Test dump.sql (id 6b3b1396de21) (out)
dump.stable.err.int128.FILTERED 2019-09-20 09:17:18.736104442 +0200dump.test.err.FILTERED 2019-09-20 09:17:18.739104414 +0200
1 Statistics about stderr of test 'dump` in directory 'sql/test/emptydb-upgrade-chain-hge`: 1 1 Statistics about stderr of test 'dump` in directory 'sql/test/emptydb-upgrade-chain-hge`: 1
2 1 lines, 8 words, 79 chars in lines not matching '^$|^(\| |)#|^=` 2 ! 2 77 lines, 512 words, 6219 chars in lines not matching '^$|^(\| |)#|^=` 2
3 = 1 lines, 8 words, 79 chars in lines not matching '^$|^(\| |)#` 3 ! 3 = 81 lines, 542 words, 6501 chars in lines not matching '^$|^(\| |)#` 3
4 # 17 lines, 59 words, 597 chars in all lines 4 ! 4 # 98 lines, 577 words, 6942 chars in all lines 4
5 5 5 5
..................
# 17 lines, 59 words,
8 8 8 8
9 # 16:42:40 > 9 ! 9 # 09:17:18 > 9
10 # 16:42:40 > "mserver5" "--debug=10" "--set" "gdk_nr_threads=0" "--set" "mapi_open=true" "--set" "mapi_port=31377" "--set" "mapi_usock=/var/tmp/mtest-18658/.s.monetdb.31377" "--set" "monet_prompt=" "--forcemito" "--set" "mal_listing=2" "--dbpath=/ufs/sjoerd/Monet-stable/var/MonetDB/mTests_sql_test_emptydb-upgrade-chain-hge" "--set" "mal_listing=0" "--set" "embedded_r=yes" 10 ! 10 # 09:17:18 > "mserver5" "--debug=0" "--set" "gdk_nr_threads=0" "--set" "mapi_open=true" "--set" "mapi_port=31964" "--set" "mapi_usock=/var/tmp/mtest-22310/.s.monetdb.31964" "--forcemito" "--set" "gdk_vm_maxsize=8589934592" "--dbpath=/export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/tests/sql/dbfarm/mTests_sql_test_emptydb-upgrade-chain-hge" "--set" "embedded_c=true" 10
11 # 16:42:40 > 11 ! 11 # 09:17:18 > 11
12 12 ! 12 12
13 13 ! 13 ================================================================= 13
14 # 16:42:40 > 14 ! 14 ==8051==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62d0001c0e88 at pc 0x7fc89d72b08e bp 0x7fc876219ec0 sp 0x7fc876219eb0 14
15 # 16:42:40 > "/usr/bin/python2" "dump.SQL.py" "dump" 15 ! 15 READ of size 8 at 0x62d0001c0e88 thread T19 15
16 # 16:42:40 > 16 ! 16 #0 0x7fc89d72b08d in binsearchcand /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_cand.c:316 16
17 17 ! 17 #1 0x7fc89d72e41 in canditer_idx /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_cand.c:652 17
18 18 ! 18 #2 0x7fc89d9b1749 in BATprojectchain /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_project.c:712 18
19 # 16:42:41 > 19 ! 19 #3 0x7fc89dfed7a0 in ALGprojectionpath /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/modules/mal/projectionpath.c:39 19
20 # 16:42:41 > "Done." 20 ! 20 #4 0x7fc89de6cec3 in runMALsequence /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_interpreter.c:650 20
21 # 16:42:41 > 21 ! 21 #5 0x7fc89de747d9 in DFLOWworker /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_dataflow.c:399 21
+ 22 #6 0x7fc89d7a46f1 in THRstarter /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_utils.c:1382 22
+ 23 #7 0x7fc89d8ad22c in thread_starter /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_system.c:641 23
+ 24 #8 0x7fc89aa7336c in start_thread (/lib64/libpthread.so.0+0x736c) 24
+ 25 #9 0x7fc89a7a7b4e in __clone (/lib64/libc.so.6+0x110b4e) 25
+ 26 26
+ 27 0x62d0001c0e88 is located 0 bytes to the right of 35464-byte region [0x62d0001b8400,0x62d0001c0e88) 27
+ 28 allocated by thread T19 here: 28
+ 29 #0 0x7fc89e513850 in malloc (/lib64/libasan.so.4+0xde850) 29
+ 30 #1 0x7fc89d7a5eb4 in GDKmalloc_internal /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_utils.c:1660 30
+ 31 #2 0x7fc89d7a5f7a in GDKmalloc /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_utils.c:1687 31
+ 32 #3 0x7fc89d797cac in HEAPalloc /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_heap.c:117 32
+ 33 #4 0x7fc89d72fcfb in BATnegcands /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_cand.c:891 33
+ 34 #5 0x7fc8922447b6 in SQLtid /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/sql/backends/monet5/sql.c:2201 34
+ 35 #6 0x7fc89de6cec3 in runMALsequence /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_interpreter.c:650 35
+ 36 #7 0x7fc89de747d9 in DFLOWworker /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_dataflow.c:399 36
+ 37 #8 0x7fc89d7a46f1 in THRstarter /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_utils.c:1382 37
+ 38 #9 0x7fc89d8ad22c in thread_starter /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_system.c:641 38
+ 39 #10 0x7fc89aa7336c in start_thread (/lib64/libpthread.so.0+0x736c) 39
+ 40 40
+ 41 Thread T19 created by T0 here: 41
+ 42 #0 0x7fc89e46ca2f in pthread_create (/lib64/libasan.so.4+0x37a2f) 42
+ 43 #1 0x7fc89d8ae242 in MT_create_thread /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_system.c:759 43
+ 44 #2 0x7fc89d7a4c97 in THRcreate /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_utils.c:1420 44
+ 45 #3 0x7fc89de7a023 in runMALdataflow /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_dataflow.c:888 45
+ 46 #4 0x7fc89dfee8a5 in MALstartDataflow /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/modules/mal/language.c:151 46
+ 47 #5 0x7fc89de6cec3 in runMALsequence /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_interpreter.c:650 47
+ 48 #6 0x7fc89de6a5ee in runMAL /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_interpreter.c:335 48
+ 49 #7 0x7fc892289bb8 in SQLrun /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/sql/backends/monet5/sql_execute.c:385 49
+ 50 #8 0x7fc89228b8f5 in SQLstatementIntern /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/sql/backends/monet5/sql_execute.c:655 50
+ 51 #9 0x7fc89229c924 in SQLupgrades /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/sql/backends/monet5/sql_upgrades.c:2133 51
+ 52 #10 0x7fc89227fe94 in SQLinit /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/sql/backends/monet5/sql_scenario.c:552 52
+ 53 #11 0x7fc89227d8bf in SQLprelude /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/sql/backends/monet5/sql_scenario.c:144 53
+ 54 #12 0x7fc89de6cec3 in runMALsequence /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_interpreter.c:650 54
+ 55 #13 0x7fc89de6a5ee in runMAL /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_interpreter.c:335 55
+ 56 #14 0x7fc89deb676b in MALengine /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_session.c:720 56
+ 57 #15 0x7fc89deb1e58 in malBootstrap /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_session.c:68 57
+ 58 #16 0x7fc89de33bec in mal_init /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal.c:71 58
+ 59 #17 0x405764 in main /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/tools/mserver/mserver5.c:688 59
+ 60 #18 0x7fc89a6b7889 in __libc_start_main (/lib64/libc.so.6+0x20889) 60
+ 61 61
+ 62 SUMMARY: AddressSanitizer: heap-buffer-overflow /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_cand.c:316 in binsearchcand 62
+ 63 Shadow bytes around the buggy address: 63
+ 64 0x0c5a80030180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 64
+ 65 0x0c5a80030190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 65
+ 66 0x0c5a800301a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 66
+ 67 0x0c5a800301b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 67
+ 68 0x0c5a800301c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 68
+ 69 =>0x0c5a800301d0: 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa 69
+ 70 0x0c5a800301e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 70
+ 71 0x0c5a800301f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 71
+ 72 0x0c5a80030200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 72
+ 73 0x0c5a80030210: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 73
+ 74 0x0c5a80030220: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 74
+ 75 Shadow byte legend (one shadow byte represents 8 application bytes): 75
+ 76 Addressable: 00 76
+ 77 Partially addressable: 01 02 03 04 05 06 07 77
+ 78 Heap left redzone: fa 78
+ 79 Freed heap region: fd 79
+ 80 Stack left redzone: f1 80
+ 81 Stack mid redzone: f2 81
+ 82 Stack right redzone: f3 82
+ 83 Stack after return: f5 83
+ 84 Stack use after scope: f8 84
+ 85 Global redzone: f9 85
+ 86 Global init order: f6 86
+ 87 Poisoned by user: f7 87
+ 88 Container overflow: fc 88
+ 89 Array cookie: ac 89
+ 90 Intra object redzone: bb 90
+ 91 ASan internal: fe 91
+ 92 Left alloca redzone: ca 92
+ 93 Right alloca redzone: cb 93
+ 94 ==8051==ABORTING 94
+ 95 95
+ 96 96
+ 97 ! Server not ready; skipping attempt to start client! 97
+ 98 98
+ 99 99
+ 100 # 09:17:18 > 100
+ 101 # 09:17:18 > "Done." 101
+ 102 # 09:17:18 > 102
22 22 103 103