Advertisement
Guest User

Untitled

a guest
Nov 10th, 2022
55
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 4.47 KB | None | 0 0
  1. linux@linux-virtual-machine:~/dev/test/qt_tsan_tests_dev/_build_gcc$ ./qt_tsan_tests
  2. qt.qpa.plugin: Could not find the Qt platform plugin "wayland" in ""
  3. =================================================================
  4. ==72389==ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffe033c3af0 at pc 0x7f08b158106e bp 0x7ffe033c3770 sp 0x7ffe033c3760
  5. WRITE of size 4 at 0x7ffe033c3af0 thread T0
  6. #0 0x7f08b158106d in value_lcopy_boolean ../glib/gobject/gvaluetypes.c:76
  7. #1 0x7f08b15289a1 in g_object_get_valist ../glib/gobject/gobject.c:2659
  8. #2 0x7f08b1529029 in g_object_get ../glib/gobject/gobject.c:2754
  9. #3 0x7f08b3eee24b in gtkSetting<bool> /home/linux/qt6_dev/qt6/qtbase/src/plugins/platformthemes/gtk3/qgtk3theme.cpp:30
  10. #4 0x7f08b3eef12b in QGtk3Theme::appearance() const /home/linux/qt6_dev/qt6/qtbase/src/plugins/platformthemes/gtk3/qgtk3theme.cpp:179
  11. #5 0x7f08bc0c5d6c in qt_fusionPalette() /home/linux/qt6_dev/qt6/qtbase/src/gui/kernel/qplatformtheme.cpp:349
  12. #6 0x7f08bc0c727a in QPlatformThemePrivate::initializeSystemPalette() /home/linux/qt6_dev/qt6/qtbase/src/gui/kernel/qplatformtheme.cpp:399
  13. #7 0x7f08bc0c7356 in QPlatformTheme::palette(QPlatformTheme::Palette) const /home/linux/qt6_dev/qt6/qtbase/src/gui/kernel/qplatformtheme.cpp:439
  14. #8 0x7f08bdbb9a16 in QApplicationPrivate::basePalette() const /home/linux/qt6_dev/qt6/qtbase/src/widgets/kernel/qapplication.cpp:1065
  15. #9 0x7f08bbf89e2c in QGuiApplicationPrivate::setPalette(QPalette const&) /home/linux/qt6_dev/qt6/qtbase/src/gui/kernel/qguiapplication.cpp:3372
  16. #10 0x7f08bbf8a161 in QGuiApplicationPrivate::updatePalette() /home/linux/qt6_dev/qt6/qtbase/src/gui/kernel/qguiapplication.cpp:3344
  17. #11 0x7f08bbfb01bf in QGuiApplicationPrivate::init() /home/linux/qt6_dev/qt6/qtbase/src/gui/kernel/qguiapplication.cpp:1603
  18. #12 0x7f08bdbd9d3c in QApplicationPrivate::init() /home/linux/qt6_dev/qt6/qtbase/src/widgets/kernel/qapplication.cpp:462
  19. #13 0x7f08bdbd9ebc in QApplication::QApplication(int&, char**, int) /home/linux/qt6_dev/qt6/qtbase/src/widgets/kernel/qapplication.cpp:450
  20. #14 0x5648a1e8f9d8 in main /home/linux/dev/test/qt_tsan_tests_dev/qt_tsan_tests/main.cpp:8
  21. #15 0x7f08ba2e6d8f in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58
  22. #16 0x7f08ba2e6e3f in __libc_start_main_impl ../csu/libc-start.c:392
  23. #17 0x5648a1e8e3c4 in _start (/home/linux/dev/test/qt_tsan_tests_dev/_build_gcc/qt_tsan_tests+0x43c4)
  24.  
  25. Address 0x7ffe033c3af0 is located in stack of thread T0 at offset 32 in frame
  26. #0 0x7f08b3eee1c0 in gtkSetting<bool> /home/linux/qt6_dev/qt6/qtbase/src/plugins/platformthemes/gtk3/qgtk3theme.cpp:26
  27.  
  28. This frame has 1 object(s):
  29. [32, 33) 'value' (line 29) <== Memory access at offset 32 partially overflows this variable
  30. HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork
  31. (longjmp and C++ exceptions *are* supported)
  32. SUMMARY: AddressSanitizer: stack-buffer-overflow ../glib/gobject/gvaluetypes.c:76 in value_lcopy_boolean
  33. Shadow bytes around the buggy address:
  34. 0x100040670700: 00 00 00 00 f1 f1 f1 f1 00 f2 f2 f2 00 00 00 f2
  35. 0x100040670710: f2 f2 f2 f2 00 00 00 00 00 00 00 00 f3 f3 f3 f3
  36. 0x100040670720: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1
  37. 0x100040670730: f1 f1 00 00 00 f3 f3 f3 f3 f3 00 00 00 00 00 00
  38. 0x100040670740: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  39. =>0x100040670750: 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1[01]f3
  40. 0x100040670760: f3 f3 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  41. 0x100040670770: f1 f1 f1 f1 f1 f1 f8 f2 04 f2 04 f2 00 f2 f2 f2
  42. 0x100040670780: 00 f2 f2 f2 00 f2 f2 f2 00 00 00 f2 f2 f2 f2 f2
  43. 0x100040670790: f8 f8 f8 f2 f2 f2 f2 f2 f8 f8 f8 f2 f2 f2 f2 f2
  44. 0x1000406707a0: 00 00 00 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00
  45. Shadow byte legend (one shadow byte represents 8 application bytes):
  46. Addressable: 00
  47. Partially addressable: 01 02 03 04 05 06 07
  48. Heap left redzone: fa
  49. Freed heap region: fd
  50. Stack left redzone: f1
  51. Stack mid redzone: f2
  52. Stack right redzone: f3
  53. Stack after return: f5
  54. Stack use after scope: f8
  55. Global redzone: f9
  56. Global init order: f6
  57. Poisoned by user: f7
  58. Container overflow: fc
  59. Array cookie: ac
  60. Intra object redzone: bb
  61. ASan internal: fe
  62. Left alloca redzone: ca
  63. Right alloca redzone: cb
  64. Shadow gap: cc
  65. ==72389==ABORTING
  66.  
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement