The Samba-Bugzilla – Attachment 4835 Details for
Bug 6793
winbindd crash with "INTERNAL ERROR: Signal 6" (double-free of "entry_dn")
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
valgrind output of winbindd -d 10
winbind_valgrind_d10.23626 (text/plain), 23.89 KB, created by
Pavel May
on 2009-10-13 13:49:35 UTC
(
hide
)
Description:
valgrind output of winbindd -d 10
Filename:
MIME Type:
Creator:
Pavel May
Created:
2009-10-13 13:49:35 UTC
Size:
23.89 KB
patch
obsolete
>==23626== Memcheck, a memory error detector. >==23626== Copyright (C) 2002-2006, and GNU GPL'd, by Julian Seward et al. >==23626== Using LibVEX rev 1658, a library for dynamic binary translation. >==23626== Copyright (C) 2004-2006, and GNU GPL'd, by OpenWorks LLP. >==23626== Using valgrind-3.2.1, a dynamic binary instrumentation framework. >==23626== Copyright (C) 2000-2006, and GNU GPL'd, by Julian Seward et al. >==23626== For more details, rerun with: -v >==23626== >==23626== My PID = 23626, parent PID = 30112. Prog and args are: >==23626== winbindd >==23626== -d >==23626== 10 >==23626== --log-basename=. >==23626== >==23626== >==23626== ERROR SUMMARY: 0 errors from 0 contexts (suppressed: 4 from 1) >==23626== malloc/free: in use at exit: 426,663 bytes in 488 blocks. >==23626== malloc/free: 2,256 allocs, 1,768 frees, 562,184 bytes allocated. >==23626== For counts of detected errors, rerun with: -v >==23626== searching for pointers to 488 not-freed blocks. >==23626== checked 962,688 bytes. >==23626== >==23626== LEAK SUMMARY: >==23626== definitely lost: 85 bytes in 4 blocks. >==23626== possibly lost: 104 bytes in 1 blocks. >==23626== still reachable: 426,474 bytes in 483 blocks. >==23626== suppressed: 0 bytes in 0 blocks. >==23626== Use --leak-check=full to see details of leaked memory. >==23627== Conditional jump or move depends on uninitialised value(s) >==23627== at 0x15FF28: timeval_min (time.c:541) >==23627== by 0x1AA791: event_add_to_select_args (events.c:78) >==23627== by 0x957B3: process_loop (winbindd.c:1053) >==23627== by 0x96850: main (winbindd.c:1426) >==23627== >==23627== Conditional jump or move depends on uninitialised value(s) >==23627== at 0x15FF50: timeval_min (time.c:542) >==23627== by 0x1AA791: event_add_to_select_args (events.c:78) >==23627== by 0x957B3: process_loop (winbindd.c:1053) >==23627== by 0x96850: main (winbindd.c:1426) >==23627== >==23627== Conditional jump or move depends on uninitialised value(s) >==23627== at 0x15FF7A: timeval_min (time.c:543) >==23627== by 0x1AA791: event_add_to_select_args (events.c:78) >==23627== by 0x957B3: process_loop (winbindd.c:1053) >==23627== by 0x96850: main (winbindd.c:1426) >==23628== Conditional jump or move depends on uninitialised value(s) >==23628== at 0x15FF28: timeval_min (time.c:541) >==23628== by 0x1AA791: event_add_to_select_args (events.c:78) >==23628== by 0xDBF5F: fork_domain_child (winbindd_dual.c:1409) >==23628== by 0xD8258: schedule_async_request (winbindd_dual.c:314) >==23628== by 0xD79ED: async_request (winbindd_dual.c:145) >==23628== by 0xA290A: init_child_connection (winbindd_util.c:627) >==23628== by 0xD8445: async_domain_request (winbindd_dual.c:378) >==23628== by 0xA1B5A: add_trusted_domains (winbindd_util.c:291) >==23628== by 0xA25EB: rescan_trusted_domains (winbindd_util.c:565) >==23628== by 0x96810: main (winbindd.c:1411) >==23628== >==23628== Conditional jump or move depends on uninitialised value(s) >==23628== at 0x15FF50: timeval_min (time.c:542) >==23628== by 0x1AA791: event_add_to_select_args (events.c:78) >==23628== by 0xDBF5F: fork_domain_child (winbindd_dual.c:1409) >==23628== by 0xD8258: schedule_async_request (winbindd_dual.c:314) >==23628== by 0xD79ED: async_request (winbindd_dual.c:145) >==23628== by 0xA290A: init_child_connection (winbindd_util.c:627) >==23628== by 0xD8445: async_domain_request (winbindd_dual.c:378) >==23628== by 0xA1B5A: add_trusted_domains (winbindd_util.c:291) >==23628== by 0xA25EB: rescan_trusted_domains (winbindd_util.c:565) >==23628== by 0x96810: main (winbindd.c:1411) >==23628== >==23628== Invalid read of size 8 >==23628== at 0x33124E5C79: __strcpy_chk (in /lib64/libc-2.5.so) >==23628== by 0x331D25973D: krb5_get_init_creds_password (in /usr/lib64/libkrb5.so.3.3) >==23628== by 0x604C6A: kerberos_kinit_password_ext (kerberos.c:222) >==23628== by 0x605DC1: kerberos_kinit_password (kerberos.c:648) >==23628== by 0x1CC24B: cli_session_setup_spnego (cliconnect.c:992) >==23628== by 0xC5527: cm_prepare_connection (winbindd_cm.c:855) >==23628== by 0xC78A9: cm_open_connection (winbindd_cm.c:1502) >==23628== by 0xC7E49: init_dc_connection_network (winbindd_cm.c:1636) >==23628== by 0xC7EB8: init_dc_connection (winbindd_cm.c:1652) >==23628== by 0xA2EF4: winbindd_dual_init_connection (winbindd_util.c:720) >==23628== by 0xD8784: child_process_request (winbindd_dual.c:453) >==23628== by 0xDC34D: fork_domain_child (winbindd_dual.c:1456) >==23628== Address 0x8E1A618 is 8 bytes inside a block of size 15 alloc'd >==23628== at 0x4A05809: malloc (vg_replace_malloc.c:149) >==23628== by 0x16494A: memdup (util.c:478) >==23628== by 0x2201DF: secrets_fetch (secrets.c:126) >==23628== by 0x221EF2: secrets_fetch_machine_password (secrets.c:824) >==23628== by 0xF3EF6: get_trust_pw_clear (passdb.c:2307) >==23628== by 0xC4CEF: get_trust_creds (winbindd_cm.c:712) >==23628== by 0xC53FC: cm_prepare_connection (winbindd_cm.c:837) >==23628== by 0xC78A9: cm_open_connection (winbindd_cm.c:1502) >==23628== by 0xC7E49: init_dc_connection_network (winbindd_cm.c:1636) >==23628== by 0xC7EB8: init_dc_connection (winbindd_cm.c:1652) >==23628== by 0xA2EF4: winbindd_dual_init_connection (winbindd_util.c:720) >==23628== by 0xD8784: child_process_request (winbindd_dual.c:453) >==23627== >==23627== Invalid read of size 8 >==23627== at 0x33124E5C79: __strcpy_chk (in /lib64/libc-2.5.so) >==23627== by 0x331D25973D: krb5_get_init_creds_password (in /usr/lib64/libkrb5.so.3.3) >==23627== by 0x604C6A: kerberos_kinit_password_ext (kerberos.c:222) >==23627== by 0x605DC1: kerberos_kinit_password (kerberos.c:648) >==23627== by 0x1CC24B: cli_session_setup_spnego (cliconnect.c:992) >==23627== by 0xC5527: cm_prepare_connection (winbindd_cm.c:855) >==23627== by 0xC78A9: cm_open_connection (winbindd_cm.c:1502) >==23627== by 0xC7E49: init_dc_connection_network (winbindd_cm.c:1636) >==23627== by 0xC7EB8: init_dc_connection (winbindd_cm.c:1652) >==23627== by 0xA548D: get_cache (winbindd_cache.c:144) >==23627== by 0xA8A78: resolve_alias_to_username (winbindd_cache.c:1094) >==23627== by 0xA481F: normalize_name_unmap (winbindd_util.c:1498) >==23627== Address 0x8E1B9D8 is 8 bytes inside a block of size 15 alloc'd >==23627== at 0x4A05809: malloc (vg_replace_malloc.c:149) >==23627== by 0x16494A: memdup (util.c:478) >==23627== by 0x2201DF: secrets_fetch (secrets.c:126) >==23627== by 0x221EF2: secrets_fetch_machine_password (secrets.c:824) >==23627== by 0xF3EF6: get_trust_pw_clear (passdb.c:2307) >==23627== by 0xC4CEF: get_trust_creds (winbindd_cm.c:712) >==23627== by 0xC53FC: cm_prepare_connection (winbindd_cm.c:837) >==23627== by 0xC78A9: cm_open_connection (winbindd_cm.c:1502) >==23627== by 0xC7E49: init_dc_connection_network (winbindd_cm.c:1636) >==23627== by 0xC7EB8: init_dc_connection (winbindd_cm.c:1652) >==23627== by 0xA548D: get_cache (winbindd_cache.c:144) >==23627== by 0xA8A78: resolve_alias_to_username (winbindd_cache.c:1094) >==23627== >==23627== Invalid read of size 8 >==23627== at 0x33124E5C79: __strcpy_chk (in /lib64/libc-2.5.so) >==23627== by 0x331D25973D: krb5_get_init_creds_password (in /usr/lib64/libkrb5.so.3.3) >==23627== by 0x604C6A: kerberos_kinit_password_ext (kerberos.c:222) >==23627== by 0x604F37: ads_kinit_password (kerberos.c:326) >==23627== by 0x5F5776: ads_sasl_spnego_bind (sasl.c:812) >==23627== by 0x5F67FD: ads_sasl_bind (sasl.c:1113) >==23627== by 0x5E8C29: ads_connect (ldap.c:711) >==23627== by 0xCFD03: ads_cached_connection (winbindd_ads.c:124) >==23627== by 0xD47DD: sequence_number (winbindd_ads.c:1250) >==23627== by 0xA68A1: refresh_sequence_number (winbindd_cache.c:510) >==23627== by 0xA706F: wcache_fetch (winbindd_cache.c:638) >==23627== by 0xA8AF5: resolve_alias_to_username (winbindd_cache.c:1109) >==23627== Address 0x9001248 is 8 bytes inside a block of size 15 alloc'd >==23627== at 0x4A05809: malloc (vg_replace_malloc.c:149) >==23627== by 0x16494A: memdup (util.c:478) >==23627== by 0x2201DF: secrets_fetch (secrets.c:126) >==23627== by 0x221EF2: secrets_fetch_machine_password (secrets.c:824) >==23627== by 0xCFC5E: ads_cached_connection (winbindd_ads.c:100) >==23627== by 0xD47DD: sequence_number (winbindd_ads.c:1250) >==23627== by 0xA68A1: refresh_sequence_number (winbindd_cache.c:510) >==23627== by 0xA706F: wcache_fetch (winbindd_cache.c:638) >==23627== by 0xA8AF5: resolve_alias_to_username (winbindd_cache.c:1109) >==23627== by 0xA481F: normalize_name_unmap (winbindd_util.c:1498) >==23627== by 0x9813E: winbindd_getpwnam (winbindd_user.c:440) >==23627== by 0x93EF7: process_request (winbindd.c:538) >==23653== >==23653== Conditional jump or move depends on uninitialised value(s) >==23653== at 0x15FF28: timeval_min (time.c:541) >==23653== by 0x1AA791: event_add_to_select_args (events.c:78) >==23653== by 0xDBF5F: fork_domain_child (winbindd_dual.c:1409) >==23653== by 0xD8258: schedule_async_request (winbindd_dual.c:314) >==23653== by 0xD79ED: async_request (winbindd_dual.c:145) >==23653== by 0xDC69B: do_async (winbindd_async.c:83) >==23653== by 0xE685C: winbindd_uid2sid_async (winbindd_idmap.c:428) >==23653== by 0xBFB69: winbindd_uid_to_sid (winbindd_sid.c:553) >==23653== by 0x93EF7: process_request (winbindd.c:538) >==23653== by 0x94EA9: request_recv (winbindd.c:811) >==23653== by 0x94C54: request_main_recv (winbindd.c:772) >==23653== by 0x94491: rw_callback (winbindd.c:621) >==23628== >==23628== Invalid read of size 8 >==23628== at 0x33124E5C79: __strcpy_chk (in /lib64/libc-2.5.so) >==23628== by 0x331D25973D: krb5_get_init_creds_password (in /usr/lib64/libkrb5.so.3.3) >==23628== by 0x604C6A: kerberos_kinit_password_ext (kerberos.c:222) >==23628== by 0x604F37: ads_kinit_password (kerberos.c:326) >==23628== by 0x5F5776: ads_sasl_spnego_bind (sasl.c:812) >==23628== by 0x5F67FD: ads_sasl_bind (sasl.c:1113) >==23628== by 0x5E8C29: ads_connect (ldap.c:711) >==23628== by 0x95966D1: _idmap_adex_init (idmap_adex.c:90) >==23628== by 0x9597137: _nss_adex_init (idmap_adex.c:309) >==23628== by 0x61E485: nss_domain_list_add_domain (nss_info.c:148) >==23628== by 0x61E990: nss_init (nss_info.c:228) >==23628== by 0x61EACC: find_nss_domain (nss_info.c:260) >==23628== Address 0x9278C50 is 8 bytes inside a block of size 15 alloc'd >==23628== at 0x4A05809: malloc (vg_replace_malloc.c:149) >==23628== by 0x16494A: memdup (util.c:478) >==23628== by 0x2201DF: secrets_fetch (secrets.c:126) >==23628== by 0x221EF2: secrets_fetch_machine_password (secrets.c:824) >==23628== by 0x959667F: _idmap_adex_init (idmap_adex.c:81) >==23628== by 0x9597137: _nss_adex_init (idmap_adex.c:309) >==23628== by 0x61E485: nss_domain_list_add_domain (nss_info.c:148) >==23628== by 0x61E990: nss_init (nss_info.c:228) >==23628== by 0x61EACC: find_nss_domain (nss_info.c:260) >==23628== by 0x61ED14: nss_get_info (nss_info.c:314) >==23628== by 0xB3EBE: nss_get_info_cached (winbindd_cache.c:4230) >==23628== by 0xD15A6: query_user (winbindd_ads.c:487) >==23657== >==23657== ERROR SUMMARY: 59 errors from 6 contexts (suppressed: 49 from 1) >==23657== malloc/free: in use at exit: 891,874 bytes in 977 blocks. >==23657== malloc/free: 40,539 allocs, 39,562 frees, 5,880,752 bytes allocated. >==23657== For counts of detected errors, rerun with: -v >==23657== searching for pointers to 977 not-freed blocks. >==23653== >==23653== Invalid read of size 4 >==23653== at 0x4C26961: talloc_chunk_from_ptr (talloc.c:172) >==23653== by 0x4C27586: _talloc_free (talloc.c:501) >==23653== by 0x4C281D1: talloc_free (talloc.c:974) >==23653== by 0x959B6DB: check_result_unique_scoped (provider_unified.c:442) >==23653== by 0x959BB10: search_forest (provider_unified.c:518) >==23653== by 0x959BEE4: search_cell_list (provider_unified.c:564) >==23653== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) >==23653== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) >==23653== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) >==23653== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) >==23653== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) >==23653== by 0xD8784: child_process_request (winbindd_dual.c:453) >==23653== Address 0x9F470B0 is 64 bytes inside a block of size 256 free'd >==23653== at 0x4A0541E: free (vg_replace_malloc.c:233) >==23653== by 0x4C2792B: _talloc_free (talloc.c:593) >==23653== by 0x4C27831: _talloc_free (talloc.c:562) >==23653== by 0x4C281D1: talloc_free (talloc.c:974) >==23653== by 0x959B6D2: check_result_unique_scoped (provider_unified.c:441) >==23653== by 0x959BB10: search_forest (provider_unified.c:518) >==23653== by 0x959BEE4: search_cell_list (provider_unified.c:564) >==23653== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) >==23653== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) >==23653== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) >==23653== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) >==23653== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) >==23653== >==23653== Invalid read of size 4 >==23653== at 0x4C2697B: talloc_chunk_from_ptr (talloc.c:173) >==23653== by 0x4C27586: _talloc_free (talloc.c:501) >==23653== by 0x4C281D1: talloc_free (talloc.c:974) >==23653== by 0x959B6DB: check_result_unique_scoped (provider_unified.c:442) >==23653== by 0x959BB10: search_forest (provider_unified.c:518) >==23653== by 0x959BEE4: search_cell_list (provider_unified.c:564) >==23653== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) >==23653== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) >==23653== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) >==23653== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) >==23653== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) >==23653== by 0xD8784: child_process_request (winbindd_dual.c:453) >==23653== Address 0x9F470B0 is 64 bytes inside a block of size 256 free'd >==23653== at 0x4A0541E: free (vg_replace_malloc.c:233) >==23653== by 0x4C2792B: _talloc_free (talloc.c:593) >==23653== by 0x4C27831: _talloc_free (talloc.c:562) >==23653== by 0x4C281D1: talloc_free (talloc.c:974) >==23653== by 0x959B6D2: check_result_unique_scoped (provider_unified.c:441) >==23653== by 0x959BB10: search_forest (provider_unified.c:518) >==23653== by 0x959BEE4: search_cell_list (provider_unified.c:564) >==23653== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) >==23653== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) >==23653== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) >==23653== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) >==23653== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) >==23657== checked 1,634,760 bytes. >==23657== >==23657== LEAK SUMMARY: >==23657== definitely lost: 374 bytes in 13 blocks. >==23657== possibly lost: 104 bytes in 1 blocks. >==23657== still reachable: 891,396 bytes in 963 blocks. >==23657== suppressed: 0 bytes in 0 blocks. >==23657== Use --leak-check=full to see details of leaked memory. >==23705== >==23705== Conditional jump or move depends on uninitialised value(s) >==23705== at 0x15FF28: timeval_min (time.c:541) >==23705== by 0x1AA791: event_add_to_select_args (events.c:78) >==23705== by 0xDBF5F: fork_domain_child (winbindd_dual.c:1409) >==23705== by 0xD8258: schedule_async_request (winbindd_dual.c:314) >==23705== by 0xD8AF0: winbind_child_died (winbindd_dual.c:520) >==23705== by 0xD7D4B: async_request_fail (winbindd_dual.c:214) >==23705== by 0xD8043: async_reply_recv (winbindd_dual.c:272) >==23705== by 0xD7C0C: async_request_timeout_handler (winbindd_dual.c:189) >==23705== by 0x1AA925: run_events (events.c:107) >==23705== by 0x95A3B: process_loop (winbindd.c:1111) >==23705== by 0x96850: main (winbindd.c:1426) >==23705== >==23705== Invalid read of size 4 >==23705== at 0x4C26961: talloc_chunk_from_ptr (talloc.c:172) >==23705== by 0x4C27586: _talloc_free (talloc.c:501) >==23705== by 0x4C281D1: talloc_free (talloc.c:974) >==23705== by 0x959B6DB: check_result_unique_scoped (provider_unified.c:442) >==23705== by 0x959BB10: search_forest (provider_unified.c:518) >==23705== by 0x959BEE4: search_cell_list (provider_unified.c:564) >==23705== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) >==23705== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) >==23705== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) >==23705== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) >==23705== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) >==23705== by 0xD8784: child_process_request (winbindd_dual.c:453) >==23705== Address 0x914DE28 is 64 bytes inside a block of size 256 free'd >==23705== at 0x4A0541E: free (vg_replace_malloc.c:233) >==23705== by 0x4C2792B: _talloc_free (talloc.c:593) >==23705== by 0x4C27831: _talloc_free (talloc.c:562) >==23705== by 0x4C281D1: talloc_free (talloc.c:974) >==23705== by 0x959B6D2: check_result_unique_scoped (provider_unified.c:441) >==23705== by 0x959BB10: search_forest (provider_unified.c:518) >==23705== by 0x959BEE4: search_cell_list (provider_unified.c:564) >==23705== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) >==23705== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) >==23705== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) >==23705== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) >==23705== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) >==23705== >==23705== Invalid read of size 4 >==23705== at 0x4C2697B: talloc_chunk_from_ptr (talloc.c:173) >==23705== by 0x4C27586: _talloc_free (talloc.c:501) >==23705== by 0x4C281D1: talloc_free (talloc.c:974) >==23705== by 0x959B6DB: check_result_unique_scoped (provider_unified.c:442) >==23705== by 0x959BB10: search_forest (provider_unified.c:518) >==23705== by 0x959BEE4: search_cell_list (provider_unified.c:564) >==23705== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) >==23705== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) >==23705== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) >==23705== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) >==23705== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) >==23705== by 0xD8784: child_process_request (winbindd_dual.c:453) >==23705== Address 0x914DE28 is 64 bytes inside a block of size 256 free'd >==23705== at 0x4A0541E: free (vg_replace_malloc.c:233) >==23705== by 0x4C2792B: _talloc_free (talloc.c:593) >==23705== by 0x4C27831: _talloc_free (talloc.c:562) >==23705== by 0x4C281D1: talloc_free (talloc.c:974) >==23705== by 0x959B6D2: check_result_unique_scoped (provider_unified.c:441) >==23705== by 0x959BB10: search_forest (provider_unified.c:518) >==23705== by 0x959BEE4: search_cell_list (provider_unified.c:564) >==23705== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) >==23705== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) >==23705== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) >==23705== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) >==23705== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) >==23628== Warning: invalid file descriptor -1 in syscall close() >==23738== >==23738== Conditional jump or move depends on uninitialised value(s) >==23738== at 0x15FF28: timeval_min (time.c:541) >==23738== by 0x1AA791: event_add_to_select_args (events.c:78) >==23738== by 0xDBF5F: fork_domain_child (winbindd_dual.c:1409) >==23738== by 0xD8258: schedule_async_request (winbindd_dual.c:314) >==23738== by 0xD8AF0: winbind_child_died (winbindd_dual.c:520) >==23738== by 0xD7D4B: async_request_fail (winbindd_dual.c:214) >==23738== by 0xD8043: async_reply_recv (winbindd_dual.c:272) >==23738== by 0xD7C0C: async_request_timeout_handler (winbindd_dual.c:189) >==23738== by 0x1AA925: run_events (events.c:107) >==23738== by 0x95A3B: process_loop (winbindd.c:1111) >==23738== by 0x96850: main (winbindd.c:1426) >==23738== >==23738== Conditional jump or move depends on uninitialised value(s) >==23738== at 0x15FF50: timeval_min (time.c:542) >==23738== by 0x1AA791: event_add_to_select_args (events.c:78) >==23738== by 0xDBF5F: fork_domain_child (winbindd_dual.c:1409) >==23738== by 0xD8258: schedule_async_request (winbindd_dual.c:314) >==23738== by 0xD8AF0: winbind_child_died (winbindd_dual.c:520) >==23738== by 0xD7D4B: async_request_fail (winbindd_dual.c:214) >==23738== by 0xD8043: async_reply_recv (winbindd_dual.c:272) >==23738== by 0xD7C0C: async_request_timeout_handler (winbindd_dual.c:189) >==23738== by 0x1AA925: run_events (events.c:107) >==23738== by 0x95A3B: process_loop (winbindd.c:1111) >==23738== by 0x96850: main (winbindd.c:1426) >==23738== >==23738== Invalid read of size 4 >==23738== at 0x4C26961: talloc_chunk_from_ptr (talloc.c:172) >==23738== by 0x4C27586: _talloc_free (talloc.c:501) >==23738== by 0x4C281D1: talloc_free (talloc.c:974) >==23738== by 0x959B6DB: check_result_unique_scoped (provider_unified.c:442) >==23738== by 0x959BB10: search_forest (provider_unified.c:518) >==23738== by 0x959BEE4: search_cell_list (provider_unified.c:564) >==23738== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) >==23738== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) >==23738== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) >==23738== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) >==23738== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) >==23738== by 0xD8784: child_process_request (winbindd_dual.c:453) >==23738== Address 0x924E430 is 64 bytes inside a block of size 256 free'd >==23738== at 0x4A0541E: free (vg_replace_malloc.c:233) >==23738== by 0x4C2792B: _talloc_free (talloc.c:593) >==23738== by 0x4C27831: _talloc_free (talloc.c:562) >==23738== by 0x4C281D1: talloc_free (talloc.c:974) >==23738== by 0x959B6D2: check_result_unique_scoped (provider_unified.c:441) >==23738== by 0x959BB10: search_forest (provider_unified.c:518) >==23738== by 0x959BEE4: search_cell_list (provider_unified.c:564) >==23738== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) >==23738== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) >==23738== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) >==23738== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) >==23738== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) >==23738== >==23738== Invalid read of size 4 >==23738== at 0x4C2697B: talloc_chunk_from_ptr (talloc.c:173) >==23738== by 0x4C27586: _talloc_free (talloc.c:501) >==23738== by 0x4C281D1: talloc_free (talloc.c:974) >==23738== by 0x959B6DB: check_result_unique_scoped (provider_unified.c:442) >==23738== by 0x959BB10: search_forest (provider_unified.c:518) >==23738== by 0x959BEE4: search_cell_list (provider_unified.c:564) >==23738== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) >==23738== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) >==23738== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) >==23738== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) >==23738== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374) >==23738== by 0xD8784: child_process_request (winbindd_dual.c:453) >==23738== Address 0x924E430 is 64 bytes inside a block of size 256 free'd >==23738== at 0x4A0541E: free (vg_replace_malloc.c:233) >==23738== by 0x4C2792B: _talloc_free (talloc.c:593) >==23738== by 0x4C27831: _talloc_free (talloc.c:562) >==23738== by 0x4C281D1: talloc_free (talloc.c:974) >==23738== by 0x959B6D2: check_result_unique_scoped (provider_unified.c:441) >==23738== by 0x959BB10: search_forest (provider_unified.c:518) >==23738== by 0x959BEE4: search_cell_list (provider_unified.c:564) >==23738== by 0x959D6C3: _ccp_get_id_from_sid (provider_unified.c:1002) >==23738== by 0x9596F24: _idmap_adex_get_id_from_sid (idmap_adex.c:231) >==23738== by 0x60FB79: idmap_backends_sid_to_unixid (idmap.c:785) >==23738== by 0x611508: idmap_sid_to_gid (idmap_util.c:261) >==23738== by 0xE64AD: winbindd_dual_sid2gid (winbindd_idmap.c:374)
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 6793
:
4821
|
4825
|
4829
| 4835 |
4836
|
4837
|
4844
|
4845
|
4854