RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 1125956 - evolution killed by SIGSEGV
Summary: evolution killed by SIGSEGV
Keywords:
Status: CLOSED DUPLICATE of bug 1125965
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: p11-kit
Version: 7.0
Hardware: x86_64
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Stef Walter
QA Contact: BaseOS QE Security Team
URL:
Whiteboard: abrt_hash:ecbced2f2d19eb5a4aa657f58f0...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2014-08-01 12:51 UTC by David Jaša
Modified: 2014-08-07 07:28 UTC (History)
2 users (show)

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Clone Of:
Environment:
Last Closed: 2014-08-07 07:28:05 UTC
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)
File: backtrace (39.31 KB, text/plain)
2014-08-01 12:51 UTC, David Jaša
no flags Details
File: cgroup (172 bytes, text/plain)
2014-08-01 12:51 UTC, David Jaša
no flags Details
File: core_backtrace (8.57 KB, text/plain)
2014-08-01 12:51 UTC, David Jaša
no flags Details
File: dso_list (26.22 KB, text/plain)
2014-08-01 12:51 UTC, David Jaša
no flags Details
File: environ (1.53 KB, text/plain)
2014-08-01 12:51 UTC, David Jaša
no flags Details
File: limits (1.29 KB, text/plain)
2014-08-01 12:51 UTC, David Jaša
no flags Details
File: maps (120.01 KB, text/plain)
2014-08-01 12:51 UTC, David Jaša
no flags Details
File: open_fds (1.18 KB, text/plain)
2014-08-01 12:51 UTC, David Jaša
no flags Details
File: proc_pid_status (1.09 KB, text/plain)
2014-08-01 12:51 UTC, David Jaša
no flags Details
File: var_log_messages (1.13 KB, text/plain)
2014-08-01 12:51 UTC, David Jaša
no flags Details
File: binary (32.98 KB, application/octet-stream)
2014-08-01 12:51 UTC, David Jaša
no flags Details
File: sosreport.tar.xz (6.95 MB, application/octet-stream)
2014-08-01 12:52 UTC, David Jaša
no flags Details

Description David Jaša 2014-08-01 12:51:32 UTC
Description of problem:
evolution crashed on startup

Version-Release number of selected component:
evolution-3.8.5-22.el7_0.1.1

Additional info:
reporter:       libreport-2.1.11
backtrace_rating: 4
cmdline:        evolution
executable:     /usr/bin/evolution
kernel:         3.10.0-123.4.4.el7.x86_64
runlevel:       N 5
type:           CCpp
uid:            16189

Truncated backtrace:
Thread no. 1 (10 frames)
 #0 ??
 #1 finalize_module_unlocked_reentrant at modules.c:666
 #2 _p11_kit_finalize_registered_unlocked_reentrant at modules.c:815
 #3 proxy_C_Finalize at proxy.c:216
 #4 SECMOD_UnloadModule at pk11load.c:555
 #5 SECMOD_SlotDestroyModule at pk11util.c:871
 #6 PK11_DestroySlot at pk11slot.c:441
 #7 PK11_FreeSlot at pk11slot.c:454
 #8 SECMOD_DestroyModule at pk11util.c:842
 #9 SECMOD_DestroyModuleListElement at pk11util.c:888

Comment 1 David Jaša 2014-08-01 12:51:34 UTC
Created attachment 923289 [details]
File: backtrace

Comment 2 David Jaša 2014-08-01 12:51:35 UTC
Created attachment 923290 [details]
File: cgroup

Comment 3 David Jaša 2014-08-01 12:51:36 UTC
Created attachment 923291 [details]
File: core_backtrace

Comment 4 David Jaša 2014-08-01 12:51:38 UTC
Created attachment 923292 [details]
File: dso_list

Comment 5 David Jaša 2014-08-01 12:51:39 UTC
Created attachment 923293 [details]
File: environ

Comment 6 David Jaša 2014-08-01 12:51:40 UTC
Created attachment 923294 [details]
File: limits

Comment 7 David Jaša 2014-08-01 12:51:42 UTC
Created attachment 923295 [details]
File: maps

Comment 8 David Jaša 2014-08-01 12:51:43 UTC
Created attachment 923296 [details]
File: open_fds

Comment 9 David Jaša 2014-08-01 12:51:45 UTC
Created attachment 923297 [details]
File: proc_pid_status

Comment 10 David Jaša 2014-08-01 12:51:46 UTC
Created attachment 923298 [details]
File: var_log_messages

Comment 11 David Jaša 2014-08-01 12:51:48 UTC
Created attachment 923299 [details]
File: binary

Comment 12 David Jaša 2014-08-01 12:52:19 UTC
Created attachment 923300 [details]
File: sosreport.tar.xz

Comment 13 David Jaša 2014-08-01 13:03:42 UTC
The bug actually seems to be in p11-kit. My p11-kit configuration is altered by addition of opencryptoki module in hope of seeing thinkpad TPM module through it:

# cat /etc/pkcs11/modules/opencryptoki.module 
module: /usr/lib64/opencryptoki/libopencryptoki.so
critical: no
You have new mail in /var/spool/mail/root
[root@cihla ~]# rpm -qa '*opencryptoki*'
opencryptoki-tpmtok-3.0-11.el7.x86_64
opencryptoki-libs-3.0-11.el7.x86_64
opencryptoki-3.0-11.el7.x86_64

(this didn't materialize, instead of it, I hit this bug).
This is what nss database and p11-kit modules looked like:



bash-4.2$ modutil -dbdir /etc/pki/nssdb -list

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal PKCS #11 Module
	 slots: 2 slots attached
	status: loaded

	 slot: NSS Internal Cryptographic Services
	token: NSS Generic Crypto Services

	 slot: NSS User Private Key and Certificate Services
	token: NSS Certificate DB
-----------------------------------------------------------
bash-4.2$ modutil -dbdir sql:/etc/pki/nssdb -list
p11-kit: failed to initialize module: opencryptoki: The operation failed

Listing of PKCS #11 Modules
-----------------------------------------------------------
  1. NSS Internal Crypto Services
	 slots: 3 slots attached
	status: loaded

	 slot: NSS Internal Cryptographic Services
	token: NSS Generic Crypto Services

	 slot: NSS User Private Key and Certificate Services
	token: NSS Certificate DB

	 slot: NSS Application Slot 00000004
	token: NSS system database

  2. CoolKey PKCS #11 Module
	library name: /usr/lib64/pkcs11/libcoolkeypk11.so
	 slots: There are no slots attached to this module
	status: loaded

  3. p11-kit
	library name: /usr/lib64/p11-kit-proxy.so
	 slots: 6 slots attached
	status: loaded

	 slot: /etc/pki/ca-trust/source
	token: System Trust

	 slot: /usr/share/pki/ca-trust-source
	token: Default Trust

	 slot: SSH Keys
	token: SSH Keys

	 slot: Secret Store
	token: Secret Store

	 slot: Gnome2 Key Storage
	token: Gnome2 Key Storage

	 slot: User Key Storage
	token: User Key Storage
-----------------------------------------------------------
bash-4.2$ p11-kit list-modules
p11-kit: failed to initialize module: opencryptoki: The operation failed
p11-kit-trust: /usr/lib64/pkcs11/p11-kit-trust.so
    library-description: PKCS#11 Kit Trust Module
    library-manufacturer: PKCS#11 Kit
    library-version: 0.18
    token: System Trust
        manufacturer: PKCS#11 Kit
        model: p11-kit-trust
        serial-number: 1
        hardware-version: 0.18
        flags:
               write-protected
               token-initialized
    token: Default Trust
        manufacturer: PKCS#11 Kit
        model: p11-kit-trust
        serial-number: 1
        hardware-version: 0.18
        flags:
               write-protected
               token-initialized
gnome-keyring: /usr/lib64/pkcs11/gnome-keyring-pkcs11.so
    library-description: GNOME Keyring Daemon Core
    library-manufacturer: GNOME Keyring
    library-version: 1.1
    token: SSH Keys
        manufacturer: Gnome Keyring
        model: 1.0
        serial-number: 1:SSH:HOME
        flags:
               write-protected
               user-pin-initialized
               protected-authentication-path
               token-initialized
    token: Secret Store
        manufacturer: Gnome Keyring
        model: 1.0
        serial-number: 1:SECRET:MAIN
        flags:
               login-required
               user-pin-initialized
               protected-authentication-path
               token-initialized
    token: Gnome2 Key Storage
        manufacturer: Gnome Keyring
        model: 1.0
        serial-number: 1:USER:DEFAULT
        flags:
               login-required
               user-pin-initialized
               protected-authentication-path
               token-initialized
    token: User Key Storage
        manufacturer: Gnome Keyring
        model: 1.0
        serial-number: 1:XDG:DEFAULT
        flags:
               protected-authentication-path
               token-initialized
Segmentation fault (core dumped)

Comment 14 David Jaša 2014-08-01 13:17:58 UTC
> Segmentation fault (core dumped)

bug 1125965

Comment 16 Stef Walter 2014-08-07 07:28:05 UTC

*** This bug has been marked as a duplicate of bug 1125965 ***


Note You need to log in before you can comment on or make changes to this bug.