When the worker pool rejected a connection (ErrPoolOverload), the accepted net.Conn was never closed — leaking a file descriptor and TCP socket per rejected connection. Under sustained traffic spikes this compounds the problem: leaked descriptors reduce the capacity for new dials (including to the fronting domain), accelerating the failure cascade described in #378.tags/v2.2.5^2^2
|
||
| 152 | 152 |
|
| 153 | 153 |
|
| 154 | 154 |
|
| 155 |
|
|
| 155 | 156 |
|
| 156 | 157 |
|
| 157 | 158 |
|