Child panics on OpenSolaris

Paul Wright wrighty+varnishmisc at gmail.com
Fri Feb 12 13:17:59 CET 2010


Apologies if this is a duplicate.

On 11 February 2010 21:54, Poul-Henning Kamp <phk at phk.freebsd.dk> wrote:
> In message <282e72051002110739y50bc0b16j687bf75692f42ec8 at mail.gmail.com>, Paul
> Wright writes:
>
>>I've had a go at 1.) and have two verbose `snoop` traces during child
>>panics.  I used sp.client from the backtrace to find out the port
>>number and then looked at just matching packets. From my (limited)
>>Wireshark comprehension they show the client establishing a connection
>>to Varnish, issue a GET, receive the response (200 OK).  Then the
>>client sends a RST packet, from there the connection disappears.
>>Would this cause the child to panic?
>
> Questions:

I've included the summary traces below in case my reading of them is
incorrect (times are relative to the start of snooping).  The first is
a single GET request, the second contains a number of KeepAlive GETs.
Both end in a RST, ACK packet.

> Does the RST arrive after the entire response is sent ?

Yes.

> If so: does the client ACK the response, before the RST ?

In Stream 1 the client ACK the response in the same packet as the RST.
 In Stream 2 there's an ACK and then an ACK, RST.

> If so: how long time elapses between the ACK and the RST ?

0.031s

Paul.

===Stream 1===
No.     Time        Source                Destination           Protocol Info
  30700 10.878818   81.144.251.100        192.168.0.35          TCP
  18763 > http [SYN] Seq=0 Win=65535 Len=0 MSS=1380
  30701 10.878838   192.168.0.35          81.144.251.100        TCP
  http > 18763 [SYN, ACK] Seq=0 Ack=1 Win=64860 Len=0 MSS=1460
  30703 10.885352   81.144.251.100        192.168.0.35          TCP
  18763 > http [ACK] Seq=1 Ack=1 Win=65535 Len=0
  30704 10.885758   81.144.251.100        192.168.0.35          HTTP
  GET /flash/hpf.swf HTTP/1.0
  30705 10.885778   192.168.0.35          81.144.251.100        TCP
  http > 18763 [ACK] Seq=1 Ack=818 Win=64860 Len=0
  30711 10.887222   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  30712 10.887231   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  30730 10.896227   81.144.251.100        192.168.0.35          TCP
  18763 > http [ACK] Seq=818 Ack=1562 Win=65535 Len=0
  30731 10.896242   192.168.0.35          81.144.251.100        HTTP
  HTTP/1.1 200 OK  (application/x-shockwave-flash)
  30798 10.938749   81.144.251.100        192.168.0.35          TCP
  18763 > http [RST, ACK] Seq=818 Ack=2802 Win=0 Len=0


===Stream 2===
No.     Time        Source                Destination           Protocol Info
  29059 10.157730   81.144.251.100        192.168.0.35          TCP
  46174 > http [SYN] Seq=0 Win=65535 Len=0 MSS=1380
  29060 10.157765   192.168.0.35          81.144.251.100        TCP
  http > 46174 [SYN, ACK] Seq=0 Ack=1 Win=64860 Len=0 MSS=1460
  29115 10.174576   81.144.251.100        192.168.0.35          TCP
  46174 > http [ACK] Seq=1 Ack=1 Win=65535 Len=0
  29116 10.174716   81.144.251.100        192.168.0.35          HTTP
  GET /i/home/inthepress/inthepress_22ctvodka.jpg HTTP/1.0
  29118 10.174750   192.168.0.35          81.144.251.100        TCP
  http > 46174 [ACK] Seq=1 Ack=598 Win=64860 Len=0
  29120 10.174847   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29121 10.174888   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29156 10.183128   81.144.251.100        192.168.0.35          TCP
  46174 > http [ACK] Seq=598 Ack=1567 Win=65535 Len=0
  29157 10.183144   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29158 10.183156   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29159 10.183166   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29177 10.190576   81.144.251.100        192.168.0.35          TCP
  46174 > http [ACK] Seq=598 Ack=5707 Win=65535 Len=0
  29178 10.190593   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29179 10.190604   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29180 10.190615   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29181 10.190624   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29200 10.197563   81.144.251.100        192.168.0.35          TCP
  46174 > http [ACK] Seq=598 Ack=9847 Win=65535 Len=0
  29201 10.197580   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29202 10.197592   192.168.0.35          81.144.251.100        HTTP
  HTTP/1.1 200 OK  (JPEG JFIF image)
  29225 10.205114   81.144.251.100        192.168.0.35          TCP
  46174 > http [ACK] Seq=598 Ack=12766 Win=65535 Len=0
  29305 10.232454   81.144.251.100        192.168.0.35          HTTP
  GET /i/home/inthepress/inthepress_cuvee.jpg HTTP/1.0
  29306 10.232469   192.168.0.35          81.144.251.100        TCP
  http > 46174 [ACK] Seq=12766 Ack=1414 Win=64860 Len=0
  29307 10.232648   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29309 10.232682   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29310 10.232695   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29311 10.232705   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29312 10.232716   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29313 10.232726   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29367 10.251798   81.144.251.100        192.168.0.35          TCP
  46174 > http [ACK] Seq=1414 Ack=15712 Win=65535 Len=0
  29368 10.251906   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29369 10.251925   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29370 10.251937   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29371 10.251949   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29378 10.252476   81.144.251.100        192.168.0.35          TCP
  46174 > http [ACK] Seq=1414 Ack=18472 Win=65535 Len=0
  29379 10.252496   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29380 10.252508   192.168.0.35          81.144.251.100        TCP
  [TCP segment of a reassembled PDU]
  29381 10.252517   192.168.0.35          81.144.251.100        HTTP
  HTTP/1.1 200 OK  (JPEG JFIF image)
  29382 10.253163   81.144.251.100        192.168.0.35          TCP
  46174 > http [ACK] Seq=1414 Ack=19852 Win=65535 Len=0
  29410 10.261167   81.144.251.100        192.168.0.35          TCP
  46174 > http [ACK] Seq=1414 Ack=22612 Win=65535 Len=0
  29411 10.261172   81.144.251.100        192.168.0.35          TCP
  46174 > http [ACK] Seq=1414 Ack=26752 Win=65535 Len=0
  29412 10.261176   81.144.251.100        192.168.0.35          TCP
  46174 > http [ACK] Seq=1414 Ack=28490 Win=65535 Len=0
  29555 10.292370   81.144.251.100        192.168.0.35          TCP
  46174 > http [RST, ACK] Seq=1414 Ack=28490 Win=0 Len=0


More information about the varnish-misc mailing list