[Bug 231950] www/squid: bug in 4.3, No connections are accepted after ECONNABORTED
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Wed Nov 14 08:53:27 UTC 2018
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=231950
Marko Cupać <marko.cupac at mimar.rs> changed:
What |Removed |Added
----------------------------------------------------------------------------
CC| |marko.cupac at mimar.rs
--- Comment #11 from Marko Cupać <marko.cupac at mimar.rs> ---
(In reply to commit-hook from comment #10)
I'm running squid-4.3_1, and it crashes under load constantly. Not sure if it's
related to this particular bug report.
>From squid jail's cache log, just before crash I always get 'assertion failed':
cat /var/log/squid/cache.log | grep assertion
2018/11/14 08:34:47 kid1| assertion failed: http.cc:1530:
"!Comm::MonitorsRead(serverConnection->fd)"
2018/11/14 08:37:00 kid1| assertion failed: http.cc:1530:
"!Comm::MonitorsRead(serverConnection->fd)"
2018/11/14 08:39:03 kid1| assertion failed: http.cc:1530:
"!Comm::MonitorsRead(serverConnection->fd)"
2018/11/14 08:41:05 kid1| assertion failed: http.cc:1530:
"!Comm::MonitorsRead(serverConnection->fd)"
2018/11/14 08:43:08 kid1| assertion failed: http.cc:1530:
"!Comm::MonitorsRead(serverConnection->fd)"
2018/11/14 08:45:12 kid1| assertion failed: http.cc:1530:
"!Comm::MonitorsRead(serverConnection->fd)"
2018/11/14 08:50:22 kid1| assertion failed: stmem.cc:98: "lowestOffset () <=
target_offset"
2018/11/14 08:55:43 kid1| assertion failed: stmem.cc:98: "lowestOffset () <=
target_offset"
2018/11/14 09:00:51 kid1| assertion failed: stmem.cc:98: "lowestOffset () <=
target_offset"
2018/11/14 09:05:56 kid1| assertion failed: stmem.cc:98: "lowestOffset () <=
target_offset"
>From jail host's messages.log:
Nov 14 08:43:52 warden4 kernel: pid 95207 (squid), uid 100: exited on signal 6
(core dumped)
Nov 14 08:43:55 warden4 kernel: Limiting closed port RST response from 305 to
200 packets/sec
Nov 14 08:45:27 warden4 kernel: sonewconn: pcb 0xfffff801f2145910: Listen queue
overflow: 193 already in queue awaiting acceptance (1394 occurrences)
Nov 14 08:46:03 warden4 kernel: pid 96661 (squid), uid 100: exited on signal 6
(core dumped)
Nov 14 08:46:04 warden4 kernel: Limiting closed port RST response from 567 to
200 packets/sec
Nov 14 08:50:35 warden4 kernel: sonewconn: pcb 0xfffff8016dd02910: Listen queue
overflow: 193 already in queue awaiting acceptance (1647 occurrences)
Nov 14 08:51:25 warden4 kernel: pid 98427 (squid), uid 100: exited on signal 6
(core dumped)
Nov 14 08:51:26 warden4 kernel: Limiting closed port RST response from 586 to
200 packets/sec
Nov 14 08:55:59 warden4 kernel: sonewconn: pcb 0xfffff80288af5570: Listen queue
overflow: 193 already in queue awaiting acceptance (1793 occurrences)
Nov 14 08:56:32 warden4 kernel: pid 2397 (squid), uid 100: exited on signal 6
(core dumped)
Nov 14 08:56:34 warden4 kernel: Limiting closed port RST response from 489 to
200 packets/sec
Nov 14 09:01:10 warden4 kernel: sonewconn: pcb 0xfffff80152101cb0: Listen queue
overflow: 193 already in queue awaiting acceptance (1460 occurrences)
Nov 14 09:01:37 warden4 kernel: pid 5938 (squid), uid 100: exited on signal 6
(core dumped)
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list