bugzilla-daemon at mindrot.org
2024-May-12 14:19 UTC
[Bug 3690] New: sshd: root [priv] process sleeping leads to unprivileged child proc zombie
https://bugzilla.mindrot.org/show_bug.cgi?id=3690 Bug ID: 3690 Summary: sshd: root [priv] process sleeping leads to unprivileged child proc zombie Product: Portable OpenSSH Version: -current Hardware: All OS: Linux Status: NEW Severity: normal Priority: P5 Component: sshd Assignee: unassigned-bugs at mindrot.org Reporter: 546554688 at qq.com Created attachment 3814 --> https://bugzilla.mindrot.org/attachment.cgi?id=3814&action=edit deadlock process call stack In the `sshd.c` file, the `grace_alarm_handler()` signal handling function calls `sigdie()`, which in turn calls `sshsigdie()`, and within this call, functions such as `shlogv()`, `do_log()`, `{openlog(), syslog(), closelog()}` are invoked. Similarly, within the main thread, the `privsep_preauth()` function calls `monitor_child_preauth()`, which then calls `auth_log()`, and this also results in calls to `{openlog(), syslog(), closelog()}`. Since these functions are not async-signal-safe and they utilize a global lock named `syslog_lock`, this can lead to a recursive deadlock (AA lock). As a result, the pre-authentication process may end up in a zombie state and fail to exit. -- You are receiving this mail because: You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2024-May-12 14:21 UTC
[Bug 3690] sshd: root [priv] process sleeping leads to unprivileged child proc zombie
https://bugzilla.mindrot.org/show_bug.cgi?id=3690 linker <546554688 at qq.com> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |546554688 at qq.com -- You are receiving this mail because: You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2024-May-13 11:01 UTC
[Bug 3690] sshd: root [priv] process sleeping leads to unprivileged child proc zombie
https://bugzilla.mindrot.org/show_bug.cgi?id=3690 Damien Miller <djm at mindrot.org> changed: What |Removed |Added ---------------------------------------------------------------------------- Status|NEW |RESOLVED Resolution|--- |DUPLICATE CC| |djm at mindrot.org --- Comment #1 from Damien Miller <djm at mindrot.org> --- *** This bug has been marked as a duplicate of bug 3598 *** -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
bugzilla-daemon at mindrot.org
2024-May-15 11:20 UTC
[Bug 3690] sshd: root [priv] process sleeping leads to unprivileged child proc zombie
https://bugzilla.mindrot.org/show_bug.cgi?id=3690 linker <546554688 at qq.com> changed: What |Removed |Added ---------------------------------------------------------------------------- Version|-current |8.5p1 -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2024-Jul-01 12:04 UTC
[Bug 3690] sshd: root [priv] process sleeping leads to unprivileged child proc zombie
https://bugzilla.mindrot.org/show_bug.cgi?id=3690 github at kalvdans.no-ip.org changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |github at kalvdans.no-ip.org -- You are receiving this mail because: You are watching someone on the CC list of the bug. You are watching the assignee of the bug.
bugzilla-daemon at mindrot.org
2024-Jul-01 19:51 UTC
[Bug 3690] sshd: root [priv] process sleeping leads to unprivileged child proc zombie
https://bugzilla.mindrot.org/show_bug.cgi?id=3690 Alan D. Salewski <salewski at att.net> changed: What |Removed |Added ---------------------------------------------------------------------------- CC| |salewski at att.net -- You are receiving this mail because: You are watching the assignee of the bug. You are watching someone on the CC list of the bug.
Reasonably Related Threads
- [Bug 3598] New: Dead lock of sshd and Defunct of sshd
- [Bug 2143] New: X11 forwarding for ipv4 is broken when ipv6 is disabled on the loopback interface
- [Bug 3379] New: Config parser only allows SetEnv once
- [Bug 2950] New: Store user runtime files in /run/user/ rather than in /tmp/
- [Bug 3438] New: env var that is SetEnv'ed multiple times in the same SetEnv directive, is sent/printed several times