[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#347233: marked as done (dbus-1 on sarge segfaults if a unpriviliged user run "lshal")



Your message dated Sun, 8 May 2011 16:13:09 -0500
with message-id <20110508211308.GA24035@elie>
and subject line Re: dbus-1 does not start because of segmentation fault
has caused the Debian Bug report #226515,
regarding dbus-1 on sarge segfaults if a unpriviliged user run "lshal"
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact owner@bugs.debian.org
immediately.)


-- 
226515: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=226515
Debian Bug Tracking System
Contact owner@bugs.debian.org with problems
--- Begin Message ---
Package: dbus-1
Version: 0.23.4-1
Severity: grave
Justification: renders package unusable

Running lshal as root runs fine.
Running lshal as user gives:
	lshal version 0.4.7
	libhal.c 644 : Error connecting to system bus: No reply within specified time
	error: hal_initialize failed

After this, hald still runs but dbus-daemon-1 is gone.

Here's what /usr/bin/dbus-daemon-1 --system --nofork says when I run
"lshal" as a non-privilged user:

	berlin: ~ 11# /usr/bin/dbus-daemon-1 --system --nofork
	Segmentation fault
	berlin: ~ 12#

This is the strace of the daemon crashing:

[......]

[{fd=3, events=POLLIN, revents=POLLIN}, {fd=4, events=POLLIN}, {fd=6,
events=POLLIN}], 3, -1) = 1
gettimeofday({1136821879, 967986}, NULL) = 0
accept(3, {sa_family=AF_FILE, path="«"}, [2]) = 7
fcntl64(7, F_GETFD)                     = 0
fcntl64(7, F_SETFD, FD_CLOEXEC)         = 0
fcntl64(7, F_GETFL)                     = 0x2 (flags O_RDWR)
fcntl64(7, F_SETFL, O_RDWR|O_NONBLOCK)  = 0
rt_sigaction(SIGPIPE, {SIG_IGN}, {SIG_IGN}, 8) = 0
gettimeofday({1136821879, 968379}, NULL) = 0
gettimeofday({1136821879, 968418}, NULL) = 0
gettimeofday({1136821879, 968449}, NULL) = 0
poll([{fd=3, events=POLLIN}, {fd=4, events=POLLIN}, {fd=6,
events=POLLIN}, {fd=7, events=POLLIN, revents=POLLIN}], 4, 28103) = 1
gettimeofday({1136821879, 968512}, NULL) = 0
recvmsg(7, {msg_name(0)=NULL, msg_iov(1)=[{"\0", 1}], msg_controllen=0,
msg_flags=0}, 0) = 1
getsockopt(7, SOL_SOCKET, SO_PEERCRED, "\21\10\0\0\36+\0\0\347\3\0\0",
[12]) = 0
read(7, "AUTH EXTERNAL 3131303338\r\n", 2048) = 26
gettimeofday({1136821879, 968701}, NULL) = 0
poll([{fd=3, events=POLLIN}, {fd=4, events=POLLIN}, {fd=6,
events=POLLIN}, {fd=7, events=POLLOUT, revents=POLLOUT}], 4, 28103) = 1
gettimeofday({1136821879, 968765}, NULL) = 0
write(7, "OK\r\n", 4)                   = 4
gettimeofday({1136821879, 968925}, NULL) = 0
poll([{fd=3, events=POLLIN}, {fd=4, events=POLLIN}, {fd=6,
events=POLLIN}, {fd=7, events=POLLIN, revents=POLLIN}], 4, 28102) = 1
gettimeofday({1136821879, 968986}, NULL) = 0
read(7, "BEGIN\r\nl\1\0\0\200\0\0\0\0\0\0\0\1\0\0\0\1o\0\0\25\0"...,
2048) = 135
socket(PF_FILE, SOCK_STREAM, 0)         = 8
connect(8, {sa_family=AF_FILE, path="/var/run/.nscd_socket"}, 110) = 0
writev(8, [{"\2\0\0\0\1\0\0\0\6\0\0\0", 12}, {"11038\0", 6}], 2) = 18
read(8, "\2\0\0\0\1\0\0\0\7\0\0\0\16\0\0\0\36+\0\0\347\3\0\0 \0"..., 36)
= 36
read(8, "vsauer\0/ndcT7gL90ShI\0Volker Saue"..., 76) = 76
close(8)                                = 0
open("/etc/group", O_RDONLY)            = 8
fcntl64(8, F_GETFD)                     = 0
fcntl64(8, F_SETFD, FD_CLOEXEC)         = 0
_llseek(8, 0, [0], SEEK_CUR)            = 0
fstat64(8, {st_mode=S_IFREG|0644, st_size=723, ...}) = 0
mmap2(NULL, 723, PROT_READ, MAP_SHARED, 8, 0) = 0x40018000
_llseek(8, 723, [723], SEEK_SET)        = 0
open("/var/yp/binding/dvs1.informatik.tu-darmstadt.de.2", O_RDONLY) = 9
readv(9, [{"\377\377", 2}, {"\1\0\0\0\202S\246\201\3[\0\0", 12}], 2) =
14
socket(PF_INET, SOCK_DGRAM, IPPROTO_UDP) = 10
bind(10, {sa_family=AF_INET, sin_port=htons(988),
sin_addr=inet_addr("0.0.0.0")}, 16) = -1 EACCES (Permission denied)
ioctl(10, FIONBIO, [1])                 = 0
setsockopt(10, SOL_IP, IP_RECVERR, [1], 4) = 0
fcntl64(10, F_SETFD, FD_CLOEXEC)        = 0
close(9)                                = 0
close(10)                               = 0
socket(PF_INET, SOCK_STREAM, IPPROTO_TCP) = 9
bind(9, {sa_family=AF_INET, sin_port=htons(989),
sin_addr=inet_addr("0.0.0.0")}, 16) = -1 EACCES (Permission denied)
connect(9, {sa_family=AF_INET, sin_port=htons(111),
sin_addr=inet_addr("130.83.166.129")}, 16) = 0
write(9, "\200\0\0008\4\343\307\355\0\0\0\0\0\0\0\2\0\1\206\240\0"...,
60) = 60
poll([{fd=9, events=POLLIN, revents=POLLIN}], 1, 60000) = 1
read(9, "\200\0\0\34\4\343\307\355\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0"...,
400) = 32
close(9)                                = 0
socket(PF_INET, SOCK_STREAM, IPPROTO_TCP) = 9
bind(9, {sa_family=AF_INET, sin_port=htons(990),
sin_addr=inet_addr("0.0.0.0")}, 16) = -1 EACCES (Permission denied)
connect(9, {sa_family=AF_INET, sin_port=htons(863),
sin_addr=inet_addr("130.83.166.129")}, 16) = 0
write(9, "\200\0\0\\_p\277\373\0\0\0\0\0\0\0\2\0\1\206\244\0\0\0"...,
96) = 96
poll([{fd=9, events=POLLIN, revents=POLLIN}], 1, 25000) = 1
read(9, "\0\0\17\234_p\277\373\0\0\0\1\0\0\0\0\0\0\0\0\0\0\0\0\0"...,
4000) = 2896
poll([{fd=9, events=POLLIN, revents=POLLIN}], 1, 25000) = 1
read(9, "n,cilia,fiege,haul,helbaoui,mant"..., 4000) = 1268
close(9)                                = 0
--- SIGSEGV (Segmentation fault) @ 0 (0) ---
+++ killed by SIGSEGV +++


