You are viewing a plain text version of this content. The canonical link for it is here.
Posted to commits@trafficserver.apache.org by zw...@apache.org on 2018/03/26 23:49:28 UTC

[trafficserver] branch 7.1.x updated (c09fbcb -> 9a1fac7)

This is an automated email from the ASF dual-hosted git repository.

zwoop pushed a change to branch 7.1.x
in repository https://gitbox.apache.org/repos/asf/trafficserver.git.


    from c09fbcb  prevents connecting to INADDR_ANY hosts
     new 163e3fb  Go into timeout state regardless of whether server response data was sent.
     new 9a1fac7  Add check on continuation before dereferencing

The 2 revisions listed above as "new" are entirely new to this
repository and will be described in separate emails.  The revisions
listed as "add" were already present in the repository and have only
been added to this reference.


Summary of changes:
 proxy/PluginVC.cc    | 2 +-
 proxy/http/HttpSM.cc | 2 +-
 2 files changed, 2 insertions(+), 2 deletions(-)

-- 
To stop receiving notification emails like this one, please contact
zwoop@apache.org.

[trafficserver] 01/02: Go into timeout state regardless of whether server response data was sent.

Posted by zw...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

zwoop pushed a commit to branch 7.1.x
in repository https://gitbox.apache.org/repos/asf/trafficserver.git

commit 163e3fb91a034fc2729fbd0f0095c2305dc952ef
Author: Susan Hinrichs <sh...@apache.org>
AuthorDate: Mon Mar 19 10:26:01 2018 -0500

    Go into timeout state regardless of whether server response data was sent.
    
    We had issue where client timed out in the POST tunnel state but client_response_hdr_bytes
    was non-zero, so the original post tunnel was not shutdown.  Causing an assert in consumer_handler later.
    
    client_response_hdr_bytes may be set in the setup_100_continue logic, cache logic, and probably a few other
    paths in addition to the receive response header logic.
    
    (cherry picked from commit 60b2d998283e0c05e1270bd1870303f47c52949e)
---
 proxy/http/HttpSM.cc | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/proxy/http/HttpSM.cc b/proxy/http/HttpSM.cc
index 7461e39..fb7cf87 100644
--- a/proxy/http/HttpSM.cc
+++ b/proxy/http/HttpSM.cc
@@ -2717,7 +2717,7 @@ HttpSM::tunnel_handler_post(int event, void *data)
 
   switch (event) {
   case HTTP_TUNNEL_EVENT_DONE: // Tunnel done.
-    if (p->handler_state == HTTP_SM_POST_UA_FAIL && client_response_hdr_bytes == 0) {
+    if (p->handler_state == HTTP_SM_POST_UA_FAIL) {
       // post failed
       switch (t_state.client_info.state) {
       case HttpTransact::ACTIVE_TIMEOUT:

-- 
To stop receiving notification emails like this one, please contact
zwoop@apache.org.

[trafficserver] 02/02: Add check on continuation before dereferencing

Posted by zw...@apache.org.
This is an automated email from the ASF dual-hosted git repository.

zwoop pushed a commit to branch 7.1.x
in repository https://gitbox.apache.org/repos/asf/trafficserver.git

commit 9a1fac719e9336c6446e9fd037448b05dc54c9a0
Author: Evan Zelkowitz <ev...@comcast.com>
AuthorDate: Mon Mar 19 16:05:42 2018 -0600

    Add check on continuation before dereferencing
    
    (cherry picked from commit 51c5cf029e13739909331790a604751a22cd9f7f)
---
 proxy/PluginVC.cc | 2 +-
 1 file changed, 1 insertion(+), 1 deletion(-)

diff --git a/proxy/PluginVC.cc b/proxy/PluginVC.cc
index e2e2217..1d467af 100644
--- a/proxy/PluginVC.cc
+++ b/proxy/PluginVC.cc
@@ -262,7 +262,7 @@ PluginVC::do_io_read(Continuation *c, int64_t nbytes, MIOBuffer *buf)
 
   // Note: we set vio.op last because process_read_side looks at it to
   //  tell if the VConnection is active.
-  read_state.vio.mutex     = c->mutex;
+  read_state.vio.mutex     = c ? c->mutex : this->mutex;
   read_state.vio._cont     = c;
   read_state.vio.nbytes    = nbytes;
   read_state.vio.ndone     = 0;

-- 
To stop receiving notification emails like this one, please contact
zwoop@apache.org.