https://gcc.gnu.org/bugzilla/show_bug.cgi?id=84208
--- Comment #5 from Akhilesh Kumar <akhilesh.k at samsung dot com> --- Please Mark this bug ID as invalid with the same patch I am able to run on ARM also there was issue in My setup only (Sorry for the noise). Test results on ARM (gcc 6.2.1) sh-3.2# out_of_scope ================================================================= ==3348==ERROR: AddressSanitizer: stack-use-after-scope on address 0xbe35c700 at pc 0x000108e8 bp 0xbe35c6c4 sp 0xbe35c6bc WRITE of size 1 at 0xbe35c700 thread T0 #0 0x108e7 in main /data2/TC/scripts/test2.c:10 #1 0x410768ab in __libc_start_main (/lib/libc.so.6+0x410768ab) Address 0xbe35c700 is located in stack of thread T0 at offset 32 in frame #0 0x107ef in main /data2/TC/scripts/test2.c:3 This frame has 1 object(s): [32, 33) 'my_char' <== Memory access at offset 32 is inside this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: AddressSanitizer stack-use-after-scope /data2/TC/scripts/test2.c:10 in main Shadow bytes around the buggy address: 0x37c6b890: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x37c6b8a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x37c6b8b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x37c6b8c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x37c6b8d0: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1 =>0x37c6b8e0:[f8]f4 f4 f4 f3 f3 f3 f3 00 00 00 00 00 00 00 00 0x37c6b8f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x37c6b900: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x37c6b910: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x37c6b920: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x37c6b930: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Heap right redzone: fb Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack partial redzone: f4 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3348==ABORTING sh-3.2# [SECOS][PSCI] Suspend Start CPU #0