http://gcc.gnu.org/bugzilla/show_bug.cgi?id=55289
--- Comment #31 from Jack Howarth <howarth at nitro dot med.uc.edu> 2012-11-14 19:10:15 UTC --- Also fine on i386-apple-darwin10... howarth% ./use-after-free ================================================================= ==82550== ERROR: AddressSanitizer heap-use-after-free on address 0x0207afc5 at pc 0x1f0b bp 0xbfffe3a8 sp 0xbfffe39c READ of size 1 at 0x0207afc5 thread T0 #0 0x1f0a (/Users/howarth/./use-after-free+0x1f0a) #1 0x1ec0 (/Users/howarth/./use-after-free+0x1ec0) #2 0x0 (/Users/howarth/./use-after-free+0x0) 0x0207afc5 is located 5 bytes inside of 40-byte region [0x0207afc0,0x0207afe8) freed by thread T0 here: #0 0x10b34 (/sw_i386/lib/gcc4.8/lib/libasan.0.dylib+0xcb34) #1 0x10cdb (/sw_i386/lib/gcc4.8/lib/libasan.0.dylib+0xccdb) #2 0x1ee6 (/Users/howarth/./use-after-free+0x1ee6) #3 0x1ec0 (/Users/howarth/./use-after-free+0x1ec0) #4 0x0 (/Users/howarth/./use-after-free+0x0) previously allocated by thread T0 here: #0 0x10515 (/sw_i386/lib/gcc4.8/lib/libasan.0.dylib+0xc515) #1 0x99041ba7 (/usr/lib/libSystem.B.dylib+0x4ba7) #2 0x9903fc77 (/usr/lib/libSystem.B.dylib+0x2c77) #3 0x1edc (/Users/howarth/./use-after-free+0x1edc) #4 0x1ec0 (/Users/howarth/./use-after-free+0x1ec0) #5 0x0 (/Users/howarth/./use-after-free+0x0) Shadow byte and word: 0x2040f5f8: fd 0x2040f5f8: fd fd fd fd More shadow bytes: 0x2040f5e8: fa fa fa fa 0x2040f5ec: fa fa fa fa 0x2040f5f0: fa fa fa fa 0x2040f5f4: fa fa fa fa =>0x2040f5f8: fd fd fd fd 0x2040f5fc: fd fd fd fd 0x2040f600: fa fa fa fa 0x2040f604: fa fa fa fa 0x2040f608: fa fa fa fa Stats: 0M malloced (0M for red zones) by 1 calls Stats: 0M realloced by 0 calls Stats: 0M freed by 1 calls Stats: 0M really freed by 0 calls Stats: 0M (128 full pages) mmaped in 1 calls mmaps by size class: 7:4095; mallocs by size class: 7:1; frees by size class: 7:1; rfrees by size class: Stats: malloc large: 0 small slow: 1 ==82550== ABORTING Alexander, can you check in libsanitizer/interception/mach_override/mach_override.c (patched as in comment 229) and libsanitizer/interception/mach_override/mach_override.h with the build infrastructure patch from http://gcc.gnu.org/ml/gcc-patches/2012-11/msg01119.html? It would be nice to be able to start testing libsanitizer on intel darwin.