https://gcc.gnu.org/bugzilla/show_bug.cgi?id=63292

            Bug ID: 63292
           Summary: ASan reports global-buffer-overflow in
                    gcc.dg/vect/pr59594.c.
           Product: gcc
           Version: 5.0
            Status: UNCONFIRMED
          Severity: normal
          Priority: P3
         Component: testsuite
          Assignee: unassigned at gcc dot gnu.org
          Reporter: chefmax at gcc dot gnu.org
            Target: x86_64-pc-linux-gnu
             Build: x86_64-pc-linux-gnu

This test fails at line 20 with global buffer overflow:

$ ~/install/master/bin/gcc ~/gcc/gcc/testsuite/gcc.dg/vect/pr59594.c
-fsanitize=address -msse2 -ftree-vectorize -fno-vect-cost-model -fno-common -O2
-fdump-tree-vect-details -lm -o ./pr59594.exe

$ ./pr59594.exe

=================================================================
==2059==ERROR: AddressSanitizer: global-buffer-overflow on address
0x000000602384 at pc 0x400a4d bp 0x7fff0d9f5300 sp 0x7fff0d9f52f8
WRITE of size 4 at 0x000000602384 thread T0
    #0 0x400a4c in main
(/home/max/build/master-x86_64/gcc/testsuite/gcc/pr59594.exe+0x400a4c)
    #1 0x2b523822176c in __libc_start_main
(/lib/x86_64-linux-gnu/libc.so.6+0x2176c)
    #2 0x400aa4
(/home/max/build/master-x86_64/gcc/testsuite/gcc/pr59594.exe+0x400aa4)

0x000000602384 is located 0 bytes to the right of global variable 'b' from
'/home/max/workspace/downloads/gcc/gcc/testsuite/gcc.dg/vect/pr59594.c'
(0x601380) of size 4100
SUMMARY: AddressSanitizer: global-buffer-overflow ??:0 main
Shadow bytes around the buggy address:
  0x0000800b8420: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0000800b8430: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0000800b8440: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0000800b8450: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0000800b8460: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x0000800b8470:[04]f9 f9 f9 f9 f9 f9 f9 00 00 00 00 00 00 00 00
  0x0000800b8480: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0000800b8490: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0000800b84a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0000800b84b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x0000800b84c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07
  Heap left redzone:       fa
  Heap right redzone:      fb
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack partial redzone:   f4
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  ASan internal:           fe
==2059==ABORTING

Reply via email to