Your message dated Fri, 09 Oct 2009 01:02:12 +0000
with message-id <[email protected]>
and subject line Bug#549702: fixed in udev 146-5
has caused the Debian Bug report #549702,
regarding openssh-server: sshd not reaping my login shell
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
549702: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=549702
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: openssh-server
Version: 1:5.1p1-7
Severity: important


When I ssh from little-cat-a to cat-in-the-hat, exiting the login shell
on cat-in-the-hat doesn't end my ssh connection. After running ps on
cat-in-the-hat, I noticed that the login shell in question was still
sitting around as a zombie process, meaning that sshd isn't reaping the
shell.

Here's an strace of the problem (from sshd on cat-in-the-hat), attaching
to the sshd process (as root) after I am already logged in. You can see
that sshd is changing the signal mask an awful lot (blocking and
unblocking SIGCHLD), and it appears sshd isn't responding to SIGCHLD.
(It's definitley not calling waitpid to reap the shell.)

sshd finally quits when I type ~. to make the client drop the
connection.

[bl...@cat-in-the-hat ~]$ sudo strace -p 8124
[sudo] password for bloom: 
Process 8124 attached - interrupt to quit
select(13, [3 6 8 9 12], [], NULL, NULL) = 1 (in [3])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
read(3, "?m\3\270^\316,\314\0v\375\240\36\rG\263\203`f\210\210\264\340
\366\3\341\366\230_X\5\276"..., 16384) = 48
select(13, [3 6 8 9 12], [10], NULL, NULL) = 1 (out [10])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
write(10, "e", 1)                       = 1
ioctl(10, SNDCTL_TMR_TIMEBASE or TCGETS, {B38400 opost isig -icanon
-echo ...}) = 0
select(13, [3 6 8 9 12], [], NULL, NULL) = 1 (in [12])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
read(12, "e", 16384)                    = 1
select(13, [3 6 8 9 12], [3], NULL, NULL) = 1 (out [3])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
write(3, "X\263\2A\350\235\233\355,\3149\223\364\221\265Ut\346\225h\275
\215z\234Z\3039\31\356x[\27"..., 48) = 48
select(13, [3 6 8 9 12], [], NULL, NULL) = 1 (in [3])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
read(3, "\233`\205l\271\25\217\245\311j\307\2614\267t\226D\212\275h&q
\314+\262\23\25\321\302\261D\235"..., 16384) = 48
select(13, [3 6 8 9 12], [10], NULL, NULL) = 1 (out [10])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
write(10, "x", 1)                       = 1
ioctl(10, SNDCTL_TMR_TIMEBASE or TCGETS, {B38400 opost isig -icanon
-echo ...}) = 0
select(13, [3 6 8 9 12], [], NULL, NULL) = 1 (in [12])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
read(12, "x", 16384)                    = 1
select(13, [3 6 8 9 12], [3], NULL, NULL) = 1 (out [3])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
write(3, "\206\331V\270\377\4\356\34rA\211c\336\200-e\264M\205\244\263
\250Qg$\227\307\205\270\36\201t"..., 48) = 48
select(13, [3 6 8 9 12], [], NULL, NULL) = 1 (in [3])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
read(3, "<\326\326|\204\343[G\22\230\211\231\2\240\324xs~\257\35\250TT
\212,>\1\376U\231\374\264"..., 16384) = 48
select(13, [3 6 8 9 12], [10], NULL, NULL) = 1 (out [10])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
write(10, "i", 1)                       = 1
ioctl(10, SNDCTL_TMR_TIMEBASE or TCGETS, {B38400 opost isig -icanon
-echo ...}) = 0
select(13, [3 6 8 9 12], [], NULL, NULL) = 1 (in [12])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
read(12, "i", 16384)                    = 1
select(13, [3 6 8 9 12], [3], NULL, NULL) = 1 (out [3])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
