aboutsummaryrefslogtreecommitdiffstats
diff options
context:
space:
mode:
authorNobuyoshi Nakada <nobu@ruby-lang.org>2020-08-30 16:07:12 +0900
committerNobuyoshi Nakada <nobu@ruby-lang.org>2020-08-30 16:07:12 +0900
commit9eda6547812cbda23a73ba3b2620520b0de2bdd6 (patch)
treef4f355ac188c30d7ae32c906d594b2b5282cd2af
parent726f2e59f9b0c7a69f540e09bab54ab17b013d56 (diff)
downloadruby-9eda6547812cbda23a73ba3b2620520b0de2bdd6.tar.gz
KNOWNBUGS.rb: use-after-poison since b9007b6c548f91e88fd3f2ffa23de740431fa969
-rw-r--r--KNOWNBUGS.rb82
1 files changed, 82 insertions, 0 deletions
diff --git a/KNOWNBUGS.rb b/KNOWNBUGS.rb
index 35a8e75876..4db33a64a2 100644
--- a/KNOWNBUGS.rb
+++ b/KNOWNBUGS.rb
@@ -5,3 +5,85 @@
# This test file includes tests which point out known bugs.
# So all tests will cause failure.
#
+
+assert_normal_exit %q{
+ using Module.new
+}
+
+=begin
+=================================================================
+==43397==ERROR: AddressSanitizer: use-after-poison on address 0x62d000004028 at pc 0x000107ffd8b2 bp 0x7ffee87380d0 sp 0x7ffee87380c8
+READ of size 8 at 0x62d000004028 thread T0
+ #0 0x107ffd8b1 in invalidate_all_cc vm_method.c:243
+ #1 0x107a891bf in objspace_each_objects_without_setup gc.c:3074
+ #2 0x107ab6d4b in objspace_each_objects_protected gc.c:3084
+ #3 0x107a5409b in rb_ensure eval.c:1137
+ #4 0x107a88bcb in objspace_each_objects gc.c:3152
+ #5 0x107a8888a in rb_objspace_each_objects gc.c:3136
+ #6 0x107ffd843 in rb_clear_method_cache_all vm_method.c:259
+ #7 0x107a55c9f in rb_using_module eval.c:1483
+ #8 0x107a57dcf in top_using eval.c:1829
+ #9 0x10806f65f in call_cfunc_1 vm_insnhelper.c:2439
+ #10 0x108062ea5 in vm_call_cfunc_with_frame vm_insnhelper.c:2601
+ #11 0x1080491b7 in vm_call_cfunc vm_insnhelper.c:2622
+ #12 0x108048136 in vm_call_method_each_type vm_insnhelper.c:3100
+ #13 0x108047507 in vm_call_method vm_insnhelper.c:3204
+ #14 0x10800c03c in vm_call_general vm_insnhelper.c:3240
+ #15 0x10803858e in vm_sendish vm_insnhelper.c:4194
+ #16 0x107feb993 in vm_exec_core insns.def:799
+ #17 0x1080223db in rb_vm_exec vm.c:1944
+ #18 0x108026d2f in rb_iseq_eval_main vm.c:2201
+ #19 0x107a4e863 in rb_ec_exec_node eval.c:296
+ #20 0x107a4e323 in ruby_run_node eval.c:354
+ #21 0x1074c2c94 in main main.c:50
+ #22 0x7fff6b093cc8 in start (libdyld.dylib:x86_64+0x1acc8)
+
+0x62d000004028 is located 40 bytes inside of 16384-byte region [0x62d000004000,0x62d000008000)
+allocated by thread T0 here:
+ #0 0x1086bf1c0 in wrap_posix_memalign (libclang_rt.asan_osx_dynamic.dylib:x86_64h+0x461c0)
+ #1 0x107a9be2f in rb_aligned_malloc gc.c:9748
+ #2 0x107ab26fd in heap_page_allocate gc.c:1771
+ #3 0x107ab24a4 in heap_page_create gc.c:1875
+ #4 0x107ab23e8 in heap_assign_page gc.c:1895
+ #5 0x107a88093 in heap_add_pages gc.c:1908
+ #6 0x107a87f8f in Init_heap gc.c:3030
+ #7 0x107a4afd6 in ruby_setup eval.c:85
+ #8 0x107a4b64c in ruby_init eval.c:108
+ #9 0x1074c2c02 in main main.c:49
+ #10 0x7fff6b093cc8 in start (libdyld.dylib:x86_64+0x1acc8)
+
+SUMMARY: AddressSanitizer: use-after-poison vm_method.c:243 in invalidate_all_cc
+Shadow bytes around the buggy address:
+ 0x1c5a000007b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
+ 0x1c5a000007c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
+ 0x1c5a000007d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
+ 0x1c5a000007e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
+ 0x1c5a000007f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
+=>0x1c5a00000800: 00 00 00 00 00[f7]00 00 00 00 f7 00 00 00 00 f7
+ 0x1c5a00000810: 00 00 00 00 f7 00 00 00 00 f7 00 00 00 00 f7 00
+ 0x1c5a00000820: 00 00 00 f7 00 00 00 00 f7 00 00 00 00 f7 00 00
+ 0x1c5a00000830: 00 00 f7 00 00 00 00 f7 00 00 00 00 f7 00 00 00
+ 0x1c5a00000840: 00 f7 00 00 00 00 f7 00 00 00 00 f7 00 00 00 00
+ 0x1c5a00000850: f7 00 00 00 00 f7 00 00 00 00 f7 00 00 00 00 f7
+Shadow byte legend (one shadow byte represents 8 application bytes):
+ Addressable: 00
+ Partially addressable: 01 02 03 04 05 06 07
+ Heap left redzone: fa
+ Freed heap region: fd
+ Stack left redzone: f1
+ Stack mid redzone: f2
+ Stack right redzone: f3
+ Stack after return: f5
+ Stack use after scope: f8
+ Global redzone: f9
+ Global init order: f6
+ Poisoned by user: f7
+ Container overflow: fc
+ Array cookie: ac
+ Intra object redzone: bb
+ ASan internal: fe
+ Left alloca redzone: ca
+ Right alloca redzone: cb
+ Shadow gap: cc
+==43397==ABORTING
+=end