-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Fix null metadata dereference in Thrift proxy router for shadow traffic #38181
Fix null metadata dereference in Thrift proxy router for shadow traffic #38181
Conversation
432baf3
to
9e8893e
Compare
This commit addresses a segmentation fault in Envoy’s Thrift proxy when handling shadow traffic. The crash occurs due to a null pointer dereference of MessageMetadata within the shadow router path during response parsing from upstream. In scenarios where the Thrift decoder unexpectedly returns a complete parsing status without metadata, the previous logic led to crashing. Now, UpstreamRequest has been updated to include null-checks around metadata access during handleRegularResponse(), treating it as an error condition. Signed-off-by: Peter Leng <Peter Leng>
Signed-off-by: Peter Leng <Peter Leng>
Signed-off-by: Peter Leng <Peter Leng>
9e8893e
to
0f814ba
Compare
@zuercher Hi Stephan, |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
This seems ok. Assigned @JuniorHsu since he works on the code more regularly than I do.
| can we run the skipped tests in the CI?
Are you referring to the skipped github checks? I don't believe they are necessary.
ah got it. |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
this is good i think. next step is to check if any of these metrics matches the new metric.
Note that this is not a fix to the root cause so expect to be revert while we dig further more.
@zuercher Shall we merge this PR? |
Commit Message:
Addresses a segmentation fault in Envoy’s Thrift proxy when handling shadow traffic. The crash occurs due to a null pointer dereference of MessageMetadata within the shadow router path during response parsing from upstream. In scenarios where the Thrift decoder unexpectedly returns a complete parsing status without metadata, the previous logic led to crashing. Now, UpstreamRequest has been updated to include null-checks around metadata access during handleRegularResponse(), treating it as an error condition.
Added a new Counter to track null metadata from responses for Thrift router
thrift.upstream_resp_metadata_null
Additional Description:
Backtrace from production machine
Risk Level: Medium
Testing: new unit test
Docs Changes: N/A
Release Notes: N/A
Platform Specific Features: N/A