I can confirm this behavior for rxvt on Win2k, and have some more info: rxvt only crashes in W11 (Windows native) mode, in X11 mode it works fine. I've run strace, and the output is quite interesting. rxvt apparently goes into an infinite loop trying to setup a signal handler, and runs out of stack space. I've attached strace output (with only the first few frames of the infinite loop).
I also have another problem. Apparently, 'ssh -X' hangs when requesting a pty. This doesn't happen if the -X flag is not specified, but does happen with the -X flag in both SSH1 and SSH2 modes. I've attached the output of 'ssh -v -X -1 [EMAIL PROTECTED]' and 'ssh -v -X -2 [EMAIL PROTECTED]'. Igor On Mon, 14 Oct 2002, Topas wrote: > I just install the Cygwin-1.3.13-1, the rxvt will crash under 1.3.13-1. > I also try the snapshot-20021010, it works fine. > > [Rxvt.exe.stackdump] > Exception: STATUS_ACCESS_VIOLATION at eip=61066300 > eax=00000000 ebx=00200020 ecx=77E5A39C edx=7FFE0304 esi=0A02ACE0 > edi=00000000 > ebp=013CFF84 esp=013CFF5C program=c:\cygwin\bin\rxvt.exe > cs=001B ds=0023 es=0023 fs=0038 gs=0000 ss=0023 > Stack trace: > Frame Function Args > 013CFF84 61066300 (0A02ACE0, 00000000, 00000000, 00000000) > 013CFFB4 61005436 (610C6800, 00000000, 00000000, 610C6800) > 152748 [select_pipe] rxvt 2600 handle_exceptions: Exception: > STATUS_ACCESS_VIOLATION > 161015 [select_pipe] rxvt 2600 handle_exceptions: Error while dumping > state (probably corrupted stack) > > [Cygcheck -s result:] > [snip] -- http://cs.nyu.edu/~pechtcha/ |\ _,,,---,,_ [EMAIL PROTECTED] ZZZzz /,`.-'`' -. ;-;;,_ [EMAIL PROTECTED] |,4- ) )-,_. ,\ ( `'-' Igor Pechtchanski '---''(_/--' `-'\_) fL a.k.a JaguaR-R-R-r-r-r-.-.-. Meow! "Water molecules expand as they grow warmer" (C) Popular Science, Oct'02, p.51
rxvt.strace.bz2
Description: Binary data
[pechtcha:~] ssh -v -X [EMAIL PROTECTED] OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090607f debug1: Reading configuration data /home/igor/.ssh/config debug1: Applying options for * debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: ssh_connect: needpriv 0 debug1: Connecting to slinky.cs.nyu.edu [128.122.20.14] port 22. debug1: Connection established. debug1: identity file /home/igor/.ssh/identity type 0 debug1: identity file /home/igor/.ssh/id_rsa type -1 debug1: identity file /home/igor/.ssh/id_dsa type -1 debug1: Remote protocol version 1.99, remote software version 2.2.0 SSH Secure Shell (non-commercial) debug1: match: 2.2.0 SSH Secure Shell (non-commercial) pat 2.2.0*,2.3.0* debug1: Local version string SSH-1.5-OpenSSH_3.4p1 debug1: Waiting for server public key. debug1: Received server public key (768 bits) and host key (1024 bits). debug1: Host 'slinky.cs.nyu.edu' is known and matches the RSA1 host key. debug1: Found key in /home/igor/.ssh/known_hosts:2 debug1: Encryption type: 3des debug1: Sent encrypted session key. debug1: cipher_init: set keylen (16 -> 32) debug1: cipher_init: set keylen (16 -> 32) debug1: Installing crc compensation attack detector. debug1: Received encrypted confirmation. debug1: Trying RSA authentication with key '/home/igor/.ssh/identity' debug1: Received RSA challenge from server. debug1: Sending response to host key RSA challenge. debug1: RSA authentication accepted by server. debug1: Requesting pty.
[pechtcha:~] ssh -v -X -2 [EMAIL PROTECTED] OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090607f debug1: Reading configuration data /home/igor/.ssh/config debug1: Applying options for * debug1: Rhosts Authentication disabled, originating port will not be trusted. debug1: ssh_connect: needpriv 0 debug1: Connecting to slinky.cs.nyu.edu [128.122.20.14] port 22. debug1: Connection established. debug1: identity file /home/igor/.ssh/id_rsa type -1 debug1: identity file /home/igor/.ssh/id_dsa type -1 debug1: Remote protocol version 1.99, remote software version 2.2.0 SSH Secure Shell (non-commercial) debug1: match: 2.2.0 SSH Secure Shell (non-commercial) pat 2.2.0*,2.3.0* Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-2.0-OpenSSH_3.4p1 debug1: SSH2_MSG_KEXINIT sent debug1: SSH2_MSG_KEXINIT received debug1: kex: server->client 3des-cbc hmac-md5 none debug1: kex: client->server 3des-cbc hmac-md5 none debug1: dh_gen_key: priv key bits set: 188/384 debug1: bits set: 496/1024 debug1: sending SSH2_MSG_KEXDH_INIT debug1: expecting SSH2_MSG_KEXDH_REPLY debug1: Host 'slinky.cs.nyu.edu' is known and matches the DSA host key. debug1: Found key in /home/igor/.ssh/known_hosts:1 debug1: bits set: 536/1024 debug1: ssh_dss_verify: signature correct debug1: kex_derive_keys debug1: newkeys: mode 1 debug1: SSH2_MSG_NEWKEYS sent debug1: waiting for SSH2_MSG_NEWKEYS debug1: newkeys: mode 0 debug1: SSH2_MSG_NEWKEYS received debug1: done: ssh_kex2. debug1: send SSH2_MSG_SERVICE_REQUEST debug1: service_accept: ssh-userauth debug1: got SSH2_MSG_SERVICE_ACCEPT debug1: authentications that can continue: publickey,password,hostbased debug1: next auth method to try is publickey debug1: try privkey: /home/igor/.ssh/id_rsa debug1: try privkey: /home/igor/.ssh/id_dsa debug1: next auth method to try is password [EMAIL PROTECTED]'s password: debug1: ssh-userauth2 successful: method password debug1: channel 0: new [client-session] debug1: send channel open 0 debug1: Entering interactive session. debug1: ssh_session2_setup: id 0 debug1: channel request 0: pty-req
-- Unsubscribe info: http://cygwin.com/ml/#unsubscribe-simple Bug reporting: http://cygwin.com/bugs.html Documentation: http://cygwin.com/docs.html FAQ: http://cygwin.com/faq/