Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

staticd: Memory leak of string in staticd #14474

Merged
merged 1 commit into from
Oct 5, 2023

Conversation

donaldsharp
Copy link
Member

XSTRDUP and then calling strsep mangles the
pointer returned by XSTRDUP. Keep a copy
of the orig and when we are done, free that instead.

@NetDEF-CI
Copy link
Collaborator

NetDEF-CI commented Sep 22, 2023

Continuous Integration Result: FAILED

Continuous Integration Result: FAILED

See below for issues.
CI System Testrun URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/

This is a comment from an automated CI system.
For questions and feedback in regards to this CI system, please feel free to email
Martin Winter - mwinter (at) opensourcerouting.org.

Get source / Pull Request: Successful

Building Stage: Successful

Basic Tests: Failed

Topotests debian 10 amd64 part 0: Failed (click for details)

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPO0DEB10AMD64-14302/test

Topology Tests failed for Topotests debian 10 amd64 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0DEB10AMD64/TopotestLogs/log_topotests.txt
Topotests debian 10 amd64 part 0: Unknown Log
URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0DEB10AMD64/TopotestDetails/

Topotests Ubuntu 18.04 amd64 part 0: Failed (click for details)

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPOU1804-14302/test

Topology Tests failed for Topotests Ubuntu 18.04 amd64 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPOU1804/TopotestLogs/log_topotests.txt
Topotests Ubuntu 18.04 amd64 part 0: Unknown Log
URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPOU1804/TopotestDetails/

Topotests Ubuntu 18.04 arm8 part 0: Failed (click for details) Topotests Ubuntu 18.04 arm8 part 0: Unknown Log URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0U18ARM8/TopotestDetails/

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPO0U18ARM8-14302/test

Topology Tests failed for Topotests Ubuntu 18.04 arm8 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0U18ARM8/TopotestLogs/log_topotests.txt

Topotests Ubuntu 18.04 i386 part 0: Failed (click for details) Topotests Ubuntu 18.04 i386 part 0: Unknown Log URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0U18I386/TopotestDetails/

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPO0U18I386-14302/test

Topology Tests failed for Topotests Ubuntu 18.04 i386 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0U18I386/TopotestLogs/log_topotests.txt

Addresssanitizer topotests part 0: Failed (click for details)
## Error: heap-use-after-free

### AddressSanitizer error in topotest `test_srv6_route.py`, test `test_srv6_static_route`, router `r1`

    ERROR: AddressSanitizer: heap-use-after-free on address 0x604000030710 at pc 0x7fce7f55a6a2 bp 0x7ffc41e4e260 sp 0x7ffc41e4da08
    READ of size 2 at 0x604000030710 thread T0
        #0 0x7fce7f55a6a1 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1)
        #1 0x7fce7f07aa9e in yang_data_new lib/yang.c:618
        #2 0x7fce7efe3d9f in nb_candidate_edit_config_changes lib/northbound.c:884
        #3 0x7fce7efee18e in nb_cli_apply_changes_internal lib/northbound_cli.c:148
        #4 0x7fce7efeebbe in nb_cli_apply_changes lib/northbound_cli.c:211
        #5 0x7fce7e846f3c in static_route_nb_run staticd/static_vty.c:420
        #6 0x7fce7e8576c2 in ipv6_route_magic staticd/static_vty.c:1173
        #7 0x7fce7e8576c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #8 0x7fce7ef3ee41 in cmd_execute_command_real lib/command.c:993
        #9 0x7fce7ef3f872 in cmd_execute_command_strict lib/command.c:1102
        #10 0x7fce7ef3f8d1 in command_config_read_one_line lib/command.c:1262
        #11 0x7fce7ef3fbb8 in config_from_file lib/command.c:1315
        #12 0x7fce7f072ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #13 0x563175a59340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #14 0x7fce7f05baec in event_call lib/event.c:1976
        #15 0x7fce7ef9ed92 in frr_run lib/libfrr.c:1213
        #16 0x563175a34785 in main mgmtd/mgmt_main.c:283
        #17 0x7fce7e24fc86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
        #18 0x563175a34119 in _start (/usr/lib/frr/mgmtd+0x2c119)
    
    0x604000030710 is located 0 bytes inside of 41-byte region [0x604000030710,0x604000030739)
    freed by thread T0 here:
        #0 0x7fce7f5c17a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
        #1 0x7fce7efbc48d in qfree lib/memory.c:130
        #2 0x7fce7e846d29 in static_route_nb_run staticd/static_vty.c:378
        #3 0x7fce7e8576c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7fce7e8576c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7fce7ef3ee41 in cmd_execute_command_real lib/command.c:993
        #6 0x7fce7ef3f872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7fce7ef3f8d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7fce7ef3fbb8 in config_from_file lib/command.c:1315
        #9 0x7fce7f072ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x563175a59340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7fce7f05baec in event_call lib/event.c:1976
        #12 0x7fce7ef9ed92 in frr_run lib/libfrr.c:1213
        #13 0x563175a34785 in main mgmtd/mgmt_main.c:283
        #14 0x7fce7e24fc86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    previously allocated by thread T0 here:
        #0 0x7fce7f55a538 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x77538)
        #1 0x7fce7efbc153 in qstrdup lib/memory.c:117
        #2 0x7fce7e846ba2 in static_route_nb_run staticd/static_vty.c:366
        #3 0x7fce7e8576c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7fce7e8576c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7fce7ef3ee41 in cmd_execute_command_real lib/command.c:993
        #6 0x7fce7ef3f872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7fce7ef3f8d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7fce7ef3fbb8 in config_from_file lib/command.c:1315
        #9 0x7fce7f072ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x563175a59340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7fce7f05baec in event_call lib/event.c:1976
        #12 0x7fce7ef9ed92 in frr_run lib/libfrr.c:1213
        #13 0x563175a34785 in main mgmtd/mgmt_main.c:283
        #14 0x7fce7e24fc86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    SUMMARY: AddressSanitizer: heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1) in strdup
    Shadow bytes around the buggy address:
      0x0c087fffe090: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0a0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe0b0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0c0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0d0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
    =>0x0c087fffe0e0: fa fa[fd]fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0f0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe100: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd
      0x0c087fffe110: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe120: fa fa fd fd fd fd fd fa fa fa 00 00 00 00 00 00
      0x0c087fffe130: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
    Shadow byte legend (one shadow byte represents 8 application bytes):
      Addressable:           00
      Partially addressable: 01 02 03 04 05 06 07 
      Heap left redzone:       fa
      Freed heap region:       fd
      Stack left redzone:      f1
      Stack mid redzone:       f2
      Stack right redzone:     f3
      Stack after return:      f5
      Stack use after scope:   f8
      Global redzone:          f9
      Global init order:       f6
      Poisoned by user:        f7
      Container overflow:      fc
      Array cookie:            ac
      Intra object redzone:    bb
      ASan internal:           fe
      Left alloca redzone:     ca
      Right alloca redzone:    cb

---------------
## Error: heap-use-after-free

### AddressSanitizer error in topotest `test_srv6_route.py`, test `teardown_module`, router `r1`

    ERROR: AddressSanitizer: heap-use-after-free on address 0x604000030710 at pc 0x7fce7f55a6a2 bp 0x7ffc41e4e260 sp 0x7ffc41e4da08
    READ of size 2 at 0x604000030710 thread T0
        #0 0x7fce7f55a6a1 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1)
        #1 0x7fce7f07aa9e in yang_data_new lib/yang.c:618
        #2 0x7fce7efe3d9f in nb_candidate_edit_config_changes lib/northbound.c:884
        #3 0x7fce7efee18e in nb_cli_apply_changes_internal lib/northbound_cli.c:148
        #4 0x7fce7efeebbe in nb_cli_apply_changes lib/northbound_cli.c:211
        #5 0x7fce7e846f3c in static_route_nb_run staticd/static_vty.c:420
        #6 0x7fce7e8576c2 in ipv6_route_magic staticd/static_vty.c:1173
        #7 0x7fce7e8576c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #8 0x7fce7ef3ee41 in cmd_execute_command_real lib/command.c:993
        #9 0x7fce7ef3f872 in cmd_execute_command_strict lib/command.c:1102
        #10 0x7fce7ef3f8d1 in command_config_read_one_line lib/command.c:1262
        #11 0x7fce7ef3fbb8 in config_from_file lib/command.c:1315
        #12 0x7fce7f072ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #13 0x563175a59340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #14 0x7fce7f05baec in event_call lib/event.c:1976
        #15 0x7fce7ef9ed92 in frr_run lib/libfrr.c:1213
        #16 0x563175a34785 in main mgmtd/mgmt_main.c:283
        #17 0x7fce7e24fc86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
        #18 0x563175a34119 in _start (/usr/lib/frr/mgmtd+0x2c119)
    
