Statistics about stderr of test 'dump` in directory 'sql/test/emptydb-upgrade-chain-hge`: 77 lines, 512 words, 6219 chars in lines not matching '^$|^(\| |)#|^=` = 81 lines, 542 words, 6501 chars in lines not matching '^$|^(\| |)#` # 98 lines, 577 words, 6942 chars in all lines stderr of test 'dump` in directory 'sql/test/emptydb-upgrade-chain-hge` itself: # 09:17:18 > # 09:17:18 > "mserver5" "--debug=0" "--set" "gdk_nr_threads=0" "--set" "mapi_open=true" "--set" "mapi_port=31964" "--set" "mapi_usock=/var/tmp/mtest-22310/.s.monetdb.31964" "--forcemito" "--set" "gdk_vm_maxsize=8589934592" "--dbpath=/export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/tests/sql/dbfarm/mTests_sql_test_emptydb-upgrade-chain-hge" "--set" "embedded_c=true" # 09:17:18 > ================================================================= ==8051==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x62d0001c0e88 at pc 0x7fc89d72b08e bp 0x7fc876219ec0 sp 0x7fc876219eb0 READ of size 8 at 0x62d0001c0e88 thread T19 #0 0x7fc89d72b08d in binsearchcand /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_cand.c:316 #1 0x7fc89d72e41 in canditer_idx /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_cand.c:652 #2 0x7fc89d9b1749 in BATprojectchain /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_project.c:712 #3 0x7fc89dfed7a0 in ALGprojectionpath /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/modules/mal/projectionpath.c:39 #4 0x7fc89de6cec3 in runMALsequence /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_interpreter.c:650 #5 0x7fc89de747d9 in DFLOWworker /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_dataflow.c:399 #6 0x7fc89d7a46f1 in THRstarter /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_utils.c:1382 #7 0x7fc89d8ad22c in thread_starter /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_system.c:641 #8 0x7fc89aa7336c in start_thread (/lib64/libpthread.so.0+0x736c) #9 0x7fc89a7a7b4e in __clone (/lib64/libc.so.6+0x110b4e) 0x62d0001c0e88 is located 0 bytes to the right of 35464-byte region [0x62d0001b8400,0x62d0001c0e88) allocated by thread T19 here: #0 0x7fc89e513850 in malloc (/lib64/libasan.so.4+0xde850) #1 0x7fc89d7a5eb4 in GDKmalloc_internal /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_utils.c:1660 #2 0x7fc89d7a5f7a in GDKmalloc /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_utils.c:1687 #3 0x7fc89d797cac in HEAPalloc /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_heap.c:117 #4 0x7fc89d72fcfb in BATnegcands /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_cand.c:891 #5 0x7fc8922447b6 in SQLtid /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/sql/backends/monet5/sql.c:2201 #6 0x7fc89de6cec3 in runMALsequence /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_interpreter.c:650 #7 0x7fc89de747d9 in DFLOWworker /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_dataflow.c:399 #8 0x7fc89d7a46f1 in THRstarter /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_utils.c:1382 #9 0x7fc89d8ad22c in thread_starter /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_system.c:641 #10 0x7fc89aa7336c in start_thread (/lib64/libpthread.so.0+0x736c) Thread T19 created by T0 here: #0 0x7fc89e46ca2f in pthread_create (/lib64/libasan.so.4+0x37a2f) #1 0x7fc89d8ae242 in MT_create_thread /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_system.c:759 #2 0x7fc89d7a4c97 in THRcreate /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_utils.c:1420 #3 0x7fc89de7a023 in runMALdataflow /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_dataflow.c:888 #4 0x7fc89dfee8a5 in MALstartDataflow /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/modules/mal/language.c:151 #5 0x7fc89de6cec3 in runMALsequence /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_interpreter.c:650 #6 0x7fc89de6a5ee in runMAL /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_interpreter.c:335 #7 0x7fc892289bb8 in SQLrun /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/sql/backends/monet5/sql_execute.c:385 #8 0x7fc89228b8f5 in SQLstatementIntern /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/sql/backends/monet5/sql_execute.c:655 #9 0x7fc89229c924 in SQLupgrades /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/sql/backends/monet5/sql_upgrades.c:2133 #10 0x7fc89227fe94 in SQLinit /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/sql/backends/monet5/sql_scenario.c:552 #11 0x7fc89227d8bf in SQLprelude /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/sql/backends/monet5/sql_scenario.c:144 #12 0x7fc89de6cec3 in runMALsequence /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_interpreter.c:650 #13 0x7fc89de6a5ee in runMAL /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_interpreter.c:335 #14 0x7fc89deb676b in MALengine /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_session.c:720 #15 0x7fc89deb1e58 in malBootstrap /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal_session.c:68 #16 0x7fc89de33bec in mal_init /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/monetdb5/mal/mal.c:71 #17 0x405764 in main /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/tools/mserver/mserver5.c:688 #18 0x7fc89a6b7889 in __libc_start_main (/lib64/libc.so.6+0x20889) SUMMARY: AddressSanitizer: heap-buffer-overflow /export/scratch1/home/monet/testing/6b3b1396de21-4-1-3/MonetDB/gdk/gdk_cand.c:316 in binsearchcand Shadow bytes around the buggy address: 0x0c5a80030180: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c5a80030190: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c5a800301a0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c5a800301b0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 0x0c5a800301c0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 =>0x0c5a800301d0: 00[fa]fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c5a800301e0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c5a800301f0: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c5a80030200: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c5a80030210: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa 0x0c5a80030220: fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa fa Shadow byte legend (one shadow byte represents 8 application bytes): Addressable: 00 Partially addressable: 01 02 03 04 05 06 07 Heap left redzone: fa Freed heap region: fd Stack left redzone: f1 Stack mid redzone: f2 Stack right redzone: f3 Stack after return: f5 Stack use after scope: f8 Global redzone: f9 Global init order: f6 Poisoned by user: f7 Container overflow: fc Array cookie: ac Intra object redzone: bb ASan internal: fe Left alloca redzone: ca Right alloca redzone: cb ==8051==ABORTING ! Server not ready; skipping attempt to start client! # 09:17:18 > # 09:17:18 > "Done." # 09:17:18 >