From nobody Fri Jan 07 11:39:03 2022 X-Original-To: freebsd-current@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id E6D391946EDE for ; Fri, 7 Jan 2022 11:39:18 +0000 (UTC) (envelope-from marklmi@yahoo.com) Received: from sonic301-21.consmr.mail.gq1.yahoo.com (sonic301-21.consmr.mail.gq1.yahoo.com [98.137.64.147]) (using TLSv1.2 with cipher ECDHE-RSA-AES128-GCM-SHA256 (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 4JVh853ptmz3myn for ; Fri, 7 Jan 2022 11:39:17 +0000 (UTC) (envelope-from marklmi@yahoo.com) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1641555550; bh=0vU/0VqsB67FDxYZA6iZDdnvJOE8c21LaXU76jXTHD4=; h=From:Subject:Date:To:References:From:Subject:Reply-To; b=TsIQXFnmmjtXwfobHkfP0YLGLw46x3yXvcAODbqpbOlyb4pO978nHVXVc1EQv3+X92Es9rxiUoIuiQH9Q6no8VLYmv0EKRJUkErAZQ5PBW8cNlm0Hi2cwdZeBy1pCYtz+01TxVlridtFUuD+gRIyRt52BWs/NsshpuZZ+fKfD0EoHSzF4W3Hb6yO0WEjp0VAk/QQkdETGG73ba5cwF65YllZjD36zaPGKUjN7KpYbiTLANkmO4ELNT1zUQCjV4ot7VlLT3LTYy5peVGV8RUMRHssv1eRUE/Y9YJ6tzVxWAsogv+ueJP5G8nal7GeXcSOUyXc1IssfywdOzrETitP8w== X-SONIC-DKIM-SIGN: v=1; a=rsa-sha256; c=relaxed/relaxed; d=yahoo.com; s=s2048; t=1641555550; bh=DH/QyuO6M/C4JaCGL93NR6/ulqbQuE64EuxB5Znw8VZ=; h=X-Sonic-MF:From:Subject:Date:To:From:Subject; b=NMDU/Sv/it1IE+BzxMsh6BIrnceFAUqxsYY9PvyepdqV7QfvyuyMqXlD6jxKfF23MsTm5rSri5xtdavf87CKVwE0A/T9qnmIglvrxzGQ1OKTZYEjd2/STZNFv18ZSfDVNVG6m6aZYED4YlMHXEjfjEjfLNXwJInHrMWOhnAOVkzGYmyC9fOvZlXQ9T5IJ6yeDrxbW5wYUK547Zlwq87E/212Wcd1Y7JzKqYPv2Um/x6ul8zl67qLOA7fCO0Z7MjPj76whXoSu0jwa77k4BzMmkAdE8ceh4+cpEan5zCA5ZtiB9XEEJj4E7AJsSRREXdi3+ch/CQkiw2vB9a8ixwZmQ== X-YMail-OSG: JgcNIB8VM1k5XPqu_86AtCCEUSius6xtF4zvrwzEHSrW.XwGtHpryxfARCykpaF AU._FMa.Z0_m_956KWujpM._xhqB7.c4T1GEVbvHLn4J3J7ETVvxXNQhEc1Zgz0u64fEbZYkKxp4 3vJ1vq5L9LjbKyI6qkMQNgZ5ITKi3GJZm7ghAyXV0MScd5nkJMJZ0_vxxlfRq1I3sg3yYqcQWugC b2wYJa5QYAhCErmqj4FWi2fru64eH3pIooIW6MACQ8YBg4Vuv_.iX0gDokH.aDm8wzzvLB7hjiDW yAJE.Ka3PloEJ3AXszGIMbHs1_va5DqFoTE1Dl37B4sZj24Ea6o79tAmC9gf4PDg.PTJhGawy6zI UJM3SoUN.eIYSO9X3FuD7alrd0EEQsd4OgspYCoH5j2Aa.MsaplRU3ttR.Undu6N82PgRg8Htcjt z2CZgnur8HzLDMHHZ3tm48usmxJX7HG4xabm3AxxOxLDDOZX2hyjqmSKzRjQpFYDm5OgcmWtS9Cp d73ZWVD40jAvqKpOBQ3bX1WforHfgnPLTVuMWbWYHSazYVtB71cITf4un_fU.q7dB2JNtLB2itvR FGf2gJnNFZLk3VuF2_utyoaJym1KhPlEYPIvxVtjNye7kFLfABjl77Pr7AJAy8FJOi2bPRlzrr5K XA3jx4qiHGUGLV5PG.eQGARyt2aXLjclKzAWG8qmQdCNNQblLiPjIHdLAvPEohFjd3ekYOr6sWxe NeJCxOYd9sNBqtxJnPRGN5I12tWG2xRRlAAsIFGIAp9HiyEpjrvCLSiBOfoep4fym.HNV4nHB4Fl _tdDuUbQhsj3VxbESnb79tCGIROLU0wRRpLlNLsC7DxfTDpIkO0xMSzye234Wwq88qrJtkGWpm2W LwletwrqVAXaFBi.oX4dM859LGbYtrG5EhOh.FJP8TX0nwV17Y3Oo8.wTEuMX3cHRVSP0Zx9zCmV gdWa0iJMbfHquws36CTzYYQl6ttHoTpQWwsoeAsL6W.AoW.x8bYQTpmwBmjdMcARM7shUGSt6_Pp 27ll_NdKyo2Hpn2Eu4so8MSQnCvMlo.FUXGAwqxudLYU6VT3bBBEJpxm1r.BmcvCk3Ppuelznsf6 ybszKAjsSyDPEHtxRarrvMb3Q8Z_aPZiJyGHPpSfARR.TPNy6DRYWzwMGI.wDPNri1E.UQrj59bO 1v97Oqw0U7_MzKhY4ZKlbIpBYEo7GtEJ9aE8YkEbKQfEb1E5Wl6L_b4F7xiGZWKgyuFqZpSmJRk9 fZRf8gJ_mKhMwFGsymSjZgPY.lqTvxVqTSxpEhBQZM.yBOs2DAsDjej4pCO6uxGeU5sHYV2JBiPP pJXJ48xKN9RKM4UMk5majQCjgG3FbFAgd_RKZ_i0cEm8Cxt4TI6iFCP8Mz6nrCUZ2dyaZYmYyVRw T8KrKxif42TiLTOFlMCr0jhTH9.FG_20W0MRZGp5fmuxbnurZ3CHnj3Qi7FkqIYnMHSCt29ORwhR y938lGdSEDaPCeIqwINEEzB2n0WgetX68nLGkKZAUCoi7HP0FNlyr0C1D00ianErvtWjgrznZjk6 7Xj2avqzgQqnDB1G6nzZuHxR3pCEwchpp24GBlbaI4wjsuP0sNfwwtj0dfUvecGKcLLXMMVSrMWb QB15ZRV.tl8NJmUDL3Dfyk_GLgJ5e0d.7u0hYwmmq.G.1zdcQ_ht5_gDTYkeHvhw41RKDJ8RizUC bPUq7_0MSynYR3EvsUpsByoosj2A0FGFCUg3mw3tMNATIxnuP8nvErfrvOrxSL7LMgBMxkp3m2cy N1yzBP2OLnyHt4yx31FURXlnlAQP0BqL0GJ_.ky7Y4VAo5ASL3j0j6Jh0OKyCGQVM8687so2qBeX YyxSLzQL1mdlpZKy2Bqodf_laEh_Zrx9lY6jcCTnJ1wt2A9q3OF8JeO1sDvEWKDwobVtzmEl2aFa SSfULaMKZ62NFRlKjO._5NQFZZJ32Hu2DRKpMmUmYjdLnjb8R1tMSQZmzO_U6fM66E82gxv6mR3o bDOzONDMiZbHvKaNW7MIGiP3w_64.nCLA1RCsz389zPEWv8CXOiZJG67NP3BPD0BHcIeSCUSvWCr O4bFyAoDM7DnQwH7XBNP7ynjekJOf_5YrqJsvleMhGEWCgWzny9VCNXE2VnSSVItMceaqPURo_Dx eChZR8qLvcYFbDxIp0GdJKFs.3YiF_cQoVhQyWlSNidrzPWxw3zaIke87mg.ijgEzgN1Wb0s3SZi Lp7lv7sl60rL232N3 X-Sonic-MF: Received: from sonic.gate.mail.ne1.yahoo.com by sonic301.consmr.mail.gq1.yahoo.com with HTTP; Fri, 7 Jan 2022 11:39:10 +0000 Received: by kubenode507.mail-prod1.omega.ne1.yahoo.com (VZM Hermes SMTP Server) with ESMTPA ID c3b197f4b72370d170cad1113b1aecea; Fri, 07 Jan 2022 11:39:05 +0000 (UTC) From: Mark Millard Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: quoted-printable List-Id: Discussions about the use of FreeBSD-current List-Archive: https://lists.freebsd.org/archives/freebsd-current List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-current@freebsd.org Mime-Version: 1.0 (Mac OS X Mail 14.0 \(3654.120.0.1.13\)) Subject: FYI: An example ASAN failure report during kyua test -k /usr/tests/Kyuafile Message-Id: Date: Fri, 7 Jan 2022 03:39:03 -0800 To: freebsd-current X-Mailer: Apple Mail (2.3654.120.0.1.13) References: X-Rspamd-Queue-Id: 4JVh853ptmz3myn X-Spamd-Bar: / Authentication-Results: mx1.freebsd.org; dkim=pass header.d=yahoo.com header.s=s2048 header.b=TsIQXFnm; dmarc=pass (policy=reject) header.from=yahoo.com; spf=pass (mx1.freebsd.org: domain of marklmi@yahoo.com designates 98.137.64.147 as permitted sender) smtp.mailfrom=marklmi@yahoo.com X-Spamd-Result: default: False [-0.84 / 15.00]; RCVD_TLS_LAST(0.00)[]; ARC_NA(0.00)[]; R_DKIM_ALLOW(-0.20)[yahoo.com:s=s2048]; RWL_MAILSPIKE_POSSIBLE(0.00)[98.137.64.147:from]; FROM_HAS_DN(0.00)[]; FREEMAIL_FROM(0.00)[yahoo.com]; MV_CASE(0.50)[]; MIME_GOOD(-0.10)[text/plain]; TO_MATCH_ENVRCPT_ALL(0.00)[]; NEURAL_HAM_MEDIUM(-0.77)[-0.774]; RCPT_COUNT_ONE(0.00)[1]; TO_DN_ALL(0.00)[]; DKIM_TRACE(0.00)[yahoo.com:+]; DMARC_POLICY_ALLOW(-0.50)[yahoo.com,reject]; RCVD_IN_DNSWL_NONE(0.00)[98.137.64.147:from]; NEURAL_HAM_SHORT(-0.57)[-0.566]; R_SPF_ALLOW(-0.20)[+ptr:yahoo.com]; NEURAL_SPAM_LONG(1.00)[0.999]; FROM_EQ_ENVFROM(0.00)[]; MIME_TRACE(0.00)[0:+]; FREEMAIL_ENVFROM(0.00)[yahoo.com]; ASN(0.00)[asn:36647, ipnet:98.137.64.0/20, country:US]; RCVD_COUNT_TWO(0.00)[2]; MID_RHS_MATCH_FROM(0.00)[]; DWL_DNSWL_NONE(0.00)[yahoo.com:dkim] X-ThisMailContainsUnwantedMimeParts: N Having done a buildworld with both WITH_ASAN=3D and WITH_UBSAN=3D after finding what to control to allow the build, I installed it in a directory tree for chroot use and have "kyua test -k /usr/tests/Kyuafile" running. I see evidence of one AddressSanitizer report. (kyua is still running.) The context is: # more = /usr/obj/DESTDIRs/main-amd64-xSAN-chroot/tmp/kyua.FKD2vh/434/stdout.txt=20= Executing command [ mkdir /tmp/kyua.FKD2vh/434/work/mntpt ] mount -t tmpfs -o size=3D10M tmpfs /tmp/kyua.FKD2vh/434/work/mntpt Executing command [ touch a ] Executing command [ rm a ] Executing command [ dd if=3D/dev/zero of=3Da bs=3D1m count=3D15 ] Executing command [ rm a ] # more = /usr/obj/DESTDIRs/main-amd64-xSAN-chroot/tmp/kyua.FKD2vh/434/stderr.txt=20= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D= =3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D=3D =3D=3D14384=3D=3DERROR: AddressSanitizer: stack-buffer-overflow on = address 0x7fffffffa948 at pc 0x000801f38f5a bp 0x7fffffffa830 sp = 0x7fffffffa828 WRITE of size 8 at 0x7fffffffa948 thread T0 #0 0x801f38f59 in strtoimax_l = /usr/main-src/lib/libc/stdlib/strtoimax.c:148:11 #1 0x10de6c8 in strtoimax = /usr/main-src/contrib/llvm-project/compiler-rt/lib/sanitizer_common/saniti= zer_common_interceptors.inc:3441:18 #2 0x11a4723 in getq /usr/main-src/bin/test/test.c:560:6 #3 0x11a4523 in intcmp /usr/main-src/bin/test/test.c:584:7 #4 0x11a4523 in binop /usr/main-src/bin/test/test.c:351:10 #5 0x11a2f06 in primary /usr/main-src/bin/test/test.c:317:10 #6 0x11a2f06 in nexpr /usr/main-src/bin/test/test.c:275:9 #7 0x11a28cb in aexpr /usr/main-src/bin/test/test.c:261:8 #8 