The Samba-Bugzilla – Attachment 11877 Details for
Bug 11760
creating a user with smbpasswd leads to a segfault
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
log file
log.wb-EXAMPLE (text/plain), 28.23 KB, created by
Rowland Penny
on 2016-02-29 15:39:50 UTC
(
hide
)
Description:
log file
Filename:
MIME Type:
Creator:
Rowland Penny
Created:
2016-02-29 15:39:50 UTC
Size:
28.23 KB
patch
obsolete
>[2016/02/29 15:14:04.952589, 4, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:1389(child_handler) > child daemon request 20 >[2016/02/29 15:14:04.952681, 10, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:512(child_process_request) > child_process_request: request fn LIST_TRUSTDOM >[2016/02/29 15:14:04.952713, 3, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_misc.c:161(winbindd_dual_list_trusted_domains) > [ 1977]: list trusted domains >[2016/02/29 15:14:04.952754, 10, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_cache.c:2910(trusted_domains) > trusted_domains: [Cached] - doing backend query for info for domain EXAMPLE >[2016/02/29 15:14:04.952785, 3, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_samr.c:293(sam_trusted_domains) > samr: trusted domains >[2016/02/29 15:14:04.952850, 4, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_ncacn_np.c:203(make_internal_rpc_pipe_p) > Create pipe requested lsarpc >[2016/02/29 15:14:04.952887, 10, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:222(init_pipe_handles) > init_pipe_handle_list: created handle list for pipe lsarpc >[2016/02/29 15:14:04.952934, 10, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:239(init_pipe_handles) > init_pipe_handle_list: pipe_handles ref count = 1 for pipe lsarpc >[2016/02/29 15:14:04.953004, 4, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_ncacn_np.c:243(make_internal_rpc_pipe_p) > Created internal pipe lsarpc >[2016/02/29 15:14:04.953047, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) > lsa_OpenPolicy: struct lsa_OpenPolicy > in: struct lsa_OpenPolicy > system_name : * > system_name : 0x005c (92) > attr : * > attr: struct lsa_ObjectAttribute > len : 0x00000018 (24) > root_dir : NULL > object_name : NULL > attributes : 0x00000000 (0) > sec_desc : NULL > sec_qos : * > sec_qos: struct lsa_QosInfo > len : 0x0000000c (12) > impersonation_level : 0x0002 (2) > context_mode : 0x01 (1) > effective_only : 0x00 (0) > access_mask : 0x02000000 (33554432) > 0: LSA_POLICY_VIEW_LOCAL_INFORMATION > 0: LSA_POLICY_VIEW_AUDIT_INFORMATION > 0: LSA_POLICY_GET_PRIVATE_INFORMATION > 0: LSA_POLICY_TRUST_ADMIN > 0: LSA_POLICY_CREATE_ACCOUNT > 0: LSA_POLICY_CREATE_SECRET > 0: LSA_POLICY_CREATE_PRIVILEGE > 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS > 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS > 0: LSA_POLICY_AUDIT_LOG_ADMIN > 0: LSA_POLICY_SERVER_ADMIN > 0: LSA_POLICY_LOOKUP_NAMES > 0: LSA_POLICY_NOTIFICATION >[2016/02/29 15:14:04.953306, 10, pid=2061, effective(0, 0), real(0, 0)] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0xb0000000 to 0x000f1fff >[2016/02/29 15:14:04.953349, 4, pid=2061, effective(0, 0), real(0, 0)] ../source3/rpc_server/srv_access_check.c:95(access_check_object) > _lsa_OpenPolicy2: ACCESS should be DENIED (requested: 0x000f1fff) > but overritten by euid == initial uid >[2016/02/29 15:14:04.953366, 4, pid=2061, effective(0, 0), real(0, 0)] ../source3/rpc_server/srv_access_check.c:117(access_check_object) > _lsa_OpenPolicy2: access GRANTED (requested: 0x000f1fff, granted: 0x000f1fff) >[2016/02/29 15:14:04.953384, 6, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:303(create_rpc_handle_internal) > Opened policy hnd[1] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 D4 56 3C 60 ........ .....V<` > [0010] 0D 08 00 00 .... >[2016/02/29 15:14:04.953428, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) > lsa_OpenPolicy: struct lsa_OpenPolicy > out: struct lsa_OpenPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-d456-3c600d080000 > result : NT_STATUS_OK >[2016/02/29 15:14:04.953510, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) > lsa_EnumTrustedDomainsEx: struct lsa_EnumTrustedDomainsEx > in: struct lsa_EnumTrustedDomainsEx > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-d456-3c600d080000 > resume_handle : * > resume_handle : 0x00000000 (0) > max_size : 0xffffffff (4294967295) >[2016/02/29 15:14:04.953599, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) > lsa_EnumTrustDom: struct lsa_EnumTrustDom > in: struct lsa_EnumTrustDom > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-d456-3c600d080000 > resume_handle : * > resume_handle : 0x00000000 (0) > max_size : 0xffffffff (4294967295) >[2016/02/29 15:14:04.953656, 6, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:338(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 D4 56 3C 60 ........ .....V<` > [0010] 0D 08 00 00 .... >[2016/02/29 15:14:04.953704, 5, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:1249(smbldap_search_ext) > smbldap_search_ext: base => [sambaDomainName=EXAMPLE,dc=example,dc=com], filter => [(objectClass=sambaTrustedDomainPassword)], scope => [2] >[2016/02/29 15:14:04.954836, 5, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_ldap.c:6351(ldapsam_enum_trusteddoms) > ldapsam_enum_trusteddoms: got 0 domains >[2016/02/29 15:14:04.954877, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) > lsa_EnumTrustDom: struct lsa_EnumTrustDom > out: struct lsa_EnumTrustDom > resume_handle : * > resume_handle : 0xffffffff (4294967295) > domains : * > domains: struct lsa_DomainList > count : 0x00000000 (0) > domains : NULL > result : NT_STATUS_NO_MORE_ENTRIES >[2016/02/29 15:14:04.954912, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) > lsa_Close: struct lsa_Close > in: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000009-0000-0000-d456-3c600d080000 >[2016/02/29 15:14:04.954974, 6, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:338(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 D4 56 3C 60 ........ .....V<` > [0010] 0D 08 00 00 .... >[2016/02/29 15:14:04.955019, 6, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:338(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 09 00 00 00 00 00 00 00 D4 56 3C 60 ........ .....V<` > [0010] 0D 08 00 00 .... >[2016/02/29 15:14:04.955060, 6, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:387(close_policy_hnd) > Closed policy >[2016/02/29 15:14:04.955074, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) > lsa_Close: struct lsa_Close > out: struct lsa_Close > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 00000000-0000-0000-0000-000000000000 > result : NT_STATUS_OK >[2016/02/29 15:14:04.955131, 10, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:417(close_policy_by_pipe) > Deleted handle list for RPC connection lsarpc >[2016/02/29 15:14:04.955157, 4, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:1397(child_handler) > Finished processing child request 20 >[2016/02/29 15:14:04.955182, 10, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:104(child_write_response) > Writing 3496 bytes to parent >[2016/02/29 15:14:26.077151, 10, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:69(child_read_request) > Need to read 52 extra bytes >[2016/02/29 15:14:26.077211, 4, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:1389(child_handler) > child daemon request 59 >[2016/02/29 15:14:26.077508, 10, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual.c:512(child_process_request) > child_process_request: request fn NDRCMD >[2016/02/29 15:14:26.077528, 10, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_dual_ndr.c:315(winbindd_dual_ndrcmd) > winbindd_dual_ndrcmd: Running command WBINT_LOOKUPNAME (EXAMPLE) >[2016/02/29 15:14:26.077555, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) > wbint_LookupName: struct wbint_LookupName > in: struct wbint_LookupName > domain : * > domain : 'EXAMPLE' > name : * > name : 'ADMINISTRATOR' > flags : 0x00000008 (8) >[2016/02/29 15:14:26.077606, 10, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_cache.c:1874(name_to_sid) > name_to_sid: [Cached] - doing backend query for name for domain EXAMPLE >[2016/02/29 15:14:26.077620, 3, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_samr.c:548(sam_name_to_sid) > sam_name_to_sid >[2016/02/29 15:14:26.077662, 4, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_ncacn_np.c:203(make_internal_rpc_pipe_p) > Create pipe requested lsarpc >[2016/02/29 15:14:26.077695, 10, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:222(init_pipe_handles) > init_pipe_handle_list: created handle list for pipe lsarpc >[2016/02/29 15:14:26.077712, 10, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:239(init_pipe_handles) > init_pipe_handle_list: pipe_handles ref count = 1 for pipe lsarpc >[2016/02/29 15:14:26.077772, 4, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_ncacn_np.c:243(make_internal_rpc_pipe_p) > Created internal pipe lsarpc >[2016/02/29 15:14:26.077811, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) > lsa_OpenPolicy: struct lsa_OpenPolicy > in: struct lsa_OpenPolicy > system_name : * > system_name : 0x005c (92) > attr : * > attr: struct lsa_ObjectAttribute > len : 0x00000018 (24) > root_dir : NULL > object_name : NULL > attributes : 0x00000000 (0) > sec_desc : NULL > sec_qos : * > sec_qos: struct lsa_QosInfo > len : 0x0000000c (12) > impersonation_level : 0x0002 (2) > context_mode : 0x01 (1) > effective_only : 0x00 (0) > access_mask : 0x02000000 (33554432) > 0: LSA_POLICY_VIEW_LOCAL_INFORMATION > 0: LSA_POLICY_VIEW_AUDIT_INFORMATION > 0: LSA_POLICY_GET_PRIVATE_INFORMATION > 0: LSA_POLICY_TRUST_ADMIN > 0: LSA_POLICY_CREATE_ACCOUNT > 0: LSA_POLICY_CREATE_SECRET > 0: LSA_POLICY_CREATE_PRIVILEGE > 0: LSA_POLICY_SET_DEFAULT_QUOTA_LIMITS > 0: LSA_POLICY_SET_AUDIT_REQUIREMENTS > 0: LSA_POLICY_AUDIT_LOG_ADMIN > 0: LSA_POLICY_SERVER_ADMIN > 0: LSA_POLICY_LOOKUP_NAMES > 0: LSA_POLICY_NOTIFICATION >[2016/02/29 15:14:26.078104, 10, pid=2061, effective(0, 0), real(0, 0)] ../libcli/security/access_check.c:58(se_map_generic) > se_map_generic(): mapped mask 0xb0000000 to 0x000f1fff >[2016/02/29 15:14:26.078144, 4, pid=2061, effective(0, 0), real(0, 0)] ../source3/rpc_server/srv_access_check.c:95(access_check_object) > _lsa_OpenPolicy2: ACCESS should be DENIED (requested: 0x000f1fff) > but overritten by euid == initial uid >[2016/02/29 15:14:26.078187, 4, pid=2061, effective(0, 0), real(0, 0)] ../source3/rpc_server/srv_access_check.c:117(access_check_object) > _lsa_OpenPolicy2: access GRANTED (requested: 0x000f1fff, granted: 0x000f1fff) >[2016/02/29 15:14:26.078222, 6, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:303(create_rpc_handle_internal) > Opened policy hnd[1] [0000] 00 00 00 00 0A 00 00 00 00 00 00 00 D4 56 52 60 ........ .....VR` > [0010] 0D 08 00 00 .... >[2016/02/29 15:14:26.078293, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) > lsa_OpenPolicy: struct lsa_OpenPolicy > out: struct lsa_OpenPolicy > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000a-0000-0000-d456-52600d080000 > result : NT_STATUS_OK >[2016/02/29 15:14:26.078461, 3, pid=2061, effective(0, 0), real(0, 0), class=winbind] ../source3/winbindd/winbindd_rpc.c:309(rpc_name_to_sid) > name_to_sid: EXAMPLE\ADMINISTRATOR for domain EXAMPLE >[2016/02/29 15:14:26.078516, 1, pid=2061, effective(0, 0), real(0, 0)] ../librpc/ndr/ndr.c:439(ndr_print_function_debug) > lsa_LookupNames: struct lsa_LookupNames > in: struct lsa_LookupNames > handle : * > handle: struct policy_handle > handle_type : 0x00000000 (0) > uuid : 0000000a-0000-0000-d456-52600d080000 > num_names : 0x00000001 (1) > names: ARRAY(1) > names: struct lsa_String > length : 0x002a (42) > size : 0x002a (42) > string : * > string : 'EXAMPLE\ADMINISTRATOR' > sids : * > sids: struct lsa_TransSidArray > count : 0x00000000 (0) > sids : NULL > level : LSA_LOOKUP_NAMES_ALL (1) > count : * > count : 0x00000000 (0) >[2016/02/29 15:14:26.078883, 6, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/rpc_handles.c:338(find_policy_by_hnd_internal) > Found policy hnd[0] [0000] 00 00 00 00 0A 00 00 00 00 00 00 00 D4 56 52 60 ........ .....VR` > [0010] 0D 08 00 00 .... >[2016/02/29 15:14:26.078954, 5, pid=2061, effective(0, 0), real(0, 0), class=rpc_srv] ../source3/rpc_server/lsa/srv_lsa_nt.c:163(lookup_lsa_rids) > lookup_lsa_rids: looking up name EXAMPLE\ADMINISTRATOR >[2016/02/29 15:14:26.078986, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:77(lookup_name) > lookup_name: EXAMPLE\ADMINISTRATOR => domain=[EXAMPLE], name=[ADMINISTRATOR] >[2016/02/29 15:14:26.079037, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/passdb/lookup_sid.c:78(lookup_name) > lookup_name: flags = 0x073 >[2016/02/29 15:14:26.079097, 5, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:1249(smbldap_search_ext) > smbldap_search_ext: base => [dc=example,dc=com], filter => [(&(uid=ADMINISTRATOR)(objectclass=sambaSamAccount))], scope => [2] >[2016/02/29 15:14:26.080568, 2, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_ldap.c:524(init_sam_from_ldap) > init_sam_from_ldap: Entry found for user: Administrator >[2016/02/29 15:14:26.080632, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:570(pdb_set_username) > pdb_set_username: setting username Administrator, was >[2016/02/29 15:14:26.080666, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:593(pdb_set_domain) > pdb_set_domain: setting domain EXAMPLE, was >[2016/02/29 15:14:26.080696, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:616(pdb_set_nt_username) > pdb_set_nt_username: setting nt username Administrator, was >[2016/02/29 15:14:26.080734, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:508(pdb_set_user_sid_from_string) > pdb_set_user_sid_from_string: setting user sid S-1-5-21-3433748774-3946474326-2194090801-500 >[2016/02/29 15:14:26.080768, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:495(pdb_set_user_sid) > pdb_set_user_sid: setting user sid S-1-5-21-3433748774-3946474326-2194090801-500 >[2016/02/29 15:14:26.080816, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) > attribute sambaLogonTime does not exist >[2016/02/29 15:14:26.080851, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) > attribute sambaLogoffTime does not exist >[2016/02/29 15:14:26.080884, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) > attribute sambaKickoffTime does not exist >[2016/02/29 15:14:26.080922, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:639(pdb_set_fullname) > pdb_set_full_name: setting full name Administrator, was >[2016/02/29 15:14:26.080957, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) > attribute sambaHomeDrive does not exist >[2016/02/29 15:14:26.080987, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:708(pdb_set_dir_drive) > pdb_set_dir_drive: setting dir drive , was NULL >[2016/02/29 15:14:26.081022, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) > attribute sambaHomePath does not exist >[2016/02/29 15:14:26.081073, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:732(pdb_set_homedir) > pdb_set_homedir: setting home dir , was >[2016/02/29 15:14:26.081109, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) > attribute sambaLogonScript does not exist >[2016/02/29 15:14:26.081140, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:662(pdb_set_logon_script) > pdb_set_logon_script: setting logon script , was >[2016/02/29 15:14:26.081175, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) > attribute sambaProfilePath does not exist >[2016/02/29 15:14:26.081205, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_get_set.c:685(pdb_set_profile_path) > pdb_set_profile_path: setting profile path , was >[2016/02/29 15:14:26.081296, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) > attribute description does not exist >[2016/02/29 15:14:26.081399, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) > attribute sambaUserWorkstations does not exist >[2016/02/29 15:14:26.081434, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) > attribute sambaMungedDial does not exist >[2016/02/29 15:14:26.081468, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) > attribute sambaLMPassword does not exist >[2016/02/29 15:14:26.081560, 10, pid=2061, effective(0, 0), real(0, 0), class=tdb] ../source3/lib/gencache.c:323(gencache_set_data_blob) > Adding cache entry with key=[ACCT_POL/password history] and timeout=[Thu Jan 1 01:00:00 1970 BST] (-1456758866 seconds in the past) >[2016/02/29 15:14:26.081641, 10, pid=2061, effective(0, 0), real(0, 0), class=passdb] ../source3/passdb/pdb_ldap.c:3877(ldapsam_get_account_policy_from_ldap) > ldapsam_get_account_policy_from_ldap >[2016/02/29 15:14:26.081688, 5, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:1249(smbldap_search_ext) > smbldap_search_ext: base => [sambaDomainName=EXAMPLE,dc=example,dc=com], filter => [(objectClass=sambaDomain)], scope => [0] >[2016/02/29 15:14:26.082863, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/passdb/account_pol.c:425(cache_account_policy_set) > cache_account_policy_set: updating account pol cache >[2016/02/29 15:14:26.082938, 10, pid=2061, effective(0, 0), real(0, 0), class=tdb] ../source3/lib/gencache.c:323(gencache_set_data_blob) > Adding cache entry with key=[ACCT_POL/password history] and timeout=[Mon Feb 29 15:15:26 2016 GMT] (60 seconds ahead) >[2016/02/29 15:14:26.083031, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) > attribute sambaBadPasswordCount does not exist >[2016/02/29 15:14:26.083069, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) > attribute sambaBadPasswordTime does not exist >[2016/02/29 15:14:26.083104, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) > attribute sambaLogonHours does not exist >[2016/02/29 15:14:26.083148, 10, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/smbldap.c:90(smbldap_talloc_single_attribute) > attribute gecos does not exist >[2016/02/29 15:14:26.083828, 0, pid=2061, effective(0, 0), real(0, 0)] ../lib/util/fault.c:78(fault_report) > =============================================================== >[2016/02/29 15:14:26.084559, 0, pid=2061, effective(0, 0), real(0, 0)] ../lib/util/fault.c:79(fault_report) > INTERNAL ERROR: Signal 11 in pid 2061 (4.3.5) > Please read the Trouble-Shooting section of the Samba HOWTO >[2016/02/29 15:14:26.085513, 0, pid=2061, effective(0, 0), real(0, 0)] ../lib/util/fault.c:81(fault_report) > =============================================================== >[2016/02/29 15:14:26.085992, 0, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/util.c:789(smb_panic_s3) > PANIC (pid 2061): internal error >[2016/02/29 15:14:26.088209, 0, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/util.c:900(log_stack_trace) > BACKTRACE: 48 stack frames: > #0 /usr/local/samba/lib/libsmbconf.so.0(log_stack_trace+0x26) [0xb685a45b] > #1 /usr/local/samba/lib/libsmbconf.so.0(smb_panic_s3+0x6a) [0xb685a2b1] > #2 /usr/local/samba/lib/libsamba-util.so.0(smb_panic+0x2a) [0xb72e9b96] > #3 /usr/local/samba/lib/libsamba-util.so.0(+0x1e87d) [0xb72e987d] > #4 /usr/local/samba/lib/libsamba-util.so.0(+0x1e88e) [0xb72e988e] > #5 linux-gate.so.1(__kernel_sigreturn+0) [0xb7661cf0] > #6 /lib/i386-linux-gnu/i686/cmov/libc.so.6(+0x83b66) [0xb653fb66] > #7 /usr/local/samba/lib/libsmbconf.so.0(tcopy_passwd+0x65) [0xb688d2ed] > #8 /usr/local/samba/lib/libsamba-passdb.so.0(+0x200a4) [0xb738a0a4] > #9 /usr/local/samba/lib/libsamba-passdb.so.0(+0x21c51) [0xb738bc51] > #10 /usr/local/samba/lib/libsamba-passdb.so.0(pdb_getsampwnam+0x2f) [0xb73b1901] > #11 /usr/local/samba/lib/libsamba-passdb.so.0(lookup_global_sam_name+0x8f) [0xb73a36e8] > #12 /usr/local/samba/lib/libsamba-passdb.so.0(lookup_name+0x2ce) [0xb73a98f8] > #13 /usr/local/samba/sbin/winbindd(+0xa18f8) [0xb77268f8] > #14 /usr/local/samba/sbin/winbindd(_lsa_LookupNames+0x1de) [0xb772884e] > #15 /usr/local/samba/sbin/winbindd(+0xac532) [0xb7731532] > #16 /usr/local/samba/sbin/winbindd(+0x1d72d) [0xb76a272d] > #17 /usr/local/samba/sbin/winbindd(+0x1d998) [0xb76a2998] > #18 /usr/local/samba/lib/libdcerpc-binding.so.0(dcerpc_binding_handle_raw_call_send+0x93) [0xb7356e09] > #19 /usr/local/samba/lib/libdcerpc-binding.so.0(dcerpc_binding_handle_call_send+0x340) [0xb735764a] > #20 /usr/local/samba/lib/libdcerpc-binding.so.0(dcerpc_binding_handle_call+0x79) [0xb7357a05] > #21 /usr/local/samba/lib/private/libdcerpc-samba-samba4.so(dcerpc_lsa_LookupNames_r+0x32) [0xb7106d74] > #22 /usr/local/samba/lib/private/libdcerpc-samba-samba4.so(dcerpc_lsa_LookupNames+0x71) [0xb71071b8] > #23 /usr/local/samba/lib/private/liblibcli-lsa3-samba4.so(dcerpc_lsa_lookup_names_generic+0x127) [0xb6933d74] > #24 /usr/local/samba/lib/private/liblibcli-lsa3-samba4.so(dcerpc_lsa_lookup_names+0x3b) [0xb69341ba] > #25 /usr/local/samba/lib/private/liblibcli-lsa3-samba4.so(rpccli_lsa_lookup_names+0x4c) [0xb6934213] > #26 /usr/local/samba/sbin/winbindd(rpc_name_to_sid+0x184) [0xb76d8f40] > #27 /usr/local/samba/sbin/winbindd(+0x5c571) [0xb76e1571] > #28 /usr/local/samba/sbin/winbindd(+0x3630c) [0xb76bb30c] > #29 /usr/local/samba/sbin/winbindd(_wbint_LookupName+0x76) [0xb76e790e] > #30 /usr/local/samba/sbin/winbindd(+0xb8e8b) [0xb773de8b] > #31 /usr/local/samba/sbin/winbindd(winbindd_dual_ndrcmd+0x16a) [0xb76e761e] > #32 /usr/local/samba/sbin/winbindd(+0x5e901) [0xb76e3901] > #33 /usr/local/samba/sbin/winbindd(+0x61086) [0xb76e6086] > #34 /usr/local/samba/lib/private/libtevent.so.0(+0xaf10) [0xb7247f10] > #35 /usr/local/samba/lib/private/libtevent.so.0(+0xb532) [0xb7248532] > #36 /usr/local/samba/lib/private/libtevent.so.0(+0x86ab) [0xb72456ab] > #37 /usr/local/samba/lib/private/libtevent.so.0(_tevent_loop_once+0xdb) [0xb72405ba] > #38 /usr/local/samba/sbin/winbindd(+0x61b78) [0xb76e6b78] > #39 /usr/local/samba/sbin/winbindd(+0x5d9cc) [0xb76e29cc] > #40 /usr/local/samba/lib/private/libtevent.so.0(+0x4485) [0xb7241485] > #41 /usr/local/samba/lib/private/libtevent.so.0(tevent_common_loop_immediate+0x18e) [0xb7241162] > #42 /usr/local/samba/lib/private/libtevent.so.0(+0xb491) [0xb7248491] > #43 /usr/local/samba/lib/private/libtevent.so.0(+0x86ab) [0xb72456ab] > #44 /usr/local/samba/lib/private/libtevent.so.0(_tevent_loop_once+0xdb) [0xb72405ba] > #45 /usr/local/samba/sbin/winbindd(main+0xd6b) [0xb76b269e] > #46 /lib/i386-linux-gnu/i686/cmov/libc.so.6(__libc_start_main+0xf3) [0xb64d5a63] > #47 /usr/local/samba/sbin/winbindd(+0x1a071) [0xb769f071] >[2016/02/29 15:14:26.101195, 0, pid=2061, effective(0, 0), real(0, 0)] ../source3/lib/dumpcore.c:318(dump_core) > dumping core in /usr/local/samba/var/cores/winbindd
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 11760
:
11876
|
11877
|
11878
|
11879
|
11881
|
11883
|
11884