From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 9D4B046801; Tue, 27 May 2025 11:06:27 +0200 (CEST) Received: from mails.dpdk.org (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 2BB10402D6; Tue, 27 May 2025 11:06:27 +0200 (CEST) Received: from inbox.dpdk.org (inbox.dpdk.org [95.142.172.178]) by mails.dpdk.org (Postfix) with ESMTP id AFD8C402B9 for ; Tue, 27 May 2025 11:06:25 +0200 (CEST) Received: by inbox.dpdk.org (Postfix, from userid 33) id 86EBE46803; Tue, 27 May 2025 11:06:25 +0200 (CEST) From: bugzilla@dpdk.org To: dev@dpdk.org Subject: [DPDK/examples Bug 1712] secondary symmetric_mp startup failure with ASan (stack-buffer-overflow) Date: Tue, 27 May 2025 09:06:25 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: DPDK X-Bugzilla-Component: examples X-Bugzilla-Version: 25.03 X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: ahmedi@nvidia.com X-Bugzilla-Status: UNCONFIRMED X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: dev@dpdk.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter target_milestone Message-ID: Content-Type: multipart/alternative; boundary=17483367850.9D16A9.2196726 Content-Transfer-Encoding: 7bit X-Bugzilla-URL: http://bugs.dpdk.org/ Auto-Submitted: auto-generated X-Auto-Response-Suppress: All MIME-Version: 1.0 X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org --17483367850.9D16A9.2196726 Date: Tue, 27 May 2025 11:06:25 +0200 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://bugs.dpdk.org/ Auto-Submitted: auto-generated X-Auto-Response-Suppress: All https://bugs.dpdk.org/show_bug.cgi?id=3D1712 Bug ID: 1712 Summary: secondary symmetric_mp startup failure with ASan (stack-buffer-overflow) Product: DPDK Version: 25.03 Hardware: ARM OS: Linux Status: UNCONFIRMED Severity: normal Priority: Normal Component: examples Assignee: dev@dpdk.org Reporter: ahmedi@nvidia.com Target Milestone: --- ./build/examples/dpdk-symmetric_mp -n 4 -a 0000:03:00.0 -a 0000:03:00.1 -= l 1 --proc-type=3Dprimary -- -p 0xa --num-procs=3D7 --proc-id=3D0=20 ./build/examples/dpdk-symmetric_mp -n 4 -a 0000:03:00.0 -a 0000:03:00.1 -l= 2 --proc-type=3Dsecondary -- -p 0xa --num-procs=3D7 --proc-id=3D1 Attempt 1: Process exited with status None, output: EAL: Detected CPU lcore= s: 8 EAL: Detected NUMA nodes: 1 EAL: Detected static linkage of DPDK EAL: Multi-process socket /var/run/dpdk/rte/mp_socket_486544_7286ede6c03 EAL: Selected IOVA mode 'VA' EAL: Cannot get a virtual area at requested address: 0xfffb85e00000 (got 0xfffb790e0000) EAL: Cannot reserve 17179869184 bytes at [0xfffb85e00000] - please use '--base-virtaddr' option EAL: Cannot preallocate VA space for hugepage memory EAL: FATAL: Cannot init memory EAL: Cannot init memory EAL: Error - exiting with code: 1 Cause: Cannot init EAL =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D486544=3D=3DERROR: AddressSanitizer: stack-buffer-overflow on address 0xffff798ed4ac at pc 0xffff83ef2254 bp 0xffff798ecc00 sp 0xffff798ecc48 WRITE of size 24 at 0xffff798ed4ac thread T16777215 #0 0xffff83ef2250 in __interceptor_sigaltstack ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors= .inc:9986 #1 0xffff83f68674 in __sanitizer::UnsetAlternateSignalStack() ../../../../src/libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cpp:1= 95 #2 0xffff83f58f94 in __asan::AsanThread::Destroy() ../../../../src/libsanitizer/asan/asan_thread.cpp:104 #3 0xffff836fa3c0 in __GI___nptl_deallocate_tsd nptl/nptl_deallocate_tsd.c:73 #4 0xffff836fd480 in start_thread nptl/pthread_create.c:453 #5 0xffff83765ed8 (/lib/aarch64-linux-gnu/libc.so.6+0xe5ed8) Address 0xffff798ed4ac is located in stack of thread T3 at offset 1100 in f= rame #0 0xaaaac8ce476c in mp_handle ([..]/examples/dpdk-symmetric_mp+0x70476= c) This frame has 6 object(s): [32, 48) 'iov' [64, 120) 'msgh' [160, 270) 'sa' (line 392) [304, 664) 'dummy' (line 374) [736, 1100) 'msg' (line 391) <=3D=3D Memory access at offset 1100 overf= lows this variable [1168, 1216) 'control' HINT: this may be a false positive if your program uses some custom stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) Thread T3 created by T0 here: #0 0xffff83ef6188 in __interceptor_pthread_create ../../../../src/libsanitizer/asan/asan_interceptors.cpp:216 #1 0xaaaac8cc86a0 in rte_ctrl_thread_create ([..]/examples/dpdk-symmetric_mp+0x6e86a0) #2 0xaaaac8ce685c in rte_mp_channel_init ([..]/examples/dpdk-symmetric_mp+0x70685c) #3 0xaaaac8cfc688 in rte_eal_init ([..]/examples/dpdk-symmetric_mp+0x71c688) #4 0xaaaac87a898c in main ([..]/examples/dpdk-symmetric_mp+0x1c898c) #5 0xffff836a73f8 in __libc_start_call_main ../sysdeps/nptl/libc_start_call_main.h:58 #6 0xffff836a74c8 in __libc_start_main_impl ../csu/libc-start.c:392 #7 0xaaaac87b406c in _start ([..]/examples/dpdk-symmetric_mp+0x1d406c) SUMMARY: AddressSanitizer: stack-buffer-overflow ../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors= .inc:9986 in __interceptor_sigaltstack Shadow bytes around the buggy address: 0x200fef31da40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x200fef31da50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f2 0x200fef31da60: f2 f2 f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00 00 0x200fef31da70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x200fef31da80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =3D>0x200fef31da90: 00 00 00 00 00[04]f2 f2 f2 f2 f2 f2 f2 f2 00 00 0x200fef31daa0: 00 00 00 00 f3 f3 f3 f3 00 00 00 00 00 00 00 00 0x200fef31dab0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x200fef31dac0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x200fef31dad0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x200fef31dae0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07=20 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc =3D=3D486544=3D=3DABORTING Environment info: OS: Ubuntu 22.04 (aarch64) Kernel: Kernel: 5.15.0-1065-bluefield Device: Bluefield-2 gcc: 11.2.0 --=20 You are receiving this mail because: You are the assignee for the bug.= --17483367850.9D16A9.2196726 Date: Tue, 27 May 2025 11:06:25 +0200 MIME-Version: 1.0 Content-Type: text/html; charset=UTF-8 Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://bugs.dpdk.org/ Auto-Submitted: auto-generated X-Auto-Response-Suppress: All
Bug ID 1712
Summary secondary symmetric_mp startup failure with ASan (stack-buffe= r-overflow)
Product DPDK
Version 25.03
Hardware ARM
OS Linux
Status UNCONFIRMED
Severity normal
Priority Normal
Component examples
Assignee dev@dpdk.org
Reporter ahmedi@nvidia.com
Target Milestone ---

./build/examples/dpdk-symmetric_mp=
 -n 4  -a 0000:03:00.0  -a 0000:03:00.1 -l 1
--proc-type=3Dprimary  -- -p 0xa --num-procs=3D7 --proc-id=3D0=20
./build/examples/dpdk-symmetric_mp -n 4  -a 0000:03:00.0 -a 0000:03:00.1 -l=
 2
--proc-type=3Dsecondary  -- -p 0xa --num-procs=3D7 --proc-id=3D1


Attempt 1: Process exited with status None, output: EAL: Detected CPU lcore=
s: 8
EAL: Detected NUMA nodes: 1
EAL: Detected static linkage of DPDK
EAL: Multi-process socket /var/run/dpdk/rte/mp_socket_486544_7286ede6c03
EAL: Selected IOVA mode 'VA'
EAL: Cannot get a virtual area at requested address: 0xfffb85e00000 (got
0xfffb790e0000)
EAL: Cannot reserve 17179869184 bytes at [0xfffb85e00000] - please use
'--base-virtaddr' option
EAL: Cannot preallocate VA space for hugepage memory
EAL: FATAL: Cannot init memory
EAL: Cannot init memory
EAL: Error - exiting with code: 1
  Cause: Cannot init EAL
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=
=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D
=3D=3D486544=3D=3DERROR: AddressSanitizer: stack-buffer-overflow on address
0xffff798ed4ac at pc 0xffff83ef2254 bp 0xffff798ecc00 sp 0xffff798ecc48
WRITE of size 24 at 0xffff798ed4ac thread T16777215
    #0 0xffff83ef2250 in __interceptor_sigaltstack
../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors=
.inc:9986
    #1 0xffff83f68674 in __sanitizer::UnsetAlternateSignalStack()
../../../../src/libsanitizer/sanitizer_common/sanitizer_posix_libcdep.cpp:1=
95
    #2 0xffff83f58f94 in __asan::AsanThread::Destroy()
../../../../src/libsanitizer/asan/asan_thread.cpp:104
    #3 0xffff836fa3c0 in __GI___nptl_deallocate_tsd
nptl/nptl_deallocate_tsd.c:73
    #4 0xffff836fd480 in start_thread nptl/pthread_create.c:453
    #5 0xffff83765ed8  (/lib/aarch64-linux-gnu/libc.so.6+0xe5ed8)

Address 0xffff798ed4ac is located in stack of thread T3 at offset 1100 in f=
rame
    #0 0xaaaac8ce476c in mp_handle ([..]/examples/dpdk-symmetric_mp+0x70476=
c)

  This frame has 6 object(s):
    [32, 48) 'iov'
    [64, 120) 'msgh'
    [160, 270) 'sa' (line 392)
    [304, 664) 'dummy' (line 374)
    [736, 1100) 'msg' (line 391) <=3D=3D Memory access at offset 1100 ov=
erflows
this variable
    [1168, 1216) 'control'
HINT: this may be a false positive if your program uses some custom stack
unwind mechanism, swapcontext or vfork
      (longjmp and C++ exceptions *are* supported)
Thread T3 created by T0 here:
    #0 0xffff83ef6188 in __interceptor_pthread_create
../../../../src/libsanitizer/asan/asan_interceptors.cpp:216
    #1 0xaaaac8cc86a0 in rte_ctrl_thread_create
([..]/examples/dpdk-symmetric_mp+0x6e86a0)
    #2 0xaaaac8ce685c in rte_mp_channel_init
([..]/examples/dpdk-symmetric_mp+0x70685c)
    #3 0xaaaac8cfc688 in rte_eal_init
([..]/examples/dpdk-symmetric_mp+0x71c688)
    #4 0xaaaac87a898c in main ([..]/examples/dpdk-symmetric_mp+0x1c898c)
    #5 0xffff836a73f8 in __libc_start_call_main
../sysdeps/nptl/libc_start_call_main.h:58
    #6 0xffff836a74c8 in __libc_start_main_impl ../csu/libc-start.c:392
    #7 0xaaaac87b406c in _start ([..]/examples/dpdk-symmetric_mp+0x1d406c)

SUMMARY: AddressSanitizer: stack-buffer-overflow
../../../../src/libsanitizer/sanitizer_common/sanitizer_common_interceptors=
.inc:9986
in __interceptor_sigaltstack
Shadow bytes around the buggy address:
  0x200fef31da40: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x200fef31da50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 f2
  0x200fef31da60: f2 f2 f2 f2 f2 f2 f2 f2 00 00 00 00 00 00 00 00
  0x200fef31da70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x200fef31da80: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
=3D>0x200fef31da90: 00 00 00 00 00[04]f2 f2 f2 f2 f2 f2 f2 f2 00 00
  0x200fef31daa0: 00 00 00 00 f3 f3 f3 f3 00 00 00 00 00 00 00 00
  0x200fef31dab0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x200fef31dac0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x200fef31dad0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x200fef31dae0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07=20
  Heap left redzone:       fa
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
  Left alloca redzone:     ca
  Right alloca redzone:    cb
  Shadow gap:              cc
=3D=3D486544=3D=3DABORTING


Environment info:
OS: Ubuntu 22.04 (aarch64)
Kernel: Kernel: 5.15.0-1065-bluefield
Device: Bluefield-2
gcc: 11.2.0
          


You are receiving this mail because:
  • You are the assignee for the bug.
=20=20=20=20=20=20=20=20=20=20
= --17483367850.9D16A9.2196726--