==23626== Memcheck, a memory error detector. ==23626== Copyright (C) 2002-2006, and GNU GPL'd, by Julian Seward et al. ==23626== Using LibVEX rev 1658, a library for dynamic binary translation. ==23626== Copyright (C) 2004-2006, and GNU GPL'd, by OpenWorks LLP. ==23626== Using valgrind-3.2.1, a dynamic binary instrumentation framework. ==23626== Copyright (C) 2000-2006, and GNU GPL'd, by Julian Seward et al. ==23626== For more details, rerun with: -v ==23626== ==23626== My PID = 23626, parent PID = 30112. Prog and args are: ==23626== winbindd ==23626== -d ==23626== 10 ==23626== --log-basename=. ==23626== ==23626== ==23626== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 4 from 1) ==23626== malloc/free: in use at exit: 426,663 bytes in 488 blocks. ==23626== malloc/free: 2,256 allocs, 1,768 frees, 562,184 bytes allocated. ==23626== For counts of detected errors, rerun with: -v ==23626== searching for pointers to 488 not-freed blocks. ==23626== checked 962,688 bytes. ==23626== ==23626== LEAK SUMMARY: ==23626== definitely lost: 85 bytes in 4 blocks. ==23626== possibly lost: 104 bytes in 1 blocks. ==23626== still reachable: 426,474 bytes in 483 blocks. ==23626== suppressed: 0 bytes in 0 blocks. ==23626== Use --leak-check=full to see details of leaked memory. ==23627== Conditional jump or move depends on uninitialised value(s) ==23627== at 0x15FF28: timeval_min (time.c:541) ==23627== by 0x1AA791: event_add_to_select_args (events.c:78) ==23627== by 0x957B3: process_loop (winbindd.c:1053) ==23627== by 0x96850: main (winbindd.c:1426) ==23627== ==23627== Conditional jump or move depends on uninitialised value(s) ==23627== at 0x15FF50: timeval_min (time.c:542) ==23627== by 0x1AA791: event_add_to_select_args (events.c:78) ==23627== by 0x957B3: process_loop (winbindd.c:1053) ==23627== by 0x96850: main (winbindd.c:1426) ==23627== ==23627== Conditional jump or move depends on uninitialised value(s) ==23627== at 0x15FF7A: timeval_min (time.c:543) ==23627== by 0x1AA791: event_add_to_select_args (events.c:78) ==23627== by 0x957B3: process_loop (winbindd.c:1053) ==23627== by 0x96850: main (winbindd.c:1426) ==23628== Conditional jump or move depends on uninitialised value(s) ==23628== at 0x15FF28: timeval_min (time.c:541) ==23628== by 0x1AA791: event_add_to_select_args (events.c:78) ==23628== by 0xDBF5F: fork_domain_child (winbindd_dual.c:1409) ==23628== by 0xD8258: schedule_async_request (winbindd_dual.c:314) ==23628== by 0xD79ED: async_request (winbindd_dual.c:145) ==23628== by 0xA290A: init_child_connection (winbindd_util.c:627) ==23628== by 0xD8445: async_domain_request (winbindd_dual.c:378) ==23628== by 0xA1B5A: add_trusted_domains (winbindd_util.c:291) ==23628== by 0xA25EB: rescan_trusted_domains (winbindd_util.c:565) ==23628== by 0x96810: main (winbindd.c:1411) ==23628== ==23628== Conditional jump or move depends on uninitialised value(s) ==23628== at 0x15FF50: timeval_min (time.c:542) ==23628== by 0x1AA791: event_add_to_select_args (events.c:78) ==23628== by 0xDBF5F: fork_domain_child (winbindd_dual.c:1409) ==23628== by 0xD8258: schedule_async_request (winbindd_dual.c:314) ==23628== by 0xD79ED: async_request (winbindd_dual.c:145) ==23628== by 0xA290A: init_child_connection (winbindd_util.c:627) ==23628== by 0xD8445: async_domain_request (winbindd_dual.c:378) ==23628== by 0xA1B5A: add_trusted_domains (winbindd_util.c:291) ==23628== by 0xA25EB: rescan_trusted_domains (winbindd_util.c:565) ==23628== by 0x96810: main (winbindd.c:1411) ==23628== ==23628== Invalid read of size 8 ==23628== at 0x33124E5C79: __strcpy_chk (in /lib64/libc-2.5.so) ==23628== by 0x331D25973D: krb5_get_init_creds_password (in /usr/lib64/libkrb5.so.3.3) ==23628== by 0x604C6A: kerberos_kinit_password_ext (kerberos.c:222) ==23628== by 0x605DC1: kerberos_kinit_password (kerberos.c:648) ==23628== by 0x1CC24B: cli_session_setup_spnego (cliconnect.c:992) ==23628== by 0xC5527: cm_prepare_connection (winbindd_cm.c:855) ==23628== by 0xC78A9: cm_open_connection (winbindd_cm.c:1502) ==23628== by 0xC7E49: init_dc_connection_network (winbindd_cm.c:1636) ==23628== by 0xC7EB8: init_dc_connection (winbindd_cm.c:1652) ==23628== by 0xA2EF4: winbindd_dual_init_connection (winbindd_util.c:720) ==23628== by 0xD8784: child_process_request (winbindd_dual.c:453) ==23628== by 0xDC34D: fork_domain_child (winbindd_dual.c:1456) ==23628== Address 0x8E1A618 is 8 bytes inside a block of size 15 alloc'd ==23628== at 0x4A05809: malloc (vg_replace_malloc.c:149) ==23628== by 0x16494A: memdup (util.c:478) ==23628== by 0x2201DF: secrets_fetch (secrets.c:126) ==23628== by 0x221EF2: secrets_fetch_machine_password (secrets.c:824) ==23628== by 0xF3EF6: get_trust_pw_clear (passdb.c:2307) ==23628== by 0xC4CEF: get_trust_creds (winbindd_cm.c:712) ==23628== by 0xC53FC: cm_prepare_connection (winbindd_cm.c:837) ==23628== by 0xC78A9: cm_open_connection (winbindd_cm.c:1502) ==23628== by 0xC7E49: init_dc_connection_network (winbindd_cm.c:1636) ==23628== by 0xC7EB8: init_dc_connection (winbindd_cm.c:1652) ==23628== by 0xA2EF4: winbindd_dual_init_connection (winbindd_util.c:720) ==23628== by 0xD8784: child_process_request (winbindd_dual.c:453) ==23627== ==23627== Invalid read of size 8 ==23627== at 0x33124E5C79: __strcpy_chk (in /lib64/libc-2.5.so) ==23627== by 0x331D25973D: krb5_get_init_creds_password (in /usr/lib64/libkrb5.so.3.3) ==23627== by 0x604C6A: kerberos_kinit_password_ext (kerberos.c:222) ==23627== by 0x605DC1: kerberos_kinit_password (kerberos.c:648) ==23627== by 0x1CC24B: cli_session_setup_spnego (cliconnect.c:992) ==23627== by 0xC5527: cm_prepare_connection (winbindd_cm.c:855) ==23627== by 0xC78A9: cm_open_connection (winbindd_cm.c:1502) ==23627== by 0xC7E49: init_dc_connection_network (winbindd_cm.c:1636) ==23627== by 0xC7EB8: init_dc_connection (winbindd_cm.c:1652) ==23627== by 0xA548D: get_cache (winbindd_cache.c:144) ==23627== by 0xA8A78: resolve_alias_to_username (winbindd_cache.c:1094) ==23627== by 0xA481F: normalize_name_unmap (winbindd_util.c:1498) ==23627== Address 0x8E1B9D8 is 8 bytes inside a block of size 15 alloc'd ==23627== at 0x4A05809: malloc (vg_replace_malloc.c:149) ==23627== by 0x16494A: memdup (util.c:478) ==23627== by 0x2201DF: secrets_fetch (secrets.c:126) ==23627== by 0x221EF2: secrets_fetch_machine_password (secrets.c:824) ==23627== by 0xF3EF6: get_trust_pw_clear (passdb.c:2307) ==23627== by 0xC4CEF: get_trust_creds (winbindd_cm.c:712) ==23627== by 0xC53FC: cm_prepare_connection (winbindd_cm.c:837) ==23627== by 0xC78A9: cm_open_connection (winbindd_cm.c:1502) ==23627== by 0xC7E49: init_dc_connection_network (winbindd_cm.c:1636) ==23627== by 0xC7EB8: init_dc_connection (winbindd_cm.c:1652) ==23627== by 0xA548D: get_cache (winbindd_cache.c:144) ==23627== by 0xA8A78: resolve_alias_to_username (winbindd_cache.c:1094) ==23627== ==23627== Invalid read of size 8 ==23627== at 0x33124E5C79: __strcpy_chk (in /lib64/libc-2.5.so) ==23627== by 0x331D25973D: krb5_get_init_creds_password (in /usr/lib64/libkrb5.so.3.3) ==23627== by 0x604C6A: kerberos_kinit_password_ext (kerberos.c:222) ==23627== by 0x604F37: ads_kinit_password (kerberos.c:326) ==23627== by 0x5F5776: ads_sasl_spnego_bind (sasl.c:812) ==23627== by 0x5F67FD: ads_sasl_bind (sasl.c:1113) ==23627== by 0x5E8C29: ads_connect (ldap.c:711) ==23627== by 0xCFD03: ads_cached_connection (winbindd_ads.c:124) ==23627== by 0xD47DD: sequence_number (winbindd_ads.c:1250) ==23627== by 0xA68A1: refresh_sequence_number (winbindd_cache.c:510) ==23627== by 0xA706F: wcache_fetch (winbindd_cache.c:638) ==23627== by 0xA8AF5: resolve_alias_to_username (winbindd_cache.c:1109) ==23627== Address 0x9001248 is 8 bytes inside a block of size 15 alloc'd ==23627== at 0x4A05809: malloc (vg_replace_malloc.c:149) ==23627== by 0x16494A: memdup (util.c:478) ==23627== by 0x2201DF: secrets_fetch (secrets.c:126) ==23627== by 0x221EF2: secrets_fetch_machine_password (secrets.c:824) ==23627== by 0xCFC5E: ads_cached_connection (winbindd_ads.c:100) ==23627== by 0xD47DD: sequence_number (winbindd_ads.c:1250) ==23627== by 0xA68A1: refresh_sequence_number (winbindd_cache.c:510) ==23627== by 0xA706F: wcache_fetch (winbindd_cache.c:638) ==23627== by 0xA8AF5: resolve_alias_to_username (winbindd_cache.c:1109) ==23627== by 0xA481F: normalize_name_unmap (winbindd_util.c:1498) ==23627== by 0x9813E: winbindd_getpwnam (winbindd_user.c:440) ==23627== by 0x93EF7: process_request (winbindd.c:538) ==23653== ==23653== Conditional jump or move depends on uninitialised value(s) ==23653== at 0x15FF28: timeval_min (time.c:541) ==23653== by 0x1AA791: event_add_to_select_args (events.c:78) ==23653== by 0xDBF5F: fork_domain_child (winbindd_dual.c:1409) ==23653== by 0xD8258: schedule_async_request (winbindd_dual.c:314) ==23653== by 0xD79ED: async_request (winbindd_dual.c:145) ==23653== by 0xDC69B: do_async (winbindd_async.c:83) ==23653== by 0xE685C: winbindd_uid2sid_async (winbindd_idmap.c:428) ==23653== by 0xBFB69: winbindd_uid_to_sid (winbindd_sid.c:553) ==23653== by 0x93EF7: process_request (winbindd.c:538) ==23653== by 0x94EA9: request_recv (winbindd.c:811) ==23653== by 0x94C54: request_main_recv (winbindd.c:772) ==23653== by 0x94491: rw_callback (winbindd.c:621) ==23628== ==23628== Invalid read of size 8 ==23628== at 0x33124E5C79: __strcpy_chk (in /lib64/libc-2.5.so) ==23628== by 0x331D25973D: krb5_get_init_creds_password (in /usr/lib64/libkrb5.so.3.3) ==23628== by 0x604C6A: kerberos_kinit_password_ext (kerberos.c:222) ==23628== by 0x604F37: ads_kinit_password (kerberos.c:326) ==23628== by 0x5F5776: ads_sasl_spnego_bind (sasl.c:812) ==23628== by 0x5F67FD: ads_sasl_bind (sasl.c:1113) ==23628== by 0x5E8C29: ads_connect (ldap.c:711) ==23628== by 0x95966D1: _idmap_adex_init (idmap_adex.c:90) ==23628== by 0x9597137: _nss_adex_init (idmap_adex.c:309) ==23628== by 0x61E485: nss_domain_list_add_domain (nss_info.c:148) ==23628== by 0x61E990: nss_init (nss_info.c:228) ==23628== by 0x61EACC: find_nss_domain (nss_info.c:260) ==23628== Address 0x9278C50 is 8 bytes inside a block of size 15 alloc'd ==23628== at 0x4A05809: malloc (vg_replace_malloc.c:149) ==23628== by 0x16494A: memdup (util.c:478) ==23628== by 0x2201DF: secrets_fetch (secrets.c:126) ==23628== by 0x221EF2: secrets_fetch_machine_password (secrets.c:824) ==23628== by 0x959667F: _idmap_adex_init (idmap_adex.c:81) ==23628== by 0x9597137: _nss_adex_init (idmap_adex.c:309) ==23628== by 0x61E485: nss_domain_list_add_domain (nss_info.c:148) ==23628== by 0x61E990: nss_init (nss_info.c:228) ==23628== by 0x61EACC: find_nss_domain (nss_info.c:260) ==23628== by 0x61ED14: nss_get_info (nss_info.c:314) ==23628== by 0xB3EBE: nss_get_info_cached (winbindd_cache.c:4230) ==23628== by 0xD15A6: query_user (winbindd_ads.c:487) ==23657== ==23657== ERROR SUMMARY: 59 errors from 6 contexts (suppressed: 49 from 1) ==23657== malloc/free: in use at exit: 891,874 bytes in 977 blocks. ==23657== malloc/free: 40,539 allocs, 39,562 frees, 5,880,752 bytes allocated. ==23657== For counts of detected errors, rerun with: -v ==23657== searching for pointers to 977 not-freed blocks. ==23653== ==23653== Invalid read of size 4 ==23653== at 0x4C26961: talloc_chunk_from_ptr (talloc.c:172) ==23653== by 0x4C27586: _talloc_free (talloc.c:501) ==23653== by 0x4C281D1: talloc_free (talloc.c:974) ==23653== by 0x959B6DB: check_result_unique_scoped (provider_unified.c:442) ==23653== by 0x959BB10: search_forest (provider_unified.c:518) ==23653== by 0x959BEE4: search_cell_list (provider_unified.c:564) ==23653== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) ==23653== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) ==23653== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) ==23653== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) ==23653== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) ==23653== by 0xD8784: child_process_request (winbindd_dual.c:453) ==23653== Address 0x9F470B0 is 64 bytes inside a block of size 256 free'd ==23653== at 0x4A0541E: free (vg_replace_malloc.c:233) ==23653== by 0x4C2792B: _talloc_free (talloc.c:593) ==23653== by 0x4C27831: _talloc_free (talloc.c:562) ==23653== by 0x4C281D1: talloc_free (talloc.c:974) ==23653== by 0x959B6D2: check_result_unique_scoped (provider_unified.c:441) ==23653== by 0x959BB10: search_forest (provider_unified.c:518) ==23653== by 0x959BEE4: search_cell_list (provider_unified.c:564) ==23653== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) ==23653== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) ==23653== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) ==23653== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) ==23653== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) ==23653== ==23653== Invalid read of size 4 ==23653== at 0x4C2697B: talloc_chunk_from_ptr (talloc.c:173) ==23653== by 0x4C27586: _talloc_free (talloc.c:501) ==23653== by 0x4C281D1: talloc_free (talloc.c:974) ==23653== by 0x959B6DB: check_result_unique_scoped (provider_unified.c:442) ==23653== by 0x959BB10: search_forest (provider_unified.c:518) ==23653== by 0x959BEE4: search_cell_list (provider_unified.c:564) ==23653== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) ==23653== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) ==23653== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) ==23653== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) ==23653== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) ==23653== by 0xD8784: child_process_request (winbindd_dual.c:453) ==23653== Address 0x9F470B0 is 64 bytes inside a block of size 256 free'd ==23653== at 0x4A0541E: free (vg_replace_malloc.c:233) ==23653== by 0x4C2792B: _talloc_free (talloc.c:593) ==23653== by 0x4C27831: _talloc_free (talloc.c:562) ==23653== by 0x4C281D1: talloc_free (talloc.c:974) ==23653== by 0x959B6D2: check_result_unique_scoped (provider_unified.c:441) ==23653== by 0x959BB10: search_forest (provider_unified.c:518) ==23653== by 0x959BEE4: search_cell_list (provider_unified.c:564) ==23653== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) ==23653== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) ==23653== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) ==23653== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) ==23653== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) ==23657== checked 1,634,760 bytes. ==23657== ==23657== LEAK SUMMARY: ==23657== definitely lost: 374 bytes in 13 blocks. ==23657== possibly lost: 104 bytes in 1 blocks. ==23657== still reachable: 891,396 bytes in 963 blocks. ==23657== suppressed: 0 bytes in 0 blocks. ==23657== Use --leak-check=full to see details of leaked memory. ==23705== ==23705== Conditional jump or move depends on uninitialised value(s) ==23705== at 0x15FF28: timeval_min (time.c:541) ==23705== by 0x1AA791: event_add_to_select_args (events.c:78) ==23705== by 0xDBF5F: fork_domain_child (winbindd_dual.c:1409) ==23705== by 0xD8258: schedule_async_request (winbindd_dual.c:314) ==23705== by 0xD8AF0: winbind_child_died (winbindd_dual.c:520) ==23705== by 0xD7D4B: async_request_fail (winbindd_dual.c:214) ==23705== by 0xD8043: async_reply_recv (winbindd_dual.c:272) ==23705== by 0xD7C0C: async_request_timeout_handler (winbindd_dual.c:189) ==23705== by 0x1AA925: run_events (events.c:107) ==23705== by 0x95A3B: process_loop (winbindd.c:1111) ==23705== by 0x96850: main (winbindd.c:1426) ==23705== ==23705== Invalid read of size 4 ==23705== at 0x4C26961: talloc_chunk_from_ptr (talloc.c:172) ==23705== by 0x4C27586: _talloc_free (talloc.c:501) ==23705== by 0x4C281D1: talloc_free (talloc.c:974) ==23705== by 0x959B6DB: check_result_unique_scoped (provider_unified.c:442) ==23705== by 0x959BB10: search_forest (provider_unified.c:518) ==23705== by 0x959BEE4: search_cell_list (provider_unified.c:564) ==23705== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) ==23705== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) ==23705== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) ==23705== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) ==23705== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) ==23705== by 0xD8784: child_process_request (winbindd_dual.c:453) ==23705== Address 0x914DE28 is 64 bytes inside a block of size 256 free'd ==23705== at 0x4A0541E: free (vg_replace_malloc.c:233) ==23705== by 0x4C2792B: _talloc_free (talloc.c:593) ==23705== by 0x4C27831: _talloc_free (talloc.c:562) ==23705== by 0x4C281D1: talloc_free (talloc.c:974) ==23705== by 0x959B6D2: check_result_unique_scoped (provider_unified.c:441) ==23705== by 0x959BB10: search_forest (provider_unified.c:518) ==23705== by 0x959BEE4: search_cell_list (provider_unified.c:564) ==23705== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) ==23705== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) ==23705== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) ==23705== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) ==23705== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) ==23705== ==23705== Invalid read of size 4 ==23705== at 0x4C2697B: talloc_chunk_from_ptr (talloc.c:173) ==23705== by 0x4C27586: _talloc_free (talloc.c:501) ==23705== by 0x4C281D1: talloc_free (talloc.c:974) ==23705== by 0x959B6DB: check_result_unique_scoped (provider_unified.c:442) ==23705== by 0x959BB10: search_forest (provider_unified.c:518) ==23705== by 0x959BEE4: search_cell_list (provider_unified.c:564) ==23705== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) ==23705== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) ==23705== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) ==23705== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) ==23705== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) ==23705== by 0xD8784: child_process_request (winbindd_dual.c:453) ==23705== Address 0x914DE28 is 64 bytes inside a block of size 256 free'd ==23705== at 0x4A0541E: free (vg_replace_malloc.c:233) ==23705== by 0x4C2792B: _talloc_free (talloc.c:593) ==23705== by 0x4C27831: _talloc_free (talloc.c:562) ==23705== by 0x4C281D1: talloc_free (talloc.c:974) ==23705== by 0x959B6D2: check_result_unique_scoped (provider_unified.c:441) ==23705== by 0x959BB10: search_forest (provider_unified.c:518) ==23705== by 0x959BEE4: search_cell_list (provider_unified.c:564) ==23705== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) ==23705== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) ==23705== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) ==23705== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) ==23705== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) ==23628== Warning: invalid file descriptor -1 in syscall close() ==23738== ==23738== Conditional jump or move depends on uninitialised value(s) ==23738== at 0x15FF28: timeval_min (time.c:541) ==23738== by 0x1AA791: event_add_to_select_args (events.c:78) ==23738== by 0xDBF5F: fork_domain_child (winbindd_dual.c:1409) ==23738== by 0xD8258: schedule_async_request (winbindd_dual.c:314) ==23738== by 0xD8AF0: winbind_child_died (winbindd_dual.c:520) ==23738== by 0xD7D4B: async_request_fail (winbindd_dual.c:214) ==23738== by 0xD8043: async_reply_recv (winbindd_dual.c:272) ==23738== by 0xD7C0C: async_request_timeout_handler (winbindd_dual.c:189) ==23738== by 0x1AA925: run_events (events.c:107) ==23738== by 0x95A3B: process_loop (winbindd.c:1111) ==23738== by 0x96850: main (winbindd.c:1426) ==23738== ==23738== Conditional jump or move depends on uninitialised value(s) ==23738== at 0x15FF50: timeval_min (time.c:542) ==23738== by 0x1AA791: event_add_to_select_args (events.c:78) ==23738== by 0xDBF5F: fork_domain_child (winbindd_dual.c:1409) ==23738== by 0xD8258: schedule_async_request (winbindd_dual.c:314) ==23738== by 0xD8AF0: winbind_child_died (winbindd_dual.c:520) ==23738== by 0xD7D4B: async_request_fail (winbindd_dual.c:214) ==23738== by 0xD8043: async_reply_recv (winbindd_dual.c:272) ==23738== by 0xD7C0C: async_request_timeout_handler (winbindd_dual.c:189) ==23738== by 0x1AA925: run_events (events.c:107) ==23738== by 0x95A3B: process_loop (winbindd.c:1111) ==23738== by 0x96850: main (winbindd.c:1426) ==23738== ==23738== Invalid read of size 4 ==23738== at 0x4C26961: talloc_chunk_from_ptr (talloc.c:172) ==23738== by 0x4C27586: _talloc_free (talloc.c:501) ==23738== by 0x4C281D1: talloc_free (talloc.c:974) ==23738== by 0x959B6DB: check_result_unique_scoped (provider_unified.c:442) ==23738== by 0x959BB10: search_forest (provider_unified.c:518) ==23738== by 0x959BEE4: search_cell_list (provider_unified.c:564) ==23738== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) ==23738== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) ==23738== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) ==23738== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) ==23738== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) ==23738== by 0xD8784: child_process_request (winbindd_dual.c:453) ==23738== Address 0x924E430 is 64 bytes inside a block of size 256 free'd ==23738== at 0x4A0541E: free (vg_replace_malloc.c:233) ==23738== by 0x4C2792B: _talloc_free (talloc.c:593) ==23738== by 0x4C27831: _talloc_free (talloc.c:562) ==23738== by 0x4C281D1: talloc_free (talloc.c:974) ==23738== by 0x959B6D2: check_result_unique_scoped (provider_unified.c:441) ==23738== by 0x959BB10: search_forest (provider_unified.c:518) ==23738== by 0x959BEE4: search_cell_list (provider_unified.c:564) ==23738== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) ==23738== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) ==23738== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) ==23738== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) ==23738== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) ==23738== ==23738== Invalid read of size 4 ==23738== at 0x4C2697B: talloc_chunk_from_ptr (talloc.c:173) ==23738== by 0x4C27586: _talloc_free (talloc.c:501) ==23738== by 0x4C281D1: talloc_free (talloc.c:974) ==23738== by 0x959B6DB: check_result_unique_scoped (provider_unified.c:442) ==23738== by 0x959BB10: search_forest (provider_unified.c:518) ==23738== by 0x959BEE4: search_cell_list (provider_unified.c:564) ==23738== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) ==23738== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) ==23738== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) ==23738== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) ==23738== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) ==23738== by 0xD8784: child_process_request (winbindd_dual.c:453) ==23738== Address 0x924E430 is 64 bytes inside a block of size 256 free'd ==23738== at 0x4A0541E: free (vg_replace_malloc.c:233) ==23738== by 0x4C2792B: _talloc_free (talloc.c:593) ==23738== by 0x4C27831: _talloc_free (talloc.c:562) ==23738== by 0x4C281D1: talloc_free (talloc.c:974) ==23738== by 0x959B6D2: check_result_unique_scoped (provider_unified.c:441) ==23738== by 0x959BB10: search_forest (provider_unified.c:518) ==23738== by 0x959BEE4: search_cell_list (provider_unified.c:564) ==23738== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) ==23738== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) ==23738== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) ==23738== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) ==23738== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374)