[Pkg-sssd-devel] Bug#929473: sssd-kcm: talloc_abort call via schedule_fd_processing

Sam Morris sam at robots.org.uk
Fri May 24 09:24:44 BST 2019


Package: sssd-kcm
Version: 1.16.3-3.1
Severity: important

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Having installed sssd-kcm and setting default_ccache_name = KCM: in
krb5.conf, after running kinit and klist a few times I started getting
the following crash:

#0  __GI_raise (sig=sig at entry=6) at ../sysdeps/unix/sysv/linux/raise.c:50
#1  0x00007f7ce3493535 in __GI_abort () at abort.c:79
#2  0x00007f7ce3a8b621 in talloc_abort (reason=0x7f7ce3a99070 "Bad talloc magic value - unknown value")
    at ../talloc.c:500
#3  0x00007f7ce3a8b591 in talloc_abort_unknown_value () at ../talloc.c:529
#4  talloc_chunk_from_ptr (ptr=0x55db7c89de20) at ../talloc.c:529
#5  _talloc_free (ptr=0x55db7c89de20, location=0x55db7b05b27a "../src/util/tev_curl.c:449") at ../talloc.c:1747
#6  0x000055db7b0378fb in schedule_fd_processing (multi=<optimized out>, timeout_ms=0, userp=<optimized out>)
    at ../src/util/tev_curl.c:449
#7  0x00007f7ce3af78cc in update_timer (multi=multi at entry=0x55db7c89d4a0) at multi.c:2941
#8  0x00007f7ce3af8f76 in curl_multi_add_handle (data=0x55db7dcc6b80, multi=0x55db7c89d4a0) at multi.c:500
#9  curl_multi_add_handle (multi=0x55db7c89d4a0, data=0x55db7dcc6b80) at multi.c:376
#10 0x000055db7b037fa9 in tcurl_request_send (mem_ctx=mem_ctx at entry=0x55db7c8aade0, ev=ev at entry=0x55db7c839830,
    tcurl_ctx=tcurl_ctx at entry=0x55db7c89d480, tcurl_req=tcurl_req at entry=0x55db7dcc91d0, timeout=timeout at entry=5)
    at ../src/util/tev_curl.c:700
#11 0x000055db7b038a98 in tcurl_http_send (mem_ctx=0x55db7c8aade0, ev=ev at entry=0x55db7c839830,
    tcurl_ctx=0x55db7c89d480, method=method at entry=TCURL_HTTP_GET,
    socket_path=socket_path at entry=0x55db7b0534a3 "/var/run/secrets.socket", url=<optimized out>,
    headers=0x55db7b0759b0 <sec_headers>, body=0x0, timeout=5) at ../src/util/tev_curl.c:1017
#12 0x000055db7b02d659 in sec_list_send (mem_ctx=<optimized out>, ev=ev at entry=0x55db7c839830,
    client=client at entry=0x55db7c89a7d0, secdb=<optimized out>) at ../src/responder/kcm/kcmsrv_ccache_secrets.c:163
#13 0x000055db7b02dc4e in sec_get_ccache_send (mem_ctx=<optimized out>, ev=ev at entry=0x55db7c839830,
    secdb=secdb at entry=0x55db7c89a440, client=client at entry=0x55db7c89a7d0, name=name at entry=0x55db7c89d300 "1000",
    uuid=uuid at entry=0x7fff37adda30 "") at ../src/responder/kcm/kcmsrv_ccache_secrets.c:482
#14 0x000055db7b02e16d in ccdb_sec_getbyname_send (mem_ctx=<optimized out>, ev=0x55db7c839830, db=<optimized out>,
    client=0x55db7c89a7d0, name=0x55db7c89d300 "1000") at ../src/responder/kcm/kcmsrv_ccache_secrets.c:1275
#15 0x000055db7b025e39 in kcm_ccdb_getbyname_send (mem_ctx=<optimized out>, ev=ev at entry=0x55db7c839830,
    db=0x55db7c89a220, client=0x55db7c89a7d0, name=0x55db7c89d300 "1000")
    at ../src/responder/kcm/kcmsrv_ccache.c:692
#16 0x000055db7b02fa6e in kcm_op_get_cred_by_uuid_send (mem_ctx=<optimized out>, ev=0x55db7c839830,
    op_ctx=0x55db7dcc9110) at ../src/responder/kcm/kcmsrv_ops.c:1099
#17 0x000055db7b02e9f3 in kcm_cmd_queue_done (subreq=0x0) at ../src/responder/kcm/kcmsrv_ops.c:196
#18 0x00007f7ce3aa7479 in tevent_common_invoke_immediate_handler (im=0x55db7c838460, removed=removed at entry=0x0)
    at ../tevent_immediate.c:165
#19 0x00007f7ce3aa74a3 in tevent_common_loop_immediate (ev=ev at entry=0x55db7c839830) at ../tevent_immediate.c:202
#20 0x00007f7ce3aace5b in epoll_event_loop_once (ev=0x55db7c839830, location=<optimized out>)
    at ../tevent_epoll.c:917
#21 0x00007f7ce3aab2d7 in std_event_loop_once (ev=0x55db7c839830,
    location=0x7f7ce36e8178 "../src/util/server.c:725") at ../tevent_standard.c:110
#22 0x00007f7ce3aa67e4 in _tevent_loop_once (ev=ev at entry=0x55db7c839830,
    location=location at entry=0x7f7ce36e8178 "../src/util/server.c:725") at ../tevent.c:772
#23 0x00007f7ce3aa6a2b in tevent_common_loop_wait (ev=0x55db7c839830,
    location=0x7f7ce36e8178 "../src/util/server.c:725") at ../tevent.c:895
#24 0x00007f7ce3aab277 in std_event_loop_wait (ev=0x55db7c839830,
    location=0x7f7ce36e8178 "../src/util/server.c:725") at ../tevent_standard.c:141
#25 0x00007f7ce36c38e3 in server_loop () from /usr/lib/x86_64-linux-gnu/sssd/libsss_util.so
#26 0x000055db7b022c70 in main (argc=<optimized out>, argv=<optimized out>) at ../src/responder/kcm/kcm.c:318

