On Tue, Nov 03, 2015 at 04:18:44AM -0800, Lloyd Fournier wrote: > # New Ticket Created by Lloyd Fournier > # Please include the string: [perl #126551] > # in the subject line of all future correspondence about this issue. > # <URL: https://rt.perl.org/Ticket/Display.html?id=126551 > > > > # Exporter1.pm > multi foo { } > > sub EXPORT { > Hash.new('&foo' => &foo) #Map.new doesn't cause it. > } > --- > # Exporter2.pm > multi foo is export { } > --- > # main.pl > use Exporter1; > use Exporter2; > > #! Segmentation fault
Score! ================================================================= ==13267==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60300023e2c8 at pc 0x7fa2e35f4498 bp 0x7fff11d85020 sp 0x7fff11d85018 READ of size 8 at 0x60300023e2c8 thread T0 #0 0x7fa2e35f4497 in get_attribute src/6model/reprs/P6opaque.c:224 #1 0x7fa2e34c413c in MVM_interp_run src/core/interp.c:2462 #2 0x7fa2e37602a3 in MVM_vm_run_file src/moar.c:249 #3 0x401a4f in main src/main.c:191 #4 0x7fa2e2cebd5c in __libc_start_main (/lib64/libc.so.6+0x1ed5c) #5 0x401058 (/home/nicholas/Sandpit/moar-san/bin/moar+0x401058) 0x60300023e2c8 is located 8 bytes to the left of 24-byte region [0x60300023e2d0,0x60300023e2e8) allocated by thread T0 here: #0 0x7fa2e406a62f in __interceptor_malloc ../../.././libsanitizer/asan/asan_malloc_linux.cc:72 #1 0x7fa2e367c6b5 in MVM_malloc src/core/alloc.h:2 #2 0x7fa2e368fce7 in deserialize_stable src/6model/serialization.c:2413 #3 0x7fa2e369208d in work_loop src/6model/serialization.c:2601 #4 0x7fa2e369291f in MVM_serialization_demand_stable src/6model/serialization.c:2671 #5 0x7fa2e3679afd in MVM_sc_get_stable src/6model/sc.c:234 #6 0x7fa2e368dba0 in read_object_table_entry src/6model/serialization.c:2114 #7 0x7fa2e3693c86 in repossess src/6model/serialization.c:2832 #8 0x7fa2e3694f41 in MVM_serialization_deserialize src/6model/serialization.c:2990 #9 0x7fa2e34db5f6 in MVM_interp_run src/core/interp.c:3466 #10 0x7fa2e37602a3 in MVM_vm_run_file src/moar.c:249 #11 0x401a4f in main src/main.c:191 #12 0x7fa2e2cebd5c in __libc_start_main (/lib64/libc.so.6+0x1ed5c) SUMMARY: AddressSanitizer: heap-buffer-overflow src/6model/reprs/P6opaque.c:224 get_attribute Shadow bytes around the buggy address: 0x0c068003fc00: 00 00 00 02 fa fa 00 00 00 fa fa fa 00 00 00 fa 0x0c068003fc10: fa fa 00 00 00 fa fa fa 00 00 00 00 fa fa 00 00 0x0c068003fc20: 00 00 fa fa 00 00 00 00 fa fa 00 00 00 00 fa fa 0x0c068003fc30: 00 00 00 06 fa fa 00 00 00 06 fa fa 00 00 00 06 0x0c068003fc40: fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00 =>0x0c068003fc50: 00 fa fa fa 00 00 00 fa fa[fa]00 00 00 fa fa fa 0x0c068003fc60: 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00 00 fa 0x0c068003fc70: fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00 0x0c068003fc80: 00 fa fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa 0x0c068003fc90: 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00 00 fa 0x0c068003fca0: fa fa 00 00 00 fa fa fa 00 00 00 fa fa fa 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Contiguous container OOB:fc ASan internal: fe ==13267==ABORTING Not a NULL pointer dereference. A more serious bug than that. Thanks for reporting the bug, and thanks for reducing it down to a really small case. Nicholas Clark