On Mon, Aug 31, 2020 at 08:37:55AM +0200, Ruediger Pluem wrote:
> On 8/30/20 7:22 AM, Christophe JAILLET wrote:
> > Thread 66 (Thread 0x7f13a6525700 (LWP 7436)):
> > 
> > #0  0x00007f13dd61a187 in kill () from /lib/x86_64-linux-gnu/libc.so.6
> > #1  <signal handler called>
> > #2  0x00007f13dd619e97 in raise () from /lib/x86_64-linux-gnu/libc.so.6
> > #3  0x00007f13dd61b801 in abort () from /lib/x86_64-linux-gnu/libc.so.6
> > #4  0x00007f13ddc05f62 in apr_table_mergen (t=0x560cba82d790, 
> > key=key@entry=0x560cb949006a "Connection",
> > val=val@entry=0x560cb9488f86 "close") at tables/apr_tables.c:750
> > #5  0x0000560cb9434fcf in ap_set_keepalive (r=r@entry=0x560cba7c9c60) at 
> > http_protocol.c:309
> > #6  0x0000560cb943a475 in ap_http_header_filter (f=0x560cba74f8e0, 
> > b=0x560cba65db80) at http_filters.c:1369
> > #7  0x0000560cb9458091 in ap_content_length_filter (f=0x560cba1d95c0, 
> > b=0x560cba65db80) at protocol.c:2040
> > 
> 
> My only guess is some sort of pool corruption. The key is a literal 
> and as such its memory address shouldn't be in the scope of any memory 
> managed by a pool.

I agree.  This is triggered by running TLSv1.2 tests with memcache 
configured as the session cache (a relatively new test).  The memcache 
socache provider does *not* use AP_SOCACHE_FLAG_NOTMPSAFE so is used w/o 
locks held across multiple threads so that might be a good place to 
investigate.

Reply via email to