[Bug 3666] sshd crash
bugzilla-daemon at mindrot.org
bugzilla-daemon at mindrot.org
Mon Feb 12 18:13:01 AEDT 2024
https://bugzilla.mindrot.org/show_bug.cgi?id=3666
--- Comment #6 from Pawan Badganchi <pawan.badganchi at kpit.com> ---
(In reply to Darren Tucker from comment #4)
> (In reply to Pawan Badganchi from comment #3)
> > > > What makes you think this is a crash?
> > >
> > We are checking post test crash for openssh, so there this issue is
> > observed.
>
> What do you mean by "check post test crash"? Is there a core dump?
> If so, can you get a backtrace? ("gdb /path/to/sshd
> /path/to/coredump" the "bt").
Please find the backtrace below.
(gdb) bt full
#0 0x0000ffffb5aa3c50 in __GI___libc_write (fd=3,
buf=buf at entry=0xffffd89e5fe8, nbytes=36) at
../sysdeps/unix/sysv/linux/write.c:26
_x2tmp = 36
_x0tmp = 3
_x0 = -27
_x2 = 36
_x8 = 64
_x1tmp = 281474316001256
_x1 = 281474316001256
_sys_result = <optimized out>
_sys_result = <optimized out>
_x0tmp = <optimized out>
_x0 = <optimized out>
sc_ret = <optimized out>
_sys_result = <optimized out>
_sys_result = <optimized out>
_x1tmp = <optimized out>
_x1 = <optimized out>
sc_cancel_oldtype = <optimized out>
_x2tmp = <optimized out>
_x2 = <optimized out>
_x8 = <optimized out>
#1 0x0000aaaad4054dc4 in do_log (level=level at entry=SYSLOG_LEVEL_FATAL,
fmt=<optimized out>, args=...) at log.c:467
msgbuf = "mm_log_handler: write: Broken
pipe\r\n\000\000\000\000\360`\236\330\377\377\000\000\354\235\242\265\377\377\000\000\\`\236\330\377\377\000\000\300c\236\330\377\377\000\000\060.000\377\000\000\360a\236\330\377\377\000\000\000\000\000\000\000\000\000\000\060\000\000\000.\000\000\000\060\000\000\000\060\000\000\000\060\000\000\000\377\377\000\000\350\377\377\377\200\377\377\377",
'\000' <repeats 42 times>, "\060r\225\333t\272\342\230\357\006", '\000'
<repeats 43 times>...
fmtbuf = "mm_log_handler: write: Broken
pipe\000\377\001\000\000\000\377\377\377\377\377\377\377\377`t\236\330\377\377\000\000
\000\000\000\000\000\000\000\063\000\000\000\000\000\000\000\n\000\000\000\377\377\000\000u\000\000\000\000\000\000\000
\000\000\000\203#\024", '\000' <repeats 25 times>,
"\030\004\260\265\377\377\000\000\220d\236\330\377\377\000\000\000j\236\330\377\377\000\000\030\343\244\265\377\377\000\000Pk\236\330\377\377\000\000\377\003\000\000\000\000\000\000\257q\b\324\252\252\000\000\240k\236\330\377\377\000\000x\330\a\324\252\252\000\000\002\000\000\000\000\000\000\000"...
txt = <optimized out>
pri = <optimized out>
saved_errno = <optimized out>
tmp_handler = <optimized out>
#2 0x0000aaaad405313c in fatal (fmt=<optimized out>) at fatal.c:42
args = {__stack = 0xffffd89e6970, __gr_top = 0xffffd89e6970,
__vr_top = 0xffffd89e6930, __gr_offs = -56, __vr_offs = -128}
#3 0x0000aaaad4036bfc in mm_log_handler
(level=level at entry=SYSLOG_LEVEL_INFO, msg=msg at entry=0xffffd89e6df8
"Connection closed by authenticating user root UNKNOWN port 65535",
ctx=<optimized out>)
at monitor_wrap.c:101
log_msg = 0xaaab05c77c10
mon = <optimized out>
r = <optimized out>
len = <optimized out>
__func__ = "mm_log_handler"
#4 0x0000aaaad4054cc8 in do_log (level=level at entry=SYSLOG_LEVEL_INFO,
fmt=<optimized out>, args=...) at log.c:462
msgbuf = "Connection closed by authenticating user root UNKNOWN
port
65535\000\000\000\000\000\000\000\000\060w\346\265\377\377\000\000\000\220\f\324\252\252\000\000\254\222\f\324\252\252\000\000\a\000\000\000\000\000\000\000\220j\236\330\377\377\000\000\234\352\003\324\001\000\000\000\060\024\307\005\253\252\000\000\230\237\f\324\252\252\000\000\240j\236\330\377\377\000\000\350\064\245\265\377\377\000\000\b#\307\005\253\252\000\000\310L\005\324\252\252\000\000
k\236\330\377\377\000\000\340\315\243\265\377\377\000\000&\000\000\000\000\000\000\000\360p\236\330\377\377\000\000"...
fmtbuf = "Connection closed by authenticating user root UNKNOWN
port 65535\000c delay 0.000ms", '\000' <repeats 16 times>,
"\001\000\000\000\000\000\000\000\000p\342\265\377\377\000\000mm_request_receive
entering\000q\353 )\221\333\033G\307\311\303\270\026BY\351q\353
*\221\333\033G\307\311\303\270\340n\236\330\377\377\000\000d\006\320\265\377\377\000\000\350S\307\005\253\252\000\000\b\000\000\000\000\000\000\000"...
txt = <optimized out>
pri = <optimized out>
saved_errno = <optimized out>
tmp_handler = 0xaaaad4036b58 <mm_log_handler>
--Type <RET> for more, q to quit, c to continue without paging--
#5 0x0000aaaad4054f78 in logdie (fmt=<optimized out>) at log.c:191
args = {__stack = 0xffffd89e7380, __gr_top = 0xffffd89e7380,
__vr_top = 0xffffd89e7340, __gr_offs = -56, __vr_offs = -128}
#6 0x0000aaaad4058634 in sshpkt_vfatal (ssh=ssh at entry=0xaaab05c77e50,
r=-52, fmt=fmt at entry=0xaaaad407a38c "%s", ap=...) at packet.c:1860
tag = 0x0
remote_id = "authenticating user root UNKNOWN port
65535\000\253\252\000\000\260\217\307\005\253\252\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000<\000\000\000\000\000\000\000\000\200\f\324\252\252\000\000P~\307\005\253\252\000\000\020\000\000\000\000\000\000\000\360t\236\330\377\377\000\000\244\264\245\265\377\377\000\000\b\000\000\000\000\000\000\000(z\264\265\377\377\000\000\020o\346\265\377\377\000\000\340*\001\000\000\000\000\000
\225\307\005\253\252\000\000\000\000\000\000\000\000\000\000\331\265\a\324\252\252\000\000\332/\b\324\252\252\000\000\000\200\a\324\252\252\000\000T\311\a\324\252\252\000\000"...
oerrno = 1
__func__ = "sshpkt_vfatal"
#7 0x0000aaaad40587bc in sshpkt_fatal (ssh=ssh at entry=0xaaab05c77e50,
r=<optimized out>, fmt=fmt at entry=0xaaaad407a38c "%s") at packet.c:1908
ap = {__stack = 0xffffd89e7730, __gr_top = 0xffffd89e7730,
__vr_top = 0xffffd89e7700, __gr_offs = -40, __vr_offs = -128}
#8 0x0000aaaad405ce40 in ssh_dispatch_run_fatal
(ssh=ssh at entry=0xaaab05c77e50, mode=mode at entry=0,
done=done at entry=0xaaab05c76be0) at dispatch.c:134
r = <optimized out>
__func__ = "ssh_dispatch_run_fatal"
#9 0x0000aaaad4029bf0 in do_authentication2 (ssh=0xaaab05c77e50) at
auth2.c:178
authctxt = 0xaaab05c76be0
#10 0x0000aaaad401ea50 in main (ac=<optimized out>, av=<optimized out>)
at sshd.c:2200
ssh = 0xaaab05c77e50
r = <optimized out>
opt = <optimized out>
on = 1
already_daemon = <optimized out>
remote_port = 65535
sock_in = <optimized out>
sock_out = <optimized out>
newsock = <optimized out>
remote_ip = 0xaaab05c76f50 "UNKNOWN"
rdomain = <optimized out>
fp = <optimized out>
line = <optimized out>
laddr = <optimized out>
logfile = <optimized out>
config_s = {-1, -1}
i = <optimized out>
j = <optimized out>
ibytes = 281470681743560
obytes = 187651416129664
new_umask = <optimized out>
key = 0xaaab05c59900
pubkey = 0xaaab05c6cab0
keytype = <optimized out>
authctxt = 0xaaab05c76be0
connection_info = <optimized out>
__func__ = "main"
(gdb)
--
You are receiving this mail because:
You are watching the assignee of the bug.
You are watching someone on the CC list of the bug.
More information about the openssh-bugs
mailing list