From owner-freebsd-ports-bugs@FreeBSD.ORG Thu Jul 11 15:40:04 2013 Return-Path: Delivered-To: freebsd-ports-bugs@smarthost.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id 2285E66E for ; Thu, 11 Jul 2013 15:40:04 +0000 (UTC) (envelope-from gnats@FreeBSD.org) Received: from freefall.freebsd.org (freefall.freebsd.org [IPv6:2001:1900:2254:206c::16:87]) by mx1.freebsd.org (Postfix) with ESMTP id 047DA1639 for ; Thu, 11 Jul 2013 15:40:04 +0000 (UTC) Received: from freefall.freebsd.org (localhost [127.0.0.1]) by freefall.freebsd.org (8.14.7/8.14.7) with ESMTP id r6BFe34V015608 for ; Thu, 11 Jul 2013 15:40:03 GMT (envelope-from gnats@freefall.freebsd.org) Received: (from gnats@localhost) by freefall.freebsd.org (8.14.7/8.14.7/Submit) id r6BFe3oE015606; Thu, 11 Jul 2013 15:40:03 GMT (envelope-from gnats) Resent-Date: Thu, 11 Jul 2013 15:40:03 GMT Resent-Message-Id: <201307111540.r6BFe3oE015606@freefall.freebsd.org> Resent-From: FreeBSD-gnats-submit@FreeBSD.org (GNATS Filer) Resent-To: freebsd-ports-bugs@FreeBSD.org Resent-Reply-To: FreeBSD-gnats-submit@FreeBSD.org, Peter Kieser Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by hub.freebsd.org (Postfix) with ESMTP id 55EE5564 for ; Thu, 11 Jul 2013 15:38:40 +0000 (UTC) (envelope-from nobody@FreeBSD.org) Received: from oldred.freebsd.org (oldred.freebsd.org [8.8.178.121]) by mx1.freebsd.org (Postfix) with ESMTP id 47D0B161E for ; Thu, 11 Jul 2013 15:38:40 +0000 (UTC) Received: from oldred.freebsd.org ([127.0.1.6]) by oldred.freebsd.org (8.14.5/8.14.7) with ESMTP id r6BFcdOu083067 for ; Thu, 11 Jul 2013 15:38:39 GMT (envelope-from nobody@oldred.freebsd.org) Received: (from nobody@localhost) by oldred.freebsd.org (8.14.5/8.14.5/Submit) id r6BFcd1u083051; Thu, 11 Jul 2013 15:38:39 GMT (envelope-from nobody) Message-Id: <201307111538.r6BFcd1u083051@oldred.freebsd.org> Date: Thu, 11 Jul 2013 15:38:39 GMT From: Peter Kieser To: freebsd-gnats-submit@FreeBSD.org X-Send-Pr-Version: www-3.1 Subject: ports/180470: r321585 port commit causes Apache 2.2 w/ mod_rpaf2 to segfault when IPv6 client accesses site X-BeenThere: freebsd-ports-bugs@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Ports bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 11 Jul 2013 15:40:04 -0000 >Number: 180470 >Category: ports >Synopsis: r321585 port commit causes Apache 2.2 w/ mod_rpaf2 to segfault when IPv6 client accesses site >Confidential: no >Severity: non-critical >Priority: low >Responsible: freebsd-ports-bugs >State: open >Quarter: >Keywords: >Date-Required: >Class: sw-bug >Submitter-Id: current-users >Arrival-Date: Thu Jul 11 15:40:03 UTC 2013 >Closed-Date: >Last-Modified: >Originator: Peter Kieser >Release: 9.1-RELEASE-p4 >Organization: >Environment: FreeBSD azazel.pfak.org 9.1-RELEASE-p4 FreeBSD 9.1-RELEASE-p4 #0: Mon Jun 17 11:42:37 UTC 2013 root@amd64-builder.daemonology.net:/usr/obj/usr/src/sys/GENERIC amd64 >Description: I am using Apache 2.2 with mod_rpaf and nginx sitting in front of it, which is IPv6 enabled. Prior to the following commit, IPv6 worked fine: http://docs.freebsd.org/cgi/getmsg.cgi?fetch=3707253+0+/usr/local/www/db/text/2013/svn-ports-all/20130623.svn-ports-all Now if I try to access a site with mod_rpaf2 enabled, the httpd process segfaults. Unfortunately I'm not able to get a decent stacktrace. Removing the patch and recompiling the port resolves the issue. #0 0x0000000804858fa8 in .rodata () from /usr/local/libexec/apache22/mod_rpaf2.so [New Thread 802807400 (LWP 100191/httpd)] (gdb) bt #0 0x0000000804858fa8 in .rodata () from /usr/local/libexec/apache22/mod_rpaf2.so #1 0x00000008006638a7 in dlinfo () from /libexec/ld-elf.so.1 #2 0x0000000800663a18 in dlclose () from /libexec/ld-elf.so.1 #3 0x0000000801939e84 in dso_cleanup (thedso=Variable "thedso" is not available. ) at dso/unix/dso.c:72 #4 0x000000080193ee5d in run_cleanups (cref=0x802823048) at memory/unix/apr_pools.c:2352 #5 0x000000080193fabe in apr_pool_clear (pool=0x802823028) at memory/unix/apr_pools.c:772 #6 0x000000000042421d in main (argc=1, argv=0x7fffffffdd38) at main.c:696 >How-To-Repeat: Use latest mod_rpaf2 port, have an IPv6 client access the reverse proxy in front of Apache and watch Apache segfault. >Fix: >Release-Note: >Audit-Trail: >Unformatted: