From owner-freebsd-hackers@freebsd.org Fri Dec 11 19:30:36 2015 Return-Path: Delivered-To: freebsd-hackers@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 5EDF0A041C3 for ; Fri, 11 Dec 2015 19:30:36 +0000 (UTC) (envelope-from sgk@troutmask.apl.washington.edu) Received: from troutmask.apl.washington.edu (troutmask.apl.washington.edu [128.95.76.21]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "troutmask", Issuer "troutmask" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 43CFD13C2; Fri, 11 Dec 2015 19:30:36 +0000 (UTC) (envelope-from sgk@troutmask.apl.washington.edu) Received: from troutmask.apl.washington.edu (localhost [127.0.0.1]) by troutmask.apl.washington.edu (8.15.2/8.15.2) with ESMTPS id tBBJUZPg003156 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Fri, 11 Dec 2015 11:30:35 -0800 (PST) (envelope-from sgk@troutmask.apl.washington.edu) Received: (from sgk@localhost) by troutmask.apl.washington.edu (8.15.2/8.15.2/Submit) id tBBJUYBu003155; Fri, 11 Dec 2015 11:30:34 -0800 (PST) (envelope-from sgk) Date: Fri, 11 Dec 2015 11:30:34 -0800 From: Steve Kargl To: Navdeep Parhar Cc: freebsd-hackers@freebsd.org Subject: Re: sonewconn issue? Message-ID: <20151211193034.GA3100@troutmask.apl.washington.edu> References: <20151211160354.GA1005@troutmask.apl.washington.edu> <566B06B0.5060809@FreeBSD.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <566B06B0.5060809@FreeBSD.org> User-Agent: Mutt/1.5.24 (2015-08-30) X-Mailman-Approved-At: Fri, 11 Dec 2015 19:58:59 +0000 X-BeenThere: freebsd-hackers@freebsd.org X-Mailman-Version: 2.1.20 Precedence: list List-Id: Technical Discussions relating to FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 11 Dec 2015 19:30:36 -0000 On Fri, Dec 11, 2015 at 09:24:00AM -0800, Navdeep Parhar wrote: > On 12/11/2015 08:03, Steve Kargl wrote: > > Last night my system became wedged. Inspection of/var/log/messages > > revealed 290 messages of the form > > > > Dec 10 19:27:49 troutmask kernel: sonewconn: pcb 0xfffff8000a76c4b0: > > Listen queue overflow: 16 already in queue awaiting > > acceptance (1 occurrences) > > > > During this time, I could connect to the webserver on the system. > > ssh into the box would connect, but I never got an actaul session. > > This morning I found the console unresponse. > > > > Any suggestions for identifying the rogue process? > > > > Try "netstat -aLnp tcp" and look at the "Listen" column to see which > sockets are backlogged. Then "sockstat -4l" to identify the process > that owns the socket. > Thanks for the suggestions. I'll keep this in mind if the problem re-appears. Unfortunately, I had no access to the box. ssh didn't work. console was unresponse. No serial console. I forgot to mention that this is FreeBSD-current circa Nov 9th, 2015. The box gets updated about once a month or so. -- Steve