microsoft / ebpf-for-windows

eBPF implementation that runs on top of Windows
MIT License
2.85k stars 217 forks source link

Workflow failed - fault_injection_full #3418

Closed github-actions[bot] closed 4 months ago

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

Alan-Jowett commented 5 months ago

Double free:

00000043`5f0fb6c0 00007ff9`d87318af     ucrtbased!get_wide_winmain_command_line+0xf1
15 00000043`5f0fb700 00007ff6`fa78bb33     ucrtbased!wassert+0x2f
16 00000043`5f0fb730 00007ff6`fa3ea3fc     unit_tests!cxplat_free+0x93 [D:\a\ebpf-for-windows\ebpf-for-windows\external\usersim\cxplat\src\cxplat_winuser\memory_winuser.cpp @ 205] 
17 00000043`5f0fb780 00007ff6`fa894968     unit_tests!ebpf_free+0x1c [D:\a\ebpf-for-windows\ebpf-for-windows\libs\shared\ebpf_shared_framework.h @ 71] 
18 00000043`5f0fb7b0 00007ff6`fa7fb6d9     unit_tests!ebpf_program_info_free+0x128 [D:\a\ebpf-for-windows\ebpf-for-windows\libs\shared\ebpf_serialize.c @ 265] 
19 00000043`5f0fb8e0 00007ff6`fa7fae23     unit_tests!_ebpf_program_info_deleter::operator()+0x19 [D:\a\ebpf-for-windows\ebpf-for-windows\libs\api_common\windows_platform_common.cpp @ 47] 
1a 00000043`5f0fb910 00007ff6`fa7fad7b     unit_tests!std::unique_ptr<_ebpf_program_info,_ebpf_program_info_deleter>::~unique_ptr<_ebpf_program_info,_ebpf_program_info_deleter>+0x43 [C:\Program Files\Microsoft Visual Studio\2022\Enterprise\VC\Tools\MSVC\14.38.33130\include\memory @ 3280] 
1b 00000043`5f0fb950 00007ff6`fa7fb7a8     unit_tests!std::pair<_GUID const ,std::unique_ptr<_ebpf_program_info,_ebpf_program_info_deleter> >::~pair<_GUID const ,std::unique_ptr<_ebpf_program_info,_ebpf_program_info_deleter> >+0x1b
1c 00000043`5f0fb980 00007ff6`fa7f9a16     unit_tests!std::pair<_GUID const ,std::unique_ptr<_ebpf_program_info,_ebpf_program_info_deleter> >::`scalar deleting destructor'+0x18
1d 00000043`5f0fb9b0 00007ff6`fa7f99b9     unit_tests!std::destroy_at<std::pair<_GUID const ,std::unique_ptr<_ebpf_program_info,_ebpf_program_info_deleter> > >+0x16 [C:\Program Files\Microsoft Visual Studio\2022\Enterprise\VC\Tools\MSVC\14.38.33130\include\xmemory @ 322] 
1e 00000043`5f0fb9e0 00007ff6`fa7f8e1d     unit_tests!std::_Default_allocator_traits<std::allocator<std::_Tree_node<std::pair<_GUID const ,std::unique_ptr<_ebpf_program_info,_ebpf_program_info_deleter> >,void *> > >::destroy<std::pair<_GUID const ,std::unique_ptr<_ebpf_program_info,_ebpf_program_info_deleter> > >+0x19 [C:\Program Files\Microsoft Visual Studio\2022\Enterprise\VC\Tools\MSVC\14.38.33130\include\xmemory @ 734] 
1f 00000043`5f0fba10 00007ff6`fa7f8898     unit_tests!std::_Tree_node<std::pair<_GUID const ,std::unique_ptr<_ebpf_program_info,_ebpf_program_info_deleter> >,void *>::_Freenode<std::allocator<std::_Tree_node<std::pair<_GUID const ,std::unique_ptr<_ebpf_program_info,_ebpf_program_info_deleter> >,void *> > >+0x2d [C:\Program Files\Microsoft Visual Studio\2022\Enterprise\VC\Tools\MSVC\14.38.33130\include\xtree @ 382] 
20 00000043`5f0fba40 00007ff6`fa7fe824     unit_tests!std::_Tree_val<std::_Tree_simple_types<std::pair<_GUID const ,std::unique_ptr<_ebpf_program_info,_ebpf_program_info_deleter> > > >::_Erase_tree<std::allocator<std::_Tree_node<std::pair<_GUID const ,std::unique_ptr<_ebpf_program_info,_ebpf_program_info_deleter> >,void *> > >+0x58 [C:\Program Files\Microsoft Visual Studio\2022\Enterprise\VC\Tools\MSVC\14.38.33130\include\xtree @ 747] 
21 00000043`5f0fba70 00007ff6`fa7fe93a     unit_tests!std::_Tree<std::_Tmap_traits<_GUID,std::unique_ptr<_ebpf_program_info,_ebpf_program_info_deleter>,guid_compare,std::allocator<std::pair<_GUID const ,std::unique_ptr<_ebpf_program_info,_ebpf_program_info_deleter> > >,0> >::clear+0x64 [C:\Program Files\Microsoft Visual Studio\2022\Enterprise\VC\Tools\MSVC\14.38.33130\include\xtree @ 1352] 
22 00000043`5f0fbac0 00007ff6`fa7cc3ab     unit_tests!clear_ebpf_provider_data+0x2a [D:\a\ebpf-for-windows\ebpf-for-windows\libs\api_common\windows_platform_common.cpp @ 860] 
23 00000043`5f0fbb00 00007ff6`fa4b1912     unit_tests!ebpf_api_terminate+0xb [D:\a\ebpf-for-windows\ebpf-for-windows\libs\api\ebpf_api.cpp @ 245] 
24 00000043`5f0fbb30 00007ff6`fa4b1c1d     unit_tests!_test_helper_end_to_end::~_test_helper_end_to_end+0x92 [D:\a\ebpf-for-windows\ebpf-for-windows\tests\end_to_end\test_helper.cpp @ 775] 
25 00000043`5f0fbba0 00007ff6`fa96da2c     unit_tests!_test_helper_libbpf::~_test_helper_libbpf+0x27d [D:\a\ebpf-for-windows\ebpf-for-windows\tests\end_to_end\test_helper.cpp @ 848] 
26 00000043`5f0fbc70 00007ff9`f1e71030     unit_tests!`CATCH2_INTERNAL_TEST_136'::`1'::dtor$0+0x1c
27 00000043`5f0fbcb0 00007ff9`f1e74307     VCRUNTIME140_1D+0x1030
28 00000043`5f0fbce0 00007ff9`f1e766ab     VCRUNTIME140_1D!_NLG_Return2+0x31b7
29 00000043`5f0fbdf0 00007ff9`f1e72cd2     VCRUNTIME140_1D!_NLG_Return2+0x555b
2a 00000043`5f0fbe30 00007ff9`f1e72f5a     VCRUNTIME140_1D!_NLG_Return2+0x1b82
2b 00000043`5f0fbf00 00007ff9`f1e76dfb     VCRUNTIME140_1D!_NLG_Return2+0x1e0a
2c 00000043`5f0fbf60 00007ff6`fa8b57f0     VCRUNTIME140_1D!_CxxFrameHandler4+0xfb
2d 00000043`5f0fbff0 00007ff9`f82a443f     unit_tests!__GSHandlerCheck_EH4+0x90 [D:\a\_work\1\s\src\vctools\crt\vcstartup\src\gs\amd64\gshandlereh4.cpp @ 73] 
2e 00000043`5f0fc040 00007ff9`f82b635a     ntdll!_chkstk+0x1af
2f 00000043`5f0fc070 00007ff9`f1e76a7f     ntdll!RtlIsNonEmptyDirectoryReparsePointAllowed+0xb11a
30 00000043`5f0fc820 00007ff9`f1e71c1e     VCRUNTIME140_1D!_NLG_Return2+0x592f
31 00000043`5f0fc920 00007ff9`f1e7218b     VCRUNTIME140_1D!_NLG_Return2+0xace
32 00000043`5f0fc9c0 00007ff9`f1e72ec5     VCRUNTIME140_1D!_NLG_Return2+0x103b
33 00000043`5f0fcba0 00007ff9`f1e72f5a     VCRUNTIME140_1D!_NLG_Return2+0x1d75
34 00000043`5f0fcc70 00007ff9`f1e76dfb     VCRUNTIME140_1D!_NLG_Return2+0x1e0a
35 00000043`5f0fccd0 00007ff6`fa8b57f0     VCRUNTIME140_1D!_CxxFrameHandler4+0xfb
36 00000043`5f0fcd60 00007ff9`f82a43bf     unit_tests!__GSHandlerCheck_EH4+0x90 [D:\a\_work\1\s\src\vctools\crt\vcstartup\src\gs\amd64\gshandlereh4.cpp @ 73] 
37 00000043`5f0fcdb0 00007ff9`f823186e     ntdll!_chkstk+0x12f
38 00000043`5f0fcde0 00007ff9`f824f6d1     ntdll!RtlVirtualUnwind2+0x35e
39 00000043`5f0fd5a0 00007ff9`f5aaf19c     ntdll!RtlRaiseException+0x1f1
3a 00000043`5f0fdd90 00007ff9`e39bbbf1     KERNELBASE!RaiseException+0x6c
3b 00000043`5f0fde70 00007ff6`fa572ea8     VCRUNTIME140D!CxxThrowException+0x131
3c 00000043`5f0fdf00 00007ff6`fa56f29d     unit_tests!Catch::throw_test_failure_exception+0x28 [D:\a\ebpf-for-windows\ebpf-for-windows\external\Catch2\src\catch2\internal\catch_test_failure_exception.cpp @ 21] 
3d 00000043`5f0fdf40 00007ff6`fa50a8b3     unit_tests!Catch::AssertionHandler::complete+0x4d [D:\a\ebpf-for-windows\ebpf-for-windows\external\Catch2\src\catch2\internal\catch_assertion_handler.cpp @ 52] 
3e 00000043`5f0fdf80 00007ff6`fa5702d2     unit_tests!CATCH2_INTERNAL_TEST_136+0x593 [D:\a\ebpf-for-windows\ebpf-for-windows\tests\unit\libbpf_test.cpp @ 2756] 
3f 00000043`5f0febd0 00007ff6`fa57ea71     unit_tests!Catch::`anonymous namespace'::TestInvokerAsFunction::invoke+0x12 [D:\a\ebpf-for-windows\ebpf-for-windows\external\Catch2\src\catch2\internal\catch_test_registry.cpp @ 58] 
40 00000043`5f0fec00 00007ff6`fa57eac7     unit_tests!Catch::TestCaseHandle::invoke+0x21 [D:\a\ebpf-for-windows\ebpf-for-windows\external\Catch2\src\catch2\catch_test_case_info.hpp @ 117] 
41 00000043`5f0fec30 00007ff6`fa57f710     unit_tests!Catch::RunContext::invokeActiveTestCase+0x47 [D:\a\ebpf-for-windows\ebpf-for-windows\external\Catch2\src\catch2\internal\catch_run_context.cpp @ 554] 
42 00000043`5f0fec80 00007ff6`fa57fb82     unit_tests!Catch::RunContext::runCurrentTest+0x250 [D:\a\ebpf-for-windows\ebpf-for-windows\external\Catch2\src\catch2\internal\catch_run_context.cpp @ 519] 
43 00000043`5f0ff000 00007ff6`fa919803     unit_tests!Catch::RunContext::runTest+0x2e2 [D:\a\ebpf-for-windows\ebpf-for-windows\external\Catch2\src\catch2\internal\catch_run_context.cpp @ 240] 
44 00000043`5f0ff4e0 00007ff6`fa91a7a0     unit_tests!Catch::`anonymous namespace'::TestGroup::execute+0xf3 [D:\a\ebpf-for-windows\ebpf-for-windows\external\Catch2\src\catch2\catch_session.cpp @ 111] 
45 00000043`5f0ff660 00007ff6`fa91a340     unit_tests!Catch::Session::runInternal+0x3f0 [D:\a\ebpf-for-windows\ebpf-for-windows\external\Catch2\src\catch2\catch_session.cpp @ 336] 
46 00000043`5f0ffae0 00007ff6`fa8c10b2     unit_tests!Catch::Session::run+0x50 [D:\a\ebpf-for-windows\ebpf-for-windows\external\Catch2\src\catch2\catch_session.cpp @ 264] 
47 00000043`5f0ffb20 00007ff6`fa8c1121     unit_tests!Catch::Session::run<char>+0x52 [D:\a\ebpf-for-windows\ebpf-for-windows\external\Catch2\src\catch2\catch_session.hpp @ 41] 
48 00000043`5f0ffb60 00007ff6`fa8b60f9     unit_tests!main+0x61 [D:\a\ebpf-for-windows\ebpf-for-windows\external\Catch2\src\catch2\internal\catch_main.cpp @ 36] 
49 00000043`5f0ffd80 00007ff6`fa8b604e     unit_tests!invoke_main+0x39 [D:\a\_work\1\s\src\vctools\crt\vcstartup\src\startup\exe_common.inl @ 79] 
4a 00000043`5f0ffdd0 00007ff6`fa8b5f0e     unit_tests!__scrt_common_main_seh+0x12e [D:\a\_work\1\s\src\vctools\crt\vcstartup\src\startup\exe_common.inl @ 288] 
4b 00000043`5f0ffe40 00007ff6`fa8b616e     unit_tests!__scrt_common_main+0xe [D:\a\_work\1\s\src\vctools\crt\vcstartup\src\startup\exe_common.inl @ 331] 
4c 00000043`5f0ffe70 00007ff9`f76e4cb0     unit_tests!mainCRTStartup+0xe [D:\a\_work\1\s\src\vctools\crt\vcstartup\src\startup\exe_main.cpp @ 17] 
4d 00000043`5f0ffea0 00007ff9`f827e8ab     kernel32!BaseThreadInitThunk+0x10
4e 00000043`5f0ffed0 00000000`00000000     ntdll!RtlUserThreadStart+0x2b

program_info->program_type_descriptor->context_descriptor has already been freed.

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 5 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 4 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 4 months ago

Failed Run Codebase Test name - fault_injection_full

github-actions[bot] commented 4 months ago

Failed Run Codebase Test name - fault_injection_full