This is the mail archive of the
gcc-bugs@gcc.gnu.org
mailing list for the GCC project.
[Bug fortran/60576] [4.8/4.9 Regression] FAIL: gfortran.dg/assumed_rank_7.f90
- From: "dominiq at lps dot ens.fr" <gcc-bugzilla at gcc dot gnu dot org>
- To: gcc-bugs at gcc dot gnu dot org
- Date: Fri, 21 Mar 2014 20:42:31 +0000
- Subject: [Bug fortran/60576] [4.8/4.9 Regression] FAIL: gfortran.dg/assumed_rank_7.f90
- Auto-submitted: auto-generated
- References: <bug-60576-4 at http dot gcc dot gnu dot org/bugzilla/>
http://gcc.gnu.org/bugzilla/show_bug.cgi?id=60576
Dominique d'Humieres <dominiq at lps dot ens.fr> changed:
What |Removed |Added
----------------------------------------------------------------------------
Status|UNCONFIRMED |NEW
Last reconfirmed| |2014-03-21
Ever confirmed|0 |1
--- Comment #3 from Dominique d'Humieres <dominiq at lps dot ens.fr> ---
Running the test compiled with -fsanitize=address gives
=================================================================
==70806==ERROR: AddressSanitizer: stack-buffer-overflow on address
0x7fff58110428 at pc 0x107b115d8 bp 0x7fff58110240 sp 0x7fff58110218
READ of size 168 at 0x7fff58110428 thread T0
#0 0x107b115d7 (/opt/gcc/gcc4.9w/lib/libasan.1.dylib+0x1a5d7)
#1 0x107af0340
(/Users/dominiq/Documents/Fortran/g95bench/win/f90/bug/a.out+0x100001340)
#2 0x107af18ad
(/Users/dominiq/Documents/Fortran/g95bench/win/f90/bug/a.out+0x1000028ad)
#3 0x7fff9184e5fc (/usr/lib/system/libdyld.dylib+0x35fc)
#4 0x0
Address 0x7fff58110428 is located in stack of thread T0 at offset 104 in frame
#0 0x107af000d
(/Users/dominiq/Documents/Fortran/g95bench/win/f90/bug/a.out+0x10000100d)
This frame has 1 object(s):
[32, 104) 'at' <== Memory access at offset 104 overflows this variable
HINT: this may be a false positive if your program uses some custom stack
unwind mechanism or swapcontext
(longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow ??:0 ??
Shadow bytes around the buggy address:
0x1fffeb022030: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1fffeb022040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1fffeb022050: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1fffeb022060: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1fffeb022070: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00
=>0x1fffeb022080: 00 00 00 00 00[f4]f4 f4 f3 f3 f3 f3 00 00 00 00
0x1fffeb022090: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1fffeb0220a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1fffeb0220b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1fffeb0220c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x1fffeb0220d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Heap right redzone: fb
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack partial redzone: f4
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Contiguous container OOB:fc
ASan internal: fe
==70806==ABORTING