[ 
https://issues.apache.org/jira/browse/DISPATCH-2274?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel&focusedCommentId=17439443#comment-17439443
 ] 

ASF GitHub Bot commented on DISPATCH-2274:
------------------------------------------

ganeshmurthy opened a new pull request #1421:
URL: https://github.com/apache/qpid-dispatch/pull/1421


   …as context


-- 
This is an automated message from the Apache Git Service.
To respond to the message, please log on to GitHub and use the
URL above to go to the specific comment.

To unsubscribe, e-mail: [email protected]

For queries about this service, please contact Infrastructure at:
[email protected]


> system_tests_router_mesh: ERROR: AddressSanitizer: use-after-poison in 
> qd_link_pn container.c:1029
> --------------------------------------------------------------------------------------------------
>
>                 Key: DISPATCH-2274
>                 URL: https://issues.apache.org/jira/browse/DISPATCH-2274
>             Project: Qpid Dispatch
>          Issue Type: Bug
>    Affects Versions: 1.18.0
>         Environment: Aarch64 Linux, amd64 macOS
>            Reporter: Jiri Daněk
>            Assignee: Ken Giusti
>            Priority: Major
>             Fix For: 1.18.0
>
>
> https://app.travis-ci.com/github/apache/qpid-dispatch/jobs/545969177
> {noformat}
> 66: Create 10 senders each with a different priority. ... ERROR
> 66: ERROR
> 66: 
> 66: Router RouterC output file:
> 66: >>>>
> 66: =================================================================
> 66: ==21601==ERROR: AddressSanitizer: use-after-poison on address 
> 0x61300007d828 at pc 0x0001064a6469 bp 0x70000843bca0 sp 0x70000843bc98
> 66: READ of size 8 at 0x61300007d828 thread T4
> 66:     #0 0x1064a6468 in qd_link_pn container.c:1029
> 66:     #1 0x1066d0e37 in CORE_link_push router_node.c:1920
> 66:     #2 0x106576df6 in qdr_connection_process connections.c:414
> 66:     #3 0x1064956ce in writable_handler container.c:396
> 66:     #4 0x1066edb36 in thread_run server.c:1149
> 66:     #5 0x7fff5fa152ea in _pthread_body 
> (libsystem_pthread.dylib:x86_64+0x32ea)
> 66:     #6 0x7fff5fa18248 in _pthread_start 
> (libsystem_pthread.dylib:x86_64+0x6248)
> 66:     #7 0x7fff5fa1440c in thread_start 
> (libsystem_pthread.dylib:x86_64+0x240c)
> 66: 
> 66: 0x61300007d828 is located 168 bytes inside of 320-byte region 
> [0x61300007d780,0x61300007d8c0)
> 66: allocated by thread T4 here:
> 66:     #0 0x106f823a7 in wrap_posix_memalign 
> (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x5f3a7)
> 66:     #1 0x1064555df in qd_alloc alloc_pool.c:396
> 66:     #2 0x10649691a in qd_container_handle_event container.c:75
> 66:     #3 0x1066f4366 in handle server.c:1108
> 66:     #4 0x1066eda23 in thread_run server.c:1133
> 66:     #5 0x7fff5fa152ea in _pthread_body 
> (libsystem_pthread.dylib:x86_64+0x32ea)
> 66:     #6 0x7fff5fa18248 in _pthread_start 
> (libsystem_pthread.dylib:x86_64+0x6248)
> 66:     #7 0x7fff5fa1440c in thread_start 
> (libsystem_pthread.dylib:x86_64+0x240c)
> 66: 
> 66: Thread T4 created by T0 here:
> 66:     #0 0x106f79add in wrap_pthread_create 
> (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x56add)
> 66:     #1 0x106535a6d in sys_thread threading.c:181
> 66:     #2 0x1066ed1af in qd_server_run server.c:1525
> 66:     #3 0x1063b081e in main_process main.c:115
> 66:     #4 0x1063af12b in main main.c:369
> 66:     #5 0x7fff5f8213d4 in start (libdyld.dylib:x86_64+0x163d4)
> 66: 
> 66: SUMMARY: AddressSanitizer: use-after-poison container.c:1029 in qd_link_pn
> 66: Shadow bytes around the buggy address:
> 66:   0x1c260000fab0: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
> 66:   0x1c260000fac0: 00 00 00 00 00 00 00 00 00 00 f7 f7 f7 f7 f7 f7
> 66:   0x1c260000fad0: f7 f7 f7 f7 f7 f7 f7 f7 f7 f7 f7 f7 00 00 00 00
> 66:   0x1c260000fae0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
> 66:   0x1c260000faf0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 66: =>0x1c260000fb00: 00 00 f7 f7 f7[f7]f7 f7 f7 f7 f7 f7 f7 f7 f7 f7
> 66:   0x1c260000fb10: f7 f7 f7 f7 00 00 00 00 fa fa fa fa fa fa fa fa
> 66:   0x1c260000fb20: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
> 66:   0x1c260000fb30: 00 00 00 00 00 00 00 00 00 00 f7 f7 f7 f7 f7 f7
> 66:   0x1c260000fb40: f7 f7 f7 f7 f7 f7 f7 f7 f7 f7 f7 f7 00 00 00 00
> 66:   0x1c260000fb50: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
> 66: Shadow byte legend (one shadow byte represents 8 application bytes):
> 66:   Addressable:           00
> 66:   Partially addressable: 01 02 03 04 05 06 07 
> 66:   Heap left redzone:       fa
> 66:   Freed heap region:       fd
> 66:   Stack left redzone:      f1
> 66:   Stack mid redzone:       f2
> 66:   Stack right redzone:     f3
> 66:   Stack after return:      f5
> 66:   Stack use after scope:   f8
> 66:   Global redzone:          f9
> 66:   Global init order:       f6
> 66:   Poisoned by user:        f7
> 66:   Container overflow:      fc
> 66:   Array cookie:            ac
> 66:   Intra object redzone:    bb
> 66:   ASan internal:           fe
> 66:   Left alloca redzone:     ca
> 66:   Right alloca redzone:    cb
> 66:   Shadow gap:              cc
> 66: ==21601==ABORTING
> {noformat}
> essentially the same stacktrace in the same job
> {noformat}
> 27: ERROR
> 27: test_90_block_link_route_EB1_INTB 
> (system_tests_policy_oversize_compound.MaxMessageSizeLinkRouteOversize) ... ok
> 27: 
> 27: ======================================================================
> 27: ERROR: tearDownClass 
> (system_tests_policy_oversize_compound.MaxMessageSizeBlockOversize)
> 27: ----------------------------------------------------------------------
> 27: Traceback (most recent call last):
> 27:   File "/Users/travis/build/apache/qpid-dispatch/tests/system_test.py", 
> line 836, in tearDownClass
> 27:     cls.tester.teardown()
> 27:   File "/Users/travis/build/apache/qpid-dispatch/tests/system_test.py", 
> line 779, in teardown
> 27:     raise RuntimeError("Errors during teardown: \n\n%s" % 
> "\n\n".join([str(e) for e in errors]))
> 27: RuntimeError: Errors during teardown: 
> 27: 
> 27: Process 20948 error: exit code -6, expected -1
> 27: qdrouterd -c EB1.conf -I /Users/travis/build/apache/qpid-dispatch/python
> 27: 
> /Users/travis/build/apache/qpid-dispatch/build/tests/system_test.dir/system_tests_policy_oversize_compound/MaxMessageSizeBlockOversize/setUpClass/EB1-4.cmd
> 27: >>>>
> 27: =================================================================
> 27: ==20948==ERROR: AddressSanitizer: use-after-poison on address 
> 0x61300006e328 at pc 0x00010e5d0469 bp 0x7ffee1727ca0 sp 0x7ffee1727c98
> 27: READ of size 8 at 0x61300006e328 thread T0
> 27:     #0 0x10e5d0468 in qd_link_pn container.c:1029
> 27:     #1 0x10e7fae37 in CORE_link_push router_node.c:1920
> 27:     #2 0x10e6a0df6 in qdr_connection_process connections.c:414
> 27:     #3 0x10e5bf6ce in writable_handler container.c:396
> 27:     #4 0x10e817b36 in thread_run server.c:1149
> 27:     #5 0x10e8171fa in qd_server_run server.c:1527
> 27:     #6 0x10e4da81e in main_process main.c:115
> 27:     #7 0x10e4d912b in main main.c:369
> 27:     #8 0x7fff5f8213d4 in start (libdyld.dylib:x86_64+0x163d4)
> 27: 
> 27: 0x61300006e328 is located 168 bytes inside of 320-byte region 
> [0x61300006e280,0x61300006e3c0)
> 27: allocated by thread T0 here:
> 27:     #0 0x10f0b63a7 in wrap_posix_memalign 
> (libclang_rt.asan_osx_dynamic.dylib:x86_64+0x5f3a7)
> 27:     #1 0x10e57f5df in qd_alloc alloc_pool.c:396
> 27:     #2 0x10e5c091a in qd_container_handle_event container.c:75
> 27:     #3 0x10e81e366 in handle server.c:1108
> 27:     #4 0x10e817a23 in thread_run server.c:1133
> 27:     #5 0x10e8171fa in qd_server_run server.c:1527
> 27:     #6 0x10e4da81e in main_process main.c:115
> 27:     #7 0x10e4d912b in main main.c:369
> 27:     #8 0x7fff5f8213d4 in start (libdyld.dylib:x86_64+0x163d4)
> 27: 
> 27: SUMMARY: AddressSanitizer: use-after-poison container.c:1029 in qd_link_pn
> 27: Shadow bytes around the buggy address:
> 27:   0x1c260000dc10: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
> 27:   0x1c260000dc20: 00 00 00 00 00 00 00 00 00 00 f7 f7 f7 f7 f7 f7
> 27:   0x1c260000dc30: f7 f7 f7 f7 f7 f7 f7 f7 f7 f7 f7 f7 00 00 00 00
> 27:   0x1c260000dc40: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
> 27:   0x1c260000dc50: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
> 27: =>0x1c260000dc60: 00 00 f7 f7 f7[f7]f7 f7 f7 f7 f7 f7 f7 f7 f7 f7
> 27:   0x1c260000dc70: f7 f7 f7 f7 00 00 00 00 fa fa fa fa fa fa fa fa
> 27:   0x1c260000dc80: fa fa fa fa fa fa fa fa 00 00 00 00 00 00 00 00
> 27:   0x1c260000dc90: 00 00 00 00 00 00 00 00 00 00 f7 f7 f7 f7 f7 f7
> 27:   0x1c260000dca0: f7 f7 f7 f7 f7 f7 f7 f7 f7 f7 f7 f7 00 00 00 00
> 27:   0x1c260000dcb0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa
> 27: Shadow byte legend (one shadow byte represents 8 application bytes):
> 27:   Addressable:           00
> 27:   Partially addressable: 01 02 03 04 05 06 07 
> 27:   Heap left redzone:       fa
> 27:   Freed heap region:       fd
> 27:   Stack left redzone:      f1
> 27:   Stack mid redzone:       f2
> 27:   Stack right redzone:     f3
> 27:   Stack after return:      f5
> 27:   Stack use after scope:   f8
> 27:   Global redzone:          f9
> 27:   Global init order:       f6
> 27:   Poisoned by user:        f7
> 27:   Container overflow:      fc
> 27:   Array cookie:            ac
> 27:   Intra object redzone:    bb
> 27:   ASan internal:           fe
> 27:   Left alloca redzone:     ca
> 27:   Right alloca redzone:    cb
> 27:   Shadow gap:              cc
> 27: ==20948==ABORTING
> {noformat}



--
This message was sent by Atlassian Jira
(v8.3.4#803005)

---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to