In sssd_kcm.log we have only the following message:

(Fri May 24 09:13:18 2019) [sssd[kcm]] [talloc_log_fn] (0x0010): Bad talloc magic value - unknown value

... putting debug_level=9 in the [kcm] section of sssd.conf doesn't
cause any more detailed messages to be logged.

- -- System Information:
Debian Release: 10.0
  APT prefers testing-debug
  APT policy: (550, 'testing-debug'), (550, 'testing'), (520, 'unstable-debug'), (520, 'unstable'), (510, 'experimental-debug'), (510, 'experimental')
Architecture: amd64 (x86_64)
Foreign Architectures: arm64

Kernel: Linux 4.19.0-5-amd64 (SMP w/2 CPU cores)
Kernel taint flags: TAINT_OOT_MODULE, TAINT_UNSIGNED_MODULE
Locale: LANG=en_GB.UTF-8, LC_CTYPE=en_GB.UTF-8 (charmap=UTF-8), LANGUAGE=en_GB.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash
Init: systemd (via /run/systemd/system)
LSM: AppArmor: enabled

Versions of packages sssd-kcm depends on:
ii  libc6            2.28-10
ii  libcom-err2      1.44.5-1
ii  libcurl3-gnutls  7.64.0-3
ii  libdbus-1-3      1.12.12-1
ii  libdhash1        0.6.1-2
ii  libjansson4      2.12-1
ii  libk5crypto3     1.17-2
ii  libkrb5-3        1.17-2
ii  libldb1          2:1.5.1+really1.4.6-3
ii  libpopt0         1.16-12
ii  libselinux1      2.8-1+b1
ii  libsystemd0      241-3
ii  libtalloc2       2.1.14-2
ii  libtdb1          1.3.16-2+b1
ii  libtevent0       0.9.37-1
ii  libuuid1         2.33.1-0.1
ii  sssd-common      1.16.3-3.1

sssd-kcm recommends no packages.

sssd-kcm suggests no packages.

- -- no debconf information

-----BEGIN PGP SIGNATURE-----

iQJGBAEBCAAwFiEEyqqqGsppqDqJKxhV0gtCAlzaJ7kFAlznqkUSHHNhbUByb2Jv
dHMub3JnLnVrAAoJENILQgJc2ie5zM0P/1nYppVZs9gkYLz7DMiTvhOgAmuz4Znu
hJxW2GIYGAWBy73twoeAO7gXUuptnxkXj7/kFbWIwVXOSgqrGhxEaeR2DsfCMl8c
GlBmQcJrfvwJA4VmtOnbRK0Anyd70Vd6clSvmw4HE2GNNEadPO/lYM4YmpGpRtXt
8YcnYtdfwTrCWTVMi1k9Wl/CwYV0cI55NvcXqiWBheMPJKezJxAoUGQKkaVrZ6SS
GgEfPRGARs86VKsfWpyBS423CzJNybR9HCulasaB3v5zw9blA2Yj4TItwYaUzLDM
5ugJzF5v8024JOz3HFFWMuc8O7i/TIsedVh03JWawKrCXosoVOqUJxkloD8JWFV8
g9LzVHhcWXF6MevER/iySMcXfQtKCvdq+C+keRnGvwA6dOP2X2G2Q27CVfrQGjDi
U0ZLE6HB8PkyZICfX4GKIdzp6h+4lDw67+61IKtVhO0VfSJ715RB7KarUF/2XDeC
xdgbiOCB+uXd5vVnn9/IK6LfNfPrZ69MdzzLps03Zbk8HDX5jQ66ss7FuOy9/lNC
RzyM7u/ORr1J+RLX6ebB6UFrkRa8LLxhurLQfWttKzzFeq8F1UWhJ8o9z790b6cM
XX7Smr8TAjOndu1CkZ0JfN+g7BLO6VN4HiSKzHdbxNL916MuOr56dWvlPVVvLWpD
7GIENkGveZwi
=K1Dd
-----END PGP SIGNATURE-----



More information about the Pkg-sssd-devel mailing list