Advertisement
Guest User

ASAN backtrace

a guest
Jun 14th, 2020
142
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 2.44 KB | None | 0 0
  1. ==99711==ERROR: AddressSanitizer: stack-use-after-scope on address 0x7ffdb63cce90 at pc 0x0000004caaf6 bp 0x7fd5fc6fec50 sp 0x7fd5fc6fec48
  2. READ of size 8 at 0x7ffdb63cce90 thread T1
  3. #0 0x4caaf5 in std::decay<void (*)(int&)>::type _decay_copy<void (*)(int&)>(void (*&&)(int&))
  4. #1 0x4ca93b in std::thread timed_thread<void (*)(int&), std::reference_wrapper<int> >(void (*&&)(int&), std::reference_wrapper<int>&&)::'lambda'()::operator()() const
  5. #2 0x4ca7bc in void (*std::__invoke_impl<void, std::thread timed_thread<void (*)(int&), std::reference_wrapper<int> >(void (*&&)(int&), std::reference_wrapper<int>&&)::'lambda'()>(std::__invoke_other, std::thread timed_thread<void (*)(int&), std::reference_wrapper<int> >(void (*&&)(int&), std::reference_wrapper<int>&&)::'lambda'()&&))(int&)
  6. #3 0x4ca74c in std::__invoke_result<void (*)(int&), std::reference_wrapper<int> >::type std::__invoke<std::thread timed_thread<void (*)(int&), std::reference_wrapper<int> >(void (*&&)(int&), std::reference_wrapper<int>&&)::'lambda'()>(void (*&&)(int&), std::reference_wrapper<int>&&)
  7. #4 0x4ca724 in void std::thread::_Invoker<std::tuple<std::thread timed_thread<void (*)(int&), std::reference_wrapper<int> >(void (*&&)(int&), std::reference_wrapper<int>&&)::'lambda'()> >::_M_invoke<0ul>(std::_Index_tuple<0ul>)
  8. #5 0x4ca6f4 in std::thread::_Invoker<std::tuple<std::thread timed_thread<void (*)(int&), std::reference_wrapper<int> >(void (*&&)(int&), std::reference_wrapper<int>&&)::'lambda'()> >::operator()()
  9. #6 0x4ca5ad in std::thread::_State_impl<std::thread::_Invoker<std::tuple<std::thread timed_thread<void (*)(int&), std::reference_wrapper<int> >(void (*&&)(int&), std::reference_wrapper<int>&&)::'lambda'()> > >::_M_run()
  10. #7 0x7fd5ffedfbdf
  11. #8 0x7fd5ffcb3f26 in start_thread
  12. #9 0x7fd5ffbb931e in clone
  13.  
  14. Address 0x7ffdb63cce90 is located in stack of thread T0 at offset 80 in frame
  15. #0 0x4c93bf in main (/home/sam/Downloads/a.out+0x4c93bf)
  16.  
  17. This frame has 4 object(s):
  18. [32, 36) 'i'
  19. [48, 56) 't'
  20. [80, 88) 'ref.tmp' <== Memory access at offset 80 is inside this variable
  21. [112, 120) 'ref.tmp1'
  22. HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
  23. (longjmp and C++ exceptions *are* supported)
  24. SUMMARY: AddressSanitizer: stack-use-after-scope (/home/sam/Downloads/a.out+0x4caaf5) in std::decay<void (*)(int&)>::type _decay_copy<void (*)(int&)>(void (*&&)(int&))
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement