On Wed, Aug 20, 2008 at 20:03:47 +0200, Nico Golde wrote:

> [EMAIL PROTECTED]:/tmp$] cp /usr/share/doc/libpam0g-dev/examples/check_user.c 
> .
> [EMAIL PROTECTED]:/tmp$] gcc -lpam -lpam_misc check_user.c -o check_user
> [EMAIL PROTECTED]:/tmp$] ./check_user nion; date; tail -1 /var/log/kern.log
> Authenticated
> Mi 20. Aug 20:01:40 CEST 2008
> Aug 20 20:01:40 coredump kernel: [1073387.605090] check_user[20665]: segfault 
> at 0 ip 7f9a2ebf40f9 sp 7fff37983980 error 4 in pam_unix.so[7f9a2ebea000+c000]
> 
> The segfault happens on the pam_authenticate call as far as I can see.
> 
> Reassigning to pam...
> 
(gdb) set follow-fork-mode child 
(gdb) r julien
Starting program: /tmp/check_user julien

Program received signal SIGSEGV, Segmentation fault.
[Switching to process 11347]
0xb7d8cec6 in _pammodutil_tty_secure (pamh=0x924b008, uttyname=0x0)
    at tty_secure.c:42
    42          if (strncmp(TTY_PREFIX, uttyname, sizeof(TTY_PREFIX)-1)
    == 0)

_pammodutil_tty_secure doesn't like a NULL uttyname.

Cheers,
Julien



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to