From owner-freebsd-arm@FreeBSD.ORG Fri Nov 1 13:50:39 2013 Return-Path: Delivered-To: freebsd-arm@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTP id 803568B9 for ; Fri, 1 Nov 2013 13:50:39 +0000 (UTC) (envelope-from ian@FreeBSD.org) Received: from mho-02-ewr.mailhop.org (mho-02-ewr.mailhop.org [204.13.248.72]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mx1.freebsd.org (Postfix) with ESMTPS id 5799E2DD3 for ; Fri, 1 Nov 2013 13:50:39 +0000 (UTC) Received: from c-24-8-230-52.hsd1.co.comcast.net ([24.8.230.52] helo=damnhippie.dyndns.org) by mho-02-ewr.mailhop.org with esmtpsa (TLSv1:AES256-SHA:256) (Exim 4.72) (envelope-from ) id 1VcF7V-0001pS-V8; Fri, 01 Nov 2013 13:50:38 +0000 Received: from [172.22.42.240] (revolution.hippie.lan [172.22.42.240]) by damnhippie.dyndns.org (8.14.3/8.14.3) with ESMTP id rA1DoYMJ057125; Fri, 1 Nov 2013 07:50:34 -0600 (MDT) (envelope-from ian@FreeBSD.org) X-Mail-Handler: Dyn Standard SMTP by Dyn X-Originating-IP: 24.8.230.52 X-Report-Abuse-To: abuse@dyndns.com (see http://www.dyndns.com/services/sendlabs/outbound_abuse.html for abuse reporting information) X-MHO-User: U2FsdGVkX1+V/mC1pqV8eqIjdvcswJGx Subject: Re: sshd crash From: Ian Lepore To: Howard Su In-Reply-To: References: Content-Type: text/plain; charset="us-ascii" Date: Fri, 01 Nov 2013 07:50:34 -0600 Message-ID: <1383313834.31172.65.camel@revolution.hippie.lan> Mime-Version: 1.0 X-Mailer: Evolution 2.32.1 FreeBSD GNOME Team Port Content-Transfer-Encoding: 7bit Cc: freebsd-arm@FreeBSD.org X-BeenThere: freebsd-arm@freebsd.org X-Mailman-Version: 2.1.14 Precedence: list List-Id: Porting FreeBSD to the StrongARM Processor List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Fri, 01 Nov 2013 13:50:39 -0000 On Fri, 2013-11-01 at 21:36 +0800, Howard Su wrote: > I running freebsd in BeagleBone Black. > root@beaglebone:~ # uname -a > FreeBSD beaglebone 11.0-CURRENT FreeBSD 11.0-CURRENT #0 r257039: Thu Oct 24 > 11:39:07 CET 2013 > root@testbed:/usr/home/howard/bbb/crochet-freebsd/work/obj/arm.armv6/usr/src/sys/BEAGLEBONE > arm > > debug1: HPN Disabled: 0, HPN Buffer Size: 65536 > debug1: Client protocol version 2.0; client software version > PuTTY_Release_0.63 > debug1: no match: PuTTY_Release_0.63 > debug1: Enabling compatibility mode for protocol 2.0 > debug1: Local version string SSH-2.0-OpenSSH_6.3_hpn13v11 FreeBSD-20130918 > debug1: permanently_set_uid: 22/22 [preauth] > debug1: list_hostkey_types: ssh-rsa,ssh-dss,ecdsa-sha2-nistp256 [preauth] > debug1: SSH2_MSG_KEXINIT sent [preauth] > debug1: SSH2_MSG_KEXINIT received [preauth] > debug1: kex: client->server aes256-ctr hmac-sha2-256 none [preauth] > debug1: kex: server->client aes256-ctr hmac-sha2-256 none [preauth] > debug1: SSH2_MSG_KEX_DH_GEX_REQUEST_OLD received [preauth] > : jemalloc_arena.c:387: Failed assertion: "p[i] == 0" > debug1: SSH2_MSG_KEX_DH_GEX_GROUP sent [preauth] > debug1: monitor_read_log: child log fd closed > debug1: do_cleanup > debug1: Killing privsep child 807 > > I find the workaround with the history, add UsePrivilegeSeparation no into > /etc/ssh/sshd_config. I just wondering if anyone is working on this issue? > I would like to dig into more details if no one is active looking at this. > Several people investigated this (pretty extensively) and didn't come up with a solution, or even a good suspect. We haven't forgotten it by any means, but I don't think anyone is knocking themselves out on it right now either. A fresh look may be exactly what's needed, so feel free to dig into it. I'll summarize what I remember... It happens on armv4 and armv6. It happens when kernel and world are built with clang or gcc. It happens with eabi and oabi. What I can't remember is whether anyone has bisected things down to a changeset or timeframe when the problem showed up. -- Ian