[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: debugging gsasl autopkg test error on armhf



Hello,

That is the same issue we had in Ubuntu, and is caused by the recent addition of the -fstack-clash-protection compiler flag.

There is an earlier thread discussing exactly this on debian-arm.

Mate Kukri

On 12/3/23 17:20, Andreas Metzler wrote:
Hello,

gnutls28 is currently blocked from testing because gsasl's autopkg test
fails. I have played around on abel:

Taking a trixie chroot and pulling in newer gnutls via LD_LIBRARY_PATH
makes most of the testsuite fail, including this trivial test:

8X------------------------------
LD_LIBRARY_PATH=~/BU/gnutls28-3.8.2/debian/tmp/usr/lib/arm-linux-gnueabihf  valgrind --error-exitcode=1 /usr/bin/gsasl --mkpasswd --password password --mechanism SCRAM-SHA-1 ; echo $?
==16979==
==16979== Invalid write of size 4
==16979==    at 0x48B9A5A: lib_init (global.c:499)
==16979==    by 0x400354B: call_init (dl-init.c:90)
==16979==    by 0x400354B: call_init (dl-init.c:27)
==16979==    by 0x40035F9: _dl_init (dl-init.c:137)
==16979==    by 0x400F3DF: ??? (in /usr/lib/arm-linux-gnueabihf/ld-linux-armhf.so.3)
==16979==  Address 0xbde0f468 is on thread 1's stack
==16979==  16 bytes below stack pointer
==16979==
==16979== Invalid write of size 4
==16979==    at 0x48B9A5A: lib_init (global.c:499)
==16979==    by 0x400354B: call_init (dl-init.c:90)
==16979==    by 0x400354B: call_init (dl-init.c:27)
==16979==    by 0x40035F9: _dl_init (dl-init.c:137)
==16979==    by 0x400F3DF: ??? (in
/usr/lib/arm-linux-gnueabihf/ld-linux-armhf.so.3)
==16979==  Address 0xbde0f468 is on thread 1's stack
==16979==  16 bytes below stack pointer
==16979==
==16979== Invalid write of size 4
==16979==    at 0x48B9A5A: lib_init (global.c:499)
==16979==    by 0x400354B: call_init (dl-init.c:90)
==16979==    by 0x400354B: call_init (dl-init.c:27)
==16979==    by 0x40035F9: _dl_init (dl-init.c:137)
==16979==    by 0x400F3DF: ??? (in
/usr/lib/arm-linux-gnueabihf/ld-linux-armhf.so.3)
==16979==  Address 0xbde0f468 is on thread 1's stack
==16979==  16 bytes below stack pointer
[...]
(Full log attached)
8X------------------------------

OTOH the test succeeds on sid.[1] I have checked the differences trixie/sid
and tried pulling in the other newer libraries into the trixie chroot in
vain. The only thing I could not test was valgrind, sid has 1:3.20.0-2,
trixie 1:3.19.0-1. So I *suspect* valgrind/trixie to be slightly broken.
Could this be true? Any better ideas?

TIA, cu Andreas


[1]
==17768== Memcheck, a memory error detector
==17768== Copyright (C) 2002-2022, and GNU GPL'd, by Julian Seward et al.
==17768== Using Valgrind-3.20.0 and LibVEX; rerun with -h for copyright info
==17768== Command: /usr/bin/gsasl --mkpasswd --password password --mechanism SCRAM-SHA-1
==17768==
{SCRAM-SHA-1}65536,GiFRM7gH+lxu1r64,cGXqaDs3AxdxGl/Ia36IpYwHFrA=,pYycqZHy09aKZ9UK3hEIaT9XSls=
==17768==
==17768== HEAP SUMMARY:
==17768==     in use at exit: 42 bytes in 4 blocks
==17768==   total heap usage: 1,326 allocs, 1,322 frees, 99,720 bytes allocated
==17768==
==17768== LEAK SUMMARY:
==17768==    definitely lost: 0 bytes in 0 blocks
==17768==    indirectly lost: 0 bytes in 0 blocks
==17768==      possibly lost: 0 bytes in 0 blocks
==17768==    still reachable: 42 bytes in 4 blocks
==17768==         suppressed: 0 bytes in 0 blocks
==17768== Rerun with --leak-check=full to see details of leaked memory
==17768==
==17768== For lists of detected and suppressed errors, rerun with: -s
==17768== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 2733 from 34)
0
-—-----------


Reply to: