I found out how to backtrace the core files from httpd crash due to SSLSessionCache, and here is the output of the backtrace from Sun Studio Debugger
Any help with this backtrace to find out if this is due to a misconfiguration, or a bug in the software would be appreciated:
dbx /opt/apache/bin/httpd /var/core/core.httpd.2372
For information about new features see `help changes'
To remove this message, put `dbxenv suppress_startup_message 7.5' in your .dbxrc
Reading httpd
core file header read successfully
Reading ld.so.1
Reading libaprutil-1.so.0
Reading libldap-2.3.so.0
Reading liblber-2.3.so.0
Reading libexpat.so.0
Reading libapr-1.so.0
Reading libuuid.so.1
Reading
libsendfile.so.1
Reading librt.so.1
Reading libsocket.so.1
Reading libnsl.so.1
Reading libpthread.so.1
Reading libdl.so.1
Reading libthread.so.1
Reading libc.so.1
Reading libucb.so.1
Reading libresolv.so.2
Reading libelf.so.1
Reading libgen.so.1
Reading libaio.so.1
Reading libmp.so.2
Reading libc_psr.so.1
Reading nss_files.so.1
Reading mod_authz_host.so
Reading mod_auth_basic.so
Reading mod_deflate.so
Reading libz.so.1
Reading mod_ldap.so
Reading mod_log_config.so
Reading mod_log_forensic.so
Reading mod_logio.so
Reading mod_env.so
Reading mod_headers.so
Reading mod_setenvif.so
Reading mod_ssl.so
Reading mod_mime.so
Reading mod_status.so
Reading mod_info.so
Reading mod_dir.so
Reading mod_alias.so
Reading mod_rewrite.so
Reading mod_perl.so
Reading libperl.so
Reading libmalloc.so.1
Reading
libm.so.1
Reading libsec.so.1
Reading mod_authnz_ldap.so
Reading mod_evasive20.so
Reading Embperl.so
t@1 (
l@1) terminated by signal BUS (invalid address alignment)
0xffffffff7945b664: shmcb_lookup_session_id+0x0264: ld [%i5 + 12], %g1
(dbx) where -h
current thread:
t@1=>[1] shmcb_lookup_session_id(0x10024d470, 0xffffffff7fff8760, 0xffffffff7fff8740, 0x10038e5fb, 0x10, 0xffffffff7c127152), at 0xffffffff7945b664
[2] shmcb_retrieve_session(0x10024d470, 0xffffffff7c100008, 0x60, 0x270e2, 0x10, 0xa), at 0xffffffff79459134
[3] ssl_scache_shmcb_retrieve(0x10024d470, 0x10038e5fb, 0x10, 0x0, 0x26e0d4, 0xffffffff796c5a18), at 0xffffffff79457990
[4] ssl_callback_GetSessionCacheEntry(0x1003a04b0, 0x10038e5fb, 0x10, 0xffffffff7fff8a4c, 0x0, 0x10), at 0xffffffff7944ad98
[5] ssl_get_prev_session(0x1, 0x10038e5fb, 0x10, 0x1, 0x10036b7c0, 0xaa), at 0xffffffff794743f4
[6] get_client_hello(0x1003a04b0, 0x10038e5e0, 0x32, 0x10, 0xffffffff796c5a18, 0x12), at 0xffffffff7945fac4
[7] ssl2_accept(0x1003a04b0, 0x1, 0x0, 0x2070, 0x2010, 0x2030), at 0xffffffff7945e4a8
[8] ssl23_get_client_hello(0x1003a04b0, 0x6000000, 0x0, 0x10039f360, 0xffffffff796c5a18, 0x1), at 0xffffffff79466f98
[9] ssl23_accept(0x1003a04b0, 0x0, 0x2210, 0x6000, 0xffffffff796c5a18, 0x4000), at 0xffffffff7946612c
[10] ssl_io_filter_connect(0x10037a7f0, 0x100379f58, 0x0, 0x10039cd70, 0x1003479b8, 0x10037a6e8), at 0xffffffff7944601c
[11] ssl_io_filter_input(0x100385588, 0x10039e548, 0x1, 0x0, 0x0, 0x1001dca48), at 0xffffffff794467cc
[12] ap_rgetline_core(0x10039ce38, 0x2000, 0xffffffff7fff91e0, 0x10039ce08, 0x10039e550, 0x10039e548), at 0x100029074
[13] ap_read_request(0x100379f58, 0x10039ce38, 0x100385588, 0x10024d470, 0x10039ce08, 0x1), at 0x10002a6f0
[14] ap_process_http_connection(0x100379f58, 0x100379f58, 0x1, 0x100176758, 0x126b14, 0x1), at 0x10004fc68
[15] ap_process_connection(0x100379f58, 0x1001a2f88, 0xbee0, 0x1003488a0, 0x100182638, 0x4), at 0x100049a68
[16] child_main(0x100379f58, 0x1001826a0, 0x10017e0cc, 0x100176758, 0x10017df80, 0x100182758), at 0x100059fcc
[17] make_child(0x7400, 0x1, 0x0, 0x11c594, 0x100176758, 0x1000594a0), at 0x10005a330
[18] startup_children(0x5, 0x100, 0x7628, 0xff000000, 0x10017e0c0, 0x100176758), at 0x10005a40c
[19] ap_mpm_run(0xffffffff7bf00008, 0x5, 0x100197b70, 0x10017df88, 0x100176758, 0x1001826e0), at 0x10005a6d0
[20] main(0x7400, 0x0, 0x10017de68, 0x100197b70, 0x1001905d8, 0x100176758), at 0x10001de04
(dbx)