[Bug 585] sshd core dumping on IRIX 6.5.18 with VerifyReverseMapping enabled

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Tue Jul 15 00:13:21 EST 2003


http://bugzilla.mindrot.org/show_bug.cgi?id=585





------- Additional Comments From ktaylor at daac.gsfc.nasa.gov  2003-07-15 00:13 -------

well, I got a core dump and ran dbx against it and it doesn't look like anything
different to me. The corefile size was significantly larger (28MB vs 3MB for the
other)...so I assume dmalloc was working.

>  0 realfree(0x10152388, 0x101520e8, 0x0, 0x6e686463, 0x6e686460, 0x1,
0x10166968, 0x0)
["/xlv86/patches/5015/work/irix/lib/libc/libc_n32_M4/gen/malloc.c":538, 0xfb24694]
   1 cleanfree(0x0, 0x101520e8, 0x0, 0x6e686463, 0x6e686460, 0x1, 0x10166968,
0x0) ["/xlv86/patches/5015/work/irix/lib/libc/libc_n32_M4/gen/malloc.c":944,
0xfb24eac]
   2 __malloc(0x260, 0x101520e8, 0x0, 0x6e686463, 0x6e686460, 0x1, 0x10166968,
0x0) ["/xlv86/patches/5015/work/irix/lib/libc/libc_n32_M4/gen/malloc.c":230,
0xfb240e0]
   3 _malloc(0x0, 0x101520e8, 0x0, 0x6e686463, 0x6e686460, 0x1, 0x10166968, 0x0)
["/xlv86/patches/5015/work/irix/lib/libc/libc_n32_M4/gen/malloc.c":186, 0xfb23f4c]
   4 xmalloc(size = 608)
["/usr/local/src/security/openssh-3.6.1p1/xmalloc.c":28, 0x10065934]
   5 login_alloc_entry(pid = 77144314, username = 0x101520e8 = "ktaylor",
hostname = 0x10152368 = "66-44-105-44.s806.apx2.lnhd`.md.dialup.rcn.com", line =
0x1014a20c = "/dev/ttyq51")
["/usr/local/src/security/openssh-3.6.1p1/loginrec.c":325, 0x10048aa0]
   6 record_login(pid = 77144314, ttyname = 0x1014a20c = "/dev/ttyq51", user =
0x101520e8 = "ktaylor", uid = ####, host = 0x10152368 =
"66-44-105-44.s806.apx2.lnhd`.md.dialup.rcn.com", addr = 0x7ffed410, addrlen =
16) ["/usr/local/src/security/openssh-3.6.1p1/sshlogin.c":72, 0x1002be58]
   7 mm_record_login(s = 0x1014a1d8, pw = 0x1015dbc8)
["/usr/local/src/security/openssh-3.6.1p1/monitor.c":1030, 0x10042c24]
   8 mm_answer_pty(socket = 7, m = 0x7ffed500)
["/usr/local/src/security/openssh-3.6.1p1/monitor.c":1080, 0x10042ecc]
   9 monitor_read(pmonitor = 0x10152780, ent = 0x10137730, pent = (nil))
["/usr/local/src/security/openssh-3.6.1p1/monitor.c":371, 0x10040ef4]
   10 monitor_child_postauth(pmonitor = 0x10152780)
["/usr/local/src/security/openssh-3.6.1p1/monitor.c":334, 0x10040d4c]
   11 privsep_postauth(authctxt = 0x10151570)
["/usr/local/src/security/openssh-3.6.1p1/sshd.c":665, 0x10025f18]
   12 main(ac = 3, av = 0x7ffedf04)
["/usr/local/src/security/openssh-3.6.1p1/sshd.c":1533, 0x10028a28]
   13 __start()
["/xlv55/kudzu-apr12/work/irix/lib/libc/libc_n32_M4/csu/crt1text.s":177, 0x100249e8]




------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.




More information about the openssh-bugs mailing list