With all of the testing I've been doing, the scenario
you describe has happened. I've been testing on
multiple machines, so I'm not sure if it's happened on
all of the ones that are failing.

Steven

--- Kenneth Grady wrote:

> Have you reloaded an account from a dump? and was
> the policy for that
> account deleted?
>
> Steven Miller wrote:
> > has anyone been able to figure this out?
> >
> > thanks!
> > Steven
> >
> > Very weird, when running kadmin.local under

> valgrind,
> > it does NOT segfault. I am including the valgrind
> > output.
> >
> >

>

-------------------------------------------------------
> >
> > [root@vfkdc01 ~]# valgrind kadmin.local
> > ==9674== Memcheck, a memory error detector.
> > ==9674== Copyright (C) 2002-2005, and GNU GPL'd,

> by
> > Julian Seward et al.
> > ==9674== Using LibVEX rev 1575, a library for

> dynamic
> > binary translation.
> > ==9674== Copyright (C) 2004-2005, and GNU GPL'd,

> by
> > OpenWorks LLP.
> > ==9674== Using valgrind-3.1.1, a dynamic binary
> > instrumentation framework.
> > ==9674== Copyright (C) 2000-2005, and GNU GPL'd,

> by
> > Julian Seward et al.
> > ==9674== For more details, rerun with: -v
> > ==9674==
> > Authenticating as principal

> root/admin@FISERVIPO.COM
> > with password.
> > kadmin.local: cpw test
> > Enter password for principal "test":
> > Re-enter password for principal "test":
> > ==9674== Conditional jump or move depends on
> > uninitialised value(s)
> > ==9674== at 0x402FC40: cleanup_key_data
> > (kdb_cpw.c:88)
> > ==9674== by 0x4030CAB: krb5_dbe_def_cpw
> > (kdb_cpw.c:588)
> > ==9674== by 0x402EB06: krb5_dbe_cpw

> (kdb5.c:1736)
> > ==9674== by 0x40177A8: kadm5_chpass_principal_3
> > (svr_principal.c:1328)
> > ==9674== by 0x401743F: kadm5_chpass_principal
> > (svr_principal.c:1276)
> > ==9674== by 0x804BD27: kadmin_cpw

> (kadmin.c:831)
> > ==9674== by 0x80516CB: check_request_table
> > (execute_cmd.c:89)
> > ==9674== by 0x8051738: really_execute_command
> > (execute_cmd.c:130)
> > ==9674== by 0x8051899: ss_execute_line
> > (execute_cmd.c:215)
> > ==9674== by 0x8051BB6: ss_listen (listen.c:125)
> > ==9674== by 0x804E57E: main (ss_wrapper.c:62)
> > ==9674==
> > ==9674== Conditional jump or move depends on
> > uninitialised value(s)
> > ==9674== at 0x402F242:

> krb5_dbekd_decrypt_key_data
> > (decrypt_key.c:118)
> > ==9674== by 0x4016F6B: create_history_entry
> > (svr_principal.c:1007)
> > ==9674== by 0x4017860: kadm5_chpass_principal_3
> > (svr_principal.c:1364)
> > ==9674== by 0x401743F: kadm5_chpass_principal
> > (svr_principal.c:1276)
> > ==9674== by 0x804BD27: kadmin_cpw

> (kadmin.c:831)
> > ==9674== by 0x80516CB: check_request_table
> > (execute_cmd.c:89)
> > ==9674== by 0x8051738: really_execute_command
> > (execute_cmd.c:130)
> > ==9674== by 0x8051899: ss_execute_line
> > (execute_cmd.c:215)
> > ==9674== by 0x8051BB6: ss_listen (listen.c:125)
> > ==9674== by 0x804E57E: main (ss_wrapper.c:62)
> > ==9674==
> > ==9674== Conditional jump or move depends on
> > uninitialised value(s)
> > ==9674== at 0x402F077:

> krb5_dbekd_encrypt_key_data
> > (encrypt_key.c:122)
> > ==9674== by 0x4016FCA: create_history_entry
> > (svr_principal.c:1014)
> > ==9674== by 0x4017860: kadm5_chpass_principal_3
> > (svr_principal.c:1364)
> > ==9674== by 0x401743F: kadm5_chpass_principal
> > (svr_principal.c:1276)
> > ==9674== by 0x804BD27: kadmin_cpw

> (kadmin.c:831)
> > ==9674== by 0x80516CB: check_request_table
> > (execute_cmd.c:89)
> > ==9674== by 0x8051738: really_execute_command
> > (execute_cmd.c:130)
> > ==9674== by 0x8051899: ss_execute_line
> > (execute_cmd.c:215)
> > ==9674== by 0x8051BB6: ss_listen (listen.c:125)
> > ==9674== by 0x804E57E: main (ss_wrapper.c:62)
> > ==9674==
> > ==9674== Conditional jump or move depends on
> > uninitialised value(s)
> > ==9674== at 0x427AFF2: krb5_dbe_free_contents
> > (ldap_principal.c:107)
> > ==9674== by 0x427B199: krb5_ldap_free_principal
> > (ldap_principal.c:135)
> > ==9674== by 0x402DA89: krb5_db_free_principal
> > (kdb5.c:928)
> > ==9674== by 0x401AE31: kdb_free_entry
> > (server_kdb.c:295)
> > ==9674== by 0x4017A52: kadm5_chpass_principal_3
> > (svr_principal.c:1453)
> > ==9674== by 0x401743F: kadm5_chpass_principal
> > (svr_principal.c:1276)
> > ==9674== by 0x804BD27: kadmin_cpw

> (kadmin.c:831)
> > ==9674== by 0x80516CB: check_request_table
> > (execute_cmd.c:89)
> > ==9674== by 0x8051738: really_execute_command
> > (execute_cmd.c:130)
> > ==9674== by 0x8051899: ss_execute_line
> > (execute_cmd.c:215)
> > ==9674== by 0x8051BB6: ss_listen (listen.c:125)
> > ==9674== by 0x804E57E: main (ss_wrapper.c:62)
> > Password for "test@FISERVIPO.COM" changed.
> > kadmin.local: quit
> > ==9674==
> > ==9674== ERROR SUMMARY: 4 errors from 4 contexts
> > (suppressed: 69 from 2)
> > ==9674== malloc/free: in use at exit: 1,441 bytes

> in
> > 68 blocks.
> > ==9674== malloc/free: 2,280 allocs, 2,212 frees,
> > 348,960 bytes allocated.
> > ==9674== For counts of detected errors, rerun

> with: -v
> > ==9674== searching for pointers to 68 not-freed
> > blocks.
> > ==9674== checked 174,336 bytes.
> > ==9674==
> > ==9674== LEAK SUMMARY:
> > ==9674== definitely lost: 733 bytes in 34

> blocks.
> > ==9674== possibly lost: 0 bytes in 0 blocks.
> > ==9674== still reachable: 708 bytes in 34

> blocks.
> > ==9674== suppressed: 0 bytes in 0 blocks.
> > ==9674== Use --leak-check=full to see details of
> > leaked memory.
> > [root@vfkdc01 ~]#
> >
> >
> >
> >
> >
> >
> >

>

__________________________________________________ __________________________________
> > Never miss a thing. Make Yahoo your home page.
> > http://www.yahoo.com/r/hs
> > ________________________________________________
> > Kerberos mailing list Kerberos@mit.edu
> > https://mailman.mit.edu/mailman/listinfo/kerberos
> >

>




__________________________________________________ __________________________________
Looking for last minute shopping deals?
Find them fast with Yahoo! Search. http://tools.search.yahoo.com/newsea...egory=shopping