Job 6392126 Nodelist : nic5-w[001-006,031] a = NTASKS = 70 b = SLURM_CPUS_PER_TASK = 1 c = SLURM_TASKS_PER_NODE = 18,2(x2),1,9,6,32 Starting job in /scratch/ucl/tfl/marichaj/results_Test_petsc/ Wed Dec 20 10:09:03 CET 2023 mkdir: cannot create directory '/scratch/ucl/tfl/marichaj/results_Test_petsc/': File exists Finished copying directories \n\t########################################################################### \t# # \t# Welcome in # \t# # \t# ███ ███ █████ ██████ ██ ██ █████ # \t# ████ ████ ██ ██ ██ ██ ██ ██ ██ ██ # \t# ██ ████ ██ ███████ ██████ ███████ ███████ # \t# ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ # \t# ██ ██ ██ ██ ██ ██ ██ ██ ██ ██ # \t# # \t########################################################################### mkdir -p ./results/ mpicxx -O3 -Wall -Wno-unused-variable -Wno-unused-but-set-variable -lm -lmpi -pedantic-errors -O3 -fsanitize=address -fsanitize=undefined main.o -o cobpor -lmpi -L/home/ucl/tfl/marichaj/Test_petsc/marha/lib_petsc/lib -Wl,-rpath=:/home/ucl/tfl/marichaj/Test_petsc/marha/lib_petsc/lib -lpetsc -lHYPRE -I/home/ucl/tfl/marichaj/Test_petsc/marha/lib_petsc/include Finished make all Start running [Proc 22] cornx = 15, corny = 0, cornz = 30, cornxm = 15, cornym = 100, cornzm = 10 ================================================================= ==3646609==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000039294 at pc 0x000000406227 bp 0x7ffded23b1e0 sp 0x7ffded23b1d8 WRITE of size 4 at 0x602000039294 thread T0 [Proc 18] cornx = 58, corny = 0, cornz = 20, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2017323==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000039a54 at pc 0x000000406227 bp 0x7ffd557ace60 sp 0x7ffd557ace58 WRITE of size 4 at 0x602000039a54 thread T0 [Proc 20] cornx = 86, corny = 0, cornz = 20, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==1703477==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000039874 at pc 0x000000406227 bp 0x7ffe5c20d140 sp 0x7ffe5c20d138 WRITE of size 4 at 0x602000039874 thread T0 [Proc 19] cornx = 72, corny = 0, cornz = 20, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2017324==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000039594 at pc 0x000000406227 bp 0x7ffeaf6545f0 sp 0x7ffeaf6545e8 [Proc 28] cornx = 0, corny = 0, cornz = 40, cornxm = 15, cornym = 100, cornzm = 10 ================================================================= ==3841346==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200003c174 at pc 0x000000406227 bp 0x7ffdeab7bf80 sp 0x7ffdeab7bf78 WRITE of size 4 at 0x60200003c174 thread T0 WRITE of size 4 at 0x602000039594 thread T0 [Proc 21] cornx = 0, corny = 0, cornz = 30, cornxm = 15, cornym = 100, cornzm = 10 ================================================================= ==1703478==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000397b4 at pc 0x000000406227 bp 0x7ffeaa5b65b0 sp 0x7ffeaa5b65a8 WRITE of size 4 at 0x6020000397b4 thread T0 [Proc 31] cornx = 44, corny = 0, cornz = 40, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==3841358==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200003b9b4 at pc 0x000000406227 bp 0x7ffdcc0912c0 sp 0x7ffdcc0912b8 WRITE of size 4 at 0x60200003b9b4 thread T0 [Proc 57] cornx = 15, corny = 0, cornz = 80, cornxm = 15, cornym = 100, cornzm = 10 ================================================================= ==2355262==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000048494 at pc 0x000000406227 bp 0x7ffe87a6e8e0 sp 0x7ffe87a6e8d8 WRITE of size 4 at 0x602000048494 thread T0 [Proc 3] cornx = 44, corny = 0, cornz = 0, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2771803==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000413b4 at pc 0x000000406227 bp 0x7ffe7c54a340 sp 0x7ffe7c54a338 WRITE of size 4 at 0x6020000413b4 thread T0 [Proc 33] cornx = 72, corny = 0, cornz = 40, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==3047162==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200003ac14 at pc 0x000000406227 bp 0x7ffe28f0b600 sp 0x7ffe28f0b5f8 WRITE of size 4 at 0x60200003ac14 thread T0 [Proc 27] cornx = 86, corny = 0, cornz = 30, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==3841345==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200003bbb4 at pc 0x000000406227 bp 0x7fff7103bf80 sp 0x7fff7103bf78 WRITE of size 4 at 0x60200003bbb4 thread T0 Number of processors = 70, rank = 0 [Proc 0] cornx = 0, corny = 0, cornz = 0, cornxm = 15, cornym = 100, cornzm = 10 ================================================================= ==2771800==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000412d4 at pc 0x000000406227 bp 0x7ffca4357010 sp 0x7ffca4357008 WRITE of size 4 at 0x6020000412d4 thread T0 [Proc 15] cornx = 15, corny = 0, cornz = 20, cornxm = 15, cornym = 100, cornzm = 10 ================================================================= ==2771830==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000412b4 at pc 0x000000406227 bp 0x7ffffab78020 sp 0x7ffffab78018 WRITE of size 4 at 0x6020000412b4 thread T0 [Proc 37] cornx = 30, corny = 0, cornz = 50, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==3047169==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200003b0d4 at pc 0x000000406227 bp 0x7ffc29f75260 sp 0x7ffc29f75258 WRITE of size 4 at 0x60200003b0d4 thread T0 [Proc 32] cornx = 58, corny = 0, cornz = 40, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= [Proc 34] cornx = 86, corny = 0, cornz = 40, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==3047161==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200003b2b4 at pc 0x000000406227 bp 0x7fff66577630 sp 0x7fff66577628 WRITE of size 4 at 0x60200003b2b4 thread T0 ==3047164==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200003acf4 at pc 0x000000406227 bp 0x7ffd72551450 sp 0x7ffd72551448 WRITE of size 4 at 0x60200003acf4 thread T0 [Proc 36] cornx = 15, corny = 0, cornz = 50, cornxm = 15, cornym = 100, cornzm = 10 ================================================================= ==3047167==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200003ae14 at pc 0x000000406227 bp 0x7ffd24f62af0 sp 0x7ffd24f62ae8 WRITE of size 4 at 0x60200003ae14 thread T0 ================================================================= [Proc 14] cornx = 0, corny = 0, cornz = 20, cornxm = 15, cornym = 100, cornzm = 10 ==2771828==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000041314 at pc 0x000000406227 bp 0x7ffcc13d3ac0 sp 0x7ffcc13d3ab8 WRITE of size 4 at 0x602000041314 thread T0 [Proc 25] cornx = 58, corny = 0, cornz = 30, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==3841342==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200003bff4 at pc 0x000000406227 bp 0x7ffceca38430 sp 0x7ffceca38428 WRITE of size 4 at 0x60200003bff4 thread T0 [Proc 35] cornx = 0, corny = 0, cornz = 50, cornxm = 15, cornym = 100, cornzm = 10 ================================================================= ==3047166==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200003ad74 at pc 0x000000406227 bp 0x7ffe87ba8140 sp 0x7ffe87ba8138 WRITE of size 4 at 0x60200003ad74 thread T0 [Proc 5] cornx = 72, corny = 0, cornz = 0, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2771807==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000041154 at pc 0x000000406227 bp 0x7fff476701c0 sp 0x7fff476701b8 WRITE of size 4 at 0x602000041154 thread T0 [Proc 13] cornx = 86, corny = 0, cornz = 10, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2771824==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000040eb4 at pc 0x000000406227 bp 0x7fff473dfaa0 sp 0x7fff473dfa98 WRITE of size 4 at 0x602000040eb4 thread T0 [Proc 24] cornx = 44, corny = 0, cornz = 30, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==3841339==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200003c1f4 at pc 0x000000406227 bp 0x7ffd4be05b80 sp 0x7ffd4be05b78 WRITE of size 4 at 0x60200003c1f4 thread T0 [Proc 7] cornx = 0, corny = 0, cornz = 10, cornxm = 15, cornym = 100, cornzm = 10 ================================================================= ==2771809==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000040bd4 at pc 0x000000406227 bp 0x7ffd66528b50 sp 0x7ffd66528b48 WRITE of size 4 at 0x602000040bd4 thread T0 [Proc 23] cornx = 30, corny = 0, cornz = 30, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==3841338==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200003c134 at pc 0x000000406227 bp 0x7ffc55c752d0 sp 0x7ffc55c752c8 WRITE of size 4 at 0x60200003c134 thread T0 [Proc 61] cornx = 72, corny = 0, cornz = 80, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2355281==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000048494 at pc 0x000000406227 bp 0x7ffc76665e60 sp 0x7ffc76665e58 WRITE of size 4 at 0x602000048494 thread T0 [Proc 30] cornx = 30, corny = 0, cornz = 40, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==3841352==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200003bcd4 at pc 0x000000406227 bp 0x7ffdce8aac20 sp 0x7ffdce8aac18 WRITE of size 4 at 0x60200003bcd4 thread T0 [Proc 29] cornx = 15, corny = 0, cornz = 40, cornxm = 15, cornym = 100, cornzm = 10 ================================================================= ==3841347==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200003bd34 at pc 0x000000406227 bp 0x7ffd497193a0 sp 0x7ffd49719398 WRITE of size 4 at 0x60200003bd34 thread T0 [Proc 26] cornx = 72, corny = 0, cornz = 30, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==3841344==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200003c314 at pc 0x000000406227 bp 0x7fffc6a395a0 sp 0x7fffc6a39598 WRITE of size 4 at 0x60200003c314 thread T0 [Proc 2] cornx = 30, corny = 0, cornz = 0, cornxm = 14, cornym = 100, cornzm = 10 [Proc 12] cornx = 72, corny = 0, cornz = 10, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ================================================================= ==2771802==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000040cf4 at pc 0x000000406227 bp 0x7fffd14d1180 sp 0x7fffd14d1178 ==2771822==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000040eb4 at pc 0x000000406227 bp 0x7ffe047ff0b0 sp 0x7ffe047ff0a8 WRITE of size 4 at 0x602000040cf4 thread T0 WRITE of size 4 at 0x602000040eb4 thread T0 [Proc 4] cornx = 58, corny = 0, cornz = 0, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2771804==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000409d4 at pc 0x000000406227 bp 0x7ffc6df810c0 sp 0x7ffc6df810b8 WRITE of size 4 at 0x6020000409d4 thread T0 [Proc 16] cornx = 30, corny = 0, cornz = 20, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2771832==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000041454 at pc 0x000000406227 bp 0x7ffcaba042f0 sp 0x7ffcaba042e8 WRITE of size 4 at 0x602000041454 thread T0 [Proc 8] cornx = 15, corny = 0, cornz = 10, cornxm = 15, cornym = 100, cornzm = 10 ================================================================= ==2771810==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000040214 at pc 0x000000406227 bp 0x7fff662f3b70 sp 0x7fff662f3b68 WRITE of size 4 at 0x602000040214 thread T0 [Proc 10] cornx = 44, corny = 0, cornz = 10, cornxm = 14, cornym = 100, cornzm = 10 [Proc 17] cornx = 44, corny = 0, cornz = 20, cornxm = 14, cornym = 100, cornzm = 10 [Proc 1] cornx = 15, corny = 0, cornz = 0, cornxm = 15, cornym = 100, cornzm = 10 ================================================================= ================================================================= ================================================================= ==2771815==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000040554 at pc 0x000000406227 bp 0x7ffe3af69640 sp 0x7ffe3af69638 ==2771836==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000041794 at pc 0x000000406227 bp 0x7fffb4284720 sp 0x7fffb4284718 [Proc 6] cornx = 86, corny = 0, cornz = 0, cornxm = 14, cornym = 100, cornzm = 10 [Proc 11] cornx = 58, corny = 0, cornz = 10, cornxm = 14, cornym = 100, cornzm = 10 ==2771801==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000041394 at pc 0x000000406227 bp 0x7fff2ed7e560 sp 0x7fff2ed7e558 WRITE of size 4 at 0x602000041394 thread T0 WRITE of size 4 at 0x602000041794 thread T0 WRITE of size 4 at 0x602000040554 thread T0 ================================================================= ================================================================= ==2771818==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000409b4 at pc 0x000000406227 bp 0x7ffc6886aaf0 sp 0x7ffc6886aae8 WRITE of size 4 at 0x6020000409b4 thread T0 ==2771808==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000404b4 at pc 0x000000406227 bp 0x7ffc0388fba0 sp 0x7ffc0388fb98 WRITE of size 4 at 0x6020000404b4 thread T0 [Proc 9] cornx = 30, corny = 0, cornz = 10, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= [Proc 66] cornx = 44, corny = 0, cornz = 90, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2355299==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000049274 at pc 0x000000406227 bp 0x7ffe6c05afa0 sp 0x7ffe6c05af98 WRITE of size 4 at 0x602000049274 thread T0 ==2771811==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000040df4 at pc 0x000000406227 bp 0x7ffff6d5d930 sp 0x7ffff6d5d928 WRITE of size 4 at 0x602000040df4 thread T0 [Proc 38] cornx = 44, corny = 0, cornz = 50, cornxm = 14, cornym = 100, cornzm = 10 [Proc 45] cornx = 44, corny = 0, cornz = 60, cornxm = 14, cornym = 100, cornzm = 10 [Proc 50] cornx = 15, corny = 0, cornz = 70, cornxm = 15, cornym = 100, cornzm = 10 [Proc 67] cornx = 58, corny = 0, cornz = 90, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2355208==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x60200004a1f4 at pc 0x000000406227 bp 0x7fff446b4d30 sp 0x7fff446b4d28 WRITE of size 4 at 0x60200004a1f4 thread T0 ================================================================= ==2355225==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000048794 at pc 0x000000406227 bp 0x7ffed03161a0 sp 0x7ffed0316198 WRITE of size 4 at 0x602000048794 thread T0 ================================================================= ==2355234==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000048474 at pc 0x000000406227 bp 0x7fff9d3b7650 sp 0x7fff9d3b7648 WRITE of size 4 at 0x602000048474 thread T0 ================================================================= ==2355302==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000049214 at pc 0x000000406227 bp 0x7ffc11bab790 sp 0x7ffc11bab788 WRITE of size 4 at 0x602000049214 thread T0 [Proc 51] cornx = 30, corny = 0, cornz = 70, cornxm = 14, cornym = 100, cornzm = 10 [Proc 48] cornx = 86, corny = 0, cornz = 60, cornxm = 14, cornym = 100, cornzm = 10 [Proc 42] cornx = 0, corny = 0, cornz = 60, cornxm = 15, cornym = 100, cornzm = 10 ================================================================= ================================================================= ================================================================= ==2355235==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000048414 at pc 0x000000406227 bp 0x7ffc3283abe0 sp 0x7ffc3283abd8 ==2355231==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000048594 at pc 0x000000406227 bp 0x7fff0cb73bd0 sp 0x7fff0cb73bc8 ==2355220==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000049634 at pc 0x000000406227 bp 0x7fffb5f6efd0 sp 0x7fffb5f6efc8 WRITE of size 4 at 0x602000048414 thread T0 WRITE of size 4 at 0x602000049634 thread T0 WRITE of size 4 at 0x602000048594 thread T0 [Proc 58] cornx = 30, corny = 0, cornz = 80, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2355269==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000484f4 at pc 0x000000406227 bp 0x7ffd06370ac0 sp 0x7ffd06370ab8 WRITE of size 4 at 0x6020000484f4 thread T0 [Proc 69] cornx = 86, corny = 0, cornz = 90, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2355308==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000049a54 at pc 0x000000406227 bp 0x7ffe3b6d6530 sp 0x7ffe3b6d6528 WRITE of size 4 at 0x602000049a54 thread T0 [Proc 54] cornx = 72, corny = 0, cornz = 70, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2355245==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000484f4 at pc 0x000000406227 bp 0x7ffce1898570 sp 0x7ffce1898568 WRITE of size 4 at 0x6020000484f4 thread T0 [Proc 68] cornx = 72, corny = 0, cornz = 90, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2355304==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000049734 at pc 0x000000406227 bp 0x7ffd2dba1b80 sp 0x7ffd2dba1b78 WRITE of size 4 at 0x602000049734 thread T0 [Proc 39] cornx = 58, corny = 0, cornz = 50, cornxm = 14, cornym = 100, cornzm = 10 [Proc 64] cornx = 15, corny = 0, cornz = 90, cornxm = 15, cornym = 100, cornzm = 10 ================================================================= ================================================================= ==2355292==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000048df4 at pc 0x000000406227 bp 0x7ffec5c66c10 sp 0x7ffec5c66c08 ==2355209==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000049cd4 at pc 0x000000406227 bp 0x7ffe67eb2170 sp 0x7ffe67eb2168 WRITE of size 4 at 0x602000048df4 thread T0 WRITE of size 4 at 0x602000049cd4 thread T0 [Proc 52] cornx = 44, corny = 0, cornz = 70, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2355236==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000484d4 at pc 0x000000406227 bp 0x7fff08956b60 sp 0x7fff08956b58 WRITE of size 4 at 0x6020000484d4 thread T0 [Proc 55] cornx = 86, corny = 0, cornz = 70, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2355256==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000048494 at pc 0x000000406227 bp 0x7fff483d9410 sp 0x7fff483d9408 WRITE of size 4 at 0x602000048494 thread T0 [Proc 47] cornx = 72, corny = 0, cornz = 60, cornxm = 14, cornym = 100, cornzm = 10 [Proc 53] cornx = 58, corny = 0, cornz = 70, cornxm = 14, cornym = 100, cornzm = 10 [Proc 65] cornx = 30, corny = 0, cornz = 90, cornxm = 14, cornym = 100, cornzm = 10 [Proc 56] cornx = 0, corny = 0, cornz = 80, cornxm = 15, cornym = 100, cornzm = 10 ================================================================= ================================================================= ================================================================= ================================================================= ==2355241==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000048414 at pc 0x000000406227 bp 0x7ffc321d7f80 sp 0x7ffc321d7f78 ==2355229==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000048414 at pc 0x000000406227 bp 0x7fff960fc790 sp 0x7fff960fc788 ==2355296==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000048cd4 at pc 0x000000406227 bp 0x7fff9af6c080 sp 0x7fff9af6c078 ==2355260==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000485b4 at pc 0x000000406227 bp 0x7fff9779a9a0 sp 0x7fff9779a998 WRITE of size 4 at 0x602000048414 thread T0 WRITE of size 4 at 0x602000048414 thread T0 WRITE of size 4 at 0x602000048cd4 thread T0 WRITE of size 4 at 0x6020000485b4 thread T0 [Proc 60] cornx = 58, corny = 0, cornz = 80, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2355276==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000048554 at pc 0x000000406227 bp 0x7fffed132d50 sp 0x7fffed132d48 WRITE of size 4 at 0x602000048554 thread T0 [Proc 43] cornx = 15, corny = 0, cornz = 60, cornxm = 15, cornym = 100, cornzm = 10 [Proc 49] cornx = 0, corny = 0, cornz = 70, cornxm = 15, cornym = 100, cornzm = 10 [Proc 62] cornx = 86, corny = 0, cornz = 80, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ================================================================= ==2355285==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000489b4 at pc 0x000000406227 bp 0x7ffe4e46a4a0 sp 0x7ffe4e46a498 ==2355232==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000048414 at pc 0x000000406227 bp 0x7ffee7963170 sp 0x7ffee7963168 WRITE of size 4 at 0x6020000489b4 thread T0 WRITE of size 4 at 0x602000048414 thread T0 ================================================================= ==2355222==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000049114 at pc 0x000000406227 bp 0x7ffdde1b0110 sp 0x7ffdde1b0108 WRITE of size 4 at 0x602000049114 thread T0 [Proc 59] cornx = 44, corny = 0, cornz = 80, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2355274==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000048494 at pc 0x000000406227 bp 0x7ffee58f8180 sp 0x7ffee58f8178 WRITE of size 4 at 0x602000048494 thread T0 [Proc 44] cornx = 30, corny = 0, cornz = 60, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2355223==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000048d14 at pc 0x000000406227 bp 0x7ffc02d0b460 sp 0x7ffc02d0b458 WRITE of size 4 at 0x602000048d14 thread T0 [Proc 40] cornx = 72, corny = 0, cornz = 50, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= [Proc 46] cornx = 58, corny = 0, cornz = 60, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2355210==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000049a74 at pc 0x000000406227 bp 0x7fff2f100da0 sp 0x7fff2f100d98 WRITE of size 4 at 0x602000049a74 thread T0 ================================================================= ==2355289==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000048954 at pc 0x000000406227 bp 0x7ffca16037a0 sp 0x7ffca1603798 WRITE of size 4 at 0x602000048954 thread T0 ==2355227==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6020000483b4 at pc 0x000000406227 bp 0x7fffd4f19300 sp 0x7fffd4f192f8 WRITE of size 4 at 0x6020000483b4 thread T0 [Proc 63] cornx = 0, corny = 0, cornz = 90, cornxm = 15, cornym = 100, cornzm = 10 [Proc 41] cornx = 86, corny = 0, cornz = 50, cornxm = 14, cornym = 100, cornzm = 10 ================================================================= ==2355216==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x602000049a34 at pc 0x000000406227 bp 0x7ffef9cb4b00 sp 0x7ffef9cb4af8 WRITE of size 4 at 0x602000049a34 thread T0 #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14aee97f6d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000039a54 is located 0 bytes to the right of 4-byte region [0x602000039a50,0x602000039a54) allocated by thread T0 here: #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14852f021d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000039594 is located 0 bytes to the right of 4-byte region [0x602000039590,0x602000039594) allocated by thread T0 here: #0 0x14aeef725d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #0 0x148534f50d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000013 