[Bug 1062191] New: Inconsistency detected by ld.so: dl-close.c: 811: _dl_close: Assertion `map->l_init_called' failed!
http://bugzilla.opensuse.org/show_bug.cgi?id=1062191 Bug ID: 1062191 Summary: Inconsistency detected by ld.so: dl-close.c: 811: _dl_close: Assertion `map->l_init_called' failed! Classification: openSUSE Product: openSUSE Distribution Version: Leap 42.2 Hardware: Other OS: Other Status: NEW Severity: Normal Priority: P5 - None Component: Security Assignee: security-team@suse.de Reporter: jayvdb@gmail.com QA Contact: qa-bugs@suse.de Found By: --- Blocker: --- The openssl tests on Leap 42.2 and SLE_12_SP2 are currently failing https://build.opensuse.org/package/show/security:tls/openssl-1_1_0 It is fixed in Leap 42.2 and SLE_12_SP3, but a very similar problem appears to in Factory ARM builds. The default output for this problem is only [ 190s] ../test/recipes/70-test_sslsessiontick.t ........ [ 190s] Dubious, test returned 127 (wstat 32512, 0x7f00) [ 190s] No subtests run Adding VERBOSE=1 in the .spec command running the tests results in Inconsistency detected by ld.so: dl-close.c: 811: _dl_close: Assertion `map->l_init_called' failed! It looks like https://bugzilla.redhat.com/show_bug.cgi?id=1398370 Extract of log [ 172s] ../test/recipes/70-test_sslsessiontick.t ........ [ 172s] Server command: ../util/shlib_wrap.sh ../apps/openssl s_server -no_comp -rev -engine ossltest -accept 4443 -cert ../apps/server.pem -naccept 1 -cipher AES128-SHA [ 172s] Proxy started on port 4453 [ 172s] Client command: echo test | ../util/shlib_wrap.sh ../apps/openssl s_client -engine ossltest -connect localhost:4453 [ 172s] engine "ossltest" set. [ 172s] Using default temp DH parameters [ 172s] ACCEPT [ 172s] engine "ossltest" set. [ 172s] Connection opened [ 172s] Received client packet [ 172s] Packet length = 176 [ 172s] Processing flight 0 [ 172s] Record 1 (client -> server) [ 172s] Content type: HANDSHAKE [ 172s] Version: TLS1.0 [ 172s] Length: 171 [ 172s] Message type: ClientHello [ 172s] Message Length: 167 [ 172s] Client Version:771 [ 172s] Session ID Len:0 [ 172s] Ciphersuite len:56 [ 172s] Compression Method Len:1 [ 172s] Extensions Len:70 [ 172s] [ 172s] Forwarded packet length = 176 [ 172s] [ 172s] Received server packet [ 172s] Packet length = 1093 [ 172s] Processing flight 1 [ 172s] Record 1 (server -> client) [ 172s] Content type: HANDSHAKE [ 172s] Version: TLS1.2 [ 172s] Length: 61 [ 172s] Message type: ServerHello [ 172s] Message Length: 57 [ 172s] Server Version:771 [ 172s] Session ID Len:0 [ 172s] Ciphersuite:47 [ 172s] Compression Method:0 [ 172s] Extensions Len:17 [ 172s] Record 2 (server -> client) [ 172s] Content type: HANDSHAKE [ 172s] Version: TLS1.2 [ 172s] Length: 1013 [ 172s] Message type: Certificate [ 172s] Message Length: 1009 [ 172s] Record 3 (server -> client) [ 172s] Content type: HANDSHAKE [ 172s] Version: TLS1.2 [ 172s] Length: 4 [ 172s] Message type: ServerHelloDone [ 172s] Message Length: 0 [ 172s] [ 172s] Forwarded packet length = 1093 [ 172s] [ 172s] depth=0 C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = Test Server Cert [ 172s] verify error:num=20:unable to get local issuer certificate [ 172s] verify return:1 [ 172s] depth=0 C = UK, O = OpenSSL Group, OU = FOR TESTING PURPOSES ONLY, CN = Test Server Cert [ 172s] verify error:num=21:unable to verify the first certificate [ 172s] verify return:1 [ 172s] Received client packet [ 172s] Packet length = 346 [ 172s] Processing flight 2 [ 172s] Record 1 (client -> server) [ 172s] Content type: HANDSHAKE [ 172s] Version: TLS1.2 [ 172s] Length: 262 [ 172s] Message type: ClientKeyExchange [ 172s] Message Length: 258 [ 172s] Record 2 (client -> server) [ 172s] Content type: CCS [ 172s] Version: TLS1.2 [ 172s] Length: 1 [ 172s] Record 3 (client -> server) [ 172s] Content type: HANDSHAKE [ 172s] Version: TLS1.2 [ 172s] Length: 68 [ 172s] Message type: Finished [ 172s] Message Length: 12 [ 172s] [ 172s] Forwarded packet length = 346 [ 172s] [ 172s] Received server packet [ 172s] Packet length = 254 [ 172s] Processing flight 3 [ 172s] Record 1 (server -> client) [ 172s] Content type: HANDSHAKE [ 172s] Version: TLS1.2 [ 172s] Length: 170 [ 172s] Message type: NewSessionTicket [ 172s] Message Length: 166 [ 172s] Record 2 (server -> client) [ 172s] Content type: CCS [ 172s] Version: TLS1.2 [ 172s] Length: 1 [ 172s] Record 3 (server -> client) [ 172s] Content type: HANDSHAKE [ 172s] Version: TLS1.2 [ 172s] Length: 68 [ 172s] Message type: Finished [ 172s] Message Length: 12 [ 172s] [ 172s] Forwarded packet length = 254 [ 172s] [ 172s] CONNECTION ESTABLISHED [ 172s] Protocol version: TLSv1.2 [ 172s] Client cipher list: ECDHE-ECDSA-AES256-GCM-SHA384:ECDHE-RSA-AES256-GCM-SHA384:DHE-RSA-AES256-GCM-SHA384:ECDHE-ECDSA-CHACHA20-POLY1305:ECDHE-RSA-CHACHA20-POLY1305:DHE-RSA-CHACHA20-POLY1305:ECDHE-ECDSA-AES128-GCM-SHA256:ECDHE-RSA-AES128-GCM-SHA256:DHE-RSA-AES128-GCM-SHA256:ECDHE-ECDSA-AES256-SHA384:ECDHE-RSA-AES256-SHA384:DHE-RSA-AES256-SHA256:ECDHE-ECDSA-AES128-SHA256:ECDHE-RSA-AES128-SHA256:DHE-RSA-AES128-SHA256:ECDHE-ECDSA-AES256-SHA:ECDHE-RSA-AES256-SHA:DHE-RSA-AES256-SHA:ECDHE-ECDSA-AES128-SHA:ECDHE-RSA-AES128-SHA:DHE-RSA-AES128-SHA:AES256-GCM-SHA384:AES128-GCM-SHA256:AES256-SHA256:AES128-SHA256:AES256-SHA:AES128-SHA:SCSV [ 172s] Ciphersuite: AES128-SHA [ 172s] Signature Algorithms: RSA+SHA512:DSA+SHA512:ECDSA+SHA512:RSA+SHA384:DSA+SHA384:ECDSA+SHA384:RSA+SHA256:DSA+SHA256:ECDSA+SHA256:RSA+SHA224:DSA+SHA224:ECDSA+SHA224:RSA+SHA1:DSA+SHA1:ECDSA+SHA1 [ 172s] No peer certificate [ 172s] Supported Elliptic Curve Point Formats: uncompressed:ansiX962_compressed_prime:ansiX962_compressed_char2 [ 172s] Supported Elliptic Curves: X25519:P-256:P-521:P-384 [ 172s] CONNECTED(00000003) [ 172s] --- [ 172s] Certificate chain [ 172s] 0 s:/C=UK/O=OpenSSL Group/OU=FOR TESTING PURPOSES ONLY/CN=Test Server Cert [ 172s] i:/C=UK/O=OpenSSL Group/OU=FOR TESTING PURPOSES ONLY/CN=OpenSSL Test Intermediate CA [ 172s] --- [ 172s] Server certificate [ 172s] -----BEGIN CERTIFICATE----- [ 172s] MIID5zCCAs+gAwIBAgIJALnu1NlVpZ6zMA0GCSqGSIb3DQEBBQUAMHAxCzAJBgNV [ 172s] BAYTAlVLMRYwFAYDVQQKDA1PcGVuU1NMIEdyb3VwMSIwIAYDVQQLDBlGT1IgVEVT [ 172s] VElORyBQVVJQT1NFUyBPTkxZMSUwIwYDVQQDDBxPcGVuU1NMIFRlc3QgSW50ZXJt [ 172s] ZWRpYXRlIENBMB4XDTExMTIwODE0MDE0OFoXDTIxMTAxNjE0MDE0OFowZDELMAkG [ 172s] A1UEBhMCVUsxFjAUBgNVBAoMDU9wZW5TU0wgR3JvdXAxIjAgBgNVBAsMGUZPUiBU [ 172s] RVNUSU5HIFBVUlBPU0VTIE9OTFkxGTAXBgNVBAMMEFRlc3QgU2VydmVyIENlcnQw [ 172s] ggEiMA0GCSqGSIb3DQEBAQUAA4IBDwAwggEKAoIBAQDzhPOSNtyyRspmeuUpxfNJ [ 172s] KCLTuf7g3uQ4zu4iHOmRO5TQci+HhVlLZrHF9XqFXcIP0y4pWDbMSGuiorUmzmfi [ 172s] R7bfSdI/+qIQt8KXRH6HNG1t8ou0VSvWId5TS5Dq/er5ODUr9OaaDva7EquHIcMv [ 172s] vPQGuI+OEAcnleVCy9HVEIySrO4P3CNIicnGkwwiAud05yUAq/gPXBC1hTtmlPD7 [ 172s] TVcGVSEiJdvzqqlgv02qedGrkki6GY4S7GjZxrrf7Foc2EP+51LJzwLQx3/JfrCU [ 172s] 41NEWAsu/Sl0tQabXESN+zJ1pDqoZ3uHMgpQjeGiE0olr+YcsSW/tJmiU9OiAr8R [ 172s] AgMBAAGjgY8wgYwwDAYDVR0TAQH/BAIwADAOBgNVHQ8BAf8EBAMCBeAwLAYJYIZI [ 172s] AYb4QgENBB8WHU9wZW5TU0wgR2VuZXJhdGVkIENlcnRpZmljYXRlMB0GA1UdDgQW [ 172s] BBSCvM8AABPR9zklmifnr9LvIBturDAfBgNVHSMEGDAWgBQ2w2yI55X+sL3szj49 [ 172s] hqshgYfa2jANBgkqhkiG9w0BAQUFAAOCAQEAqb1NV0B0/pbpK9Z4/bNjzPQLTRLK [ 172s] WnSNm/Jh5v0GEUOE/Beg7GNjNrmeNmqxAlpqWz9qoeoFZax+QBpIZYjROU3TS3fp [ 172s] yLsrnlr0CDQ5R7kCCDGa8dkXxemmpZZLbUCpW2Uoy8sAA4JjN9OtsZY7dvUXFgJ7 [ 172s] vVNTRnI01ghknbtD+2SxSQd3CWF6QhcRMAzZJ1z1cbbwGDDzfvGFPzJ+Sq+zEPds [ 172s] xoVLLSetCiBc+40ZcDS5dV98h9XD7JMTQfxzA7mNGv73JoZJA6nFgj+ADSlJsY/t [ 172s] JBv+z1iQRueoh9Qeee+ZbRifPouCB8FDx+AltvHTANdAq0t/K3o+pplMVA== [ 172s] -----END CERTIFICATE----- [ 172s] subject=/C=UK/O=OpenSSL Group/OU=FOR TESTING PURPOSES ONLY/CN=Test Server Cert [ 172s] issuer=/C=UK/O=OpenSSL Group/OU=FOR TESTING PURPOSES ONLY/CN=OpenSSL Test Intermediate CA [ 172s] --- [ 172s] No client certificate CA names sent [ 172s] --- [ 172s] SSL handshake has read 1347 bytes and written 522 bytes [ 172s] Verification error: unable to verify the first certificate [ 172s] --- [ 172s] New, SSLv3, Cipher is AES128-SHA [ 172s] Server public key is 2048 bit [ 172s] Secure Renegotiation IS supported [ 172s] Compression: NONE [ 172s] Expansion: NONE [ 172s] No ALPN negotiated [ 172s] SSL-Session: [ 172s] Protocol : TLSv1.2 [ 172s] Cipher : AES128-SHA [ 172s] Session-ID: 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F [ 172s] Session-ID-ctx: [ 172s] Master-Key: 000102030405060708090A0B0C0D0E0F101112131415161718191A1B1C1D1E1F000102030405060708090A0B0C0D0E0F [ 172s] PSK identity: None [ 172s] PSK identity hint: None [ 172s] SRP username: None [ 172s] TLS session ticket lifetime hint: 7200 (seconds) [ 172s] TLS session ticket: [ 172s] 0000 - 0a 0b 0c 0d 0e 0f 10 11-12 13 0a 0b 0c 0d 0e 0f ................ [ 172s] 0010 - 0a 0b 0c 0d 0e 0f 10 11-12 13 0a 0b 0c 0d 0e 0f ................ [ 172s] 0020 - 76 e8 e8 05 c3 14 e0 5e-b1 37 96 69 e7 8f b4 94 v......^.7.i.... [ 172s] 0030 - bc e7 ef 1e 79 58 8c 6f-38 32 fe b2 25 3f 2f ab ....yX.o82..%?/. [ 172s] 0040 - 4a 97 79 22 8e 22 b3 9f-a0 0c fb 46 dc f8 05 f9 J.y".".....F.... [ 172s] 0050 - 95 c8 b3 c1 5f 7b 2d 1a-42 3e b2 d1 3f 5c 1a 3f ...._{-.B>..?\.? [ 172s] 0060 - d9 a4 46 bb 7a b7 05 c6-04 9b 59 23 39 9a 74 de ..F.z.....Y#9.t. [ 172s] 0070 - c4 92 41 24 f1 dc 98 ea-71 03 87 a2 59 b5 9e 32 ..A$....q...Y..2 [ 172s] 0080 - 00 01 02 03 04 05 06 07-08 09 0a 0b 0c 0d 0e 0f ................ [ 172s] 0090 - 10 11 12 13 14 15 16 17-18 19 1a 1b 1c 1d 1e 1f ................ [ 172s] [ 172s] Start Time: 1507464122 [ 172s] Timeout : 7200 (sec) [ 172s] Verify return code: 21 (unable to verify the first certificate) [ 172s] Extended master secret: yes [ 172s] --- [ 172s] DONE [ 172s] Received client packet [ 172s] Packet length = 57 [ 172s] Processing flight 4 [ 172s] Record 1 (client -> server) [ 172s] Content type: APPLICATION DATA [ 172s] Version: TLS1.2 [ 172s] Length: 52 [ 172s] [ENCRYPTED APPLICATION DATA] [ 172s] [test [ 172s] ] [ 172s] [ 172s] Forwarded packet length = 57 [ 172s] [ 172s] Received client packet [ 172s] Packet length = 57 [ 172s] Processing flight 5 [ 172s] Record 1 (client -> server) [ 172s] Content type: ALERT [ 172s] Version: TLS1.2 [ 172s] Length: 52 [ 172s] [ 172s] Forwarded packet length = 57 [ 172s] [ 172s] Connection closed [ 172s] Inconsistency detected by ld.so: dl-close.c: 810: _dl_close: Assertion `map->l_init_called' failed! [ 172s] Waiting for server process to close: 23574 [ 172s] CONNECTION CLOSED [ 172s] Inconsistency detected by ld.so: dl-close.c: 810: _dl_close: Assertion `map->l_init_called' failed! [ 172s] exit code 32512 from server process [ 172s] Dubious, test returned 127 (wstat 32512, 0x7f00) [ 172s] No subtests run -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1062191 http://bugzilla.opensuse.org/show_bug.cgi?id=1062191#c1 --- Comment #1 from John Vandenberg <jayvdb@gmail.com> --- I see several comments indicating it is https://bugzilla.suse.com/show_bug.cgi?id=1035445 , but I cant see that one. -- You are receiving this mail because: You are on the CC list for the bug.
http://bugzilla.opensuse.org/show_bug.cgi?id=1062191 http://bugzilla.opensuse.org/show_bug.cgi?id=1062191#c2 Andreas Stieger <astieger@suse.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED CC| |astieger@suse.com Resolution|--- |DUPLICATE --- Comment #2 from Andreas Stieger <astieger@suse.com> --- Yes should be bug 1035445, now fixed in Leap 42.2 *** This bug has been marked as a duplicate of bug 1035445 *** -- You are receiving this mail because: You are on the CC list for the bug.
participants (1)
-
bugzilla_noreply@novell.com