Build #2,636

FreeRangeRouting Protocol Suite

Build result summary

Details

Completed
Duration
225 minutes
Labels
version=frr-7_1-dev-2794-gd09e0a81bgit=https_//github_com/frrouting/frr_gitbuildurl=https_//ci1_netdef_org/browse/frr-frr-2636branch=master
Revision
d09e0a81b4e6bc407de0960d5dfba8572663c950 d09e0a81b4e6bc407de0960d5dfba8572663c950
Total tests
9045
Failing since
#2634 (Manual run by Martin Winter)
No failed tests found, a possible compilation error occurred.

Tests

Responsible

This build has been failing since #2634
No one has taken responsibility

Code commits

Author Commit Message Commit date
Donatas Abraitis <donatas.abraitis@gmail.com> Donatas Abraitis <donatas.abraitis@gmail.com> d09e0a81b4e6bc407de0960d5dfba8572663c950 d09e0a81b4e6bc407de0960d5dfba8572663c950 Merge pull request #5129 from qlyoung/doc-yang-style
doc: add style guide for YANG
Quentin Young Quentin Young 6f7a92544b3bbc50b9aa46f3d2178f7f03bdab94 m 6f7a92544b3bbc50b9aa46f3d2178f7f03bdab94 doc: add style guide for YANG
Signed-off-by: Quentin Young <qlyoung@cumulusnetworks.com>

Configuration changes

Plan configuration has changed since the last successful build. See the plan audit log for more details.

Error summary for AddressSanitizer Topotests

The job generated some errors, drill down into the full build log for more details.

addgroup: The group `frr' already exists as a system group. Exiting.
  0x1000285fa7a0: f1 f1 02 f4 f4 f4 f2 f2 f2 f2 04 f4 f4 f4 f2 f2
  0x1000285fa7b0: f2 f2 00 00 f4 f4 f2 f2 f2 f2 00 00 00 00 f2 f2
  0x1000285fa7c0: f2 f2 00 00 00 00 00 00 00 00 00 00 00 00 f2 f2
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07
  Heap left redzone:       fa
  Heap right redzone:      fb
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack partial redzone:   f4
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
r2: Daemon bgpd killed by AddressSanitizer2019-10-10 03:34:41,222 ERROR: assert failed at "bgp_rfapi_basic_sanity.test_bgp_rfapi_basic_sanity/test_memory_leak":
r2: Daemon bgpd killed by AddressSanitizer
2019-10-10 03:37:30,686 ERROR: ******************************************************************************
2019-10-10 03:37:30,687 ERROR: Test Target Summary                                                  Pass Fail
2019-10-10 03:37:30,687 ERROR: ******************************************************************************
2019-10-10 03:37:30,687 ERROR: FILE: scripts/add_routes.py
2019-10-10 03:37:30,687 ERROR: FILE: scripts/adjacencies.py
2019-10-10 03:37:30,687 ERROR: FILE: scripts/check_routes.py
2019-10-10 03:37:30,687 ERROR: FILE: scripts/check_close.py
2019-10-10 03:37:30,687 ERROR: 42   r1     See cleanup +23.93 secs                                  0    1
2019-10-10 03:37:30,687 ERROR: 43   r3     See cleanup +24.01 secs                                  0    1
2019-10-10 03:37:30,687 ERROR: 44   r4     See cleanup +23.95 secs                                  0    1
2019-10-10 03:37:30,687 ERROR: See /tmp/topotests/bgp_rfapi_basic_sanity_config2.test_bgp_rfapi_basic_sanity_config2/output.log for details of errors
2019-10-10 03:37:30,690 ERROR: assert failed at "bgp_rfapi_basic_sanity_config2.test_bgp_rfapi_basic_sanity_config2/test_check_close": 3 tests failed
r2: bgpd triggered an exception by AddressSanitizer
ERROR: AddressSanitizer: stack-buffer-overflow on address 0x7ffc10fb8170 at pc 0x0000006856bf bp 0x7ffc10fb5660 sp 0x7ffc10fb5650
READ of size 1 at 0x7ffc10fb8170 thread T0
    #0 0x6856be in prefix_cmp lib/prefix.c:776
    #1 0x58897e in rfapiItBiIndexSearch bgpd/rfapi/rfapi_import.c:2230
    #2 0x58897e in rfapiBgpInfoFilteredImportVPN bgpd/rfapi/rfapi_import.c:3520
    #3 0x58b869 in rfapiProcessWithdraw bgpd/rfapi/rfapi_import.c:4071
    #4 0x4c454e in bgp_withdraw bgpd/bgp_route.c:3736
    #5 0x484122 in bgp_nlri_parse_vpn bgpd/bgp_mplsvpn.c:237
    #6 0x497f52 in bgp_nlri_parse bgpd/bgp_packet.c:315
    #7 0x49d06d in bgp_update_receive bgpd/bgp_packet.c:1598
    #8 0x49d06d in bgp_process_packet bgpd/bgp_packet.c:2274
    #9 0x6b9eb4 in thread_call lib/thread.c:1531
    #10 0x656f97 in frr_run lib/libfrr.c:1052
    #11 0x42d268 in main bgpd/bgp_main.c:486
    #12 0x7fb7198a582f in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x2082f)
    #13 0x42bcc8 in _start (/usr/lib/frr/bgpd+0x42bcc8)

Address 0x7ffc10fb8170 is located in stack of thread T0 at offset 240 in frame
    #0 0x483945 in bgp_nlri_parse_vpn bgpd/bgp_mplsvpn.c:103

  This frame has 5 object(s):
    [32, 36) 'label'
    [96, 108) 'rd_as'
    [160, 172) 'rd_ip'
    [224, 240) 'prd' <== Memory access at offset 240 overflows this variable
    [288, 336) 'p'
HINT: this may be a false positive if your program uses some custom stack unwind mechanism or swapcontext
      (longjmp and C++ exceptions *are* supported)
SUMMARY: AddressSanitizer: stack-buffer-overflow lib/prefix.c:776 prefix_cmp
Shadow bytes around the buggy address:
  0x1000021eefd0: 00 00 00 00 00 00 00 00 f1 f1 f1 f1 00 00 00 00
  0x1000021eefe0: 00 00 00 00 00 00 00 00 00 00 00 00 f3 f3 f3 f3
  0x1000021eeff0: f3 f3 f3 f3 00 00 00 00 00 00 00 00 00 00 00 00
  0x1000021ef000: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1000021ef010: f1 f1 f1 f1 04 f4 f4 f4 f2 f2 f2 f2 00 04 f4 f4
=>0x1000021ef020: f2 f2 f2 f2 00 04 f4 f4 f2 f2 f2 f2 00 00[f4]f4
  0x1000021ef030: f2 f2 f2 f2 00 00 00 00 00 00 f4 f4 f3 f3 f3 f3
  0x1000021ef040: 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
  0x1000021ef050: 00 00 00 00 00 00 00 00 00 00 00 00 f1 f1 f1 f1
  0x1000021ef060: 02 f4 f4 f4 f2 f2 f2 f2 04 f4 f4 f4 f2 f2 f2 f2
  0x1000021ef070: 00 00 f4 f4 f2 f2 f2 f2 00 00 00 00 f2 f2 f2 f2
Shadow byte legend (one shadow byte represents 8 application bytes):
  Addressable:           00
  Partially addressable: 01 02 03 04 05 06 07
  Heap left redzone:       fa
  Heap right redzone:      fb
  Freed heap region:       fd
  Stack left redzone:      f1
  Stack mid redzone:       f2
  Stack right redzone:     f3
  Stack partial redzone:   f4
  Stack after return:      f5
  Stack use after scope:   f8
  Global redzone:          f9
  Global init order:       f6
  Poisoned by user:        f7
  Container overflow:      fc
  Array cookie:            ac
  Intra object redzone:    bb
  ASan internal:           fe
r2: Daemon bgpd killed by AddressSanitizer2019-10-10 03:37:33,104 ERROR: assert failed at "bgp_rfapi_basic_sanity_config2.test_bgp_rfapi_basic_sanity_config2/test_memory_leak":
r2: Daemon bgpd killed by AddressSanitizer
Address Sanitizer triggered - Test failed