Skip to content

backport: Prevent SEGFAULT when disabling listener (#13515)#13882

Merged
ggreenway merged 5 commits intoenvoyproxy:release/v1.16from
cpakulski:relv1.16
Nov 5, 2020
Merged

backport: Prevent SEGFAULT when disabling listener (#13515)#13882
ggreenway merged 5 commits intoenvoyproxy:release/v1.16from
cpakulski:relv1.16

Conversation

@cpakulski
Copy link
Copy Markdown
Contributor

Commit Message:
This prevents the stop_listening overload action from causing
segmentation faults that can occur if the action is enabled after the
listener has already shut down.

Risk Level: low
Testing: unit tests
Docs Changes: none
Release Notes: none
Fixes #13514

akonradi and others added 3 commits October 30, 2020 14:19
This prevents the stop_listening overload action from causing
segmentation faults that can occur if the action is enabled after the
listener has already shut down.

Signed-off-by: Alex Konradi <akonradi@google.com>
Signed-off-by: Christoph Pakulski <christoph@tetrate.io>
Signed-off-by: Christoph Pakulski <christoph@tetrate.io>
Signed-off-by: Christoph Pakulski <christoph@tetrate.io>
@akonradi
Copy link
Copy Markdown
Contributor

akonradi commented Nov 3, 2020

Fix looks good. Don't we need to update docs/root/version_history/current.rst?

@ggreenway
Copy link
Copy Markdown
Member

Fix looks good. Don't we need to update docs/root/version_history/current.rst?

Yes, this needs a release-note.

/wait

@antoniovicente
Copy link
Copy Markdown
Contributor

Fix looks good. Don't we need to update docs/root/version_history/current.rst?

Yes, this needs a release-note.

/wait

The original change didn't have a release note, but it sounds like we may want to add one for the backport.

Signed-off-by: Christoph Pakulski <christoph@tetrate.io>

This prevents the stop_listening overload action from causing
segmentation faults that can occur if the action is enabled after the
listener has already shut down.
Copy link
Copy Markdown
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Release notes are typically a single line. See examples at: https://raw.githubusercontent.com/envoyproxy/envoy/master/docs/root/version_history/v1.16.0.rst

For this specific one I suggest the following wording:
listener: fix crash when disabling or re-enabling listeners due to overload while processing LDS updates

Copy link
Copy Markdown
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

@antoniovicente Thanks for suggestion! It is corrected now.

Signed-off-by: Christoph Pakulski <christoph@tetrate.io>
Copy link
Copy Markdown
Contributor

@antoniovicente antoniovicente left a comment

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Many thanks for the help on the backport effort.

@antoniovicente
Copy link
Copy Markdown
Contributor

/retest

@repokitteh-read-only
Copy link
Copy Markdown

Retrying Azure Pipelines:
Retried failed jobs in: envoy-presubmit

🐱

Caused by: a #13882 (comment) was created by @antoniovicente.

see: more, trace.

@ggreenway ggreenway merged commit 79984e4 into envoyproxy:release/v1.16 Nov 5, 2020
guyco-redis added a commit to RedisLabs/envoy that referenced this pull request Nov 11, 2020
* backport: Prevent SEGFAULT when disabling listener (envoyproxy#13515) (envoyproxy#13882)

* Prevent SEGFAULT when disabling listener (envoyproxy#13515)

This prevents the stop_listening overload action from causing
segmentation faults that can occur if the action is enabled after the
listener has already shut down.

Signed-off-by: Alex Konradi <akonradi@google.com>
Signed-off-by: Christoph Pakulski <christoph@tetrate.io>

* backport to rel-1.16: proxy_proto - fixing hashing bug envoyproxy#13768 (envoyproxy#13966)

Fix a bug where the transport socket options for the first downstream got reused for subsequent upstream connections.

Risk Level: low
Testing: new integration test
Docs Changes: n/a
Release Notes:
Platform Specific Features:
Fixes envoyproxy#13659

Signed-off-by: Alyssa Wilk <alyssar@chromium.org>
Signed-off-by: Christoph Pakulski <christoph@tetrate.io>

Co-authored-by: Christoph Pakulski <christoph@tetrate.io>
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment

Labels

None yet

Projects

None yet

Development

Successfully merging this pull request may close these issues.

4 participants