Hi Stephen,
Thanks for your reply.
Here are somemore details:
- The problem is Winhttp just stopped sending the GET/POST
requests to the servers. There's no "sending data:" logs after
WinHttpSendRequest() is called.
- Typically, we have 20-30 HTTP transactions/s. But, we may have as
many as 200 simultaneous HTTP transactions under load.
- Strangely, the requests to the Apache Tomcat server stopped first.
It could still fetch from IIS when it stopped fetching from Tomcat.
After a few hours, the requests to IIS failed too.
- The problem does not occur after a fixed period of time.
We've seen it happened after 14hours, 20 hours, 3 days..
And sometimes it runs fine for 4 days.
- It also does not occur on the same systems consistently.
We have 6 systems, it happened 3 times on system 1, twice on
system 3. The rest are error free.
We've compared the OS and software on the the systems and they
are identical.
- I'm not sure about the keep-alive. I know that there is no
"connection:" field in the responses.
So it defaults to keep-alive probably?
- There are 100 unique "users" trying to fetch from the servers, and
each user may have 2 simultaneous fetches. So, worst case scenario,
we'll have 200 simultaneous fetches. Typically,we have 20-30
fetches per second(according to the logs)
- yes you're right. There is no timeout errors in the logs.
After winhttpsendrequest() call, we got as far as
WINHTTP_CALLBACK_STATUS_CONNECTING_TO_SERVER. I don't know if
WINHTTP_CALLBACK_STATUS_CONNECTED_TO_SERVER is received or not.
- We have a thread that will remove timed-out requests,
and the thread will send a timeout error to the upper layers.
That's where the timeouts came from.
When the thread removes the requests, it will close the winhttp
handles.
- Yes each "user" calls WinHttpConnect and WinHttpOpenRequest
seperately for each HTTP request. If you really want to see
the code I can email it to you.
The app initialize the dll by calling winhttpopen once.
Then, each "user" starts the request by creating an request
object and put it in a queue. The "user" would return
and wait for the fetch completion.
- There is a threadpool with 5 threads that picks up the HTTP
requests from the queue, and then initiates the asyn HTTP
transactions by calling winhttpconnect, winhttpOpenRequest
and winhttpSendRequest. Then the threads returns to the pool.
When the callbacks came in, we are using the callback
threads to start the next async operations: winhttpQueryHeaders,
winhttpreaddata etc. until there is an error returned by the
callback,
or the HTTP transaction ended
(WINHTTP_CALLBACK_STATUS_READ_COMPLETE).
- We have a mixture of timeout values, 3.5s to 8s. All HTTP
request would be stuck regardless of the timeout values.
And the web server logs indicate that the web server did not
receive any HTTP request from the winhttp client at all.
IE is able to fetch from the same servers while the
app is in the failed state.
- Also, after system 3 failed, the rest of the systems are
running fine using the same web servers. So the problem is
unlikely to be the web servers or the network. All the
systems are connected to the same gigabit switch. There is no
proxy servers.
Thanks,
Adrian
Here are somemore logs. Sorry about the huge post and linewraps.
0152dd0 failed. 0152dd1 works.
