AW: received signal SIGSEGV, Segmentation fault. malloc_consolidate (av=0x7ffff5e2de80) at malloc.c:5196

Hachmer, Tobias Tobias.Hachmer at stadt-frankfurt.de
Thu Dec 12 08:32:21 CET 2013


Hello Arran,

thanks for the answer.

-----Ursprüngliche Nachricht-----
Von: freeradius-users-bounces+tobias.hachmer=stadt-frankfurt.de at lists.freeradius.org [mailto:freeradius-users-bounces+tobias.hachmer=stadt-frankfurt.de at lists.freeradius.org] Im Auftrag von Arran Cudbard-Bell
Gesendet: Mittwoch, 11. Dezember 2013 15:26
An: FreeRadius users mailing list
Betreff: Re: received signal SIGSEGV, Segmentation fault. malloc_consolidate (av=0x7ffff5e2de80) at malloc.c:5196

> *sigh* probably memory corruption could you run it under valgrind and see if there's any useful info?
Complete output of valgrind is about 10000 lines. It's hard to me to find out which lines are the useful ones but I give it a try. See at the end of this post.

> Also when you build your RPMs could you make sure to pass --enable-developer to turn off optimization so we don't get all those <value optimized out> messages.
I have built a new package with this configure parameter but there are still optimized out messages.

This SIGSEGV signal only comes if the Auth-Type is Kerberos. Running radius and there are only requests which perform ldap auths all is running fine.

Again the BT:
rad_recv: Access-Request packet from host 127.0.0.1 port 57314, id=37, length=103
        User-Name = 'hachmer'
        User-Password = 'pass'
        NAS-IP-Address = 127.0.0.1
        NAS-Port = 0
        Message-Authenticator = 0x73022b83754542e2627e6cda51d690d8
(2) # Executing section authorize from file /etc/raddb/sites-enabled/default
(2)   authorize {
(2)   filter_username filter_username {
(2)    ? if (User-Name != "%{tolower:%{User-Name}}") 

Program received signal SIGSEGV, Segmentation fault.
0x00007ffff5b15285 in malloc_consolidate () from /lib64/libc.so.6
Missing separate debuginfos, use: debuginfo-install freeradius-3.0.1-6.el6.x86_64
(gdb) bt
#0  0x00007ffff5b15285 in malloc_consolidate () from /lib64/libc.so.6
#1  0x00007ffff5b18405 in _int_malloc () from /lib64/libc.so.6
#2  0x00007ffff5b19991 in malloc () from /lib64/libc.so.6
#3  0x00007ffff715163f in _talloc_array () from /usr/lib64/libtalloc.so.2
#4  0x00007ffff7bceb25 in xlat_aprint (ctx=0xa35b80, request=0xa35b80, node=0xa39dc0, escape=0, escape_ctx=0x0, lvl=0) at src/main/xlat.c:1895
#5  0x00007ffff7bcf6f1 in xlat_process (out=0x7fffffffc508, request=0xa35b80, head=<value optimized out>, escape=0, escape_ctx=0x0) at src/main/xlat.c:1976
#6  0x00007ffff7bcf9ac in xlat_expand (out=0x7fffffffc690, outlen=0, request=0xa35b80, fmt=0x82dff0 "%{tolower:%{User-Name}}", escape=0, escape_ctx=0x0) at src/main/xlat.c:2068
#7  0x00007ffff7bcb328 in radius_expand_tmpl (out=0x7fffffffc690, request=0xa35b80, vpt=<value optimized out>) at src/main/evaluate.c:108
#8  0x00007ffff7bcb9d8 in radius_evaluate_map (request=0xa35b80, modreturn=<value optimized out>, depth=<value optimized out>, c=0x82dc60) at src/main/evaluate.c:424
#9  0x00007ffff7bcc131 in radius_evaluate_cond (request=0xa35b80, modreturn=10, depth=0, c=<value optimized out>) at src/main/evaluate.c:597
#10 0x000000000041e56b in modcall_recurse (request=0xa35b80, component=RLM_COMPONENT_AUTZ, depth=2, entry=0x7fffffffd800) at src/main/modcall.c:480
#11 0x000000000041f9f4 in modcall_child (request=<value optimized out>, component=RLM_COMPONENT_AUTZ, depth=2, entry=0x7fffffffd7e8, c=0xa1adb0, result=0x7fffffffd1dc) at src/main/modcall.c:414
#12 0x000000000041e3a7 in modcall_recurse (request=0xa35b80, component=RLM_COMPONENT_AUTZ, depth=1, entry=0x7fffffffd7e8) at src/main/modcall.c:780
#13 0x000000000041f9f4 in modcall_child (request=<value optimized out>, component=RLM_COMPONENT_AUTZ, depth=1, entry=0x7fffffffd7d0, c=0xa1ad30, result=0x7fffffffd78c) at src/main/modcall.c:414
#14 0x000000000041e3a7 in modcall_recurse (request=0xa35b80, component=RLM_COMPONENT_AUTZ, depth=0, entry=0x7fffffffd7d0) at src/main/modcall.c:780
#15 0x000000000041f91d in modcall (component=<value optimized out>, c=<value optimized out>, request=<value optimized out>) at src/main/modcall.c:1036
#16 0x000000000041a8a3 in indexed_modcall (comp=RLM_COMPONENT_AUTZ, idx=0, request=0xa35b80) at src/main/modules.c:747
#17 0x000000000040cb52 in rad_authenticate (request=0xa35b80) at src/main/auth.c:409
#18 0x000000000042a96c in request_running (request=0xa35b80, action=1) at src/main/process.c:1211
#19 0x000000000042a4dd in request_queue_or_run (request=0xa35b80, process=0x42a830 <request_running>) at src/main/process.c:851
#20 0x000000000042c7c1 in request_receive (listener=0xa337a0, packet=0x8827e0, client=0x81a370, fun=0x40c8f0 <rad_authenticate>) at src/main/process.c:1414
#21 0x0000000000417624 in auth_socket_recv (listener=0xa337a0) at src/main/listen.c:1509
#22 0x0000000000426e6a in event_socket_handler (xel=<value optimized out>, fd=<value optimized out>, ctx=0xa337a0) at src/main/process.c:3499
#23 0x00007ffff79ac35b in fr_event_loop (el=0xa1de60) at src/lib/event.c:417
#24 0x0000000000420294 in main (argc=<value optimized out>, argv=<value optimized out>) at src/main/radiusd.c:479

Valgrind:
==1937== Memcheck, a memory error detector
==1937== Copyright (C) 2002-2012, and GNU GPL'd, by Julian Seward et al.
==1937== Using Valgrind-3.8.1 and LibVEX; rerun with -h for copyright info
==1937== Command: radiusd -Xm
==1937== 
radiusd: FreeRADIUS Version 3.0.1 (git #fafc5f6), for host x86_64-redhat-linux-gnu, built on Dec 12 2013 at 07:10:43
...
