kadmin.local segfault
Steven Miller
stevenraymillerjr at yahoo.com
Tue Feb 19 08:39:57 EST 2008
has anyone been able to figure this out?
thanks!
Steven
Very weird, when running kadmin.local under valgrind,
it does NOT segfault. I am including the valgrind
output.
-------------------------------------------------------
[root at vfkdc01 ~]# valgrind kadmin.local
==9674== Memcheck, a memory error detector.
==9674== Copyright (C) 2002-2005, and GNU GPL'd, by
Julian Seward et al.
==9674== Using LibVEX rev 1575, a library for dynamic
binary translation.
==9674== Copyright (C) 2004-2005, and GNU GPL'd, by
OpenWorks LLP.
==9674== Using valgrind-3.1.1, a dynamic binary
instrumentation framework.
==9674== Copyright (C) 2000-2005, and GNU GPL'd, by
Julian Seward et al.
==9674== For more details, rerun with: -v
==9674==
Authenticating as principal root/admin at FISERVIPO.COM
with password.
kadmin.local: cpw test
Enter password for principal "test":
Re-enter password for principal "test":
==9674== Conditional jump or move depends on
uninitialised value(s)
==9674== at 0x402FC40: cleanup_key_data
(kdb_cpw.c:88)
==9674== by 0x4030CAB: krb5_dbe_def_cpw
(kdb_cpw.c:588)
==9674== by 0x402EB06: krb5_dbe_cpw (kdb5.c:1736)
==9674== by 0x40177A8: kadm5_chpass_principal_3
(svr_principal.c:1328)
==9674== by 0x401743F: kadm5_chpass_principal
(svr_principal.c:1276)
==9674== by 0x804BD27: kadmin_cpw (kadmin.c:831)
==9674== by 0x80516CB: check_request_table
(execute_cmd.c:89)
==9674== by 0x8051738: really_execute_command
(execute_cmd.c:130)
==9674== by 0x8051899: ss_execute_line
(execute_cmd.c:215)
==9674== by 0x8051BB6: ss_listen (listen.c:125)
==9674== by 0x804E57E: main (ss_wrapper.c:62)
==9674==
==9674== Conditional jump or move depends on
uninitialised value(s)
==9674== at 0x402F242: krb5_dbekd_decrypt_key_data
(decrypt_key.c:118)
==9674== by 0x4016F6B: create_history_entry
(svr_principal.c:1007)
==9674== by 0x4017860: kadm5_chpass_principal_3
(svr_principal.c:1364)
==9674== by 0x401743F: kadm5_chpass_principal
(svr_principal.c:1276)
==9674== by 0x804BD27: kadmin_cpw (kadmin.c:831)
==9674== by 0x80516CB: check_request_table
(execute_cmd.c:89)
==9674== by 0x8051738: really_execute_command
(execute_cmd.c:130)
==9674== by 0x8051899: ss_execute_line
(execute_cmd.c:215)
==9674== by 0x8051BB6: ss_listen (listen.c:125)
==9674== by 0x804E57E: main (ss_wrapper.c:62)
==9674==
==9674== Conditional jump or move depends on
uninitialised value(s)
==9674== at 0x402F077: krb5_dbekd_encrypt_key_data
(encrypt_key.c:122)
==9674== by 0x4016FCA: create_history_entry
(svr_principal.c:1014)
==9674== by 0x4017860: kadm5_chpass_principal_3
(svr_principal.c:1364)
==9674== by 0x401743F: kadm5_chpass_principal
(svr_principal.c:1276)
==9674== by 0x804BD27: kadmin_cpw (kadmin.c:831)
==9674== by 0x80516CB: check_request_table
(execute_cmd.c:89)
==9674== by 0x8051738: really_execute_command
(execute_cmd.c:130)
==9674== by 0x8051899: ss_execute_line
(execute_cmd.c:215)
==9674== by 0x8051BB6: ss_listen (listen.c:125)
==9674== by 0x804E57E: main (ss_wrapper.c:62)
==9674==
==9674== Conditional jump or move depends on
uninitialised value(s)
==9674== at 0x427AFF2: krb5_dbe_free_contents
(ldap_principal.c:107)
==9674== by 0x427B199: krb5_ldap_free_principal
(ldap_principal.c:135)
==9674== by 0x402DA89: krb5_db_free_principal
(kdb5.c:928)
==9674== by 0x401AE31: kdb_free_entry
(server_kdb.c:295)
==9674== by 0x4017A52: kadm5_chpass_principal_3
(svr_principal.c:1453)
==9674== by 0x401743F: kadm5_chpass_principal
(svr_principal.c:1276)
==9674== by 0x804BD27: kadmin_cpw (kadmin.c:831)
==9674== by 0x80516CB: check_request_table
(execute_cmd.c:89)
==9674== by 0x8051738: really_execute_command
(execute_cmd.c:130)
==9674== by 0x8051899: ss_execute_line
(execute_cmd.c:215)
==9674== by 0x8051BB6: ss_listen (listen.c:125)
==9674== by 0x804E57E: main (ss_wrapper.c:62)
Password for "test at FISERVIPO.COM" changed.
kadmin.local: quit
==9674==
==9674== ERROR SUMMARY: 4 errors from 4 contexts
(suppressed: 69 from 2)
==9674== malloc/free: in use at exit: 1,441 bytes in
68 blocks.
==9674== malloc/free: 2,280 allocs, 2,212 frees,
348,960 bytes allocated.
==9674== For counts of detected errors, rerun with: -v
==9674== searching for pointers to 68 not-freed
blocks.
==9674== checked 174,336 bytes.
==9674==
==9674== LEAK SUMMARY:
==9674== definitely lost: 733 bytes in 34 blocks.
==9674== possibly lost: 0 bytes in 0 blocks.
==9674== still reachable: 708 bytes in 34 blocks.
==9674== suppressed: 0 bytes in 0 blocks.
==9674== Use --leak-check=full to see details of
leaked memory.
[root at vfkdc01 ~]#
____________________________________________________________________________________
Never miss a thing. Make Yahoo your home page.
http://www.yahoo.com/r/hs
More information about the Kerberos
mailing list