Hi,

Am 04.07.2017 um 22:35 schrieb Willy Tarreau:
>
> This one should theorically not be caused by an issue in the task scheduler,
> unless we're reusing something already freed. We could retry it with -dM
> and/or -DDEBUG_MEMORY to force earlier corruption to pop up.

The call trace doesn't really look different when I used -dM or -DDEBUG_MEMORY.

I was able to get a different trace by actually connecting to a backend however,
(instead of showing an haproxy internal 403 error):

(gdb) bt
#0  0x00007ffff7179428 in __GI_raise (sig=sig@entry=6) at 
../sysdeps/unix/sysv/linux/raise.c:54
#1  0x00007ffff717b02a in __GI_abort () at abort.c:89
#2  0x00007ffff71bb7ea in __libc_message (do_abort=2, 
fmt=fmt@entry=0x7ffff72d4e98 "*** Error in `%s': %s: 0x%s ***\n") at 
../sysdeps/posix/libc_fatal.c:175
#3  0x00007ffff71c2913 in malloc_printerr (ar_ptr=0x7ffff7508b20 <main_arena>, 
ptr=0xa83220, str=0x7ffff72d1c35 "corrupted size vs. prev_size", 
action=<optimized out>) at malloc.c:5006
#4  malloc_consolidate (av=av@entry=0x7ffff7508b20 <main_arena>) at 
malloc.c:4175
#5  0x00007ffff71c5cde in _int_malloc (av=av@entry=0x7ffff7508b20 <main_arena>, 
bytes=bytes@entry=4448) at malloc.c:3450
#6  0x00007ffff71c8184 in __GI___libc_malloc (bytes=4448) at malloc.c:2913
#7  0x00000000005d658e in CRYPTO_zalloc ()
#8  0x0000000000536172 in SSL_new ()
#9  0x000000000041143a in ssl_sock_init (conn=0xa3f9a0) at src/ssl_sock.c:4515
#10 0x00000000004fcc58 in conn_xprt_init (conn=0xa3f9a0) at 
include/proto/connection.h:79
#11 0x00000000004fde02 in session_accept_fd (l=0xa432f0, cfd=5, 
addr=0x7fffffffe320) at src/session.c:152
#12 0x00000000004e44c6 in listener_accept (fd=4) at src/listener.c:493
#13 0x00000000005116a2 in fd_process_cached_events () at src/fd.c:240
#14 0x00000000004d4a75 in run_poll_loop () at src/haproxy.c:2186
#15 0x00000000004d5d67 in main (argc=7, argv=0x7fffffffe638) at 
src/haproxy.c:2701
(gdb)

Reply via email to