BAD Gateway Squid 3.5

1. BAD Gateway Squid 3.5

Anderson Mekelburg
mekelburg

(usa RedHat)

Enviado em 21/06/2016 - 14:03h

Olá Pessoal,

Tenho na minha infraestrutura um servidor proxy squid (3.5.19) que ao acessar a página do sefaz www.sefaz.am.gov.br está recebendo um reset de conexão (Connection reset by peer). No access.log tenho a seguinte saída:

1466512240.028 367 10.0.15.7 TCP_MISS/502 4274 GET http://www.sefaz.am.gov.br/ - HIER_DIRECT/200.242.61.12 text/html

Habilitando debug no squid, tenho as seguintes mensagens:

2016/06/21 09:31:39.479 kid1| 5,3| IoCallback.cc(116) finish: called for local=10.1.239.5:3128 remote=10.0.15.7:55261 FD 15 flags=1 (0, 0)
2016/06/21 09:31:39.479 kid1| 5,3| Read.cc(91) ReadNow: local=10.1.239.5:3128 remote=10.0.15.7:55261 FD 15 flags=1, size 15935, retval 406, errno 0
2016/06/21 09:31:39.479 kid1| 33,3| client_side.cc(2259) parseHttpRequest: parseHttpRequest: req_hdr = {Host: www.sefaz.am.gov.br
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: pt-BR,pt;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Cookie: _ga=GA1.3.81554590.1466157108
Connection: keep-alive
Cache-Control: max-age=0

}
2016/06/21 09:31:39.479 kid1| 33,3| client_side.cc(2263) parseHttpRequest: parseHttpRequest: end = {
}
2016/06/21 09:31:39.479 kid1| 33,3| client_side.cc(2267) parseHttpRequest: parseHttpRequest: prefix_sz = 406, req_line_sz = 42
2016/06/21 09:31:39.481 kid1| 87,3| clientStream.cc(144) clientStreamInsertHead: clientStreamInsertHead: Inserted node 0x3fa6118 with data 0x3fc98a0 after head
2016/06/21 09:31:39.481 kid1| 11,2| client_side.cc(2346) parseHttpRequest: HTTP Client local=10.1.239.5:3128 remote=10.0.15.7:55261 FD 15 flags=1
2016/06/21 09:31:39.481 kid1| 11,2| client_side.cc(2347) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://www.sefaz.am.gov.br/ HTTP/1.1
Host: www.sefaz.am.gov.br
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: pt-BR,pt;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Cookie: _ga=GA1.3.81554590.1466157108
Connection: keep-alive
Cache-Control: max-age=0


----------
2016/06/21 09:31:39.481 kid1| 5,3| comm.cc(553) commSetConnTimeout: local=10.1.239.5:3128 remote=10.0.15.7:55261 FD 15 flags=1 timeout 86400
2016/06/21 09:31:39.481 kid1| 23,3| url.cc(359) urlParse: urlParse: Split URL 'http://www.sefaz.am.gov.br/' into proto='http', host='www.sefaz.am.gov.br', port='80', path='/'
2016/06/21 09:31:39.481 kid1| 14,3| Address.cc(389) lookupHostIP: Given Non-IP 'www.sefaz.am.gov.br': Name or service not known
2016/06/21 09:31:39.481 kid1| 33,3| client_side.cc(874) clientSetKeepaliveFlag: http_ver = HTTP/1.1
2016/06/21 09:31:39.481 kid1| 33,3| client_side.cc(875) clientSetKeepaliveFlag: method = GET
2016/06/21 09:31:39.482 kid1| 85,3| client_side_request.cc(130) ClientRequestContext: 0x32a98f8 ClientRequestContext constructed
2016/06/21 09:31:39.482 kid1| 83,3| client_side_request.cc(1687) doCallouts: Doing calloutContext->hostHeaderVerify()
2016/06/21 09:31:39.482 kid1| 85,3| client_side_request.cc(634) hostHeaderVerify: validate host=www.sefaz.am.gov.br, port=0, portStr=NULL
2016/06/21 09:31:39.482 kid1| 85,3| client_side_request.cc(648) hostHeaderVerify: validate skipped.
2016/06/21 09:31:39.482 kid1| 83,3| client_side_request.cc(1694) doCallouts: Doing calloutContext->clientAccessCheck()
2016/06/21 09:31:39.482 kid1| 28,3| Checklist.cc(70) preCheck: 0x3f826c8 checking slow rules
2016/06/21 09:31:39.482 kid1| 28,3| Acl.cc(158) matches: checked: CONNECT = 0
2016/06/21 09:31:39.482 kid1| 28,3| Acl.cc(158) matches: checked: http_access#1 = 0
2016/06/21 09:31:39.482 kid1| 28,3| RegexData.cc(51) match: aclRegexData::match: checking 'http://www.sefaz.am.gov.br/'
2016/06/21 09:31:39.482 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(^cache_object://)'
2016/06/21 09:31:39.482 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(^https?://[^/]+/squid-internal-mgr/)'
2016/06/21 09:31:39.482 kid1| 28,3| Acl.cc(158) matches: checked: manager = 0
2016/06/21 09:31:39.482 kid1| 28,3| Acl.cc(158) matches: checked: http_access#2 = 0
2016/06/21 09:31:39.482 kid1| 28,3| RegexData.cc(51) match: aclRegexData::match: checking 'http://www.sefaz.am.gov.br/'
2016/06/21 09:31:39.482 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(^cache_object://)'
2016/06/21 09:31:39.482 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(^https?://[^/]+/squid-internal-mgr/)'
2016/06/21 09:31:39.482 kid1| 28,3| Acl.cc(158) matches: checked: manager = 0
2016/06/21 09:31:39.482 kid1| 28,3| Acl.cc(158) matches: checked: http_access#3 = 0
2016/06/21 09:31:39.483 kid1| 28,3| RegexData.cc(51) match: aclRegexData::match: checking 'http://www.sefaz.am.gov.br/'
2016/06/21 09:31:39.483 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(swupmf.adobe.com)|(crl.adobe.com)|(www.basemetals.com/imagelibrary/ql/minesite.gif)|(www.basemetals.com/imagelibrary/ql/tbd-mj.gif)|(activate.pdfcreator-toolbar.org)|(apps.skype.com)|(imnotaproxy.com)|(kproxy.com)|(www.proxysite.com)|(officecdn.microsoft.com)|(officecdn.microsoft.com.edgesuite.net)'
2016/06/21 09:31:39.483 kid1| 28,3| Acl.cc(158) matches: checked: redlist = 0
2016/06/21 09:31:39.483 kid1| 28,3| Acl.cc(158) matches: checked: http_access#4 = 0
2016/06/21 09:31:39.483 kid1| 28,3| RegexData.cc(51) match: aclRegexData::match: checking 'http://www.sefaz.am.gov.br/'
2016/06/21 09:31:39.483 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(mail.google.com)|(gmail.com)'
2016/06/21 09:31:39.483 kid1| 28,3| Acl.cc(158) matches: checked: gmail = 0
2016/06/21 09:31:39.483 kid1| 28,3| Acl.cc(158) matches: checked: http_access#5 = 0
2016/06/21 09:31:39.483 kid1| 28,3| RegexData.cc(51) match: aclRegexData::match: checking 'http://www.sefaz.am.gov.br/'
2016/06/21 09:31:39.483 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '...'
2016/06/21 09:31:39.485 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '...'
2016/06/21 09:31:39.486 kid1| 28,2| RegexData.cc(73) match: aclRegexData::match: match '...' found in 'http://www.sefaz.am.gov.br/'
2016/06/21 09:31:39.487 kid1| 28,3| Acl.cc(158) matches: checked: whitelist = 1
2016/06/21 09:31:39.487 kid1| 28,3| Acl.cc(158) matches: checked: http_access#6 = 1
2016/06/21 09:31:39.487 kid1| 28,3| Acl.cc(158) matches: checked: http_access = 1
2016/06/21 09:31:39.487 kid1| 28,3| Checklist.cc(63) markFinished: 0x3f826c8 answer ALLOWED for match
2016/06/21 09:31:39.487 kid1| 28,3| Checklist.cc(163) checkCallback: ACLChecklist::checkCallback: 0x3f826c8 answer=ALLOWED
2016/06/21 09:31:39.487 kid1| 85,2| client_side_request.cc(744) clientAccessCheckDone: The request GET http://www.sefaz.am.gov.br/ is ALLOWED; last ACL checked: whitelist
2016/06/21 09:31:39.487 kid1| 83,3| AccessCheck.cc(42) Start: adaptation off, skipping
2016/06/21 09:31:39.487 kid1| 83,3| client_side_request.cc(1714) doCallouts: Doing calloutContext->clientRedirectStart()
2016/06/21 09:31:39.487 kid1| Starting new redirector helpers...
2016/06/21 09:31:39.487 kid1| helperOpenServers: Starting 1/40 'squidGuard' processes
2016/06/21 09:31:39.487 kid1| 51,3| fd.cc(198) fd_open: fd_open() FD 16 IPC UNIX STREAM Parent
2016/06/21 09:31:39.487 kid1| 51,3| fd.cc(198) fd_open: fd_open() FD 17 IPC UNIX STREAM Parent
2016/06/21 09:31:39.487 kid1| 54,3| ipc.cc(180) ipcCreate: ipcCreate: prfd FD 16
2016/06/21 09:31:39.487 kid1| 54,3| ipc.cc(181) ipcCreate: ipcCreate: pwfd FD 16
2016/06/21 09:31:39.487 kid1| 54,3| ipc.cc(182) ipcCreate: ipcCreate: crfd FD 17
2016/06/21 09:31:39.487 kid1| 54,3| ipc.cc(183) ipcCreate: ipcCreate: cwfd FD 17
2016/06/21 09:31:39.501 kid1| 5,3| comm.cc(868) _comm_close: comm_close: start closing FD 17
2016/06/21 09:31:39.501 kid1| 5,3| comm.cc(540) commUnsetFdTimeout: Remove timeout for FD 17
2016/06/21 09:31:39.501 kid1| 21,3| tools.cc(543) leave_suid: leave_suid: PID 7195 called
2016/06/21 09:31:39.502 kid1| 21,3| tools.cc(636) no_suid: no_suid: PID 7195 giving up root priveleges forever
2016/06/21 09:31:39.503 kid1| 5,3| comm.cc(540) commUnsetFdTimeout: Remove timeout for FD 16
2016/06/21 09:31:39.506 kid1| 84,3| helper.cc(1200) GetFirstAvailable: GetFirstAvailable: Least-loaded helper is overloaded!
2016/06/21 09:31:39.507 kid1| 51,3| fd.cc(93) fd_close: fd_close FD 17 IPC UNIX STREAM Parent
2016/06/21 09:31:39.507 kid1| 5,3| IoCallback.cc(116) finish: called for local=[::] remote=[::] FD 16 flags=1 (0, 0)
2016/06/21 09:31:39.689 kid1| 5,3| Read.cc(144) HandleRead: FD 16, size 4095, retval 1, errno 0
2016/06/21 09:31:39.689 kid1| 5,3| IoCallback.cc(116) finish: called for local=[::] remote=[::] FD 16 flags=1 (0, 0)
2016/06/21 09:31:39.689 kid1| 84,3| helper.cc(892) helperHandleRead: helperHandleRead: end of reply found
2016/06/21 09:31:39.689 kid1| 84,3| Reply.cc(29) parse: Parsing helper buffer
2016/06/21 09:31:39.689 kid1| 84,3| Reply.cc(35) parse: Reply length is smaller than 1 or none at all
2016/06/21 09:31:39.689 kid1| 83,3| client_side_request.cc(1722) doCallouts: Doing calloutContext->clientAccessCheck2()
2016/06/21 09:31:39.689 kid1| 85,2| client_side_request.cc(720) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2016/06/21 09:31:39.689 kid1| 85,2| client_side_request.cc(744) clientAccessCheckDone: The request GET http://www.sefaz.am.gov.br/ is ALLOWED; last ACL checked: whitelist
2016/06/21 09:31:39.689 kid1| 83,3| client_side_request.cc(1740) doCallouts: Doing clientInterpretRequestHeaders()
2016/06/21 09:31:39.690 kid1| 83,3| client_side_request.cc(1749) doCallouts: Doing calloutContext->checkNoCache()
2016/06/21 09:31:39.690 kid1| 28,3| Checklist.cc(70) preCheck: 0x3f826c8 checking slow rules
2016/06/21 09:31:39.690 kid1| 28,3| RegexData.cc(51) match: aclRegexData::match: checking '/'
2016/06/21 09:31:39.690 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(cgi-bin)|(\?)'
2016/06/21 09:31:39.690 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(bradesco)'
2016/06/21 09:31:39.690 kid1| 28,3| Acl.cc(158) matches: checked: QUERY = 0
2016/06/21 09:31:39.690 kid1| 28,3| Acl.cc(158) matches: checked: no_cache#1 = 0
2016/06/21 09:31:39.690 kid1| 28,3| Acl.cc(158) matches: checked: no_cache = 0
2016/06/21 09:31:39.690 kid1| 28,3| Checklist.cc(386) calcImplicitAnswer: 0x3f826c8 NO match found, last action DENIED so returning ALLOWED
2016/06/21 09:31:39.690 kid1| 28,3| Checklist.cc(63) markFinished: 0x3f826c8 answer ALLOWED for implicit rule won
2016/06/21 09:31:39.690 kid1| 28,3| Checklist.cc(163) checkCallback: ACLChecklist::checkCallback: 0x3f826c8 answer=ALLOWED
2016/06/21 09:31:39.690 kid1| 85,3| client_side_request.cc(115) ~ClientRequestContext: 0x32a98f8 ClientRequestContext destructed
2016/06/21 09:31:39.690 kid1| 83,3| client_side_request.cc(1831) doCallouts: calling processRequest()
2016/06/21 09:31:39.690 kid1| 87,3| clientStream.cc(184) clientStreamRead: clientStreamRead: Calling 1 with cbdata 0x3fca990 from node 0x3fa6118
2016/06/21 09:31:39.690 kid1| 73,3| HttpRequest.cc(687) storeId: sent back canonicalUrl:http://www.sefaz.am.gov.br/
2016/06/21 09:31:39.691 kid1| 20,3| store_dir.cc(1073) get: storeGet: looking up 185CB7106C29D1D1939E6289FBA7EC48
2016/06/21 09:31:39.691 kid1| 85,3| client_side_reply.cc(1637) identifyFoundObject: StoreEntry is NULL - MISS
2016/06/21 09:31:39.691 kid1| 20,3| store.cc(774) storeCreatePureEntry: storeCreateEntry: 'http://www.sefaz.am.gov.br/'
2016/06/21 09:31:39.691 kid1| 20,3| MemObject.cc(97) MemObject: new MemObject 0x3d24c00
2016/06/21 09:31:39.691 kid1| 20,3| store.cc(483) lock: storeCreateEntry locked key [null_store_key] e:=V/0x3dd4900*1
2016/06/21 09:31:39.691 kid1| 20,3| store_key_md5.cc(89) storeKeyPrivate: storeKeyPrivate: GET http://www.sefaz.am.gov.br/
2016/06/21 09:31:39.691 kid1| 20,3| store.cc(447) hashInsert: StoreEntry::hashInsert: Inserting Entry e:=IV/0x3dd4900*1 key 'B43B6D547ECEC7D9DC58FF325E32E2BA'
2016/06/21 09:31:39.691 kid1| 90,3| store_client.cc(200) copy: store_client::copy: B43B6D547ECEC7D9DC58FF325E32E2BA, from 0, for length 4096, cb 1, cbdata 0x3fc98d8
2016/06/21 09:31:39.691 kid1| 20,3| store.cc(483) lock: store_client::copy locked key B43B6D547ECEC7D9DC58FF325E32E2BA e:=IV/0x3dd4900*2
2016/06/21 09:31:39.691 kid1| 90,3| store_client.cc(297) storeClientCopy2: storeClientCopy2: B43B6D547ECEC7D9DC58FF325E32E2BA
2016/06/21 09:31:39.691 kid1| 90,3| store_client.cc(341) doCopy: store_client::doCopy: Waiting for more
2016/06/21 09:31:39.691 kid1| 20,3| store.cc(521) unlock: store_client::copy unlocking key B43B6D547ECEC7D9DC58FF325E32E2BA e:=IV/0x3dd4900*2
2016/06/21 09:31:39.691 kid1| 17,3| FwdState.cc(332) Start: 'http://www.sefaz.am.gov.br/'
2016/06/21 09:31:39.691 kid1| 17,2| FwdState.cc(133) FwdState: Forwarding client request local=10.1.239.5:3128 remote=10.0.15.7:55261 FD 15 flags=1, url=http://www.sefaz.am.gov.br/
2016/06/21 09:31:39.691 kid1| 20,3| store.cc(483) lock: FwdState locked key B43B6D547ECEC7D9DC58FF325E32E2BA e:=IV/0x3dd4900*2
2016/06/21 09:31:39.691 kid1| 44,3| peer_select.cc(137) peerSelect: e:=IWV/0x3dd4900*2 http://www.sefaz.am.gov.br/
2016/06/21 09:31:39.691 kid1| 20,3| store.cc(483) lock: peerSelect locked key B43B6D547ECEC7D9DC58FF325E32E2BA e:=IWV/0x3dd4900*3
2016/06/21 09:31:39.691 kid1| 44,3| peer_select.cc(441) peerSelectFoo: GET www.sefaz.am.gov.br
2016/06/21 09:31:39.692 kid1| 44,3| peer_select.cc(401) peerCheckNetdbDirect: peerCheckNetdbDirect: MY RTT = 0 msec
2016/06/21 09:31:39.692 kid1| 44,3| peer_select.cc(402) peerCheckNetdbDirect: peerCheckNetdbDirect: minimum_direct_rtt = 400 msec
2016/06/21 09:31:39.692 kid1| 44,3| peer_select.cc(409) peerCheckNetdbDirect: peerCheckNetdbDirect: MY hops = 0
2016/06/21 09:31:39.692 kid1| 44,3| peer_select.cc(410) peerCheckNetdbDirect: peerCheckNetdbDirect: minimum_direct_hops = 4
2016/06/21 09:31:39.692 kid1| 15,3| neighbors.cc(100) whichPeer: whichPeer: from [::]
2016/06/21 09:31:39.692 kid1| 44,3| peer_select.cc(474) peerSelectFoo: peerSelectFoo: direct = DIRECT_MAYBE (default)
2016/06/21 09:31:39.692 kid1| 44,3| peer_select.cc(477) peerSelectFoo: peerSelectFoo: direct = DIRECT_MAYBE
2016/06/21 09:31:39.692 kid1| 73,3| HttpRequest.cc(687) storeId: sent back canonicalUrl:http://www.sefaz.am.gov.br/
2016/06/21 09:31:39.692 kid1| 44,3| peer_select.cc(110) peerSelectIcpPing: peerSelectIcpPing: http://www.sefaz.am.gov.br/
2016/06/21 09:31:39.692 kid1| 15,3| neighbors.cc(289) neighborsCount: neighborsCount: 0
2016/06/21 09:31:39.692 kid1| 44,3| peer_select.cc(121) peerSelectIcpPing: peerSelectIcpPing: counted 0 neighbors
2016/06/21 09:31:39.692 kid1| 44,3| peer_select.cc(685) peerGetSomeParent: GET www.sefaz.am.gov.br
2016/06/21 09:31:39.692 kid1| 15,3| neighbors.cc(350) getRoundRobinParent: returning NULL
2016/06/21 09:31:39.692 kid1| 15,3| neighbors.cc(400) getWeightedRoundRobinParent: getWeightedRoundRobinParent: returning NULL
2016/06/21 09:31:39.692 kid1| 15,3| neighbors.cc(312) getFirstUpParent: getFirstUpParent: returning NULL
2016/06/21 09:31:39.692 kid1| 15,3| neighbors.cc(490) getDefaultParent: getDefaultParent: returning NULL
2016/06/21 09:31:39.692 kid1| 15,3| neighbors.cc(490) getDefaultParent: getDefaultParent: returning NULL
2016/06/21 09:31:39.692 kid1| 44,2| peer_select.cc(258) peerSelectDnsPaths: Find IP destination for: http://www.sefaz.am.gov.br/' via www.sefaz.am.gov.br
2016/06/21 09:31:39.692 kid1| 14,3| Address.cc(389) lookupHostIP: Given Non-IP 'www.sefaz.am.gov.br': Name or service not known
2016/06/21 09:31:39.692 kid1| 14,3| ipcache.cc(174) ipcacheRelease: ipcacheRelease: Releasing entry for 'www.sefaz.am.gov.br'
2016/06/21 09:31:39.693 kid1| 78,3| dns_internal.cc(1745) idnsALookup: idnsALookup: buf is 37 bytes for www.sefaz.am.gov.br, id = 0xb905
2016/06/21 09:31:39.693 kid1| 50,3| comm.cc(957) comm_udp_sendto: comm_udp_sendto: Attempt to send UDP packet to 10.1.1.111:53 using FD 9 using Port 45437
2016/06/21 09:31:39.693 kid1| 78,3| dns_internal.cc(1683) idnsSendSlaveAAAAQuery: buf is 37 bytes for www.sefaz.am.gov.br, id = 0xaa1f
2016/06/21 09:31:39.693 kid1| 50,3| comm.cc(957) comm_udp_sendto: comm_udp_sendto: Attempt to send UDP packet to 10.1.1.111:53 using FD 9 using Port 45437
2016/06/21 09:31:39.821 kid1| 78,3| dns_internal.cc(1277) idnsRead: idnsRead: starting with FD 9
2016/06/21 09:31:39.821 kid1| 78,3| dns_internal.cc(1323) idnsRead: idnsRead: FD 9: received 106 bytes from 10.1.1.111:53
2016/06/21 09:31:39.821 kid1| 78,3| dns_internal.cc(1130) idnsGrokReply: idnsGrokReply: QID 0xaa1f, 1 answers
2016/06/21 09:31:39.848 kid1| 78,3| dns_internal.cc(1277) idnsRead: idnsRead: starting with FD 9
2016/06/21 09:31:39.848 kid1| 78,3| dns_internal.cc(1323) idnsRead: idnsRead: FD 9: received 71 bytes from 10.1.1.111:53
2016/06/21 09:31:39.848 kid1| 78,3| dns_internal.cc(1130) idnsGrokReply: idnsGrokReply: QID 0xb905, 2 answers
2016/06/21 09:31:39.848 kid1| 14,3| ipcache.cc(364) ipcacheParse: ipcacheParse: 3 answers for 'www.sefaz.am.gov.br'
2016/06/21 09:31:39.848 kid1| 14,3| ipcache.cc(422) ipcacheParse: ipcacheParse: www.sefaz.am.gov.br #0 200.242.61.12
2016/06/21 09:31:39.848 kid1| 44,2| peer_select.cc(280) peerSelectDnsPaths: Found sources for 'http://www.sefaz.am.gov.br/'
2016/06/21 09:31:39.848 kid1| 44,2| peer_select.cc(281) peerSelectDnsPaths: always_direct = DENIED
2016/06/21 09:31:39.848 kid1| 44,2| peer_select.cc(282) peerSelectDnsPaths: never_direct = DENIED
2016/06/21 09:31:39.849 kid1| 44,2| peer_select.cc(286) peerSelectDnsPaths: DIRECT = local=0.0.0.0 remote=200.242.61.12:80 flags=1
2016/06/21 09:31:39.849 kid1| 44,2| peer_select.cc(295) peerSelectDnsPaths: timedout = 0
2016/06/21 09:31:39.849 kid1| 17,3| FwdState.cc(387) startConnectionOrFail: http://www.sefaz.am.gov.br/
2016/06/21 09:31:39.849 kid1| 17,3| FwdState.cc(806) connectStart: fwdConnectStart: http://www.sefaz.am.gov.br/
2016/06/21 09:31:39.849 kid1| 48,3| pconn.cc(439) pop: lookup for key {200.242.61.12:80/www.sefaz.am.gov.br} failed.
2016/06/21 09:31:39.849 kid1| 17,3| FwdState.cc(1307) GetMarkingsToServer: from 0.0.0.0 netfilter mark 0
2016/06/21 09:31:39.849 kid1| 17,3| AsyncCall.cc(26) AsyncCall: The AsyncCall fwdConnectDoneWrapper constructed, this=0x2dd5f90 [call118202]
2016/06/21 09:31:39.849 kid1| 44,3| peer_select.cc(79) ~ps_state: http://www.sefaz.am.gov.br/
2016/06/21 09:31:39.849 kid1| 20,3| store.cc(521) unlock: peerSelect unlocking key B43B6D547ECEC7D9DC58FF325E32E2BA e:=p2IWV/0x3dd4900*3
2016/06/21 09:31:39.849 kid1| 50,3| comm.cc(347) comm_openex: comm_openex: Attempt open socket for: 0.0.0.0
2016/06/21 09:31:39.849 kid1| 50,3| comm.cc(388) comm_openex: comm_openex: Opened socket local=0.0.0.0 remote=[::] FD 17 flags=1 : family=2, type=1, protocol=6
2016/06/21 09:31:39.849 kid1| 51,3| fd.cc(198) fd_open: fd_open() FD 17 www.sefaz.am.gov.br
2016/06/21 09:31:39.849 kid1| 5,3| ConnOpener.cc(289) createFd: local=0.0.0.0 remote=200.242.61.12:80 flags=1 will timeout in 60
2016/06/21 09:31:40.076 kid1| 17,3| AsyncCall.cc(93) ScheduleCall: ConnOpener.cc(137) will call fwdConnectDoneWrapper(local=10.1.239.5:44234 remote=200.242.61.12:80 FD 17 flags=1, data=0x3ced588) [call118202]
2016/06/21 09:31:40.076 kid1| 17,3| AsyncCallQueue.cc(55) fireNext: entering fwdConnectDoneWrapper(local=10.1.239.5:44234 remote=200.242.61.12:80 FD 17 flags=1, data=0x3ced588)
2016/06/21 09:31:40.076 kid1| 17,3| AsyncCall.cc(38) make: make call fwdConnectDoneWrapper [call118202]
2016/06/21 09:31:40.076 kid1| 17,3| FwdState.cc(680) connectDone: local=10.1.239.5:44234 remote=200.242.61.12:80 FD 17 flags=1: 'http://www.sefaz.am.gov.br/'
2016/06/21 09:31:40.076 kid1| 17,3| FwdState.cc(908) dispatch: local=10.1.239.5:3128 remote=10.0.15.7:55261 FD 15 flags=1: Fetching GET http://www.sefaz.am.gov.br/
2016/06/21 09:31:40.076 kid1| 11,3| http.cc(2278) httpStart: GET http://www.sefaz.am.gov.br/
2016/06/21 09:31:40.076 kid1| 20,3| store.cc(483) lock: Client locked key B43B6D547ECEC7D9DC58FF325E32E2BA e:=p2DIWV/0x3dd4900*3
2016/06/21 09:31:40.077 kid1| 17,3| AsyncCallQueue.cc(57) fireNext: leaving fwdConnectDoneWrapper(local=10.1.239.5:44234 remote=200.242.61.12:80 FD 17 flags=1, data=0x3ced588)
2016/06/21 09:31:40.077 kid1| 5,3| comm.cc(553) commSetConnTimeout: local=10.1.239.5:44234 remote=200.242.61.12:80 FD 17 flags=1 timeout 86400
2016/06/21 09:31:40.077 kid1| 11,2| http.cc(2234) sendRequest: HTTP Server local=10.1.239.5:44234 remote=200.242.61.12:80 FD 17 flags=1
2016/06/21 09:31:40.077 kid1| 11,2| http.cc(2235) sendRequest: HTTP Server REQUEST:
---------
GET / HTTP/1.1
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0
Accept: text/html,application/xhtml+xml,application/xml;q=0.9,*/*;q=0.8
Accept-Language: pt-BR,pt;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Cookie: _ga=GA1.3.81554590.1466157108
Host: www.sefaz.am.gov.br
Via: 1.1 squid.weg.net (squid/3.5.19)
X-Forwarded-For: unknown
Cache-Control: max-age=0
Connection: keep-alive


----------
2016/06/21 09:31:40.077 kid1| 5,3| IoCallback.cc(116) finish: called for local=10.1.239.5:44234 remote=200.242.61.12:80 FD 17 flags=1 (0, 0)
2016/06/21 09:31:40.077 kid1| 5,3| comm.cc(553) commSetConnTimeout: local=10.1.239.5:44234 remote=200.242.61.12:80 FD 17 flags=1 timeout 900
2016/06/21 09:31:40.212 kid1| 5,3| Read.cc(144) HandleRead: FD 17, size 16383, retval -1, errno 104
2016/06/21 09:31:40.212 kid1| 5,3| Read.cc(154) HandleRead: comm_read_try: scheduling Comm::COMM_ERROR
2016/06/21 09:31:40.212 kid1| 5,3| IoCallback.cc(116) finish: called for local=10.1.239.5:44234 remote=200.242.61.12:80 FD 17 flags=1 (-1, 104)
2016/06/21 09:31:40.212 kid1| 11,2| http.cc(1157) readReply: local=10.1.239.5:44234 remote=200.242.61.12:80 FD 17 flags=1: read failure: (104) Connection reset by peer.
2016/06/21 09:31:40.212 kid1| 17,3| FwdState.cc(416) fail: ERR_READ_ERROR "Bad Gateway"
http://www.sefaz.am.gov.br/
2016/06/21 09:31:40.212 kid1| 17,3| FwdState.cc(447) unregister: http://www.sefaz.am.gov.br/
2016/06/21 09:31:40.212 kid1| 5,3| comm.cc(868) _comm_close: comm_close: start closing FD 17
2016/06/21 09:31:40.212 kid1| 5,3| comm.cc(540) commUnsetFdTimeout: Remove timeout for FD 17
2016/06/21 09:31:40.212 kid1| 17,2| FwdState.cc(655) handleUnregisteredServerEnd: self=0x3ced588*2 err=0x3c6f868 http://www.sefaz.am.gov.br/
2016/06/21 09:31:40.212 kid1| 17,3| FwdState.cc(618) retryOrBail: re-forwarding (0 tries, 1 secs)
2016/06/21 09:31:40.212 kid1| 17,3| FwdState.cc(387) startConnectionOrFail: http://www.sefaz.am.gov.br/
2016/06/21 09:31:40.213 kid1| 17,3| FwdState.cc(404) startConnectionOrFail: Connection failed: http://www.sefaz.am.gov.br/
2016/06/21 09:31:40.213 kid1| 20,3| store.cc(521) unlock: Client unlocking key B43B6D547ECEC7D9DC58FF325E32E2BA e:=p2DIWV/0x3dd4900*3
2016/06/21 09:31:40.213 kid1| 17,3| FwdState.cc(266) ~FwdState: FwdState destructor starting
2016/06/21 09:31:40.213 kid1| 51,3| fd.cc(198) fd_open: fd_open() FD 18 /usr/share/squid/errors/pt-br/ERR_READ_ERROR
2016/06/21 09:31:40.213 kid1| 51,3| fd.cc(93) fd_close: fd_close FD 18 /usr/share/squid/errors/pt-br/ERR_READ_ERROR
2016/06/21 09:31:40.213 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%l --> '/*
* Copyright (C) 1996-2016 The Squid Software Foundation and contributors
*
* Squid software is distributed under GPLv2+ license and includes
* contributions from numerous individuals and organizations.
* Please see the COPYING and CONTRIBUTORS files for details.
*/

