[Nasm-bugs] [Bug 3392708] SEGV in tok_text asm/preproc.c:322

noreply-nasm at dev.nasm.us noreply-nasm at dev.nasm.us
Wed Jul 29 00:46:17 PDT 2020


https://bugzilla.nasm.us/show_bug.cgi?id=3392708

--- Comment #3 from Suhwan <prada960808 at gmail.com> ---
NASM version 2.15.04rc1 compiled on Jul 29 2020


==26762==ERROR: AddressSanitizer: SEGV on unknown address 0x00000000000c (pc
0x564f19a4e52c bp 0x7ff982d25640 sp 0x7ffd85154120 T0)
==26762==The signal is caused by a READ memory access.
==26762==Hint: address points to the zero page.
    #0 0x564f19a4e52b in tok_text asm/preproc.c:334
    #1 0x564f19a4e52b in do_directive asm/preproc.c:3671
    #2 0x564f19a6c19c in pp_tokline asm/preproc.c:6851
    #3 0x564f19a6c19c in pp_getline asm/preproc.c:6914
    #4 0x564f198e038b in assemble_file asm/nasm.c:1718
    #5 0x564f198d7171 in main asm/nasm.c:714
    #6 0x7ff9818afb96 in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x21b96)
    #7 0x564f198da289 in _start
(/mnt/hda2/suhwan/add_project/final/FINAL_TEST_ZONE/program/nasm-2.15.04rc1/install_dir/bin/nasm+0x12a289)

AddressSanitizer can not provide additional info.
SUMMARY: AddressSanitizer: SEGV asm/preproc.c:334 in tok_text
==26762==ABORTING

Sorry for bothering you.

-- 
You are receiving this mail because:
You are watching all bug changes.
You are on the CC list for the bug.


More information about the Nasm-bugs mailing list