[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Re: Bug#762906: krb5-auth-dialog debug output



On Mon, Oct 20, 2014 at 03:23:24PM +0200, Wolfgang Schweer wrote:
> With the patch applied, the tray icon now disappears if clicked.
> 
> krb5-auth-dialog (with patch) compiled again with '--enable-debug' and 
> running it out of a terminal shows that the reason is a segmentation 
> fault.
 
This is the output of 'valgrind krb5-auth-dialog' with the tray icon 
clicked:
----------------------------------------------
==21299== Memcheck, a memory error detector
==21299== Copyright (C) 2002-2013, and GNU GPL'd, by Julian Seward et al.
==21299== Using Valgrind-3.10.0 and LibVEX; rerun with -h for copyright info
==21299== Command: krb5-auth-dialog
==21299== 

** (krb5-auth-dialog:21299): WARNING **: Couldn't register with 
accessibility bus: Did not receive a reply. Possible causes include: the 
remote application did not send a reply, the message bus security policy 
blocked the reply, the reply timeout expired, or the network connection 
was broken.

DEBUG: ka_applet_set_property: principal: 
DEBUG: ka_applet_set_property: pk-userid: 
DEBUG: ka_applet_set_property: pk-anchors: 
DEBUG: ka_applet_set_property: pw-prompt-mins: 30
DEBUG: ka_applet_set_property: tgt-forwardable: False
DEBUG: ka_applet_set_property: tgt-proxiable: False
DEBUG: ka_applet_set_property: tgt-renewable: False
DEBUG: ka_applet_set_property: conf-tickets: False
==21299== Conditional jump or move depends on uninitialised value(s)
==21299==    at 0x5BAC57D: ??? (in /usr/lib/i386-linux-gnu/libpixman-1.so.0.32.6)
==21299==    by 0x5B8F211: ??? (in /usr/lib/i386-linux-gnu/libpixman-1.so.0.32.6)
==21299==    by 0x5B3E76A: pixman_image_composite32 (in /usr/lib/i386-linux-gnu/libpixman-1.so.0.32.6)
==21299==    by 0x54584C7: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299==    by 0x54A28DA: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299==    by 0x5493069: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299==    by 0x5493BF4: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299==    by 0x549490B: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299==    by 0x544A6A9: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299==    by 0x545C79A: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299==    by 0x549834D: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299==    by 0x54539A8: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299== 
==21299== Conditional jump or move depends on uninitialised value(s)
==21299==    at 0x5BAC7CD: ??? (in /usr/lib/i386-linux-gnu/libpixman-1.so.0.32.6)
==21299==    by 0x5B8F211: ??? (in /usr/lib/i386-linux-gnu/libpixman-1.so.0.32.6)
==21299==    by 0x5B3E76A: pixman_image_composite32 (in /usr/lib/i386-linux-gnu/libpixman-1.so.0.32.6)
==21299==    by 0x54584C7: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299==    by 0x54A28DA: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299==    by 0x5493069: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299==    by 0x5493BF4: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299==    by 0x5494C66: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299==    by 0x544A7AC: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299==    by 0x545C7D2: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299==    by 0x5498475: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299==    by 0x5453E58: ??? (in /usr/lib/i386-linux-gnu/libcairo.so.2.11200.16)
==21299== 
==21299== Conditional jump or move depends on uninitialised value(s)
==21299==    at 0x99727A2: ??? (in /usr/lib/i386-linux-gnu/librsvg-2.so.2.40.4)
==21299==    by 0x9973625: rsvg_handle_get_pixbuf_sub (in /usr/lib/i386-linux-gnu/librsvg-2.so.2.40.4)
==21299==    by 0x99736C9: rsvg_handle_get_pixbuf (in /usr/lib/i386-linux-gnu/librsvg-2.so.2.40.4)
==21299==    by 0x8043AC0: ??? (in /usr/lib/i386-linux-gnu/gdk-pixbuf-2.0/2.10.0/loaders/libpixbufloader-svg.so)
==21299==    by 0x527E998: gdk_pixbuf_loader_close (in /usr/lib/i386-linux-gnu/libgdk_pixbuf-2.0.so.0.3100.1)
==21299==    by 0x527A671: ??? (in /usr/lib/i386-linux-gnu/libgdk_pixbuf-2.0.so.0.3100.1)
==21299==    by 0x527C58C: gdk_pixbuf_new_from_stream_at_scale (in /usr/lib/i386-linux-gnu/libgdk_pixbuf-2.0.so.0.3100.1)
==21299==    by 0x43479D3: ??? (in /usr/lib/i386-linux-gnu/libgtk-3.so.0.1400.1)
==21299==    by 0x4347CA3: gtk_icon_info_load_icon (in /usr/lib/i386-linux-gnu/libgtk-3.so.0.1400.1)
==21299==    by 0x4349042: gtk_icon_info_load_symbolic_for_context (in /usr/lib/i386-linux-gnu/libgtk-3.so.0.1400.1)
==21299==    by 0x433F6D4: ??? (in /usr/lib/i386-linux-gnu/libgtk-3.so.0.1400.1)
==21299==    by 0x433F91D: ??? (in /usr/lib/i386-linux-gnu/libgtk-3.so.0.1400.1)
==21299== 
DEBUG: ka_applet_set_property: principal: 
DEBUG: ka_applet_set_property: pk-userid: 
DEBUG: ka_applet_set_property: pk-anchors: 
DEBUG: ka_applet_set_property: pw-prompt-mins: 30
DEBUG: ka_applet_set_property: tgt-forwardable: False
DEBUG: ka_applet_set_property: tgt-proxiable: False
DEBUG: ka_applet_set_property: tgt-renewable: False
DEBUG: ka_applet_set_property: conf-tickets: False
DEBUG: ka_applet_local_command_line: Parsing local command line
DEBUG: ka_applet_startup: Primary application
DEBUG: ka_nm_client_state_changed_cb: Network connected
DEBUG: monitor_ccache: Monitoring /tmp/krb5cc_1000_NFyZSs
DEBUG: ka_applet_command_line: Evaluating command line
DEBUG: credentials_expiring: Checking expiry <1800s
DEBUG: ka_nm_client_state_changed_cb: Network connected
DEBUG: ka_tray_icon_on_click: Trayicon clicked: 1800
==21299== Invalid read of size 1
==21299==    at 0x804E51A: ??? (in /usr/bin/krb5-auth-dialog)
==21299==    by 0x804EE0B: ka_grab_credentials (in /usr/bin/krb5-auth-dialog)
==21299==    by 0x8050997: ??? (in /usr/bin/krb5-auth-dialog)
==21299==    by 0x4B244E6: g_cclosure_marshal_VOID__VOIDv (in /usr/lib/i386-linux-gnu/libgobject-2.0.so.0.4200.0)
==21299==    by 0x4B22A5E: ??? (in /usr/lib/i386-linux-gnu/libgobject-2.0.so.0.4200.0)
==21299==    by 0x4B3C7F8: g_signal_emit_valist (in /usr/lib/i386-linux-gnu/libgobject-2.0.so.0.4200.0)
==21299==    by 0x4B3D0D4: g_signal_emit (in /usr/lib/i386-linux-gnu/libgobject-2.0.so.0.4200.0)
==21299==    by 0x4203D86: ??? (in /usr/lib/i386-linux-gnu/libgtk-3.so.0.1400.1)
==21299==    by 0x420444B: ??? (in /usr/lib/i386-linux-gnu/libgtk-3.so.0.1400.1)
==21299==    by 0x4386B95: ??? (in /usr/lib/i386-linux-gnu/libgtk-3.so.0.1400.1)
==21299==    by 0x4B2283A: g_closure_invoke (in /usr/lib/i386-linux-gnu/libgobject-2.0.so.0.4200.0)
==21299==    by 0x4B34854: ??? (in /usr/lib/i386-linux-gnu/libgobject-2.0.so.0.4200.0)
==21299==  Address 0x0 is not stack'd, malloc'd or (recently) free'd
==21299== 
==21299== 
==21299== Process terminating with default action of signal 11 (SIGSEGV)
==21299==  Access not within mapped region at address 0x0
==21299==    at 0x804E51A: ??? (in /usr/bin/krb5-auth-dialog)
==21299==    by 0x804EE0B: ka_grab_credentials (in /usr/bin/krb5-auth-dialog)
==21299==    by 0x8050997: ??? (in /usr/bin/krb5-auth-dialog)
==21299==    by 0x4B244E6: g_cclosure_marshal_VOID__VOIDv (in /usr/lib/i386-linux-gnu/libgobject-2.0.so.0.4200.0)
==21299==    by 0x4B22A5E: ??? (in /usr/lib/i386-linux-gnu/libgobject-2.0.so.0.4200.0)
==21299==    by 0x4B3C7F8: g_signal_emit_valist (in /usr/lib/i386-linux-gnu/libgobject-2.0.so.0.4200.0)
==21299==    by 0x4B3D0D4: g_signal_emit (in /usr/lib/i386-linux-gnu/libgobject-2.0.so.0.4200.0)
==21299==    by 0x4203D86: ??? (in /usr/lib/i386-linux-gnu/libgtk-3.so.0.1400.1)
==21299==    by 0x420444B: ??? (in /usr/lib/i386-linux-gnu/libgtk-3.so.0.1400.1)
==21299==    by 0x4386B95: ??? (in /usr/lib/i386-linux-gnu/libgtk-3.so.0.1400.1)
==21299==    by 0x4B2283A: g_closure_invoke (in /usr/lib/i386-linux-gnu/libgobject-2.0.so.0.4200.0)
==21299==    by 0x4B34854: ??? (in /usr/lib/i386-linux-gnu/libgobject-2.0.so.0.4200.0)
==21299==  If you believe this happened as a result of a stack
==21299==  overflow in your program's main thread (unlikely but
==21299==  possible), you can try to increase the size of the
==21299==  main thread stack using the --main-stacksize= flag.
==21299==  The main thread stack size used in this run was 8388608.
==21299== 
==21299== HEAP SUMMARY:
==21299==     in use at exit: 2,844,399 bytes in 62,049 blocks
==21299==   total heap usage: 441,018 allocs, 378,969 frees, 45,448,507 bytes allocated
==21299== 
==21299== LEAK SUMMARY:
==21299==    definitely lost: 6,324 bytes in 27 blocks
==21299==    indirectly lost: 16,453 bytes in 938 blocks
==21299==      possibly lost: 71,568 bytes in 2,062 blocks
==21299==    still reachable: 2,582,770 bytes in 57,564 blocks
==21299==         suppressed: 0 bytes in 0 blocks
==21299== Rerun with --leak-check=full to see details of leaked memory
==21299== 
==21299== For counts of detected and suppressed errors, rerun with: -v
==21299== Use --track-origins=yes to see where uninitialised values come from
==21299== ERROR SUMMARY: 51 errors from 4 contexts (suppressed: 0 from 0)
Getötet (i.e. killed)

Wolfgang

Attachment: signature.asc
Description: Digital signature


Reply to: