httpd-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Rob Hartill <r...@imdb.com>
Subject [BUG]: "HTML files <IMG> crate zombies " on FreeBSDLinux (fwd)
Date Tue, 25 Feb 1997 13:05:40 GMT

This seems to be complete nonsense unless I'm misreading it.

not acked.

---------- Forwarded message ----------
Date: Mon Feb 24 23:46:26 1997
From: sk@www.russia.net
To: apache-bugs%apache.org@organic.com
Subject: [BUG]: "HTML files <IMG> crate zombies " on FreeBSDLinux

Submitter: sk@www.russia.net
Operating system: FreeBSDLinux, version: 
Version of Apache Used: 1.1.1, 1.2.something
Extra Modules used: no dependance
URL exhibiting problem: 

Symptoms:
--
The html :

#! /usr/bin/perl 
print "Content-type: text/html\n\n";
print "<META HTTP-EQUIV=\"Refresh\"  CONTENT=10>\n";
$cnt=0;
$maxcnt=10;
while($cnt!=$maxcnt){
print "<IMG SRC=\"/cgi-bin/somebinary?arglist\">\n";
$cnt++;
}

print "</HTML>\n";


This is just enough to start zombie which will be
the httpd responsible for.

Zombies will be the 'somebinary's

The number of zombie creation might range in 1,2,...
(not exactly one zombie)

the frequency of zombie emergence will greately depend on the
system load average, and in order to watch you may have to 
sit waiting for a while.

The problem reported by the hackers is the
incorrect loop structure in the alloc.c
fork()/signal()/wait() handling.

The potential problems arizing seem to be easy to
model by waiting in the perl script which produces the HTML
page, while allocing lots of memory in the child 'somebinary'

Regards, 
Serguei Kouzmine

--

Backtrace:
--

--



Mime
View raw message