Child panics on OpenSolaris
Paul Wright
wrighty+varnishmisc at gmail.com
Fri Feb 12 13:17:59 CET 2010
Apologies if this is a duplicate.
On 11 February 2010 21:54, Poul-Henning Kamp <phk at phk.freebsd.dk> wrote:
> In message <282e72051002110739y50bc0b16j687bf75692f42ec8 at mail.gmail.com>, Paul
> Wright writes:
>
>>I've had a go at 1.) and have two verbose `snoop` traces during child
>>panics. I used sp.client from the backtrace to find out the port
>>number and then looked at just matching packets. From my (limited)
>>Wireshark comprehension they show the client establishing a connection
>>to Varnish, issue a GET, receive the response (200 OK). Then the
>>client sends a RST packet, from there the connection disappears.
>>Would this cause the child to panic?
>
> Questions:
I've included the summary traces below in case my reading of them is
incorrect (times are relative to the start of snooping). The first is
a single GET request, the second contains a number of KeepAlive GETs.
Both end in a RST, ACK packet.
> Does the RST arrive after the entire response is sent ?
Yes.
> If so: does the client ACK the response, before the RST ?
In Stream 1 the client ACK the response in the same packet as the RST.
In Stream 2 there's an ACK and then an ACK, RST.
> If so: how long time elapses between the ACK and the RST ?
0.031s
Paul.
===Stream 1===
No. Time Source Destination Protocol Info
30700 10.878818 81.144.251.100 192.168.0.35 TCP
18763 > http [SYN] Seq=0 Win=65535 Len=0 MSS=1380
30701 10.878838 192.168.0.35 81.144.251.100 TCP
http > 18763 [SYN, ACK] Seq=0 Ack=1 Win=64860 Len=0 MSS=1460
30703 10.885352 81.144.251.100 192.168.0.35 TCP
18763 > http [ACK] Seq=1 Ack=1 Win=65535 Len=0
30704 10.885758 81.144.251.100 192.168.0.35 HTTP
GET /flash/hpf.swf HTTP/1.0
30705 10.885778 192.168.0.35 81.144.251.100 TCP
http > 18763 [ACK] Seq=1 Ack=818 Win=64860 Len=0
30711 10.887222 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
30712 10.887231 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
30730 10.896227 81.144.251.100 192.168.0.35 TCP
18763 > http [ACK] Seq=818 Ack=1562 Win=65535 Len=0
30731 10.896242 192.168.0.35 81.144.251.100 HTTP
HTTP/1.1 200 OK (application/x-shockwave-flash)
30798 10.938749 81.144.251.100 192.168.0.35 TCP
18763 > http [RST, ACK] Seq=818 Ack=2802 Win=0 Len=0
===Stream 2===
No. Time Source Destination Protocol Info
29059 10.157730 81.144.251.100 192.168.0.35 TCP
46174 > http [SYN] Seq=0 Win=65535 Len=0 MSS=1380
29060 10.157765 192.168.0.35 81.144.251.100 TCP
http > 46174 [SYN, ACK] Seq=0 Ack=1 Win=64860 Len=0 MSS=1460
29115 10.174576 81.144.251.100 192.168.0.35 TCP
46174 > http [ACK] Seq=1 Ack=1 Win=65535 Len=0
29116 10.174716 81.144.251.100 192.168.0.35 HTTP
GET /i/home/inthepress/inthepress_22ctvodka.jpg HTTP/1.0
29118 10.174750 192.168.0.35 81.144.251.100 TCP
http > 46174 [ACK] Seq=1 Ack=598 Win=64860 Len=0
29120 10.174847 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29121 10.174888 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29156 10.183128 81.144.251.100 192.168.0.35 TCP
46174 > http [ACK] Seq=598 Ack=1567 Win=65535 Len=0
29157 10.183144 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29158 10.183156 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29159 10.183166 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29177 10.190576 81.144.251.100 192.168.0.35 TCP
46174 > http [ACK] Seq=598 Ack=5707 Win=65535 Len=0
29178 10.190593 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29179 10.190604 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29180 10.190615 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29181 10.190624 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29200 10.197563 81.144.251.100 192.168.0.35 TCP
46174 > http [ACK] Seq=598 Ack=9847 Win=65535 Len=0
29201 10.197580 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29202 10.197592 192.168.0.35 81.144.251.100 HTTP
HTTP/1.1 200 OK (JPEG JFIF image)
29225 10.205114 81.144.251.100 192.168.0.35 TCP
46174 > http [ACK] Seq=598 Ack=12766 Win=65535 Len=0
29305 10.232454 81.144.251.100 192.168.0.35 HTTP
GET /i/home/inthepress/inthepress_cuvee.jpg HTTP/1.0
29306 10.232469 192.168.0.35 81.144.251.100 TCP
http > 46174 [ACK] Seq=12766 Ack=1414 Win=64860 Len=0
29307 10.232648 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29309 10.232682 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29310 10.232695 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29311 10.232705 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29312 10.232716 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29313 10.232726 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29367 10.251798 81.144.251.100 192.168.0.35 TCP
46174 > http [ACK] Seq=1414 Ack=15712 Win=65535 Len=0
29368 10.251906 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29369 10.251925 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29370 10.251937 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29371 10.251949 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29378 10.252476 81.144.251.100 192.168.0.35 TCP
46174 > http [ACK] Seq=1414 Ack=18472 Win=65535 Len=0
29379 10.252496 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29380 10.252508 192.168.0.35 81.144.251.100 TCP
[TCP segment of a reassembled PDU]
29381 10.252517 192.168.0.35 81.144.251.100 HTTP
HTTP/1.1 200 OK (JPEG JFIF image)
29382 10.253163 81.144.251.100 192.168.0.35 TCP
46174 > http [ACK] Seq=1414 Ack=19852 Win=65535 Len=0
29410 10.261167 81.144.251.100 192.168.0.35 TCP
46174 > http [ACK] Seq=1414 Ack=22612 Win=65535 Len=0
29411 10.261172 81.144.251.100 192.168.0.35 TCP
46174 > http [ACK] Seq=1414 Ack=26752 Win=65535 Len=0
29412 10.261176 81.144.251.100 192.168.0.35 TCP
46174 > http [ACK] Seq=1414 Ack=28490 Win=65535 Len=0
29555 10.292370 81.144.251.100 192.168.0.35 TCP
46174 > http [RST, ACK] Seq=1414 Ack=28490 Win=0 Len=0
More information about the varnish-misc
mailing list