The Samba-Bugzilla – Attachment 15179 Details for
Bug 13956
idmap_tdb2 stops working after some time
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
log of winbindd under valgrind
winbind_valgrind.log (text/plain), 43.43 KB, created by
Heinrich Mislik
on 2019-05-22 11:51:26 UTC
(
hide
)
Description:
log of winbindd under valgrind
Filename:
MIME Type:
Creator:
Heinrich Mislik
Created:
2019-05-22 11:51:26 UTC
Size:
43.43 KB
patch
obsolete
>==32241== Memcheck, a memory error detector >==32241== Copyright (C) 2002-2017, and GNU GPL'd, by Julian Seward et al. >==32241== Using Valgrind-3.13.0 and LibVEX; rerun with -h for copyright info >==32241== Command: winbindd -d 5 -is /home/mi/idmap2.conf >==32241== >INFO: Current debug levels: > all: 5 > tdb: 5 > printdrivers: 5 > lanman: 5 > smb: 5 > rpc_parse: 5 > rpc_srv: 5 > rpc_cli: 5 > passdb: 5 > sam: 5 > auth: 5 > winbind: 5 > vfs: 5 > idmap: 5 > quota: 5 > acls: 5 > locking: 5 > msdfs: 5 > dmapi: 5 > registry: 5 > scavenger: 5 > dns: 5 > ldb: 5 > tevent: 5 > auth_audit: 5 > auth_json_audit: 5 > kerberos: 5 > drs_repl: 5 > smb2: 5 > smb2_credits: 5 >winbindd version 4.8.3 started. >Copyright Andrew Tridgell and the Samba Team 1992-2018 >lp_load_ex: refreshing parameters >Initialising global parameters >rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) >INFO: Current debug levels: > all: 5 > tdb: 5 > printdrivers: 5 > lanman: 5 > smb: 5 > rpc_parse: 5 > rpc_srv: 5 > rpc_cli: 5 > passdb: 5 > sam: 5 > auth: 5 > winbind: 5 > vfs: 5 > idmap: 5 > quota: 5 > acls: 5 > locking: 5 > msdfs: 5 > dmapi: 5 > registry: 5 > scavenger: 5 > dns: 5 > ldb: 5 > tevent: 5 > auth_audit: 5 > auth_json_audit: 5 > kerberos: 5 > drs_repl: 5 > smb2: 5 > smb2_credits: 5 >Processing section "[global]" >doing parameter security = domain >doing parameter workgroup = share >doing parameter netbios name = share2 >doing parameter wins server = 131.130.1.111 >doing parameter client ipc signing = auto >doing parameter idmap config * : backend = tdb2 >doing parameter idmap config * : range = 200-20000000 >doing parameter idmap config * : script = echo XXXXXXXXXXXXXXX 1>&2 >doing parameter idmap config * : read only = yes >doing parameter log file = /tmp/samba >doing parameter lock directory = /tmp >doing parameter private dir = /tmp >doing parameter pid directory = /tmp >doing parameter cache directory = /tmp >doing parameter state directory = /tmp >pm_process() returned Yes >Registering messaging pointer for type 2 - private_data=(nil) >Registering messaging pointer for type 9 - private_data=(nil) >Registered MSG_REQ_POOL_USAGE >Registering messaging pointer for type 11 - private_data=(nil) >Registering messaging pointer for type 12 - private_data=(nil) >Registered MSG_REQ_DMALLOC_MARK and LOG_CHANGED >Registering messaging pointer for type 1 - private_data=(nil) >Registering messaging pointer for type 5 - private_data=(nil) >Registering messaging pointer for type 51 - private_data=(nil) >lp_load_ex: refreshing parameters >Freeing parametrics: >Initialising global parameters >rlimit_max: increasing rlimit_max (1024) to minimum Windows limit (16384) >INFO: Current debug levels: > all: 5 > tdb: 5 > printdrivers: 5 > lanman: 5 > smb: 5 > rpc_parse: 5 > rpc_srv: 5 > rpc_cli: 5 > passdb: 5 > sam: 5 > auth: 5 > winbind: 5 > vfs: 5 > idmap: 5 > quota: 5 > acls: 5 > locking: 5 > msdfs: 5 > dmapi: 5 > registry: 5 > scavenger: 5 > dns: 5 > ldb: 5 > tevent: 5 > auth_audit: 5 > auth_json_audit: 5 > kerberos: 5 > drs_repl: 5 > smb2: 5 > smb2_credits: 5 >Processing section "[global]" >doing parameter security = domain >doing parameter workgroup = share >doing parameter netbios name = share2 >doing parameter wins server = 131.130.1.111 >doing parameter client ipc signing = auto >doing parameter idmap config * : backend = tdb2 >doing parameter idmap config * : range = 200-20000000 >doing parameter idmap config * : script = echo XXXXXXXXXXXXXXX 1>&2 >doing parameter idmap config * : read only = yes >doing parameter log file = /tmp/samba >doing parameter lock directory = /tmp >doing parameter private dir = /tmp >doing parameter pid directory = /tmp >doing parameter cache directory = /tmp >doing parameter state directory = /tmp >pm_process() returned Yes >added interface eth0 ip=2001:62a:4:1:250:56ff:fea4:5f7b bcast= netmask=ffff:ffff:ffff:ffff:: >added interface eth0 ip=131.130.1.38 bcast=131.130.1.255 netmask=255.255.255.0 >Netbios name list:- >my_netbios_names[0]="SHARE2" >added interface eth0 ip=2001:62a:4:1:250:56ff:fea4:5f7b bcast= netmask=ffff:ffff:ffff:ffff:: >added interface eth0 ip=131.130.1.38 bcast=131.130.1.255 netmask=255.255.255.0 >==811== >==811== HEAP SUMMARY: >==811== in use at exit: 75,242 bytes in 225 blocks >==811== total heap usage: 863 allocs, 638 frees, 203,669 bytes allocated >==811== >==811== LEAK SUMMARY: >==811== definitely lost: 21 bytes in 1 blocks >==811== indirectly lost: 0 bytes in 0 blocks >==811== possibly lost: 71,747 bytes in 207 blocks >==811== still reachable: 3,474 bytes in 17 blocks >==811== suppressed: 0 bytes in 0 blocks >==811== Rerun with --leak-check=full to see details of leaked memory >==811== >==811== For counts of detected and suppressed errors, rerun with: -v >==811== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) >TimeInit: Serverzone is -7200 >initialize_winbindd_cache: clearing cache and re-creating with version number 2 >Registering messaging pointer for type 33 - private_data=(nil) >Registering messaging pointer for type 13 - private_data=(nil) >Registering messaging pointer for type 1028 - private_data=(nil) >Registering messaging pointer for type 1027 - private_data=(nil) >Registering messaging pointer for type 1029 - private_data=(nil) >Registering messaging pointer for type 1036 - private_data=(nil) >Registering messaging pointer for type 1035 - private_data=(nil) >Registering messaging pointer for type 1280 - private_data=(nil) >Registering messaging pointer for type 1032 - private_data=(nil) >Registering messaging pointer for type 1033 - private_data=(nil) >Registering messaging pointer for type 1034 - private_data=(nil) >Registering messaging pointer for type 1 - private_data=(nil) >Overriding messaging pointer for type 1 - private_data=(nil) >Registering messaging pointer for type 1038 - private_data=(nil) >add_trusted_domain: Added domain [BUILTIN] [(null)] [S-1-5-32] >Attempting to find a passdb backend to match tdbsam (tdbsam) >No builtin backend found, trying to load plugin >load_module_absolute_path: Probing module '/usr/lib64/samba/pdb/tdbsam.so' >load_module_absolute_path: Module '/usr/lib64/samba/pdb/tdbsam.so' loaded >Attempting to register passdb backend tdbsam >Successfully added passdb backend 'tdbsam' >Found pdb backend tdbsam >pdb backend tdbsam has a valid init >add_trusted_domain: Added domain [SHARE2] [(null)] [S-1-5-21-3616229581-1115301702-3858548163] >add_trusted_domain: Added domain [SHARE] [] [S-1-5-21-2933155079-744193478-709915287] >Deregistering messaging pointer for type 33 - private_data=(nil) >Deregistering messaging pointer for type 13 - private_data=(nil) >Deregistering messaging pointer for type 1028 - private_data=(nil) >Deregistering messaging pointer for type 1027 - private_data=(nil) >Deregistering messaging pointer for type 1029 - private_data=(nil) >Deregistering messaging pointer for type 1280 - private_data=(nil) >Deregistering messaging pointer for type 1033 - private_data=(nil) >Deregistering messaging pointer for type 1 - private_data=(nil) >Deregistering messaging pointer for type 1036 - private_data=(nil) >Deregistering messaging pointer for type 1035 - private_data=(nil) >Registering messaging pointer for type 1028 - private_data=(nil) >Registering messaging pointer for type 1027 - private_data=(nil) >Registering messaging pointer for type 1280 - private_data=(nil) >Registering messaging pointer for type 1 - private_data=(nil) >Registering messaging pointer for type 1034 - private_data=(nil) >Overriding messaging pointer for type 1034 - private_data=(nil) >Registering messaging pointer for type 1038 - private_data=(nil) >Overriding messaging pointer for type 1038 - private_data=(nil) >child daemon request 48 >connection_ok: Connection to (null) for domain SHARE is not connected >Opening cache file at /tmp/gencache.tdb >Opening cache file at /tmp/gencache_notrans.tdb >saf_fetch: failed to find server for "SHARE" domain >saf_fetch: failed to find server for "SHARE" domain >get_dc_list: preferred server list: ", *" >no entry for SHARE#1C found. >resolve_lmhosts: Attempting lmhosts lookup for name SHARE<0x1c> >getlmhostsent: lmhost entry: 127.0.0.1 localhost >wins_srv_is_dead: 131.130.1.111 is alive >resolve_wins: using WINS server 131.130.1.111 and tag '*' >nmb packet from 131.130.1.111(35072) header: id=11806 opcode=Query(0) response=Yes > header: flags: bcast=No rec_avail=Yes rec_des=Yes trunc=No auth=Yes > header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 > answers: nmb_name=SHARE<1c> rr_type=32 rr_class=1 ttl=258381 > answers 0 char .....u.....u hex E00083820175E00083820475 >Got a positive name query response from 131.130.1.111 ( 131.130.1.117 131.130.4.117 ) >namecache_store: storing 2 addresses for SHARE#1c: 131.130.1.117,131.130.4.117 >get_dc_list: returning 2 ip addresses in an unordered list >get_dc_list: 131.130.1.117:0 131.130.4.117:0 >Connecting to 131.130.1.117 at port 445 >No nmbd found >namecache_status_fetch: no entry for NBT/SHARE#1C.20.131.130.1.117 found. >getlmhostsent: lmhost entry: 127.0.0.1 localhost >nmb packet from 131.130.1.117(35072) header: id=25902 opcode=Query(0) response=Yes > header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes > header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0 > answers: nmb_name=SHARE<1c> rr_type=33 rr_class=1 ttl=0 > answers 0 char .SHARE1.PDC hex 085348415245312E5044432020202020 > answers 10 char .d.SHARE1.PDC hex 0064005348415245312E504443202020 > answers 20 char .d.SHARE1.PDC hex 20200364005348415245312E50444320 > answers 30 char d...__MSBRO hex 2020202020640001025F5F4D5342524F > answers 40 char WSE__....SHARE hex 5753455F5F0201E40053484152452020 > answers 50 char ...SHARE hex 202020202020202000E4005348415245 > answers 60 char ...SHA hex 202020202020202020201CE400534841 > answers 70 char RE .d.S hex 5245202020202020202020201D640053 > answers 80 char HARE .. hex 48415245202020202020202020201EE4 > answers 90 char ................ hex 00000000000000000000000000000000 > answers a0 char ................ hex 00000000000000000000000000000000 > answers b0 char ............... hex 000000000000000000000000000000 >namecache_store: storing 1 address for SHARE1.PDC#20: 131.130.1.117 >Socket options: > SO_KEEPALIVE = 0 > SO_REUSEADDR = 0 > SO_BROADCAST = 0 > TCP_NODELAY = 1 > TCP_KEEPCNT = 9 > TCP_KEEPIDLE = 7200 > TCP_KEEPINTVL = 75 > IPTOS_LOWDELAY = 0 > IPTOS_THROUGHPUT = 0 > SO_REUSEPORT = 0 > SO_SNDBUF = 87040 > SO_RCVBUF = 367360 > SO_SNDLOWAT = 1 > SO_RCVLOWAT = 1 > SO_SNDTIMEO = 0 > SO_RCVTIMEO = 0 > TCP_QUICKACK = 1 > TCP_DEFER_ACCEPT = 0 >ldb_wrap open of secrets.ldb >connecting to SHARE1.PDC (SHARE, ) with account [SHARE\SHARE2$] principal [SHARE2$@SHARE] and realm [] >got OID=1.3.6.1.4.1.311.2.2.10 >GENSEC backend 'gssapi_spnego' registered >GENSEC backend 'gssapi_krb5' registered >GENSEC backend 'gssapi_krb5_sasl' registered >GENSEC backend 'spnego' registered >GENSEC backend 'schannel' registered >GENSEC backend 'naclrpc_as_system' registered >GENSEC backend 'sasl-EXTERNAL' registered >GENSEC backend 'ntlmssp' registered >GENSEC backend 'ntlmssp_resume_ccache' registered >GENSEC backend 'http_basic' registered >GENSEC backend 'http_ntlm' registered >GENSEC backend 'http_negotiate' registered >Starting GENSEC mechanism spnego >Starting GENSEC submechanism ntlmssp >Got challenge flags: >Got NTLMSSP neg_flags=0x62898215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088215 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >saf_store: refusing to store 0 length domain or servername! >set_dc_type_and_flags_connect: domain SHARE >Bind RPC Pipe: host SHARE1.PDC auth_type 0, auth_level 1 >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 52 >check_bind_response: accepted! >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 80 >Bind RPC Pipe: host SHARE1.PDC auth_type 0, auth_level 1 >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 52 >check_bind_response: accepted! >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 32 >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 16 >../source3/rpc_client/cli_pipe.c:568: RPC fault code DCERPC_NCA_S_OP_RNG_ERROR received from host SHARE1.PDC! >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 32 >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 84 >set_dc_type_and_flags_connect: domain SHARE is NOT in native mode. >set_dc_type_and_flags_connect: domain SHARE is NOT running active directory. >Finished processing child request 48 >child daemon request 20 >[32241]: list trusted domains >winbindd_domain_init_backend: Setting MS-RPC methods for domain SHARE >msrpc_trusted_domains >ldb_wrap open of secrets.ldb >Starting GENSEC mechanism spnego >Bind RPC Pipe: host SHARE1.PDC auth_type 9, auth_level 6 >create_generic_auth_rpc_bind_req: generate first token >Starting GENSEC submechanism ntlmssp >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 295 >check_bind_response: accepted! >Got challenge flags: >Got NTLMSSP neg_flags=0x62898235 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_SEAL > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_TARGET_TYPE_DOMAIN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_TARGET_INFO > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP: Set final flags: >Got NTLMSSP neg_flags=0x62088235 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_SEAL > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >NTLMSSP Sign/Seal - Initialising with flags: >Got NTLMSSP neg_flags=0x62088235 > NTLMSSP_NEGOTIATE_UNICODE > NTLMSSP_REQUEST_TARGET > NTLMSSP_NEGOTIATE_SIGN > NTLMSSP_NEGOTIATE_SEAL > NTLMSSP_NEGOTIATE_NTLM > NTLMSSP_NEGOTIATE_ALWAYS_SIGN > NTLMSSP_NEGOTIATE_EXTENDED_SESSIONSECURITY > NTLMSSP_NEGOTIATE_VERSION > NTLMSSP_NEGOTIATE_128 > NTLMSSP_NEGOTIATE_KEY_EXCH >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 3 >../source3/rpc_client/cli_pipe.c:421: Bind NACK received from host SHARE1.PDC! >rpc_pipe_bind: host SHARE1.PDC bind request returned NT_STATUS_NETWORK_ACCESS_DENIED >cli_rpc_pipe_open_generic_auth: cli_rpc_pipe_bind failed with error NT_STATUS_NETWORK_ACCESS_DENIED >ldb_wrap open of secrets.ldb >dbwrap_lock_order_lock: check lock order 3 for /tmp/g_lock.tdb >dbwrap_lock_order_unlock: release lock order 3 for /tmp/g_lock.tdb >Bind RPC Pipe: host SHARE1.PDC auth_type 0, auth_level 1 >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 56 >check_bind_response: accepted! >dbwrap_lock_order_lock: check lock order 2 for /tmp/netlogon_creds_cli.tdb >dbwrap_lock_order_unlock: release lock order 2 for /tmp/netlogon_creds_cli.tdb >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 20 >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 28 >dbwrap_lock_order_lock: check lock order 2 for /tmp/netlogon_creds_cli.tdb >dbwrap_lock_order_unlock: release lock order 2 for /tmp/netlogon_creds_cli.tdb >rpccli_setup_netlogon_creds_locked: using new netlogon_creds cli[SHARE2$/SHARE2] to SHARE1.PDC >Starting GENSEC mechanism schannel >Bind RPC Pipe: host SHARE1.PDC auth_type 68, auth_level 6 >create_generic_auth_rpc_bind_req: generate first token >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 76 >check_bind_response: accepted! > seed c2086f6d:c945ae78 > seed+time 1eeda481:c945ae78 > CLIENT d1bac395:14d83db6 > seed+time+1 1eeda482:c945ae78 > SERVER be27c896:7a44773b >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 104 >dbwrap_lock_order_lock: check lock order 2 for /tmp/netlogon_creds_cli.tdb >dbwrap_lock_order_unlock: release lock order 2 for /tmp/netlogon_creds_cli.tdb >dbwrap_lock_order_lock: check lock order 3 for /tmp/g_lock.tdb >dbwrap_lock_order_unlock: release lock order 3 for /tmp/g_lock.tdb >dbwrap_lock_order_lock: check lock order 3 for /tmp/g_lock.tdb >dbwrap_lock_order_unlock: release lock order 3 for /tmp/g_lock.tdb >Starting GENSEC mechanism schannel >Bind RPC Pipe: host SHARE1.PDC auth_type 68, auth_level 6 >create_generic_auth_rpc_bind_req: generate first token >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 72 >check_bind_response: accepted! >dbwrap_lock_order_lock: check lock order 3 for /tmp/g_lock.tdb >dbwrap_lock_order_unlock: release lock order 3 for /tmp/g_lock.tdb >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 104 >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 16 >../source3/rpc_client/cli_pipe.c:568: RPC fault code DCERPC_NCA_S_OP_RNG_ERROR received from host SHARE1.PDC! >rpc_api_pipe: host SHARE1.PDC >rpc_read_send: data_to_read: 88 >Finished processing child request 20 >Registering messaging pointer for type 1030 - private_data=(nil) >Registering messaging pointer for type 1031 - private_data=(nil) >Deregistering messaging pointer for type 33 - private_data=(nil) >Deregistering messaging pointer for type 13 - private_data=(nil) >Deregistering messaging pointer for type 1028 - private_data=(nil) >Deregistering messaging pointer for type 1027 - private_data=(nil) >Deregistering messaging pointer for type 1029 - private_data=(nil) >Deregistering messaging pointer for type 1280 - private_data=(nil) >Deregistering messaging pointer for type 1033 - private_data=(nil) >Deregistering messaging pointer for type 1 - private_data=(nil) >Deregistering messaging pointer for type 1036 - private_data=(nil) >Deregistering messaging pointer for type 1035 - private_data=(nil) >Opening cache file at /tmp/gencache.tdb >Opening cache file at /tmp/gencache_notrans.tdb >saf_fetch: Returning "SHARE1.PDC" for "SHARE" domain >get_dc_list: preferred server list: "SHARE1.PDC, *" >name SHARE#1C found. >sitename_fetch: No stored sitename for realm '' >name SHARE1.PDC#20 found. >get_dc_list: returning 2 ip addresses in an ordered list >get_dc_list: 131.130.1.117:0 131.130.4.117:0 >msg_try_to_go_online: received for domain SHARE. >msg_try_to_go_online: domain SHARE already online. >==841== >==841== HEAP SUMMARY: >==841== in use at exit: 125,740 bytes in 416 blocks >==841== total heap usage: 1,478 allocs, 1,062 frees, 389,629 bytes allocated >==841== >==841== LEAK SUMMARY: >==841== definitely lost: 21 bytes in 1 blocks >==841== indirectly lost: 0 bytes in 0 blocks >==841== possibly lost: 118,980 bytes in 371 blocks >==841== still reachable: 6,739 bytes in 44 blocks >==841== suppressed: 0 bytes in 0 blocks >==841== Rerun with --leak-check=full to see details of leaked memory >==841== >==841== For counts of detected and suppressed errors, rerun with: -v >==841== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) >Already reaped child 841 died >[ 853]: request interface version (version = 30) >[ 853]: request location of privileged pipe >xids_to_sids >Opening cache file at /tmp/gencache.tdb >Opening cache file at /tmp/gencache_notrans.tdb >Deregistering messaging pointer for type 33 - private_data=(nil) >Deregistering messaging pointer for type 13 - private_data=(nil) >Deregistering messaging pointer for type 1028 - private_data=(nil) >Deregistering messaging pointer for type 1027 - private_data=(nil) >Deregistering messaging pointer for type 1029 - private_data=(nil) >Deregistering messaging pointer for type 1280 - private_data=(nil) >Deregistering messaging pointer for type 1033 - private_data=(nil) >Deregistering messaging pointer for type 1 - private_data=(nil) >Deregistering messaging pointer for type 1036 - private_data=(nil) >Deregistering messaging pointer for type 1035 - private_data=(nil) >Registering messaging pointer for type 1028 - private_data=(nil) >Registering messaging pointer for type 1027 - private_data=(nil) >Registering messaging pointer for type 1280 - private_data=(nil) >Registering messaging pointer for type 1 - private_data=(nil) >Registering messaging pointer for type 1034 - private_data=(nil) >Overriding messaging pointer for type 1034 - private_data=(nil) >Registering messaging pointer for type 1038 - private_data=(nil) >Overriding messaging pointer for type 1038 - private_data=(nil) >child daemon request 48 >set_dc_type_and_flags_connect: domain SHARE2 >Create pipe requested lsarpc >Created internal pipe lsarpc >set_dc_type_and_flags_connect: rpccli_ds_getprimarydominfo on domain SHARE2 failed: (NT_STATUS_RPC_PROCNUM_OUT_OF_RANGE) >Create pipe requested lsarpc >Created internal pipe lsarpc >_lsa_OpenPolicy2: ACCESS should be DENIED (requested: 0x000f1fff) >but overritten by euid == initial uid >_lsa_OpenPolicy2: access GRANTED (requested: 0x000f1fff, granted: 0x000f1fff) >_lsa_OpenPolicy2: ACCESS should be DENIED (requested: 0x000f1fff) >but overritten by euid == initial uid >_lsa_OpenPolicy2: access GRANTED (requested: 0x000f1fff, granted: 0x000f1fff) >set_dc_type_and_flags_connect: domain SHARE2 is NOT in native mode. >set_dc_type_and_flags_connect: domain SHARE2 is NOT running active directory. >Finished processing child request 48 >child daemon request 56 >sam_name_to_sid >Create pipe requested samr >Created internal pipe samr >_samr_Connect2: 3860 >_samr_Connect2: ACCESS should be DENIED (requested: 0x000f003f) >but overritten by euid == initial uid >_samr_Connect2: access GRANTED (requested: 0x000f003f, granted: 0x000f003f) >_samr_Connect2: 3889 >access_check_object: user rights access mask [0x3f0] >_samr_OpenDomain: ACCESS should be DENIED (requested: 0x000f040f) >but overritten by euid == initial uid >_samr_OpenDomain: access GRANTED (requested: 0x000f040f, granted: 0x000f07ff) >_samr_OpenDomain: 501 >Create pipe requested lsarpc >Created internal pipe lsarpc >_lsa_OpenPolicy2: ACCESS should be DENIED (requested: 0x000f1fff) >but overritten by euid == initial uid >_lsa_OpenPolicy2: access GRANTED (requested: 0x000f1fff, granted: 0x000f1fff) >name_to_sid: SHARE2 for domain SHARE2 >lookup_lsa_rids: looking up name SHARE2 >init_lsa_rids: SHARE2 found >Create pipe requested samr >Created internal pipe samr >_samr_Connect2: 3860 >_samr_Connect2: ACCESS should be DENIED (requested: 0x000f003f) >but overritten by euid == initial uid >_samr_Connect2: access GRANTED (requested: 0x000f003f, granted: 0x000f003f) >_samr_Connect2: 3889 >access_check_object: user rights access mask [0x3f0] >_samr_OpenDomain: ACCESS should be DENIED (requested: 0x000f040f) >but overritten by euid == initial uid >_samr_OpenDomain: access GRANTED (requested: 0x000f040f, granted: 0x000f07ff) >_samr_OpenDomain: 501 >Create pipe requested lsarpc >Created internal pipe lsarpc >_lsa_OpenPolicy2: ACCESS should be DENIED (requested: 0x000f1fff) >but overritten by euid == initial uid >_lsa_OpenPolicy2: access GRANTED (requested: 0x000f1fff, granted: 0x000f1fff) >name_to_sid: SHARE2 for domain SHARE2 >lookup_lsa_rids: looking up name SHARE2 >init_lsa_rids: SHARE2 found >==854== Conditional jump or move depends on uninitialised value(s) >==854== at 0xD35AEF9: vfprintf (in /usr/lib64/libc-2.17.so) >==854== by 0xD423234: __vsnprintf_chk (in /usr/lib64/libc-2.17.so) >==854== by 0xD423197: __snprintf_chk (in /usr/lib64/libc-2.17.so) >==854== by 0x9C206D4: namemap_cache_set_sid2name (in /usr/lib64/libsmbconf.so.0) >==854== by 0x13ACC7: wcache_save_sid_to_name.isra.19 (winbindd_cache.c:969) >==854== by 0x13D984: wb_cache_name_to_sid (winbindd_cache.c:1855) >==854== by 0x15F676: _wbint_LookupName (winbindd_dual_srv.c:139) >==854== by 0x1B695C: api_wbint_LookupName (srv_winbind.c:316) >==854== by 0x15F33A: winbindd_dual_ndrcmd (winbindd_dual_ndr.c:369) >==854== by 0x15BB8B: child_process_request (winbindd_dual.c:666) >==854== by 0x15BB8B: child_handler (winbindd_dual.c:1567) >==854== by 0xCEB383A: ??? (in /usr/lib64/libtevent.so.0.9.36) >==854== by 0xCEB1C06: ??? (in /usr/lib64/libtevent.so.0.9.36) >==854== >Finished processing child request 56 >Deregistering messaging pointer for type 33 - private_data=(nil) >Deregistering messaging pointer for type 13 - private_data=(nil) >Deregistering messaging pointer for type 1028 - private_data=(nil) >Deregistering messaging pointer for type 1027 - private_data=(nil) >Deregistering messaging pointer for type 1029 - private_data=(nil) >Deregistering messaging pointer for type 1280 - private_data=(nil) >Deregistering messaging pointer for type 1033 - private_data=(nil) >Deregistering messaging pointer for type 1 - private_data=(nil) >Deregistering messaging pointer for type 1036 - private_data=(nil) >Deregistering messaging pointer for type 1035 - private_data=(nil) >Registering messaging pointer for type 1028 - private_data=(nil) >Registering messaging pointer for type 1027 - private_data=(nil) >Registering messaging pointer for type 1280 - private_data=(nil) >Registering messaging pointer for type 1 - private_data=(nil) >Registering messaging pointer for type 1034 - private_data=(nil) >Overriding messaging pointer for type 1034 - private_data=(nil) >Registering messaging pointer for type 1038 - private_data=(nil) >Overriding messaging pointer for type 1038 - private_data=(nil) >child daemon request 56 >Successfully added idmap backend 'tdb' >Successfully added idmap backend 'passdb' >Successfully added idmap backend 'nss' >idmap backend tdb2 not found >load_module_absolute_path: Probing module '/usr/lib64/samba/idmap/tdb2.so' >load_module_absolute_path: Module '/usr/lib64/samba/idmap/tdb2.so' loaded >Successfully added idmap backend 'tdb2' >using idmap script 'echo XXXXXXXXXXXXXXX 1>&2' >pdb_default_uid_to_sid: host has no idea of uid 1000 >Finished processing child request 56 >child daemon request 56 >XXXXXXXXXXXXXXX IDTOSID UID 1000 >Finished processing child request 56 >Registering messaging pointer for type 1030 - private_data=(nil) >Overriding messaging pointer for type 1030 - private_data=(nil) >Registering messaging pointer for type 1031 - private_data=(nil) >Overriding messaging pointer for type 1031 - private_data=(nil) >Deregistering messaging pointer for type 1028 - private_data=(nil) >Deregistering messaging pointer for type 1027 - private_data=(nil) >Deregistering messaging pointer for type 1280 - private_data=(nil) >Deregistering messaging pointer for type 1 - private_data=(nil) >saf_fetch: Returning "SHARE1.PDC" for "SHARE" domain >get_dc_list: preferred server list: "SHARE1.PDC, *" >name SHARE#1C found. >sitename_fetch: No stored sitename for realm '' >name SHARE1.PDC#20 found. >get_dc_list: returning 2 ip addresses in an ordered list >get_dc_list: 131.130.1.117:0 131.130.4.117:0 >msg_try_to_go_online: received for domain SHARE. >msg_try_to_go_online: domain SHARE already online. >==861== >==861== HEAP SUMMARY: >==861== in use at exit: 149,983 bytes in 490 blocks >==861== total heap usage: 2,575 allocs, 2,085 frees, 614,600 bytes allocated >==861== >==861== LEAK SUMMARY: >==861== definitely lost: 21 bytes in 1 blocks >==861== indirectly lost: 0 bytes in 0 blocks >==861== possibly lost: 141,470 bytes in 440 blocks >==861== still reachable: 8,492 bytes in 49 blocks >==861== suppressed: 0 bytes in 0 blocks >==861== Rerun with --leak-check=full to see details of leaked memory >==861== >==861== For counts of detected and suppressed errors, rerun with: -v >==861== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) >Reloading services after SIGHUP >Reloading services after SIGHUP >Reloading services after SIGHUP >Reloading services after SIGHUP >lp_load_ex: refreshing parameters >Freeing parametrics: >Initialising global parameters >rlimit_max: increasing rlimit_max (270) to minimum Windows limit (16384) >INFO: Current debug levels: > all: 5 > tdb: 5 > printdrivers: 5 > lanman: 5 > smb: 5 > rpc_parse: 5 > rpc_srv: 5 > rpc_cli: 5 > passdb: 5 > sam: 5 > auth: 5 > winbind: 5 > vfs: 5 > idmap: 5 > quota: 5 > acls: 5 > locking: 5 > msdfs: 5 > dmapi: 5 > registry: 5 > scavenger: 5 > dns: 5 > ldb: 5 > tevent: 5 > auth_audit: 5 > auth_json_audit: 5 > kerberos: 5 > drs_repl: 5 > smb2: 5 > smb2_credits: 5 >Processing section "[global]" >doing parameter security = domain >doing parameter workgroup = share >doing parameter netbios name = share2 >doing parameter wins server = 131.130.1.111 >doing parameter client ipc signing = auto >doing parameter idmap config * : backend = tdb2 >doing parameter idmap config * : range = 200-20000000 >doing parameter idmap config * : script = echo XXXXXXXXXXXXXXX 1>&2 >lp_load_ex: refreshing parameters >doing parameter idmap config * : read only = yes >Freeing parametrics: >doing parameter log file = /tmp/samba >doing parameter lock directory = /tmp >Initialising global parameters >doing parameter private dir = /tmp >rlimit_max: increasing rlimit_max (270) to minimum Windows limit (16384) >doing parameter pid directory = /tmp >doing parameter cache directory = /tmp >doing parameter state directory = /tmp >pm_process() returned Yes >INFO: Current debug levels: > all: 5 > tdb: 5 > printdrivers: 5 > lanman: 5 > smb: 5 > rpc_parse: 5 > rpc_srv: 5 > rpc_cli: 5 > passdb: 5 > sam: 5 > auth: 5 > winbind: 5 > vfs: 5 > idmap: 5 > quota: 5 > acls: 5 > locking: 5 > msdfs: 5 > dmapi: 5 > registry: 5 > scavenger: 5 > dns: 5 > ldb: 5 > tevent: 5 > auth_audit: 5 > auth_json_audit: 5 > kerberos: 5 > drs_repl: 5 > smb2: 5 > smb2_credits: 5 >added interface eth0 ip=2001:62a:4:1:250:56ff:fea4:5f7b bcast= netmask=ffff:ffff:ffff:ffff:: >added interface eth0 ip=131.130.1.38 bcast=131.130.1.255 netmask=255.255.255.0 >Processing section "[global]" >doing parameter security = domain >doing parameter workgroup = share >doing parameter netbios name = share2 >doing parameter wins server = 131.130.1.111 >doing parameter client ipc signing = auto >doing parameter idmap config * : backend = tdb2 >doing parameter idmap config * : range = 200-20000000 >doing parameter idmap config * : script = echo XXXXXXXXXXXXXXX 1>&2 >doing parameter idmap config * : read only = yes >doing parameter log file = /tmp/samba >doing parameter lock directory = /tmp >doing parameter private dir = /tmp >doing parameter pid directory = /tmp >doing parameter cache directory = /tmp >doing parameter state directory = /tmp >pm_process() returned Yes >added interface eth0 ip=2001:62a:4:1:250:56ff:fea4:5f7b bcast= netmask=ffff:ffff:ffff:ffff:: >added interface eth0 ip=131.130.1.38 bcast=131.130.1.255 netmask=255.255.255.0 >lp_load_ex: refreshing parameters >Freeing parametrics: >Initialising global parameters >rlimit_max: increasing rlimit_max (270) to minimum Windows limit (16384) >lp_load_ex: refreshing parameters >Freeing parametrics: >INFO: Current debug levels: > all: 5 > tdb: 5 >Initialising global parameters > printdrivers: 5 > lanman: 5 > smb: 5 > rpc_parse: 5 > rpc_srv: 5 >rlimit_max: increasing rlimit_max (270) to minimum Windows limit (16384) > rpc_cli: 5 > passdb: 5 > sam: 5 > auth: 5 > winbind: 5 > vfs: 5 > idmap: 5 > quota: 5 > acls: 5 > locking: 5 > msdfs: 5 > dmapi: 5 > registry: 5 > scavenger: 5 > dns: 5 > ldb: 5 > tevent: 5 > auth_audit: 5 > auth_json_audit: 5 > kerberos: 5 > drs_repl: 5 > smb2: 5 > smb2_credits: 5 >INFO: Current debug levels: > all: 5 > tdb: 5 > printdrivers: 5 > lanman: 5 > smb: 5 > rpc_parse: 5 > rpc_srv: 5 > rpc_cli: 5 > passdb: 5 > sam: 5 >Processing section "[global]" > auth: 5 >doing parameter security = domain > winbind: 5 > vfs: 5 > idmap: 5 > quota: 5 > acls: 5 > locking: 5 > msdfs: 5 >doing parameter workgroup = share > dmapi: 5 > registry: 5 > scavenger: 5 > dns: 5 > ldb: 5 > tevent: 5 > auth_audit: 5 > auth_json_audit: 5 > kerberos: 5 > drs_repl: 5 >doing parameter netbios name = share2 > smb2: 5 > smb2_credits: 5 >doing parameter wins server = 131.130.1.111 >doing parameter client ipc signing = auto >Processing section "[global]" >doing parameter idmap config * : backend = tdb2 >doing parameter security = domain >doing parameter workgroup = share >doing parameter idmap config * : range = 200-20000000 >doing parameter netbios name = share2 >doing parameter idmap config * : script = echo XXXXXXXXXXXXXXX 1>&2 >doing parameter wins server = 131.130.1.111 >doing parameter idmap config * : read only = yes >doing parameter client ipc signing = auto >doing parameter idmap config * : backend = tdb2 >doing parameter log file = /tmp/samba >doing parameter idmap config * : range = 200-20000000 >doing parameter lock directory = /tmp >doing parameter private dir = /tmp >doing parameter idmap config * : script = echo XXXXXXXXXXXXXXX 1>&2 >doing parameter pid directory = /tmp >doing parameter cache directory = /tmp >doing parameter idmap config * : read only = yes >doing parameter state directory = /tmp >doing parameter log file = /tmp/samba >pm_process() returned Yes >doing parameter lock directory = /tmp >doing parameter private dir = /tmp >doing parameter pid directory = /tmp >doing parameter cache directory = /tmp >doing parameter state directory = /tmp >added interface eth0 ip=2001:62a:4:1:250:56ff:fea4:5f7b bcast= netmask=ffff:ffff:ffff:ffff:: >added interface eth0 ip=131.130.1.38 bcast=131.130.1.255 netmask=255.255.255.0 >pm_process() returned Yes >added interface eth0 ip=2001:62a:4:1:250:56ff:fea4:5f7b bcast= netmask=ffff:ffff:ffff:ffff:: >added interface eth0 ip=131.130.1.38 bcast=131.130.1.255 netmask=255.255.255.0 >[ 874]: request interface version (version = 30) >[ 874]: request location of privileged pipe >xids_to_sids >child daemon request 56 >pdb_default_uid_to_sid: host has no idea of uid 1000 >Finished processing child request 56 >child daemon request 56 >==855== Invalid read of size 1 >==855== at 0xD35AEF9: vfprintf (in /usr/lib64/libc-2.17.so) >==855== by 0xD423234: __vsnprintf_chk (in /usr/lib64/libc-2.17.so) >==855== by 0xC5AA3FD: ??? (in /usr/lib64/libtalloc.so.2.1.13) >==855== by 0xC5AAB58: talloc_vasprintf (in /usr/lib64/libtalloc.so.2.1.13) >==855== by 0xC5AAC06: talloc_asprintf (in /usr/lib64/libtalloc.so.2.1.13) >==855== by 0x1D53D396: idmap_tdb2_script (idmap_tdb2.c:272) >==855== by 0x1D53E6D4: idmap_tdb2_id_to_sid (idmap_tdb2.c:386) >==855== by 0x5AA0FC5: idmap_tdb_common_unixids_to_sids (idmap_tdb_common.c:331) >==855== by 0x5AA3444: idmap_backend_unixids_to_sids (idmap.c:626) >==855== by 0x15FA5B: _wbint_UnixIDs2Sids (winbindd_dual_srv.c:258) >==855== by 0x1B642E: api_wbint_UnixIDs2Sids (srv_winbind.c:472) >==855== by 0x15F33A: winbindd_dual_ndrcmd (winbindd_dual_ndr.c:369) >==855== Address 0x169cbae0 is 400 bytes inside a block of size 655 free'd >==855== at 0x4C2ACBD: free (vg_replace_malloc.c:530) >==855== by 0xC5A5D9E: ??? (in /usr/lib64/libtalloc.so.2.1.13) >==855== by 0x9BF6444: ??? (in /usr/lib64/libsmbconf.so.0) >==855== by 0x9BFCD36: ??? (in /usr/lib64/libsmbconf.so.0) >==855== by 0x9C00E61: ??? (in /usr/lib64/libsmbconf.so.0) >==855== by 0x9C011AE: ??? (in /usr/lib64/libsmbconf.so.0) >==855== by 0x9C01BA4: lp_load_global (in /usr/lib64/libsmbconf.so.0) >==855== by 0x131A97: reload_services_file (winbindd.c:119) >==855== by 0xCEB19C6: tevent_common_check_signal (in /usr/lib64/libtevent.so.0.9.36) >==855== by 0xCEB37BB: ??? (in /usr/lib64/libtevent.so.0.9.36) >==855== by 0xCEB1C06: ??? (in /usr/lib64/libtevent.so.0.9.36) >==855== by 0xCEADFFC: _tevent_loop_once (in /usr/lib64/libtevent.so.0.9.36) >==855== Block was alloc'd at >==855== at 0x4C29BC3: malloc (vg_replace_malloc.c:299) >==855== by 0xC5AA1BC: _talloc_pooled_object (in /usr/lib64/libtalloc.so.2.1.13) >==855== by 0x8F28F50: set_param_opt (loadparm.c:894) >==855== by 0x8F29055: lp_do_parameter_parametric (loadparm.c:1591) >==855== by 0x6CB259B: UnknownInlinedFun (tini.c:264) >==855== by 0x6CB259B: tini_parse (tini.c:309) >==855== by 0x6CB44FB: pm_process (params.c:99) >==855== by 0x9C01267: ??? (in /usr/lib64/libsmbconf.so.0) >==855== by 0x9C01BA4: lp_load_global (in /usr/lib64/libsmbconf.so.0) >==855== by 0x131A97: reload_services_file (winbindd.c:119) >==855== by 0x12E46C: main (winbindd.c:1659) >==855== >==855== Invalid read of size 1 >==855== at 0x4C30A08: __GI_mempcpy (vg_replace_strmem.c:1525) >==855== by 0xD38AE2B: _IO_default_xsputn (in /usr/lib64/libc-2.17.so) >==855== by 0xD35AEB2: vfprintf (in /usr/lib64/libc-2.17.so) >==855== by 0xD423234: __vsnprintf_chk (in /usr/lib64/libc-2.17.so) >==855== by 0xC5AA3FD: ??? (in /usr/lib64/libtalloc.so.2.1.13) >==855== by 0xC5AAB58: talloc_vasprintf (in /usr/lib64/libtalloc.so.2.1.13) >==855== by 0xC5AAC06: talloc_asprintf (in /usr/lib64/libtalloc.so.2.1.13) >==855== by 0x1D53D396: idmap_tdb2_script (idmap_tdb2.c:272) >==855== by 0x1D53E6D4: idmap_tdb2_id_to_sid (idmap_tdb2.c:386) >==855== by 0x5AA0FC5: idmap_tdb_common_unixids_to_sids (idmap_tdb_common.c:331) >==855== by 0x5AA3444: idmap_backend_unixids_to_sids (idmap.c:626) >==855== by 0x15FA5B: _wbint_UnixIDs2Sids (winbindd_dual_srv.c:258) >==855== Address 0x169cbaf8 is 424 bytes inside a block of size 655 free'd >==855== at 0x4C2ACBD: free (vg_replace_malloc.c:530) >==855== by 0xC5A5D9E: ??? (in /usr/lib64/libtalloc.so.2.1.13) >==855== by 0x9BF6444: ??? (in /usr/lib64/libsmbconf.so.0) >==855== by 0x9BFCD36: ??? (in /usr/lib64/libsmbconf.so.0) >==855== by 0x9C00E61: ??? (in /usr/lib64/libsmbconf.so.0) >==855== by 0x9C011AE: ??? (in /usr/lib64/libsmbconf.so.0) >==855== by 0x9C01BA4: lp_load_global (in /usr/lib64/libsmbconf.so.0) >==855== by 0x131A97: reload_services_file (winbindd.c:119) >==855== by 0xCEB19C6: tevent_common_check_signal (in /usr/lib64/libtevent.so.0.9.36) >==855== by 0xCEB37BB: ??? (in /usr/lib64/libtevent.so.0.9.36) >==855== by 0xCEB1C06: ??? (in /usr/lib64/libtevent.so.0.9.36) >==855== by 0xCEADFFC: _tevent_loop_once (in /usr/lib64/libtevent.so.0.9.36) >==855== Block was alloc'd at >==855== at 0x4C29BC3: malloc (vg_replace_malloc.c:299) >==855== by 0xC5AA1BC: _talloc_pooled_object (in /usr/lib64/libtalloc.so.2.1.13) >==855== by 0x8F28F50: set_param_opt (loadparm.c:894) >==855== by 0x8F29055: lp_do_parameter_parametric (loadparm.c:1591) >==855== by 0x6CB259B: UnknownInlinedFun (tini.c:264) >==855== by 0x6CB259B: tini_parse (tini.c:309) >==855== by 0x6CB44FB: pm_process (params.c:99) >==855== by 0x9C01267: ??? (in /usr/lib64/libsmbconf.so.0) >==855== by 0x9C01BA4: lp_load_global (in /usr/lib64/libsmbconf.so.0) >==855== by 0x131A97: reload_services_file (winbindd.c:119) >==855== by 0x12E46C: main (winbindd.c:1659) >==855== >==855== Invalid read of size 1 >==855== at 0x4C30A1A: __GI_mempcpy (vg_replace_strmem.c:1525) >==855== by 0xD38AE2B: _IO_default_xsputn (in /usr/lib64/libc-2.17.so) >==855== by 0xD35AEB2: vfprintf (in /usr/lib64/libc-2.17.so) >==855== by 0xD423234: __vsnprintf_chk (in /usr/lib64/libc-2.17.so) >==855== by 0xC5AA3FD: ??? (in /usr/lib64/libtalloc.so.2.1.13) >==855== by 0xC5AAB58: talloc_vasprintf (in /usr/lib64/libtalloc.so.2.1.13) >==855== by 0xC5AAC06: talloc_asprintf (in /usr/lib64/libtalloc.so.2.1.13) >==855== by 0x1D53D396: idmap_tdb2_script (idmap_tdb2.c:272) >==855== by 0x1D53E6D4: idmap_tdb2_id_to_sid (idmap_tdb2.c:386) >==855== by 0x5AA0FC5: idmap_tdb_common_unixids_to_sids (idmap_tdb_common.c:331) >==855== by 0x5AA3444: idmap_backend_unixids_to_sids (idmap.c:626) >==855== by 0x15FA5B: _wbint_UnixIDs2Sids (winbindd_dual_srv.c:258) >==855== Address 0x169cbaf6 is 422 bytes inside a block of size 655 free'd >==855== at 0x4C2ACBD: free (vg_replace_malloc.c:530) >==855== by 0xC5A5D9E: ??? (in /usr/lib64/libtalloc.so.2.1.13) >==855== by 0x9BF6444: ??? (in /usr/lib64/libsmbconf.so.0) >==855== by 0x9BFCD36: ??? (in /usr/lib64/libsmbconf.so.0) >==855== by 0x9C00E61: ??? (in /usr/lib64/libsmbconf.so.0) >==855== by 0x9C011AE: ??? (in /usr/lib64/libsmbconf.so.0) >==855== by 0x9C01BA4: lp_load_global (in /usr/lib64/libsmbconf.so.0) >==855== by 0x131A97: reload_services_file (winbindd.c:119) >==855== by 0xCEB19C6: tevent_common_check_signal (in /usr/lib64/libtevent.so.0.9.36) >==855== by 0xCEB37BB: ??? (in /usr/lib64/libtevent.so.0.9.36) >==855== by 0xCEB1C06: ??? (in /usr/lib64/libtevent.so.0.9.36) >==855== by 0xCEADFFC: _tevent_loop_once (in /usr/lib64/libtevent.so.0.9.36) >==855== Block was alloc'd at >==855== at 0x4C29BC3: malloc (vg_replace_malloc.c:299) >==855== by 0xC5AA1BC: _talloc_pooled_object (in /usr/lib64/libtalloc.so.2.1.13) >==855== by 0x8F28F50: set_param_opt (loadparm.c:894) >==855== by 0x8F29055: lp_do_parameter_parametric (loadparm.c:1591) >==855== by 0x6CB259B: UnknownInlinedFun (tini.c:264) >==855== by 0x6CB259B: tini_parse (tini.c:309) >==855== by 0x6CB44FB: pm_process (params.c:99) >==855== by 0x9C01267: ??? (in /usr/lib64/libsmbconf.so.0) >==855== by 0x9C01BA4: lp_load_global (in /usr/lib64/libsmbconf.so.0) >==855== by 0x131A97: reload_services_file (winbindd.c:119) >==855== by 0x12E46C: main (winbindd.c:1659) >==855== >XXXXXXXXXXXXXXX IDTOSID UID 1000 >Finished processing child request 56 >Got sig[15] terminate (is_parent=0) >Got sig[15] terminate (is_parent=0) >Got sig[15] terminate (is_parent=0) >Got sig[15] terminate (is_parent=1) >==854== >==854== HEAP SUMMARY: >==854== in use at exit: 168,096 bytes in 628 blocks >==854== total heap usage: 3,120 allocs, 2,492 frees, 769,493 bytes allocated >==854== >==854== LEAK SUMMARY: >==854== definitely lost: 21 bytes in 1 blocks >==854== indirectly lost: 0 bytes in 0 blocks >==854== possibly lost: 161,548 bytes in 583 blocks >==854== still reachable: 6,527 bytes in 44 blocks >==854== suppressed: 0 bytes in 0 blocks >==854== Rerun with --leak-check=full to see details of leaked memory >==854== >==854== For counts of detected and suppressed errors, rerun with: -v >==854== Use --track-origins=yes to see where uninitialised values come from >==854== ERROR SUMMARY: 1 errors from 1 contexts (suppressed: 0 from 0) >==32241== >==32241== HEAP SUMMARY: >==32241== in use at exit: 123,031 bytes in 407 blocks >==32241== total heap usage: 2,312 allocs, 1,905 frees, 717,203 bytes allocated >==32241== >==855== >==855== HEAP SUMMARY: >==855== in use at exit: 143,050 bytes in 451 blocks >==855== total heap usage: 2,773 allocs, 2,322 frees, 691,104 bytes allocated >==855== >==32241== LEAK SUMMARY: >==32241== definitely lost: 39 bytes in 2 blocks >==32241== indirectly lost: 0 bytes in 0 blocks >==32241== possibly lost: 116,393 bytes in 359 blocks >==32241== still reachable: 6,599 bytes in 46 blocks >==32241== suppressed: 0 bytes in 0 blocks >==32241== Rerun with --leak-check=full to see details of leaked memory >==32241== >==32241== For counts of detected and suppressed errors, rerun with: -v >==32241== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0) >==814== >==814== HEAP SUMMARY: >==814== in use at exit: 167,887 bytes in 596 blocks >==814== total heap usage: 7,393 allocs, 6,797 frees, 2,651,405 bytes allocated >==814== >==855== LEAK SUMMARY: >==855== definitely lost: 21 bytes in 1 blocks >==855== indirectly lost: 0 bytes in 0 blocks >==855== possibly lost: 134,973 bytes in 404 blocks >==855== still reachable: 8,056 bytes in 46 blocks >==855== suppressed: 0 bytes in 0 blocks >==855== Rerun with --leak-check=full to see details of leaked memory >==855== >==855== For counts of detected and suppressed errors, rerun with: -v >==855== ERROR SUMMARY: 51 errors from 3 contexts (suppressed: 0 from 0) >==814== LEAK SUMMARY: >==814== definitely lost: 21 bytes in 1 blocks >==814== indirectly lost: 0 bytes in 0 blocks >==814== possibly lost: 149,149 bytes in 515 blocks >==814== still reachable: 18,717 bytes in 80 blocks >==814== suppressed: 0 bytes in 0 blocks >==814== Rerun with --leak-check=full to see details of leaked memory >==814== >==814== For counts of detected and suppressed errors, rerun with: -v >==814== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 0 from 0)
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 13956
: 15179 |
15187
|
15196