[jira] [Created] (PROTON-2006) Qpid Proton cannot connect to Azure Service Bus 'amqp:connection:framing-error'

2019-02-13 Thread Oskar Christensson (JIRA)
Oskar Christensson created PROTON-2006:
--

 Summary: Qpid Proton cannot connect to Azure Service Bus 
'amqp:connection:framing-error'
 Key: PROTON-2006
 URL: https://issues.apache.org/jira/browse/PROTON-2006
 Project: Qpid Proton
  Issue Type: Bug
  Components: cpp-binding, examples
Affects Versions: proton-c-0.28.0
Reporter: Oskar Christensson


 
{code:java}
amqp:connection:framing-error: SASL header mismatch: Insufficient data to 
determine protocol [''] (connection aborted){code}
We're trying to get a C++ connection to Azure Service Bus using AMQP with QPID 
proton, and trying out the examples under qpid-proton/cpp/examples it fails.

Steps to reproduce:
 # Clone qpid-proton
 # Follow installation and make README
 # Create new Service Bus Namespace in azure
 # Create new Service Bus Queue in Azure with Sessions enabled
 # Create a policy with all permissions
 # `./service_bus -n .servicebus.windows.net -p  -k 
 -e 

Expected results:

It should work according to the docs in the cpp/examples/service_bus.cpp docs

Actual results:
{code:java}
amqp:connection:framing-error: SASL header mismatch: Insufficient data to 
determine protocol [''] (connection aborted){code}
 



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: dev-unsubscr...@qpid.apache.org
For additional commands, e-mail: dev-h...@qpid.apache.org



[jira] [Created] (QPID-8278) Build failure on Windows

2019-02-13 Thread Cliff Jansen (JIRA)
Cliff Jansen created QPID-8278:
--

 Summary: Build failure on Windows
 Key: QPID-8278
 URL: https://issues.apache.org/jira/browse/QPID-8278
 Project: Qpid
  Issue Type: Bug
  Components: C++ Broker
Affects Versions: qpid-cpp-1.38.0
Reporter: Cliff Jansen
Assignee: Cliff Jansen


Missing extern for Windows in Queue.h causes build failuers.

Introduced with QPID-8209



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: dev-unsubscr...@qpid.apache.org
For additional commands, e-mail: dev-h...@qpid.apache.org



[jira] [Commented] (QPID-8276) [Broker-J] Broker can leak closed NonBlockingConnection objects and eventually run out of heap memory

2019-02-13 Thread Alex Rudyy (JIRA)


[ 
https://issues.apache.org/jira/browse/QPID-8276?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16767683#comment-16767683
 ] 

Alex Rudyy commented on QPID-8276:
--

The fixes were committed against wrong JIRA:

Commit 94de25eb9fb8be6e6deba38a72afcf7b14ce1d0b in qpid-broker-j's branch 
refs/heads/master from Alex Rudyy
[ https://gitbox.apache.org/repos/asf?p=qpid-broker-j.git;h=94de25e ]

QPID-8273: [Broker-J] Set notify work on channel reaching end-of-read-stream

Commit ae6fecffad5edb4abde74f1e4d2e2060702523f2 in qpid-broker-j's branch 
refs/heads/7.1.x from Alex Rudyy
[ https://gitbox.apache.org/repos/asf?p=qpid-broker-j.git;h=ae6fecf ]

QPID-8273: [Broker-J] Set notify work on channel reaching end-of-read-stream

(cherry picked from commit 94de25eb9fb8be6e6deba38a72afcf7b14ce1d0b)

Commit 2e72e832d9b8274cc09f7f1cfba313a40f8cc0da in qpid-broker-j's branch 
refs/heads/7.0.x from Alex Rudyy
[ https://gitbox.apache.org/repos/asf?p=qpid-broker-j.git;h=2e72e83 ]

QPID-8273: [Broker-J] Set notify work on channel reaching end-of-read-stream

(cherry picked from commit 94de25eb9fb8be6e6deba38a72afcf7b14ce1d0b)

> [Broker-J] Broker can leak closed NonBlockingConnection objects and 
> eventually run out of heap memory
> -
>
> Key: QPID-8276
> URL: https://issues.apache.org/jira/browse/QPID-8276
> Project: Qpid
>  Issue Type: Bug
>  Components: Broker-J
>Affects Versions: qpid-java-broker-7.0.3, qpid-java-broker-7.0.2, 
> qpid-java-broker-7.0.0, qpid-java-broker-7.0.1, qpid-java-6.1.7, 
> qpid-java-broker-7.1.0, qpid-java-broker-7.0.4, qpid-java-broker-7.0.5, 
> qpid-java-broker-7.0.6
>Reporter: Alex Rudyy
>Assignee: Alex Rudyy
>Priority: Critical
> Fix For: qpid-java-broker-7.0.7, qpid-java-broker-7.1.1
>
>
> The Qpid Broker-J can leak closed NonBlockingConnection objects.
> The heap dump analysis of impacted broker instance revealed that leaked 
> {{NonBlockingConnection}} objects are accumulated in 
> {{SelectorThread.SelectionTask#_unscheduledConnections}} belonging to AMQP 
> port IO pool. They have no ticker set and no state changed flag set 
> ({{NonBlockingConnection#isStateChanged() == false)}}. As result, the 
> NonBlockingConnection objects are not removed from 
> {{SelectorThread#_unscheduledConnections}} on invocation of 
> {{SelectorThread.SelectionTask#processUnscheduledConnections()}} called from 
> {{SelectorThread.SelectionTask#performSelect()}}.
> The {{NonBlockingConnection}} and underlying model object are in closed state.
>  It seems that leaked {{NonBlockingConnection}} was closed as part of 
> invocation {{NonBlockingConnection#doWork()}}. The connection was 
> unregistered on {{VirtualHost}} IO pool and re-registered with port IO pool 
> as part of invocation {{NetworkConnectionScheduler#processConnection}} At 
> first, it was stored in collection 
> {{SelectorThread.SelectionTask#_unregisteredConnections}}. Later on, it was 
> moved from {{SelectorThread.SelectionTask#_unregisteredConnections}} to 
> {{SelectorThread.SelectionTask#_unscheduledConnections}} as part of 
> invocation {{SelectorThread.SelectionTask#reregisterUnregisteredConnections}} 
> and stack there afterwards.
> The TLS transport was used in leaked connection, but, I think that connection 
> with plain transport can be leaked as well.
> I suspect that connections were leaked in result of following scenario:
>  * Invocation of {{SocketChannel#read(java.nio.ByteBuffer[])}} returned 
> {{-1}} in {{NonBlockingConnection#readFromNetwork}}.
>  * The flag {{NonBlockingConnection#_closed}} was set to {{true}}. The method 
> {{ProtocolEngine#notifyWork()}} was not invoked to set {{state changed}} flag 
> to {{true}}
>  * The execution of {{NonBlockingConnection#doWork()}} ended up it connection 
> shutdown (due to {{NonBlockingConnection#_closed}} being set) and following 
> re-scheduling the connection on port IO scheduler. The latter resulted in 
> connection being put into 
> {{SelectorThread.SelectionTask#_unscheduledConnections}} as described above.
> It seems that opening and closing frequent connections with connection life 
> span {{>10s}} (required for tickers to be removed) can ended-up in 
> connections being leaked as described in scenario above. It looks like 
> connections which are closed orderly or closed in result of {{IOException}} 
> being thrown from socket read/write operation are not effected by the defect.
> The impacted broker instance can eventually crash with out of memory error. 
> Broker memory monitoring and periodic broker restarts can mitigate the issue.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: 

[jira] [Updated] (QPID-8276) [Broker-J] Broker can leak closed NonBlockingConnection objects and eventually run out of heap memory

2019-02-13 Thread Alex Rudyy (JIRA)


 [ 
https://issues.apache.org/jira/browse/QPID-8276?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Alex Rudyy updated QPID-8276:
-
Status: Reviewable  (was: In Progress)

> [Broker-J] Broker can leak closed NonBlockingConnection objects and 
> eventually run out of heap memory
> -
>
> Key: QPID-8276
> URL: https://issues.apache.org/jira/browse/QPID-8276
> Project: Qpid
>  Issue Type: Bug
>  Components: Broker-J
>Affects Versions: qpid-java-broker-7.0.3, qpid-java-broker-7.0.2, 
> qpid-java-broker-7.0.0, qpid-java-broker-7.0.1, qpid-java-6.1.7, 
> qpid-java-broker-7.1.0, qpid-java-broker-7.0.4, qpid-java-broker-7.0.5, 
> qpid-java-broker-7.0.6
>Reporter: Alex Rudyy
>Assignee: Alex Rudyy
>Priority: Critical
> Fix For: qpid-java-broker-7.0.7, qpid-java-broker-7.1.1
>
>
> The Qpid Broker-J can leak closed NonBlockingConnection objects.
> The heap dump analysis of impacted broker instance revealed that leaked 
> {{NonBlockingConnection}} objects are accumulated in 
> {{SelectorThread.SelectionTask#_unscheduledConnections}} belonging to AMQP 
> port IO pool. They have no ticker set and no state changed flag set 
> ({{NonBlockingConnection#isStateChanged() == false)}}. As result, the 
> NonBlockingConnection objects are not removed from 
> {{SelectorThread#_unscheduledConnections}} on invocation of 
> {{SelectorThread.SelectionTask#processUnscheduledConnections()}} called from 
> {{SelectorThread.SelectionTask#performSelect()}}.
> The {{NonBlockingConnection}} and underlying model object are in closed state.
>  It seems that leaked {{NonBlockingConnection}} was closed as part of 
> invocation {{NonBlockingConnection#doWork()}}. The connection was 
> unregistered on {{VirtualHost}} IO pool and re-registered with port IO pool 
> as part of invocation {{NetworkConnectionScheduler#processConnection}} At 
> first, it was stored in collection 
> {{SelectorThread.SelectionTask#_unregisteredConnections}}. Later on, it was 
> moved from {{SelectorThread.SelectionTask#_unregisteredConnections}} to 
> {{SelectorThread.SelectionTask#_unscheduledConnections}} as part of 
> invocation {{SelectorThread.SelectionTask#reregisterUnregisteredConnections}} 
> and stack there afterwards.
> The TLS transport was used in leaked connection, but, I think that connection 
> with plain transport can be leaked as well.
> I suspect that connections were leaked in result of following scenario:
>  * Invocation of {{SocketChannel#read(java.nio.ByteBuffer[])}} returned 
> {{-1}} in {{NonBlockingConnection#readFromNetwork}}.
>  * The flag {{NonBlockingConnection#_closed}} was set to {{true}}. The method 
> {{ProtocolEngine#notifyWork()}} was not invoked to set {{state changed}} flag 
> to {{true}}
>  * The execution of {{NonBlockingConnection#doWork()}} ended up it connection 
> shutdown (due to {{NonBlockingConnection#_closed}} being set) and following 
> re-scheduling the connection on port IO scheduler. The latter resulted in 
> connection being put into 
> {{SelectorThread.SelectionTask#_unscheduledConnections}} as described above.
> It seems that opening and closing frequent connections with connection life 
> span {{>10s}} (required for tickers to be removed) can ended-up in 
> connections being leaked as described in scenario above. It looks like 
> connections which are closed orderly or closed in result of {{IOException}} 
> being thrown from socket read/write operation are not effected by the defect.
> The impacted broker instance can eventually crash with out of memory error. 
> Broker memory monitoring and periodic broker restarts can mitigate the issue.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: dev-unsubscr...@qpid.apache.org
For additional commands, e-mail: dev-h...@qpid.apache.org



[jira] [Assigned] (QPID-8276) [Broker-J] Broker can leak closed NonBlockingConnection objects and eventually run out of heap memory

2019-02-13 Thread Alex Rudyy (JIRA)


 [ 
https://issues.apache.org/jira/browse/QPID-8276?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Alex Rudyy reassigned QPID-8276:


Assignee: Alex Rudyy

> [Broker-J] Broker can leak closed NonBlockingConnection objects and 
> eventually run out of heap memory
> -
>
> Key: QPID-8276
> URL: https://issues.apache.org/jira/browse/QPID-8276
> Project: Qpid
>  Issue Type: Bug
>  Components: Broker-J
>Affects Versions: qpid-java-broker-7.0.3, qpid-java-broker-7.0.2, 
> qpid-java-broker-7.0.0, qpid-java-broker-7.0.1, qpid-java-6.1.7, 
> qpid-java-broker-7.1.0, qpid-java-broker-7.0.4, qpid-java-broker-7.0.5, 
> qpid-java-broker-7.0.6
>Reporter: Alex Rudyy
>Assignee: Alex Rudyy
>Priority: Critical
> Fix For: qpid-java-broker-7.0.7, qpid-java-broker-7.1.1
>
>
> The Qpid Broker-J can leak closed NonBlockingConnection objects.
> The heap dump analysis of impacted broker instance revealed that leaked 
> {{NonBlockingConnection}} objects are accumulated in 
> {{SelectorThread.SelectionTask#_unscheduledConnections}} belonging to AMQP 
> port IO pool. They have no ticker set and no state changed flag set 
> ({{NonBlockingConnection#isStateChanged() == false)}}. As result, the 
> NonBlockingConnection objects are not removed from 
> {{SelectorThread#_unscheduledConnections}} on invocation of 
> {{SelectorThread.SelectionTask#processUnscheduledConnections()}} called from 
> {{SelectorThread.SelectionTask#performSelect()}}.
> The {{NonBlockingConnection}} and underlying model object are in closed state.
>  It seems that leaked {{NonBlockingConnection}} was closed as part of 
> invocation {{NonBlockingConnection#doWork()}}. The connection was 
> unregistered on {{VirtualHost}} IO pool and re-registered with port IO pool 
> as part of invocation {{NetworkConnectionScheduler#processConnection}} At 
> first, it was stored in collection 
> {{SelectorThread.SelectionTask#_unregisteredConnections}}. Later on, it was 
> moved from {{SelectorThread.SelectionTask#_unregisteredConnections}} to 
> {{SelectorThread.SelectionTask#_unscheduledConnections}} as part of 
> invocation {{SelectorThread.SelectionTask#reregisterUnregisteredConnections}} 
> and stack there afterwards.
> The TLS transport was used in leaked connection, but, I think that connection 
> with plain transport can be leaked as well.
> I suspect that connections were leaked in result of following scenario:
>  * Invocation of {{SocketChannel#read(java.nio.ByteBuffer[])}} returned 
> {{-1}} in {{NonBlockingConnection#readFromNetwork}}.
>  * The flag {{NonBlockingConnection#_closed}} was set to {{true}}. The method 
> {{ProtocolEngine#notifyWork()}} was not invoked to set {{state changed}} flag 
> to {{true}}
>  * The execution of {{NonBlockingConnection#doWork()}} ended up it connection 
> shutdown (due to {{NonBlockingConnection#_closed}} being set) and following 
> re-scheduling the connection on port IO scheduler. The latter resulted in 
> connection being put into 
> {{SelectorThread.SelectionTask#_unscheduledConnections}} as described above.
> It seems that opening and closing frequent connections with connection life 
> span {{>10s}} (required for tickers to be removed) can ended-up in 
> connections being leaked as described in scenario above. It looks like 
> connections which are closed orderly or closed in result of {{IOException}} 
> being thrown from socket read/write operation are not effected by the defect.
> The impacted broker instance can eventually crash with out of memory error. 
> Broker memory monitoring and periodic broker restarts can mitigate the issue.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: dev-unsubscr...@qpid.apache.org
For additional commands, e-mail: dev-h...@qpid.apache.org



[jira] [Commented] (QPID-8273) [Broker-J][AMQP 0-8..0-91] Broker can crash with BufferOverflowException when sending message to consumer

2019-02-13 Thread ASF subversion and git services (JIRA)


[ 
https://issues.apache.org/jira/browse/QPID-8273?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16767679#comment-16767679
 ] 

ASF subversion and git services commented on QPID-8273:
---

Commit 2e72e832d9b8274cc09f7f1cfba313a40f8cc0da in qpid-broker-j's branch 
refs/heads/7.0.x from Alex Rudyy
[ https://gitbox.apache.org/repos/asf?p=qpid-broker-j.git;h=2e72e83 ]

QPID-8273: [Broker-J] Set notify work on channel reaching end-of-read-stream

(cherry picked from commit 94de25eb9fb8be6e6deba38a72afcf7b14ce1d0b)


> [Broker-J][AMQP 0-8..0-91] Broker can crash with BufferOverflowException when 
> sending message to consumer
> -
>
> Key: QPID-8273
> URL: https://issues.apache.org/jira/browse/QPID-8273
> Project: Qpid
>  Issue Type: Bug
>  Components: Broker-J
>Affects Versions: qpid-java-6.1.6, qpid-java-broker-7.0.3, 
> qpid-java-broker-7.0.2, qpid-java-6.0, qpid-java-6.0.1, qpid-java-6.0.2, 
> qpid-java-6.0.3, qpid-java-6.0.4, qpid-java-6.0.5, qpid-java-6.1, 
> qpid-java-6.0.6, qpid-java-6.1.1, qpid-java-6.1.2, qpid-java-6.0.7, 
> qpid-java-6.1.3, qpid-java-6.0.8, qpid-java-6.1.4, qpid-java-broker-7.0.0, 
> qpid-java-6.1.5, qpid-java-broker-7.0.1, qpid-java-6.1.7, 
> qpid-java-broker-7.1.0, qpid-java-broker-7.0.4, qpid-java-broker-7.0.5, 
> qpid-java-broker-7.0.6
>Reporter: Alex Rudyy
>Priority: Critical
> Fix For: qpid-java-broker-7.0.7, qpid-java-broker-7.1.1
>
>
> Broker can crash with BufferOverflowException when sending message to 
> consumer. The stack trace like the one below is reported into Qpid Broker 
> logs.
> {noformat}
> (o.a.q.s.Main) - Uncaught exception, shutting down.
> java.nio.BufferOverflowException: null
>   at java.nio.Buffer.nextPutIndex(Buffer.java:527)
>   at java.nio.DirectByteBuffer.putLong(DirectByteBuffer.java:797)
>   at 
> org.apache.qpid.bytebuffer.QpidByteBuffer.putLong(QpidByteBuffer.java:500)
>   at 
> org.apache.qpid.framing.BasicContentHeaderProperties.writePropertyListPayload(BasicContentHeaderProperties.java:293)
>   at 
> org.apache.qpid.framing.BasicContentHeaderProperties.writePropertyListPayload(BasicContentHeaderProperties.java:471)
>   at 
> org.apache.qpid.framing.ContentHeaderBody.writePayload(ContentHeaderBody.java:100)
>   at org.apache.qpid.framing.AMQFrame.writePayload(AMQFrame.java:69)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl$CompositeAMQBodyBlock.writePayload(ProtocolOutputConverterImpl.java:542)
>   at 
> org.apache.qpid.server.protocol.v0_8.AMQPConnection_0_8Impl.writeFrame(AMQPConnection_0_8Impl.java:382)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeFrame(ProtocolOutputConverterImpl.java:501)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeMessageDeliveryUnchanged(ProtocolOutputConverterImpl.java:227)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeMessageDelivery(ProtocolOutputConverterImpl.java:138)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeMessageDelivery(ProtocolOutputConverterImpl.java:95)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeDeliver(ProtocolOutputConverterImpl.java:72)
>   at 
> org.apache.qpid.server.protocol.v0_8.AMQPConnection_0_8Impl$WriteDeliverMethod.deliverToClient(AMQPConnection_0_8Impl.java:1275)
>   at 
> org.apache.qpid.server.protocol.v0_8.ConsumerTarget_0_8.sendToClient(ConsumerTarget_0_8.java:452)
>   at 
> org.apache.qpid.server.protocol.v0_8.ConsumerTarget_0_8$AckConsumer.doSend(ConsumerTarget_0_8.java:274)
>   at 
> org.apache.qpid.server.consumer.AbstractConsumerTarget.sendNextMessage(AbstractConsumerTarget.java:327)
>   at 
> org.apache.qpid.server.consumer.AbstractConsumerTarget.processPending(AbstractConsumerTarget.java:99)
>   at 
> org.apache.qpid.server.protocol.v0_8.AMQChannel.processPending(AMQChannel.java:3797)
>   at 
> org.apache.qpid.server.protocol.v0_8.AMQPConnection_0_8Impl$ProcessPendingIterator$1.run(AMQPConnection_0_8Impl.java:1447)
>   at 
> org.apache.qpid.server.transport.NonBlockingConnection.processPending(NonBlockingConnection.java:375)
>   at 
> org.apache.qpid.server.transport.NonBlockingConnection.doWork(NonBlockingConnection.java:279)
>   at 
> org.apache.qpid.server.transport.NetworkConnectionScheduler.processConnection(NetworkConnectionScheduler.java:130)
>   at 
> org.apache.qpid.server.transport.SelectorThread$ConnectionProcessor.processConnection(SelectorThread.java:563)
>   at 
> org.apache.qpid.server.transport.SelectorThread$ConnectionProcessor.run(SelectorThread.java:551)
>   at 
> 

[jira] [Commented] (QPID-8273) [Broker-J][AMQP 0-8..0-91] Broker can crash with BufferOverflowException when sending message to consumer

2019-02-13 Thread ASF subversion and git services (JIRA)


[ 
https://issues.apache.org/jira/browse/QPID-8273?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16767678#comment-16767678
 ] 

ASF subversion and git services commented on QPID-8273:
---

Commit ae6fecffad5edb4abde74f1e4d2e2060702523f2 in qpid-broker-j's branch 
refs/heads/7.1.x from Alex Rudyy
[ https://gitbox.apache.org/repos/asf?p=qpid-broker-j.git;h=ae6fecf ]

QPID-8273: [Broker-J] Set notify work on channel reaching end-of-read-stream

(cherry picked from commit 94de25eb9fb8be6e6deba38a72afcf7b14ce1d0b)


