aboutsummaryrefslogtreecommitdiffstats
path: root/lib/inets/test/old_httpd_SUITE_data/Makefile.src
diff options
context:
space:
mode:
authorAnders Svensson <[email protected]>2018-02-01 11:11:55 +0100
committerAnders Svensson <[email protected]>2018-02-01 11:36:43 +0100
commitd73df2f7850184a8e1f44fdc82217935c25e867b (patch)
treeae03db39525715798c5d93fdde7a0afd0288c4f0 /lib/inets/test/old_httpd_SUITE_data/Makefile.src
parent194513197e19cd592f3f5c2231510542f5193fe4 (diff)
downloadotp-d73df2f7850184a8e1f44fdc82217935c25e867b.tar.gz
otp-d73df2f7850184a8e1f44fdc82217935c25e867b.tar.bz2
otp-d73df2f7850184a8e1f44fdc82217935c25e867b.zip
Fix handling of SUSPECT connections at service termination
A peer connection in watchdog state SUSPECT is represented by a peer table entry in diameter_service, but not by a request table entry in diameter_peer, so diameter_service:terminate/2 could result in failures like this: exception error: no match of right hand side value [] in function diameter_traffic:peer_down/1 (base/diameter_traffic.erl, line 141) in call from lists:foldl/3 (lists.erl, line 1263) in call from ets:do_foldl/4 (ets.erl, line 611) in call from ets:foldl/3 (ets.erl, line 600) in call from diameter_service:terminate/2 (base/diameter_service.erl, line 557) in call from gen_server:try_terminate/3 (gen_server.erl, line 648) in call from gen_server:terminate/10 (gen_server.erl, line 833) in call from gen_server:handle_msg/6 (gen_server.erl, line 679)
Diffstat (limited to 'lib/inets/test/old_httpd_SUITE_data/Makefile.src')
0 files changed, 0 insertions, 0 deletions