From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id 83E68A034F; Tue, 9 Nov 2021 20:47:10 +0100 (CET) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 6DF1540E28; Tue, 9 Nov 2021 20:47:10 +0100 (CET) Received: from inbox.dpdk.org (inbox.dpdk.org [95.142.172.178]) by mails.dpdk.org (Postfix) with ESMTP id 8F9674068B for ; Tue, 9 Nov 2021 20:47:09 +0100 (CET) Received: by inbox.dpdk.org (Postfix, from userid 33) id 7426CA0548; Tue, 9 Nov 2021 20:47:09 +0100 (CET) From: bugzilla@dpdk.org To: dev@dpdk.org Date: Tue, 09 Nov 2021 19:47:08 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: DPDK X-Bugzilla-Component: core X-Bugzilla-Version: unspecified X-Bugzilla-Keywords: X-Bugzilla-Severity: normal X-Bugzilla-Who: david.marchand@redhat.com X-Bugzilla-Status: UNCONFIRMED X-Bugzilla-Resolution: X-Bugzilla-Priority: Normal X-Bugzilla-Assigned-To: dev@dpdk.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter target_milestone Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: http://bugs.dpdk.org/ Auto-Submitted: auto-generated X-Auto-Response-Suppress: All MIME-Version: 1.0 Subject: [dpdk-dev] [Bug 880] [asan] mem: out of bound access in unit test X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" https://bugs.dpdk.org/show_bug.cgi?id=3D880 Bug ID: 880 Summary: [asan] mem: out of bound access in unit test Product: DPDK Version: unspecified Hardware: All OS: All Status: UNCONFIRMED Severity: normal Priority: Normal Component: core Assignee: dev@dpdk.org Reporter: david.marchand@redhat.com Target Milestone: --- ASan reports: 18:08:02 DPDK_TEST=3Dmemory_autotest MALLOC_PERTURB_=3D143 /home/dmarchan/builds/build-gcc-static/app/test/dpdk-test --file-prefix=3Dmemory_autotest -l 0-3 ----------------------------------- output --------------------------------= --- stdout: RTE>>memory_autotest^M stderr: EAL: Detected CPU lcores: 28 EAL: Detected NUMA nodes: 1 EAL: Detected static linkage of DPDK EAL: WARNING! Base virtual address hint (0x100005000 !=3D 0x7f695f22e000) n= ot respected! EAL: This may cause issues with mapping memory into secondary processes EAL: Multi-process socket /var/run/dpdk/memory_autotest/mp_socket EAL: Selected IOVA mode 'VA' EAL: No available 2048 kB hugepages reported EAL: WARNING! Base virtual address hint (0x10000b000 !=3D 0x7f695efb2000) n= ot respected! EAL: This may cause issues with mapping memory into secondary processes EAL: WARNING! Base virtual address hint (0x100011000 !=3D 0x7f695f201000) n= ot respected! EAL: This may cause issues with mapping memory into secondary processes EAL: WARNING! Base virtual address hint (0x240012000 !=3D 0x7f6140000000) n= ot respected! EAL: This may cause issues with mapping memory into secondary processes EAL: WARNING! Base virtual address hint (0x280017000 !=3D 0x7f695f200000) n= ot respected! EAL: This may cause issues with mapping memory into secondary processes EAL: WARNING! Base virtual address hint (0x3c0018000 !=3D 0x7f5900000000) n= ot respected! EAL: This may cause issues with mapping memory into secondary processes EAL: Probe PCI driver: net_mlx4 (15b3:1007) device: 0000:04:00.0 (socket 0) net_mlx4: cannot access device, is mlx4_ib loaded? EAL: Requested device 0000:04:00.0 cannot be used APP: HPET is not enabled, using TSC as default timer =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D2495520=3D=3DERROR: AddressSanitizer: heap-buffer-overflow on address 0x7f617fe68cf0 at pc 0x000001eaa348 bp 0x7ffeb7ae11c0 sp 0x7ffeb7ae11b8 READ of size 1 at 0x7f617fe68cf0 thread T0 #0 0x1eaa347 in check_mem ../../dpdk/app/test/test_memory.c:36 #1 0x24cd50c in rte_memseg_walk_thread_unsafe ../../dpdk/lib/eal/common/eal_common_memory.c:729 #2 0x24cd55d in rte_memseg_walk ../../dpdk/lib/eal/common/eal_common_memory.c:745 #3 0x1eaa3ab in test_memory ../../dpdk/app/test/test_memory.c:94 #4 0x1ca5dcf in cmd_autotest_parsed ../../dpdk/app/test/commands.c:71 #5 0x2457d6d in cmdline_parse ../../dpdk/lib/cmdline/cmdline_parse.c:290 #6 0x245557f in cmdline_valid_buffer ../../dpdk/lib/cmdline/cmdline.c:26 #7 0x245d5cf in rdline_char_in ../../dpdk/lib/cmdline/cmdline_rdline.c:= 446 #8 0x245566b in cmdline_in ../../dpdk/lib/cmdline/cmdline.c:148 #9 0x245566b in cmdline_in ../../dpdk/lib/cmdline/cmdline.c:137 #10 0x40d93c in main ../../dpdk/app/test/test.c:214 #11 0x7f6962d5fb74 in __libc_start_main (/usr/lib64/libc.so.6+0x27b74) #12 0x1ca5c9d in _start (/home/dmarchan/builds/build-gcc-static/app/test/dpdk-test+0x1ca5c9d) Address 0x7f617fe68cf0 is a wild pointer. SUMMARY: AddressSanitizer: heap-buffer-overflow ../../dpdk/app/test/test_memory.c:36 in check_mem Shadow bytes around the buggy address: 0x0fecaffc5140: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fecaffc5150: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fecaffc5160: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fecaffc5170: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fecaffc5180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =3D>0x0fecaffc5190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00[fa]fa 0x0fecaffc51a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fecaffc51b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fecaffc51c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fecaffc51d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0fecaffc51e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb Shadow gap: cc =3D=3D2495520=3D=3DABORTING ---------------------------------------------------------------------------= --- --=20 You are receiving this mail because: You are the assignee for the bug.=