httpd-bugs mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From bugzi...@apache.org
Subject DO NOT REPLY [Bug 44854] httpd dumps core on a module using apache_log_request on solaris
Date Fri, 25 Apr 2008 07:34:26 GMT
https://issues.apache.org/bugzilla/show_bug.cgi?id=44854


rahul <rahul@sun.com> changed:

           What    |Removed                     |Added
----------------------------------------------------------------------------
             Status|RESOLVED                    |REOPENED
         Resolution|INVALID                     |




--- Comment #7 from rahul <rahul@sun.com>  2008-04-25 00:34:25 PST ---
Here is the stack trace again , (I renamed apache_log_request to
lgtst_log_request)

]stop in lgtst_log_request
(2) stop in lgtst_log_request
]c                       
t@1 (l@1) stopped in lgtst_log_request at line 19 in file "mod_logtst.c"
   19       const char *redirectLocation = NULL;
]where                   
current thread: t@1
=>[1] lgtst_log_request(r = 0x1d7130), line 19 in "mod_logtst.c"
  [2] ap_run_log_transaction(r = 0x1d7130), line 1744 in "protocol.c"
  [3] ap_process_request(r = 0x1d7130), line 284 in "http_request.c"
  [4] ap_process_http_connection(c = 0x1d33b8), line 190 in "http_core.c"
  [5] ap_run_process_connection(c = 0x1d33b8), line 43 in "connection.c"
  [6] child_main(child_num_arg = 0), line 640 in "prefork.c"
  [7] make_child(s = 0x6d000, slot = 1), line 736 in "prefork.c"
  [8] ap_mpm_run(_pconf = 0x9d800, plog = 0x9fc00, s = 0x9fc00), line 871 in
"prefork.c"
  [9] main(argc = 7, argv = 0xffbff11c), line 730 in "main.c"
]p r.headers_out
r->headers_out = 0x400
]p r.headers_in
r->headers_in = (nil)

]p *r
*r = {
    pool                 = 0x1d70f8
    connection           = 0x1d33b8
    server               = 0xaf758
    next                 = (nil)
    prev                 = (nil)
    main                 = (nil)
    the_request          = 0x1d7f50 "POST /eat_post HTTP/1.1"
    assbackwards         = 0
    proxyreq             = 0
    header_only          = 0
    protocol             = 0x1d7fd8 "HTTP/1.1"
    proto_num            = 1001
    hostname             = 0x1d8248 "localhost"
    request_time         = 1209107790930910LL
    status_line          = 0x81bf0 "200 OK"
    status               = 200
    method               = 0x1d7fa0 "POST"
    method_number        = 2
    allowed              = 0
    allowed_xmethods     = (nil)
    allowed_methods      = 0x1d72d8
    sent_bodyct          = 0
    bytes_sent           = 1
    mtime                = 5LL
    chunked              = 0
    range                = (nil)
    clength              = 0
    remaining            = 0
    read_length          = 0
    read_body            = 5
    read_chunked         = 0
    expecting_100        = 0
    headers_in           = (nil)
    headers_out          = 0x400
    err_headers_out      = 0x1
    subprocess_env       = (nil)
    notes                = (nil)
    content_type         = 0x1d7308 ""
    handler              = 0x1d7798 ""
    content_encoding     = 0x1d7940 ""
    content_languages    = 0x1d8b58
    vlist_validator      = 0x1d7a98 ""
    user                 = (nil)
    ap_auth_type         = 0x184d48 "eat_post"
    no_cache             = 0
    no_local_copy        = 0
    unparsed_uri         = (nil)
    uri                  = (nil)
    filename             = (nil)
    canonical_filename   = (nil)
    path_info            = (nil)
    args                 = 0x1d7fb8 "/eat_post"
    finfo                = {
        pool       = 0x1d7fc8
        valid      = 1934848
        protection = 1934848
        filetype   = 1934704
        user       = 0
        group      = 0
        inode      = 1929464U
        device     = 7598960U
        nlink      = 1877
        size       = 0
        csize      = 152090
        atime      = 890192132571151LL
        mtime      = 30244686384LL
        ctime      = 512LL
        fname      = (nil)
        name       = 0x400 "<bad address 0x400>"
        filehand   = 0x44bad
    }
    parsed_uri           = {
        scheme         = 0x44b6f "\xf8\xc2#\xa0\\x90^V#\xe8\x9a^Sb\xb0^P\x80"
        hostinfo       = 0xb944f61d "<bad address 0xb944f61d>"
        user           = 0x44b6f "\xf8\xc2#\xa0\\x90^V#\xe8\x9a^Sb\xb0^P\x80"
        password       = 0xb944f61d "<bad address 0xb944f61d>"
        hostname       = 0x1d8600 "/space/httpd-framework/t/htdocs/eat_post"
        port_str       = 0x7fbf9438 ""
        path           = 0x1cf "<bad address 0x1cf>"
        query          = 0x7860dd1 "<bad address 0x7860dd1>"
        fragment       = (nil)
        hostent        = (nil)
        port           = 0
        is_initialized = 0
        dns_looked_up  = 0
        dns_resolved   = 0
    }
    used_path_info       = 0
    per_dir_config       = (nil)
    request_config       = 0x1d8261
    htaccess             = 0x1d7fc8
    output_filters       = (nil)
    input_filters        = (nil)
    proto_output_filters = (nil)
    proto_input_filters  = 0x21518000
    eos_sent             = 2
}


As can be seen, the memmory of request_rec seems to be corrupted.

Some information on reproducing it:
1) It is seen only when running t/http11/post.t and is seen on every second
request.
2) Unable to reproduce it by simple submission of same POST data through telnet
or the other clients (possibly because I do not know exactly what the Apache
perl-framework does.)
3) It is not a one-machine bug, I am able to reproduce it in any 'Solaris'
machine with any apache from 2.2.6 to 2.2.8 (both sparc and x86)


-- 
Configure bugmail: https://issues.apache.org/bugzilla/userprefs.cgi?tab=email
------- You are receiving this mail because: -------
You are the assignee for the bug.

---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@httpd.apache.org
For additional commands, e-mail: bugs-help@httpd.apache.org


Mime
View raw message