==32241== Memcheck, a memory error detector ==32241== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. ==32241== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info ==32241== Command: winbindd -d 5 -is /home/mi/idmap2.conf ==32241== INFO: Current debug levels: all: 5 tdb: 5 printdrivers: 5 lanman: 5 smb: 5 rpc_parse: 5 rpc_srv: 5 rpc_cli: 5 passdb: 5 sam: 5 auth: 5 winbind: 5 vfs: 5 idmap: 5 quota: 5 acls: 5 locking: 5 msdfs: 5 dmapi: 5 registry: 5 scavenger: 5 dns: 5 ldb: 5 tevent: 5 auth_audit: 5 auth_json_audit: 5 kerberos: 5 drs_repl: 5 smb2: 5 smb2_credits: 5 winbindd version 4.8.3 started. Copyright Andrew Tridgell and the Samba Team 1992-2018 lp_load_ex: refreshing parameters Initialising global parameters rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) INFO: Current debug levels: all: 5 tdb: 5 printdrivers: 5 lanman: 5 smb: 5 rpc_parse: 5 rpc_srv: 5 rpc_cli: 5 passdb: 5 sam: 5 auth: 5 winbind: 5 vfs: 5 idmap: 5 quota: 5 acls: 5 locking: 5 msdfs: 5 dmapi: 5 registry: 5 scavenger: 5 dns: 5 ldb: 5 tevent: 5 auth_audit: 5 auth_json_audit: 5 kerberos: 5 drs_repl: 5 smb2: 5 smb2_credits: 5 Processing section "[global]" doing parameter security = domain doing parameter workgroup = share doing parameter netbios name = share2 doing parameter wins server = 131.130.1.111 doing parameter client ipc signing = auto doing parameter idmap config * : backend = tdb2 doing parameter idmap config * : range = 200-20000000 doing parameter idmap config * : script = echo XXXXXXXXXXXXXXX 1>&2 doing parameter idmap config * : read only = yes doing parameter log file = /tmp/samba doing parameter lock directory = /tmp doing parameter private dir = /tmp doing parameter pid directory = /tmp doing parameter cache directory = /tmp doing parameter state directory = /tmp pm_process() returned Yes Registering messaging pointer for type 2 - private_data=(nil) Registering messaging pointer for type 9 - private_data=(nil) Registered MSG_REQ_POOL_USAGE Registering messaging pointer for type 11 - private_data=(nil) Registering messaging pointer for type 12 - private_data=(nil) Registered MSG_REQ_DMALLOC_MARK and LOG_CHANGED Registering messaging pointer for type 1 - private_data=(nil) Registering messaging pointer for type 5 - private_data=(nil) Registering messaging pointer for type 51 - private_data=(nil) lp_load_ex: refreshing parameters Freeing parametrics: Initialising global parameters rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) INFO: Current debug levels: all: 5 tdb: 5 printdrivers: 5 lanman: 5 smb: 5 rpc_parse: 5 rpc_srv: 5 rpc_cli: 5 passdb: 5 sam: 5 auth: 5 winbind: 5 vfs: 5 idmap: 5 quota: 5 acls: 5 locking: 5 msdfs: 5 dmapi: 5 registry: 5 scavenger: 5 dns: 5 ldb: 5 tevent: 5 auth_audit: 5 auth_json_audit: 5 kerberos: 5 drs_repl: 5 smb2: 5 smb2_credits: 5 Processing section "[global]" doing parameter security = domain doing parameter workgroup = share doing parameter netbios name = share2 doing parameter wins server = 131.130.1.111 doing parameter client ipc signing = auto doing parameter idmap config * : backend = tdb2 doing parameter idmap config * : range = 200-20000000 doing parameter idmap config * : script = echo XXXXXXXXXXXXXXX 1>&2 doing parameter idmap config * : read only = yes doing parameter log file = /tmp/samba doing parameter lock directory = /tmp doing parameter private dir = /tmp doing parameter pid directory = /tmp doing parameter cache directory = /tmp doing parameter state directory = /tmp pm_process() returned Yes added interface eth0 ip=2001:62a:4:1:250:56ff:fea4:5f7b bcast= netmask=ffff:ffff:ffff:ffff:: added interface eth0 ip=131.130.1.38 bcast=131.130.1.255 netmask=255.255.255.0 Netbios name list:- my_netbios_names[0]="SHARE2" added interface eth0 ip=2001:62a:4:1:250:56ff:fea4:5f7b bcast= netmask=ffff:ffff:ffff:ffff:: added interface eth0 ip=131.130.1.38 bcast=131.130.1.255 netmask=255.255.255.0 ==811== ==811== HEAP SUMMARY: ==811== in use at exit: 75,242 bytes in 225 blocks ==811== total heap usage: 863 allocs, 638 frees, 203,669 bytes allocated ==811== ==811== LEAK SUMMARY: ==811== definitely lost: 21 bytes in 1 blocks ==811== indirectly lost: 0 bytes in 0 blocks ==811== possibly lost: 71,747 bytes in 207 blocks ==811== still reachable: 3,474 bytes in 17 blocks ==811== suppressed: 0 bytes in 0 blocks ==811== Rerun with --leak-check=full to see details of leaked memory ==811== ==811== For counts of detected and suppressed errors, rerun with: -v ==811== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) TimeInit: Serverzone is -7200 initialize_winbindd_cache: clearing cache and re-creating with version number 2 Registering messaging pointer for type 33 - private_data=(nil) Registering messaging pointer for type 13 - private_data=(nil) Registering messaging pointer for type 1028 - private_data=(nil) Registering messaging pointer for type 1027 - private_data=(nil) Registering messaging pointer for type 1029 - private_data=(nil) Registering messaging pointer for type 1036 - private_data=(nil) Registering messaging pointer for type 1035 - private_data=(nil) Registering messaging pointer for type 1280 - private_data=(nil) Registering messaging pointer for type 1032 - private_data=(nil) Registering messaging pointer for type 1033 - private_data=(nil) Registering messaging pointer for type 1034 - private_data=(nil) Registering messaging pointer for type 1 - private_data=(nil) Overriding messaging pointer for type 1 - private_data=(nil) Registering messaging pointer for type 1038 - private_data=(nil) add_trusted_domain: Added domain [BUILTIN] [(null)] [S-1-5-32] Attempting to find a passdb backend to match tdbsam (tdbsam) No builtin backend found, trying to load plugin load_module_absolute_path: Probing module '/usr/lib64/samba/pdb/tdbsam.so' load_module_absolute_path: Module '/usr/lib64/samba/pdb/tdbsam.so' loaded Attempting to register passdb backend tdbsam Successfully added passdb backend 'tdbsam' Found pdb backend tdbsam pdb backend tdbsam has a valid init add_trusted_domain: Added domain [SHARE2] [(null)] [S-1-5-21-3616229581-1115301702-3858548163] add_trusted_domain: Added domain [SHARE] [] [S-1-5-21-2933155079-744193478-709915287] Deregistering messaging pointer for type 33 - private_data=(nil) Deregistering messaging pointer for type 13 - private_data=(nil) Deregistering messaging pointer for type 1028 - private_data=(nil) Deregistering messaging pointer for type 1027 - private_data=(nil) Deregistering messaging pointer for type 1029 - private_data=(nil) Deregistering messaging pointer for type 1280 - private_data=(nil) Deregistering messaging pointer for type 1033 - private_data=(nil) Deregistering messaging pointer for type 1 - private_data=(nil) Deregistering messaging pointer for type 1036 - private_data=(nil) Deregistering messaging pointer for type 1035 - private_data=(nil) Registering messaging pointer for type 1028 - private_data=(nil) Registering messaging pointer for type 1027 - private_data=(nil) Registering messaging pointer for type 1280 - private_data=(nil) Registering messaging pointer for type 1 - private_data=(nil) Registering messaging pointer for type 1034 - private_data=(nil) Overriding messaging pointer for type 1034 - private_data=(nil) Registering messaging pointer for type 1038 - private_data=(nil) Overriding messaging pointer for type 1038 - private_data=(nil) child daemon request 48 connection_ok: Connection to (null) for domain SHARE is not connected Opening cache file at /tmp/gencache.tdb Opening cache file at /tmp/gencache_notrans.tdb saf_fetch: failed to find server for "SHARE" domain saf_fetch: failed to find server for "SHARE" domain get_dc_list: preferred server list: ", *" no entry for SHARE#1C found. resolve_lmhosts: Attempting lmhosts lookup for name SHARE<0x1c> getlmhostsent: lmhost entry: 127.0.0.1 localhost wins_srv_is_dead: 131.130.1.111 is alive resolve_wins: using WINS server 131.130.1.111 and tag '*' nmb packet from 131.130.1.111(35072) header: id=11806 opcode=Query(0) response=Yes header: flags: bcast=No rec_avail=Yes rec_des=Yes trunc=No auth=Yes header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 answers: nmb_name=SHARE<1c> rr_type=32 rr_class=1 ttl=258381 answers 0 char .....u.....u hex E00083820175E00083820475 Got a positive name query response from 131.130.1.111 ( 131.130.1.117 131.130.4.117 ) namecache_store: storing 2 addresses for SHARE#1c: 131.130.1.117,131.130.4.117 get_dc_list: returning 2 ip addresses in an unordered list get_dc_list: 131.130.1.117:0 131.130.4.117:0 Connecting to 131.130.1.117 at port 445 No nmbd found namecache_status_fetch: no entry for NBT/SHARE#1C.20.131.130.1.117 found. getlmhostsent: lmhost entry: 127.0.0.1 localhost nmb packet from 131.130.1.117(35072) header: id=25902 opcode=Query(0) response=Yes header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 answers: nmb_name=SHARE<1c> rr_type=33 rr_class=1 ttl=0 answers 0 char .SHARE1.PDC hex 085348415245312E5044432020202020 answers 10 char .d.SHARE1.PDC hex 0064005348415245312E504443202020 answers 20 char .d.SHARE1.PDC hex 20200364005348415245312E50444320 answers 30 char d...__MSBRO hex 2020202020640001025F5F4D5342524F answers 40 char WSE__....SHARE hex 5753455F5F0201E40053484152452020 answers 50 char ...SHARE hex 202020202020202000E4005348415245 answers 60 char ...SHA hex 202020202020202020201CE400534841 answers 70 char RE .d.S hex 5245202020202020202020201D640053 answers 80 char HARE .. hex 48415245202020202020202020201EE4 answers 90 char ................ hex 00000000000000000000000000000000 answers a0 char ................ hex 00000000000000000000000000000000 answers b0 char ............... hex 000000000000000000000000000000 namecache_store: storing 1 address for SHARE1.PDC#20: 131.130.1.117 Socket options: SO_KEEPALIVE = 0 SO_REUSEADDR = 0 SO_BROADCAST = 0 TCP_NODELAY = 1 TCP_KEEPCNT = 9 TCP_KEEPIDLE = 7200 TCP_KEEPINTVL = 75 IPTOS_LOWDELAY = 0 IPTOS_THROUGHPUT = 0 SO_REUSEPORT = 0 SO_SNDBUF = 87040 SO_RCVBUF = 367360 SO_SNDLOWAT = 1 SO_RCVLOWAT = 1 SO_SNDTIMEO = 0 SO_RCVTIMEO = 0 TCP_QUICKACK = 1 TCP_DEFER_ACCEPT = 0 ldb_wrap open of secrets.ldb connecting to SHARE1.PDC (SHARE, ) with account [SHARE\SHARE2$] principal [SHARE2$@SHARE] and realm [] got OID=1.3.6.1.4.1.311.2.2.10 GENSEC backend 'gssapi_spnego' registered GENSEC backend 'gssapi_krb5' registered GENSEC backend 'gssapi_krb5_sasl' registered GENSEC backend 'spnego' registered GENSEC backend 'schannel' registered GENSEC backend 'naclrpc_as_system' registered GENSEC backend 'sasl-EXTERNAL' registered GENSEC backend 'ntlmssp' registered GENSEC backend 'ntlmssp_resume_ccache' registered GENSEC backend 'http_basic' registered GENSEC backend 'http_ntlm' registered GENSEC backend 'http_negotiate' registered Starting GENSEC mechanism spnego Starting GENSEC submechanism ntlmssp Got challenge flags: Got NTLMSSP neg_flags=0x62898215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088215 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH saf_store: refusing to store 0 length domain or servername! set_dc_type_and_flags_connect: domain SHARE Bind RPC Pipe: host SHARE1.PDC auth_type 0, auth_level 1 rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 52 check_bind_response: accepted! rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 80 Bind RPC Pipe: host SHARE1.PDC auth_type 0, auth_level 1 rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 52 check_bind_response: accepted! rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 32 rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 16 ../source3/rpc_client/cli_pipe.c:568: RPC fault code DCERPC_NCA_S_OP_RNG_ERROR received from host SHARE1.PDC! rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 32 rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 84 set_dc_type_and_flags_connect: domain SHARE is NOT in native mode. set_dc_type_and_flags_connect: domain SHARE is NOT running active directory. Finished processing child request 48 child daemon request 20 [32241]: list trusted domains winbindd_domain_init_backend: Setting MS-RPC methods for domain SHARE msrpc_trusted_domains ldb_wrap open of secrets.ldb Starting GENSEC mechanism spnego Bind RPC Pipe: host SHARE1.PDC auth_type 9, auth_level 6 create_generic_auth_rpc_bind_req: generate first token Starting GENSEC submechanism ntlmssp rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 295 check_bind_response: accepted! Got challenge flags: Got NTLMSSP neg_flags=0x62898235 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_SEAL NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_TARGET_TYPE_DOMAIN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_TARGET_INFO NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP: Set final flags: Got NTLMSSP neg_flags=0x62088235 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_SEAL NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH NTLMSSP Sign/Seal - Initialising with flags: Got NTLMSSP neg_flags=0x62088235 NTLMSSP_NEGOTIATE_UNICODE NTLMSSP_REQUEST_TARGET NTLMSSP_NEGOTIATE_SIGN NTLMSSP_NEGOTIATE_SEAL NTLMSSP_NEGOTIATE_NTLM NTLMSSP_NEGOTIATE_ALWAYS_SIGN NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY NTLMSSP_NEGOTIATE_VERSION NTLMSSP_NEGOTIATE_128 NTLMSSP_NEGOTIATE_KEY_EXCH rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 3 ../source3/rpc_client/cli_pipe.c:421: Bind NACK received from host SHARE1.PDC! rpc_pipe_bind: host SHARE1.PDC bind request returned NT_STATUS_NETWORK_ACCESS_DENIED cli_rpc_pipe_open_generic_auth: cli_rpc_pipe_bind failed with error NT_STATUS_NETWORK_ACCESS_DENIED ldb_wrap open of secrets.ldb dbwrap_lock_order_lock: check lock order 3 for /tmp/g_lock.tdb dbwrap_lock_order_unlock: release lock order 3 for /tmp/g_lock.tdb Bind RPC Pipe: host SHARE1.PDC auth_type 0, auth_level 1 rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 56 check_bind_response: accepted! dbwrap_lock_order_lock: check lock order 2 for /tmp/netlogon_creds_cli.tdb dbwrap_lock_order_unlock: release lock order 2 for /tmp/netlogon_creds_cli.tdb rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 20 rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 28 dbwrap_lock_order_lock: check lock order 2 for /tmp/netlogon_creds_cli.tdb dbwrap_lock_order_unlock: release lock order 2 for /tmp/netlogon_creds_cli.tdb rpccli_setup_netlogon_creds_locked: using new netlogon_creds cli[SHARE2$/SHARE2] to SHARE1.PDC Starting GENSEC mechanism schannel Bind RPC Pipe: host SHARE1.PDC auth_type 68, auth_level 6 create_generic_auth_rpc_bind_req: generate first token rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 76 check_bind_response: accepted! seed c2086f6d:c945ae78 seed+time 1eeda481:c945ae78 CLIENT d1bac395:14d83db6 seed+time+1 1eeda482:c945ae78 SERVER be27c896:7a44773b rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 104 dbwrap_lock_order_lock: check lock order 2 for /tmp/netlogon_creds_cli.tdb dbwrap_lock_order_unlock: release lock order 2 for /tmp/netlogon_creds_cli.tdb dbwrap_lock_order_lock: check lock order 3 for /tmp/g_lock.tdb dbwrap_lock_order_unlock: release lock order 3 for /tmp/g_lock.tdb dbwrap_lock_order_lock: check lock order 3 for /tmp/g_lock.tdb dbwrap_lock_order_unlock: release lock order 3 for /tmp/g_lock.tdb Starting GENSEC mechanism schannel Bind RPC Pipe: host SHARE1.PDC auth_type 68, auth_level 6 create_generic_auth_rpc_bind_req: generate first token rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 72 check_bind_response: accepted! dbwrap_lock_order_lock: check lock order 3 for /tmp/g_lock.tdb dbwrap_lock_order_unlock: release lock order 3 for /tmp/g_lock.tdb rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 104 rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 16 ../source3/rpc_client/cli_pipe.c:568: RPC fault code DCERPC_NCA_S_OP_RNG_ERROR received from host SHARE1.PDC! rpc_api_pipe: host SHARE1.PDC rpc_read_send: data_to_read: 88 Finished processing child request 20 Registering messaging pointer for type 1030 - private_data=(nil) Registering messaging pointer for type 1031 - private_data=(nil) Deregistering messaging pointer for type 33 - private_data=(nil) Deregistering messaging pointer for type 13 - private_data=(nil) Deregistering messaging pointer for type 1028 - private_data=(nil) Deregistering messaging pointer for type 1027 - private_data=(nil) Deregistering messaging pointer for type 1029 - private_data=(nil) Deregistering messaging pointer for type 1280 - private_data=(nil) Deregistering messaging pointer for type 1033 - private_data=(nil) Deregistering messaging pointer for type 1 - private_data=(nil) Deregistering messaging pointer for type 1036 - private_data=(nil) Deregistering messaging pointer for type 1035 - private_data=(nil) Opening cache file at /tmp/gencache.tdb Opening cache file at /tmp/gencache_notrans.tdb saf_fetch: Returning "SHARE1.PDC" for "SHARE" domain get_dc_list: preferred server list: "SHARE1.PDC, *" name SHARE#1C found. sitename_fetch: No stored sitename for realm '' name SHARE1.PDC#20 found. get_dc_list: returning 2 ip addresses in an ordered list get_dc_list: 131.130.1.117:0 131.130.4.117:0 msg_try_to_go_online: received for domain SHARE. msg_try_to_go_online: domain SHARE already online. ==841== ==841== HEAP SUMMARY: ==841== in use at exit: 125,740 bytes in 416 blocks ==841== total heap usage: 1,478 allocs, 1,062 frees, 389,629 bytes allocated ==841== ==841== LEAK SUMMARY: ==841== definitely lost: 21 bytes in 1 blocks ==841== indirectly lost: 0 bytes in 0 blocks ==841== possibly lost: 118,980 bytes in 371 blocks ==841== still reachable: 6,739 bytes in 44 blocks ==841== suppressed: 0 bytes in 0 blocks ==841== Rerun with --leak-check=full to see details of leaked memory ==841== ==841== For counts of detected and suppressed errors, rerun with: -v ==841== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) Already reaped child 841 died [ 853]: request interface version (version = 30) [ 853]: request location of privileged pipe xids_to_sids Opening cache file at /tmp/gencache.tdb Opening cache file at /tmp/gencache_notrans.tdb Deregistering messaging pointer for type 33 - private_data=(nil) Deregistering messaging pointer for type 13 - private_data=(nil) Deregistering messaging pointer for type 1028 - private_data=(nil) Deregistering messaging pointer for type 1027 - private_data=(nil) Deregistering messaging pointer for type 1029 - private_data=(nil) Deregistering messaging pointer for type 1280 - private_data=(nil) Deregistering messaging pointer for type 1033 - private_data=(nil) Deregistering messaging pointer for type 1 - private_data=(nil) Deregistering messaging pointer for type 1036 - private_data=(nil) Deregistering messaging pointer for type 1035 - private_data=(nil) Registering messaging pointer for type 1028 - private_data=(nil) Registering messaging pointer for type 1027 - private_data=(nil) Registering messaging pointer for type 1280 - private_data=(nil) Registering messaging pointer for type 1 - private_data=(nil) Registering messaging pointer for type 1034 - private_data=(nil) Overriding messaging pointer for type 1034 - private_data=(nil) Registering messaging pointer for type 1038 - private_data=(nil) Overriding messaging pointer for type 1038 - private_data=(nil) child daemon request 48 set_dc_type_and_flags_connect: domain SHARE2 Create pipe requested lsarpc Created internal pipe lsarpc set_dc_type_and_flags_connect: rpccli_ds_getprimarydominfo on domain SHARE2 failed: (NT_STATUS_RPC_PROCNUM_OUT_OF_RANGE) Create pipe requested lsarpc Created internal pipe lsarpc _lsa_OpenPolicy2: ACCESS should be DENIED (requested: 0x000f1fff) but overritten by euid == initial uid _lsa_OpenPolicy2: access GRANTED (requested: 0x000f1fff, granted: 0x000f1fff) _lsa_OpenPolicy2: ACCESS should be DENIED (requested: 0x000f1fff) but overritten by euid == initial uid _lsa_OpenPolicy2: access GRANTED (requested: 0x000f1fff, granted: 0x000f1fff) set_dc_type_and_flags_connect: domain SHARE2 is NOT in native mode. set_dc_type_and_flags_connect: domain SHARE2 is NOT running active directory. Finished processing child request 48 child daemon request 56 sam_name_to_sid Create pipe requested samr Created internal pipe samr _samr_Connect2: 3860 _samr_Connect2: ACCESS should be DENIED (requested: 0x000f003f) but overritten by euid == initial uid _samr_Connect2: access GRANTED (requested: 0x000f003f, granted: 0x000f003f) _samr_Connect2: 3889 access_check_object: user rights access mask [0x3f0] _samr_OpenDomain: ACCESS should be DENIED (requested: 0x000f040f) but overritten by euid == initial uid _samr_OpenDomain: access GRANTED (requested: 0x000f040f, granted: 0x000f07ff) _samr_OpenDomain: 501 Create pipe requested lsarpc Created internal pipe lsarpc _lsa_OpenPolicy2: ACCESS should be DENIED (requested: 0x000f1fff) but overritten by euid == initial uid _lsa_OpenPolicy2: access GRANTED (requested: 0x000f1fff, granted: 0x000f1fff) name_to_sid: SHARE2 for domain SHARE2 lookup_lsa_rids: looking up name SHARE2 init_lsa_rids: SHARE2 found Create pipe requested samr Created internal pipe samr _samr_Connect2: 3860 _samr_Connect2: ACCESS should be DENIED (requested: 0x000f003f) but overritten by euid == initial uid _samr_Connect2: access GRANTED (requested: 0x000f003f, granted: 0x000f003f) _samr_Connect2: 3889 access_check_object: user rights access mask [0x3f0] _samr_OpenDomain: ACCESS should be DENIED (requested: 0x000f040f) but overritten by euid == initial uid _samr_OpenDomain: access GRANTED (requested: 0x000f040f, granted: 0x000f07ff) _samr_OpenDomain: 501 Create pipe requested lsarpc Created internal pipe lsarpc _lsa_OpenPolicy2: ACCESS should be DENIED (requested: 0x000f1fff) but overritten by euid == initial uid _lsa_OpenPolicy2: access GRANTED (requested: 0x000f1fff, granted: 0x000f1fff) name_to_sid: SHARE2 for domain SHARE2 lookup_lsa_rids: looking up name SHARE2 init_lsa_rids: SHARE2 found ==854== Conditional jump or move depends on uninitialised value(s) ==854== at 0xD35AEF9: vfprintf (in /usr/lib64/libc-2.17.so) ==854== by 0xD423234: __vsnprintf_chk (in /usr/lib64/libc-2.17.so) ==854== by 0xD423197: __snprintf_chk (in /usr/lib64/libc-2.17.so) ==854== by 0x9C206D4: namemap_cache_set_sid2name (in /usr/lib64/libsmbconf.so.0) ==854== by 0x13ACC7: wcache_save_sid_to_name.isra.19 (winbindd_cache.c:969) ==854== by 0x13D984: wb_cache_name_to_sid (winbindd_cache.c:1855) ==854== by 0x15F676: _wbint_LookupName (winbindd_dual_srv.c:139) ==854== by 0x1B695C: api_wbint_LookupName (srv_winbind.c:316) ==854== by 0x15F33A: winbindd_dual_ndrcmd (winbindd_dual_ndr.c:369) ==854== by 0x15BB8B: child_process_request (winbindd_dual.c:666) ==854== by 0x15BB8B: child_handler (winbindd_dual.c:1567) ==854== by 0xCEB383A: ??? (in /usr/lib64/libtevent.so.0.9.36) ==854== by 0xCEB1C06: ??? (in /usr/lib64/libtevent.so.0.9.36) ==854== Finished processing child request 56 Deregistering messaging pointer for type 33 - private_data=(nil) Deregistering messaging pointer for type 13 - private_data=(nil) Deregistering messaging pointer for type 1028 - private_data=(nil) Deregistering messaging pointer for type 1027 - private_data=(nil) Deregistering messaging pointer for type 1029 - private_data=(nil) Deregistering messaging pointer for type 1280 - private_data=(nil) Deregistering messaging pointer for type 1033 - private_data=(nil) Deregistering messaging pointer for type 1 - private_data=(nil) Deregistering messaging pointer for type 1036 - private_data=(nil) Deregistering messaging pointer for type 1035 - private_data=(nil) Registering messaging pointer for type 1028 - private_data=(nil) Registering messaging pointer for type 1027 - private_data=(nil) Registering messaging pointer for type 1280 - private_data=(nil) Registering messaging pointer for type 1 - private_data=(nil) Registering messaging pointer for type 1034 - private_data=(nil) Overriding messaging pointer for type 1034 - private_data=(nil) Registering messaging pointer for type 1038 - private_data=(nil) Overriding messaging pointer for type 1038 - private_data=(nil) child daemon request 56 Successfully added idmap backend 'tdb' Successfully added idmap backend 'passdb' Successfully added idmap backend 'nss' idmap backend tdb2 not found load_module_absolute_path: Probing module '/usr/lib64/samba/idmap/tdb2.so' load_module_absolute_path: Module '/usr/lib64/samba/idmap/tdb2.so' loaded Successfully added idmap backend 'tdb2' using idmap script 'echo XXXXXXXXXXXXXXX 1>&2' pdb_default_uid_to_sid: host has no idea of uid 1000 Finished processing child request 56 child daemon request 56 XXXXXXXXXXXXXXX IDTOSID UID 1000 Finished processing child request 56 Registering messaging pointer for type 1030 - private_data=(nil) Overriding messaging pointer for type 1030 - private_data=(nil) Registering messaging pointer for type 1031 - private_data=(nil) Overriding messaging pointer for type 1031 - private_data=(nil) Deregistering messaging pointer for type 1028 - private_data=(nil) Deregistering messaging pointer for type 1027 - private_data=(nil) Deregistering messaging pointer for type 1280 - private_data=(nil) Deregistering messaging pointer for type 1 - private_data=(nil) saf_fetch: Returning "SHARE1.PDC" for "SHARE" domain get_dc_list: preferred server list: "SHARE1.PDC, *" name SHARE#1C found. sitename_fetch: No stored sitename for realm '' name SHARE1.PDC#20 found. get_dc_list: returning 2 ip addresses in an ordered list get_dc_list: 131.130.1.117:0 131.130.4.117:0 msg_try_to_go_online: received for domain SHARE. msg_try_to_go_online: domain SHARE already online. ==861== ==861== HEAP SUMMARY: ==861== in use at exit: 149,983 bytes in 490 blocks ==861== total heap usage: 2,575 allocs, 2,085 frees, 614,600 bytes allocated ==861== ==861== LEAK SUMMARY: ==861== definitely lost: 21 bytes in 1 blocks ==861== indirectly lost: 0 bytes in 0 blocks ==861== possibly lost: 141,470 bytes in 440 blocks ==861== still reachable: 8,492 bytes in 49 blocks ==861== suppressed: 0 bytes in 0 blocks ==861== Rerun with --leak-check=full to see details of leaked memory ==861== ==861== For counts of detected and suppressed errors, rerun with: -v ==861== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) Reloading services after SIGHUP Reloading services after SIGHUP Reloading services after SIGHUP Reloading services after SIGHUP lp_load_ex: refreshing parameters Freeing parametrics: Initialising global parameters rlimit_max: increasing rlimit_max (270) to minimum Windows limit (16384) INFO: Current debug levels: all: 5 tdb: 5 printdrivers: 5 lanman: 5 smb: 5 rpc_parse: 5 rpc_srv: 5 rpc_cli: 5 passdb: 5 sam: 5 auth: 5 winbind: 5 vfs: 5 idmap: 5 quota: 5 acls: 5 locking: 5 msdfs: 5 dmapi: 5 registry: 5 scavenger: 5 dns: 5 ldb: 5 tevent: 5 auth_audit: 5 auth_json_audit: 5 kerberos: 5 drs_repl: 5 smb2: 5 smb2_credits: 5 Processing section "[global]" doing parameter security = domain doing parameter workgroup = share doing parameter netbios name = share2 doing parameter wins server = 131.130.1.111 doing parameter client ipc signing = auto doing parameter idmap config * : backend = tdb2 doing parameter idmap config * : range = 200-20000000 doing parameter idmap config * : script = echo XXXXXXXXXXXXXXX 1>&2 lp_load_ex: refreshing parameters doing parameter idmap config * : read only = yes Freeing parametrics: doing parameter log file = /tmp/samba doing parameter lock directory = /tmp Initialising global parameters doing parameter private dir = /tmp rlimit_max: increasing rlimit_max (270) to minimum Windows limit (16384) doing parameter pid directory = /tmp doing parameter cache directory = /tmp doing parameter state directory = /tmp pm_process() returned Yes INFO: Current debug levels: all: 5 tdb: 5 printdrivers: 5 lanman: 5 smb: 5 rpc_parse: 5 rpc_srv: 5 rpc_cli: 5 passdb: 5 sam: 5 auth: 5 winbind: 5 vfs: 5 idmap: 5 quota: 5 acls: 5 locking: 5 msdfs: 5 dmapi: 5 registry: 5 scavenger: 5 dns: 5 ldb: 5 tevent: 5 auth_audit: 5 auth_json_audit: 5 kerberos: 5 drs_repl: 5 smb2: 5 smb2_credits: 5 added interface eth0 ip=2001:62a:4:1:250:56ff:fea4:5f7b bcast= netmask=ffff:ffff:ffff:ffff:: added interface eth0 ip=131.130.1.38 bcast=131.130.1.255 netmask=255.255.255.0 Processing section "[global]" doing parameter security = domain doing parameter workgroup = share doing parameter netbios name = share2 doing parameter wins server = 131.130.1.111 doing parameter client ipc signing = auto doing parameter idmap config * : backend = tdb2 doing parameter idmap config * : range = 200-20000000 doing parameter idmap config * : script = echo XXXXXXXXXXXXXXX 1>&2 doing parameter idmap config * : read only = yes doing parameter log file = /tmp/samba doing parameter lock directory = /tmp doing parameter private dir = /tmp doing parameter pid directory = /tmp doing parameter cache directory = /tmp doing parameter state directory = /tmp pm_process() returned Yes added interface eth0 ip=2001:62a:4:1:250:56ff:fea4:5f7b bcast= netmask=ffff:ffff:ffff:ffff:: added interface eth0 ip=131.130.1.38 bcast=131.130.1.255 netmask=255.255.255.0 lp_load_ex: refreshing parameters Freeing parametrics: Initialising global parameters rlimit_max: increasing rlimit_max (270) to minimum Windows limit (16384) lp_load_ex: refreshing parameters Freeing parametrics: INFO: Current debug levels: all: 5 tdb: 5 Initialising global parameters printdrivers: 5 lanman: 5 smb: 5 rpc_parse: 5 rpc_srv: 5 rlimit_max: increasing rlimit_max (270) to minimum Windows limit (16384) rpc_cli: 5 passdb: 5 sam: 5 auth: 5 winbind: 5 vfs: 5 idmap: 5 quota: 5 acls: 5 locking: 5 msdfs: 5 dmapi: 5 registry: 5 scavenger: 5 dns: 5 ldb: 5 tevent: 5 auth_audit: 5 auth_json_audit: 5 kerberos: 5 drs_repl: 5 smb2: 5 smb2_credits: 5 INFO: Current debug levels: all: 5 tdb: 5 printdrivers: 5 lanman: 5 smb: 5 rpc_parse: 5 rpc_srv: 5 rpc_cli: 5 passdb: 5 sam: 5 Processing section "[global]" auth: 5 doing parameter security = domain winbind: 5 vfs: 5 idmap: 5 quota: 5 acls: 5 locking: 5 msdfs: 5 doing parameter workgroup = share dmapi: 5 registry: 5 scavenger: 5 dns: 5 ldb: 5 tevent: 5 auth_audit: 5 auth_json_audit: 5 kerberos: 5 drs_repl: 5 doing parameter netbios name = share2 smb2: 5 smb2_credits: 5 doing parameter wins server = 131.130.1.111 doing parameter client ipc signing = auto Processing section "[global]" doing parameter idmap config * : backend = tdb2 doing parameter security = domain doing parameter workgroup = share doing parameter idmap config * : range = 200-20000000 doing parameter netbios name = share2 doing parameter idmap config * : script = echo XXXXXXXXXXXXXXX 1>&2 doing parameter wins server = 131.130.1.111 doing parameter idmap config * : read only = yes doing parameter client ipc signing = auto doing parameter idmap config * : backend = tdb2 doing parameter log file = /tmp/samba doing parameter idmap config * : range = 200-20000000 doing parameter lock directory = /tmp doing parameter private dir = /tmp doing parameter idmap config * : script = echo XXXXXXXXXXXXXXX 1>&2 doing parameter pid directory = /tmp doing parameter cache directory = /tmp doing parameter idmap config * : read only = yes doing parameter state directory = /tmp doing parameter log file = /tmp/samba pm_process() returned Yes doing parameter lock directory = /tmp doing parameter private dir = /tmp doing parameter pid directory = /tmp doing parameter cache directory = /tmp doing parameter state directory = /tmp added interface eth0 ip=2001:62a:4:1:250:56ff:fea4:5f7b bcast= netmask=ffff:ffff:ffff:ffff:: added interface eth0 ip=131.130.1.38 bcast=131.130.1.255 netmask=255.255.255.0 pm_process() returned Yes added interface eth0 ip=2001:62a:4:1:250:56ff:fea4:5f7b bcast= netmask=ffff:ffff:ffff:ffff:: added interface eth0 ip=131.130.1.38 bcast=131.130.1.255 netmask=255.255.255.0 [ 874]: request interface version (version = 30) [ 874]: request location of privileged pipe xids_to_sids child daemon request 56 pdb_default_uid_to_sid: host has no idea of uid 1000 Finished processing child request 56 child daemon request 56 ==855== Invalid read of size 1 ==855== at 0xD35AEF9: vfprintf (in /usr/lib64/libc-2.17.so) ==855== by 0xD423234: __vsnprintf_chk (in /usr/lib64/libc-2.17.so) ==855== by 0xC5AA3FD: ??? (in /usr/lib64/libtalloc.so.2.1.13) ==855== by 0xC5AAB58: talloc_vasprintf (in /usr/lib64/libtalloc.so.2.1.13) ==855== by 0xC5AAC06: talloc_asprintf (in /usr/lib64/libtalloc.so.2.1.13) ==855== by 0x1D53D396: idmap_tdb2_script (idmap_tdb2.c:272) ==855== by 0x1D53E6D4: idmap_tdb2_id_to_sid (idmap_tdb2.c:386) ==855== by 0x5AA0FC5: idmap_tdb_common_unixids_to_sids (idmap_tdb_common.c:331) ==855== by 0x5AA3444: idmap_backend_unixids_to_sids (idmap.c:626) ==855== by 0x15FA5B: _wbint_UnixIDs2Sids (winbindd_dual_srv.c:258) ==855== by 0x1B642E: api_wbint_UnixIDs2Sids (srv_winbind.c:472) ==855== by 0x15F33A: winbindd_dual_ndrcmd (winbindd_dual_ndr.c:369) ==855== Address 0x169cbae0 is 400 bytes inside a block of size 655 free'd ==855== at 0x4C2ACBD: free (vg_replace_malloc.c:530) ==855== by 0xC5A5D9E: ??? (in /usr/lib64/libtalloc.so.2.1.13) ==855== by 0x9BF6444: ??? (in /usr/lib64/libsmbconf.so.0) ==855== by 0x9BFCD36: ??? (in /usr/lib64/libsmbconf.so.0) ==855== by 0x9C00E61: ??? (in /usr/lib64/libsmbconf.so.0) ==855== by 0x9C011AE: ??? (in /usr/lib64/libsmbconf.so.0) ==855== by 0x9C01BA4: lp_load_global (in /usr/lib64/libsmbconf.so.0) ==855== by 0x131A97: reload_services_file (winbindd.c:119) ==855== by 0xCEB19C6: tevent_common_check_signal (in /usr/lib64/libtevent.so.0.9.36) ==855== by 0xCEB37BB: ??? (in /usr/lib64/libtevent.so.0.9.36) ==855== by 0xCEB1C06: ??? (in /usr/lib64/libtevent.so.0.9.36) ==855== by 0xCEADFFC: _tevent_loop_once (in /usr/lib64/libtevent.so.0.9.36) ==855== Block was alloc'd at ==855== at 0x4C29BC3: malloc (vg_replace_malloc.c:299) ==855== by 0xC5AA1BC: _talloc_pooled_object (in /usr/lib64/libtalloc.so.2.1.13) ==855== by 0x8F28F50: set_param_opt (loadparm.c:894) ==855== by 0x8F29055: lp_do_parameter_parametric (loadparm.c:1591) ==855== by 0x6CB259B: UnknownInlinedFun (tini.c:264) ==855== by 0x6CB259B: tini_parse (tini.c:309) ==855== by 0x6CB44FB: pm_process (params.c:99) ==855== by 0x9C01267: ??? (in /usr/lib64/libsmbconf.so.0) ==855== by 0x9C01BA4: lp_load_global (in /usr/lib64/libsmbconf.so.0) ==855== by 0x131A97: reload_services_file (winbindd.c:119) ==855== by 0x12E46C: main (winbindd.c:1659) ==855== ==855== Invalid read of size 1 ==855== at 0x4C30A08: __GI_mempcpy (vg_replace_strmem.c:1525) ==855== by 0xD38AE2B: _IO_default_xsputn (in /usr/lib64/libc-2.17.so) ==855== by 0xD35AEB2: vfprintf (in /usr/lib64/libc-2.17.so) ==855== by 0xD423234: __vsnprintf_chk (in /usr/lib64/libc-2.17.so) ==855== by 0xC5AA3FD: ??? (in /usr/lib64/libtalloc.so.2.1.13) ==855== by 0xC5AAB58: talloc_vasprintf (in /usr/lib64/libtalloc.so.2.1.13) ==855== by 0xC5AAC06: talloc_asprintf (in /usr/lib64/libtalloc.so.2.1.13) ==855== by 0x1D53D396: idmap_tdb2_script (idmap_tdb2.c:272) ==855== by 0x1D53E6D4: idmap_tdb2_id_to_sid (idmap_tdb2.c:386) ==855== by 0x5AA0FC5: idmap_tdb_common_unixids_to_sids (idmap_tdb_common.c:331) ==855== by 0x5AA3444: idmap_backend_unixids_to_sids (idmap.c:626) ==855== by 0x15FA5B: _wbint_UnixIDs2Sids (winbindd_dual_srv.c:258) ==855== Address 0x169cbaf8 is 424 bytes inside a block of size 655 free'd ==855== at 0x4C2ACBD: free (vg_replace_malloc.c:530) ==855== by 0xC5A5D9E: ??? (in /usr/lib64/libtalloc.so.2.1.13) ==855== by 0x9BF6444: ??? (in /usr/lib64/libsmbconf.so.0) ==855== by 0x9BFCD36: ??? (in /usr/lib64/libsmbconf.so.0) ==855== by 0x9C00E61: ??? (in /usr/lib64/libsmbconf.so.0) ==855== by 0x9C011AE: ??? (in /usr/lib64/libsmbconf.so.0) ==855== by 0x9C01BA4: lp_load_global (in /usr/lib64/libsmbconf.so.0) ==855== by 0x131A97: reload_services_file (winbindd.c:119) ==855== by 0xCEB19C6: tevent_common_check_signal (in /usr/lib64/libtevent.so.0.9.36) ==855== by 0xCEB37BB: ??? (in /usr/lib64/libtevent.so.0.9.36) ==855== by 0xCEB1C06: ??? (in /usr/lib64/libtevent.so.0.9.36) ==855== by 0xCEADFFC: _tevent_loop_once (in /usr/lib64/libtevent.so.0.9.36) ==855== Block was alloc'd at ==855== at 0x4C29BC3: malloc (vg_replace_malloc.c:299) ==855== by 0xC5AA1BC: _talloc_pooled_object (in /usr/lib64/libtalloc.so.2.1.13) ==855== by 0x8F28F50: set_param_opt (loadparm.c:894) ==855== by 0x8F29055: lp_do_parameter_parametric (loadparm.c:1591) ==855== by 0x6CB259B: UnknownInlinedFun (tini.c:264) ==855== by 0x6CB259B: tini_parse (tini.c:309) ==855== by 0x6CB44FB: pm_process (params.c:99) ==855== by 0x9C01267: ??? (in /usr/lib64/libsmbconf.so.0) ==855== by 0x9C01BA4: lp_load_global (in /usr/lib64/libsmbconf.so.0) ==855== by 0x131A97: reload_services_file (winbindd.c:119) ==855== by 0x12E46C: main (winbindd.c:1659) ==855== ==855== Invalid read of size 1 ==855== at 0x4C30A1A: __GI_mempcpy (vg_replace_strmem.c:1525) ==855== by 0xD38AE2B: _IO_default_xsputn (in /usr/lib64/libc-2.17.so) ==855== by 0xD35AEB2: vfprintf (in /usr/lib64/libc-2.17.so) ==855== by 0xD423234: __vsnprintf_chk (in /usr/lib64/libc-2.17.so) ==855== by 0xC5AA3FD: ??? (in /usr/lib64/libtalloc.so.2.1.13) ==855== by 0xC5AAB58: talloc_vasprintf (in /usr/lib64/libtalloc.so.2.1.13) ==855== by 0xC5AAC06: talloc_asprintf (in /usr/lib64/libtalloc.so.2.1.13) ==855== by 0x1D53D396: idmap_tdb2_script (idmap_tdb2.c:272) ==855== by 0x1D53E6D4: idmap_tdb2_id_to_sid (idmap_tdb2.c:386) ==855== by 0x5AA0FC5: idmap_tdb_common_unixids_to_sids (idmap_tdb_common.c:331) ==855== by 0x5AA3444: idmap_backend_unixids_to_sids (idmap.c:626) ==855== by 0x15FA5B: _wbint_UnixIDs2Sids (winbindd_dual_srv.c:258) ==855== Address 0x169cbaf6 is 422 bytes inside a block of size 655 free'd ==855== at 0x4C2ACBD: free (vg_replace_malloc.c:530) ==855== by 0xC5A5D9E: ??? (in /usr/lib64/libtalloc.so.2.1.13) ==855== by 0x9BF6444: ??? (in /usr/lib64/libsmbconf.so.0) ==855== by 0x9BFCD36: ??? (in /usr/lib64/libsmbconf.so.0) ==855== by 0x9C00E61: ??? (in /usr/lib64/libsmbconf.so.0) ==855== by 0x9C011AE: ??? (in /usr/lib64/libsmbconf.so.0) ==855== by 0x9C01BA4: lp_load_global (in /usr/lib64/libsmbconf.so.0) ==855== by 0x131A97: reload_services_file (winbindd.c:119) ==855== by 0xCEB19C6: tevent_common_check_signal (in /usr/lib64/libtevent.so.0.9.36) ==855== by 0xCEB37BB: ??? (in /usr/lib64/libtevent.so.0.9.36) ==855== by 0xCEB1C06: ??? (in /usr/lib64/libtevent.so.0.9.36) ==855== by 0xCEADFFC: _tevent_loop_once (in /usr/lib64/libtevent.so.0.9.36) ==855== Block was alloc'd at ==855== at 0x4C29BC3: malloc (vg_replace_malloc.c:299) ==855== by 0xC5AA1BC: _talloc_pooled_object (in /usr/lib64/libtalloc.so.2.1.13) ==855== by 0x8F28F50: set_param_opt (loadparm.c:894) ==855== by 0x8F29055: lp_do_parameter_parametric (loadparm.c:1591) ==855== by 0x6CB259B: UnknownInlinedFun (tini.c:264) ==855== by 0x6CB259B: tini_parse (tini.c:309) ==855== by 0x6CB44FB: pm_process (params.c:99) ==855== by 0x9C01267: ??? (in /usr/lib64/libsmbconf.so.0) ==855== by 0x9C01BA4: lp_load_global (in /usr/lib64/libsmbconf.so.0) ==855== by 0x131A97: reload_services_file (winbindd.c:119) ==855== by 0x12E46C: main (winbindd.c:1659) ==855== XXXXXXXXXXXXXXX IDTOSID UID 1000 Finished processing child request 56 Got sig[15] terminate (is_parent=0) Got sig[15] terminate (is_parent=0) Got sig[15] terminate (is_parent=0) Got sig[15] terminate (is_parent=1) ==854== ==854== HEAP SUMMARY: ==854== in use at exit: 168,096 bytes in 628 blocks ==854== total heap usage: 3,120 allocs, 2,492 frees, 769,493 bytes allocated ==854== ==854== LEAK SUMMARY: ==854== definitely lost: 21 bytes in 1 blocks ==854== indirectly lost: 0 bytes in 0 blocks ==854== possibly lost: 161,548 bytes in 583 blocks ==854== still reachable: 6,527 bytes in 44 blocks ==854== suppressed: 0 bytes in 0 blocks ==854== Rerun with --leak-check=full to see details of leaked memory ==854== ==854== For counts of detected and suppressed errors, rerun with: -v ==854== Use --track-origins=yes to see where uninitialised values come from ==854== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) ==32241== ==32241== HEAP SUMMARY: ==32241== in use at exit: 123,031 bytes in 407 blocks ==32241== total heap usage: 2,312 allocs, 1,905 frees, 717,203 bytes allocated ==32241== ==855== ==855== HEAP SUMMARY: ==855== in use at exit: 143,050 bytes in 451 blocks ==855== total heap usage: 2,773 allocs, 2,322 frees, 691,104 bytes allocated ==855== ==32241== LEAK SUMMARY: ==32241== definitely lost: 39 bytes in 2 blocks ==32241== indirectly lost: 0 bytes in 0 blocks ==32241== possibly lost: 116,393 bytes in 359 blocks ==32241== still reachable: 6,599 bytes in 46 blocks ==32241== suppressed: 0 bytes in 0 blocks ==32241== Rerun with --leak-check=full to see details of leaked memory ==32241== ==32241== For counts of detected and suppressed errors, rerun with: -v ==32241== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) ==814== ==814== HEAP SUMMARY: ==814== in use at exit: 167,887 bytes in 596 blocks ==814== total heap usage: 7,393 allocs, 6,797 frees, 2,651,405 bytes allocated ==814== ==855== LEAK SUMMARY: ==855== definitely lost: 21 bytes in 1 blocks ==855== indirectly lost: 0 bytes in 0 blocks ==855== possibly lost: 134,973 bytes in 404 blocks ==855== still reachable: 8,056 bytes in 46 blocks ==855== suppressed: 0 bytes in 0 blocks ==855== Rerun with --leak-check=full to see details of leaked memory ==855== ==855== For counts of detected and suppressed errors, rerun with: -v ==855== ERROR SUMMARY: 51 errors from 3 contexts (suppressed: 0 from 0) ==814== LEAK SUMMARY: ==814== definitely lost: 21 bytes in 1 blocks ==814== indirectly lost: 0 bytes in 0 blocks ==814== possibly lost: 149,149 bytes in 515 blocks ==814== still reachable: 18,717 bytes in 80 blocks ==814== suppressed: 0 bytes in 0 blocks ==814== Rerun with --leak-check=full to see details of leaked memory ==814== ==814== For counts of detected and suppressed errors, rerun with: -v ==814== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)