https://gcc.gnu.org/bugzilla/show_bug.cgi?id=98669

--- Comment #4 from Matthias Klose <doko at debian dot org> ---
$ /usr/lib/gcc-snapshot/bin/gcc -fsanitize=address crypt.c -lcrypt &&
LD_LIBRARY_PATH=/usr/lib/gcc-snapshot/lib ./a.out 
sasWQy9ecMDEs

looks like this happens with a compiler configured with --enable-default-pie.

Otoh, I still see:

$ gcc-10 -no-pie -fno-stack-protector -fsanitize=address crypt.c -lcrypt &&
./a.out
AddressSanitizer:DEADLYSIGNAL
=================================================================
==2831466==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc
0x000000000000 bp 0x7ffd02382710 sp 0x7ffd023826f8 T0)
==2831466==Hint: pc points to the zero page.
==2831466==The signal is caused by a READ memory access.
==2831466==Hint: address points to the zero page.
    #0 0x0  (<unknown module>)

AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV (<unknown module>) 
==2831466==ABORTING

Reply via email to