encfs crashes since gcc-libs-7.3.1+20180406-1 glibc-2.27-2

Ask questions about Arch Linux ARM. Please search before making a new topic.

encfs crashes since gcc-libs-7.3.1+20180406-1 glibc-2.27-2

Postby Ente » Thu Apr 26, 2018 6:59 am

Since today's updates (see the list below), encfs crashes with the following assertion:

encfs: malloc.c:2401: sysmalloc: Assertion `(old_top == initial_top (av) && old_size == 0) || ((unsigned long) (old_size) >= MINSIZE && prev_inuse (old_top) && ((unsigned long) old_end & (pagesize - 1)) == 0)' failed.

While trying to investigate the problem, I found kind of a workaround - if I start encfs under valgrind ("valgrind --leak-check=yes encfs ..."), there is no crash, and encfs appears to work properly. Valgrinds reports a number of possible problems that may, or may not, be related to the actual crash (see the output below the list below).


list of today's updates:
binutils-2.30-3 fcgi-2.4.0-14 gcc-7.3.1+20180406-1
gcc-libs-7.3.1+20180406-1 glibc-2.27-2 ldb-1.3.2-1
libnsl-1.2.0-1 libwbclient-4.8.0-2 linux-api-headers-4.16.1-1
net-snmp-5.7.3-8 nmap-7.70-2 pam-1.3.0-2 perl-uri-1.74-1
php-7.2.5-1 php-apache-7.2.5-1 php-embed-7.2.5-1 php-gd-7.2.5-1
php-intl-7.2.5-1 php-odbc-7.2.5-1 php-xsl-7.2.5-1
pinentry-1.1.0-2 postfix-3.3.0-3 python-3.6.5-2 python2-2.7.14-3
syslog-ng-3.14.1-2 thin-provisioning-tools-0.7.6-1


valgrind output for encfs:

==779== Conditional jump or move depends on uninitialised value(s)
==779== at 0x401A164: index (in /usr/lib/ld-2.27.so)
==779== by 0x4007EC3: expand_dynamic_string_token (in /usr/lib/ld-2.27.so)
==779==
==779== Conditional jump or move depends on uninitialised value(s)
==779== at 0x401A168: index (in /usr/lib/ld-2.27.so)
==779== by 0x4007EC3: expand_dynamic_string_token (in /usr/lib/ld-2.27.so)
==779==
==779== Conditional jump or move depends on uninitialised value(s)
==779== at 0x4007EC8: expand_dynamic_string_token (in /usr/lib/ld-2.27.so)
==779==
disInstr(arm): unhandled instruction: 0xEC510F1E
cond=14(0xE) 27:20=197(0xC5) 4:4=1 3:0=14(0xE)
==779== valgrind: Unrecognised instruction at address 0x4cdfe68.
==779== at 0x4CDFE68: ??? (in /usr/lib/libcrypto.so.1.1)
==779== Invalid write of size 4
==779== at 0x4E72B9C: tinyxml2::XMLDocument::XMLDocument(bool, tinyxml2::Whitespace) (in /usr/lib/libtinyxml2.so.6.2.0)
==779== by 0x48D70AF: encfs::XmlReader::load(char const*) (in /usr/lib/libencfs.so.1.9.4)
==779== Address 0x4fbcfcc is 0 bytes after a block of size 444 alloc'd
==779== at 0x484803C: operator new(unsigned int) (vg_replace_malloc.c:328)
==779== by 0x48D709F: encfs::XmlReader::load(char const*) (in /usr/lib/libencfs.so.1.9.4)
==779==
==779== Invalid read of size 4
==779== at 0x4E7159C: tinyxml2::XMLDocument::Identify(char*, tinyxml2::XMLNode**) (in /usr/lib/libtinyxml2.so.6.2.0)
==779== by 0x4E750F7: tinyxml2::XMLNode::ParseDeep(char*, tinyxml2::StrPair*, int*) (in /usr/lib/libtinyxml2.so.6.2.0)
==779== Address 0x4fbcfcc is 0 bytes after a block of size 444 alloc'd
==779== at 0x484803C: operator new(unsigned int) (vg_replace_malloc.c:328)
==779== by 0x48D709F: encfs::XmlReader::load(char const*) (in /usr/lib/libencfs.so.1.9.4)
==779==
==779== Invalid write of size 4
==779== at 0x4E715A8: tinyxml2::XMLDocument::Identify(char*, tinyxml2::XMLNode**) (in /usr/lib/libtinyxml2.so.6.2.0)
==779== by 0x4E750F7: tinyxml2::XMLNode::ParseDeep(char*, tinyxml2::StrPair*, int*) (in /usr/lib/libtinyxml2.so.6.2.0)
==779== Address 0x4fbcfcc is 0 bytes after a block of size 444 alloc'd
==779== at 0x484803C: operator new(unsigned int) (vg_replace_malloc.c:328)
==779== by 0x48D709F: encfs::XmlReader::load(char const*) (in /usr/lib/libencfs.so.1.9.4)
==779==
==779== Invalid read of size 4
==779== at 0x4E76BF4: ??? (in /usr/lib/libtinyxml2.so.6.2.0)
==779== Address 0x4fbcfcc is 0 bytes after a block of size 444 alloc'd
==779== at 0x484803C: operator new(unsigned int) (vg_replace_malloc.c:328)
==779== by 0x48D709F: encfs::XmlReader::load(char const*) (in /usr/lib/libencfs.so.1.9.4)
==779==
==779== Invalid write of size 4
==779== at 0x4E76BFC: ??? (in /usr/lib/libtinyxml2.so.6.2.0)
==779== Address 0x4fbcfcc is 0 bytes after a block of size 444 alloc'd
==779== at 0x484803C: operator new(unsigned int) (vg_replace_malloc.c:328)
==779== by 0x48D709F: encfs::XmlReader::load(char const*) (in /usr/lib/libencfs.so.1.9.4)
==779==
==779== Invalid read of size 4
==779== at 0x4E71A54: tinyxml2::XMLDocument::Identify(char*, tinyxml2::XMLNode**) (in /usr/lib/libtinyxml2.so.6.2.0)
==779== by 0x4E750F7: tinyxml2::XMLNode::ParseDeep(char*, tinyxml2::StrPair*, int*) (in /usr/lib/libtinyxml2.so.6.2.0)
==779== Address 0x4fbcfcc is 0 bytes after a block of size 444 alloc'd
==779== at 0x484803C: operator new(unsigned int) (vg_replace_malloc.c:328)
==779== by 0x48D709F: encfs::XmlReader::load(char const*) (in /usr/lib/libencfs.so.1.9.4)
==779==
==779== Invalid write of size 4
==779== at 0x4E71A60: tinyxml2::XMLDocument::Identify(char*, tinyxml2::XMLNode**) (in /usr/lib/libtinyxml2.so.6.2.0)
==779== by 0x4E750F7: tinyxml2::XMLNode::ParseDeep(char*, tinyxml2::StrPair*, int*) (in /usr/lib/libtinyxml2.so.6.2.0)
==779== Address 0x4fbcfcc is 0 bytes after a block of size 444 alloc'd
==779== at 0x484803C: operator new(unsigned int) (vg_replace_malloc.c:328)
==779== by 0x48D709F: encfs::XmlReader::load(char const*) (in /usr/lib/libencfs.so.1.9.4)
==779==
==779== Invalid write of size 4
==779== at 0x4E744A8: tinyxml2::XMLDocument::~XMLDocument() (in /usr/lib/libtinyxml2.so.6.2.0)
==779== Address 0x4fbcfcc is 0 bytes after a block of size 444 alloc'd
==779== at 0x484803C: operator new(unsigned int) (vg_replace_malloc.c:328)
==779== by 0x48D709F: encfs::XmlReader::load(char const*) (in /usr/lib/libencfs.so.1.9.4)
Ente
 
Posts: 6
Joined: Thu Jan 19, 2017 10:37 pm

Re: encfs crashes since gcc-libs-7.3.1+20180406-1 glibc-2.2

Postby Ente » Fri Apr 27, 2018 8:29 am

Just wanted to let you know that with today's updates (encfs-1.9.4-1.1 jemalloc-1:5.0.1-4.1), encfs is back to working normally.
Ente
 
Posts: 6
Joined: Thu Jan 19, 2017 10:37 pm


Return to User Questions

Who is online

Users browsing this forum: Google [Bot] and 10 guests