(gdb) backtrace #0 0xdfb96d1b in t_splay () from /usr/lib/libc.so.1 #1 0xdfb96b30 in t_delete () from /usr/lib/libc.so.1 #2 0xdfb9689a in realfree () from /usr/lib/libc.so.1 #3 0xdfb964d5 in _malloc_unlocked () from /usr/lib/libc.so.1 #4 0xdfb96315 in malloc () from /usr/lib/libc.so.1 #5 0x805556d in til_jo (serv=0x806ad20, msg=0x8046ce4 "0123457890123457890123457890123457890123457890123457890123") at ./til_com.c:1280 #6 0x8057b98 in til_ca2 (csys=0x806ad20, serv=0x806ad20, svmsg=0x8046ce4 "0123457890123457890123457890123457890123457890123457890123") at ./til_com.c:186 #7 0x804bc1b in til_ca (csys=0x806ad20) at ./til_com.c:569 #8 0x8049eed in main (argc=2, argv=0x8047988) at ./til_main.c:141
debug1: sshd version OpenSSH_3.5p1 debug1: private host key: #0 type 0 RSA1 debug1: read PEM private key done: type RSA debug1: private host key: #1 type 1 RSA debug1: read PEM private key done: type DSA debug1: private host key: #2 type 2 DSA debug1: Bind to port 22 on 0.0.0.0. Server listening on 0.0.0.0 port 22. Generating 768 bit RSA key. RSA key generation complete. debug1: Server will not fork when running in debugging mode. Connection from 127.0.0.1 port 33005 debug1: Client protocol version 2.0; client software version OpenSSH_3.5p1 debug1: match: OpenSSH_3.5p1 pat OpenSSH* debug1: Enabling compatibility mode for protocol 2.0 debug1: Local version string SSH-1.99-OpenSSH_3.5p1 mm_malloc: size too big debug1: Calling cleanup 0x40c60(0x0)