* [PATCH] squid 3.5.19: latest patches from upstream
@ 2016-05-23 12:16 Matthias Fischer
0 siblings, 0 replies; 2+ messages in thread
From: Matthias Fischer @ 2016-05-23 12:16 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 14622 bytes --]
For details, see:
http://www.squid-cache.org/Versions/v3/3.5/changesets/
Signed-off-by: Matthias Fischer <matthias.fischer(a)ipfire.org>
---
lfs/squid | 6 ++++
src/patches/squid/squid-3.5-14051.patch | 63 +++++++++++++++++++++++++++++++++
src/patches/squid/squid-3.5-14052.patch | 34 ++++++++++++++++++
src/patches/squid/squid-3.5-14053.patch | 46 ++++++++++++++++++++++++
src/patches/squid/squid-3.5-14054.patch | 37 +++++++++++++++++++
src/patches/squid/squid-3.5-14055.patch | 39 ++++++++++++++++++++
src/patches/squid/squid-3.5-14056.patch | 36 +++++++++++++++++++
7 files changed, 261 insertions(+)
create mode 100644 src/patches/squid/squid-3.5-14051.patch
create mode 100644 src/patches/squid/squid-3.5-14052.patch
create mode 100644 src/patches/squid/squid-3.5-14053.patch
create mode 100644 src/patches/squid/squid-3.5-14054.patch
create mode 100644 src/patches/squid/squid-3.5-14055.patch
create mode 100644 src/patches/squid/squid-3.5-14056.patch
diff --git a/lfs/squid b/lfs/squid
index 74a4f19..edaf943 100644
--- a/lfs/squid
+++ b/lfs/squid
@@ -70,6 +70,12 @@ $(subst %,%_MD5,$(objects)) :
$(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects))
@$(PREBUILD)
@rm -rf $(DIR_APP) && cd $(DIR_SRC) && tar xaf $(DIR_DL)/$(DL_FILE)
+ cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid/squid-3.5-14051.patch
+ cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid/squid-3.5-14052.patch
+ cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid/squid-3.5-14053.patch
+ cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid/squid-3.5-14054.patch
+ cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid/squid-3.5-14055.patch
+ cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid/squid-3.5-14056.patch
cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid-3.5.17-fix-max-file-descriptors.patch
cd $(DIR_APP) && autoreconf -vfi
diff --git a/src/patches/squid/squid-3.5-14051.patch b/src/patches/squid/squid-3.5-14051.patch
new file mode 100644
index 0000000..58892dc
--- /dev/null
+++ b/src/patches/squid/squid-3.5-14051.patch
@@ -0,0 +1,63 @@
+------------------------------------------------------------
+revno: 14051
+revision-id: squid3(a)treenet.co.nz-20160517145850-uos9z00nrt7xd9ik
+parent: squid3(a)treenet.co.nz-20160508124125-fytgvn68zppfr8ix
+author: Steve Hill <steve(a)opendium.com>
+committer: Amos Jeffries <squid3(a)treenet.co.nz>
+branch nick: 3.5
+timestamp: Wed 2016-05-18 02:58:50 +1200
+message:
+ Support unified EUI format code in external_acl_type
+
+ Squid supports %>eui as a logformat specifier, which produces an EUI-48
+ for IPv4 clients and an EUI-64 for IPv6 clients. However, This is not
+ allowed as a format specifier for the external ACLs, and you have to use
+ %SRCEUI48 and %SRCEUI64 instead. %SRCEUI48 is only useful for IPv4
+ clients and %SRCEUI64 is only useful for IPv6 clients, so supporting
+ both v4 and v6 is a bit messy.
+
+ Adds the %>eui specifier for external ACLs and behaves in the same way
+ as the logformat specifier.
+------------------------------------------------------------
+# Bazaar merge directive format 2 (Bazaar 0.90)
+# revision_id: squid3(a)treenet.co.nz-20160517145850-uos9z00nrt7xd9ik
+# target_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# testament_sha1: ad0743717948a65cfd4f306acc2bbaa9343e9a76
+# timestamp: 2016-05-17 15:50:54 +0000
+# source_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# base_revision_id: squid3(a)treenet.co.nz-20160508124125-\
+# fytgvn68zppfr8ix
+#
+# Begin patch
+=== modified file 'src/external_acl.cc'
+--- src/external_acl.cc 2016-01-01 00:14:27 +0000
++++ src/external_acl.cc 2016-05-17 14:58:50 +0000
+@@ -356,6 +356,8 @@
+ else if (strcmp(token, "%SRCPORT") == 0 || strcmp(token, "%>p") == 0)
+ format->type = Format::LFT_CLIENT_PORT;
+ #if USE_SQUID_EUI
++ else if (strcmp(token, "%>eui") == 0)
++ format->type = Format::LFT_CLIENT_EUI;
+ else if (strcmp(token, "%SRCEUI48") == 0)
+ format->type = Format::LFT_EXT_ACL_CLIENT_EUI48;
+ else if (strcmp(token, "%SRCEUI64") == 0)
+@@ -944,6 +946,18 @@
+ break;
+
+ #if USE_SQUID_EUI
++ case Format::LFT_CLIENT_EUI:
++ // TODO make the ACL checklist have a direct link to any TCP details.
++ if (request->clientConnectionManager.valid() && request->clientConnectionManager->clientConnection != NULL)
++ {
++ if (request->clientConnectionManager->clientConnection->remote.isIPv4())
++ request->clientConnectionManager->clientConnection->remoteEui48.encode(buf, sizeof(buf));
++ else
++ request->clientConnectionManager->clientConnection->remoteEui64.encode(buf, sizeof(buf));
++ str = buf;
++ }
++ break;
++
+ case Format::LFT_EXT_ACL_CLIENT_EUI48:
+ if (request->clientConnectionManager.valid() && request->clientConnectionManager->clientConnection != NULL &&
+ request->clientConnectionManager->clientConnection->remoteEui48.encode(buf, sizeof(buf)))
+
diff --git a/src/patches/squid/squid-3.5-14052.patch b/src/patches/squid/squid-3.5-14052.patch
new file mode 100644
index 0000000..4fba159
--- /dev/null
+++ b/src/patches/squid/squid-3.5-14052.patch
@@ -0,0 +1,34 @@
+------------------------------------------------------------
+revno: 14052
+revision-id: squidadm(a)squid-cache.org-20160517181416-sfrjdosd9dhx7u8o
+parent: squid3(a)treenet.co.nz-20160517145850-uos9z00nrt7xd9ik
+committer: Source Maintenance <squidadm(a)squid-cache.org>
+branch nick: 3.5
+timestamp: Tue 2016-05-17 18:14:16 +0000
+message:
+ SourceFormat Enforcement
+------------------------------------------------------------
+# Bazaar merge directive format 2 (Bazaar 0.90)
+# revision_id: squidadm(a)squid-cache.org-20160517181416-\
+# sfrjdosd9dhx7u8o
+# target_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# testament_sha1: e30c12805cacdb559925da08cc6a25fe4a39c19b
+# timestamp: 2016-05-17 18:51:06 +0000
+# source_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# base_revision_id: squid3(a)treenet.co.nz-20160517145850-\
+# uos9z00nrt7xd9ik
+#
+# Begin patch
+=== modified file 'src/external_acl.cc'
+--- src/external_acl.cc 2016-05-17 14:58:50 +0000
++++ src/external_acl.cc 2016-05-17 18:14:16 +0000
+@@ -956,7 +956,7 @@
+ request->clientConnectionManager->clientConnection->remoteEui64.encode(buf, sizeof(buf));
+ str = buf;
+ }
+- break;
++ break;
+
+ case Format::LFT_EXT_ACL_CLIENT_EUI48:
+ if (request->clientConnectionManager.valid() && request->clientConnectionManager->clientConnection != NULL &&
+
diff --git a/src/patches/squid/squid-3.5-14053.patch b/src/patches/squid/squid-3.5-14053.patch
new file mode 100644
index 0000000..f669449
--- /dev/null
+++ b/src/patches/squid/squid-3.5-14053.patch
@@ -0,0 +1,46 @@
+------------------------------------------------------------
+revno: 14053
+revision-id: squid3(a)treenet.co.nz-20160521130058-zq8zugw0fohwfu3z
+parent: squidadm(a)squid-cache.org-20160517181416-sfrjdosd9dhx7u8o
+committer: Amos Jeffries <squid3(a)treenet.co.nz>
+branch nick: 3.5
+timestamp: Sun 2016-05-22 01:00:58 +1200
+message:
+ Do not override user defined -std option
+------------------------------------------------------------
+# Bazaar merge directive format 2 (Bazaar 0.90)
+# revision_id: squid3(a)treenet.co.nz-20160521130058-zq8zugw0fohwfu3z
+# target_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# testament_sha1: a75245a622ccfa385ef5e4722f9a9fb438a16135
+# timestamp: 2016-05-21 13:08:06 +0000
+# source_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# base_revision_id: squidadm(a)squid-cache.org-20160517181416-\
+# sfrjdosd9dhx7u8o
+#
+# Begin patch
+=== modified file 'configure.ac'
+--- configure.ac 2016-05-08 12:41:25 +0000
++++ configure.ac 2016-05-21 13:00:58 +0000
+@@ -95,6 +95,9 @@
+ # Guess the compiler type (sets squid_cv_compiler)
+ SQUID_CC_GUESS_VARIANT
+
++# If the user did not specify a C++ version.
++user_cxx=`echo "$PRESET_CXXFLAGS" | grep -o -E "\-std="`
++if test "x$user_cxx" = "x"; then
+ # Check for C++11 compiler support
+ #
+ # BUG 3613: when clang -std=c++0x is used, it activates a "strict mode"
+@@ -103,8 +106,9 @@
+ #
+ # Similar POSIX issues on MinGW 32-bit and Cygwin
+ #
+-if ! test "x$squid_host_os" = "xmingw" -o "x$squid_host_os" = "xcygwin" -o "x$squid_cv_compiler" = "xclang"; then
+- AX_CXX_COMPILE_STDCXX_11([noext],[optional])
++ if ! test "x$squid_host_os" = "xmingw" -o "x$squid_host_os" = "xcygwin" -o "x$squid_cv_compiler" = "xclang"; then
++ AX_CXX_COMPILE_STDCXX_11([noext],[optional])
++ fi
+ fi
+
+ # test for programs
+
diff --git a/src/patches/squid/squid-3.5-14054.patch b/src/patches/squid/squid-3.5-14054.patch
new file mode 100644
index 0000000..90b34c1
--- /dev/null
+++ b/src/patches/squid/squid-3.5-14054.patch
@@ -0,0 +1,37 @@
+------------------------------------------------------------
+revno: 14054
+revision-id: squid3(a)treenet.co.nz-20160521130144-6xtcayieij00fm5v
+parent: squid3(a)treenet.co.nz-20160521130058-zq8zugw0fohwfu3z
+committer: Amos Jeffries <squid3(a)treenet.co.nz>
+branch nick: 3.5
+timestamp: Sun 2016-05-22 01:01:44 +1200
+message:
+ Fix OpenSSL detection on FreeBSD
+------------------------------------------------------------
+# Bazaar merge directive format 2 (Bazaar 0.90)
+# revision_id: squid3(a)treenet.co.nz-20160521130144-6xtcayieij00fm5v
+# target_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# testament_sha1: 3d8c0d7a9f1886523ac55d79e4d3e8f0340e2ec9
+# timestamp: 2016-05-21 13:08:08 +0000
+# source_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# base_revision_id: squid3(a)treenet.co.nz-20160521130058-\
+# zq8zugw0fohwfu3z
+#
+# Begin patch
+=== modified file 'configure.ac'
+--- configure.ac 2016-05-21 13:00:58 +0000
++++ configure.ac 2016-05-21 13:01:44 +0000
+@@ -1348,10 +1348,10 @@
+
+ AC_CHECK_LIB(crypto,[CRYPTO_new_ex_data],[LIBOPENSSL_LIBS="-lcrypto $LIBOPENSSL_LIBS"],[
+ AC_MSG_ERROR([library 'crypto' is required for OpenSSL])
+- ])
++ ],$LIBOPENSSL_LIBS)
+ AC_CHECK_LIB(ssl,[SSL_library_init],[LIBOPENSSL_LIBS="-lssl $LIBOPENSSL_LIBS"],[
+ AC_MSG_ERROR([library 'ssl' is required for OpenSSL])
+- ])
++ ],$LIBOPENSSL_LIBS)
+ ])
+
+ # This is a workaround for RedHat 9 brain damage..
+
diff --git a/src/patches/squid/squid-3.5-14055.patch b/src/patches/squid/squid-3.5-14055.patch
new file mode 100644
index 0000000..ac04bb6
--- /dev/null
+++ b/src/patches/squid/squid-3.5-14055.patch
@@ -0,0 +1,39 @@
+------------------------------------------------------------
+revno: 14055
+revision-id: squid3(a)treenet.co.nz-20160521155202-pp53utwamdhkugvg
+parent: squid3(a)treenet.co.nz-20160521130144-6xtcayieij00fm5v
+author: Alex Rousskov <rousskov(a)measurement-factory.com>
+committer: Amos Jeffries <squid3(a)treenet.co.nz>
+branch nick: 3.5
+timestamp: Sun 2016-05-22 03:52:02 +1200
+message:
+ Fix icons loading speed.
+
+ Since trunk r14100 (Bug 3875: bad mimeLoadIconFile error handling), each
+ icon was read from disk and written to Store one character at a time. I
+ did not measure startup delays in production, but in debugging runs,
+ fixing this bug sped up icons loading from 1 minute to 4 seconds.
+------------------------------------------------------------
+# Bazaar merge directive format 2 (Bazaar 0.90)
+# revision_id: squid3(a)treenet.co.nz-20160521155202-pp53utwamdhkugvg
+# target_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# testament_sha1: 79b78480d81666c15406d23837608ba9a578da4b
+# timestamp: 2016-05-21 16:51:00 +0000
+# source_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# base_revision_id: squid3(a)treenet.co.nz-20160521130144-\
+# 6xtcayieij00fm5v
+#
+# Begin patch
+=== modified file 'src/mime.cc'
+--- src/mime.cc 2016-01-01 00:14:27 +0000
++++ src/mime.cc 2016-05-21 15:52:02 +0000
+@@ -430,7 +430,7 @@
+ /* read the file into the buffer and append it to store */
+ int n;
+ char *buf = (char *)memAllocate(MEM_4K_BUF);
+- while ((n = FD_READ_METHOD(fd, buf, sizeof(*buf))) > 0)
++ while ((n = FD_READ_METHOD(fd, buf, 4096)) > 0)
+ e->append(buf, n);
+
+ file_close(fd);
+
diff --git a/src/patches/squid/squid-3.5-14056.patch b/src/patches/squid/squid-3.5-14056.patch
new file mode 100644
index 0000000..4ea3808
--- /dev/null
+++ b/src/patches/squid/squid-3.5-14056.patch
@@ -0,0 +1,36 @@
+------------------------------------------------------------
+revno: 14056
+revision-id: squid3(a)treenet.co.nz-20160521172919-du6cbdirqcxdjbtr
+parent: squid3(a)treenet.co.nz-20160521155202-pp53utwamdhkugvg
+author: Christos Tsantilas <chtsanti(a)users.sourceforge.net>
+committer: Amos Jeffries <squid3(a)treenet.co.nz>
+branch nick: 3.5
+timestamp: Sun 2016-05-22 05:29:19 +1200
+message:
+ Increase debug level in a peek-and-splice related debug message
+
+ It may produced one debugging line for each SSL transaction in some cases
+------------------------------------------------------------
+# Bazaar merge directive format 2 (Bazaar 0.90)
+# revision_id: squid3(a)treenet.co.nz-20160521172919-du6cbdirqcxdjbtr
+# target_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# testament_sha1: 76c2e864289dabb1065c470c954f9fc5ec4c7b4f
+# timestamp: 2016-05-21 17:50:54 +0000
+# source_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# base_revision_id: squid3(a)treenet.co.nz-20160521155202-\
+# pp53utwamdhkugvg
+#
+# Begin patch
+=== modified file 'src/ssl/PeerConnector.cc'
+--- src/ssl/PeerConnector.cc 2016-02-15 11:29:50 +0000
++++ src/ssl/PeerConnector.cc 2016-05-21 17:29:19 +0000
+@@ -598,7 +598,7 @@
+
+ case SSL_ERROR_WANT_WRITE:
+ if ((srvBio->bumpMode() == Ssl::bumpPeek || srvBio->bumpMode() == Ssl::bumpStare) && srvBio->holdWrite()) {
+- debugs(81, DBG_IMPORTANT, "hold write on SSL connection on FD " << fd);
++ debugs(81, 3, "hold write on SSL connection on FD " << fd);
+ checkForPeekAndSplice();
+ return;
+ }
+
--
2.8.3
^ permalink raw reply [flat|nested] 2+ messages in thread
* [PATCH] squid 3.5.19: latest patches from upstream
@ 2016-06-21 18:22 Matthias Fischer
0 siblings, 0 replies; 2+ messages in thread
From: Matthias Fischer @ 2016-06-21 18:22 UTC (permalink / raw)
To: development
[-- Attachment #1: Type: text/plain, Size: 47014 bytes --]
For details see:
http://www.squid-cache.org/Versions/v3/3.5/changesets/
Signed-off-by: Matthias Fischer <matthias.fischer(a)ipfire.org>
---
lfs/squid | 5 +
src/patches/squid/squid-3.5-14057.patch | 132 ++++++
src/patches/squid/squid-3.5-14058.patch | 732 ++++++++++++++++++++++++++++++++
