When the worker pool rejected a connection (ErrPoolOverload), the accepted net.Conn was never closed — leaking a file descriptor and TCP socket per rejected connection. Under sustained traffic spikes this compounds the problem: leaked descriptors reduce the capacity for new dials (including to the fronting domain), accelerating the failure cascade described in #378.tags/v2.2.5^2^2
|
|
||
| 152 |
|
152 |
|
| 153 |
|
153 |
|
| 154 |
|
154 |
|
|
155 |
|
|
| 155 |
|
156 |
|
| 156 |
|
157 |
|
| 157 |
|
158 |
|