[trafficserver] branch 8.1.x updated: Revert "8.1.x timeout fixes (#7715)" (#7977)

2021-06-22 Thread eze
This is an automated email from the ASF dual-hosted git repository.

eze pushed a commit to branch 8.1.x
in repository https://gitbox.apache.org/repos/asf/trafficserver.git


The following commit(s) were added to refs/heads/8.1.x by this push:
 new faf7041  Revert "8.1.x timeout fixes (#7715)" (#7977)
faf7041 is described below

commit faf7041ca998d7f0d02e3a8d6676dee906c80818
Author: Evan Zelkowitz 
AuthorDate: Tue Jun 22 16:34:33 2021 -0700

Revert "8.1.x timeout fixes (#7715)" (#7977)

This reverts commit 447839268fdf95ef2bfe8b3cb8edf51f3efd86c6.
---
 iocore/net/I_NetProcessor.h   |  23 
 iocore/net/P_SSLNetVConnection.h  |  10 
 iocore/net/P_UnixNetVConnection.h |   6 --
 iocore/net/UnixNetProcessor.cc| 116 ++
 iocore/net/UnixNetVConnection.cc  |   7 ---
 proxy/http/HttpSM.cc  |  55 +-
 6 files changed, 166 insertions(+), 51 deletions(-)

diff --git a/iocore/net/I_NetProcessor.h b/iocore/net/I_NetProcessor.h
index 570e7f3..142244b 100644
--- a/iocore/net/I_NetProcessor.h
+++ b/iocore/net/I_NetProcessor.h
@@ -176,6 +176,8 @@ public:
   call back with success. If this behaviour is desired use
   synchronous connect connet_s method.
 
+@see connect_s()
+
 @param cont Continuation to be called back with events.
 @param addr target address and port to connect to.
 @param options @see NetVCOptions.
@@ -185,6 +187,27 @@ public:
   inkcoreapi Action *connect_re(Continuation *cont, sockaddr const *addr, 
NetVCOptions *options = nullptr);
 
   /**
+Open a NetVConnection for connection oriented I/O. This call
+is simliar to connect method except that the cont is called
+back only after the connections has been established. In the
+case of connect the cont could be called back with NET_EVENT_OPEN
+event and OS could still be in the process of establishing the
+connection. Re-entrant Callbacks: same as connect. If unix
+asynchronous type connect is desired use connect_re().
+
+@param cont Continuation to be called back with events.
+@param addr Address to which to connect (includes port).
+@param timeout for connect, the cont will get NET_EVENT_OPEN_FAILED
+  if connection could not be established for timeout msecs. The
+  default is 30 secs.
+@param options @see NetVCOptions.
+
+@see connect_re()
+
+  */
+  Action *connect_s(Continuation *cont, sockaddr const *addr, int timeout = 
NET_CONNECT_TIMEOUT, NetVCOptions *opts = nullptr);
+
+  /**
 Initializes the net processor. This must be called before the event 
threads are started.
 
   */
diff --git a/iocore/net/P_SSLNetVConnection.h b/iocore/net/P_SSLNetVConnection.h
index 531abdb..e73f3fa 100644
--- a/iocore/net/P_SSLNetVConnection.h
+++ b/iocore/net/P_SSLNetVConnection.h
@@ -101,16 +101,6 @@ public:
   }
 
   bool
-  trackFirstHandshake() override
-  {
-bool retval = sslHandshakeBeginTime == 0;
-if (retval) {
-  sslHandshakeBeginTime = Thread::get_hrtime();
-}
-return retval;
-  }
-
-  bool
   getSSLHandShakeComplete() const override
   {
 return sslHandShakeComplete;
diff --git a/iocore/net/P_UnixNetVConnection.h 
b/iocore/net/P_UnixNetVConnection.h
index ba2f862..37b4278 100644
--- a/iocore/net/P_UnixNetVConnection.h
+++ b/iocore/net/P_UnixNetVConnection.h
@@ -206,12 +206,6 @@ public:
 return (true);
   }
 
