Your message dated Tue, 14 Feb 2006 22:27:38 +0300
with message-id <[EMAIL PROTECTED]>
and subject line New upload.
has caused the attached Bug report to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere.  Please contact me immediately.)

Debian bug tracking system administrator
(administrator, Debian Bugs database)

--- Begin Message ---
Package: ysm
Version: 2.9.6-1
Severity: important


How to reproduce :

0. run ysm
1. Enter UIN 0 to register new UIN
2. Press enter for empty proxy
3. Enter password once, and next time to verify
4. Wait a little
5. See CPU usage goes up to 100%

ltrace for this process shows the following :

inet_aton("login.icq.com", 0xbff6115c)                      = 0
gethostbyname("login.icq.com")                              = 0x4113edd0
socket(2, 1, 0)                                             = 3
connect(3, 0xbff61190, 16, 0x4113cae4, 0x80690a8)           = 0
getsockname(3, 0xbff611d0, 0xbff611cc, 0, 0x1000415)        = 0
read(3, "*\001j\223", 6)                                    = 6
read(3, "", 4)                                              = 4
strlen("apulooz")                                           = 7
malloc(10)                                                  = 0x8082a50
rand(10, 0x8068bd0, 5613, 0, 0x8068bd0)                     = 0x6b8b4567
write(3, "*\001\260\363", 10)                               = 10
free(0x8082a50)                                             = <void>
malloc(62)                                                  = 0x8082a60
memset(0x8082a60, '\000', 62)                               = 0x8082a60
strlen("apulooz")                                           = 7
strlen("apulooz")                                           = 7
memcpy(0x8082a8e, "apulooz", 7)                             = 0x8082a8e
strlen("apulooz")                                           = 7
malloc(78)                                                  = 0x8082aa8
memset(0x8082aa8, '\000', 78)                               = 0x8082aa8
time(NULL)                                                  = 1122273726
srand(0x42e489be, 78, 0x8068bd0, 2133, 0xbff61258)          = 0
rand(0x8082ab0, 4, 0x8068bd0, 2133, 0xbff61258)             = 0x193319f8
memcpy(0x8082ab8, "", 62)                                   = 0x8082ab8
write(3, "*\002\260\364", 78)                               = 78
free(0x8082aa8)                                             = <void>
free(0x8082a60)                                             = <void>
read(3, "*\002j\224", 6)                                    = 6
malloc(43)                                                  = 0x8082aa8
memset(0x8082aa8, '\000', 43)                               = 0x8082aa8
read(3, "", 42)                                             = 42
free(0x8082aa8)                                             = <void>
read(3, "*\004j\225", 6)                                    = 6
malloc(1)                                                   = 0x8082a50
memset(0x8082a50, '\000', 1)                                = 0x8082a50
read(3, "", 6)                                              = 0
read(3, "", 6)                                              = 0

(and then it goes into read() ad infinitum)

strace shows the following (195.24.128.65 is our local DNS server) :

socket(PF_INET, SOCK_DGRAM, IPPROTO_IP) = 3
connect(3, {sa_family=AF_INET, sin_port=htons(53), 
sin_addr=inet_addr("195.24.128.65")}, 28) = 0
fcntl64(3, F_GETFL)                     = 0x2 (flags O_RDWR)
fcntl64(3, F_SETFL, O_RDWR|O_NONBLOCK)  = 0
gettimeofday({1122274042, 375519}, NULL) = 0
poll([{fd=3, events=POLLOUT, revents=POLLOUT}], 1, 0) = 1
send(3, "\t\32\1\0\0\1\0\0\0\0\0\0\5login\3icq\3com\0\0\1\0\1", 31, 0) = 31
poll([{fd=3, events=POLLIN, revents=POLLIN}], 1, 5000) = 1
ioctl(3, FIONREAD, [175])               = 0
recvfrom(3, "\t\32\201\200\0\1\0\2\0\2\0\2\5login\3icq\3com\0\0\1\0"..., 1024, 
0, {sa_family=AF_INET, sin_port=htons(53), 
sin_addr=inet_addr("195.24.128.65")}, [16]) = 175
close(3)                                = 0
socket(PF_INET, SOCK_STREAM, IPPROTO_IP) = 3
connect(3, {sa_family=AF_INET, sin_port=htons(5190), 
sin_addr=inet_addr("64.12.200.89")}, 16) = 0
getsockname(3, {sa_family=AF_INET, sin_port=htons(51674), 
sin_addr=inet_addr("62.244.12.189")}, [16]) = 0
read(3, "*\1 \254\0\4", 6)              = 6
read(3, "\0\0\0\1", 4)                  = 4
write(3, "*\1\260\363\0\4\0\0\0\1", 10) = 10
time(NULL)                              = 1122274043
write(3, "*\2\260\364\0H\0\27\0\4\0\0?j\300f\0\1\0:\0\0\0\0(\0\3"..., 78) = 78
read(3, "*\2 \255\0*", 6)               = 6
read(3, "\0\27\0\1\0\0?j\300f\0\5\0!\0\32\0\0\0\0\0\0j\n\0\3\f\210"..., 42) = 42
read(3, "*\4 \256\0\0", 6)              = 6
read(3, "", 6)                          = 0
read(3, "", 6)                          = 0

(and so on, the same)

Please give your software a little more debugging.

-- System Information:
Debian Release: testing/unstable
  APT prefers hoary-updates
  APT policy: (500, 'hoary-updates'), (500, 'hoary-security'), (500, 'hoary'), 
(500, 'unstable'), (1, 'experimental')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.12
Locale: LANG=uk_UA.UTF-8, LC_CTYPE=uk_UA.UTF-8 (charmap=UTF-8)

Versions of packages ysm depends on:
ii  libc6                     2.3.5-1ubuntu3 GNU C Library: Shared libraries an
ii  libreadline4              4.3-15         GNU readline and history libraries

ysm recommends no packages.

-- no debconf information


--- End Message ---
--- Begin Message ---
Package: ysm
Version: 2.9.8-1

Closed all bugs in 2.9.8-1 upload.

Attachment: signature.asc
Description: This is a digitally signed message part


--- End Message ---

Reply via email to