tags 448589 moreinfo
thanks

On Sat, Nov 03, 2007 at 02:16:40PM +0100, Florian Weimer wrote:
> * Tobias Frost:
> 
> > heres the last lines of the strace, reading of the password removed.
> >
> > stat64(".", {st_mode=S_IFDIR|0755, st_size=4096, ...}) = 0
> > read(7, [EMAIL PROTECTED]'s password:
> > (some lines removed)
> > stat64("./sbin", {st_mode=S_IFDIR|0755, st_size=4096, ...}) = 0
> > umask(0)                                = 022
> > umask(022)                              = 0
> > write(6, "\0", 1)                       = 1
> > stat64("./sbin", {st_mode=S_IFDIR|0755, st_size=4096, ...}) = 0
> > read(7, Segmentation fault
> > "", 1)                          = 0
> > --- SIGCHLD (Child exited) @ 0 (0) ---
> > read(7, "", 1)                          = 0
> > close(7)                                = 0
> > waitpid(10650, [{WIFEXITED(s) && WEXITSTATUS(s) == 139}], 0) = 10650
> > exit_group(1)                           = ?
> > Process 10649 detached
> 
> Can you post a GDB stack trace?  You should be able to obtain this by
> attaching gdb to the scp child process (with "gdb /usr/bin/scp PID")
> while ssh prompts for the password.

Or even telling strace to follow child processes (since it's the
underlying ssh process that's segfaulting, not scp itself) as well as
turning on scp's own debugging might help:

  strace -f scp -vvv -r [EMAIL PROTECTED]:/sbin .

Thanks,

-- 
Colin Watson                                       [EMAIL PROTECTED]



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to