[Bug sanitizer/98669] SIGSEGV on pc=0 in crypt() with -fsanitize=address

doko at debian dot org gcc-bugzilla@gcc.gnu.org
Thu Jan 14 10:52:44 GMT 2021


https://gcc.gnu.org/bugzilla/show_bug.cgi?id=98669

--- Comment #7 from Matthias Klose <doko at debian dot org> ---
$ ASAN_OPTIONS=verbosity=111 ./a.out
==3598976==info->dlpi_name =    info->dlpi_addr = 0x5653263c7000
==3598976==info->dlpi_name = linux-vdso.so.1    info->dlpi_addr =
0x7fff7e8ed000
==3598976==info->dlpi_name = /usr/lib/x86_64-linux-gnu/libasan.so.6    
info->dlpi_addr = 0x7f2feae05000
==3598976==AddressSanitizer: failed to intercept '__isoc99_printf'
'==3598976==AddressSanitizer: failed to intercept '__isoc99_sprintf'
'==3598976==AddressSanitizer: failed to intercept '__isoc99_snprintf'
'==3598976==AddressSanitizer: failed to intercept '__isoc99_fprintf'
'==3598976==AddressSanitizer: failed to intercept '__isoc99_vprintf'
'==3598976==AddressSanitizer: failed to intercept '__isoc99_vsprintf'
'==3598976==AddressSanitizer: failed to intercept '__isoc99_vsnprintf'
'==3598976==AddressSanitizer: failed to intercept '__isoc99_vfprintf'
'==3598976==AddressSanitizer: failed to intercept 'crypt'
'==3598976==AddressSanitizer: failed to intercept 'crypt_r'
'==3598976==AddressSanitizer: failed to intercept '__cxa_throw'
'==3598976==AddressSanitizer: libc interceptors initialized
|| `[0x10007fff8000, 0x7fffffffffff]` || HighMem    ||
|| `[0x02008fff7000, 0x10007fff7fff]` || HighShadow ||
|| `[0x00008fff7000, 0x02008fff6fff]` || ShadowGap  ||
|| `[0x00007fff8000, 0x00008fff6fff]` || LowShadow  ||
|| `[0x000000000000, 0x00007fff7fff]` || LowMem     ||
MemToShadow(shadow): 0x00008fff7000 0x000091ff6dff 0x004091ff6e00
0x02008fff6fff
redzone=16
max_redzone=2048
quarantine_size_mb=256M
thread_local_quarantine_size_kb=1024K
malloc_context_size=30
SHADOW_SCALE: 3
SHADOW_GRANULARITY: 8
SHADOW_OFFSET: 0x7fff8000
==3598976==Installed the sigaction for signal 11
==3598976==Installed the sigaction for signal 7
==3598976==Installed the sigaction for signal 8
==3598976==SetCurrentThread: 0x7f2feb7d5000 for thread 0x7f2feaab5780
==3598976==T0: stack [0x7fff7e050000,0x7fff7e850000) size 0x800000;
local=0x7fff7e84d6ec
==3598976==Using libbacktrace symbolizer.
==3598976==AddressSanitizer Init done
AddressSanitizer:DEADLYSIGNAL
=================================================================
==3598976==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc
0x000000000000 bp 0x7fff7e84d6d0 sp 0x7fff7e84d6b8 T0)
==3598976==Hint: pc points to the zero page.
==3598976==The signal is caused by a READ memory access.
==3598976==Hint: address points to the zero page.
    #0 0x0  (<unknown module>)

AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (<unknown module>) 
==3598976==ABORTING


More information about the Gcc-bugs mailing list