Project

General

Profile

Actions

Bug #2230

closed

valgrind memcheck - 4.0.0-dev (rev 1180687)

Added by Peter Manev about 7 years ago. Updated almost 7 years ago.

Status:
Closed
Priority:
Normal
Assignee:
Target version:
Affected Versions:
Effort:
Difficulty:
Label:

Description

==8084== Syscall param ioctl(SIOCETHTOOL) points to uninitialised byte(s)
==8084==    at 0x7C28F07: ioctl (syscall-template.S:84)
==8084==    by 0x5AE96E: GetEthtoolValue (util-ioctl.c:286)
==8084==    by 0x5AF3B4: DisableIfaceOffloadingLinux (util-ioctl.c:434)
==8084==    by 0x558BE6: ParseAFPConfig (runmode-af-packet.c:468)
==8084==    by 0x5E9BC1: RunModeSetLiveCaptureWorkers (util-runmodes.c:373)
==8084==    by 0x55B329: RunModeIdsAFPWorkers (runmode-af-packet.c:693)
==8084==    by 0x563D97: RunModeDispatch (runmodes.c:384)
==8084==    by 0x413512: main (suricata.c:2909)
==8084==  Address 0xffeffcd85 is on thread 1's stack
==8084==  in frame #1, created by GetEthtoolValue (util-ioctl.c:273)
==8084== 
==8084== Syscall param ioctl(SIOCETHTOOL) points to uninitialised byte(s)
==8084==    at 0x7C28F07: ioctl (syscall-template.S:84)
==8084==    by 0x5AE96E: GetEthtoolValue (util-ioctl.c:286)
==8084==    by 0x5AF46C: DisableIfaceOffloadingLinux (util-ioctl.c:441)
==8084==    by 0x558BE6: ParseAFPConfig (runmode-af-packet.c:468)
==8084==    by 0x5E9BC1: RunModeSetLiveCaptureWorkers (util-runmodes.c:373)
==8084==    by 0x55B329: RunModeIdsAFPWorkers (runmode-af-packet.c:693)
==8084==    by 0x563D97: RunModeDispatch (runmodes.c:384)
==8084==    by 0x413512: main (suricata.c:2909)
==8084==  Address 0xffeffcd85 is on thread 1's stack
==8084==  in frame #1, created by GetEthtoolValue (util-ioctl.c:273)
==8084== 
==8084== Syscall param ioctl(SIOCETHTOOL) points to uninitialised byte(s)
==8084==    at 0x7C28F07: ioctl (syscall-template.S:84)
==8084==    by 0x5AE96E: GetEthtoolValue (util-ioctl.c:286)
==8084==    by 0x5AF52A: DisableIfaceOffloadingLinux (util-ioctl.c:448)
==8084==    by 0x558BE6: ParseAFPConfig (runmode-af-packet.c:468)
==8084==    by 0x5E9BC1: RunModeSetLiveCaptureWorkers (util-runmodes.c:373)
==8084==    by 0x55B329: RunModeIdsAFPWorkers (runmode-af-packet.c:693)
==8084==    by 0x563D97: RunModeDispatch (runmodes.c:384)
==8084==    by 0x413512: main (suricata.c:2909)
==8084==  Address 0xffeffcd85 is on thread 1's stack
==8084==  in frame #1, created by GetEthtoolValue (util-ioctl.c:273)
==8084== 
==8084== Syscall param ioctl(SIOCETHTOOL) points to uninitialised byte(s)
==8084==    at 0x7C28F07: ioctl (syscall-template.S:84)
==8084==    by 0x5AE96E: GetEthtoolValue (util-ioctl.c:286)
==8084==    by 0x5AF5E8: DisableIfaceOffloadingLinux (util-ioctl.c:455)
==8084==    by 0x558BE6: ParseAFPConfig (runmode-af-packet.c:468)
==8084==    by 0x5E9BC1: RunModeSetLiveCaptureWorkers (util-runmodes.c:373)
==8084==    by 0x55B329: RunModeIdsAFPWorkers (runmode-af-packet.c:693)
==8084==    by 0x563D97: RunModeDispatch (runmodes.c:384)
==8084==    by 0x413512: main (suricata.c:2909)
==8084==  Address 0xffeffcd85 is on thread 1's stack
==8084==  in frame #1, created by GetEthtoolValue (util-ioctl.c:273)
==8084== 
==8084== Syscall param ioctl(SIOCETHTOOL) points to uninitialised byte(s)
==8084==    at 0x7C28F07: ioctl (syscall-template.S:84)
==8084==    by 0x5AE96E: GetEthtoolValue (util-ioctl.c:286)
==8084==    by 0x5AF6A0: DisableIfaceOffloadingLinux (util-ioctl.c:462)
==8084==    by 0x558BE6: ParseAFPConfig (runmode-af-packet.c:468)
==8084==    by 0x5E9BC1: RunModeSetLiveCaptureWorkers (util-runmodes.c:373)
==8084==    by 0x55B329: RunModeIdsAFPWorkers (runmode-af-packet.c:693)
==8084==    by 0x563D97: RunModeDispatch (runmodes.c:384)
==8084==    by 0x413512: main (suricata.c:2909)
==8084==  Address 0xffeffcd85 is on thread 1's stack
==8084==  in frame #1, created by GetEthtoolValue (util-ioctl.c:273)
==8084== 

Details attached.


Files

bugreport-valgrind (43.8 KB) bugreport-valgrind Peter Manev, 10/12/2017 03:06 PM
Actions

Also available in: Atom PDF