Very weird, when running kadmin.local under valgrind, it does NOT segfault. I am including the valgrind output.
------------------------------------------------------- [EMAIL PROTECTED] ~]# valgrind kadmin.local ==9674== Memcheck, a memory error detector. ==9674== Copyright (C) 2002-2005, and GNU GPL'd, by Julian Seward et al. ==9674== Using LibVEX rev 1575, a library for dynamic binary translation. ==9674== Copyright (C) 2004-2005, and GNU GPL'd, by OpenWorks LLP. ==9674== Using valgrind-3.1.1, a dynamic binary instrumentation framework. ==9674== Copyright (C) 2000-2005, and GNU GPL'd, by Julian Seward et al. ==9674== For more details, rerun with: -v ==9674== Authenticating as principal root/[EMAIL PROTECTED] with password. kadmin.local: cpw test Enter password for principal "test": Re-enter password for principal "test": ==9674== Conditional jump or move depends on uninitialised value(s) ==9674== at 0x402FC40: cleanup_key_data (kdb_cpw.c:88) ==9674== by 0x4030CAB: krb5_dbe_def_cpw (kdb_cpw.c:588) ==9674== by 0x402EB06: krb5_dbe_cpw (kdb5.c:1736) ==9674== by 0x40177A8: kadm5_chpass_principal_3 (svr_principal.c:1328) ==9674== by 0x401743F: kadm5_chpass_principal (svr_principal.c:1276) ==9674== by 0x804BD27: kadmin_cpw (kadmin.c:831) ==9674== by 0x80516CB: check_request_table (execute_cmd.c:89) ==9674== by 0x8051738: really_execute_command (execute_cmd.c:130) ==9674== by 0x8051899: ss_execute_line (execute_cmd.c:215) ==9674== by 0x8051BB6: ss_listen (listen.c:125) ==9674== by 0x804E57E: main (ss_wrapper.c:62) ==9674== ==9674== Conditional jump or move depends on uninitialised value(s) ==9674== at 0x402F242: krb5_dbekd_decrypt_key_data (decrypt_key.c:118) ==9674== by 0x4016F6B: create_history_entry (svr_principal.c:1007) ==9674== by 0x4017860: kadm5_chpass_principal_3 (svr_principal.c:1364) ==9674== by 0x401743F: kadm5_chpass_principal (svr_principal.c:1276) ==9674== by 0x804BD27: kadmin_cpw (kadmin.c:831) ==9674== by 0x80516CB: check_request_table (execute_cmd.c:89) ==9674== by 0x8051738: really_execute_command (execute_cmd.c:130) ==9674== by 0x8051899: ss_execute_line (execute_cmd.c:215) ==9674== by 0x8051BB6: ss_listen (listen.c:125) ==9674== by 0x804E57E: main (ss_wrapper.c:62) ==9674== ==9674== Conditional jump or move depends on uninitialised value(s) ==9674== at 0x402F077: krb5_dbekd_encrypt_key_data (encrypt_key.c:122) ==9674== by 0x4016FCA: create_history_entry (svr_principal.c:1014) ==9674== by 0x4017860: kadm5_chpass_principal_3 (svr_principal.c:1364) ==9674== by 0x401743F: kadm5_chpass_principal (svr_principal.c:1276) ==9674== by 0x804BD27: kadmin_cpw (kadmin.c:831) ==9674== by 0x80516CB: check_request_table (execute_cmd.c:89) ==9674== by 0x8051738: really_execute_command (execute_cmd.c:130) ==9674== by 0x8051899: ss_execute_line (execute_cmd.c:215) ==9674== by 0x8051BB6: ss_listen (listen.c:125) ==9674== by 0x804E57E: main (ss_wrapper.c:62) ==9674== ==9674== Conditional jump or move depends on uninitialised value(s) ==9674== at 0x427AFF2: krb5_dbe_free_contents (ldap_principal.c:107) ==9674== by 0x427B199: krb5_ldap_free_principal (ldap_principal.c:135) ==9674== by 0x402DA89: krb5_db_free_principal (kdb5.c:928) ==9674== by 0x401AE31: kdb_free_entry (server_kdb.c:295) ==9674== by 0x4017A52: kadm5_chpass_principal_3 (svr_principal.c:1453) ==9674== by 0x401743F: kadm5_chpass_principal (svr_principal.c:1276) ==9674== by 0x804BD27: kadmin_cpw (kadmin.c:831) ==9674== by 0x80516CB: check_request_table (execute_cmd.c:89) ==9674== by 0x8051738: really_execute_command (execute_cmd.c:130) ==9674== by 0x8051899: ss_execute_line (execute_cmd.c:215) ==9674== by 0x8051BB6: ss_listen (listen.c:125) ==9674== by 0x804E57E: main (ss_wrapper.c:62) Password for "[EMAIL PROTECTED]" changed. kadmin.local: quit ==9674== ==9674== ERROR SUMMARY: 4 errors from 4 contexts (suppressed: 69 from 2) ==9674== malloc/free: in use at exit: 1,441 bytes in 68 blocks. ==9674== malloc/free: 2,280 allocs, 2,212 frees, 348,960 bytes allocated. ==9674== For counts of detected errors, rerun with: -v ==9674== searching for pointers to 68 not-freed blocks. ==9674== checked 174,336 bytes. ==9674== ==9674== LEAK SUMMARY: ==9674== definitely lost: 733 bytes in 34 blocks. ==9674== possibly lost: 0 bytes in 0 blocks. ==9674== still reachable: 708 bytes in 34 blocks. ==9674== suppressed: 0 bytes in 0 blocks. ==9674== Use --leak-check=full to see details of leaked memory. [EMAIL PROTECTED] ~]# ____________________________________________________________________________________ Looking for last minute shopping deals? Find them fast with Yahoo! Search. http://tools.search.yahoo.com/newsearch/category.php?category=shopping ________________________________________________ Kerberos mailing list Kerberos@mit.edu https://mailman.mit.edu/mailman/listinfo/kerberos