13:03:08.796 ::*0152dcb* :: WinHttpConnect(0x51c5000, "tomcatserver",
8080, 0x0)
13:03:08.796 ::*0152dcb* :: WinHttpConnect() returning handle
0x5b6e2900
13:03:08.796 ::*Session* :: WinHttpOpenRequest(0x5b6e2900, "POST",
"/App1/ExecuteSubroutine", "", "", 0x0, 0x00000100)
13:03:08.796 ::*Session* :: WinHttpCreateUrlA(0x6bef20c, 0x0,
0x25e40000, 0x6bef248)
13:03:08.796 ::*Session* :: WinHttpCreateUrlA() returning TRUE
13:03:08.796 ::*0152dd0* :: WinHttpOpenRequest() returning handle
0x5b56e400
13:03:08.796 ::*Session* :: WinHttpQueryOption(0x5b56e400, (12),
0x6bef498, 0x6bef474 [4])
13:03:08.796 ::*Session* :: WinHttpQueryOption() returning TRUE
13:03:08.796 ::*Session* :: WinHttpAddRequestHeaders(0x5b56e400,
"Content-Type: application/x-www-form-urlencoded\r\nReferer:
http://iisserver/vappl", -1, 0x1)
13:03:08.796 ::*Session* :: WinHttpAddRequestHeaders() returning TRUE
13:03:08.796 ::*0152dd0* :: WinHttpSetOption(0x5b56e400, (63),
0x6bef4a8 [0x1], 4)
13:03:08.796 ::*0152dd0* :: WinHttpSetOption() returning TRUE
13:03:08.796 ::*0152dd0* :: WinHttpSendRequest(0x5b56e400, "", 0,
0x26a93b18, 1553, 1553, 154c2a)
13:03:08.796 ::*0152dd0* :: WinHttpSendRequest() returning TRUE
13:03:08.796 ::*0152dd0* :: WinHttpSetOption(0x5b56e400, (3),
0x23a4f254 [0x1f40], 4)
13:03:08.796 ::*0152dd0* :: WinHttpSetOption() returning TRUE
13:03:09.453 ::*0152dcc* ::
WinHttpCrackUrl("http://iisserver/vappl/ASPs/xlate.asp?FileName=areastat&Key=234",
0x0, 0x0, 0x6eef598)
13:03:09.453 ::*0152dcc* ::
WinHttpCrackUrlA("http://iisserver/vappl/ASPs/xlate.asp?FileName=areastat&Key=234",
0x3f, 0x0, 0x6eef274)
13:03:09.453 ::*0152dcc* :: WinHttpCrackUrlA() returning TRUE
13:03:09.453 ::*0152dcc* :: WinHttpCrackUrl() returning TRUE
13:03:09.453 ::*0152dcc* :: WinHttpConnect(0x51c5000, "iisserver", 80,
0x0)
13:03:09.453 ::*0152dcc* :: WinHttpConnect() returning handle
0x5b5f9600
13:03:09.453 ::*Session* :: WinHttpOpenRequest(0x5b5f9600, "GET",
"/vappl/ASPs/xlate.asp?FileName=areastat&Key=234", "", "", 0x0,
0x00000100)
13:03:09.453 ::*Session* :: WinHttpCreateUrlA(0x6eef210, 0x0,
0x262c0000, 0x6eef24c)
13:03:09.453 ::*Session* :: WinHttpCreateUrlA() returning TRUE
13:03:09.453 ::*0152dd1* :: WinHttpOpenRequest() returning handle
0x5b5e9800
13:03:09.453 ::*Session* :: WinHttpQueryOption(0x5b5e9800, (12),
0x6eef498, 0x6eef474 [4])
13:03:09.453 ::*Session* :: WinHttpQueryOption() returning TRUE
13:03:09.453 ::*Session* :: WinHttpAddRequestHeaders(0x5b5e9800,
"Content-Type: application/x-www-form-urlencoded\r\nReferer:
http://iisserver/vappl", -1, 0x1)
13:03:09.453 ::*Session* :: WinHttpAddRequestHeaders() returning TRUE
13:03:09.453 ::*0152dd1* :: WinHttpSetOption(0x5b5e9800, (63),
0x6eef4a8 [0x1], 4)
13:03:09.453 ::*0152dd1* :: WinHttpSetOption() returning TRUE
13:03:09.453 ::*0152dd1* :: WinHttpSendRequest(0x5b5e9800, "", 0, 0x0,
0, 0, 154c2b)
13:03:09.453 ::*0152dd1* :: WinHttpSendRequest() returning TRUE
13:03:09.453 ::*0152dd1* :: sending data:
13:03:09.453 ::*0152dd1* :: 402 (0x192) bytes
13:03:09.453 ::*0152dd1* :: <<<<-------- HTTP headers follow below
----------------------------------------------->>>>
13:03:09.453 ::*0152dd1* :: GET
/vappl/ASPs/xlate.asp?FileName=areastat&Key=234 HTTP/1.1
13:03:09.453 ::*0152dd1* :: Content-Type:
application/x-www-form-urlencoded
13:03:09.453 ::*0152dd1* :: Referer:
http://iisserver/vappl/BAC004/Utility_Lib_Get_Translate_Table.vxml
13:03:09.453 ::*0152dd1* :: Cookie:
ASPSESSIONIDAQBTACSS=MNCJBDEDIFAAGHEDLMPCLLFO
13:03:09.453 ::*0152dd1* :: User-Agent: Mozilla/4.0 (compatible;
Windows 2000)
13:03:09.453 ::*0152dd1* :: Host: iisserver
13:03:09.453 ::*0152dd1* :: Connection: Keep-Alive
13:03:09.453 ::*0152dd1* :: Cache-Control: no-cache
13:03:09.453 ::*0152dd1* :: Pragma: no-cache
13:03:09.453 ::*0152dd1* :: <<<<-------- End
----------------------------------------------->>>>
13:03:09.453 ::*0152dd1* :: WinHttpSetOption(0x5b5e9800, (5),
0x23a4f8f4 [0x1388], 4)
13:03:09.453 ::*0152dd1* :: WinHttpSetOption() returning TRUE
13:03:09.453 ::*0152dd1* :: WinHttpSetOption(0x5b5e9800, (6),
0x23a4fa24 [0xffffffff], 4)
13:03:09.453 ::*0152dd1* :: WinHttpSetOption() returning TRUE
13:03:09.453 ::*0152dd1* :: WinHttpReceiveResponse(0x5b5e9800, 0x0)
13:03:09.453 ::*0152dd1* :: WinHttpReceiveResponse() returning TRUE
13:03:09.453 ::*0152dd1* :: received data:
13:03:09.453 ::*0152dd1* :: 379 (0x17b) bytes
13:03:09.453 ::*0152dd1* :: <<<<-------- HTTP headers follow below
----------------------------------------------->>>>
13:03:09.453 ::*0152dd1* :: HTTP/1.1 200 OK
13:03:09.453 ::*0152dd1* :: Server: Microsoft-IIS/5.0
13:03:09.453 ::*0152dd1* :: Date: Tue, 24 May 2005 18:06:37 GMT
13:03:09.453 ::*0152dd1* :: Content-Length: 226
13:03:09.453 ::*0152dd1* :: Content-Type: text/html
13:03:09.453 ::*0152dd1* :: Cache-control: private
13:03:09.453 ::*0152dd1* :: <<<<-------- End
----------------------------------------------->>>>
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders(0x5b5e9800, (0x13),
"<null>", 0x2388c0f0, 0x2388c0ec [31], 0x0 [0])
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders() returning TRUE
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders(0x5b5e9800, (0x16),
"<null>", 0x0, 0x2388f408 [0], 0x0 [0])
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders() returning FALSE
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders(0x5b5e9800, (0x16),
"<null>", 0x503cc00, 0x2388f408 [308], 0x0 [0])
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders() returning TRUE
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders(0x5b5e9800, (0x1),
"<null>", 0x2388f274, 0x2388f404 [399], 0x0 [0])
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders() returning TRUE
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders(0x5b5e9800, (0x31),
"<null>", 0x2388c980, 0x2388c97c [199], 0x2388f248 [0])
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders() returning TRUE
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders(0x5b5e9800, (0x31),
"<null>", 0x2388c980, 0x2388c97c [199], 0x2388f248 [1])
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders() returning FALSE
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders(0x5b5e9800, (0xa),
"<null>", 0x2388c764, 0x2388c760 [499], 0x0 [0])
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders() returning FALSE
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders(0x5b5e9800, (0x9),
"<null>", 0x2388c560, 0x2388c55c [499], 0x0 [0])
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders() returning TRUE
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders(0x5b5e9800, (0x11),
"<null>", 0x2388c3b8, 0x2388c548 [199], 0x2388f248 [0])
13:03:09.453 ::*0152dd1* :: WinHttpQueryHeaders() returning FALSE
13:03:09.453 ::*0152dd1* :: WinHttpReadData(0x5b5e9800, 0x410d7e63,
10240, 0x410da664)
13:03:09.453 ::*0152dd1* :: WinHttpReadData(0x5b5e9800, 0x410d7e63,
10240, 0x410da664)
13:03:09.453 ::*0152dd1* :: WinHttpReadData() returning TRUE
13:03:09.453 ::*0152dd1* :: WinHttpReadData() returning TRUE
13:03:09.453 ::*0152dd1* :: WinHttpCloseHandle(0x5b5e9800)
13:03:09.453 ::*0152dd1* :: WinHttpCloseHandle() returning TRUE
13:03:09.453 ::*Session* :: WinHttpCloseHandle(0x5b5f9600)
13:03:09.453 ::*Session* :: WinHttpCloseHandle() returning TRUE
13:03:09.468 ::*0152dcd* ::
WinHttpCrackUrl("http://iisserver/vappl/ASPs/xlate.asp?FileName=sysid&Key=10.1.80.13",
0x0, 0x0, 0x6aef598)
13:03:09.468 ::*0152dcd* ::
WinHttpCrackUrlA("http://iisserver/vappl/ASPs/xlate.asp?FileName=sysid&Key=10.1.80.13",
0x43, 0x0, 0x6aef274)
13:03:09.468 ::*0152dcd* :: WinHttpCrackUrlA() returning TRUE
13:03:09.468 ::*0152dcd* :: WinHttpCrackUrl() returning TRUE
13:03:09.468 ::*0152dcd* :: WinHttpConnect(0x51c5000, "iisserver", 80,
0x0)
13:03:09.468 ::*0152dcd* :: WinHttpConnect() returning handle
0x5b60c400
13:03:09.468 ::*Session* :: WinHttpOpenRequest(0x5b60c400, "GET",
"/vappl/ASPs/xlate.asp?FileName=sysid&Key=10.1.80.13", "", "", 0x0,
0x00000100)
13:03:09.468 ::*Session* :: WinHttpCreateUrlA(0x6aef210, 0x0,
0x19d10000, 0x6aef24c)
13:03:09.468 ::*Session* :: WinHttpCreateUrlA() returning TRUE
13:03:09.468 ::*0152dd2* :: WinHttpOpenRequest() returning handle
0x5b5bcc00
13:03:09.468 ::*Session* :: WinHttpQueryOption(0x5b5bcc00, (12),
0x6aef498, 0x6aef474 [4])
13:03:09.468 ::*Session* :: WinHttpQueryOption() returning TRUE
13:03:09.468 ::*Session* :: WinHttpAddRequestHeaders(0x5b5bcc00,
"Content-Type: application/x-www-form-urlencoded\r\nReferer:
http://iisserver/vappl", -1, 0x1)
13:03:09.468 ::*Session* :: WinHttpAddRequestHeaders() returning TRUE
13:03:09.468 ::*0152dd2* :: WinHttpSetOption(0x5b5bcc00, (63),
0x6aef4a8 [0x1], 4)
13:03:09.468 ::*0152dd2* :: WinHttpSetOption() returning TRUE
13:03:09.468 ::*0152dd2* :: WinHttpSendRequest(0x5b5bcc00, "", 0, 0x0,
0, 0, 154c2c)
13:03:09.468 ::*0152dd2* :: WinHttpSendRequest() returning TRUE
13:03:09.468 ::*0152dd2* :: sending data:
13:03:09.468 ::*0152dd2* :: 406 (0x196) bytes
13:03:09.468 ::*0152dd2* :: <<<<-------- HTTP headers follow below
----------------------------------------------->>>>
13:03:09.468 ::*0152dd2* :: GET
/vappl/ASPs/xlate.asp?FileName=sysid&Key=10.1.80.13 HTTP/1.1
13:03:09.468 ::*0152dd2* :: Content-Type:
application/x-www-form-urlencoded
13:03:09.468 ::*0152dd2* :: Referer:
http://iisserver/vappl/BAC004/Utility_Lib_Get_Translate_Table.vxml
13:03:09.468 ::*0152dd2* :: Cookie:
ASPSESSIONIDAQBTACSS=MNCJBDEDIFAAGHEDLMPCLLFO
13:03:09.468 ::*0152dd2* :: User-Agent: Mozilla/4.0 (compatible;
Windows 2000)
13:03:09.468 ::*0152dd2* :: Host: iisserver
13:03:09.468 ::*0152dd2* :: Connection: Keep-Alive
13:03:09.468 ::*0152dd2* :: Cache-Control: no-cache
13:03:09.468 ::*0152dd2* :: Pragma: no-cache
13:03:09.468 ::*0152dd2* :: <<<<-------- End
----------------------------------------------->>>>
13:03:09.468 ::*0152dd2* :: WinHttpSetOption(0x5b5bcc00, (5),
0x2388f8f4 [0x1388], 4)
13:03:09.468 ::*0152dd2* :: WinHttpSetOption() returning TRUE
13:03:09.468 ::*0152dd2* :: WinHttpSetOption(0x5b5bcc00, (6),
0x2388fa24 [0xffffffff], 4)
13:03:09.468 ::*0152dd2* :: WinHttpSetOption() returning TRUE
13:03:09.468 ::*0152dd2* :: WinHttpReceiveResponse(0x5b5bcc00, 0x0)
13:03:09.468 ::*0152dd2* :: WinHttpReceiveResponse() returning TRUE
13:03:09.468 ::*0152dd2* :: received data:
13:03:09.468 ::*0152dd2* :: 392 (0x188) bytes
13:03:09.468 ::*0152dd2* :: <<<<-------- HTTP headers follow below
----------------------------------------------->>>>
13:03:09.468 ::*0152dd2* :: HTTP/1.1 200 OK
13:03:09.468 ::*0152dd2* :: Server: Microsoft-IIS/5.0
13:03:09.468 ::*0152dd2* :: Date: Tue, 24 May 2005 18:06:37 GMT
13:03:09.468 ::*0152dd2* :: Content-Length: 239
13:03:09.468 ::*0152dd2* :: Content-Type: text/html
13:03:09.468 ::*0152dd2* :: Cache-control: private
13:03:09.468 ::*0152dd2* :: <<<<-------- End
----------------------------------------------->>>>
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders(0x5b5bcc00, (0x13),
"<null>", 0x23a4c0f0, 0x23a4c0ec [31], 0x0 [0])
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders() returning TRUE
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders(0x5b5bcc00, (0x16),
"<null>", 0x0, 0x23a4f408 [0], 0x0 [0])
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders() returning FALSE
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders(0x5b5bcc00, (0x16),
"<null>", 0x503cc00, 0x23a4f408 [308], 0x0 [0])
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders() returning TRUE
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders(0x5b5bcc00, (0x1),
"<null>", 0x23a4f274, 0x23a4f404 [399], 0x0 [0])
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders() returning TRUE
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders(0x5b5bcc00, (0x31),
"<null>", 0x23a4c980, 0x23a4c97c [199], 0x23a4f248 [0])
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders() returning TRUE
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders(0x5b5bcc00, (0x31),
"<null>", 0x23a4c980, 0x23a4c97c [199], 0x23a4f248 [1])
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders() returning FALSE
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders(0x5b5bcc00, (0xa),
"<null>", 0x23a4c764, 0x23a4c760 [499], 0x0 [0])
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders() returning FALSE
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders(0x5b5bcc00, (0x9),
"<null>", 0x23a4c560, 0x23a4c55c [499], 0x0 [0])
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders() returning TRUE
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders(0x5b5bcc00, (0x11),
"<null>", 0x23a4c3b8, 0x23a4c548 [199], 0x23a4f248 [0])
13:03:09.468 ::*0152dd2* :: WinHttpQueryHeaders() returning FALSE
13:03:09.468 ::*0152dd2* :: WinHttpReadData(0x5b5bcc00, 0x410d7e63,
10240, 0x410da664)
13:03:09.468 ::*0152dd2* :: WinHttpReadData(0x5b5bcc00, 0x410d7e63,
10240, 0x410da664)
13:03:09.468 ::*0152dd2* :: WinHttpReadData() returning TRUE
13:03:09.468 ::*0152dd2* :: WinHttpReadData() returning TRUE
13:03:09.468 ::*0152dd2* :: WinHttpCloseHandle(0x5b5bcc00)
13:03:09.468 ::*0152dd2* :: WinHttpCloseHandle() returning TRUE
13:03:09.468 ::*Session* :: WinHttpCloseHandle(0x5b60c400)
13:03:09.468 ::*Session* :: WinHttpCloseHandle() returning TRUE
13:03:09.484 ::*Session* ::
WinHttpCrackUrl("http://tomcatserver:8080/App1/ExecuteSubroutine", 0x0,
0x0, 0x6cef598)
13:03:09.484 ::*Session* ::
WinHttpCrackUrlA("http://tomcatserver:8080/App1/ExecuteSubroutine",
0x31, 0x0, 0x6cef274)
13:03:09.484 ::*Session* :: WinHttpCrackUrlA() returning TRUE
13:03:09.484 ::*Session* :: WinHttpCrackUrl() returning TRUE
13:03:09.484 ::*Session* :: WinHttpConnect(0x51c5000, "tomcatserver",
8080, 0x0)
13:03:09.484 ::*Session* :: WinHttpConnect() returning handle
0x5b614f00
13:03:09.484 ::*Session* :: WinHttpOpenRequest(0x5b614f00, "POST",
"/App1/ExecuteSubroutine", "", "", 0x0, 0x00000100)
13:03:09.484 ::*Session* :: WinHttpCreateUrlA(0x6cef20c, 0x0,
0x26120000, 0x6cef248)
13:03:09.484 ::*Session* :: WinHttpCreateUrlA() returning TRUE
13:03:09.484 ::*0152dd3* :: WinHttpOpenRequest() returning handle
0x5b913800
13:03:09.484 ::*Session* :: WinHttpQueryOption(0x5b913800, (12),
0x6cef498, 0x6cef474 [4])
13:03:09.484 ::*Session* :: WinHttpQueryOption() returning TRUE
13:03:09.484 ::*Session* :: WinHttpAddRequestHeaders(0x5b913800,
"Content-Type: application/x-www-form-urlencoded\r\nReferer:
http://iisserver/vappl", -1, 0x1)
13:03:09.484 ::*Session* :: WinHttpAddRequestHeaders() returning TRUE
13:03:09.484 ::*0152dd3* :: WinHttpSetOption(0x5b913800, (63),
0x6cef4a8 [0x1], 4)
13:03:09.484 ::*0152dd3* :: WinHttpSetOption() returning TRUE
13:03:09.484 ::*0152dd3* :: WinHttpSendRequest(0x5b913800, "", 0,
0x26ad9db0, 1553, 1553, 154c2d)
13:03:09.484 ::*0152dd3* :: WinHttpSendRequest() returning TRUE
13:03:09.484 ::*0152dd3* :: WinHttpSetOption(0x5b913800, (3),
0x23a4f254 [0x1f40], 4)
13:03:09.484 ::*0152dd3* :: WinHttpSetOption() returning TRUE
13:03:16.796 ::*Session* :: WinHttpCloseHandle(0x5b56e400)
13:03:16.796 ::*Session* :: WinHttpCloseHandle() returning TRUE
13:03:16.796 ::*Session* :: WinHttpCloseHandle(0x5b6e2900)
13:03:16.796 ::*Session* :: WinHttpCloseHandle() returning TRUE
13:03:17.484 ::*Session* :: WinHttpCloseHandle(0x5b913800)
13:03:17.484 ::*Session* :: WinHttpCloseHandle() returning TRUE
13:03:17.484 ::*Session* :: WinHttpCloseHandle(0x5b614f00)
13:03:17.484 ::*Session* :: WinHttpCloseHandle() returning TRUE
13:03:24.265 ::*Session* :: WinHttpCloseHandle(0x5b5e2000)
13:03:24.265 ::*Session* :: WinHttpCloseHandle() returning TRUE
13:03:24.265 ::*Session* :: WinHttpCloseHandle(0x5b53a800)
13:03:24.265 ::*Session* :: WinHttpCloseHandle() returning TRUE
13:03:24.281 ::*Session* ::
WinHttpCrackUrl("http://tomcatserver:8080/App1/ExecuteSubroutine", 0x0,
0x0, 0x6def598)
13:03:24.281 ::*Session* ::
WinHttpCrackUrlA("http://tomcatserver:8080/App1/ExecuteSubroutine",
0x31, 0x0, 0x6def274)
13:03:24.281 ::*Session* :: WinHttpCrackUrlA() returning TRUE
13:03:24.281 ::*Session* :: WinHttpCrackUrl() returning TRUE
13:03:24.281 ::*Session* :: WinHttpConnect(0x51c5000, "tomcatserver",
8080, 0x0)
13:03:24.281 ::*Session* :: WinHttpConnect() returning handle
0x470d0700
13:03:24.281 ::*Session* :: WinHttpOpenRequest(0x470d0700, "POST",
"/App1/ExecuteSubroutine", "", "", 0x0, 0x00000100)
13:03:24.281 ::*Session* :: WinHttpCreateUrlA(0x6def20c, 0x0,
0x261f0000, 0x6def248)
13:03:24.281 ::*Session* :: WinHttpCreateUrlA() returning TRUE
13:03:24.281 ::*0152dd4* :: WinHttpOpenRequest() returning handle
0x5b5c9800
13:03:24.281 ::*Session* :: WinHttpQueryOption(0x5b5c9800, (12),
0x6def498, 0x6def474 [4])
13:03:24.281 ::*Session* :: WinHttpQueryOption() returning TRUE
13:03:24.281 ::*Session* :: WinHttpAddRequestHeaders(0x5b5c9800,
"Content-Type: application/x-www-form-urlencoded\r\nReferer:
http://iisserver/vappl", -1, 0x1)
13:03:24.281 ::*Session* :: WinHttpAddRequestHeaders() returning TRUE
13:03:24.281 ::*0152dd4* :: WinHttpSetOption(0x5b5c9800, (63),
0x6def4a8 [0x1], 4)
13:03:24.281 ::*0152dd4* :: WinHttpSetOption() returning TRUE
13:03:24.281 ::*0152dd4* :: WinHttpSendRequest(0x5b5c9800, "", 0,
0x503b1f0, 494, 494, 154c2e)
13:03:24.281 ::*0152dd4* :: WinHttpSendRequest() returning TRUE
13:03:24.281 ::*0152dd4* :: WinHttpSetOption(0x5b5c9800, (3),
0x23a4f254 [0xdac], 4)
13:03:24.281 ::*0152dd4* :: WinHttpSetOption() returning TRUE
13:03:24.437 ::*Session* :: WinHttpCloseHandle(0x5b5c3400)
13:03:24.437 ::*Session* :: WinHttpCloseHandle() returning TRUE
13:03:24.437 ::*Session* :: WinHttpCloseHandle(0x5b5a3d00)
13:03:24.437 ::*Session* :: WinHttpCloseHandle() returning TRUE
13:03:24.453 ::*0152dd0* ::
WinHttpCrackUrl("http://tomcatserver:8080/App1/ExecuteSubroutine", 0x0,
0x0, 0x6bef598)
13:03:24.453 ::*0152dd0* ::
WinHttpCrackUrlA("http://tomcatserver:8080/App1/ExecuteSubroutine",
0x31, 0x0, 0x6bef274)
13:03:24.453 ::*0152dd0* :: WinHttpCrackUrlA() returning TRUE
13:03:24.453 ::*0152dd0* :: WinHttpCrackUrl() returning TRUE
13:03:24.453 ::*0152dd0* :: WinHttpConnect(0x51c5000, "tomcatserver",
8080, 0x0)
13:03:24.453 ::*0152dd0* :: WinHttpConnect() returning handle
0x5b6e2a00
13:03:24.453 ::*Session* :: WinHttpOpenRequest(0x5b6e2a00, "POST",
"/App1/ExecuteSubroutine", "", "", 0x0, 0x00000100)
13:03:24.453 ::*Session* :: WinHttpCreateUrlA(0x6bef20c, 0x0,
0x25e40000, 0x6bef248)
13:03:24.453 ::*Session* :: WinHttpCreateUrlA() returning TRUE
13:03:24.453 ::*0152dd5* :: WinHttpOpenRequest() returning handle
0x5b56e800
13:03:24.453 ::*Session* :: WinHttpQueryOption(0x5b56e800, (12),
0x6bef498, 0x6bef474 [4])
13:03:24.453 ::*Session* :: WinHttpQueryOption() returning TRUE
13:03:24.453 ::*Session* :: WinHttpAddRequestHeaders(0x5b56e800,
"Content-Type: application/x-www-form-urlencoded\r\nReferer:
http://iisserver/vappl", -1, 0x1)
13:03:24.453 ::*Session* :: WinHttpAddRequestHeaders() returning TRUE
13:03:24.453 ::*0152dd5* :: WinHttpSetOption(0x5b56e800, (63),
0x6bef4a8 [0x1], 4)
13:03:24.453 ::*0152dd5* :: WinHttpSetOption() returning TRUE
13:03:24.453 ::*0152dd5* :: WinHttpSendRequest(0x5b56e800, "", 0,
0x26a7c978, 494, 494, 154c2f)
13:03:24.453 ::*0152dd5* :: WinHttpSendRequest() returning TRUE
13:03:24.453 ::*0152dd5* :: WinHttpSetOption(0x5b56e800, (3),
0x23a4f254 [0xdac], 4)
13:03:24.453 ::*0152dd5* :: WinHttpSetOption() returning TRUE