]> git.ipfire.org Git - thirdparty/haproxy.git/commit
BUG/MEDIUM: mux-h1: Be sure xprt support splicing to use it during fast-forward
authorChristopher Faulet <cfaulet@haproxy.com>
Tue, 7 Nov 2023 17:16:33 +0000 (18:16 +0100)
committerChristopher Faulet <cfaulet@haproxy.com>
Tue, 7 Nov 2023 17:23:00 +0000 (18:23 +0100)
commit7d7df1cf0a9fad64098654e34984838525fadeec
tree06c2deaa34819c90b51153d1eb89090f14e5d87b
parent6f9b65f952c7435d6bdb61ba547c0b56a32e2c0a
BUG/MEDIUM: mux-h1: Be sure xprt support splicing to use it during fast-forward

The commit d6d4abdc3 ("BUILD: mux-h1: Fix build without kernel splicing
support") introduced a regression. The kernel support for the underlying
XPRT is no longer checked. So it is possible to enable the splicing for SSL
connection. This of course leads to a segfault.

This patch restore the test on the xprt rcv_pipe/snd_pipe functions.

This patch should fix a crash reported by Tristan in #2095
(#issuecomment-1788949014). No backport needed.
src/mux_h1.c