-
Notifications
You must be signed in to change notification settings - Fork 1.1k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Unhandled OOM encountered in aws_mem_acquire with allocatorAborted #2556
Comments
Thanks for opening this issue. Can you provide the cmake file that you are using with the code you posted above? |
Greetings! It looks like this issue hasn’t been active in longer than a week. We encourage you to check if this is still an issue in the latest release. Because it has been longer than a week since the last update on this, and in the absence of more information, we will be closing this issue soon. If you find that this is still a problem, please feel free to provide a comment or add an upvote to prevent automatic closure, or if the issue is already closed, please feel free to open a new one. |
@jmklix Please find the build command
|
Will retest with latest available version and update |
I've retested this issue with latest aws-sdk-cpp verion 1.11.112 and is reproducible
when tested with ca.crt file , it returns the exception
|
What certificate is your example using for the above test? Did you put it inside the /tmp/certs/ folder
How are you generating your ca.crt for this second failure? |
The |
Do the certs come pre-loaded on the device that you are using? |
@jmklix The ca.crt is a self signed certificate which come pre-loaded in our env. |
caFile expects a file and passing a directory is not a supported behavior. That option is modeled after similar curl option, CURLOPT_CAINFO (if curl is http client, sdk should be passing caFile directly to that curl option), and we are unlikely to make any modifications to how it works. Second error seems to be due to s3-crt client not respecting verifySSL setting being set to false, as s3 endpoint should fail to validate against self signed cert otherwise? That was fixed in 1.11.218 and should work now as expected. |
@DmitriyMusatkin Thanks for the update, will check this with latest SDK version and will update you. |
I've checked this with latest SDK version 1.11.313 and confirming that received different error than the previous
|
Yes, thats expected. As i mentioned dir path is not valid for ca_file, and with the latest version it will correctly propagate the error and not initialize the client - |
yes, could see the actual reason in the log file
|
When you use the correct file path are you able to get this working? |
Greetings! It looks like this issue hasn’t been active in longer than a week. We encourage you to check if this is still an issue in the latest release. Because it has been longer than a week since the last update on this, and in the absence of more information, we will be closing this issue soon. If you find that this is still a problem, please feel free to provide a comment or add an upvote to prevent automatic closure, or if the issue is already closed, please feel free to open a new one. |
Describe the bug
The crash is observed when
Aws::S3Crt::ClientConfiguration.ca_file
is set to ca certs dir path.Expected Behavior
It should not crash and work as below
Current Behavior
Observed the crash with below message
Reproduction Steps
This behaviour easily reproducible with below code snippet
Possible Solution
NA
Additional Information/Context
NA
AWS CPP SDK version used
aws-cpp-sdk-1.11.100
Compiler and Version used
g++ (GCC) 11.2.0
Operating System and version
Linux 906f057decec 5.14.0-1057-oem #64-Ubuntu SMP Mon Jan 23 17:02:19 UTC 2023 x86_64 x86_64 x86_64 GNU/Linux
The text was updated successfully, but these errors were encountered: