http://gcc.gnu.org/bugzilla/show_bug.cgi?id=60576
Dominique d'Humieres <dominiq at lps dot ens.fr> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|UNCONFIRMED |NEW Last reconfirmed| |2014-03-21 Ever confirmed|0 |1 --- Comment #3 from Dominique d'Humieres <dominiq at lps dot ens.fr> --- Running the test compiled with -fsanitize=address gives ================================================================= ==70806==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7fff58110428 at pc 0x107b115d8 bp 0x7fff58110240 sp 0x7fff58110218 READ of size 168 at 0x7fff58110428 thread T0 #0 0x107b115d7 (/opt/gcc/gcc4.9w/lib/libasan.1.dylib+0x1a5d7) #1 0x107af0340 (/Users/dominiq/Documents/Fortran/g95bench/win/f90/bug/a.out+0x100001340) #2 0x107af18ad (/Users/dominiq/Documents/Fortran/g95bench/win/f90/bug/a.out+0x1000028ad) #3 0x7fff9184e5fc (/usr/lib/system/libdyld.dylib+0x35fc) #4 0x0 Address 0x7fff58110428 is located in stack of thread T0 at offset 104 in frame #0 0x107af000d (/Users/dominiq/Documents/Fortran/g95bench/win/f90/bug/a.out+0x10000100d) This frame has 1 object(s): [32, 104) 'at' <== Memory access at offset 104 overflows this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow ??:0 ?? Shadow bytes around the buggy address: 0x1fffeb022030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1fffeb022040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1fffeb022050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1fffeb022060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1fffeb022070: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00 =>0x1fffeb022080: 00 00 00 00 00[f4]f4 f4 f3 f3 f3 f3 00 00 00 00 0x1fffeb022090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1fffeb0220a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1fffeb0220b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1fffeb0220c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1fffeb0220d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Contiguous container OOB:fc ASan internal: fe ==70806==ABORTING