http://gcc.gnu.org/bugzilla/show_bug.cgi?id=55341
--- Comment #9 from Joost VandeVondele <Joost.VandeVondele at mat dot ethz.ch> 2012-12-10 13:19:24 UTC --- (In reply to comment #8) > Joost: > http://code.google.com/p/address-sanitizer/wiki/AddressSanitizer#Call_stack No luck, even with -fno-omit-frame-pointer and the python script : > rm -f ./a.out ; gfortran -g -O0 -fsanitize=address -fno-omit-frame-pointer > asan_test.f90 ; ./a.out | python ./asan_symbolize.py ================================================================= ==43068== ERROR: AddressSanitizer: stack-buffer-underflow on address 0x7fff7a574fb8 at pc 0x400922 bp 0x7fff7a574f80 sp 0x7fff7a574f78 WRITE of size 4 at 0x7fff7a574fb8 thread T0 #0 0x400921 (/data/vjoost/gnu/bugs/a.out+0x400921) #1 0x400942 (/data/vjoost/gnu/bugs/a.out+0x400942) #2 0x400978 (/data/vjoost/gnu/bugs/a.out+0x400978) #3 0x351661ecdc (/lib64/libc-2.12.so+0x1ecdc) Address 0x7fff7a574fb8 is located at offset 24 in frame <test_asan_01> of T0's stack: This frame has 1 object(s): [32, 72) 'a' HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) Shadow byte and word: 0x1fffef4ae9f7: f1