It is an application's responsibility to call sigaction to ignore
SIGPIPE.  You can do that with the following code:

    #include <signal.h>

    struct sigaction sigact;
    sigact.sa_handler = SIG_IGN;
    sigemptyset(&sigact.sa_mask);
    sigact.sa_flags = 0;
    sigaction(SIGPIPE, &sigact, NULL);

But your stack trace shows that NSPR should have been
initialized at that point.  (The SSL_GetStatistics,
NSSSSL_VersionCheck functions in the call stacks can't
be trusted because you're using a release/optimized build
of NSS.)  So NSPR's initialization function should have
called sigaction to ignore SIGPIPE.  I don't know why
SIGPIPE isn't being ignored.

In any case, it is worth a try for your app to call sigaction
to ignore SIGPIPE using the code snippet I showed above.

Wan-Teh
-- 
dev-tech-crypto mailing list
dev-tech-crypto@lists.mozilla.org
https://lists.mozilla.org/listinfo/dev-tech-crypto

Reply via email to