[29295] in Kerberos

home help back first fref pref prev next nref lref last post

Re: kadmin.local segfault

daemon@ATHENA.MIT.EDU (Steven Miller)
Tue Feb 19 10:44:13 2008

Date: Tue, 19 Feb 2008 07:43:10 -0800 (PST)
From: Steven Miller <stevenraymillerjr@yahoo.com>
To: kerberos@mit.edu
In-Reply-To: <47BAE797.9080302@lanl.gov>
MIME-Version: 1.0
Message-ID: <244738.10937.qm@web38512.mail.mud.yahoo.com>
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Errors-To: kerberos-bounces@mit.edu

With all of the testing I've been doing, the scenario
you describe has happened. I've been testing on
multiple machines, so I'm not sure if it's happened on
all of the ones that are failing.

Steven

--- Kenneth Grady <klg@lanl.gov> wrote:

> Have you reloaded an account from a dump? and was
> the policy for that
> account deleted?
> 
> Steven Miller wrote:
> > has anyone been able to figure this out?
> >
> > thanks!
> > Steven
> >
> > Very weird, when running kadmin.local under
> valgrind,
> > it does NOT segfault. I am including the valgrind
> > output.
> >
> >
>
-------------------------------------------------------
> >
> > [root@vfkdc01 ~]# valgrind kadmin.local
> > ==9674== Memcheck, a memory error detector.
> > ==9674== Copyright (C) 2002-2005, and GNU GPL'd,
> by
> > Julian Seward et al.
> > ==9674== Using LibVEX rev 1575, a library for
> dynamic
> > binary translation.
> > ==9674== Copyright (C) 2004-2005, and GNU GPL'd,
> by
> > OpenWorks LLP.
> > ==9674== Using valgrind-3.1.1, a dynamic binary
> > instrumentation framework.
> > ==9674== Copyright (C) 2000-2005, and GNU GPL'd,
> by
> > Julian Seward et al.
> > ==9674== For more details, rerun with: -v
> > ==9674==
> > Authenticating as principal
> root/admin@FISERVIPO.COM
> > with password.
> > kadmin.local:  cpw test
> > Enter password for principal "test":
> > Re-enter password for principal "test":
> > ==9674== Conditional jump or move depends on
> > uninitialised value(s)
> > ==9674==    at 0x402FC40: cleanup_key_data
> > (kdb_cpw.c:88)
> > ==9674==    by 0x4030CAB: krb5_dbe_def_cpw
> > (kdb_cpw.c:588)
> > ==9674==    by 0x402EB06: krb5_dbe_cpw
> (kdb5.c:1736)
> > ==9674==    by 0x40177A8: kadm5_chpass_principal_3
> > (svr_principal.c:1328)
> > ==9674==    by 0x401743F: kadm5_chpass_principal
> > (svr_principal.c:1276)
> > ==9674==    by 0x804BD27: kadmin_cpw
> (kadmin.c:831)
> > ==9674==    by 0x80516CB: check_request_table
> > (execute_cmd.c:89)
> > ==9674==    by 0x8051738: really_execute_command
> > (execute_cmd.c:130)
> > ==9674==    by 0x8051899: ss_execute_line
> > (execute_cmd.c:215)
> > ==9674==    by 0x8051BB6: ss_listen (listen.c:125)
> > ==9674==    by 0x804E57E: main (ss_wrapper.c:62)
> > ==9674==
> > ==9674== Conditional jump or move depends on
> > uninitialised value(s)
> > ==9674==    at 0x402F242:
> krb5_dbekd_decrypt_key_data
> > (decrypt_key.c:118)
> > ==9674==    by 0x4016F6B: create_history_entry
> > (svr_principal.c:1007)
> > ==9674==    by 0x4017860: kadm5_chpass_principal_3
> > (svr_principal.c:1364)
> > ==9674==    by 0x401743F: kadm5_chpass_principal
> > (svr_principal.c:1276)
> > ==9674==    by 0x804BD27: kadmin_cpw
> (kadmin.c:831)
> > ==9674==    by 0x80516CB: check_request_table
> > (execute_cmd.c:89)
> > ==9674==    by 0x8051738: really_execute_command
> > (execute_cmd.c:130)
> > ==9674==    by 0x8051899: ss_execute_line
> > (execute_cmd.c:215)
> > ==9674==    by 0x8051BB6: ss_listen (listen.c:125)
> > ==9674==    by 0x804E57E: main (ss_wrapper.c:62)
> > ==9674==
> > ==9674== Conditional jump or move depends on
> > uninitialised value(s)
> > ==9674==    at 0x402F077:
> krb5_dbekd_encrypt_key_data
> > (encrypt_key.c:122)
> > ==9674==    by 0x4016FCA: create_history_entry
> > (svr_principal.c:1014)
> > ==9674==    by 0x4017860: kadm5_chpass_principal_3
> > (svr_principal.c:1364)
> > ==9674==    by 0x401743F: kadm5_chpass_principal
> > (svr_principal.c:1276)
> > ==9674==    by 0x804BD27: kadmin_cpw
> (kadmin.c:831)
> > ==9674==    by 0x80516CB: check_request_table
> > (execute_cmd.c:89)
> > ==9674==    by 0x8051738: really_execute_command
> > (execute_cmd.c:130)
> > ==9674==    by 0x8051899: ss_execute_line
> > (execute_cmd.c:215)
> > ==9674==    by 0x8051BB6: ss_listen (listen.c:125)
> > ==9674==    by 0x804E57E: main (ss_wrapper.c:62)
> > ==9674==
> > ==9674== Conditional jump or move depends on
> > uninitialised value(s)
> > ==9674==    at 0x427AFF2: krb5_dbe_free_contents
> > (ldap_principal.c:107)
> > ==9674==    by 0x427B199: krb5_ldap_free_principal
> > (ldap_principal.c:135)
> > ==9674==    by 0x402DA89: krb5_db_free_principal
> > (kdb5.c:928)
> > ==9674==    by 0x401AE31: kdb_free_entry
> > (server_kdb.c:295)
> > ==9674==    by 0x4017A52: kadm5_chpass_principal_3
> > (svr_principal.c:1453)
> > ==9674==    by 0x401743F: kadm5_chpass_principal
> > (svr_principal.c:1276)
> > ==9674==    by 0x804BD27: kadmin_cpw
> (kadmin.c:831)
> > ==9674==    by 0x80516CB: check_request_table
> > (execute_cmd.c:89)
> > ==9674==    by 0x8051738: really_execute_command
> > (execute_cmd.c:130)
> > ==9674==    by 0x8051899: ss_execute_line
> > (execute_cmd.c:215)
> > ==9674==    by 0x8051BB6: ss_listen (listen.c:125)
> > ==9674==    by 0x804E57E: main (ss_wrapper.c:62)
> > Password for "test@FISERVIPO.COM" changed.
> > kadmin.local:  quit
> > ==9674==
> > ==9674== ERROR SUMMARY: 4 errors from 4 contexts
> > (suppressed: 69 from 2)
> > ==9674== malloc/free: in use at exit: 1,441 bytes
> in
> > 68 blocks.
> > ==9674== malloc/free: 2,280 allocs, 2,212 frees,
> > 348,960 bytes allocated.
> > ==9674== For counts of detected errors, rerun
> with: -v
> > ==9674== searching for pointers to 68 not-freed
> > blocks.
> > ==9674== checked 174,336 bytes.
> > ==9674==
> > ==9674== LEAK SUMMARY:
> > ==9674==    definitely lost: 733 bytes in 34
> blocks.
> > ==9674==      possibly lost: 0 bytes in 0 blocks.
> > ==9674==    still reachable: 708 bytes in 34
> blocks.
> > ==9674==         suppressed: 0 bytes in 0 blocks.
> > ==9674== Use --leak-check=full to see details of
> > leaked memory.
> > [root@vfkdc01 ~]#
> >
> >
> >
> >     
> >
> >
> >      
>
____________________________________________________________________________________
> > Never miss a thing.  Make Yahoo your home page. 
> > http://www.yahoo.com/r/hs
> > ________________________________________________
> > Kerberos mailing list           Kerberos@mit.edu
> > https://mailman.mit.edu/mailman/listinfo/kerberos
> >   
> 



      ____________________________________________________________________________________
Looking for last minute shopping deals?  
Find them fast with Yahoo! Search.  http://tools.search.yahoo.com/newsearch/category.php?category=shopping
________________________________________________
Kerberos mailing list           Kerberos@mit.edu
https://mailman.mit.edu/mailman/listinfo/kerberos

home help back first fref pref prev next nref lref last post