Code: Select all
$ Set NoOn
$ VERIFY = F$VERIFY(F$TRNLNM("SYLOGIN_VERIFY"))
%SYSTEM-F-STKOVF, stack overflow, PC=0000000000AA3B5B, PS=0000001B
%TRACE-F-TRACEBACK, symbolic stack dump follows
image module routine line rel PC abs PC
SSL3$LIBCRYPTO_SHR32 0 00000000006B9B5B 0000000000AA3B5B
SSL3$LIBSSL_SHR32 0 00000000000AA03E 00000000000F003E
SSH$SSHD session.c;1 session_pty_req
#64553 000000008004ACD0 000000008004ACD0
SSH$SSHD session.c;1 session_input_channel_req
#64842 00000000800451CB 00000000800451CB
SSH$SSHD serverloop.c;1 server_input_channel_req
#61823 00000000800325BB 00000000800325BB
SSH$SSHD dispatch.c;1 ssh_dispatch_run
#46326 00000000800D13A6 00000000800D13A6
SSH$SSHD dispatch.c;1 ssh_dispatch_run_fatal
#46346 00000000800D145F 00000000800D145F
SSH$SSHD serverloop.c;1 process_buffered_input_packets
#61232 000000008002F38C 000000008002F38C
SSH$SSHD serverloop.c;1 server_loop2
#61285 000000008002DA20 000000008002DA20
SSH$SSHD session.c;1 do_authenticated2
#65261 000000008004A646 000000008004A646
SSH$SSHD session.c;1 do_authenticated
#62800 00000000800447BC 00000000800447BC
SSH$SSHD sshd.c;1 vms_main #67775 000000008000F204 000000008000F204
SSH$SSHD wrapper.c;1 main #55390 000000008018DA6E 000000008018DA6E
SSH$SSHD wrapper.c;1 __main #55365 000000008018E767 000000008018E767
PTHREAD$RTL 0 000000008004122C FFFF83000950922C
PTHREAD$RTL 0 0000000080002316 FFFF8300094CA316
0 FFFF8300081FC0A6 FFFF8300081FC0A6
DCL 0 000000008006778B 000000007ADEB78B
%TRACE-I-LINENUMBER, Leading '#' specifies a source file record number.
%TRACE-I-END, end of TRACE stack dump
SSH$SSH job terminated at 3-NOV-2023 13:46:16.31
BTW, I didn't realize that community members weren't supposed to use the support portal to file bugs. I was under the impression from watching a YouTube video that bugs would be accepted there but triaged at a low priority. Nope. The buttons are greyed out but it let me file a bug, so I figured it was okay.