The following reply was made to PR mod_proxy/1326; it has been noted by GNATS.
From: Marc Slemko <[EMAIL PROTECTED]> To: Apache bugs database <[EMAIL PROTECTED]> Cc: Subject: Re: mod_proxy/1326: HTTPS - Cannot Connect! (PR#1024, PR#1105) (fwd) Date: Wed, 29 Oct 1997 09:08:37 -0700 (MST) ---------- Forwarded message ---------- Date: Wed, 29 Oct 1997 10:28:09 +0100 From: Rainer Scherg RTC <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] Cc: [EMAIL PROTECTED] Subject: Re: mod_proxy/1326: HTTPS - Cannot Connect! (PR#1024, PR#1105) > Synopsis: HTTPS - Cannot Connect! (PR#1024, PR#1105) > > State-Changed-From-To: open-analyzed > State-Changed-By: marc > State-Changed-When: Tue Oct 28 06:44:24 PST 1997 > State-Changed-Why: >[...] > If this doesn't help, recompile Apache with "-g" added to > the EXTRA_CFLAGS for debugging info, add a CoreDumpDirectory > directive to put the core dumps somewhere writable, then > get a core dump and run gbd on it to see where it is dumping. Hi! As an addition to my first reply, this mail contains a trace of the core file. sun-msp-w1a (/tmp)# dbx /usr- sys1/rasc/apache/apache_1.3.x/apache_1.3b2/src/http d.1.3b2.debug httpd.core Reading symbolic information for /usr- sys1/rasc/apache/apache_1.3.x/apache_1.3b2 /src/httpd.1..3b2.debug dbx: warning: core object name "httpd.1.3b2.de" matches object name "httpd.1.3b2.debug" within the limit of 14. assuming they match dbx: warning: writable memory segment 0xdeb30000[53248] of size 0 in core dbx: warning: writable memory segment 0xdf630000[4096] of size 0 in core core file header read successfully Reading symbolic information for rtld /usr/lib/ld.so.1 Reading symbolic information for /lib/libsocket.so.1 Reading symbolic information for /lib/libnsl.so.1 Reading symbolic information for /lib/libpthread.so.1 Reading symbolic information for /lib/libc.so.1 Reading symbolic information for /lib/libdl.so.1 Reading symbolic information for /lib/libintl.so.1 Reading symbolic information for /lib/libmp.so.1 Reading symbolic information for /lib/libw.so.1 Reading symbolic information for /lib/libthread.so.1 Reading symbolic information for /lib/nss_files.so.1 Reading symbolic information for /lib/nss_nis.so.1 detected a multithreaded program (dbx) where =>[1] __sigprocmask(0x0, 0x0, 0x0, 0xffff7fff, 0x93620, 0x0), at 0xdf5b35a4 [2] __bounceself(0x9363b, 0x0, 0x0, 0x0, 0x935f8, 0x0), at 0xdf5ac29c [3] _lrw_unlock(0xdf7f4b18, 0x37d6b0, 0x108, 0xdf7f4b38, 0xdf7f4b20, 0xdf7f4b4 8), at 0xdf5aa5dc [4] 0xdf7db1d4(0xdf5c5168, 0xdf5ac108, 0xdf7c089c, 0xdf5adfb4, 0xdf5a3e4b, 0xd f5a1acc), at 0xdf7db1d3 [5] 0xdf7d44e4(0xdf5adfb4, 0x0, 0x0, 0x0, 0x0, 0x1), at 0xdf7d44e3 [6] 0xdf5c4ba8(0x9363b, 0x0, 0x93636, 0x93637, 0x0, 0x93635), at 0xdf5c4ba7 [7] pthread_sigmask(0x2, 0x9367c, 0x0, 0x93637, 0x93640, 0x93635), at 0xdf5adf b4 [8] sigprocmask(0x2, 0xdfffebc0, 0x0, 0x3e9, 0xe026d2c0, 0x5), at 0xdf5b33d4 [9] sigrelse(0x6, 0x0, 0x0, 0x0, 0xffffffff, 0x91570), at 0xdf692edc [10] abort(0x0, 0x8f400, 0xd, 0x94038, 0xdfffecc8, 0x1), at 0xdf679670 [11] sig_coredump(0xb, 0xdffff138, 0xdfffef78, 0xffff7fff, 0x93640, 0x93670), at 0x46f48 [12] __libthread_segvhdlr(0xb, 0xdffff138, 0xdfffef78, 0xdfffeeb8, 0xdf5b2f20, 0x0), at 0xdf5b3004 ---- called from signal handler with signal 11 (SIGSEGV) ------ [13] strlen(), at 0xdf662eac [14] sscanf(0x0, 0x70260, 0xdffff2b8, 0xdffff2bc, 0xdffff2c0, 0xdffff274), at 0xdf6b0e38 [15] proxy_match_ipaddr(0xa6f24, 0xc30a0, 0x242ac, 0x1, 0x6eba8, 0xc6c30), at 0x24320 [16] proxy_handler(0xc30a0, 0x17780, 0x6eaf0, 0x0, 0xdf6bac6c, 0x0), at 0x179b 0 [17] invoke_handler(0xc30a0, 0x3e8, 0x55a8c8, 0x0, 0x78000, 0xdeb303e0), at 0x 4f728 [18] process_request_internal(0xc30a0, 0x1, 0xffffffff, 0x65000000, 0x6500, 0x deb30460), at 0x54c48 [19] process_request(0xc30a0, 0x4, 0xc30a0, 0xdffff580, 0xdffff590, 0x5), at 0 x54cb4 [20] child_main(0x5, 0x46f64, 0x46c00, 0xdf5cc9a8, 0xdf5c57f0, 0x0), at 0x4874 4 [21] make_child(0x94038, 0x5, 0x3456ff09, 0x5, 0x3e8, 0x0), at 0x48a90 [22] perform_idle_server_maintenance(0x0, 0xdffff7ac, 0xe, 0x94038, 0x75458, 0 x6ea70), at 0x48ff0 [23] standalone_main(0x1, 0xdffff8d4, 0x91570, 0x91400, 0x3, 0x91570), at 0x49 4d4 [24] main(0x1, 0xdffff8d4, 0xdffff8dc, 0x8f1a8, 0x1, 0x0), at 0x49bb0 (dbx) quit -------------------------------------------------------------------- Rainer Scherg, Abt. RTC, Mannesmann Rexroth AG e-Mail: [EMAIL PROTECTED], Tel/Fax: +49-9352-18-1510 /-1500