src/patches/squid/squid-3.5-14059.patch | 49 +++
src/patches/squid/squid-3.5-14060.patch | 117 +++++
src/patches/squid/squid-3.5-14061.patch | 237 +++++++++++
6 files changed, 1272 insertions(+)
create mode 100644 src/patches/squid/squid-3.5-14057.patch
create mode 100644 src/patches/squid/squid-3.5-14058.patch
create mode 100644 src/patches/squid/squid-3.5-14059.patch
create mode 100644 src/patches/squid/squid-3.5-14060.patch
create mode 100644 src/patches/squid/squid-3.5-14061.patch
diff --git a/lfs/squid b/lfs/squid
index edaf943..c2b899e 100644
--- a/lfs/squid
+++ b/lfs/squid
@@ -76,6 +76,11 @@ $(TARGET) : $(patsubst %,$(DIR_DL)/%,$(objects))
cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid/squid-3.5-14054.patch
cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid/squid-3.5-14055.patch
cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid/squid-3.5-14056.patch
+ cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid/squid-3.5-14057.patch
+ cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid/squid-3.5-14058.patch
+ cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid/squid-3.5-14059.patch
+ cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid/squid-3.5-14060.patch
+ cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid/squid-3.5-14061.patch
cd $(DIR_APP) && patch -Np0 -i $(DIR_SRC)/src/patches/squid-3.5.17-fix-max-file-descriptors.patch
cd $(DIR_APP) && autoreconf -vfi
diff --git a/src/patches/squid/squid-3.5-14057.patch b/src/patches/squid/squid-3.5-14057.patch
new file mode 100644
index 0000000..fd4ddc3
--- /dev/null
+++ b/src/patches/squid/squid-3.5-14057.patch
@@ -0,0 +1,132 @@
+------------------------------------------------------------
+revno: 14057
+revision-id: squid3(a)treenet.co.nz-20160524200503-1nn3hijw86ti726r
+parent: squid3(a)treenet.co.nz-20160521172919-du6cbdirqcxdjbtr
+fixes bug: http://bugs.squid-cache.org/show_bug.cgi?id=4485
+author: Eduard Bagdasaryan <eduard.bagdasaryan(a)measurement-factory.com>
+committer: Amos Jeffries <squid3(a)treenet.co.nz>
+branch nick: 3.5
+timestamp: Wed 2016-05-25 08:05:03 +1200
+message:
+ Bug 4485: off-by-one out-of-bounds Parser::Tokenizer::int64() read errors
+------------------------------------------------------------
+# Bazaar merge directive format 2 (Bazaar 0.90)
+# revision_id: squid3(a)treenet.co.nz-20160524200503-1nn3hijw86ti726r
+# target_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# testament_sha1: a7a643f09c2d39665e013fc7a6bc87577f0890e0
+# timestamp: 2016-05-24 20:51:02 +0000
+# source_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# base_revision_id: squid3(a)treenet.co.nz-20160521172919-\
+# du6cbdirqcxdjbtr
+#
+# Begin patch
+=== modified file 'src/parser/Tokenizer.cc'
+--- src/parser/Tokenizer.cc 2016-01-01 00:14:27 +0000
++++ src/parser/Tokenizer.cc 2016-05-24 20:05:03 +0000
+@@ -111,8 +111,9 @@
+ } else if (*s == '+') {
+ ++s;
+ }
++
+ if (s >= end) return false;
+- if (( base == 0 || base == 16) && *s == '0' && (s+1 <= end ) &&
++ if (( base == 0 || base == 16) && *s == '0' && (s+1 < end ) &&
+ tolower(*(s+1)) == 'x') {
+ s += 2;
+ base = 16;
+@@ -135,7 +136,8 @@
+
+ int any = 0, c;
+ int64_t acc = 0;
+- for (c = *s++; s <= end; c = *s++) {
++ do {
++ c = *s;
+ if (xisdigit(c)) {
+ c -= '0';
+ } else if (xisalpha(c)) {
+@@ -152,7 +154,7 @@
+ acc *= base;
+ acc += c;
+ }
+- }
++ } while (++s < end);
+
+ if (any == 0) // nothing was parsed
+ return false;
+@@ -164,6 +166,6 @@
+ acc = -acc;
+
+ result = acc;
+- return success(s - buf_.rawContent() - 1);
++ return success(s - buf_.rawContent());
+ }
+
+
+=== modified file 'src/tests/testTokenizer.cc'
+--- src/tests/testTokenizer.cc 2016-01-01 00:14:27 +0000
++++ src/tests/testTokenizer.cc 2016-05-24 20:05:03 +0000
+@@ -144,6 +144,7 @@
+ const int64_t benchmark = 1234;
+ CPPUNIT_ASSERT(t.int64(rv, 10));
+ CPPUNIT_ASSERT_EQUAL(benchmark,rv);
++ CPPUNIT_ASSERT(t.buf().isEmpty());
+ }
+
+ // successful parse, autodetect base
+@@ -153,6 +154,7 @@
+ const int64_t benchmark = 1234;
+ CPPUNIT_ASSERT(t.int64(rv));
+ CPPUNIT_ASSERT_EQUAL(benchmark,rv);
++ CPPUNIT_ASSERT(t.buf().isEmpty());
+ }
+
+ // successful parse, autodetect base
+@@ -162,6 +164,7 @@
+ const int64_t benchmark = 01234;
+ CPPUNIT_ASSERT(t.int64(rv));
+ CPPUNIT_ASSERT_EQUAL(benchmark,rv);
++ CPPUNIT_ASSERT(t.buf().isEmpty());
+ }
+
+ // successful parse, autodetect base
+@@ -171,6 +174,7 @@
+ const int64_t benchmark = 0x12f4;
+ CPPUNIT_ASSERT(t.int64(rv));
+ CPPUNIT_ASSERT_EQUAL(benchmark,rv);
++ CPPUNIT_ASSERT(t.buf().isEmpty());
+ }
+
+ // API mismatch: don't eat leading space
+@@ -178,6 +182,7 @@
+ int64_t rv;
+ Parser::Tokenizer t(SBuf(" 1234"));
+ CPPUNIT_ASSERT(!t.int64(rv));
++ CPPUNIT_ASSERT_EQUAL(SBuf(" 1234"), t.buf());
+ }
+
+ // API mismatch: don't eat multiple leading spaces
+@@ -185,6 +190,7 @@
+ int64_t rv;
+ Parser::Tokenizer t(SBuf(" 1234"));
+ CPPUNIT_ASSERT(!t.int64(rv));
++ CPPUNIT_ASSERT_EQUAL(SBuf(" 1234"), t.buf());
+ }
+
+ // trailing spaces
+@@ -222,6 +228,7 @@
+ int64_t rv;
+ Parser::Tokenizer t(SBuf("1029397752385698678762234"));
+ CPPUNIT_ASSERT(!t.int64(rv));
++ CPPUNIT_ASSERT_EQUAL(SBuf("1029397752385698678762234"), t.buf());
+ }
+
+ // buffered sub-string parsing
+@@ -233,6 +240,7 @@
+ CPPUNIT_ASSERT_EQUAL(SBuf("22"),t.buf());
+ CPPUNIT_ASSERT(t.int64(rv));
+ CPPUNIT_ASSERT_EQUAL(benchmark,rv);
++ CPPUNIT_ASSERT(t.buf().isEmpty());
+ }
+
+ // base-16, prefix
+
diff --git a/src/patches/squid/squid-3.5-14058.patch b/src/patches/squid/squid-3.5-14058.patch
new file mode 100644
index 0000000..451b964
--- /dev/null
+++ b/src/patches/squid/squid-3.5-14058.patch
@@ -0,0 +1,732 @@
+------------------------------------------------------------
+revno: 14058
+revision-id: squid3(a)treenet.co.nz-20160615220816-yqh6bmry6ijvfwi1
+parent: squid3(a)treenet.co.nz-20160524200503-1nn3hijw86ti726r
+author: Alex Rousskov <rousskov(a)measurement-factory.com>
+committer: Amos Jeffries <squid3(a)treenet.co.nz>
+branch nick: 3.5
+timestamp: Thu 2016-06-16 10:08:16 +1200
+message:
+ Do not allow low-level debugging to hide important/critical messages.
+
+ Removed debugs() side effects that inadvertently resulted in some
+ important/critical messages logged at the wrong debugging level and,
+ hence, becoming invisible to the admin. The removed side effects set the
+ "current" debugging level when a debugs() parameter called a function
+ that also called debugs(). The last nested debugs() called affected the
+ level of all debugs() still in progress!
+
+ Related changes:
+
+ * Reentrant debugging messages no longer clobber parent messages. Each
+ debugging message is logged separately, in the natural order of
+ debugs() calls that would have happened if debugs() were a function
+ (that gets already evaluated arguments) and not a macro (that
+ evaluates its arguments in the middle of the call). This order is
+ "natural" because good macros work like functions from the caller
+ point of view.
+
+ * Assertions hit while evaluating debugs() parameters are now logged
+ instead of being lost with the being-built debugs() log line.
+
+ * 10-20% faster debugs() performance because we no longer allocate a new
+ std::ostringstream buffer for the vast majority of debugs() calls.
+ Only reentrant calls get a new buffer.
+
+ * Removed old_debug(), addressing an old "needs to die" to-do.
+
+ * Removed do_debug() that changed debugging level while testing whether
+ debugging is needed. Use side-effect-free Debug::Enabled() instead.
+
+ Also removed the OutStream wrapper class. The wrapper was added in trunk
+ revision 13767 that promised to (but did not?) MemPool the debug output
+ buffers. We no longer "new" the buffer stream so a custom new() method
+ would be unused. Besides, the r13767 explanation implied that providing
+ a Child::new() method would somehow overwrite Parent::allocator_type,
+ which did not compute for me. Finally, Squid "new"s other allocator-
+ enabled STL objects without overriding their new methods so either the
+ same problem is still there or it did not exist (or was different?).
+
+ Also removed Debug::xassert() because the debugs() assertions now work
+ OK without that hack.
+------------------------------------------------------------
+# Bazaar merge directive format 2 (Bazaar 0.90)
+# revision_id: squid3(a)treenet.co.nz-20160615220816-yqh6bmry6ijvfwi1
+# target_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# testament_sha1: 1d7a703d3dfe6ebd05138880652ab78c3260a323
+# timestamp: 2016-06-15 22:51:04 +0000
+# source_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# base_revision_id: squid3(a)treenet.co.nz-20160524200503-\
+# 1nn3hijw86ti726r
+#
+# Begin patch
+=== modified file 'src/Debug.h'
+--- src/Debug.h 2016-01-01 00:14:27 +0000
++++ src/Debug.h 2016-06-15 22:08:16 +0000
+@@ -49,38 +49,51 @@
+ {
+
+ public:
++ /// meta-information for debugs() or a similar debugging call
++ class Context
++ {
++ public:
++ Context(const int aSectionLevel, const int aLevel);
++
++ int level; ///< minimum debugging level required by the debugs() call
++ int sectionLevel; ///< maximum debugging level allowed during the call
++
++ private:
++ friend class Debug;
++ void rewind(const int aSection, const int aLevel);
++ void formatStream();
++ Context *upper; ///< previous or parent record in nested debugging calls
++ std::ostringstream buf; ///< debugs() output sink
++ };
++
++ /// whether debugging the given section and the given level produces output
++ static bool Enabled(const int section, const int level)
++ {
++ return level <= Debug::Levels[section];
++ }
++
+ static char *debugOptions;
+ static char *cache_log;
+ static int rotateNumber;
+ static int Levels[MAX_DEBUG_SECTIONS];
+- static int level; ///< minimum debugging level required by debugs() call
+- static int sectionLevel; ///< maximum debugging level allowed now
+ static int override_X;
+ static int log_stderr;
+ static bool log_syslog;
+
+- static std::ostream &getDebugOut();
+- static void finishDebug();
+ static void parseOptions(char const *);
+
++ /// minimum level required by the current debugs() call
++ static int Level() { return Current ? Current->level : 1; }
++ /// maximum level currently allowed
++ static int SectionLevel() { return Current ? Current->sectionLevel : 1; }
++
++ /// opens debugging context and returns output buffer
++ static std::ostringstream &Start(const int section, const int level);
++ /// logs output buffer created in Start() and closes debugging context
++ static void Finish();
++
+ private:
+- // Hack: replaces global ::xassert() to debug debugging assertions
+- static void xassert(const char *msg, const char *file, int line);
+-
+- /// Wrapper class to prevent SquidNew.h overrides getting confused
+- /// with the libc++6 std::ostringstream definitions
+- class OutStream : public std::ostringstream
+- {
+- // XXX: use MEMPROXY_CLASS() once that no longer pulls in typedefs.h and enums.h and globals.h
+- public:
+- void *operator new(size_t size) throw(std::bad_alloc) {return xmalloc(size);}
+- void operator delete(void *address) throw() {xfree(address);}
+- void *operator new[] (size_t size) throw(std::bad_alloc) ; //{return xmalloc(size);}
+- void operator delete[] (void *address) throw() ; // {xfree(address);}
+- };
+-
+- static OutStream *CurrentDebug;
+- static int TheDepth; // level of nested debugging calls
++ static Context *Current; ///< deepest active context; nil outside debugs()
+ };
+
+ extern FILE *debug_log;
+@@ -91,15 +104,15 @@
+ /* Debug stream */
+ #define debugs(SECTION, LEVEL, CONTENT) \
+ do { \
+- if ((Debug::level = (LEVEL)) <= Debug::Levels[SECTION]) { \
+- Debug::sectionLevel = Debug::Levels[SECTION]; \
+- std::ostream &_dbo=Debug::getDebugOut(); \
+- if (Debug::level > DBG_IMPORTANT) { \
+- _dbo << (SECTION) << ',' << (LEVEL) << "| " \
++ const int _dbg_level = (LEVEL); \
++ if (Debug::Enabled((SECTION), _dbg_level)) { \
++ std::ostream &_dbo = Debug::Start((SECTION), _dbg_level); \
++ if (_dbg_level > DBG_IMPORTANT) { \
++ _dbo << (SECTION) << ',' << _dbg_level << "| " \
+ << SkipBuildPrefix(__FILE__)<<"("<<__LINE__<<") "<<__FUNCTION__<<": "; \
+ } \
+ _dbo << CONTENT; \
+- Debug::finishDebug(); \
++ Debug::Finish(); \
+ } \
+ } while (/*CONSTCOND*/ 0)
+
+@@ -135,10 +148,6 @@
+ return (os << (int)d);
+ }
+
+-/* Legacy debug style. Still used in some places. needs to die... */
+-#define do_debug(SECTION, LEVEL) ((Debug::level = (LEVEL)) <= Debug::Levels[SECTION])
+-#define old_debug(SECTION, LEVEL) if do_debug((SECTION), (LEVEL)) _db_print
+-
+ /* Legacy debug function definitions */
+ void _db_init(const char *logfile, const char *options);
+ void _db_print(const char *,...) PRINTF_FORMAT_ARG1;
+
+=== modified file 'src/adaptation/ecap/Host.cc'
+--- src/adaptation/ecap/Host.cc 2016-02-23 15:58:54 +0000
++++ src/adaptation/ecap/Host.cc 2016-06-15 22:08:16 +0000
+@@ -147,18 +147,16 @@
+ {
+ const int squidLevel = SquidLogLevel(lv);
+ const int squidSection = 93; // XXX: this should be a global constant
+- // XXX: Debug.h should provide this to us
+- if ((Debug::level = squidLevel) <= Debug::Levels[squidSection])
+- return &Debug::getDebugOut();
+- else
+- return NULL;
++ return Debug::Enabled(squidSection, squidLevel) ?
++ &Debug::Start(squidSection, squidLevel) :
++ NULL;
+ }
+
+ void
+ Adaptation::Ecap::Host::closeDebug(std::ostream *debug)
+ {
+ if (debug)
+- Debug::finishDebug();
++ Debug::Finish();
+ }
+
+ Adaptation::Ecap::Host::MessagePtr
+
+=== modified file 'src/base/Lock.h'
+--- src/base/Lock.h 2016-01-01 00:14:27 +0000
++++ src/base/Lock.h 2016-06-15 22:08:16 +0000
+@@ -33,7 +33,7 @@
+ /// All locks must be cleared before it may be destroyed.
+ void lock() const {
+ #if defined(LOCKCOUNT_DEBUG)
+- old_debug(0,1)("Incrementing this %p from count %u\n",this,count_);
++ debugs(0,1, "Incrementing this " << static_cast<void*>(this) << " from count " << count_);
+ #endif
+ assert(count_ < UINT32_MAX);
+ ++count_;
+@@ -43,7 +43,7 @@
+ /// All locks must be cleared before it may be destroyed.
+ uint32_t unlock() const {
+ #if defined(LOCKCOUNT_DEBUG)
+- old_debug(0,1)("Decrementing this %p from count %u\n",this,count_);
++ debugs(0,1, "Decrementing this " << static_cast<void*>(this) << " from count " << count_);
+ #endif
+ assert(count_ > 0);
+ return --count_;
+
+=== modified file 'src/client_side.cc'
+--- src/client_side.cc 2016-05-02 10:51:18 +0000
++++ src/client_side.cc 2016-06-15 22:08:16 +0000
+@@ -3778,7 +3778,7 @@
+ debugs(83, 2, "clientNegotiateSSL: Session " << SSL_get_session(ssl) <<
+ " reused on FD " << fd << " (" << fd_table[fd].ipaddr << ":" << (int)fd_table[fd].remote_port << ")");
+ } else {
+- if (do_debug(83, 4)) {
++ if (Debug::Enabled(83, 4)) {
+ /* Write out the SSL session details.. actually the call below, but
+ * OpenSSL headers do strange typecasts confusing GCC.. */
+ /* PEM_write_SSL_SESSION(debug_log, SSL_get_session(ssl)); */
+
+=== modified file 'src/debug.cc'
+--- src/debug.cc 2016-03-23 14:46:37 +0000
++++ src/debug.cc 2016-06-15 22:08:16 +0000
+@@ -22,8 +22,6 @@
+ int Debug::log_stderr = -1;
+ bool Debug::log_syslog = false;
+ int Debug::Levels[MAX_DEBUG_SECTIONS];
+-int Debug::level;
+-int Debug::sectionLevel;
+ char *Debug::cache_log = NULL;
+ int Debug::rotateNumber = -1;
+ FILE *debug_log = NULL;
+@@ -134,7 +132,7 @@
+ static void
+ _db_print_stderr(const char *format, va_list args)
+ {
+- if (Debug::log_stderr < Debug::level)
++ if (Debug::log_stderr < Debug::Level())
+ return;
+
+ if (debug_log == stderr)
+@@ -149,7 +147,7 @@
+ {
+ /* level 0,1 go to syslog */
+
+- if (Debug::level > 1)
++ if (Debug::Level() > 1)
+ return;
+
+ if (!Debug::log_syslog)
+@@ -162,7 +160,7 @@
+
+ tmpbuf[BUFSIZ - 1] = '\0';
+
+- syslog(Debug::level == 0 ? LOG_WARNING : LOG_NOTICE, "%s", tmpbuf);
++ syslog(Debug::Level() == 0 ? LOG_WARNING : LOG_NOTICE, "%s", tmpbuf);
+ }
+ #endif /* HAVE_SYSLOG */
+
+@@ -512,7 +510,7 @@
+ static char buf[128];
+ static time_t last_t = 0;
+
+- if (Debug::level > 1) {
++ if (Debug::Level() > 1) {
+ char buf2[128];
+ tm = localtime(&t);
+ strftime(buf2, 127, "%Y/%m/%d %H:%M:%S", tm);
+@@ -714,55 +712,75 @@
+ return Ctx_Descrs[ctx] ? Ctx_Descrs[ctx] : "<null>";
+ }
+
+-int Debug::TheDepth = 0;
+-
+-Debug::OutStream *Debug::CurrentDebug(NULL);
+-
+-std::ostream &
+-Debug::getDebugOut()
+-{
+- assert(TheDepth >= 0);
+- ++TheDepth;
+- if (TheDepth > 1) {
+- assert(CurrentDebug);
+- *CurrentDebug << std::endl << "reentrant debuging " << TheDepth << "-{";
+- } else {
+- assert(!CurrentDebug);
+- CurrentDebug = new Debug::OutStream;
+- // set default formatting flags
+- CurrentDebug->setf(std::ios::fixed);
+- CurrentDebug->precision(2);
+- }
+- return *CurrentDebug;
+-}
+-
+-void
+-Debug::finishDebug()
+-{
+- assert(TheDepth >= 0);
+- assert(CurrentDebug);
+- if (TheDepth > 1) {
+- *CurrentDebug << "}-" << TheDepth << std::endl;
+- } else {
+- assert(TheDepth == 1);
+- _db_print("%s\n", CurrentDebug->str().c_str());
+- delete CurrentDebug;
+- CurrentDebug = NULL;
+- }
+- --TheDepth;
+-}
+-
+-// Hack: replaces global ::xassert() to debug debugging assertions
+-// Relies on assert macro calling xassert() without a specific scope.
+-void
+-Debug::xassert(const char *msg, const char *file, int line)
+-{
+-
+- if (CurrentDebug) {
+- *CurrentDebug << "assertion failed: " << file << ":" << line <<
+- ": \"" << msg << "\"";
+- }
+- abort();
++Debug::Context *Debug::Current = NULL;
++
++Debug::Context::Context(const int aSection, const int aLevel):
++ level(aLevel),
++ sectionLevel(Levels[aSection]),
++ upper(Current)
++{
++ formatStream();
++}
++
++/// Optimization: avoids new Context creation for every debugs().
++void
++Debug::Context::rewind(const int aSection, const int aLevel)
++{
++ level = aLevel;
++ sectionLevel = Levels[aSection];
++ assert(upper == Current);
++
++ buf.str(std::string());
++ buf.clear();
++ // debugs() users are supposed to preserve format, but
++ // some do not, so we have to waste cycles resetting it for all.
++ formatStream();
++}
++
++/// configures default formatting for the debugging stream
++void
++Debug::Context::formatStream()
++{
++ const static std::ostringstream cleanStream;
++ buf.flags(cleanStream.flags() | std::ios::fixed);
++ buf.width(cleanStream.width());
++ buf.precision(2);
++ buf.fill(' ');
++ // If this is not enough, use copyfmt(cleanStream) which is ~10% slower.
++}
++
++std::ostringstream &
++Debug::Start(const int section, const int level)
++{
++ Context *future = NULL;
++
++ // prepare future context
++ if (Current) {
++ // all reentrant debugs() calls get here; create a dedicated context
++ future = new Context(section, level);
++ } else {
++ // Optimization: Nearly all debugs() calls get here; avoid allocations
++ static Context *topContext = new Context(1, 1);
++ topContext->rewind(section, level);
++ future = topContext;
++ }
++
++ Current = future;
++
++ return future->buf;
++}
++
++void
++Debug::Finish()
++{
++ // TODO: Optimize to remove at least one extra copy.
++ _db_print("%s\n", Current->buf.str().c_str());
++
++ Context *past = Current;
++ Current = past->upper;
++ if (Current)
++ delete past;
++ // else it was a static topContext from Debug::Start()
+ }
+
+ size_t
+@@ -799,8 +817,8 @@
+
+ // finalize debugging level if no level was set explicitly via minLevel()
+ const int finalLevel = (level >= 0) ? level :
+- (size_ > 40 ? DBG_DATA : Debug::sectionLevel);
+- if (finalLevel <= Debug::sectionLevel) {
++ (size_ > 40 ? DBG_DATA : Debug::SectionLevel());
++ if (finalLevel <= Debug::SectionLevel()) {
+ os << (label_ ? '=' : ' ');
+ if (data_)
+ os.write(data_, size_);
+
+=== modified file 'src/esi/Expression.cc'
+--- src/esi/Expression.cc 2016-01-01 00:14:27 +0000
++++ src/esi/Expression.cc 2016-06-15 22:08:16 +0000
+@@ -116,8 +116,6 @@
+ static int membercompare(stackmember a, stackmember b);
+ static char const *trim(char const *s);
+ static stackmember getsymbol(const char *s, char const **endptr);
+-static void printliteral(stackmember s);
+-static void printmember(stackmember s);
+
+ /* -2 = failed to compate
+ * -1 = a less than b
+@@ -846,105 +844,106 @@
+ return rv;
+ }
+
+-void
+-printliteral(stackmember s)
++static void
++printLiteral(std::ostream &os, const stackmember &s)
+ {
+ switch (s.valuestored) {
+
+ case ESI_LITERAL_INVALID:
+- old_debug(86, 1)( " Invalid " );
++ os << " Invalid ";
+ break;
+
+ case ESI_LITERAL_FLOAT:
+- old_debug(86,1)("%f", s.value.floating);
++ os << s.value.floating;
+ break;
+
+ case ESI_LITERAL_STRING:
+- old_debug(86,1)("'%s'", s.value.string);
++ os << '\'' << s.value.string << '\'';
+ break;
+
+ case ESI_LITERAL_INT:
+- old_debug(86,1)("%d", s.value.integral);
++ os << s.value.integral;
+ break;
+
+ case ESI_LITERAL_BOOL:
+- old_debug(86,1)("%s",s.value.integral ? "true" : "false");
++ os << (s.value.integral ? "true" : "false");
+ }
+ }
+
+-void
+-printmember(stackmember s)
++static std::ostream &
++operator <<(std::ostream &os, const stackmember &s)
+ {
+ switch (s.valuetype) {
+
+ case ESI_EXPR_INVALID:
+- old_debug(86,1)(" Invalid ");
++ os << " Invalid ";
+ break;
+
+ case ESI_EXPR_LITERAL:
+- printliteral(s);
++ printLiteral(os, s);
+ break;
+
+ case ESI_EXPR_EXPR:
+- old_debug(86,1)("%s", s.value.integral ? "true" : "false");
++ os << (s.value.integral ? "true" : "false");
+ break;
+
+ case ESI_EXPR_OR:
+- old_debug(86,1)("|");
++ os << "|";
+ break;
+
+ case ESI_EXPR_AND:
+- old_debug(86,1)("&");
++ os << "&";
+ break;
+
+ case ESI_EXPR_NOT:
+- old_debug(86,1)("!");
++ os << "!";
+ break;
+
+ case ESI_EXPR_START:
+- old_debug(86,1)("(");
++ os << "(";
+ break;
+
+ case ESI_EXPR_END:
+- old_debug(86,1)(")");
++ os << ")";
+ break;
+
+ case ESI_EXPR_EQ:
+- old_debug(86,1)("==");
++ os << "==";
+ break;
+
+ case ESI_EXPR_NOTEQ:
+- old_debug(86,1)("!=");
++ os << "!=";
+ break;
+
+ case ESI_EXPR_LESS:
+- old_debug(86,1)("<");
++ os << "<";
+ break;
+
+ case ESI_EXPR_LESSEQ:
+- old_debug(86,1)("<=");
++ os << "<=";
+ break;
+
+ case ESI_EXPR_MORE:
+- old_debug(86,1)(">");
++ os << ">";
+ break;
+
+ case ESI_EXPR_MOREEQ:
+- old_debug(86,1)(">=");
++ os << ">=";
+ break;
+ }
++
++ return os;
+ }
+
+ void
+ dumpstack(stackmember * stack, int depth)
+ {
+- int i;
+-
+- for (i = 0; i < depth; ++i)
+- printmember(stack[i]);
+-
+- if (depth)
+- old_debug(86,1)("\n");
++ if (depth) {
++ std::ostringstream buf;
++ for (int i = 0; i < depth; ++i)
++ buf << stack[i];
++ debugs(86,1, buf.str());
++ }
+ }
+
+ int
+
+=== modified file 'src/servers/FtpServer.cc'
+--- src/servers/FtpServer.cc 2016-03-23 15:43:55 +0000
++++ src/servers/FtpServer.cc 2016-06-15 22:08:16 +0000
+@@ -1303,7 +1303,7 @@
+ Must(header.has(HDR_FTP_ARGUMENTS));
+ String ¶ms = header.findEntry(HDR_FTP_ARGUMENTS)->value;
+
+- if (do_debug(9, 2)) {
++ if (Debug::Enabled(9, 2)) {
+ MemBuf mb;
+ Packer p;
+ mb.init();
+
+=== modified file 'src/ssl/support.cc'
+--- src/ssl/support.cc 2016-04-19 15:04:09 +0000
++++ src/ssl/support.cc 2016-06-15 22:08:16 +0000
+@@ -135,7 +135,7 @@
+ }
+
+ if (newkey) {
+- if (do_debug(83, 5))
++ if (Debug::Enabled(83, 5))
+ PEM_write_RSAPrivateKey(debug_log, rsa, NULL, NULL, 0, NULL, NULL);
+
+ debugs(83, DBG_IMPORTANT, "Generated ephemeral RSA key of length " << keylen);
+
+=== modified file 'src/tests/stub_debug.cc'
+--- src/tests/stub_debug.cc 2016-01-01 00:14:27 +0000
++++ src/tests/stub_debug.cc 2016-06-15 22:08:16 +0000
+@@ -17,14 +17,11 @@
+ #include "Debug.h"
+
+ FILE *debug_log = NULL;
+-int Debug::TheDepth = 0;
+
+ char *Debug::debugOptions;
+ char *Debug::cache_log= NULL;
+ int Debug::rotateNumber = 0;
+ int Debug::Levels[MAX_DEBUG_SECTIONS];
+-int Debug::level;
+-int Debug::sectionLevel;
+ int Debug::override_X = 0;
+ int Debug::log_stderr = 1;
+ bool Debug::log_syslog = false;
+@@ -81,71 +78,52 @@
+ static void
+ _db_print_stderr(const char *format, va_list args)
+ {
+- if (1 < Debug::level)
++ if (1 < Debug::Level())
+ return;
+
+ vfprintf(stderr, format, args);
+ }
+
+-Debug::OutStream *Debug::CurrentDebug(NULL);
+-
+-std::ostream &
+-Debug::getDebugOut()
+-{
+- assert(TheDepth >= 0);
+- ++TheDepth;
+- if (TheDepth > 1) {
+- assert(CurrentDebug);
+- *CurrentDebug << std::endl << "reentrant debuging " << TheDepth << "-{";
+- } else {
+- assert(!CurrentDebug);
+- CurrentDebug = new Debug::OutStream;
+- // set default formatting flags
+- CurrentDebug->setf(std::ios::fixed);
+- CurrentDebug->precision(2);
+- }
+- return *CurrentDebug;
+-}
+-
+ void
+ Debug::parseOptions(char const *)
+ {
+ return;
+ }
+
+-void
+-Debug::finishDebug()
+-{
+- assert(TheDepth >= 0);
+- assert(CurrentDebug);
+- if (TheDepth > 1) {
+- *CurrentDebug << "}-" << TheDepth << std::endl;
+- } else {
+- assert(TheDepth == 1);
+- _db_print("%s\n", CurrentDebug->str().c_str());
+- delete CurrentDebug;
+- CurrentDebug = NULL;
+- }
+- --TheDepth;
+-}
+-
+-void
+-Debug::xassert(const char *msg, const char *file, int line)
+-{
+-
+- if (CurrentDebug) {
+- *CurrentDebug << "assertion failed: " << file << ":" << line <<
+- ": \"" << msg << "\"";
+- }
+- abort();
+-}
+-
+ const char*
+ SkipBuildPrefix(const char* path)
+ {
+ return path;
+ }
+
++Debug::Context *Debug::Current = NULL;
++
++Debug::Context::Context(const int aSection, const int aLevel):
++ level(aLevel),
++ sectionLevel(Levels[aSection]),
++ upper(Current)
++{
++ buf.setf(std::ios::fixed);
++ buf.precision(2);
++}
++
++std::ostringstream &
++Debug::Start(const int section, const int level)
++{
++ Current = new Context(section, level);
++ return Current->buf;
++}
++
++void
++Debug::Finish()
++{
++ if (Current) {
++ _db_print("%s\n", Current->buf.str().c_str());
++ delete Current;
++ Current = NULL;
++ }
++}
++
+ std::ostream &
+ Raw::print(std::ostream &os) const
+ {
+@@ -157,10 +135,13 @@
+
+ // finalize debugging level if no level was set explicitly via minLevel()
+ const int finalLevel = (level >= 0) ? level :
+- (size_ > 40 ? DBG_DATA : Debug::sectionLevel);
+- if (finalLevel <= Debug::sectionLevel) {
++ (size_ > 40 ? DBG_DATA : Debug::SectionLevel());
++ if (finalLevel <= Debug::SectionLevel()) {
+ os << (label_ ? '=' : ' ');
+- os.write(data_, size_);
++ if (data_)
++ os.write(data_, size_);
++ else
++ os << "[null]";
+ }
+
+ return os;
+
diff --git a/src/patches/squid/squid-3.5-14059.patch b/src/patches/squid/squid-3.5-14059.patch
new file mode 100644
index 0000000..5fbd503
--- /dev/null
+++ b/src/patches/squid/squid-3.5-14059.patch
@@ -0,0 +1,49 @@
+------------------------------------------------------------
+revno: 14059
+revision-id: squidadm(a)squid-cache.org-20160616001416-jb7a6qq30tm5gpoc
+parent: squid3(a)treenet.co.nz-20160615220816-yqh6bmry6ijvfwi1
+committer: Source Maintenance <squidadm(a)squid-cache.org>
+branch nick: 3.5
+timestamp: Thu 2016-06-16 00:14:16 +0000
+message:
+ SourceFormat Enforcement
+------------------------------------------------------------
+# Bazaar merge directive format 2 (Bazaar 0.90)
+# revision_id: squidadm(a)squid-cache.org-20160616001416-\
+# jb7a6qq30tm5gpoc
+# target_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# testament_sha1: 222d2b2638e1aae18afd737bbdf56623ee8ecab3
+# timestamp: 2016-06-16 00:51:03 +0000
+# source_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# base_revision_id: squid3(a)treenet.co.nz-20160615220816-\
+# yqh6bmry6ijvfwi1
+#
+# Begin patch
+=== modified file 'src/adaptation/ecap/Host.cc'
+--- src/adaptation/ecap/Host.cc 2016-06-15 22:08:16 +0000
++++ src/adaptation/ecap/Host.cc 2016-06-16 00:14:16 +0000
+@@ -148,8 +148,8 @@
+ const int squidLevel = SquidLogLevel(lv);
+ const int squidSection = 93; // XXX: this should be a global constant
+ return Debug::Enabled(squidSection, squidLevel) ?
