On Wed, Aug 20, 2008 at 20:03:47 +0200, Nico Golde wrote: > [EMAIL PROTECTED]:/tmp$] cp /usr/share/doc/libpam0g-dev/examples/check_user.c > . > [EMAIL PROTECTED]:/tmp$] gcc -lpam -lpam_misc check_user.c -o check_user > [EMAIL PROTECTED]:/tmp$] ./check_user nion; date; tail -1 /var/log/kern.log > Authenticated > Mi 20. Aug 20:01:40 CEST 2008 > Aug 20 20:01:40 coredump kernel: [1073387.605090] check_user[20665]: segfault > at 0 ip 7f9a2ebf40f9 sp 7fff37983980 error 4 in pam_unix.so[7f9a2ebea000+c000] > > The segfault happens on the pam_authenticate call as far as I can see. > > Reassigning to pam... > (gdb) set follow-fork-mode child (gdb) r julien Starting program: /tmp/check_user julien
Program received signal SIGSEGV, Segmentation fault. [Switching to process 11347] 0xb7d8cec6 in _pammodutil_tty_secure (pamh=0x924b008, uttyname=0x0) at tty_secure.c:42 42 if (strncmp(TTY_PREFIX, uttyname, sizeof(TTY_PREFIX)-1) == 0) _pammodutil_tty_secure doesn't like a NULL uttyname. Cheers, Julien -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]