Advertisement
Guest User

Untitled

a guest
Dec 15th, 2020
134
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 3.02 KB | None | 0 0
  1. =================================================================
  2. ==1588==ERROR: AddressSanitizer: heap-use-after-free on address 0x612000003132 at pc 0x7f9598f0b4bf bp 0x7ffed0cda440 sp 0x7ffed0cda438
  3. READ of size 1 at 0x612000003132 thread T0
  4. #0 0x7f9598f0b4be in ustream_write_pending /home/hauke/openwrt/openwrt/build_dir/target-x86_64_glibc/libubox-2020-12-12-35787769/ustream.c:407
  5. #1 0x7f9598f0c025 in __ustream_fd_poll /home/hauke/openwrt/openwrt/build_dir/target-x86_64_glibc/libubox-2020-12-12-35787769/ustream-fd.c:125
  6. #2 0x7f9598f08a70 in uloop_run_events /home/hauke/openwrt/openwrt/build_dir/target-x86_64_glibc/libubox-2020-12-12-35787769/uloop.c:198
  7. #3 0x7f9598f08a70 in uloop_run_timeout /home/hauke/openwrt/openwrt/build_dir/target-x86_64_glibc/libubox-2020-12-12-35787769/uloop.c:555
  8. #4 0x402151 (/sbin/logd+0x402151)
  9. #5 0x7f9598d44cf9 in __libc_start_main (/lib/libc.so.6+0x23cf9)
  10. #6 0x4021e9 (/sbin/logd+0x4021e9)
  11.  
  12. 0x612000003132 is located 242 bytes inside of 272-byte region [0x612000003040,0x612000003150)
  13. freed by thread T0 here:
  14. #0 0x7f9598fac755 in __interceptor_free (/lib/libasan.so.6+0x8b755)
  15. #1 0x7f9598f0b496 in ustream_write_pending /home/hauke/openwrt/openwrt/build_dir/target-x86_64_glibc/libubox-2020-12-12-35787769/ustream.c:405
  16.  
  17. previously allocated by thread T0 here:
  18. #0 0x7f9598facabe in calloc (/lib/libasan.so.6+0x8babe)
  19. #1 0x402c56 (/sbin/logd+0x402c56)
  20.  
  21. SUMMARY: AddressSanitizer: heap-use-after-free /home/hauke/openwrt/openwrt/build_dir/target-x86_64_glibc/libubox-2020-12-12-35787769/ustream.c:407 in ustream_write_pending
  22. Shadow bytes around the buggy address:
  23. 0x0c247fff85d0: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd
  24. 0x0c247fff85e0: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
  25. 0x0c247fff85f0: fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa fa
  26. 0x0c247fff8600: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd
  27. 0x0c247fff8610: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
  28. =>0x0c247fff8620: fd fd fd fd fd fd[fd]fd fd fd fa fa fa fa fa fa
  29. 0x0c247fff8630: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd
  30. 0x0c247fff8640: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
  31. 0x0c247fff8650: fd fd fd fd fd fd fd fd fd fd fd fd fa fa fa fa
  32. 0x0c247fff8660: fa fa fa fa fa fa fa fa fd fd fd fd fd fd fd fd
  33. 0x0c247fff8670: fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd fd
  34. Shadow byte legend (one shadow byte represents 8 application bytes):
  35. Addressable: 00
  36. Partially addressable: 01 02 03 04 05 06 07
  37. Heap left redzone: fa
  38. Freed heap region: fd
  39. Stack left redzone: f1
  40. Stack mid redzone: f2
  41. Stack right redzone: f3
  42. Stack after return: f5
  43. Stack use after scope: f8
  44. Global redzone: f9
  45. Global init order: f6
  46. Poisoned by user: f7
  47. Container overflow: fc
  48. Array cookie: ac
  49. Intra object redzone: bb
  50. ASan internal: fe
  51. Left alloca redzone: ca
  52. Right alloca redzone: cb
  53. Shadow gap: cc
  54.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement