https://gcc.gnu.org/bugzilla/show_bug.cgi?id=98669
--- Comment #7 from Matthias Klose <doko at debian dot org> --- $ ASAN_OPTIONS=verbosity=111 ./a.out ==3598976==info->dlpi_name = info->dlpi_addr = 0x5653263c7000 ==3598976==info->dlpi_name = linux-vdso.so.1 info->dlpi_addr = 0x7fff7e8ed000 ==3598976==info->dlpi_name = /usr/lib/x86_64-linux-gnu/libasan.so.6 info->dlpi_addr = 0x7f2feae05000 ==3598976==AddressSanitizer: failed to intercept '__isoc99_printf' '==3598976==AddressSanitizer: failed to intercept '__isoc99_sprintf' '==3598976==AddressSanitizer: failed to intercept '__isoc99_snprintf' '==3598976==AddressSanitizer: failed to intercept '__isoc99_fprintf' '==3598976==AddressSanitizer: failed to intercept '__isoc99_vprintf' '==3598976==AddressSanitizer: failed to intercept '__isoc99_vsprintf' '==3598976==AddressSanitizer: failed to intercept '__isoc99_vsnprintf' '==3598976==AddressSanitizer: failed to intercept '__isoc99_vfprintf' '==3598976==AddressSanitizer: failed to intercept 'crypt' '==3598976==AddressSanitizer: failed to intercept 'crypt_r' '==3598976==AddressSanitizer: failed to intercept '__cxa_throw' '==3598976==AddressSanitizer: libc interceptors initialized || `[0x10007fff8000, 0x7fffffffffff]` || HighMem || || `[0x02008fff7000, 0x10007fff7fff]` || HighShadow || || `[0x00008fff7000, 0x02008fff6fff]` || ShadowGap || || `[0x00007fff8000, 0x00008fff6fff]` || LowShadow || || `[0x000000000000, 0x00007fff7fff]` || LowMem || MemToShadow(shadow): 0x00008fff7000 0x000091ff6dff 0x004091ff6e00 0x02008fff6fff redzone=16 max_redzone=2048 quarantine_size_mb=256M thread_local_quarantine_size_kb=1024K malloc_context_size=30 SHADOW_SCALE: 3 SHADOW_GRANULARITY: 8 SHADOW_OFFSET: 0x7fff8000 ==3598976==Installed the sigaction for signal 11 ==3598976==Installed the sigaction for signal 7 ==3598976==Installed the sigaction for signal 8 ==3598976==SetCurrentThread: 0x7f2feb7d5000 for thread 0x7f2feaab5780 ==3598976==T0: stack [0x7fff7e050000,0x7fff7e850000) size 0x800000; local=0x7fff7e84d6ec ==3598976==Using libbacktrace symbolizer. ==3598976==AddressSanitizer Init done AddressSanitizer:DEADLYSIGNAL ================================================================= ==3598976==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000000 (pc 0x000000000000 bp 0x7fff7e84d6d0 sp 0x7fff7e84d6b8 T0) ==3598976==Hint: pc points to the zero page. ==3598976==The signal is caused by a READ memory access. ==3598976==Hint: address points to the zero page. #0 0x0 (<unknown module>) AddressSanitizer can not provide additional info. SUMMARY: AddressSanitizer: SEGV (<unknown module>) ==3598976==ABORTING