This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
* Logging: | |
extern "C" WasmResult proxy_log(LogLevel level, const char *logMessage, size_t messageSize); | |
extern "C" WasmResult proxy_get_log_level(LogLevel *level); | |
* Timers: | |
extern "C" WasmResult proxy_set_tick_period_milliseconds(uint32_t millisecond); | |
* Attribute accessors: | |
extern "C" WasmResult proxy_get_property(const char *path_ptr, size_t path_size, |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ RUN ] DownstreamProtocols/DownstreamProtocolIntegrationTest.FaultyFilterWithConnect/IPv6_Http3Downstream_HttpUpstreamNghttp2NoDeferredProcessing | |
================================================================= | |
==17==ERROR: AddressSanitizer: heap-use-after-free on address 0x60f00005da80 at pc 0x0000089bf500 bp 0x7ffd5d49f4a0 sp 0x7ffd5d49f498 | |
READ of size 8 at 0x60f00005da80 thread T0 | |
#0 0x89bf4ff in Envoy::Http::StreamCallbackHelper::runResetCallbacks(Envoy::Http::StreamResetReason) /proc/self/cwd/./source/common/http/codec_helper.h:51:20 | |
#1 0x962bdf6 in Envoy::Quic::EnvoyQuicClientStream::ResetWithError(quic::QuicResetStreamError) /proc/self/cwd/source/common/quic/envoy_quic_client_stream.cc:348:3 | |
#2 0x9cdf101 in quic::QuicStream::Reset(quic::QuicRstStreamErrorCode) /proc/self/cwd/external/com_github_google_quiche/quiche/quic/core/quic_stream.cc:595:3 | |
#3 0x961ed2d in Envoy::Quic::EnvoyQuicClientStream::resetStream(Envoy::Http::StreamResetReason) /proc/self/cwd/source/common/quic/envoy |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
static_resources: | |
listeners: | |
- address: | |
socket_address: | |
address: 0.0.0.0 | |
port_value: 8081 | |
traffic_direction: INBOUND | |
filter_chains: | |
- filters: | |
- name: inbound-http-proxy |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
bootstrap_extensions: | |
- name: envoy.bootstrap.internal_listener_registry | |
typed_config: | |
"@type": "type.googleapis.com/google.protobuf.Struct" | |
admin: | |
access_log_path: "/dev/null" | |
address: | |
socket_address: | |
address: 0.0.0.0 | |
port_value: 10000 |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
static_resources: | |
listeners: | |
- address: | |
socket_address: | |
address: 0.0.0.0 | |
port_value: 8081 | |
traffic_direction: INBOUND | |
filter_chains: | |
- filters: | |
- name: inbound-http-proxy |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
==12==ERROR: AddressSanitizer: heap-use-after-free on address 0x60300077c538 at pc 0x00001381b534 bp 0x7ffd3972c9b0 sp 0x7ffd3972c9a8 | |
READ of size 8 at 0x60300077c538 thread T0 | |
#0 0x1381b533 in std::__shared_count<(__gnu_cxx::_Lock_policy)2>::~__shared_count() /usr/bin/../lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/shared_ptr_base.h:727:6 | |
#1 0x13c5e5d5 in std::__shared_ptr<Envoy::Upstream::Host, (__gnu_cxx::_Lock_policy)2>::~__shared_ptr() /usr/bin/../lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/shared_ptr_base.h:1167:31 | |
#2 0x13c33ce1 in std::shared_ptr<Envoy::Upstream::Host>::~shared_ptr() /usr/bin/../lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/shared_ptr.h:103:11 | |
#3 0x13ca152e in void std::_Destroy<std::shared_ptr<Envoy::Upstream::Host> >(std::shared_ptr<Envoy::Upstream::Host>*) /usr/bin/../lib/gcc/x86_64-linux-gnu/8/../../../../include/c++/8/bits/stl_construct.h:98:19 | |
#4 0x13ca148b in void std::_Destroy_aux<false>::__destroy<std::shared_ptr<Envoy |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
#0 0x00000000029251fc in tcmalloc::SLL_Next(void*) () | |
#1 0x00000000029251bb in tcmalloc::SLL_TryPop(void**, void**) () | |
#2 0x000000000292511f in tcmalloc::ThreadCache::FreeList::TryPop(void**) () | |
#3 0x00000000029fcfc5 in tc_newarray () | |
#4 0x0000000000456507 in __gnu_cxx::new_allocator<char>::allocate(unsigned long, void const*) () | |
#5 0x000000000045644c in std::allocator_traits<std::allocator<char> >::allocate(std::allocator<char>&, unsigned long) () | |
#6 0x000000000045628a in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::_M_create(unsigned long&, unsigned long) () | |
#7 0x00000000004593b6 in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::_M_mutate(unsigned long, unsigned long, char const*, unsigned long) () | |
#8 0x00000000005ab280 in std::__cxx11::basic_string<char, std::char_traits<char>, std::allocator<char> >::_M_replace(unsigned long, unsigned long, char const*, unsigned long) () | |
#9 0x00000000009b61ac in std::__cxx11::basic_string<char |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[2020-02-19 17:11:30.811][3730][warning][config] [bazel-out/k8-fastbuild/bin/external/envoy/source/common/config/_virtual_includes/grpc_stream_lib/common/config/grpc_stream.h:92] StreamAggregatedResources gRPC config stream closed: 13, | |
[2020-02-19 17:11:30.812][3730][info][main] [external/envoy/source/server/server.cc:595] exiting | |
[2020-02-19 17:11:30.815][3730][critical][backtrace] [bazel-out/k8-fastbuild/bin/external/envoy/source/server/_virtual_includes/backtrace_lib/server/backtrace.h:83] Caught Segmentation fault, suspect faulting address 0x0 | |
[2020-02-19 17:11:30.815][3730][critical][backtrace] [bazel-out/k8-fastbuild/bin/external/envoy/source/server/_virtual_includes/backtrace_lib/server/backtrace.h:70] Backtrace (use tools/stack_decode.py to get line numbers): | |
[2020-02-19 17:11:30.815][3730][critical][backtrace] [bazel-out/k8-fastbuild/bin/external/envoy/source/server/_virtual_includes/backtrace_lib/server/backtrace.h:71] Envoy version: d3e3f089826410541481e591ca61ee228758867d/1.14.0-dev/Modified/DEBUG |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
extensions/stackdriver/stackdriver.cc:202:14: runtime error: member call on null pointer of type 'Extensions::Stackdriver::Log::Logger' | |
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior extensions/stackdriver/stackdriver.cc:202:14 in | |
extensions/stackdriver/log/logger.cc:180:14: runtime error: member call on null pointer of type 'Extensions::Stackdriver::Log::Logger *' | |
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior extensions/stackdriver/log/logger.cc:180:14 in | |
extensions/stackdriver/log/logger.cc:158:14: runtime error: member call on null pointer of type 'Extensions::Stackdriver::Log::Logger *' | |
SUMMARY: UndefinedBehaviorSanitizer: undefined-behavior extensions/stackdriver/log/logger.cc:158:14 in | |
AddressSanitizer:DEADLYSIGNAL | |
================================================================= | |
==21724==ERROR: AddressSanitizer: SEGV on unknown address 0x000000000020 (pc 0x5596aa1e4dfc bp 0x7ffdc30f3360 sp 0x7ffdc30f31c0 T0) | |
==21724==The signal is caused by a READ memory access. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[ RUN ] RouterUpstreamLogTest.LogTimestampsAndDurations | |
================================================================= | |
==16==ERROR: AddressSanitizer: heap-buffer-overflow on address 0x6250000ca678 at pc 0x00002701ebd4 bp 0x7ffc2507feb0 sp 0x7ffc2507fea8 | |
WRITE of size 1 at 0x6250000ca678 thread T0 | |
#0 0x2701ebd3 in Envoy::Router::TestFilter::TestFilter(Envoy::Router::FilterConfig&) /proc/self/cwd/test/common/router/router_test.cc:86:8 | |
#1 0x271d226b in Envoy::Router::RouterUpstreamLogTest::init(absl::optional<envoy::config::accesslog::v3::AccessLog>) /proc/self/cwd/test/common/router/router_upstream_log_test.cc:96:23 | |
#2 0x271cc529 in Envoy::Router::RouterUpstreamLogTest_LogTimestampsAndDurations_Test::TestBody() /proc/self/cwd/test/common/router/router_upstream_log_test.cc:294:3 | |
#3 0x40237ce4 in void testing::internal::HandleSehExceptionsInMethodIfSupported<testing::Test, void>(testing::Test*, void (testing::Test::*)(), char const*) /proc/self/cwd/external/com_google_googletest/googletest |
NewerOlder