Note: This is a public test instance of Red Hat Bugzilla. The data contained within is a snapshot of the live data so any changes you make will not be reflected in the production Bugzilla. Email is disabled so feel free to test any aspect of the site that you want. File any problems you find or give feedback at bugzilla.redhat.com.
Bug 1485656 - trap invalid opcode in libfreeblpriv3.so
Summary: trap invalid opcode in libfreeblpriv3.so
Keywords:
Status: CLOSED NEXTRELEASE
Alias: None
Product: Fedora
Classification: Fedora
Component: nss-softokn
Version: 26
Hardware: athlon
OS: Linux
unspecified
unspecified
Target Milestone: ---
Assignee: nss-nspr-maint
QA Contact: Fedora Extras Quality Assurance
URL:
Whiteboard:
Depends On:
Blocks: x86Tracker
TreeView+ depends on / blocked
 
Reported: 2017-08-26 19:08 UTC by Davide Repetto
Modified: 2017-10-21 17:26 UTC (History)
7 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2017-10-21 17:26:15 UTC
Type: Bug
Embargoed:


Attachments (Terms of Use)

Description Davide Repetto 2017-08-26 19:08:48 UTC
Description of problem:
=======================
[184717.943155] traps: dnf[22672] trap invalid opcode ip:b5153aca sp:bfb5b1a0 error:0 in libfreeblpriv3.so[b5150000+6d000]

Happens on AMD Athlon XP CPUs 


Version-Release number of selected component (if applicable):
=============================================================
nss-softokn-freebl-3.31.0-1.0.fc25.i686

How reproducible:
=================
Using dnf or rpm just after the update of nss-softokn-freebl


Additional info:
================
# cat /proc/cpuinfo
processor       : 0
vendor_id       : AuthenticAMD
cpu family      : 6
model           : 8
model name      : AMD Athlon(tm) XP 2400+
stepping        : 1
cpu MHz         : 1989.069
cache size      : 256 KB
physical id     : 0
siblings        : 1
core id         : 0
cpu cores       : 1
apicid          : 0
initial apicid  : 0
fdiv_bug        : no
f00f_bug        : no
coma_bug        : no
fpu             : yes
fpu_exception   : yes
cpuid level     : 1
wp              : yes
flags           : fpu vme de pse tsc msr pae mce cx8 apic sep mtrr pge mca cmov pat pse36 mmx fxsr sse syscall mmxext 3dnowext 3dnow cpuid 3dnowprefetch vmmcall
bugs            : fxsave_leak sysret_ss_attrs
bogomips        : 3978.13
clflush size    : 32
cache_alignment : 32
address sizes   : 34 bits physical, 32 bits virtual
power management: ts

Comment 1 Davide Repetto 2017-08-27 09:07:17 UTC
Something similar may have happened to centos in the past: https://bugs.centos.org/view.php?id=11074

Comment 2 Kai Engert (:kaie) (inactive account) 2017-08-29 16:31:34 UTC
Bob/Daiki, is this a duplicate of other similar bugs you've seen recently?

Comment 3 Daiki Ueno 2017-08-30 08:03:52 UTC
It's likely, but I can't say anything without examining the backtrace and the failing instruction.  Davide, could you try to collect more information as in the other bug 1482798?

Comment 4 Eugene Kanter 2017-09-13 15:37:30 UTC
(gdb) disas
Dump of assembler code for function gcmHash_Update:
   0xb5247a20 <+0>:	sub    $0x3c,%esp
   0xb5247a23 <+3>:	mov    %ebx,0x2c(%esp)
   0xb5247a27 <+7>:	mov    0x48(%esp),%ebx
   0xb5247a2b <+11>:	mov    0x40(%esp),%edx
   0xb5247a2f <+15>:	mov    %esi,0x30(%esp)
   0xb5247a33 <+19>:	mov    %edi,0x34(%esp)
   0xb5247a37 <+23>:	xor    %edi,%edi
   0xb5247a39 <+25>:	lea    0x0(,%ebx,8),%esi
   0xb5247a40 <+32>:	movd   %edi,%xmm0
   0xb5247a44 <+36>:	movd   %esi,%xmm1
   0xb5247a48 <+40>:	mov    0x50(%edx),%esi
   0xb5247a4b <+43>:	punpckldq %xmm0,%xmm1
   0xb5247a4f <+47>:	movq   0x64(%edx),%xmm0
=> 0xb5247a54 <+52>:	paddq  %xmm1,%xmm0
   0xb5247a58 <+56>:	mov    %ebp,0x38(%esp)

Comment 5 Jeff Backus 2017-09-17 15:39:44 UTC
Hi all, any update? Based on Daiki's comment #20 in bug 1482798, there is a patch that may address this? Thanks!

Comment 6 Davide Repetto 2017-10-21 17:26:15 UTC
Problem solved in fc27 with:
nss-softokn-freebl-3.33.0-1.1.fc27.i686
nss-softokn-3.33.0-1.1.fc27.i686


Note You need to log in before you can comment on or make changes to this bug.