Bug#893685: Segfault after higher number of connections

2019-11-13 Thread Samuel MARTIN MORO
Package: siege
Version: 4.0.2-1.1+b1
Followup-For: Bug #893685

Dear Maintainer,


As I was having issues with Siege, I tried to contact its
maintainer on GitHub:

https://github.com/JoeDog/siege/issues/141#issuecomment-552889047

I managed to get it working on Debian buster, where Siege is in v4.0.4
instead of 4.0.2. Menwhile, project maintainer says he's not dealing
with Debian packages.


Eventually, I found a similar bug logged to Debian:

https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=893685

Last message would suggest Victor Martinez found a possible fix, though
there hasn't been much feedback since then, while that faulty package is
still being distributed to Stretch users.


What can we do next?


Thanks,

Regards.


-- System Information:
Debian Release: 9.8
  APT prefers oldstable-updates
  APT policy: (500, 'oldstable-updates'), (500, 'oldstable')
Architecture: amd64 (x86_64)

Kernel: Linux 4.9.0-8-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.utf8, LC_CTYPE=en_US.utf8 (charmap=UTF-8), 
LANGUAGE=en_US.utf8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)

Versions of packages siege depends on:
ii  libc6  2.24-11+deb9u4
ii  libssl1.1  1.1.0l-1~deb9u1

siege recommends no packages.

siege suggests no packages.

-- no debconf information



Bug#893685: Segfault after higher number of connections

2018-10-29 Thread Víctor Martínez
Package: siege
Version: 4.0.2-1.1+b1
Followup-For: Bug #893685

Dear maintainer,

After Reading your message I took initiative and go directly to github and 
found in Changelog [1] this:
2017/07/11 Matijs van Zuijlen https://github.com/mvz
 * src/ssl.c  mvz:fix-crash 
* src/version.c Version increment: 4.0.3rc5

That turns out to be commit 08078ff490eb4bd3a2ae87c6037d31683f3166b3 [2]  

--- src/ssl.c   2018-10-29 09:30:16.402870332 -0600
+++ ../siege-4.0.2/src/ssl.c2016-05-20 06:41:06.0 -0500
@@ -221,6 +221,7 @@
 OPENSSL_free(lock_count); 
 lock_count=(long *)NULL; 
   }
+  sk_SSL_COMP_free(SSL_COMP_get_compression_methods());
   CRYPTO_cleanup_all_ex_data();
   ERR_remove_state(0);
   ERR_free_strings();

So patch is available, I have tested only on work machine with success, please 
review and if possible push to close this bug.

Regards.

[1] https://github.com/JoeDog/siege/blob/master/ChangeLog
[2] 
https://github.com/JoeDog/siege/commit/08078ff490eb4bd3a2ae87c6037d31683f3166b3#diff-a25959c07e4b4538d7045da811e2c5b9



Bug#893685: Segfault after higher number of connections

2018-10-28 Thread Josue Abarca
Sorry for the late reply.
Thanks for the additional details. I will look for the fix in upstream
commit history, and will work to add the version in debian unstable to
the backports for stable.

Regards,

Josue



Bug#893685: Segfault after higher number of connections

2018-10-27 Thread Víctor Martínez
Package: siege
Version: 4.0.2-1.1+b1
Followup-For: Bug #893685

Dear Maintainer,

I have the same problem, attached is a strace of the program in the hope that 
could be useful. I was able to replicate on my three machines at work on ovh 
vps and home currently the strace is from work.

