httpd-dev mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Sander Temme <scte...@apache.org>
Subject Re: [pre-release] 2.0.55 *candidate* available for testing
Date Thu, 13 Oct 2005 18:11:31 GMT
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1


On Oct 10, 2005, at 9:35 AM, William A. Rowe, Jr. wrote:

> Sander Temme wrote:
>
>> On Oct 9, 2005, at 9:42 PM, William A. Rowe, Jr. wrote:
>>
>>> The httpd-2.0.55 candidate, including win32 source .zip and   
>>> installers*,
>>>
>> As of 17:59 CEST (15 minutes ago), 2.0.55 is running on   
>> www.apache.org. Please report any anomalies.
>>
>
> Ack, starting clock with 72 hours to GA, contingent upon an absence
> of problem reports (specificially regressions).

Six more cores since the last update of mod_mbox. Then twenty more  
appeared with exactly the same timestamp: probably some bot pounding  
the site.

Quick story: all the cores I've analyzed are mod_mbox crashes. None  
in other parts of httpd.

+1 for GA based on running for 72 hours on www.apache.org without  
crashes in the distributed code.

S.

Brief analysis of some of the cores follows:

/raid1/httpd-cores/core.5885

#0  mbox_mime_decode_body (p=0x0, cte=CTE_NONE, body=0x0, len=0) at  
mod_mbox_mime.c:290
#1  0x2000000001011110 in mbox_mime_get_body (p=0x60000000002509c8,  
m=0x6000000000063130) at mod_mbox_mime.c:299
#2  0x200000000100d2e0 in mbox_static_message (r=0x6000000000250a30,  
f=0x60000000001ed530) at mod_mbox_out.c:1151
#3  0x2000000001008ca0 in mbox_file_handler (r=0x6000000000250a30) at  
mod_mbox_file.c:231
#4  0x4000000000035f90 in ap_run_handler (r=0x6000000000250a30) at  
config.c:153
#5  0x4000000000036f70 in ap_invoke_handler (r=0x6000000000250a30) at  
config.c:317
#6  0x400000000002fb00 in ap_process_request (r=0x6000000000250a30)  
at http_request.c:226
#7  0x4000000000024bf0 in ap_process_http_connection  
(c=0x60000000001db350) at http_core.c:233
#8  0x400000000004db00 in ap_run_process_connection  
(c=0x60000000001db350) at connection.c:43
#9  0x4000000000032910 in child_main (child_num_arg=27976) at  
prefork.c:610
#10 0x4000000000032be0 in make_child (s=0x6000000000047788, slot=360)  
at prefork.c:704
#11 0x4000000000033180 in perform_idle_server_maintenance (p=0x6) at  
prefork.c:839
#12 0x4000000000033fc0 in ap_mpm_run (_pconf=0x600000000000bc68,  
plog=0x6000000000042298, s=0x0) at prefork.c:863
#13 0x4000000000041f60 in main (argc=2, argv=0x60000fffffffb3e8) at  
main.c:618

(gdb) print r->unparsed_uri
$2 = 0x6000000000251f00 "/mod_mbox/httpd-users/200310.mbox/%3CBAY2- 
F103MOEYzk8TRA00006ddd@hotmail.com%3E"

/raid1/httpd-cores/core.28450

#0  get_base_uri (r=0x6000000000215748) at mod_mbox.c:197
#1  0x2000000001007a10 in get_base_path (r=0x6000000000215748) at  
mod_mbox.c:178
#2  0x200000000100cfa0 in mbox_static_message (r=0x60000000002155d0,  
f=0x60000000001f87b8) at mod_mbox_out.c:1051
#3  0x2000000001008ca0 in mbox_file_handler (r=0x60000000002155d0) at  
mod_mbox_file.c:231
#4  0x4000000000035f90 in ap_run_handler (r=0x60000000002155d0) at  
config.c:153
#5  0x4000000000036f70 in ap_invoke_handler (r=0x60000000002155d0) at  
config.c:317
#6  0x400000000002fb00 in ap_process_request (r=0x60000000002155d0)  
at http_request.c:226
#7  0x4000000000024bf0 in ap_process_http_connection  
(c=0x60000000001db530) at http_core.c:233
#8  0x400000000004db00 in ap_run_process_connection  
(c=0x60000000001db530) at connection.c:43
#9  0x4000000000032910 in child_main (child_num_arg=27976) at  
prefork.c:610
#10 0x4000000000032be0 in make_child (s=0x6000000000047788, slot=29)  
at prefork.c:704
#11 0x4000000000033180 in perform_idle_server_maintenance (p=0x1) at  
prefork.c:839
#12 0x4000000000033fc0 in ap_mpm_run (_pconf=0x0,  
plog=0x6000000000042298, s=0x0) at prefork.c:863
#13 0x4000000000041f60 in main (argc=2, argv=0x60000fffffffb3e8) at  
main.c:618

(gdb) print r->unparsed_uri
$1 = 0x0
(gdb) print r->header_only
$3 = 1

/raid1/httpd-cores/core.19623

#0  get_base_uri (r=0x6000000000213778) at mod_mbox.c:197
#1  0x2000000001007a10 in get_base_path (r=0x6000000000213778) at  
mod_mbox.c:178
#2  0x200000000100cfa0 in mbox_static_message (r=0x6000000000213600,  
f=0x6000000000224958) at mod_mbox_out.c:1051
#3  0x2000000001008ca0 in mbox_file_handler (r=0x6000000000213600) at  
mod_mbox_file.c:231
#4  0x4000000000035f90 in ap_run_handler (r=0x6000000000213600) at  
config.c:153
#5  0x4000000000036f70 in ap_invoke_handler (r=0x6000000000213600) at  
config.c:317
#6  0x400000000002fb00 in ap_process_request (r=0x6000000000213600)  
at http_request.c:226
#7  0x4000000000024bf0 in ap_process_http_connection  
(c=0x60000000001db530) at http_core.c:233
#8  0x400000000004db00 in ap_run_process_connection  
(c=0x60000000001db530) at connection.c:43
#9  0x4000000000032910 in child_main (child_num_arg=27976) at  
prefork.c:610
#10 0x4000000000032be0 in make_child (s=0x6000000000047788, slot=185)  
at prefork.c:704
#11 0x4000000000033180 in perform_idle_server_maintenance (p=0x2) at  
prefork.c:839
#12 0x4000000000033fc0 in ap_mpm_run (_pconf=0x0,  
plog=0x6000000000042298, s=0x0) at prefork.c:863
#13 0x4000000000041f60 in main (argc=2, argv=0x60000fffffffb3e8) at  
main.c:618

There are quite a few of these. Here's the full request_rec of this  
particular one:

(gdb) print *r
$1 = {pool = 0x60000000002153a7, connection = 0x0, server =  
0x6000000000213598, next = 0x6440073f170, prev = 0x1f800000001, main  
= 0x13aa, the_request = 0x5a867f <Address 0x5a867f out of bounds>,
   assbackwards = 2065, proxyreq = 0, header_only = 1, protocol =  
0x1fc20e <Address 0x1fc20e out of bounds>, proto_num = 0, hostname =  
0x402f817f63900 <Address 0x402f817f63900 out of bounds>,
   request_time = 1123663468000000, status_line = 0x4028a48dc9280  
<Address 0x4028a48dc9280 out of bounds>, status = 3932920, method =  
0x0, method_number = 0, allowed = 0, allowed_xmethods = 0x0,
   allowed_methods = 0x0, sent_bodyct = 0, bytes_sent = 0, mtime = 0,  
chunked = 2182016, range = 0x0, clength = 0, remaining = 0,  
read_length = 65536, read_body = 2, read_chunked = 0,
   expecting_100 = 2041752, headers_in = 0x6000000000214568,  
headers_out = 0x60000000001f2738, err_headers_out =  
0x6000000000200d58, subprocess_env = 0x6000000000214928, notes =  
0x6000000000214950,
   content_type = 0x6000000000214928 "�n\001", handler = 0x0,  
content_encoding = 0x0, content_languages = 0x60000000002138b0,  
vlist_validator = 0x6000000000213598 "��\035",
   user = 0x8 <Address 0x8 out of bounds>, ap_auth_type =  
0x2074636500000002 <Address 0x2074636500000002 out of bounds>,  
no_cache = 2177232, no_local_copy = 1610612736, unparsed_uri = 0x0,  
uri = 0x0,
   filename = 0x6000000000213598 "��\035", canonical_filename =  
0x900000018 <Address 0x900000018 out of bounds>, path_info =  
0x2020202000000019 <Address 0x2020202000000019 out of bounds>,
   args = 0x6000000000213a08 "", finfo = {pool = 0x2e6174720024012a,  
valid = 1, protection = 1865311592, filetype = APR_CHR, user =  
795178089, group = 8, inode = 1747857971,
     device = 8386658473162859858, nlink = 1919242272, size =  
7598809965127562350, csize = 3414965976753469038, atime =  
18949104999, mtime = 8675450682576495990, ctime = 2314885856696991749,
     fname = 0x2f3a707474682020 <Address 0x2f3a707474682020 out of  
bounds>, name = 0x617472616b616a2f <Address 0x617472616b616a2f out of  
bounds>, filehand = 0x2e6568636170612e}, parsed_uri = {
     scheme = 0x657469732f67726f <Address 0x657469732f67726f out of  
bounds>, hostinfo = 0x6f766e697465672f <Address 0x6f766e697465672f  
out of bounds>,
     user = 0x6d74682e00000002 <Address 0x6d74682e00000002 out of  
bounds>, password = 0x6572696400000003 <Address 0x6572696400000003  
out of bounds>,
     hostname = 0x616d726500000008 <Address 0x616d726500000008 out of  
bounds>, port_str = 0x746e656e <Address 0x746e656e out of bounds>,
     path = 0x65766c6f766e6974 <Address 0x65766c6f766e6974 out of  
bounds>, query = 0x72617262696c2f64 <Address 0x72617262696c2f64 out  
of bounds>,
     fragment = 0x20206c6d74682e79 <Address 0x20206c6d74682e79 out of  
bounds>, hostent = 0x2020202020202020, port = 8224, is_initialized =  
0, dns_looked_up = 0, dns_resolved = 0},
   used_path_info = 1781477178, per_dir_config = 0x6863617000000007,  
request_config = 0x69732f67726f2e65, htaccess = 0x617262696c2f6574,  
output_filters = 0xa6c6d74682e7972,
   input_filters = 0x7463657269646552, proto_output_filters =  
0x656e616d72655020, proto_input_filters = 0x6000000000214c00,  
eos_sent = 2182150}

Guess that's gonna look real good in YOUR mailer... note a lot of  
garbage, and header_only is set. It's a HEAD request.

Couple more with the same issue. core.7456 broke ata different point:

#0  mbox_raw_message (r=0x6000000000238720, f=0x31) at mod_mbox_out.c: 
966
#1  0x2000000001008cf0 in mbox_file_handler (r=0x6000000000238720) at  
mod_mbox_file.c:231
#2  0x4000000000035f90 in ap_run_handler (r=0x6000000000238720) at  
config.c:153
#3  0x4000000000036f70 in ap_invoke_handler (r=0x6000000000238720) at  
config.c:317
#4  0x400000000002fb00 in ap_process_request (r=0x6000000000238720)  
at http_request.c:226
#5  0x4000000000024bf0 in ap_process_http_connection  
(c=0x60000000001db530) at http_core.c:233
#6  0x400000000004db00 in ap_run_process_connection  
(c=0x60000000001db530) at connection.c:43
#7  0x4000000000032910 in child_main (child_num_arg=27976) at  
prefork.c:610
#8  0x4000000000032be0 in make_child (s=0x6000000000047788, slot=118)  
at prefork.c:704
#9  0x4000000000033180 in perform_idle_server_maintenance (p=0x1) at  
prefork.c:839
#10 0x4000000000033fc0 in ap_mpm_run (_pconf=0x0,  
plog=0x6000000000042298, s=0x0) at prefork.c:863
#11 0x4000000000041f60 in main (argc=2, argv=0x60000fffffffb3e8) at  
main.c:618

(gdb) print r->unparsed_uri
$2 = 0x6000000000239bf0 "/mod_mbox/ws-fx-dev/200501.mbox/raw/ 
<41DF306C.3050404@parasoft.com>/axis.html"

core.13402 breaks in the same place with the following request:

(gdb) print r->unparsed_uri
$2 = 0x60000000003554f0 "/mod_mbox/ws-axis-c-user/200412.mbox/raw/% 
3CEAA42CA41CFA78419786AF09337DEBF804B43B1A@edmb003.edm-b.edm.dsh.de% 
3E/%5C%5C%5C"

core.11704, same line, the following request:

(gdb) print r->unparsed_uri
$1 = 0x60000000002480f0 "/mod_mbox/ws-axis-c-user/200412.mbox/raw/% 
3CEAA42CA41CFA78419786AF09337DEBF804B43B1A@edmb003.edm-b.edm.dsh.de% 
3E/%5C%5C%5C"


Etc. etc.

- --
sander@temme.net              http://www.temme.net/sander/
PGP FP: 51B4 8727 466A 0BC3 69F4  B7B8 B2BE BC40 1529 24AF

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.1 (Darwin)

iD8DBQFDTqNXnjkrwtLH+RIRAtJ5AJ95uUxQsgWgmr/iJFp/Yzep5WZjngCfcmMx
gpilgLS9KUEVEIJ3dMFDEJE=
=wg45
-----END PGP SIGNATURE-----

Mime
View raw message