Bug 1771852

Summary: [abrt] [faf] sssd: anonymous function(): /usr/libexec/sssd/sssd_be killed by 11
Product: Red Hat Enterprise Linux 8 Reporter: Madhuri <mupadhye>
Component: sssdAssignee: Alexey Tikhonov <atikhono>
Status: CLOSED DUPLICATE QA Contact: sssd-qe <sssd-qe>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 8.1CC: atikhono, grajaiya, jhrozek, lslebodn, mzidek, pbrezina, sbose, tscherf
Target Milestone: rc   
Target Release: 8.0   
Hardware: Unspecified   
OS: Unspecified   
URL: http://faf.lab.eng.brq.redhat.com/faf/reports/bthash/82d23a0dbfb0b014a3581be058e55924a17010b5/
Whiteboard: sync-to-jira
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2019-11-15 18:04:20 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:

Description Madhuri 2019-11-13 07:01:50 UTC
This bug has been created based on an anonymous crash report requested by the package maintainer.

Report URL: http://faf.lab.eng.brq.redhat.com/faf/reports/bthash/82d23a0dbfb0b014a3581be058e55924a17010b5/

time:           Wed 13 Nov 2019 12:34:03 AM EST
package:        sssd-common-2.2.0-19.el8
reason:         sssd_be killed by SIGSEGV
cmdline:        /usr/libexec/sssd/sssd_be --domain LDAP --uid 0 --gid 0 --logger=files
executable:     /usr/libexec/sssd/sssd_be
component:      sssd
uid:            0
hostname:       ci-vm-10-0-153-6.hosted.upshift.rdu2.redhat.com
os_release:     Red Hat Enterprise Linux release 8.1 (Ootpa)
architecture:   x86_64
pwd:            /
kernel:         4.18.0-80.11.2.el8_0.x86_64
abrt_version:   2.10.9
exploitable:
:Likely crash reason: Jump to an invalid address
:Exploitable rating (0-9 scale): 6

Reports:
uReport: BTHASH=82d23a0dbfb0b014a3581be058e55924a17010b5
ABRT Server: URL=http://faf.lab.eng.brq.redhat.com/faf/reports/bthash/82d23a0dbfb0b014a3581be058e55924a17010b5
ABRT Server: URL=http://faf.lab.eng.brq.redhat.com/faf/reports/14354/
CI Job:https://idm-jenkins.rhev-ci-vms.eng.rdu2.redhat.com/job/mupadhye-dev-pipeline/job/upgrade_8.0_to_8.1/14/

Full Backtrace:
[New LWP 26031]
Core was generated by `/usr/libexec/sssd/sssd_be --domain LDAP --uid 0 --gid 0 --logger=files'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  0x00007f14cfe52396 in ?? ()

Thread 1 (LWP 26031):
#0  0x00007f14cfe52396 in ?? ()
No symbol table info available.
#1  0x5895494e77754793 in ?? ()
No symbol table info available.
#2  0x0000000000000000 in ?? ()
No symbol table info available.
No shared libraries loaded at this time.
No symbol table is loaded.  Use the "file" command.
No symbol table is loaded.  Use the "file" command.
rax            0x1                 1
rbx            0x0                 0
rcx            0x0                 0
rdx            0x1                 1
rsi            0x7f14d1989030      139727392510000
rdi            0x0                 0
rbp            0x10                0x10
rsp            0x7ffe52c27db0      0x7ffe52c27db0
r8             0x0                 0
r9             0xffffffffffffffff  -1
r10            0x0                 0
r11            0x10                16
r12            0x55c8df29abf0      94321225870320
r13            0x10                16
r14            0x7ffe52c28990      140730286901648
r15            0x1                 1
rip            0x7f14cfe52396      0x7f14cfe52396
eflags         0x10202             [ IF RF ]
cs             0x33                51
ss             0x2b                43
ds             0x0                 0
es             0x0                 0
fs             0x0                 0
gs             0x0                 0
st0            0                   (raw 0x00000000000000000000)
st1            0                   (raw 0x00000000000000000000)
st2            0                   (raw 0x00000000000000000000)
st3            0                   (raw 0x00000000000000000000)
st4            0                   (raw 0x00000000000000000000)
st5            0                   (raw 0x00000000000000000000)
st6            0                   (raw 0x00000000000000000000)
st7            0                   (raw 0x00000000000000000000)
fctrl          0x37f               895
fstat          0x0                 0
ftag           0xffff              65535
fiseg          0x0                 0
fioff          0x0                 0
foseg          0x0                 0
fooff          0x0                 0
fop            0x0                 0
mxcsr          0x1fa0              [ PE IM DM ZM OM UM PM ]
ymm0           {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x0, 0x0}}
ymm1           {v8_float = {0xffffffff, 0xffffffff, 0xffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x7fffffffffffffff, 0x7fffffffffffffff, 0x0, 0x0}, v32_int8 = {0x6c, 0x79, 0x20, 0x72, 0x65, 0x6d, 0x6f, 0x76, 0x65, 0x64, 0x20, 0x63, 0x6f, 0x6e, 0x6e, 0x65, 0x0 <repeats 16 times>}, v16_int16 = {0x796c, 0x7220, 0x6d65, 0x766f, 0x6465, 0x6320, 0x6e6f, 0x656e, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x7220796c, 0x766f6d65, 0x63206465, 0x656e6e6f, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x766f6d657220796c, 0x656e6e6f63206465, 0x0, 0x0}, v2_int128 = {0x656e6e6f63206465766f6d657220796c, 0x0}}
ymm2           {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0xff, 0xff, 0xff, 0xff, 0xff, 0xff, 0x0 <repeats 16 times>}, v16_int16 = {0x0, 0x0, 0x0, 0x0, 0x0, 0xffff, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x0, 0x0, 0xffff0000, 0xffffffff, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0xffffffffffff0000, 0x0, 0x0}, v2_int128 = {0xffffffffffff00000000000000000000, 0x0}}
ymm3           {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x8000000000000000, 0x0, 0x0}, v32_int8 = {0x0, 0xff <repeats 15 times>, 0x0 <repeats 16 times>}, v16_int16 = {0xff00, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0xffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0xffffff00, 0xffffffff, 0xffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xffffffffffffff00, 0xffffffffffffffff, 0x0, 0x0}, v2_int128 = {0xffffffffffffffffffffffffffffff00, 0x0}}
ymm4           {v8_float = {0xa842c000, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0xa8, 0xf7, 0x8a, 0xd0, 0x14, 0x7f, 0x0, 0x0, 0x98, 0x0 <repeats 23 times>}, v16_int16 = {0xf7a8, 0xd08a, 0x7f14, 0x0, 0x98, 0x0 <repeats 11 times>}, v8_int32 = {0xd08af7a8, 0x7f14, 0x98, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x7f14d08af7a8, 0x98, 0x0, 0x0}, v2_int128 = {0x9800007f14d08af7a8, 0x0}}
ymm5           {v8_float = {0x9b409800, 0x0, 0x6e760000, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0xed, 0x97, 0xac, 0xd0, 0x14, 0x7f, 0x0, 0x0, 0xc5, 0x48, 0xd8, 0xd3, 0x14, 0x7f, 0x0 <repeats 18 times>}, v16_int16 = {0x97ed, 0xd0ac, 0x7f14, 0x0, 0x48c5, 0xd3d8, 0x7f14, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0xd0ac97ed, 0x7f14, 0xd3d848c5, 0x7f14, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x7f14d0ac97ed, 0x7f14d3d848c5, 0x0, 0x0}, v2_int128 = {0x7f14d3d848c500007f14d0ac97ed, 0x0}}
ymm6           {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x64, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x21, 0x0 <repeats 23 times>}, v16_int16 = {0x64, 0x0, 0x0, 0x0, 0x21, 0x0 <repeats 11 times>}, v8_int32 = {0x64, 0x0, 0x21, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x64, 0x21, 0x0, 0x0}, v2_int128 = {0x210000000000000064, 0x0}}
ymm7           {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x0, 0x0}}
ymm8           {v8_float = {0xffffffff, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x7fffffffffffffff, 0x0, 0x0, 0x0}, v32_int8 = {0x63, 0x61, 0x6c, 0x6c, 0x62, 0x61, 0x63, 0x6b, 0x2e, 0xa, 0x0 <repeats 22 times>}, v16_int16 = {0x6163, 0x6c6c, 0x6162, 0x6b63, 0xa2e, 0x0 <repeats 11 times>}, v8_int32 = {0x6c6c6163, 0x6b636162, 0xa2e, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x6b6361626c6c6163, 0xa2e, 0x0, 0x0}, v2_int128 = {0xa2e6b6361626c6c6163, 0x0}}
ymm9           {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0 <repeats 32 times>}, v16_int16 = {0x0 <repeats 16 times>}, v8_int32 = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x0, 0x0, 0x0, 0x0}, v2_int128 = {0x0, 0x0}}
ymm10          {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0x0, 0x0, 0x0, 0x20, 0x20, 0x20, 0x0, 0x20, 0x20, 0x20, 0x0, 0x0, 0x0, 0x0, 0x20, 0x0 <repeats 17 times>}, v16_int16 = {0x0, 0x2000, 0x2020, 0x2000, 0x2020, 0x0, 0x0, 0x20, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x20000000, 0x20002020, 0x2020, 0x200000, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x2000202020000000, 0x20000000002020, 0x0, 0x0}, v2_int128 = {0x200000000020202000202020000000, 0x0}}
ymm11          {v8_float = {0xffffffff, 0xfffffb72, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x8000000000000000, 0x0, 0x0, 0x0}, v32_int8 = {0xf3, 0x7f, 0x63, 0x72, 0xf4, 0xdd, 0x91, 0xc4, 0x49, 0x4, 0xf1, 0x1c, 0x85, 0x85, 0x5, 0x2d, 0x0 <repeats 16 times>}, v16_int16 = {0x7ff3, 0x7263, 0xddf4, 0xc491, 0x449, 0x1cf1, 0x8585, 0x2d05, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x72637ff3, 0xc491ddf4, 0x1cf10449, 0x2d058585, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xc491ddf472637ff3, 0x2d0585851cf10449, 0x0, 0x0}, v2_int128 = {0x2d0585851cf10449c491ddf472637ff3, 0x0}}
ymm12          {v8_float = {0x3, 0x0, 0x0, 0x3, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x163, 0x0, 0x0}, v32_int8 = {0x54, 0x7b, 0x6a, 0x40, 0xf4, 0x69, 0x44, 0xb9, 0x33, 0x10, 0x2c, 0xb5, 0xf2, 0x30, 0x76, 0x40, 0x0 <repeats 16 times>}, v16_int16 = {0x7b54, 0x406a, 0x69f4, 0xb944, 0x1033, 0xb52c, 0x30f2, 0x4076, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x406a7b54, 0xb94469f4, 0xb52c1033, 0x407630f2, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xb94469f4406a7b54, 0x407630f2b52c1033, 0x0, 0x0}, v2_int128 = {0x407630f2b52c1033b94469f4406a7b54, 0x0}}
ymm13          {v8_float = {0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x0, 0x0, 0x0}, v32_int8 = {0xc1, 0xfb, 0x5f, 0x7, 0xd9, 0x8b, 0xdd, 0xb, 0x54, 0x1a, 0x56, 0xa6, 0x94, 0x89, 0x14, 0x6, 0x0 <repeats 16 times>}, v16_int16 = {0xfbc1, 0x75f, 0x8bd9, 0xbdd, 0x1a54, 0xa656, 0x8994, 0x614, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0x75ffbc1, 0xbdd8bd9, 0xa6561a54, 0x6148994, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xbdd8bd9075ffbc1, 0x6148994a6561a54, 0x0, 0x0}, v2_int128 = {0x6148994a6561a540bdd8bd9075ffbc1, 0x0}}
ymm14          {v8_float = {0x0, 0x0, 0x0, 0x1dc, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x0, 0x7fffffffffffffff, 0x0, 0x0}, v32_int8 = {0xc4, 0xa8, 0xcf, 0xbc, 0xda, 0xd7, 0xc6, 0xa9, 0x1a, 0x2b, 0x69, 0xe, 0x3d, 0x61, 0xee, 0x43, 0x0 <repeats 16 times>}, v16_int16 = {0xa8c4, 0xbccf, 0xd7da, 0xa9c6, 0x2b1a, 0xe69, 0x613d, 0x43ee, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0xbccfa8c4, 0xa9c6d7da, 0xe692b1a, 0x43ee613d, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0xa9c6d7dabccfa8c4, 0x43ee613d0e692b1a, 0x0, 0x0}, v2_int128 = {0x43ee613d0e692b1aa9c6d7dabccfa8c4, 0x0}}
ymm15          {v8_float = {0x0, 0xffffffff, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v4_double = {0x7fffffffffffffff, 0x0, 0x0, 0x0}, v32_int8 = {0xb9, 0xc0, 0x41, 0xe9, 0x78, 0xe8, 0x36, 0x66, 0xd3, 0x3e, 0x1d, 0x14, 0x75, 0xe8, 0xaf, 0x94, 0x0 <repeats 16 times>}, v16_int16 = {0xc0b9, 0xe941, 0xe878, 0x6636, 0x3ed3, 0x141d, 0xe875, 0x94af, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0, 0x0}, v8_int32 = {0xe941c0b9, 0x6636e878, 0x141d3ed3, 0x94afe875, 0x0, 0x0, 0x0, 0x0}, v4_int64 = {0x6636e878e941c0b9, 0x94afe875141d3ed3, 0x0, 0x0}, v2_int128 = {0x94afe875141d3ed36636e878e941c0b9, 0x0}}
No function contains program counter for selected frame.


Additional information:
limits:
:Limit                     Soft Limit           Hard Limit           Units     
:Max cpu time              unlimited            unlimited            seconds   
:Max file size             unlimited            unlimited            bytes     
:Max data size             unlimited            unlimited            bytes     
:Max stack size            8388608              unlimited            bytes     
:Max core file size        unlimited            unlimited            bytes     
:Max resident set          unlimited            unlimited            bytes     
:Max processes             15015                15015                processes
:Max open files            1024                 4096                 files     
:Max locked memory         16777216             16777216             bytes     
:Max address space         unlimited            unlimited            bytes     
:Max file locks            unlimited            unlimited            locks     
:Max pending signals       15015                15015                signals   
:Max msgqueue size         819200               819200               bytes     
:Max nice priority         0                    0                   
:Max realtime priority     0                    0                   
:Max realtime timeout      unlimited            unlimited            us       
environ:
:LANG=en_US.UTF-8
:PATH=/usr/local/sbin:/usr/local/bin:/usr/sbin:/usr/bin
:NOTIFY_SOCKET=/run/systemd/notify
:INVOCATION_ID=b89f1f19968b4e8b9d5342f7c29fde0a
:JOURNAL_STREAM=9:74261
:DEBUG_LOGGER=--logger=files
:_SSS_LOOPS=NO
:KRB5RCACHEDIR=/var/cache/krb5rcache

Comment 1 Sumit Bose 2019-11-13 07:11:25 UTC
Hi,

can you run the CI test again with debuginfo packages installed?

bye,
Sumit

Comment 10 Alexey Tikhonov 2019-11-15 18:04:20 UTC
Backtrace:

```
#0  0x00007fb4541a1396 in pthread_rwlock_wrlock () from /lib64/libpthread.so.0
#1  0x00007fb455d1544d in CRYPTO_THREAD_write_lock () from /lib64/libcrypto.so.1.1
#2  0x00007fb455cd8979 in RAND_get_rand_method () from /lib64/libcrypto.so.1.1
#3  0x00007fb455cd8c74 in RAND_bytes () from /lib64/libcrypto.so.1.1
...
#13 0x00007fb444a8537a in ldap_send_unbind () from /lib64/libldap-2.4.so.2
#14 0x00007fb444a8df73 in ldap_free_connection () from /lib64/libldap-2.4.so.2
#15 0x00007fb444a84ee7 in ldap_ld_free () from /lib64/libldap-2.4.so.2
...
#30 0x00007fb454bfba58 in _talloc_free () from /lib64/libtalloc.so.2
#31 0x00007fb454c05120 in talloc_lib_atexit () from /lib64/libtalloc.so.2
#32 0x00007fb4546180cc in __run_exit_handlers () from /lib64/libc.so.6
#33 0x00007fb454618200 in exit () from /lib64/libc.so.6
#34 0x00007fb4580b1b15 in orderly_shutdown (status=0) at src/util/server.c:261
#35 0x00007fb454e14d46 in tevent_common_invoke_signal_handler () from /lib64/libtevent.so.0
#36 0x00007fb454e14f58 in tevent_common_check_signal () from /lib64/libtevent.so.0
...
#42 0x00007fb4580b2a07 in server_loop (main_ctx=0x55d7f7fcff80) at src/util/server.c:724
#43 0x000055d7f60b638b in main (argc=8, argv=<optimized out>) at src/providers/data_provider_be.c:699
```

I close this as a duplicate of bz 1672584

*** This bug has been marked as a duplicate of bug 1672584 ***