Sorry, this is as deep as dbx goes into the stack. Rebuilding libcurl with '-g' and specifying source directory to dbx (-I option) does not contribute to more informative stack.
-----Original Message----- From: curl-library [mailto:curl-library-boun...@cool.haxx.se] On Behalf Of Dan Fandrich Sent: April 2, 2014 12:47 PM To: curl-library@cool.haxx.se Subject: Re: libcurl 7.21.0 On Wed, Apr 02, 2014 at 03:56:00PM +0000, Alona Rossen wrote: > Our application crashes in libcurl with the following stack: > > Segmentation fault in addbyter at 0x22f8a1b8 ($t2) > 0x22f8a1b8 (addbyter+0x18) 98650000 stb r3,0x0(r5) > (dbx) where > addbyter() at 0x22f8a1b8 > dprintf_formatf() at 0x22f8a2b4 > curl_mvsnprintf() at 0x22f8bc24 > Curl_failf() at 0x22f8d2cc > (dbx) Line numbers would go a long way to help track this down, as would displaying a deeper stack trace. > We do set NOSIGNALS option and we do use SSL library¢s mutex callbacks. > > However, we do not explicitely clear CRYPTO mutexes, since our > application misses code similar to the following: > > static void kill_locks(void) > { > int i; > CRYPTO_set_locking_callback(NULL); > for (i=0; i<CRYPTO_num_locks(); i++) > pthread_mutex_destroy(&(lockarray[i])); > OPENSSL_free(lockarray); > } Once the locks are set, they don't need to be deleted while the program is running. > Please advise. My first advice would be to migrate to a version of curl that's not 4 years old. Lots of bugs have been fixed since then. The second would be to try to track down which call to Curl_failf is causing this issue, what the arguments are, and why those arguments appear to be bad. >>> Dan ------------------------------------------------------------------- List admin: http://cool.haxx.se/list/listinfo/curl-library Etiquette: http://curl.haxx.se/mail/etiquette.html ------------------------------------------------------------------- List admin: http://cool.haxx.se/list/listinfo/curl-library Etiquette: http://curl.haxx.se/mail/etiquette.html