|
Message-id: <BC05BC4E-249A-4264-A5BE-8DE4780B4181@erols.com> Date: Fri, 29 Jun 2012 12:03:43 -0400 From: Erik Winkler <ewinkler@...ls.com> To: john-dev@...ts.openwall.com Subject: Re: 1.7.9-jumbo-6 > In one of the email threads, I asked for a gdb backtrace. Any progress > on that? Did you try latest OpenSSL? Thanks. > Here is the backtrace: Reading symbols for shared libraries +++. done Benchmarking: SSH RSA/DSA (one 2048-bit RSA and one 1024-bit DSA key) [32/32]... Program received signal EXC_BAD_ACCESS, Could not access memory. Reason: KERN_INVALID_ADDRESS at address: 0xffd9d730 0x93ef0a78 in tiny_malloc_from_free_list () (gdb) bt #0 0x93ef0a78 in tiny_malloc_from_free_list () #1 0x93eea2ac in szone_malloc () #2 0x93eea190 in malloc_zone_malloc () #3 0x93eea0f0 in malloc () #4 0x000e5430 in CRYPTO_malloc () #5 0x0013b920 in lh_insert () #6 0x000e71ec in CRYPTO_set_ex_data_implementation () #7 0x000e775c in CRYPTO_free_ex_data () #8 0x0012a5e0 in RSA_new_method () #9 0x00129e50 in RSAPrivateKey_asn1_meth () #10 0x001570fc in ASN1_template_new () #11 0x00159b38 in ASN1_item_ex_d2i () #12 0x0015a4ec in ASN1_item_d2i () #13 0x00059e08 in PEM_do_header_safe () #14 0x000bf888 in fmt_self_test () #15 0x000b4b2c in benchmark_format () #16 0x000b5494 in benchmark_all () #17 0x000c35e4 in do_incremental_crack () #18 0x000c44e8 in main () Compiled with the latest OpenSSL (v1.0.1c), I get the following results with segfault: Reading symbols for shared libraries +++. done Benchmarking: SSH RSA/DSA (one 2048-bit RSA and one 1024-bit DSA key) [32/32]... Program received signal EXC_BAD_ACCESS, Could not access memory. Reason: KERN_INVALID_ADDRESS at address: 0xffd9d730 0x93ef0a78 in tiny_malloc_from_free_list () (gdb) bt #0 0x93ef0a78 in tiny_malloc_from_free_list () #1 0x93eea2ac in szone_malloc () #2 0x93eea190 in malloc_zone_malloc () #3 0x93eea0f0 in malloc () #4 0x000e55e0 in CRYPTO_malloc () #5 0x001545b0 in lh_insert () #6 0x000e726c in CRYPTO_set_ex_data_implementation () #7 0x000e77dc in CRYPTO_free_ex_data () #8 0x00139220 in RSA_new_method () #9 0x0013b790 in RSA_X931_hash_id () #10 0x00175ac4 in ASN1_template_new () #11 0x0017850c in ASN1_item_ex_d2i () #12 0x00178ebc in ASN1_item_d2i () #13 0x00059f28 in PEM_do_header_safe () #14 0x000bf9a8 in fmt_self_test () #15 0x000b4c4c in benchmark_format () #16 0x000b55b4 in benchmark_all () #17 0x000c3704 in do_incremental_crack () #18 0x000c4608 in main () Erik
Powered by blists - more mailing lists
Confused about mailing lists and their use? Read about mailing lists on Wikipedia and check out these guidelines on proper formatting of your messages.