[mpich-discuss] Another integer overflow

Joachim Protze protze at itc.rwth-aachen.de
Thu Jan 31 12:41:25 CST 2019


Hi all,

we found another integer overflow when using MPI_Sendrecv_replace, see 
attached file.
When the buffer size exceeds MAX_INT, a segmentation fault occurs.
I could reproduce this with the MPICH 3.3a2 installation on my Ubuntu 
desktop.

@Jeff: I could reproduce the segfault as well as with IntelMPI 2018
IntelMPI 2019 detects a message truncation


Best
Joachim
-- 
Dipl.-Inf. Joachim Protze

IT Center
Group: High Performance Computing
Division: Computational Science and Engineering
RWTH Aachen University
Seffenter Weg 23
D 52074  Aachen (Germany)
Tel: +49 241 80- 24765
Fax: +49 241 80-624765
protze at itc.rwth-aachen.de
www.itc.rwth-aachen.de
-------------- next part --------------
A non-text attachment was scrubbed...
Name: sendrecv_replace.c
Type: text/x-csrc
Size: 598 bytes
Desc: not available
URL: <http://lists.mpich.org/pipermail/discuss/attachments/20190131/d709d3fd/attachment.bin>
-------------- next part --------------
A non-text attachment was scrubbed...
Name: smime.p7s
Type: application/pkcs7-signature
Size: 4915 bytes
Desc: S/MIME Cryptographic Signature
URL: <http://lists.mpich.org/pipermail/discuss/attachments/20190131/d709d3fd/attachment.p7s>


More information about the discuss mailing list