+- &Debug::Start(squidSection, squidLevel) :
+- NULL;
++ &Debug::Start(squidSection, squidLevel) :
++ NULL;
+ }
+
+ void
+
+=== modified file 'src/debug.cc'
+--- src/debug.cc 2016-06-15 22:08:16 +0000
++++ src/debug.cc 2016-06-16 00:14:16 +0000
+@@ -729,7 +729,7 @@
+ level = aLevel;
+ sectionLevel = Levels[aSection];
+ assert(upper == Current);
+-
++
+ buf.str(std::string());
+ buf.clear();
+ // debugs() users are supposed to preserve format, but
+
diff --git a/src/patches/squid/squid-3.5-14060.patch b/src/patches/squid/squid-3.5-14060.patch
new file mode 100644
index 0000000..02e8675
--- /dev/null
+++ b/src/patches/squid/squid-3.5-14060.patch
@@ -0,0 +1,117 @@
+------------------------------------------------------------
+revno: 14060
+revision-id: squid3(a)treenet.co.nz-20160618114803-m7riuy90mrdlxw1f
+parent: squidadm(a)squid-cache.org-20160616001416-jb7a6qq30tm5gpoc
+fixes bug: http://bugs.squid-cache.org/show_bug.cgi?id=3579
+committer: Amos Jeffries <squid3(a)treenet.co.nz>
+branch nick: 3.5
+timestamp: Sat 2016-06-18 23:48:03 +1200
+message:
+ Bug 3579: assertion failed 'MemPools[type]' from dst_as ACL
+------------------------------------------------------------
+# Bazaar merge directive format 2 (Bazaar 0.90)
+# revision_id: squid3(a)treenet.co.nz-20160618114803-m7riuy90mrdlxw1f
+# target_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# testament_sha1: cc798e8d0b4767544c21f3614ce995d435bca867
+# timestamp: 2016-06-18 11:50:56 +0000
+# source_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# base_revision_id: squidadm(a)squid-cache.org-20160616001416-\
+# jb7a6qq30tm5gpoc
+#
+# Begin patch
+=== modified file 'src/PeerSelectState.h'
+--- src/PeerSelectState.h 2016-01-01 00:14:27 +0000
++++ src/PeerSelectState.h 2016-06-18 11:48:03 +0000
+@@ -38,11 +38,17 @@
+ class FwdServer
+ {
+ public:
++ MEMPROXY_CLASS(FwdServer);
++ FwdServer(CachePeer *p, hier_code c) : _peer(cbdataReference(p)), code(c), next(NULL) {}
++ ~FwdServer() {cbdataReferenceDone(_peer);}
++
+ CachePeer *_peer; /* NULL --> origin server */
+ hier_code code;
+ FwdServer *next;
+ };
+
++MEMPROXY_CLASS_INLINE(FwdServer);
++
+ class ps_state
+ {
+
+
+=== modified file 'src/enums.h'
+--- src/enums.h 2016-01-01 00:14:27 +0000
++++ src/enums.h 2016-06-18 11:48:03 +0000
+@@ -170,7 +170,6 @@
+ MEM_DONTFREE,
+ // following pools are initialized late by their component if needed (or never)
+ MEM_FQDNCACHE_ENTRY,
+- MEM_FWD_SERVER,
+ MEM_IDNS_QUERY,
+ MEM_IPCACHE_ENTRY,
+ MEM_MAX
+
+=== modified file 'src/peer_select.cc'
+--- src/peer_select.cc 2016-01-01 00:14:27 +0000
++++ src/peer_select.cc 2016-06-18 11:48:03 +0000
+@@ -71,7 +71,7 @@
+ while (servers) {
+ FwdServer *next = servers->next;
+ cbdataReferenceDone(servers->_peer);
+- memFree(servers, MEM_FWD_SERVER);
++ delete servers;
+ servers = next;
+ }
+
+@@ -246,7 +246,7 @@
+ // clear the used fs and continue
+ psstate->servers = fs->next;
+ cbdataReferenceDone(fs->_peer);
+- memFree(fs, MEM_FWD_SERVER);
++ delete fs;
+ peerSelectDnsPaths(psstate);
+ return;
+ }
+@@ -268,7 +268,7 @@
+ while (fs) {
+ psstate->servers = fs->next;
+ cbdataReferenceDone(fs->_peer);
+- memFree(fs, MEM_FWD_SERVER);
++ delete fs;
+ fs = psstate->servers;
+ }
+ }
+@@ -377,7 +377,7 @@
+
+ psstate->servers = fs->next;
+ cbdataReferenceDone(fs->_peer);
+- memFree(fs, MEM_FWD_SERVER);
++ delete fs;
+
+ // see if more paths can be found
+ peerSelectDnsPaths(psstate);
+@@ -772,7 +772,6 @@
+ peerSelectInit(void)
+ {
+ memset(&PeerStats, '\0', sizeof(PeerStats));
+- memDataInit(MEM_FWD_SERVER, "FwdServer", sizeof(FwdServer), 0);
+ }
+
+ static void
+@@ -934,12 +933,10 @@
+ static void
+ peerAddFwdServer(FwdServer ** FSVR, CachePeer * p, hier_code code)
+ {
+- FwdServer *fs = (FwdServer *)memAllocate(MEM_FWD_SERVER);
+ debugs(44, 5, "peerAddFwdServer: adding " <<
+ (p ? p->host : "DIRECT") << " " <<
+ hier_code_str[code] );
+- fs->_peer = cbdataReference(p);
+- fs->code = code;
++ FwdServer *fs = new FwdServer(p, code);
+
+ while (*FSVR)
+ FSVR = &(*FSVR)->next;
+
diff --git a/src/patches/squid/squid-3.5-14061.patch b/src/patches/squid/squid-3.5-14061.patch
new file mode 100644
index 0000000..0985db5
--- /dev/null
+++ b/src/patches/squid/squid-3.5-14061.patch
@@ -0,0 +1,237 @@
+------------------------------------------------------------
+revno: 14061
+revision-id: squid3(a)treenet.co.nz-20160618133607-yt9vr8gjdrctcqd1
+parent: squid3(a)treenet.co.nz-20160618114803-m7riuy90mrdlxw1f
+author: Alex Rousskov <rousskov(a)measurement-factory.com>
+committer: Amos Jeffries <squid3(a)treenet.co.nz>
+branch nick: 3.5
+timestamp: Sun 2016-06-19 01:36:07 +1200
+message:
+ Fixed ConnStateData::In::maybeMakeSpaceAvailable() logic.
+
+ This change fixes logic bugs that mostly affect performance: In micro-
+ tests, this change gives 10% performance improvement.
+
+ maybeMakeSpaceAvailable() is called with an essentially random in.buf.
+ The method must prepare in.buf for the next network read. The old code
+ was not doing that [well enough], leading to performance problems.
+
+ In some environments, in.buf often ends up having tiny space exceeding 2
+ bytes (e.g., 6 bytes). This happens, for example, when Squid creates and
+ parses a fake CONNECT request. The old code often left such tiny in.bufs
+ "as is" because we tried to ensure that we have at least 2 bytes to read
+ instead of trying to provide a reasonable number of buffer space for the
+ next network read. Tiny buffers naturally result in tiny network reads,
+ which are very inefficient, especially for non-incremental parsers.
+
+ I have removed the explicit "2 byte" space checks: Both the new and the
+ old code do not _guarantee_ that at least 2 bytes of buffer space are
+ always available, and the caller does not check that condition either.
+ If some other code relies on it, more fixes will be needed (but this
+ change is not breaking that guarantee -- either it was broken earlier or
+ was never fully enforced). In practice, only buffers approaching
+ Config.maxRequestBufferSize limit may violate this guarantee AFAICT, and
+ those buffers ought to be rare, so the bug, if any, remains unnoticed.
+
+ Another subtle maybeMakeSpaceAvailable() problem was that the code
+ contained its own buffer capacity increase algorithm (n^2 growth).
+ However, increasing buffer capacity exponentially does not make much
+ sense because network read sizes are not going to increase
+ exponentially. Also, memAllocStringmemAllocate() overwrites n^2 growth
+ with its own logic. Besides, it is buffer _space_, not the total
+ capacity that should be increased. More work is needed to better match
+ Squid buffer size for from-user network reads with the TCP stack buffers
+ and traffic patterns.
+
+ Both the old and the new code reallocate in.buf MemBlobs. However, the
+ new code leaves "reallocate or memmove" decision to the new
+ SBuf::reserve(), opening the possibility for future memmove
+ optimizations that SBuf/MemBlob do not currently support.
+
+ It is probably wrong that in.buf points to an essentially random MemBlob
+ outside ConnStateData control but this change does not attempt to fix that.
