Hi, We have a production apache 1.3 instance on solaris, where of late one
of the httpd processes has been crashing and
producing core dumps. This looks to be a known issue with large SSL file
downloads happening over apache 1.3.
However what I" want to know is how can I debug this production issue
further. How can I find the application/cgi
causing the crash or how can it be remediated (without having to upgrade
apache). The stack traces are as below.
Your inputs are appreciated. thanks

coredump1:

(dbx) where

=>[1] ssl3_write_pending(0x3b52c0, 0x17, 0xfb1f4000, 0x4000, 0x0,
0x73736c00), a
t 0xfb5f38fc
  [2] ssl3_write_bytes(0x3b52c0, 0x17, 0xfb1f0000, 0x8000, 0x0, 0x6), at
0xfb5f3
480
  [3] ssl_io_hook_write(0xcfb80, 0xfb1f0000, 0x8000, 0x0, 0x69746500,
0x69746500
), at 0xfb5bbed8
  [4] ap_hook_call_func(0xffbff190, 0xcc390, 0xce690, 0x0, 0x74657874,
0x6367692
d), at 0x6cb98
  [5] ap_hook_call(0xbf3d0, 0xffbff1a8, 0xcfb80, 0xfb1f0000, 0x8000, 0x0),
at 0x
6bed8
  [6] ap_write(0xcfb80, 0xfb1f0000, 0x8000, 0x3c74b6, 0xa, 0x2c7366), at
0x39884

  [7] buff_write(0xcfb80, 0xfb1f0000, 0x8000, 0xffbff2ec, 0x2, 0x2e295c), at
0x3
9918
  [8] write_with_errors(0xcfb80, 0xfb1f0000, 0x8000, 0x7efefeff, 0x81010100,
0xf
f00), at 0x3af00
  [9] bcwrite(0xcfb80, 0xfb1f0000, 0x8000, 0x61, 0xc00d0, 0x4), at 0x3b028
  [10] ap_bwrite(0xcfb80, 0xfb1f0000, 0x8000, 0x0, 0x0, 0x6), at 0x3b5e0
  [11] ap_send_mmap(0xfb1d0000, 0x164628, 0x0, 0x4622d, 0xe, 0x0), at
0x54644
  [12] default_handler(0x164628, 0xa27e4, 0xffffffff, 0x0, 0x74657874,
0x6367692
d), at 0x4732c
  [13] ap_invoke_handler(0x164628, 0xa5f10, 0x0, 0x0, 0x3f, 0x3f), at
0x3cd08
  [14] process_request_internal(0x164628, 0xfb221e1c, 0xffbff5f4,
0xffbff634, 0x
4, 0x1), at 0x5846c
  [15] ap_process_request(0x164628, 0x4, 0x164628, 0xffbff6b4, 0xffbff6c4,
0x2f)
, at 0x584f8
  [16] child_main(0x2f, 0x4b260, 0x0, 0x0, 0x0, 0x0), at 0x4cdf8
  [17] make_child(0xc3b28, 0x2f, 0x47c2bbcf, 0x0, 0xffbff844, 0x0), at
0x4d0f4
  [18] perform_idle_server_maintenance(0xffffffff, 0x0, 0x0, 0xc3b28,
0xa41b4, 0
xbfe9c), at 0x4d5a8
  [19] standalone_main(0x2, 0xffbff9cc, 0xba630, 0x2f, 0xffbffb09, 0x0), at
0x4d
c74
  [20] main(0x2, 0xffbff9cc, 0xffbff9d8, 0xb7800, 0x0, 0x0), at 0x4e54c

coredump2:
=>[1] ssl3_write_pending(0x36d168, 0x17, 0xffbf93bc, 0x2000, 0x0,
0xffbf93c1), at 0xfb5f38fc
  [2] ssl3_write_bytes(0x36d168, 0x17, 0xffbf93bc, 0x2000, 0x73736c00,
0x73736c00), at 0xfb5f3428
  [3] SSL_writev(0x36d168, 0xffbf922c, 0x3, 0x0, 0x0, 0x0), at 0xfb5bc1a4
  [4] ssl_io_hook_writev(0xcfb80, 0xffbf922c, 0x3, 0x0, 0x0, 0x0), at
0xfb5bc040
  [5] ap_hook_call_func(0xffbf9190, 0xcc3b8, 0xce6a0, 0xffbf9104,
0xffbf9134, 0xf), at 0x6cb98
  [6] ap_hook_call(0xbf3e0, 0xffbf91ac, 0xcfb80, 0xffbf922c, 0x3,
0xffbf921e), at 0x6bed8
  [7] writev_it_all(0xcfb80, 0xffbf922c, 0x3, 0x2000, 0x0, 0x40), at 0x3ad18

  [8] large_write(0xcfb80, 0xffbf93bc, 0x2000, 0xfba3f2c0, 0xffbf9338,
0xffffffff), at 0x3b250
  [9] ap_bwrite(0xcfb80, 0xffbf93bc, 0x2000, 0x0, 0x0, 0xffbf93c1), at
0x3b360
  [10] ap_send_fb_length(0x390e00, 0x1b, 0x2000, 0x0, 0x2000, 0x2000), at
0x543e8
  [11] ap_send_fb(0x390e00, 0x164628, 0xffbfb48c, 0x2, 0xffbff4c4,
0xffbff4c0), at 0x540bc
  [12] cgi_handler(0x164628, 0x9e8ba, 0xffffffff, 0x0, 0x74, 0x74), at
0x2eb78
  [13] ap_invoke_handler(0x164628, 0xa5f10, 0x0, 0x0, 0x25, 0x25), at
0x3cc64
  [14] process_request_internal(0x164628, 0xfb2233e4, 0xffbff5f4, 0x0, 0x0,
0x0), at 0x5846c
  [15] ap_process_request(0x164628, 0x4, 0x164628, 0xffbff6b4, 0xffbff6c4,
0x51), at 0x584f8
  [16] child_main(0x51, 0x4b260, 0x0, 0x0, 0x0, 0x0), at 0x4cdf8
  [17] make_child(0xc3b28, 0x51, 0x47c5ba2b, 0x0, 0xffbff844, 0x8), at
0x4d0f4
  [18] perform_idle_server_maintenance(0xffffffff, 0x0, 0x0, 0xc3b28,
0xa41b4, 0xbfe9c), at 0x4d5a8
  [19] standalone_main(0x2, 0xffbff9cc, 0xba630, 0x2f, 0xffbffb09, 0x0), at
0x4dc74
  [20] main(0x2, 0xffbff9cc, 0xffbff9d8, 0xb7800, 0x0, 0x0), at 0x4e54c

Reply via email to