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff260: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fa 0x0c047ffff270: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c047ffff280: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff290: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff2a0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff2b0: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff2c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff2d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff2e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff2f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff300: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2017324==ABORTING #2 0xe00000013 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff2f0: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fa 0x0c047ffff300: fa fa fd fd fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff310: fa fa fd fa fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c047ffff320: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff330: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff340: fa fa fd fa fa fa fd fa fa fa[04]fa fa fa fa fa 0x0c047ffff350: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff360: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff370: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff380: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff390: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2017323==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x154ca2aa9d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x60200003c174 is located 0 bytes to the right of 4-byte region [0x60200003c170,0x60200003c174) allocated by thread T0 here: #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x151911c96d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x60200003b9b4 is located 0 bytes to the right of 4-byte region [0x60200003b9b0,0x60200003b9b4) allocated by thread T0 here: #0 0x154ca89d8d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #0 0x151917bc5d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14ec2deecd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x60200003bbb4 is located 0 bytes to the right of 4-byte region [0x60200003bbb0,0x60200003bbb4) allocated by thread T0 here: #0 0x14ec33e1bd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xf00000027 () #2 0xe00000027 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff7d0: fa fa fd fd fa fa fd fd fa fa fd fa fa fa fd fd 0x0c047ffff7e0: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fa 0x0c047ffff7f0: fa fa fd fa fa fa fd fa fa fa 04 fa fa fa fd fa 0x0c047ffff800: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff810: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff820: fa fa fd fa fa fa fd fa fa fa fd fa fa fa[04]fa 0x0c047ffff830: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff840: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff850: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff860: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff870: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow bytes around the buggy address: 0x0c047ffff6e0: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c047ffff6f0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff700: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff710: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff720: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff730: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c047ffff740: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff750: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff760: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff770: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff780: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3841346==ABORTING ==3841358==ABORTING #2 0xe0000001d () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff720: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c047ffff730: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff740: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff750: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff760: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff770: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c047ffff780: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff790: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff7a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff7b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff7c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3841345==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x149c13b05d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x60200003c1f4 is located 0 bytes to the right of 4-byte region [0x60200003c1f0,0x60200003c1f4) allocated by thread T0 here: #0 0x149c19a34d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe0000001d () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff7e0: fa fa fd fd fa fa fd fd fa fa fd fa fa fa fd fd 0x0c047ffff7f0: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fa 0x0c047ffff800: fa fa fd fa fa fa fd fa fa fa 04 fa fa fa fd fa 0x0c047ffff810: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff820: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff830: fa fa fd fa fa fa fd fa fa fa fd fa fa fa[04]fa 0x0c047ffff840: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff850: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff860: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff870: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff880: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3841339==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x150583ca5d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x60200003c134 is located 0 bytes to the right of 4-byte region [0x60200003c130,0x60200003c134) allocated by thread T0 here: #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14f48be3dd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000040bd4 is located 0 bytes to the right of 4-byte region [0x602000040bd0,0x602000040bd4) #0 0x150589bd4d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) allocated by thread T0 here: #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14d8f957fd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) 0x602000041154 is located 0 bytes to the right of 4-byte region [0x602000041150,0x602000041154) #1 0x150fe8475d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) allocated by thread T0 here: #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x6020000412d4 is located 0 bytes to the right of 4-byte region [0x6020000412d0,0x6020000412d4) allocated by thread T0 here: #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14f2840fdd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x6020000413b4 is located 0 bytes to the right of 4-byte region [0x6020000413b0,0x6020000413b4) #0 0x14f491d6cd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 allocated by thread T0 here: #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #0 0x14d8ff4aed90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #1 0x15106d88bd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #0 0x150fee3a4d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) #0 0x14f28a02cd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) 0x6020000412b4 is located 0 bytes to the right of 4-byte region [0x6020000412b0,0x6020000412b4) allocated by thread T0 here: #2 0xe0000001d () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff7d0: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c047ffff7e0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff7f0: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff800: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff810: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff820: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c047ffff830: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff840: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff850: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff860: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff870: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3841338==ABORTING #0 0x1510737bad90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xf00000009 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480000120: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000130: fa fa fd fd fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480000140: fa fa fd fa fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480000150: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000160: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480000170: fa fa fd fa fa fa fd fa fa fa[04]fa fa fa fa fa 0x0c0480000180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000190: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800001a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800001b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800001c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb #2 0xdffffffff () ==2771809==ABORTING SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c04800001d0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800001e0: fa fa fd fd fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c04800001f0: fa fa fd fa fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480000200: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000210: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480000220: fa fa fd fa fa fa fd fa fa fa[04]fa fa fa fa fa 0x0c0480000230: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000240: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000250: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000260: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000270: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2771807==ABORTING #2 0xeffffffff () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main #2 0xdffffffff () Shadow bytes around the buggy address: 0x0c0480000200: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000210: fa fa fd fd fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480000220: fa fa fd fa fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480000230: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000240: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480000250: fa fa fd fa fa fa fd fa fa fa[04]fa fa fa fa fa 0x0c0480000260: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000270: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000290: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800002a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main ==2771800==ABORTING Shadow bytes around the buggy address: 0x0c0480000220: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fd 0x0c0480000230: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000240: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000250: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000260: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480000270: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c0480000280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000290: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800002a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800002b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800002c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) ==2771803==ABORTING #1 0x1456bff2ed84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x60200003bd34 is located 0 bytes to the right of 4-byte region [0x60200003bd30,0x60200003bd34) allocated by thread T0 here: #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x149a320b2d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000040eb4 is located 0 bytes to the right of 4-byte region [0x602000040eb0,0x602000040eb4) allocated by thread T0 here: #0 0x1456c5e5dd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #0 0x149a37fe1d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x151f99d88d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000040eb4 is located 0 bytes to the right of 4-byte region [0x602000040eb0,0x602000040eb4) allocated by thread T0 here: #2 0xf00000013 () #0 0x151f9fcb7d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14f96957dd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) Shadow bytes around the buggy address: 0x0c0480000200: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c0480000210: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000220: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000230: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000240: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480000250: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c0480000260: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000270: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000290: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800002a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2771830==ABORTING #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x60200003c314 is located 0 bytes to the right of 4-byte region [0x60200003c310,0x60200003c314) allocated by thread T0 here: #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x1482f7aadd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) #0 0x14f96f4acd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 0x602000041314 is located 0 bytes to the right of 4-byte region [0x602000041310,0x602000041314) allocated by thread T0 here: #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xf00000027 () #2 0xe00000009 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480000180: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c0480000190: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800001a0: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800001b0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800001c0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c04800001d0: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c04800001e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800001f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000210: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000220: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2771824==ABORTING Shadow bytes around the buggy address: 0x0c047ffff750: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c047ffff760: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff770: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff780: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff790: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff7a0: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c047ffff7b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff7c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff7d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff7e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff7f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3841347==ABORTING #0 0x1482fd9dcd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) -------------------------------------------------------------------------- Primary job terminated normally, but 1 process returned a non-zero exit code. Per user-direction, the job has been aborted. -------------------------------------------------------------------------- #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x151ce1ce2d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x60200003bff4 is located 0 bytes to the right of 4-byte region [0x60200003bff0,0x60200003bff4) allocated by thread T0 here: #0 0x151ce7c11d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe0000001d () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff7a0: fa fa fd fd fa fa fd fd fa fa fd fa fa fa fd fd 0x0c047ffff7b0: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fa 0x0c047ffff7c0: fa fa fd fa fa fa fd fa fa fa 04 fa fa fa fd fa 0x0c047ffff7d0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff7e0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff7f0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa[04]fa 0x0c047ffff800: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff810: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff820: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff830: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff840: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3841342==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14a17399ad84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x60200003bcd4 is located 0 bytes to the right of 4-byte region [0x60200003bcd0,0x60200003bcd4) allocated by thread T0 here: #0 0x14a1798c9d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe0000001d () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff810: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fa 0x0c047ffff820: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c047ffff830: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff840: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff850: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff860: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff870: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff880: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff890: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff8a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff8b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3841344==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x1470f92e8d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000040df4 is located 0 bytes to the right of 4-byte region [0x602000040df0,0x602000040df4) allocated by thread T0 here: #0 0x1470ff217d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000009 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480000160: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000170: fa fa fd fa fa fa fd fd fa fa 04 fa fa fa fd fa 0x0c0480000180: fa fa fd fa fa fa fd fa fa fa 04 fa fa fa fd fa 0x0c0480000190: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800001a0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c04800001b0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa[04]fa 0x0c04800001c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800001d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800001e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800001f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2771811==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14aa29c70d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000041394 is located 0 bytes to the right of 4-byte region [0x602000041390,0x602000041394) allocated by thread T0 here: #0 0x14aa2fb9fd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14a02f426d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x6020000409b4 is located 0 bytes to the right of 4-byte region [0x6020000409b0,0x6020000409b4) allocated by thread T0 here: #0 0x14a035355d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000009 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c04800000e0: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c04800000f0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000100: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000110: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000120: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480000130: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c0480000140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000160: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000170: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2771818==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14e1b7b43d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000041454 is located 0 bytes to the right of 4-byte region [0x602000041450,0x602000041454) allocated by thread T0 here: #0 0x14e1bda72d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000013 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480000230: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fa 0x0c0480000240: fa fa fd fd fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000250: fa fa fd fa fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480000260: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000270: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480000280: fa fa fd fa fa fa fd fa fa fa[04]fa fa fa fa fa 0x0c0480000290: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800002a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800002b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800002c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800002d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2771832==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x1500e8c99d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x6020000404b4 is located 0 bytes to the right of 4-byte region [0x6020000404b0,0x6020000404b4) allocated by thread T0 here: #0 0x1500eebc8d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xdffffffff () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480000040: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fd 0x0c0480000050: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000060: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000070: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000080: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480000090: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c04800000a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800000b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800000c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800000d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800000e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2771808==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x1475abf88d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000040214 is located 0 bytes to the right of 4-byte region [0x602000040210,0x602000040214) allocated by thread T0 here: #0 0x1475b1eb7d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xf00000009 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffffff0: fa fa fd fa fa fa fd fa fa fa fd fd fa fa 04 fa 0x0c0480000000: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c0480000010: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000020: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000030: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480000040: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000050: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000060: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000070: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2771810==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x151f38e4ad84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000041794 is located 0 bytes to the right of 4-byte region [0x602000041790,0x602000041794) allocated by thread T0 here: #0 0x151f3ed79d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000013 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c04800002a0: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fa 0x0c04800002b0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c04800002c0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800002d0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800002e0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c04800002f0: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000300: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000310: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000320: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000330: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000340: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2771836==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x151964884d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000040554 is located 0 bytes to the right of 4-byte region [0x602000040550,0x602000040554) allocated by thread T0 here: #0 0x15196a7b3d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000009 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480000050: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000060: fa fa fd fd fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480000070: fa fa fd fa fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480000080: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000090: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c04800000a0: fa fa fd fa fa fa fd fa fa fa[04]fa fa fa fa fa 0x0c04800000b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800000c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800000d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800000e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800000f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2771815==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14f6eec36d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000040cf4 is located 0 bytes to the right of 4-byte region [0x602000040cf0,0x602000040cf4) allocated by thread T0 here: #0 0x14f6f4b65d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xdffffffff () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480000140: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000150: fa fa fd fa fa fa fd fd fa fa 04 fa fa fa fd fa 0x0c0480000160: fa fa fd fa fa fa fd fa fa fa 04 fa fa fa fd fa 0x0c0480000170: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000180: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480000190: fa fa fd fa fa fa fd fa fa fa fd fa fa fa[04]fa 0x0c04800001a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800001b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800001c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800001d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800001e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2771802==ABORTING #2 0xe00000009 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480000180: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c0480000190: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800001a0: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800001b0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800001c0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c04800001d0: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c04800001e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800001f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000210: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000220: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2771822==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14710c1dad84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x6020000409d4 is located 0 bytes to the right of 4-byte region [0x6020000409d0,0x6020000409d4) allocated by thread T0 here: #0 0x147112109d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xdffffffff () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c04800000e0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800000f0: fa fa fd fd fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480000100: fa fa fd fa fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480000110: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000120: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480000130: fa fa fd fa fa fa fd fa fa fa[04]fa fa fa fa fa 0x0c0480000140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000160: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000170: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2771804==ABORTING #2 0xf00000013 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480000210: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fa 0x0c0480000220: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c0480000230: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000240: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480000250: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480000260: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000270: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480000290: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800002a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800002b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2771828==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x149c5fa98d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000039874 is located 0 bytes to the right of 4-byte region [0x602000039870,0x602000039874) allocated by thread T0 here: #0 0x149c659c7d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000013 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff2b0: fa fa fd fd fa fa fd fd fa fa fd fa fa fa fd fd 0x0c047ffff2c0: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fa 0x0c047ffff2d0: fa fa fd fa fa fa fd fa fa fa 04 fa fa fa fd fa 0x0c047ffff2e0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff2f0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff300: fa fa fd fa fa fa fd fa fa fa fd fa fa fa[04]fa 0x0c047ffff310: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff320: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff330: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff340: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff350: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==1703477==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x1517f0cb6d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x6020000397b4 is located 0 bytes to the right of 4-byte region [0x6020000397b0,0x6020000397b4) allocated by thread T0 here: #0 0x1517f6be5d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xf0000001d () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff2a0: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c047ffff2b0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff2c0: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff2d0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff2e0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff2f0: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c047ffff300: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff310: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff320: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff330: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff340: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==1703478==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14cb83b41d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x60200003b0d4 is located 0 bytes to the right of 4-byte region [0x60200003b0d0,0x60200003b0d4) allocated by thread T0 here: #0 0x14cb89a70d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000031 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff5c0: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fa 0x0c047ffff5d0: fa fa fd fd fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff5e0: fa fa fd fa fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c047ffff5f0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff600: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff610: fa fa fd fa fa fa fd fa fa fa[04]fa fa fa fa fa 0x0c047ffff620: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff630: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff640: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff650: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff660: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3047169==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14628a90dd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x60200003b2b4 is located 0 bytes to the right of 4-byte region [0x60200003b2b0,0x60200003b2b4) allocated by thread T0 here: #0 0x14629083cd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000027 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff600: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c047ffff610: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff620: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff630: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff640: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff650: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c047ffff660: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff670: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff680: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff690: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff6a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3047161==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14fb936f2d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x60200003ae14 is located 0 bytes to the right of 4-byte region [0x60200003ae10,0x60200003ae14) allocated by thread T0 here: #0 0x14fb99621d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xf00000031 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff570: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fa 0x0c047ffff580: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c047ffff590: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff5a0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff5b0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff5c0: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff5d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff5e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff5f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff600: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff610: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3047167==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x1468a1a7ad84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x60200003acf4 is located 0 bytes to the right of 4-byte region [0x60200003acf0,0x60200003acf4) allocated by thread T0 here: #0 0x1468a79a9d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000027 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff540: fa fa fd fd fa fa fd fd fa fa fd fa fa fa fd fd 0x0c047ffff550: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fa 0x0c047ffff560: fa fa fd fa fa fa fd fa fa fa 04 fa fa fa fd fa 0x0c047ffff570: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff580: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff590: fa fa fd fa fa fa fd fa fa fa fd fa fa fa[04]fa 0x0c047ffff5a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff5b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff5c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff5d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff5e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3047164==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x1488fe07bd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x60200003ac14 is located 0 bytes to the right of 4-byte region [0x60200003ac10,0x60200003ac14) allocated by thread T0 here: #0 0x148903faad90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000027 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff530: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fa 0x0c047ffff540: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c047ffff550: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff560: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff570: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff580: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff590: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff5a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff5b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff5c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff5d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3047162==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x1504fabbcd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x60200003ad74 is located 0 bytes to the right of 4-byte region [0x60200003ad70,0x60200003ad74) allocated by thread T0 here: #0 0x150500aebd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xf00000031 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff550: fa fa fd fd fa fa fd fd fa fa fd fa fa fa fd fd 0x0c047ffff560: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fa 0x0c047ffff570: fa fa fd fa fa fa fd fa fa fa 04 fa fa fa fd fa 0x0c047ffff580: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff590: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff5a0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa[04]fa 0x0c047ffff5b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff5c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff5d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff5e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff5f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3047166==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x15275fd29d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000049274 is located 0 bytes to the right of 4-byte region [0x602000049270,0x602000049274) allocated by thread T0 here: #0 0x152765c58d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000059 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c04800011f0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fd 0x0c0480001200: fa fa fd fa fa fa fd fd fa fa 04 fa fa fa fd fa 0x0c0480001210: fa fa fd fa fa fa fd fa fa fa 04 fa fa fa fd fa 0x0c0480001220: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001230: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001240: fa fa fd fa fa fa fd fa fa fa fd fa fa fa[04]fa 0x0c0480001250: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001260: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001270: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001290: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355299==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x146e6a029d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000049734 is located 0 bytes to the right of 4-byte region [0x602000049730,0x602000049734) allocated by thread T0 here: #0 0x146e6ff58d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000059 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001290: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fd 0x0c04800012a0: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800012b0: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800012c0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800012d0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c04800012e0: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c04800012f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001300: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001310: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001320: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001330: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355304==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x1455d0f68d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000048d14 is located 0 bytes to the right of 4-byte region [0x602000048d10,0x602000048d14) allocated by thread T0 here: #0 0x1455d6e97d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe0000003b () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001150: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fa 0x0c0480001160: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c0480001170: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001180: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001190: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c04800011a0: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800011b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800011c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800011d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800011e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800011f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355223==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x1456b3468d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x6020000483b4 is located 0 bytes to the right of 4-byte region [0x6020000483b0,0x6020000483b4) allocated by thread T0 here: #0 0x1456b9397d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe0000003b () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001020: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fd 0x0c0480001030: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001040: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001050: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001060: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001070: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c0480001080: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355227==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14f5c9e7cd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000048554 is located 0 bytes to the right of 4-byte region [0x602000048550,0x602000048554) allocated by thread T0 here: #0 0x14f5cfdabd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe0000004f () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001050: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001060: fa fa fd fd fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480001070: fa fa fd fa fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480001080: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001090: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c04800010a0: fa fa fd fa fa fa fd fa fa fa[04]fa fa fa fa fa 0x0c04800010b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355276==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14d0b6917d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000048414 is located 0 bytes to the right of 4-byte region [0x602000048410,0x602000048414) allocated by thread T0 here: #0 0x14d0bc846d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xf00000045 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001030: fa fa fd fa fa fa fd fa fa fa fd fd fa fa 04 fa 0x0c0480001040: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c0480001050: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001060: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001070: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001080: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355232==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x15355969ed84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000048494 is located 0 bytes to the right of 4-byte region [0x602000048490,0x602000048494) allocated by thread T0 here: #0 0x15355f5cdd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe0000004f () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001040: fa fa fd fa fa fa fd fa fa fa fd fd fa fa 04 fa 0x0c0480001050: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c0480001060: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001070: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001080: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001090: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355274==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14f24be52d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x60200004a1f4 is located 0 bytes to the right of 4-byte region [0x60200004a1f0,0x60200004a1f4) allocated by thread T0 here: #0 0x14f251d81d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000031 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c04800013e0: fa fa fd fd fa fa fd fd fa fa fd fa fa fa fd fd 0x0c04800013f0: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fa 0x0c0480001400: fa fa fd fa fa fa fd fa fa fa 04 fa fa fa fd fa 0x0c0480001410: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001420: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001430: fa fa fd fa fa fa fd fa fa fa fd fa fa fa[04]fa 0x0c0480001440: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001450: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001460: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001470: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001480: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355208==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x147ce42f0d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000048954 is located 0 bytes to the right of 4-byte region [0x602000048950,0x602000048954) allocated by thread T0 here: #0 0x147cea21fd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xf00000059 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c04800010d0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800010e0: fa fa fd fd fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c04800010f0: fa fa fd fa fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480001100: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001110: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001120: fa fa fd fa fa fa fd fa fa fa[04]fa fa fa fa fa 0x0c0480001130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001160: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001170: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355289==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14e4ee26ad84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000048494 is located 0 bytes to the right of 4-byte region [0x602000048490,0x602000048494) allocated by thread T0 here: #0 0x14e4f4199d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000045 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001040: fa fa fd fa fa fa fd fa fa fa fd fd fa fa 04 fa 0x0c0480001050: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c0480001060: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001070: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001080: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001090: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355256==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x146d7ad6ed84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000048414 is located 0 bytes to the right of 4-byte region [0x602000048410,0x602000048414) allocated by thread T0 here: #0 0x146d80c9dd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000045 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001030: fa fa fd fa fa fa fd fa fa fa fd fd fa fa 04 fa 0x0c0480001040: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c0480001050: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001060: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001070: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001080: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355235==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14e39a937d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000049634 is located 0 bytes to the right of 4-byte region [0x602000049630,0x602000049634) allocated by thread T0 here: #0 0x14e3a0866d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xf0000003b () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001270: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c0480001280: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001290: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800012a0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800012b0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c04800012c0: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c04800012d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800012e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800012f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001300: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001310: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355220==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14beacec1d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x6020000489b4 is located 0 bytes to the right of 4-byte region [0x6020000489b0,0x6020000489b4) allocated by thread T0 here: #0 0x14beb2df0d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe0000004f () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c04800010e0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fd 0x0c04800010f0: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001100: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001110: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001120: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001130: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c0480001140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001150: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001160: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001170: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001180: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355285==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x152642370d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000048794 is located 0 bytes to the right of 4-byte region [0x602000048790,0x602000048794) allocated by thread T0 here: #0 0x15264829fd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe0000003b () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c04800010a0: fa fa fd fa fa fa fd fa fa fa fd fd fa fa 04 fa 0x0c04800010b0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c04800010c0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800010d0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800010e0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c04800010f0: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001110: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001120: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001130: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001140: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355225==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x146e8bc7fd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000049214 is located 0 bytes to the right of 4-byte region [0x602000049210,0x602000049214) allocated by thread T0 here: #0 0x146e91baed90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000059 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c04800011f0: fa fa fd fd fa fa fd fa fa fa fd fd fa fa 04 fa 0x0c0480001200: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c0480001210: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001220: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001230: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001240: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001250: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001260: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001270: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001290: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355302==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x151313e5dd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000049cd4 is located 0 bytes to the right of 4-byte region [0x602000049cd0,0x602000049cd4) allocated by thread T0 here: #0 0x151319d8cd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000031 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001340: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fa 0x0c0480001350: fa fa fd fd fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001360: fa fa fd fa fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480001370: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001380: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001390: fa fa fd fa fa fa fd fa fa fa[04]fa fa fa fa fa 0x0c04800013a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800013b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800013c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800013d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800013e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355209==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14e71916dd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000048cd4 is located 0 bytes to the right of 4-byte region [0x602000048cd0,0x602000048cd4) allocated by thread T0 here: #0 0x14e71f09cd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000059 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001140: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001150: fa fa fd fd fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480001160: fa fa fd fa fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480001170: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001180: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001190: fa fa fd fa fa fa fd fa fa fa[04]fa fa fa fa fa 0x0c04800011a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800011b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800011c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800011d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800011e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355296==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14a53b9e1d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000049a54 is located 0 bytes to the right of 4-byte region [0x602000049a50,0x602000049a54) allocated by thread T0 here: #0 0x14a541910d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000059 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c04800012f0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001300: fa fa fd fd fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480001310: fa fa fd fa fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480001320: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001330: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001340: fa fa fd fa fa fa fd fa fa fa[04]fa fa fa fa fa 0x0c0480001350: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001360: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001370: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001380: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001390: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355308==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x154f976f9d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x6020000484d4 is located 0 bytes to the right of 4-byte region [0x6020000484d0,0x6020000484d4) allocated by thread T0 here: #0 0x154f9d628d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000045 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001040: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001050: fa fa fd fd fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480001060: fa fa fd fa fa fa 04 fa fa fa fd fa fa fa fd fa 0x0c0480001070: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001080: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001090: fa fa fd fa fa fa fd fa fa fa[04]fa fa fa fa fa 0x0c04800010a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355236==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x15266caeed84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000048414 is located 0 bytes to the right of 4-byte region [0x602000048410,0x602000048414) allocated by thread T0 here: #0 0x152672a1dd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000045 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001030: fa fa fd fa fa fa fd fa fa fa fd fd fa fa 04 fa 0x0c0480001040: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c0480001050: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001060: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001070: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001080: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355241==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14dfeffd8d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000048594 is located 0 bytes to the right of 4-byte region [0x602000048590,0x602000048594) allocated by thread T0 here: #0 0x14dff5f07d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe0000003b () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001060: fa fa fd fa fa fa fd fa fa fa fd fd fa fa 04 fa 0x0c0480001070: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c0480001080: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001090: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800010a0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c04800010b0: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355231==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14f8a85b6d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000049114 is located 0 bytes to the right of 4-byte region [0x602000049110,0x602000049114) allocated by thread T0 here: #0 0x14f8ae4e5d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xf0000003b () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c04800011d0: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fa 