On Wed, Mar 27, 2024 at 02:26:47PM -0300, Ricardo Nabinger Sanchez wrote:
> On Wed, 27 Mar 2024 11:06:39 -0300
> Felipe Wilhelms Damasio wrote:
>
> > kernel: traps: haproxy[2057993] trap invalid opcode ip:5b3e26
> > sp:7fd7c002f100 error:0 in haproxy[42c000+1f7000]
>
> We managed to get a core
Fix typo in patch formatting.
Richard
diff --git a/include/haproxy/ssl_ckch.h b/include/haproxy/ssl_ckch.h
index 94c53b301..00ba2bf18 100644
--- a/include/haproxy/ssl_ckch.h
+++ b/include/haproxy/ssl_ckch.h
@@ -72,5 +72,14 @@ int __ssl_store_load_locations_file(char *path, int create_if_none,
Apologies for the badly pasted diff
Richard
diff --git a/include/haproxy/ssl_ckch.h b/include/haproxy/ssl_ckch.h
index 94c53b301..00ba2bf18 100644
--- a/include/haproxy/ssl_ckch.h
+++ b/include/haproxy/ssl_ckch.h
@@ -72,5 +72,14 @@ int __ssl_store_load_locations_file(char *path, int
diff --git a/include/haproxy/ssl_ckch.h b/include/haproxy/ssl_ckch.h
index 94c53b301..00ba2bf18 100644
--- a/include/haproxy/ssl_ckch.h
+++ b/include/haproxy/ssl_ckch.h
@@ -72,5 +72,14 @@ int __ssl_store_load_locations_file(char *path, int
create_if_none, enum cafile_
extern struct cert_exts
Hello,
This is an RFC to recreate private keys in the worker process
for PKCS#11, so that HSM keys can be used in -W mode.
- ssl_ckch.c: add map of ckch_data to PEM data
- ssl_sock.c: add map of SSL_CTX* to ckch_data
- maps are implemented using buckets of linked lists
it is explicit and in
On Wed, 27 Mar 2024 11:06:39 -0300
Felipe Wilhelms Damasio wrote:
> kernel: traps: haproxy[2057993] trap invalid opcode ip:5b3e26
> sp:7fd7c002f100 error:0 in haproxy[42c000+1f7000]
We managed to get a core file, and so created ticket #2508
(https://github.com/haproxy/haproxy/issues/2508) with
it is pretty rare case, however displaying "bt" may provide some ideas what
went wrong
Ilya Shipitsin (1):
CI: vtest: show coredumps if any
.github/workflows/vtest.yml | 26 +-
1 file changed, 25 insertions(+), 1 deletion(-)
--
2.44.0
if any coredump is found, it is passed to gdb with
'thread apply all bt full'
---
.github/workflows/vtest.yml | 26 +-
1 file changed, 25 insertions(+), 1 deletion(-)
diff --git a/.github/workflows/vtest.yml b/.github/workflows/vtest.yml
index 8c461385f..a704c92dc 100644
When adding a server dynamically, we observe that when a backend has a
dynamic persistence cookie, the new server has no cookie as we receive
the following HTTP header:
set-cookie: test-cookie=; Expires=Thu, 01-Jan-1970 00:00:01 GMT; path=/
Whereas we were expecting to receive something like the
On Wed, 27 Mar 2024 11:06:39 -0300
Felipe Wilhelms Damasio wrote:
> kernel: traps: haproxy[2057993] trap invalid opcode ip:5b3e26 sp:7fd7c002f100
> error:0 in haproxy[42c000+1f7000]
In our build, this would be where instruction pointer was:
(gdb) list *0x5b10e6
0x5b10e6 is in __task_queue
Hi,
We've confirmed a few findings after we poured ~75-80Gbps of traffic
on purpose on a single machine:
- haproxy does indeed crashes;
- hence, we have no stats socket to collect a few things;
It seems that under pressure (not sure which conditions yet) the
kernel seems to be killing it. dmesg
Hi again Anthony,
I'm still having a few comments, but I think nothing that I cannot address
while merging it:
On Wed, Mar 13, 2024 at 12:33:54PM -0400, Anthony Deschamps wrote:
> +static inline u32 chash_compute_server_key(struct server *s)
> +{
> + u32 key = 0;
> + struct
On Fri, Mar 22, 2024 at 09:45:59AM +, Damien Claisse wrote:
> Hi Amaury!
> Sorry for the HTML message, I have to use a *** well-known enterprise MUA :(
> Le 22/03/2024 09:09, « Amaury Denoyelle » a écrit :
>> This patch raises several interrogations. First, dynamic servers are
>> currently
Hi Anthony,
On Sun, Mar 24, 2024 at 10:11:41PM -0400, Anthony Deschamps wrote:
> Hi Willy,
>
> I'm just checking in to see if there's anything left I can help address here.
Thanks for the ping and sorry for the delay. It just fell through the
cracks in the middle of all other stuff I'm
14 matches
Mail list logo