==6750==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffec181d0b8 at pc 0x7f279ef4def5 bp 0x7ffec181cdc0 sp 0x7ffec181cdb8 WRITE of size 8 at 0x7ffec181d0b8 thread T0 #0 0x7f279ef4def4 in prephi_ /home/ivan/temp/smash/prephi.f:50 #1 0x7f279ef4c38b in derivf_ /home/ivan/temp/smash/derivf.f:15 #2 0x7f279ef4ce34 in getgl_ /home/ivan/temp/smash/getgl.f:18 #3 0x7f27a645ece6 (/usr/lib/R/lib/libR.so+0xfdce6) #4 0x7f27a64960e2 (/usr/lib/R/lib/libR.so+0x1350e2) #5 0x7f27a64a8aef in Rf_eval (/usr/lib/R/lib/libR.so+0x147aef) #6 0x7f27a64aa936 (/usr/lib/R/lib/libR.so+0x149936) #7 0x7f27a64ab886 in Rf_applyClosure (/usr/lib/R/lib/libR.so+0x14a886) #8 0x7f27a64a8caf in Rf_eval (/usr/lib/R/lib/libR.so+0x147caf) #9 0x7f27a64adce8 (/usr/lib/R/lib/libR.so+0x14cce8) #10 0x7f27a64a8f2c in Rf_eval (/usr/lib/R/lib/libR.so+0x147f2c) #11 0x7f27a64af2bc (/usr/lib/R/lib/libR.so+0x14e2bc) #12 0x7f27a64960e2 (/usr/lib/R/lib/libR.so+0x1350e2) #13 0x7f27a64a8aef in Rf_eval (/usr/lib/R/lib/libR.so+0x147aef) #14 0x7f27a64aa936 (/usr/lib/R/lib/libR.so+0x149936) #15 0x7f27a64ab886 in Rf_applyClosure (/usr/lib/R/lib/libR.so+0x14a886) #16 0x7f27a649ec93 (/usr/lib/R/lib/libR.so+0x13dc93) #17 0x7f27a64a8aef in Rf_eval (/usr/lib/R/lib/libR.so+0x147aef) #18 0x7f27a64a94db (/usr/lib/R/lib/libR.so+0x1484db) #19 0x7f27a64a8e13 in Rf_eval (/usr/lib/R/lib/libR.so+0x147e13) #20 0x7f27a64af7ab (/usr/lib/R/lib/libR.so+0x14e7ab) #21 0x7f27a64ec6a5 (/usr/lib/R/lib/libR.so+0x18b6a5) #22 0x7f27a6499c3b (/usr/lib/R/lib/libR.so+0x138c3b) #23 0x7f27a64a8aef in Rf_eval (/usr/lib/R/lib/libR.so+0x147aef) #24 0x7f27a64aa936 (/usr/lib/R/lib/libR.so+0x149936) #25 0x7f27a64ab886 in Rf_applyClosure (/usr/lib/R/lib/libR.so+0x14a886) #26 0x7f27a649ec93 (/usr/lib/R/lib/libR.so+0x13dc93) #27 0x7f27a64a8aef in Rf_eval (/usr/lib/R/lib/libR.so+0x147aef) #28 0x7f27a64aa936 (/usr/lib/R/lib/libR.so+0x149936) #29 0x7f27a64ab886 in Rf_applyClosure (/usr/lib/R/lib/libR.so+0x14a886) #30 0x7f27a64a8caf in Rf_eval (/usr/lib/R/lib/libR.so+0x147caf) #31 0x7f27a64dc699 in Rf_ReplIteration (/usr/lib/R/lib/libR.so+0x17b699) #32 0x7f27a64dc9d0 (/usr/lib/R/lib/libR.so+0x17b9d0) #33 0x7f27a64dca87 in run_Rmainloop (/usr/lib/R/lib/libR.so+0x17ba87) #34 0x55d380f9807a in main (/usr/lib/R/bin/exec/R+0x107a) #35 0x7f27a614c09a in __libc_start_main ../csu/libc-start.c:308 #36 0x55d380f980b9 in _start (/usr/lib/R/bin/exec/R+0x10b9) Address 0x7ffec181d0b8 is located in stack of thread T0 at offset 168 in frame #0 0x7f279ef4cba9 in getgl_ /home/ivan/temp/smash/getgl.f:2 This frame has 4 object(s): [32, 36) 'nd' [96, 104) 'd2f' [160, 168) 'd2u' <== Memory access at offset 168 overflows this variable [224, 232) 'd2zeta' HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow /home/ivan/temp/smash/prephi.f:50 in prephi_ Shadow bytes around the buggy address: 0x1000582fb9c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000582fb9d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000582fb9e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000582fb9f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000582fba00: 00 00 f1 f1 f1 f1 04 f2 f2 f2 f2 f2 f2 f2 00 f2 =>0x1000582fba10: f2 f2 f2 f2 f2 f2 00[f2]f2 f2 f2 f2 f2 f2 00 f2 0x1000582fba20: f2 f2 f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 0x1000582fba30: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000582fba40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000582fba50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x1000582fba60: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 04 Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3