From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 19417 invoked by alias); 14 Nov 2012 19:10:31 -0000 Received: (qmail 19331 invoked by uid 48); 14 Nov 2012 19:10:17 -0000 From: "howarth at nitro dot med.uc.edu" To: gcc-bugs@gcc.gnu.org Subject: [Bug bootstrap/55289] darwin bootstrap fails due to missing libsanitizer/interception/mach_override directory and files Date: Wed, 14 Nov 2012 19:10:00 -0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: gcc X-Bugzilla-Component: bootstrap X-Bugzilla-Keywords: X-Bugzilla-Severity: critical X-Bugzilla-Who: howarth at nitro dot med.uc.edu X-Bugzilla-Status: NEW X-Bugzilla-Priority: P3 X-Bugzilla-Assigned-To: unassigned at gcc dot gnu.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: X-Bugzilla-URL: http://gcc.gnu.org/bugzilla/ Auto-Submitted: auto-generated Content-Type: text/plain; charset="UTF-8" MIME-Version: 1.0 Mailing-List: contact gcc-bugs-help@gcc.gnu.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: Sender: gcc-bugs-owner@gcc.gnu.org X-SW-Source: 2012-11/txt/msg01280.txt.bz2 http://gcc.gnu.org/bugzilla/show_bug.cgi?id=55289 --- Comment #31 from Jack Howarth 2012-11-14 19:10:15 UTC --- Also fine on i386-apple-darwin10... howarth% ./use-after-free ================================================================= ==82550== ERROR: AddressSanitizer heap-use-after-free on address 0x0207afc5 at pc 0x1f0b bp 0xbfffe3a8 sp 0xbfffe39c READ of size 1 at 0x0207afc5 thread T0 #0 0x1f0a (/Users/howarth/./use-after-free+0x1f0a) #1 0x1ec0 (/Users/howarth/./use-after-free+0x1ec0) #2 0x0 (/Users/howarth/./use-after-free+0x0) 0x0207afc5 is located 5 bytes inside of 40-byte region [0x0207afc0,0x0207afe8) freed by thread T0 here: #0 0x10b34 (/sw_i386/lib/gcc4.8/lib/libasan.0.dylib+0xcb34) #1 0x10cdb (/sw_i386/lib/gcc4.8/lib/libasan.0.dylib+0xccdb) #2 0x1ee6 (/Users/howarth/./use-after-free+0x1ee6) #3 0x1ec0 (/Users/howarth/./use-after-free+0x1ec0) #4 0x0 (/Users/howarth/./use-after-free+0x0) previously allocated by thread T0 here: #0 0x10515 (/sw_i386/lib/gcc4.8/lib/libasan.0.dylib+0xc515) #1 0x99041ba7 (/usr/lib/libSystem.B.dylib+0x4ba7) #2 0x9903fc77 (/usr/lib/libSystem.B.dylib+0x2c77) #3 0x1edc (/Users/howarth/./use-after-free+0x1edc) #4 0x1ec0 (/Users/howarth/./use-after-free+0x1ec0) #5 0x0 (/Users/howarth/./use-after-free+0x0) Shadow byte and word: 0x2040f5f8: fd 0x2040f5f8: fd fd fd fd More shadow bytes: 0x2040f5e8: fa fa fa fa 0x2040f5ec: fa fa fa fa 0x2040f5f0: fa fa fa fa 0x2040f5f4: fa fa fa fa =>0x2040f5f8: fd fd fd fd 0x2040f5fc: fd fd fd fd 0x2040f600: fa fa fa fa 0x2040f604: fa fa fa fa 0x2040f608: fa fa fa fa Stats: 0M malloced (0M for red zones) by 1 calls Stats: 0M realloced by 0 calls Stats: 0M freed by 1 calls Stats: 0M really freed by 0 calls Stats: 0M (128 full pages) mmaped in 1 calls mmaps by size class: 7:4095; mallocs by size class: 7:1; frees by size class: 7:1; rfrees by size class: Stats: malloc large: 0 small slow: 1 ==82550== ABORTING Alexander, can you check in libsanitizer/interception/mach_override/mach_override.c (patched as in comment 229) and libsanitizer/interception/mach_override/mach_override.h with the build infrastructure patch from http://gcc.gnu.org/ml/gcc-patches/2012-11/msg01119.html? It would be nice to be able to start testing libsanitizer on intel darwin.