https://sourceware.org/bugzilla/show_bug.cgi?id=33465
Bug ID: 33465
Summary: [BUG] A SEGV in elf_x86_64_relocate_section at
elf64-x86-64.c:4806
Product: binutils
Version: 2.45
Status: UNCONFIRMED
Severity: normal
Priority: P2
Component: ld
Assignee: unassigned at sourceware dot org
Reporter: yfzhang23 at stu dot pku.edu.cn
Target Milestone: ---
Created attachment 16363
--> https://sourceware.org/bugzilla/attachment.cgi?id=16363&action=edit
POC
## Description
- Version: Binutils 2.45 with patches in bug 33451, bug 33455, and bug 33457.
- Environment: Ubuntu 20.04.6 LTS, Clang 12.0.0
## Steps to reproduce
export CC="clang"
export CFLAGS="-g -fsanitize=address"
./configure
make -j
./ld/ld-new --gc-sections --no-print-gc-sections -w $POC
## Sanitizer output
==146904==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x000000639ff7
bp 0x7ffd58a35e60 sp 0x7ffd58a33180 T0)
==146904==The signal is caused by a READ memory access.
==146904==Hint: this fault was caused by a dereference of a high value address
(see register values below). Disassemble the provided pc to learn which
register was used.
#0 0x639ff7 in elf_x86_64_relocate_section
/benchmark/bin/binutils-2.45/bfd/elf64-x86-64.c:4806:5
#1 0x7696f4 in elf_link_input_bfd
/benchmark/bin/binutils-2.45/bfd/elflink.c:11926:10
#2 0x75b539 in bfd_elf_final_link
/benchmark/bin/binutils-2.45/bfd/elflink.c:13185:11
#3 0x545133 in ldwrite /benchmark/bin/binutils-2.45/ld/ldwrite.c:548:8
#4 0x53cc51 in main /benchmark/bin/binutils-2.45/ld/./ldmain.c:912:3
#5 0x7f0035471082 in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x24082)
#6 0x41d6ad in _start (/benchmark/bin/binutils-2.45/ld/ld-new+0x41d6ad)
AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV
/benchmark/bin/binutils-2.45/bfd/elf64-x86-64.c:4806:5 in
elf_x86_64_relocate_section
==146904==ABORTING
## Credit
Reported by Yifan Zhang, [PLL](https://pl.cs.pku.edu.cn/en/)
--
You are receiving this mail because:
You are on the CC list for the bug.