I'd like to get final confirmation from Matt before declaring victory.
On May 2, 2016 1:15 PM, "Andrew Johnson" <email address hidden> wrote:
> Michael, are you still working on this or can I apply your patch to the
> 3.14 branch?
>
> --
> You received this bug notification because you are subscribed to the bug
> report.
> https://bugs.launchpad.net/bugs/1571224
>
> Title:
> IOC segmentation fault related to CA security
>
> Status in EPICS Base:
> New
>
> Bug description:
> On 04/15/2016 05:27 PM, Pearson, Matthew R. wrote:
> >
> > Hi,
> >
> > I’ve had a few instances of one of my soft IOCs crashing with a
> segmentation fault when I shutdown another IOC that hosts a PV used as part
> of the CA security logic on the other crashed IOC.
> >
> > There is sometimes (but not always) this message printed out before
> the crash:
> >
> > dbCa:exceptionCallback stat "Virtual circuit disconnect" channel
> "unknown" context "cg1d-dassrv1.ornl.gov:5064"
> > nativeType DBR_invalid requestType DBR_invalid nativeCount 0
> requestCount 0 noReadAccess noWriteAccess
> >
> > Printing the stack trace:
> >
> > Core was generated by `../../bin/linux-x86_64/cg1d-parker1 ./st.cmd'.
> > Program terminated with signal 11, Segmentation fault.
> > #0 0x00007f5321218599 in ellDelete (pList=0x7f52bc000920,
> pNode=0x7f52ac008ec0) at ../../../src/libCom/ellLib/ellLib.c:87
> > 87 pNode->previous->next = pNode->next;
> > Missing separate debuginfos, use: debuginfo-install
> glibc-2.12-1.149.el6_6.9.x86_64 libgcc-4.4.7-11.el6.x86_64
> libstdc++-4.4.7-11.el6.x86_64 ncurses-libs-5.7-3.20090208.el6.x86_64
> readline-6.0-4.el6.x86_64
> > (gdb) bt
> > #0 0x00007f5321218599 in ellDelete (pList=0x7f52bc000920,
> pNode=0x7f52ac008ec0) at ../../../src/libCom/ellLib/ellLib.c:87
> > #1 0x00007f532217c289 in casAccessRightsCB (ascpvt=0x7f52b8000db8,
> type=asClientCOAR) at ../camessage.c:1111
> > #2 0x00007f5321d64122 in asComputePvt (asClientPvt=0x7f52b8000db8) at
> ../asLibRoutines.c:1014
> > #3 0x00007f5321d63ea0 in asComputeAsgPvt (pasg=0x1f91ee0) at
> ../asLibRoutines.c:940
> > #4 0x00007f5321d62419 in asComputeAsg (pasg=0x1f91ee0) at
> ../asLibRoutines.c:455
> > #5 0x00007f5321d60482 in connectCallback (arg=...) at ../asCa.c:99
> > #6 0x00007f53214c1301 in oldChannelNotify::disconnectNotify
> (this=0x7f52d0000d10, guard=...) at ../oldChannelNotify.cpp:112
> > #7 0x00007f53214abe30 in nciu::unresponsiveCircuitNotify
> (this=0x7f5323714010, cbGuard=..., guard=...) at ../nciu.cpp:171
> > #8 0x00007f53214b7c38 in tcpiiu::disconnectAllChannels
> (this=0x7f52d40008c0, cbGuard=..., guard=..., discIIU=...) at
> ../tcpiiu.cpp:1834
> > #9 0x00007f532149a042 in cac::destroyIIU (this=0x7f52d000ed20,
> iiu=...) at ../cac.cpp:1227
> > #10 0x00007f53214b27e3 in tcpSendThread::run (this=0x7f52d4000a00) at
> ../tcpiiu.cpp:229
> > #11 0x00007f532122bc51 in epicsThreadCallEntryPoint
> (pPvt=0x7f52d4000a08) at ../../../src/libCom/osi/epicsThread.cpp:85
> > #12 0x00007f53212333ce in start_routine (arg=0x7f52d400a250) at
> ../../../src/libCom/osi/os/posix/osdThread.c:385
> > #13 0x00007f53204a29d1 in start_thread () from /lib64/libpthread.so.0
> > #14 0x00007f53207a08fd in clone () from /lib64/libc.so.6
> >
> >
> > The crashed IOC has a CA access security rule that looks like:
> >
> > ASG(DEFAULT)
> > {
> > INPA("$(P):Scan:Active")
> > RULE(1, READ)
> > RULE(1, WRITE)
> > {
> > CALC("A=0")
> > }
> > RULE(1, WRITE)
> > {
> > UAG(epics, beamline, detector)
> > HAG(beamline)
> > CALC("A=1")
> > }
> > }
> >
> > where $(P):Scan:Active is hosted by the IOC that I’m shutting down.
> >
> > In addition there is a channel access link between the two IOCs
> involving a CP link.
> >
> > I can’t reliably reproduce it, but it’s happened a few times today as
> I was testing it (stopping and starting the IOC hosting $(P):Scan:Active
> perhaps 20 times).
> >
> > Anybody have ideas about this?
> >
> > Our base version is 3.14.12.4 running on RHEL6.
>
> To manage notifications about this bug go to:
> https://bugs.launchpad.net/epics-base/+bug/1571224/+subscriptions
>
I'd like to get final confirmation from Matt before declaring victory.
On May 2, 2016 1:15 PM, "Andrew Johnson" <email address hidden> wrote:
> Michael, are you still working on this or can I apply your patch to the /bugs.launchpad .net/bugs/ 1571224 allback stat "Virtual circuit disconnect" channel ornl.gov: 5064" bin/linux- x86_64/ cg1d-parker1 ./st.cmd'. 0x7f52bc000920, 08ec0) at ../../. ./src/libCom/ ellLib/ ellLib. c:87 previous- >next = pNode->next; 12-1.149. el6_6.9. x86_64 libgcc- 4.4.7-11. el6.x86_ 64 +-4.4.7- 11.el6. x86_64 ncurses- libs-5. 7-3.20090208. el6.x86_ 64 6.0-4.el6. x86_64 0x7f52bc000920, 08ec0) at ../../. ./src/libCom/ ellLib/ ellLib. c:87 0x7f52b8000db8, 0x7f52b8000db8) at s.c:1014 s.c:940 s.c:455 y::disconnectNo tify 00d10, guard=...) at ../oldChannelNo tify.cpp: 112 iveCircuitNotif y 14010, cbGuard=..., guard=...) at ../nciu.cpp:171 :disconnectAllC hannels 008c0, cbGuard=..., guard=..., discIIU=...) at 0ed20, 00a00) at EntryPoint 00a08) at ../../. ./src/libCom/ osi/epicsThread .cpp:85 a250) at ./src/libCom/ osi/os/ posix/osdThread .c:385 libpthread. so.0 (P):Scan: Active" ) /bugs.launchpad .net/epics- base/+bug/ 1571224/ +subscriptions
> 3.14 branch?
>
> --
> You received this bug notification because you are subscribed to the bug
> report.
> https:/
>
> Title:
> IOC segmentation fault related to CA security
>
> Status in EPICS Base:
> New
>
> Bug description:
> On 04/15/2016 05:27 PM, Pearson, Matthew R. wrote:
> >
> > Hi,
> >
> > I’ve had a few instances of one of my soft IOCs crashing with a
> segmentation fault when I shutdown another IOC that hosts a PV used as part
> of the CA security logic on the other crashed IOC.
> >
> > There is sometimes (but not always) this message printed out before
> the crash:
> >
> > dbCa:exceptionC
> "unknown" context "cg1d-dassrv1.
> > nativeType DBR_invalid requestType DBR_invalid nativeCount 0
> requestCount 0 noReadAccess noWriteAccess
> >
> > Printing the stack trace:
> >
> > Core was generated by `../../
> > Program terminated with signal 11, Segmentation fault.
> > #0 0x00007f5321218599 in ellDelete (pList=
> pNode=0x7f52ac0
> > 87 pNode->
> > Missing separate debuginfos, use: debuginfo-install
> glibc-2.
> libstdc+
> readline-
> > (gdb) bt
> > #0 0x00007f5321218599 in ellDelete (pList=
> pNode=0x7f52ac0
> > #1 0x00007f532217c289 in casAccessRightsCB (ascpvt=
> type=asClientCOAR) at ../camessage.c:1111
> > #2 0x00007f5321d64122 in asComputePvt (asClientPvt=
> ../asLibRoutine
> > #3 0x00007f5321d63ea0 in asComputeAsgPvt (pasg=0x1f91ee0) at
> ../asLibRoutine
> > #4 0x00007f5321d62419 in asComputeAsg (pasg=0x1f91ee0) at
> ../asLibRoutine
> > #5 0x00007f5321d60482 in connectCallback (arg=...) at ../asCa.c:99
> > #6 0x00007f53214c1301 in oldChannelNotif
> (this=0x7f52d00
> > #7 0x00007f53214abe30 in nciu::unrespons
> (this=0x7f53237
> > #8 0x00007f53214b7c38 in tcpiiu:
> (this=0x7f52d40
> ../tcpiiu.cpp:1834
> > #9 0x00007f532149a042 in cac::destroyIIU (this=0x7f52d00
> iiu=...) at ../cac.cpp:1227
> > #10 0x00007f53214b27e3 in tcpSendThread::run (this=0x7f52d40
> ../tcpiiu.cpp:229
> > #11 0x00007f532122bc51 in epicsThreadCall
> (pPvt=0x7f52d40
> > #12 0x00007f53212333ce in start_routine (arg=0x7f52d400
> ../../.
> > #13 0x00007f53204a29d1 in start_thread () from /lib64/
> > #14 0x00007f53207a08fd in clone () from /lib64/libc.so.6
> >
> >
> > The crashed IOC has a CA access security rule that looks like:
> >
> > ASG(DEFAULT)
> > {
> > INPA("$
> > RULE(1, READ)
> > RULE(1, WRITE)
> > {
> > CALC("A=0")
> > }
> > RULE(1, WRITE)
> > {
> > UAG(epics, beamline, detector)
> > HAG(beamline)
> > CALC("A=1")
> > }
> > }
> >
> > where $(P):Scan:Active is hosted by the IOC that I’m shutting down.
> >
> > In addition there is a channel access link between the two IOCs
> involving a CP link.
> >
> > I can’t reliably reproduce it, but it’s happened a few times today as
> I was testing it (stopping and starting the IOC hosting $(P):Scan:Active
> perhaps 20 times).
> >
> > Anybody have ideas about this?
> >
> > Our base version is 3.14.12.4 running on RHEL6.
>
> To manage notifications about this bug go to:
> https:/
>