/*
Stylesheet for Squid Error pages
Adapted from design by Free CSS Templates
http://www.freecsstemplates.org
Released for free under a Creative Commons Attribution 2.5 License
*/

/* Page basics */
* {
font-family: verdana, sans-serif;
}

html body {
margin: 0;
padding: 0;
background: #efefef;
font-size: 12px;
color: #1e1e1e;
}

/* Page displayed title area */
#titles {
margin-left: 15px;
padding: 10px;
padding-left: 100px;
background: url('/squid-internal-static/icons/SN.png') no-repeat left;
}

/* initial title */
#titles h1 {
color: #000000;
}
#titles h2 {
color: #000000;
}

/* special event: FTP success page titles */
#titles ftpsuccess {
background-color:#00ff00;
width:100%;
}

/* Page displayed body content area */
#content {
padding: 10px;
background: #ffffff;
}

/* General text */
p {
}

/* error brief description */
#error p {
}

/* some data which may have caused the problem */
#data {
}

/* the error message received from the system or other software */
#sysmsg {
}

pre {
font-family:sans-serif;
}

/* special event: FTP / Gopher directory listing */
#dirmsg {
font-family: courier;
color: black;
font-size: 10pt;
}
#dirlisting {
margin-left: 2%;
margin-right: 2%;
}
#dirlisting tr.entry td.icon,td.filename,td.size,td.date {
border-bottom: groove;
}
#dirlisting td.size {
width: 50px;
text-align: right;
padding-right: 5px;
}

/* horizontal lines */
hr {
margin: 0;
}

/* page displayed footer area */
#footer {
font-size: 9px;
padding-left: 10px;
}
'
2016/06/21 09:31:40.213 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%; --> '%;'
2016/06/21 09:31:40.213 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%c --> 'ERR_READ_ERROR'
2016/06/21 09:31:40.213 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%U --> 'http://www.sefaz.am.gov.br/'
2016/06/21 09:31:40.213 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%U --> 'http://www.sefaz.am.gov.br/'
2016/06/21 09:31:40.213 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%E --> '(104) Connection reset by peer'
2016/06/21 09:31:40.213 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%w --> 'webmaster'
2016/06/21 09:31:40.214 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%W --> '?subject=CacheErrorInfo%20-%20ERR_READ_ERROR&body=CacheHost%3A%20squid.weg.net%0D%0AErrPage%3A%20ERR_READ_ERROR%0D%0AErr%3A%20(104)%20Connection%20reset%20by%20peer%0D%0ATimeStamp%3A%20Tue,%2021%20Jun%202016%2012%3A31%3A40%20GMT%0D%0A%0D%0AClientIP%3A%2010.0.15.7%0D%0AServerIP%3A%20www.sefaz.am.gov.br%0D%0A%0D%0AHTTP%20Request%3A%0D%0AGET%20%2F%20HTTP%2F1.1%0AUser-Agent%3A%20Mozilla%2F5.0%20(Windows%20NT%2010.0%3B%20WOW64%3B%20rv%3A35.0)%20Gecko%2F20100101%20Firefox%2F35.0%0D%0AAccept%3A%20text%2Fhtml,application%2Fxhtml+xml,application%2Fxml%3Bq%3D0.9,*%2F*%3Bq%3D0.8%0D%0AAccept-Language%3A%20pt-BR,pt%3Bq%3D0.8,en-US%3Bq%3D0.5,en%3Bq%3D0.3%0D%0AAccept-Encoding%3A%20gzip,%20deflate%0D%0ACookie%3A%20_ga%3DGA1.3.81554590.1466157108%0D%0AConnection%3A%20keep-alive%0D%0ACache-Control%3A%20max-age%3D0%0D%0AHost%3A%20www.sefaz.am.gov.br%0D%0A%0D%0A%0D%0A'
2016/06/21 09:31:40.214 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%w --> 'webmaster'
2016/06/21 09:31:40.214 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%T --> 'Tue, 21 Jun 2016 12:31:40 GMT'
2016/06/21 09:31:40.214 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%h --> 'squid.weg.net'
2016/06/21 09:31:40.214 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%s --> 'squid/3.5.19'
2016/06/21 09:31:40.214 kid1| 4,3| errorpage.cc(1101) Convert: errorConvert: %%c --> 'ERR_READ_ERROR'
2016/06/21 09:31:40.214 kid1| 20,3| store.cc(483) lock: StoreEntry::storeErrorResponse locked key B43B6D547ECEC7D9DC58FF325E32E2BA e:=p2DIWV/0x3dd4900*3
2016/06/21 09:31:40.214 kid1| 20,3| store.cc(1862) replaceHttpReply: StoreEntry::replaceHttpReply: http://www.sefaz.am.gov.br/
2016/06/21 09:31:40.214 kid1| 20,3| store.cc(980) checkCachable: StoreEntry::checkCachable: NO: private key
2016/06/21 09:31:40.214 kid1| 20,3| store.cc(499) setReleaseFlag: StoreEntry::setReleaseFlag: 'B43B6D547ECEC7D9DC58FF325E32E2BA'
2016/06/21 09:31:40.214 kid1| 20,3| store_swapout.cc(381) mayStartSwapOut: not cachable
2016/06/21 09:31:40.214 kid1| 20,2| store.cc(949) checkCachable: StoreEntry::checkCachable: NO: not cachable
2016/06/21 09:31:40.214 kid1| 90,3| store_client.cc(732) invokeHandlers: InvokeHandlers: B43B6D547ECEC7D9DC58FF325E32E2BA
2016/06/21 09:31:40.214 kid1| 90,3| store_client.cc(738) invokeHandlers: StoreEntry::InvokeHandlers: checking client #0
2016/06/21 09:31:40.214 kid1| 90,3| store_client.cc(297) storeClientCopy2: storeClientCopy2: B43B6D547ECEC7D9DC58FF325E32E2BA
2016/06/21 09:31:40.214 kid1| 90,3| store_client.cc(433) scheduleMemRead: store_client::doCopy: Copying normal from memory
2016/06/21 09:31:40.215 kid1| 88,3| client_side_reply.cc(1506) buildReplyHeader: listening port closed
2016/06/21 09:31:40.215 kid1| 28,3| Checklist.cc(70) preCheck: 0x3f826c8 checking slow rules
2016/06/21 09:31:40.215 kid1| 28,3| RegexData.cc(51) match: aclRegexData::match: checking 'http://www.sefaz.am.gov.br/'
2016/06/21 09:31:40.215 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '...'
2016/06/21 09:31:40.216 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '...'
2016/06/21 09:31:40.216 kid1| 28,2| RegexData.cc(73) match: aclRegexData::match: match '...'
2016/06/21 09:31:40.216 kid1| 28,3| Acl.cc(158) matches: checked: whitelist = 1
2016/06/21 09:31:40.216 kid1| 28,3| Acl.cc(158) matches: checked: http_reply_access#1 = 1
2016/06/21 09:31:40.217 kid1| 28,3| Acl.cc(158) matches: checked: http_reply_access = 1
2016/06/21 09:31:40.217 kid1| 28,3| Checklist.cc(63) markFinished: 0x3f826c8 answer ALLOWED for match
2016/06/21 09:31:40.217 kid1| 28,3| Checklist.cc(163) checkCallback: ACLChecklist::checkCallback: 0x3f826c8 answer=ALLOWED
2016/06/21 09:31:40.217 kid1| 88,2| client_side_reply.cc(1999) processReplyAccessResult: The reply for GET http://www.sefaz.am.gov.br/ is ALLOWED, because it matched whitelist
2016/06/21 09:31:40.217 kid1| 20,3| store.cc(483) lock: ClientHttpRequest::loggingEntry locked key B43B6D547ECEC7D9DC58FF325E32E2BA e:=p2XDIV/0x3dd4900*4
2016/06/21 09:31:40.217 kid1| 88,3| client_side_reply.cc(2037) processReplyAccessResult: clientReplyContext::sendMoreData: Appending 3846 bytes after 250 bytes of headers
2016/06/21 09:31:40.217 kid1| 87,3| clientStream.cc(162) clientStreamCallback: clientStreamCallback: Calling 1 with cbdata 0x3fc98a0 from node 0x3fc7f48
2016/06/21 09:31:40.217 kid1| 11,2| client_side.cc(1392) sendStartOfMessage: HTTP Client local=10.1.239.5:3128 remote=10.0.15.7:55261 FD 15 flags=1
2016/06/21 09:31:40.217 kid1| 11,2| client_side.cc(1393) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 502 Bad Gateway
Server: squid/3.5.19
Mime-Version: 1.0
Date: Tue, 21 Jun 2016 12:31:40 GMT
Content-Type: text/html;charset=utf-8
Content-Length: 3881
X-Squid-Error: ERR_READ_ERROR 104
Vary: Accept-Language
Content-Language: pt-br
X-Cache: MISS from squid.weg.net
X-Cache-Lookup: MISS from squid.weg.net:3128
Via: 1.1 squid.weg.net (squid/3.5.19)
Connection: close


----------
2016/06/21 09:31:40.217 kid1| 20,3| store.cc(1048) complete: storeComplete: 'B43B6D547ECEC7D9DC58FF325E32E2BA'
2016/06/21 09:31:40.217 kid1| 20,3| store.cc(1337) validLength: storeEntryValidLength: Checking 'B43B6D547ECEC7D9DC58FF325E32E2BA'
2016/06/21 09:31:40.217 kid1| 20,3| store_swapout.cc(356) mayStartSwapOut: already rejected
2016/06/21 09:31:40.217 kid1| 20,2| store.cc(949) checkCachable: StoreEntry::checkCachable: NO: not cachable
2016/06/21 09:31:40.217 kid1| 90,3| store_client.cc(732) invokeHandlers: InvokeHandlers: B43B6D547ECEC7D9DC58FF325E32E2BA
2016/06/21 09:31:40.217 kid1| 90,3| store_client.cc(738) invokeHandlers: StoreEntry::InvokeHandlers: checking client #0
2016/06/21 09:31:40.217 kid1| 20,3| store.cc(521) unlock: StoreEntry::storeErrorResponse unlocking key B43B6D547ECEC7D9DC58FF325E32E2BA e:=sp2XDINV/0x3dd4900*4
2016/06/21 09:31:40.217 kid1| 90,3| store_client.cc(758) storePendingNClients: storePendingNClients: returning 1
2016/06/21 09:31:40.217 kid1| 20,3| store.cc(521) unlock: FwdState unlocking key B43B6D547ECEC7D9DC58FF325E32E2BA e:=sp2XDINV/0x3dd4900*3
2016/06/21 09:31:40.218 kid1| 17,3| AsyncCall.cc(56) cancel: will not call fwdConnectDoneWrapper [call118202] because FwdState destructed
2016/06/21 09:31:40.218 kid1| 17,3| FwdState.cc(293) ~FwdState: FwdState destructor done
2016/06/21 09:31:40.218 kid1| 51,3| fd.cc(93) fd_close: fd_close FD 17 http://www.sefaz.am.gov.br/
2016/06/21 09:31:40.218 kid1| 5,3| IoCallback.cc(116) finish: called for local=10.1.239.5:3128 remote=10.0.15.7:55261 FD 15 flags=1 (0, 0)
2016/06/21 09:31:40.218 kid1| 58,3| HttpReply.cc(521) receivedBodyTooLarge: -250 >? -1
2016/06/21 09:31:40.218 kid1| 87,3| clientStream.cc(184) clientStreamRead: clientStreamRead: Calling 1 with cbdata 0x3fca990 from node 0x3fa6118
2016/06/21 09:31:40.218 kid1| 90,3| store_client.cc(200) copy: store_client::copy: B43B6D547ECEC7D9DC58FF325E32E2BA, from 4096, for length 4096, cb 1, cbdata 0x3fc98d8
2016/06/21 09:31:40.218 kid1| 20,3| store.cc(483) lock: store_client::copy locked key B43B6D547ECEC7D9DC58FF325E32E2BA e:=sp2XDINV/0x3dd4900*3
2016/06/21 09:31:40.218 kid1| 90,3| store_client.cc(297) storeClientCopy2: storeClientCopy2: B43B6D547ECEC7D9DC58FF325E32E2BA
2016/06/21 09:31:40.218 kid1| 90,3| store_client.cc(433) scheduleMemRead: store_client::doCopy: Copying normal from memory
2016/06/21 09:31:40.218 kid1| 87,3| clientStream.cc(162) clientStreamCallback: clientStreamCallback: Calling 1 with cbdata 0x3fc98a0 from node 0x3fc7f48
2016/06/21 09:31:40.218 kid1| 20,3| store.cc(521) unlock: store_client::copy unlocking key B43B6D547ECEC7D9DC58FF325E32E2BA e:=sp2XDINV/0x3dd4900*3
2016/06/21 09:31:40.218 kid1| 5,3| IoCallback.cc(116) finish: called for local=10.1.239.5:3128 remote=10.0.15.7:55261 FD 15 flags=1 (0, 0)
2016/06/21 09:31:40.218 kid1| 88,3| client_side_reply.cc(1096) storeOKTransferDone: storeOKTransferDone out.offset=3881 objectLen()=4131 headers_sz=250
2016/06/21 09:31:40.219 kid1| 5,3| comm.cc(868) _comm_close: comm_close: start closing FD 15
2016/06/21 09:31:40.219 kid1| 5,3| comm.cc(540) commUnsetFdTimeout: Remove timeout for FD 15
2016/06/21 09:31:40.219 kid1| 5,3| IoCallback.cc(116) finish: called for local=10.1.239.5:3128 remote=10.0.15.7:55261 FD 15 flags=1 (-10, 0)
2016/06/21 09:31:40.219 kid1| 33,2| client_side.cc(816) swanSong: local=10.1.239.5:3128 remote=10.0.15.7:55261 flags=1
2016/06/21 09:31:40.219 kid1| 87,3| clientStream.cc(202) clientStreamDetach: clientStreamDetach: Detaching node 0x3fa6118
2016/06/21 09:31:40.219 kid1| 87,3| clientStream.cc(287) clientStreamFree: Freeing clientStreamNode 0x3fa6118
2016/06/21 09:31:40.219 kid1| 87,3| clientStream.cc(223) clientStreamDetach: clientStreamDetach: Calling 1 with cbdata 0x3fca990
2016/06/21 09:31:40.219 kid1| 87,3| clientStream.cc(202) clientStreamDetach: clientStreamDetach: Detaching node 0x3fc7f48
2016/06/21 09:31:40.219 kid1| 87,3| clientStream.cc(287) clientStreamFree: Freeing clientStreamNode 0x3fc7f48
2016/06/21 09:31:40.219 kid1| 90,3| store_client.cc(664) storeUnregister: storeUnregister: called for 'B43B6D547ECEC7D9DC58FF325E32E2BA'
2016/06/21 09:31:40.219 kid1| 20,3| store_swapout.cc(356) mayStartSwapOut: already rejected
2016/06/21 09:31:40.219 kid1| 20,2| store.cc(949) checkCachable: StoreEntry::checkCachable: NO: not cachable
2016/06/21 09:31:40.219 kid1| 20,3| store.cc(483) lock: storeUnregister locked key B43B6D547ECEC7D9DC58FF325E32E2BA e:=sp2XDINV/0x3dd4900*3
2016/06/21 09:31:40.219 kid1| 90,3| store_client.cc(758) storePendingNClients: storePendingNClients: returning 0
2016/06/21 09:31:40.219 kid1| 20,3| store.cc(521) unlock: storeUnregister unlocking key B43B6D547ECEC7D9DC58FF325E32E2BA e:=sp2XDINV/0x3dd4900*3
2016/06/21 09:31:40.219 kid1| 20,3| store.cc(521) unlock: clientReplyContext::removeStoreReference unlocking key B43B6D547ECEC7D9DC58FF325E32E2BA e:=sp2XDINV/0x3dd4900*2
2016/06/21 09:31:40.219 kid1| 33,3| client_side_request.cc(248) ~ClientHttpRequest: httpRequestFree: http://www.sefaz.am.gov.br/
2016/06/21 09:31:40.219 kid1| 28,3| Checklist.cc(70) preCheck: 0x7ffc5d0c7c40 checking fast ACLs
2016/06/21 09:31:40.220 kid1| 28,3| RegexData.cc(51) match: aclRegexData::match: checking 'http://www.sefaz.am.gov.br/'
2016/06/21 09:31:40.220 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(HTTP://osce80-en.url.trendmicro.com)'
2016/06/21 09:31:40.220 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(urs.microsoft.com)'
2016/06/21 09:31:40.220 kid1| 28,3| Acl.cc(158) matches: checked: no_log = 0
2016/06/21 09:31:40.220 kid1| 28,3| Acl.cc(158) matches: checked: !no_log = 1
2016/06/21 09:31:40.220 kid1| 28,3| Acl.cc(158) matches: checked: (cache_access_log /var/log/squid/access.log line) = 1
2016/06/21 09:31:40.220 kid1| 28,3| Acl.cc(158) matches: checked: cache_access_log /var/log/squid/access.log = 1
2016/06/21 09:31:40.220 kid1| 28,3| Checklist.cc(63) markFinished: 0x7ffc5d0c7c40 answer ALLOWED for match
2016/06/21 09:31:40.220 kid1| 20,3| store.cc(521) unlock: ClientHttpRequest::loggingEntry unlocking key B43B6D547ECEC7D9DC58FF325E32E2BA e:=sp2XDINV/0x3dd4900*1
2016/06/21 09:31:40.220 kid1| 90,3| store_client.cc(758) storePendingNClients: storePendingNClients: returning 0
2016/06/21 09:31:40.220 kid1| 20,3| store.cc(1239) release: releasing e:=sp2XDINV/0x3dd4900*0 B43B6D547ECEC7D9DC58FF325E32E2BA
2016/06/21 09:31:40.220 kid1| 20,3| store.cc(402) destroyMemObject: destroyMemObject 0x3d24c00
2016/06/21 09:31:40.220 kid1| 20,3| MemObject.cc(110) ~MemObject: del MemObject 0x3d24c00
2016/06/21 09:31:40.220 kid1| 20,3| store.cc(420) destroyStoreEntry: destroyStoreEntry: destroying 0x3dd4908
2016/06/21 09:31:40.220 kid1| 20,3| store.cc(402) destroyMemObject: destroyMemObject 0
2016/06/21 09:31:40.220 kid1| 33,3| client_side.cc(5119) unpinConnection:
2016/06/21 09:31:40.221 kid1| 33,3| client_side.cc(847) ~ConnStateData: local=10.1.239.5:3128 remote=10.0.15.7:55261 flags=1
2016/06/21 09:31:40.221 kid1| 51,3| fd.cc(93) fd_close: fd_close FD 15 http://www.sefaz.am.gov.br/
2016/06/21 09:31:40.258 kid1| 5,2| TcpAcceptor.cc(220) doAccept: New connection on FD 11
2016/06/21 09:31:40.258 kid1| 5,2| TcpAcceptor.cc(295) acceptNext: connection on local=[::]:3128 remote=[::] FD 11 flags=9
2016/06/21 09:31:40.258 kid1| 51,3| fd.cc(198) fd_open: fd_open() FD 15 HTTP Request
2016/06/21 09:31:40.258 kid1| 28,3| Eui48.cc(520) lookup: id=0x41e65b4 10.0.15.7 NOT found
2016/06/21 09:31:40.259 kid1| 5,3| comm.cc(553) commSetConnTimeout: local=10.1.239.5:3128 remote=10.0.15.7:55345 FD 15 flags=1 timeout 300
2016/06/21 09:31:40.260 kid1| 5,3| IoCallback.cc(116) finish: called for local=10.1.239.5:3128 remote=10.0.15.7:55345 FD 15 flags=1 (0, 0)
2016/06/21 09:31:40.260 kid1| 5,3| Read.cc(91) ReadNow: local=10.1.239.5:3128 remote=10.0.15.7:55345 FD 15 flags=1, size 16384, retval 448, errno 0
2016/06/21 09:31:40.260 kid1| 33,3| client_side.cc(2259) parseHttpRequest: parseHttpRequest: req_hdr = {Host: www.sefaz.am.gov.br
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: pt-BR,pt;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://www.sefaz.am.gov.br/
Cookie: _ga=GA1.3.81554590.1466157108
Connection: keep-alive
Cache-Control: max-age=0

}
2016/06/21 09:31:40.260 kid1| 33,3| client_side.cc(2263) parseHttpRequest: parseHttpRequest: end = {
}
2016/06/21 09:31:40.260 kid1| 33,3| client_side.cc(2267) parseHttpRequest: parseHttpRequest: prefix_sz = 448, req_line_sz = 76
2016/06/21 09:31:40.260 kid1| 87,3| clientStream.cc(144) clientStreamInsertHead: clientStreamInsertHead: Inserted node 0x3fa6118 with data 0x3fc98a0 after head
2016/06/21 09:31:40.260 kid1| 11,2| client_side.cc(2346) parseHttpRequest: HTTP Client local=10.1.239.5:3128 remote=10.0.15.7:55345 FD 15 flags=1
2016/06/21 09:31:40.260 kid1| 11,2| client_side.cc(2347) parseHttpRequest: HTTP Client REQUEST:
---------
GET http://www.sefaz.am.gov.br/squid-internal-static/icons/SN.png HTTP/1.1
Host: www.sefaz.am.gov.br
User-Agent: Mozilla/5.0 (Windows NT 10.0; WOW64; rv:35.0) Gecko/20100101 Firefox/35.0
Accept: image/png,image/*;q=0.8,*/*;q=0.5
Accept-Language: pt-BR,pt;q=0.8,en-US;q=0.5,en;q=0.3
Accept-Encoding: gzip, deflate
Referer: http://www.sefaz.am.gov.br/
Cookie: _ga=GA1.3.81554590.1466157108
Connection: keep-alive
Cache-Control: max-age=0