vicm3@janus:~$ siege -c 10 http://blografia.net/vicm3 -t 1m  -q
New configuration template added to /home/vicm3/.siege
Run siege -C to view the current settings in that file
[alert] Zip encoding disabled; siege requires zlib support to enable it: No 
such file or directory
^C
Lifting the server siege...*** Error in `siege': munmap_chunk(): invalid 
pointer: 0x55de77ebf440 ***
=== Backtrace: =
/lib/x86_64-linux-gnu/libc.so.6(+0x70bfb)[0x7f00b248fbfb]
/lib/x86_64-linux-gnu/libc.so.6(+0x76fc6)[0x7f00b2495fc6]
/usr/lib/x86_64-linux-gnu/libcrypto.so.1.1(OPENSSL_sk_free+0x1e)[0x7f00b297ba1e]
/usr/lib/x86_64-linux-gnu/libssl.so.1.1(+0x2cb29)[0x7f00b2c7db29]
/usr/lib/x86_64-linux-gnu/libcrypto.so.1.1(OPENSSL_cleanup+0x52)[0x7f00b2926242]
/lib/x86_64-linux-gnu/libc.so.6(+0x35940)[0x7f00b2454940]
/lib/x86_64-linux-gnu/libc.so.6(+0x3599a)[0x7f00b245499a]
siege(+0x651f)[0x55de7666e51f]
/lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xf1)[0x7f00b243f2e1]
siege(+0x682a)[0x55de7666e82a]
=== Memory map: 
55de76668000-55de7668e000 r-xp  08:04 526238 
/usr/bin/siege
55de7688e000-55de7689 r--p 00026000 08:04 526238 
/usr/bin/siege
55de7689-55de76891000 rw-p 00028000 08:04 526238 
/usr/bin/siege
55de76891000-55de76892000 rw-p  00:00 0 
55de77eba000-55de77efa000 rw-p  00:00 0  [heap]
7f007c00-7f007c065000 rw-p  00:00 0 
7f007c065000-7f008000 ---p  00:00 0 
7f008000-7f0080021000 rw-p  00:00 0 
7f0080021000-7f008400 ---p  00:00 0 
7f008400-7f0084065000 rw-p  00:00 0 
7f0084065000-7f008800 ---p  00:00 0 
7f008b5c1000-7f008b5d7000 r-xp  08:02 393900 
/lib/x86_64-linux-gnu/libgcc_s.so.1
7f008b5d7000-7f008b7d6000 ---p 00016000 08:02 393900 
/lib/x86_64-linux-gnu/libgcc_s.so.1
7f008b7d6000-7f008b7d7000 r--p 00015000 08:02 393900 
/lib/x86_64-linux-gnu/libgcc_s.so.1
7f008b7d7000-7f008b7d8000 rw-p 00016000 08:02 393900 
/lib/x86_64-linux-gnu/libgcc_s.so.1
7f008b7d8000-7f008b7ec000 r-xp  08:02 393976 
/lib/x86_64-linux-gnu/libresolv-2.24.so
7f008b7ec000-7f008b9eb000 ---p 00014000 08:02 393976 
/lib/x86_64-linux-gnu/libresolv-2.24.so
7f008b9eb000-7f008b9ec000 r--p 00013000 08:02 393976 
/lib/x86_64-linux-gnu/libresolv-2.24.so
7f008b9ec000-7f008b9ed000 rw-p 00014000 08:02 393976 
/lib/x86_64-linux-gnu/libresolv-2.24.so
7f008b9ed000-7f008b9ef000 rw-p  00:00 0 
7f008b9ef000-7f008b9f4000 r-xp  08:02 393969 
/lib/x86_64-linux-gnu/libnss_dns-2.24.so
7f008b9f4000-7f008bbf3000 ---p 5000 08:02 393969 
/lib/x86_64-linux-gnu/libnss_dns-2.24.so
7f008bbf3000-7f008bbf4000 r--p 4000 08:02 393969 
/lib/x86_64-linux-gnu/libnss_dns-2.24.so
7f008bbf4000-7f008bbf5000 rw-p 5000 08:02 393969 
/lib/x86_64-linux-gnu/libnss_dns-2.24.so
7f008bbf5000-7f008bbf7000 r-xp  08:02 397949 
/lib/x86_64-linux-gnu/libnss_mdns4_minimal.so.2
7f008bbf7000-7f008bdf6000 ---p 2000 08:02 397949 
/lib/x86_64-linux-gnu/libnss_mdns4_minimal.so.2
7f008bdf6000-7f008bdf7000 r--p 1000 08:02 397949 
/lib/x86_64-linux-gnu/libnss_mdns4_minimal.so.2
7f008bdf7000-7f008bdf8000 rw-p 2000 08:02 397949 
/lib/x86_64-linux-gnu/libnss_mdns4_minimal.so.2
7f008bdf8000-7f008bdff000 r-xp  08:02 393977 
/lib/x86_64-linux-gnu/librt-2.24.so
7f008bdff000-7f008bffe000 ---p 7000 08:02 393977 
/lib/x86_64-linux-gnu/librt-2.24.so
7f008bffe000-7f008bfff000 r--p 6000 08:02 393977 
/lib/x86_64-linux-gnu/librt-2.24.so
7f008bfff000-7f008c00 rw-p 7000 08:02 393977 
/lib/x86_64-linux-gnu/librt-2.24.so
7f008c00-7f008c065000 rw-p  00:00 0 
7f008c065000-7f009000 ---p  00:00 0 
7f009000-7f0090063000 rw-p  00:00 0 
7f0090063000-7f009400 ---p  00:00 0 
7f009400-7f0094067000 rw-p  00:00 0 
7f0094067000-7f009800 ---p  00:00 0 
7f009800-7f0098065000 rw-p  00:00 0 
7f0098065000-7f009c00 ---p  00:00 0 
7f009c00-7f009c045000 rw-p  00:00 0 
7f009c045000-7f00a000 ---p  00:00 0 
7f00a000-7f00a0065000 rw-p  00:00 0 
7f00a0065000-7f00a400 ---p  00:00 0 
7f00a400-7f00a4065000 rw-p  00:00 0 

Bug#893685: Segfault after higher number of connections

2018-05-17 Thread William MARTIN
Package: siege
Version: 4.0.2-1.1+b1
Followup-For: Bug #893685

Dear Maintainer,

I know you love backtrace !

Best regards,

$ siege -u https://192.168.2.43/bundle/ui.css -d1 -r10 -c16
siege: invalid option -- 'u'
[alert] Zip encoding disabled; siege requires zlib support to enable it
siege: invalid option -- 'u'
** SIEGE 4.0.2
** Preparing 16 concurrent users for battle.
The server is now under siege...
Transactions:160 hits
Availability: 100.00 %
Elapsed time:   8.99 secs
Data transferred:  28.28 MB
Response time:  0.08 secs
Transaction rate:  17.80 trans/sec
Throughput: 3.15 MB/sec
Concurrency:1.45
Successful transactions: 160
Failed transactions:   0
Longest transaction:0.22
Shortest transaction:   0.01

*** Error in `siege': munmap_chunk(): invalid pointer: 0x56541133c490 ***
=== Backtrace: =
/lib/x86_64-linux-gnu/libc.so.6(+0x70bfb)[0x7f94c2053bfb]
/lib/x86_64-linux-gnu/libc.so.6(+0x76fc6)[0x7f94c2059fc6]
/usr/lib/x86_64-linux-
gnu/libcrypto.so.1.1(OPENSSL_sk_free+0x1e)[0x7f94c253fa1e]
/usr/lib/x86_64-linux-gnu/libssl.so.1.1(+0x2cb29)[0x7f94c2841b29]
/usr/lib/x86_64-linux-
gnu/libcrypto.so.1.1(OPENSSL_cleanup+0x52)[0x7f94c24ea242]
/lib/x86_64-linux-gnu/libc.so.6(+0x35940)[0x7f94c2018940]
/lib/x86_64-linux-gnu/libc.so.6(+0x3599a)[0x7f94c201899a]
siege(+0x651f)[0x56540f47151f]
/lib/x86_64-linux-gnu/libc.so.6(__libc_start_main+0xf1)[0x7f94c20032e1]
siege(+0x682a)[0x56540f47182a]
=== Memory map: 
56540f46b000-56540f491000 r-xp  08:02 1460877
/usr/bin/siege
56540f691000-56540f693000 r--p 00026000 08:02 1460877
/usr/bin/siege
56540f693000-56540f694000 rw-p 00028000 08:02 1460877
/usr/bin/siege
56540f694000-56540f695000 rw-p  00:00 0
565411337000-565411389000 rw-p  00:00 0  [heap]
7f947800-7f9478074000 rw-p  00:00 0
7f9478074000-7f947c00 ---p  00:00 0
7f947c00-7f947c074000 rw-p  00:00 0
7f947c074000-7f948000 ---p  00:00 0
7f948000-7f9480074000 rw-p  00:00 0
7f9480074000-7f948400 ---p  00:00 0
7f948400-7f9484074000 rw-p  00:00 0
7f9484074000-7f948800 ---p  00:00 0
7f948800-7f9488074000 rw-p  00:00 0
7f9488074000-7f948c00 ---p  00:00 0
7f948c00-7f948c074000 rw-p  00:00 0
7f948c074000-7f949000 ---p  00:00 0
7f949000-7f9490074000 rw-p  00:00 0
7f9490074000-7f949400 ---p  00:00 0
7f949400-7f9494074000 rw-p  00:00 0
7f9494074000-7f949800 ---p  00:00 0
7f949800-7f9498074000 rw-p  00:00 0
7f9498074000-7f949c00 ---p  00:00 0
7f949c00-7f949c074000 rw-p  00:00 0
7f949c074000-7f94a000 ---p  00:00 0
7f94a000-7f94a006e000 rw-p  00:00 0
7f94a006e000-7f94a400 ---p  00:00 0
7f94a400-7f94a4074000 rw-p  00:00 0
7f94a4074000-7f94a800 ---p  00:00 0
7f94a800-7f94a8074000 rw-p  00:00 0
7f94a8074000-7f94ac00 ---p  00:00 0
7f94ac00-7f94ac074000 rw-p  00:00 0
7f94ac074000-7f94b000 ---p  00:00 0
7f94b000-7f94b0074000 rw-p  00:00 0
7f94b0074000-7f94b400 ---p  00:00 0
7f94b400-7f94b4074000 rw-p  00:00 0
7f94b4074000-7f94b800 ---p  00:00 0
7f94b944f000-7f94b9465000 r-xp  08:02 262123
/lib/x86_64-linux-gnu/libgcc_s.so.1
7f94b9465000-7f94b9664000 ---p 00016000 08:02 262123
/lib/x86_64-linux-gnu/libgcc_s.so.1
7f94b9664000-7f94b9665000 r--p 00015000 08:02 262123
/lib/x86_64-linux-gnu/libgcc_s.so.1
7f94b9665000-7f94b9666000 rw-p 00016000 08:02 262123
/lib/x86_64-linux-gnu/libgcc_s.so.1
7f94b97d2000-7f94b97d3000 ---p  00:00 0
7f94b97d3000-7f94b9fd3000 rw-p  00:00 0
7f94b9fd3000-7f94b9fd4000 ---p  00:00 0
7f94b9fd4000-7f94ba7d4000 rw-p  00:00 0
7f94ba7d4000-7f94ba7d5000 ---p  00:00 0
7f94ba7d5000-7f94bafd5000 rw-p  00:00 0
7f94bafd5000-7f94bafd6000 ---p  00:00 0
7f94bafd6000-7f94bb7d6000 rw-p  00:00 0
7f94bb7d6000-7f94bb7d7000 ---p  00:00 0
7f94bb7d7000-7f94bbfd7000 rw-p  00:00 0
7f94c1fe3000-7f94c2178000 r-xp  08:02 264461
/lib/x86_64-linux-gnu/libc-2.24.so
7f94c2178000-7f94c2378000 ---p 00195000 08:02 264461
/lib/x86_64-linux-gnu/libc-2.24.so
7f94c2378000-7f94c237c000 r--p 00195000 08:02 264461
/lib/x86_64-linux-gnu/libc-2.24.so
7f94c237c000-7f94c237e000 rw-p 00199000 08:02 264461
/lib/x86_64-linux-gnu/libc-2.24.so
7f94c237e000-7f94c2382000 rw-p  00:00 0
7f94c2382000-7f94c25e7000 r-xp  08:02 1442287
/usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
7f94c25e7000-7f94c27e6000 ---p 00265000 08:02 1442287
/usr/lib/x86_64-linux-gnu/libcrypto.so.1.1
7f94c27e6000-7f94c2804000 r--p 00264000 08:02 1442287

Bug#893685: Segfault after higher number of connections

2018-03-21 Thread Peter Viskup
Package: siege
Version: 4.0.2-1.1+b1

When running siege, always getting the segfault after more than 700
connections were made. Tests made on nonTLS connections with GET method
only (Debian repository URIs). Siege just stops receiving data. There are
seen high receive queues on siege side and send queues on server side.

Installing the unstable version fixed the issue (downloading deb and "dpkg
-i").

Maybe related to upstream bug https://github.com/JoeDog/siege/issues/76

Peter