Build #2,635

FreeRangeRouting Protocol Suite

Build: #2635 failed Changes by Renato Westphal

Build result summary

Details

Completed
Duration
267 minutes
Labels
version=frr-7_1-dev-2792-gd00d0f963git=https_//github_com/frrouting/frr_gitbuildurl=https_//ci1_netdef_org/browse/frr-frr-2635branch=master
Revision
d00d0f9634c39cc263b7a56b46034ee73b4fa83c d00d0f9634c39cc263b7a56b46034ee73b4fa83c
Total tests
9045
Failing since
#2634 (Manual run by Martin Winter)
No failed tests found, a possible compilation error occurred.

Tests

Responsible

This build has been failing since #2634
No one has taken responsibility

Code commits

Author Commit Message Commit date
Renato Westphal Renato Westphal d00d0f9634c39cc263b7a56b46034ee73b4fa83c d00d0f9634c39cc263b7a56b46034ee73b4fa83c Merge pull request #5126 from qlyoung/fix-grpc-build
lib: fix gRPC northbound plugin build
Quentin Young Quentin Young 63d12a7d77c82fe9a88af54eacd6d9211c5f0d8f m 63d12a7d77c82fe9a88af54eacd6d9211c5f0d8f lib: fix gRPC northbound plugin build
Some issues with our internal vector type being typedef'd as `vector`,
which conflicts with the C++ standard vector class...

Signed-off-by: Quentin Young <qlyoung@cumulusnetworks.com>

Configuration changes

Plan configuration has changed since the last successful build. See the plan audit log for more details.

Error summary for AddressSanitizer Topotests

The job generated some errors, drill down into the full build log for more details.

  0x100047aac5f0: 00 00 f1 f1 f1 f1 02 f4 f4 f4 f2 f2 f2 f2 04 f4
  0x100047aac600: f4 f4 f2 f2 f2 f2 00 00 f4 f4 f2 f2 f2 f2 00 00
  0x100047aac610: 00 00 f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07
  Heap left redzone:       fa
  Heap right redzone:      fb
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack partial redzone:   f4
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
r2: Daemon bgpd killed by AddressSanitizer2019-10-09 16:50:44,657 ERROR: assert failed at "bgp_rfapi_basic_sanity.test_bgp_rfapi_basic_sanity/test_memory_leak":
r2: Daemon bgpd killed by AddressSanitizer
2019-10-09 16:53:57,337 ERROR: ******************************************************************************
2019-10-09 16:53:57,338 ERROR: Test Target Summary                                                  Pass Fail
2019-10-09 16:53:57,338 ERROR: ******************************************************************************
2019-10-09 16:53:57,338 ERROR: FILE: scripts/add_routes.py
2019-10-09 16:53:57,339 ERROR: FILE: scripts/adjacencies.py
2019-10-09 16:53:57,339 ERROR: FILE: scripts/check_routes.py
2019-10-09 16:53:57,339 ERROR: FILE: scripts/check_close.py
2019-10-09 16:53:57,339 ERROR: 42   r1     See cleanup +27.54 secs                                  0    1
2019-10-09 16:53:57,339 ERROR: 43   r3     See cleanup +27.82 secs                                  0    1
2019-10-09 16:53:57,340 ERROR: 44   r4     See cleanup +27.79 secs                                  0    1
2019-10-09 16:53:57,340 ERROR: See /tmp/topotests/bgp_rfapi_basic_sanity_config2.test_bgp_rfapi_basic_sanity_config2/output.log for details of errors
2019-10-09 16:53:57,344 ERROR: assert failed at "bgp_rfapi_basic_sanity_config2.test_bgp_rfapi_basic_sanity_config2/test_check_close": 3 tests failed
r2: bgpd triggered an exception by AddressSanitizer
ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffd8dce5610 at pc 0x0000006856bf bp 0x7ffd8dce2b00 sp 0x7ffd8dce2af0
READ of size 1 at 0x7ffd8dce5610 thread T0
    #0 0x6856be in prefix_cmp lib/prefix.c:776
    #1 0x58897e in rfapiItBiIndexSearch bgpd/rfapi/rfapi_import.c:2230
    #2 0x58897e in rfapiBgpInfoFilteredImportVPN bgpd/rfapi/rfapi_import.c:3520
    #3 0x58b869 in rfapiProcessWithdraw bgpd/rfapi/rfapi_import.c:4071
    #4 0x4c454e in bgp_withdraw bgpd/bgp_route.c:3736
    #5 0x484122 in bgp_nlri_parse_vpn bgpd/bgp_mplsvpn.c:237
    #6 0x497f52 in bgp_nlri_parse bgpd/bgp_packet.c:315
    #7 0x49d06d in bgp_update_receive bgpd/bgp_packet.c:1598
    #8 0x49d06d in bgp_process_packet bgpd/bgp_packet.c:2274
    #9 0x6b9eb4 in thread_call lib/thread.c:1531
    #10 0x656f97 in frr_run lib/libfrr.c:1052
    #11 0x42d268 in main bgpd/bgp_main.c:486
    #12 0x7f05aee2882f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
    #13 0x42bcc8 in _start (/usr/lib/frr/bgpd+0x42bcc8)

Address 0x7ffd8dce5610 is located in stack of thread T0 at offset 240 in frame
    #0 0x483945 in bgp_nlri_parse_vpn bgpd/bgp_mplsvpn.c:103

  This frame has 5 object(s):
    [32, 36) 'label'
    [96, 108) 'rd_as'
    [160, 172) 'rd_ip'
    [224, 240) 'prd' <== Memory access at offset 240 overflows this variable
    [288, 336) 'p'
HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext
      (longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow lib/prefix.c:776 prefix_cmp
Shadow bytes around the buggy address:
  0x100031b94a70: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x100031b94a80: f3 f3 f3 f3 f3 f3 f3 f3 00 00 00 00 00 00 00 00
  0x100031b94a90: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x100031b94aa0: 00 00 00 00 f1 f1 f1 f1 04 f4 f4 f4 f2 f2 f2 f2
  0x100031b94ab0: 00 04 f4 f4 f2 f2 f2 f2 00 04 f4 f4 f2 f2 f2 f2
=>0x100031b94ac0: 00 00[f4]f4 f2 f2 f2 f2 00 00 00 00 00 00 f4 f4
  0x100031b94ad0: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
  0x100031b94ae0: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x100031b94af0: f1 f1 f1 f1 02 f4 f4 f4 f2 f2 f2 f2 04 f4 f4 f4
  0x100031b94b00: f2 f2 f2 f2 00 00 f4 f4 f2 f2 f2 f2 00 00 00 00
  0x100031b94b10: f2 f2 f2 f2 00 00 00 00 00 00 00 00 00 00 00 00
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07
  Heap left redzone:       fa
  Heap right redzone:      fb
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack partial redzone:   f4
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
r2: Daemon bgpd killed by AddressSanitizer2019-10-09 16:53:59,974 ERROR: assert failed at "bgp_rfapi_basic_sanity_config2.test_bgp_rfapi_basic_sanity_config2/test_memory_leak":
r2: Daemon bgpd killed by AddressSanitizer
ci/topotests/asan/run_topotests.sh: line 61: syntax error: unexpected end of file