Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Address sanatizer error #1342

Closed
jhert0 opened this issue Apr 16, 2019 · 0 comments · Fixed by #1348
Closed

Address sanatizer error #1342

jhert0 opened this issue Apr 16, 2019 · 0 comments · Fixed by #1348

Comments

@jhert0
Copy link
Member

jhert0 commented Apr 16, 2019

==9103==ERROR: AddressSanitizer: stack-use-after-return on address 0x7ffde7f03571 at pc 0x0000005d3b36 bp 0x7ffde7f034c0 sp 0x7ffde7f034b0
WRITE of size 1 at 0x7ffde7f03571 thread T0
#0 0x5d3b35 in dropdown_close (/usr/local/bin/utox+0x5d3b35)
#1 0x5f331b in close_dropdowns (/usr/local/bin/utox+0x5f331b)
#2 0x5f3355 in close_dropdowns (/usr/local/bin/utox+0x5f3355)
#3 0x5f3355 in close_dropdowns (/usr/local/bin/utox+0x5f3355)
#4 0x5f345f in reset_settings_controls (/usr/local/bin/utox+0x5f345f)
#5 0x5f34b1 in disable_all_setting_sub (/usr/local/bin/utox+0x5f34b1)
#6 0x5f3587 in button_settings_sub_ui_on_mup (/usr/local/bin/utox+0x5f3587)
#7 0x5d0e06 in button_mup (/usr/local/bin/utox+0x5d0e06)
#8 0x496d8e in panel_mup (/usr/local/bin/utox+0x496d8e)
#9 0x496e34 in panel_mup (/usr/local/bin/utox+0x496e34)
#10 0x496e34 in panel_mup (/usr/local/bin/utox+0x496e34)
#11 0x496e34 in panel_mup (/usr/local/bin/utox+0x496e34)
#12 0x496e34 in panel_mup (/usr/local/bin/utox+0x496e34)
#13 0x496e34 in panel_mup (/usr/local/bin/utox+0x496e34)
#14 0x5b475b in mouse_up (/usr/local/bin/utox+0x5b475b)
#15 0x5b56d9 in doevent (/usr/local/bin/utox+0x5b56d9)
#16 0x5c4ff0 in main (/usr/local/bin/utox+0x5c4ff0)
#17 0x7f2681aa2b6a in __libc_start_main ../csu/libc-start.c:308
#18 0x4159d9 in _start (/usr/local/bin/utox+0x4159d9)

Address 0x7ffde7f03571 is located in stack of thread T0 at offset 97 in frame
#0 0x5f31df in close_dropdowns (/usr/local/bin/utox+0x5f31df)

This frame has 1 object(s):
[32, 40) 'ch' <== Memory access at offset 97 overflows this variable
HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext
(longjmp and C++ exceptions are supported)
SUMMARY: AddressSanitizer: stack-use-after-return (/usr/local/bin/utox+0x5d3b35) in dropdown_close
Shadow bytes around the buggy address:
0x10003cfd8650: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003cfd8660: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003cfd8670: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003cfd8680: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003cfd8690: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=>0x10003cfd86a0: 00 00 f1 f1 f1 f1 00 f2 f2 f2 00 00 f5 f5[f5]f5
0x10003cfd86b0: f5 f5 f5 f5 00 00 00 00 f1 f1 f1 f1 00 f2 f2 f2
0x10003cfd86c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1
0x10003cfd86d0: f1 f1 00 f2 f2 f2 00 00 00 00 00 00 00 00 00 00
0x10003cfd86e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
0x10003cfd86f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
Addressable: 00
Partially addressable: 01 02 03 04 05 06 07
Heap left redzone: fa
Freed heap region: fd
Stack left redzone: f1
Stack mid redzone: f2
Stack right redzone: f3
Stack after return: f5
Stack use after scope: f8
Global redzone: f9
Global init order: f6
Poisoned by user: f7
Container overflow: fc
Array cookie: ac
Intra object redzone: bb
ASan internal: fe
Left alloca redzone: ca
Right alloca redzone: cb
==9103==ABORTING

@ghost ghost closed this as completed in #1348 Apr 21, 2019
This issue was closed.
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant