kadmin.local segfault
Steven Miller
stevenraymillerjr at yahoo.com
Tue Feb 19 10:43:10 EST 2008
With all of the testing I've been doing, the scenario
you describe has happened. I've been testing on
multiple machines, so I'm not sure if it's happened on
all of the ones that are failing.
Steven
--- Kenneth Grady <klg at lanl.gov> wrote:
> Have you reloaded an account from a dump? and was
> the policy for that
> account deleted?
>
> Steven Miller wrote:
> > has anyone been able to figure this out?
> >
> > thanks!
> > Steven
> >
> > Very weird, when running kadmin.local under
> valgrind,
> > it does NOT segfault. I am including the valgrind
> > output.
> >
> >
>
-------------------------------------------------------
> >
> > [root at vfkdc01 ~]# valgrind kadmin.local
> > ==9674== Memcheck, a memory error detector.
> > ==9674== Copyright (C) 2002-2005, and GNU GPL'd,
> by
> > Julian Seward et al.
> > ==9674== Using LibVEX rev 1575, a library for
> dynamic
> > binary translation.
> > ==9674== Copyright (C) 2004-2005, and GNU GPL'd,
> by
> > OpenWorks LLP.
> > ==9674== Using valgrind-3.1.1, a dynamic binary
> > instrumentation framework.
> > ==9674== Copyright (C) 2000-2005, and GNU GPL'd,
> by
> > Julian Seward et al.
> > ==9674== For more details, rerun with: -v
> > ==9674==
> > Authenticating as principal
> root/admin at FISERVIPO.COM
> > with password.
> > kadmin.local: cpw test
> > Enter password for principal "test":
> > Re-enter password for principal "test":
> > ==9674== Conditional jump or move depends on
> > uninitialised value(s)
> > ==9674== at 0x402FC40: cleanup_key_data
> > (kdb_cpw.c:88)
> > ==9674== by 0x4030CAB: krb5_dbe_def_cpw
> > (kdb_cpw.c:588)
> > ==9674== by 0x402EB06: krb5_dbe_cpw
> (kdb5.c:1736)
> > ==9674== by 0x40177A8: kadm5_chpass_principal_3
> > (svr_principal.c:1328)
> > ==9674== by 0x401743F: kadm5_chpass_principal
> > (svr_principal.c:1276)
> > ==9674== by 0x804BD27: kadmin_cpw
> (kadmin.c:831)
> > ==9674== by 0x80516CB: check_request_table
> > (execute_cmd.c:89)
> > ==9674== by 0x8051738: really_execute_command
> > (execute_cmd.c:130)
> > ==9674== by 0x8051899: ss_execute_line
> > (execute_cmd.c:215)
> > ==9674== by 0x8051BB6: ss_listen (listen.c:125)
> > ==9674== by 0x804E57E: main (ss_wrapper.c:62)
> > ==9674==
> > ==9674== Conditional jump or move depends on
> > uninitialised value(s)
> > ==9674== at 0x402F242:
> krb5_dbekd_decrypt_key_data
> > (decrypt_key.c:118)
> > ==9674== by 0x4016F6B: create_history_entry
> > (svr_principal.c:1007)
> > ==9674== by 0x4017860: kadm5_chpass_principal_3
> > (svr_principal.c:1364)
> > ==9674== by 0x401743F: kadm5_chpass_principal
> > (svr_principal.c:1276)
> > ==9674== by 0x804BD27: kadmin_cpw
> (kadmin.c:831)
> > ==9674== by 0x80516CB: check_request_table
> > (execute_cmd.c:89)
> > ==9674== by 0x8051738: really_execute_command
> > (execute_cmd.c:130)
> > ==9674== by 0x8051899: ss_execute_line
> > (execute_cmd.c:215)
> > ==9674== by 0x8051BB6: ss_listen (listen.c:125)
> > ==9674== by 0x804E57E: main (ss_wrapper.c:62)
> > ==9674==
> > ==9674== Conditional jump or move depends on
> > uninitialised value(s)
> > ==9674== at 0x402F077:
> krb5_dbekd_encrypt_key_data
> > (encrypt_key.c:122)
> > ==9674== by 0x4016FCA: create_history_entry
> > (svr_principal.c:1014)
> > ==9674== by 0x4017860: kadm5_chpass_principal_3
> > (svr_principal.c:1364)
> > ==9674== by 0x401743F: kadm5_chpass_principal
> > (svr_principal.c:1276)
> > ==9674== by 0x804BD27: kadmin_cpw
> (kadmin.c:831)
> > ==9674== by 0x80516CB: check_request_table
> > (execute_cmd.c:89)
> > ==9674== by 0x8051738: really_execute_command
> > (execute_cmd.c:130)
> > ==9674== by 0x8051899: ss_execute_line
> > (execute_cmd.c:215)
> > ==9674== by 0x8051BB6: ss_listen (listen.c:125)
> > ==9674== by 0x804E57E: main (ss_wrapper.c:62)
> > ==9674==
> > ==9674== Conditional jump or move depends on
> > uninitialised value(s)
> > ==9674== at 0x427AFF2: krb5_dbe_free_contents
> > (ldap_principal.c:107)
> > ==9674== by 0x427B199: krb5_ldap_free_principal
> > (ldap_principal.c:135)
> > ==9674== by 0x402DA89: krb5_db_free_principal
> > (kdb5.c:928)
> > ==9674== by 0x401AE31: kdb_free_entry
> > (server_kdb.c:295)
> > ==9674== by 0x4017A52: kadm5_chpass_principal_3
> > (svr_principal.c:1453)
> > ==9674== by 0x401743F: kadm5_chpass_principal
> > (svr_principal.c:1276)
> > ==9674== by 0x804BD27: kadmin_cpw
> (kadmin.c:831)
> > ==9674== by 0x80516CB: check_request_table
> > (execute_cmd.c:89)
> > ==9674== by 0x8051738: really_execute_command
> > (execute_cmd.c:130)
> > ==9674== by 0x8051899: ss_execute_line
> > (execute_cmd.c:215)
> > ==9674== by 0x8051BB6: ss_listen (listen.c:125)
> > ==9674== by 0x804E57E: main (ss_wrapper.c:62)
> > Password for "test at FISERVIPO.COM" changed.
> > kadmin.local: quit
> > ==9674==
> > ==9674== ERROR SUMMARY: 4 errors from 4 contexts
> > (suppressed: 69 from 2)
> > ==9674== malloc/free: in use at exit: 1,441 bytes
> in
> > 68 blocks.
> > ==9674== malloc/free: 2,280 allocs, 2,212 frees,
> > 348,960 bytes allocated.
> > ==9674== For counts of detected errors, rerun
> with: -v
> > ==9674== searching for pointers to 68 not-freed
> > blocks.
> > ==9674== checked 174,336 bytes.
> > ==9674==
> > ==9674== LEAK SUMMARY:
> > ==9674== definitely lost: 733 bytes in 34
> blocks.
> > ==9674== possibly lost: 0 bytes in 0 blocks.
> > ==9674== still reachable: 708 bytes in 34
> blocks.
> > ==9674== suppressed: 0 bytes in 0 blocks.
> > ==9674== Use --leak-check=full to see details of
> > leaked memory.
> > [root at vfkdc01 ~]#
> >
> >
> >
> >
> >
> >
> >
>
____________________________________________________________________________________
> > Never miss a thing. Make Yahoo your home page.
> > http://www.yahoo.com/r/hs
> > ________________________________________________
> > Kerberos mailing list Kerberos at mit.edu
> > https://mailman.mit.edu/mailman/listinfo/kerberos
> >
>
____________________________________________________________________________________
Looking for last minute shopping deals?
Find them fast with Yahoo! Search. http://tools.search.yahoo.com/newsearch/category.php?category=shopping
More information about the Kerberos
mailing list