On Wed, Aug 20, 2008 at 20:03:47 +0200, Nico Golde wrote:
> [EMAIL PROTECTED]:/tmp$] cp /usr/share/doc/libpam0g-dev/examples/check_user.c
> .
> [EMAIL PROTECTED]:/tmp$] gcc -lpam -lpam_misc check_user.c -o check_user
> [EMAIL PROTECTED]:/tmp$] ./check_user nion; date; tail -1 /var/log/kern.log
> Authenticated
> Mi 20. Aug 20:01:40 CEST 2008
> Aug 20 20:01:40 coredump kernel: [1073387.605090] check_user[20665]: segfault
> at 0 ip 7f9a2ebf40f9 sp 7fff37983980 error 4 in pam_unix.so[7f9a2ebea000+c000]
>
> The segfault happens on the pam_authenticate call as far as I can see.
>
> Reassigning to pam...
>
(gdb) set follow-fork-mode child
(gdb) r julien
Starting program: /tmp/check_user julien
Program received signal SIGSEGV, Segmentation fault.
[Switching to process 11347]
0xb7d8cec6 in _pammodutil_tty_secure (pamh=0x924b008, uttyname=0x0)
at tty_secure.c:42
42 if (strncmp(TTY_PREFIX, uttyname, sizeof(TTY_PREFIX)-1)
== 0)
_pammodutil_tty_secure doesn't like a NULL uttyname.
Cheers,
Julien
--
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]