Bug 1368935

Summary: segmentation fault at destroy_tunnel
Product: [Fedora] Fedora EPEL Reporter: lee_yiu_chung
Component: xl2tpdAssignee: Paul Wouters <pwouters>
Status: CLOSED EOL QA Contact: Fedora Extras Quality Assurance <extras-qa>
Severity: high Docs Contact:
Priority: unspecified    
Version: el6CC: pwouters
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2020-11-30 15:05:53 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:

Description lee_yiu_chung 2016-08-22 07:51:07 UTC
Description of problem:


Version-Release number of selected component (if applicable):
1.3.6-2.el6.x86_64

How reproducible:
random crash

Steps to Reproduce:
1.
2.
3.

Actual results:
segmentation fault

Expected results:
no crash

Additional info:
Below is the crash stack trace. If you need further logs please let me know if I can salvage any. If you need the actual crash dump please also tell me how to upload.


(gdb) bt full
#0  destroy_tunnel (t=0x7f58560b0400) at xl2tpd.c:578
        c = 0x7f58560dcd10
        me = 0x7f58560b1ed0
        p = <value optimized out>
        tv = {tv_sec = 140017377412096, tv_usec = 59}
        __FUNCTION__ = "destroy_tunnel"
#1  0x00007f58556813ea in build_fdset (readfds=0x7ffcfce99570) at network.c:403
        tun = 0x7f58560b0400
        call = <value optimized out>
        max = 59
        __FUNCTION__ = "build_fdset"
#2  0x00007f585568201f in network_thread () at network.c:456
        ret = <value optimized out>
        from = {sin_family = 2, sin_port = 5272, sin_addr = {s_addr = 4100004212}, sin_zero = "\000\000\000\000\000\000\000"}
        to = {ipi_ifindex = 2, ipi_spec_dst = {s_addr = 579652220}, ipi_addr = {s_addr = 579652220}}
        fromlen = <value optimized out>
        tunnel = <value optimized out>
        call = <value optimized out>
        recvsize = <value optimized out>
        buf = 0x7f5855fbc050
        c = <value optimized out>
        sc = <value optimized out>
        st = <value optimized out>
        readfds = {__fds_bits = {576460752303423488, 0 <repeats 15 times>}}
        max = <value optimized out>
        tv = {tv_sec = 3, tv_usec = 187650}
        ptv = <value optimized out>
        msgh = {msg_name = 0x7ffcfce99760, msg_namelen = 16, msg_iov = 0x7ffcfce99630, msg_iovlen = 1, msg_control = 0x7ffcfce99660, msg_controllen = 32, msg_flags = 0}
        iov = {iov_base = 0x7f58560af3fa, iov_len = 4086}
        cbuf = "\034", '\000' <repeats 11 times>, "\b\000\000\000\002\000\000\000|ʌ\"|ʌ\"7 UTC 2016", '\000' <repeats 30 times>, "x86_64", '\000' <repeats 30 times>, "Y\024\325TX\177", '\000' <repeats 23 times>, "(none)\000\000\000\000\000\000\000\000\000\t\000\000\000\002", '\000' <repeats 39 times>"\260, \000\000\000\000\000\000\000\t\000\000\000\062\000\000\000[\000\000\000|\000\000\000w\000\000\000n\000\000\000\270\230\351\374\374\177\000\000 Q\006UX\177\000\000\000\000\000\000\000\000\000\000\340\345\001\000\000\000\000"
        refme = <value optimized out>
        refhim = <value optimized out>
        currentfd = <value optimized out>
        server_socket_processed = <value optimized out>
        __FUNCTION__ = "network_thread"
#3  0x00007f5855678019 in main (argc=<value optimized out>, argv=<value optimized out>) at xl2tpd.c:1560

Comment 1 Ben Cotton 2020-11-05 16:50:55 UTC
This message is a reminder that EPEL 6 is nearing its end of life. Fedora will stop maintaining and issuing updates for EPEL 6 on 2020-11-30. It is our policy to close all bug reports from releases that are no longer maintained. At that time this bug will be closed as EOL if it remains open with a 'version' of 'el6'.

Package Maintainer: If you wish for this bug to remain open because you plan to fix it in a currently maintained version, simply change the 'version' to a later EPEL version.

Thank you for reporting this issue and we are sorry that we were not able to fix it before EPEL 6 is end of life. If you would still like to see this bug fixed and are able to reproduce it against a later version of Fedora, you are encouraged  change the 'version' to a later Fedora version prior this bug is closed as described in the policy above.

Comment 2 Ben Cotton 2020-11-30 15:05:53 UTC
EPEL el6 changed to end-of-life (EOL) status on 2020-11-30. EPEL el6 is
no longer maintained, which means that it will not receive any further
security or bug fix updates. As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of
EPEL please feel free to reopen this bug against that version. If you
are unable to reopen this bug, please file a new report against the
current release. If you experience problems, please add a comment to this
bug.

Thank you for reporting this bug and we are sorry it could not be fixed.