The Samba 'panic action' script, /usr/local/bin/panic-action, was called for pid 2243 (/usr/sbin/smbd). Below is a backtrace for this process generated with gdb, which shows the state of the program at the time the error occured. If this problem is recurring, you should think about submitting a bugreport for Samba. [Thread debugging using libthread_db enabled] 0x00007f6152b498be in __libc_waitpid (pid=2245, stat_loc=0x7fff5f5ce7cc, options=0) at ../sysdeps/unix/sysv/linux/waitpid.c:32 32 return INLINE_SYSCALL (wait4, 4, pid, stat_loc, options, NULL); #0 0x00007f6152b498be in __libc_waitpid (pid=2245, stat_loc=0x7fff5f5ce7cc, options=0) at ../sysdeps/unix/sysv/linux/waitpid.c:32 resultvar = 18446744073709551104 oldtype = result = #1 0x00007f6152adb909 in do_system (line=) at ../sysdeps/posix/system.c:149 __result = _buffer = {__routine = 0x7f6152adbc60 , __arg = 0x7fff5f5ce7c8, __canceltype = 0, __prev = 0x0} _avail = 1 status = save = pid = 2245 sa = {__sigaction_handler = {sa_handler = 0x1, sa_sigaction = 0x1}, sa_mask = {__val = {65536, 0 }}, sa_flags = 0, sa_restorer = 0x7f6152aa8610} omask = {__val = {7296, 4294967295, 140734793312032, 1, 12130504, 0, 140734793313656, 0, 140056030617600, 140056028438512, 1, 0, 34, 140055975462416, 140056054646288, 140056054596944}} #2 0x00007f615636b753 in smb_panic (why=) at lib/util.c:1123 cmd = 0x7f6157620550 "/usr/local/bin/panic-action 2243" result = __FUNCTION__ = "smb_panic" #3 0x00007f615635c1b4 in fault_report (sig=11) at lib/fault.c:53 counter = 1 #4 sig_fault (sig=11) at lib/fault.c:76 No locals. #5 No symbol table info available. #6 tcopy_passwd (mem_ctx=, from=0x1f0) at ../lib/util/util_pw.c:82 ret = 0x7f61576015e0 #7 0x00007f6156306562 in pdb_copy_sam_account (dst=0x7f6157629a00, src=0x7f6157604aa0) at passdb/passdb.c:2114 buf = 0x7f6157629d40 "" len = #8 0x00007f615630a965 in pdb_getsampwsid (sam_acct=0x7f6157629a00, sid=0x7fff5f5ced80) at passdb/pdb_interface.c:414 cache_copy = pdb = 0x7f6157535450 rid = 1026 cache_data = ok = false __FUNCTION__ = "pdb_getsampwsid" #9 0x00007f615624116c in _samr_OpenUser (p=0x7f6157617030, r=0x7f6157622310) at rpc_server/samr/srv_samr_nt.c:2204 sampass = 0x7f6157629a00 sid = {sid_rev_num = 1 '\001', num_auths = 5 '\005', id_auth = "\000\000\000\000\000\005", sub_auths = {21, 3348813608, 2003740952, 1141461195, 1026, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0}} dinfo = uinfo = psd = 0x7f61575fe550 acc_granted = des_access = 985087 extra_access = 0 sd_size = 168 ret = nt_status = {v = 1450498211} needed_priv_1 = needed_priv_2 = status = {v = 0} __FUNCTION__ = "_samr_OpenUser" #10 0x00007f6156250fc7 in api_samr_OpenUser (p=0x7f6157617030) at librpc/gen_ndr/srv_samr.c:2745 call = pull = 0x7f615762c5a0 push = ndr_err = r = 0x7f6157622310 #11 0x00007f6156261f3a in rpcint_dispatch (mem_ctx=, ev=0x7f61576271d0, h=, object=, opnum=, in_flags=, in_data=0x7f6157629500 "", in_length=28) at rpc_server/rpc_ncacn_np.c:210 num_cmds = cmds = i = ok = #12 rpcint_bh_raw_call_send (mem_ctx=, ev=0x7f61576271d0, h=, object=, opnum=, in_flags=, in_data=0x7f6157629500 "", in_length=28) at rpc_server/rpc_ncacn_np.c:308 hs = req = 0x7f615762c6f0 state = 0x7f6157627010 ok = status = #13 0x00007f61563da089 in dcerpc_binding_handle_raw_call_send (mem_ctx=, ev=0x7f61576271d0, h=0x7f6157616ef0, object=0x0, opnum=34, in_flags=1048576, in_data=0x7f6157629500 "", in_length=28) at ../librpc/rpc/binding_handle.c:133 req = 0x7f6157620400 state = 0x7f61576205d0 subreq = #14 0x00007f61563da33b in dcerpc_binding_handle_call_send (mem_ctx=, ev=0x7f61576271d0, h=0x7f6157616ef0, object=0x0, table=, opnum=34, r_mem=0x7f61576165b0, r_ptr=0x7fff5f5cefd0) at ../librpc/rpc/binding_handle.c:414 req = 0x7f61575b0d30 state = 0x7f6157619280 subreq = ndr_err = #15 0x00007f61563da447 in dcerpc_binding_handle_call (h=0x7f6157616ef0, object=0x0, table=0x7f6156ac13a0, opnum=34, r_mem=, r_ptr=) at ../librpc/rpc/binding_handle.c:534 frame = 0x7f615762c690 ev = subreq = status = #16 0x00007f61562d262d in dcerpc_samr_OpenUser_r (h=, mem_ctx=, r=) at librpc/gen_ndr/ndr_samr_c.c:7529 status = #17 0x00007f61562d265d in dcerpc_samr_OpenUser (h=, mem_ctx=, _domain_handle=, _access_mask=, _rid=, _user_handle=0x7fff5f5cf210, result=0x7fff5f5cf090) at librpc/gen_ndr/ndr_samr_c.c:7664 r = {in = {domain_handle = 0x7fff5f5cf0a0, access_mask = 33554432, rid = 1026}, out = {user_handle = 0x7fff5f5cf060, result = {v = 1466003184}}} status = #18 0x00007f61561f348b in samr_find_machine_account (mem_ctx=0x7f61576165b0, b=0x7f6157616ef0, account_name=0x7f6157616110 "PC10728$", domain_sid_p=0x7fff5f5cf198, user_rid_p=0x7fff5f5cf1ac, user_handle=0x7fff5f5cf210, access_mask=33554432) at rpc_server/netlogon/srv_netlog_nt.c:600 status = result = {v = 0} connect_handle = {handle_type = 0, uuid = {time_low = 13, time_mid = 0, time_hi_and_version = 0, clock_seq = "\rS", node = "{\273\303\b\000"}} domain_handle = {handle_type = 0, uuid = {time_low = 14, time_mid = 0, time_hi_and_version = 0, clock_seq = "\rS", node = "{\273\303\b\000"}} domain_name = {length = 24, size = 24, string = 0x7f615752c150 "FILMAKADEMIE"} domain_sid = 0x7f6157624cf0 names = {length = 16, size = 16, string = 0x7f6157616110 "PC10728$"} rids = {count = 1, ids = 0x7f6157627170} types = {count = 1, ids = 0x7f615758e0c0} rid = #19 0x00007f61561f371b in get_md4pw (p=0x7f6157623290, r=0x7f6157615d20) at rpc_server/netlogon/srv_netlog_nt.c:699 status = h = 0x7f6157616ef0 info = client_id = {addr = "127.0.0.1", '\000' , name = 0x7f61565da63d "127.0.0.1"} result = {v = 0} mem_ctx = 0x7f61576165b0 user_handle = {handle_type = 0, uuid = {time_low = 0, time_mid = 0, time_hi_and_version = 0, clock_seq = "\000", node = "\000\000\000\000\000"}} user_rid = domain_sid = acct_ctrl = session_info = 0x7f6157616600 #20 _netr_ServerAuthenticate3 (p=0x7f6157623290, r=0x7f6157615d20) at rpc_server/netlogon/srv_netlog_nt.c:947 status = srv_flgs = 1073889791 in_neg_flags = fn = 0x7f61566a2585 "_netr_ServerAuthenticate3" sid = {sid_rev_num = 2 '\002', num_auths = 0 '\000', id_auth = "\000\000\000\000\000", sub_auths = {1450500816, 32609, 16, 0, 1, 0, 1465998648, 32609, 1786620025, 3056591538, 120, 0, 1466103360, 32609, 1466000144}} mach_pwd = {hash = "\264\330tVa\177\000\000@\366bWa\177\000"} creds = pipe_state = 0x7f615762ce10 __FUNCTION__ = "_netr_ServerAuthenticate3" #21 0x00007f61561f855c in api_netr_ServerAuthenticate3 (p=0x7f6157623290) at librpc/gen_ndr/srv_netlogon.c:2168 call = pull = 0x7f6157615dc0 push = ndr_err = r = 0x7f6157615d20 #22 0x00007f615625e3a6 in api_rpcTNP (p=0x7f6157623290, pkt=0x7f6157629cd0, api_rpc_cmds=0x7f6156adc940, n_cmds=) at rpc_server/srv_pipe.c:1647 fn_num = offset1 = 0 __FUNCTION__ = "api_rpcTNP" #23 0x00007f615625f61f in api_pipe_request (p=0x7f6157623290) at rpc_server/srv_pipe.c:1580 frame = 0x7f6157615c70 ret = false changed_user = false pipe_fns = 0x7f61575b0e30 #24 process_request_pdu (p=0x7f6157623290) at rpc_server/srv_pipe.c:1837 ret = false status = #25 process_complete_pdu (p=0x7f6157623290) at rpc_server/srv_pipe.c:1894 pkt = 0x7f6157629cd0 status = reply = false __FUNCTION__ = "process_complete_pdu" #26 0x00007f6156260d98 in process_incoming_data (p=0x7f6157623290, data=0x7f61575f1a00 "h", n=) at rpc_server/srv_pipe_hnd.c:218 data_to_copy = 112 __FUNCTION__ = "process_incoming_data" #27 0x00007f6156261231 in write_to_internal_pipe (mem_ctx=, ev=0x7f615752a590, handle=, data=, len=128) at rpc_server/srv_pipe_hnd.c:244 data_used = data_left = 112 #28 np_write_send (mem_ctx=, ev=0x7f615752a590, handle=, data=, len=128) at rpc_server/srv_pipe_hnd.c:538 p = 0x7f6157623290 req = 0x7f61575f1ec0 state = 0x7f61575f2020 status = __FUNCTION__ = "np_write_send" #29 0x00007f61560d787b in smbd_smb2_write_send (req=0x7f61575f16e0) at smbd/smb2_write.c:260 subreq = 0x0 status = state = 0x7f61575f1d50 smbreq = 0x7f61575f1dd0 conn = 0x7f615762edd0 req = 0x7f61575f1bf0 nwritten = lock = {context = {smblctx = 140056054682032, tid = 43129, pid = {pid = 12, vnn = 0, unique_id = 57363}}, start = 58, size = 140056034958861, fnum = 57363, lock_type = READ_LOCK, lock_flav = 1443529276} #30 smbd_smb2_request_process_write (req=0x7f61575f16e0) at smbd/smb2_write.c:97 status = inhdr = inbody = i = in_data_offset = in_data_length = in_data_buffer = {data = 0x7f61575f19f0 "\005", length = 128} in_fsp = 0x7f61575fe870 subreq = 0x7f61575f1bf0 __FUNCTION__ = "smbd_smb2_request_process_write" #31 0x00007f61560cdbf5 in smbd_smb2_request_dispatch (req=0x7f61575f16e0) at smbd/smb2_server.c:1569 inhdr = i = opcode = 9 flags = 0 status = session_status = {v = 0} allowed_flags = __FUNCTION__ = "smbd_smb2_request_dispatch" #32 0x00007f61560cf1fd in smbd_smb2_request_incoming (subreq=0x0) at smbd/smb2_server.c:2657 sconn = 0x7f615752a670 status = req = __FUNCTION__ = "smbd_smb2_request_incoming" #33 0x00007f61560cc4f0 in smbd_smb2_request_read_done (subreq=0x7f61575fdc80) at smbd/smb2_server.c:2500 req = 0x7f6157629cd0 ret = sys_errno = 32609 status = #34 0x00007f615616bfd2 in tstream_readv_pdu_queue_done (subreq=0x7f61575f14a0) at ../lib/tsocket/tsocket_helpers.c:394 req = 0x7f61575fdc80 state = 0x7f61575fe550 ret = 244 sys_errno = #35 0x00007f615616c354 in tstream_readv_pdu_readv_done (subreq=0x7f615762c620) at ../lib/tsocket/tsocket_helpers.c:287 req = 0x7f61575f14a0 state = 0x7f61575fe7c0 ret = sys_errno = #36 0x00007f615616b324 in tstream_readv_done (subreq=0x0) at ../lib/tsocket/tsocket.c:604 req = 0x7f615762c620 state = 0x7f61575fe6e0 ret = 174 sys_errno = #37 0x00007f615346a0c8 in tevent_common_loop_immediate () from /usr/lib64/libtevent.so.0 No symbol table info available. #38 0x00007f615637a78c in run_events_poll (ev=0x7f615752a590, pollrtn=0, pfds=0x0, num_pfds=0) at lib/events.c:197 state = pollfd_idx = fde = now = {tv_sec = 140056053584064, tv_usec = 8192} __FUNCTION__ = "run_events_poll" #39 0x00007f61560b8748 in smbd_server_connection_loop_once (sconn=0x7f615752a670) at smbd/process.c:995 timeout = 0 num_pfds = 2 ret = retry = #40 smbd_process (sconn=0x7f615752a670) at smbd/process.c:3159 status = frame = 0x7f6157615b50 ss = {ss_family = 2, __ss_align = 0, __ss_padding = "\001\000\000\000\000\000\000\000\360\332RWa\177\000\000\236\000tVa\177\000\000@\333RWa\177\000\000P\316aWa\177\000\000\260\220RWa\177\000\000\001\000\000\000\000\000\000\000\211SgSa\177\000\000@\333RWa\177\000\000\001\000\000\000\000\000\000\000\063\000\000\000\000\000\000\000w\341\211:\322\373\256\271\260\314RWa\177\000\000\t\344\064Va\177\000"} sa = 0x7fff5f5cfa80 sa_socklen = local_address = 0x7f61575f9780 remote_address = 0x7f61575f9710 remaddr = ret = __FUNCTION__ = "smbd_process" #41 0x00007f61565d722f in smbd_accept_connection (ev=, fde=, flags=, private_data=) at smbd/server.c:514 status = s = 0x0 addr = {ss_family = 2, __ss_align = 0, __ss_padding = "\260\270RWa\177\000\000\260\314RWa\177\000\000\003\000\000\000\000\000\000\000\212\232\263Ra\177\000\000\000\000\000\000\000\000\000\000\301\252\063Va\177", '\000' , "\023\000\000\000\000\000\000\000\352\316\a\000\000\000\000\000@\374\\_\377\177\000\000\024\370__\377\177\000\000\200\374\\_\377\177\000\000\000\000\000\000\000\000\000"} in_addrlen = 16 fd = pid = 0 unique_id = 13379908423308140919 __FUNCTION__ = "smbd_accept_connection" #42 0x00007f615637aac7 in run_events_poll (ev=0x7f615752a590, pollrtn=, pfds=0x7f615752ccb0, num_pfds=3) at lib/events.c:286 pfd = flags = state = pollfd_idx = 0x7f615761dd50 fde = 0x7f6157632f70 now = {tv_sec = 1393408891, tv_usec = 831356} __FUNCTION__ = "run_events_poll" #43 0x00007f615637af7f in s3_event_loop_once (ev=0x7f615752a590, location=) at lib/events.c:349 state = 0x7f615752b8b0 timeout = 19512 num_pfds = 3 ret = 1 #44 0x00007f615346949d in _tevent_loop_once () from /usr/lib64/libtevent.so.0 No symbol table info available. #45 0x00007f61565d852b in smbd_parent_loop (argc=, argv=0x7f6157628120) at smbd/server.c:820 ret = frame = 0x7f6157534230 #46 main (argc=, argv=0x7f6157628120) at smbd/server.c:1304 is_daemon = interactive = Fork = no_process_group = log_stdout = ports = 0x0 profile_level = 0x0 opt = pc = print_build_options = 80 long_options = {{longName = 0x0, shortName = 0 '\000', argInfo = 4, arg = 0x7f6153a85420, val = 0, descrip = 0x7f61567e15f3 "Help options:", argDescrip = 0x0}, {longName = 0x7f61567380a6 "daemon", shortName = 68 'D', argInfo = 0, arg = 0x0, val = 1000, descrip = 0x7f61567e1601 "Become a daemon (default)", argDescrip = 0x0}, {longName = 0x7f61567e161b "interactive", shortName = 105 'i', argInfo = 0, arg = 0x0, val = 1001, descrip = 0x7f61567e1d30 "Run interactive (not a daemon)", argDescrip = 0x0}, {longName = 0x7f61567e1627 "foreground", shortName = 70 'F', argInfo = 0, arg = 0x0, val = 1002, descrip = 0x7f61567e1d50 "Run daemon in foreground (for daemontools, etc.)", argDescrip = 0x0}, {longName = 0x7f61567e1632 "no-process-group", shortName = 0 '\000', argInfo = 0, arg = 0x0, val = 1003, descrip = 0x7f61567e1d88 "Don't create a new process group", argDescrip = 0x0}, {longName = 0x7f61567e1643 "log-stdout", shortName = 83 'S', argInfo = 0, arg = 0x0, val = 1004, descrip = 0x7f61567e164e "Log to stdout", argDescrip = 0x0}, {longName = 0x7f61567e165c "build-options", shortName = 98 'b', argInfo = 0, arg = 0x0, val = 98, descrip = 0x7f61567e166a "Print build options", argDescrip = 0x0}, {longName = 0x7f615666bb29 "port", shortName = 112 'p', argInfo = 1, arg = 0x7fff5f5d0018, val = 0, descrip = 0x7f61567e167e "Listen on the specified ports", argDescrip = 0x0}, {longName = 0x7f61567e169c "profiling-level", shortName = 80 'P', argInfo = 1, arg = 0x7fff5f5d0010, val = 0, descrip = 0x7f61567e16ac "Set profiling level", argDescrip = 0x7f61567e16c0 "PROFILE_LEVEL"}, {longName = 0x0, shortName = 0 '\000', argInfo = 4, arg = 0x7f6156adf620, val = 0, descrip = 0x7f61567e16ce "Common samba options:", argDescrip = 0x0}, {longName = 0x0, shortName = 0 '\000', argInfo = 4, arg = 0x7f6156ac2480, val = 0, descrip = 0x7f61567e1db0 "Build-time configuration overrides:", argDescrip = 0x0}, {longName = 0x0, shortName = 0 '\000', argInfo = 0, arg = 0x0, val = 0, descrip = 0x0, argDescrip = 0x0}} parent = 0x7f6157628120 frame = status = __FUNCTION__ = "main" A debugging session is active. Inferior 1 [process 2243] will be detached. Quit anyway? (y or n) [answered Y; input not from terminal]