On 24 Sep 2003, Andrew Morgan writes:

> I've just ran into this problem again.  This time I have the gdb
> backtrace of both the lmtpd process trying to get the lock and the
> imap process holding the lock.  There is nothing new in the lmtpd
> backtrace.  Here is the imapd backtrace:

> 0x402ae3c4 in read () from /lib/libc.so.6
> (gdb) bt
> #0  0x402ae3c4 in read () from /lib/libc.so.6
> #1  0x40111fc4 in TXT_DB_version () from /usr/lib/libcrypto.so.0.9.6
> #2  0x41754277 in ?? ()
> Cannot access memory at address 0x62416b47

> So I'm a little stuck here.  I don't know enough about gdb to find
> out what it is actually trying to read from, although the network
> seems like a reasonable guess.

I'm guessing here, but is this at all related to the "insufficient
randomness" thing where reading from /dev/random hangs until more
entropy gens generated?  A read from code in libcrypto that hangs
things ... it all sounds strangely familiar!

If my guess is somewhat close to correct, then a temporary workaround
(which worked on Red Hat 7.3 for me) may be to do

  cd /dev
  mv random random.orig
  ln -s urandom random

A longer term fix may be to recompile the affected code to use
/dev/urandom for its entropy source, rather than /dev/random?

Hope this helps,

Jonathan
--
Jonathan Marsden        | Internet: [EMAIL PROTECTED]   | Making electronic 
1252 Judson Street      | Phone: +1 (909) 795-3877      | communications work 
Redlands, CA 92374      | Fax:   +1 (909) 795-0327      | reliably for Christian 
USA                     | http://www.xc.org/jonathan    | missions worldwide 



Reply via email to