Steve Hay wrote:

t\filter\in_bbs_inject_header.t always succeeds when run as part of the whole "nmake new" run, and only sometimes crashes Apache when run alone, which was only uncovered by last night's SMOKE run.

After numerous attempts, mine finally failed (running in isolation) too.

You mean, it's a random thing, right?

Here's the stacktrace (using perl-5.8.4):

Perl_safesysmalloc(unsigned int 268467750) line 67 + 11 bytes
modperl_input_filter_handler(ap_filter_t * 0x6eec8410 apr_pool_cleanup_null(void *), apr_bucket_brigade * 0x02b3c950, int 45337120, int 0, __int64 10888566729080832) line 905 + 23 bytes

so where is that line 905? what mod_perl code has caused that malloc call?

modperl_filter_add_connection(conn_rec * 0x02b3cdb0, int 0, const char * 0x02b3ca20, ap_filter_t * (const char *, void *, request_rec *, conn_rec *)* 0x00000000, const char * 0x02b3ca08) line 988 + 1 byte
02b3cd68()
modperl_input_filter_handler(ap_filter_t * 0x6e6e6f63, apr_bucket_brigade * 0x69746365, int 1767861871, int 1953853550, __int64 37412188805136384) line 891
5f6c7265()


It crashed on the line:

ptr = (Malloc_t)PerlMem_malloc(size?size:1); /* malloc(0) is NASTY on our system */

with an Access Violation exception.

size is 268467750 at this point. Not sure I understand where such a violation is coming from.

- Steve



------------------------------------------------
Radan Computational Ltd.

The information contained in this message and any files transmitted with it are confidential and intended for the addressee(s) only. If you have received this message in error or there are any problems, please notify the sender immediately. The unauthorized use, disclosure, copying or alteration of this message is strictly forbidden. Note that any views or opinions presented in this email are solely those of the author and do not necessarily represent those of Radan Computational Ltd. The recipient(s) of this message should check it and any attached files for viruses: Radan Computational will accept no liability for any damage caused by any virus transmitted by this email.


--
__________________________________________________________________
Stas Bekman            JAm_pH ------> Just Another mod_perl Hacker
http://stason.org/     mod_perl Guide ---> http://perl.apache.org
mailto:[EMAIL PROTECTED] http://use.perl.org http://apacheweek.com
http://modperlbook.org http://apache.org   http://ticketmaster.com

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



Reply via email to