diff options
author | Shahab Vahedi <shahab@synopsys.com> | 2020-01-06 15:27:32 +0100 |
---|---|---|
committer | Pedro Alves <palves@redhat.com> | 2020-01-06 19:47:20 +0000 |
commit | cbfa85811792ca8e96ace40bef0aaaf507e54bcc (patch) | |
tree | 6cb59c31bf71bc95e6212e74ca32b475a62acc88 /gdb/stack.c | |
parent | 3f6028216b1df14a299a9cd89b1149258c024d4f (diff) | |
download | gdb-cbfa85811792ca8e96ace40bef0aaaf507e54bcc.zip gdb-cbfa85811792ca8e96ace40bef0aaaf507e54bcc.tar.gz gdb-cbfa85811792ca8e96ace40bef0aaaf507e54bcc.tar.bz2 |
GDB: Fix the overflow in addr/line_is_displayed()
In tui_disasm_window::addr_is_displayed(), there can be situations
where "content" is empty. For instance, it can happen when the
"content" was not filled in tui_disasm_window::set_contents(),
because tui_disassemble() threw an exception. Usually this exception
is the result of fetching invalid PC addresses like the ones beyond
the end of the program.
Having "content.size ()" zero leads to an overflow in this condition
check inside tui_disasm_window::addr_is_displayed():
int i = 0;
while (i < content.size () - threshold ...) {
... content[i] ...
}
"threshold" is 2 and there are times that "content.size ()" is 0.
This results into an overflow and the loop is entered whereas it
should have been skipped. Finally, "content[i]" access leads to
a segmentation fault.
Same problem applies to tui_source_window::line_is_displayed().
The issue has been discussed at length in bug 25345:
https://sourceware.org/bugzilla/show_bug.cgi?id=25345
This commit avoids the segmentation faults with an early check:
if (content.size () < SCROLL_THRESHOLD)
return false;
Moreover, those functions have been overhauled to a leaner code.
gdb/ChangeLog:
2020-01-06 Shahab Vahedi <shahab@synopsys.com>
* tui/tui-disasm.c (tui_disasm_window::addr_is_displayed): Avoid
overflow by an early check of content vs threshold.
* tui/tui-source.c (tui_source_window::line_is_displayed):
Likewise.
Diffstat (limited to 'gdb/stack.c')
0 files changed, 0 insertions, 0 deletions