On 8/1/19 10:35 AM, joseph wrote: > on solaris crash is it bug to report or ? A Segment Violation crash is virtually always a Squid bug. If you are not using some dangerous unsupported configuration and/or an unsupported Squid version, then it is OK to report it. If you decide to report this problem to Bugzilla, then please post "*this" values from frames 24, 25, and 27 (if you have that information available). Alex. > cache.log............ > 2019/07/30 10:10:23 kid1| Error negotiating SSL connection on FD 22: > error:00000001:lib(0):func(0):reason(1) (1/0) > 2019/07/30 10:10:37 kid1| Error negotiating SSL connection on FD 54: > error:00000001:lib(0):func(0):reason(1) (1/0) > 2019/07/30 10:11:14 kid1| FATAL: Received Segment Violation...dying. > 2019/07/30 10:11:14 kid1| Closing HTTP(S) port 0.0.0.0:3126 > 2019/07/30 10:11:14 kid1| Closing HTTP(S) port 0.0.0.0:3127 > > > t@1 (l@1) terminated by signal ABRT (Abort) > 0xfffffd7ffe9536ea: __lwp_kill+0x000a: jae __lwp_kill+0x18 [ > 0xfffffd7ffe9536f8, .+0xe ] > (dbx) where > current thread: t@1 > =>[1] __lwp_kill(0x1, 0x6, 0xffffffff86785800, 0xfffffd7ffe953fde, 0x0, > 0xfffffd7ffe9b3c80), at 0xfffffd7ffe9536ea > [2] _thr_kill(), at 0xfffffd7ffe94bfe3 > [3] raise(), at 0xfffffd7ffe8f8229 > [4] abort(), at 0xfffffd7ffe8d6bc0 > [5] death(), at 0x700068 > [6] __sighndlr(), at 0xfffffd7ffe94dee6 > [7] call_user_handler(), at 0xfffffd7ffe9427a2 > [8] sigacthandler(), at 0xfffffd7ffe9429ce > ---- called from signal handler with signal 11 (SIGSEGV) ------ > [9] 0x9514b6(0x2b6, 0xfffffd7fff037c30, 0xfffffd7ffe805ea8, 0x7, 0xa, > 0xfffffd7fffdfe8d8), at 0x9514b6 > [10] asn1_enc_save(), at 0xfffffd7ffeee949a > [11] 0xfffffd7ffeee42ea(), at 0xfffffd7ffeee42ea > [12] 0xfffffd7ffeee4e7d(), at 0xfffffd7ffeee4e7d > [13] 0xfffffd7ffeee4b01(), at 0xfffffd7ffeee4b01 > [14] 0xfffffd7ffeee41ac(), at 0xfffffd7ffeee41ac > [15] ASN1_item_ex_d2i(), at 0xfffffd7ffeee49b8 > [16] ASN1_item_d2i(), at 0xfffffd7ffeee3e73 > [17] d2i_X509(), at 0xfffffd7ffeeecd90 > [18] PEM_X509_INFO_read_bio(), at 0xfffffd7ffef870df > [19] X509_load_cert_crl_file(), at 0xfffffd7ffefc206f > [20] 0xfffffd7ffefc1bdc(), at 0xfffffd7ffefc1bdc > [21] X509_LOOKUP_ctrl(), at 0xfffffd7ffefc3a9c > [22] X509_STORE_load_locations(), at 0xfffffd7ffefc34fb > [23] SSL_CTX_load_verify_locations(), at 0xfffffd7fff12294d > [24] Security::PeerOptions::updateContextCa(), at 0x83f18c > [25] Security::ServerOptions::updateContextConfig(), at 0x844851 > [26] Ssl::createSSLContext(), at 0x85d1eb > [27] ConnStateData::startPeekAndSplice(), at 0x5ef872 > [28] httpsSslBumpStep2AccessCheckDone(), at 0x5efe1d > [29] ACLChecklist::checkCallback(), at 0x75deba > [30] ConnStateData::startPeekAndSplice(), at 0x5ef832 > [31] ConnStateData::parseTlsHandshake(), at 0x5f08f8 > [32] ConnStateData::afterClientRead(), at 0x5f0a9d > [33] Server::doClientRead(), at 0x7a85dc > [34] JobDialer<Server>::dial(), at 0x7a8e5a > [35] AsyncCall::make(), at 0x7bea19 > [36] AsyncCallQueue::fireNext(), at 0x7bfdd3 > [37] AsyncCallQueue::fire(), at 0x7c0158 > [38] EventLoop::runOnce(), at 0x632272 > [39] EventLoop::run(), at 0x632378 > [40] SquidMain(), at 0x6992b3 > [41] main(), at 0x959260 > (dbx) > _______________________________________________ squid-users mailing list squid-users@xxxxxxxxxxxxxxxxxxxxx http://lists.squid-cache.org/listinfo/squid-users