Sending Access-Accept of id 164 from 127.0.0.1 port 1812 to 127.0.0.1 port 40209
        Idle-Timeout = 300
        Session-Timeout = 3600
        Xylan-Access-Priv = Xylan-Read-Priv
        Xylan-Access-Priv = Xylan-Write-Priv
        Xylan-Access-Priv = Xylan-Admin-Priv
        Xylan-Acce-Priv-F-W1 = 0xffffffff
        Xylan-Acce-Priv-F-W2 = 0xffffffff
        Xylan-Nms-Group = 'Default'
        NS-Admin-Privilege = Root-Admin
        NS-NSM-User-Domain-Name = 'global'
        NS-NSM-User-Role-Mapping = 'global:System Administrator'
        Aruba-User-Role = 'root'
        Aruba-Priv-Admin-User = 1
        Juniper-Junosspace-Profile = 'readwrite'
        Service-Type = Administrative-User
==1937== Syscall param sendmsg(msg.msg_control) points to uninitialised byte(s)
==1937==    at 0x6750D30: __sendmsg_nocancel (in /lib64/libpthread-2.12.so)
==1937==    by 0x506A18C: sendfromto (udpfromto.c:391)
==1937==    by 0x50672AD: rad_send (radius.c:283)
==1937==    by 0x412E1D: auth_socket_send (listen.c:1271)
==1937==    by 0x42AA3E: request_running (process.c:1154)
==1937==    by 0x42A4DC: request_queue_or_run (process.c:851)
==1937==    by 0x42C7C0: request_receive (process.c:1414)
==1937==    by 0x417623: auth_socket_recv (listen.c:1509)
==1937==    by 0x426E69: event_socket_handler (process.c:3499)
==1937==    by 0x506F35A: fr_event_loop (event.c:417)
==1937==    by 0x420293: main (radiusd.c:479)
==1937==  Address 0x7fefffc4c is on thread 1's stack
==1937== 
(0) Finished request 0.
...
(1) krb5 : Using client principal "hachmer at EXAMPLE.COM"
==1937== Invalid read of size 1
==1937==    at 0x6E2112C: vfprintf (in /lib64/libc-2.12.so)
==1937==    by 0x6E486D9: vasprintf (in /lib64/libc-2.12.so)
==1937==    by 0x6E28647: asprintf (in /lib64/libc-2.12.so)
==1937==    by 0x7839591: k5_plugin_register_dyn (in /lib64/libkrb5.so.3.3)
==1937==    by 0x783AD97: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x783BCF9: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782AFC5: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782B908: krb5_init_creds_init (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782D806: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782F6A7: krb5_get_init_creds_password (in /lib64/libkrb5.so.3.3)
==1937==    by 0xD02771E: krb5_auth (rlm_krb5.c:518)
==1937==    by 0x41E709: modcall_recurse (modcall.c:311)
==1937==  Address 0x908a9b0 is 0 bytes inside a block of size 24 free'd
==1937==    at 0x4C273F0: free (vg_replace_malloc.c:446)
==1937==    by 0x7830B2D: krb5_free_context (in /lib64/libkrb5.so.3.3)
==1937==    by 0xD0274BD: krb5_auth (rlm_krb5.c:569)
==1937==    by 0x41E709: modcall_recurse (modcall.c:311)
==1937==    by 0x41F9F3: modcall_child (modcall.c:414)
==1937==    by 0x41E3A6: modcall_recurse (modcall.c:780)
==1937==    by 0x41F91C: modcall (modcall.c:1036)
==1937==    by 0x41A8A2: indexed_modcall (modules.c:747)
==1937==    by 0x40CFD0: rad_authenticate (auth.c:252)
==1937==    by 0x42A96B: request_running (process.c:1211)
==1937==    by 0x42A4DC: request_queue_or_run (process.c:851)
==1937==    by 0x42C7C0: request_receive (process.c:1414)
==1937== 
==1937== Invalid read of size 1
==1937==    at 0x4C2B008: mempcpy (mc_replace_strmem.c:1267)
==1937==    by 0x6E4D95D: _IO_default_xsputn (in /lib64/libc-2.12.so)
==1937==    by 0x6E2148F: vfprintf (in /lib64/libc-2.12.so)
==1937==    by 0x6E486D9: vasprintf (in /lib64/libc-2.12.so)
==1937==    by 0x6E28647: asprintf (in /lib64/libc-2.12.so)
==1937==    by 0x7839591: k5_plugin_register_dyn (in /lib64/libkrb5.so.3.3)
==1937==    by 0x783AD97: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x783BCF9: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782AFC5: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782B908: krb5_init_creds_init (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782D806: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782F6A7: krb5_get_init_creds_password (in /lib64/libkrb5.so.3.3)
==1937==  Address 0x908a9c6 is 22 bytes inside a block of size 24 free'd
==1937==    at 0x4C273F0: free (vg_replace_malloc.c:446)
==1937==    by 0x7830B2D: krb5_free_context (in /lib64/libkrb5.so.3.3)
==1937==    by 0xD0274BD: krb5_auth (rlm_krb5.c:569)
==1937==    by 0x41E709: modcall_recurse (modcall.c:311)
==1937==    by 0x41F9F3: modcall_child (modcall.c:414)
==1937==    by 0x41E3A6: modcall_recurse (modcall.c:780)
==1937==    by 0x41F91C: modcall (modcall.c:1036)
==1937==    by 0x41A8A2: indexed_modcall (modules.c:747)
==1937==    by 0x40CFD0: rad_authenticate (auth.c:252)
==1937==    by 0x42A96B: request_running (process.c:1211)
==1937==    by 0x42A4DC: request_queue_or_run (process.c:851)
==1937==    by 0x42C7C0: request_receive (process.c:1414)
==1937== 
==1937== Invalid read of size 1
==1937==    at 0x4C2B01B: mempcpy (mc_replace_strmem.c:1267)
==1937==    by 0x6E4D95D: _IO_default_xsputn (in /lib64/libc-2.12.so)
==1937==    by 0x6E2148F: vfprintf (in /lib64/libc-2.12.so)
==1937==    by 0x6E486D9: vasprintf (in /lib64/libc-2.12.so)
==1937==    by 0x6E28647: asprintf (in /lib64/libc-2.12.so)
==1937==    by 0x7839591: k5_plugin_register_dyn (in /lib64/libkrb5.so.3.3)
==1937==    by 0x783AD97: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x783BCF9: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782AFC5: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782B908: krb5_init_creds_init (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782D806: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782F6A7: krb5_get_init_creds_password (in /lib64/libkrb5.so.3.3)
==1937==  Address 0x908a9c4 is 20 bytes inside a block of size 24 free'd
==1937==    at 0x4C273F0: free (vg_replace_malloc.c:446)
==1937==    by 0x7830B2D: krb5_free_context (in /lib64/libkrb5.so.3.3)
==1937==    by 0xD0274BD: krb5_auth (rlm_krb5.c:569)
==1937==    by 0x41E709: modcall_recurse (modcall.c:311)
==1937==    by 0x41F9F3: modcall_child (modcall.c:414)
==1937==    by 0x41E3A6: modcall_recurse (modcall.c:780)
==1937==    by 0x41F91C: modcall (modcall.c:1036)
==1937==    by 0x41A8A2: indexed_modcall (modules.c:747)
==1937==    by 0x40CFD0: rad_authenticate (auth.c:252)
==1937==    by 0x42A96B: request_running (process.c:1211)
==1937==    by 0x42A4DC: request_queue_or_run (process.c:851)
==1937==    by 0x42C7C0: request_receive (process.c:1414)
==1937== 
(1) krb5 : Successfully retrieved and decrypted TGT
==1937== Invalid free() / delete / delete[] / realloc()
==1937==    at 0x4C273F0: free (vg_replace_malloc.c:446)
==1937==    by 0x7830B2D: krb5_free_context (in /lib64/libkrb5.so.3.3)
==1937==    by 0xD0274BD: krb5_auth (rlm_krb5.c:569)
==1937==    by 0x41E709: modcall_recurse (modcall.c:311)
==1937==    by 0x41F9F3: modcall_child (modcall.c:414)
==1937==    by 0x41E3A6: modcall_recurse (modcall.c:780)
==1937==    by 0x41F91C: modcall (modcall.c:1036)
==1937==    by 0x41A8A2: indexed_modcall (modules.c:747)
==1937==    by 0x40CFD0: rad_authenticate (auth.c:252)
==1937==    by 0x42A96B: request_running (process.c:1211)
==1937==    by 0x42A4DC: request_queue_or_run (process.c:851)
==1937==    by 0x42C7C0: request_receive (process.c:1414)
==1937==  Address 0x908a9b0 is 0 bytes inside a block of size 24 free'd
==1937==    at 0x4C273F0: free (vg_replace_malloc.c:446)
==1937==    by 0x7830B2D: krb5_free_context (in /lib64/libkrb5.so.3.3)
==1937==    by 0xD0274BD: krb5_auth (rlm_krb5.c:569)
==1937==    by 0x41E709: modcall_recurse (modcall.c:311)
==1937==    by 0x41F9F3: modcall_child (modcall.c:414)
==1937==    by 0x41E3A6: modcall_recurse (modcall.c:780)
==1937==    by 0x41F91C: modcall (modcall.c:1036)
==1937==    by 0x41A8A2: indexed_modcall (modules.c:747)
==1937==    by 0x40CFD0: rad_authenticate (auth.c:252)
==1937==    by 0x42A96B: request_running (process.c:1211)
==1937==    by 0x42A4DC: request_queue_or_run (process.c:851)
==1937==    by 0x42C7C0: request_receive (process.c:1414)
==1937== 
(1)   [krb5] = ok
...
(4) krb5 : Using client principal "hachmer at EXAMPLE.COM"
==1937== Invalid read of size 1
==1937==    at 0x4C2B050: mempcpy (mc_replace_strmem.c:1267)
==1937==    by 0x6E4D95D: _IO_default_xsputn (in /lib64/libc-2.12.so)
==1937==    by 0x6E2148F: vfprintf (in /lib64/libc-2.12.so)
==1937==    by 0x6E486D9: vasprintf (in /lib64/libc-2.12.so)
==1937==    by 0x6E28647: asprintf (in /lib64/libc-2.12.so)
==1937==    by 0x7839591: k5_plugin_register_dyn (in /lib64/libkrb5.so.3.3)
==1937==    by 0x783AD97: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x783BCF9: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782AFC5: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782B908: krb5_init_creds_init (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782D806: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782F6A7: krb5_get_init_creds_password (in /lib64/libkrb5.so.3.3)
==1937==  Address 0x908a9b0 is 0 bytes inside a block of size 24 free'd
==1937==    at 0x4C273F0: free (vg_replace_malloc.c:446)
==1937==    by 0x7830B2D: krb5_free_context (in /lib64/libkrb5.so.3.3)
==1937==    by 0xD0274BD: krb5_auth (rlm_krb5.c:569)
==1937==    by 0x41E709: modcall_recurse (modcall.c:311)
==1937==    by 0x41F9F3: modcall_child (modcall.c:414)
==1937==    by 0x41E3A6: modcall_recurse (modcall.c:780)
==1937==    by 0x41F91C: modcall (modcall.c:1036)
==1937==    by 0x41A8A2: indexed_modcall (modules.c:747)
==1937==    by 0x40CFD0: rad_authenticate (auth.c:252)
==1937==    by 0x42A96B: request_running (process.c:1211)
==1937==    by 0x42A4DC: request_queue_or_run (process.c:851)
==1937==    by 0x42C7C0: request_receive (process.c:1414)
==1937== 
==1937== Invalid read of size 1
==1937==    at 0x4C2B063: mempcpy (mc_replace_strmem.c:1267)
==1937==    by 0x6E4D95D: _IO_default_xsputn (in /lib64/libc-2.12.so)
==1937==    by 0x6E2148F: vfprintf (in /lib64/libc-2.12.so)
==1937==    by 0x6E486D9: vasprintf (in /lib64/libc-2.12.so)
==1937==    by 0x6E28647: asprintf (in /lib64/libc-2.12.so)
==1937==    by 0x7839591: k5_plugin_register_dyn (in /lib64/libkrb5.so.3.3)
==1937==    by 0x783AD97: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x783BCF9: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782AFC5: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782B908: krb5_init_creds_init (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782D806: ??? (in /lib64/libkrb5.so.3.3)
==1937==    by 0x782F6A7: krb5_get_init_creds_password (in /lib64/libkrb5.so.3.3)
==1937==  Address 0x908a9b2 is 2 bytes inside a block of size 24 free'd
==1937==    at 0x4C273F0: free (vg_replace_malloc.c:446)
==1937==    by 0x7830B2D: krb5_free_context (in /lib64/libkrb5.so.3.3)
==1937==    by 0xD0274BD: krb5_auth (rlm_krb5.c:569)
==1937==    by 0x41E709: modcall_recurse (modcall.c:311)
==1937==    by 0x41F9F3: modcall_child (modcall.c:414)
==1937==    by 0x41E3A6: modcall_recurse (modcall.c:780)
==1937==    by 0x41F91C: modcall (modcall.c:1036)
==1937==    by 0x41A8A2: indexed_modcall (modules.c:747)
==1937==    by 0x40CFD0: rad_authenticate (auth.c:252)
==1937==    by 0x42A96B: request_running (process.c:1211)
==1937==    by 0x42A4DC: request_queue_or_run (process.c:851)
==1937==    by 0x42C7C0: request_receive (process.c:1414)
==1937== 
(4) krb5 : Successfully retrieved and decrypted TGT
(4)   [krb5] = ok
...
^CSignalled to terminate
Exiting normally.
(7) Cleaning up request packet ID 43 with timestamp +181
==1937== Invalid read of size 8
==1937==    at 0x5067C58: rbtree_walk (rbtree.c:716)
==1937==    by 0x42D2B7: radius_event_free (process.c:4204)
==1937==    by 0x4202FC: main (radiusd.c:519)
==1937==  Address 0xfeb6f98 is 8 bytes inside a block of size 40 free'd
==1937==    at 0x4C273F0: free (vg_replace_malloc.c:446)
==1937==    by 0x5067B19: rbtree_delete_internal (rbtree.c:481)
==1937==    by 0x506E024: fr_packet_list_yank (packet.c:554)
==1937==    by 0x429499: request_done (process.c:500)
==1937==    by 0x42A023: request_hash_cb (process.c:4165)
==1937==    by 0x5067C87: rbtree_walk (rbtree.c:700)
==1937==    by 0x42D2B7: radius_event_free (process.c:4204)
==1937==    by 0x4202FC: main (radiusd.c:519)
==1937== 
==1937== Invalid read of size 8
==1937==    at 0x5067CB9: rbtree_walk (rbtree.c:720)
==1937==    by 0x42D2B7: radius_event_free (process.c:4204)
==1937==    by 0x4202FC: main (radiusd.c:519)
==1937==  Address 0xfeb6fa0 is 16 bytes inside a block of size 40 free'd
==1937==    at 0x4C273F0: free (vg_replace_malloc.c:446)
==1937==    by 0x5067B19: rbtree_delete_internal (rbtree.c:481)
==1937==    by 0x506E024: fr_packet_list_yank (packet.c:554)
==1937==    by 0x429499: request_done (process.c:500)
==1937==    by 0x42A023: request_hash_cb (process.c:4165)
==1937==    by 0x5067C87: rbtree_walk (rbtree.c:700)
==1937==    by 0x42D2B7: radius_event_free (process.c:4204)
==1937==    by 0x4202FC: main (radiusd.c:519)
==1937== 
==1937== Invalid free() / delete / delete[] / realloc()
==1937==    at 0x4C273F0: free (vg_replace_malloc.c:446)
==1937==    by 0x7830B2D: krb5_free_context (in /lib64/libkrb5.so.3.3)
==1937==    by 0xD027993: krb5_detach (rlm_krb5.c:117)
==1937==    by 0x58B95A3: ??? (in /usr/lib64/libtalloc.so.2.0.7)
==1937==    by 0x58B9322: ??? (in /usr/lib64/libtalloc.so.2.0.7)
==1937==    by 0x5067E7C: FreeWalker (rbtree.c:76)
==1937==    by 0x5067E5C: FreeWalker (rbtree.c:73)
==1937==    by 0x5067E5C: FreeWalker (rbtree.c:73)
==1937==    by 0x5067E5C: FreeWalker (rbtree.c:73)
==1937==    by 0x5067E6D: FreeWalker (rbtree.c:74)
==1937==    by 0x5067E6D: FreeWalker (rbtree.c:74)
==1937==    by 0x5067E5C: FreeWalker (rbtree.c:73)
==1937==  Address 0x908a9b0 is 0 bytes inside a block of size 24 free'd
==1937==    at 0x4C273F0: free (vg_replace_malloc.c:446)
==1937==    by 0x7830B2D: krb5_free_context (in /lib64/libkrb5.so.3.3)
==1937==    by 0xD0274BD: krb5_auth (rlm_krb5.c:569)
==1937==    by 0x41E709: modcall_recurse (modcall.c:311)
==1937==    by 0x41F9F3: modcall_child (modcall.c:414)
==1937==    by 0x41E3A6: modcall_recurse (modcall.c:780)
==1937==    by 0x41F91C: modcall (modcall.c:1036)
==1937==    by 0x41A8A2: indexed_modcall (modules.c:747)
==1937==    by 0x40CFD0: rad_authenticate (auth.c:252)
==1937==    by 0x42A96B: request_running (process.c:1211)
==1937==    by 0x42A4DC: request_queue_or_run (process.c:851)
==1937==    by 0x42C7C0: request_receive (process.c:1414)
==1937== 
rlm_ldap (ldap): Removing connection pool
rlm_ldap (ldap): Closing connection (8)
rlm_ldap (ldap): Closing connection (7)
rlm_ldap (ldap): Closing connection (6)
rlm_ldap (ldap): Closing connection (4)
ASSERT FAILED src/main/connection.c[451]: this->in_use == false
==1937== 
==1937== HEAP SUMMARY:
==1937==     in use at exit: 2,757,485 bytes in 36,430 blocks
==1937==   total heap usage: 296,722 allocs, 260,300 frees, 34,697,818 bytes allocated
==1937==
...
==1937== 117 (40 direct, 77 indirect) bytes in 1 blocks are definitely lost in loss record 665 of 1,396
==1937==    at 0x4C279EE: malloc (vg_replace_malloc.c:270)
==1937==    by 0x7821C8A: krb5_build_principal_alloc_va (in /lib64/libkrb5.so.3.3)
==1937==    by 0x7821DBE: krb5_build_principal (in /lib64/libkrb5.so.3.3)
==1937==    by 0x785BD14: krb5_sname_to_principal (in /lib64/libkrb5.so.3.3)
==1937==    by 0xD027A6E: krb5_instantiate (rlm_krb5.c:195)
==1937==    by 0x41B0ED: find_module_instance (modules.c:620)
==1937==    by 0x41C393: setup_modules (modules.c:1608)
==1937==    by 0x419BC9: read_mainconfig (mainconfig.c:944)
==1937==    by 0x41FFE1: main (radiusd.c:315)
...
==1937== LEAK SUMMARY:
==1937==    definitely lost: 67 bytes in 2 blocks
==1937==    indirectly lost: 77 bytes in 4 blocks
==1937==      possibly lost: 651,755 bytes in 5,191 blocks
==1937==    still reachable: 2,105,586 bytes in 31,233 blocks
==1937==         suppressed: 0 bytes in 0 blocks
==1937== Reachable blocks (those to which a pointer was found) are not shown.
==1937== To see them, rerun with: --leak-check=full --show-reachable=yes
==1937== 
==1937== For counts of detected and suppressed errors, rerun with: -v
==1937== Use --track-origins=yes to see where uninitialised values come from
==1937== ERROR SUMMARY: 993 errors from 640 contexts (suppressed: 144 from 9)
==1937== could not unlink /tmp/vgdb-pipe-from-vgdb-to-1937-by-root-on-radius-test
==1937== could not unlink /tmp/vgdb-pipe-to-vgdb-from-1937-by-root-on-radius-test
==1937== could not unlink /tmp/vgdb-pipe-shared-mem-vgdb-1937-by-root-on-radius-test
Aborted

Regards,
Tobias Hachmer


More information about the Freeradius-Users mailing list