-  virtual bool
-  trackFirstHandshake()
-  {
-return false;
-  }
-
   virtual void net_read_io(NetHandler *nh, EThread *lthread);
   virtual int64_t load_buffer_and_write(int64_t towrite, MIOBufferAccessor 
, int64_t _written, int );
   void readDisable(NetHandler *nh);
diff --git a/iocore/net/UnixNetProcessor.cc b/iocore/net/UnixNetProcessor.cc
index d1ec316..3aac473 100644
--- a/iocore/net/UnixNetProcessor.cc
+++ b/iocore/net/UnixNetProcessor.cc
@@ -306,6 +306,122 @@ UnixNetProcessor::connect(Continuation *cont, 
UnixNetVConnection ** /* avc */, s
   return connect_re(cont, target, opt);
 }
 
+struct CheckConnect : public Continuation {
+  UnixNetVConnection *vc;
+  Action action_;
+  MIOBuffer *buf;
+  IOBufferReader *reader;
+  int connect_status;
+  int recursion;
+  ink_hrtime timeout;
+
+  int
+  handle_connect(int event, Event *e)
+  {
+connect_status = event;
+switch (event) {
+case NET_EVENT_OPEN:
+  vc = (UnixNetVConnection *)e;
+  Debug("iocore_net_connect", "connect Net open");
+  vc->do_io_write(this, 10, /* some non-zero number just to get the poll 
going */
+  reader);
+  /* dont wait for more than timeout secs */
+  vc->set_inactivity_timeout(timeout);
+  return EVENT_CONT;
+  break;
+
+case NET_EVENT_OPEN_FAILED:
+  Debug("iocore_net_connect", "connect Net open failed");
+  if (!action_.cancelled) {
+action_.continuation->handleEvent(NET_EVENT_OPEN_FAILED, (void *)e);
+  }
+  break;
+
+case VC_EVENT_WRITE_READY:
+  int sl, ret;
+

[trafficserver] branch revert-7715-BP-timeout-fixes created (now a06295e)

2021-06-22 Thread eze
This is an automated email from the ASF dual-hosted git repository.

eze pushed a change to branch revert-7715-BP-timeout-fixes
in repository https://gitbox.apache.org/repos/asf/trafficserver.git.


  at a06295e  Revert "8.1.x timeout fixes (#7715)"

This branch includes the following new commits:

 new a06295e  Revert "8.1.x timeout fixes (#7715)"

The 1 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.



[trafficserver] 01/01: Revert "8.1.x timeout fixes (#7715)"

2021-06-22 Thread eze
This is an automated email from the ASF dual-hosted git repository.

eze pushed a commit to branch revert-7715-BP-timeout-fixes
in repository https://gitbox.apache.org/repos/asf/trafficserver.git

commit a06295e34ea7db039584f0f091c04b67d91837b1
Author: Evan Zelkowitz 
AuthorDate: Tue Jun 22 16:42:41 2021 -0600

Revert "8.1.x timeout fixes (#7715)"

This reverts commit 447839268fdf95ef2bfe8b3cb8edf51f3efd86c6.
---
 iocore/net/I_NetProcessor.h   |  23 
 iocore/net/P_SSLNetVConnection.h  |  10 
 iocore/net/P_UnixNetVConnection.h |   6 --
 iocore/net/UnixNetProcessor.cc| 116 ++
 iocore/net/UnixNetVConnection.cc  |   7 ---
 proxy/http/HttpSM.cc  |  55 +-
 6 files changed, 166 insertions(+), 51 deletions(-)

diff --git a/iocore/net/I_NetProcessor.h b/iocore/net/I_NetProcessor.h
index 570e7f3..142244b 100644
--- a/iocore/net/I_NetProcessor.h
+++ b/iocore/net/I_NetProcessor.h
@@ -176,6 +176,8 @@ public:
   call back with success. If this behaviour is desired use
   synchronous connect connet_s method.
 
+@see connect_s()
+
 @param cont Continuation to be called back with events.
 @param addr target address and port to connect to.
 @param options @see NetVCOptions.
@@ -185,6 +187,27 @@ public:
   inkcoreapi Action *connect_re(Continuation *cont, sockaddr const *addr, 
NetVCOptions *options = nullptr);
 
   /**
+Open a NetVConnection for connection oriented I/O. This call
+is simliar to connect method except that the cont is called
+back only after the connections has been established. In the
+case of connect the cont could be called back with NET_EVENT_OPEN
+event and OS could still be in the process of establishing the
+connection. Re-entrant Callbacks: same as connect. If unix
+asynchronous type connect is desired use connect_re().
+
+@param cont Continuation to be called back with events.
+@param addr Address to which to connect (includes port).
+@param timeout for connect, the cont will get NET_EVENT_OPEN_FAILED
+  if connection could not be established for timeout msecs. The
+  default is 30 secs.
+@param options @see NetVCOptions.
+
+@see connect_re()
+
+  */
+  Action *connect_s(Continuation *cont, sockaddr const *addr, int timeout = 
NET_CONNECT_TIMEOUT, NetVCOptions *opts = nullptr);
+
+  /**
 Initializes the net processor. This must be called before the event 
threads are started.
 
   */
diff --git a/iocore/net/P_SSLNetVConnection.h b/iocore/net/P_SSLNetVConnection.h
index 531abdb..e73f3fa 100644
--- a/iocore/net/P_SSLNetVConnection.h
+++ b/iocore/net/P_SSLNetVConnection.h
@@ -101,16 +101,6 @@ public:
   }
 
   bool
-  trackFirstHandshake() override
-  {
-bool retval = sslHandshakeBeginTime == 0;
-if (retval) {
-  sslHandshakeBeginTime = Thread::get_hrtime();
-}
-return retval;
-  }
-
-  bool
   getSSLHandShakeComplete() const override
   {
 return sslHandShakeComplete;
diff --git a/iocore/net/P_UnixNetVConnection.h 
b/iocore/net/P_UnixNetVConnection.h
index ba2f862..37b4278 100644
--- a/iocore/net/P_UnixNetVConnection.h
+++ b/iocore/net/P_UnixNetVConnection.h
@@ -206,12 +206,6 @@ public:
 return (true);
   }
 
-  virtual bool
-  trackFirstHandshake()
-  {
-return false;
-  }
-
   virtual void net_read_io(NetHandler *nh, EThread *lthread);
   virtual int64_t load_buffer_and_write(int64_t towrite, MIOBufferAccessor 
, int64_t _written, int );
   void readDisable(NetHandler *nh);
diff --git a/iocore/net/UnixNetProcessor.cc b/iocore/net/UnixNetProcessor.cc
index d1ec316..3aac473 100644
--- a/iocore/net/UnixNetProcessor.cc
+++ b/iocore/net/UnixNetProcessor.cc
@@ -306,6 +306,122 @@ UnixNetProcessor::connect(Continuation *cont, 
UnixNetVConnection ** /* avc */, s
   return connect_re(cont, target, opt);
 }
 
+struct CheckConnect : public Continuation {
+  UnixNetVConnection *vc;
+  Action action_;
+  MIOBuffer *buf;
+  IOBufferReader *reader;
+  int connect_status;
+  int recursion;
+  ink_hrtime timeout;
+
+  int
+  handle_connect(int event, Event *e)
+  {
+connect_status = event;
+switch (event) {
+case NET_EVENT_OPEN:
+  vc = (UnixNetVConnection *)e;
+  Debug("iocore_net_connect", "connect Net open");
+  vc->do_io_write(this, 10, /* some non-zero number just to get the poll 
going */
+  reader);
+  /* dont wait for more than timeout secs */
+  vc->set_inactivity_timeout(timeout);
+  return EVENT_CONT;
+  break;
+
+case NET_EVENT_OPEN_FAILED:
+  Debug("iocore_net_connect", "connect Net open failed");
+  if (!action_.cancelled) {
+action_.continuation->handleEvent(NET_EVENT_OPEN_FAILED, (void *)e);
+  }
+  break;
+
+case VC_EVENT_WRITE_READY:
+  int sl, ret;
+  socklen_t sz;
+  if (!action_.cancelled) {
+sz  = sizeof(int);
+ret = getsockopt(vc->con.fd, SOL_SOCKET, SO_ERROR, (char 

[trafficserver] branch 8.1.x updated: Revert "Adjust connection timeout for TLS (#7810)" (#7975)

2021-06-22 Thread eze
This is an automated email from the ASF dual-hosted git repository.

eze pushed a commit to branch 8.1.x
in repository https://gitbox.apache.org/repos/asf/trafficserver.git


