https://bz.apache.org/bugzilla/show_bug.cgi?id=60439
--- Comment #4 from [email protected] --- Today we had another segementation fault on the same server. But this time the coredump looks quite different. (I've masked possible sensitive informations using X): **** coredump **** #0 0x00007f5c9ce40274 in ?? () No symbol table info available. #1 0x00007f5c897ef5a0 in ?? () No symbol table info available. #2 0x00007f5c9d4b18bb in ?? () No symbol table info available. #3 0x00007f5c3c0d6040 in ?? () No symbol table info available. #4 0x000000aa81800000 in ?? () No symbol table info available. #5 0x00007f5c2801aa30 in ?? () No symbol table info available. #6 0x00007f5c30020b28 in ?? () No symbol table info available. #7 0x00007f5c897ef590 in ?? () No symbol table info available. #8 0x00007f5c9d4b208a in ?? () No symbol table info available. #9 0x00007f5c50109160 in ?? () No symbol table info available. #10 0x0000000000aa800e in ?? () No symbol table info available. #11 0x00007f5c48006918 in ?? () No symbol table info available. #12 0x0000000000c14d38 in ?? () No symbol table info available. #13 0x00007f5c897ef5c0 in ?? () No symbol table info available. #14 0x0000000000438133 in ap_vrprintf (r=0x7f5c897ef540, fmt=<optimized out>, va=<optimized out>) at /opt/unpack/httpd-2.4.23/server/protocol.c:1658 written = <optimized out> vd = {vbuff = { curpos = 0x7f5c3c0d7a08 "=cnp_jQuery(d),s=p.attr(\"name\"),J=p.val();if(!(g&&this.isEmptyString(J))){var W=p.closest(\"form\"),\nH={};if(s===\"ACCOUNT.NUMBER\"||s===\"ACCOUNT.XXXX\")if(this.isXXXXForm(W))this.validateXXXX(J)||(H=cnp_j"..., endpos = 0x5a3 <error: Cannot access memory at address 0x5a3>}, r = 0x7f5c48299f24, buff = 0x7f5c30020c68 "s://\"+(r==\"live\"?\"XXXX.XXX\":\"test.XXXX.XXX\")+\"/connectors/XXX/XXXXXXXX.link\",jsonp:\"callback\",dataType:\"jsonp\",success:function(u){var F=cnp_jQuery(\"select.XXXXNameSelectBox\",\"div.otXXXXXXX_XXX\");F.em"...} vrprintf_buf = "\036!\2XX\2XX\\\1XX\000\000$\2XX)H\\\1XX\000\000\2XX\n\002\060\000\000\000\000h\f\002\0XX\\\1XX\000\000\001\000\000\000\000\000\000\000P\3XX~\2XX\\\1XX\000\000\0XX\0XXE", '\000' <repeats 17 times>, "\001\000\000\000\bz\r<\\\1XX\000\000\b\2XX\001(\\\1XX\000\000\b\r\0XX\0XX\\\1XX\000\000\0XX\0XXK\2XX\\\1XX\000\000\0XX\2XX\001(\\\1XX\000\000\2XX\0XX\000\000\000\000\000\000#\2XX)H\\\1XX\000\000\000\000\000\000\000\000\000\000P\3XX~\2XX\\\1XX\000\000\b\r\0XX\0XX\\\1XX\000\000\000\000\000\000\000\000\000\000\0XX^RX\000\000\000\000\001\000\000\000\000\000\000\000\3XX\2XX\001(\\\1XX\000\000\3XX\3XX~\2XX\\\1XX\000\000\2XX\3XX~\2XX\\\1XX\000\000"... #15 0x00007f5c50109160 in ?? () No symbol table info available. #16 0x0000000000aa800e in ?? () No symbol table info available. #17 0x00007f5c897ef5e0 in ?? () No symbol table info available. #18 0x00007f5c9d900ec0 in ?? () No symbol table info available. #19 0x00007f5c897ef5f0 in ?? () No symbol table info available. #20 0x00007f5c501091a8 in ?? () No symbol table info available. #21 0x00007f5c3007ad18 in ?? () No symbol table info available. #22 0x00007f5c50109188 in ?? () No symbol table info available. #23 0x00007f5c897ef610 in ?? () No symbol table info available. #24 0x00007f5c9d9016e0 in ?? () No symbol table info available. #25 0x00007f5c897ef670 in ?? () No symbol table info available. #26 0x00007f5c3007adf8 in ?? () No symbol table info available. #27 0x00007f5c28051f98 in ?? () No symbol table info available. #28 0x00007f5c3007adf8 in ?? () No symbol table info available. #29 0x00007f5c897ef6c0 in ?? () No symbol table info available. #30 0x0000000000453571 in ap_open_piped_log_ex (p=0x0, program=0x7f5c9d4b2240 <error: Cannot access memory at address 0x7f5c9d4b2240>, cmdtype=<optimized out>) at /opt/unpack/httpd-2.4.23/server/log.c:1833 pl = 0x7f5c48006918 #31 0x0000000000000005 in ?? () No symbol table info available. #32 0x0000000000000000 in ?? () No symbol table info available. **** coredump **** **** frame 14 **** (gdb) frame 14 #14 0x0000000000438133 in ap_vrprintf (r=0x7f5c897ef540, fmt=<optimized out>, va=<optimized out>) at /opt/unpack/httpd-2.4.23/server/protocol.c:1658 1658 } (gdb) list 1653 1654 written += n; 1655 } 1656 1657 return written; 1658 } 1659 1660 AP_DECLARE_NONSTD(int) ap_rprintf(request_rec *r, const char *fmt, ...) 1661 { 1662 va_list va; **** frame 30 **** (gdb) frame 30 #30 0x0000000000453571 in ap_open_piped_log_ex (p=0x0, program=0x7f5c9d4b2240 <error: Cannot access memory at address 0x7f5c9d4b2240>, cmdtype=<optimized out>) at /opt/unpack/httpd-2.4.23/server/log.c:1833 1833 apr_pool_cleanup_register(p, pl, piped_log_cleanup, (gdb) list 1828 if (apr_file_pipe_create_ex(&pl->read_fd, 1829 &pl->write_fd, 1830 APR_FULL_BLOCK, p) != APR_SUCCESS) { 1831 return NULL; 1832 } 1833 apr_pool_cleanup_register(p, pl, piped_log_cleanup, 1834 piped_log_cleanup_for_exec); 1835 if (piped_log_spawn(pl) != APR_SUCCESS) { 1836 apr_pool_cleanup_kill(p, pl, piped_log_cleanup); 1837 apr_file_close(pl->read_fd); (gdb) -- You are receiving this mail because: You are the assignee for the bug. --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
