The following reply was made to PR mod_proxy/1326; it has been noted by GNATS.

From: Marc Slemko <[EMAIL PROTECTED]>
To: Apache bugs database <[EMAIL PROTECTED]>
Cc:  Subject: Re: mod_proxy/1326: HTTPS - Cannot Connect! (PR#1024, PR#1105) 
(fwd)
Date: Wed, 29 Oct 1997 09:08:37 -0700 (MST)

 ---------- Forwarded message ----------
 Date: Wed, 29 Oct 1997 10:28:09 +0100
 From: Rainer Scherg RTC <[EMAIL PROTECTED]>
 To: [EMAIL PROTECTED]
 Cc: [EMAIL PROTECTED]
 Subject: Re: mod_proxy/1326: HTTPS - Cannot Connect! (PR#1024, PR#1105)
 
 > Synopsis: HTTPS - Cannot Connect! (PR#1024, PR#1105)
 > 
 > State-Changed-From-To: open-analyzed
 > State-Changed-By: marc
 > State-Changed-When: Tue Oct 28 06:44:24 PST 1997
 > State-Changed-Why:
 >[...]
 > If this doesn't help, recompile Apache with "-g" added to
 > the EXTRA_CFLAGS for debugging info, add a CoreDumpDirectory
 > directive to put the core dumps somewhere writable, then
 > get a core dump and run gbd on it to see where it is dumping.
 
 Hi!
 
 As an addition to my first reply, this mail contains a trace of the core 
 file.
 
 
 sun-msp-w1a (/tmp)# dbx /usr-
 sys1/rasc/apache/apache_1.3.x/apache_1.3b2/src/http
 d.1.3b2.debug httpd.core
 Reading symbolic information for /usr-
 sys1/rasc/apache/apache_1.3.x/apache_1.3b2
 /src/httpd.1..3b2.debug
 dbx: warning: core object name "httpd.1.3b2.de" matches
 object name "httpd.1.3b2.debug" within the limit of 14. assuming they match
 dbx: warning: writable memory segment 0xdeb30000[53248] of size 0 in core
 dbx: warning: writable memory segment 0xdf630000[4096] of size 0 in core
 core file header read successfully
 Reading symbolic information for rtld /usr/lib/ld.so.1
 Reading symbolic information for /lib/libsocket.so.1
 Reading symbolic information for /lib/libnsl.so.1
 Reading symbolic information for /lib/libpthread.so.1
 Reading symbolic information for /lib/libc.so.1
 Reading symbolic information for /lib/libdl.so.1
 Reading symbolic information for /lib/libintl.so.1
 Reading symbolic information for /lib/libmp.so.1
 Reading symbolic information for /lib/libw.so.1
 Reading symbolic information for /lib/libthread.so.1
 Reading symbolic information for /lib/nss_files.so.1
 Reading symbolic information for /lib/nss_nis.so.1
 detected a multithreaded program
  
 (dbx) where
 =>[1] __sigprocmask(0x0, 0x0, 0x0, 0xffff7fff, 0x93620, 0x0), at 0xdf5b35a4
   [2] __bounceself(0x9363b, 0x0, 0x0, 0x0, 0x935f8, 0x0), at 0xdf5ac29c
   [3] _lrw_unlock(0xdf7f4b18, 0x37d6b0, 0x108, 0xdf7f4b38, 0xdf7f4b20, 
 0xdf7f4b4
 8), at 0xdf5aa5dc
   [4] 0xdf7db1d4(0xdf5c5168, 0xdf5ac108, 0xdf7c089c, 0xdf5adfb4, 0xdf5a3e4b, 
 0xd
 f5a1acc), at 0xdf7db1d3
   [5] 0xdf7d44e4(0xdf5adfb4, 0x0, 0x0, 0x0, 0x0, 0x1), at 0xdf7d44e3
   [6] 0xdf5c4ba8(0x9363b, 0x0, 0x93636, 0x93637, 0x0, 0x93635), at 
 0xdf5c4ba7
   [7] pthread_sigmask(0x2, 0x9367c, 0x0, 0x93637, 0x93640, 0x93635), at 
 0xdf5adf
 b4
   [8] sigprocmask(0x2, 0xdfffebc0, 0x0, 0x3e9, 0xe026d2c0, 0x5), at 
 0xdf5b33d4
   [9] sigrelse(0x6, 0x0, 0x0, 0x0, 0xffffffff, 0x91570), at 0xdf692edc
   [10] abort(0x0, 0x8f400, 0xd, 0x94038, 0xdfffecc8, 0x1), at 0xdf679670
   [11] sig_coredump(0xb, 0xdffff138, 0xdfffef78, 0xffff7fff, 0x93640, 
 0x93670),
 at 0x46f48
   [12] __libthread_segvhdlr(0xb, 0xdffff138, 0xdfffef78, 0xdfffeeb8, 
 0xdf5b2f20,
  0x0), at 0xdf5b3004
   ---- called from signal handler with signal 11 (SIGSEGV) ------
   [13] strlen(), at 0xdf662eac
   [14] sscanf(0x0, 0x70260, 0xdffff2b8, 0xdffff2bc, 0xdffff2c0, 0xdffff274), 
 at
 0xdf6b0e38
   [15] proxy_match_ipaddr(0xa6f24, 0xc30a0, 0x242ac, 0x1, 0x6eba8, 0xc6c30), 
 at
 0x24320
   [16] proxy_handler(0xc30a0, 0x17780, 0x6eaf0, 0x0, 0xdf6bac6c, 0x0), at 
 0x179b
 0
   [17] invoke_handler(0xc30a0, 0x3e8, 0x55a8c8, 0x0, 0x78000, 0xdeb303e0), 
 at 0x
 4f728
   [18] process_request_internal(0xc30a0, 0x1, 0xffffffff, 0x65000000, 
 0x6500, 0x
 deb30460), at 0x54c48
   [19] process_request(0xc30a0, 0x4, 0xc30a0, 0xdffff580, 0xdffff590, 0x5), 
 at 0
 x54cb4
   [20] child_main(0x5, 0x46f64, 0x46c00, 0xdf5cc9a8, 0xdf5c57f0, 0x0), at 
 0x4874
 4
   [21] make_child(0x94038, 0x5, 0x3456ff09, 0x5, 0x3e8, 0x0), at 0x48a90
   [22] perform_idle_server_maintenance(0x0, 0xdffff7ac, 0xe, 0x94038, 
 0x75458, 0
 x6ea70), at 0x48ff0
   [23] standalone_main(0x1, 0xdffff8d4, 0x91570, 0x91400, 0x3, 0x91570), at 
 0x49
 4d4
   [24] main(0x1, 0xdffff8d4, 0xdffff8dc, 0x8f1a8, 0x1, 0x0), at 0x49bb0
 (dbx) quit
 
 
 
 --------------------------------------------------------------------
 Rainer Scherg, Abt. RTC, Mannesmann Rexroth AG
 e-Mail: [EMAIL PROTECTED],  Tel/Fax: +49-9352-18-1510 /-1500
 
 

Reply via email to