[Date Prev][Date Next] [Chronological] [Thread] [Top]

Re: Failed assertion in sockbuf.c



> As long as you build the OpenLDAP libraries with debugging info, and you have
> root privilege, you can execute the passwd command using the debugger and when
> it hits the assertion you can get a stack trace.

Well, gdb seems to be useless, but dbx reveals this:

Reading passwd
dbx: warning: setuid program exec()ed. Reattaching
Reading ld.so.1
Reading libcrypt_i.so.1
Reading libbsm.so.1
Reading libdl.so.1
Reading libpam.so.1
Reading libnsl.so.1
Reading libsldap.so.1
Reading libsocket.so.1
Reading libmp.so.2
Reading libc.so.1
Reading libgen.so.1
Reading libldap.so.4
Reading libdoor.so.1
Reading libresolv.so.2
Reading libc_psr.so.1
(/opt/SUNWspro/bin/../WS6U1/bin/sparcv9/dbx) set args clint
(/opt/SUNWspro/bin/../WS6U1/bin/sparcv9/dbx) run
Running: passwd 
dbx: warning: setuid program exec()ed. Reattaching
(process id 1723)
passwd:  Changing password for clint
Reading pam_openldap.so.1
Reading libldap.so.2
Reading liblber.so.2
Reading libsasl.so.7
Reading libssl.so.0.9.6
dbx: warning: cannot demangle '__10bad_typeid'
dbx: warning: cannot demangle
'__17__class_type_infoPCcPCQ217__class_type_info9base_infoUi'
dbx: warning: cannot demangle
'__14__si_type_infoPCcRC16__user_type_info'
dbx: warning: cannot demangle '__13bad_exception'
dbx: warning: cannot demangle '__16__user_type_infoPCc'
Reading libcrypto.so.0.9.6
dbx: warning: cannot demangle
'__14__si_type_infoPCcRC16__user_type_info'
dbx: warning: cannot demangle
'__17__class_type_infoPCcPCQ217__class_type_info9base_infoUi'
dbx: warning: cannot demangle '__10bad_typeid'
dbx: warning: cannot demangle '__13bad_exception'
dbx: warning: cannot demangle '__16__user_type_infoPCc'
Reading libdb-3.3.so
Reading pam_unix.so.1
Reading libcmd.so.1
sockbuf.c:75: failed assertion `sb != NULL'
signal ABRT (Abort) in _kill at 0xff11bed4
0xff11bed4: _kill+0x0008:       bgeu    _kill+0x30

and the trace, as you requested

=>[1] _kill(0x0, 0x6, 0x0, 0xffffffff, 0x34cf0, 0xff0b56d8), at
0xff11bed4
  [2] abort(0xff13801c, 0xff13fa9c, 0x0, 0x0, 0xfef88bc8, 0x0), at
0xff0b57bc
  [3] __eprintf(0xfef88b98, 0xfef88bb8, 0x4b, 0xfef88bc8, 0x128, 0x0),
at 0xfef1f9dc
  [4] ber_sockbuf_ctrl(0x0, 0x3, 0xfefe9ae4, 0x0, 0x0, 0x0), at
0xfef86eb0
  [5] ldap_pvt_tls_inplace(0x0, 0x0, 0x0, 0x0, 0x0, 0x0), at 0xfefd1ab0
  [6] ldap_start_tls_s(0x37218, 0x0, 0x0, 0xff194000, 0x11, 0xffbeed80),
at 0xfefd288c
  [7] _open_session(0x35980, 0x35198, 0x0, 0xffffffff, 0xfffffff8,
0xffbef620), at 0xfeff3428
  [8] _connect_anonymously(0x35980, 0xfeff7890, 0x35980, 0xfeff20ec,
0x0, 0x3598d), at 0xfeff3604
  [9] _get_user_info(0x35980, 0x34d40, 0x1, 0xffbef740, 0x35f20,
0xffbef748), at 0xfeff41d8
  [10] pam_sm_chauthtok(0x0, 0x234, 0x0, 0x34da0, 0x0, 0x0), at
0xfeff5460
  [11] pam_chauthtok(0x0, 0xff3165c8, 0xff316000, 0x1, 0x1, 0x0), at
0xff3030b4
  [12] main(0x34800, 0x35950, 0x34800, 0x34800, 0x0, 0x3225c), at
0x1304c