From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: (qmail 32125 invoked by alias); 16 Aug 2012 13:51:26 -0000 Received: (qmail 32076 invoked by uid 22791); 16 Aug 2012 13:51:24 -0000 X-SWARE-Spam-Status: No, hits=-6.0 required=5.0 tests=AWL,BAYES_00,KHOP_RCVD_UNTRUST,RCVD_IN_DNSWL_HI,RCVD_IN_HOSTKARMA_W,RP_MATCHES_RCVD,SPF_HELO_PASS X-Spam-Check-By: sourceware.org Received: from mx1.redhat.com (HELO mx1.redhat.com) (209.132.183.28) by sourceware.org (qpsmtpd/0.43rc1) with ESMTP; Thu, 16 Aug 2012 13:51:09 +0000 Received: from int-mx02.intmail.prod.int.phx2.redhat.com (int-mx02.intmail.prod.int.phx2.redhat.com [10.5.11.12]) by mx1.redhat.com (8.14.4/8.14.4) with ESMTP id q7GDp9Te027592 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=OK); Thu, 16 Aug 2012 09:51:09 -0400 Received: from fche.csb (vpn-8-57.rdu.redhat.com [10.11.8.57]) by int-mx02.intmail.prod.int.phx2.redhat.com (8.13.8/8.13.8) with ESMTP id q7GDp8p2011116; Thu, 16 Aug 2012 09:51:09 -0400 Received: by fche.csb (Postfix, from userid 2569) id 376A458151; Thu, 16 Aug 2012 09:51:08 -0400 (EDT) Date: Thu, 16 Aug 2012 13:51:00 -0000 From: "Frank Ch. Eigler" To: Diego Novillo Cc: overseers@gcc.gnu.org Subject: Re: Frequent 'connection reset by peer' messages from the git server Message-ID: <20120816135108.GA10973@redhat.com> References: <502CFA76.3010103@google.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <502CFA76.3010103@google.com> User-Agent: Mutt/1.4.2.2i Mailing-List: contact overseers-help@sourceware.org; run by ezmlm Precedence: bulk List-Id: List-Archive: List-Post: List-Help: , Sender: overseers-owner@sourceware.org X-SW-Source: 2012-q3/txt/msg00070.txt.bz2 Hi - > I've been getting into this situation quite a bit recently: > > $ git pull > fatal: read error: Connection reset by peer > > $ git remote -v > origin git://gcc.gnu.org/git/gcc.git (fetch) > origin git://gcc.gnu.org/git/gcc.git (push) > > Is the machine too overloaded or the server too restricted in how many > connections it can serve? Perhaps both. Use the non-anonymous ssh:// URL to bypass load restrictions. - FChE