[Bug 585] sshd core dumping on IRIX 6.5.18 with VerifyReverseMapping enabled

bugzilla-daemon at mindrot.org bugzilla-daemon at mindrot.org
Thu Jun 12 02:12:35 EST 2003


http://bugzilla.mindrot.org/show_bug.cgi?id=585





------- Additional Comments From ktaylor at daac.gsfc.nasa.gov  2003-06-12 02:12 -------
Ok. After using the fake-getaddrinfo, sshd is still crashing. Here's the latest
dbx output.

Is there anything else we can look at without resorting to memory debugging?


>  0 realfree(0x10165f80, 0x10151490, 0x10165f60, 0x73706561, 0x73706560,
0x7ffed420, 0x10, 0x0)
["/xlv86/patches/5015/work/irix/lib/libc/libc_n32_M4/gen/malloc.c":527, 0xfb2466c]
   1 cleanfree(0x0, 0x10151490, 0x10165f60, 0x73706561, 0x73706560, 0x7ffed420,
0x10, 0x0)
["/xlv86/patches/5015/work/irix/lib/libc/libc_n32_M4/gen/malloc.c":944, 0xfb24eac]
   2 __malloc(0x260, 0x10151490, 0x10165f60, 0x73706561, 0x73706560, 0x7ffed420,
0x10, 0x0)
["/xlv86/patches/5015/work/irix/lib/libc/libc_n32_M4/gen/malloc.c":230, 0xfb240e0]
   3 _malloc(0x0, 0x10151490, 0x10165f60, 0x73706561, 0x73706560, 0x7ffed420,
0x10, 0x0)
["/xlv86/patches/5015/work/irix/lib/libc/libc_n32_M4/gen/malloc.c":186, 0xfb23f4c]
   4 xmalloc(size = 608)
["/usr/local/src/security/openssh-3.6.1p1/xmalloc.c":28, 0x10065994]
   5 login_alloc_entry(pid = 20692179, username = 0x10151490 = "asdfa", hostname
= 0x10165f60 = "dsl093-055-063.blt1.dsl.spe`keasy.net", line = 0x1014a27c =
"/dev/ttyq25") ["/usr/local/src/security/openssh-3.6.1p1/loginrec.c":325,
0x10048b00]
   6 record_login(pid = 20692179, ttyname = 0x1014a27c = "/dev/ttyq25", user =
0x10151490 = "asdf", uid = ####, host = 0x10165f60 =
"dsl093-055-063.blt1.dsl.spe`keasy.net", addr = 0x7ffed420, addrlen = 16)
["/usr/local/src/security/openssh-3.6.1p1/sshlogin.c":72, 0x1002beb8]
   7 mm_record_login(s = 0x1014a248, pw = 0x1015dc08)
["/usr/local/src/security/openssh-3.6.1p1/monitor.c":1030, 0x10042c84]
   8 mm_answer_pty(socket = 6, m = 0x7ffed510)
["/usr/local/src/security/openssh-3.6.1p1/monitor.c":1080, 0x10042f2c]
   9 monitor_read(pmonitor = 0x101527c0, ent = 0x10137790, pent = (nil))
["/usr/local/src/security/openssh-3.6.1p1/monitor.c":371, 0x10040f54]
   10 monitor_child_postauth(pmonitor = 0x101527c0)
["/usr/local/src/security/openssh-3.6.1p1/monitor.c":334, 0x10040dac]
   11 privsep_postauth(authctxt = 0x101515b0)
["/usr/local/src/security/openssh-3.6.1p1/sshd.c":665, 0x10025f78]
   12 main(ac = 1, av = 0x7ffedf14)
["/usr/local/src/security/openssh-3.6.1p1/sshd.c":1533, 0x10028a88]
   13 __start()
["/xlv55/kudzu-apr12/work/irix/lib/libc/libc_n32_M4/csu/crt1text.s":177, 0x10024a48]



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.




More information about the openssh-bugs mailing list