This behaviour occurs in various machines inside our NIS-enviroment.


-- System Information:
Debian Release: 3.1
Architecture: i386 (i686)
Kernel: Linux 2.6.8-2-k7
Locale: LANG=de_DE@euro, LC_CTYPE=de_DE (charmap=ISO-8859-1)

Versions of packages dbus-1 depends on:
ii  adduser                     3.63         Add and remove users and groups
ii  debianutils                 2.8.4        Miscellaneous utilities specific t
ii  libc6                       2.3.2.ds1-22 GNU C Library: Shared libraries an
ii  libexpat1                   1.95.8-3     XML parsing C library - runtime li

-- no debconf information


--- End Message ---
--- Begin Message ---
Version: 2.3.5-3

GOTO Masanori wrote:

> These bugs are marked as important when glibc 2.3.2.ds1 is used in
> sarge.  Nowadays we have new glibc 2.3.5-3 in unstable.  Could you
> test dbus-1 with new glibc?  I guess this problem is already fixed.

This might have been fixed by

    2003-04-23  Ulrich Drepper  <drepper@redhat.com>

        * grp/initgroups.c (getgrouplist): Don't copy too much into the
        user buffer if more groups are found than fit into it.

        * nis/nss_nis/nis-initgroups.c (_nss_nis_initgroups_dyn): Use
        extend_alloca.

or

    2005-03-29  Thorsten Kukuk  <kukuk@suse.de>

        [BZ #661]
        * grp/initgroups.c (internal_getgrouplist): Check if we have
        enough space before adding the primary group to the list.

or

    2003-06-27  Thorsten Kukuk  <kukuk@suse.de>

        * nis/nss_compat/compat-initgroups.c: Don't use our own NIS/NIS+
        functions, dlopen corresponding NSS module instead.

After gotom's ping, no one responded except someone reporting the same
bug with 2.3.2, and I suspect this is the sort of bug that would make
people unhappy enough to report it when they see it.  Closing.

Please reopen if it happens again.


--- End Message ---

Reply to: