@文心快码addresssanitizer: stack-use-after-return on address 文心快码 AddressSanitizer 报告 stack-use-after-return 错误时,通常意味着程序在函数返回后继续使用了栈上的内存。 AddressSanitizer(ASan)是一个强大的C/C++内存错误检测工具,它可以检测多种内存错误,包括堆缓冲区溢出
^[[0;32m[ RUN ] ^[[mParseDateTimeTest/ParseDateTimeTestFixture.parse_datetime/31 === ==1921919==ERROR: AddressSanitizer: stack-use-after-return on address 0x7fcd4a4ee840 at pc 0x000019a75c87 bp 0x7fff8558d450 sp 0x7fff8558d448 READ of size 8 at 0x7fcd4a4ee840 thread T0 I1226 16:...
==865578==ERROR: AddressSanitizer: stack-use-after-return on address 0x7ffff4d01620 at pc 0x5555564a1aa1 bp 0x7fffffffd560 sp 0x7fffffffd550 WRITE of size 4 at 0x7ffff4d01620 thread T0#0 0x5555564a1aa0 in exec_cb lvgl/tests/src/test_cases/test_anim.c:21#1 0x55555656ad42 in ani...
==107156==ERROR: AddressSanitizer: SEGV on unknown address (pc 0x000000401463 bp 0x7ffd76144620 sp 0x7ffd76144200 T0) ==107156==The signal is caused by a READ memory access. ==107156==Hint: this fault was caused by a dereference of a high value address (see register values below). ...
==461162==ERROR: AddressSanitizer: stack-use-after-return on address 0x7ffff2b19588 at pc 0x5555567e8be8 bp 0x7fffffffa840 sp 0x7fffffffa830 READ of size 4 at 0x7ffff2b19588 thread T0 #0 0x5555567e8be7 in ZEND_ASSIGN_OBJ_SPEC_UNUSED_CONST_OP_DATA_CV_HANDLER /run/media/niels/More...
Compile with `clang++ -o foo foo.cc main.cc -fsanitize=address -O2 -mavx512f -g`. Running the program crashes: Program received signal SIGSEGV, Segmentation fault. 0x0000559c458fd95c in foo () at foo.cc:14 14 hoge(Foo()); (gdb) disassemble $rip,$rip+1 Dump of assembler code...