http://gcc.gnu.org/bugzilla/show_bug.cgi?id=55333



             Bug #: 55333

           Summary: [x32] 8 asan test failures

    Classification: Unclassified

           Product: gcc

           Version: 4.8.0

            Status: UNCONFIRMED

          Severity: normal

          Priority: P3

         Component: other

        AssignedTo: unassig...@gcc.gnu.org

        ReportedBy: hjl.to...@gmail.com





Schedule of variations:

    unix/-mx32



Running target unix/-mx32

Using /usr/share/dejagnu/baseboards/unix.exp as board description file for

target.

Using /usr/share/dejagnu/config/unix.exp as generic interface file for target.

Using /export/gnu/import/git/gcc/gcc/testsuite/config/default.exp as

tool-and-target-specific interface file.

Running /export/gnu/import/git/gcc/gcc/testsuite/gcc.dg/asan/asan.exp ...

FAIL: c-c++-common/asan/memcmp-1.c  -O0  output pattern test, is

=================================================================

==3035== ERROR: AddressSanitizer stack-buffer-overflow on address 0xffe91e45 at

pc 0xf5b1e798 bp 0xffe91df0 sp 0xffe91d90

READ of size 1 at 0xffe91e45 thread T0

    #0 0xf5b1e797 in __interceptor_memcmp

/export/gnu/import/git/gcc/libsanitizer/asan/asan_interceptors.cc:218

(discriminator 1)

Address 0xffe91e45 is located at offset 37 in frame <main> of T0's stack:

  This frame has 2 object(s):

    [32, 36) 'a1'

    [96, 100) 'a2'

HINT: this may be a false positive if your program uses some custom stack

unwind mechanism

      (longjmp and C++ exceptions *are* supported)

Shadow byte and word:

  0x3ffd23c8: 4

  0x3ffd23c8: 04 f4 f4 f4

More shadow bytes:

  0x3ffd23b8: 00 00 00 00

  0x3ffd23bc: 00 00 00 00

  0x3ffd23c0: 00 00 00 00

  0x3ffd23c4: f1 f1 f1 f1

=>0x3ffd23c8: 04 f4 f4 f4

  0x3ffd23cc: f2 f2 f2 f2

  0x3ffd23d0: 04 f4 f4 f4

  0x3ffd23d4: f3 f3 f3 f3

  0x3ffd23d8: 00 00 00 00

Stats: 0M malloced (0M for red zones) by 0 calls

Stats: 0M realloced by 0 calls

Stats: 0M freed by 0 calls

Stats: 0M really freed by 0 calls

Stats: 0M (0 full pages) mmaped in 0 calls

  mmaps   by size class: 

  mallocs by size class: 

  frees   by size class: 

  rfrees  by size class: 

Stats: malloc large: 0 small slow: 0

==3035== ABORTING

, should match ERROR: AddressSanitizer stack-buffer-overflow.*(

|

)    #0 0x[0-9a-f]+ (in _*(interceptor_|)memcmp |[(])[^

]*(

|

)    #1 0x[0-9a-f]+ (in _*main|[(])[^

]*(

|

)

FAIL: c-c++-common/asan/memcmp-1.c  -O1  output pattern test, is

=================================================================

==3135== ERROR: AddressSanitizer stack-buffer-overflow on address 0xffe3c135 at

pc 0xf5b81798 bp 0xffe3c100 sp 0xffe3c0a0

READ of size 1 at 0xffe3c135 thread T0

    #0 0xf5b81797 in __interceptor_memcmp

/export/gnu/import/git/gcc/libsanitizer/asan/asan_interceptors.cc:218

(discriminator 1)

Address 0xffe3c135 is located at offset 37 in frame <main> of T0's stack:

  This frame has 2 object(s):

    [32, 36) 'a1'

    [96, 100) 'a2'

HINT: this may be a false positive if your program uses some custom stack

unwind mechanism

      (longjmp and C++ exceptions *are* supported)

Shadow byte and word:

  0x3ffc7826: 4

  0x3ffc7824: f1 f1 04 f4

More shadow bytes:

  0x3ffc7814: 00 00 00 00

  0x3ffc7818: 00 00 00 00

  0x3ffc781c: 00 00 00 00

  0x3ffc7820: 00 00 f1 f1

=>0x3ffc7824: f1 f1 04 f4

  0x3ffc7828: f4 f4 f2 f2

  0x3ffc782c: f2 f2 04 f4

  0x3ffc7830: f4 f4 f3 f3

  0x3ffc7834: f3 f3 00 00

Stats: 0M malloced (0M for red zones) by 0 calls

Stats: 0M realloced by 0 calls

Stats: 0M freed by 0 calls

Stats: 0M really freed by 0 calls

Stats: 0M (0 full pages) mmaped in 0 calls

  mmaps   by size class: 

  mallocs by size class: 

  frees   by size class: 

  rfrees  by size class: 

Stats: malloc large: 0 small slow: 0

==3135== ABORTING

, should match ERROR: AddressSanitizer stack-buffer-overflow.*(

|

)    #0 0x[0-9a-f]+ (in _*(interceptor_|)memcmp |[(])[^

]*(

|

)    #1 0x[0-9a-f]+ (in _*main|[(])[^

]*(

|

)

FAIL: c-c++-common/asan/memcmp-1.c  -O2  output pattern test, is

=================================================================

==3220== ERROR: AddressSanitizer stack-buffer-overflow on address 0xffa93f15 at

pc 0xf5b6d798 bp 0xffa93ee0 sp 0xffa93e80

READ of size 1 at 0xffa93f15 thread T0

    #0 0xf5b6d797 in __interceptor_memcmp

/export/gnu/import/git/gcc/libsanitizer/asan/asan_interceptors.cc:218

(discriminator 1)

Address 0xffa93f15 is located at offset 37 in frame <main> of T0's stack:

  This frame has 2 object(s):

    [32, 36) 'a1'

    [96, 100) 'a2'

HINT: this may be a false positive if your program uses some custom stack

unwind mechanism

      (longjmp and C++ exceptions *are* supported)

Shadow byte and word:

  0x3ff527e2: 4

  0x3ff527e0: f1 f1 04 f4

More shadow bytes:

  0x3ff527d0: 00 00 00 00

  0x3ff527d4: 00 00 00 00

  0x3ff527d8: 00 00 00 00

  0x3ff527dc: 00 00 f1 f1

=>0x3ff527e0: f1 f1 04 f4

  0x3ff527e4: f4 f4 f2 f2

  0x3ff527e8: f2 f2 04 f4

  0x3ff527ec: f4 f4 f3 f3

  0x3ff527f0: f3 f3 00 00

Stats: 0M malloced (0M for red zones) by 0 calls

Stats: 0M realloced by 0 calls

Stats: 0M freed by 0 calls

Stats: 0M really freed by 0 calls

Stats: 0M (0 full pages) mmaped in 0 calls

  mmaps   by size class: 

  mallocs by size class: 

  frees   by size class: 

  rfrees  by size class: 

Stats: malloc large: 0 small slow: 0

==3220== ABORTING

, should match ERROR: AddressSanitizer stack-buffer-overflow.*(

|

)    #0 0x[0-9a-f]+ (in _*(interceptor_|)memcmp |[(])[^

]*(

|

)    #1 0x[0-9a-f]+ (in _*main|[(])[^

]*(

|

)

FAIL: c-c++-common/asan/memcmp-1.c  -O3 -fomit-frame-pointer  output pattern

test, is =================================================================

==3372== ERROR: AddressSanitizer stack-buffer-overflow on address 0xff9dd5d5 at

pc 0xf5b18798 bp 0xff9dd5a0 sp 0xff9dd540

READ of size 1 at 0xff9dd5d5 thread T0

    #0 0xf5b18797 in __interceptor_memcmp

/export/gnu/import/git/gcc/libsanitizer/asan/asan_interceptors.cc:218

(discriminator 1)

Address 0xff9dd5d5 is located at offset 37 in frame <main> of T0's stack:

  This frame has 2 object(s):

    [32, 36) 'a1'

    [96, 100) 'a2'

HINT: this may be a false positive if your program uses some custom stack

unwind mechanism

      (longjmp and C++ exceptions *are* supported)

Shadow byte and word:

  0x3ff3baba: 4

  0x3ff3bab8: f1 f1 04 f4

More shadow bytes:

  0x3ff3baa8: 00 00 00 00

  0x3ff3baac: 00 00 00 00

  0x3ff3bab0: 00 00 00 00

  0x3ff3bab4: 00 00 f1 f1

=>0x3ff3bab8: f1 f1 04 f4

  0x3ff3babc: f4 f4 f2 f2

  0x3ff3bac0: f2 f2 04 f4

  0x3ff3bac4: f4 f4 f3 f3

  0x3ff3bac8: f3 f3 00 00

Stats: 0M malloced (0M for red zones) by 0 calls

Stats: 0M realloced by 0 calls

Stats: 0M freed by 0 calls

Stats: 0M really freed by 0 calls

Stats: 0M (0 full pages) mmaped in 0 calls

  mmaps   by size class: 

  mallocs by size class: 

  frees   by size class: 

  rfrees  by size class: 

Stats: malloc large: 0 small slow: 0

==3372== ABORTING

, should match ERROR: AddressSanitizer stack-buffer-overflow.*(

|

)    #0 0x[0-9a-f]+ (in _*(interceptor_|)memcmp |[(])[^

]*(

|

)    #1 0x[0-9a-f]+ (in _*main|[(])[^

]*(

|

)

FAIL: c-c++-common/asan/memcmp-1.c  -O3 -g  output pattern test, is

=================================================================

==3475== ERROR: AddressSanitizer stack-buffer-overflow on address 0xfffb9475 at

pc 0xf5ad4798 bp 0xfffb9440 sp 0xfffb93e0

READ of size 1 at 0xfffb9475 thread T0

    #0 0xf5ad4797 in __interceptor_memcmp

/export/gnu/import/git/gcc/libsanitizer/asan/asan_interceptors.cc:218

(discriminator 1)

Address 0xfffb9475 is located at offset 37 in frame <main> of T0's stack:

  This frame has 2 object(s):

    [32, 36) 'a1'

    [96, 100) 'a2'

HINT: this may be a false positive if your program uses some custom stack

unwind mechanism

      (longjmp and C++ exceptions *are* supported)

Shadow byte and word:

  0x3fff728e: 4

  0x3fff728c: f1 f1 04 f4

More shadow bytes:

  0x3fff727c: 00 00 00 00

  0x3fff7280: 00 00 00 00

  0x3fff7284: 00 00 00 00

  0x3fff7288: 00 00 f1 f1

=>0x3fff728c: f1 f1 04 f4

  0x3fff7290: f4 f4 f2 f2

  0x3fff7294: f2 f2 04 f4
  0x3fff7298: f4 f4 f3 f3

  0x3fff729c: f3 f3 00 00

Stats: 0M malloced (0M for red zones) by 0 calls

Stats: 0M realloced by 0 calls

Stats: 0M freed by 0 calls

Stats: 0M really freed by 0 calls

Stats: 0M (0 full pages) mmaped in 0 calls

  mmaps   by size class: 

  mallocs by size class: 

  frees   by size class: 

  rfrees  by size class: 

Stats: malloc large: 0 small slow: 0

==3475== ABORTING

, should match ERROR: AddressSanitizer stack-buffer-overflow.*(

|

)    #0 0x[0-9a-f]+ (in _*(interceptor_|)memcmp |[(])[^

]*(

|

)    #1 0x[0-9a-f]+ (in _*main|[(])[^

]*(

|

)

FAIL: c-c++-common/asan/memcmp-1.c  -Os  output pattern test, is

=================================================================

==3572== ERROR: AddressSanitizer stack-buffer-overflow on address 0xff9adc55 at

pc 0xf5b26798 bp 0xff9adc20 sp 0xff9adbc0

READ of size 1 at 0xff9adc55 thread T0

    #0 0xf5b26797 in __interceptor_memcmp

/export/gnu/import/git/gcc/libsanitizer/asan/asan_interceptors.cc:218

(discriminator 1)

Address 0xff9adc55 is located at offset 37 in frame <main> of T0's stack:

  This frame has 2 object(s):

    [32, 36) 'a1'

    [96, 100) 'a2'

HINT: this may be a false positive if your program uses some custom stack

unwind mechanism

      (longjmp and C++ exceptions *are* supported)

Shadow byte and word:

  0x3ff35b8a: 4

  0x3ff35b88: f1 f1 04 f4

More shadow bytes:

  0x3ff35b78: 00 00 00 00

  0x3ff35b7c: 00 00 00 00

  0x3ff35b80: 00 00 00 00

  0x3ff35b84: 00 00 f1 f1

=>0x3ff35b88: f1 f1 04 f4

  0x3ff35b8c: f4 f4 f2 f2

  0x3ff35b90: f2 f2 04 f4

  0x3ff35b94: f4 f4 f3 f3

  0x3ff35b98: f3 f3 00 00

Stats: 0M malloced (0M for red zones) by 0 calls

Stats: 0M realloced by 0 calls

Stats: 0M freed by 0 calls

Stats: 0M really freed by 0 calls

Stats: 0M (0 full pages) mmaped in 0 calls

  mmaps   by size class: 

  mallocs by size class: 

  frees   by size class: 

  rfrees  by size class: 

Stats: malloc large: 0 small slow: 0

==3572== ABORTING

, should match ERROR: AddressSanitizer stack-buffer-overflow.*(

|

)    #0 0x[0-9a-f]+ (in _*(interceptor_|)memcmp |[(])[^

]*(

|

)    #1 0x[0-9a-f]+ (in _*main|[(])[^

]*(

|

)

FAIL: c-c++-common/asan/memcmp-1.c  -O2 -flto -fno-use-linker-plugin

-flto-partition=none  output pattern test, is

=================================================================

==3824== ERROR: AddressSanitizer stack-buffer-overflow on address 0xff802b65 at

pc 0xf5b8b798 bp 0xff802b30 sp 0xff802ad0

READ of size 1 at 0xff802b65 thread T0

    #0 0xf5b8b797 in __interceptor_memcmp

/export/gnu/import/git/gcc/libsanitizer/asan/asan_interceptors.cc:218

(discriminator 1)

Address 0xff802b65 is located at offset 37 in frame <main> of T0's stack:

  This frame has 2 object(s):

    [32, 36) 'a1'

    [96, 100) 'a2'

HINT: this may be a false positive if your program uses some custom stack

unwind mechanism

      (longjmp and C++ exceptions *are* supported)

Shadow byte and word:

  0x3ff0056c: 4

  0x3ff0056c: 04 f4 f4 f4

More shadow bytes:

  0x3ff0055c: 00 00 00 00

  0x3ff00560: 00 00 00 00

  0x3ff00564: 00 00 00 00

  0x3ff00568: f1 f1 f1 f1

=>0x3ff0056c: 04 f4 f4 f4

  0x3ff00570: f2 f2 f2 f2

  0x3ff00574: 04 f4 f4 f4

  0x3ff00578: f3 f3 f3 f3

  0x3ff0057c: 00 00 00 00

Stats: 0M malloced (0M for red zones) by 0 calls

Stats: 0M realloced by 0 calls

Stats: 0M freed by 0 calls

Stats: 0M really freed by 0 calls

Stats: 0M (0 full pages) mmaped in 0 calls

  mmaps   by size class: 

  mallocs by size class: 

  frees   by size class: 

  rfrees  by size class: 

Stats: malloc large: 0 small slow: 0

==3824== ABORTING

, should match ERROR: AddressSanitizer stack-buffer-overflow.*(

|

)    #0 0x[0-9a-f]+ (in _*(interceptor_|)memcmp |[(])[^

]*(

|

)    #1 0x[0-9a-f]+ (in _*main|[(])[^

]*(

|

)

FAIL: c-c++-common/asan/memcmp-1.c  -O2 -flto -fuse-linker-plugin

-fno-fat-lto-objects  output pattern test, is

=================================================================

==3947== ERROR: AddressSanitizer stack-buffer-overflow on address 0xffdb2fb5 at

pc 0xf5b7e798 bp 0xffdb2f80 sp 0xffdb2f20

READ of size 1 at 0xffdb2fb5 thread T0

    #0 0xf5b7e797 in __interceptor_memcmp

/export/gnu/import/git/gcc/libsanitizer/asan/asan_interceptors.cc:218

(discriminator 1)

Address 0xffdb2fb5 is located at offset 37 in frame <main> of T0's stack:

  This frame has 2 object(s):

    [32, 36) 'a1'

    [96, 100) 'a2'

HINT: this may be a false positive if your program uses some custom stack

unwind mechanism

      (longjmp and C++ exceptions *are* supported)

Shadow byte and word:

  0x3ffb65f6: 4

  0x3ffb65f4: f1 f1 04 f4

More shadow bytes:

  0x3ffb65e4: 00 00 00 00

  0x3ffb65e8: 00 00 00 00

  0x3ffb65ec: 00 00 00 00

  0x3ffb65f0: 00 00 f1 f1

=>0x3ffb65f4: f1 f1 04 f4

  0x3ffb65f8: f4 f4 f2 f2

  0x3ffb65fc: f2 f2 04 f4

  0x3ffb6600: f4 f4 f3 f3

  0x3ffb6604: f3 f3 00 00

Stats: 0M malloced (0M for red zones) by 0 calls

Stats: 0M realloced by 0 calls

Stats: 0M freed by 0 calls

Stats: 0M really freed by 0 calls

Stats: 0M (0 full pages) mmaped in 0 calls

  mmaps   by size class: 

  mallocs by size class: 

  frees   by size class: 

  rfrees  by size class: 

Stats: malloc large: 0 small slow: 0

==3947== ABORTING

, should match ERROR: AddressSanitizer stack-buffer-overflow.*(

|

)    #0 0x[0-9a-f]+ (in _*(interceptor_|)memcmp |[(])[^

]*(

|

)    #1 0x[0-9a-f]+ (in _*main|[(])[^

]*(

|

)



        === gcc Summary ===



# of expected passes        16

# of unexpected failures    8

Reply via email to