LVS
lvs-users
Google
 
Web LinuxVirtualServer.org

Re: [lvs-users] Fallback server alive check error - Inaccessible real se

To: "LinuxVirtualServer.org users mailing list." <lvs-users@xxxxxxxxxxxxxxxxxxxxxx>
Subject: Re: [lvs-users] Fallback server alive check error - Inaccessible real server: 127.0.0.1:80 (192.168.0.6:80)
From: Eelco Jepkema <eelco@xxxxxxxxxxxx>
Date: Wed, 01 Jul 2009 10:46:22 +0200
Just to keep replying to myself, I've added a strace of the ldirectord process to this mail in hopes that someone with some more programming experience might see something strange. The mail get's sent on timestamp 10:32:24.464092 in this strace.

Best regards,
Eelco Jepkema
10:32:17.813982 restart_syscall(<... resuming interrupted call ...>) = 0
10:32:18.389959 time(NULL)              = 1246437138
10:32:18.390046 time(NULL)              = 1246437138
10:32:18.390574 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:18.390670 rt_sigaction(SIGALRM, {SIG_DFL}, {SIG_DFL}, 8) = 0
10:32:18.390745 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:18.390812 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:18.390884 rt_sigaction(SIGALRM, {0x809a270, [], 0}, {SIG_DFL}, 8) = 0
10:32:18.390963 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:18.391037 alarm(10)               = 0
10:32:18.391621 socket(PF_INET, SOCK_STREAM, IPPROTO_TCP) = 4
10:32:18.391705 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:18.391809 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:18.391878 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:18.391940 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:18.391998 fcntl64(4, F_SETFD, FD_CLOEXEC) = 0
10:32:18.392113 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:18.392181 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:18.392252 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.4")}, 16) = -1 EINPROGRESS (Operation now in 
progress)
10:32:18.392480 select(8, NULL, [4], NULL, {180, 0}) = 1 (out [4], left {180, 
0})
10:32:18.392642 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.4")}, 16) = 0
10:32:18.392726 fcntl64(4, F_GETFL)     = 0x802 (flags O_RDWR|O_NONBLOCK)
10:32:18.392788 fcntl64(4, F_SETFL, O_RDWR) = 0
10:32:18.392904 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:18.392963 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:18.393267 write(4, "GET /alive HTTP/1.1\r\nTE: deflate,"..., 121) = 121
10:32:18.393417 time(NULL)              = 1246437138
10:32:18.393487 select(8, [4], NULL, NULL, {180, 0}) = 1 (in [4], left {180, 0})
10:32:18.393825 read(4, "HTTP/1.1 200 OK\r\nDate: Wed, 01 Ju"..., 1024) = 239
10:32:18.394330 getpeername(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.4")}, [16]) = 0
10:32:18.394698 close(4)                = 0
10:32:18.394805 time(NULL)              = 1246437138
10:32:18.394962 alarm(0)                = 10
10:32:18.395028 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:18.395102 rt_sigaction(SIGALRM, {SIG_DFL}, {0x809a270, [], 0}, 8) = 0
10:32:18.395179 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:18.395603 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:18.395682 rt_sigaction(SIGALRM, {SIG_DFL}, {SIG_DFL}, 8) = 0
10:32:18.395756 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:18.395822 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:18.395894 rt_sigaction(SIGALRM, {0x809a270, [], 0}, {SIG_DFL}, 8) = 0
10:32:18.395970 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:18.396042 alarm(10)               = 0
10:32:18.396442 socket(PF_INET, SOCK_STREAM, IPPROTO_TCP) = 4
10:32:18.396514 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:18.396580 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:18.396642 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:18.396704 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:18.396767 fcntl64(4, F_SETFD, FD_CLOEXEC) = 0
10:32:18.396858 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:18.396919 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:18.396985 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.5")}, 16) = -1 EINPROGRESS (Operation now in 
progress)
10:32:18.397153 select(8, NULL, [4], NULL, {180, 0}) = 1 (out [4], left {179, 
990000})
10:32:18.400352 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.5")}, 16) = 0
10:32:18.400438 fcntl64(4, F_GETFL)     = 0x802 (flags O_RDWR|O_NONBLOCK)
10:32:18.400500 fcntl64(4, F_SETFL, O_RDWR) = 0
10:32:18.400603 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:18.400664 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:18.400950 write(4, "GET /alive HTTP/1.1\r\nTE: deflate,"..., 121) = 121
10:32:18.401075 time(NULL)              = 1246437138
10:32:18.401147 select(8, [4], NULL, NULL, {180, 0}) = 1 (in [4], left {180, 0})
10:32:18.404659 read(4, "HTTP/1.1 200 OK\r\nDate: Wed, 01 Ju"..., 1024) = 239
10:32:18.405115 getpeername(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.5")}, [16]) = 0
10:32:18.405424 close(4)                = 0
10:32:18.405528 time(NULL)              = 1246437138
10:32:18.405646 alarm(0)                = 10
10:32:18.405711 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:18.405786 rt_sigaction(SIGALRM, {SIG_DFL}, {0x809a270, [], 0}, 8) = 0
10:32:18.405862 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:18.406061 stat64("/etc/ha.d/ldirectord.cf", {st_mode=S_IFREG|0644, 
st_size=553, ...}) = 0
10:32:18.406192 time(NULL)              = 1246437138
10:32:18.406252 rt_sigprocmask(SIG_BLOCK, [CHLD], [], 8) = 0
10:32:18.406322 rt_sigaction(SIGCHLD, NULL, {SIG_DFL}, 8) = 0
10:32:18.406387 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:18.406448 nanosleep({2, 0}, {2, 0}) = 0
10:32:20.409967 time(NULL)              = 1246437140
10:32:20.410041 time(NULL)              = 1246437140
10:32:20.410459 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:20.410541 rt_sigaction(SIGALRM, {SIG_DFL}, {SIG_DFL}, 8) = 0
10:32:20.410616 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:20.410682 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:20.410755 rt_sigaction(SIGALRM, {0x809a270, [], 0}, {SIG_DFL}, 8) = 0
10:32:20.410831 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:20.410904 alarm(10)               = 0
10:32:20.411392 socket(PF_INET, SOCK_STREAM, IPPROTO_TCP) = 4
10:32:20.411468 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:20.411536 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:20.411600 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:20.411662 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:20.411721 fcntl64(4, F_SETFD, FD_CLOEXEC) = 0
10:32:20.411820 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:20.411881 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:20.411947 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.4")}, 16) = -1 EINPROGRESS (Operation now in 
progress)
10:32:20.412146 select(8, NULL, [4], NULL, {180, 0}) = 1 (out [4], left {180, 
0})
10:32:20.412302 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.4")}, 16) = 0
10:32:20.412388 fcntl64(4, F_GETFL)     = 0x802 (flags O_RDWR|O_NONBLOCK)
10:32:20.412449 fcntl64(4, F_SETFL, O_RDWR) = 0
10:32:20.412560 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:20.412620 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:20.412908 write(4, "GET /alive HTTP/1.1\r\nTE: deflate,"..., 121) = 121
10:32:20.413050 time(NULL)              = 1246437140
10:32:20.413121 select(8, [4], NULL, NULL, {180, 0}) = 1 (in [4], left {180, 0})
10:32:20.413404 read(4, "HTTP/1.1 200 OK\r\nDate: Wed, 01 Ju"..., 1024) = 239
10:32:20.413888 getpeername(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.4")}, [16]) = 0
10:32:20.414229 close(4)                = 0
10:32:20.414335 time(NULL)              = 1246437140
10:32:20.414487 alarm(0)                = 10
10:32:20.414552 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:20.414626 rt_sigaction(SIGALRM, {SIG_DFL}, {0x809a270, [], 0}, 8) = 0
10:32:20.414704 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:20.415109 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:20.415188 rt_sigaction(SIGALRM, {SIG_DFL}, {SIG_DFL}, 8) = 0
10:32:20.415262 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:20.415328 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:20.415400 rt_sigaction(SIGALRM, {0x809a270, [], 0}, {SIG_DFL}, 8) = 0
10:32:20.415476 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:20.415548 alarm(10)               = 0
10:32:20.415945 socket(PF_INET, SOCK_STREAM, IPPROTO_TCP) = 4
10:32:20.416036 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:20.416103 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:20.416165 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:20.416226 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:20.416285 fcntl64(4, F_SETFD, FD_CLOEXEC) = 0
10:32:20.416376 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:20.416437 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:20.416503 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.5")}, 16) = -1 EINPROGRESS (Operation now in 
progress)
10:32:20.416667 select(8, NULL, [4], NULL, {180, 0}) = 1 (out [4], left {180, 
0})
10:32:20.419890 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.5")}, 16) = 0
10:32:20.419986 fcntl64(4, F_GETFL)     = 0x802 (flags O_RDWR|O_NONBLOCK)
10:32:20.420048 fcntl64(4, F_SETFL, O_RDWR) = 0
10:32:20.420151 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:20.420212 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:20.420475 write(4, "GET /alive HTTP/1.1\r\nTE: deflate,"..., 121) = 121
10:32:20.420593 time(NULL)              = 1246437140
10:32:20.420670 select(8, [4], NULL, NULL, {180, 0}) = 1 (in [4], left {180, 0})
10:32:20.424226 read(4, "HTTP/1.1 200 OK\r\nDate: Wed, 01 Ju"..., 1024) = 239
10:32:20.424676 getpeername(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.5")}, [16]) = 0
10:32:20.424982 close(4)                = 0
10:32:20.425080 time(NULL)              = 1246437140
10:32:20.425203 alarm(0)                = 10
10:32:20.425267 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:20.425341 rt_sigaction(SIGALRM, {SIG_DFL}, {0x809a270, [], 0}, 8) = 0
10:32:20.425418 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:20.425613 stat64("/etc/ha.d/ldirectord.cf", {st_mode=S_IFREG|0644, 
st_size=553, ...}) = 0
10:32:20.425729 time(NULL)              = 1246437140
10:32:20.425788 rt_sigprocmask(SIG_BLOCK, [CHLD], [], 8) = 0
10:32:20.425858 rt_sigaction(SIGCHLD, NULL, {SIG_DFL}, 8) = 0
10:32:20.425923 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:20.425983 nanosleep({2, 0}, {2, 0}) = 0
10:32:22.429991 time(NULL)              = 1246437142
10:32:22.430088 time(NULL)              = 1246437142
10:32:22.430687 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:22.430772 rt_sigaction(SIGALRM, {SIG_DFL}, {SIG_DFL}, 8) = 0
10:32:22.430848 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:22.430916 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:22.430989 rt_sigaction(SIGALRM, {0x809a270, [], 0}, {SIG_DFL}, 8) = 0
10:32:22.431066 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:22.431140 alarm(10)               = 0
10:32:22.431785 socket(PF_INET, SOCK_STREAM, IPPROTO_TCP) = 4
10:32:22.431867 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:22.431941 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:22.432005 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:22.432067 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:22.432126 fcntl64(4, F_SETFD, FD_CLOEXEC) = 0
10:32:22.432244 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:22.432306 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:22.432372 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.4")}, 16) = -1 EINPROGRESS (Operation now in 
progress)
10:32:22.432602 select(8, NULL, [4], NULL, {180, 0}) = 1 (out [4], left {180, 
0})
10:32:22.432770 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.4")}, 16) = 0
10:32:22.432855 fcntl64(4, F_GETFL)     = 0x802 (flags O_RDWR|O_NONBLOCK)
10:32:22.432917 fcntl64(4, F_SETFL, O_RDWR) = 0
10:32:22.433037 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:22.433096 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:22.433417 write(4, "GET /alive HTTP/1.1\r\nTE: deflate,"..., 121) = 121
10:32:22.433569 time(NULL)              = 1246437142
10:32:22.433653 select(8, [4], NULL, NULL, {180, 0}) = 1 (in [4], left {180, 0})
10:32:22.433981 read(4, "HTTP/1.1 200 OK\r\nDate: Wed, 01 Ju"..., 1024) = 239
10:32:22.434506 getpeername(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.4")}, [16]) = 0
10:32:22.434905 close(4)                = 0
10:32:22.435009 time(NULL)              = 1246437142
10:32:22.435171 alarm(0)                = 10
10:32:22.435237 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:22.435312 rt_sigaction(SIGALRM, {SIG_DFL}, {0x809a270, [], 0}, 8) = 0
10:32:22.435389 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:22.435833 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:22.435914 rt_sigaction(SIGALRM, {SIG_DFL}, {SIG_DFL}, 8) = 0
10:32:22.435988 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:22.436054 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:22.436126 rt_sigaction(SIGALRM, {0x809a270, [], 0}, {SIG_DFL}, 8) = 0
10:32:22.436202 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:22.436274 alarm(10)               = 0
10:32:22.436689 socket(PF_INET, SOCK_STREAM, IPPROTO_TCP) = 4
10:32:22.436762 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:22.436829 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:22.436892 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:22.436953 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:22.437012 fcntl64(4, F_SETFD, FD_CLOEXEC) = 0
10:32:22.437104 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:22.437165 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:22.437231 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.5")}, 16) = -1 EINPROGRESS (Operation now in 
progress)
10:32:22.437394 select(8, NULL, [4], NULL, {180, 0}) = 1 (out [4], left {179, 
990000})
10:32:22.440607 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.5")}, 16) = 0
10:32:22.440693 fcntl64(4, F_GETFL)     = 0x802 (flags O_RDWR|O_NONBLOCK)
10:32:22.440754 fcntl64(4, F_SETFL, O_RDWR) = 0
10:32:22.440858 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:22.440918 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:22.441185 write(4, "GET /alive HTTP/1.1\r\nTE: deflate,"..., 121) = 121
10:32:22.441311 time(NULL)              = 1246437142
10:32:22.441377 select(8, [4], NULL, NULL, {180, 0}) = 1 (in [4], left {180, 0})
10:32:22.444948 read(4, "HTTP/1.1 200 OK\r\nDate: Wed, 01 Ju"..., 1024) = 239
10:32:22.445409 getpeername(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.5")}, [16]) = 0
10:32:22.445720 close(4)                = 0
10:32:22.445816 time(NULL)              = 1246437142
10:32:22.445935 alarm(0)                = 10
10:32:22.446000 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:22.446074 rt_sigaction(SIGALRM, {SIG_DFL}, {0x809a270, [], 0}, 8) = 0
10:32:22.446152 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:22.446350 stat64("/etc/ha.d/ldirectord.cf", {st_mode=S_IFREG|0644, 
st_size=553, ...}) = 0
10:32:22.446470 time(NULL)              = 1246437142
10:32:22.446530 rt_sigprocmask(SIG_BLOCK, [CHLD], [], 8) = 0
10:32:22.446600 rt_sigaction(SIGCHLD, NULL, {SIG_DFL}, 8) = 0
10:32:22.446665 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:22.446726 nanosleep({2, 0}, {2, 0}) = 0
10:32:24.449957 time(NULL)              = 1246437144
10:32:24.450026 time(NULL)              = 1246437144
10:32:24.450156 time(NULL)              = 1246437144
10:32:24.450221 stat64("/etc/localtime", {st_mode=S_IFREG|0644, st_size=2917, 
...}) = 0
10:32:24.450495 time(NULL)              = 1246437144
10:32:24.450556 stat64("/etc/localtime", {st_mode=S_IFREG|0644, st_size=2917, 
...}) = 0
10:32:24.450660 time(NULL)              = 1246437144
10:32:24.450717 stat64("/etc/localtime", {st_mode=S_IFREG|0644, st_size=2917, 
...}) = 0
