DPDK sanitizer seems cannot detect the overflow issue sometimes
halsey.pian at longsys.com
halsey.pian at longsys.com
Wed Jun 29 11:56:03 CEST 2022
Dear All,
I would try to detect the illegal memory access issues in my App based on DPDK, so I add some codes based on several overflow scenario to check if it is detected in DPDK standalone project.
It seems that DPDK santizer cannot find the overflow issue below,
I add some code into examples/helloworld/main.c as below,
char*p = (char*)rte_zmalloc(NULL, 9, 4096);
if(p != NULL)
{
p = p + 32;
*p = 'A‘ // should be overflow here
}
But there is no any sanitzer output after dpdk-helloworld exit.
BTW, DPDK sanitzer can detect the overflow below,
char*p = (char*)rte_zmalloc(NULL, 9, 4096);
if(p != NULL)
{
p[9] = 'A‘ // can be detected
}
Unfortunately, DPDK cannot detect the overflow when update the code to below,
p[32] = 'A' // cannot be detected
Version: DPDK 21.11.1
OS: Fedora 32
Build: meson setup -Dbuildtype=debug -Db_lundef=false -Db_sanitize=address -Dexamples=hellowowrld build
Is it a known issue? I am confused with this.
Could you provide some info? Thanks.
Best Regards
Halsey Pian
More information about the dev
mailing list