[Bug 231950] www/squid: bug in 4.3, No connections are accepted after ECONNABORTED

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Wed Nov 14 08:53:27 UTC 2018


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=231950

Marko Cupać <marko.cupac at mimar.rs> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
                 CC|                            |marko.cupac at mimar.rs

--- Comment #11 from Marko Cupać <marko.cupac at mimar.rs> ---
(In reply to commit-hook from comment #10)

I'm running squid-4.3_1, and it crashes under load constantly. Not sure if it's
related to this particular bug report.

>From squid jail's cache log, just before crash I always get 'assertion failed':

cat /var/log/squid/cache.log | grep assertion

2018/11/14 08:34:47 kid1| assertion failed: http.cc:1530:
"!Comm::MonitorsRead(serverConnection->fd)"
2018/11/14 08:37:00 kid1| assertion failed: http.cc:1530:
"!Comm::MonitorsRead(serverConnection->fd)"
2018/11/14 08:39:03 kid1| assertion failed: http.cc:1530:
"!Comm::MonitorsRead(serverConnection->fd)"
2018/11/14 08:41:05 kid1| assertion failed: http.cc:1530:
"!Comm::MonitorsRead(serverConnection->fd)"
2018/11/14 08:43:08 kid1| assertion failed: http.cc:1530:
"!Comm::MonitorsRead(serverConnection->fd)"
2018/11/14 08:45:12 kid1| assertion failed: http.cc:1530:
"!Comm::MonitorsRead(serverConnection->fd)"
2018/11/14 08:50:22 kid1| assertion failed: stmem.cc:98: "lowestOffset () <=
target_offset"
2018/11/14 08:55:43 kid1| assertion failed: stmem.cc:98: "lowestOffset () <=
target_offset"
2018/11/14 09:00:51 kid1| assertion failed: stmem.cc:98: "lowestOffset () <=
target_offset"
2018/11/14 09:05:56 kid1| assertion failed: stmem.cc:98: "lowestOffset () <=
target_offset"

>From jail host's messages.log:

Nov 14 08:43:52 warden4 kernel: pid 95207 (squid), uid 100: exited on signal 6
(core dumped)
Nov 14 08:43:55 warden4 kernel: Limiting closed port RST response from 305 to
200 packets/sec
Nov 14 08:45:27 warden4 kernel: sonewconn: pcb 0xfffff801f2145910: Listen queue
overflow: 193 already in queue awaiting acceptance (1394 occurrences)
Nov 14 08:46:03 warden4 kernel: pid 96661 (squid), uid 100: exited on signal 6
(core dumped)
Nov 14 08:46:04 warden4 kernel: Limiting closed port RST response from 567 to
200 packets/sec
Nov 14 08:50:35 warden4 kernel: sonewconn: pcb 0xfffff8016dd02910: Listen queue
overflow: 193 already in queue awaiting acceptance (1647 occurrences)
Nov 14 08:51:25 warden4 kernel: pid 98427 (squid), uid 100: exited on signal 6
(core dumped)
Nov 14 08:51:26 warden4 kernel: Limiting closed port RST response from 586 to
200 packets/sec
Nov 14 08:55:59 warden4 kernel: sonewconn: pcb 0xfffff80288af5570: Listen queue
overflow: 193 already in queue awaiting acceptance (1793 occurrences)
Nov 14 08:56:32 warden4 kernel: pid 2397 (squid), uid 100: exited on signal 6
(core dumped)
Nov 14 08:56:34 warden4 kernel: Limiting closed port RST response from 489 to
200 packets/sec
Nov 14 09:01:10 warden4 kernel: sonewconn: pcb 0xfffff80152101cb0: Listen queue
overflow: 193 already in queue awaiting acceptance (1460 occurrences)
Nov 14 09:01:37 warden4 kernel: pid 5938 (squid), uid 100: exited on signal 6
(core dumped)

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list