Bug ID 1104553: HTTP_REJECT processing can lead to zombie SPAWN flows piling up

Last Modified: Sep 29, 2022

Bug Tracker

Affected Product:  See more info
BIG-IP LTM(all modules)

Known Affected Versions:
15.1.0, 15.1.0.1, 15.1.0.2, 15.1.0.3, 15.1.0.4, 15.1.0.5, 15.1.1, 15.1.2, 15.1.2.1, 15.1.3, 15.1.3.1, 15.1.4, 15.1.4.1, 15.1.5, 15.1.5.1, 15.1.6, 15.1.6.1

Fixed In:
15.1.7

Opened: May 05, 2022
Severity: 3-Major

Symptoms

In the execution of a specific sequence of events, when TCL attempts to execute the non-existing event, it follows a path which in turn makes SPAWN flow to become a zombie, which pile up over time showing up on the monitoring system.

Impact

Clients may not be able to connect to the virtual server after a point in time.

Conditions

-- http2, client-ssl, optimized-caching filters on the virtual server -- HTTP::respond iRule with LB_FAILED event and set of iRules like HTTP_REQUEST, HTTP_RESPONSE, CLIENTSSL_HANDSHAKE, CACHE_RESPONSE, ASM_REQUEST_BLOCKING -- send http2 request through the virtual server

Workaround

None

Fix Information

This defect has been resolved and stale connections are being cleaned up as expected.

Behavior Change