    0x604000030710 is located 0 bytes inside of 41-byte region [0x604000030710,0x604000030739)
    freed by thread T0 here:
        #0 0x7fce7f5c17a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
        #1 0x7fce7efbc48d in qfree lib/memory.c:130
        #2 0x7fce7e846d29 in static_route_nb_run staticd/static_vty.c:378
        #3 0x7fce7e8576c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7fce7e8576c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7fce7ef3ee41 in cmd_execute_command_real lib/command.c:993
        #6 0x7fce7ef3f872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7fce7ef3f8d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7fce7ef3fbb8 in config_from_file lib/command.c:1315
        #9 0x7fce7f072ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x563175a59340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7fce7f05baec in event_call lib/event.c:1976
        #12 0x7fce7ef9ed92 in frr_run lib/libfrr.c:1213
        #13 0x563175a34785 in main mgmtd/mgmt_main.c:283
        #14 0x7fce7e24fc86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    previously allocated by thread T0 here:
        #0 0x7fce7f55a538 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x77538)
        #1 0x7fce7efbc153 in qstrdup lib/memory.c:117
        #2 0x7fce7e846ba2 in static_route_nb_run staticd/static_vty.c:366
        #3 0x7fce7e8576c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7fce7e8576c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7fce7ef3ee41 in cmd_execute_command_real lib/command.c:993
        #6 0x7fce7ef3f872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7fce7ef3f8d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7fce7ef3fbb8 in config_from_file lib/command.c:1315
        #9 0x7fce7f072ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x563175a59340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7fce7f05baec in event_call lib/event.c:1976
        #12 0x7fce7ef9ed92 in frr_run lib/libfrr.c:1213
        #13 0x563175a34785 in main mgmtd/mgmt_main.c:283
        #14 0x7fce7e24fc86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    SUMMARY: AddressSanitizer: heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1) in strdup
    Shadow bytes around the buggy address:
      0x0c087fffe090: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0a0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe0b0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0c0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0d0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
    =>0x0c087fffe0e0: fa fa[fd]fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0f0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe100: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd
      0x0c087fffe110: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe120: fa fa fd fd fd fd fd fa fa fa 00 00 00 00 00 00
      0x0c087fffe130: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
    Shadow byte legend (one shadow byte represents 8 application bytes):
      Addressable:           00
      Partially addressable: 01 02 03 04 05 06 07 
      Heap left redzone:       fa
      Freed heap region:       fd
      Stack left redzone:      f1
      Stack mid redzone:       f2
      Stack right redzone:     f3
      Stack after return:      f5
      Stack use after scope:   f8
      Global redzone:          f9
      Global init order:       f6
      Poisoned by user:        f7
      Container overflow:      fc
      Array cookie:            ac
      Intra object redzone:    bb
      ASan internal:           fe
      Left alloca redzone:     ca
      Right alloca redzone:    cb

---------------

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-ASAN3-14302/test

Topology Tests failed for Addresssanitizer topotests part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/ASAN3/TopotestLogs/log_topotests.txt
Addresssanitizer topotests part 0: Unknown Log
URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/ASAN3/Topotest-Details/

Successful on other platforms/tests
  • Topotests Ubuntu 18.04 amd64 part 3
  • Topotests Ubuntu 18.04 arm8 part 7
  • Topotests Ubuntu 18.04 i386 part 7
  • Addresssanitizer topotests part 7
  • Topotests Ubuntu 18.04 i386 part 2
  • Topotests Ubuntu 18.04 arm8 part 8
  • Topotests Ubuntu 18.04 amd64 part 5
  • Addresssanitizer topotests part 5
  • Topotests Ubuntu 18.04 i386 part 6
  • Topotests Ubuntu 18.04 i386 part 1
  • Topotests Ubuntu 18.04 i386 part 3
  • Topotests Ubuntu 18.04 i386 part 8
  • Topotests Ubuntu 18.04 amd64 part 2
  • Topotests Ubuntu 18.04 amd64 part 7
  • Debian 10 deb pkg check
  • Addresssanitizer topotests part 3
  • Topotests debian 10 amd64 part 8
  • Topotests Ubuntu 18.04 i386 part 5
  • Topotests Ubuntu 18.04 arm8 part 4
  • Addresssanitizer topotests part 2
  • Topotests Ubuntu 18.04 arm8 part 9
  • Topotests Ubuntu 18.04 arm8 part 2
  • Topotests debian 10 amd64 part 9
  • Addresssanitizer topotests part 9
  • CentOS 7 rpm pkg check
  • Topotests Ubuntu 18.04 amd64 part 4
  • Topotests debian 10 amd64 part 7
  • Topotests Ubuntu 18.04 amd64 part 9
  • Topotests Ubuntu 18.04 i386 part 9
  • Topotests Ubuntu 18.04 amd64 part 8
  • Addresssanitizer topotests part 8
  • Topotests debian 10 amd64 part 2
  • Static analyzer (clang)
  • Ubuntu 18.04 deb pkg check
  • Addresssanitizer topotests part 6
  • Ubuntu 20.04 deb pkg check
  • Topotests Ubuntu 18.04 arm8 part 5
  • Topotests debian 10 amd64 part 1
  • Topotests Ubuntu 18.04 amd64 part 1
  • Topotests Ubuntu 18.04 arm8 part 6
  • Topotests Ubuntu 18.04 arm8 part 1
  • Topotests debian 10 amd64 part 3
  • Topotests debian 10 amd64 part 6
  • Topotests Ubuntu 18.04 amd64 part 6
  • Addresssanitizer topotests part 4
  • Topotests Ubuntu 18.04 arm8 part 3
  • Debian 9 deb pkg check
  • Topotests debian 10 amd64 part 5
  • Addresssanitizer topotests part 1
  • Topotests Ubuntu 18.04 i386 part 4
  • Topotests debian 10 amd64 part 4

@NetDEF-CI
Copy link
Collaborator

NetDEF-CI commented Sep 23, 2023

Continuous Integration Result: FAILED

Continuous Integration Result: FAILED

See below for issues.
CI System Testrun URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/

This is a comment from an automated CI system.
For questions and feedback in regards to this CI system, please feel free to email
Martin Winter - mwinter (at) opensourcerouting.org.

Get source / Pull Request: Successful

Building Stage: Successful

Basic Tests: Failed

Topotests debian 10 amd64 part 0: Failed (click for details)

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPO0DEB10AMD64-14302/test

Topology Tests failed for Topotests debian 10 amd64 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0DEB10AMD64/TopotestLogs/log_topotests.txt
Topotests debian 10 amd64 part 0: Unknown Log
URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0DEB10AMD64/TopotestDetails/

Topotests Ubuntu 18.04 amd64 part 0: Failed (click for details)

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPOU1804-14302/test

Topology Tests failed for Topotests Ubuntu 18.04 amd64 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPOU1804/TopotestLogs/log_topotests.txt
Topotests Ubuntu 18.04 amd64 part 0: Unknown Log
URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPOU1804/TopotestDetails/

Topotests Ubuntu 18.04 arm8 part 0: Failed (click for details) Topotests Ubuntu 18.04 arm8 part 0: Unknown Log URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0U18ARM8/TopotestDetails/

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPO0U18ARM8-14302/test

Topology Tests failed for Topotests Ubuntu 18.04 arm8 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0U18ARM8/TopotestLogs/log_topotests.txt

Topotests Ubuntu 18.04 i386 part 0: Failed (click for details) Topotests Ubuntu 18.04 i386 part 0: Unknown Log URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0U18I386/TopotestDetails/

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPO0U18I386-14302/test

Topology Tests failed for Topotests Ubuntu 18.04 i386 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0U18I386/TopotestLogs/log_topotests.txt

Addresssanitizer topotests part 0: Failed (click for details)
## Error: heap-use-after-free

### AddressSanitizer error in topotest `test_srv6_route.py`, test `test_srv6_static_route`, router `r1`

    ERROR: AddressSanitizer: heap-use-after-free on address 0x604000030710 at pc 0x7fb7db80e6a2 bp 0x7fff9589cb80 sp 0x7fff9589c328
    READ of size 2 at 0x604000030710 thread T0
        #0 0x7fb7db80e6a1 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1)
        #1 0x7fb7db32ea9e in yang_data_new lib/yang.c:618
        #2 0x7fb7db297d9f in nb_candidate_edit_config_changes lib/northbound.c:884
        #3 0x7fb7db2a218e in nb_cli_apply_changes_internal lib/northbound_cli.c:148
        #4 0x7fb7db2a2bbe in nb_cli_apply_changes lib/northbound_cli.c:211
        #5 0x7fb7daafaf3c in static_route_nb_run staticd/static_vty.c:420
        #6 0x7fb7dab0b6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #7 0x7fb7dab0b6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #8 0x7fb7db1f2e41 in cmd_execute_command_real lib/command.c:993
        #9 0x7fb7db1f3872 in cmd_execute_command_strict lib/command.c:1102
        #10 0x7fb7db1f38d1 in command_config_read_one_line lib/command.c:1262
        #11 0x7fb7db1f3bb8 in config_from_file lib/command.c:1315
        #12 0x7fb7db326ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #13 0x55894d454340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #14 0x7fb7db30faec in event_call lib/event.c:1976
        #15 0x7fb7db252d92 in frr_run lib/libfrr.c:1213
        #16 0x55894d42f785 in main mgmtd/mgmt_main.c:283
        #17 0x7fb7da503c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
        #18 0x55894d42f119 in _start (/usr/lib/frr/mgmtd+0x2c119)
    
    0x604000030710 is located 0 bytes inside of 41-byte region [0x604000030710,0x604000030739)
    freed by thread T0 here:
        #0 0x7fb7db8757a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
        #1 0x7fb7db27048d in qfree lib/memory.c:130
        #2 0x7fb7daafad29 in static_route_nb_run staticd/static_vty.c:378
        #3 0x7fb7dab0b6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7fb7dab0b6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7fb7db1f2e41 in cmd_execute_command_real lib/command.c:993
        #6 0x7fb7db1f3872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7fb7db1f38d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7fb7db1f3bb8 in config_from_file lib/command.c:1315
        #9 0x7fb7db326ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x55894d454340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7fb7db30faec in event_call lib/event.c:1976
        #12 0x7fb7db252d92 in frr_run lib/libfrr.c:1213
        #13 0x55894d42f785 in main mgmtd/mgmt_main.c:283
        #14 0x7fb7da503c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    previously allocated by thread T0 here:
        #0 0x7fb7db80e538 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x77538)
        #1 0x7fb7db270153 in qstrdup lib/memory.c:117
        #2 0x7fb7daafaba2 in static_route_nb_run staticd/static_vty.c:366
        #3 0x7fb7dab0b6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7fb7dab0b6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7fb7db1f2e41 in cmd_execute_command_real lib/command.c:993
        #6 0x7fb7db1f3872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7fb7db1f38d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7fb7db1f3bb8 in config_from_file lib/command.c:1315
        #9 0x7fb7db326ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x55894d454340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7fb7db30faec in event_call lib/event.c:1976
        #12 0x7fb7db252d92 in frr_run lib/libfrr.c:1213
        #13 0x55894d42f785 in main mgmtd/mgmt_main.c:283
        #14 0x7fb7da503c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    SUMMARY: AddressSanitizer: heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1) in strdup
    Shadow bytes around the buggy address:
      0x0c087fffe090: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0a0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe0b0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0c0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0d0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
    =>0x0c087fffe0e0: fa fa[fd]fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0f0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe100: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd
      0x0c087fffe110: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe120: fa fa fd fd fd fd fd fa fa fa 00 00 00 00 00 00
      0x0c087fffe130: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
    Shadow byte legend (one shadow byte represents 8 application bytes):
      Addressable:           00
      Partially addressable: 01 02 03 04 05 06 07 
      Heap left redzone:       fa
      Freed heap region:       fd
      Stack left redzone:      f1
      Stack mid redzone:       f2
      Stack right redzone:     f3
      Stack after return:      f5
      Stack use after scope:   f8
      Global redzone:          f9
      Global init order:       f6
      Poisoned by user:        f7
      Container overflow:      fc
      Array cookie:            ac
      Intra object redzone:    bb
      ASan internal:           fe
      Left alloca redzone:     ca
      Right alloca redzone:    cb

---------------
## Error: heap-use-after-free

### AddressSanitizer error in topotest `test_srv6_route.py`, test `teardown_module`, router `r1`

    ERROR: AddressSanitizer: heap-use-after-free on address 0x604000030710 at pc 0x7fb7db80e6a2 bp 0x7fff9589cb80 sp 0x7fff9589c328
    READ of size 2 at 0x604000030710 thread T0
        #0 0x7fb7db80e6a1 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1)
        #1 0x7fb7db32ea9e in yang_data_new lib/yang.c:618
        #2 0x7fb7db297d9f in nb_candidate_edit_config_changes lib/northbound.c:884
        #3 0x7fb7db2a218e in nb_cli_apply_changes_internal lib/northbound_cli.c:148
        #4 0x7fb7db2a2bbe in nb_cli_apply_changes lib/northbound_cli.c:211
        #5 0x7fb7daafaf3c in static_route_nb_run staticd/static_vty.c:420
        #6 0x7fb7dab0b6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #7 0x7fb7dab0b6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #8 0x7fb7db1f2e41 in cmd_execute_command_real lib/command.c:993
        #9 0x7fb7db1f3872 in cmd_execute_command_strict lib/command.c:1102
        #10 0x7fb7db1f38d1 in command_config_read_one_line lib/command.c:1262
        #11 0x7fb7db1f3bb8 in config_from_file lib/command.c:1315
        #12 0x7fb7db326ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #13 0x55894d454340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #14 0x7fb7db30faec in event_call lib/event.c:1976
        #15 0x7fb7db252d92 in frr_run lib/libfrr.c:1213
        #16 0x55894d42f785 in main mgmtd/mgmt_main.c:283
        #17 0x7fb7da503c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
        #18 0x55894d42f119 in _start (/usr/lib/frr/mgmtd+0x2c119)
    
    0x604000030710 is located 0 bytes inside of 41-byte region [0x604000030710,0x604000030739)
    freed by thread T0 here:
        #0 0x7fb7db8757a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
        #1 0x7fb7db27048d in qfree lib/memory.c:130
        #2 0x7fb7daafad29 in static_route_nb_run staticd/static_vty.c:378
        #3 0x7fb7dab0b6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7fb7dab0b6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7fb7db1f2e41 in cmd_execute_command_real lib/command.c:993
        #6 0x7fb7db1f3872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7fb7db1f38d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7fb7db1f3bb8 in config_from_file lib/command.c:1315
        #9 0x7fb7db326ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x55894d454340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7fb7db30faec in event_call lib/event.c:1976
        #12 0x7fb7db252d92 in frr_run lib/libfrr.c:1213
        #13 0x55894d42f785 in main mgmtd/mgmt_main.c:283
        #14 0x7fb7da503c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    previously allocated by thread T0 here:
        #0 0x7fb7db80e538 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x77538)
        #1 0x7fb7db270153 in qstrdup lib/memory.c:117
        #2 0x7fb7daafaba2 in static_route_nb_run staticd/static_vty.c:366
        #3 0x7fb7dab0b6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7fb7dab0b6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7fb7db1f2e41 in cmd_execute_command_real lib/command.c:993
        #6 0x7fb7db1f3872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7fb7db1f38d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7fb7db1f3bb8 in config_from_file lib/command.c:1315
        #9 0x7fb7db326ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x55894d454340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7fb7db30faec in event_call lib/event.c:1976
        #12 0x7fb7db252d92 in frr_run lib/libfrr.c:1213
        #13 0x55894d42f785 in main mgmtd/mgmt_main.c:283
        #14 0x7fb7da503c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    SUMMARY: AddressSanitizer: heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1) in strdup
    Shadow bytes around the buggy address:
      0x0c087fffe090: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0a0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe0b0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0c0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0d0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
    =>0x0c087fffe0e0: fa fa[fd]fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0f0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe100: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd
      0x0c087fffe110: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe120: fa fa fd fd fd fd fd fa fa fa 00 00 00 00 00 00
      0x0c087fffe130: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
    Shadow byte legend (one shadow byte represents 8 application bytes):
      Addressable:           00
      Partially addressable: 01 02 03 04 05 06 07 
      Heap left redzone:       fa
      Freed heap region:       fd
      Stack left redzone:      f1
      Stack mid redzone:       f2
      Stack right redzone:     f3
      Stack after return:      f5
      Stack use after scope:   f8
      Global redzone:          f9
      Global init order:       f6
      Poisoned by user:        f7
      Container overflow:      fc
      Array cookie:            ac
      Intra object redzone:    bb
      ASan internal:           fe
      Left alloca redzone:     ca
      Right alloca redzone:    cb

---------------

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-ASAN3-14302/test

Topology Tests failed for Addresssanitizer topotests part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/ASAN3/TopotestLogs/log_topotests.txt
Addresssanitizer topotests part 0: Unknown Log
URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/ASAN3/Topotest-Details/

Successful on other platforms/tests
  • Topotests Ubuntu 18.04 amd64 part 3
  • Topotests Ubuntu 18.04 arm8 part 7
  • Topotests Ubuntu 18.04 i386 part 7
  • Addresssanitizer topotests part 7
  • Topotests Ubuntu 18.04 i386 part 2
  • Topotests Ubuntu 18.04 arm8 part 8
  • Topotests Ubuntu 18.04 amd64 part 5
  • Addresssanitizer topotests part 5
  • Topotests Ubuntu 18.04 i386 part 6
  • Topotests Ubuntu 18.04 i386 part 1
  • Topotests Ubuntu 18.04 i386 part 3
  • Topotests Ubuntu 18.04 i386 part 8
  • Topotests Ubuntu 18.04 amd64 part 2
  • Topotests Ubuntu 18.04 amd64 part 7
  • Debian 10 deb pkg check
  • Addresssanitizer topotests part 3
  • Topotests debian 10 amd64 part 8
  • Topotests Ubuntu 18.04 i386 part 5
  • Topotests Ubuntu 18.04 arm8 part 4
  • Addresssanitizer topotests part 2
  • Topotests Ubuntu 18.04 arm8 part 9
  • Topotests Ubuntu 18.04 arm8 part 2
  • Topotests debian 10 amd64 part 9
  • Addresssanitizer topotests part 9
  • CentOS 7 rpm pkg check
  • Topotests Ubuntu 18.04 amd64 part 4
  • Topotests debian 10 amd64 part 7
  • Topotests Ubuntu 18.04 amd64 part 9
  • Topotests Ubuntu 18.04 i386 part 9
  • Topotests Ubuntu 18.04 amd64 part 8
  • Addresssanitizer topotests part 8
  • Topotests debian 10 amd64 part 2
  • Static analyzer (clang)
  • Ubuntu 18.04 deb pkg check
  • Addresssanitizer topotests part 6
  • Ubuntu 20.04 deb pkg check
  • Topotests Ubuntu 18.04 arm8 part 5
  • Topotests debian 10 amd64 part 1
  • Topotests Ubuntu 18.04 amd64 part 1
  • Topotests Ubuntu 18.04 arm8 part 6
  • Topotests Ubuntu 18.04 arm8 part 1
  • Topotests debian 10 amd64 part 3
  • Topotests debian 10 amd64 part 6
  • Topotests Ubuntu 18.04 amd64 part 6
  • Addresssanitizer topotests part 4
  • Topotests Ubuntu 18.04 arm8 part 3
  • Debian 9 deb pkg check
  • Topotests debian 10 amd64 part 5
  • Addresssanitizer topotests part 1
  • Topotests Ubuntu 18.04 i386 part 4
  • Topotests debian 10 amd64 part 4

@NetDEF-CI
Copy link
Collaborator

NetDEF-CI commented Sep 24, 2023

Continuous Integration Result: FAILED

Continuous Integration Result: FAILED

See below for issues.
CI System Testrun URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/

This is a comment from an automated CI system.
For questions and feedback in regards to this CI system, please feel free to email
Martin Winter - mwinter (at) opensourcerouting.org.

Get source / Pull Request: Successful

Building Stage: Successful

Basic Tests: Failed

Topotests debian 10 amd64 part 0: Failed (click for details)

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPO0DEB10AMD64-14302/test

Topology Tests failed for Topotests debian 10 amd64 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0DEB10AMD64/TopotestLogs/log_topotests.txt
Topotests debian 10 amd64 part 0: Unknown Log
URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0DEB10AMD64/TopotestDetails/

Topotests Ubuntu 18.04 amd64 part 0: Failed (click for details)

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPOU1804-14302/test

Topology Tests failed for Topotests Ubuntu 18.04 amd64 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPOU1804/TopotestLogs/log_topotests.txt
Topotests Ubuntu 18.04 amd64 part 0: Unknown Log
URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPOU1804/TopotestDetails/

Topotests Ubuntu 18.04 arm8 part 0: Failed (click for details) Topotests Ubuntu 18.04 arm8 part 0: Unknown Log URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0U18ARM8/TopotestDetails/

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPO0U18ARM8-14302/test

Topology Tests failed for Topotests Ubuntu 18.04 arm8 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0U18ARM8/TopotestLogs/log_topotests.txt

Topotests Ubuntu 18.04 i386 part 0: Failed (click for details) Topotests Ubuntu 18.04 i386 part 0: Unknown Log URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0U18I386/TopotestDetails/

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPO0U18I386-14302/test

Topology Tests failed for Topotests Ubuntu 18.04 i386 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/TOPO0U18I386/TopotestLogs/log_topotests.txt

Addresssanitizer topotests part 0: Failed (click for details)
## Error: heap-use-after-free

### AddressSanitizer error in topotest `test_srv6_route.py`, test `test_srv6_static_route`, router `r1`

    ERROR: AddressSanitizer: heap-use-after-free on address 0x604000030710 at pc 0x7f912db216a2 bp 0x7ffce6941480 sp 0x7ffce6940c28
    READ of size 2 at 0x604000030710 thread T0
        #0 0x7f912db216a1 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1)
        #1 0x7f912d641a9e in yang_data_new lib/yang.c:618
        #2 0x7f912d5aad9f in nb_candidate_edit_config_changes lib/northbound.c:884
        #3 0x7f912d5b518e in nb_cli_apply_changes_internal lib/northbound_cli.c:148
        #4 0x7f912d5b5bbe in nb_cli_apply_changes lib/northbound_cli.c:211
        #5 0x7f912ce0df3c in static_route_nb_run staticd/static_vty.c:420
        #6 0x7f912ce1e6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #7 0x7f912ce1e6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #8 0x7f912d505e41 in cmd_execute_command_real lib/command.c:993
        #9 0x7f912d506872 in cmd_execute_command_strict lib/command.c:1102
        #10 0x7f912d5068d1 in command_config_read_one_line lib/command.c:1262
        #11 0x7f912d506bb8 in config_from_file lib/command.c:1315
        #12 0x7f912d639ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #13 0x564c60f65340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #14 0x7f912d622aec in event_call lib/event.c:1976
        #15 0x7f912d565d92 in frr_run lib/libfrr.c:1213
        #16 0x564c60f40785 in main mgmtd/mgmt_main.c:283
        #17 0x7f912c816c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
        #18 0x564c60f40119 in _start (/usr/lib/frr/mgmtd+0x2c119)
    
    0x604000030710 is located 0 bytes inside of 41-byte region [0x604000030710,0x604000030739)
    freed by thread T0 here:
        #0 0x7f912db887a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
        #1 0x7f912d58348d in qfree lib/memory.c:130
        #2 0x7f912ce0dd29 in static_route_nb_run staticd/static_vty.c:378
        #3 0x7f912ce1e6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7f912ce1e6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7f912d505e41 in cmd_execute_command_real lib/command.c:993
        #6 0x7f912d506872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7f912d5068d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7f912d506bb8 in config_from_file lib/command.c:1315
        #9 0x7f912d639ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x564c60f65340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7f912d622aec in event_call lib/event.c:1976
        #12 0x7f912d565d92 in frr_run lib/libfrr.c:1213
        #13 0x564c60f40785 in main mgmtd/mgmt_main.c:283
        #14 0x7f912c816c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    previously allocated by thread T0 here:
        #0 0x7f912db21538 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x77538)
        #1 0x7f912d583153 in qstrdup lib/memory.c:117
        #2 0x7f912ce0dba2 in static_route_nb_run staticd/static_vty.c:366
        #3 0x7f912ce1e6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7f912ce1e6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7f912d505e41 in cmd_execute_command_real lib/command.c:993
        #6 0x7f912d506872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7f912d5068d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7f912d506bb8 in config_from_file lib/command.c:1315
        #9 0x7f912d639ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x564c60f65340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7f912d622aec in event_call lib/event.c:1976
        #12 0x7f912d565d92 in frr_run lib/libfrr.c:1213
        #13 0x564c60f40785 in main mgmtd/mgmt_main.c:283
        #14 0x7f912c816c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    SUMMARY: AddressSanitizer: heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1) in strdup
    Shadow bytes around the buggy address:
      0x0c087fffe090: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0a0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe0b0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0c0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0d0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
    =>0x0c087fffe0e0: fa fa[fd]fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0f0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe100: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd
      0x0c087fffe110: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe120: fa fa fd fd fd fd fd fa fa fa 00 00 00 00 00 00
      0x0c087fffe130: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
    Shadow byte legend (one shadow byte represents 8 application bytes):
      Addressable:           00
      Partially addressable: 01 02 03 04 05 06 07 
      Heap left redzone:       fa
      Freed heap region:       fd
      Stack left redzone:      f1
      Stack mid redzone:       f2
      Stack right redzone:     f3
      Stack after return:      f5
      Stack use after scope:   f8
      Global redzone:          f9
      Global init order:       f6
      Poisoned by user:        f7
      Container overflow:      fc
      Array cookie:            ac
      Intra object redzone:    bb
      ASan internal:           fe
      Left alloca redzone:     ca
      Right alloca redzone:    cb

---------------
## Error: heap-use-after-free

### AddressSanitizer error in topotest `test_srv6_route.py`, test `teardown_module`, router `r1`

    ERROR: AddressSanitizer: heap-use-after-free on address 0x604000030710 at pc 0x7f912db216a2 bp 0x7ffce6941480 sp 0x7ffce6940c28
    READ of size 2 at 0x604000030710 thread T0
        #0 0x7f912db216a1 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1)
        #1 0x7f912d641a9e in yang_data_new lib/yang.c:618
        #2 0x7f912d5aad9f in nb_candidate_edit_config_changes lib/northbound.c:884
        #3 0x7f912d5b518e in nb_cli_apply_changes_internal lib/northbound_cli.c:148
        #4 0x7f912d5b5bbe in nb_cli_apply_changes lib/northbound_cli.c:211
        #5 0x7f912ce0df3c in static_route_nb_run staticd/static_vty.c:420
        #6 0x7f912ce1e6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #7 0x7f912ce1e6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #8 0x7f912d505e41 in cmd_execute_command_real lib/command.c:993
        #9 0x7f912d506872 in cmd_execute_command_strict lib/command.c:1102
        #10 0x7f912d5068d1 in command_config_read_one_line lib/command.c:1262
        #11 0x7f912d506bb8 in config_from_file lib/command.c:1315
        #12 0x7f912d639ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #13 0x564c60f65340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #14 0x7f912d622aec in event_call lib/event.c:1976
        #15 0x7f912d565d92 in frr_run lib/libfrr.c:1213
        #16 0x564c60f40785 in main mgmtd/mgmt_main.c:283
        #17 0x7f912c816c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
        #18 0x564c60f40119 in _start (/usr/lib/frr/mgmtd+0x2c119)
    
    0x604000030710 is located 0 bytes inside of 41-byte region [0x604000030710,0x604000030739)
    freed by thread T0 here:
        #0 0x7f912db887a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
        #1 0x7f912d58348d in qfree lib/memory.c:130
        #2 0x7f912ce0dd29 in static_route_nb_run staticd/static_vty.c:378
        #3 0x7f912ce1e6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7f912ce1e6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7f912d505e41 in cmd_execute_command_real lib/command.c:993
        #6 0x7f912d506872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7f912d5068d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7f912d506bb8 in config_from_file lib/command.c:1315
        #9 0x7f912d639ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x564c60f65340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7f912d622aec in event_call lib/event.c:1976
        #12 0x7f912d565d92 in frr_run lib/libfrr.c:1213
        #13 0x564c60f40785 in main mgmtd/mgmt_main.c:283
        #14 0x7f912c816c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    previously allocated by thread T0 here:
        #0 0x7f912db21538 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x77538)
        #1 0x7f912d583153 in qstrdup lib/memory.c:117
        #2 0x7f912ce0dba2 in static_route_nb_run staticd/static_vty.c:366
        #3 0x7f912ce1e6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7f912ce1e6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7f912d505e41 in cmd_execute_command_real lib/command.c:993
        #6 0x7f912d506872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7f912d5068d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7f912d506bb8 in config_from_file lib/command.c:1315
        #9 0x7f912d639ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x564c60f65340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7f912d622aec in event_call lib/event.c:1976
        #12 0x7f912d565d92 in frr_run lib/libfrr.c:1213
        #13 0x564c60f40785 in main mgmtd/mgmt_main.c:283
        #14 0x7f912c816c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    SUMMARY: AddressSanitizer: heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1) in strdup
    Shadow bytes around the buggy address:
      0x0c087fffe090: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0a0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe0b0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0c0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0d0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
    =>0x0c087fffe0e0: fa fa[fd]fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0f0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe100: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd
      0x0c087fffe110: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe120: fa fa fd fd fd fd fd fa fa fa 00 00 00 00 00 00
      0x0c087fffe130: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
    Shadow byte legend (one shadow byte represents 8 application bytes):
      Addressable:           00
      Partially addressable: 01 02 03 04 05 06 07 
      Heap left redzone:       fa
      Freed heap region:       fd
      Stack left redzone:      f1
      Stack mid redzone:       f2
      Stack right redzone:     f3
      Stack after return:      f5
      Stack use after scope:   f8
      Global redzone:          f9
      Global init order:       f6
      Poisoned by user:        f7
      Container overflow:      fc
      Array cookie:            ac
      Intra object redzone:    bb
      ASan internal:           fe
      Left alloca redzone:     ca
      Right alloca redzone:    cb

---------------

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-ASAN3-14302/test

Topology Tests failed for Addresssanitizer topotests part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/ASAN3/TopotestLogs/log_topotests.txt
Addresssanitizer topotests part 0: Unknown Log
URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14302/artifact/ASAN3/Topotest-Details/

Successful on other platforms/tests
  • Topotests Ubuntu 18.04 amd64 part 3
  • Topotests Ubuntu 18.04 arm8 part 7
  • Topotests Ubuntu 18.04 i386 part 7
  • Addresssanitizer topotests part 7
  • Topotests Ubuntu 18.04 i386 part 2
  • Topotests Ubuntu 18.04 arm8 part 8
  • Topotests Ubuntu 18.04 amd64 part 5
  • Addresssanitizer topotests part 5
  • Topotests Ubuntu 18.04 i386 part 6
  • Topotests Ubuntu 18.04 i386 part 1
  • Topotests Ubuntu 18.04 i386 part 3
  • Topotests Ubuntu 18.04 i386 part 8
  • Topotests Ubuntu 18.04 amd64 part 2
  • Topotests Ubuntu 18.04 amd64 part 7
  • Debian 10 deb pkg check
  • Addresssanitizer topotests part 3
  • Topotests debian 10 amd64 part 8
  • Topotests Ubuntu 18.04 i386 part 5
  • Topotests Ubuntu 18.04 arm8 part 4
  • Addresssanitizer topotests part 2
  • Topotests Ubuntu 18.04 arm8 part 9
  • Topotests Ubuntu 18.04 arm8 part 2
  • Topotests debian 10 amd64 part 9
  • Addresssanitizer topotests part 9
  • CentOS 7 rpm pkg check
  • Topotests Ubuntu 18.04 amd64 part 4
  • Topotests debian 10 amd64 part 7
  • Topotests Ubuntu 18.04 amd64 part 9
  • Topotests Ubuntu 18.04 i386 part 9
  • Topotests Ubuntu 18.04 amd64 part 8
  • Addresssanitizer topotests part 8
  • Topotests debian 10 amd64 part 2
  • Static analyzer (clang)
  • Ubuntu 18.04 deb pkg check
  • Addresssanitizer topotests part 6
  • Ubuntu 20.04 deb pkg check
  • Topotests Ubuntu 18.04 arm8 part 5
  • Topotests debian 10 amd64 part 1
  • Topotests Ubuntu 18.04 amd64 part 1
  • Topotests Ubuntu 18.04 arm8 part 6
  • Topotests Ubuntu 18.04 arm8 part 1
  • Topotests debian 10 amd64 part 3
  • Topotests debian 10 amd64 part 6
  • Topotests Ubuntu 18.04 amd64 part 6
  • Addresssanitizer topotests part 4
  • Topotests Ubuntu 18.04 arm8 part 3
  • Debian 9 deb pkg check
  • Topotests debian 10 amd64 part 5
  • Addresssanitizer topotests part 1
  • Topotests Ubuntu 18.04 i386 part 4
  • Topotests debian 10 amd64 part 4

mobash-rasool
mobash-rasool previously approved these changes Sep 24, 2023
@mobash-rasool
Copy link
Contributor

ci:rerun

@NetDEF-CI
Copy link
Collaborator

NetDEF-CI commented Sep 24, 2023

Continuous Integration Result: FAILED

Continuous Integration Result: FAILED

See below for issues.
CI System Testrun URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/

This is a comment from an automated CI system.
For questions and feedback in regards to this CI system, please feel free to email
Martin Winter - mwinter (at) opensourcerouting.org.

Get source / Pull Request: Successful

Building Stage: Successful

Basic Tests: Failed

Addresssanitizer topotests part 0: Failed (click for details)
## Error: heap-use-after-free

### AddressSanitizer error in topotest `test_srv6_route.py`, test `test_srv6_static_route`, router `r1`

    ERROR: AddressSanitizer: heap-use-after-free on address 0x604000030710 at pc 0x7faa8288f6a2 bp 0x7ffd7faadc10 sp 0x7ffd7faad3b8
    READ of size 2 at 0x604000030710 thread T0
        #0 0x7faa8288f6a1 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1)
        #1 0x7faa823afa9e in yang_data_new lib/yang.c:618
        #2 0x7faa82318d9f in nb_candidate_edit_config_changes lib/northbound.c:884
        #3 0x7faa8232318e in nb_cli_apply_changes_internal lib/northbound_cli.c:148
        #4 0x7faa82323bbe in nb_cli_apply_changes lib/northbound_cli.c:211
        #5 0x7faa81b7bf3c in static_route_nb_run staticd/static_vty.c:420
        #6 0x7faa81b8c6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #7 0x7faa81b8c6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #8 0x7faa82273e41 in cmd_execute_command_real lib/command.c:993
        #9 0x7faa82274872 in cmd_execute_command_strict lib/command.c:1102
        #10 0x7faa822748d1 in command_config_read_one_line lib/command.c:1262
        #11 0x7faa82274bb8 in config_from_file lib/command.c:1315
        #12 0x7faa823a7ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #13 0x5596de296340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #14 0x7faa82390aec in event_call lib/event.c:1976
        #15 0x7faa822d3d92 in frr_run lib/libfrr.c:1213
        #16 0x5596de271785 in main mgmtd/mgmt_main.c:283
        #17 0x7faa81584c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
        #18 0x5596de271119 in _start (/usr/lib/frr/mgmtd+0x2c119)
    
    0x604000030710 is located 0 bytes inside of 41-byte region [0x604000030710,0x604000030739)
    freed by thread T0 here:
        #0 0x7faa828f67a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
        #1 0x7faa822f148d in qfree lib/memory.c:130
        #2 0x7faa81b7bd29 in static_route_nb_run staticd/static_vty.c:378
        #3 0x7faa81b8c6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7faa81b8c6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7faa82273e41 in cmd_execute_command_real lib/command.c:993
        #6 0x7faa82274872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7faa822748d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7faa82274bb8 in config_from_file lib/command.c:1315
        #9 0x7faa823a7ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x5596de296340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7faa82390aec in event_call lib/event.c:1976
        #12 0x7faa822d3d92 in frr_run lib/libfrr.c:1213
        #13 0x5596de271785 in main mgmtd/mgmt_main.c:283
        #14 0x7faa81584c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    previously allocated by thread T0 here:
        #0 0x7faa8288f538 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x77538)
        #1 0x7faa822f1153 in qstrdup lib/memory.c:117
        #2 0x7faa81b7bba2 in static_route_nb_run staticd/static_vty.c:366
        #3 0x7faa81b8c6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7faa81b8c6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7faa82273e41 in cmd_execute_command_real lib/command.c:993
        #6 0x7faa82274872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7faa822748d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7faa82274bb8 in config_from_file lib/command.c:1315
        #9 0x7faa823a7ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x5596de296340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7faa82390aec in event_call lib/event.c:1976
        #12 0x7faa822d3d92 in frr_run lib/libfrr.c:1213
        #13 0x5596de271785 in main mgmtd/mgmt_main.c:283
        #14 0x7faa81584c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    SUMMARY: AddressSanitizer: heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1) in strdup
    Shadow bytes around the buggy address:
      0x0c087fffe090: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0a0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe0b0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0c0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0d0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
    =>0x0c087fffe0e0: fa fa[fd]fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0f0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe100: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd
      0x0c087fffe110: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe120: fa fa fd fd fd fd fd fa fa fa 00 00 00 00 00 00
      0x0c087fffe130: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
    Shadow byte legend (one shadow byte represents 8 application bytes):
      Addressable:           00
      Partially addressable: 01 02 03 04 05 06 07 
      Heap left redzone:       fa
      Freed heap region:       fd
      Stack left redzone:      f1
      Stack mid redzone:       f2
      Stack right redzone:     f3
      Stack after return:      f5
      Stack use after scope:   f8
      Global redzone:          f9
      Global init order:       f6
      Poisoned by user:        f7
      Container overflow:      fc
      Array cookie:            ac
      Intra object redzone:    bb
      ASan internal:           fe
      Left alloca redzone:     ca
      Right alloca redzone:    cb

---------------
## Error: heap-use-after-free

### AddressSanitizer error in topotest `test_srv6_route.py`, test `teardown_module`, router `r1`

    ERROR: AddressSanitizer: heap-use-after-free on address 0x604000030710 at pc 0x7faa8288f6a2 bp 0x7ffd7faadc10 sp 0x7ffd7faad3b8
    READ of size 2 at 0x604000030710 thread T0
        #0 0x7faa8288f6a1 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1)
        #1 0x7faa823afa9e in yang_data_new lib/yang.c:618
        #2 0x7faa82318d9f in nb_candidate_edit_config_changes lib/northbound.c:884
        #3 0x7faa8232318e in nb_cli_apply_changes_internal lib/northbound_cli.c:148
        #4 0x7faa82323bbe in nb_cli_apply_changes lib/northbound_cli.c:211
        #5 0x7faa81b7bf3c in static_route_nb_run staticd/static_vty.c:420
        #6 0x7faa81b8c6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #7 0x7faa81b8c6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #8 0x7faa82273e41 in cmd_execute_command_real lib/command.c:993
        #9 0x7faa82274872 in cmd_execute_command_strict lib/command.c:1102
        #10 0x7faa822748d1 in command_config_read_one_line lib/command.c:1262
        #11 0x7faa82274bb8 in config_from_file lib/command.c:1315
        #12 0x7faa823a7ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #13 0x5596de296340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #14 0x7faa82390aec in event_call lib/event.c:1976
        #15 0x7faa822d3d92 in frr_run lib/libfrr.c:1213
        #16 0x5596de271785 in main mgmtd/mgmt_main.c:283
        #17 0x7faa81584c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
        #18 0x5596de271119 in _start (/usr/lib/frr/mgmtd+0x2c119)
    
    0x604000030710 is located 0 bytes inside of 41-byte region [0x604000030710,0x604000030739)
    freed by thread T0 here:
        #0 0x7faa828f67a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
        #1 0x7faa822f148d in qfree lib/memory.c:130
        #2 0x7faa81b7bd29 in static_route_nb_run staticd/static_vty.c:378
        #3 0x7faa81b8c6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7faa81b8c6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7faa82273e41 in cmd_execute_command_real lib/command.c:993
        #6 0x7faa82274872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7faa822748d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7faa82274bb8 in config_from_file lib/command.c:1315
        #9 0x7faa823a7ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x5596de296340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7faa82390aec in event_call lib/event.c:1976
        #12 0x7faa822d3d92 in frr_run lib/libfrr.c:1213
        #13 0x5596de271785 in main mgmtd/mgmt_main.c:283
        #14 0x7faa81584c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    previously allocated by thread T0 here:
        #0 0x7faa8288f538 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x77538)
        #1 0x7faa822f1153 in qstrdup lib/memory.c:117
        #2 0x7faa81b7bba2 in static_route_nb_run staticd/static_vty.c:366
        #3 0x7faa81b8c6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7faa81b8c6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7faa82273e41 in cmd_execute_command_real lib/command.c:993
        #6 0x7faa82274872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7faa822748d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7faa82274bb8 in config_from_file lib/command.c:1315
        #9 0x7faa823a7ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x5596de296340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7faa82390aec in event_call lib/event.c:1976
        #12 0x7faa822d3d92 in frr_run lib/libfrr.c:1213
        #13 0x5596de271785 in main mgmtd/mgmt_main.c:283
        #14 0x7faa81584c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    SUMMARY: AddressSanitizer: heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1) in strdup
    Shadow bytes around the buggy address:
      0x0c087fffe090: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0a0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe0b0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0c0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0d0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
    =>0x0c087fffe0e0: fa fa[fd]fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0f0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe100: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd
      0x0c087fffe110: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe120: fa fa fd fd fd fd fd fa fa fa 00 00 00 00 00 00
      0x0c087fffe130: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
    Shadow byte legend (one shadow byte represents 8 application bytes):
      Addressable:           00
      Partially addressable: 01 02 03 04 05 06 07 
      Heap left redzone:       fa
      Freed heap region:       fd
      Stack left redzone:      f1
      Stack mid redzone:       f2
      Stack right redzone:     f3
      Stack after return:      f5
      Stack use after scope:   f8
      Global redzone:          f9
      Global init order:       f6
      Poisoned by user:        f7
      Container overflow:      fc
      Array cookie:            ac
      Intra object redzone:    bb
      ASan internal:           fe
      Left alloca redzone:     ca
      Right alloca redzone:    cb

---------------

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-ASAN3-14318/test

Topology Tests failed for Addresssanitizer topotests part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/ASAN3/TopotestLogs/log_topotests.txt
Addresssanitizer topotests part 0: Unknown Log
URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/ASAN3/Topotest-Details/

Topotests debian 10 amd64 part 0: Failed (click for details)

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPO0DEB10AMD64-14318/test

Topology Tests failed for Topotests debian 10 amd64 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/TOPO0DEB10AMD64/TopotestLogs/log_topotests.txt
Topotests debian 10 amd64 part 0: Unknown Log
URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/TOPO0DEB10AMD64/TopotestDetails/

Topotests Ubuntu 18.04 i386 part 0: Failed (click for details) Topotests Ubuntu 18.04 i386 part 0: Unknown Log URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/TOPO0U18I386/TopotestDetails/

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPO0U18I386-14318/test

Topology Tests failed for Topotests Ubuntu 18.04 i386 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/TOPO0U18I386/TopotestLogs/log_topotests.txt

Topotests Ubuntu 18.04 amd64 part 0: Failed (click for details)

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPOU1804-14318/test

Topology Tests failed for Topotests Ubuntu 18.04 amd64 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/TOPOU1804/TopotestLogs/log_topotests.txt
Topotests Ubuntu 18.04 amd64 part 0: Unknown Log
URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/TOPOU1804/TopotestDetails/

Topotests Ubuntu 18.04 arm8 part 0: Failed (click for details) Topotests Ubuntu 18.04 arm8 part 0: Unknown Log URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/TOPO0U18ARM8/TopotestDetails/

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPO0U18ARM8-14318/test

Topology Tests failed for Topotests Ubuntu 18.04 arm8 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/TOPO0U18ARM8/TopotestLogs/log_topotests.txt

Successful on other platforms/tests
  • Addresssanitizer topotests part 4
  • Topotests Ubuntu 18.04 arm8 part 3
  • Topotests debian 10 amd64 part 9
  • Addresssanitizer topotests part 5
  • Topotests debian 10 amd64 part 4
  • Topotests Ubuntu 18.04 amd64 part 3
  • Topotests Ubuntu 18.04 amd64 part 2
  • Topotests debian 10 amd64 part 3
  • Topotests debian 10 amd64 part 8
  • Topotests Ubuntu 18.04 arm8 part 4
  • Addresssanitizer topotests part 2
  • Topotests Ubuntu 18.04 arm8 part 9
  • Topotests Ubuntu 18.04 amd64 part 5
  • Ubuntu 20.04 deb pkg check
  • Topotests Ubuntu 18.04 arm8 part 2
  • Topotests Ubuntu 18.04 i386 part 6
  • Addresssanitizer topotests part 9
  • Topotests Ubuntu 18.04 i386 part 1
  • Topotests Ubuntu 18.04 amd64 part 4
  • Topotests Ubuntu 18.04 amd64 part 9
  • Topotests Ubuntu 18.04 arm8 part 7
  • Topotests Ubuntu 18.04 i386 part 3
  • Topotests Ubuntu 18.04 i386 part 8
  • Topotests Ubuntu 18.04 amd64 part 7
  • Debian 10 deb pkg check
  • Addresssanitizer topotests part 3
  • Addresssanitizer topotests part 7
  • Addresssanitizer topotests part 6
  • Topotests Ubuntu 18.04 arm8 part 5
  • Topotests debian 10 amd64 part 1
  • CentOS 7 rpm pkg check
  • Topotests debian 10 amd64 part 7
  • Topotests Ubuntu 18.04 i386 part 9
  • Topotests debian 10 amd64 part 2
  • Topotests Ubuntu 18.04 amd64 part 8
  • Static analyzer (clang)
  • Topotests Ubuntu 18.04 i386 part 5
  • Ubuntu 18.04 deb pkg check
  • Debian 9 deb pkg check
  • Topotests debian 10 amd64 part 5
  • Addresssanitizer topotests part 1
  • Topotests Ubuntu 18.04 i386 part 4
  • Topotests Ubuntu 18.04 amd64 part 1
  • Topotests Ubuntu 18.04 arm8 part 6
  • Topotests Ubuntu 18.04 arm8 part 1
  • Addresssanitizer topotests part 8
  • Topotests Ubuntu 18.04 i386 part 7
  • Topotests debian 10 amd64 part 6
  • Topotests Ubuntu 18.04 i386 part 2
  • Topotests Ubuntu 18.04 amd64 part 6
  • Topotests Ubuntu 18.04 arm8 part 8

@NetDEF-CI
Copy link
Collaborator

Continuous Integration Result: FAILED

See below for issues.
CI System Testrun URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/

This is a comment from an automated CI system.
For questions and feedback in regards to this CI system, please feel free to email
Martin Winter - mwinter (at) opensourcerouting.org.

Get source / Pull Request: Successful

Building Stage: Successful

Basic Tests: Failed

Addresssanitizer topotests part 0: Failed (click for details)
## Error: heap-use-after-free

### AddressSanitizer error in topotest `test_srv6_route.py`, test `test_srv6_static_route`, router `r1`

    ERROR: AddressSanitizer: heap-use-after-free on address 0x604000030710 at pc 0x7f46a42616a2 bp 0x7ffdd7dae0b0 sp 0x7ffdd7dad858
    READ of size 2 at 0x604000030710 thread T0
        #0 0x7f46a42616a1 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1)
        #1 0x7f46a3d81a9e in yang_data_new lib/yang.c:618
        #2 0x7f46a3cead9f in nb_candidate_edit_config_changes lib/northbound.c:884
        #3 0x7f46a3cf518e in nb_cli_apply_changes_internal lib/northbound_cli.c:148
        #4 0x7f46a3cf5bbe in nb_cli_apply_changes lib/northbound_cli.c:211
        #5 0x7f46a354df3c in static_route_nb_run staticd/static_vty.c:420
        #6 0x7f46a355e6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #7 0x7f46a355e6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #8 0x7f46a3c45e41 in cmd_execute_command_real lib/command.c:993
        #9 0x7f46a3c46872 in cmd_execute_command_strict lib/command.c:1102
        #10 0x7f46a3c468d1 in command_config_read_one_line lib/command.c:1262
        #11 0x7f46a3c46bb8 in config_from_file lib/command.c:1315
        #12 0x7f46a3d79ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #13 0x5577aa4ca340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #14 0x7f46a3d62aec in event_call lib/event.c:1976
        #15 0x7f46a3ca5d92 in frr_run lib/libfrr.c:1213
        #16 0x5577aa4a5785 in main mgmtd/mgmt_main.c:283
        #17 0x7f46a2f56c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
        #18 0x5577aa4a5119 in _start (/usr/lib/frr/mgmtd+0x2c119)
    
    0x604000030710 is located 0 bytes inside of 41-byte region [0x604000030710,0x604000030739)
    freed by thread T0 here:
        #0 0x7f46a42c87a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
        #1 0x7f46a3cc348d in qfree lib/memory.c:130
        #2 0x7f46a354dd29 in static_route_nb_run staticd/static_vty.c:378
        #3 0x7f46a355e6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7f46a355e6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7f46a3c45e41 in cmd_execute_command_real lib/command.c:993
        #6 0x7f46a3c46872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7f46a3c468d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7f46a3c46bb8 in config_from_file lib/command.c:1315
        #9 0x7f46a3d79ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x5577aa4ca340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7f46a3d62aec in event_call lib/event.c:1976
        #12 0x7f46a3ca5d92 in frr_run lib/libfrr.c:1213
        #13 0x5577aa4a5785 in main mgmtd/mgmt_main.c:283
        #14 0x7f46a2f56c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    previously allocated by thread T0 here:
        #0 0x7f46a4261538 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x77538)
        #1 0x7f46a3cc3153 in qstrdup lib/memory.c:117
        #2 0x7f46a354dba2 in static_route_nb_run staticd/static_vty.c:366
        #3 0x7f46a355e6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7f46a355e6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7f46a3c45e41 in cmd_execute_command_real lib/command.c:993
        #6 0x7f46a3c46872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7f46a3c468d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7f46a3c46bb8 in config_from_file lib/command.c:1315
        #9 0x7f46a3d79ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x5577aa4ca340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7f46a3d62aec in event_call lib/event.c:1976
        #12 0x7f46a3ca5d92 in frr_run lib/libfrr.c:1213
        #13 0x5577aa4a5785 in main mgmtd/mgmt_main.c:283
        #14 0x7f46a2f56c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    SUMMARY: AddressSanitizer: heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1) in strdup
    Shadow bytes around the buggy address:
      0x0c087fffe090: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0a0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe0b0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0c0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0d0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
    =>0x0c087fffe0e0: fa fa[fd]fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0f0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe100: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd
      0x0c087fffe110: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe120: fa fa fd fd fd fd fd fa fa fa 00 00 00 00 00 00
      0x0c087fffe130: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
    Shadow byte legend (one shadow byte represents 8 application bytes):
      Addressable:           00
      Partially addressable: 01 02 03 04 05 06 07 
      Heap left redzone:       fa
      Freed heap region:       fd
      Stack left redzone:      f1
      Stack mid redzone:       f2
      Stack right redzone:     f3
      Stack after return:      f5
      Stack use after scope:   f8
      Global redzone:          f9
      Global init order:       f6
      Poisoned by user:        f7
      Container overflow:      fc
      Array cookie:            ac
      Intra object redzone:    bb
      ASan internal:           fe
      Left alloca redzone:     ca
      Right alloca redzone:    cb

---------------
## Error: heap-use-after-free

### AddressSanitizer error in topotest `test_srv6_route.py`, test `teardown_module`, router `r1`

    ERROR: AddressSanitizer: heap-use-after-free on address 0x604000030710 at pc 0x7f46a42616a2 bp 0x7ffdd7dae0b0 sp 0x7ffdd7dad858
    READ of size 2 at 0x604000030710 thread T0
        #0 0x7f46a42616a1 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1)
        #1 0x7f46a3d81a9e in yang_data_new lib/yang.c:618
        #2 0x7f46a3cead9f in nb_candidate_edit_config_changes lib/northbound.c:884
        #3 0x7f46a3cf518e in nb_cli_apply_changes_internal lib/northbound_cli.c:148
        #4 0x7f46a3cf5bbe in nb_cli_apply_changes lib/northbound_cli.c:211
        #5 0x7f46a354df3c in static_route_nb_run staticd/static_vty.c:420
        #6 0x7f46a355e6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #7 0x7f46a355e6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #8 0x7f46a3c45e41 in cmd_execute_command_real lib/command.c:993
        #9 0x7f46a3c46872 in cmd_execute_command_strict lib/command.c:1102
        #10 0x7f46a3c468d1 in command_config_read_one_line lib/command.c:1262
        #11 0x7f46a3c46bb8 in config_from_file lib/command.c:1315
        #12 0x7f46a3d79ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #13 0x5577aa4ca340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #14 0x7f46a3d62aec in event_call lib/event.c:1976
        #15 0x7f46a3ca5d92 in frr_run lib/libfrr.c:1213
        #16 0x5577aa4a5785 in main mgmtd/mgmt_main.c:283
        #17 0x7f46a2f56c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
        #18 0x5577aa4a5119 in _start (/usr/lib/frr/mgmtd+0x2c119)
    
    0x604000030710 is located 0 bytes inside of 41-byte region [0x604000030710,0x604000030739)
    freed by thread T0 here:
        #0 0x7f46a42c87a8 in __interceptor_free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0xde7a8)
        #1 0x7f46a3cc348d in qfree lib/memory.c:130
        #2 0x7f46a354dd29 in static_route_nb_run staticd/static_vty.c:378
        #3 0x7f46a355e6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7f46a355e6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7f46a3c45e41 in cmd_execute_command_real lib/command.c:993
        #6 0x7f46a3c46872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7f46a3c468d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7f46a3c46bb8 in config_from_file lib/command.c:1315
        #9 0x7f46a3d79ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x5577aa4ca340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7f46a3d62aec in event_call lib/event.c:1976
        #12 0x7f46a3ca5d92 in frr_run lib/libfrr.c:1213
        #13 0x5577aa4a5785 in main mgmtd/mgmt_main.c:283
        #14 0x7f46a2f56c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    previously allocated by thread T0 here:
        #0 0x7f46a4261538 in strdup (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x77538)
        #1 0x7f46a3cc3153 in qstrdup lib/memory.c:117
        #2 0x7f46a354dba2 in static_route_nb_run staticd/static_vty.c:366
        #3 0x7f46a355e6c2 in ipv6_route_magic staticd/static_vty.c:1173
        #4 0x7f46a355e6c2 in ipv6_route staticd/static_vty_clippy.c:1661
        #5 0x7f46a3c45e41 in cmd_execute_command_real lib/command.c:993
        #6 0x7f46a3c46872 in cmd_execute_command_strict lib/command.c:1102
        #7 0x7f46a3c468d1 in command_config_read_one_line lib/command.c:1262
        #8 0x7f46a3c46bb8 in config_from_file lib/command.c:1315
        #9 0x7f46a3d79ef8 in mgmt_vty_read_configs lib/vty.c:2251
        #10 0x5577aa4ca340 in mgmt_config_read_in mgmtd/mgmt_vty.c:455
        #11 0x7f46a3d62aec in event_call lib/event.c:1976
        #12 0x7f46a3ca5d92 in frr_run lib/libfrr.c:1213
        #13 0x5577aa4a5785 in main mgmtd/mgmt_main.c:283
        #14 0x7f46a2f56c86 in __libc_start_main (/lib/x86_64-linux-gnu/libc.so.6+0x21c86)
    
    SUMMARY: AddressSanitizer: heap-use-after-free (/usr/lib/x86_64-linux-gnu/libasan.so.4+0x776a1) in strdup
    Shadow bytes around the buggy address:
      0x0c087fffe090: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0a0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe0b0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0c0: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
      0x0c087fffe0d0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
    =>0x0c087fffe0e0: fa fa[fd]fd fd fd fd fd fa fa fd fd fd fd fd fd
      0x0c087fffe0f0: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe100: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fd
      0x0c087fffe110: fa fa fd fd fd fd fd fa fa fa fd fd fd fd fd fa
      0x0c087fffe120: fa fa fd fd fd fd fd fa fa fa 00 00 00 00 00 00
      0x0c087fffe130: fa fa fd fd fd fd fd fd fa fa fd fd fd fd fd fa
    Shadow byte legend (one shadow byte represents 8 application bytes):
      Addressable:           00
      Partially addressable: 01 02 03 04 05 06 07 
      Heap left redzone:       fa
      Freed heap region:       fd
      Stack left redzone:      f1
      Stack mid redzone:       f2
      Stack right redzone:     f3
      Stack after return:      f5
      Stack use after scope:   f8
      Global redzone:          f9
      Global init order:       f6
      Poisoned by user:        f7
      Container overflow:      fc
      Array cookie:            ac
      Intra object redzone:    bb
      ASan internal:           fe
      Left alloca redzone:     ca
      Right alloca redzone:    cb

---------------

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-ASAN3-14318/test

Topology Tests failed for Addresssanitizer topotests part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/ASAN3/TopotestLogs/log_topotests.txt
Addresssanitizer topotests part 0: Unknown Log
URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/ASAN3/Topotest-Details/

Topotests debian 10 amd64 part 0: Failed (click for details)

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPO0DEB10AMD64-14318/test

Topology Tests failed for Topotests debian 10 amd64 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/TOPO0DEB10AMD64/TopotestLogs/log_topotests.txt
Topotests debian 10 amd64 part 0: Unknown Log
URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/TOPO0DEB10AMD64/TopotestDetails/

Topotests Ubuntu 18.04 i386 part 0: Failed (click for details) Topotests Ubuntu 18.04 i386 part 0: Unknown Log URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/TOPO0U18I386/TopotestDetails/

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPO0U18I386-14318/test

Topology Tests failed for Topotests Ubuntu 18.04 i386 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/TOPO0U18I386/TopotestLogs/log_topotests.txt

Topotests Ubuntu 18.04 amd64 part 0: Failed (click for details)

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPOU1804-14318/test

Topology Tests failed for Topotests Ubuntu 18.04 amd64 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/TOPOU1804/TopotestLogs/log_topotests.txt
Topotests Ubuntu 18.04 amd64 part 0: Unknown Log
URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/TOPOU1804/TopotestDetails/

Topotests Ubuntu 18.04 arm8 part 0: Failed (click for details) Topotests Ubuntu 18.04 arm8 part 0: Unknown Log URL: https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/TOPO0U18ARM8/TopotestDetails/

Topology Test Results are at https://ci1.netdef.org/browse/FRR-PULLREQ2-TOPO0U18ARM8-14318/test

Topology Tests failed for Topotests Ubuntu 18.04 arm8 part 0
see full log at https://ci1.netdef.org/browse/FRR-PULLREQ2-14318/artifact/TOPO0U18ARM8/TopotestLogs/log_topotests.txt

Successful on other platforms/tests
  • Addresssanitizer topotests part 4
  • Topotests Ubuntu 18.04 arm8 part 3
  • Topotests debian 10 amd64 part 9
  • Addresssanitizer topotests part 5
  • Topotests debian 10 amd64 part 4
  • Topotests Ubuntu 18.04 amd64 part 3
  • Topotests Ubuntu 18.04 amd64 part 2
  • Topotests debian 10 amd64 part 3
  • Topotests debian 10 amd64 part 8
  • Topotests Ubuntu 18.04 arm8 part 4
  • Addresssanitizer topotests part 2
  • Topotests Ubuntu 18.04 arm8 part 9
  • Topotests Ubuntu 18.04 amd64 part 5
  • Ubuntu 20.04 deb pkg check
  • Topotests Ubuntu 18.04 arm8 part 2
  • Topotests Ubuntu 18.04 i386 part 6
  • Addresssanitizer topotests part 9
  • Topotests Ubuntu 18.04 i386 part 1
  • Topotests Ubuntu 18.04 amd64 part 4
  • Topotests Ubuntu 18.04 amd64 part 9
  • Topotests Ubuntu 18.04 arm8 part 7
  • Topotests Ubuntu 18.04 i386 part 3
  • Topotests Ubuntu 18.04 i386 part 8
  • Topotests Ubuntu 18.04 amd64 part 7
  • Debian 10 deb pkg check
  • Addresssanitizer topotests part 3
  • Addresssanitizer topotests part 7
  • Addresssanitizer topotests part 6
  • Topotests Ubuntu 18.04 arm8 part 5
  • Topotests debian 10 amd64 part 1
  • CentOS 7 rpm pkg check
  • Topotests debian 10 amd64 part 7
  • Topotests Ubuntu 18.04 i386 part 9
  • Topotests debian 10 amd64 part 2
  • Topotests Ubuntu 18.04 amd64 part 8
  • Static analyzer (clang)
  • Topotests Ubuntu 18.04 i386 part 5
  • Ubuntu 18.04 deb pkg check
  • Debian 9 deb pkg check
  • Topotests debian 10 amd64 part 5
  • Addresssanitizer topotests part 1
  • Topotests Ubuntu 18.04 i386 part 4
  • Topotests Ubuntu 18.04 amd64 part 1
  • Topotests Ubuntu 18.04 arm8 part 6
  • Topotests Ubuntu 18.04 arm8 part 1
  • Addresssanitizer topotests part 8
  • Topotests Ubuntu 18.04 i386 part 7
  • Topotests debian 10 amd64 part 6
  • Topotests Ubuntu 18.04 i386 part 2
  • Topotests Ubuntu 18.04 amd64 part 6
  • Topotests Ubuntu 18.04 arm8 part 8

Copy link
Member

@rzalamena rzalamena left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Topotest is consistently failing in address sanitizer due to use-after-free.

nb_cli_enqueue_change enqueues a changeset data structure that points to string pointed by nump, which in its turn points to orig/ostr which is free()d before nb_cli_apply_changes is called. The temporary string needs to live beyond the northbound apply otherwise it will use a string which is no longer allocated.

@mobash-rasool mobash-rasool dismissed their stale review September 24, 2023 18:08

Please fix ci failure

@Jafaral Jafaral added this to the 9.1 Release milestone Sep 26, 2023
@donaldsharp
Copy link
Member Author

fixed

XSTRDUP and then calling strsep mangles the
pointer returned by XSTRDUP.  Keep a copy
of the orig and when we are done, free that instead.

Signed-off-by: Donald Sharp <[email protected]>
@rzalamena rzalamena merged commit 0fb9f91 into FRRouting:master Oct 5, 2023
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

5 participants