VALGRIND: Major impact on authentication!

Guilherme Franco guilhermefranco at gmail.com
Thu Feb 8 04:54:29 CET 2007


Hi,

I did run "valgrind radiusd -xxx" at Wed Feb 7 19:15:08 2007 and at
Wed Feb 7 20:59:04 2007 radiusd DIED.

Afterwards, "service radius restart" would not work and of lots of
"Error: Internal error processing module entry", "Error:
rlm_sql_oracle: fetch failed in sql_fetch_row: ORA-24338: statement
handle not executed", and "Error: rlm_sql (sql): failed after
re-connect" appeared.

I've just disabled accounting in the NAS and then "service radiusd
start" worked.

Last messages (I have the entire log, 70MB, if you want):

Wed Feb 7 20:59:04 2007 : Debug: radius_xlat: 'UPDATE radacct SET
AcctStopTime = TO_DATE('2007-02-07 20:56:41','yyyy-mm-dd hh24:mi:ss'),
AcctSessionTime = '0', AcctInputOctets = '0', AcctOutputOctets = '0',
AcctTerminateCause = 'User-Request', AcctStopDelay = '21',
ConnectInfo_stop = '' WHERE AcctSessionId = 'erx GigabitEthernet
11/0.109:2109:0021188786' AND UserName = 'fiba at foobar.com' AND
NASIPAddress = '10.10.1.2' AND AcctStopTime IS NULL'

Wed Feb 7 20:59:04 2007 : Debug: rlm_sql (sql): Reserving sql socket id: 19

00000000 65746D6F 6F632E6C 72622E6D 4E412027 44432044 49544953 31203D20 444E4120

00000000 50545320 45504F47 203D2052 20275327 20444E41 4C425453 4555514F 3D204F49

00000000 274E2720 44524F20 42205245 64692059 00000000 00000000 202068E0 00000000

00000000 04A238D4 00000000 63726573 65746D6F 6F632E6C 72622E6D 04A238DF 00000000

00000000 72677265 2E70756F 00000000 00000000 203D2065 67646172 70756F72 6C706572

00000000 72472E79 4E70756F 20206320 00000000

Argument/Register addr=be20748. Dump of memory from 0x00BE20708 to 0x00BE20848

00000000 0BE20748 00000000 00000000 00000000 00000000 00000000

00000000 00000000 00000000 00000080 00000000 00000078 00000000 00000000 00000000

00000000 00000000 00000000 0BE207C0 00000000 0BE28C78 00000000 0BE29950 00000000

00000000 0BE2A838 00000000 0BEAFAD8 00000000 00000000 00000000 00000000 00000000

00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

00000000 00000078 00000000 000077C8 00000000 00000000 00000000 00000000 00000000

00000000 F8E9DACB 00000105 00000000 00000000 0BE207C0 00000000 00008048 00000000

00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

00000000 0BE28648 00000000 00000000 00000000 00000000 00000000 0BE28738 00000000

00000000 00000000 00000000 0BE26CE0 00000000 00000000 00000000 0BE20DB8 00000000

00000000 00000000 00000000

Argument/Register addr=4e936d0. Dump of memory from 0x004E93690 to 0x004E937D0

00000000 36353433 2E393837 203A5F2D 0000002F

00000000 00000000 00000000 00000000 00000000 00000078 00000000 00000038 00000000

00000000 00000000 00000000 00000000 00000000 006C7173 00000000 00000000 00000000

00000000 00000000 00000000 00000038 00000000 00000150 00000000 00000000 00000000

00000000 00000000 00000000 006C7173 00000000 00000000 00000000 00000000 00000000

00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000 00000000

Repeat 4 times

00000000 00000000 00000000 00000000 00000000

Argument/Register addr=4e91e9a. Dump of memory from 0x004E91E5A to 0x004E91F9A

00000000 20444E41 49534443

00000000 3D204954 41203120 5320444E 4F475054 20524550 5327203D 4E412027 54532044

00000000 514F4C42 4F494555 27203D20 4F20274E 52454452 20594220 00006469 00000000

00000000 00000000 00000000 00000000 00000000 000000D0 00000000 00000098 00000000

00000000 00000000 00000000 00000000 00000000 454C4553 69205443 73552C64 614E7265

00000000 412C656D 69727474 65747562 6C61562C 6F2C6575 52462070 72204D4F 65726461

00000000 20796C70 52454857 73552045 616E7265 3D20656D 7B252720 2D4C5153 72657355

00000000 6D614E2D 20277D65 4544524F 59422052 00646920 00000000 00000000 00000000

00000000 00000000 00000000 00000098 00000000 00000138 00000000 00000000 00000000

00000000 00000000 00000000 454C4553 72205443 72676461 6370756F 6B636568 2C64692E

00000000 67646172 70756F72 63656863 72472E6B 4E70756F 2C656D61 67646172

Argument/Register addr=20206270. Dump of memory from 0x020206230 to 0x020206370

00000000 44432044 49544953 31203D20 444E4120

00000000 50545320 45504F47 203D2052 20275327 20444E41 4C425453 4555514F 3D204F49

00000000 274E2720 44524F20 42205245 64692059 00000000 00000000 202068E0 00000000

00000000 04A238D4 00000000 63726573 65746D6F 6F632E6C 72622E6D 04A238DF 00000000

00000000 72677265 2E70756F 00000000 00000000 203D2065 67646172 70756F72 6C706572

00000000 72472E79 4E70756F 20206320 00000000 0FB0B12C 32310000 FFFFFFFF FFFFFFFF

00000000 0FB0B12C 00000000 0FB0B12C 00000000 20206440 00000000 04A238D4 00000000

00000000 00000006 00000000 0FBADC38 00000000 0FB0B12C 00000000 7185CFB9 00000039

00000000 FBAD8001 00000000 0FB0B12C 00000000 0FB0B12C 00000000 0FB0B12C 00000000

00000000 0FB0B12C 00000000 0FB0B137 00000000 FFFFFFFF FFFFFFFF 0FB0B12C 00000000

00000000 FFFFFFFF FFFFFFFF 00000000 00000000



----- End of Call Stack Trace -----

==30772==

==30772== Invalid write of size 1

==30772== at 0x5E82AD0: kpuhhrsp (in
/usr/local/instantclient_10_2/libclntsh.so.10.1)

==30772== by 0x5E918FA: kpuexResPrefRows (in
/usr/local/instantclient_10_2/libclntsh.so.10.1)

==30772== by 0x5E9791F: kpuexecv8 (in
/usr/local/instantclient_10_2/libclntsh.so.10.1)

==30772== by 0x5E946C2: kpuexec (in
/usr/local/instantclient_10_2/libclntsh.so.10.1)

==30772== by 0x5F44B0A: OCIStmtExecute (in
/usr/local/instantclient_10_2/libclntsh.so.10.1)

==30772== by 0x5A6B4FA: sql_select_query (sql_oracle.c:301)

==30772== by 0x59670BA: rlm_sql_select_query (sql.c:538)

==30772== by 0x5967195: sql_getvpdata (sql.c:583)

==30772== by 0x5965690: rlm_sql_authorize (rlm_sql.c:759)

==30772== by 0x40D172: modcall (in /usr/local/sbin/radiusd)

==30772== by 0x40D710: (within /usr/local/sbin/radiusd)

==30772== by 0x40D2B6: modcall (in /usr/local/sbin/radiusd)

==30772== Address 0x0 is not stack'd, malloc'd or (recently) free'd

==30772==

==30772== Process terminating with default action of signal 11 (SIGSEGV)

==30772== Access not within mapped region at address 0x0

==30772== at 0x5E82AD0: kpuhhrsp (in
/usr/local/instantclient_10_2/libclntsh.so.10.1)

==30772== by 0x5E918FA: kpuexResPrefRows (in
/usr/local/instantclient_10_2/libclntsh.so.10.1)

==30772== by 0x5E9791F: kpuexecv8 (in
/usr/local/instantclient_10_2/libclntsh.so.10.1)

==30772== by 0x5E946C2: kpuexec (in
/usr/local/instantclient_10_2/libclntsh.so.10.1)

==30772== by 0x5F44B0A: OCIStmtExecute (in
/usr/local/instantclient_10_2/libclntsh.so.10.1)

==30772== by 0x5A6B4FA: sql_select_query (sql_oracle.c:301)

==30772== by 0x59670BA: rlm_sql_select_query (sql.c:538)

==30772== by 0x5967195: sql_getvpdata (sql.c:583)

==30772== by 0x5965690: rlm_sql_authorize (rlm_sql.c:759)

==30772== by 0x40D172: modcall (in /usr/local/sbin/radiusd)

==30772== by 0x40D710: (within /usr/local/sbin/radiusd)

==30772== by 0x40D2B6: modcall (in /usr/local/sbin/radiusd)

==30772==

==30772== ERROR SUMMARY: 129640 errors from 286 contexts (suppressed: 7 from 2)

==30772== malloc/free: in use at exit: 9,108,522 bytes in 39,502 blocks.

==30772== malloc/free: 683,099 allocs, 643,597 frees, 151,100,648
bytes allocated.

==30772== For counts of detected errors, rerun with: -v

==30772== searching for pointers to 39,502 not-freed blocks.


Thanks!



More information about the Freeradius-Users mailing list