Just doing a quick check with valgrind I'm seeing a lot of errors in the
event system.
"Syscall param epoll_ctl(event) points to uninitialised byte(s)"
with a wide range of events like:
==25761== at 0x4559A59: epoll_ctl (in /lib/libc-2.7.so)
==25761== by 0x8171C2F: comm_read(int, char*, int,
RefCount<AsyncCall>&) (comm.cc:346)
==25761== by 0x814B50C: StoreEntry::delayAwareRead(int, char*, int,
RefCount<AsyncCall>) (store.cc:261)
==25761== by 0x80FB573: HttpStateData::maybeReadVirginBody()
(http.cc:1290)
==25761== by 0x80F9C36: HttpStateData::sendRequest() (http.cc:1782)
==25761== by 0x80FA594: httpStart (http.cc:1845)
==25761== by 0x817AF86: CommConnectCbPtrFun::dial() (CommCalls.cc:127)
==25761== by 0x8069A27: AsyncCall::make() (AsyncCall.cc:34)
==25761== by 0x8068EAC: AsyncCallQueue::fireNext() (AsyncCallQueue.cc:53)
==25761== by 0x8068FAD: AsyncCallQueue::fire() (AsyncCallQueue.cc:39)
==25761== by 0x80CF392: EventLoop::dispatchCalls() (EventLoop.cc:156)
==25761== by 0x80CF58C: EventLoop::runOnce() (EventLoop.cc:133)
==25761== Address 0xbef187d8 is on thread 1's stack
All sharing the root:
comm_read(int, char*, int, RefCount<AsyncCall>&) (comm.cc:346)
Anyone want to attack this one?
Amos
--
Please use Squid 2.6STABLE17+ or 3.0STABLE1+
There are serious security advisories out on all earlier releases.