Skip to content

bgpd: fix memory leak in evpn mh (backport #19334) #19383

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 2 commits into from
Aug 13, 2025

Conversation

mergify[bot]
Copy link

@mergify mergify bot commented Aug 12, 2025

==361051== 96 bytes in 1 blocks are possibly lost in loss record 256 of 442
==361051== at 0x48465EF: calloc (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so)
==361051== by 0x492A42F: qcalloc (memory.c:105)
==361051== by 0x2245A0: bgp_evpn_es_vrf_create (bgp_evpn_mh.c:3047)
==361051== by 0x2245A0: bgp_evpn_es_vrf_ref (bgp_evpn_mh.c:3156)
==361051== by 0x2246CD: bgp_evpn_es_evi_new (bgp_evpn_mh.c:3615)
==361051== by 0x22667A: bgp_evpn_local_es_evi_add (bgp_evpn_mh.c:3823)
==361051== by 0x2EA653: bgp_zebra_process_local_es_evi (bgp_zebra.c:3175)
==361051== by 0x4989F19: zclient_read (zclient.c:4668)
==361051== by 0x4974210: event_call (event.c:2034)
==361051== by 0x491DC0F: frr_run (libfrr.c:1242)
==361051== by 0x1F02E5: main (bgp_main.c:562)

==361051== 152 bytes in 1 blocks are possibly lost in loss record 316 of 442
==361051== at 0x48465EF: calloc (in /usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so)
==361051== by 0x492A42F: qcalloc (memory.c:105)
==361051== by 0x224673: bgp_evpn_es_evi_new (bgp_evpn_mh.c:3598)
==361051== by 0x22667A: bgp_evpn_local_es_evi_add (bgp_evpn_mh.c:3823)
==361051== by 0x2EA653: bgp_zebra_process_local_es_evi (bgp_zebra.c:3175)
==361051== by 0x4989F19: zclient_read (zclient.c:4668)
==361051== by 0x4974210: event_call (event.c:2034)
==361051== by 0x491DC0F: frr_run (libfrr.c:1242)
==361051== by 0x1F02E5: main (bgp_main.c:562)

Signed-off-by: Chirag Shah [email protected]


This is an automatic backport of pull request #19334 done by [Mergify](https://mergify.com).

==361051== 96 bytes in 1 blocks are possibly lost in loss record 256 of
442
==361051==    at 0x48465EF: calloc (in
/usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so)
==361051==    by 0x492A42F: qcalloc (memory.c:105)
==361051==    by 0x2245A0: bgp_evpn_es_vrf_create (bgp_evpn_mh.c:3047)
==361051==    by 0x2245A0: bgp_evpn_es_vrf_ref (bgp_evpn_mh.c:3156)
==361051==    by 0x2246CD: bgp_evpn_es_evi_new (bgp_evpn_mh.c:3615)
==361051==    by 0x22667A: bgp_evpn_local_es_evi_add
(bgp_evpn_mh.c:3823)
==361051==    by 0x2EA653: bgp_zebra_process_local_es_evi
(bgp_zebra.c:3175)
==361051==    by 0x4989F19: zclient_read (zclient.c:4668)
==361051==    by 0x4974210: event_call (event.c:2034)
==361051==    by 0x491DC0F: frr_run (libfrr.c:1242)
==361051==    by 0x1F02E5: main (bgp_main.c:562)

Ticket: #4564820

Cursor
Signed-off-by: Chirag Shah <[email protected]>
(cherry picked from commit b45ca16)
==361051== 152 bytes in 1 blocks are possibly lost in loss record 316 of
442
==361051==    at 0x48465EF: calloc (in
/usr/libexec/valgrind/vgpreload_memcheck-amd64-linux.so)
==361051==    by 0x492A42F: qcalloc (memory.c:105)
==361051==    by 0x224673: bgp_evpn_es_evi_new (bgp_evpn_mh.c:3598)
==361051==    by 0x22667A: bgp_evpn_local_es_evi_add
(bgp_evpn_mh.c:3823)
==361051==    by 0x2EA653: bgp_zebra_process_local_es_evi
(bgp_zebra.c:3175)
==361051==    by 0x4989F19: zclient_read (zclient.c:4668)
==361051==    by 0x4974210: event_call (event.c:2034)
==361051==    by 0x491DC0F: frr_run (libfrr.c:1242)
==361051==    by 0x1F02E5: main (bgp_main.c:562)

Ticket: #4564820

Cursor
Signed-off-by: Chirag Shah <[email protected]>
(cherry picked from commit 38f2cd2)
@ton31337 ton31337 merged commit 6a6860b into stable/10.0 Aug 13, 2025
14 of 15 checks passed
@ton31337 ton31337 deleted the mergify/bp/stable/10.0/pr-19334 branch August 13, 2025 08:24
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Projects
None yet
Development

Successfully merging this pull request may close these issues.

2 participants