https://bz.apache.org/bugzilla/show_bug.cgi?id=60439

--- Comment #4 from [email protected] ---
Today we had another segementation fault on the same server. But this time the
coredump looks quite different. (I've masked possible sensitive informations
using X):

**** coredump ****
#0  0x00007f5c9ce40274 in ?? ()
No symbol table info available.
#1  0x00007f5c897ef5a0 in ?? ()
No symbol table info available.
#2  0x00007f5c9d4b18bb in ?? ()
No symbol table info available.
#3  0x00007f5c3c0d6040 in ?? ()
No symbol table info available.
#4  0x000000aa81800000 in ?? ()
No symbol table info available.
#5  0x00007f5c2801aa30 in ?? ()
No symbol table info available.
#6  0x00007f5c30020b28 in ?? ()
No symbol table info available.
#7  0x00007f5c897ef590 in ?? ()
No symbol table info available.
#8  0x00007f5c9d4b208a in ?? ()
No symbol table info available.
#9  0x00007f5c50109160 in ?? ()
No symbol table info available.
#10 0x0000000000aa800e in ?? ()
No symbol table info available.
#11 0x00007f5c48006918 in ?? ()
No symbol table info available.
#12 0x0000000000c14d38 in ?? ()
No symbol table info available.
#13 0x00007f5c897ef5c0 in ?? ()
No symbol table info available.
#14 0x0000000000438133 in ap_vrprintf (r=0x7f5c897ef540, fmt=<optimized out>,
va=<optimized out>) at /opt/unpack/httpd-2.4.23/server/protocol.c:1658
        written = <optimized out>
        vd = {vbuff = {
            curpos = 0x7f5c3c0d7a08
"=cnp_jQuery(d),s=p.attr(\"name\"),J=p.val();if(!(g&&this.isEmptyString(J))){var
W=p.closest(\"form\"),\nH={};if(s===\"ACCOUNT.NUMBER\"||s===\"ACCOUNT.XXXX\")if(this.isXXXXForm(W))this.validateXXXX(J)||(H=cnp_j"...,
endpos = 0x5a3 <error: Cannot access memory at address 0x5a3>}, r =
0x7f5c48299f24, 
          buff = 0x7f5c30020c68
"s://\"+(r==\"live\"?\"XXXX.XXX\":\"test.XXXX.XXX\")+\"/connectors/XXX/XXXXXXXX.link\",jsonp:\"callback\",dataType:\"jsonp\",success:function(u){var
F=cnp_jQuery(\"select.XXXXNameSelectBox\",\"div.otXXXXXXX_XXX\");F.em"...}
        vrprintf_buf =
"\036!\2XX\2XX\\\1XX\000\000$\2XX)H\\\1XX\000\000\2XX\n\002\060\000\000\000\000h\f\002\0XX\\\1XX\000\000\001\000\000\000\000\000\000\000P\3XX~\2XX\\\1XX\000\000\0XX\0XXE",
'\000' <repeats 17 times>,
"\001\000\000\000\bz\r<\\\1XX\000\000\b\2XX\001(\\\1XX\000\000\b\r\0XX\0XX\\\1XX\000\000\0XX\0XXK\2XX\\\1XX\000\000\0XX\2XX\001(\\\1XX\000\000\2XX\0XX\000\000\000\000\000\000#\2XX)H\\\1XX\000\000\000\000\000\000\000\000\000\000P\3XX~\2XX\\\1XX\000\000\b\r\0XX\0XX\\\1XX\000\000\000\000\000\000\000\000\000\000\0XX^RX\000\000\000\000\001\000\000\000\000\000\000\000\3XX\2XX\001(\\\1XX\000\000\3XX\3XX~\2XX\\\1XX\000\000\2XX\3XX~\2XX\\\1XX\000\000"...
#15 0x00007f5c50109160 in ?? ()
No symbol table info available.
#16 0x0000000000aa800e in ?? ()
No symbol table info available.
#17 0x00007f5c897ef5e0 in ?? ()
No symbol table info available.
#18 0x00007f5c9d900ec0 in ?? ()
No symbol table info available.
#19 0x00007f5c897ef5f0 in ?? ()
No symbol table info available.
#20 0x00007f5c501091a8 in ?? ()
No symbol table info available.
#21 0x00007f5c3007ad18 in ?? ()
No symbol table info available.
#22 0x00007f5c50109188 in ?? ()
No symbol table info available.
#23 0x00007f5c897ef610 in ?? ()
No symbol table info available.
#24 0x00007f5c9d9016e0 in ?? ()
No symbol table info available.
#25 0x00007f5c897ef670 in ?? ()
No symbol table info available.
#26 0x00007f5c3007adf8 in ?? ()
No symbol table info available.
#27 0x00007f5c28051f98 in ?? ()
No symbol table info available.
#28 0x00007f5c3007adf8 in ?? ()
No symbol table info available.
#29 0x00007f5c897ef6c0 in ?? ()
No symbol table info available.
#30 0x0000000000453571 in ap_open_piped_log_ex (p=0x0, program=0x7f5c9d4b2240
<error: Cannot access memory at address 0x7f5c9d4b2240>, cmdtype=<optimized
out>) at /opt/unpack/httpd-2.4.23/server/log.c:1833
        pl = 0x7f5c48006918
#31 0x0000000000000005 in ?? ()
No symbol table info available.
#32 0x0000000000000000 in ?? ()
No symbol table info available.
**** coredump ****


**** frame 14 ****
(gdb) frame 14
#14 0x0000000000438133 in ap_vrprintf (r=0x7f5c897ef540, fmt=<optimized out>,
va=<optimized out>) at /opt/unpack/httpd-2.4.23/server/protocol.c:1658
1658    }
(gdb) list
1653    
1654            written += n;
1655        }
1656    
1657        return written;
1658    }
1659    
1660    AP_DECLARE_NONSTD(int) ap_rprintf(request_rec *r, const char *fmt, ...)
1661    {
1662        va_list va;


**** frame 30 ****
(gdb) frame 30
#30 0x0000000000453571 in ap_open_piped_log_ex (p=0x0, program=0x7f5c9d4b2240
<error: Cannot access memory at address 0x7f5c9d4b2240>, cmdtype=<optimized
out>) at /opt/unpack/httpd-2.4.23/server/log.c:1833
1833        apr_pool_cleanup_register(p, pl, piped_log_cleanup,
(gdb) list
1828        if (apr_file_pipe_create_ex(&pl->read_fd,
1829                                    &pl->write_fd,
1830                                    APR_FULL_BLOCK, p) != APR_SUCCESS) {
1831            return NULL;
1832        }
1833        apr_pool_cleanup_register(p, pl, piped_log_cleanup,
1834                                  piped_log_cleanup_for_exec);
1835        if (piped_log_spawn(pl) != APR_SUCCESS) {
1836            apr_pool_cleanup_kill(p, pl, piped_log_cleanup);
1837            apr_file_close(pl->read_fd);
(gdb)

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to