This is the mail archive of the
gcc-bugs@gcc.gnu.org
mailing list for the GCC project.
[Bug testsuite/63939] [5 Regression] Massive asan failures (356) on x86_64-apple-darwin14
- From: "howarth at bromo dot med.uc.edu" <gcc-bugzilla at gcc dot gnu dot org>
- To: gcc-bugs at gcc dot gnu dot org
- Date: Tue, 18 Nov 2014 19:14:54 +0000
- Subject: [Bug testsuite/63939] [5 Regression] Massive asan failures (356) on x86_64-apple-darwin14
- Auto-submitted: auto-generated
- References: <bug-63939-4 at http dot gcc dot gnu dot org/bugzilla/>
https://gcc.gnu.org/bugzilla/show_bug.cgi?id=63939
--- Comment #1 from howarth at bromo dot med.uc.edu ---
This is the diff of the output from the c-c++-common/asan/global-overflow-1.c
-O0 execution test on linux and darwin...
--- pass 2014-11-18 14:11:05.000000000 -0500
+++ fail 2014-11-18 14:11:40.000000000 -0500
@@ -1,25 +1,25 @@
=================================================================
-==25409==ERROR: AddressSanitizer: global-buffer-overflow on address 0x08049daa
at pc 0x08048717 bp 0xffe2ada8 sp 0xffe2ad9c
-READ of size 1 at 0x08049daa thread T0
- #0 0x8048716 in main
/home/howarth/gcc-trunk/gcc/testsuite/c-c++-common/asan/global-overflow-1.c:20
- #1 0x439383f2 in __libc_start_main (/lib/libc.so.6+0x439383f2)
- #2 0x80485c0
(/home/howarth/build/gcc/testsuite/gcc/global-overflow-1.exe+0x80485c0)
+==3315==ERROR: AddressSanitizer: global-buffer-overflow on address 0x0006718a
at pc 0x00066d0a bp 0xbff97748 sp 0xbff9773c
+READ of size 1 at 0x0006718a thread T0
+ #0 0x66d09
(/sw/src/fink.build/gcc50-5.0.0-1000/darwin_objdir/gcc/testsuite/gcc/./global-overflow-1.exe+0x1d09)
+ #1 0x93b076d8 (/usr/lib/system/libdyld.dylib+0x36d8)
+ #2 0x0 (<unknown module>)
-0x08049daa is located 0 bytes to the right of global variable 'YYY' defined in
'/home/howarth/gcc-trunk/gcc/testsuite/c-c++-common/asan/global-overflow-1.c:15:15'
(0x8049da0) of size 10
-0x08049daa is located 54 bytes to the left of global variable 'ZZZ' defined in
'/home/howarth/gcc-trunk/gcc/testsuite/c-c++-common/asan/global-overflow-1.c:16:15'
(0x8049de0) of size 10
-SUMMARY: AddressSanitizer: global-buffer-overflow
/home/howarth/gcc-trunk/gcc/testsuite/c-c++-common/asan/global-overflow-1.c:20
main
+0x0006718a is located 0 bytes to the right of global variable 'YYY' defined in
'/sw/src/fink.build/gcc50-5.0.0-1000/gcc-5-20141117/gcc/testsuite/c-c++-common/asan/global-overflow-1.c:15:15'
(0x67180) of size 10
+0x0006718a is located 54 bytes to the left of global variable 'ZZZ' defined in
'/sw/src/fink.build/gcc50-5.0.0-1000/gcc-5-20141117/gcc/testsuite/c-c++-common/asan/global-overflow-1.c:16:15'
(0x671c0) of size 10
+SUMMARY: AddressSanitizer: global-buffer-overflow ??:0 ??
Shadow bytes around the buggy address:
- 0x21009360: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- 0x21009370: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- 0x21009380: 00 00 00 00 00 00 00 00 04 f9 f9 f9 f9 f9 f9 f9
- 0x21009390: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- 0x210093a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 02 f9 f9
-=>0x210093b0: f9 f9 f9 f9 00[02]f9 f9 f9 f9 f9 f9 00 02 f9 f9
- 0x210093c0: f9 f9 f9 f9 00 00 00 00 00 00 00 00 00 00 00 00
- 0x210093d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- 0x210093e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- 0x210093f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
- 0x21009400: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
+ 0x2000cde0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
+ 0x2000cdf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
+ 0x2000ce00: 00 00 00 00 00 00 00 00 04 f9 f9 f9 f9 f9 f9 f9
+ 0x2000ce10: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
+ 0x2000ce20: 00 00 00 00 00 00 00 00 00 02 f9 f9 f9 f9 f9 f9
+=>0x2000ce30: 00[02]f9 f9 f9 f9 f9 f9 00 02 f9 f9 f9 f9 f9 f9
+ 0x2000ce40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
+ 0x2000ce50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
+ 0x2000ce60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
+ 0x2000ce70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
+ 0x2000ce80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
@@ -39,5 +39,5 @@
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
-==25409==ABORTING
+==3315==ABORTING