FYI, the bug is submitted:
https://bz.apache.org/bugzilla/show_bug.cgi?id=59897
Chris and Rainer, thanks for pointing me in the right direction!
Michael
On 19 July 2016 at 11:42, Michael Diener wrote:
> Chris,
>
> thanks a lot for explaining what could be overflowing the FD_SETSIZE of
> 1024.
Chris,
thanks a lot for explaining what could be overflowing the FD_SETSIZE of
1024.
Just for reference, I use mpm_event mostly with SSL connections, so it
should behave like mpm_worker. This is my configuration:
StartServers 2
ServerLimit 16
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Michael,
On 7/18/16 10:10 AM, Christopher Schultz wrote:
> Michael,
>
> On 7/18/16 8:53 AM, Michael Diener wrote:
>> On 6 July 2016 at 00:09, Christopher Schultz
>> wrote:
>
From what I understand a buffer overflow would only happen
fo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Michael,
On 7/18/16 10:10 AM, Christopher Schultz wrote:
> Michael,
>
> On 7/18/16 8:53 AM, Michael Diener wrote:
>> On 6 July 2016 at 00:09, Christopher Schultz
>> wrote:
>
From what I understand a buffer overflow would only happen
fo
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Michael,
On 7/18/16 8:53 AM, Michael Diener wrote:
> On 6 July 2016 at 00:09, Christopher Schultz
> wrote:
>
>>> From what I understand a buffer overflow would only happen for
>>> FD_SET if the fd_set gets over 1024 descriptors. I made sure
>>> t
On 6 July 2016 at 00:09, Christopher Schultz
wrote:
> > From what I understand a buffer overflow would only happen for
> > FD_SET if the fd_set gets over 1024 descriptors. I made sure that
> > my ulimit for open files is set and applied large enough, so that's
> > not it.
>
> There's nothing magi
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA256
Michael,
On 7/5/16 11:31 AM, Michael Diener wrote:
> Alright, I did my homework this time and worked with a self
> compiled version of mod_jk (1.2.41). Still the same error is
> happening. I traced the buffer overflow down to line 291 in
> jk_connec
Alright, I did my homework this time and worked with a self compiled
version of mod_jk (1.2.41). Still the same error is happening. I traced the
buffer overflow down to line 291 in jk_connect.c (nb_connect):
280> do {
281>rc = connect(sd, (const struct sockaddr *)&addr->sa.sin,
addr->sal
Thank you Rainer!
On 29 June 2016 at 14:50, Rainer Jung wrote:
> Can you reproduce? Does it also happen on a test system?
It only happens on a live system and I'm not able to reproduce it.
> Latest we provide in the project is 1.2.41. It is pretty easy to compile
> yourself and would be an
Am 29.06.2016 um 11:58 schrieb Michael Diener:
I get occasional Apache 2 crashes being caused by mod_jk and I'm running
out of ideas about the cause of the problem. I hope somebody here can point
me in the right direction.
Can you reproduce? Does it also happen on a test system?
tomcat6 6.0.3
I get occasional Apache 2 crashes being caused by mod_jk and I'm running
out of ideas about the cause of the problem. I hope somebody here can point
me in the right direction.
-Michael
tomcat6 6.0.39-1
libapache2-mod-jk 1:1.2.37-3
apache2 2.4.7-1ubuntu4
java version "1.6.0_45"
Java(TM) SE Run
11 matches
Mail list logo