> [Broker-J][AMQP 0-8..0-91] Broker can crash with BufferOverflowException when 
> sending message to consumer
> -
>
> Key: QPID-8273
> URL: https://issues.apache.org/jira/browse/QPID-8273
> Project: Qpid
>  Issue Type: Bug
>  Components: Broker-J
>Affects Versions: qpid-java-6.1.6, qpid-java-broker-7.0.3, 
> qpid-java-broker-7.0.2, qpid-java-6.0, qpid-java-6.0.1, qpid-java-6.0.2, 
> qpid-java-6.0.3, qpid-java-6.0.4, qpid-java-6.0.5, qpid-java-6.1, 
> qpid-java-6.0.6, qpid-java-6.1.1, qpid-java-6.1.2, qpid-java-6.0.7, 
> qpid-java-6.1.3, qpid-java-6.0.8, qpid-java-6.1.4, qpid-java-broker-7.0.0, 
> qpid-java-6.1.5, qpid-java-broker-7.0.1, qpid-java-6.1.7, 
> qpid-java-broker-7.1.0, qpid-java-broker-7.0.4, qpid-java-broker-7.0.5, 
> qpid-java-broker-7.0.6
>Reporter: Alex Rudyy
>Priority: Critical
> Fix For: qpid-java-broker-7.0.7, qpid-java-broker-7.1.1
>
>
> Broker can crash with BufferOverflowException when sending message to 
> consumer. The stack trace like the one below is reported into Qpid Broker 
> logs.
> {noformat}
> (o.a.q.s.Main) - Uncaught exception, shutting down.
> java.nio.BufferOverflowException: null
>   at java.nio.Buffer.nextPutIndex(Buffer.java:527)
>   at java.nio.DirectByteBuffer.putLong(DirectByteBuffer.java:797)
>   at 
> org.apache.qpid.bytebuffer.QpidByteBuffer.putLong(QpidByteBuffer.java:500)
>   at 
> org.apache.qpid.framing.BasicContentHeaderProperties.writePropertyListPayload(BasicContentHeaderProperties.java:293)
>   at 
> org.apache.qpid.framing.BasicContentHeaderProperties.writePropertyListPayload(BasicContentHeaderProperties.java:471)
>   at 
> org.apache.qpid.framing.ContentHeaderBody.writePayload(ContentHeaderBody.java:100)
>   at org.apache.qpid.framing.AMQFrame.writePayload(AMQFrame.java:69)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl$CompositeAMQBodyBlock.writePayload(ProtocolOutputConverterImpl.java:542)
>   at 
> org.apache.qpid.server.protocol.v0_8.AMQPConnection_0_8Impl.writeFrame(AMQPConnection_0_8Impl.java:382)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeFrame(ProtocolOutputConverterImpl.java:501)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeMessageDeliveryUnchanged(ProtocolOutputConverterImpl.java:227)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeMessageDelivery(ProtocolOutputConverterImpl.java:138)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeMessageDelivery(ProtocolOutputConverterImpl.java:95)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeDeliver(ProtocolOutputConverterImpl.java:72)
>   at 
> org.apache.qpid.server.protocol.v0_8.AMQPConnection_0_8Impl$WriteDeliverMethod.deliverToClient(AMQPConnection_0_8Impl.java:1275)
>   at 
> org.apache.qpid.server.protocol.v0_8.ConsumerTarget_0_8.sendToClient(ConsumerTarget_0_8.java:452)
>   at 
> org.apache.qpid.server.protocol.v0_8.ConsumerTarget_0_8$AckConsumer.doSend(ConsumerTarget_0_8.java:274)
>   at 
> org.apache.qpid.server.consumer.AbstractConsumerTarget.sendNextMessage(AbstractConsumerTarget.java:327)
>   at 
> org.apache.qpid.server.consumer.AbstractConsumerTarget.processPending(AbstractConsumerTarget.java:99)
>   at 
> org.apache.qpid.server.protocol.v0_8.AMQChannel.processPending(AMQChannel.java:3797)
>   at 
> org.apache.qpid.server.protocol.v0_8.AMQPConnection_0_8Impl$ProcessPendingIterator$1.run(AMQPConnection_0_8Impl.java:1447)
>   at 
> org.apache.qpid.server.transport.NonBlockingConnection.processPending(NonBlockingConnection.java:375)
>   at 
> org.apache.qpid.server.transport.NonBlockingConnection.doWork(NonBlockingConnection.java:279)
>   at 
> org.apache.qpid.server.transport.NetworkConnectionScheduler.processConnection(NetworkConnectionScheduler.java:130)
>   at 
> org.apache.qpid.server.transport.SelectorThread$ConnectionProcessor.processConnection(SelectorThread.java:563)
>   at 
> org.apache.qpid.server.transport.SelectorThread$ConnectionProcessor.run(SelectorThread.java:551)
>   at 
> 

[jira] [Commented] (QPID-8273) [Broker-J][AMQP 0-8..0-91] Broker can crash with BufferOverflowException when sending message to consumer

2019-02-13 Thread ASF subversion and git services (JIRA)


[ 
https://issues.apache.org/jira/browse/QPID-8273?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16767677#comment-16767677
 ] 

ASF subversion and git services commented on QPID-8273:
---

Commit 94de25eb9fb8be6e6deba38a72afcf7b14ce1d0b in qpid-broker-j's branch 
refs/heads/master from Alex Rudyy
[ https://gitbox.apache.org/repos/asf?p=qpid-broker-j.git;h=94de25e ]

QPID-8273: [Broker-J] Set notify work on channel reaching end-of-read-stream


> [Broker-J][AMQP 0-8..0-91] Broker can crash with BufferOverflowException when 
> sending message to consumer
> -
>
> Key: QPID-8273
> URL: https://issues.apache.org/jira/browse/QPID-8273
> Project: Qpid
>  Issue Type: Bug
>  Components: Broker-J
>Affects Versions: qpid-java-6.1.6, qpid-java-broker-7.0.3, 
> qpid-java-broker-7.0.2, qpid-java-6.0, qpid-java-6.0.1, qpid-java-6.0.2, 
> qpid-java-6.0.3, qpid-java-6.0.4, qpid-java-6.0.5, qpid-java-6.1, 
> qpid-java-6.0.6, qpid-java-6.1.1, qpid-java-6.1.2, qpid-java-6.0.7, 
> qpid-java-6.1.3, qpid-java-6.0.8, qpid-java-6.1.4, qpid-java-broker-7.0.0, 
> qpid-java-6.1.5, qpid-java-broker-7.0.1, qpid-java-6.1.7, 
> qpid-java-broker-7.1.0, qpid-java-broker-7.0.4, qpid-java-broker-7.0.5, 
> qpid-java-broker-7.0.6
>Reporter: Alex Rudyy
>Priority: Critical
> Fix For: qpid-java-broker-7.0.7, qpid-java-broker-7.1.1
>
>
> Broker can crash with BufferOverflowException when sending message to 
> consumer. The stack trace like the one below is reported into Qpid Broker 
> logs.
> {noformat}
> (o.a.q.s.Main) - Uncaught exception, shutting down.
> java.nio.BufferOverflowException: null
>   at java.nio.Buffer.nextPutIndex(Buffer.java:527)
>   at java.nio.DirectByteBuffer.putLong(DirectByteBuffer.java:797)
>   at 
> org.apache.qpid.bytebuffer.QpidByteBuffer.putLong(QpidByteBuffer.java:500)
>   at 
> org.apache.qpid.framing.BasicContentHeaderProperties.writePropertyListPayload(BasicContentHeaderProperties.java:293)
>   at 
> org.apache.qpid.framing.BasicContentHeaderProperties.writePropertyListPayload(BasicContentHeaderProperties.java:471)
>   at 
> org.apache.qpid.framing.ContentHeaderBody.writePayload(ContentHeaderBody.java:100)
>   at org.apache.qpid.framing.AMQFrame.writePayload(AMQFrame.java:69)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl$CompositeAMQBodyBlock.writePayload(ProtocolOutputConverterImpl.java:542)
>   at 
> org.apache.qpid.server.protocol.v0_8.AMQPConnection_0_8Impl.writeFrame(AMQPConnection_0_8Impl.java:382)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeFrame(ProtocolOutputConverterImpl.java:501)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeMessageDeliveryUnchanged(ProtocolOutputConverterImpl.java:227)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeMessageDelivery(ProtocolOutputConverterImpl.java:138)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeMessageDelivery(ProtocolOutputConverterImpl.java:95)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeDeliver(ProtocolOutputConverterImpl.java:72)
>   at 
> org.apache.qpid.server.protocol.v0_8.AMQPConnection_0_8Impl$WriteDeliverMethod.deliverToClient(AMQPConnection_0_8Impl.java:1275)
>   at 
> org.apache.qpid.server.protocol.v0_8.ConsumerTarget_0_8.sendToClient(ConsumerTarget_0_8.java:452)
>   at 
> org.apache.qpid.server.protocol.v0_8.ConsumerTarget_0_8$AckConsumer.doSend(ConsumerTarget_0_8.java:274)
>   at 
> org.apache.qpid.server.consumer.AbstractConsumerTarget.sendNextMessage(AbstractConsumerTarget.java:327)
>   at 
> org.apache.qpid.server.consumer.AbstractConsumerTarget.processPending(AbstractConsumerTarget.java:99)
>   at 
> org.apache.qpid.server.protocol.v0_8.AMQChannel.processPending(AMQChannel.java:3797)
>   at 
> org.apache.qpid.server.protocol.v0_8.AMQPConnection_0_8Impl$ProcessPendingIterator$1.run(AMQPConnection_0_8Impl.java:1447)
>   at 
> org.apache.qpid.server.transport.NonBlockingConnection.processPending(NonBlockingConnection.java:375)
>   at 
> org.apache.qpid.server.transport.NonBlockingConnection.doWork(NonBlockingConnection.java:279)
>   at 
> org.apache.qpid.server.transport.NetworkConnectionScheduler.processConnection(NetworkConnectionScheduler.java:130)
>   at 
> org.apache.qpid.server.transport.SelectorThread$ConnectionProcessor.processConnection(SelectorThread.java:563)
>   at 
> org.apache.qpid.server.transport.SelectorThread$ConnectionProcessor.run(SelectorThread.java:551)
>   at 
> org.apache.qpid.server.transport.SelectorThread.run(SelectorThread.java:521)
>  

[jira] [Commented] (PROTON-2005) [proton-c] AMQP error if delivery is aborted with session_outgoing bytes > 0

2019-02-13 Thread Chuck Rolke (JIRA)


[ 
https://issues.apache.org/jira/browse/PROTON-2005?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16767297#comment-16767297
 ] 

Chuck Rolke commented on PROTON-2005:
-

The file attachments are:
 * selftest-printf.txt.txt - print statements in the python test code showing 
which messages were aborted or not.
 * router-print-debug.txt - verbose logging in router message.c to 1) show all 
the proton event entry and exit counter details, 
and 2) details of each call to pn_link_send. Look at line 2615, time 
0461.141453 S to see the what happened at the abort call.
 * router-scrape.html - the scraper output file of the merged routers. The 
protocol error is at time 7:41.141514. 
For convenient viewing in the Connections, Connections by ConnectionId section 
view only connection A1_4. (Deselect All, then check only that connection.

 

> [proton-c] AMQP error if delivery is aborted with session_outgoing bytes > 0
> 
>
> Key: PROTON-2005
> URL: https://issues.apache.org/jira/browse/PROTON-2005
> Project: Qpid Proton
>  Issue Type: Bug
>  Components: proton-c
>Affects Versions: proton-c-0.26.0, proton-c-0.27.0
>Reporter: Chuck Rolke
>Priority: Critical
> Attachments: PROTON-2005-router-print-debug.txt, 
> PROTON-2005-router-scrape.html, PROTON-2005-selftest-printf.txt.txt
>
>
> Running the test case in https://issues.apache.org/jira/browse/DISPATCH-1265
> The self test is  a two-router network with a test sender sending to router A 
> and a test receiver receiving from router B. The test sender is sending some 
> number of bytes and then aborting the delivery. In the observations here 
> router A is transmitting incorrect AMQP over the interrouter link to router B 
> in response to the abort.
>  * A 400K byte message is being transmitted. 320K bytes have already gone 
> over the wire
>  * The message is aborted. with  session_outgoing 84992
>  * Over the wire six transfers send the 84992 bytes with the same delivery-id 
> and with abort=true
> A dispatch log scraper trace of router A for the interrouter link to router B:
>  
> {{  delivery 21 is in progress}}
> {{2019-02-08 05:07:41.140975 A0#1480 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) more transfer_93 - 16346 bytes (pending)}}
> {{2019-02-08 05:07:41.141066 A0#1486 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) more transfer_99 - 16346 bytes (pending)}}
> {{2019-02-08 05:07:41.141087 A0#1488 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) more transfer_102 - 228 bytes (pending)}}
> {{2019-02-08 05:07:41.141169 A0#1492 A [A0_4] <- [B0_1] B flow [0,10] 
> (14,250)}}
> {{  delivery 21 is aborted with session_outgoing 84992}}
> {{  over the wire the session bytes are bled down with multiple transfers 
> that have both 'more' and 'aborted' set true}}
> {{2019-02-08 05:07:41.141514 A0#1513 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) settled more aborted transfer_93 - 16342 bytes transfer presettled}}
> {{2019-02-08 05:07:41.141538 A0#1514 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) settled more aborted transfer_94 - 16342 bytes transfer presettled}}
> {{2019-02-08 05:07:41.141564 A0#1517 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) settled more aborted transfer_96 - 16342 bytes transfer presettled}}
> {{2019-02-08 05:07:41.141603 A0#1521 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) settled more aborted transfer_99 - 16342 bytes transfer presettled}}
> {{2019-02-08 05:07:41.141669 A0#1527 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) settled more aborted transfer_92 - 16342 bytes transfer presettled}}
> {{2019-02-08 05:07:41.141722 A0#1531 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) settled aborted transfer_93 - 13522 bytes transfer presettled}}
> {{  delivery 22 is started}}
> {{2019-02-08 05:07:41.142542 A0#1576 A [A0_4] -> [B0_1] B transfer [0,10] 
> (22) more transfer_107 - 16346 bytes (pending)}}
> {{2019-02-08 05:07:41.142578 A0#1579 A [A0_4] -> [B0_1] B transfer [0,10] 
> (22) more transfer_108 - 16346 bytes (pending)}}
> {{2019-02-08 05:07:41.142608 A0#1581 A [A0_4] -> [B0_1] B transfer [0,10] 
> (22) more transfer_109 - 16346 bytes (pending) ...}}
> {{  eventually peer router B closes the connection}}
> {{2019-02-08 05:07:41.144746 A0#1730 A [A0_4] <- [B0_1] B close [0] error 
> :"amqp:session:invalid-field" "sequencing error, expected delivery-id 22, got 
> 21"}}
> {{2019-02-08 05:07:41.144767 A0#1732 A [A0_4] <- [B0_1] B EOS}}
> The transfer at 05:07:41.141514 settles the delivery and the next transfer is 
> an AMQP protocol violation.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: dev-unsubscr...@qpid.apache.org
For additional commands, e-mail: dev-h...@qpid.apache.org



