From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from gnu.wildebeest.org (gnu.wildebeest.org [45.83.234.184]) by sourceware.org (Postfix) with ESMTPS id ACD6D3857377 for ; Sat, 28 May 2022 09:43:18 +0000 (GMT) DMARC-Filter: OpenDMARC Filter v1.4.1 sourceware.org ACD6D3857377 Authentication-Results: sourceware.org; dmarc=none (p=none dis=none) header.from=klomp.org Authentication-Results: sourceware.org; spf=pass smtp.mailfrom=klomp.org Received: from reform (deer0x07.wildebeest.org [172.31.17.137]) (using TLSv1.2 with cipher ADH-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by gnu.wildebeest.org (Postfix) with ESMTPSA id 8C7CF302FB8A for ; Sat, 28 May 2022 11:43:17 +0200 (CEST) Received: by reform (Postfix, from userid 1000) id 4BC122E83D87; Sat, 28 May 2022 11:43:17 +0200 (CEST) Date: Sat, 28 May 2022 11:43:17 +0200 From: Mark Wielaard To: elfutils-devel@sourceware.org Subject: Re: =?utf-8?B?4pigIEJ1aWxkYm8=?= =?utf-8?Q?t?= (GNU Toolchain): elfutils - failed test (failure) (master) Message-ID: References: <20220528091530.AD8583857373@sourceware.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: X-Spam-Status: No, score=-3.9 required=5.0 tests=BAYES_00, JMQ_SPF_NEUTRAL, KAM_DMARC_STATUS, SPF_HELO_NONE, SPF_PASS, TXREP, T_SCC_BODY_TEXT_LINE autolearn=no autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on server2.sourceware.org X-BeenThere: elfutils-devel@sourceware.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Elfutils-devel mailing list List-Unsubscribe: , List-Archive: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 28 May 2022 09:43:20 -0000 On Sat, May 28, 2022 at 11:35:19AM +0200, Mark Wielaard wrote: > Retrying with ulimit -c unlimited... > > O! It failed again, now with core > > (gdb) where > #0 0x00007f4d528be387 in __GI_raise (sig=sig@entry=6) at ../nptl/sysdeps/unix/sysv/linux/raise.c:55 > #1 0x00007f4d528bfa78 in __GI_abort () at abort.c:90 > #2 0x00007f4d53dfae1f in mhd_panic_std (cls=, file=, > line=, reason=) at daemon.c:117 > #3 0x00007f4d53dfc69e in MHD_cleanup_connections (daemon=daemon@entry=0xdf38e0) at daemon.c:1826 > #4 0x00007f4d53dfdf60 in MHD_run_from_select (daemon=daemon@entry=0xdf38e0, > read_fd_set=read_fd_set@entry=0x7f4d4c153c10, write_fd_set=write_fd_set@entry=0x7f4d4c153c90, > except_fd_set=except_fd_set@entry=0x7f4d4c153d10) at daemon.c:2014 > #5 0x00007f4d53dfe1e9 in MHD_select (daemon=daemon@entry=0xdf38e0, may_block=may_block@entry=1) > at daemon.c:2109 > #6 0x00007f4d53dfe3b2 in MHD_select_thread (cls=0xdf38e0) at daemon.c:2632 > #7 0x00007f4d53681ea5 in start_thread (arg=0x7f4d4c154700) at pthread_create.c:307 > #8 0x00007f4d52986b0d in clone () at ../sysdeps/unix/sysv/linux/x86_64/clone.S:111 > > (gdb) > #3 0x00007f4d53dfc69e in MHD_cleanup_connections (daemon=daemon@entry=0xdf38e0) at daemon.c:1826 > 1826 MHD_PANIC ("close failed\n"); > (gdb) list > 1821 { > 1822 #ifdef WINDOWS > 1823 SHUTDOWN (pos->socket_fd, SHUT_WR); > 1824 #endif > 1825 if (0 != CLOSE (pos->socket_fd)) > 1826 MHD_PANIC ("close failed\n"); > 1827 } > 1828 if (NULL != pos->addr) > 1829 free (pos->addr); > 1830 free (pos); > > Hohum. That does look like a bug in libmicrohttpd. Or do we manipulate > the socket_fd in any way? And in case it is useful for analysis: (gdb) print *pos $2 = {nextE = 0x0, prevE = 0x0, next = 0x0, prev = 0x0, nextX = 0x0, prevX = 0x0, daemon = 0xdf38e0, headers_received = 0x0, headers_received_tail = 0x0, response = 0x0, pool = 0x7f4d242f2450, client_context = 0x0, method = 0x0, url = 0x0, version = 0x0, read_buffer = 0x7f4d242f2480 "\240\355\v$M\177", write_buffer = 0x0, last = 0x0, colon = 0x0, addr = 0x7f4d242fa490, pid = 139968370415360, read_buffer_size = 16384, read_buffer_offset = 0, write_buffer_size = 0, write_buffer_send_offset = 0, write_buffer_append_offset = 0, remaining_upload_size = 0, response_write_position = 0, continue_message_write_offset = 0, addr_len = 28, last_activity = 599293, connection_timeout = 0, client_aware = 0, socket_fd = 96, read_closed = 1, thread_joined = 0, in_idle = 0, epoll_state = MHD_EPOLL_STATE_UNREADY, state = MHD_CONNECTION_CLOSED, event_loop_info = MHD_EVENT_LOOP_INFO_CLEANUP, responseCode = 0, response_unready = 0, have_chunked_upload = 0, current_chunk_size = 0, current_chunk_offset = 0, read_handler = 0x7f4d53df7680 , write_handler = 0x7f4d53df78d0 , idle_handler = 0x7f4d53df83a0 , recv_cls = 0x7f4d53dfa030 , send_cls = 0x7f4d53df9ec0 , tls_session = 0x0, protocol = 0, cipher = 0, tls_read_ready = 0, suspended = 0, resuming = 0} $ rpm -q libmicrohttpd libmicrohttpd-0.9.33-2.el7.x86_64 Cheers, Mark