https://bz.apache.org/bugzilla/show_bug.cgi?id=65627
acmondor <[email protected]> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEEDINFO |NEW --- Comment #11 from acmondor <[email protected]> --- Here is the additional info requested. First the the gdb info: Core was generated by `/usr/sbin/apache2 -D INFO -D SSL -D PHP -D MPM_ITK -D STATUS -D SECURITY -d /us'. Program terminated with signal SIGSEGV, Segmentation fault. #0 0x00007f26d402fdac in apr_socket_close (thesocket=0x0) at network_io/unix/sockets.c:213 213 return apr_pool_cleanup_run(thesocket->pool, thesocket, socket_cleanup); (gdb) (gdb) bt #0 0x00007f26d402fdac in apr_socket_close (thesocket=0x0) at network_io/unix/sockets.c:213 #1 0x0000563794dd8292 in ap_lingering_close (c=0x563797134010) at connection.c:159 #2 0x0000563794df5829 in child_main (child_num_arg=4, child_bucket=0) at prefork.c:655 #3 0x0000563794df5a87 in make_child (s=0x563796e4e888, slot=4) at prefork.c:756 #4 0x0000563794df5ae7 in startup_children (number_to_start=1) at prefork.c:774 #5 0x0000563794df6159 in prefork_run (_pconf=0x563796e253c8, plog=0x563796e52608, s=0x563796e4e888) at prefork.c:936 #6 0x0000563794d9ba43 in ap_run_mpm (pconf=0x563796e253c8, plog=0x563796e52608, s=0x563796e4e888) at mpm_common.c:95 #7 0x0000563794d915fc in main (argc=19, argv=0x7ffcb763ef38) at main.c:819 (gdb) (gdb) frame 1 #1 0x0000563794dd8292 in ap_lingering_close (c=0x563797134010) at connection.c:159 159 apr_socket_close(csd); (gdb) print *(c->conn_config) $1 = <incomplete type> (gdb) print *(c) $2 = {pool = 0x563797133da8, base_server = 0x563796f456b0, vhost_lookup_data = 0x563796f56b18, local_addr = 0x563797133e70, client_addr = 0x563797133f30, client_ip = 0x563797134418 "192.168.1.13", remote_host = 0x0, remote_logname = 0x0, local_ip = 0x563797134408 "192.168.1.13", local_host = 0x0, id = 4, conn_config = 0x5637971340e0, notes = 0x563797134268, input_filters = 0x563797134440, output_filters = 0x5637971344b0, sbh = 0x563797131ef0, bucket_alloc = 0x563797138e58, cs = 0x0, data_in_input_filters = 0, data_in_output_filters = 0, clogging_input_filters = 0, double_reverse = 0, aborted = 0, keepalive = AP_CONN_UNKNOWN, keepalives = 0, log = 0x0, log_id = 0x0, current_thread = 0x563797131e10, master = 0x0, outgoing = 0} (gdb) print c->aborted $3 = 0 (gdb) x/100xw 0x5637971340e0 0x5637971340e0: 0x00000000 0x00000000 0x00000000 0x00000000 0x5637971340f0: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134100: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134110: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134120: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134130: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134140: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134150: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134160: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134170: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134180: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134190: 0x00000000 0x00000000 0x00000000 0x00000000 0x5637971341a0: 0x00000000 0x00000000 0x00000000 0x00000000 0x5637971341b0: 0x00000000 0x00000000 0x00000000 0x00000000 0x5637971341c0: 0x00000000 0x00000000 0x00000000 0x00000000 0x5637971341d0: 0x00000000 0x00000000 0x00000000 0x00000000 0x5637971341e0: 0x97134428 0x00005637 0x00000000 0x00000000 0x5637971341f0: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134200: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134210: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134220: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134230: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134240: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134250: 0x00000000 0x00000000 0x00000000 0x00000000 0x563797134260: 0x00000000 0x00000000 0x97133da8 0x00005637 Even after looking through the httpd code I couldn't figure how to get around that '<incomplete type>' from 'print *(c->conn_config)', so I just did a memory dump. Here is the trace8 error log: [Tue Oct 12 10:54:04.886976 2021] [ELF1] [default] [default] [core:trace5] [pid 11324:tid protocol.c(711): [client 192.168.1.13:41666] Request received from client: GET / HTTP/1.1 [Tue Oct 12 10:54:04.887549 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [setenvif:trace4] [pid 11324:tid util_expr_eval.c(859): [client 192.168.1.13:41666] Evaluation of expression from /home/www.mac003/config/request_denied.include:84 gave: 0 [Tue Oct 12 10:54:04.887585 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11324:tid http_request.c(435): [client 192.168.1.13:41666] Headers received from client: [Tue Oct 12 10:54:04.887599 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11324:tid http_request.c(438): [client 192.168.1.13:41666] Host: test001.acmondor.ca [Tue Oct 12 10:54:04.887611 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11324:tid http_request.c(438): [client 192.168.1.13:41666] User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like Gecko) Version/9.1.2 Safari/601.7.7 [Tue Oct 12 10:54:04.887624 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11324:tid http_request.c(438): [client 192.168.1.13:41666] Accept: */* [Tue Oct 12 10:54:04.887817 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [authz_core:debug] [pid 11324:tid mod_authz_core.c(815): [client 192.168.1.13:41666] AH01626: authorization result of Require all granted: granted [Tue Oct 12 10:54:04.887834 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [authz_core:debug] [pid 11324:tid mod_authz_core.c(815): [client 192.168.1.13:41666] AH01626: authorization result of Require not env request_denied: neutral [Tue Oct 12 10:54:04.887851 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [authz_core:debug] [pid 11324:tid mod_authz_core.c(815): [client 192.168.1.13:41666] AH01626: authorization result of <RequireAll>: granted [Tue Oct 12 10:54:04.887864 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [authz_core:debug] [pid 11324:tid mod_authz_core.c(815): [client 192.168.1.13:41666] AH01626: authorization result of <RequireAny>: granted [Tue Oct 12 10:54:04.887877 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [core:trace3] [pid 11324:tid request.c(360): [client 192.168.1.13:41666] request authorized without authentication by access_checker_ex hook: / [Tue Oct 12 10:54:04.888102 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace3] [pid 11324:tid http_filters.c(1126): [client 192.168.1.13:41666] Response sent with status 200, headers: [Tue Oct 12 10:54:04.888119 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace5] [pid 11324:tid http_filters.c(1135): [client 192.168.1.13:41666] Date: Tue, 12 Oct 2021 16:54:04 GMT [Tue Oct 12 10:54:04.888134 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace5] [pid 11324:tid http_filters.c(1138): [client 192.168.1.13:41666] Server: Apache [Tue Oct 12 10:54:04.888146 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11324:tid http_filters.c(956): [client 192.168.1.13:41666] Last-Modified: Mon, 29 Jul 2019 20:18:21 GMT [Tue Oct 12 10:54:04.888159 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11324:tid http_filters.c(956): [client 192.168.1.13:41666] ETag: \\"2d-58ed797e5d022\\" [Tue Oct 12 10:54:04.888171 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11324:tid http_filters.c(956): [client 192.168.1.13:41666] Accept-Ranges: bytes [Tue Oct 12 10:54:04.888183 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11324:tid http_filters.c(956): [client 192.168.1.13:41666] Content-Length: 45 [Tue Oct 12 10:54:04.888194 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11324:tid http_filters.c(956): [client 192.168.1.13:41666] Content-Type: text/html [Tue Oct 12 10:54:04.888302 2021] [ELF1] [default] [core:trace6] [pid 11324:tid core_filters.c(810): [client 192.168.1.13:41666] writev_nonblocking: 256/256 [Tue Oct 12 10:54:05.533291 2021] [ELF1] [mac003] [core:trace4] [pid 11141:tid mpm_common.c(538): mpm child 11327 (gen 0/slot 3) started [Tue Oct 12 10:54:06.534425 2021] [ELF1] [mac003] [core:notice] [pid 11141:tid AH00051: child pid 11148 exit signal Segmentation fault (11), possible coredump in /tmp [Tue Oct 12 10:54:06.534478 2021] [ELF1] [mac003] [core:trace4] [pid 11141:tid mpm_common.c(538): mpm child 11148 (gen 0/slot 4) exited I once again confirmed that the problem does away when mpm-itk is disabled. Here's what the error log looks like in that case: [Tue Oct 12 11:00:43.710355 2021] [ELF1] [mac003] [core:debug] [pid 11878:tid log.c(1570): AH02639: Using SO_REUSEPORT: yes (1) [Tue Oct 12 11:00:43.710372 2021] [ELF1] [mac003] [mpm_prefork:debug] [pid 11878:tid prefork.c(953): AH00165: Accept mutex: pthread (default: pthread) [Tue Oct 12 11:00:55.470355 2021] [ELF1] [default] [default] [core:trace5] [pid 11881:tid protocol.c(711): [client 192.168.1.13:41770] Request received from client: GET / HTTP/1.1 [Tue Oct 12 11:00:55.471298 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [setenvif:trace4] [pid 11881:tid util_expr_eval.c(859): [client 192.168.1.13:41770] Evaluation of expression from /home/www.mac003/config/request_denied.include:84 gave: 0 [Tue Oct 12 11:00:55.471393 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11881:tid http_request.c(435): [client 192.168.1.13:41770] Headers received from client: [Tue Oct 12 11:00:55.471408 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11881:tid http_request.c(438): [client 192.168.1.13:41770] Host: test001.acmondor.ca [Tue Oct 12 11:00:55.471418 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11881:tid http_request.c(438): [client 192.168.1.13:41770] User-Agent: Mozilla/5.0 (Macintosh; Intel Mac OS X 10_11_6) AppleWebKit/601.7.7 (KHTML, like Gecko) Version/9.1.2 Safari/601.7.7 [Tue Oct 12 11:00:55.471431 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11881:tid http_request.c(438): [client 192.168.1.13:41770] Accept: */* [Tue Oct 12 11:00:55.471553 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [authz_core:debug] [pid 11881:tid mod_authz_core.c(815): [client 192.168.1.13:41770] AH01626: authorization result of Require all granted: granted [Tue Oct 12 11:00:55.471570 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [authz_core:debug] [pid 11881:tid mod_authz_core.c(815): [client 192.168.1.13:41770] AH01626: authorization result of Require not env request_denied: neutral [Tue Oct 12 11:00:55.471580 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [authz_core:debug] [pid 11881:tid mod_authz_core.c(815): [client 192.168.1.13:41770] AH01626: authorization result of <RequireAll>: granted [Tue Oct 12 11:00:55.471590 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [authz_core:debug] [pid 11881:tid mod_authz_core.c(815): [client 192.168.1.13:41770] AH01626: authorization result of <RequireAny>: granted [Tue Oct 12 11:00:55.471600 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [core:trace3] [pid 11881:tid request.c(360): [client 192.168.1.13:41770] request authorized without authentication by access_checker_ex hook: / [Tue Oct 12 11:00:55.471845 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace3] [pid 11881:tid http_filters.c(1126): [client 192.168.1.13:41770] Response sent with status 200, headers: [Tue Oct 12 11:00:55.471859 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace5] [pid 11881:tid http_filters.c(1135): [client 192.168.1.13:41770] Date: Tue, 12 Oct 2021 17:00:55 GMT [Tue Oct 12 11:00:55.471919 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace5] [pid 11881:tid http_filters.c(1138): [client 192.168.1.13:41770] Server: Apache [Tue Oct 12 11:00:55.471932 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11881:tid http_filters.c(956): [client 192.168.1.13:41770] Last-Modified: Mon, 29 Jul 2019 20:18:21 GMT [Tue Oct 12 11:00:55.471941 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11881:tid http_filters.c(956): [client 192.168.1.13:41770] ETag: \\"2d-58ed797e5d022\\" [Tue Oct 12 11:00:55.471952 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11881:tid http_filters.c(956): [client 192.168.1.13:41770] Accept-Ranges: bytes [Tue Oct 12 11:00:55.471962 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11881:tid http_filters.c(956): [client 192.168.1.13:41770] Content-Length: 45 [Tue Oct 12 11:00:55.471971 2021] [ELF1] [test001.acmondor.ca] [test001.acmondor.ca] [http:trace4] [pid 11881:tid http_filters.c(956): [client 192.168.1.13:41770] Content-Type: text/html [Tue Oct 12 11:00:55.472135 2021] [ELF1] [default] [core:trace6] [pid 11881:tid core_filters.c(810): [client 192.168.1.13:41770] writev_nonblocking: 256/256 Will attach a file with the server info output. -- You are receiving this mail because: You are the assignee for the bug. --------------------------------------------------------------------- To unsubscribe, e-mail: [email protected] For additional commands, e-mail: [email protected]