10:32:24.450818 stat64("/etc/localtime", {st_mode=S_IFREG|0644, st_size=2917, 
...}) = 0
10:32:24.450920 stat64("/etc/localtime", {st_mode=S_IFREG|0644, st_size=2917, 
...}) = 0
10:32:24.451079 select(8, [3], NULL, [3], {0, 0}) = 0 (Timeout)
10:32:24.451174 write(3, "<134>Jul  1 10:32:24 ldirectord[1"..., 110) = 110
10:32:24.451366 stat64("/usr/lib/sendmail", {st_mode=S_IFREG|0755, 
st_size=22084, ...}) = 0
10:32:24.451478 stat64("/usr/lib/sendmail", {st_mode=S_IFREG|0755, 
st_size=22084, ...}) = 0
10:32:24.451734 pipe([4, 5])            = 0
10:32:24.451818 clone(child_stack=0, 
flags=CLONE_CHILD_CLEARTID|CLONE_CHILD_SETTID|SIGCHLD, child_tidptr=0xb7da16f8) 
= 2639
10:32:24.463483 dup2(5, 4)              = 4
10:32:24.463551 close(5)                = 0
10:32:24.463634 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffa48) = -1 EINVAL 
(Invalid argument)
10:32:24.463703 _llseek(4, 0, 0xbfeffa90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:24.463767 fcntl64(4, F_SETFD, FD_CLOEXEC) = 0
10:32:24.464092 write(4, "Subject: Inaccessible real server"..., 185) = 185
10:32:24.464171 close(4)                = 0
10:32:24.464233 rt_sigaction(SIGHUP, {SIG_IGN}, {0x809a270, [], 0}, 8) = 0
10:32:24.464311 rt_sigaction(SIGINT, {SIG_IGN}, {0x809a270, [], 0}, 8) = 0
10:32:24.464387 rt_sigaction(SIGQUIT, {SIG_IGN}, {0x809a270, [], 0}, 8) = 0
10:32:24.464461 waitpid(2639, [{WIFEXITED(s) && WEXITSTATUS(s) == 0}], 0) = 2639
10:32:24.475799 --- SIGCHLD (Child exited) @ 0 (0) ---
10:32:24.475847 rt_sigaction(SIGHUP, {0x809a270, [], 0}, NULL, 8) = 0
10:32:24.475918 rt_sigaction(SIGINT, {0x809a270, [], 0}, NULL, 8) = 0
10:32:24.475986 rt_sigaction(SIGQUIT, {0x809a270, [], 0}, NULL, 8) = 0
10:32:24.476909 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:24.477004 rt_sigaction(SIGALRM, {SIG_DFL}, {SIG_DFL}, 8) = 0
10:32:24.477079 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:24.477145 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:24.477218 rt_sigaction(SIGALRM, {0x809a270, [], 0}, {SIG_DFL}, 8) = 0
10:32:24.477293 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:24.477368 alarm(10)               = 0
10:32:24.478284 socket(PF_INET, SOCK_STREAM, IPPROTO_TCP) = 4
10:32:24.478361 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:24.478429 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:24.478492 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:24.478554 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:24.478613 fcntl64(4, F_SETFD, FD_CLOEXEC) = 0
10:32:24.478744 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:24.478806 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:24.478873 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.4")}, 16) = -1 EINPROGRESS (Operation now in 
progress)
10:32:24.479223 select(8, NULL, [4], NULL, {180, 0}) = 1 (out [4], left {180, 
0})
10:32:24.479337 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.4")}, 16) = 0
10:32:24.479424 fcntl64(4, F_GETFL)     = 0x802 (flags O_RDWR|O_NONBLOCK)
10:32:24.479485 fcntl64(4, F_SETFL, O_RDWR) = 0
10:32:24.479631 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:24.479691 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:24.480082 write(4, "GET /alive HTTP/1.1\r\nTE: deflate,"..., 121) = 121
10:32:24.480252 time(NULL)              = 1246437144
10:32:24.480339 select(8, [4], NULL, NULL, {180, 0}) = 1 (in [4], left {180, 0})
10:32:24.480594 read(4, "HTTP/1.1 200 OK\r\nDate: Wed, 01 Ju"..., 1024) = 239
10:32:24.481222 getpeername(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.4")}, [16]) = 0
10:32:24.481654 close(4)                = 0
10:32:24.481757 time(NULL)              = 1246437144
10:32:24.481920 alarm(0)                = 10
10:32:24.481987 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:24.482062 rt_sigaction(SIGALRM, {SIG_DFL}, {0x809a270, [], 0}, 8) = 0
10:32:24.482139 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:24.482628 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:24.482709 rt_sigaction(SIGALRM, {SIG_DFL}, {SIG_DFL}, 8) = 0
