[jira] [Updated] (TS-3283) Certain SSL handshake error during client-hello hangs the client and leaves network connection open
[ https://issues.apache.org/jira/browse/TS-3283?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Phil Sorber updated TS-3283: Backport to Version: 4.2.3 Certain SSL handshake error during client-hello hangs the client and leaves network connection open --- Key: TS-3283 URL: https://issues.apache.org/jira/browse/TS-3283 Project: Traffic Server Issue Type: Bug Components: SSL Reporter: Joe Chung Assignee: Susan Hinrichs Fix For: 5.3.0 h3. Problem Description Send an SSLv2 Client Hello with an old cipher suite request against Traffic Server 4.2.2, and the connection will freeze on the client side and eventually time out after 120 seconds. The Traffic Server detects the SSL error, but instead of closing the connection, goes on to accept new connections. h3. Reproduction === Client: Macbook Pro running OSX Mavericks 10.9.5 === {code:none} $ openssl version -a OpenSSL 0.9.8za 5 Jun 2014 built on: Aug 10 2014 platform: darwin64-x86_64-llvm options: bn(64,64) md2(int) rc4(ptr,char) des(idx,cisc,16,int) blowfish(idx) compiler: -arch x86_64 -fmessage-length=0 -pipe -Wno-trigraphs -fpascal-strings -fasm-blocks -O3 -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DMD32_REG_T=int -DOPENSSL_NO_IDEA -DOPENSSL_PIC -DOPENSSL_THREADS -DZLIB -mmacosx-version-min=10.6 OPENSSLDIR: /System/Library/OpenSSL {code} h4. The following command triggers the bad behavior on the 4.2.2 server. {code:none} $ openssl s_client -connect 192.168.20.130:443 -ssl2 -debug CONNECTED(0003) write to 0x7fb9f2508610 [0x7fb9f300f201] (45 bytes = 45 (0x2D)) - 80 2b 01 00 02 00 12 00-00 00 10 07 00 c0 03 00 .+.. 0010 - 80 01 00 80 06 00 40 04-00 80 02 00 80 f4 71 1a ..@...q. 0020 - ad 23 06 59 4d f8 d2 c5-b2 57 a9 66 4c.#.YMW.fL ^C {code} At this point, the client is hung, and I have to hit ctrl-c to interrupt it or wait 120 seconds for tcp timeout. h3. Server: Lubuntu 13.10 on VMware {code:none} $ openssl version -a OpenSSL 1.0.1e 11 Feb 2013 built on: Fri Jun 20 18:52:25 UTC 2014 platform: debian-i386 options: bn(64,32) rc4(8x,mmx) des(ptr,risc1,16,long) blowfish(idx) compiler: cc -fPIC -DOPENSSL_PIC -DZLIB -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DTERMIO -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -D_FORTIFY_SOURCE=2 -Wl,-Bsymbolic-functions -Wl,-z,relro -Wa,--noexecstack -Wall -DOPENSSL_NO_TLS1_2_CLIENT -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DRMD160_ASM -DAES_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM OPENSSLDIR: /usr/lib/ssl {code} {code:none} $ diff /usr/local/etc/trafficserver/records.config.422 /usr/local/etc/trafficserver/records.config 113c113 CONFIG proxy.config.http.server_ports STRING 8080 --- CONFIG proxy.config.http.server_ports STRING 8080 443:ssl 594,595c594,595 CONFIG proxy.config.diags.debug.enabled INT 0 CONFIG proxy.config.diags.debug.tags STRING http.*|dns.* --- CONFIG proxy.config.diags.debug.enabled INT 1 CONFIG proxy.config.diags.debug.tags STRING ssl.* {code} {code:none} $ /usr/local/bin/traffic_server --version [TrafficServer] using root directory '/usr/local' Apache Traffic Server - traffic_server - 4.2.2 - (build # 0723 on Jan 7 2015 at 23:04:32) $ sudo /usr/local/bin/traffic_server [sudo] password for user: [TrafficServer] using root directory '/usr/local' [Jan 8 00:53:42.618] Server {0xb702e700} DEBUG: (ssl) setting SNI callbacks with for ctx 0xa4a7928 [Jan 8 00:53:42.618] Server {0xb702e700} DEBUG: (ssl) indexed '*' with SSL_CTX 0xa4a7928 [Jan 8 00:53:42.619] Server {0xb702e700} DEBUG: (ssl) importing SNI names from /usr/local/etc/trafficserver [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) [SSLNextProtocolAccept:mainEvent] event 202 netvc 0xb280fa90 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 16 ret: 1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 8193 ret: 1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 8194 ret: -1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) SSL::3055967040:error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol:s23_srvr.c:628 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: SSLNetVConnection.cc:526 (sslServerHandShakeEvent) (ssl) SSL handshake error: SSL_ERROR_SSL (1), errno=0 {code} At this point, the server has not closed the tcp connection, and has instead gone back
[jira] [Commented] (TS-3309) TLS Session tickets docs
[ https://issues.apache.org/jira/browse/TS-3309?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14285911#comment-14285911 ] ASF subversion and git services commented on TS-3309: - Commit 86bda3532dc72389f9e88d58af07309cf0d92411 in trafficserver's branch refs/heads/master from [~bzeng] [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=86bda35 ] TS-3309: document TLS session ticket rotation TLS Session tickets docs Key: TS-3309 URL: https://issues.apache.org/jira/browse/TS-3309 Project: Traffic Server Issue Type: Bug Components: Core, Security, SSL Reporter: Bin Assignee: James Peach Fix For: 5.3.0 Attachments: traffic_line_rotation_doc.diff Add a few words to describe the TLS session ticket keys rotation for TS-3301. jpeach is the best person to review it. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (TS-3304) segfault in libtsutils
[ https://issues.apache.org/jira/browse/TS-3304?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14285962#comment-14285962 ] Phil Sorber commented on TS-3304: - [~amc], [~zwoop], Are we ok with my patch as the backport fix, or is there some better patch that is imminent? segfault in libtsutils -- Key: TS-3304 URL: https://issues.apache.org/jira/browse/TS-3304 Project: Traffic Server Issue Type: Bug Components: HostDB Reporter: Steve Malenfant Assignee: Leif Hedstrom Fix For: 5.3.0 Getting multiple segfaults per day on 4.2.1. [4324544.324222] [ET_NET 23][10504]: segfault at 0 ip 2acd66546168 sp 2acd71f190b8 error 4 in libtsutil.so.4.2.1[2acd66521000+34000] [4410696.820857] [ET_NET 19][22738]: segfault at 0 ip 2af09f339168 sp 2af0aa9230b8 error 4 in libtsutil.so.4.2.1[2af09f314000+34000] [4497039.474253] [ET_NET 12][34872]: segfault at 0 ip 2ad17e6a1168 sp 2ad1896100b8 error 4 in libtsutil.so.4.2.1[2ad17e67c000+34000] [4583372.073916] [ET_NET 3][46994]: segfault at 0 ip 2aced4227168 sp 2aceda7d80b8 error 4 in libtsutil.so.4.2.1[2aced4202000+34000] [4756046.944373] [ET_NET 22][10799]: segfault at 0 ip 2b1771f76168 sp 2b177d9130b8 error 4 in libtsutil.so.4.2.1[2b1771f51000+34000] Stack Trace : (gdb) bt #0 ink_inet_addr (s=value optimized out) at ink_inet.cc:107 #1 0x005e0df5 in is_dotted_form_hostname (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at P_HostDBProcessor.h:545 #2 probe (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at HostDB.cc:668 #3 0x005e2b34 in HostDBProcessor::getby (this=value optimized out, cont=0x2b514cc749d0, hostname=0x0, len=value optimized out, ip=0x2b50e8f092b0, aforce_dns=false, host_res_style=HOST_RES_NONE, dns_lookup_timeout=0) at HostDB.cc:772 #4 0x00517f2c in getbyaddr_re (this=0x2b514cc749d0) at ../../iocore/hostdb/I_HostDBProcessor.h:417 #5 HttpSM::do_hostdb_reverse_lookup (this=0x2b514cc749d0) at HttpSM.cc:3968 #6 0x0052f028 in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6932 #7 0x00518242 in HttpSM::do_hostdb_lookup (this=0x2b514cc749d0) at HttpSM.cc:3950 #8 0x0052f44a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6925 #9 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #10 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #11 0x0052ea8a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:7224 #12 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #13 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #14 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #15 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #16 0x0052fef6 in HttpSM::state_read_client_request_header (this=0x2b514cc749d0, event=100, data=value optimized out) at HttpSM.cc:821 #17 0x0052a5b8 in HttpSM::main_handler (this=0x2b514cc749d0, event=100, data=0x2b514802ca08) at HttpSM.cc:2539 #18 0x0068793b in handleEvent (event=value optimized out, vc=0x2b514802c900) at ../../iocore/eventsystem/I_Continuation.h:146 #19 read_signal_and_update (event=value optimized out, vc=0x2b514802c900) at UnixNetVConnection.cc:138 #20 0x00689ec4 in read_from_net (nh=0x2b50e2e17c10, vc=0x2b514802c900, thread=value optimized out) at UnixNetVConnection.cc:320 #21 0x0067fb12 in NetHandler::mainNetEvent (this=0x2b50e2e17c10, event=value optimized out, e=value optimized out) at UnixNet.cc:384 #22 0x006ac8cf in handleEvent (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at I_Continuation.h:146 #23 EThread::process_event (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at UnixEThread.cc:145 #24 0x006ad273 in EThread::execute (this=0x2b50e2e14010) at UnixEThread.cc:269 #25 0x006abc2a in spawn_thread_internal (a=0x198f820) at Thread.cc:88 #26 0x2b50e026b9d1 in start_thread () from /lib64/libpthread.so.0 #27 0x00381b2e8b6d in clone () from /lib64/libc.so.6 -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Updated] (TS-3283) Certain SSL handshake error during client-hello hangs the client and leaves network connection open
[ https://issues.apache.org/jira/browse/TS-3283?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Phil Sorber updated TS-3283: Labels: (was: bac) Certain SSL handshake error during client-hello hangs the client and leaves network connection open --- Key: TS-3283 URL: https://issues.apache.org/jira/browse/TS-3283 Project: Traffic Server Issue Type: Bug Components: SSL Reporter: Joe Chung Assignee: Susan Hinrichs Fix For: 5.3.0 h3. Problem Description Send an SSLv2 Client Hello with an old cipher suite request against Traffic Server 4.2.2, and the connection will freeze on the client side and eventually time out after 120 seconds. The Traffic Server detects the SSL error, but instead of closing the connection, goes on to accept new connections. h3. Reproduction === Client: Macbook Pro running OSX Mavericks 10.9.5 === {code:none} $ openssl version -a OpenSSL 0.9.8za 5 Jun 2014 built on: Aug 10 2014 platform: darwin64-x86_64-llvm options: bn(64,64) md2(int) rc4(ptr,char) des(idx,cisc,16,int) blowfish(idx) compiler: -arch x86_64 -fmessage-length=0 -pipe -Wno-trigraphs -fpascal-strings -fasm-blocks -O3 -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DMD32_REG_T=int -DOPENSSL_NO_IDEA -DOPENSSL_PIC -DOPENSSL_THREADS -DZLIB -mmacosx-version-min=10.6 OPENSSLDIR: /System/Library/OpenSSL {code} h4. The following command triggers the bad behavior on the 4.2.2 server. {code:none} $ openssl s_client -connect 192.168.20.130:443 -ssl2 -debug CONNECTED(0003) write to 0x7fb9f2508610 [0x7fb9f300f201] (45 bytes = 45 (0x2D)) - 80 2b 01 00 02 00 12 00-00 00 10 07 00 c0 03 00 .+.. 0010 - 80 01 00 80 06 00 40 04-00 80 02 00 80 f4 71 1a ..@...q. 0020 - ad 23 06 59 4d f8 d2 c5-b2 57 a9 66 4c.#.YMW.fL ^C {code} At this point, the client is hung, and I have to hit ctrl-c to interrupt it or wait 120 seconds for tcp timeout. h3. Server: Lubuntu 13.10 on VMware {code:none} $ openssl version -a OpenSSL 1.0.1e 11 Feb 2013 built on: Fri Jun 20 18:52:25 UTC 2014 platform: debian-i386 options: bn(64,32) rc4(8x,mmx) des(ptr,risc1,16,long) blowfish(idx) compiler: cc -fPIC -DOPENSSL_PIC -DZLIB -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DTERMIO -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -D_FORTIFY_SOURCE=2 -Wl,-Bsymbolic-functions -Wl,-z,relro -Wa,--noexecstack -Wall -DOPENSSL_NO_TLS1_2_CLIENT -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DRMD160_ASM -DAES_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM OPENSSLDIR: /usr/lib/ssl {code} {code:none} $ diff /usr/local/etc/trafficserver/records.config.422 /usr/local/etc/trafficserver/records.config 113c113 CONFIG proxy.config.http.server_ports STRING 8080 --- CONFIG proxy.config.http.server_ports STRING 8080 443:ssl 594,595c594,595 CONFIG proxy.config.diags.debug.enabled INT 0 CONFIG proxy.config.diags.debug.tags STRING http.*|dns.* --- CONFIG proxy.config.diags.debug.enabled INT 1 CONFIG proxy.config.diags.debug.tags STRING ssl.* {code} {code:none} $ /usr/local/bin/traffic_server --version [TrafficServer] using root directory '/usr/local' Apache Traffic Server - traffic_server - 4.2.2 - (build # 0723 on Jan 7 2015 at 23:04:32) $ sudo /usr/local/bin/traffic_server [sudo] password for user: [TrafficServer] using root directory '/usr/local' [Jan 8 00:53:42.618] Server {0xb702e700} DEBUG: (ssl) setting SNI callbacks with for ctx 0xa4a7928 [Jan 8 00:53:42.618] Server {0xb702e700} DEBUG: (ssl) indexed '*' with SSL_CTX 0xa4a7928 [Jan 8 00:53:42.619] Server {0xb702e700} DEBUG: (ssl) importing SNI names from /usr/local/etc/trafficserver [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) [SSLNextProtocolAccept:mainEvent] event 202 netvc 0xb280fa90 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 16 ret: 1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 8193 ret: 1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 8194 ret: -1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) SSL::3055967040:error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol:s23_srvr.c:628 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: SSLNetVConnection.cc:526 (sslServerHandShakeEvent) (ssl) SSL handshake error: SSL_ERROR_SSL (1), errno=0 {code} At this point, the server has not closed the tcp connection, and has instead gone back to
[jira] [Assigned] (TS-3283) Certain SSL handshake error during client-hello hangs the client and leaves network connection open
[ https://issues.apache.org/jira/browse/TS-3283?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Phil Sorber reassigned TS-3283: --- Assignee: Phil Sorber (was: Susan Hinrichs) Certain SSL handshake error during client-hello hangs the client and leaves network connection open --- Key: TS-3283 URL: https://issues.apache.org/jira/browse/TS-3283 Project: Traffic Server Issue Type: Bug Components: SSL Reporter: Joe Chung Assignee: Phil Sorber Fix For: 5.3.0 h3. Problem Description Send an SSLv2 Client Hello with an old cipher suite request against Traffic Server 4.2.2, and the connection will freeze on the client side and eventually time out after 120 seconds. The Traffic Server detects the SSL error, but instead of closing the connection, goes on to accept new connections. h3. Reproduction === Client: Macbook Pro running OSX Mavericks 10.9.5 === {code:none} $ openssl version -a OpenSSL 0.9.8za 5 Jun 2014 built on: Aug 10 2014 platform: darwin64-x86_64-llvm options: bn(64,64) md2(int) rc4(ptr,char) des(idx,cisc,16,int) blowfish(idx) compiler: -arch x86_64 -fmessage-length=0 -pipe -Wno-trigraphs -fpascal-strings -fasm-blocks -O3 -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DMD32_REG_T=int -DOPENSSL_NO_IDEA -DOPENSSL_PIC -DOPENSSL_THREADS -DZLIB -mmacosx-version-min=10.6 OPENSSLDIR: /System/Library/OpenSSL {code} h4. The following command triggers the bad behavior on the 4.2.2 server. {code:none} $ openssl s_client -connect 192.168.20.130:443 -ssl2 -debug CONNECTED(0003) write to 0x7fb9f2508610 [0x7fb9f300f201] (45 bytes = 45 (0x2D)) - 80 2b 01 00 02 00 12 00-00 00 10 07 00 c0 03 00 .+.. 0010 - 80 01 00 80 06 00 40 04-00 80 02 00 80 f4 71 1a ..@...q. 0020 - ad 23 06 59 4d f8 d2 c5-b2 57 a9 66 4c.#.YMW.fL ^C {code} At this point, the client is hung, and I have to hit ctrl-c to interrupt it or wait 120 seconds for tcp timeout. h3. Server: Lubuntu 13.10 on VMware {code:none} $ openssl version -a OpenSSL 1.0.1e 11 Feb 2013 built on: Fri Jun 20 18:52:25 UTC 2014 platform: debian-i386 options: bn(64,32) rc4(8x,mmx) des(ptr,risc1,16,long) blowfish(idx) compiler: cc -fPIC -DOPENSSL_PIC -DZLIB -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DTERMIO -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -D_FORTIFY_SOURCE=2 -Wl,-Bsymbolic-functions -Wl,-z,relro -Wa,--noexecstack -Wall -DOPENSSL_NO_TLS1_2_CLIENT -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DRMD160_ASM -DAES_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM OPENSSLDIR: /usr/lib/ssl {code} {code:none} $ diff /usr/local/etc/trafficserver/records.config.422 /usr/local/etc/trafficserver/records.config 113c113 CONFIG proxy.config.http.server_ports STRING 8080 --- CONFIG proxy.config.http.server_ports STRING 8080 443:ssl 594,595c594,595 CONFIG proxy.config.diags.debug.enabled INT 0 CONFIG proxy.config.diags.debug.tags STRING http.*|dns.* --- CONFIG proxy.config.diags.debug.enabled INT 1 CONFIG proxy.config.diags.debug.tags STRING ssl.* {code} {code:none} $ /usr/local/bin/traffic_server --version [TrafficServer] using root directory '/usr/local' Apache Traffic Server - traffic_server - 4.2.2 - (build # 0723 on Jan 7 2015 at 23:04:32) $ sudo /usr/local/bin/traffic_server [sudo] password for user: [TrafficServer] using root directory '/usr/local' [Jan 8 00:53:42.618] Server {0xb702e700} DEBUG: (ssl) setting SNI callbacks with for ctx 0xa4a7928 [Jan 8 00:53:42.618] Server {0xb702e700} DEBUG: (ssl) indexed '*' with SSL_CTX 0xa4a7928 [Jan 8 00:53:42.619] Server {0xb702e700} DEBUG: (ssl) importing SNI names from /usr/local/etc/trafficserver [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) [SSLNextProtocolAccept:mainEvent] event 202 netvc 0xb280fa90 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 16 ret: 1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 8193 ret: 1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 8194 ret: -1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) SSL::3055967040:error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol:s23_srvr.c:628 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: SSLNetVConnection.cc:526 (sslServerHandShakeEvent) (ssl) SSL handshake error: SSL_ERROR_SSL (1), errno=0 {code} At this point, the server has not closed the tcp connection, and
[jira] [Commented] (TS-153) Dynamic keep-alive timeouts
[ https://issues.apache.org/jira/browse/TS-153?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14286022#comment-14286022 ] ASF subversion and git services commented on TS-153: Commit 5e91acd24e67da73baa81ded14878e32273f1e20 in trafficserver's branch refs/heads/master from [~bcall] [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=5e91acd ] TS-153: Dynamic keep-alive timeouts 1. Changed the limit on the number of connections to include all incoming connections instead of just ones that are keep-alive. This will keep the number of incoming connections per thread more consistent. However, it will only close keep-alive connections. 2. Change the double link list to a queue. 3. When adding to the queue if the connection is already in the queue remove it and then add it to the end the queue. 4. Properly close the connection by mimicking what inactivity cop does to close the connection. 5. Add stats to determine the average KA timeout since it is now dynamic. 6. Added support for spdy connections. Config option is now: proxy.config.net.connections.threshold_shed_idle_in Stats added are: proxy.process.net.dynamic_keep_alive_timeout_in_total proxy.process.net.dynamic_keep_alive_timeout_in_count Dynamic keep-alive timeouts - Key: TS-153 URL: https://issues.apache.org/jira/browse/TS-153 Project: Traffic Server Issue Type: New Feature Components: Core Reporter: Leif Hedstrom Assignee: Bryan Call Priority: Minor Labels: A Fix For: 5.3.0 Attachments: ts153.diff (This is from a Y! Bugzilla ticket 1821593, adding it here. . Originally posted by Leif Hedstrom on 2008-03-19): Currently you have to set static keep-alive idle timeouts in TS, e.g. CONFIG proxy.config.http.keep_alive_no_activity_timeout_in INT 8 CONFIG proxy.config.http.keep_alive_no_activity_timeout_out INT 30 even with epoll() in 1.17.x, this is difficult to configure, and put an appropriate timeout. The key here is that the settings above need to assure that you stay below the max configured number of connections, e.g.: CONFIG proxy.config.net.connections_throttle INT 75000 I'm suggesting that we add one (or two) new configuration options, and appropriate TS code support, to instead of specifying timeouts, we specify connection limits for idle KA connections. For example: CONFIG proxy.config.http.keep_alive_max_idle_connections_in INT 5 CONFIG proxy.config.http_keep_alive_max_idle_connections_out INT 5000 (one still has to be careful to leave head-room for active connections here, in the example above, 2 connections could be active, which is a lot of traffic). These would override the idle timeouts, so one could use the max_idle connections for incoming (client) connections, and the idle timeouts for outgoing (origin) connections for instance. The benefit here is that it makes configuration not only easier, but also a lot safer for many applications. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Updated] (TS-3283) Certain SSL handshake error during client-hello hangs the client and leaves network connection open
[ https://issues.apache.org/jira/browse/TS-3283?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Phil Sorber updated TS-3283: Fix Version/s: (was: 5.3.0) Certain SSL handshake error during client-hello hangs the client and leaves network connection open --- Key: TS-3283 URL: https://issues.apache.org/jira/browse/TS-3283 Project: Traffic Server Issue Type: Bug Components: SSL Reporter: Joe Chung Assignee: Phil Sorber Fix For: 4.2.3 h3. Problem Description Send an SSLv2 Client Hello with an old cipher suite request against Traffic Server 4.2.2, and the connection will freeze on the client side and eventually time out after 120 seconds. The Traffic Server detects the SSL error, but instead of closing the connection, goes on to accept new connections. h3. Reproduction === Client: Macbook Pro running OSX Mavericks 10.9.5 === {code:none} $ openssl version -a OpenSSL 0.9.8za 5 Jun 2014 built on: Aug 10 2014 platform: darwin64-x86_64-llvm options: bn(64,64) md2(int) rc4(ptr,char) des(idx,cisc,16,int) blowfish(idx) compiler: -arch x86_64 -fmessage-length=0 -pipe -Wno-trigraphs -fpascal-strings -fasm-blocks -O3 -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DMD32_REG_T=int -DOPENSSL_NO_IDEA -DOPENSSL_PIC -DOPENSSL_THREADS -DZLIB -mmacosx-version-min=10.6 OPENSSLDIR: /System/Library/OpenSSL {code} h4. The following command triggers the bad behavior on the 4.2.2 server. {code:none} $ openssl s_client -connect 192.168.20.130:443 -ssl2 -debug CONNECTED(0003) write to 0x7fb9f2508610 [0x7fb9f300f201] (45 bytes = 45 (0x2D)) - 80 2b 01 00 02 00 12 00-00 00 10 07 00 c0 03 00 .+.. 0010 - 80 01 00 80 06 00 40 04-00 80 02 00 80 f4 71 1a ..@...q. 0020 - ad 23 06 59 4d f8 d2 c5-b2 57 a9 66 4c.#.YMW.fL ^C {code} At this point, the client is hung, and I have to hit ctrl-c to interrupt it or wait 120 seconds for tcp timeout. h3. Server: Lubuntu 13.10 on VMware {code:none} $ openssl version -a OpenSSL 1.0.1e 11 Feb 2013 built on: Fri Jun 20 18:52:25 UTC 2014 platform: debian-i386 options: bn(64,32) rc4(8x,mmx) des(ptr,risc1,16,long) blowfish(idx) compiler: cc -fPIC -DOPENSSL_PIC -DZLIB -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DTERMIO -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -D_FORTIFY_SOURCE=2 -Wl,-Bsymbolic-functions -Wl,-z,relro -Wa,--noexecstack -Wall -DOPENSSL_NO_TLS1_2_CLIENT -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DRMD160_ASM -DAES_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM OPENSSLDIR: /usr/lib/ssl {code} {code:none} $ diff /usr/local/etc/trafficserver/records.config.422 /usr/local/etc/trafficserver/records.config 113c113 CONFIG proxy.config.http.server_ports STRING 8080 --- CONFIG proxy.config.http.server_ports STRING 8080 443:ssl 594,595c594,595 CONFIG proxy.config.diags.debug.enabled INT 0 CONFIG proxy.config.diags.debug.tags STRING http.*|dns.* --- CONFIG proxy.config.diags.debug.enabled INT 1 CONFIG proxy.config.diags.debug.tags STRING ssl.* {code} {code:none} $ /usr/local/bin/traffic_server --version [TrafficServer] using root directory '/usr/local' Apache Traffic Server - traffic_server - 4.2.2 - (build # 0723 on Jan 7 2015 at 23:04:32) $ sudo /usr/local/bin/traffic_server [sudo] password for user: [TrafficServer] using root directory '/usr/local' [Jan 8 00:53:42.618] Server {0xb702e700} DEBUG: (ssl) setting SNI callbacks with for ctx 0xa4a7928 [Jan 8 00:53:42.618] Server {0xb702e700} DEBUG: (ssl) indexed '*' with SSL_CTX 0xa4a7928 [Jan 8 00:53:42.619] Server {0xb702e700} DEBUG: (ssl) importing SNI names from /usr/local/etc/trafficserver [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) [SSLNextProtocolAccept:mainEvent] event 202 netvc 0xb280fa90 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 16 ret: 1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 8193 ret: 1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 8194 ret: -1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) SSL::3055967040:error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol:s23_srvr.c:628 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: SSLNetVConnection.cc:526 (sslServerHandShakeEvent) (ssl) SSL handshake error: SSL_ERROR_SSL (1), errno=0 {code} At this point, the server has not closed the tcp connection, and has instead gone
[jira] [Updated] (TS-3311) CLONE - segfault in libtsutils
[ https://issues.apache.org/jira/browse/TS-3311?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Leif Hedstrom updated TS-3311: -- Assignee: Alan M. Carroll (was: Leif Hedstrom) CLONE - segfault in libtsutils -- Key: TS-3311 URL: https://issues.apache.org/jira/browse/TS-3311 Project: Traffic Server Issue Type: Bug Components: HostDB Reporter: Steve Malenfant Assignee: Alan M. Carroll Fix For: 5.3.0 Getting multiple segfaults per day on 4.2.1. [4324544.324222] [ET_NET 23][10504]: segfault at 0 ip 2acd66546168 sp 2acd71f190b8 error 4 in libtsutil.so.4.2.1[2acd66521000+34000] [4410696.820857] [ET_NET 19][22738]: segfault at 0 ip 2af09f339168 sp 2af0aa9230b8 error 4 in libtsutil.so.4.2.1[2af09f314000+34000] [4497039.474253] [ET_NET 12][34872]: segfault at 0 ip 2ad17e6a1168 sp 2ad1896100b8 error 4 in libtsutil.so.4.2.1[2ad17e67c000+34000] [4583372.073916] [ET_NET 3][46994]: segfault at 0 ip 2aced4227168 sp 2aceda7d80b8 error 4 in libtsutil.so.4.2.1[2aced4202000+34000] [4756046.944373] [ET_NET 22][10799]: segfault at 0 ip 2b1771f76168 sp 2b177d9130b8 error 4 in libtsutil.so.4.2.1[2b1771f51000+34000] Stack Trace : (gdb) bt #0 ink_inet_addr (s=value optimized out) at ink_inet.cc:107 #1 0x005e0df5 in is_dotted_form_hostname (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at P_HostDBProcessor.h:545 #2 probe (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at HostDB.cc:668 #3 0x005e2b34 in HostDBProcessor::getby (this=value optimized out, cont=0x2b514cc749d0, hostname=0x0, len=value optimized out, ip=0x2b50e8f092b0, aforce_dns=false, host_res_style=HOST_RES_NONE, dns_lookup_timeout=0) at HostDB.cc:772 #4 0x00517f2c in getbyaddr_re (this=0x2b514cc749d0) at ../../iocore/hostdb/I_HostDBProcessor.h:417 #5 HttpSM::do_hostdb_reverse_lookup (this=0x2b514cc749d0) at HttpSM.cc:3968 #6 0x0052f028 in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6932 #7 0x00518242 in HttpSM::do_hostdb_lookup (this=0x2b514cc749d0) at HttpSM.cc:3950 #8 0x0052f44a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6925 #9 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #10 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #11 0x0052ea8a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:7224 #12 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #13 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #14 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #15 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #16 0x0052fef6 in HttpSM::state_read_client_request_header (this=0x2b514cc749d0, event=100, data=value optimized out) at HttpSM.cc:821 #17 0x0052a5b8 in HttpSM::main_handler (this=0x2b514cc749d0, event=100, data=0x2b514802ca08) at HttpSM.cc:2539 #18 0x0068793b in handleEvent (event=value optimized out, vc=0x2b514802c900) at ../../iocore/eventsystem/I_Continuation.h:146 #19 read_signal_and_update (event=value optimized out, vc=0x2b514802c900) at UnixNetVConnection.cc:138 #20 0x00689ec4 in read_from_net (nh=0x2b50e2e17c10, vc=0x2b514802c900, thread=value optimized out) at UnixNetVConnection.cc:320 #21 0x0067fb12 in NetHandler::mainNetEvent (this=0x2b50e2e17c10, event=value optimized out, e=value optimized out) at UnixNet.cc:384 #22 0x006ac8cf in handleEvent (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at I_Continuation.h:146 #23 EThread::process_event (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at UnixEThread.cc:145 #24 0x006ad273 in EThread::execute (this=0x2b50e2e14010) at UnixEThread.cc:269 #25 0x006abc2a in spawn_thread_internal (a=0x198f820) at Thread.cc:88 #26 0x2b50e026b9d1 in start_thread () from /lib64/libpthread.so.0 #27 0x00381b2e8b6d in clone () from /lib64/libc.so.6 -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (TS-3311) Possible lookups on NULL hostnames in HostDB
[ https://issues.apache.org/jira/browse/TS-3311?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14286252#comment-14286252 ] Leif Hedstrom commented on TS-3311: --- I cloned this, such that we can look at the underlying problem that triggered this issue. Assigning to [~amc] Possible lookups on NULL hostnames in HostDB Key: TS-3311 URL: https://issues.apache.org/jira/browse/TS-3311 Project: Traffic Server Issue Type: Bug Components: HostDB Reporter: Steve Malenfant Assignee: Alan M. Carroll Fix For: 5.3.0 Getting multiple segfaults per day on 4.2.1. [4324544.324222] [ET_NET 23][10504]: segfault at 0 ip 2acd66546168 sp 2acd71f190b8 error 4 in libtsutil.so.4.2.1[2acd66521000+34000] [4410696.820857] [ET_NET 19][22738]: segfault at 0 ip 2af09f339168 sp 2af0aa9230b8 error 4 in libtsutil.so.4.2.1[2af09f314000+34000] [4497039.474253] [ET_NET 12][34872]: segfault at 0 ip 2ad17e6a1168 sp 2ad1896100b8 error 4 in libtsutil.so.4.2.1[2ad17e67c000+34000] [4583372.073916] [ET_NET 3][46994]: segfault at 0 ip 2aced4227168 sp 2aceda7d80b8 error 4 in libtsutil.so.4.2.1[2aced4202000+34000] [4756046.944373] [ET_NET 22][10799]: segfault at 0 ip 2b1771f76168 sp 2b177d9130b8 error 4 in libtsutil.so.4.2.1[2b1771f51000+34000] Stack Trace : (gdb) bt #0 ink_inet_addr (s=value optimized out) at ink_inet.cc:107 #1 0x005e0df5 in is_dotted_form_hostname (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at P_HostDBProcessor.h:545 #2 probe (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at HostDB.cc:668 #3 0x005e2b34 in HostDBProcessor::getby (this=value optimized out, cont=0x2b514cc749d0, hostname=0x0, len=value optimized out, ip=0x2b50e8f092b0, aforce_dns=false, host_res_style=HOST_RES_NONE, dns_lookup_timeout=0) at HostDB.cc:772 #4 0x00517f2c in getbyaddr_re (this=0x2b514cc749d0) at ../../iocore/hostdb/I_HostDBProcessor.h:417 #5 HttpSM::do_hostdb_reverse_lookup (this=0x2b514cc749d0) at HttpSM.cc:3968 #6 0x0052f028 in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6932 #7 0x00518242 in HttpSM::do_hostdb_lookup (this=0x2b514cc749d0) at HttpSM.cc:3950 #8 0x0052f44a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6925 #9 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #10 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #11 0x0052ea8a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:7224 #12 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #13 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #14 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #15 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #16 0x0052fef6 in HttpSM::state_read_client_request_header (this=0x2b514cc749d0, event=100, data=value optimized out) at HttpSM.cc:821 #17 0x0052a5b8 in HttpSM::main_handler (this=0x2b514cc749d0, event=100, data=0x2b514802ca08) at HttpSM.cc:2539 #18 0x0068793b in handleEvent (event=value optimized out, vc=0x2b514802c900) at ../../iocore/eventsystem/I_Continuation.h:146 #19 read_signal_and_update (event=value optimized out, vc=0x2b514802c900) at UnixNetVConnection.cc:138 #20 0x00689ec4 in read_from_net (nh=0x2b50e2e17c10, vc=0x2b514802c900, thread=value optimized out) at UnixNetVConnection.cc:320 #21 0x0067fb12 in NetHandler::mainNetEvent (this=0x2b50e2e17c10, event=value optimized out, e=value optimized out) at UnixNet.cc:384 #22 0x006ac8cf in handleEvent (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at I_Continuation.h:146 #23 EThread::process_event (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at UnixEThread.cc:145 #24 0x006ad273 in EThread::execute (this=0x2b50e2e14010) at UnixEThread.cc:269 #25 0x006abc2a in spawn_thread_internal (a=0x198f820) at Thread.cc:88 #26 0x2b50e026b9d1 in start_thread () from /lib64/libpthread.so.0 #27 0x00381b2e8b6d in clone () from /lib64/libc.so.6 -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Updated] (TS-3311) Possible lookups on NULL hostnames in HostDB
[ https://issues.apache.org/jira/browse/TS-3311?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Leif Hedstrom updated TS-3311: -- Summary: Possible lookups on NULL hostnames in HostDB (was: CLONE - segfault in libtsutils) Possible lookups on NULL hostnames in HostDB Key: TS-3311 URL: https://issues.apache.org/jira/browse/TS-3311 Project: Traffic Server Issue Type: Bug Components: HostDB Reporter: Steve Malenfant Assignee: Alan M. Carroll Fix For: 5.3.0 Getting multiple segfaults per day on 4.2.1. [4324544.324222] [ET_NET 23][10504]: segfault at 0 ip 2acd66546168 sp 2acd71f190b8 error 4 in libtsutil.so.4.2.1[2acd66521000+34000] [4410696.820857] [ET_NET 19][22738]: segfault at 0 ip 2af09f339168 sp 2af0aa9230b8 error 4 in libtsutil.so.4.2.1[2af09f314000+34000] [4497039.474253] [ET_NET 12][34872]: segfault at 0 ip 2ad17e6a1168 sp 2ad1896100b8 error 4 in libtsutil.so.4.2.1[2ad17e67c000+34000] [4583372.073916] [ET_NET 3][46994]: segfault at 0 ip 2aced4227168 sp 2aceda7d80b8 error 4 in libtsutil.so.4.2.1[2aced4202000+34000] [4756046.944373] [ET_NET 22][10799]: segfault at 0 ip 2b1771f76168 sp 2b177d9130b8 error 4 in libtsutil.so.4.2.1[2b1771f51000+34000] Stack Trace : (gdb) bt #0 ink_inet_addr (s=value optimized out) at ink_inet.cc:107 #1 0x005e0df5 in is_dotted_form_hostname (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at P_HostDBProcessor.h:545 #2 probe (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at HostDB.cc:668 #3 0x005e2b34 in HostDBProcessor::getby (this=value optimized out, cont=0x2b514cc749d0, hostname=0x0, len=value optimized out, ip=0x2b50e8f092b0, aforce_dns=false, host_res_style=HOST_RES_NONE, dns_lookup_timeout=0) at HostDB.cc:772 #4 0x00517f2c in getbyaddr_re (this=0x2b514cc749d0) at ../../iocore/hostdb/I_HostDBProcessor.h:417 #5 HttpSM::do_hostdb_reverse_lookup (this=0x2b514cc749d0) at HttpSM.cc:3968 #6 0x0052f028 in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6932 #7 0x00518242 in HttpSM::do_hostdb_lookup (this=0x2b514cc749d0) at HttpSM.cc:3950 #8 0x0052f44a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6925 #9 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #10 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #11 0x0052ea8a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:7224 #12 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #13 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #14 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #15 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #16 0x0052fef6 in HttpSM::state_read_client_request_header (this=0x2b514cc749d0, event=100, data=value optimized out) at HttpSM.cc:821 #17 0x0052a5b8 in HttpSM::main_handler (this=0x2b514cc749d0, event=100, data=0x2b514802ca08) at HttpSM.cc:2539 #18 0x0068793b in handleEvent (event=value optimized out, vc=0x2b514802c900) at ../../iocore/eventsystem/I_Continuation.h:146 #19 read_signal_and_update (event=value optimized out, vc=0x2b514802c900) at UnixNetVConnection.cc:138 #20 0x00689ec4 in read_from_net (nh=0x2b50e2e17c10, vc=0x2b514802c900, thread=value optimized out) at UnixNetVConnection.cc:320 #21 0x0067fb12 in NetHandler::mainNetEvent (this=0x2b50e2e17c10, event=value optimized out, e=value optimized out) at UnixNet.cc:384 #22 0x006ac8cf in handleEvent (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at I_Continuation.h:146 #23 EThread::process_event (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at UnixEThread.cc:145 #24 0x006ad273 in EThread::execute (this=0x2b50e2e14010) at UnixEThread.cc:269 #25 0x006abc2a in spawn_thread_internal (a=0x198f820) at Thread.cc:88 #26 0x2b50e026b9d1 in start_thread () from /lib64/libpthread.so.0 #27 0x00381b2e8b6d in clone () from /lib64/libc.so.6 -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Updated] (TS-3311) Possible lookups on NULL hostnames in HostDB
[ https://issues.apache.org/jira/browse/TS-3311?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Leif Hedstrom updated TS-3311: -- Backport to Version: 5.2.1 (was: 4.2.3, 5.2.1) Possible lookups on NULL hostnames in HostDB Key: TS-3311 URL: https://issues.apache.org/jira/browse/TS-3311 Project: Traffic Server Issue Type: Bug Components: HostDB Reporter: Steve Malenfant Assignee: Alan M. Carroll Fix For: 5.3.0 Getting multiple segfaults per day on 4.2.1. [4324544.324222] [ET_NET 23][10504]: segfault at 0 ip 2acd66546168 sp 2acd71f190b8 error 4 in libtsutil.so.4.2.1[2acd66521000+34000] [4410696.820857] [ET_NET 19][22738]: segfault at 0 ip 2af09f339168 sp 2af0aa9230b8 error 4 in libtsutil.so.4.2.1[2af09f314000+34000] [4497039.474253] [ET_NET 12][34872]: segfault at 0 ip 2ad17e6a1168 sp 2ad1896100b8 error 4 in libtsutil.so.4.2.1[2ad17e67c000+34000] [4583372.073916] [ET_NET 3][46994]: segfault at 0 ip 2aced4227168 sp 2aceda7d80b8 error 4 in libtsutil.so.4.2.1[2aced4202000+34000] [4756046.944373] [ET_NET 22][10799]: segfault at 0 ip 2b1771f76168 sp 2b177d9130b8 error 4 in libtsutil.so.4.2.1[2b1771f51000+34000] Stack Trace : (gdb) bt #0 ink_inet_addr (s=value optimized out) at ink_inet.cc:107 #1 0x005e0df5 in is_dotted_form_hostname (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at P_HostDBProcessor.h:545 #2 probe (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at HostDB.cc:668 #3 0x005e2b34 in HostDBProcessor::getby (this=value optimized out, cont=0x2b514cc749d0, hostname=0x0, len=value optimized out, ip=0x2b50e8f092b0, aforce_dns=false, host_res_style=HOST_RES_NONE, dns_lookup_timeout=0) at HostDB.cc:772 #4 0x00517f2c in getbyaddr_re (this=0x2b514cc749d0) at ../../iocore/hostdb/I_HostDBProcessor.h:417 #5 HttpSM::do_hostdb_reverse_lookup (this=0x2b514cc749d0) at HttpSM.cc:3968 #6 0x0052f028 in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6932 #7 0x00518242 in HttpSM::do_hostdb_lookup (this=0x2b514cc749d0) at HttpSM.cc:3950 #8 0x0052f44a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6925 #9 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #10 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #11 0x0052ea8a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:7224 #12 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #13 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #14 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #15 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #16 0x0052fef6 in HttpSM::state_read_client_request_header (this=0x2b514cc749d0, event=100, data=value optimized out) at HttpSM.cc:821 #17 0x0052a5b8 in HttpSM::main_handler (this=0x2b514cc749d0, event=100, data=0x2b514802ca08) at HttpSM.cc:2539 #18 0x0068793b in handleEvent (event=value optimized out, vc=0x2b514802c900) at ../../iocore/eventsystem/I_Continuation.h:146 #19 read_signal_and_update (event=value optimized out, vc=0x2b514802c900) at UnixNetVConnection.cc:138 #20 0x00689ec4 in read_from_net (nh=0x2b50e2e17c10, vc=0x2b514802c900, thread=value optimized out) at UnixNetVConnection.cc:320 #21 0x0067fb12 in NetHandler::mainNetEvent (this=0x2b50e2e17c10, event=value optimized out, e=value optimized out) at UnixNet.cc:384 #22 0x006ac8cf in handleEvent (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at I_Continuation.h:146 #23 EThread::process_event (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at UnixEThread.cc:145 #24 0x006ad273 in EThread::execute (this=0x2b50e2e14010) at UnixEThread.cc:269 #25 0x006abc2a in spawn_thread_internal (a=0x198f820) at Thread.cc:88 #26 0x2b50e026b9d1 in start_thread () from /lib64/libpthread.so.0 #27 0x00381b2e8b6d in clone () from /lib64/libc.so.6 -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Created] (TS-3312) KA timeout to origin does not seem to honor configurations
Leif Hedstrom created TS-3312: - Summary: KA timeout to origin does not seem to honor configurations Key: TS-3312 URL: https://issues.apache.org/jira/browse/TS-3312 Project: Traffic Server Issue Type: Bug Components: Core, HTTP Reporter: Leif Hedstrom Doing some basic testing, with the following settings: {code} CONFIG proxy.config.http.keep_alive_no_activity_timeout_out INT 120 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30 {code} I see ATS timing out the origin sessions after 30sec, with a {code} CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30 {code} What's also interesting, after I made a config change per Geffon's suggestion: {code} CONFIG proxy.config.http.origin_min_keep_alive_connections INT 10 {code} I see the following in the diagnostic trace: {code} [Jan 21 14:19:19.416] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [release session] session placed into shared pool [Jan 21 14:19:49.558] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], reseting timeout to maintain minimum number of connections [Jan 21 14:20:19.633] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], reseting timeout to maintain minimum number of connections [Jan 21 14:20:19.670] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [session_pool] session 0x1cc5aa0 received io notice [VC_EVENT_EOS] {code} So, not only is it resetting the timeout twice, it also gets a VC_EVENT_EOS. I first though it was the origin that closed the connection, but from what I could tell, the timeout on the origin was set to 60s. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (TS-3313) New World order for connection management and timeouts
[ https://issues.apache.org/jira/browse/TS-3313?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14286414#comment-14286414 ] Leif Hedstrom commented on TS-3313: --- Marking this as a 6.0.0 fix version target. I'm hoping that much of this will go in for v5.3.0, but things that would break compatibility would need to go into 6.0.0. New World order for connection management and timeouts -- Key: TS-3313 URL: https://issues.apache.org/jira/browse/TS-3313 Project: Traffic Server Issue Type: New Feature Components: Core Reporter: Leif Hedstrom Assignee: Bryan Call Labels: Umbrella Fix For: 6.0.0 This is an umbrella ticket for all issues related to connection management and timeouts. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Closed] (TS-2406) Sig 11: Segmentation fault
[ https://issues.apache.org/jira/browse/TS-2406?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Susan Hinrichs closed TS-2406. -- Resolution: Cannot Reproduce Fix Version/s: (was: 6.0.0) Not enough information to pursue. Based on the log info, it looks like SSL was enabled. The SSL connection handling has evolved considerably since 4.2. Please reopen again if this is still occurring. A stack trace or core would be useful in tracking down the situation. In addition description of the traffic and configuration would be useful (transparent, explicit proxy, forward or review proxy). Sig 11: Segmentation fault -- Key: TS-2406 URL: https://issues.apache.org/jira/browse/TS-2406 Project: Traffic Server Issue Type: Bug Components: Core Affects Versions: 4.2.0 Reporter: Neddy Assignee: Susan Hinrichs Labels: Crash Attachments: traffic.out.bak I've noticed this today, still don't know why [Nov 27 21:10:49.280] Manager {0x7f54eff15720} ERROR: [LocalManager::pollMgmtProcessServer] Server Process terminated due to Sig 11: Segmentation fault [Nov 28 07:53:42.853] Manager {0x7f54eff15720} ERROR: [LocalManager::pollMgmtProcessServer] Server Process terminated due to Sig 11: Segmentation fault How can I trace this? -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Created] (TS-3311) CLONE - segfault in libtsutils
Leif Hedstrom created TS-3311: - Summary: CLONE - segfault in libtsutils Key: TS-3311 URL: https://issues.apache.org/jira/browse/TS-3311 Project: Traffic Server Issue Type: Bug Components: HostDB Reporter: Steve Malenfant Assignee: Leif Hedstrom Fix For: 5.3.0 Getting multiple segfaults per day on 4.2.1. [4324544.324222] [ET_NET 23][10504]: segfault at 0 ip 2acd66546168 sp 2acd71f190b8 error 4 in libtsutil.so.4.2.1[2acd66521000+34000] [4410696.820857] [ET_NET 19][22738]: segfault at 0 ip 2af09f339168 sp 2af0aa9230b8 error 4 in libtsutil.so.4.2.1[2af09f314000+34000] [4497039.474253] [ET_NET 12][34872]: segfault at 0 ip 2ad17e6a1168 sp 2ad1896100b8 error 4 in libtsutil.so.4.2.1[2ad17e67c000+34000] [4583372.073916] [ET_NET 3][46994]: segfault at 0 ip 2aced4227168 sp 2aceda7d80b8 error 4 in libtsutil.so.4.2.1[2aced4202000+34000] [4756046.944373] [ET_NET 22][10799]: segfault at 0 ip 2b1771f76168 sp 2b177d9130b8 error 4 in libtsutil.so.4.2.1[2b1771f51000+34000] Stack Trace : (gdb) bt #0 ink_inet_addr (s=value optimized out) at ink_inet.cc:107 #1 0x005e0df5 in is_dotted_form_hostname (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at P_HostDBProcessor.h:545 #2 probe (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at HostDB.cc:668 #3 0x005e2b34 in HostDBProcessor::getby (this=value optimized out, cont=0x2b514cc749d0, hostname=0x0, len=value optimized out, ip=0x2b50e8f092b0, aforce_dns=false, host_res_style=HOST_RES_NONE, dns_lookup_timeout=0) at HostDB.cc:772 #4 0x00517f2c in getbyaddr_re (this=0x2b514cc749d0) at ../../iocore/hostdb/I_HostDBProcessor.h:417 #5 HttpSM::do_hostdb_reverse_lookup (this=0x2b514cc749d0) at HttpSM.cc:3968 #6 0x0052f028 in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6932 #7 0x00518242 in HttpSM::do_hostdb_lookup (this=0x2b514cc749d0) at HttpSM.cc:3950 #8 0x0052f44a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6925 #9 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #10 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #11 0x0052ea8a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:7224 #12 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #13 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #14 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #15 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #16 0x0052fef6 in HttpSM::state_read_client_request_header (this=0x2b514cc749d0, event=100, data=value optimized out) at HttpSM.cc:821 #17 0x0052a5b8 in HttpSM::main_handler (this=0x2b514cc749d0, event=100, data=0x2b514802ca08) at HttpSM.cc:2539 #18 0x0068793b in handleEvent (event=value optimized out, vc=0x2b514802c900) at ../../iocore/eventsystem/I_Continuation.h:146 #19 read_signal_and_update (event=value optimized out, vc=0x2b514802c900) at UnixNetVConnection.cc:138 #20 0x00689ec4 in read_from_net (nh=0x2b50e2e17c10, vc=0x2b514802c900, thread=value optimized out) at UnixNetVConnection.cc:320 #21 0x0067fb12 in NetHandler::mainNetEvent (this=0x2b50e2e17c10, event=value optimized out, e=value optimized out) at UnixNet.cc:384 #22 0x006ac8cf in handleEvent (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at I_Continuation.h:146 #23 EThread::process_event (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at UnixEThread.cc:145 #24 0x006ad273 in EThread::execute (this=0x2b50e2e14010) at UnixEThread.cc:269 #25 0x006abc2a in spawn_thread_internal (a=0x198f820) at Thread.cc:88 #26 0x2b50e026b9d1 in start_thread () from /lib64/libpthread.so.0 #27 0x00381b2e8b6d in clone () from /lib64/libc.so.6 -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (TS-3287) Coverity fixes for v5.3.0 by zwoop
[ https://issues.apache.org/jira/browse/TS-3287?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14286336#comment-14286336 ] ASF subversion and git services commented on TS-3287: - Commit 9dc726cb24808e7ee99c890c6326d501bc7be049 in trafficserver's branch refs/heads/master from [~jpe...@apache.org] [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=9dc726c ] TS-3287: fix URL rewrite allocation size We are allocating the URL rewrite path in units of char, not units of char *. Coverity CID #1254805 Coverity fixes for v5.3.0 by zwoop -- Key: TS-3287 URL: https://issues.apache.org/jira/browse/TS-3287 Project: Traffic Server Issue Type: Bug Components: Core Reporter: Leif Hedstrom Assignee: Leif Hedstrom Fix For: 5.3.0 This is my JIRA for Coverity commits for v5.3.0. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Updated] (TS-3283) Certain SSL handshake error during client-hello hangs the client and leaves network connection open
[ https://issues.apache.org/jira/browse/TS-3283?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Phil Sorber updated TS-3283: Backport to Version: (was: 4.2.3) Certain SSL handshake error during client-hello hangs the client and leaves network connection open --- Key: TS-3283 URL: https://issues.apache.org/jira/browse/TS-3283 Project: Traffic Server Issue Type: Bug Components: SSL Reporter: Joe Chung Assignee: Phil Sorber Fix For: 4.2.3, 5.3.0 h3. Problem Description Send an SSLv2 Client Hello with an old cipher suite request against Traffic Server 4.2.2, and the connection will freeze on the client side and eventually time out after 120 seconds. The Traffic Server detects the SSL error, but instead of closing the connection, goes on to accept new connections. h3. Reproduction === Client: Macbook Pro running OSX Mavericks 10.9.5 === {code:none} $ openssl version -a OpenSSL 0.9.8za 5 Jun 2014 built on: Aug 10 2014 platform: darwin64-x86_64-llvm options: bn(64,64) md2(int) rc4(ptr,char) des(idx,cisc,16,int) blowfish(idx) compiler: -arch x86_64 -fmessage-length=0 -pipe -Wno-trigraphs -fpascal-strings -fasm-blocks -O3 -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DMD32_REG_T=int -DOPENSSL_NO_IDEA -DOPENSSL_PIC -DOPENSSL_THREADS -DZLIB -mmacosx-version-min=10.6 OPENSSLDIR: /System/Library/OpenSSL {code} h4. The following command triggers the bad behavior on the 4.2.2 server. {code:none} $ openssl s_client -connect 192.168.20.130:443 -ssl2 -debug CONNECTED(0003) write to 0x7fb9f2508610 [0x7fb9f300f201] (45 bytes = 45 (0x2D)) - 80 2b 01 00 02 00 12 00-00 00 10 07 00 c0 03 00 .+.. 0010 - 80 01 00 80 06 00 40 04-00 80 02 00 80 f4 71 1a ..@...q. 0020 - ad 23 06 59 4d f8 d2 c5-b2 57 a9 66 4c.#.YMW.fL ^C {code} At this point, the client is hung, and I have to hit ctrl-c to interrupt it or wait 120 seconds for tcp timeout. h3. Server: Lubuntu 13.10 on VMware {code:none} $ openssl version -a OpenSSL 1.0.1e 11 Feb 2013 built on: Fri Jun 20 18:52:25 UTC 2014 platform: debian-i386 options: bn(64,32) rc4(8x,mmx) des(ptr,risc1,16,long) blowfish(idx) compiler: cc -fPIC -DOPENSSL_PIC -DZLIB -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DTERMIO -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -D_FORTIFY_SOURCE=2 -Wl,-Bsymbolic-functions -Wl,-z,relro -Wa,--noexecstack -Wall -DOPENSSL_NO_TLS1_2_CLIENT -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DRMD160_ASM -DAES_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM OPENSSLDIR: /usr/lib/ssl {code} {code:none} $ diff /usr/local/etc/trafficserver/records.config.422 /usr/local/etc/trafficserver/records.config 113c113 CONFIG proxy.config.http.server_ports STRING 8080 --- CONFIG proxy.config.http.server_ports STRING 8080 443:ssl 594,595c594,595 CONFIG proxy.config.diags.debug.enabled INT 0 CONFIG proxy.config.diags.debug.tags STRING http.*|dns.* --- CONFIG proxy.config.diags.debug.enabled INT 1 CONFIG proxy.config.diags.debug.tags STRING ssl.* {code} {code:none} $ /usr/local/bin/traffic_server --version [TrafficServer] using root directory '/usr/local' Apache Traffic Server - traffic_server - 4.2.2 - (build # 0723 on Jan 7 2015 at 23:04:32) $ sudo /usr/local/bin/traffic_server [sudo] password for user: [TrafficServer] using root directory '/usr/local' [Jan 8 00:53:42.618] Server {0xb702e700} DEBUG: (ssl) setting SNI callbacks with for ctx 0xa4a7928 [Jan 8 00:53:42.618] Server {0xb702e700} DEBUG: (ssl) indexed '*' with SSL_CTX 0xa4a7928 [Jan 8 00:53:42.619] Server {0xb702e700} DEBUG: (ssl) importing SNI names from /usr/local/etc/trafficserver [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) [SSLNextProtocolAccept:mainEvent] event 202 netvc 0xb280fa90 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 16 ret: 1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 8193 ret: 1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 8194 ret: -1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) SSL::3055967040:error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol:s23_srvr.c:628 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: SSLNetVConnection.cc:526 (sslServerHandShakeEvent) (ssl) SSL handshake error: SSL_ERROR_SSL (1), errno=0 {code} At this point, the server has not closed the tcp connection, and has
[jira] [Updated] (TS-3313) New World order for connection management and timeouts
[ https://issues.apache.org/jira/browse/TS-3313?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Leif Hedstrom updated TS-3313: -- Fix Version/s: 5.3.0 New World order for connection management and timeouts -- Key: TS-3313 URL: https://issues.apache.org/jira/browse/TS-3313 Project: Traffic Server Issue Type: New Feature Components: Core Reporter: Leif Hedstrom Labels: Umbrella Fix For: 5.3.0 This is an umbrella ticket for all issues related to connection management and timeouts. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (TS-3313) New World order for connection management and timeouts
[ https://issues.apache.org/jira/browse/TS-3313?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14286340#comment-14286340 ] Bryan Call commented on TS-3313: Here is a rough design draft. This will become a Wiki when it becomes more polished. https://docs.google.com/document/d/1Y5iKRas1Bd-LbsHltKvB4rNd5ySA-L5aSMHoEK8YlvE/edit New World order for connection management and timeouts -- Key: TS-3313 URL: https://issues.apache.org/jira/browse/TS-3313 Project: Traffic Server Issue Type: New Feature Components: Core Reporter: Leif Hedstrom Labels: Umbrella Fix For: 5.3.0 This is an umbrella ticket for all issues related to connection management and timeouts. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (TS-1336) High CPU Usage at idle
[ https://issues.apache.org/jira/browse/TS-1336?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14286338#comment-14286338 ] Leif Hedstrom commented on TS-1336: --- I spoke with God (jplevyak) on this issue recently. One suspicion here is that we're doing things either at too short timeout intervals, or scheduling things too frequently. Definitely worth looking into, and also, maybe TS-3313 will help with some of these issues. High CPU Usage at idle -- Key: TS-1336 URL: https://issues.apache.org/jira/browse/TS-1336 Project: Traffic Server Issue Type: Bug Components: Performance Affects Versions: 3.0.5, 3.0.2 Environment: Ubuntu 12.04 server, amd64, Xenon E5520 (4-core, 16 cores with HT) Reporter: Greg Smolyn Labels: A Fix For: sometime On this unloaded system, a very basic traffic server instance is using 180% CPU, with 3 threads ET_TASK 0, ET_TASK 1, and LOGGING taking up about 60% each. top -H output: PID USER PR NI VIRT RES SHR S %CPU %MEMTIME+ COMMAND 10723 traffics 20 0 1960m 113m 4168 R 61 0.4 9:11.27 [ET_TASK 1] 10722 traffics 20 0 1960m 113m 4168 R 60 0.4 8:41.61 [ET_TASK 0] 10720 traffics 20 0 1960m 113m 4168 S 59 0.4 8:49.19 [LOGGING] 19 root 20 0 000 R 15 0.0 898:45.74 ksoftirqd/3 10 root 20 0 000 S 15 0.0 930:16.92 ksoftirqd/1 27 root 20 0 000 S 14 0.0 893:18.41 ksoftirqd/5 35 root 20 0 000 S 14 0.0 888:54.41 ksoftirqd/7 3 root 20 0 000 S8 0.0 942:48.39 ksoftirqd/0 15 root 20 0 000 S7 0.0 906:40.98 ksoftirqd/2 23 root 20 0 000 S7 0.0 907:30.33 ksoftirqd/4 31 root 20 0 000 S7 0.0 898:13.05 ksoftirqd/6 13530 root 20 0 98.2m 3244 2572 S1 0.0 29:28.86 flip_server 9425 root 20 0 17568 1592 1060 R0 0.0 0:04.16 top 10689 traffics 20 0 1960m 113m 4168 S0 0.4 0:00.54 [ET_NET 5] 10693 traffics 20 0 1960m 113m 4168 S0 0.4 0:00.51 [ET_NET 9] 10701 traffics 20 0 1960m 113m 4168 S0 0.4 0:00.56 [ET_NET 17] 10702 traffics 20 0 1960m 113m 4168 S0 0.4 0:00.53 [ET_NET 18] 10705 traffics 20 0 1960m 113m 4168 S0 0.4 0:00.54 [ET_NET 21] 1 root 20 0 24328 2256 1344 S0 0.0 0:02.53 init 2 root 20 0 000 S0 0.0 0:00.05 kthreadd stracing the ET_TASK threads showed a repeating set of calls to
[jira] [Closed] (TS-3306) Keep_alive_out not working
[ https://issues.apache.org/jira/browse/TS-3306?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Thomas Jackson closed TS-3306. -- Resolution: Not a Problem Turns out there was a bug in the origin that was miscalculating the content-length. Some clients (such as curl) will continue to use the tcp session even if there is such a mismatch, but ATS doesn't-- which is more than fair. I've fixed the test case, and can confirm that it is working as intended. Keep_alive_out not working -- Key: TS-3306 URL: https://issues.apache.org/jira/browse/TS-3306 Project: Traffic Server Issue Type: Bug Reporter: Thomas Jackson Fix For: 5.3.0 Attachments: cop.log I *hope* that I'm just missing something very obvious, but as best I can tell keep_alive_out is not working on 5.0, 5.1, and master. At some point this worked as we vetted the feature when we rolled it out-- I think we were running 4.2 at the time. To show the issue I created a test (https://github.com/jacksontj/trafficserver/commit/f913b88666aef6502b8540149a60b2ce25853f9c) which shows the issue. In my test case there is a socket server which just returns a 200 OK keep-alive response with the body being the number of HTTP requests this tcp connection has seen. If you run the test you can see that it will always return 1. I thought this could have been some issue timeouts or something, but you can see in the output (below) that ATS immediately closes the connection to origin. {code} test_basic_proxy (test_keepalive.TestKeepAliveOut) ... connection from ('127.0.0.1', 39298) GET / HTTP/1.1 Host: 127.0.0.1:45807 Accept-Encoding: gzip Accept: */* User-Agent: python-requests/2.5.1 CPython/2.6.6 Linux/2.6.32-431.20.3.el6.ipvs.x86_64 Client-ip: 127.0.0.1 X-Forwarded-For: 127.0.0.1 Via: http/1.1 proxy_name[2620011950002221C32458757B78BB48] (ApacheTrafficServer/5.3.0) sending data back to the client Client disconnected waiting for a connection connection from ('127.0.0.1', 39300) GET / HTTP/1.1 Host: 127.0.0.1:45807 Accept-Encoding: gzip Accept: */* User-Agent: python-requests/2.5.1 CPython/2.6.6 Linux/2.6.32-431.20.3.el6.ipvs.x86_64 Client-ip: 127.0.0.1 X-Forwarded-For: 127.0.0.1 Via: http/1.1 proxy_name[2620011950002221C32458757B78BB48] (ApacheTrafficServer/5.3.0) sending data back to the client Client disconnected waiting for a connection FAIL {code} -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Updated] (TS-3313) New World order for connection management and timeouts
[ https://issues.apache.org/jira/browse/TS-3313?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Leif Hedstrom updated TS-3313: -- Labels: Umbrella (was: ) New World order for connection management and timeouts -- Key: TS-3313 URL: https://issues.apache.org/jira/browse/TS-3313 Project: Traffic Server Issue Type: New Feature Components: Core Reporter: Leif Hedstrom Labels: Umbrella This is an umbrella ticket for all issues related to connection management and timeouts. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Updated] (TS-3283) Certain SSL handshake error during client-hello hangs the client and leaves network connection open
[ https://issues.apache.org/jira/browse/TS-3283?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Phil Sorber updated TS-3283: Fix Version/s: 4.2.3 Certain SSL handshake error during client-hello hangs the client and leaves network connection open --- Key: TS-3283 URL: https://issues.apache.org/jira/browse/TS-3283 Project: Traffic Server Issue Type: Bug Components: SSL Reporter: Joe Chung Assignee: Phil Sorber Fix For: 4.2.3, 5.3.0 h3. Problem Description Send an SSLv2 Client Hello with an old cipher suite request against Traffic Server 4.2.2, and the connection will freeze on the client side and eventually time out after 120 seconds. The Traffic Server detects the SSL error, but instead of closing the connection, goes on to accept new connections. h3. Reproduction === Client: Macbook Pro running OSX Mavericks 10.9.5 === {code:none} $ openssl version -a OpenSSL 0.9.8za 5 Jun 2014 built on: Aug 10 2014 platform: darwin64-x86_64-llvm options: bn(64,64) md2(int) rc4(ptr,char) des(idx,cisc,16,int) blowfish(idx) compiler: -arch x86_64 -fmessage-length=0 -pipe -Wno-trigraphs -fpascal-strings -fasm-blocks -O3 -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DMD32_REG_T=int -DOPENSSL_NO_IDEA -DOPENSSL_PIC -DOPENSSL_THREADS -DZLIB -mmacosx-version-min=10.6 OPENSSLDIR: /System/Library/OpenSSL {code} h4. The following command triggers the bad behavior on the 4.2.2 server. {code:none} $ openssl s_client -connect 192.168.20.130:443 -ssl2 -debug CONNECTED(0003) write to 0x7fb9f2508610 [0x7fb9f300f201] (45 bytes = 45 (0x2D)) - 80 2b 01 00 02 00 12 00-00 00 10 07 00 c0 03 00 .+.. 0010 - 80 01 00 80 06 00 40 04-00 80 02 00 80 f4 71 1a ..@...q. 0020 - ad 23 06 59 4d f8 d2 c5-b2 57 a9 66 4c.#.YMW.fL ^C {code} At this point, the client is hung, and I have to hit ctrl-c to interrupt it or wait 120 seconds for tcp timeout. h3. Server: Lubuntu 13.10 on VMware {code:none} $ openssl version -a OpenSSL 1.0.1e 11 Feb 2013 built on: Fri Jun 20 18:52:25 UTC 2014 platform: debian-i386 options: bn(64,32) rc4(8x,mmx) des(ptr,risc1,16,long) blowfish(idx) compiler: cc -fPIC -DOPENSSL_PIC -DZLIB -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DTERMIO -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -D_FORTIFY_SOURCE=2 -Wl,-Bsymbolic-functions -Wl,-z,relro -Wa,--noexecstack -Wall -DOPENSSL_NO_TLS1_2_CLIENT -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DRMD160_ASM -DAES_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM OPENSSLDIR: /usr/lib/ssl {code} {code:none} $ diff /usr/local/etc/trafficserver/records.config.422 /usr/local/etc/trafficserver/records.config 113c113 CONFIG proxy.config.http.server_ports STRING 8080 --- CONFIG proxy.config.http.server_ports STRING 8080 443:ssl 594,595c594,595 CONFIG proxy.config.diags.debug.enabled INT 0 CONFIG proxy.config.diags.debug.tags STRING http.*|dns.* --- CONFIG proxy.config.diags.debug.enabled INT 1 CONFIG proxy.config.diags.debug.tags STRING ssl.* {code} {code:none} $ /usr/local/bin/traffic_server --version [TrafficServer] using root directory '/usr/local' Apache Traffic Server - traffic_server - 4.2.2 - (build # 0723 on Jan 7 2015 at 23:04:32) $ sudo /usr/local/bin/traffic_server [sudo] password for user: [TrafficServer] using root directory '/usr/local' [Jan 8 00:53:42.618] Server {0xb702e700} DEBUG: (ssl) setting SNI callbacks with for ctx 0xa4a7928 [Jan 8 00:53:42.618] Server {0xb702e700} DEBUG: (ssl) indexed '*' with SSL_CTX 0xa4a7928 [Jan 8 00:53:42.619] Server {0xb702e700} DEBUG: (ssl) importing SNI names from /usr/local/etc/trafficserver [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) [SSLNextProtocolAccept:mainEvent] event 202 netvc 0xb280fa90 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 16 ret: 1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 8193 ret: 1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 8194 ret: -1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) SSL::3055967040:error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol:s23_srvr.c:628 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: SSLNetVConnection.cc:526 (sslServerHandShakeEvent) (ssl) SSL handshake error: SSL_ERROR_SSL (1), errno=0 {code} At this point, the server has not closed the tcp connection, and has instead gone back
[jira] [Updated] (TS-3304) segfault in libtsutils
[ https://issues.apache.org/jira/browse/TS-3304?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Phil Sorber updated TS-3304: Backport to Version: 5.2.1 (was: 4.2.3, 5.2.1) segfault in libtsutils -- Key: TS-3304 URL: https://issues.apache.org/jira/browse/TS-3304 Project: Traffic Server Issue Type: Bug Components: HostDB Reporter: Steve Malenfant Assignee: Leif Hedstrom Fix For: 4.2.3, 5.3.0 Getting multiple segfaults per day on 4.2.1. [4324544.324222] [ET_NET 23][10504]: segfault at 0 ip 2acd66546168 sp 2acd71f190b8 error 4 in libtsutil.so.4.2.1[2acd66521000+34000] [4410696.820857] [ET_NET 19][22738]: segfault at 0 ip 2af09f339168 sp 2af0aa9230b8 error 4 in libtsutil.so.4.2.1[2af09f314000+34000] [4497039.474253] [ET_NET 12][34872]: segfault at 0 ip 2ad17e6a1168 sp 2ad1896100b8 error 4 in libtsutil.so.4.2.1[2ad17e67c000+34000] [4583372.073916] [ET_NET 3][46994]: segfault at 0 ip 2aced4227168 sp 2aceda7d80b8 error 4 in libtsutil.so.4.2.1[2aced4202000+34000] [4756046.944373] [ET_NET 22][10799]: segfault at 0 ip 2b1771f76168 sp 2b177d9130b8 error 4 in libtsutil.so.4.2.1[2b1771f51000+34000] Stack Trace : (gdb) bt #0 ink_inet_addr (s=value optimized out) at ink_inet.cc:107 #1 0x005e0df5 in is_dotted_form_hostname (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at P_HostDBProcessor.h:545 #2 probe (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at HostDB.cc:668 #3 0x005e2b34 in HostDBProcessor::getby (this=value optimized out, cont=0x2b514cc749d0, hostname=0x0, len=value optimized out, ip=0x2b50e8f092b0, aforce_dns=false, host_res_style=HOST_RES_NONE, dns_lookup_timeout=0) at HostDB.cc:772 #4 0x00517f2c in getbyaddr_re (this=0x2b514cc749d0) at ../../iocore/hostdb/I_HostDBProcessor.h:417 #5 HttpSM::do_hostdb_reverse_lookup (this=0x2b514cc749d0) at HttpSM.cc:3968 #6 0x0052f028 in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6932 #7 0x00518242 in HttpSM::do_hostdb_lookup (this=0x2b514cc749d0) at HttpSM.cc:3950 #8 0x0052f44a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6925 #9 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #10 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #11 0x0052ea8a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:7224 #12 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #13 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #14 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #15 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #16 0x0052fef6 in HttpSM::state_read_client_request_header (this=0x2b514cc749d0, event=100, data=value optimized out) at HttpSM.cc:821 #17 0x0052a5b8 in HttpSM::main_handler (this=0x2b514cc749d0, event=100, data=0x2b514802ca08) at HttpSM.cc:2539 #18 0x0068793b in handleEvent (event=value optimized out, vc=0x2b514802c900) at ../../iocore/eventsystem/I_Continuation.h:146 #19 read_signal_and_update (event=value optimized out, vc=0x2b514802c900) at UnixNetVConnection.cc:138 #20 0x00689ec4 in read_from_net (nh=0x2b50e2e17c10, vc=0x2b514802c900, thread=value optimized out) at UnixNetVConnection.cc:320 #21 0x0067fb12 in NetHandler::mainNetEvent (this=0x2b50e2e17c10, event=value optimized out, e=value optimized out) at UnixNet.cc:384 #22 0x006ac8cf in handleEvent (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at I_Continuation.h:146 #23 EThread::process_event (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at UnixEThread.cc:145 #24 0x006ad273 in EThread::execute (this=0x2b50e2e14010) at UnixEThread.cc:269 #25 0x006abc2a in spawn_thread_internal (a=0x198f820) at Thread.cc:88 #26 0x2b50e026b9d1 in start_thread () from /lib64/libpthread.so.0 #27 0x00381b2e8b6d in clone () from /lib64/libc.so.6 -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Resolved] (TS-3283) Certain SSL handshake error during client-hello hangs the client and leaves network connection open
[ https://issues.apache.org/jira/browse/TS-3283?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Phil Sorber resolved TS-3283. - Resolution: Fixed This is backported and will be in the next 4.2.x release. Certain SSL handshake error during client-hello hangs the client and leaves network connection open --- Key: TS-3283 URL: https://issues.apache.org/jira/browse/TS-3283 Project: Traffic Server Issue Type: Bug Components: SSL Reporter: Joe Chung Assignee: Phil Sorber Fix For: 4.2.3 h3. Problem Description Send an SSLv2 Client Hello with an old cipher suite request against Traffic Server 4.2.2, and the connection will freeze on the client side and eventually time out after 120 seconds. The Traffic Server detects the SSL error, but instead of closing the connection, goes on to accept new connections. h3. Reproduction === Client: Macbook Pro running OSX Mavericks 10.9.5 === {code:none} $ openssl version -a OpenSSL 0.9.8za 5 Jun 2014 built on: Aug 10 2014 platform: darwin64-x86_64-llvm options: bn(64,64) md2(int) rc4(ptr,char) des(idx,cisc,16,int) blowfish(idx) compiler: -arch x86_64 -fmessage-length=0 -pipe -Wno-trigraphs -fpascal-strings -fasm-blocks -O3 -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DMD32_REG_T=int -DOPENSSL_NO_IDEA -DOPENSSL_PIC -DOPENSSL_THREADS -DZLIB -mmacosx-version-min=10.6 OPENSSLDIR: /System/Library/OpenSSL {code} h4. The following command triggers the bad behavior on the 4.2.2 server. {code:none} $ openssl s_client -connect 192.168.20.130:443 -ssl2 -debug CONNECTED(0003) write to 0x7fb9f2508610 [0x7fb9f300f201] (45 bytes = 45 (0x2D)) - 80 2b 01 00 02 00 12 00-00 00 10 07 00 c0 03 00 .+.. 0010 - 80 01 00 80 06 00 40 04-00 80 02 00 80 f4 71 1a ..@...q. 0020 - ad 23 06 59 4d f8 d2 c5-b2 57 a9 66 4c.#.YMW.fL ^C {code} At this point, the client is hung, and I have to hit ctrl-c to interrupt it or wait 120 seconds for tcp timeout. h3. Server: Lubuntu 13.10 on VMware {code:none} $ openssl version -a OpenSSL 1.0.1e 11 Feb 2013 built on: Fri Jun 20 18:52:25 UTC 2014 platform: debian-i386 options: bn(64,32) rc4(8x,mmx) des(ptr,risc1,16,long) blowfish(idx) compiler: cc -fPIC -DOPENSSL_PIC -DZLIB -DOPENSSL_THREADS -D_REENTRANT -DDSO_DLFCN -DHAVE_DLFCN_H -DL_ENDIAN -DTERMIO -g -O2 -fstack-protector --param=ssp-buffer-size=4 -Wformat -Werror=format-security -D_FORTIFY_SOURCE=2 -Wl,-Bsymbolic-functions -Wl,-z,relro -Wa,--noexecstack -Wall -DOPENSSL_NO_TLS1_2_CLIENT -DOPENSSL_MAX_TLS1_2_CIPHER_LENGTH=50 -DOPENSSL_BN_ASM_PART_WORDS -DOPENSSL_IA32_SSE2 -DOPENSSL_BN_ASM_MONT -DOPENSSL_BN_ASM_GF2m -DSHA1_ASM -DSHA256_ASM -DSHA512_ASM -DMD5_ASM -DRMD160_ASM -DAES_ASM -DVPAES_ASM -DWHIRLPOOL_ASM -DGHASH_ASM OPENSSLDIR: /usr/lib/ssl {code} {code:none} $ diff /usr/local/etc/trafficserver/records.config.422 /usr/local/etc/trafficserver/records.config 113c113 CONFIG proxy.config.http.server_ports STRING 8080 --- CONFIG proxy.config.http.server_ports STRING 8080 443:ssl 594,595c594,595 CONFIG proxy.config.diags.debug.enabled INT 0 CONFIG proxy.config.diags.debug.tags STRING http.*|dns.* --- CONFIG proxy.config.diags.debug.enabled INT 1 CONFIG proxy.config.diags.debug.tags STRING ssl.* {code} {code:none} $ /usr/local/bin/traffic_server --version [TrafficServer] using root directory '/usr/local' Apache Traffic Server - traffic_server - 4.2.2 - (build # 0723 on Jan 7 2015 at 23:04:32) $ sudo /usr/local/bin/traffic_server [sudo] password for user: [TrafficServer] using root directory '/usr/local' [Jan 8 00:53:42.618] Server {0xb702e700} DEBUG: (ssl) setting SNI callbacks with for ctx 0xa4a7928 [Jan 8 00:53:42.618] Server {0xb702e700} DEBUG: (ssl) indexed '*' with SSL_CTX 0xa4a7928 [Jan 8 00:53:42.619] Server {0xb702e700} DEBUG: (ssl) importing SNI names from /usr/local/etc/trafficserver [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) [SSLNextProtocolAccept:mainEvent] event 202 netvc 0xb280fa90 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 16 ret: 1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 8193 ret: 1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) ssl_callback_info ssl: 0xb280fcb8 where: 8194 ret: -1 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: (ssl) SSL::3055967040:error:140760FC:SSL routines:SSL23_GET_CLIENT_HELLO:unknown protocol:s23_srvr.c:628 [Jan 8 00:54:02.256] Server {0xb6265b40} DEBUG: SSLNetVConnection.cc:526 (sslServerHandShakeEvent) (ssl) SSL handshake error: SSL_ERROR_SSL (1), errno=0 {code} At this point, the server has not
[jira] [Updated] (TS-3304) segfault in libtsutils
[ https://issues.apache.org/jira/browse/TS-3304?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Phil Sorber updated TS-3304: Fix Version/s: 4.2.3 segfault in libtsutils -- Key: TS-3304 URL: https://issues.apache.org/jira/browse/TS-3304 Project: Traffic Server Issue Type: Bug Components: HostDB Reporter: Steve Malenfant Assignee: Leif Hedstrom Fix For: 4.2.3, 5.3.0 Getting multiple segfaults per day on 4.2.1. [4324544.324222] [ET_NET 23][10504]: segfault at 0 ip 2acd66546168 sp 2acd71f190b8 error 4 in libtsutil.so.4.2.1[2acd66521000+34000] [4410696.820857] [ET_NET 19][22738]: segfault at 0 ip 2af09f339168 sp 2af0aa9230b8 error 4 in libtsutil.so.4.2.1[2af09f314000+34000] [4497039.474253] [ET_NET 12][34872]: segfault at 0 ip 2ad17e6a1168 sp 2ad1896100b8 error 4 in libtsutil.so.4.2.1[2ad17e67c000+34000] [4583372.073916] [ET_NET 3][46994]: segfault at 0 ip 2aced4227168 sp 2aceda7d80b8 error 4 in libtsutil.so.4.2.1[2aced4202000+34000] [4756046.944373] [ET_NET 22][10799]: segfault at 0 ip 2b1771f76168 sp 2b177d9130b8 error 4 in libtsutil.so.4.2.1[2b1771f51000+34000] Stack Trace : (gdb) bt #0 ink_inet_addr (s=value optimized out) at ink_inet.cc:107 #1 0x005e0df5 in is_dotted_form_hostname (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at P_HostDBProcessor.h:545 #2 probe (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at HostDB.cc:668 #3 0x005e2b34 in HostDBProcessor::getby (this=value optimized out, cont=0x2b514cc749d0, hostname=0x0, len=value optimized out, ip=0x2b50e8f092b0, aforce_dns=false, host_res_style=HOST_RES_NONE, dns_lookup_timeout=0) at HostDB.cc:772 #4 0x00517f2c in getbyaddr_re (this=0x2b514cc749d0) at ../../iocore/hostdb/I_HostDBProcessor.h:417 #5 HttpSM::do_hostdb_reverse_lookup (this=0x2b514cc749d0) at HttpSM.cc:3968 #6 0x0052f028 in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6932 #7 0x00518242 in HttpSM::do_hostdb_lookup (this=0x2b514cc749d0) at HttpSM.cc:3950 #8 0x0052f44a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6925 #9 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #10 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #11 0x0052ea8a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:7224 #12 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #13 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #14 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #15 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #16 0x0052fef6 in HttpSM::state_read_client_request_header (this=0x2b514cc749d0, event=100, data=value optimized out) at HttpSM.cc:821 #17 0x0052a5b8 in HttpSM::main_handler (this=0x2b514cc749d0, event=100, data=0x2b514802ca08) at HttpSM.cc:2539 #18 0x0068793b in handleEvent (event=value optimized out, vc=0x2b514802c900) at ../../iocore/eventsystem/I_Continuation.h:146 #19 read_signal_and_update (event=value optimized out, vc=0x2b514802c900) at UnixNetVConnection.cc:138 #20 0x00689ec4 in read_from_net (nh=0x2b50e2e17c10, vc=0x2b514802c900, thread=value optimized out) at UnixNetVConnection.cc:320 #21 0x0067fb12 in NetHandler::mainNetEvent (this=0x2b50e2e17c10, event=value optimized out, e=value optimized out) at UnixNet.cc:384 #22 0x006ac8cf in handleEvent (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at I_Continuation.h:146 #23 EThread::process_event (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at UnixEThread.cc:145 #24 0x006ad273 in EThread::execute (this=0x2b50e2e14010) at UnixEThread.cc:269 #25 0x006abc2a in spawn_thread_internal (a=0x198f820) at Thread.cc:88 #26 0x2b50e026b9d1 in start_thread () from /lib64/libpthread.so.0 #27 0x00381b2e8b6d in clone () from /lib64/libc.so.6 -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Updated] (TS-3313) New World order for connection management and timeouts
[ https://issues.apache.org/jira/browse/TS-3313?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Leif Hedstrom updated TS-3313: -- Fix Version/s: (was: 5.3.0) 6.0.0 New World order for connection management and timeouts -- Key: TS-3313 URL: https://issues.apache.org/jira/browse/TS-3313 Project: Traffic Server Issue Type: New Feature Components: Core Reporter: Leif Hedstrom Assignee: Bryan Call Labels: Umbrella Fix For: 6.0.0 This is an umbrella ticket for all issues related to connection management and timeouts. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (TS-3309) TLS Session tickets docs
[ https://issues.apache.org/jira/browse/TS-3309?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14286277#comment-14286277 ] Bin commented on TS-3309: - Awesome! Thanks. TLS Session tickets docs Key: TS-3309 URL: https://issues.apache.org/jira/browse/TS-3309 Project: Traffic Server Issue Type: Bug Components: Core, Security, SSL Reporter: Bin Assignee: James Peach Fix For: 5.3.0 Attachments: traffic_line_rotation_doc.diff Add a few words to describe the TLS session ticket keys rotation for TS-3301. jpeach is the best person to review it. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (TS-2903) Connections are leaked at about 1000 per hour
[ https://issues.apache.org/jira/browse/TS-2903?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14286373#comment-14286373 ] Leif Hedstrom commented on TS-2903: --- [~shinrich] Wasn't there a fix related to this committed fairly recently? Connections are leaked at about 1000 per hour - Key: TS-2903 URL: https://issues.apache.org/jira/browse/TS-2903 Project: Traffic Server Issue Type: Bug Components: Core Reporter: Puneet Dhaliwal Assignee: Susan Hinrichs Fix For: sometime For version 3.2.5, with keep alive on for in/out and post out, connections were leaked at about 1000 per hour. The limit of proxy.config.net.connections_throttle was reached at 30k and at 60k after enough time. CONFIG proxy.config.http.keep_alive_post_out INT 1 CONFIG proxy.config.http.keep_alive_enabled_in INT 1 CONFIG proxy.config.http.keep_alive_enabled_out INT 1 This might also be happening for 4.2.1 and 5.0. Pls let me know if there is further information required. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (TS-153) Dynamic keep-alive timeouts
[ https://issues.apache.org/jira/browse/TS-153?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14286467#comment-14286467 ] ASF subversion and git services commented on TS-153: Commit 1dfc029c78bd986e42fcd10a2a30f94aa8f54e7a in trafficserver's branch refs/heads/master from [~bcall] [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=1dfc029 ] TS-153: Updates to traffic_top to report dynamic KA times Dynamic keep-alive timeouts - Key: TS-153 URL: https://issues.apache.org/jira/browse/TS-153 Project: Traffic Server Issue Type: New Feature Components: Core Reporter: Leif Hedstrom Assignee: Bryan Call Priority: Minor Labels: A Fix For: 5.3.0 Attachments: ts153.diff (This is from a Y! Bugzilla ticket 1821593, adding it here. . Originally posted by Leif Hedstrom on 2008-03-19): Currently you have to set static keep-alive idle timeouts in TS, e.g. CONFIG proxy.config.http.keep_alive_no_activity_timeout_in INT 8 CONFIG proxy.config.http.keep_alive_no_activity_timeout_out INT 30 even with epoll() in 1.17.x, this is difficult to configure, and put an appropriate timeout. The key here is that the settings above need to assure that you stay below the max configured number of connections, e.g.: CONFIG proxy.config.net.connections_throttle INT 75000 I'm suggesting that we add one (or two) new configuration options, and appropriate TS code support, to instead of specifying timeouts, we specify connection limits for idle KA connections. For example: CONFIG proxy.config.http.keep_alive_max_idle_connections_in INT 5 CONFIG proxy.config.http_keep_alive_max_idle_connections_out INT 5000 (one still has to be careful to leave head-room for active connections here, in the example above, 2 connections could be active, which is a lot of traffic). These would override the idle timeouts, so one could use the max_idle connections for incoming (client) connections, and the idle timeouts for outgoing (origin) connections for instance. The benefit here is that it makes configuration not only easier, but also a lot safer for many applications. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (TS-153) Dynamic keep-alive timeouts
[ https://issues.apache.org/jira/browse/TS-153?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14286508#comment-14286508 ] ASF subversion and git services commented on TS-153: Commit 0b7bf112a778111469f837a3fbba3982d217bb5d in trafficserver's branch refs/heads/master from [~bcall] [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=0b7bf11 ] TS-153: Dynamic keep-alive timeouts Renaming proxy.config.net.connections.threshold_shed_idle_in to proxy.config.net.max_connections_in to be inline with the overall design in TS-3312 Dynamic keep-alive timeouts - Key: TS-153 URL: https://issues.apache.org/jira/browse/TS-153 Project: Traffic Server Issue Type: New Feature Components: Core Reporter: Leif Hedstrom Assignee: Bryan Call Priority: Minor Labels: A Fix For: 5.3.0 Attachments: ts153.diff (This is from a Y! Bugzilla ticket 1821593, adding it here. . Originally posted by Leif Hedstrom on 2008-03-19): Currently you have to set static keep-alive idle timeouts in TS, e.g. CONFIG proxy.config.http.keep_alive_no_activity_timeout_in INT 8 CONFIG proxy.config.http.keep_alive_no_activity_timeout_out INT 30 even with epoll() in 1.17.x, this is difficult to configure, and put an appropriate timeout. The key here is that the settings above need to assure that you stay below the max configured number of connections, e.g.: CONFIG proxy.config.net.connections_throttle INT 75000 I'm suggesting that we add one (or two) new configuration options, and appropriate TS code support, to instead of specifying timeouts, we specify connection limits for idle KA connections. For example: CONFIG proxy.config.http.keep_alive_max_idle_connections_in INT 5 CONFIG proxy.config.http_keep_alive_max_idle_connections_out INT 5000 (one still has to be careful to leave head-room for active connections here, in the example above, 2 connections could be active, which is a lot of traffic). These would override the idle timeouts, so one could use the max_idle connections for incoming (client) connections, and the idle timeouts for outgoing (origin) connections for instance. The benefit here is that it makes configuration not only easier, but also a lot safer for many applications. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (TS-3312) KA timeout to origin does not seem to honor configurations
[ https://issues.apache.org/jira/browse/TS-3312?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14286509#comment-14286509 ] ASF subversion and git services commented on TS-3312: - Commit 0b7bf112a778111469f837a3fbba3982d217bb5d in trafficserver's branch refs/heads/master from [~bcall] [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=0b7bf11 ] TS-153: Dynamic keep-alive timeouts Renaming proxy.config.net.connections.threshold_shed_idle_in to proxy.config.net.max_connections_in to be inline with the overall design in TS-3312 KA timeout to origin does not seem to honor configurations -- Key: TS-3312 URL: https://issues.apache.org/jira/browse/TS-3312 Project: Traffic Server Issue Type: Bug Components: Core, HTTP Reporter: Leif Hedstrom Fix For: 5.3.0 Doing some basic testing, with the following settings: {code} CONFIG proxy.config.http.keep_alive_no_activity_timeout_out INT 120 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30 {code} I see ATS timing out the origin sessions after 30sec, with a {code} CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30 {code} What's also interesting, after I made a config change per Geffon's suggestion: {code} CONFIG proxy.config.http.origin_min_keep_alive_connections INT 10 {code} I see the following in the diagnostic trace: {code} [Jan 21 14:19:19.416] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [release session] session placed into shared pool [Jan 21 14:19:49.558] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], reseting timeout to maintain minimum number of connections [Jan 21 14:20:19.633] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], reseting timeout to maintain minimum number of connections [Jan 21 14:20:19.670] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [session_pool] session 0x1cc5aa0 received io notice [VC_EVENT_EOS] {code} So, not only is it resetting the timeout twice, it also gets a VC_EVENT_EOS. I first though it was the origin that closed the connection, but from what I could tell, the timeout on the origin was set to 60s. -- This message was sent by Atlassian JIRA (v6.3.4#6332)
Jenkins build is back to normal : clang-analyzer #287
See https://ci.trafficserver.apache.org/job/clang-analyzer/287/changes
[jira] [Commented] (TS-2715) Compiler warning in ESI plugin
[ https://issues.apache.org/jira/browse/TS-2715?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14286930#comment-14286930 ] ASF subversion and git services commented on TS-2715: - Commit 55ddb12bbb568bd08cc958b77f90c1c1f8d40281 in trafficserver's branch refs/heads/4.2.x from [~zwoop] [ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=55ddb12 ] TS-2715 Fix some ESI compile warnings (cherry picked from commit 1e6b4194e80a99e9d9b9ede0a66611209b52c178) Conflicts: CHANGES Compiler warning in ESI plugin -- Key: TS-2715 URL: https://issues.apache.org/jira/browse/TS-2715 Project: Traffic Server Issue Type: Bug Components: Plugins Reporter: Leif Hedstrom Assignee: Leif Hedstrom Priority: Trivial Fix For: 5.0.0 lib/EsiGzip.cc:36:18: warning: unused variable 'GZIP_TRAILER_SIZE' [-Wunused-const-variable] static const int GZIP_TRAILER_SIZE = 8; -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (TS-3304) segfault in libtsutils
[ https://issues.apache.org/jira/browse/TS-3304?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14286205#comment-14286205 ] Leif Hedstrom commented on TS-3304: --- I think it's ok for a 4.2.x back port. I still there's more work to be done here, maybe clone this Jira and assign to amc ? [~smalenfant] Thanks for the detailed reports, that certainly makes a lot of sense (the 86400 TTL on localhost is standard I think). Does [~psudaemon]'s fix solve your problem? You are not using log collation are you ? segfault in libtsutils -- Key: TS-3304 URL: https://issues.apache.org/jira/browse/TS-3304 Project: Traffic Server Issue Type: Bug Components: HostDB Reporter: Steve Malenfant Assignee: Leif Hedstrom Fix For: 5.3.0 Getting multiple segfaults per day on 4.2.1. [4324544.324222] [ET_NET 23][10504]: segfault at 0 ip 2acd66546168 sp 2acd71f190b8 error 4 in libtsutil.so.4.2.1[2acd66521000+34000] [4410696.820857] [ET_NET 19][22738]: segfault at 0 ip 2af09f339168 sp 2af0aa9230b8 error 4 in libtsutil.so.4.2.1[2af09f314000+34000] [4497039.474253] [ET_NET 12][34872]: segfault at 0 ip 2ad17e6a1168 sp 2ad1896100b8 error 4 in libtsutil.so.4.2.1[2ad17e67c000+34000] [4583372.073916] [ET_NET 3][46994]: segfault at 0 ip 2aced4227168 sp 2aceda7d80b8 error 4 in libtsutil.so.4.2.1[2aced4202000+34000] [4756046.944373] [ET_NET 22][10799]: segfault at 0 ip 2b1771f76168 sp 2b177d9130b8 error 4 in libtsutil.so.4.2.1[2b1771f51000+34000] Stack Trace : (gdb) bt #0 ink_inet_addr (s=value optimized out) at ink_inet.cc:107 #1 0x005e0df5 in is_dotted_form_hostname (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at P_HostDBProcessor.h:545 #2 probe (mutex=0x1d32cb0, md5=..., ignore_timeout=false) at HostDB.cc:668 #3 0x005e2b34 in HostDBProcessor::getby (this=value optimized out, cont=0x2b514cc749d0, hostname=0x0, len=value optimized out, ip=0x2b50e8f092b0, aforce_dns=false, host_res_style=HOST_RES_NONE, dns_lookup_timeout=0) at HostDB.cc:772 #4 0x00517f2c in getbyaddr_re (this=0x2b514cc749d0) at ../../iocore/hostdb/I_HostDBProcessor.h:417 #5 HttpSM::do_hostdb_reverse_lookup (this=0x2b514cc749d0) at HttpSM.cc:3968 #6 0x0052f028 in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6932 #7 0x00518242 in HttpSM::do_hostdb_lookup (this=0x2b514cc749d0) at HttpSM.cc:3950 #8 0x0052f44a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6925 #9 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #10 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #11 0x0052ea8a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:7224 #12 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #13 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #14 0x005284fa in HttpSM::handle_api_return (this=0x2b514cc749d0) at HttpSM.cc:1559 #15 0x0052ea9a in HttpSM::set_next_state (this=0x2b514cc749d0) at HttpSM.cc:6825 #16 0x0052fef6 in HttpSM::state_read_client_request_header (this=0x2b514cc749d0, event=100, data=value optimized out) at HttpSM.cc:821 #17 0x0052a5b8 in HttpSM::main_handler (this=0x2b514cc749d0, event=100, data=0x2b514802ca08) at HttpSM.cc:2539 #18 0x0068793b in handleEvent (event=value optimized out, vc=0x2b514802c900) at ../../iocore/eventsystem/I_Continuation.h:146 #19 read_signal_and_update (event=value optimized out, vc=0x2b514802c900) at UnixNetVConnection.cc:138 #20 0x00689ec4 in read_from_net (nh=0x2b50e2e17c10, vc=0x2b514802c900, thread=value optimized out) at UnixNetVConnection.cc:320 #21 0x0067fb12 in NetHandler::mainNetEvent (this=0x2b50e2e17c10, event=value optimized out, e=value optimized out) at UnixNet.cc:384 #22 0x006ac8cf in handleEvent (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at I_Continuation.h:146 #23 EThread::process_event (this=0x2b50e2e14010, e=0x1a9ef30, calling_code=5) at UnixEThread.cc:145 #24 0x006ad273 in EThread::execute (this=0x2b50e2e14010) at UnixEThread.cc:269 #25 0x006abc2a in spawn_thread_internal (a=0x198f820) at Thread.cc:88 #26 0x2b50e026b9d1 in start_thread () from /lib64/libpthread.so.0 #27 0x00381b2e8b6d in clone () from /lib64/libc.so.6 -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Updated] (TS-2573) Exponentional increasing of cluster timeouts
[ https://issues.apache.org/jira/browse/TS-2573?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] Leif Hedstrom updated TS-2573: -- Fix Version/s: (was: sometime) Exponentional increasing of cluster timeouts Key: TS-2573 URL: https://issues.apache.org/jira/browse/TS-2573 Project: Traffic Server Issue Type: Bug Components: Clustering Reporter: Peter Walsh Occasionally we see cluster operations will start timing out after 5 seconds. This will continue at an increasing rate until traffic server is restarted. The following stats increase when this happens, proxy.process.cluster.remote_op_timeouts and proxy.process.cluster.connections_open. I can tell that spikes in IO wait can contribute to this issue. Any ideas? -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Updated] (TS-3235) PluginVC crashed with unrecognized event
[ https://issues.apache.org/jira/browse/TS-3235?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel ] zouyu updated TS-3235: -- Attachment: pluginvc-crash.diff PluginVC crashed with unrecognized event Key: TS-3235 URL: https://issues.apache.org/jira/browse/TS-3235 Project: Traffic Server Issue Type: Bug Components: CPP API, HTTP, Plugins Reporter: kang li Assignee: Brian Geffon Fix For: 5.3.0 Attachments: pluginvc-crash.diff We are using atscppapi to create Intercept plugin. From the coredump , that seems Continuation of the InterceptPlugin was already been destroyed. {code} #0 0x00375ac32925 in raise () from /lib64/libc.so.6 #1 0x00375ac34105 in abort () from /lib64/libc.so.6 #2 0x2b21eeae3458 in ink_die_die_die (retval=1) at ink_error.cc:43 #3 0x2b21eeae3525 in ink_fatal_va(int, const char *, typedef __va_list_tag __va_list_tag *) (return_code=1, message_format=0x2b21eeaf08d8 %s:%d: failed assert `%s`, ap=0x2b21f4913ad0) at ink_error.cc:65 #4 0x2b21eeae35ee in ink_fatal (return_code=1, message_format=0x2b21eeaf08d8 %s:%d: failed assert `%s`) at ink_error.cc:73 #5 0x2b21eeae2160 in _ink_assert (expression=0x76ddb8 call_event == core_lock_retry_event, file=0x76dd04 PluginVC.cc, line=203) at ink_assert.cc:37 #6 0x00530217 in PluginVC::main_handler (this=0x2b24ef007cb8, event=1, data=0xe0f5b80) at PluginVC.cc:203 #7 0x004f5854 in Continuation::handleEvent (this=0x2b24ef007cb8, event=1, data=0xe0f5b80) at ../iocore/eventsystem/I_Continuation.h:146 #8 0x00755d26 in EThread::process_event (this=0x309b250, e=0xe0f5b80, calling_code=1) at UnixEThread.cc:145 #9 0x0075610a in EThread::execute (this=0x309b250) at UnixEThread.cc:239 #10 0x00755284 in spawn_thread_internal (a=0x2849330) at Thread.cc:88 #11 0x2b21ef05f9d1 in start_thread () from /lib64/libpthread.so.0 #12 0x00375ace8b7d in clone () from /lib64/libc.so.6 (gdb) p sm_lock_retry_event $13 = (Event *) 0x2b2496146e90 (gdb) p core_lock_retry_event $14 = (Event *) 0x0 (gdb) p active_event $15 = (Event *) 0x0 (gdb) p inactive_event $16 = (Event *) 0x0 (gdb) p *(INKContInternal*)this-core_obj-connect_to Cannot access memory at address 0x2b269cd46c10 {code} -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Comment Edited] (TS-3235) PluginVC crashed with unrecognized event
[ https://issues.apache.org/jira/browse/TS-3235?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14285386#comment-14285386 ] zouyu edited comment on TS-3235 at 1/21/15 10:43 AM: - Attach the pull request for this problem. [TS-3235] fix crash problem caused by sync problem in PluginVC. commit: e1ee3f517a6a916056bd95a4a3c78f3d81685da3 https://github.com/apache/trafficserver/pull/164 This fix is for the multi-thread sync problem exists in PluginVC of TS-3235. Below is the scenario of this problem: 1. customer uses interceptplugin which calls TSVIOReenable and TSVConnClose and that will call PluginVC's APIs in their work threads 2. That customer creates their work threads by using TSThreadCreate which are not controlled by ATS. 3. Because the interceptplugin works in their work threads and the lock provided by interceptplugin can only sync their work threads and it cannot sync the threads between ATS and interceptplugin, the sync problem will occur when TSVIOReenable and TSVConnClose are called from intercetplugin in customer's work threads. So, we need to consider this kind of scenario also, as it is common to customer to start their threads. was (Author: zouy): Attach the pull request for this problem. [TS-3235] fix crash problem caused by sync problem in PluginVC. commit: e1ee3f517a6a916056bd95a4a3c78f3d81685da3 This fix is for the multi-thread sync problem exists in PluginVC of TS-3235. Below is the scenario of this problem: 1. customer uses interceptplugin which calls TSVIOReenable and TSVConnClose and that will call PluginVC's APIs in their work threads 2. That customer creates their work threads by using TSThreadCreate which are not controlled by ATS. 3. Because the interceptplugin works in their work threads and the lock provided by interceptplugin can only sync their work threads and it cannot sync the threads between ATS and interceptplugin, the sync problem will occur when TSVIOReenable and TSVConnClose are called from intercetplugin in customer's work threads. So, we need to consider this kind of scenario also, as it is common to customer to start their threads. PluginVC crashed with unrecognized event Key: TS-3235 URL: https://issues.apache.org/jira/browse/TS-3235 Project: Traffic Server Issue Type: Bug Components: CPP API, HTTP, Plugins Reporter: kang li Assignee: Brian Geffon Fix For: 5.3.0 Attachments: pluginvc-crash.diff We are using atscppapi to create Intercept plugin. From the coredump , that seems Continuation of the InterceptPlugin was already been destroyed. {code} #0 0x00375ac32925 in raise () from /lib64/libc.so.6 #1 0x00375ac34105 in abort () from /lib64/libc.so.6 #2 0x2b21eeae3458 in ink_die_die_die (retval=1) at ink_error.cc:43 #3 0x2b21eeae3525 in ink_fatal_va(int, const char *, typedef __va_list_tag __va_list_tag *) (return_code=1, message_format=0x2b21eeaf08d8 %s:%d: failed assert `%s`, ap=0x2b21f4913ad0) at ink_error.cc:65 #4 0x2b21eeae35ee in ink_fatal (return_code=1, message_format=0x2b21eeaf08d8 %s:%d: failed assert `%s`) at ink_error.cc:73 #5 0x2b21eeae2160 in _ink_assert (expression=0x76ddb8 call_event == core_lock_retry_event, file=0x76dd04 PluginVC.cc, line=203) at ink_assert.cc:37 #6 0x00530217 in PluginVC::main_handler (this=0x2b24ef007cb8, event=1, data=0xe0f5b80) at PluginVC.cc:203 #7 0x004f5854 in Continuation::handleEvent (this=0x2b24ef007cb8, event=1, data=0xe0f5b80) at ../iocore/eventsystem/I_Continuation.h:146 #8 0x00755d26 in EThread::process_event (this=0x309b250, e=0xe0f5b80, calling_code=1) at UnixEThread.cc:145 #9 0x0075610a in EThread::execute (this=0x309b250) at UnixEThread.cc:239 #10 0x00755284 in spawn_thread_internal (a=0x2849330) at Thread.cc:88 #11 0x2b21ef05f9d1 in start_thread () from /lib64/libpthread.so.0 #12 0x00375ace8b7d in clone () from /lib64/libc.so.6 (gdb) p sm_lock_retry_event $13 = (Event *) 0x2b2496146e90 (gdb) p core_lock_retry_event $14 = (Event *) 0x0 (gdb) p active_event $15 = (Event *) 0x0 (gdb) p inactive_event $16 = (Event *) 0x0 (gdb) p *(INKContInternal*)this-core_obj-connect_to Cannot access memory at address 0x2b269cd46c10 {code} -- This message was sent by Atlassian JIRA (v6.3.4#6332)
[jira] [Commented] (TS-3235) PluginVC crashed with unrecognized event
[ https://issues.apache.org/jira/browse/TS-3235?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14285386#comment-14285386 ] zouyu commented on TS-3235: --- Attach the pull request for this problem. [TS-3235] fix crash problem caused by sync problem in PluginVC. commit: e1ee3f517a6a916056bd95a4a3c78f3d81685da3 This fix is for the multi-thread sync problem exists in PluginVC of TS-3235. Below is the scenario of this problem: 1. customer uses interceptplugin which calls TSVIOReenable and TSVConnClose and that will call PluginVC's APIs in their work threads 2. That customer creates their work threads by using TSThreadCreate which are not controlled by ATS. 3. Because the interceptplugin works in their work threads and the lock provided by interceptplugin can only sync their work threads and it cannot sync the threads between ATS and interceptplugin, the sync problem will occur when TSVIOReenable and TSVConnClose are called from intercetplugin in customer's work threads. So, we need to consider this kind of scenario also, as it is common to customer to start their threads. PluginVC crashed with unrecognized event Key: TS-3235 URL: https://issues.apache.org/jira/browse/TS-3235 Project: Traffic Server Issue Type: Bug Components: CPP API, HTTP, Plugins Reporter: kang li Assignee: Brian Geffon Fix For: 5.3.0 We are using atscppapi to create Intercept plugin. From the coredump , that seems Continuation of the InterceptPlugin was already been destroyed. {code} #0 0x00375ac32925 in raise () from /lib64/libc.so.6 #1 0x00375ac34105 in abort () from /lib64/libc.so.6 #2 0x2b21eeae3458 in ink_die_die_die (retval=1) at ink_error.cc:43 #3 0x2b21eeae3525 in ink_fatal_va(int, const char *, typedef __va_list_tag __va_list_tag *) (return_code=1, message_format=0x2b21eeaf08d8 %s:%d: failed assert `%s`, ap=0x2b21f4913ad0) at ink_error.cc:65 #4 0x2b21eeae35ee in ink_fatal (return_code=1, message_format=0x2b21eeaf08d8 %s:%d: failed assert `%s`) at ink_error.cc:73 #5 0x2b21eeae2160 in _ink_assert (expression=0x76ddb8 call_event == core_lock_retry_event, file=0x76dd04 PluginVC.cc, line=203) at ink_assert.cc:37 #6 0x00530217 in PluginVC::main_handler (this=0x2b24ef007cb8, event=1, data=0xe0f5b80) at PluginVC.cc:203 #7 0x004f5854 in Continuation::handleEvent (this=0x2b24ef007cb8, event=1, data=0xe0f5b80) at ../iocore/eventsystem/I_Continuation.h:146 #8 0x00755d26 in EThread::process_event (this=0x309b250, e=0xe0f5b80, calling_code=1) at UnixEThread.cc:145 #9 0x0075610a in EThread::execute (this=0x309b250) at UnixEThread.cc:239 #10 0x00755284 in spawn_thread_internal (a=0x2849330) at Thread.cc:88 #11 0x2b21ef05f9d1 in start_thread () from /lib64/libpthread.so.0 #12 0x00375ace8b7d in clone () from /lib64/libc.so.6 (gdb) p sm_lock_retry_event $13 = (Event *) 0x2b2496146e90 (gdb) p core_lock_retry_event $14 = (Event *) 0x0 (gdb) p active_event $15 = (Event *) 0x0 (gdb) p inactive_event $16 = (Event *) 0x0 (gdb) p *(INKContInternal*)this-core_obj-connect_to Cannot access memory at address 0x2b269cd46c10 {code} -- This message was sent by Atlassian JIRA (v6.3.4#6332)
Build failed in Jenkins: clang-analyzer #286
See https://ci.trafficserver.apache.org/job/clang-analyzer/286/changes Changes: [Leif Hedstrom] Fix indentation [Leif Hedstrom] TS-3308 Add an explicit -lpthread for gcc to build with ASAN options [Leif Hedstrom] Change the clean target for tsqa builds [amc] Doc: proxy.config.http.attach_server_session_to_client [Leif Hedstrom] [TS-2421] MultiCache could theoretically create world-writeable [shinrich] TS-3307: TSVConnFdCreate does not allow non-socket file descriptor -- [...truncated 1793 lines...] Making all in tcpinfo make[2]: Entering directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/tcpinfo' CXX tcpinfo.lo CXXLDtcpinfo.la make[2]: Leaving directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/tcpinfo' Making all in experimental make[2]: Entering directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental' Making all in authproxy make[3]: Entering directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/authproxy' CXX authproxy.lo CXX utils.lo CXXLDauthproxy.la make[3]: Leaving directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/authproxy' Making all in background_fetch make[3]: Entering directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/background_fetch' CXX background_fetch.lo CXXLDbackground_fetch.la make[3]: Leaving directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/background_fetch' Making all in balancer make[3]: Entering directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/balancer' CXX roundrobin.lo CXX balancer.lo CXX hash.lo CXXLDbalancer.la make[3]: Leaving directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/balancer' Making all in buffer_upload make[3]: Entering directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/buffer_upload' CXX buffer_upload.lo CXXLDbuffer_upload.la make[3]: Leaving directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/buffer_upload' Making all in channel_stats make[3]: Entering directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/channel_stats' CXX channel_stats.lo CXXLDchannel_stats.la make[3]: Leaving directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/channel_stats' Making all in collapsed_connection make[3]: Entering directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/collapsed_connection' CXX collapsed_connection.lo CXX MurmurHash3.lo CXXLDcollapsed_connection.la make[3]: Leaving directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/collapsed_connection' Making all in custom_redirect make[3]: Entering directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/custom_redirect' CXX custom_redirect.lo CXXLDcustom_redirect.la make[3]: Leaving directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/custom_redirect' Making all in epic make[3]: Entering directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/epic' CXX epic.lo CXXLDepic.la make[3]: Leaving directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/epic' Making all in escalate make[3]: Entering directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/escalate' CXX escalate.lo CXXLDescalate.la make[3]: Leaving directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/escalate' Making all in esi make[3]: Entering directory `https://ci.trafficserver.apache.org/job/clang-analyzer/ws/src/plugins/experimental/esi' CXX esi.lo CXX serverIntercept.lo CXX combo_handler.lo CXX lib/DocNode.lo CXX lib/EsiParser.lo In file included from combo_handler.cc:27: In file included from /usr/bin/../lib/gcc/x86_64-redhat-linux/4.8.3/../../../../include/c++/4.8.3/vector:64: /usr/bin/../lib/gcc/x86_64-redhat-linux/4.8.3/../../../../include/c++/4.8.3/bits/stl_vector.h:771:9: warning: Returning null reference { return *(this-_M_impl._M_start + __n); } ^~ 1 warning generated. CXX lib/EsiGzip.lo CXX lib/EsiGunzip.lo CXX lib/EsiProcessor.lo CXX lib/Expression.lo CXX lib/FailureInfo.lo CXX lib/HandlerManager.lo CXX lib/Stats.lo CXX lib/Utils.lo CXX lib/Variables.lo CXX
[jira] [Commented] (TS-3304) segfault in libtsutils
[ https://issues.apache.org/jira/browse/TS-3304?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14285620#comment-14285620 ] Steve Malenfant commented on TS-3304: - From the records.config, not sure if this has anything to do with it since that's the only place I could see a reference to localhost in the config. records.config:CONFIG proxy.config.log.hostname STRING localhost With hostdb and dns debug : [Jan 21 12:18:01.733] Server {0x2aaca5e1d700} DEBUG: (hostdb) hostname = localhost [Jan 21 12:18:11.733] Server {0x2aac9dc7c000} DEBUG: (hostdb) probe 127.0.0.1 c3aab60f33f8019c 1 [ignore_timeout = 0] [Jan 21 12:18:11.734] Server {0x2aac9dc7c000} DEBUG: (hostdb) immediate answer for 127.0.0.1 [Jan 21 12:18:11.734] Server {0x2aac9dc7c000} DEBUG: (hostdb) probe aa30de0f80a82135 1 [ignore_timeout = 0] [Jan 21 12:18:11.734] Server {0x2aac9dc7c000} DEBUG: (hostdb) immediate answer for 127.0.0.1 [Jan 21 12:18:11.734] Server {0x2aac9dc7c000} DEBUG: (hostdb) hostname = localhost [Jan 21 12:18:21.734] Server {0x2aaca4a09700} DEBUG: (hostdb) probe 127.0.0.1 c3aab60f33f8019c 1 [ignore_timeout = 0] [Jan 21 12:18:21.734] Server {0x2aaca4a09700} DEBUG: (hostdb) immediate answer for 127.0.0.1 [Jan 21 12:18:21.734] Server {0x2aaca4a09700} DEBUG: (hostdb) probe aa30de0f80a82135 1 [ignore_timeout = 0] [Jan 21 12:18:21.734] Server {0x2aaca4a09700} DEBUG: (hostdb) serving stale entry 86400 | 6 | 86400 as requested by config [Jan 21 12:18:21.734] Server {0x2aaca4a09700} DEBUG: (hostdb) serving stale entry 86400 | 6 | 86400 as requested by config [Jan 21 12:18:21.734] Server {0x2aaca4a09700} DEBUG: (hostdb) stale 86400 1421756537 86400, using it and refreshing it NOTE: Traffic Server received Sig 11: Segmentation fault /opt/trafficserver/bin/traffic_server - STACK TRACE: /lib64/libpthread.so.0(+0x381b60f710)[0x2aac9d2e5710] /opt/trafficserver/lib/libtsutil.so.4(_Z13ink_inet_addrPKc+0x8)[0x2aac9d0ba1d8] /opt/trafficserver/bin/traffic_server(_Z5probeP10ProxyMutexRK9HostDBMD5b+0x315)[0x5e0df5] /opt/trafficserver/bin/traffic_server(_ZN15HostDBProcessor5getbyEP12ContinuationPKciPK8sockaddrb12HostResStylei+0x4e4)[0x5e2b34] /opt/trafficserver/bin/traffic_server(_ZN6HttpSM24do_hostdb_reverse_lookupEv+0x4c)[0x517f2c] /opt/trafficserver/bin/traffic_server(_ZN6HttpSM14set_next_stateEv+0x778)[0x52f028] /opt/trafficserver/bin/traffic_server(_ZN6HttpSM16do_hostdb_lookupEv+0x282)[0x518242] /opt/trafficserver/bin/traffic_server(_ZN6HttpSM14set_next_stateEv+0xb9a)[0x52f44a] /opt/trafficserver/bin/traffic_server(_ZN6HttpSM17handle_api_returnEv+0x32a)[0x5284fa] /opt/trafficserver/bin/traffic_server(_ZN6HttpSM14set_next_stateEv+0x1ea)[0x52ea9a] /opt/trafficserver/bin/traffic_server(_ZN6HttpSM14set_next_stateEv+0x1da)[0x52ea8a] /opt/trafficserver/bin/traffic_server(_ZN6HttpSM17handle_api_returnEv+0x32a)[0x5284fa] /opt/trafficserver/bin/traffic_server(_ZN6HttpSM14set_next_stateEv+0x1ea)[0x52ea9a] /opt/trafficserver/bin/traffic_server(_ZN6HttpSM17handle_api_returnEv+0x32a)[0x5284fa] /opt/trafficserver/bin/traffic_server(_ZN6HttpSM14set_next_stateEv+0x1ea)[0x52ea9a] /opt/trafficserver/bin/traffic_server(_ZN6HttpSM32state_read_client_request_headerEiPv+0x226)[0x52fef6] /opt/trafficserver/bin/traffic_server(_ZN6HttpSM12main_handlerEiPv+0xd8)[0x52a5b8] /opt/trafficserver/bin/traffic_server[0x68793b] /opt/trafficserver/bin/traffic_server[0x689ec4] /opt/trafficserver/bin/traffic_server(_ZN10NetHandler12mainNetEventEiP5Event+0x1f2)[0x67fb12] /opt/trafficserver/bin/traffic_server(_ZN7EThread13process_eventEP5Eventi+0x8f)[0x6ac8cf] /opt/trafficserver/bin/traffic_server(_ZN7EThread7executeEv+0x493)[0x6ad273] /opt/trafficserver/bin/traffic_server[0x6abc2a] /lib64/libpthread.so.0(+0x381b6079d1)[0x2aac9d2dd9d1] segfault in libtsutils -- Key: TS-3304 URL: https://issues.apache.org/jira/browse/TS-3304 Project: Traffic Server Issue Type: Bug Components: HostDB Reporter: Steve Malenfant Assignee: Leif Hedstrom Fix For: 5.3.0 Getting multiple segfaults per day on 4.2.1. [4324544.324222] [ET_NET 23][10504]: segfault at 0 ip 2acd66546168 sp 2acd71f190b8 error 4 in libtsutil.so.4.2.1[2acd66521000+34000] [4410696.820857] [ET_NET 19][22738]: segfault at 0 ip 2af09f339168 sp 2af0aa9230b8 error 4 in libtsutil.so.4.2.1[2af09f314000+34000] [4497039.474253] [ET_NET 12][34872]: segfault at 0 ip 2ad17e6a1168 sp 2ad1896100b8 error 4 in libtsutil.so.4.2.1[2ad17e67c000+34000] [4583372.073916] [ET_NET 3][46994]: segfault at 0 ip 2aced4227168 sp 2aceda7d80b8 error 4 in libtsutil.so.4.2.1[2aced4202000+34000] [4756046.944373] [ET_NET 22][10799]: segfault at 0 ip 2b1771f76168 sp 2b177d9130b8 error 4 in libtsutil.so.4.2.1[2b1771f51000+34000] Stack Trace : (gdb) bt #0 ink_inet_addr (s=value optimized
[jira] [Commented] (TS-3235) PluginVC crashed with unrecognized event
[ https://issues.apache.org/jira/browse/TS-3235?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14285654#comment-14285654 ] portl4t commented on TS-3235: - Well, I think there is no doubt that the continuation can not be shared by serveral threads concurrently, some continuations are operating in the plugin on the condition that their locks had been keeped by the ats working threads. PluginVC crashed with unrecognized event Key: TS-3235 URL: https://issues.apache.org/jira/browse/TS-3235 Project: Traffic Server Issue Type: Bug Components: CPP API, HTTP, Plugins Reporter: kang li Assignee: Brian Geffon Fix For: 5.3.0 Attachments: pluginvc-crash.diff We are using atscppapi to create Intercept plugin. From the coredump , that seems Continuation of the InterceptPlugin was already been destroyed. {code} #0 0x00375ac32925 in raise () from /lib64/libc.so.6 #1 0x00375ac34105 in abort () from /lib64/libc.so.6 #2 0x2b21eeae3458 in ink_die_die_die (retval=1) at ink_error.cc:43 #3 0x2b21eeae3525 in ink_fatal_va(int, const char *, typedef __va_list_tag __va_list_tag *) (return_code=1, message_format=0x2b21eeaf08d8 %s:%d: failed assert `%s`, ap=0x2b21f4913ad0) at ink_error.cc:65 #4 0x2b21eeae35ee in ink_fatal (return_code=1, message_format=0x2b21eeaf08d8 %s:%d: failed assert `%s`) at ink_error.cc:73 #5 0x2b21eeae2160 in _ink_assert (expression=0x76ddb8 call_event == core_lock_retry_event, file=0x76dd04 PluginVC.cc, line=203) at ink_assert.cc:37 #6 0x00530217 in PluginVC::main_handler (this=0x2b24ef007cb8, event=1, data=0xe0f5b80) at PluginVC.cc:203 #7 0x004f5854 in Continuation::handleEvent (this=0x2b24ef007cb8, event=1, data=0xe0f5b80) at ../iocore/eventsystem/I_Continuation.h:146 #8 0x00755d26 in EThread::process_event (this=0x309b250, e=0xe0f5b80, calling_code=1) at UnixEThread.cc:145 #9 0x0075610a in EThread::execute (this=0x309b250) at UnixEThread.cc:239 #10 0x00755284 in spawn_thread_internal (a=0x2849330) at Thread.cc:88 #11 0x2b21ef05f9d1 in start_thread () from /lib64/libpthread.so.0 #12 0x00375ace8b7d in clone () from /lib64/libc.so.6 (gdb) p sm_lock_retry_event $13 = (Event *) 0x2b2496146e90 (gdb) p core_lock_retry_event $14 = (Event *) 0x0 (gdb) p active_event $15 = (Event *) 0x0 (gdb) p inactive_event $16 = (Event *) 0x0 (gdb) p *(INKContInternal*)this-core_obj-connect_to Cannot access memory at address 0x2b269cd46c10 {code} -- This message was sent by Atlassian JIRA (v6.3.4#6332)