Skip site navigation (1)Skip section navigation (2)
Date:      Thu, 11 Jul 2013 15:38:39 GMT
From:      Peter Kieser <peter@kieser.ca>
To:        freebsd-gnats-submit@FreeBSD.org
Subject:   ports/180470: r321585 port commit causes Apache 2.2 w/ mod_rpaf2 to segfault when IPv6 client accesses site
Message-ID:  <201307111538.r6BFcd1u083051@oldred.freebsd.org>
Resent-Message-ID: <201307111540.r6BFe3oE015606@freefall.freebsd.org>

next in thread | raw e-mail | index | archive | help

>Number:         180470
>Category:       ports
>Synopsis:       r321585 port commit causes Apache 2.2 w/ mod_rpaf2 to segfault when IPv6 client accesses site
>Confidential:   no
>Severity:       non-critical
>Priority:       low
>Responsible:    freebsd-ports-bugs
>State:          open
>Quarter:        
>Keywords:       
>Date-Required:
>Class:          sw-bug
>Submitter-Id:   current-users
>Arrival-Date:   Thu Jul 11 15:40:03 UTC 2013
>Closed-Date:
>Last-Modified:
>Originator:     Peter Kieser
>Release:        9.1-RELEASE-p4
>Organization:
>Environment:
FreeBSD azazel.pfak.org 9.1-RELEASE-p4 FreeBSD 9.1-RELEASE-p4 #0: Mon Jun 17 11:42:37 UTC 2013     root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC  amd64

>Description:

I am using Apache 2.2 with mod_rpaf and nginx sitting in front of it, which is IPv6 enabled. Prior to the following commit, IPv6 worked fine:

http://docs.freebsd.org/cgi/getmsg.cgi?fetch=3707253+0+/usr/local/www/db/text/2013/svn-ports-all/20130623.svn-ports-all

Now if I try to access a site with mod_rpaf2 enabled, the httpd process segfaults. Unfortunately I'm not able to get a decent stacktrace. Removing the patch and recompiling the port resolves the issue.

 #0  0x0000000804858fa8 in .rodata () from /usr/local/libexec/apache22/mod_rpaf2.so
[New Thread 802807400 (LWP 100191/httpd)]
(gdb) bt
#0  0x0000000804858fa8 in .rodata () from /usr/local/libexec/apache22/mod_rpaf2.so
#1  0x00000008006638a7 in dlinfo () from /libexec/ld-elf.so.1
#2  0x0000000800663a18 in dlclose () from /libexec/ld-elf.so.1
#3  0x0000000801939e84 in dso_cleanup (thedso=Variable "thedso" is not available.
) at dso/unix/dso.c:72
#4  0x000000080193ee5d in run_cleanups (cref=0x802823048) at memory/unix/apr_pools.c:2352
#5  0x000000080193fabe in apr_pool_clear (pool=0x802823028) at memory/unix/apr_pools.c:772
#6  0x000000000042421d in main (argc=1, argv=0x7fffffffdd38) at main.c:696 
>How-To-Repeat:
Use latest mod_rpaf2 port, have an IPv6 client access the reverse proxy in front of Apache and watch Apache segfault.
>Fix:


>Release-Note:
>Audit-Trail:
>Unformatted:



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?201307111538.r6BFcd1u083051>