Notes
This function is in beta test. Please help improve it in the issues
here.
================================================================= ==108618==ERROR: AddressSanitizer: stack-use-after-scope on address 0x7ffd0f7ca950 at pc 0x00000051c0ab bp 0x7ffd0f7ca910 sp 0x7ffd0f7ca908 READ of size 4 at 0x7ffd0f7ca950 thread T0 #0 0x51c0aa (/out/package/call_mem+0x51c0aa) #1 0x7f0dc662ac86 (/lib/x86_64-linux-gnu/libc.so.6+0x21c86) #2 0x41d659 (/out/package/call_mem+0x41d659) Address 0x7ffd0f7ca950 is located in stack of thread T0 at offset 48 in frame #0 0x519ebf (/out/package/call_mem+0x519ebf) This frame has 2 object(s): [32, 36) 'N' (line 7) [48, 128) 'newcall' (line 24) <== Memory access at offset 48 is inside this variable HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-use-after-scope (/out/package/call_mem+0x51c0aa) Shadow bytes around the buggy address: 0x100021ef14d0: 00 00 00 00 00 00 00 00 00 00 00 00 00
Hints
Your answer may be identical to the JOJ answer in the first several lines.
However, the main problem you meet now is Runtime Error. And the exit code of your program is 1, which should be 0.
Please double check your code to solve this problem and try again.
Your Answer
Starting tick #0
JOJ Answer
Starting tick #0 Starting tick #1 Call from Jeff a gold member Answering call from Jeff Starting tick #2