The Samba-Bugzilla – Attachment 3499 Details for
Bug 5698
Unable to initiate share with userid, get *** glibc detected *** /usr/sbin/smbd: free(): invalid pointer: 0xb7fcb540 ***
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
valgrind output. from 3.2.2 build, with -g. core file available.
valgrind-log (text/plain), 5.59 KB, created by
Douglas Wegscheid
on 2008-08-21 09:11:45 UTC
(
hide
)
Description:
valgrind output. from 3.2.2 build, with -g. core file available.
Filename:
MIME Type:
Creator:
Douglas Wegscheid
Created:
2008-08-21 09:11:45 UTC
Size:
5.59 KB
patch
obsolete
>==13586== Memcheck, a memory error detector. >==13586== Copyright (C) 2002-2007, and GNU GPL'd, by Julian Seward et al. >==13586== Using LibVEX rev 1804, a library for dynamic binary translation. >==13586== Copyright (C) 2004-2007, and GNU GPL'd, by OpenWorks LLP. >==13586== Using valgrind-3.3.0, a dynamic binary instrumentation framework. >==13586== Copyright (C) 2000-2007, and GNU GPL'd, by Julian Seward et al. >==13586== For more details, rerun with: -v >==13586== >==13586== My PID = 13586, parent PID = 26605. Prog and args are: >==13586== bin/smbd >==13586== -p >==13586== 10139 >==13586== -d >==13586== 10 >==13586== -i >==13586== --lockdir=. >==13586== --piddir=. >==13586== >==13586== Invalid free() / delete / delete[] >==13586== at 0x4823B7A: free (in /usr/lib/valgrind/x86-linux/vgpreload_memcheck.so) >==13586== by 0x32B105: str_list_substitute (util_str.c:2039) >==13586== by 0x90EDC: user_ok (password.c:606) >==13586== by 0x914F5: authorise_login (password.c:780) >==13586== by 0x11D481: make_connection_snum (service.c:752) >==13586== by 0x120281: make_connection (service.c:1378) >==13586== by 0xB6CCE: reply_tcon_and_X (reply.c:655) >==13586== by 0x1196D2: switch_message (process.c:1462) >==13586== by 0x119795: construct_reply (process.c:1485) >==13586== by 0x119BCB: process_smb (process.c:1561) >==13586== by 0x11ABF6: smbd_process (process.c:2053) >==13586== by 0x63D6B6: main (server.c:1451) >==13586== Address 0x502b240 is 3,296 bytes inside a block of size 8,256 alloc'd >==13586== at 0x4824D5E: malloc (in /usr/lib/valgrind/x86-linux/vgpreload_memcheck.so) >==13586== by 0x2F49C6: __talloc (talloc.c:322) >==13586== by 0x2F48DD: talloc_pool (talloc.c:360) >==13586== by 0x2FB880: talloc_stackframe_internal (talloc_stack.c:89) >==13586== by 0x2FB923: talloc_stackframe_pool (talloc_stack.c:115) >==13586== by 0x11AA49: smbd_process (process.c:2003) >==13586== by 0x63D6B6: main (server.c:1451) >==13586== >==13586== Invalid read of size 4 >==13586== at 0x2F4771: talloc_chunk_from_ptr (talloc.c:156) >==13586== by 0x2F51DB: _talloc_free (talloc.c:485) >==13586== by 0x2F59D5: talloc_free (talloc.c:923) >==13586== by 0x32AF04: str_list_sub_basic (util_str.c:1994) >==13586== by 0x90F06: user_ok (password.c:612) >==13586== by 0x914F5: authorise_login (password.c:780) >==13586== by 0x11D481: make_connection_snum (service.c:752) >==13586== by 0x120281: make_connection (service.c:1378) >==13586== by 0xB6CCE: reply_tcon_and_X (reply.c:655) >==13586== by 0x1196D2: switch_message (process.c:1462) >==13586== by 0x119795: construct_reply (process.c:1485) >==13586== by 0x119BCB: process_smb (process.c:1561) >==13586== Address 0x503c1b8 is 16 bytes before a block of size 7 alloc'd >==13586== at 0x4824D5E: malloc (in /usr/lib/valgrind/x86-linux/vgpreload_memcheck.so) >==13586== by 0x32AFEF: str_list_substitute (util_str.c:2031) >==13586== by 0x90EDC: user_ok (password.c:606) >==13586== by 0x914F5: authorise_login (password.c:780) >==13586== by 0x11D481: make_connection_snum (service.c:752) >==13586== by 0x120281: make_connection (service.c:1378) >==13586== by 0xB6CCE: reply_tcon_and_X (reply.c:655) >==13586== by 0x1196D2: switch_message (process.c:1462) >==13586== by 0x119795: construct_reply (process.c:1485) >==13586== by 0x119BCB: process_smb (process.c:1561) >==13586== by 0x11ABF6: smbd_process (process.c:2053) >==13586== by 0x63D6B6: main (server.c:1451) >==13586== >==13586== Invalid read of size 4 >==13586== at 0x2F4789: talloc_chunk_from_ptr (talloc.c:157) >==13586== by 0x2F51DB: _talloc_free (talloc.c:485) >==13586== by 0x2F59D5: talloc_free (talloc.c:923) >==13586== by 0x32AF04: str_list_sub_basic (util_str.c:1994) >==13586== by 0x90F06: user_ok (password.c:612) >==13586== by 0x914F5: authorise_login (password.c:780) >==13586== by 0x11D481: make_connection_snum (service.c:752) >==13586== by 0x120281: make_connection (service.c:1378) >==13586== by 0xB6CCE: reply_tcon_and_X (reply.c:655) >==13586== by 0x1196D2: switch_message (process.c:1462) >==13586== by 0x119795: construct_reply (process.c:1485) >==13586== by 0x119BCB: process_smb (process.c:1561) >==13586== Address 0x503c1b8 is 16 bytes before a block of size 7 alloc'd >==13586== at 0x4824D5E: malloc (in /usr/lib/valgrind/x86-linux/vgpreload_memcheck.so) >==13586== by 0x32AFEF: str_list_substitute (util_str.c:2031) >==13586== by 0x90EDC: user_ok (password.c:606) >==13586== by 0x914F5: authorise_login (password.c:780) >==13586== by 0x11D481: make_connection_snum (service.c:752) >==13586== by 0x120281: make_connection (service.c:1378) >==13586== by 0xB6CCE: reply_tcon_and_X (reply.c:655) >==13586== by 0x1196D2: switch_message (process.c:1462) >==13586== by 0x119795: construct_reply (process.c:1485) >==13586== by 0x119BCB: process_smb (process.c:1561) >==13586== by 0x11ABF6: smbd_process (process.c:2053) >==13586== by 0x63D6B6: main (server.c:1451) >==13586== >==13586== ERROR SUMMARY: 4 errors from 3 contexts (suppressed: 29 from 2) >==13586== malloc/free: in use at exit: 406,984 bytes in 2,703 blocks. >==13586== malloc/free: 26,804 allocs, 24,103 frees, 2,153,692 bytes allocated. >==13586== For counts of detected errors, rerun with: -v >==13586== searching for pointers to 2,703 not-freed blocks. >==13586== checked 811,748 bytes. >==13586== >==13586== LEAK SUMMARY: >==13586== definitely lost: 1,219 bytes in 23 blocks. >==13586== possibly lost: 0 bytes in 0 blocks. >==13586== still reachable: 405,765 bytes in 2,680 blocks. >==13586== suppressed: 0 bytes in 0 blocks. >==13586== Rerun with --leak-check=full to see details of leaked memory.
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 5698
:
3486
|
3492
|
3493
| 3499 |
3501