The following commit(s) were added to refs/heads/8.1.x by this push:
 new b827b9c  Revert "Adjust connection timeout for TLS (#7810)" (#7975)
b827b9c is described below

commit b827b9c622758534dbc5fae9ead685ffc155aeaa
Author: Evan Zelkowitz 
AuthorDate: Tue Jun 22 15:42:31 2021 -0700

Revert "Adjust connection timeout for TLS (#7810)" (#7975)

This reverts commit fb4574b06c1ded416ecaf00fabb5b0e4269484ae.
---
 iocore/net/UnixNetVConnection.cc | 5 ++---
 1 file changed, 2 insertions(+), 3 deletions(-)

diff --git a/iocore/net/UnixNetVConnection.cc b/iocore/net/UnixNetVConnection.cc
index 13fa4dd..efb7579 100644
--- a/iocore/net/UnixNetVConnection.cc
+++ b/iocore/net/UnixNetVConnection.cc
@@ -376,9 +376,8 @@ write_to_net_io(NetHandler *nh, UnixNetVConnection *vc, 
EThread *thread)
   // vc is an SSLNetVConnection.
   if (!vc->getSSLHandShakeComplete()) {
 if (vc->trackFirstHandshake()) {
-  // Eat the first write-ready.  Until the TLS handshake is complete,
-  // we should still be under the connect timeout and shouldn't bother
-  // the state machine until the TLS handshake is complete
+  // Send the write ready on up to the state machine
+  write_signal_and_update(VC_EVENT_WRITE_READY, vc);
   vc->write.triggered = 0;
   nh->write_ready_list.remove(vc);
 }


[trafficserver] branch revert-7810-asf-8.1.x-4903 created (now 38c6804)

2021-06-22 Thread eze
This is an automated email from the ASF dual-hosted git repository.

eze pushed a change to branch revert-7810-asf-8.1.x-4903
in repository https://gitbox.apache.org/repos/asf/trafficserver.git.


  at 38c6804  Revert "Adjust connection timeout for TLS (#7810)"

No new revisions were added by this update.


[trafficserver] branch 8.1.x updated: Fixes (#7971)

2021-06-22 Thread eze
This is an automated email from the ASF dual-hosted git repository.

eze pushed a commit to branch 8.1.x
in repository https://gitbox.apache.org/repos/asf/trafficserver.git


The following commit(s) were added to refs/heads/8.1.x by this push:
 new b82a3d1  Fixes (#7971)
b82a3d1 is described below

commit b82a3d192f995fb9d78e1c44d51d9acca4783277
Author: Evan Zelkowitz 
AuthorDate: Tue Jun 22 14:32:55 2021 -0700

Fixes (#7971)

* String the url fragment for outgoing requests (#7966)

Co-authored-by: Susan Hinrichs 
(cherry picked from commit 2b13eb33794574e62249997b4ba654d943a10f2d)

* Ensure that the content-length value is only digits (#7964)

Co-authored-by: Susan Hinrichs 
(cherry picked from commit 668d0f8668fec1cd350b0ceba3f7f8e4020ae3ca)

* Schedule H2 reenable event only if it's necessary

Co-authored-by: Katsutoshi Ikenoya 

* Fix dynamic-stack-buffer-overflow of cachekey plugin (#7945)

* Fix dynamic-stack-buffer-overflow of cachekey plugin

* Check dst_size include null termination

(cherry picked from commit 5a9339d7bc65e1c2d8d2a0fc80bb051daf3cdb0b)

Co-authored-by: Bryan Call 
Co-authored-by: Masakazu Kitajo 
Co-authored-by: Katsutoshi Ikenoya 
Co-authored-by: Masaori Koshiba 
---
 plugins/cachekey/cachekey.cc  |  2 +-
 proxy/hdrs/HTTP.cc| 11 +++
 proxy/http/HttpTransact.cc|  5 -
 proxy/http2/Http2ClientSession.cc | 14 +++---
 proxy/logging/LogUtils.cc |  2 +-
 5 files changed, 24 insertions(+), 10 deletions(-)

diff --git a/plugins/cachekey/cachekey.cc b/plugins/cachekey/cachekey.cc
index 5f12889..44925b3 100644
--- a/plugins/cachekey/cachekey.cc
+++ b/plugins/cachekey/cachekey.cc
@@ -41,7 +41,7 @@ appendEncoded(String , const char *s, size_t len)
 return;
   }
 
-  char tmp[len * 2];
+  char tmp[len * 3 + 1];
   size_t written;
 
   /* The default table does not encode the comma, so we need to use our own 
table here. */
diff --git a/proxy/hdrs/HTTP.cc b/proxy/hdrs/HTTP.cc
index 6a2ecc4..48032dd 100644
--- a/proxy/hdrs/HTTP.cc
+++ b/proxy/hdrs/HTTP.cc
@@ -1202,6 +1202,17 @@ validate_hdr_content_length(HdrHeap *heap, HTTPHdrImpl 
*hh)
 int content_length_len = 0;
 const char *content_length_val = 
content_length_field->value_get(_length_len);
 
+// RFC 7230 section 3.3.2
+// Content-Length = 1*DIGIT
+//
+// If the content-length value contains a non-numeric value, the header is 
invalid
+for (int i = 0; i < content_length_len; i++) {
+  if (!isdigit(content_length_val[i])) {
+Debug("http", "Content-Length value contains non-digit, returning 
parse error");
+return PARSE_RESULT_ERROR;
+  }
+}
+
 while (content_length_field->has_dups()) {
   int content_length_len_2 = 0;
   const char *content_length_val_2 = 
content_length_field->m_next_dup->value_get(_length_len_2);
diff --git a/proxy/http/HttpTransact.cc b/proxy/http/HttpTransact.cc
index c3d135b..2de29a8 100644
--- a/proxy/http/HttpTransact.cc
+++ b/proxy/http/HttpTransact.cc
@@ -7619,9 +7619,12 @@ HttpTransact::build_request(State *s, HTTPHdr 
*base_request, HTTPHdr *outgoing_r
 
   // HttpTransactHeaders::convert_request(outgoing_version, outgoing_request); 
// commented out this idea
 
+  URL *url = outgoing_request->url_get();
+  // Remove fragment from upstream URL
+  url->fragment_set(NULL, 0);
+
   // Check whether a Host header field is missing from a 1.0 or 1.1 request.
   if (outgoing_version != HTTPVersion(0, 9) && 
!outgoing_request->presence(MIME_PRESENCE_HOST)) {
-URL *url = outgoing_request->url_get();
 int host_len;
 const char *host = url->host_get(_len);
 
diff --git a/proxy/http2/Http2ClientSession.cc 
b/proxy/http2/Http2ClientSession.cc
index 6d7d3de..ee952b8 100644
--- a/proxy/http2/Http2ClientSession.cc
+++ b/proxy/http2/Http2ClientSession.cc
@@ -82,11 +82,6 @@ Http2ClientSession::destroy()
 void
 Http2ClientSession::free()
 {
-  if (this->_reenable_event) {
-this->_reenable_event->cancel();
-this->_reenable_event = nullptr;
-  }
-
   if (h2_pushed_urls) {
 this->h2_pushed_urls = ink_hash_table_destroy(this->h2_pushed_urls);
   }
@@ -107,6 +102,11 @@ Http2ClientSession::free()
   REMEMBER(NO_EVENT, this->recursion)
   Http2SsnDebug("session free");
 
+  if (this->_reenable_event) {
+this->_reenable_event->cancel();
+this->_reenable_event = nullptr;
+  }
+
   // Don't free active ProxySession
   ink_release_assert(is_active() == false);
 
@@ -653,8 +653,8 @@ Http2ClientSession::remember(const SourceLocation 
, int event, int reen
 bool
 Http2ClientSession::_should_do_something_else()
 {
-  // Do something else every 128 incoming frames
-  return (this->_n_frame_read & 0x7F) == 0;
+  // Do something else every 128 incoming frames if connection state isn't 
closed
+  return (this->_n_frame_read & 0x7F) == 0 && 

[trafficserver] annotated tag 9.0.2-rc0 updated (894b593 -> 60f401c)

2021-06-22 Thread zwoop
This is an automated email from the ASF dual-hosted git repository.

zwoop pushed a change to annotated tag 9.0.2-rc0
in repository https://gitbox.apache.org/repos/asf/trafficserver.git.


*** WARNING: tag 9.0.2-rc0 was modified! ***

from 894b593  (commit)
  to 60f401c  (tag)
 tagging 894b5936f5c8f4b3ff267692594a42d314a36a3c (commit)
 replaces 9.0.1
  by Leif Hedstrom
  on Tue Jun 22 09:15:19 2021 -0600

- Log -
Release Candidate 9.0.2-rc0
-BEGIN PGP SIGNATURE-
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=e/JV
-END PGP SIGNATURE-
---


No new revisions were added by this update.

Summary of changes:


[trafficserver] branch 9.0.x updated: Updated ChangeLog

2021-06-22 Thread zwoop
This is an automated email from the ASF dual-hosted git repository.

zwoop pushed a commit to branch 9.0.x
in repository https://gitbox.apache.org/repos/asf/trafficserver.git


The following commit(s) were added to refs/heads/9.0.x by this push:
 new 894b593  Updated ChangeLog
894b593 is described below

commit 894b5936f5c8f4b3ff267692594a42d314a36a3c
Author: Leif Hedstrom 
AuthorDate: Tue Jun 22 09:14:38 2021 -0600

Updated ChangeLog
---
 CHANGELOG-9.0.2 | 1 +
 1 file changed, 1 insertion(+)

diff --git a/CHANGELOG-9.0.2 b/CHANGELOG-9.0.2
index a2ceacb..c6b4dad 100644
--- a/CHANGELOG-9.0.2
+++ b/CHANGELOG-9.0.2
@@ -17,6 +17,7 @@ Changes with Apache Traffic Server 9.0.2
   #7805 - Doc: tcpinfo plugin table formatting
   #7825 - Eliminate next dup call using stale mime field mloc in s3_auth 
plugin.
   #7833 - Don't call next next dup on destroyed mime field mloc.
+  #7840 - Fixed warning in gcc 11 about array not being initalized
   #7862 - Do not delete the continuation twice
   #7889 - Fix crash in open_close_h2 (#7586)
   #7904 - Ensure the HTTP portion of the protocol string is upper case


[trafficserver] branch master updated (6c1780c -> 9e7cece)

2021-06-22 Thread bcall
This is an automated email from the ASF dual-hosted git repository.

bcall pushed a change to branch master
in repository https://gitbox.apache.org/repos/asf/trafficserver.git.


from 6c1780c  ESI plugin documentation updates. (#7970)
 add 9e7cece  Thread safe Mersenne Twister 64 using c++11 (#7859)

No new revisions were added by this update.

Summary of changes:
 include/tscore/{defalloc.h => Random.h}| 34 ++
 src/tscore/Makefile.am |  4 +-
 .../inliner/util.h => src/tscore/Random.cc | 12 +++--
 src/tscore/unit_tests/test_Random.cc   | 52 ++
 4 files changed, 85 insertions(+), 17 deletions(-)
 copy include/tscore/{defalloc.h => Random.h} (65%)
 copy plugins/experimental/inliner/util.h => src/tscore/Random.cc (83%)
 create mode 100644 src/tscore/unit_tests/test_Random.cc


[trafficserver] branch 9.0.x updated: Fixed warning in gcc 11 about array not being initalized (#7840)

2021-06-22 Thread zwoop
This is an automated email from the ASF dual-hosted git repository.

zwoop pushed a commit to branch 9.0.x
in repository https://gitbox.apache.org/repos/asf/trafficserver.git


The following commit(s) were added to refs/heads/9.0.x by this push:
 new 747b0ff  Fixed warning in gcc 11 about array not being initalized 
(#7840)
747b0ff is described below

commit 747b0ff8591bad4d33d036ea31c6230532129fab
Author: Bryan Call 
AuthorDate: Fri May 14 12:55:20 2021 -0700

Fixed warning in gcc 11 about array not being initalized (#7840)

(cherry picked from commit db75f1869883614b49cd6276edcb138e44af7cad)
---
 src/tscore/Regex.cc | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/src/tscore/Regex.cc b/src/tscore/Regex.cc
index 9d93c8d..ea80116 100644
--- a/src/tscore/Regex.cc
+++ b/src/tscore/Regex.cc
@@ -111,7 +111,7 @@ Regex::get_capture_count()
 bool
 Regex::exec(std::string_view const )
 {
-  std::array ovector;
+  std::array ovector = {0};
   return this->exec(str, ovector.data(), ovector.size());
 }