You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
==9103==ERROR: AddressSanitizer: stack-use-after-return on address 0x7ffde7f03571 at pc 0x0000005d3b36 bp 0x7ffde7f034c0 sp 0x7ffde7f034b0
WRITE of size 1 at 0x7ffde7f03571 thread T0
#0 0x5d3b35 in dropdown_close (/usr/local/bin/utox+0x5d3b35) #1 0x5f331b in close_dropdowns (/usr/local/bin/utox+0x5f331b) #2 0x5f3355 in close_dropdowns (/usr/local/bin/utox+0x5f3355) #3 0x5f3355 in close_dropdowns (/usr/local/bin/utox+0x5f3355) #4 0x5f345f in reset_settings_controls (/usr/local/bin/utox+0x5f345f) #5 0x5f34b1 in disable_all_setting_sub (/usr/local/bin/utox+0x5f34b1) #6 0x5f3587 in button_settings_sub_ui_on_mup (/usr/local/bin/utox+0x5f3587) #7 0x5d0e06 in button_mup (/usr/local/bin/utox+0x5d0e06) #8 0x496d8e in panel_mup (/usr/local/bin/utox+0x496d8e) #9 0x496e34 in panel_mup (/usr/local/bin/utox+0x496e34) #10 0x496e34 in panel_mup (/usr/local/bin/utox+0x496e34) #11 0x496e34 in panel_mup (/usr/local/bin/utox+0x496e34) #12 0x496e34 in panel_mup (/usr/local/bin/utox+0x496e34) #13 0x496e34 in panel_mup (/usr/local/bin/utox+0x496e34) #14 0x5b475b in mouse_up (/usr/local/bin/utox+0x5b475b) #15 0x5b56d9 in doevent (/usr/local/bin/utox+0x5b56d9) #16 0x5c4ff0 in main (/usr/local/bin/utox+0x5c4ff0) #17 0x7f2681aa2b6a in __libc_start_main ../csu/libc-start.c:308 #18 0x4159d9 in _start (/usr/local/bin/utox+0x4159d9)
Address 0x7ffde7f03571 is located in stack of thread T0 at offset 97 in frame
#0 0x5f31df in close_dropdowns (/usr/local/bin/utox+0x5f31df)
This frame has 1 object(s):
[32, 40) 'ch' <== Memory access at offset 97 overflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext
(longjmp and C++ exceptions are supported)
SUMMARY: AddressSanitizer: stack-use-after-return (/usr/local/bin/utox+0x5d3b35) in dropdown_close
Shadow bytes around the buggy address:
0x10003cfd8650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003cfd8660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003cfd8670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003cfd8680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003cfd8690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x10003cfd86a0: 00 00 f1 f1 f1 f1 00 f2 f2 f2 00 00 f5 f5[f5]f5
0x10003cfd86b0: f5 f5 f5 f5 00 00 00 00 f1 f1 f1 f1 00 f2 f2 f2
0x10003cfd86c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1
0x10003cfd86d0: f1 f1 00 f2 f2 f2 00 00 00 00 00 00 00 00 00 00
0x10003cfd86e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003cfd86f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==9103==ABORTING
The text was updated successfully, but these errors were encountered:
==9103==ERROR: AddressSanitizer: stack-use-after-return on address 0x7ffde7f03571 at pc 0x0000005d3b36 bp 0x7ffde7f034c0 sp 0x7ffde7f034b0
WRITE of size 1 at 0x7ffde7f03571 thread T0
#0 0x5d3b35 in dropdown_close (/usr/local/bin/utox+0x5d3b35)
#1 0x5f331b in close_dropdowns (/usr/local/bin/utox+0x5f331b)
#2 0x5f3355 in close_dropdowns (/usr/local/bin/utox+0x5f3355)
#3 0x5f3355 in close_dropdowns (/usr/local/bin/utox+0x5f3355)
#4 0x5f345f in reset_settings_controls (/usr/local/bin/utox+0x5f345f)
#5 0x5f34b1 in disable_all_setting_sub (/usr/local/bin/utox+0x5f34b1)
#6 0x5f3587 in button_settings_sub_ui_on_mup (/usr/local/bin/utox+0x5f3587)
#7 0x5d0e06 in button_mup (/usr/local/bin/utox+0x5d0e06)
#8 0x496d8e in panel_mup (/usr/local/bin/utox+0x496d8e)
#9 0x496e34 in panel_mup (/usr/local/bin/utox+0x496e34)
#10 0x496e34 in panel_mup (/usr/local/bin/utox+0x496e34)
#11 0x496e34 in panel_mup (/usr/local/bin/utox+0x496e34)
#12 0x496e34 in panel_mup (/usr/local/bin/utox+0x496e34)
#13 0x496e34 in panel_mup (/usr/local/bin/utox+0x496e34)
#14 0x5b475b in mouse_up (/usr/local/bin/utox+0x5b475b)
#15 0x5b56d9 in doevent (/usr/local/bin/utox+0x5b56d9)
#16 0x5c4ff0 in main (/usr/local/bin/utox+0x5c4ff0)
#17 0x7f2681aa2b6a in __libc_start_main ../csu/libc-start.c:308
#18 0x4159d9 in _start (/usr/local/bin/utox+0x4159d9)
Address 0x7ffde7f03571 is located in stack of thread T0 at offset 97 in frame
#0 0x5f31df in close_dropdowns (/usr/local/bin/utox+0x5f31df)
This frame has 1 object(s):
[32, 40) 'ch' <== Memory access at offset 97 overflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext
(longjmp and C++ exceptions are supported)
SUMMARY: AddressSanitizer: stack-use-after-return (/usr/local/bin/utox+0x5d3b35) in dropdown_close
Shadow bytes around the buggy address:
0x10003cfd8650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003cfd8660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003cfd8670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003cfd8680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003cfd8690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x10003cfd86a0: 00 00 f1 f1 f1 f1 00 f2 f2 f2 00 00 f5 f5[f5]f5
0x10003cfd86b0: f5 f5 f5 f5 00 00 00 00 f1 f1 f1 f1 00 f2 f2 f2
0x10003cfd86c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1
0x10003cfd86d0: f1 f1 00 f2 f2 f2 00 00 00 00 00 00 00 00 00 00
0x10003cfd86e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003cfd86f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==9103==ABORTING
The text was updated successfully, but these errors were encountered: