Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.

Bug 1615639

Summary: SIGABRT in Rsyslog
Product: Red Hat Enterprise Linux 7 Reporter: bugzilla
Component: rsyslogAssignee: Jiří Vymazal <jvymazal>
Status: CLOSED CURRENTRELEASE QA Contact: BaseOS QE Security Team <qe-baseos-security>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 7.5CC: bugzilla, dapospis, dkopecek, jvymazal, rmeggins
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2018-11-05 09:58:08 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
abrt email report 1
none
abrt email report 2
none
abrt email report 3
none
abrt email report 4
none
abrt email report 5
none
abrt email report 6
none
This one is a SEGV instead of an ABRT none

Description bugzilla 2018-08-13 23:33:09 UTC
Created attachment 1475678 [details]
abrt email report 1

Description of problem:

SIGABRT happens but we're not sure how to reproduce the error.


Version-Release number of selected component (if applicable):
package:        rsyslog-8.24.0-16.el7_5.4
kernel:         3.10.0-862.9.1.el7.x86_64

How reproducible:

Intermittent.


Steps to Reproduce:
1. unknown.
2.
3.

Actual results:

SIGABRT


Expected results:

No SIGABRT

Additional info:
See attached.

Comment 1 bugzilla 2018-08-13 23:33:46 UTC
Created attachment 1475679 [details]
abrt email report 2

Comment 2 bugzilla 2018-08-13 23:34:06 UTC
Created attachment 1475680 [details]
abrt email report 3

Comment 3 bugzilla 2018-08-13 23:34:21 UTC
Created attachment 1475681 [details]
abrt email report 4

Comment 4 bugzilla 2018-08-13 23:34:34 UTC
Created attachment 1475682 [details]
abrt email report 5

Comment 5 bugzilla 2018-08-13 23:34:48 UTC
Created attachment 1475683 [details]
abrt email report 6

Comment 6 bugzilla 2018-08-13 23:36:48 UTC
The 6 attachments are each an [abrt] log with the subject:
   [abrt] rsyslog: rsyslogd killed by SIGABRT

From what I have seen, they are similar, but maybe you will find a trend.  It appears to trigger on realloc() but this machine has plenty of available memory:

  [root@host ~] >> free -m
                total        used        free      shared  buff/cache   available
  Mem:          31905        3832        7186        1015       20887       26472
  Swap:          8095        1423        6672

Comment 8 Rich Megginson 2018-08-14 01:35:27 UTC
Can you attach your rsyslog configuration?  You appear to be using omfwd at least as well as other modules, so I'm assuming you have customized the default configuration.

Comment 9 bugzilla 2018-08-14 17:08:32 UTC
$WorkDirectory /var/lib/rsyslog  # default location for work (spool) files
$ActionQueueType LinkedList   # use asynchronous processing
$ActionQueueFileName srvrfwd  # set file name, also enables disk mode
$ActionResumeRetryCount -1    # infinite retries on insert failure
$ActionQueueSaveOnShutdown on # save in-memory data if rsyslog shuts down

$DefaultNetstreamDriverCAFile /usr/local/ewheelerinc/secmon-ca.crt

$DefaultNetstreamDriver gtls # use gtls netstream driver
$ActionSendStreamDriverMode 1 # require TLS for the connection
$ActionSendStreamDriverAuthMode x509/name

*.* @@(o)loghost.example.com:10516

Comment 10 bugzilla 2018-08-14 17:09:57 UTC
Created attachment 1475916 [details]
This one is a SEGV instead of an ABRT

Comment 11 bugzilla 2018-08-14 17:11:53 UTC
We have a bit more information on what might be happening:

An outbound firewall was enabled that prevented rsyslog from providing remote logging, so /var/lib/rsyslog where we put the spool files had lots of files in it. We have emptied that directory to see if perhaps there was a corrupt file causing a segfault. If that was the case, then it would still be good to fix the code in a way such that it fails gracefully. Hopefully the SEGV stacktrace is useful.

Comment 12 Jiří Vymazal 2018-08-15 07:37:10 UTC
(In reply to bugzilla from comment #11)
> We have a bit more information on what might be happening:
> 
> An outbound firewall was enabled that prevented rsyslog from providing
> remote logging, so /var/lib/rsyslog where we put the spool files had lots of
> files in it. We have emptied that directory to see if perhaps there was a
> corrupt file causing a segfault. If that was the case, then it would still
> be good to fix the code in a way such that it fails gracefully. Hopefully
> the SEGV stacktrace is useful.

So the removal of the files helped?

Comment 13 bugzilla 2018-10-07 22:20:34 UTC
Correct, we haven't had any issues since deleting the files.

You might be able to reproduce the problem by creating a TLS remote log as above and then iptables -I OUTPUT -j DROP (or maybe -j REJECT).  

Then pipe noise into |logger -t and see if you can get segfaults.  

At this point I don't think I have any other information that I can provide since the problem hasn't come up again.