I can confirm this behavior for rxvt on Win2k, and have some more info:

rxvt only crashes in W11 (Windows native) mode, in X11 mode it works fine.
I've run strace, and the output is quite interesting.  rxvt apparently
goes into an infinite loop trying to setup a signal handler, and runs out
of stack space.  I've attached strace output (with only the first few
frames of the infinite loop).

I also have another problem.  Apparently, 'ssh -X' hangs when requesting a
pty.  This doesn't happen if the -X flag is not specified, but does happen
with the -X flag in both SSH1 and SSH2 modes.  I've attached the output
of 'ssh -v -X -1 [EMAIL PROTECTED]' and 'ssh -v -X -2
[EMAIL PROTECTED]'.
        Igor

On Mon, 14 Oct 2002, Topas wrote:

> I just install the Cygwin-1.3.13-1, the rxvt will crash under 1.3.13-1.
> I also try the snapshot-20021010, it works fine.
>
> [Rxvt.exe.stackdump]
> Exception: STATUS_ACCESS_VIOLATION at eip=61066300
> eax=00000000 ebx=00200020 ecx=77E5A39C edx=7FFE0304 esi=0A02ACE0
> edi=00000000
> ebp=013CFF84 esp=013CFF5C program=c:\cygwin\bin\rxvt.exe
> cs=001B ds=0023 es=0023 fs=0038 gs=0000 ss=0023
> Stack trace:
> Frame     Function  Args
> 013CFF84  61066300  (0A02ACE0, 00000000, 00000000, 00000000)
> 013CFFB4  61005436  (610C6800, 00000000, 00000000, 610C6800)
>  152748 [select_pipe] rxvt 2600 handle_exceptions: Exception:
> STATUS_ACCESS_VIOLATION
>  161015 [select_pipe] rxvt 2600 handle_exceptions: Error while dumping
> state (probably corrupted stack)
>
> [Cygcheck -s result:]
> [snip]

-- 
                                http://cs.nyu.edu/~pechtcha/
      |\      _,,,---,,_                [EMAIL PROTECTED]
ZZZzz /,`.-'`'    -.  ;-;;,_            [EMAIL PROTECTED]
     |,4-  ) )-,_. ,\ (  `'-'           Igor Pechtchanski
    '---''(_/--'  `-'\_) fL     a.k.a JaguaR-R-R-r-r-r-.-.-.  Meow!

"Water molecules expand as they grow warmer" (C) Popular Science, Oct'02, p.51

Attachment: rxvt.strace.bz2
Description: Binary data

[pechtcha:~] ssh -v -X [EMAIL PROTECTED]
OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090607f
debug1: Reading configuration data /home/igor/.ssh/config
debug1: Applying options for *
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: ssh_connect: needpriv 0
debug1: Connecting to slinky.cs.nyu.edu [128.122.20.14] port 22.
debug1: Connection established.
debug1: identity file /home/igor/.ssh/identity type 0
debug1: identity file /home/igor/.ssh/id_rsa type -1
debug1: identity file /home/igor/.ssh/id_dsa type -1
debug1: Remote protocol version 1.99, remote software version 2.2.0 SSH Secure Shell 
(non-commercial)
debug1: match: 2.2.0 SSH Secure Shell (non-commercial) pat 2.2.0*,2.3.0*
debug1: Local version string SSH-1.5-OpenSSH_3.4p1
debug1: Waiting for server public key.
debug1: Received server public key (768 bits) and host key (1024 bits).
debug1: Host 'slinky.cs.nyu.edu' is known and matches the RSA1 host key.
debug1: Found key in /home/igor/.ssh/known_hosts:2
debug1: Encryption type: 3des
debug1: Sent encrypted session key.
debug1: cipher_init: set keylen (16 -> 32)
debug1: cipher_init: set keylen (16 -> 32)
debug1: Installing crc compensation attack detector.
debug1: Received encrypted confirmation.
debug1: Trying RSA authentication with key '/home/igor/.ssh/identity'
debug1: Received RSA challenge from server.
debug1: Sending response to host key RSA challenge.
debug1: RSA authentication accepted by server.
debug1: Requesting pty.

[pechtcha:~] ssh -v -X -2 [EMAIL PROTECTED]
OpenSSH_3.4p1, SSH protocols 1.5/2.0, OpenSSL 0x0090607f
debug1: Reading configuration data /home/igor/.ssh/config
debug1: Applying options for *
debug1: Rhosts Authentication disabled, originating port will not be trusted.
debug1: ssh_connect: needpriv 0
debug1: Connecting to slinky.cs.nyu.edu [128.122.20.14] port 22.
debug1: Connection established.
debug1: identity file /home/igor/.ssh/id_rsa type -1
debug1: identity file /home/igor/.ssh/id_dsa type -1
debug1: Remote protocol version 1.99, remote software version 2.2.0 SSH Secure Shell 
(non-commercial)
debug1: match: 2.2.0 SSH Secure Shell (non-commercial) pat 2.2.0*,2.3.0*
Enabling compatibility mode for protocol 2.0
debug1: Local version string SSH-2.0-OpenSSH_3.4p1
debug1: SSH2_MSG_KEXINIT sent
debug1: SSH2_MSG_KEXINIT received
debug1: kex: server->client 3des-cbc hmac-md5 none
debug1: kex: client->server 3des-cbc hmac-md5 none
debug1: dh_gen_key: priv key bits set: 188/384
debug1: bits set: 496/1024
debug1: sending SSH2_MSG_KEXDH_INIT
debug1: expecting SSH2_MSG_KEXDH_REPLY
debug1: Host 'slinky.cs.nyu.edu' is known and matches the DSA host key.
debug1: Found key in /home/igor/.ssh/known_hosts:1
debug1: bits set: 536/1024
debug1: ssh_dss_verify: signature correct
debug1: kex_derive_keys
debug1: newkeys: mode 1
debug1: SSH2_MSG_NEWKEYS sent
debug1: waiting for SSH2_MSG_NEWKEYS
debug1: newkeys: mode 0
debug1: SSH2_MSG_NEWKEYS received
debug1: done: ssh_kex2.
debug1: send SSH2_MSG_SERVICE_REQUEST
debug1: service_accept: ssh-userauth
debug1: got SSH2_MSG_SERVICE_ACCEPT
debug1: authentications that can continue: publickey,password,hostbased
debug1: next auth method to try is publickey
debug1: try privkey: /home/igor/.ssh/id_rsa
debug1: try privkey: /home/igor/.ssh/id_dsa
debug1: next auth method to try is password
[EMAIL PROTECTED]'s password:
debug1: ssh-userauth2 successful: method password
debug1: channel 0: new [client-session]
debug1: send channel open 0
debug1: Entering interactive session.
debug1: ssh_session2_setup: id 0
debug1: channel request 0: pty-req

--
Unsubscribe info:      http://cygwin.com/ml/#unsubscribe-simple
Bug reporting:         http://cygwin.com/bugs.html
Documentation:         http://cygwin.com/docs.html
FAQ:                   http://cygwin.com/faq/

Reply via email to