+------------------------------------------------------------
+# Bazaar merge directive format 2 (Bazaar 0.90)
+# revision_id: squid3(a)treenet.co.nz-20160618133607-yt9vr8gjdrctcqd1
+# target_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# testament_sha1: 86f65c860a5470008ab241b44a72d4cd35418e73
+# timestamp: 2016-06-18 13:50:58 +0000
+# source_branch: http://bzr.squid-cache.org/bzr/squid3/3.5
+# base_revision_id: squid3(a)treenet.co.nz-20160618114803-\
+# m7riuy90mrdlxw1f
+#
+# Begin patch
+=== modified file 'src/SBuf.cc'
+--- src/SBuf.cc 2016-01-01 00:14:27 +0000
++++ src/SBuf.cc 2016-06-18 13:36:07 +0000
+@@ -162,6 +162,29 @@
+ cow(minCapacity);
+ }
+
++SBuf::size_type
++SBuf::reserve(const SBufReservationRequirements &req)
++{
++ debugs(24, 8, id << " was: " << off_ << '+' << len_ << '+' << spaceSize() <<
++ '=' << store_->capacity);
++
++ const bool mustRealloc = !req.allowShared && store_->LockCount() > 1;
++
++ if (!mustRealloc && spaceSize() >= req.minSpace)
++ return spaceSize(); // the caller is content with what we have
++
++ /* only reallocation can make the caller happy */
++
++ if (!mustRealloc && len_ >= req.maxCapacity)
++ return spaceSize(); // but we cannot reallocate
++
++ const size_type newSpace = std::min(req.idealSpace, maxSize - len_);
++ reserveCapacity(std::min(len_ + newSpace, req.maxCapacity));
++ debugs(24, 7, id << " now: " << off_ << '+' << len_ << '+' << spaceSize() <<
++ '=' << store_->capacity);
++ return spaceSize(); // reallocated and probably reserved enough space
++}
++
+ char *
+ SBuf::rawSpace(size_type minSpace)
+ {
+
+=== modified file 'src/SBuf.h'
+--- src/SBuf.h 2016-01-01 00:14:27 +0000
++++ src/SBuf.h 2016-06-18 13:36:07 +0000
+@@ -75,6 +75,7 @@
+ };
+
+ class CharacterSet;
++class SBufReservationRequirements;
+
+ /**
+ * A String or Buffer.
+@@ -424,6 +425,12 @@
+ */
+ void reserveCapacity(size_type minCapacity);
+
++ /** Accommodate caller's requirements regarding SBuf's storage if possible.
++ *
++ * \return spaceSize(), which may be zero
++ */
++ size_type reserve(const SBufReservationRequirements &requirements);
++
+ /** slicing method
+ *
+ * Removes SBuf prefix and suffix, leaving a sequence of 'n'
+@@ -617,6 +624,24 @@
+ SBuf& lowAppend(const char * memArea, size_type areaSize);
+ };
+
++/// Named SBuf::reserve() parameters. Defaults ask for and restrict nothing.
++class SBufReservationRequirements
++{
++public:
++ typedef SBuf::size_type size_type;
++
++ SBufReservationRequirements() : idealSpace(0), minSpace(0), maxCapacity(SBuf::maxSize), allowShared(true) {}
++
++ /*
++ * Parameters are listed in the reverse order of importance: Satisfaction of
++ * the lower-listed requirements may violate the higher-listed requirements.
++ */
++ size_type idealSpace; ///< if allocating anyway, provide this much space
++ size_type minSpace; ///< allocate if spaceSize() is smaller
++ size_type maxCapacity; ///< do not allocate more than this
++ bool allowShared; ///< whether sharing our storage with others is OK
++};
++
+ /// ostream output operator
+ inline std::ostream &
+ operator <<(std::ostream& os, const SBuf& S)
+
+=== modified file 'src/client_side.cc'
+--- src/client_side.cc 2016-06-15 22:08:16 +0000
++++ src/client_side.cc 2016-06-18 13:36:07 +0000
+@@ -2351,26 +2351,24 @@
+ return result;
+ }
+
+-bool
++/// Prepare inBuf for I/O. This method balances several conflicting desires:
++/// 1. Do not read too few bytes at a time.
++/// 2. Do not waste too much buffer space.
++/// 3. Do not [re]allocate or memmove the buffer too much.
++/// 4. Obey Config.maxRequestBufferSize limit.
++void
+ ConnStateData::In::maybeMakeSpaceAvailable()
+ {
+- if (buf.spaceSize() < 2) {
+- const SBuf::size_type haveCapacity = buf.length() + buf.spaceSize();
+- if (haveCapacity >= Config.maxRequestBufferSize) {
+- debugs(33, 4, "request buffer full: client_request_buffer_max_size=" << Config.maxRequestBufferSize);
+- return false;
+- }
+- if (haveCapacity == 0) {
+- // haveCapacity is based on the SBuf visible window of the MemBlob buffer, which may fill up.
+- // at which point bump the buffer back to default. This allocates a new MemBlob with any un-parsed bytes.
+- buf.reserveCapacity(CLIENT_REQ_BUF_SZ);
+- } else {
+- const SBuf::size_type wantCapacity = min(static_cast<SBuf::size_type>(Config.maxRequestBufferSize), haveCapacity*2);
+- buf.reserveCapacity(wantCapacity);
+- }
+- debugs(33, 2, "growing request buffer: available=" << buf.spaceSize() << " used=" << buf.length());
+- }
+- return (buf.spaceSize() >= 2);
++ // The hard-coded parameters are arbitrary but seem reasonable.
++ // A careful study of Squid I/O and parsing patterns is needed to tune them.
++ SBufReservationRequirements requirements;
++ requirements.minSpace = 1024; // smaller I/Os are not worth their overhead
++ requirements.idealSpace = CLIENT_REQ_BUF_SZ; // we expect few larger I/Os
++ requirements.maxCapacity = Config.maxRequestBufferSize;
++ requirements.allowShared = true; // allow because inBuf is used immediately
++ buf.reserve(requirements);
++ if (!buf.spaceSize())
++ debugs(33, 4, "request buffer full: client_request_buffer_max_size=" << Config.maxRequestBufferSize);
+ }
+
+ void
+
+=== modified file 'src/client_side.h'
+--- src/client_side.h 2016-01-01 00:14:27 +0000
++++ src/client_side.h 2016-06-18 13:36:07 +0000
+@@ -195,10 +195,11 @@
+ // Client TCP connection details from comm layer.
+ Comm::ConnectionPointer clientConnection;
+
+- struct In {
++ class In {
++ public:
+ In();
+ ~In();
+- bool maybeMakeSpaceAvailable();
++ void maybeMakeSpaceAvailable();
+
+ ChunkedCodingParser *bodyParser; ///< parses chunked request body
+ SBuf buf;
+
+=== modified file 'src/tests/stub_SBuf.cc'
+--- src/tests/stub_SBuf.cc 2016-01-01 00:14:27 +0000
++++ src/tests/stub_SBuf.cc 2016-06-18 13:36:07 +0000
+@@ -53,6 +53,7 @@
+ void SBuf::forceSize(size_type newSize) STUB
+ const char* SBuf::c_str() STUB_RETVAL("")
+ void SBuf::reserveCapacity(size_type minCapacity) STUB
++SBuf::size_type SBuf::reserve(const SBufReservationRequirements &) STUB_RETVAL(0)
+ SBuf& SBuf::chop(size_type pos, size_type n) STUB_RETVAL(*this)
+ SBuf& SBuf::trim(const SBuf &toRemove, bool atBeginning, bool atEnd) STUB_RETVAL(*this)
+ SBuf SBuf::substr(size_type pos, size_type n) const STUB_RETVAL(*this)
+
+=== modified file 'src/tests/stub_client_side.cc'
+--- src/tests/stub_client_side.cc 2016-01-01 00:14:27 +0000
++++ src/tests/stub_client_side.cc 2016-06-18 13:36:07 +0000
+@@ -80,7 +80,7 @@
+ bool ConnStateData::serveDelayedError(ClientSocketContext *context) STUB_RETVAL(false)
+ #endif
+
+-bool ConnStateData::In::maybeMakeSpaceAvailable() STUB_RETVAL(false)
++void ConnStateData::In::maybeMakeSpaceAvailable() STUB
+
+ void setLogUri(ClientHttpRequest * http, char const *uri, bool cleanUrl) STUB
+ const char *findTrailingHTTPVersion(const char *uriAndHTTPVersion, const char *end) STUB_RETVAL(NULL)
+
--
2.9.0
^ permalink raw reply [flat|nested] 2+ messages in thread
end of thread, other threads:[~2016-06-21 18:22 UTC | newest]
Thread overview: 2+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2016-05-23 12:16 [PATCH] squid 3.5.19: latest patches from upstream Matthias Fischer
2016-06-21 18:22 Matthias Fischer
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox