[pcre-dev] [Bug 1803] segfault in pcre jit when running twig…

Góra strony
Delete this message
Autor: admin
Data:  
Dla: pcre-dev
Temat: [pcre-dev] [Bug 1803] segfault in pcre jit when running twig test suite (PHP7)
https://bugs.exim.org/show_bug.cgi?id=1803

--- Comment #34 from Nish Aravamudan <nish.aravamudan@???> ---
(gdb) print &size_offsets
$49 = (int *) 0x7fffffff9288

(gdb) watch *0x7fffffff9288
Hardware watchpoint 4: *0x7fffffff9288

Old value = 3
New value = 0
_pcre_jit_exec (extra_data=extra_data@entry=0x555555d4de70, 
    subject=subject@entry=0x7fffed40b1a8
"\303\251\303\204\303\237\343\201\224a", length=length@entry=10,
start_offset=start_offset@entry=2, 
    options=options@entry=8192, offsets=offsets@entry=0x7fffffff9210, 
    offset_count=<optimized out>) at pcre_jit_compile.c:10481
10481    pcre_jit_compile.c: No such file or directory.


Which seems to be the return from jit_exec ? That roughly would correspond to
what we see in the previous attachment.

(gdb) disassemble $pc-32,$pc+32
Dump of assembler code from 0x7ffff799b6ea to 0x7ffff799b72a:
   0x00007ffff799b6ea <_pcre_jit_exec+314>:    rorl   %cl,0x39440014(%rbp)
   0x00007ffff799b6f0 <_pcre_jit_exec+320>:    loop   0x7ffff799b6ac
<_pcre_jit_exec+252>
   0x00007ffff799b6f2 <_pcre_jit_exec+322>:    add    %al,(%rax)
   0x00007ffff799b6f4 <_pcre_jit_exec+324>:    add    %al,(%rax)
   0x00007ffff799b6f6 <_pcre_jit_exec+326>:    cmovg  %edx,%eax
   0x00007ffff799b6f9 <_pcre_jit_exec+329>:    testb  $0x20,(%rbx)
   0x00007ffff799b6fc <_pcre_jit_exec+332>:    je     0x7ffff799b70a
<_pcre_jit_exec+346>
   0x00007ffff799b6fe <_pcre_jit_exec+334>:    mov    0x30(%rbx),%rdx
   0x00007ffff799b702 <_pcre_jit_exec+338>:    mov    0x30(%rsp),%rcx
   0x00007ffff799b707 <_pcre_jit_exec+343>:    mov    %rcx,(%rdx)
=> 0x00007ffff799b70a <_pcre_jit_exec+346>:    mov    0x58(%rsp),%rbx
   0x00007ffff799b70f <_pcre_jit_exec+351>:    xor    %fs:0x28,%rbx
   0x00007ffff799b718 <_pcre_jit_exec+360>:    jne    0x7ffff799b761
<_pcre_jit_exec+433>
   0x00007ffff799b71a <_pcre_jit_exec+362>:    add    $0x60,%rsp
   0x00007ffff799b71e <_pcre_jit_exec+366>:    pop    %rbx
   0x00007ffff799b71f <_pcre_jit_exec+367>:    pop    %rbp
   0x00007ffff799b720 <_pcre_jit_exec+368>:    pop    %r12
   0x00007ffff799b722 <_pcre_jit_exec+370>:    retq   
   0x00007ffff799b723 <_pcre_jit_exec+371>:    nopl   0x0(%rax,%rax,1)


--
You are receiving this mail because:
You are on the CC list for the bug.