Bug 1667387 - [abrt] unbound: memmove(): unbound killed by SIGABRT
Summary: [abrt] unbound: memmove(): unbound killed by SIGABRT
Keywords:
Status: CLOSED EOL
Alias: None
Product: Fedora
Classification: Fedora
Component: unbound
Version: 29
Hardware: x86_64
OS: Unspecified
unspecified
high
Target Milestone: ---
Assignee: Petr Menšík
QA Contact: Fedora Extras Quality Assurance
URL: https://retrace.fedoraproject.org/faf...
Whiteboard: abrt_hash:2ae78448666ab44e6885a17b887...
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2019-01-18 10:16 UTC by Petr Menšík
Modified: 2019-11-27 23:18 UTC (History)
4 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2019-11-27 23:18:18 UTC
Type: ---
Embargoed:


Attachments (Terms of Use)
File: backtrace (61.86 KB, text/plain)
2019-01-18 10:16 UTC, Petr Menšík
no flags Details
File: cgroup (349 bytes, text/plain)
2019-01-18 10:16 UTC, Petr Menšík
no flags Details
File: core_backtrace (29.43 KB, text/plain)
2019-01-18 10:16 UTC, Petr Menšík
no flags Details
File: cpuinfo (1.49 KB, text/plain)
2019-01-18 10:16 UTC, Petr Menšík
no flags Details
File: dso_list (997 bytes, text/plain)
2019-01-18 10:17 UTC, Petr Menšík
no flags Details
File: environ (206 bytes, text/plain)
2019-01-18 10:17 UTC, Petr Menšík
no flags Details
File: limits (1.29 KB, text/plain)
2019-01-18 10:17 UTC, Petr Menšík
no flags Details
File: maps (7.53 KB, text/plain)
2019-01-18 10:17 UTC, Petr Menšík
no flags Details
File: mountinfo (3.94 KB, text/plain)
2019-01-18 10:17 UTC, Petr Menšík
no flags Details
File: open_fds (3.10 KB, text/plain)
2019-01-18 10:17 UTC, Petr Menšík
no flags Details
File: proc_pid_status (1.29 KB, text/plain)
2019-01-18 10:17 UTC, Petr Menšík
no flags Details
File: var_log_messages (330 bytes, text/plain)
2019-01-18 10:17 UTC, Petr Menšík
no flags Details


Links
System ID Private Priority Status Summary Last Updated
Github NLnetLabs unbound issues 24 0 None open Occasional abort related to dnssec-trigger 2020-04-14 16:28:16 UTC

Internal Links: 1898067

Description Petr Menšík 2019-01-18 10:16:52 UTC
Description of problem:
I think this is related to laptop gone to sleep or wake up from sleep. Might be also related to undocking my Lenovo Thinkpad T460s from dock a short while before it. It was running with dnssec-triggerd started, which crashed as well.

Anyway, my short check shows sockaddr_storage used in memmove is probably corrupted as well as socklen size reported to function. It uses ss_family = 161, where PF_MAX is about 47.

Uploaded also core dump, happened on Fedora 29.

Might be related to bug #1658493

Version-Release number of selected component:
unbound-1.8.3-2.fc29

Additional info:
reporter:       libreport-2.9.7
backtrace_rating: 4
cmdline:        /usr/sbin/unbound -d
crash_function: memmove
executable:     /usr/sbin/unbound
journald_cursor: s=702d6ada189046309b2c1a3d1d495587;i=230d0;b=729b4f0301654690bc3b6ce943a0a9d6;m=2a5b6b6020;t=57fa96cd0fe6b;x=596e2d8b1443b2bf
kernel:         4.19.14-300.fc29.x86_64
rootdir:        /
runlevel:       N 5
type:           CCpp
uid:            993

Comment 1 Petr Menšík 2019-01-18 10:16:55 UTC
Created attachment 1521451 [details]
File: backtrace

Comment 2 Petr Menšík 2019-01-18 10:16:56 UTC
Created attachment 1521452 [details]
File: cgroup

Comment 3 Petr Menšík 2019-01-18 10:16:58 UTC
Created attachment 1521453 [details]
File: core_backtrace

Comment 4 Petr Menšík 2019-01-18 10:16:59 UTC
Created attachment 1521454 [details]
File: cpuinfo

Comment 5 Petr Menšík 2019-01-18 10:17:00 UTC
Created attachment 1521455 [details]
File: dso_list

Comment 6 Petr Menšík 2019-01-18 10:17:01 UTC
Created attachment 1521456 [details]
File: environ

Comment 7 Petr Menšík 2019-01-18 10:17:02 UTC
Created attachment 1521457 [details]
File: limits

Comment 8 Petr Menšík 2019-01-18 10:17:03 UTC
Created attachment 1521458 [details]
File: maps

Comment 9 Petr Menšík 2019-01-18 10:17:04 UTC
Created attachment 1521459 [details]
File: mountinfo

Comment 10 Petr Menšík 2019-01-18 10:17:05 UTC
Created attachment 1521460 [details]
File: open_fds

Comment 11 Petr Menšík 2019-01-18 10:17:06 UTC
Created attachment 1521461 [details]
File: proc_pid_status

Comment 12 Petr Menšík 2019-01-18 10:17:07 UTC
Created attachment 1521462 [details]
File: var_log_messages

Comment 13 Petr Menšík 2019-01-18 10:21:21 UTC
dnssec-trigger crashed along with it, reported in bug #1667388

I expect this crash was reason of dnssec-trigger crash, but not sure.

Comment 14 Petr Menšík 2019-01-18 10:38:35 UTC
It is interesting in frame 7.

in gdb:
(gdb) frame 7
(gdb) p *xfr->task_probe->scan_addr
$3 = {
  next = 0x564bab476d88, 
  addr = {
    ss_family = 161, 
    __ss_padding = "\000\000\000\000\000\000PM\361\247\276\177\000\000p\032m\253KV\000\000\200\000\000\000\000\000\000\000\340\340\021\252KV\000\000\240}\300\252KV\000\000\377\377\377\377", '\000' <repeats 12 times>, "\377\377\377\377\000\000\000\000@\350ΪKV", '\000' <repeats 34 times>, "\001\000\001\000\000\000\000", 
    __ss_align = 181922
  }, 
  addrlen = 163505
}
(gdb) p *xfr->task_probe->scan_addr->next
$4 = {
  next = 0x21, 
  addr = {
    ss_family = 27840, 
    __ss_padding = "G\253KV\000\000\002\000\000\000\000\000\000\000 nG\253KV\000\000q\000\000\000\000\000\000\000\000\243\002\000\000\000\000\000\001", '\000' <repeats 15 times>, "\n\000\000\000\000\000\000\000\350mG\253KV\000\000\370mG\253KV\000\000\360mG\253KV\000\000\022\000\000\000\000\000\000\000\000nG\253KV\000\000\000\243\002\000\000\000\000\000\000\020 \001\005\000\000\240", 
    __ss_align = 0
  }, 
  addrlen = 256
}
(gdb) p *xfr->task_probe->scan_target
$7 = {
  next = 0x564baaccce50, 
  host = 0x564baabd6a00 "k.root-servers.net", 
  file = 0x0, 
  http = 0, 
  ixfr = 1, 
  allow_notify = 0, 
  ssl = 0, 
  port = 0, 
  list = 0x0
}


the same address is used also in frame 107, where it starts looping.

Comment 15 Dominik 'Rathann' Mierzejewski 2019-02-21 08:40:52 UTC
Same here, but it happened about half an hour after I woke the machine from suspend in a different location. Stack trace is similar:
(gdb) where
#0  0x00007f8f19bb053f in raise () from /lib64/libc.so.6
#1  0x00007f8f19b9a895 in abort () from /lib64/libc.so.6
#2  0x00007f8f19bf3927 in __libc_message () from /lib64/libc.so.6
#3  0x00007f8f19c870f5 in __fortify_fail_abort () from /lib64/libc.so.6
#4  0x00007f8f19c87127 in __fortify_fail () from /lib64/libc.so.6
#5  0x00007f8f19c850e6 in __chk_fail () from /lib64/libc.so.6
#6  0x00005583269dca0d in memmove (__len=<optimized out>, __src=<optimized out>, __dest=0x7fffad5ea930)
    at /usr/include/bits/string_fortified.h:40
#7  xfr_probe_send_probe (xfr=xfr@entry=0x5583287edea0, env=env@entry=0x5583288151c8, timeout=timeout@entry=100)
    at services/authzone.c:5793
#8  0x00005583269dd760 in xfr_probe_send_or_end (xfr=xfr@entry=0x5583287edea0, env=env@entry=0x5583288151c8)
    at services/authzone.c:6074
#9  0x00005583269ddf6d in xfr_probe_send_or_end (env=0x5583288151c8, xfr=0x5583287edea0) at services/authzone.c:6147
#10 auth_xfer_probe_lookup_callback (arg=0x5583287edea0, rcode=<optimized out>, buf=0x0, sec=<optimized out>, 
    why_bogus=<optimized out>, was_ratelimited=<optimized out>) at services/authzone.c:6147
#11 0x000055832699b70e in mesh_state_cleanup (mstate=0x558328d644c0) at services/mesh.c:744
#12 0x000055832699d0d3 in mesh_state_delete (qstate=<optimized out>) at services/mesh.c:795
#13 mesh_state_delete (qstate=<optimized out>) at services/mesh.c:761
#14 0x000055832699d219 in mesh_delete_helper (n=<optimized out>) at services/mesh.c:293
#15 mesh_delete_all (mesh=0x558328e60860) at services/mesh.c:293
#16 0x0000558326973ce6 in do_flush_requestlist (worker=0x558328813d10, ssl=0x7fffad5eb260) at daemon/remote.c:2947
#17 execute_cmd (rc=rc@entry=0x5583286efa40, ssl=ssl@entry=0x7fffad5eb260, 
    cmd=cmd@entry=0x7fffad5eae20 " flush_requestlist", worker=0x558328813d10) at daemon/remote.c:2947
#18 0x0000558326974b6f in handle_req (rc=rc@entry=0x5583286efa40, res=res@entry=0x7fffad5eb260, s=<optimized out>)
    at daemon/remote.c:3095
#19 0x0000558326974c72 in remote_control_callback (c=0x5583287e0b40, arg=arg@entry=0x558328eb9e20, err=err@entry=0, 
    rep=rep@entry=0x0) at daemon/remote.c:3177
#20 0x0000558326974f45 in remote_accept_callback (err=0, rep=<optimized out>, arg=0x5583286efa40, c=<optimized out>)
    at daemon/remote.c:521
#21 remote_accept_callback (c=<optimized out>, arg=0x5583286efa40, err=<optimized out>, rep=<optimized out>)
    at daemon/remote.c:443
#22 0x00007f8f1a3d6031 in event_process_active_single_queue () from /lib64/libevent-2.1.so.6
#23 0x00007f8f1a3d67c7 in event_base_loop () from /lib64/libevent-2.1.so.6
#24 0x0000558326a14530 in comm_base_dispatch (b=<optimized out>) at util/netevent.c:244
#25 0x00005583269796ed in worker_work (worker=<optimized out>) at daemon/worker.c:1884
#26 0x000055832696d26b in daemon_fork (daemon=0x5583286bb260) at daemon/daemon.c:666
#27 0x0000558326968c6f in run_daemon (need_pidfile=1, log_default_identity=0x7fffad5ecdf3 "unbound", debug_mode=1, 
    cmdline_verbose=0, cfgfile=0x558326a2fe1f "/etc/unbound/unbound.conf") at daemon/unbound.c:652
#28 main (argc=<optimized out>, argv=<optimized out>) at daemon/unbound.c:749
(gdb) frame 7
#7  xfr_probe_send_probe (xfr=xfr@entry=0x5583287edea0, env=env@entry=0x5583288151c8, timeout=timeout@entry=100)
    at services/authzone.c:5793
5793			memmove(&addr, &xfr->task_probe->scan_addr->addr, addrlen);
(gdb) p *xfr->task_probe->scan_addr
$1 = {next = 0x558328f599b0, addr = {ss_family = 161, 
    __ss_padding = "\000\000\000\000\000\000\360\\\361(\203U\000\000 \022~(\203U\000\000\200\000\000\000\000\000\000\000\340@\241&\203U\000\000`\205\353(\203U\000\000\377\377\377\377", '\000' <repeats 12 times>, "\377\377\377\377\000\000\000\000\360\364\200(\203U", '\000' <repeats 34 times>, "\001\000\000\000\000\000\000", __ss_align = 56728}, 
  addrlen = 151524}
(gdb) p *xfr->task_probe->scan_addr->next
$2 = {next = 0x0, addr = {ss_family = 177, 
    __ss_padding = "\000\000\000\000\000\000`\215\323\031\217\177\000\000pT\365(\203U\000\000\200\000\000\000\000\000\000\000\340@\241&\203U\000\000p\261\355(\203U\000\000\377\377\377\377", '\000' <repeats 12 times>, "\377\377\377\377\000\000\000\000\360\364\200(\203U", '\000' <repeats 34 times>, "\001\000\000\000\000\000\000", __ss_align = 56727}, 
  addrlen = 862559}
(gdb) p *xfr->task_probe->scan_target
$3 = {next = 0x5583287ee120, host = 0x5583287ee100 "k.root-servers.net", file = 0x0, http = 0, ixfr = 1, 
  allow_notify = 0, ssl = 0, port = 0, list = 0x0}
(gdb)

Comment 16 Dominik 'Rathann' Mierzejewski 2019-03-03 21:16:46 UTC
Similar problem has been detected:

Suspended, then resumed in a different (network) location.

reporter:       libreport-2.10.0
backtrace_rating: 4
cmdline:        /usr/sbin/unbound -d
crash_function: memmove
executable:     /usr/sbin/unbound
journald_cursor: s=a8e2948215424abcbc021965933530f3;i=1d7be6;b=c13512a8f34c4b79871677de00e10da6;m=d4d1f9ade;t=5826320eaaf3a;x=26a15c2f95baeb51
kernel:         4.20.8-200.fc29.x86_64
package:        unbound-1.8.3-2.fc29
reason:         unbound killed by SIGABRT
rootdir:        /
runlevel:       N 5
type:           CCpp
uid:            997

Comment 17 Dominik 'Rathann' Mierzejewski 2019-03-03 21:58:02 UTC
Similar problem has been detected:

Suspended and resumed in a different (network) location.

reporter:       libreport-2.10.0
backtrace_rating: 4
cmdline:        /usr/sbin/unbound -d
crash_function: memmove
executable:     /usr/sbin/unbound
journald_cursor: s=a8e2948215424abcbc021965933530f3;i=1b754b;b=892b529a86ff435e83cbb81b71ace6fd;m=605480f1a7;t=57f72d4671f5a;x=79a1d8084ee695d3
kernel:         4.19.13-300.fc29.x86_64
package:        unbound-1.8.3-2.fc29
reason:         unbound killed by SIGABRT
rootdir:        /
runlevel:       N 5
type:           CCpp
uid:            997

Comment 18 Petr Menšík 2019-04-29 12:21:00 UTC
Upstream responded to github issue! Testing builds at my copr repo[1] from my fork [2]

1. https://copr.fedorainfracloud.org/coprs/pemensik/unbound/
2. https://src.fedoraproject.org/fork/pemensik/rpms/unbound/tree/master

Comment 19 Petr Menšík 2019-05-06 08:56:09 UTC
Ok, it seems those patches does not resolve this issue. Happened with unbound-1.9.1-2.fc29.x86_64, which should contain proposed fix:

bt
#0  0x00007f736e06e57f in raise () from /lib64/libc.so.6
#1  0x00007f736e058895 in abort () from /lib64/libc.so.6
#2  0x00007f736e0b19c7 in __libc_message () from /lib64/libc.so.6
#3  0x00007f736e145125 in __fortify_fail_abort () from /lib64/libc.so.6
#4  0x00007f736e145157 in __fortify_fail () from /lib64/libc.so.6
#5  0x00007f736e143116 in __chk_fail () from /lib64/libc.so.6
#6  0x000055813f1e691d in memmove (__len=<optimized out>, __src=<optimized out>, __dest=0x7fffc5790700)
    at /usr/include/bits/string_fortified.h:40
#7  xfr_probe_send_probe (xfr=xfr@entry=0x558140e961d0, env=env@entry=0x558140ebe378, timeout=timeout@entry=100)
    at services/authzone.c:5930
#8  0x000055813f1e72f0 in xfr_probe_send_or_end (xfr=xfr@entry=0x558140e961d0, env=env@entry=0x558140ebe378)
    at services/authzone.c:6257
#9  0x000055813f1e7ab6 in xfr_probe_send_or_end (env=0x558140ebe378, xfr=0x558140e961d0) at services/authzone.c:6357
#10 auth_xfer_probe_lookup_callback (arg=0x558140e961d0, rcode=<optimized out>, buf=0x5581414887d0, sec=<optimized out>, 
    why_bogus=<optimized out>, was_ratelimited=<optimized out>) at services/authzone.c:6357
#11 0x000055813f1a584e in mesh_do_callback (r=0x5581413dbfd8, rep=0x0, rcode=<optimized out>, m=0x5581413dbd70)
    at services/mesh.c:1010
#12 mesh_query_done (mstate=mstate@entry=0x5581413dbd70) at services/mesh.c:1217
#13 0x000055813f1a6d9c in mesh_continue (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x5581413dbd70, 
    s=<optimized out>, ev=ev@entry=0x7fffc579115c) at services/mesh.c:1462
#14 0x000055813f1a6fae in mesh_run (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x5581413dbd70, ev=<optimized out>, 
    ev@entry=module_event_new, e=e@entry=0x0) at services/mesh.c:1506
#15 0x000055813f1a784f in mesh_new_callback (mesh=0x558141477f90, qinfo=qinfo@entry=0x7fffc5791240, 
    qflags=qflags@entry=256, edns=edns@entry=0x7fffc5791220, buf=buf@entry=0x5581414887d0, qid=qid@entry=0, 
    cb=0x55813f1e79e0 <auth_xfer_probe_lookup_callback>, cb_arg=0x558140e961d0) at services/mesh.c:541
#16 0x000055813f1e70b0 in xfr_probe_lookup_host (env=0x558140ebe378, env=0x558140ebe378, xfr=0x558140e961d0)
    at services/authzone.c:6200
#17 xfr_probe_send_or_end (xfr=xfr@entry=0x558140e961d0, env=env@entry=0x558140ebe378) at services/authzone.c:6216
#18 0x000055813f1e7ab6 in xfr_probe_send_or_end (env=0x558140ebe378, xfr=0x558140e961d0) at services/authzone.c:6357
#19 auth_xfer_probe_lookup_callback (arg=0x558140e961d0, rcode=<optimized out>, buf=0x5581414887d0, sec=<optimized out>, 
    why_bogus=<optimized out>, was_ratelimited=<optimized out>) at services/authzone.c:6357
#20 0x000055813f1a584e in mesh_do_callback (r=0x5581414240f8, rep=0x0, rcode=<optimized out>, m=0x558141423e90)
    at services/mesh.c:1010
#21 mesh_query_done (mstate=mstate@entry=0x558141423e90) at services/mesh.c:1217
#22 0x000055813f1a6d9c in mesh_continue (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x558141423e90, 
    s=<optimized out>, ev=ev@entry=0x7fffc579197c) at services/mesh.c:1462
#23 0x000055813f1a6fae in mesh_run (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x558141423e90, ev=<optimized out>, 
    ev@entry=module_event_new, e=e@entry=0x0) at services/mesh.c:1506
#24 0x000055813f1a784f in mesh_new_callback (mesh=0x558141477f90, qinfo=qinfo@entry=0x7fffc5791a60, 
    qflags=qflags@entry=256, edns=edns@entry=0x7fffc5791a40, buf=buf@entry=0x5581414887d0, qid=qid@entry=0, 
    cb=0x55813f1e79e0 <auth_xfer_probe_lookup_callback>, cb_arg=0x558140e961d0) at services/mesh.c:541
#25 0x000055813f1e70b0 in xfr_probe_lookup_host (env=0x558140ebe378, env=0x558140ebe378, xfr=0x558140e961d0)
    at services/authzone.c:6200
#26 xfr_probe_send_or_end (xfr=xfr@entry=0x558140e961d0, env=env@entry=0x558140ebe378) at services/authzone.c:6216
#27 0x000055813f1e7ab6 in xfr_probe_send_or_end (env=0x558140ebe378, xfr=0x558140e961d0) at services/authzone.c:6357
#28 auth_xfer_probe_lookup_callback (arg=0x558140e961d0, rcode=<optimized out>, buf=0x5581414887d0, sec=<optimized out>, 
    why_bogus=<optimized out>, was_ratelimited=<optimized out>) at services/authzone.c:6357
#29 0x000055813f1a584e in mesh_do_callback (r=0x558141363df8, rep=0x0, rcode=<optimized out>, m=0x558141363b90)
    at services/mesh.c:1010
#30 mesh_query_done (mstate=mstate@entry=0x558141363b90) at services/mesh.c:1217
#31 0x000055813f1a6d9c in mesh_continue (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x558141363b90, 
    s=<optimized out>, ev=ev@entry=0x7fffc579219c) at services/mesh.c:1462
#32 0x000055813f1a6fae in mesh_run (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x558141363b90, ev=<optimized out>, 
    ev@entry=module_event_new, e=e@entry=0x0) at services/mesh.c:1506
#33 0x000055813f1a784f in mesh_new_callback (mesh=0x558141477f90, qinfo=qinfo@entry=0x7fffc5792280, 
    qflags=qflags@entry=256, edns=edns@entry=0x7fffc5792260, buf=buf@entry=0x5581414887d0, qid=qid@entry=0, 
    cb=0x55813f1e79e0 <auth_xfer_probe_lookup_callback>, cb_arg=0x558140e961d0) at services/mesh.c:541
#34 0x000055813f1e70b0 in xfr_probe_lookup_host (env=0x558140ebe378, env=0x558140ebe378, xfr=0x558140e961d0)
    at services/authzone.c:6200
#35 xfr_probe_send_or_end (xfr=xfr@entry=0x558140e961d0, env=env@entry=0x558140ebe378) at services/authzone.c:6216
#36 0x000055813f1e7ab6 in xfr_probe_send_or_end (env=0x558140ebe378, xfr=0x558140e961d0) at services/authzone.c:6357
#37 auth_xfer_probe_lookup_callback (arg=0x558140e961d0, rcode=<optimized out>, buf=0x5581414887d0, sec=<optimized out>, 
    why_bogus=<optimized out>, was_ratelimited=<optimized out>) at services/authzone.c:6357
#38 0x000055813f1a584e in mesh_do_callback (r=0x5581413f8048, rep=0x0, rcode=<optimized out>, m=0x5581413f7de0)
    at services/mesh.c:1010
#39 mesh_query_done (mstate=mstate@entry=0x5581413f7de0) at services/mesh.c:1217
#40 0x000055813f1a6d9c in mesh_continue (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x5581413f7de0, 
    s=<optimized out>, ev=ev@entry=0x7fffc57929bc) at services/mesh.c:1462
#41 0x000055813f1a6fae in mesh_run (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x5581413f7de0, ev=<optimized out>, 
    ev@entry=module_event_new, e=e@entry=0x0) at services/mesh.c:1506
#42 0x000055813f1a784f in mesh_new_callback (mesh=0x558141477f90, qinfo=qinfo@entry=0x7fffc5792aa0, 
    qflags=qflags@entry=256, edns=edns@entry=0x7fffc5792a80, buf=buf@entry=0x5581414887d0, qid=qid@entry=0, 
    cb=0x55813f1e79e0 <auth_xfer_probe_lookup_callback>, cb_arg=0x558140e961d0) at services/mesh.c:541
#43 0x000055813f1e70b0 in xfr_probe_lookup_host (env=0x558140ebe378, env=0x558140ebe378, xfr=0x558140e961d0)
    at services/authzone.c:6200
#44 xfr_probe_send_or_end (xfr=xfr@entry=0x558140e961d0, env=env@entry=0x558140ebe378) at services/authzone.c:6216
#45 0x000055813f1e7ab6 in xfr_probe_send_or_end (env=0x558140ebe378, xfr=0x558140e961d0) at services/authzone.c:6357
#46 auth_xfer_probe_lookup_callback (arg=0x558140e961d0, rcode=<optimized out>, buf=0x5581414887d0, sec=<optimized out>, 
    why_bogus=<optimized out>, was_ratelimited=<optimized out>) at services/authzone.c:6357
#47 0x000055813f1a584e in mesh_do_callback (r=0x558141428108, rep=0x0, rcode=<optimized out>, m=0x558141427ea0)
    at services/mesh.c:1010
#48 mesh_query_done (mstate=mstate@entry=0x558141427ea0) at services/mesh.c:1217
#49 0x000055813f1a6d9c in mesh_continue (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x558141427ea0, 
    s=<optimized out>, ev=ev@entry=0x7fffc57931dc) at services/mesh.c:1462
#50 0x000055813f1a6fae in mesh_run (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x558141427ea0, ev=<optimized out>, 
    ev@entry=module_event_new, e=e@entry=0x0) at services/mesh.c:1506
#51 0x000055813f1a784f in mesh_new_callback (mesh=0x558141477f90, qinfo=qinfo@entry=0x7fffc57932c0, 
    qflags=qflags@entry=256, edns=edns@entry=0x7fffc57932a0, buf=buf@entry=0x5581414887d0, qid=qid@entry=0, 
    cb=0x55813f1e79e0 <auth_xfer_probe_lookup_callback>, cb_arg=0x558140e961d0) at services/mesh.c:541
#52 0x000055813f1e70b0 in xfr_probe_lookup_host (env=0x558140ebe378, env=0x558140ebe378, xfr=0x558140e961d0)
    at services/authzone.c:6200
#53 xfr_probe_send_or_end (xfr=xfr@entry=0x558140e961d0, env=env@entry=0x558140ebe378) at services/authzone.c:6216
#54 0x000055813f1e7ab6 in xfr_probe_send_or_end (env=0x558140ebe378, xfr=0x558140e961d0) at services/authzone.c:6357
#55 auth_xfer_probe_lookup_callback (arg=0x558140e961d0, rcode=<optimized out>, buf=0x5581414887d0, sec=<optimized out>, 
    why_bogus=<optimized out>, was_ratelimited=<optimized out>) at services/authzone.c:6357
#56 0x000055813f1a584e in mesh_do_callback (r=0x558141448188, rep=0x0, rcode=<optimized out>, m=0x558141447f20)
    at services/mesh.c:1010
#57 mesh_query_done (mstate=mstate@entry=0x558141447f20) at services/mesh.c:1217
#58 0x000055813f1a6d9c in mesh_continue (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x558141447f20, 
    s=<optimized out>, ev=ev@entry=0x7fffc57939fc) at services/mesh.c:1462
#59 0x000055813f1a6fae in mesh_run (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x558141447f20, ev=<optimized out>, 
    ev@entry=module_event_new, e=e@entry=0x0) at services/mesh.c:1506
#60 0x000055813f1a784f in mesh_new_callback (mesh=0x558141477f90, qinfo=qinfo@entry=0x7fffc5793ae0, 
    qflags=qflags@entry=256, edns=edns@entry=0x7fffc5793ac0, buf=buf@entry=0x5581414887d0, qid=qid@entry=0, 
    cb=0x55813f1e79e0 <auth_xfer_probe_lookup_callback>, cb_arg=0x558140e961d0) at services/mesh.c:541
#61 0x000055813f1e70b0 in xfr_probe_lookup_host (env=0x558140ebe378, env=0x558140ebe378, xfr=0x558140e961d0)
    at services/authzone.c:6200
#62 xfr_probe_send_or_end (xfr=xfr@entry=0x558140e961d0, env=env@entry=0x558140ebe378) at services/authzone.c:6216
#63 0x000055813f1e7ab6 in xfr_probe_send_or_end (env=0x558140ebe378, xfr=0x558140e961d0) at services/authzone.c:6357
#64 auth_xfer_probe_lookup_callback (arg=0x558140e961d0, rcode=<optimized out>, buf=0x5581414887d0, sec=<optimized out>, 
    why_bogus=<optimized out>, was_ratelimited=<optimized out>) at services/authzone.c:6357
#65 0x000055813f1a584e in mesh_do_callback (r=0x5581413cbf98, rep=0x0, rcode=<optimized out>, m=0x5581413cbd30)
    at services/mesh.c:1010
#66 mesh_query_done (mstate=mstate@entry=0x5581413cbd30) at services/mesh.c:1217
#67 0x000055813f1a6d9c in mesh_continue (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x5581413cbd30, 
    s=<optimized out>, ev=ev@entry=0x7fffc579421c) at services/mesh.c:1462
#68 0x000055813f1a6fae in mesh_run (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x5581413cbd30, ev=<optimized out>, 
    ev@entry=module_event_new, e=e@entry=0x0) at services/mesh.c:1506
#69 0x000055813f1a784f in mesh_new_callback (mesh=0x558141477f90, qinfo=qinfo@entry=0x7fffc5794300, 
    qflags=qflags@entry=256, edns=edns@entry=0x7fffc57942e0, buf=buf@entry=0x5581414887d0, qid=qid@entry=0, 
    cb=0x55813f1e79e0 <auth_xfer_probe_lookup_callback>, cb_arg=0x558140e961d0) at services/mesh.c:541
#70 0x000055813f1e70b0 in xfr_probe_lookup_host (env=0x558140ebe378, env=0x558140ebe378, xfr=0x558140e961d0)
    at services/authzone.c:6200
#71 xfr_probe_send_or_end (xfr=xfr@entry=0x558140e961d0, env=env@entry=0x558140ebe378) at services/authzone.c:6216
#72 0x000055813f1e7ab6 in xfr_probe_send_or_end (env=0x558140ebe378, xfr=0x558140e961d0) at services/authzone.c:6357
#73 auth_xfer_probe_lookup_callback (arg=0x558140e961d0, rcode=<optimized out>, buf=0x5581414887d0, sec=<optimized out>, 
    why_bogus=<optimized out>, was_ratelimited=<optimized out>) at services/authzone.c:6357
#74 0x000055813f1a584e in mesh_do_callback (r=0x558141408088, rep=0x0, rcode=<optimized out>, m=0x558141407e20)
    at services/mesh.c:1010
#75 mesh_query_done (mstate=mstate@entry=0x558141407e20) at services/mesh.c:1217
#76 0x000055813f1a6d9c in mesh_continue (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x558141407e20, 
    s=<optimized out>, ev=ev@entry=0x7fffc5794a3c) at services/mesh.c:1462
#77 0x000055813f1a6fae in mesh_run (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x558141407e20, ev=<optimized out>, 
    ev@entry=module_event_new, e=e@entry=0x0) at services/mesh.c:1506
#78 0x000055813f1a784f in mesh_new_callback (mesh=0x558141477f90, qinfo=qinfo@entry=0x7fffc5794b20, 
    qflags=qflags@entry=256, edns=edns@entry=0x7fffc5794b00, buf=buf@entry=0x5581414887d0, qid=qid@entry=0, 
    cb=0x55813f1e79e0 <auth_xfer_probe_lookup_callback>, cb_arg=0x558140e961d0) at services/mesh.c:541
#79 0x000055813f1e70b0 in xfr_probe_lookup_host (env=0x558140ebe378, env=0x558140ebe378, xfr=0x558140e961d0)
    at services/authzone.c:6200
#80 xfr_probe_send_or_end (xfr=xfr@entry=0x558140e961d0, env=env@entry=0x558140ebe378) at services/authzone.c:6216
#81 0x000055813f1e7ab6 in xfr_probe_send_or_end (env=0x558140ebe378, xfr=0x558140e961d0) at services/authzone.c:6357
#82 auth_xfer_probe_lookup_callback (arg=0x558140e961d0, rcode=<optimized out>, buf=0x5581414887d0, sec=<optimized out>, 
    why_bogus=<optimized out>, was_ratelimited=<optimized out>) at services/authzone.c:6357
#83 0x000055813f1a584e in mesh_do_callback (r=0x558141383e78, rep=0x0, rcode=<optimized out>, m=0x558141383c10)
    at services/mesh.c:1010
#84 mesh_query_done (mstate=mstate@entry=0x558141383c10) at services/mesh.c:1217
#85 0x000055813f1a6d9c in mesh_continue (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x558141383c10, 
    s=<optimized out>, ev=ev@entry=0x7fffc579525c) at services/mesh.c:1462
#86 0x000055813f1a6fae in mesh_run (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x558141383c10, ev=<optimized out>, 
    ev@entry=module_event_new, e=e@entry=0x0) at services/mesh.c:1506
#87 0x000055813f1a784f in mesh_new_callback (mesh=0x558141477f90, qinfo=qinfo@entry=0x7fffc5795340, 
    qflags=qflags@entry=256, edns=edns@entry=0x7fffc5795320, buf=buf@entry=0x5581414887d0, qid=qid@entry=0, 
    cb=0x55813f1e79e0 <auth_xfer_probe_lookup_callback>, cb_arg=0x558140e961d0) at services/mesh.c:541
#88 0x000055813f1e70b0 in xfr_probe_lookup_host (env=0x558140ebe378, env=0x558140ebe378, xfr=0x558140e961d0)
    at services/authzone.c:6200
#89 xfr_probe_send_or_end (xfr=xfr@entry=0x558140e961d0, env=env@entry=0x558140ebe378) at services/authzone.c:6216
#90 0x000055813f1e7ab6 in xfr_probe_send_or_end (env=0x558140ebe378, xfr=0x558140e961d0) at services/authzone.c:6357
#91 auth_xfer_probe_lookup_callback (arg=0x558140e961d0, rcode=<optimized out>, buf=0x5581414887d0, sec=<optimized out>, 
    why_bogus=<optimized out>, was_ratelimited=<optimized out>) at services/authzone.c:6357
#92 0x000055813f1a584e in mesh_do_callback (r=0x5581413f0028, rep=0x0, rcode=<optimized out>, m=0x5581413efdc0)
    at services/mesh.c:1010
#93 mesh_query_done (mstate=mstate@entry=0x5581413efdc0) at services/mesh.c:1217
#94 0x000055813f1a6d9c in mesh_continue (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x5581413efdc0, 
    s=<optimized out>, ev=ev@entry=0x7fffc5795a7c) at services/mesh.c:1462
#95 0x000055813f1a6fae in mesh_run (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x5581413efdc0, ev=<optimized out>, 
    ev@entry=module_event_new, e=e@entry=0x0) at services/mesh.c:1506
#96 0x000055813f1a784f in mesh_new_callback (mesh=0x558141477f90, qinfo=qinfo@entry=0x7fffc5795b60, 
    qflags=qflags@entry=256, edns=edns@entry=0x7fffc5795b40, buf=buf@entry=0x5581414887d0, qid=qid@entry=0, 
    cb=0x55813f1e79e0 <auth_xfer_probe_lookup_callback>, cb_arg=0x558140e961d0) at services/mesh.c:541
#97 0x000055813f1e70b0 in xfr_probe_lookup_host (env=0x558140ebe378, env=0x558140ebe378, xfr=0x558140e961d0)
    at services/authzone.c:6200
#98 xfr_probe_send_or_end (xfr=xfr@entry=0x558140e961d0, env=env@entry=0x558140ebe378) at services/authzone.c:6216
#99 0x000055813f1e7ab6 in xfr_probe_send_or_end (env=0x558140ebe378, xfr=0x558140e961d0) at services/authzone.c:6357
#100 auth_xfer_probe_lookup_callback (arg=0x558140e961d0, rcode=<optimized out>, buf=0x5581414887d0, sec=<optimized out>, 
    why_bogus=<optimized out>, was_ratelimited=<optimized out>) at services/authzone.c:6357
#101 0x000055813f1a584e in mesh_do_callback (r=0x55814137be58, rep=0x0, rcode=<optimized out>, m=0x55814137bbf0)
    at services/mesh.c:1010
#102 mesh_query_done (mstate=mstate@entry=0x55814137bbf0) at services/mesh.c:1217
#103 0x000055813f1a6d9c in mesh_continue (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x55814137bbf0, 
    s=<optimized out>, ev=ev@entry=0x7fffc579629c) at services/mesh.c:1462
#104 0x000055813f1a6fae in mesh_run (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x55814137bbf0, 
    ev=<optimized out>, ev@entry=module_event_new, e=e@entry=0x0) at services/mesh.c:1506
#105 0x000055813f1a784f in mesh_new_callback (mesh=0x558141477f90, qinfo=qinfo@entry=0x7fffc5796380, 
    qflags=qflags@entry=256, edns=edns@entry=0x7fffc5796360, buf=buf@entry=0x5581414887d0, qid=qid@entry=0, 
    cb=0x55813f1e79e0 <auth_xfer_probe_lookup_callback>, cb_arg=0x558140e961d0) at services/mesh.c:541
#106 0x000055813f1e70b0 in xfr_probe_lookup_host (env=0x558140ebe378, env=0x558140ebe378, xfr=0x558140e961d0)
    at services/authzone.c:6200
#107 xfr_probe_send_or_end (xfr=xfr@entry=0x558140e961d0, env=env@entry=0x558140ebe378) at services/authzone.c:6216
#108 0x000055813f1e7ab6 in xfr_probe_send_or_end (env=0x558140ebe378, xfr=0x558140e961d0) at services/authzone.c:6357
#109 auth_xfer_probe_lookup_callback (arg=0x558140e961d0, rcode=<optimized out>, buf=0x5581414887d0, sec=<optimized out>, 
    why_bogus=<optimized out>, was_ratelimited=<optimized out>) at services/authzone.c:6357
#110 0x000055813f1a584e in mesh_do_callback (r=0x5581413a7f08, rep=0x0, rcode=<optimized out>, m=0x5581413a7ca0)
    at services/mesh.c:1010
#111 mesh_query_done (mstate=mstate@entry=0x5581413a7ca0) at services/mesh.c:1217
#112 0x000055813f1a6d9c in mesh_continue (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x5581413a7ca0, 
    s=<optimized out>, ev=ev@entry=0x7fffc5796abc) at services/mesh.c:1462
#113 0x000055813f1a6fae in mesh_run (mesh=mesh@entry=0x558141477f90, mstate=mstate@entry=0x5581413a7ca0, 
    ev=<optimized out>, ev@entry=module_event_new, e=e@entry=0x0) at services/mesh.c:1506
#114 0x000055813f1a784f in mesh_new_callback (mesh=0x558141477f90, qinfo=qinfo@entry=0x7fffc5796ba0, 
    qflags=qflags@entry=256, edns=edns@entry=0x7fffc5796b80, buf=buf@entry=0x5581414887d0, qid=qid@entry=0, 
    cb=0x55813f1e79e0 <auth_xfer_probe_lookup_callback>, cb_arg=0x558140e961d0) at services/mesh.c:541
#115 0x000055813f1e70b0 in xfr_probe_lookup_host (env=0x558140ebe378, env=0x558140ebe378, xfr=0x558140e961d0)
    at services/authzone.c:6200
#116 xfr_probe_send_or_end (xfr=xfr@entry=0x558140e961d0, env=env@entry=0x558140ebe378) at services/authzone.c:6216
#117 0x000055813f1ec30b in xfr_probe_send_or_end (env=0x558140ebe378, xfr=0x558140e961d0) at services/authzone.c:6454
#118 xfr_start_probe (xfr=xfr@entry=0x558140e961d0, env=env@entry=0x558140ebe378, spec=spec@entry=0x0)
    at services/authzone.c:6454
#119 0x000055813f1ed06d in auth_xfer_timer (arg=0x558140e961d0) at services/authzone.c:6398
#120 0x00007f736e89bdc5 in event_process_active_single_queue () from /lib64/libevent-2.1.so.6
#121 0x00007f736e89c7c7 in event_base_loop () from /lib64/libevent-2.1.so.6
#122 0x000055813f21f5c0 in comm_base_dispatch (b=<optimized out>) at util/netevent.c:246
#123 0x000055813f1829bd in worker_work (worker=<optimized out>) at daemon/worker.c:1893
#124 0x000055813f17646b in daemon_fork (daemon=0x558140d66260) at daemon/daemon.c:666
#125 0x000055813f171daf in run_daemon (need_pidfile=1, log_default_identity=0x7fffc5798f0a "unbound", debug_mode=1, 
    cmdline_verbose=0, cfgfile=0x55813f23ae47 "/etc/unbound/unbound.conf") at daemon/unbound.c:670
#126 main (argc=<optimized out>, argv=<optimized out>) at daemon/unbound.c:767


Messages in unbound log:
May 06 10:24:05 menpad unbound[4229]: [4229:0] warning: did not exit gracefully last time (15201)
May 06 10:24:05 menpad unbound[4229]: [4229:0] notice: init module 0: ipsecmod
May 06 10:24:05 menpad unbound[4229]: [4229:0] notice: init module 1: validator
May 06 10:24:05 menpad unbound[4229]: [4229:0] notice: init module 2: iterator
May 06 10:24:05 menpad unbound[4229]: [4229:0] info: start of service (unbound 1.9.1).
May 06 10:24:06 menpad unbound[4229]: [4229:0] error: .: failed lookup, cannot probe to master k.root-servers.net
May 06 10:24:06 menpad unbound[4229]: [4229:0] error: .: failed lookup, cannot probe to master g.root-servers.net
May 06 10:24:06 menpad unbound[4229]: [4229:0] error: .: failed lookup, cannot probe to master f.root-servers.net
May 06 10:24:06 menpad unbound[4229]: [4229:0] error: .: failed lookup, cannot probe to master e.root-servers.net
May 06 10:24:06 menpad unbound[4229]: [4229:0] error: .: failed lookup, cannot probe to master c.root-servers.net
May 06 10:24:06 menpad unbound[4229]: [4229:0] error: .: failed lookup, cannot probe to master b.root-servers.net
May 06 10:24:09 menpad unbound[4229]: [4229:1] info: generate keytag query _ta-4f66. NULL IN
May 06 10:24:09 menpad unbound[4229]: [4229:0] info: generate keytag query _ta-4f66. NULL IN
...skipping...
Apr 29 14:36:35 menpad unbound[15201]: [15201:0] error: .: failed lookup, cannot probe to master g.root-servers.net
Apr 29 14:36:35 menpad unbound[15201]: [15201:0] error: .: failed lookup, cannot probe to master f.root-servers.net
Apr 29 14:36:35 menpad unbound[15201]: [15201:0] error: .: failed lookup, cannot probe to master e.root-servers.net
Apr 29 14:36:35 menpad unbound[15201]: [15201:0] error: .: failed lookup, cannot probe to master c.root-servers.net
Apr 29 14:36:35 menpad unbound[15201]: [15201:0] error: .: failed lookup, cannot probe to master b.root-servers.net
Apr 29 14:36:38 menpad unbound[15201]: [15201:0] info: generate keytag query _ta-4f66. NULL IN
Apr 30 02:34:08 menpad unbound[15201]: [15201:0] info: generate keytag query _ta-4f66. NULL IN
May 02 10:24:08 menpad unbound[15201]: [15201:2] info: generate keytag query _ta-4f66. NULL IN
May 02 19:42:30 menpad unbound[15201]: [15201:0] info: generate keytag query _ta-4f66. NULL IN
May 03 10:38:46 menpad unbound[15201]: [15201:0] info: generate keytag query _ta-4f66. NULL IN
May 03 10:38:53 menpad unbound[15201]: [15201:0] info: generate keytag query _ta-4f66. NULL IN
May 03 10:41:10 menpad unbound[15201]: [15201:2] error: tcp send r: Connection reset by peer for 127.0.0.1 port 33992
May 03 10:41:10 menpad unbound[15201]: [15201:3] error: tcp send r: Connection reset by peer for 127.0.0.1 port 33994
May 03 10:41:10 menpad unbound[15201]: [15201:1] error: tcp send r: Connection reset by peer for 127.0.0.1 port 33996
May 03 11:50:01 menpad unbound[15201]: [15201:2] info: generate keytag query _ta-4f66. NULL IN
May 03 18:19:34 menpad unbound[15201]: [15201:3] info: generate keytag query _ta-4f66. NULL IN
May 04 14:10:50 menpad unbound[15201]: [15201:2] info: generate keytag query _ta-4f66. NULL IN
May 04 14:11:06 menpad unbound[15201]: [15201:0] error: tcp send r: Connection reset by peer for 127.0.0.1 port 48176
May 04 14:11:06 menpad unbound[15201]: [15201:3] error: tcp send r: Connection reset by peer for 127.0.0.1 port 48182
May 04 14:11:27 menpad unbound[15201]: [15201:1] error: tcp send r: Connection reset by peer for 127.0.0.1 port 48218
May 04 14:11:31 menpad unbound[15201]: [15201:0] info: generate keytag query _ta-4f66. NULL IN
May 04 14:11:57 menpad unbound[15201]: [15201:0] error: tcp send r: Connection reset by peer for 127.0.0.1 port 48504
May 04 14:11:57 menpad unbound[15201]: [15201:3] error: tcp send r: Connection reset by peer for 127.0.0.1 port 48508
May 04 14:12:37 menpad unbound[15201]: [15201:1] info: validation failure menpad. A IN
May 04 14:17:00 menpad unbound[15201]: [15201:3] info: generate keytag query _ta-4f66. NULL IN
May 04 14:18:56 menpad unbound[15201]: [15201:0] info: validation failure menpad. A IN
May 04 14:26:29 menpad unbound[15201]: [15201:0] notice: sendto failed: Address family not supported by protocol
May 04 14:26:29 menpad unbound[15201]: [15201:0] notice: remote address is (inet_ntop error) port 26433
May 04 14:26:29 menpad unbound[15201]: *** buffer overflow detected ***: /usr/sbin/unbound terminated
May 04 14:26:30 menpad systemd[1]: unbound.service: Main process exited, code=dumped, status=6/ABRT
May 04 14:26:30 menpad systemd[1]: unbound.service: Failed with result 'core-dump'.
May 04 14:26:30 menpad systemd[1]: unbound.service: Consumed 56.663s CPU time


Log in dnssec-triggerd:
May 04 14:24:27 menpad dnssec-triggerd[15209]: ok
May 04 14:27:07 menpad dnssec-triggerd[15209]: [15209] notice: addr lookup fedoraproject.org at 192.168.0.1 successful
May 04 14:27:07 menpad dnssec-triggerd[15209]: [15209] notice: addr lookup fedoraproject.org at 192.168.0.1 failed: nodata a>
May 04 14:27:07 menpad dnssec-triggerd[15209]: [15209] notice: http probe6 http://fedoraproject.org/static/hotspot.txt done:>
May 04 14:27:07 menpad dnssec-triggerd[15209]: [15209] notice: http_get_done: http://fedoraproject.org/static/hotspot.txt fr>
May 04 14:27:07 menpad dnssec-triggerd[15209]: [15209] notice: http probe4 http://fedoraproject.org/static/hotspot.txt done:>
May 04 14:27:07 menpad dnssec-triggerd[15209]: [15209] notice: http_general done could not parse chunk header
May 04 14:27:07 menpad dnssec-triggerd[15209]: [15209] info: http 192.168.0.1: error could not parse chunk header
May 04 14:27:07 menpad dnssec-triggerd[15209]: [15209] info: addrlookup 192.168.0.1: error nodata answer
May 04 14:27:07 menpad dnssec-triggerd[15209]: [15209] info: cache 192.168.0.1: error no EDNS
May 04 14:27:07 menpad dnssec-triggerd[15209]: [15209] notice: probe done: http fails
May 04 14:27:07 menpad dnssec-triggerd[15209]: [1556972827] unbound-control[22429:0] error: connect: Connection refused for >
May 04 14:27:07 menpad dnssec-triggerd[15209]: [15209] warning: unbound-control exited with status 256, cmd: unbound-control>
May 04 14:27:07 menpad python3[22430]: detected unhandled Python exception in '/usr/libexec/dnssec-trigger-script'
May 04 14:27:08 menpad dnssec-triggerd[15209]: Traceback (most recent call last):
May 04 14:27:08 menpad dnssec-triggerd[15209]:   File "/usr/libexec/dnssec-trigger-script", line 748, in <module>
May 04 14:27:08 menpad dnssec-triggerd[15209]:     main()
May 04 14:27:08 menpad dnssec-triggerd[15209]:   File "/usr/libexec/dnssec-trigger-script", line 735, in main
May 04 14:27:08 menpad dnssec-triggerd[15209]:     Application(sys.argv).run()
May 04 14:27:08 menpad dnssec-triggerd[15209]:   File "/usr/libexec/dnssec-trigger-script", line 470, in run
May 04 14:27:08 menpad dnssec-triggerd[15209]:     self.method()
May 04 14:27:08 menpad dnssec-triggerd[15209]:   File "/usr/libexec/dnssec-trigger-script", line 554, in run_setup
May 04 14:27:08 menpad dnssec-triggerd[15209]:     self._unbound_set_negative_cache_ttl(UNBOUND_MAX_NEG_CACHE_TTL)
May 04 14:27:08 menpad dnssec-triggerd[15209]:   File "/usr/libexec/dnssec-trigger-script", line 639, in _unbound_set_negati>
May 04 14:27:08 menpad dnssec-triggerd[15209]:     subprocess.check_call(CMD, stdout=DEVNULL, stderr=DEVNULL)
May 04 14:27:08 menpad dnssec-triggerd[15209]:   File "/usr/lib64/python3.7/subprocess.py", line 347, in check_call
May 04 14:27:08 menpad dnssec-triggerd[15209]:     raise CalledProcessError(retcode, cmd)
May 04 14:27:08 menpad dnssec-triggerd[15209]: subprocess.CalledProcessError: Command '['unbound-control', 'set_option', 'ca>
May 06 10:19:42 menpad dnssec-triggerd[15209]: [15209] notice: addr lookup fedoraproject.org at 192.168.0.1 failed: timeout
May 06 10:19:42 menpad dnssec-triggerd[15209]: [15209] notice: http probe6 http://fedoraproject.org/static/hotspot.txt done:>
May 06 10:19:42 menpad dnssec-triggerd[15209]: [15209] notice: addr lookup fedoraproject.org at 192.168.0.1 failed: timeout
May 06 10:19:42 menpad dnssec-triggerd[15209]: [15209] notice: http probe4 http://fedoraproject.org/static/hotspot.txt done:>
May 06 10:19:42 menpad dnssec-triggerd[15209]: [15209] notice: http_general done cannot resolve domain name
May 06 10:19:42 menpad dnssec-triggerd[15209]: [15209] info: addrlookup 192.168.0.1: error timeout
May 06 10:19:42 menpad dnssec-triggerd[15209]: [15209] info: addrlookup 192.168.0.1: error timeout
May 06 10:19:42 menpad dnssec-triggerd[15209]: [15209] info: cache 192.168.0.1: error timeout
May 06 10:19:42 menpad dnssec-triggerd[15209]: [15209] notice: probe done: http fails
May 06 10:19:42 menpad dnssec-triggerd[15209]: [1557130782] unbound-control[27448:0] error: connect: Connection refused for >
May 06 10:19:42 menpad dnssec-triggerd[15209]: [15209] warning: unbound-control exited with status 256, cmd: unbound-control>
May 06 10:19:42 menpad python3[27456]: detected unhandled Python exception in '/usr/libexec/dnssec-trigger-script'
May 06 10:19:42 menpad dnssec-triggerd[15209]: Traceback (most recent call last):
May 06 10:19:42 menpad dnssec-triggerd[15209]:   File "/usr/libexec/dnssec-trigger-script", line 748, in <module>
May 06 10:19:42 menpad dnssec-triggerd[15209]:     main()
May 06 10:19:42 menpad dnssec-triggerd[15209]:   File "/usr/libexec/dnssec-trigger-script", line 735, in main
May 06 10:19:42 menpad dnssec-triggerd[15209]:     Application(sys.argv).run()
May 06 10:19:42 menpad dnssec-triggerd[15209]:   File "/usr/libexec/dnssec-trigger-script", line 470, in run
May 06 10:19:42 menpad dnssec-triggerd[15209]:     self.method()
May 06 10:19:42 menpad dnssec-triggerd[15209]:   File "/usr/libexec/dnssec-trigger-script", line 554, in run_setup
May 06 10:19:42 menpad dnssec-triggerd[15209]:     self._unbound_set_negative_cache_ttl(UNBOUND_MAX_NEG_CACHE_TTL)
May 06 10:19:42 menpad dnssec-triggerd[15209]:   File "/usr/libexec/dnssec-trigger-script", line 639, in _unbound_set_negati>
May 06 10:19:42 menpad dnssec-triggerd[15209]:     subprocess.check_call(CMD, stdout=DEVNULL, stderr=DEVNULL)
May 06 10:19:42 menpad dnssec-triggerd[15209]:   File "/usr/lib64/python3.7/subprocess.py", line 347, in check_call
May 06 10:19:42 menpad dnssec-triggerd[15209]:     raise CalledProcessError(retcode, cmd)
May 06 10:19:42 menpad dnssec-triggerd[15209]: subprocess.CalledProcessError: Command '['unbound-control', 'set_option', 'ca>
May 06 10:24:05 menpad systemd[1]: Stopping Reconfigure local DNSSEC resolver on connectivity changes...
-- Subject: Unit dnssec-triggerd.service has begun shutting down

I was configuring some devices not connected to the Internet on May 04, just wireless router sometime disconnected from uplink.

Comment 20 Dominik 'Rathann' Mierzejewski 2019-07-22 21:14:48 UTC
Similar problem has been detected:

This happens occassionally when switching between wired and wireless connection.

reporter:       libreport-2.10.1
backtrace_rating: 4
cmdline:        /usr/sbin/unbound -d
crash_function: memmove
executable:     /usr/sbin/unbound
journald_cursor: s=7ad32d6ef5e948e1ad0536d002c9ce34;i=691;b=8c29c7b68999421d8507d06d51d05187;m=26b1600;t=58e3245ccf2c2;x=cd34df871cfd27e0
kernel:         5.1.17-200.fc29.x86_64
package:        unbound-1.8.3-2.fc29
reason:         unbound killed by SIGABRT
rootdir:        /
runlevel:       N 5
type:           CCpp
uid:            997

Comment 21 Dominik 'Rathann' Mierzejewski 2019-07-22 21:19:21 UTC
Similar problem has been detected:

This happens occassionally when switching between wired and wireless connection.

reporter:       libreport-2.10.1
backtrace_rating: 4
cmdline:        /usr/sbin/unbound -d
crash_function: memmove
executable:     /usr/sbin/unbound
journald_cursor: s=1c6bf9950ab44ff68c76f41ce30d7a44;i=24737b;b=9fdb7a1e05c34bc0b01d7a63817f4646;m=9a9ca8c63;t=58cf4bccd3180;x=d80cca2accbf5dfe
kernel:         5.1.15-200.fc29.x86_64
package:        unbound-1.8.3-2.fc29
reason:         unbound killed by SIGABRT
rootdir:        /
runlevel:       N 5
type:           CCpp
uid:            997

Comment 22 Paul Wouters 2019-08-27 14:32:43 UTC
upstream told me:

The 1.9.3 contains a fix:
        - Fix for #24: Fix abort due to scan of auth zone masters using old
          address from previous scan.

And I think that may be the fix.  Also there may be other related fixes,
so just upgrading may be a good idea and fix the issue.


I'm marking this as resolved for the 1.9.3 build, please re-open when you still see this issue.

Comment 23 Dominik 'Rathann' Mierzejewski 2019-08-27 14:45:42 UTC
I don't see a 1.9.3 or in fact any 1.9.x builds in koji. The latest is still 1.8.3.

Comment 24 Paul Wouters 2019-08-27 14:48:01 UTC
I'm doing some testing still. It will appear shortly

Comment 25 Ben Cotton 2019-10-31 18:54:37 UTC
This message is a reminder that Fedora 29 is nearing its end of life.
Fedora will stop maintaining and issuing updates for Fedora 29 on 2019-11-26.
It is Fedora's policy to close all bug reports from releases that are no longer
maintained. At that time this bug will be closed as EOL if it remains open with a
Fedora 'version' of '29'.

Package Maintainer: If you wish for this bug to remain open because you
plan to fix it in a currently maintained version, simply change the 'version' 
to a later Fedora version.

Thank you for reporting this issue and we are sorry that we were not 
able to fix it before Fedora 29 is end of life. If you would still like 
to see this bug fixed and are able to reproduce it against a later version 
of Fedora, you are encouraged  change the 'version' to a later Fedora 
version prior this bug is closed as described in the policy above.

Although we aim to fix as many bugs as possible during every release's 
lifetime, sometimes those efforts are overtaken by events. Often a 
more recent Fedora release includes newer upstream software that fixes 
bugs or makes them obsolete.

Comment 26 Ben Cotton 2019-11-27 23:18:18 UTC
Fedora 29 changed to end-of-life (EOL) status on 2019-11-26. Fedora 29 is
no longer maintained, which means that it will not receive any further
security or bug fix updates. As a result we are closing this bug.

If you can reproduce this bug against a currently maintained version of
Fedora please feel free to reopen this bug against that version. If you
are unable to reopen this bug, please file a new report against the
current release. If you experience problems, please add a comment to this
bug.

Thank you for reporting this bug and we are sorry it could not be fixed.


Note You need to log in before you can comment on or make changes to this bug.