----------
2016/06/21 09:31:40.260 kid1| 5,3| comm.cc(553) commSetConnTimeout: local=10.1.239.5:3128 remote=10.0.15.7:55345 FD 15 flags=1 timeout 86400
2016/06/21 09:31:40.260 kid1| 23,3| url.cc(359) urlParse: urlParse: Split URL 'http://www.sefaz.am.gov.br/squid-internal-static/icons/SN.png' into proto='http', host='www.sefaz.am.gov.br', port='80', path='/squid-internal-static/icons/SN.png'
2016/06/21 09:31:40.261 kid1| 14,3| Address.cc(389) lookupHostIP: Given Non-IP 'www.sefaz.am.gov.br': Name or service not known
2016/06/21 09:31:40.261 kid1| 33,2| client_side.cc(2725) clientProcessRequest: internal URL found: http://www.sefaz.am.gov.br:80 (global_internal_static on)
2016/06/21 09:31:40.261 kid1| 14,3| Address.cc(389) lookupHostIP: Given Non-IP 'squid.weg.net': Name or service not known
2016/06/21 09:31:40.261 kid1| 33,3| client_side.cc(874) clientSetKeepaliveFlag: http_ver = HTTP/1.1
2016/06/21 09:31:40.261 kid1| 33,3| client_side.cc(875) clientSetKeepaliveFlag: method = GET
2016/06/21 09:31:40.261 kid1| 85,3| client_side_request.cc(130) ClientRequestContext: 0x32a98f8 ClientRequestContext constructed
2016/06/21 09:31:40.261 kid1| 83,3| client_side_request.cc(1687) doCallouts: Doing calloutContext->hostHeaderVerify()
2016/06/21 09:31:40.261 kid1| 83,3| client_side_request.cc(1694) doCallouts: Doing calloutContext->clientAccessCheck()
2016/06/21 09:31:40.261 kid1| 28,3| Checklist.cc(70) preCheck: 0x3f826c8 checking slow rules
2016/06/21 09:31:40.261 kid1| 28,3| Acl.cc(158) matches: checked: CONNECT = 0
2016/06/21 09:31:40.261 kid1| 28,3| Acl.cc(158) matches: checked: http_access#1 = 0
2016/06/21 09:31:40.261 kid1| 28,3| RegexData.cc(51) match: aclRegexData::match: checking 'http://squid.weg.net:3128/squid-internal-static/icons/SN.png'
2016/06/21 09:31:40.261 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(^cache_object://)'
2016/06/21 09:31:40.261 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(^https?://[^/]+/squid-internal-mgr/)'
2016/06/21 09:31:40.261 kid1| 28,3| Acl.cc(158) matches: checked: manager = 0
2016/06/21 09:31:40.262 kid1| 28,3| Acl.cc(158) matches: checked: http_access#2 = 0
2016/06/21 09:31:40.262 kid1| 28,3| RegexData.cc(51) match: aclRegexData::match: checking 'http://squid.weg.net:3128/squid-internal-static/icons/SN.png'
2016/06/21 09:31:40.262 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(^cache_object://)'
2016/06/21 09:31:40.262 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(^https?://[^/]+/squid-internal-mgr/)'
2016/06/21 09:31:40.262 kid1| 28,3| Acl.cc(158) matches: checked: manager = 0
2016/06/21 09:31:40.262 kid1| 28,3| Acl.cc(158) matches: checked: http_access#3 = 0
2016/06/21 09:31:40.262 kid1| 28,3| RegexData.cc(51) match: aclRegexData::match: checking 'http://squid.weg.net:3128/squid-internal-static/icons/SN.png'
2016/06/21 09:31:40.262 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(swupmf.adobe.com)|(crl.adobe.com)|(www.basemetals.com/imagelibrary/ql/minesite.gif)|(www.basemetals.com/imagelibrary/ql/tbd-mj.gif)|(activate.pdfcreator-toolbar.org)|(apps.skype.com)|(imnotaproxy.com)|(kproxy.com)|(www.proxysite.com)|(officecdn.microsoft.com)|(officecdn.microsoft.com.edgesuite.net)'
2016/06/21 09:31:40.262 kid1| 28,3| Acl.cc(158) matches: checked: redlist = 0
2016/06/21 09:31:40.262 kid1| 28,3| Acl.cc(158) matches: checked: http_access#4 = 0
2016/06/21 09:31:40.262 kid1| 28,3| RegexData.cc(51) match: aclRegexData::match: checking 'http://squid.weg.net:3128/squid-internal-static/icons/SN.png'
2016/06/21 09:31:40.262 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(mail.google.com)|(gmail.com)'
2016/06/21 09:31:40.262 kid1| 28,3| Acl.cc(158) matches: checked: gmail = 0
2016/06/21 09:31:40.262 kid1| 28,3| Acl.cc(158) matches: checked: http_access#5 = 0
2016/06/21 09:31:40.262 kid1| 28,3| RegexData.cc(51) match: aclRegexData::match: checking 'http://squid.weg.net:3128/squid-internal-static/icons/SN.png'
2016/06/21 09:31:40.262 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '...'
2016/06/21 09:31:40.264 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '...'
2016/06/21 09:31:40.265 kid1| 28,2| RegexData.cc(73) match: aclRegexData::match: match '...' found in 'http://squid.weg.net:3128/squid-internal-static/icons/SN.png'
2016/06/21 09:31:40.265 kid1| 28,3| Acl.cc(158) matches: checked: whitelist = 1
2016/06/21 09:31:40.265 kid1| 28,3| Acl.cc(158) matches: checked: http_access#6 = 1
2016/06/21 09:31:40.265 kid1| 28,3| Acl.cc(158) matches: checked: http_access = 1
2016/06/21 09:31:40.265 kid1| 28,3| Checklist.cc(63) markFinished: 0x3f826c8 answer ALLOWED for match
2016/06/21 09:31:40.265 kid1| 28,3| Checklist.cc(163) checkCallback: ACLChecklist::checkCallback: 0x3f826c8 answer=ALLOWED
2016/06/21 09:31:40.265 kid1| 85,2| client_side_request.cc(744) clientAccessCheckDone: The request GET http://www.sefaz.am.gov.br/squid-internal-static/icons/SN.png is ALLOWED; last ACL checked: whitelist
2016/06/21 09:31:40.265 kid1| 83,3| AccessCheck.cc(42) Start: adaptation off, skipping
2016/06/21 09:31:40.265 kid1| 83,3| client_side_request.cc(1714) doCallouts: Doing calloutContext->clientRedirectStart()
2016/06/21 09:31:40.268 kid1| 5,3| IoCallback.cc(116) finish: called for local=[::] remote=[::] FD 16 flags=1 (0, 0)
2016/06/21 09:31:40.275 kid1| 5,3| Read.cc(144) HandleRead: FD 16, size 4095, retval 1, errno 0
2016/06/21 09:31:40.275 kid1| 5,3| IoCallback.cc(116) finish: called for local=[::] remote=[::] FD 16 flags=1 (0, 0)
2016/06/21 09:31:40.275 kid1| 84,3| helper.cc(892) helperHandleRead: helperHandleRead: end of reply found
2016/06/21 09:31:40.275 kid1| 84,3| Reply.cc(29) parse: Parsing helper buffer
2016/06/21 09:31:40.275 kid1| 84,3| Reply.cc(35) parse: Reply length is smaller than 1 or none at all
2016/06/21 09:31:40.275 kid1| 83,3| client_side_request.cc(1722) doCallouts: Doing calloutContext->clientAccessCheck2()
2016/06/21 09:31:40.275 kid1| 85,2| client_side_request.cc(720) clientAccessCheck2: No adapted_http_access configuration. default: ALLOW
2016/06/21 09:31:40.275 kid1| 85,2| client_side_request.cc(744) clientAccessCheckDone: The request GET http://squid.weg.net:3128/squid-internal-static/icons/SN.png is ALLOWED; last ACL checked: whitelist
2016/06/21 09:31:40.276 kid1| 83,3| client_side_request.cc(1740) doCallouts: Doing clientInterpretRequestHeaders()
2016/06/21 09:31:40.276 kid1| 83,3| client_side_request.cc(1749) doCallouts: Doing calloutContext->checkNoCache()
2016/06/21 09:31:40.276 kid1| 28,3| Checklist.cc(70) preCheck: 0x3f826c8 checking slow rules
2016/06/21 09:31:40.276 kid1| 28,3| RegexData.cc(51) match: aclRegexData::match: checking '/squid-internal-static/icons/SN.png'
2016/06/21 09:31:40.276 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(cgi-bin)|(\?)'
2016/06/21 09:31:40.276 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(bradesco)'
2016/06/21 09:31:40.276 kid1| 28,3| Acl.cc(158) matches: checked: QUERY = 0
2016/06/21 09:31:40.276 kid1| 28,3| Acl.cc(158) matches: checked: no_cache#1 = 0
2016/06/21 09:31:40.276 kid1| 28,3| Acl.cc(158) matches: checked: no_cache = 0
2016/06/21 09:31:40.276 kid1| 28,3| Checklist.cc(386) calcImplicitAnswer: 0x3f826c8 NO match found, last action DENIED so returning ALLOWED
2016/06/21 09:31:40.276 kid1| 28,3| Checklist.cc(63) markFinished: 0x3f826c8 answer ALLOWED for implicit rule won
2016/06/21 09:31:40.276 kid1| 28,3| Checklist.cc(163) checkCallback: ACLChecklist::checkCallback: 0x3f826c8 answer=ALLOWED
2016/06/21 09:31:40.276 kid1| 85,3| client_side_request.cc(115) ~ClientRequestContext: 0x32a98f8 ClientRequestContext destructed
2016/06/21 09:31:40.276 kid1| 83,3| client_side_request.cc(1831) doCallouts: calling processRequest()
2016/06/21 09:31:40.277 kid1| 87,3| clientStream.cc(184) clientStreamRead: clientStreamRead: Calling 1 with cbdata 0x3fca990 from node 0x3fa6118
2016/06/21 09:31:40.277 kid1| 73,3| HttpRequest.cc(687) storeId: sent back canonicalUrl:http://squid.weg.net:3128/squid-internal-static/icons/SN.png
2016/06/21 09:31:40.277 kid1| 20,3| store_dir.cc(1073) get: storeGet: looking up FC0B8986D35D532EC3BAC3069A5BF36A
2016/06/21 09:31:40.277 kid1| 20,3| store_dir.cc(697) find: got in-transit entry: e:=msSV/0x3bd0a30*0
2016/06/21 09:31:40.277 kid1| 85,3| client_side_reply.cc(1670) identifyFoundObject: ENTRY_SPECIAL HIT e:=msSV/0x3bd0a30*0
2016/06/21 09:31:40.277 kid1| 20,3| store.cc(483) lock: clientReplyContext::doGetMoreData locked key FC0B8986D35D532EC3BAC3069A5BF36A e:=msSV/0x3bd0a30*1
2016/06/21 09:31:40.277 kid1| 90,3| store_client.cc(200) copy: store_client::copy: FC0B8986D35D532EC3BAC3069A5BF36A, from 0, for length 4096, cb 1, cbdata 0x3fc98d8
2016/06/21 09:31:40.277 kid1| 20,3| store.cc(483) lock: store_client::copy locked key FC0B8986D35D532EC3BAC3069A5BF36A e:=msSV/0x3bd0a30*2
2016/06/21 09:31:40.277 kid1| 90,3| store_client.cc(297) storeClientCopy2: storeClientCopy2: FC0B8986D35D532EC3BAC3069A5BF36A
2016/06/21 09:31:40.277 kid1| 90,3| store_client.cc(433) scheduleMemRead: store_client::doCopy: Copying normal from memory
2016/06/21 09:31:40.277 kid1| 88,3| client_side_reply.cc(462) cacheHit: clientCacheHit: http://squid.weg.net:3128/squid-internal-static/icons/SN.png, 154 bytes
2016/06/21 09:31:40.277 kid1| 73,3| HttpRequest.cc(687) storeId: sent back canonicalUrl:http://squid.weg.net:3128/squid-internal-static/icons/SN.png
2016/06/21 09:31:40.278 kid1| 88,2| client_side_reply.cc(1999) processReplyAccessResult: The reply for GET http://squid.weg.net:3128/squid-internal-static/icons/SN.png is ALLOWED, because it matched QUERY
2016/06/21 09:31:40.278 kid1| 20,3| store.cc(483) lock: ClientHttpRequest::loggingEntry locked key FC0B8986D35D532EC3BAC3069A5BF36A e:=msSV/0x3bd0a30*3
2016/06/21 09:31:40.278 kid1| 88,3| client_side_reply.cc(2037) processReplyAccessResult: clientReplyContext::sendMoreData: Appending 0 bytes after 154 bytes of headers
2016/06/21 09:31:40.278 kid1| 87,3| clientStream.cc(162) clientStreamCallback: clientStreamCallback: Calling 1 with cbdata 0x3fc98a0 from node 0x3fc7f48
2016/06/21 09:31:40.278 kid1| 11,2| client_side.cc(1392) sendStartOfMessage: HTTP Client local=10.1.239.5:3128 remote=10.0.15.7:55345 FD 15 flags=1
2016/06/21 09:31:40.278 kid1| 11,2| client_side.cc(1393) sendStartOfMessage: HTTP Client REPLY:
---------
HTTP/1.1 204 No Content
Date: Tue, 21 Jun 2016 12:31:40 GMT
Server: squid/3.5.19
Mime-Version: 1.0
Content-Length: 0
Cache-Control: max-age=86400
X-Cache: HIT from squid.weg.net
X-Cache-Lookup: HIT from squid.weg.net:3128
Via: 1.1 squid.weg.net (squid/3.5.19)
Connection: keep-alive


----------
2016/06/21 09:31:40.278 kid1| 20,3| store.cc(521) unlock: store_client::copy unlocking key FC0B8986D35D532EC3BAC3069A5BF36A e:=msSV/0x3bd0a30*3
2016/06/21 09:31:40.278 kid1| 5,3| IoCallback.cc(116) finish: called for local=10.1.239.5:3128 remote=10.0.15.7:55345 FD 15 flags=1 (0, 0)
2016/06/21 09:31:40.278 kid1| 88,3| client_side_reply.cc(1096) storeOKTransferDone: storeOKTransferDone out.offset=0 objectLen()=154 headers_sz=154
2016/06/21 09:31:40.278 kid1| 33,3| client_side.cc(1542) keepaliveNextRequest: ConnnStateData(local=10.1.239.5:3128 remote=10.0.15.7:55345 FD 15 flags=1), Context(local=10.1.239.5:3128 remote=10.0.15.7:55345 FD 15 flags=1)
2016/06/21 09:31:40.278 kid1| 87,3| clientStream.cc(202) clientStreamDetach: clientStreamDetach: Detaching node 0x3fa6118
2016/06/21 09:31:40.278 kid1| 87,3| clientStream.cc(287) clientStreamFree: Freeing clientStreamNode 0x3fa6118
2016/06/21 09:31:40.279 kid1| 33,3| client_side_request.cc(248) ~ClientHttpRequest: httpRequestFree: http://squid.weg.net:3128/squid-internal-static/icons/SN.png
2016/06/21 09:31:40.279 kid1| 28,3| Checklist.cc(70) preCheck: 0x7ffc5d0c7ae0 checking fast ACLs
2016/06/21 09:31:40.279 kid1| 28,3| RegexData.cc(51) match: aclRegexData::match: checking 'http://squid.weg.net:3128/squid-internal-static/icons/SN.png'
2016/06/21 09:31:40.279 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(HTTP://osce80-en.url.trendmicro.com)'
2016/06/21 09:31:40.279 kid1| 28,3| RegexData.cc(62) match: aclRegexData::match: looking for '(urs.microsoft.com)'
2016/06/21 09:31:40.279 kid1| 28,3| Acl.cc(158) matches: checked: no_log = 0
2016/06/21 09:31:40.279 kid1| 28,3| Acl.cc(158) matches: checked: !no_log = 1
2016/06/21 09:31:40.279 kid1| 28,3| Acl.cc(158) matches: checked: (cache_access_log /var/log/squid/access.log line) = 1
2016/06/21 09:31:40.279 kid1| 28,3| Acl.cc(158) matches: checked: cache_access_log /var/log/squid/access.log = 1
2016/06/21 09:31:40.279 kid1| 28,3| Checklist.cc(63) markFinished: 0x7ffc5d0c7ae0 answer ALLOWED for match
2016/06/21 09:31:40.279 kid1| 20,3| store.cc(521) unlock: ClientHttpRequest::loggingEntry unlocking key FC0B8986D35D532EC3BAC3069A5BF36A e:=msSV/0x3bd0a30*2
2016/06/21 09:31:40.279 kid1| 87,3| clientStream.cc(247) clientStreamAbort: clientStreamAbort: Aborting stream with tail 0x3fc7f48
2016/06/21 09:31:40.279 kid1| 87,3| clientStream.cc(202) clientStreamDetach: clientStreamDetach: Detaching node 0x3fc7f48
2016/06/21 09:31:40.280 kid1| 87,3| clientStream.cc(223) clientStreamDetach: clientStreamDetach: Calling 1 with cbdata 0x3fca990
2016/06/21 09:31:40.280 kid1| 87,3| clientStream.cc(287) clientStreamFree: Freeing clientStreamNode 0x3fc7f48
2016/06/21 09:31:40.280 kid1| 90,3| store_client.cc(664) storeUnregister: storeUnregister: called for 'FC0B8986D35D532EC3BAC3069A5BF36A'
2016/06/21 09:31:40.280 kid1| 20,3| store_swapout.cc(356) mayStartSwapOut: already rejected
2016/06/21 09:31:40.280 kid1| 20,3| store.cc(483) lock: storeUnregister locked key FC0B8986D35D532EC3BAC3069A5BF36A e:=msSV/0x3bd0a30*2
2016/06/21 09:31:40.280 kid1| 90,3| store_client.cc(758) storePendingNClients: storePendingNClients: returning 0
2016/06/21 09:31:40.280 kid1| 20,3| store.cc(521) unlock: storeUnregister unlocking key FC0B8986D35D532EC3BAC3069A5BF36A e:=msSV/0x3bd0a30*2
2016/06/21 09:31:40.280 kid1| 20,3| store.cc(521) unlock: clientReplyContext::removeStoreReference unlocking key FC0B8986D35D532EC3BAC3069A5BF36A e:=msSV/0x3bd0a30*1
2016/06/21 09:31:40.280 kid1| 90,3| store_client.cc(758) storePendingNClients: storePendingNClients: returning 0
2016/06/21 09:31:40.280 kid1| 33,3| client_side.cc(1612) keepaliveNextRequest: local=10.1.239.5:3128 remote=10.0.15.7:55345 FD 15 flags=1: calling conn->readNextRequest()
2016/06/21 09:31:40.280 kid1| 5,3| comm.cc(553) commSetConnTimeout: local=10.1.239.5:3128 remote=10.0.15.7:55345 FD 15 flags=1 timeout 120

Alguém poderia dar uma luz o que pode ser?


  






Patrocínio

Site hospedado pelo provedor RedeHost.
Linux banner
Linux banner

Destaques

Artigos

Dicas

Tópicos

Top 10 do mês

Scripts