I've passed this on to the apache dev list.

--Cliff



On Tue, 4 Mar 2003, Edward Wong wrote:

> Hello All,
>
> I've been able to consistantly reproduce a GPF on Apache service shutdown
> using Openssl 0.9.6i, and Apache 2.0.44.
>
> Swapping to an older version of Openssl (0.9.6g) resolved the GPF.
>
> To reproduce, simply download and build OpenSSL 0.9.6i and Apache 2.0.44.
> Be sure to configure ssl to use the shmcb ssl session caching.  Launch
> apache as a service and browse to the server using SSL.  Then try to stop
> the apache service.  During shutdown, Apache will GPF.
>
> Oddly, if you don't browse to the webserver using SSL, Apache will not GPF
> on shutdown.
>
> If it helps, the call stack looks as follows:
>
> NTDLL! 77f51baa()
> NTDLL! 77f7561d()
> apr_file_write(apr_file_t * 0x005e91c8, const void * 0x0006dd6c, unsigned
> int * 0x0006dd58) line 316
> apr_file_puts(const char * 0x0006dd6c, apr_file_t * 0x005e91c8) line 441
> log_error_core(const char * 0x6fd1d948, int 117, int 4, int 720006, const
> server_rec * 0x00602700, const request_rec * 0x00000000, apr_pool_t *
> 0x00000000, const char * 0x6fd1d924, char * 0x0006fdd0) line 543
> ap_log_error(const char * 0x6fd1d948, int 117, int 4, int 720006, const
> server_rec * 0x00602700, const char * 0x6fd1d924) line 561 + 37 bytes
> ssl_mutex_on(server_rec * 0x00602700) line 118 + 28 bytes
> ssl_scache_shmcb_remove(server_rec * 0x00602700, unsigned char * 0x00689dd8,
> int 32) line 476 + 9 bytes
> ssl_scache_remove(server_rec * 0x00602700, unsigned char * 0x00689dd8, int
> 32) line 158 + 17 bytes
> ssl_callback_DelSessionCacheEntry(ssl_ctx_st * 0x00645240, ssl_session_st *
> 0x00689d90) line 1722 + 17 bytes
> timeout(ssl_session_st * 0x00689d90, timeout_param_st * 0x0006fe6c) line 602
> + 18 bytes
> lh_doall_arg(lhash_st * 0x006453d0, void (void)* 0x1001a516
> timeout(ssl_session_st *, timeout_param_st *), void * 0x0006fe6c) line 290 +
> 13 bytes
> SSL_CTX_flush_sessions(ssl_ctx_st * 0x00645240, long 0) line 619 + 18 bytes
> SSL_CTX_free(ssl_ctx_st * 0x00645240) line 1259 + 11 bytes
> ssl_init_ctx_cleanup(modssl_ctx_t * 0x0064ef68) line 1197 + 21 bytes
> ssl_init_ctx_cleanup_server(modssl_ctx_t * 0x0064ef68) line 1213 + 9 bytes
> ssl_init_ModuleKill(void * 0x0030c458) line 1249 + 12 bytes
> run_cleanups(cleanup_t * * 0x0030a5d0) line 1976 + 13 bytes
> apr_pool_destroy(apr_pool_t * 0x0030a5c0) line 755 + 12 bytes
> apr_pool_destroy(apr_pool_t * 0x00308588) line 752 + 12 bytes
> destroy_and_exit_process(process_rec * 0x00308618, int 0) line 247
> main(int 3, const char * const * 0x003024a8) line 658 + 11 bytes
> mainCRTStartup() line 338 + 17 bytes
> KERNEL32! 77e814c7()
>
> The error in log_error_core is:
> [Mon Mar 03 12:43:04 2003] [warn] (OS 6)The handle is invalid.  : Failed to
> acquire global mutex lock.
>
> Is this a known issue?  Is there something that I'm missing?  Other than
> changing from DBM to SHMCB, I have stock conf files.
>
> Thanks in Advance,
>
> ************************************
> Edward Wong
> Connectivity Software
>
> Hewlett-Packard Company
> ************************************
>
>
>
>
> _________________________________________________________________
> STOP MORE SPAM with the new MSN 8 and get 2 months FREE*
> http://join.msn.com/?page=features/junkmail
>
> ______________________________________________________________________
> Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
> User Support Mailing List                      [EMAIL PROTECTED]
> Automated List Manager                            [EMAIL PROTECTED]
>
______________________________________________________________________
Apache Interface to OpenSSL (mod_ssl)                   www.modssl.org
User Support Mailing List                      [EMAIL PROTECTED]
Automated List Manager                            [EMAIL PROTECTED]

Reply via email to