[OpenAFS] Solaris 10 11/06 afs 1.4.2 pam module panic.

Kris Kasner tkasner@qualcomm.com
Mon, 18 Dec 2006 15:03:22 -0800 (PST)


Hi Folks.

I'm working on integrating the latest Solaris release into our environment. In 
our image that uses the OpenAFS PAM module for authentication, a successful 
authentication through ssh (using afs passwd, through the afs module) 
consistantly panicks the system, calling out sshd: alignment error.
If I remove the pam_afs.so.1 entries from /etc/pam.conf, the system is stable, 
but of course I don't get a token when I log in, among other issues..

Any chance anyone else has seen this? I have not had any luck finding anything 
in the bugs database or by searching through the archives..

I'm running Solaris 10 11/06 (Update 3) SPARC, and OpenAFS 1.4.2

Thanks much for any suggestions.

--Kris
-- 

Thomas Kris Kasner Qualcomm Inc.
5775 Morehouse Drive
San Diego, CA 92121


panic[cpu0]/thread=300017075e0: BAD TRAP: type=34 rp=2a100921090 
addr=3000000013
3 mmu_fsr=0

sshd: alignment error:
addr=0x30000000133
pid=817, pc=0x10b3d10, sp=0x2a100920931, tstate=0x1601, context=0x639
g1-g7: 60000541c40, 0, 0, 0, 45, 0, 300017075e0

000002a100920db0 unix:die+9c (34, 2a100921090, 30000000133, 0, 2a100920e70, 
c1e0
0000)
   %l0-3: 00000000c0800000 0000000000000034 0000000000000000 0000000000000010
   %l4-7: 0000060001305360 0000000000000006 0000060002a71610 0000000001076000
000002a100920e90 unix:trap+690 (2a100921090, 10009, 0, 80000b, 0, 300017075e0)
   %l0-3: 0000000000000000 0000060002acc3f0 0000000000000034 0000060001e44388
   %l4-7: 0000000000000000 000000000000004c 00000000012e110c 0000000000010200
000002a100920fe0 unix:ktl0+48 (60001e67ae0, 300017075e0, 0, 2, 2, 830000000003)
   %l0-3: 0000000000000002 0000000000001400 0000000000001601 000000000101aa04
   %l4-7: 0000000000000002 0000000000000030 0000000000000000 000002a100921090
000002a100921130 ip:udp_send_data+248 (60002b77dc0, 60002aeb628, 60000484540, 
60
000541cd0, 10, 0)
   %l0-3: 0000000000000000 0000000000000000 0000000000000000 0000060001e1d280
   %l4-7: 00000000e0000000 00000000c0000000 0000000000000001 00000000000001f8
000002a100921230 ip:udp_output_v4+558 (60001e1d280, 0, 7002fc00, 60000541cd0, 
0,
  2a1009214ec)
   %l0-3: 0000060000484540 000000007002dc00 0000060002b77dc0 000000000000124e
   %l4-7: 0000000070033000 0000000004000000 0000000000000080 0000000000000020
000002a100921330 ip:udp_output+474 (60001e1d280, 60000484540, 60001305360, 10, 
1
, 10)
   %l0-3: 0000000000000010 0000000000000002 0000000000000002 0000060002b77dc0
   %l4-7: 0000000000000000 0000000000000030 0000000000000000 0000060002aeb628
000002a1009214f0 ip:___const_seg_900003702+6050 (60001e1d280, 60000484540, 
60001
305360, 0, 60002b77dc0, 0)
   %l0-3: 0000000000000010 0000000000000001 000000000000003c 0000060000484550
   %l4-7: 000000000000004c 0000060000541cec 0000000000000001 0000000000000000
000002a1009215a0 sockfs:sodgram_direct+bc (600006e21d0, 60001305360, 10, 
2a10092
18c0, 60000484540, 0)
   %l0-3: 0000000000000000 000000000000004c 00000000018a6c00 0000060002acc3f0
   %l4-7: fffffffffffffffc 0000000000000001 0000000000000000 0000060002aea6c8
000002a100921680 sockfs:sotpi_sendmsg+454 (600006e21d0, 2a100921a70, 
2a1009218c0
, 0, 1200060, 0)
   %l0-3: 0000000000000000 00000600006e21f0 0000000000000000 0000000000000010
   %l4-7: 0000060001305360 0000000000000006 0000060002a71610 0000000000000008
000002a100921740 sockfs:sendit+134 (9, 2a100921a70, 2a1009218c0, 60001305360, 
60
0006e21d0, 0)
   %l0-3: 00000000ff3f0f78 0000000000000000 0000000000000000 0000000000000000
   %l4-7: 000000000001822e 000000000000004c 00000000012e110c 00000000018e83c0
000002a100921810 sockfs:sendmsg+294 (9, 4c, 100000, 2a100921918, 2a1009218f0, 
0)
   %l0-3: 0000000000000008 0000000000000002 00000000000ab86c 0000000000000030
   %l4-7: 0000000000000002 0000000000000030 00000000ffbf4e90 0000000000000010