[Bug sanitizer/101380] Segmentation fault in address sanitizer initialization, caused by mmap-ing into the running code

2021-09-13 Thread puspmvqyfzxrbytwsu at niwghx dot com via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=101380 --- Comment #3 from puspmvqyfzxrbytwsu at niwghx dot com --- Summary of the problem, as far as I understand it now: The address sanitizer initialisation code invokes the mmap-syscall (syscall 0x9) with the following paramaters: 0x60

[Bug sanitizer/101380] Segmentation fault in address sanitizer initialization, caused by mmap-ing into the running code

2021-07-16 Thread puspmvqyfzxrbytwsu at niwghx dot com via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=101380 puspmvqyfzxrbytwsu at niwghx dot com changed: What|Removed |Added Summary|Segmentation fault in |Segmentation fault

[Bug sanitizer/101380] New: Segmentation fault in __asan_init

2021-07-08 Thread puspmvqyfzxrbytwsu at niwghx dot com via Gcc-bugs
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=101380 Bug ID: 101380 Summary: Segmentation fault in __asan_init Product: gcc Version: 11.1.0 Status: UNCONFIRMED Severity: normal Priority: P3 Component: sanitizer