> I don't have a test to reproduce the segfault, so I'm just shooting in the 
> dark based on the core trace that you've kindly provided. Please revert the 
> previous patch and try the new one:

We tried the new patch, but can still get the segfault. We wrote 3
modules that can reproduce the segfault on our system.  We're using the
same trickery in our production code.  The segfault will occur when the
server is under a bit of load, refreshing the browser repeatedly will
make it die quickly.  We have apache configured so the children only
handle 10 requests before exiting.

The transhandler will answer requests for any domain name, and strip the
uri passed off of the request.  It returns declined after that so our
handler can step in and do its work.

The handler is parsing an XML file and using XML::GDOME::XSLT to
transform it into html.  We used XML::LibXSLT for a while too, the
segfaults were happening before we switched over.

The Global Module is just a locker for storing the parts of the request
we want to access from modules down the line.  

Some code we didn't include calls different objects based on the uri
passed in.  But we could reproduce the bomb without all of that.

We compiled apache without expat, having read that this can cause
segfaults when using some XML modules.

The latest backtrace and the portion of httpd.conf that sets up the test
environment are in the README for Server::Killer.  We don't want to take
too much of your time with this, if we knew what portion of our code was
causing the bomb then we could just recode it.

If you need any more information, please let us know.

Thanks again,


Marc Slagle
Whapps, LLC


Attachment: Server-Killer-0.01.tar.gz
Description: application/compressed-tar

Attachment: Server-KillerGlobal-0.01.tar.gz
Description: application/compressed-tar

Attachment: Server-KillerTH-0.04b.tar.gz
Description: application/compressed-tar

-- 
Reporting bugs: http://perl.apache.org/bugs/
Mail list info: http://perl.apache.org/maillist/modperl.html

Reply via email to