[10/14/2020 17:12:44 noire ~]# SciTE ================================================================= ==1023==ERROR: AddressSanitizer: container-overflow on address 0x608000002968 at pc 0x00000039a4d5 bp 0x7fffffffa6d0 sp 0x7fffffff9e80 READ of size 24 at 0x608000002968 thread T0 #0 0x39a4d4 in __asan_memcpy (/usr/local/bin/SciTE+0x39a4d4) #1 0x494154 in std::__1::basic_string, std::__1::allocator >::basic_string(std::__1::basic_string, std::__1::allocator >&&) /usr/include/c++/v1/string:1877:7 #2 0x4a60d0 in void std::__1::allocator, std::__1::allocator > >::construct, std::__1::allocator >, std::__1::basic_string, std::__1::allocator > >(std::__1::basic_string, std::__1::allocator >*, std::__1::basic_string, std::__1::allocator >&&) /usr/include/c++/v1/memory:1826:31 #3 0x4a607f in void std::__1::allocator_traits, std::__1::allocator > > >::__construct, std::__1::allocator >, std::__1::basic_string, std::__1::allocator > >(std::__1::integral_constant, std::__1::allocator, std::__1::allocator > >&, std::__1::basic_string, std::__1::allocator >*, std::__1::basic_string, std::__1::allocator >&&) /usr/include/c++/v1/memory:1718:18 #4 0x4a5777 in void std::__1::allocator_traits, std::__1::allocator > > >::construct, std::__1::allocator >, std::__1::basic_string, std::__1::allocator > >(std::__1::allocator, std::__1::allocator > >&, std::__1::basic_string, std::__1::allocator >*, std::__1::basic_string, std::__1::allocator >&&) /usr/include/c++/v1/memory:1561:14 #5 0x4a7366 in void std::__1::allocator_traits, std::__1::allocator > > >::__construct_backward, std::__1::allocator >*>(std::__1::allocator, std::__1::allocator > >&, std::__1::basic_string, std::__1::allocator >*, std::__1::basic_string, std::__1::allocator >*, std::__1::basic_string, std::__1::allocator >*&) /usr/include/c++/v1/memory:1680:17 #6 0x4a6906 in std::__1::vector, std::__1::allocator >, std::__1::allocator, std::__1::allocator > > >::__swap_out_circular_buffer(std::__1::__split_buffer, std::__1::allocator >, std::__1::allocator, std::__1::allocator > >&>&) /usr/include/c++/v1/vector:938:5 #7 0x4dca4d in void std::__1::vector, std::__1::allocator >, std::__1::allocator, std::__1::allocator > > >::__push_back_slow_path, std::__1::allocator > const&>(std::__1::basic_string, std::__1::allocator > const&) /usr/include/c++/v1/vector:1622:5 #8 0x808d06e81 (/usr/local/llvm80/lib/libLLVM-8.so+0x1d06e81) #9 0x808d06c48 (/usr/local/llvm80/lib/libLLVM-8.so+0x1d06c48) #10 0x8093f95c0 (/usr/local/llvm80/lib/libLLVM-8.so+0x23f95c0) 0x608000002968 is located 72 bytes inside of 96-byte region [0x608000002920,0x608000002980) allocated by thread T0 here: #0 0x439bf2 in operator new(unsigned long) (/usr/local/bin/SciTE+0x439bf2) #1 0x4a174c in std::__1::__libcpp_allocate(unsigned long, unsigned long) /usr/include/c++/v1/new:239:10 #2 0x4a7174 in std::__1::allocator, std::__1::allocator > >::allocate(unsigned long, void const*) /usr/include/c++/v1/memory:1814:37 #3 0x4a6fd0 in std::__1::allocator_traits, std::__1::allocator > > >::allocate(std::__1::allocator, std::__1::allocator > >&, unsigned long) /usr/include/c++/v1/memory:1547:21 #4 0x4a6667 in std::__1::__split_buffer, std::__1::allocator >, std::__1::allocator, std::__1::allocator > >&>::__split_buffer(unsigned long, unsigned long, std::__1::allocator, std::__1::allocator > >&) /usr/include/c++/v1/__split_buffer:311:29 #5 0x4dc992 in void std::__1::vector, std::__1::allocator >, std::__1::allocator, std::__1::allocator > > >::__push_back_slow_path, std::__1::allocator > const&>(std::__1::basic_string, std::__1::allocator > const&) /usr/include/c++/v1/vector:1618:49 #6 0x808d06e81 (/usr/local/llvm80/lib/libLLVM-8.so+0x1d06e81) #7 0x808d06c48 (/usr/local/llvm80/lib/libLLVM-8.so+0x1d06c48) #8 0x8093491da (/usr/local/llvm80/lib/libLLVM-8.so+0x23491da) #9 0x80071146d (/libexec/ld-elf.so.1+0xc46d) #10 0x8007160b9 (/libexec/ld-elf.so.1+0x110b9) #11 0x8007126de (/libexec/ld-elf.so.1+0xd6de) #12 0x3f7a5e in __interceptor_dlopen (/usr/local/bin/SciTE+0x3f7a5e) #13 0x80280a818 (/usr/local/lib/libGL.so.1+0x88818) #14 0x8027e9cb5 (/usr/local/lib/libGL.so.1+0x67cb5) #15 0x8027eaea9 (/usr/local/lib/libGL.so.1+0x68ea9) #16 0x8027de662 (/usr/local/lib/libGL.so.1+0x5c662) #17 0x8027db77d in glXQueryServerString (/usr/local/lib/libGL.so.1+0x5977d) #18 0x80238205d in epoxy_glx_version (/usr/local/lib/libepoxy.so.0+0x10705d) #19 0x80165c4e0 (/usr/local/lib/libgdk-3.so.0+0xbc4e0) #20 0x80165c96a (/usr/local/lib/libgdk-3.so.0+0xbc96a) #21 0x801667910 (/usr/local/lib/libgdk-3.so.0+0xc7910) #22 0x8016636b3 (/usr/local/lib/libgdk-3.so.0+0xc36b3) #23 0x8016525a6 (/usr/local/lib/libgdk-3.so.0+0xb25a6) #24 0x801620f59 in gdk_display_manager_open_display (/usr/local/lib/libgdk-3.so.0+0x80f59) #25 0x8013c36f2 in gtk_init (/usr/local/lib/libgtk-3.so.0+0x5c36f2) #26 0x490d10 in main /wrkdirs/usr/ports/editors/scite/work/scite/gtk/SciTEGTK.cxx:5479:2 #27 0x39310e in _start (/usr/local/bin/SciTE+0x39310e) #28 0x80072dfff () HINT: if you don't care about these errors you may set ASAN_OPTIONS=detect_container_overflow=0. If you suspect a false positive see also: https://github.com/google/sanitizers/wiki/AddressSanitizerContainerOverflow. SUMMARY: AddressSanitizer: container-overflow (/usr/local/bin/SciTE+0x39a4d4) in __asan_memcpy Shadow bytes around the buggy address: 0x4c10000004d0: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00 0x4c10000004e0: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00 0x4c10000004f0: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00 0x4c1000000500: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 00 0x4c1000000510: fa fa fa fa 00 00 00 00 00 00 00 00 00 00 00 fa =>0x4c1000000520: fa fa fa fa 00 00 00 00 00 00 00 00 00[fc]fc fc 0x4c1000000530: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x4c1000000540: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x4c1000000550: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x4c1000000560: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x4c1000000570: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc ==1023==ABORTING [10/14/2020 17:12:53 noire ~]#