Hello,

We have been having problems with FreeRadius (v0.7) crashing, and have
been able to get this: 

Program received signal SIGSEGV, Segmentation fault.
[Switching to Thread 97376 (LWP 10438)]
0x402c0064 in krb5_locate_srv_conf () from /usr/lib/libkrb5.so.3
(gdb) where
#0  0x402c0064 in krb5_locate_srv_conf () from /usr/lib/libkrb5.so.3
#1  0x402c076c in krb5_locate_kdc () from /usr/lib/libkrb5.so.3
#2  0x402c17a8 in krb5_sendto_kdc () from /usr/lib/libkrb5.so.3
#3  0x402abecb in krb5_get_renewed_creds () from /usr/lib/libkrb5.so.3
#4  0x402ad0e0 in krb5_get_init_creds () from /usr/lib/libkrb5.so.3
#5  0x402ad99b in krb5_get_init_creds_password () from
/usr/lib/libkrb5.so.3
#6  0x402e2f17 in pam_sm_authenticate () from /lib/security/pam_krb5.so
#7  0x401c7a36 in pam_fail_delay () from /lib/libpam.so.0
#8  0x401c7ce4 in _pam_dispatch () from /lib/libpam.so.0
#9  0x401c95ce in pam_authenticate () from /lib/libpam.so.0
#10 0x40024ded in pam_pass (name=0x815d45c "korffeez", passwd=0x816043c
"garfy1", pamauth=0x80b7df8 "radiusd") at rlm_pam.c:189
#11 0x40024f28 in pam_auth (instance=0x80b7e98, request=0x4050e8f8) at
rlm_pam.c:259
#12 0x0805589e in module_post_auth ()
#13 0x080559f8 in modcall ()
#14 0x080558ef in module_post_auth ()
#15 0x080559b3 in modcall ()
#16 0x080551c6 in find_module_instance ()
#17 0x0805552e in module_authenticate ()
#18 0x08051e2a in rad_check_password ()
#19 0x0805211e in rad_authenticate ()
#20 0x0804d75c in rad_respond ()
#21 0x08057200 in radius_xlat ()
#22 0x400880ba in pthread_start_thread () from /lib/libpthread.so.0
#23 0x40088101 in pthread_start_thread_event () from
/lib/libpthread.so.0
(gdb) up 10
#10 0x40024ded in pam_pass (name=0x815d45c "korffeez", passwd=0x816043c
"garfy1", pamauth=0x80b7df8 "radiusd") at rlm_pam.c:189
189         retval = pam_authenticate(pamh, 0);
(gdb) up
#11 0x40024f28 in pam_auth (instance=0x80b7e98, request=0x4050e8f8) at
rlm_pam.c:259
259             r = pam_pass((char *)request->username->strvalue,
(gdb) p *request
$1 = {packet = 0x40563b48, proxy = 0x0, reply = 0x405336f0, proxy_reply
= 0x0, config_items = 0x8185910, username = 0x815d420, 
  password = 0x8160400, secret = "sMArt.49!", '\0' <repeats 22 times>,
child_pid = 97376, timestamp = 1029990802, number = 2927, 
  proxysecret = '\0' <repeats 31 times>, proxy_is_replicate = 0,
proxy_try_count = 0, proxy_next_try = 0, simul_max = 0, 
  simul_count = 0, simul_mpp = 0, finished = 0, options = 0, container =
0x40537280}
(gdb) p request->username
$2 = (VALUE_PAIR *) 0x815d420
(gdb) p *request->username
$3 = {name = "Stripped-User-Name", '\0' <repeats 21 times>, attribute =
1043, type = 0, length = 8, lvalue = 0, 
  operator = T_OP_EQ, strvalue = "korffeez", '\0' <repeats 245 times>,
flags = {addport = 0 '\0', has_tag = 0 '\0', tag = 0 '\0', 
    encrypt = 0 '\0', len_disp = 0 '\0', do_xlat = 0 '\0'}, next =
0x81857c8}
(gdb) bt

Is there any info above that is useful, if not, how can I get more info?
Any ideas?

Also can someone please tell if malloc() and relloc() are thread safe?

Regards
Allister Maguire

-
List info/subscribe/unsubscribe? See http://www.freeradius.org/list/users.html

Reply via email to