https://gcc.gnu.org/bugzilla/show_bug.cgi?id=103930
--- Comment #2 from Jan Engelhardt <jengelh at inai dot de> --- Subissue a) "the crash output is completely useless" seems to have been addressed in the past already; I observe in gcc 12 that Found plugin run function: 0x7fecaa0e01a0 AddressSanitizer:DEADLYSIGNAL ================================================================= ==75097==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000000000 bp 0x7ffccfe3f0b0 sp 0x7ffccfe3f0a8 T0) ==75097==Hint: pc points to the zero page. ==75097==The signal is caused by a READ memory access. ==75097==Hint: address points to the zero page. #0 0x0 (<unknown module>) #1 0x4010ea in main main.c:10 #2 0x7feca982c5af in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 (But yeah, I remember a time when calling null pointer functions often meant no usable stack trace, even in gdb. Not sure what that was about.)