0x0c04800011e0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c04800011f0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001200: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001210: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001220: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001230: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001240: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001250: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001260: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001270: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355222==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14e7a58efd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x6020000485b4 is located 0 bytes to the right of 4-byte region [0x6020000485b0,0x6020000485b4) allocated by thread T0 here: #0 0x14e7ab81ed90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xf0000004f () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001060: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fd 0x0c0480001070: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001080: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001090: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800010a0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c04800010b0: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c04800010c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001100: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355260==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14fc3cac1d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000048494 is located 0 bytes to the right of 4-byte region [0x602000048490,0x602000048494) allocated by thread T0 here: #0 0x14fc429f0d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xf0000004f () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001040: fa fa fd fa fa fa fd fa fa fa fd fd fa fa 04 fa 0x0c0480001050: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c0480001060: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001070: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001080: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001090: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355262==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14b7dade6d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000049a74 is located 0 bytes to the right of 4-byte region [0x602000049a70,0x602000049a74) allocated by thread T0 here: #0 0x14b7e0d15d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000031 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c04800012f0: fa fa fd fd fa fa fd fd fa fa fd fa fa fa fd fd 0x0c0480001300: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fa 0x0c0480001310: fa fa fd fa fa fa fd fa fa fa 04 fa fa fa fd fa 0x0c0480001320: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001330: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001340: fa fa fd fa fa fa fd fa fa fa fd fa fa fa[04]fa 0x0c0480001350: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001360: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001370: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001380: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001390: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355210==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14e9cee0bd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000048df4 is located 0 bytes to the right of 4-byte region [0x602000048df0,0x602000048df4) allocated by thread T0 here: #0 0x14e9d4d3ad90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xf00000059 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001160: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001170: fa fa fd fa fa fa fd fd fa fa 04 fa fa fa fd fa 0x0c0480001180: fa fa fd fa fa fa fd fa fa fa 04 fa fa fa fd fa 0x0c0480001190: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c04800011a0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c04800011b0: fa fa fd fa fa fa fd fa fa fa fd fa fa fa[04]fa 0x0c04800011c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800011d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800011e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800011f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355292==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14ed09971d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000048414 is located 0 bytes to the right of 4-byte region [0x602000048410,0x602000048414) allocated by thread T0 here: #0 0x14ed0f8a0d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe0000003b () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001030: fa fa fd fa fa fa fd fa fa fa fd fd fa fa 04 fa 0x0c0480001040: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c0480001050: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001060: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001070: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001080: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355229==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14d6945e1d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000048494 is located 0 bytes to the right of 4-byte region [0x602000048490,0x602000048494) allocated by thread T0 here: #0 0x14d69a510d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe0000004f () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001040: fa fa fd fa fa fa fd fa fa fa fd fd fa fa 04 fa 0x0c0480001050: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c0480001060: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001070: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001080: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001090: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355281==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x1494ee0cfd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000048474 is located 0 bytes to the right of 4-byte region [0x602000048470,0x602000048474) allocated by thread T0 here: #0 0x1494f3ffed90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xf00000045 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001030: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001040: fa fa fd fa fa fa fd fd fa fa 04 fa fa fa fd fa 0x0c0480001050: fa fa fd fa fa fa fd fa fa fa 04 fa fa fa fd fa 0x0c0480001060: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001070: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001080: fa fa fd fa fa fa fd fa fa fa fd fa fa fa[04]fa 0x0c0480001090: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355234==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x146c6fc90d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x6020000484f4 is located 0 bytes to the right of 4-byte region [0x6020000484f0,0x6020000484f4) allocated by thread T0 here: #0 0x146c75bbfd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000045 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001040: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001050: fa fa fd fa fa fa fd fd fa fa 04 fa fa fa fd fa 0x0c0480001060: fa fa fd fa fa fa fd fa fa fa 04 fa fa fa fd fa 0x0c0480001070: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001080: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001090: fa fa fd fa fa fa fd fa fa fa fd fa fa fa[04]fa 0x0c04800010a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355245==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x14fabb940d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x6020000484f4 is located 0 bytes to the right of 4-byte region [0x6020000484f0,0x6020000484f4) allocated by thread T0 here: #0 0x14fac186fd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe0000004f () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c0480001040: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001050: fa fa fd fa fa fa fd fd fa fa 04 fa fa fa fd fa 0x0c0480001060: fa fa fd fa fa fa fd fa fa fa 04 fa fa fa fd fa 0x0c0480001070: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001080: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001090: fa fa fd fa fa fa fd fa fa fa fd fa fa fa[04]fa 0x0c04800010a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010b0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010c0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010d0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c04800010e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355269==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x15391b2d2d84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000049a34 is located 0 bytes to the right of 4-byte region [0x602000049a30,0x602000049a34) allocated by thread T0 here: #0 0x153921201d90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xe00000031 () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c04800012f0: fa fa fd fa fa fa fd fd fa fa fd fa fa fa fd fd 0x0c0480001300: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001310: fa fa 04 fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001320: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c0480001330: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c0480001340: fa fa fd fa fa fa[04]fa fa fa fa fa fa fa fa fa 0x0c0480001350: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001360: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001370: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001380: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c0480001390: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==2355216==ABORTING #0 0x406226 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) #1 0x15033bb2dd84 in __libc_start_main (/lib64/libc.so.6+0x3ad84) #2 0x406e3d in _start (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406e3d) 0x602000039294 is located 0 bytes to the right of 4-byte region [0x602000039290,0x602000039294) allocated by thread T0 here: #0 0x150341a5cd90 in operator new[](unsigned long) ../../../../libsanitizer/asan/asan_new_delete.cc:93 #1 0x403d52 in main (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x403d52) #2 0xf0000001d () SUMMARY: AddressSanitizer: heap-buffer-overflow (/scratch/users/m/a/marichaj/results_Test_petsc/cobpor+0x406226) in main Shadow bytes around the buggy address: 0x0c047ffff200: fa fa fd fd fa fa fd fa fa fa fd fd fa fa fd fa 0x0c047ffff210: fa fa fd fa fa fa fd fa fa fa fd fa fa fa 04 fa 0x0c047ffff220: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff230: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa 0x0c047ffff240: fa fa fd fa fa fa fd fa fa fa fd fa fa fa fd fa =>0x0c047ffff250: fa fa[04]fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff260: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff270: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff280: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff290: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c047ffff2a0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==3646609==ABORTING -------------------------------------------------------------------------- mpiexec detected that one or more processes exited with non-zero status, thus causing the job to be terminated. The first process to do so was: Process name: [[4806,1],19] Exit code: 1 -------------------------------------------------------------------------- Wed Dec 20 10:09:42 CET 2023