write(3, "\320\230 \245\237\230[\261\33\16K1\207\270\241\270\310\\tkU
\231\n\347\232H2*LENf"..., 48) = 48
select(13, [3 6 8 9 12], [], NULL, NULL) = 1 (in [3])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
read(3, "\236\347\243\35\22\235\241v\247k\246<\r\305a\271\335V\305&\30
\324-=\204\256...@\302`\333"..., 16384) = 48
select(13, [3 6 8 9 12], [10], NULL, NULL) = 1 (out [10])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
write(10, "t", 1)                       = 1
ioctl(10, SNDCTL_TMR_TIMEBASE or TCGETS, {B38400 opost isig -icanon
-echo ...}) = 0
select(13, [3 6 8 9 12], [], NULL, NULL) = 1 (in [12])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
read(12, "t", 16384)                    = 1
select(13, [3 6 8 9 12], [3], NULL, NULL) = 1 (out [3])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
write(3, ")(\353\317\2G(<\374e\346\253\277&R\214\37719\\\306\341\241d\5
\247\237\3059\35B}"..., 48) = 48
select(13, [3 6 8 9 12], [], NULL, NULL) = 1 (in [3])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
read(3, "i2xeL\20\215\266~s\264\264/fIZe\314v\304\216E\323GO\236\34\331
\364\250[l"..., 16384) = 48
select(13, [3 6 8 9 12], [10], NULL, NULL) = 1 (out [10])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
write(10, "\r", 1)                      = 1
select(13, [3 6 8 9 12], [], NULL, NULL) = 1 (in [12])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
read(12, "\r\n", 16384)                 = 2
select(13, [3 6 8 9 12], [3], NULL, NULL) = 2 (in [12], out [3])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
read(12, "logout\r\n", 16384)           = 8
write(3, "v\216`<\244\240\264\32D\331\240\212R\250-+\346\325\237b\255
\351{{y\327D4(\250\371\313"..., 48) = 48
select(13, [3 6 8 9 12], [3], NULL, NULL) = 1 (out [3])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
write(3, "\261\10\331\20fV\225\231\351=\2111\34\225G\366r\222+a\335\264
\244\266\r\17\2424^\311\0027"..., 48) = 48
select(13, [3 6 8 9 12], [], NULL, NULL) = 1 (in [12])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
read(12, 0x7fff72ac4d40, 16384)         = -1 EIO (Input/output error)
close(12)                               = 0
select(13, [3 6 8 9], [3], NULL, NULL)  = 1 (out [3])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
write(3, "\217\254\305\327\4\235N\266r\214\6h\341\256hg\362\227kNa\322
\376\33\306\363i\233\243\260x\311", 32) = 32
select(13, [3 6 8 9], [], NULL, NULL)   = 1 (in [3])
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
read(3, "", 16384)                      = 0
rt_sigprocmask(SIG_BLOCK, [CHLD], ~[KILL ALRM STOP RTMIN RT_1], 8) = 0
rt_sigprocmask(SIG_SETMASK, ~[KILL ALRM STOP RTMIN RT_1], NULL, 8) = 0
close(10)                               = 0
shutdown(8, 2 /* send and receive */)   = 0
close(8)                                = 0
close(8)                                = -1 EBADF (Bad file descriptor)
close(8)                                = -1 EBADF (Bad file descriptor)
shutdown(9, 2 /* send and receive */)   = 0
close(9)                                = 0
close(9)                                = -1 EBADF (Bad file descriptor)
close(9)                                = -1 EBADF (Bad file descriptor)
brk(0x7fc905223000)                     = 0x7fc905223000
write(5, "\0\0\0\17\34", 5)             = 5
write(5, "\0\0\0\n/dev/pts/1", 14)      = 14
close(13)                               = 0
shutdown(3, 2 /* send and receive */)   = 0
close(3)                                = 0
write(5, "\0\0\0\1=", 5)                = 5
exit_group(0)                           = ?
Process 8124 detached


-- System Information:
Debian Release: squeeze/sid
  APT prefers unstable
  APT policy: (500, 'unstable'), (1, 'experimental')
Architecture: amd64 (x86_64)

Kernel: Linux 2.6.30-1-amd64 (SMP w/2 CPU cores)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages openssh-server depends on:
ii  adduser                3.111             add and remove users and groups
ii  debconf [debconf-2.0]  1.5.27            Debian configuration management sy
ii  dpkg                   1.15.4            Debian package management system
ii  libc6                  2.9-27            GNU C Library: Shared libraries
ii  libcomerr2             1.41.9-1          common error description library
ii  libgssapi-krb5-2       1.7dfsg~beta3-1   MIT Kerberos runtime libraries - k
ii  libk5crypto3           1.7dfsg~beta3-1   MIT Kerberos runtime libraries - C
ii  libkrb5-3              1.7dfsg~beta3-1   MIT Kerberos runtime libraries
ii  libpam-modules         1.1.0-4           Pluggable Authentication Modules f
ii  libpam-runtime         1.1.0-4           Runtime support for the PAM librar
ii  libpam0g               1.1.0-4           Pluggable Authentication Modules l
ii  libselinux1            2.0.85-4          SELinux runtime shared libraries
ii  libssl0.9.8            0.9.8k-5          SSL shared libraries
ii  libwrap0               7.6.q-18          Wietse Venema's TCP wrappers libra
ii  lsb-base               3.2-23            Linux Standard Base 3.2 init scrip
ii  openssh-blacklist      0.4.1             list of default blacklisted OpenSS
ii  openssh-client         1:5.1p1-7         secure shell client, an rlogin/rsh
ii  procps                 1:3.2.8-1.2       /proc file system utilities
ii  zlib1g                 1:1.2.3.3.dfsg-15 compression library - runtime

Versions of packages openssh-server recommends:
ii  openssh-blacklist-extra       0.4.1      list of non-default blacklisted Op
ii  xauth                         1:1.0.3-2  X authentication utility

Versions of packages openssh-server suggests:
pn  molly-guard                   <none>     (no description available)
pn  rssh                          <none>     (no description available)
pn  ssh-askpass                   <none>     (no description available)
pn  ufw                           <none>     (no description available)

-- debconf information:
* ssh/insecure_rshd:
* ssh/vulnerable_host_keys:
* ssh/new_config: true
* ssh/use_old_init_script: true
* ssh/disable_cr_auth: false
* ssh/encrypted_host_key_but_no_keygen:



--- End Message ---
--- Begin Message ---
Source: udev
Source-Version: 146-5

We believe that the bug you reported is fixed in the latest version of
udev, which is due to be installed in the Debian FTP archive:

gir1.0-gudev-1.0_146-5_i386.deb
  to pool/main/u/udev/gir1.0-gudev-1.0_146-5_i386.deb
libgudev-1.0-0_146-5_i386.deb
  to pool/main/u/udev/libgudev-1.0-0_146-5_i386.deb
libgudev-1.0-dev_146-5_i386.deb
  to pool/main/u/udev/libgudev-1.0-dev_146-5_i386.deb
libudev-dev_146-5_i386.deb
  to pool/main/u/udev/libudev-dev_146-5_i386.deb
libudev0_146-5_i386.deb
  to pool/main/u/udev/libudev0_146-5_i386.deb
udev-udeb_146-5_i386.udeb
  to pool/main/u/udev/udev-udeb_146-5_i386.udeb
udev_146-5.diff.gz
  to pool/main/u/udev/udev_146-5.diff.gz
udev_146-5.dsc
  to pool/main/u/udev/udev_146-5.dsc
udev_146-5_i386.deb
  to pool/main/u/udev/udev_146-5_i386.deb



A summary of the changes between this version and the previous one is
attached.

Thank you for reporting the bug, which will now be closed.  If you
have further comments please address them to [email protected],
and the maintainer will reopen the bug report if appropriate.

Debian distribution maintenance software
pp.
Marco d'Itri <[email protected]> (supplier of updated udev package)

(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [email protected])


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

Format: 1.8
Date: Thu, 08 Oct 2009 21:56:04 +0200
Source: udev
Binary: udev libudev0 libudev-dev udev-udeb libgudev-1.0-0 gir1.0-gudev-1.0 
libgudev-1.0-dev
Architecture: source i386
Version: 146-5
Distribution: unstable
Urgency: medium
Maintainer: Marco d'Itri <[email protected]>
Changed-By: Marco d'Itri <[email protected]>
Description: 
 gir1.0-gudev-1.0 - libgudev-1.0 introspection data
 libgudev-1.0-0 - GObject-based wrapper library for libudev
 libgudev-1.0-dev - libgudev-1.0 development files
 libudev-dev - libudev development files
 libudev0   - libudev shared library
 udev       - /dev/ and hotplug management daemon
 udev-udeb  - /dev/ and hotplug management daemon (udeb)
Closes: 549702 550032
Changes: 
 udev (146-5) unstable; urgency=medium
 .
   * Abort upgrades in preinst instead of postinst if the kernel lacks
     any of the mandatory features required by udev.
   * Updated patch fix_sigmask: *really* restore the signal mask before
     executing event RUN commands. (Closes: #549702)
   * Added patch serialize_events: backported a fix related to serial
     devices. (Closes: #550032)
Checksums-Sha1: 
 078334d8d6e7f663f11d1091c4b371376d067bb1 1253 udev_146-5.dsc
 4227bca51e046772a9a0b228faddc9d626648540 76000 udev_146-5.diff.gz
 3d1d2bfa885fc75eaf7b7a54107b3e3efc47b3d6 437510 udev_146-5_i386.deb
 ab90cb11802fb9b56ed73731116fcfe25f047846 99700 libudev0_146-5_i386.deb
 981f7ad1b64ae0ddcc75cf7d38a2aec70f8ca6fe 30184 libudev-dev_146-5_i386.deb
 b32a50e12dd1f84a62064000b79afd44aff93a1e 149802 udev-udeb_146-5_i386.udeb
 bb1038f4cbc0fba7be69377e3f42c9ab09e44807 86578 libgudev-1.0-0_146-5_i386.deb
 17d656478f1fd862ab7e86949a7dd0c6c7616350 2240 gir1.0-gudev-1.0_146-5_i386.deb
 3d445dd6a269dbd6662df0ccef4758f2e78bd8fc 19450 libgudev-1.0-dev_146-5_i386.deb
Checksums-Sha256: 
 9d92b0a2abfae35904e0046654f673fdbb2b57c72860971128001450f8617985 1253 
udev_146-5.dsc
 eeefbe9e141835ee80023b198cddf2ef6af6b0b842a953cd494795c689fb2bc4 76000 
udev_146-5.diff.gz
 cd0f5dcf6a87c7bb5eaf94e212310e3f41f092ec2a77ef43671651425a6086b6 437510 
udev_146-5_i386.deb
 b31a1a632fec6f80d42531d282f6b0f244634dee9e9d54698b09c60594440a89 99700 
libudev0_146-5_i386.deb
 c0b0db9c2cef2f29cf7e635edb16b589d67ccbe1b8ef4efd16d4197111a85361 30184 
libudev-dev_146-5_i386.deb
 a841944d0d9be7de8bdc7ca7564118894c83dab8a359ea7878ee6ebb57298d1f 149802 
udev-udeb_146-5_i386.udeb
 fc317290b9eea56793abedf85e967bae90d1d595ae6cb982c713449778e1dee3 86578 
libgudev-1.0-0_146-5_i386.deb
 13dccb4c989d3f3d516e94dd1e6bab2f684be0f219eac29a98c527ac442c3600 2240 
gir1.0-gudev-1.0_146-5_i386.deb
 84ad2301ca41f21655709c692151cdb49b4d1f31bf0bd151f1257cb6a0e256f8 19450 
libgudev-1.0-dev_146-5_i386.deb
Files: 
 d332de6d30969694d2394c800554f85c 1253 admin important udev_146-5.dsc
 05da577af9b5b184b609372c1007b234 76000 admin important udev_146-5.diff.gz
 c26d176fd2b89f52f953eca18c04a9c7 437510 admin important udev_146-5_i386.deb
 d5b856cde1528b7ee514c56196922984 99700 libs optional libudev0_146-5_i386.deb
 7fa254d171d91dcb8a2e7514fed3a7e7 30184 libdevel optional 
libudev-dev_146-5_i386.deb
 05211653b3d4a164224e2900e0fb76cc 149802 debian-installer important 
udev-udeb_146-5_i386.udeb
 0762ce098e069ac19452abdd59fb698f 86578 libs optional 
libgudev-1.0-0_146-5_i386.deb
 067f396e2e816edc6767e675792338f5 2240 libs optional 
gir1.0-gudev-1.0_146-5_i386.deb
 c8b1374afcdc16c364793780588d8bed 19450 libdevel optional 
libgudev-1.0-dev_146-5_i386.deb
Package-Type: udeb

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.10 (GNU/Linux)

iEYEARECAAYFAkrOh1IACgkQFGfw2OHuP7HbxACeOy2CUDZrAYwOBwA1YvhWb21u
eBAAn0PVmdxoQy8xGLMA//SeW8tTuHA9
=52Xv
-----END PGP SIGNATURE-----



--- End Message ---

Reply via email to