received signal SIGSEGV, Segmentation fault. malloc_consolidate (av=0x7ffff5e2de80) at malloc.c:5196

Hachmer, Tobias Tobias.Hachmer at stadt-frankfurt.de
Wed Dec 11 15:00:28 CET 2013


Hello,

I'm testing kerberos authentication with the workaround from yesterday (https://github.com/FreeRADIUS/freeradius-server/commit/ea887a2ab7308a6f612da45d8e75e27b390e6795).
After 2-3 authentication tests radiusd get a SIGSEGV.

OS: CentOS 6.5 x86_64
FR built today from v3.0.x branch

BT:
rad_recv: Access-Request packet from host 127.0.0.1 port 55082, id=14, length=103
        User-Name = 'hachmer'
        User-Password = 'pw'
        NAS-IP-Address = 127.0.0.1
        NAS-Port = 0
        Message-Authenticator = 0x64454c20cfa4534882ca622de7e32c0e
(2) # Executing section authorize from file /etc/raddb/sites-enabled/default
(2)   authorize {
(2)   filter_username filter_username {
(2)    ? if (User-Name != "%{tolower:%{User-Name}}")

Program received signal SIGSEGV, Segmentation fault.
malloc_consolidate (av=0x7ffff5e2de80) at malloc.c:5196
5196              nextsize = chunksize(nextchunk);
Missing separate debuginfos, use: debuginfo-install ncurses-libs-5.7-3.20090208.el6.x86_64 pcre-7.8-6.el6.x86_64 sqlite-3.6.20-1.el6.x86_64
(gdb) bt
#0  malloc_consolidate (av=0x7ffff5e2de80) at malloc.c:5196
#1  0x00007ffff5b17405 in _int_malloc (av=0x7ffff5e2de80, bytes=<value optimized out>) at malloc.c:4406
#2  0x00007ffff5b18991 in __libc_malloc (bytes=1104) at malloc.c:3664
#3  0x00007ffff715063f in __talloc (ctx=<value optimized out>, el_size=<value optimized out>, count=<value optimized out>, name=<value optimized out>) at ../talloc.c:560
#4  _talloc_named_const (ctx=<value optimized out>, el_size=<value optimized out>, count=<value optimized out>, name=<value optimized out>) at ../talloc.c:669
#5  _talloc_array (ctx=<value optimized out>, el_size=<value optimized out>, count=<value optimized out>, name=<value optimized out>) at ../talloc.c:2217
#6  0x00007ffff7bcf0f4 in xlat_aprint (ctx=0xa16a40, request=0xa16a40, node=0x913af0, escape=0, escape_ctx=0x0, lvl=0) at src/main/xlat.c:1895
#7  0x00007ffff7bcfcd1 in xlat_process (out=0x7fffffffc1b8, request=0xa16a40, head=<value optimized out>, escape=0, escape_ctx=0x0) at src/main/xlat.c:1976
#8  0x00007ffff7bcff8c in xlat_expand (out=0x7fffffffc2c0, outlen=0, request=0xa16a40, fmt=0x81c0c0 "%{tolower:%{User-Name}}", escape=0, escape_ctx=0x0) at src/main/xlat.c:2068
#9  0x00007ffff7bcb7e8 in radius_expand_tmpl (out=0x7fffffffc2c0, request=0xa16a40, vpt=<value optimized out>) at src/main/evaluate.c:108
#10 0x00007ffff7bcbfd8 in radius_evaluate_map (request=0xa16a40, modreturn=<value optimized out>, depth=<value optimized out>, c=0x81bd30) at src/main/evaluate.c:424
#11 0x00007ffff7bcc5b1 in radius_evaluate_cond (request=0xa16a40, modreturn=10, depth=0, c=<value optimized out>) at src/main/evaluate.c:597
#12 0x000000000041ed3b in modcall_recurse (request=0xa16a40, component=RLM_COMPONENT_AUTZ, depth=2, entry=0x7fffffffd3d0) at src/main/modcall.c:480
#13 0x00000000004201d4 in modcall_child (request=<value optimized out>, component=RLM_COMPONENT_AUTZ, depth=2, entry=0x7fffffffd3b8, c=0xa026a0, result=0x7fffffffc9ec) at src/main/modcall.c:414
#14 0x000000000041eb5f in modcall_recurse (request=0xa16a40, component=RLM_COMPONENT_AUTZ, depth=1, entry=0x7fffffffd3b8) at src/main/modcall.c:780
#15 0x00000000004201d4 in modcall_child (request=<value optimized out>, component=RLM_COMPONENT_AUTZ, depth=1, entry=0x7fffffffd3a0, c=0xa02620, result=0x7fffffffcf4c) at src/main/modcall.c:414
#16 0x000000000041eb5f in modcall_recurse (request=0xa16a40, component=RLM_COMPONENT_AUTZ, depth=0, entry=0x7fffffffd3a0) at src/main/modcall.c:780
#17 0x00000000004200fd in modcall (component=<value optimized out>, c=<value optimized out>, request=<value optimized out>) at src/main/modcall.c:1036
#18 0x000000000041af93 in indexed_modcall (comp=RLM_COMPONENT_AUTZ, idx=0, request=0xa16a40) at src/main/modules.c:747
#19 0x000000000040cc42 in rad_authenticate (request=0xa16a40) at src/main/auth.c:409
#20 0x000000000042b41c in request_running (request=0xa16a40, action=1) at src/main/process.c:1210
#21 0x000000000042af4d in request_queue_or_run (request=0xa16a40, process=0x42b2e0 <request_running>) at src/main/process.c:850
#22 0x000000000042d2b0 in request_receive (listener=0xa131f0, packet=0x8fe710, client=0x8110a0, fun=0x40c9b0 <rad_authenticate>) at src/main/process.c:1409
#23 0x00000000004158b3 in auth_socket_recv (listener=0xa131f0) at src/main/listen.c:1509
#24 0x000000000042777b in event_socket_handler (xel=<value optimized out>, fd=<value optimized out>, ctx=0xa131f0) at src/main/process.c:3494
#25 0x00007ffff79abcbb in fr_event_loop (el=0xa05770) at src/lib/event.c:417
#26 0x0000000000420b14 in main (argc=<value optimized out>, argv=<value optimized out>) at src/main/radiusd.c:479

Thanks in advance,
Tobias Hachmer
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20131211/b2d10f64/attachment-0001.html>


More information about the Freeradius-Users mailing list