[jira] [Updated] (PROTON-2005) [proton-c] AMQP error if delivery is aborted with session_outgoing bytes > 0

2019-02-13 Thread Chuck Rolke (JIRA)


 [ 
https://issues.apache.org/jira/browse/PROTON-2005?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Chuck Rolke updated PROTON-2005:

Attachment: PROTON-2005-selftest-printf.txt.txt
PROTON-2005-router-scrape.html
PROTON-2005-router-print-debug.txt

> [proton-c] AMQP error if delivery is aborted with session_outgoing bytes > 0
> 
>
> Key: PROTON-2005
> URL: https://issues.apache.org/jira/browse/PROTON-2005
> Project: Qpid Proton
>  Issue Type: Bug
>  Components: proton-c
>Affects Versions: proton-c-0.26.0, proton-c-0.27.0
>Reporter: Chuck Rolke
>Priority: Critical
> Attachments: PROTON-2005-router-print-debug.txt, 
> PROTON-2005-router-scrape.html, PROTON-2005-selftest-printf.txt.txt
>
>
> Running the test case in https://issues.apache.org/jira/browse/DISPATCH-1265
> The self test is  a two-router network with a test sender sending to router A 
> and a test receiver receiving from router B. The test sender is sending some 
> number of bytes and then aborting the delivery. In the observations here 
> router A is transmitting incorrect AMQP over the interrouter link to router B 
> in response to the abort.
>  * A 400K byte message is being transmitted. 320K bytes have already gone 
> over the wire
>  * The message is aborted. with  session_outgoing 84992
>  * Over the wire six transfers send the 84992 bytes with the same delivery-id 
> and with abort=true
> A dispatch log scraper trace of router A for the interrouter link to router B:
>  
> {{  delivery 21 is in progress}}
> {{2019-02-08 05:07:41.140975 A0#1480 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) more transfer_93 - 16346 bytes (pending)}}
> {{2019-02-08 05:07:41.141066 A0#1486 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) more transfer_99 - 16346 bytes (pending)}}
> {{2019-02-08 05:07:41.141087 A0#1488 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) more transfer_102 - 228 bytes (pending)}}
> {{2019-02-08 05:07:41.141169 A0#1492 A [A0_4] <- [B0_1] B flow [0,10] 
> (14,250)}}
> {{  delivery 21 is aborted with session_outgoing 84992}}
> {{  over the wire the session bytes are bled down with multiple transfers 
> that have both 'more' and 'aborted' set true}}
> {{2019-02-08 05:07:41.141514 A0#1513 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) settled more aborted transfer_93 - 16342 bytes transfer presettled}}
> {{2019-02-08 05:07:41.141538 A0#1514 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) settled more aborted transfer_94 - 16342 bytes transfer presettled}}
> {{2019-02-08 05:07:41.141564 A0#1517 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) settled more aborted transfer_96 - 16342 bytes transfer presettled}}
> {{2019-02-08 05:07:41.141603 A0#1521 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) settled more aborted transfer_99 - 16342 bytes transfer presettled}}
> {{2019-02-08 05:07:41.141669 A0#1527 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) settled more aborted transfer_92 - 16342 bytes transfer presettled}}
> {{2019-02-08 05:07:41.141722 A0#1531 A [A0_4] -> [B0_1] B transfer [0,10] 
> (21) settled aborted transfer_93 - 13522 bytes transfer presettled}}
> {{  delivery 22 is started}}
> {{2019-02-08 05:07:41.142542 A0#1576 A [A0_4] -> [B0_1] B transfer [0,10] 
> (22) more transfer_107 - 16346 bytes (pending)}}
> {{2019-02-08 05:07:41.142578 A0#1579 A [A0_4] -> [B0_1] B transfer [0,10] 
> (22) more transfer_108 - 16346 bytes (pending)}}
> {{2019-02-08 05:07:41.142608 A0#1581 A [A0_4] -> [B0_1] B transfer [0,10] 
> (22) more transfer_109 - 16346 bytes (pending) ...}}
> {{  eventually peer router B closes the connection}}
> {{2019-02-08 05:07:41.144746 A0#1730 A [A0_4] <- [B0_1] B close [0] error 
> :"amqp:session:invalid-field" "sequencing error, expected delivery-id 22, got 
> 21"}}
> {{2019-02-08 05:07:41.144767 A0#1732 A [A0_4] <- [B0_1] B EOS}}
> The transfer at 05:07:41.141514 settles the delivery and the next transfer is 
> an AMQP protocol violation.



--
This message was sent by Atlassian JIRA
(v7.6.3#76005)

-
To unsubscribe, e-mail: dev-unsubscr...@qpid.apache.org
For additional commands, e-mail: dev-h...@qpid.apache.org



[jira] [Commented] (QPID-8273) [Broker-J][AMQP 0-8..0-91] Broker can crash with BufferOverflowException when sending message to consumer

2019-02-13 Thread ASF GitHub Bot (JIRA)


[ 
https://issues.apache.org/jira/browse/QPID-8273?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanel=16767212#comment-16767212
 ] 

ASF GitHub Bot commented on QPID-8273:
--

alex-rufous commented on pull request #21: QPID-8273: [Broker-J] Handle 
malformed messages on message routing, f…
URL: https://github.com/apache/qpid-broker-j/pull/21
 
 
   QPID-8273: [Broker-J] Handle malformed messages on message routing, flowing 
to disk, reallocation and delivery to consumer
 

This is an automated message from the Apache Git Service.
To respond to the message, please log on GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


> [Broker-J][AMQP 0-8..0-91] Broker can crash with BufferOverflowException when 
> sending message to consumer
> -
>
> Key: QPID-8273
> URL: https://issues.apache.org/jira/browse/QPID-8273
> Project: Qpid
>  Issue Type: Bug
>  Components: Broker-J
>Affects Versions: qpid-java-6.1.6, qpid-java-broker-7.0.3, 
> qpid-java-broker-7.0.2, qpid-java-6.0, qpid-java-6.0.1, qpid-java-6.0.2, 
> qpid-java-6.0.3, qpid-java-6.0.4, qpid-java-6.0.5, qpid-java-6.1, 
> qpid-java-6.0.6, qpid-java-6.1.1, qpid-java-6.1.2, qpid-java-6.0.7, 
> qpid-java-6.1.3, qpid-java-6.0.8, qpid-java-6.1.4, qpid-java-broker-7.0.0, 
> qpid-java-6.1.5, qpid-java-broker-7.0.1, qpid-java-6.1.7, 
> qpid-java-broker-7.1.0, qpid-java-broker-7.0.4, qpid-java-broker-7.0.5, 
> qpid-java-broker-7.0.6
>Reporter: Alex Rudyy
>Priority: Critical
> Fix For: qpid-java-broker-7.0.7, qpid-java-broker-7.1.1
>
>
> Broker can crash with BufferOverflowException when sending message to 
> consumer. The stack trace like the one below is reported into Qpid Broker 
> logs.
> {noformat}
> (o.a.q.s.Main) - Uncaught exception, shutting down.
> java.nio.BufferOverflowException: null
>   at java.nio.Buffer.nextPutIndex(Buffer.java:527)
>   at java.nio.DirectByteBuffer.putLong(DirectByteBuffer.java:797)
>   at 
> org.apache.qpid.bytebuffer.QpidByteBuffer.putLong(QpidByteBuffer.java:500)
>   at 
> org.apache.qpid.framing.BasicContentHeaderProperties.writePropertyListPayload(BasicContentHeaderProperties.java:293)
>   at 
> org.apache.qpid.framing.BasicContentHeaderProperties.writePropertyListPayload(BasicContentHeaderProperties.java:471)
>   at 
> org.apache.qpid.framing.ContentHeaderBody.writePayload(ContentHeaderBody.java:100)
>   at org.apache.qpid.framing.AMQFrame.writePayload(AMQFrame.java:69)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl$CompositeAMQBodyBlock.writePayload(ProtocolOutputConverterImpl.java:542)
>   at 
> org.apache.qpid.server.protocol.v0_8.AMQPConnection_0_8Impl.writeFrame(AMQPConnection_0_8Impl.java:382)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeFrame(ProtocolOutputConverterImpl.java:501)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeMessageDeliveryUnchanged(ProtocolOutputConverterImpl.java:227)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeMessageDelivery(ProtocolOutputConverterImpl.java:138)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeMessageDelivery(ProtocolOutputConverterImpl.java:95)
>   at 
> org.apache.qpid.server.protocol.v0_8.ProtocolOutputConverterImpl.writeDeliver(ProtocolOutputConverterImpl.java:72)
>   at 
> org.apache.qpid.server.protocol.v0_8.AMQPConnection_0_8Impl$WriteDeliverMethod.deliverToClient(AMQPConnection_0_8Impl.java:1275)
>   at 
> org.apache.qpid.server.protocol.v0_8.ConsumerTarget_0_8.sendToClient(ConsumerTarget_0_8.java:452)
>   at 
> org.apache.qpid.server.protocol.v0_8.ConsumerTarget_0_8$AckConsumer.doSend(ConsumerTarget_0_8.java:274)
>   at 
> org.apache.qpid.server.consumer.AbstractConsumerTarget.sendNextMessage(AbstractConsumerTarget.java:327)
>   at 
> org.apache.qpid.server.consumer.AbstractConsumerTarget.processPending(AbstractConsumerTarget.java:99)
>   at 
> org.apache.qpid.server.protocol.v0_8.AMQChannel.processPending(AMQChannel.java:3797)
>   at 
> org.apache.qpid.server.protocol.v0_8.AMQPConnection_0_8Impl$ProcessPendingIterator$1.run(AMQPConnection_0_8Impl.java:1447)
>   at 
> org.apache.qpid.server.transport.NonBlockingConnection.processPending(NonBlockingConnection.java:375)
>   at 
> org.apache.qpid.server.transport.NonBlockingConnection.doWork(NonBlockingConnection.java:279)
>   at 
> org.apache.qpid.server.transport.NetworkConnectionScheduler.processConnection(NetworkConnectionScheduler.java:130)
>   

[GitHub] alex-rufous opened a new pull request #21: QPID-8273: [Broker-J] Handle malformed messages on message routing, f…

2019-02-13 Thread GitBox
alex-rufous opened a new pull request #21: QPID-8273: [Broker-J] Handle 
malformed messages on message routing, f…
URL: https://github.com/apache/qpid-broker-j/pull/21
 
 
   QPID-8273: [Broker-J] Handle malformed messages on message routing, flowing 
to disk, reallocation and delivery to consumer


This is an automated message from the Apache Git Service.
To respond to the message, please log on GitHub and use the
URL above to go to the specific comment.
 
For queries about this service, please contact Infrastructure at:
us...@infra.apache.org


With regards,
Apache Git Services

-
To unsubscribe, e-mail: dev-unsubscr...@qpid.apache.org
For additional commands, e-mail: dev-h...@qpid.apache.org