0x11a2a03 in aexpr /usr/main-src/bin/test/test.c:263:10 #9 0x11a228b in oexpr /usr/main-src/bin/test/test.c:247:8 #10 0x11a1fcf in testcmd /usr/main-src/bin/test/test.c:224:10 #11 0x1145289 in evalcommand /usr/main-src/bin/sh/eval.c:1107:16 #12 0x113eeb7 in evaltree /usr/main-src/bin/sh/eval.c:289:4 #13 0x113fb34 in evaltree /usr/main-src/bin/sh/eval.c:225:4 #14 0x113f86b in evaltree /usr/main-src/bin/sh/eval.c:212:4 #15 0x1144d89 in evalcommand /usr/main-src/bin/sh/eval.c:1053:3 #16 0x113eeb7 in evaltree /usr/main-src/bin/sh/eval.c:289:4 #17 0x113fc55 in evaltree /usr/main-src/bin/sh/eval.c:241:4 #18 0x1144d89 in evalcommand /usr/main-src/bin/sh/eval.c:1053:3 #19 0x113eeb7 in evaltree /usr/main-src/bin/sh/eval.c:289:4 #20 0x1144d89 in evalcommand /usr/main-src/bin/sh/eval.c:1053:3 #21 0x113eeb7 in evaltree /usr/main-src/bin/sh/eval.c:289:4 #22 0x113eb88 in evalstring /usr/main-src/bin/sh/eval.c #23 0x1179727 in main /usr/main-src/bin/sh/main.c:171:3 Address 0x7fffffffa948 is located in stack of thread T0 at offset 264 in = frame #0 0x801f387ff in strtoimax_l = /usr/main-src/lib/libc/stdlib/strtoimax.c:58 This frame has 1 object(s): [32, 36) '__limit.i.i.i' <=3D=3D Memory access at offset 264 = overflows this variable HINT: this may be a false positive if your program uses some custom = stack unwind mechanism, swapcontext or vfork (longjmp and C++ exceptions *are* supported) SUMMARY: AddressSanitizer: stack-buffer-overflow = /usr/main-src/lib/libc/stdlib/strtoimax.c:148:11 in strtoimax_l Shadow bytes around the buggy address: 0x4ffffffff4d0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x4ffffffff4e0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x4ffffffff4f0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x4ffffffff500: f1 f1 f1 f1 00 00 00 00 f1 f1 f1 f1 f8 f3 f3 f3 0x4ffffffff510: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =3D>0x4ffffffff520: 00 00 00 00 f3 f3 f3 f3 f3[f3]f3 f3 00 00 00 00 0x4ffffffff530: f1 f1 f1 f1 00 f3 f3 f3 00 00 00 00 00 00 00 00 0x4ffffffff540: f1 f1 f1 f1 00 f2 f2 f2 00 f3 f3 f3 00 00 00 00 0x4ffffffff550: f1 f1 f1 f1 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 0x4ffffffff560: f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 f8 0x4ffffffff570: f2 f2 f2 f2 f2 f2 f2 f2 f8 f8 f8 f8 f8 f8 f8 f8 Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07=20 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb =3D=3D14384=3D=3DABORTING Files left in work directory after failure: mntpt, mounterr =3D=3D=3D Mark Millard marklmi at yahoo.com