-
-
Notifications
You must be signed in to change notification settings - Fork 160
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Tracing support deadlock #358
Comments
if this might be related to some kind of network config, what openssl version do these systems have? and can you reproduce the deadlock when compiling with another tls provider? |
I built the repro program as a Docker container with openssl We use native-tls for our reqwest work extensively (and sentry works fine as of v0.23.0) so long as we don't try to use tracing. Still, I can cook up another docker image for them to test with, selecting a different tls impl. |
I've added a Dockerfile to the repo (flattening our base layers and stripping out our internal stuff). Switching to rustls continues to exhibit the deadlock: |
Hi @onelson! I notice in your example repro case you have enabled the The hang is caused by sending any event to sentry, via tracing or otherwise. In our environment, running
When the sentry-rust/sentry-debug-images/src/integration.rs Lines 59 to 62 in 374c961
Inside the initialization code, the aforementioned function is run and panics. Then, In our environment at least, it is not safe to enable the |
Someone has attempted to contribute a fix for this here though wrapping vs saturating is debatable. Unfortunately the PR has gone stale. |
RE: the deadlock - I built the repro as a docker container and found that the deadlock happens when I run the container on
my Centos boxseemingly all of our Centos 7 machines, but not on another fedora machine so I'm not sure if it points to the specific kernel or perhaps some part of the network configuration. At any rate, I'm glad this isn't widespread and I'll follow up with our IT dept to try and figure this out.Originally posted by @onelson in #180 (comment)
Working with my IT dept, they were able to reproduce the issue on our Centos7 hosts having the following kernel:
3.10.0-1062.1.2.el7.x86_64
The issue was not present on:
5.4.142-1.el7.elrepo.x86_64
which is the current latest LTS, I'm told.It's not clear which hosts we'll be able to freely update, so I'm hoping there might be something to look at on your end to sidestep whatever the issue might be.
The text was updated successfully, but these errors were encountered: