Re: Squid 3.1 TPROXY bugs

From: Anton <anton.vazir_at_gmail.com>
Date: Wed, 21 May 2008 19:50:03 +0500

Any thoughts?

On Wednesday 21 May 2008 01:04, Anton VG wrote:
> Here is the backtrace, and below it the cache.log part
>
> New Thread -1246504016 (LWP 32075)]
> [New Thread -1246770256 (LWP 32076)]
> [New Thread -1247036496 (LWP 32077)]
>
> Program received signal SIGABRT, Aborted.
> [Switching to Thread -1211254112 (LWP 32004)]
> 0xffffe410 in __kernel_vsyscall ()
> #0 0xffffe410 in __kernel_vsyscall ()
> #1 0xb7d04811 in raise () from
> /lib/tls/i686/cmov/libc.so.6 #2 0xb7d05fb9 in abort ()
> from /lib/tls/i686/cmov/libc.so.6 #3 0x080f3149 in
> xassert (msg=0x820ce63
> "!fd_table[fd].flags.closing", file=0x820ccd7 "comm.cc",
> line=339) at debug.cc:577
> #4 0x0819644e in comm_read (fd=411,
> buf=0xb58bc008
> "\n\n__url=http%3A%2F%2Fletitbit.net%2Fdownload%2F71e5465
>81713%2FMiniPE.part3.rar.html&fu__submit=%CF%EE%EB%F3%F7%E
>8%F2%FC+%EF%F0%FF%EC%F3%FE\r\n", size=4095,
> callback=@0xbfe6784c) at comm.cc:339
> #5 0x080dd4d8 in ConnStateData::readSomeData
> (this=0x88780d8) at client_side.cc:214
> #6 0x080debbb in ConnStateData::clientMaybeReadData
> (this=0x88780d8, do_next_read=1) at client_side.cc:2145
> #7 0x080decc6 in
> ConnStateData::clientAfterReadingRequests
> (this=0x88780d8, do_next_read=1) at client_side.cc:2167
> #8 0x080df19b in ConnStateData::clientReadRequest
> (this=0x88780d8, io=@0x8c89c40) at client_side.cc:2557
> #9 0x080e0a05 in CommCbMemFunT<ConnStateData,
> CommIoCbParams>::doDial (this=0x8c89c34) at
> CommCalls.h:140
> #10 0x081a3320 in JobDialer::dial (this=0x8c89c34,
> call=@0x8c89c18) at ICAP/AsyncJob.cc:213
> #11 0x080e1f47 in AsyncCallT<CommCbMemFunT<ConnStateData,
> CommIoCbParams> >::fire (this=0x8c89c18) at
> AsyncCall.h:127 #12 0x080c1c62 in AsyncCall::make
> (this=0x8c89c18) at AsyncCall.cc:34 #13 0x080c1510 in
> AsyncCallQueue::fireNext (this=0x8426ba8) at
> AsyncCallQueue.cc:53
> #14 0x080c15f7 in AsyncCallQueue::fire (this=0x8426ba8)
> at AsyncCallQueue.cc:39 #15 0x080fd5fb in
> EventLoop::dispatchCalls (this=0xbfe67ae4) at
> EventLoop.cc:154 #16 0x080fd8af in EventLoop::runOnce
> (this=0xbfe67ae4) at EventLoop.cc:131 #17 0x080fd984 in
> EventLoop::run (this=0xbfe67ae4) at EventLoop.cc:95 #18
> 0x08149c4f in main (argc=4, argv=0xbfe67bb4) at
> main.cc:1382 (gdb)
> (gdb)
> (gdb)
>
>
> ---- cache log
>
> 2008/05/21 01:01:49.753| client_side_request.cc(123)
> ClientRequestContext: 0x8641e68 ClientRequestContext
> constructed 2008/05/21 01:01:49.753| The request POST
> http://exnews.org/direct/getlink.php is ALLOWED, because
> it matched 'our_networks'
> 2008/05/21 01:01:49.753| clientInterpretRequestHeaders:
> REQ_NOCACHE = NOT SET 2008/05/21 01:01:49.753|
> clientInterpretRequestHeaders: REQ_CACHABLE = NOT SET
> 2008/05/21 01:01:49.753| clientInterpretRequestHeaders:
> REQ_HIERARCHICAL = NOT SET
> 2008/05/21 01:01:49.753| client_side_request.cc(114)
> ~ClientRequestContext: 0x8641e68 ClientRequestContext
> destructed 2008/05/21 01:01:49.753| clientProcessRequest:
> POST 'http://exnews.org/direct/getlink.php'
> 2008/05/21 01:01:49.753| ClientHttpRequest::httpStart:
> NONE for 'http://exnews.org/direct/getlink.php'
> 2008/05/21 01:01:49.753| clientProcessRequest2:
> storeGet() MISS 2008/05/21 01:01:49.753| assertion
> failed: comm.cc:339: "!fd_table[fd].flags.closing"
>
> !DSPAM:48332ecc7303941283316!
Received on Wed May 21 2008 - 14:50:11 MDT

This archive was generated by hypermail 2.2.0 : Tue Aug 05 2008 - 01:06:35 MDT