[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
Re: segmenation fault with saslAuthzTo (ITS#2533)
--On Freitag, 23. Mai 2003 04:09 +0000 Kurt Zeilenga
<openldap-its@OpenLDAP.org> wrote:
> fixed in HEAD, please test. Thanks, Kurt
It now works for a few more steps but still segfaults:
<==slap_sasl2dn: Converted SASL name to
uid=norbert,ou=people,dc=example,dc=com
getdn: dn:id converted to uid=norbert,ou=people,dc=example,dc=com
==>slap_sasl_authorized: can uid=norbert,ou=people,dc=example,dc=com become
uid=root,ou=people,dc=example,dc=com?
==>slap_sasl_check_authz: does uid=root,ou=people,dc=example,dc=com match
saslAuthzTo rule in uid=norbert,ou=people,dc=example,dc=com?
bdb_dn2entry("uid=norbert,ou=people,dc=example,dc=com")
=> bdb_entry_get: found entry: "uid=norbert,ou=people,dc=example,dc=com"
bdb_entry_get: rc=0
=> access_allowed: auth access to "uid=norbert,ou=People,dc=example,dc=com"
"saslAuthzTo" requested
=> dn: [1]
=> dn: [2] cn=subschema
=> acl_get: [3] check attr saslAuthzTo
<= acl_get: [3] acl uid=norbert,ou=People,dc=example,dc=com attr:
saslAuthzTo
access_allowed: no res from state (saslAuthzTo)
=> acl_mask: access to entry "uid=norbert,ou=People,dc=example,dc=com",
attr "saslAuthzTo" requested
=> acl_mask: to all values by "", (=n)
<= check a_dn_pat: self
<= check a_dn_pat: users
<= check a_dn_pat: anonymous
<= acl_mask: [3] applying auth(=x) (stop)
<= acl_mask: [3] mask: auth(=x)
=> access_allowed: auth access granted by auth(=x)
===>slap_sasl_match: comparing DN uid=root,ou=people,dc=example,dc=com to
rule uid=.*,ou=People,dc=example,dc=com
slap_parseURI: parsing uid=.*,ou=People,dc=example,dc=com
ldap_url_parse_ext(uid=.*,ou=People,dc=example,dc=com)
>>> dnNormalize: <uid=.*,ou=People,dc=example,dc=com>
=> ldap_bv2dn(uid=.*,ou=People,dc=example,dc=com,0)
<= ldap_bv2dn(uid=.*,ou=People,dc=example,dc=com,0)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(uid=.*,ou=people,dc=example,dc=com,272)=0
<<< dnNormalize: <uid=.*,ou=people,dc=example,dc=com>
<===slap_sasl_match: comparison returned 0
Segmentation fault
#0 0x401830cd in pthread_mutex_lock () from /lib/libpthread.so.0
#1 0x401ff628 in free () from /lib/libc.so.6
#2 0x080f2dae in ber_bvarray_free_x (a=0x4064262c, ctx=0x410) at
memory.c:720
#3 0x080f2de1 in ber_bvarray_free (a=0x4064261c) at memory.c:730
#4 0x08097ca9 in slap_sasl_check_authz (conn=0x405f5f44, searchDN=0x0,
assertDN=0xbf5ff73c, ad=0x81d65d8, authc=0xbf5ff744)
at saslauthz.c:537
#5 0x0809828b in slap_sasl_authorized (conn=0x405f5f44,
authcDN=0xbf5ff744, authzDN=0xbf5ff73c) at saslauthz.c:683
#6 0x0809bc6a in slap_sasl_authorize (sconn=0x821c648, context=0x405f5f44,
requested_user=0xbf5ff73c "$", rlen=39,
auth_identity=0x821d059 "norbert", alen=7, def_realm=0x0, urlen=0,
props=0x821c550) at sasl.c:755
#7 0x4002075f in do_authorization (s_conn=0x821c648) at server.c:1016
#8 0x40020d13 in sasl_server_step (conn=0x821c648, clientin=0x0,
clientinlen=105, serverout=0xbf5ff850, serveroutlen=0x0)
at server.c:1274
#9 0x0809c909 in slap_sasl_bind (op=0x821d5c8, rs=0xbf5ff90c) at
sasl.c:1386
#10 0x08082609 in do_bind (op=0x821d5c8, rs=0xbf5ff90c) at bind.c:295
#11 0x0806ec11 in connection_operation (ctx=0xbf5ff97c, arg_v=0x821d5c8) at
connection.c:939
#12 0x080d1cb1 in ldap_int_thread_pool_wrapper (xpool=0x81c76c8) at
tpool.c:463
#13 0x401821b0 in pthread_start_thread () from /lib/libpthread.so.0
Norbert