From owner-freebsd-stable Mon Apr 12 9:25:56 1999 Delivered-To: freebsd-stable@freebsd.org Received: from point.osg.gov.bc.ca (point.osg.gov.bc.ca [142.32.102.44]) by hub.freebsd.org (Postfix) with ESMTP id 648EA155BD for ; Mon, 12 Apr 1999 09:25:43 -0700 (PDT) (envelope-from Cy.Schubert@uumail.gov.bc.ca) Received: (from daemon@localhost) by point.osg.gov.bc.ca (8.8.7/8.8.8) id JAA15188; Mon, 12 Apr 1999 09:26:03 -0700 Received: from passer.osg.gov.bc.ca(142.32.110.29) via SMTP by point.osg.gov.bc.ca, id smtpda15186; Mon Apr 12 09:25:59 1999 Received: (from uucp@localhost) by passer.osg.gov.bc.ca (8.9.3/8.9.1) id JAA00672; Mon, 12 Apr 1999 09:23:21 -0700 (PDT) Message-Id: <199904121623.JAA00672@passer.osg.gov.bc.ca> Received: from localhost.osg.gov.bc.ca(127.0.0.1), claiming to be "passer.osg.gov.bc.ca" via SMTP by localhost.osg.gov.bc.ca, id smtpdNEk662; Mon Apr 12 09:22:48 1999 X-Mailer: exmh version 2.0.2 2/24/98 Reply-To: Cy Schubert - ITSD Open Systems Group X-OS: FreeBSD 3.1-RELEASE X-Sender: cschuber To: Jeff Aitken Cc: max@ukonline.net (Max Booth), freebsd-stable@FreeBSD.ORG Subject: Re: inetd problems In-reply-to: Your message of "Mon, 12 Apr 1999 12:12:36 EDT." <199904121612.MAA01726@eagle.aitken.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Date: Mon, 12 Apr 1999 09:22:48 -0700 From: Cy Schubert Sender: owner-freebsd-stable@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG In message <199904121612.MAA01726@eagle.aitken.com>, Jeff Aitken writes: > Max Booth writes: > > Escape character is '^]'. > > inetd in realloc(): warning: junk pointer, too low to make sense. > > inetd in free(): warning: junk pointer, too low to make sense. > > Connection closed by foreign host. > > > I've seen this before, on a 2.2.6 system. IIRC, the answer from > Jordan was that there was a subtle but in inetd (or triggered by > inetd) which caused this sort of memory problem. I don't recall > whether killing and restarting inetd was enough to "fix" it or if > it required a reboot. > > I'm fairly certain that it didn't represent a security problem. This is what I originally did to circumvent the problem. Please don't laugh., it's low tech. In cron: */10 * * * * /usr/local/sbin/checkinetd In services: ckinetd 4321/tcp # checkinetd In inetd.conf: ckinetd stream tcp nowait nobody /bin/echo echo 220 Install the netcat port. checkinetd: #!/bin/sh - case `/usr/local/bin/nc localhost ckinetd` in 220) ;; *) cd / INETD_PID=`/bin/cat /var/run/inetd.pid` /usr/bin/logger -p daemon.error inetd junk pointers, killing and restarting inetd PID $INETD_PID /bin/kill $INETD_PID /bin/sleep 3 /usr/sbin/inetd /bin/sleep 1 /usr/bin/logger -p daemon.notice inetd junk pointers, restarted inetd PID `/bin/cat /var/run/inetd.pid` ;; esac Regards, Phone: (250)387-8437 Cy Schubert Fax: (250)387-5766 Open Systems Group Internet: Cy.Schubert@uumail.gov.bc.ca ITSD Cy.Schubert@gems8.gov.bc.ca Province of BC "e**(i*pi)+1=0" To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-stable" in the body of the message