Your message dated Thu, 07 Feb 2019 06:49:47 +0000
with message-id <e1grdvl-0008tx...@fasolo.debian.org>
and subject line Bug#921227: fixed in dnssec-trigger 0.17+repack-3
has caused the Debian Bug report #921227,
regarding dnssec-trigger: crashes (SIGSEGV)
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
921227: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=921227
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: dnssec-trigger
Version: 0.17+repack-2
Severity: grave
Justification: renders package unusable

dnssec-trigger has been crashing for me the last few weeks.  I'm not
sure what triggers it.

Just got around to getting a core file:

Core was generated by `dnssec-triggerd -d'.
Program terminated with signal SIGSEGV, Segmentation fault.
#0  string_list_contains (list=<optimized out>, 
value=value@entry=0x55d49c44d0b0 "d.f.ip6.arpa", 
buffer_size=buffer_size@entry=12) at riggerd/string_list.c:90
90      riggerd/string_list.c: No such file or directory.
(gdb) bt full
#0  string_list_contains (list=<optimized out>, 
value=value@entry=0x55d49c44d0b0 "d.f.ip6.arpa", 
buffer_size=buffer_size@entry=12) at riggerd/string_list.c:90
        len = 12
        iter = 0x707060703050701
#1  0x000055d49c441e4a in string_list_contains (list=<optimized out>, 
value=value@entry=0x55d49c44d0b0 "d.f.ip6.arpa", 
buffer_size=buffer_size@entry=12) at riggerd/string_list.c:76
        len = <optimized out>
        iter = <optimized out>
#2  0x000055d49c434b23 in nm_connection_list_contains_zone 
(list=list@entry=0x7ffd55ff4400, zone=zone@entry=0x55d49c44d0b0 "d.f.ip6.arpa", 
len=len@entry=12) at riggerd/connection_list.c:99
        iter = 0x55d49e0cd3c0
#3  0x000055d49c4445f9 in update_connection_zones (connections=0x7ffd55ff43f0) 
at riggerd/svr.c:1002
        zone = <optimized out>
        i = <optimized out>
        global_forwarders = {first = 0x0, ownership = LIST_NON_OWNING}
        gf_string = <optimized out>
        static_label = <optimized out>
        stored_zones = {dir = 0x55d49c44cf31 "/var/run/dnssec-trigger", path = 
0x55d49c44cf13 "/var/run/dnssec-trigger/zones", path_tmp = 0x55d49c44d518 
"/var/run/dnssec-trigger/zones.tmp", cache = {
            first = 0x55d49e0a5bb0}}
        forward_zones = {first = 0x55d49e0ce4a0, ownership = LIST_OWNING}
        iter = <optimized out>
        static_label = <optimized out>
        stored_zones = <optimized out>
        forward_zones = <optimized out>
        iter = <optimized out>
        zone = <optimized out>
        iter = <optimized out>
        c = <optimized out>
        string_iter = <optimized out>
        zone = <optimized out>
        in_store = <optimized out>
        in_fwd_zones = <optimized out>
        new_fwd_zone = <optimized out>
        global_forwarders = <optimized out>
        gf_string = <optimized out>
        i = <optimized out>
        zone = <optimized out>
        new_zone = <optimized out>
#4  handle_update_all (json=<optimized out>) at riggerd/svr.c:817
        original = {first = 0x0, ownership = LIST_OWNING}
        original = <optimized out>
#5  sslconn_command (sc=<optimized out>) at riggerd/svr.c:1303
        header = "DNSTRIG1 "
        str = <optimized out>
        header = <optimized out>
        str = <optimized out>
#6  control_callback (c=<optimized out>, arg=<optimized out>, 
reply_info=<optimized out>, err=0) at riggerd/svr.c:480
        s = <optimized out>
        r = <optimized out>
#7  0x000055d49c444a4d in control_callback (c=<optimized out>, arg=<optimized 
out>, err=<optimized out>, reply_info=<optimized out>) at riggerd/svr.c:380
        s = <optimized out>
        r = <optimized out>
        r2 = <optimized out>
        errbuf = <optimized out>
        x = <optimized out>
#8  0x000055d49c438a76 in handle_select (base=base@entry=0x55d49e04d950, 
wait=<optimized out>, wait@entry=0x7ffd55ff4690) at riggerd/mini_event.c:221
        bits = 2
        r = {fds_bits = {128, 0 <repeats 15 times>}}
        w = {fds_bits = {0 <repeats 16 times>}}
        ret = 0
        i = 7
        __func__ = "handle_select"
#9  0x000055d49c438cd3 in event_base_dispatch (base=0x55d49e04d950) at 
riggerd/mini_event.c:243
        wait = {tv_sec = 8, tv_usec = 977143}
#10 0x000055d49c43ae3c in comm_base_dispatch (b=<optimized out>) at 
riggerd/netevent.c:252
        retval = <optimized out>
#11 0x000055d49c432cf1 in do_main_work (verb=<optimized out>, nodaemonize=1, 
cfgfile=0x55d49c44c788 "/etc/dnssec-trigger/dnssec-trigger.conf") at 
riggerd/riggerd.c:286
        cfg = 0x55d49e04d7c0
        svr = 0x55d49e04dc00
        cfg = <optimized out>
        svr = <optimized out>
        c2 = <optimized out>
#12 main (argc=<optimized out>, argv=<optimized out>) at riggerd/riggerd.c:395
        c = <optimized out>
        cfgfile = 0x55d49c44c788 "/etc/dnssec-trigger/dnssec-trigger.conf"
        nodaemonize = 1
        verb = <optimized out>
        uninit_it = 0
        winopt = 0x0
(gdb) info registers
rax            0xc                 12
rbx            0x707060703050701   506380110287668993
rcx            0x10                16
rdx            0x55d49c44d0b0      94371643183280
rsi            0xc                 12
rdi            0x55d49c44d0a0      94371643183264
rbp            0xc                 0xc
rsp            0x7ffd55ff4380      0x7ffd55ff4380
r8             0xc                 12
r9             0x55d49e0cd360      94371673068384
r10            0x6                 6
r11            0x246               582
r12            0x55d49c44d0b0      94371643183280
r13            0xc                 12
r14            0x55d49e0cd360      94371673068384
r15            0x7ffd55ff4420      140726046245920
rip            0x55d49c441c90      0x55d49c441c90 <string_list_contains+48>
eflags         0x10202             [ IF RF ]
cs             0x33                51
ss             0x2b                43
ds             0x0                 0
es             0x0                 0
fs             0x0                 0
gs             0x0                 0
(gdb) 


Cheers,
Julien

-- System Information:
Debian Release: buster/sid
  APT prefers testing
  APT policy: (900, 'testing'), (500, 'unstable-debug'), (500, 
'testing-debug'), (500, 'unstable')
Architecture: amd64 (x86_64)
Foreign Architectures: i386

Kernel: Linux 4.19.0-1-amd64 (SMP w/4 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8), 
LANGUAGE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages dnssec-trigger depends on:
ii  gir1.2-nm-1.0       1.14.4-4
ii  libc6               2.28-5
ii  libgdk-pixbuf2.0-0  2.38.0+dfsg-7
ii  libglib2.0-0        2.58.2-3
ii  libgtk2.0-0         2.24.32-3
ii  libldns2            1.7.0-3.1+b1
ii  libssl1.1           1.1.1a-1
ii  python3             3.7.2-1
ii  python3-gi          3.30.4-1
ii  python3-lockfile    1:0.12.2-2
ii  sensible-utils      0.0.12
ii  unbound             1.8.1-1+b1

dnssec-trigger recommends no packages.

dnssec-trigger suggests no packages.

-- no debconf information

--- End Message ---
--- Begin Message ---
Source: dnssec-trigger
Source-Version: 0.17+repack-3

We believe that the bug you reported is fixed in the latest version of
dnssec-trigger, which is due to be installed in the Debian FTP archive.

A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to 921...@bugs.debian.org,
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Diane Trout <di...@ghic.org> (supplier of updated dnssec-trigger package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing ftpmas...@ftp-master.debian.org)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA512

Format: 1.8
Date: Wed, 06 Feb 2019 21:29:17 -0800
Source: dnssec-trigger
Binary: dnssec-trigger
Architecture: source
Version: 0.17+repack-3
Distribution: unstable
Urgency: medium
Maintainer: dnssec-trigger packagers <dnssec-trig...@packages.debian.org>
Changed-By: Diane Trout <di...@ghic.org>
Description:
 dnssec-trigger - reconfiguration tool to make DNSSEC work
Closes: 919256 921227
Changes:
 dnssec-trigger (0.17+repack-3) unstable; urgency=medium
 .
   * Remove add-null-to-end-of-string-list.patch upstream had better solution
   * Add dnssec-double-free.patch (Closes: 921227)
   * Update tests/small-key to test if small keys are fixed on upgrade
   * Modify remove-small-keys.patch to only generate the certificates if they 
don't exist
     (Closes: #919256)
   * Always run dnssec-trigger-control-setup to make sure that keys are updated
Checksums-Sha1:
 2ca23b70dae08ba78235cfdda4f1ad599dae73c4 2330 dnssec-trigger_0.17+repack-3.dsc
 cb9d241e028f2849496465949895da9e4540efaf 15632 
dnssec-trigger_0.17+repack-3.debian.tar.xz
 cbb8463a909f827541e47213a8861efe5ac8d2af 11545 
dnssec-trigger_0.17+repack-3_source.buildinfo
Checksums-Sha256:
 f857a895bc374ca3f85fdec9f50d034f8a7f5b4dd5d03c85d6c2e2f829f40386 2330 
dnssec-trigger_0.17+repack-3.dsc
 69f40384e61d6e7c7d927751affbaca42d3dae046156dcd616505b915c8a3002 15632 
dnssec-trigger_0.17+repack-3.debian.tar.xz
 01e05fb4706f17e2b270a4cd54fbc70ddf56e3a574e984c7c62200c8dbaf760f 11545 
dnssec-trigger_0.17+repack-3_source.buildinfo
Files:
 4aa03b228753fb0193a780723aee6cd7 2330 net optional 
dnssec-trigger_0.17+repack-3.dsc
 ed817ecba69fbe1c986826dd51cb866c 15632 net optional 
dnssec-trigger_0.17+repack-3.debian.tar.xz
 09a548a34c983245c689f4af1dfda708 11545 net optional 
dnssec-trigger_0.17+repack-3_source.buildinfo

-----BEGIN PGP SIGNATURE-----
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=b5/w
-----END PGP SIGNATURE-----

--- End Message ---

Reply via email to