| Summary: | segmentation fault at destroy_tunnel | ||
|---|---|---|---|
| Product: | [Fedora] Fedora EPEL | Reporter: | lee_yiu_chung |
| Component: | xl2tpd | Assignee: | Paul Wouters <pwouters> |
| Status: | CLOSED EOL | QA Contact: | Fedora Extras Quality Assurance <extras-qa> |
| Severity: | high | Docs Contact: | |
| Priority: | unspecified | ||
| Version: | el6 | CC: | pwouters |
| Target Milestone: | --- | ||
| Target Release: | --- | ||
| Hardware: | x86_64 | ||
| OS: | Linux | ||
| Whiteboard: | |||
| Fixed In Version: | Doc Type: | If docs needed, set a value | |
| Doc Text: | Story Points: | --- | |
| Clone Of: | Environment: | ||
| Last Closed: | 2020-11-30 15:05:53 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
This message is a reminder that EPEL 6 is nearing its end of life. Fedora will stop maintaining and issuing updates for EPEL 6 on 2020-11-30. It is our policy to close all bug reports from releases that are no longer maintained. At that time this bug will be closed as EOL if it remains open with a 'version' of 'el6'. Package Maintainer: If you wish for this bug to remain open because you plan to fix it in a currently maintained version, simply change the 'version' to a later EPEL version. Thank you for reporting this issue and we are sorry that we were not able to fix it before EPEL 6 is end of life. If you would still like to see this bug fixed and are able to reproduce it against a later version of Fedora, you are encouraged change the 'version' to a later Fedora version prior this bug is closed as described in the policy above. EPEL el6 changed to end-of-life (EOL) status on 2020-11-30. EPEL el6 is no longer maintained, which means that it will not receive any further security or bug fix updates. As a result we are closing this bug. If you can reproduce this bug against a currently maintained version of EPEL please feel free to reopen this bug against that version. If you are unable to reopen this bug, please file a new report against the current release. If you experience problems, please add a comment to this bug. Thank you for reporting this bug and we are sorry it could not be fixed. |
Description of problem: Version-Release number of selected component (if applicable): 1.3.6-2.el6.x86_64 How reproducible: random crash Steps to Reproduce: 1. 2. 3. Actual results: segmentation fault Expected results: no crash Additional info: Below is the crash stack trace. If you need further logs please let me know if I can salvage any. If you need the actual crash dump please also tell me how to upload. (gdb) bt full #0 destroy_tunnel (t=0x7f58560b0400) at xl2tpd.c:578 c = 0x7f58560dcd10 me = 0x7f58560b1ed0 p = <value optimized out> tv = {tv_sec = 140017377412096, tv_usec = 59} __FUNCTION__ = "destroy_tunnel" #1 0x00007f58556813ea in build_fdset (readfds=0x7ffcfce99570) at network.c:403 tun = 0x7f58560b0400 call = <value optimized out> max = 59 __FUNCTION__ = "build_fdset" #2 0x00007f585568201f in network_thread () at network.c:456 ret = <value optimized out> from = {sin_family = 2, sin_port = 5272, sin_addr = {s_addr = 4100004212}, sin_zero = "\000\000\000\000\000\000\000"} to = {ipi_ifindex = 2, ipi_spec_dst = {s_addr = 579652220}, ipi_addr = {s_addr = 579652220}} fromlen = <value optimized out> tunnel = <value optimized out> call = <value optimized out> recvsize = <value optimized out> buf = 0x7f5855fbc050 c = <value optimized out> sc = <value optimized out> st = <value optimized out> readfds = {__fds_bits = {576460752303423488, 0 <repeats 15 times>}} max = <value optimized out> tv = {tv_sec = 3, tv_usec = 187650} ptv = <value optimized out> msgh = {msg_name = 0x7ffcfce99760, msg_namelen = 16, msg_iov = 0x7ffcfce99630, msg_iovlen = 1, msg_control = 0x7ffcfce99660, msg_controllen = 32, msg_flags = 0} iov = {iov_base = 0x7f58560af3fa, iov_len = 4086} cbuf = "\034", '\000' <repeats 11 times>, "\b\000\000\000\002\000\000\000|ʌ\"|ʌ\"7 UTC 2016", '\000' <repeats 30 times>, "x86_64", '\000' <repeats 30 times>, "Y\024\325TX\177", '\000' <repeats 23 times>, "(none)\000\000\000\000\000\000\000\000\000\t\000\000\000\002", '\000' <repeats 39 times>"\260, \000\000\000\000\000\000\000\t\000\000\000\062\000\000\000[\000\000\000|\000\000\000w\000\000\000n\000\000\000\270\230\351\374\374\177\000\000 Q\006UX\177\000\000\000\000\000\000\000\000\000\000\340\345\001\000\000\000\000" refme = <value optimized out> refhim = <value optimized out> currentfd = <value optimized out> server_socket_processed = <value optimized out> __FUNCTION__ = "network_thread" #3 0x00007f5855678019 in main (argc=<value optimized out>, argv=<value optimized out>) at xl2tpd.c:1560