diff options
author | Anders Svensson <[email protected]> | 2018-02-01 11:11:55 +0100 |
---|---|---|
committer | Anders Svensson <[email protected]> | 2018-02-01 11:36:43 +0100 |
commit | d73df2f7850184a8e1f44fdc82217935c25e867b (patch) | |
tree | ae03db39525715798c5d93fdde7a0afd0288c4f0 /lib/crypto/test | |
parent | 194513197e19cd592f3f5c2231510542f5193fe4 (diff) | |
download | otp-d73df2f7850184a8e1f44fdc82217935c25e867b.tar.gz otp-d73df2f7850184a8e1f44fdc82217935c25e867b.tar.bz2 otp-d73df2f7850184a8e1f44fdc82217935c25e867b.zip |
Fix handling of SUSPECT connections at service termination
A peer connection in watchdog state SUSPECT is represented by a peer
table entry in diameter_service, but not by a request table entry in
diameter_peer, so diameter_service:terminate/2 could result in failures
like this:
exception error: no match of right hand side value []
in function diameter_traffic:peer_down/1 (base/diameter_traffic.erl, line 141)
in call from lists:foldl/3 (lists.erl, line 1263)
in call from ets:do_foldl/4 (ets.erl, line 611)
in call from ets:foldl/3 (ets.erl, line 600)
in call from diameter_service:terminate/2 (base/diameter_service.erl, line 557)
in call from gen_server:try_terminate/3 (gen_server.erl, line 648)
in call from gen_server:terminate/10 (gen_server.erl, line 833)
in call from gen_server:handle_msg/6 (gen_server.erl, line 679)
Diffstat (limited to 'lib/crypto/test')
0 files changed, 0 insertions, 0 deletions