Skip site navigation (1) Skip section navigation (2)

Re: BUG #2246: Bad malloc interactions: ecpg, openssl

From: Tom Lane <tgl(at)sss(dot)pgh(dot)pa(dot)us>
To: Andrew Klosterman <andrew5(at)ece(dot)cmu(dot)edu>
Cc: Stephen Frost <sfrost(at)snowman(dot)net>, pgsql-bugs(at)postgresql(dot)org
Subject: Re: BUG #2246: Bad malloc interactions: ecpg, openssl
Date: 2006-02-14 21:55:56
Message-ID: 23040.1139954156@sss.pgh.pa.us (view raw or flat)
Thread:
Lists: pgsql-bugspgsql-patches
Andrew Klosterman <andrew5(at)ece(dot)cmu(dot)edu> writes:
> (gdb) print *conn
> ...
>   allow_ssl_try = 1 '\001', wait_ssl_try = 0 '\0', ssl = 0x806d1d0,
>   peer = 0x807e430,
> ...
> *** glibc detected *** corrupted double-linked list: 0x0807e428 ***

Hm, it looks like the problem is associated with whatever was allocated
just before conn->peer (which is returned by SSL_get_peer_certificate
called from open_client_SSL).  Can you get efence or some other tool to
produce a trace of malloc calls so we can determine what that is?

			regards, tom lane

In response to

pgsql-bugs by date

Next:From: bug1Date: 2006-02-15 07:14:50
Subject: BUG #2263: corrupted pgstat.stat file
Previous:From: Andrew KlostermanDate: 2006-02-14 21:35:28
Subject: Re: BUG #2246: Bad malloc interactions: ecpg, openssl

pgsql-patches by date

Next:From: Tom LaneDate: 2006-02-14 21:58:57
Subject: Re: Free WAL caches on switching segments
Previous:From: Simon RiggsDate: 2006-02-14 21:54:12
Subject: Re: Patch Submission Guidelines

Privacy Policy | About PostgreSQL
Copyright © 1996-2014 The PostgreSQL Global Development Group