Actions
Bug #2230
closedvalgrind memcheck - 4.0.0-dev (rev 1180687)
Affected Versions:
Effort:
Difficulty:
Label:
Description
==8084== Syscall param ioctl(SIOCETHTOOL) points to uninitialised byte(s) ==8084== at 0x7C28F07: ioctl (syscall-template.S:84) ==8084== by 0x5AE96E: GetEthtoolValue (util-ioctl.c:286) ==8084== by 0x5AF3B4: DisableIfaceOffloadingLinux (util-ioctl.c:434) ==8084== by 0x558BE6: ParseAFPConfig (runmode-af-packet.c:468) ==8084== by 0x5E9BC1: RunModeSetLiveCaptureWorkers (util-runmodes.c:373) ==8084== by 0x55B329: RunModeIdsAFPWorkers (runmode-af-packet.c:693) ==8084== by 0x563D97: RunModeDispatch (runmodes.c:384) ==8084== by 0x413512: main (suricata.c:2909) ==8084== Address 0xffeffcd85 is on thread 1's stack ==8084== in frame #1, created by GetEthtoolValue (util-ioctl.c:273) ==8084== ==8084== Syscall param ioctl(SIOCETHTOOL) points to uninitialised byte(s) ==8084== at 0x7C28F07: ioctl (syscall-template.S:84) ==8084== by 0x5AE96E: GetEthtoolValue (util-ioctl.c:286) ==8084== by 0x5AF46C: DisableIfaceOffloadingLinux (util-ioctl.c:441) ==8084== by 0x558BE6: ParseAFPConfig (runmode-af-packet.c:468) ==8084== by 0x5E9BC1: RunModeSetLiveCaptureWorkers (util-runmodes.c:373) ==8084== by 0x55B329: RunModeIdsAFPWorkers (runmode-af-packet.c:693) ==8084== by 0x563D97: RunModeDispatch (runmodes.c:384) ==8084== by 0x413512: main (suricata.c:2909) ==8084== Address 0xffeffcd85 is on thread 1's stack ==8084== in frame #1, created by GetEthtoolValue (util-ioctl.c:273) ==8084== ==8084== Syscall param ioctl(SIOCETHTOOL) points to uninitialised byte(s) ==8084== at 0x7C28F07: ioctl (syscall-template.S:84) ==8084== by 0x5AE96E: GetEthtoolValue (util-ioctl.c:286) ==8084== by 0x5AF52A: DisableIfaceOffloadingLinux (util-ioctl.c:448) ==8084== by 0x558BE6: ParseAFPConfig (runmode-af-packet.c:468) ==8084== by 0x5E9BC1: RunModeSetLiveCaptureWorkers (util-runmodes.c:373) ==8084== by 0x55B329: RunModeIdsAFPWorkers (runmode-af-packet.c:693) ==8084== by 0x563D97: RunModeDispatch (runmodes.c:384) ==8084== by 0x413512: main (suricata.c:2909) ==8084== Address 0xffeffcd85 is on thread 1's stack ==8084== in frame #1, created by GetEthtoolValue (util-ioctl.c:273) ==8084== ==8084== Syscall param ioctl(SIOCETHTOOL) points to uninitialised byte(s) ==8084== at 0x7C28F07: ioctl (syscall-template.S:84) ==8084== by 0x5AE96E: GetEthtoolValue (util-ioctl.c:286) ==8084== by 0x5AF5E8: DisableIfaceOffloadingLinux (util-ioctl.c:455) ==8084== by 0x558BE6: ParseAFPConfig (runmode-af-packet.c:468) ==8084== by 0x5E9BC1: RunModeSetLiveCaptureWorkers (util-runmodes.c:373) ==8084== by 0x55B329: RunModeIdsAFPWorkers (runmode-af-packet.c:693) ==8084== by 0x563D97: RunModeDispatch (runmodes.c:384) ==8084== by 0x413512: main (suricata.c:2909) ==8084== Address 0xffeffcd85 is on thread 1's stack ==8084== in frame #1, created by GetEthtoolValue (util-ioctl.c:273) ==8084== ==8084== Syscall param ioctl(SIOCETHTOOL) points to uninitialised byte(s) ==8084== at 0x7C28F07: ioctl (syscall-template.S:84) ==8084== by 0x5AE96E: GetEthtoolValue (util-ioctl.c:286) ==8084== by 0x5AF6A0: DisableIfaceOffloadingLinux (util-ioctl.c:462) ==8084== by 0x558BE6: ParseAFPConfig (runmode-af-packet.c:468) ==8084== by 0x5E9BC1: RunModeSetLiveCaptureWorkers (util-runmodes.c:373) ==8084== by 0x55B329: RunModeIdsAFPWorkers (runmode-af-packet.c:693) ==8084== by 0x563D97: RunModeDispatch (runmodes.c:384) ==8084== by 0x413512: main (suricata.c:2909) ==8084== Address 0xffeffcd85 is on thread 1's stack ==8084== in frame #1, created by GetEthtoolValue (util-ioctl.c:273) ==8084==
Details attached.
Files
Actions