10:32:24.482783 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:24.482849 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:24.482942 rt_sigaction(SIGALRM, {0x809a270, [], 0}, {SIG_DFL}, 8) = 0
10:32:24.483019 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:24.483092 alarm(10)               = 0
10:32:24.483512 socket(PF_INET, SOCK_STREAM, IPPROTO_TCP) = 4
10:32:24.483584 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:24.483651 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:24.483714 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:24.483775 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:24.483834 fcntl64(4, F_SETFD, FD_CLOEXEC) = 0
10:32:24.483926 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:24.483988 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:24.484053 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.5")}, 16) = -1 EINPROGRESS (Operation now in 
progress)
10:32:24.484217 select(8, NULL, [4], NULL, {180, 0}) = 1 (out [4], left {180, 
0})
10:32:24.487493 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.5")}, 16) = 0
10:32:24.487590 fcntl64(4, F_GETFL)     = 0x802 (flags O_RDWR|O_NONBLOCK)
10:32:24.487653 fcntl64(4, F_SETFL, O_RDWR) = 0
10:32:24.487771 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:24.487832 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:24.488147 write(4, "GET /alive HTTP/1.1\r\nTE: deflate,"..., 121) = 121
10:32:24.488280 time(NULL)              = 1246437144
10:32:24.488351 select(8, [4], NULL, NULL, {180, 0}) = 1 (in [4], left {179, 
990000})
10:32:24.491855 read(4, "HTTP/1.1 200 OK\r\nDate: Wed, 01 Ju"..., 1024) = 239
10:32:24.492377 getpeername(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.5")}, [16]) = 0
10:32:24.492745 close(4)                = 0
10:32:24.492847 time(NULL)              = 1246437144
10:32:24.492980 alarm(0)                = 10
10:32:24.493046 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:24.493121 rt_sigaction(SIGALRM, {SIG_DFL}, {0x809a270, [], 0}, 8) = 0
10:32:24.493199 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:24.493444 stat64("/etc/ha.d/ldirectord.cf", {st_mode=S_IFREG|0644, 
st_size=553, ...}) = 0
10:32:24.493563 time(NULL)              = 1246437144
10:32:24.493623 rt_sigprocmask(SIG_BLOCK, [CHLD], [], 8) = 0
10:32:24.493693 rt_sigaction(SIGCHLD, NULL, {SIG_DFL}, 8) = 0
10:32:24.493757 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:24.493818 nanosleep({2, 0}, {2, 0}) = 0
10:32:26.499976 time(NULL)              = 1246437146
10:32:26.500055 time(NULL)              = 1246437146
10:32:26.500543 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:26.500626 rt_sigaction(SIGALRM, {SIG_DFL}, {SIG_DFL}, 8) = 0
10:32:26.500701 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:26.500768 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:26.500841 rt_sigaction(SIGALRM, {0x809a270, [], 0}, {SIG_DFL}, 8) = 0
10:32:26.500917 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:26.500991 alarm(10)               = 0
10:32:26.501554 socket(PF_INET, SOCK_STREAM, IPPROTO_TCP) = 4
10:32:26.501633 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:26.501704 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:26.501768 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:26.501830 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:26.501889 fcntl64(4, F_SETFD, FD_CLOEXEC) = 0
10:32:26.501999 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:26.502060 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:26.502126 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.4")}, 16) = -1 EINPROGRESS (Operation now in 
progress)
10:32:26.502336 select(8, NULL, [4], NULL, {180, 0}) = 1 (out [4], left {180, 
0})
10:32:26.502506 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.4")}, 16) = 0
10:32:26.502592 fcntl64(4, F_GETFL)     = 0x802 (flags O_RDWR|O_NONBLOCK)
10:32:26.502654 fcntl64(4, F_SETFL, O_RDWR) = 0
10:32:26.502786 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:26.502847 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:26.503148 write(4, "GET /alive HTTP/1.1\r\nTE: deflate,"..., 121) = 121
10:32:26.503287 time(NULL)              = 1246437146
10:32:26.503354 select(8, [4], NULL, NULL, {180, 0}) = 1 (in [4], left {180, 0})
10:32:26.503642 read(4, "HTTP/1.1 200 OK\r\nDate: Wed, 01 Ju"..., 1024) = 239
10:32:26.504137 getpeername(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.4")}, [16]) = 0
10:32:26.504495 close(4)                = 0
10:32:26.504596 time(NULL)              = 1246437146
10:32:26.504745 alarm(0)                = 10
10:32:26.504810 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:26.504885 rt_sigaction(SIGALRM, {SIG_DFL}, {0x809a270, [], 0}, 8) = 0
10:32:26.504962 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:26.505377 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:26.505456 rt_sigaction(SIGALRM, {SIG_DFL}, {SIG_DFL}, 8) = 0
10:32:26.505530 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:26.505596 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:26.505668 rt_sigaction(SIGALRM, {0x809a270, [], 0}, {SIG_DFL}, 8) = 0
10:32:26.505750 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:26.505822 alarm(10)               = 0
10:32:26.506222 socket(PF_INET, SOCK_STREAM, IPPROTO_TCP) = 4
10:32:26.506293 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:26.506359 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:26.506421 ioctl(4, SNDCTL_TMR_TIMEBASE or TCGETS, 0xbfeffc48) = -1 EINVAL 
(Invalid argument)
10:32:26.506483 _llseek(4, 0, 0xbfeffc90, SEEK_CUR) = -1 ESPIPE (Illegal seek)
10:32:26.506541 fcntl64(4, F_SETFD, FD_CLOEXEC) = 0
10:32:26.506632 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:26.506692 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:26.506758 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.5")}, 16) = -1 EINPROGRESS (Operation now in 
progress)
10:32:26.506918 select(8, NULL, [4], NULL, {180, 0}) = 1 (out [4], left {179, 
990000})
10:32:26.510128 connect(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.5")}, 16) = 0
10:32:26.510213 fcntl64(4, F_GETFL)     = 0x802 (flags O_RDWR|O_NONBLOCK)
10:32:26.510275 fcntl64(4, F_SETFL, O_RDWR) = 0
10:32:26.510378 fcntl64(4, F_GETFL)     = 0x2 (flags O_RDWR)
10:32:26.510438 fcntl64(4, F_SETFL, O_RDWR|O_NONBLOCK) = 0
10:32:26.510702 write(4, "GET /alive HTTP/1.1\r\nTE: deflate,"..., 121) = 121
10:32:26.510828 time(NULL)              = 1246437146
10:32:26.510894 select(8, [4], NULL, NULL, {180, 0}) = 1 (in [4], left {180, 0})
10:32:26.514466 read(4, "HTTP/1.1 200 OK\r\nDate: Wed, 01 Ju"..., 1024) = 239
10:32:26.514916 getpeername(4, {sa_family=AF_INET, sin_port=htons(80), 
sin_addr=inet_addr("192.168.0.5")}, [16]) = 0
10:32:26.515225 close(4)                = 0
10:32:26.515321 time(NULL)              = 1246437146
10:32:26.515439 alarm(0)                = 10
10:32:26.515503 rt_sigprocmask(SIG_BLOCK, [ALRM], [], 8) = 0
10:32:26.515578 rt_sigaction(SIGALRM, {SIG_DFL}, {0x809a270, [], 0}, 8) = 0
10:32:26.515654 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:26.515855 stat64("/etc/ha.d/ldirectord.cf", {st_mode=S_IFREG|0644, 
st_size=553, ...}) = 0
10:32:26.515974 time(NULL)              = 1246437146
10:32:26.516034 rt_sigprocmask(SIG_BLOCK, [CHLD], [], 8) = 0
10:32:26.516104 rt_sigaction(SIGCHLD, NULL, {SIG_DFL}, 8) = 0
10:32:26.516169 rt_sigprocmask(SIG_SETMASK, [], NULL, 8) = 0
10:32:26.516230 nanosleep({2, 0},  <unfinished ...>
_______________________________________________
Please read the documentation before posting - it's available at:
http://www.linuxvirtualserver.org/

LinuxVirtualServer.org mailing list - lvs-users@xxxxxxxxxxxxxxxxxxxxxx
Send requests to lvs-users-request@xxxxxxxxxxxxxxxxxxxxxx
or go to http://lists.graemef.net/mailman/listinfo/lvs-users
<Prev in Thread] Current Thread [Next in Thread>
  • Re: [lvs-users] Fallback server alive check error - Inaccessible real server: 127.0.0.1:80 (192.168.0.6:80), Eelco Jepkema <=