-
-
Save iagox86/499832b190b762f6b33770e160c5db3d to your computer and use it in GitHub Desktop.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
[root@dev .libs]# cd ~ron/sudo/src/.libs/; valgrind ./sudo -U chris -ll | |
==762347== Memcheck, a memory error detector | |
==762347== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. | |
==762347== Using Valgrind-3.16.1 and LibVEX; rerun with -h for copyright info | |
==762347== Command: ./sudo -U chris -ll | |
==762347== | |
==762348== Warning: invalid file descriptor 1024 in syscall close() | |
==762348== Warning: invalid file descriptor 1025 in syscall close() | |
==762348== Warning: invalid file descriptor 1026 in syscall close() | |
==762348== Warning: invalid file descriptor 1027 in syscall close() | |
==762348== Use --log-fd=<number> to select an alternative log fd. | |
==762348== Warning: invalid file descriptor 1028 in syscall close() | |
==762348== Warning: invalid file descriptor 1029 in syscall close() | |
==762347== Conditional jump or move depends on uninitialised value(s) | |
==762347== at 0x12A90AA6: sss_rule_to_priv (sssd.c:335) | |
==762347== by 0x12A90AA6: sss_to_sudoers (sssd.c:398) | |
==762347== by 0x12A90AA6: sudo_sss_query (sssd.c:684) | |
==762347== by 0x12A8185F: display_privs (parse.c:753) | |
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560) | |
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041) | |
==762347== by 0x10EAE0: policy_list (sudo.c:1223) | |
==762347== by 0x10EAE0: main (sudo.c:262) | |
==762347== | |
==762347== Conditional jump or move depends on uninitialised value(s) | |
==762347== at 0x484C1E7: sss_sudo_free_values (sss_sudo.c:187) | |
==762347== by 0x12A90AAE: sss_rule_to_priv (sssd.c:336) | |
==762347== by 0x12A90AAE: sss_to_sudoers (sssd.c:398) | |
==762347== by 0x12A90AAE: sudo_sss_query (sssd.c:684) | |
==762347== by 0x12A8185F: display_privs (parse.c:753) | |
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560) | |
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041) | |
==762347== by 0x10EAE0: policy_list (sudo.c:1223) | |
==762347== by 0x10EAE0: main (sudo.c:262) | |
==762347== | |
==762347== Use of uninitialised value of size 8 | |
==762347== at 0x484C1F2: sss_sudo_free_values (sss_sudo.c:191) | |
==762347== by 0x484C1F2: sss_sudo_free_values (sss_sudo.c:183) | |
==762347== by 0x12A90AAE: sss_rule_to_priv (sssd.c:336) | |
==762347== by 0x12A90AAE: sss_to_sudoers (sssd.c:398) | |
==762347== by 0x12A90AAE: sudo_sss_query (sssd.c:684) | |
==762347== by 0x12A8185F: display_privs (parse.c:753) | |
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560) | |
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041) | |
==762347== by 0x10EAE0: policy_list (sudo.c:1223) | |
==762347== by 0x10EAE0: main (sudo.c:262) | |
==762347== | |
==762347== Conditional jump or move depends on uninitialised value(s) | |
==762347== at 0x484C1F8: sss_sudo_free_values (sss_sudo.c:191) | |
==762347== by 0x484C1F8: sss_sudo_free_values (sss_sudo.c:183) | |
==762347== by 0x12A90AAE: sss_rule_to_priv (sssd.c:336) | |
==762347== by 0x12A90AAE: sss_to_sudoers (sssd.c:398) | |
==762347== by 0x12A90AAE: sudo_sss_query (sssd.c:684) | |
==762347== by 0x12A8185F: display_privs (parse.c:753) | |
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560) | |
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041) | |
==762347== by 0x10EAE0: policy_list (sudo.c:1223) | |
==762347== by 0x10EAE0: main (sudo.c:262) | |
==762347== | |
==762347== Conditional jump or move depends on uninitialised value(s) | |
==762347== at 0x483B9A8: free (vg_replace_malloc.c:538) | |
==762347== by 0x484C204: sss_sudo_free_values (sss_sudo.c:192) | |
==762347== by 0x484C204: sss_sudo_free_values (sss_sudo.c:183) | |
==762347== by 0x12A90AAE: sss_rule_to_priv (sssd.c:336) | |
==762347== by 0x12A90AAE: sss_to_sudoers (sssd.c:398) | |
==762347== by 0x12A90AAE: sudo_sss_query (sssd.c:684) | |
==762347== by 0x12A8185F: display_privs (parse.c:753) | |
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560) | |
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041) | |
==762347== by 0x10EAE0: policy_list (sudo.c:1223) | |
==762347== by 0x10EAE0: main (sudo.c:262) | |
==762347== | |
==762347== Invalid free() / delete / delete[] / realloc() | |
==762347== at 0x483B9F5: free (vg_replace_malloc.c:538) | |
==762347== by 0x484C204: sss_sudo_free_values (sss_sudo.c:192) | |
==762347== by 0x484C204: sss_sudo_free_values (sss_sudo.c:183) | |
==762347== by 0x12A90AAE: sss_rule_to_priv (sssd.c:336) | |
==762347== by 0x12A90AAE: sss_to_sudoers (sssd.c:398) | |
==762347== by 0x12A90AAE: sudo_sss_query (sssd.c:684) | |
==762347== by 0x12A8185F: display_privs (parse.c:753) | |
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560) | |
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041) | |
==762347== by 0x10EAE0: policy_list (sudo.c:1223) | |
==762347== by 0x10EAE0: main (sudo.c:262) | |
==762347== Address 0x440 is not stack'd, malloc'd or (recently) free'd | |
==762347== | |
==762347== Use of uninitialised value of size 8 | |
==762347== at 0x484C205: sss_sudo_free_values (sss_sudo.c:191) | |
==762347== by 0x484C205: sss_sudo_free_values (sss_sudo.c:183) | |
==762347== by 0x12A90AAE: sss_rule_to_priv (sssd.c:336) | |
==762347== by 0x12A90AAE: sss_to_sudoers (sssd.c:398) | |
==762347== by 0x12A90AAE: sudo_sss_query (sssd.c:684) | |
==762347== by 0x12A8185F: display_privs (parse.c:753) | |
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560) | |
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041) | |
==762347== by 0x10EAE0: policy_list (sudo.c:1223) | |
==762347== by 0x10EAE0: main (sudo.c:262) | |
==762347== | |
==762347== Conditional jump or move depends on uninitialised value(s) | |
==762347== at 0x483B9A8: free (vg_replace_malloc.c:538) | |
==762347== by 0x12A90AAE: sss_rule_to_priv (sssd.c:336) | |
==762347== by 0x12A90AAE: sss_to_sudoers (sssd.c:398) | |
==762347== by 0x12A90AAE: sudo_sss_query (sssd.c:684) | |
==762347== by 0x12A8185F: display_privs (parse.c:753) | |
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560) | |
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041) | |
==762347== by 0x10EAE0: policy_list (sudo.c:1223) | |
==762347== by 0x10EAE0: main (sudo.c:262) | |
==762347== | |
==762347== Invalid free() / delete / delete[] / realloc() | |
==762347== at 0x483B9F5: free (vg_replace_malloc.c:538) | |
==762347== by 0x12A90AAE: sss_rule_to_priv (sssd.c:336) | |
==762347== by 0x12A90AAE: sss_to_sudoers (sssd.c:398) | |
==762347== by 0x12A90AAE: sudo_sss_query (sssd.c:684) | |
==762347== by 0x12A8185F: display_privs (parse.c:753) | |
==762347== by 0x12A8B554: sudoers_policy_main (sudoers.c:560) | |
==762347== by 0x12A82EB1: sudoers_policy_list (policy.c:1041) | |
==762347== by 0x10EAE0: policy_list (sudo.c:1223) | |
==762347== by 0x10EAE0: main (sudo.c:262) | |
==762347== Address 0x1fff000630 is on thread 1's stack | |
==762347== in frame #2, created by display_privs (parse.c:700) | |
==762347== | |
Matching Defaults entries for chris on dev: | |
!visiblepw, always_set_home, match_group_by_gid, always_query_group_plugin, env_reset, env_keep="COLORS DISPLAY HOSTNAME HISTSIZE KDEDIR LS_COLORS", env_keep+="MAIL QTDIR USERNAME LANG | |
LC_ADDRESS LC_CTYPE", env_keep+="LC_COLLATE LC_IDENTIFICATION LC_MEASUREMENT LC_MESSAGES", env_keep+="LC_MONETARY LC_NAME LC_NUMERIC LC_PAPER LC_TELEPHONE", env_keep+="LC_TIME LC_ALL | |
LANGUAGE LINGUAS _XKB_CHARSET XAUTHORITY", secure_path=/usr/local/sbin\:/usr/local/bin\:/usr/sbin\:/usr/bin\:/sbin\:/bin\:/var/lib/snapd/snap/bin | |
User chris may run the following commands on dev: | |
LDAP Role: %LinuxAdmins | |
RunAsUsers: ALL | |
RunAsGroups: ALL | |
Options: timestamp_timeout=60, !env_reset, !always_set_home | |
Commands: | |
ALL | |
==762347== | |
==762347== HEAP SUMMARY: | |
==762347== in use at exit: 115,799 bytes in 601 blocks | |
==762347== total heap usage: 6,592 allocs, 5,993 frees, 1,257,493 bytes allocated | |
==762347== | |
==762347== LEAK SUMMARY: | |
==762347== definitely lost: 448 bytes in 2 blocks | |
==762347== indirectly lost: 317 bytes in 8 blocks | |
==762347== possibly lost: 117 bytes in 2 blocks | |
==762347== still reachable: 114,869 bytes in 588 blocks | |
==762347== suppressed: 48 bytes in 1 blocks | |
==762347== Rerun with --leak-check=full to see details of leaked memory | |
==762347== | |
==762347== Use --track-origins=yes to see where uninitialised values come from | |
==762347== For lists of detected and suppressed errors, rerun with: -s | |
==762347== ERROR SUMMARY: 9 errors from 9 contexts (suppressed: 0 from 0) |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment