FYI, the bug is submitted:
https://bz.apache.org/bugzilla/show_bug.cgi?id=59897
Chris and Rainer, thanks for pointing me in the right direction!
Michael
On 19 July 2016 at 11:42, Michael Diener wrote:
> Chris,
>
> thanks a lot for explaining what could be overflowing the FD_SETSIZE
; Hash: SHA256
>
> Michael,
>
> On 7/18/16 10:10 AM, Christopher Schultz wrote:
> > Michael,
> >
> > On 7/18/16 8:53 AM, Michael Diener wrote:
> >> On 6 July 2016 at 00:09, Christopher Schultz
> >> wrote:
> >
> >>>> From what I und
On 6 July 2016 at 00:09, Christopher Schultz
wrote:
> > From what I understand a buffer overflow would only happen for
> > FD_SET if the fd_set gets over 1024 descriptors. I made sure that
> > my ulimit for open files is set and applied large enough, so that's
> > not it.
>
> There's nothing magi
luate the IF in line 284 to
TRUE? I wonder if this might be the real cause for my problems in the first
place.
2. In line 305 of the original jk_connect.c there is a FD_ISSET inside an
IF. Is there an equivalent operation for poll or is the whole IF
unnecessary then?
Thanks,
Michael
On 30
Thank you Rainer!
On 29 June 2016 at 14:50, Rainer Jung wrote:
> Can you reproduce? Does it also happen on a test system?
It only happens on a live system and I'm not able to reproduce it.
> Latest we provide in the project is 1.2.41. It is pretty easy to compile
> yourself and would be an
I get occasional Apache 2 crashes being caused by mod_jk and I'm running
out of ideas about the cause of the problem. I hope somebody here can point
me in the right direction.
-Michael
tomcat6 6.0.39-1
libapache2-mod-jk 1:1.2.37-3
apache2 2.4.7-1ubuntu4
java version "1.6.0_45"
Java(TM) SE Run