ldap crash

poelzi little.idiot at poelzi.org
Thu Oct 4 11:08:16 GMT 2001


hi,

i tried samba-tng cvs and the last release
openldap 2.15 and all running good.
samr and netlogond crashes after they get the account from the ldap with
the log after. this is from version tng 2.6.1
i need a long time to find out that --with-ldap=/usr/local/openldap didn't
work :)
maybe, that the nss_ldap made the lookups into the ldap, cause it worked
half.
at the end there is a ntlogd with debuglevel 5 who crashed if i try to
connect with
samedit -S KEN -U root%XXXX -W MCONNEXION

by
poelzi

==> /usr/local/samba-tng/var/log.samr <==
Changed root to /
get_user_creds: Got only 20 bytes, expected 24
Setting 0 in 1 groups: 0
adding home directory root at /root
msrpc_process: client_name: samr my_name: ken
api_pipe_bind_req: \PIPE\samr -> \PIPE\samrd
Doing \PIPE\samr
api_rpc_command: SAMR_CONNECT
Doing \PIPE\samr
api_rpc_command: SAMR_ENUM_DOMAINS
Doing \PIPE\samr
api_rpc_command: SAMR_LOOKUP_DOMAIN
Doing \PIPE\samr
api_rpc_command: SAMR_CLOSE_HND
end of file from client
Closing connections
Server exit (normal exit)
Changed root to /
get_user_creds: Got only 20 bytes, expected 24
Setting 0 in 1 groups: 0
adding home directory root at /root
msrpc_process: client_name: samr my_name: ken
api_pipe_bind_req: \PIPE\samr -> \PIPE\samrd
Doing \PIPE\samr
api_rpc_command: SAMR_CONNECT
Doing \PIPE\samr
api_rpc_command: SAMR_OPEN_DOMAIN
Setting policy sid=S-1-5-21-737654797-3007802452-2889425168
Service setting policy sid=S-1-5-21-737654797-3007802452-2889425168
Doing \PIPE\samr
api_rpc_command: SAMR_OPEN_DOMAIN
Setting policy sid=S-1-5-32
Service setting policy sid=S-1-5-32
Doing \PIPE\samr
api_rpc_command: SAMR_ENUM_DOM_USERS
Connected to LDAP server
Searching in [dc=mconnexion,dc=com] for [objectclass=sambaAccount] with
scope [2]
23 matching entries found
get: [uid] = [lookup]
Retrieving account [lookup]
get: [uidNumber] = [65536]
get: [ntuid] = [lookup]
get: [rid] = [10000]
get: [acctFlags] = [[U          ]]
get: [lmPassword] = [XXX here is somthing right XXX]
get: [ntPassword] = [XXX here is something xxx]
get: [pwdLastSet] = [3b9fcf7c]
get: [gidNumber] = [65536]
get: [grouprid] = [201]
get: [cn] = [lookup]
get: [description] = [Mconnexion.com user]
get: [smbHome] = [\\%N\%U\Profile]
get: [homeDrive] = [H:]
get: [script] = [logon.bat]
get: [profile] = [\\%N\%U]
get: [pwdCanChange] = [3A2CEBFF]
get: [pwdMustChange] = [FFFFFFFF]
get: [logonTime] = [00000000]
get: [logoffTime] = [00000000]
get: [kickoffTime] = [00000000]
===============================================================
INTERNAL ERROR: Signal 11 in pid 23028 (TNG-alpha)
Please read the file BUGS.txt in the distribution
===============================================================
Stack backtrace:
/usr/local/samba-tng/lib/libsamba.so.0(generate_backtrace+0x29)
[0x400d8219]
/usr/local/samba-tng/lib/libsamba.so.0 [0x400d8069]
/usr/local/samba-tng/lib/libsamba.so.0 [0x400d8186]
/lib/libc.so.6 [0x402898d8]
/usr/local/samba-tng/lib/libsamba.so.0 [0x400e36ba]
/usr/local/samba-tng/lib/libsamba.so.0(standard_sub_vuser+0x32)
[0x400e37a2]
/usr/local/samba-tng/lib/libsmbpw.so.0 [0x40189bf2]
/usr/local/samba-tng/lib/libsmbpw.so.0 [0x4018a024]
/usr/local/samba-tng/lib/libsmbpw.so.0(getsam21pwent+0x27) [0x401882a7]
/usr/local/samba-tng/lib/libsamrpass.so.0 [0x40175df4]
/usr/local/samba-tng/lib/libsamrpass.so.0(_samr_enum_dom_users+0xb3)
[0x40176467]
/usr/local/samba-tng/sbin/samrd [0x8051975]
/usr/local/samba-tng/sbin/samrd [0x8054179]
/usr/local/samba-tng/sbin/samrd [0x8054248]
/usr/local/samba-tng/sbin/samrd [0x8052e8b]
/usr/local/samba-tng/sbin/samrd [0x8053b22]
/usr/local/samba-tng/sbin/samrd [0x8053e82]
/usr/local/samba-tng/sbin/samrd [0x8054339]
/usr/local/samba-tng/sbin/samrd [0x804ebfd]
/usr/local/samba-tng/sbin/samrd [0x804f4a5]
/usr/local/samba-tng/sbin/samrd(main+0x598) [0x804ea10]
/lib/libc.so.6(__libc_start_main+0xbb) [0x402796ef]
/usr/local/samba-tng/sbin/samrd(samr_io_r_del_groupmem+0x31) [0x804dce1]
This program is now stopped for 60 seconds.
You can use this time to attach gdb to this process.
The command to do so is probably:
gdb /usr/local/samba-tng/sbin/DAEMON 23028
At the (gdb) prompt, please type `bt'.
If you're done with gdb, you can type
`kill' and `quit'.


[global]

# ldap stuff
ldap suffix = "dc=mconnexion,dc=com"
ldap bind as = "cn=manager,dc=mconnexion,dc=com"
ldap passwd file = /etc/ldappasswd
# if the ldap server resides in the same machine you can use localhost
ldap server = localhost
ldap port = 389
ldap scope = sub

# the password will expire in 30 days since the last change
password expire time = 30

comment = Linux Auth Samba-TNG Server
workgroup = MCONNEXION
netbios name = KEN
security = user
status = yes

#wins server = 157.27.252.10

null passwords = yes
encrypt passwords = yes
domain logons = yes
logon drive = H:
logon script = scripts\startup.bat
#logon home = \\KEN\homes

# Many different ways of doing a roaming profile
;logon path = \\%N\%U\Profile
;logon path = \\%N\%H\Profile
;logon path = \\KEN\profiles\%U
;logon path = \\%N\profiles\%U

# My preferred mandatory profile
# Make it ending with .man, if you want not to allow users
# to login if profile is not available
#logon path = \\KEN\profiles\default.man

guest account = nobody
share modes = no
os level = 65

local master = yes
domain master = yes
preferred master = yes

/etc/samba-tng/smb.conf
# Make it ending with .man, if you want not to allow users
# to login if profile is not available
#logon path = \\KEN\profiles\default.man

guest account = nobody
share modes = no
os level = 65

local master = yes
domain master = yes
preferred master = yes

; sync samba with unix password
unix password sync = yes
passwd program = /usr/local/sbin/ldapsync.pl -o %u
passwd chat = *New*password* %n\n *Retype*new*password* %n\n *modifying*
;passwd chat debug = Yes
;debug level = 100

time server = yes

[homes]
guest ok = no
read only = no
create mask = 0700
directory mask = 0700
oplocks = false
level 2 oplocks = false
locking = no

[netlogon]
;utmp = yes
path = /var/domain/netlogon
writeable = no
guest ok = no
; netlogon share must (?) be browsable for the profiles
browseable = no
public = no
;preexec = echo "%T - user %u connected to %S from %m (%I)" >>/tmp/log
;postexec = echo "%T - user %u disconnected from %S from %m (%I)" >>/tmp/log

[profiles]
path = /var/domain/profiles
writeable = yes
browseable = no
create mode = 0644
directory mode = 0755
guest ok = yes
(END)




----------------------------
ntlogd with debug 5


Changed root to /
get_user_creds: Got only 24 bytes, expected 28
000000 creds_io_cmd creds
000004 vuid_io_key key
0004 pid : 00005b74
0008 vuid: 0065
000000 vuid_io_key key
0000 pid : 00005b74
0004 vuid: 0065
become_unix_sec_ctx: 0 0 1 0x80e4580
Setting 0 in 1 groups: 0
become_unix_sec_ctx uid=(0,0) gid=(0,0) vuser=(23412,65)
000000 vuid_io_key key
0000 pid : 00005b74
0004 vuid: 0065
adding home directory root at /root
Serverzone is -7200
msrpc_process: client_name: netlogon my_name: ken
000000 smb_io_rpc_hdr hdr
000000 smb_io_rpc_hdr hdr
000000 smb_io_rpc_hdr hdr
000000 vuid_io_key key
0000 pid : 00005b74
0004 vuid: 0065
Skipping become_unix_sec_ctx - already user
api_pipe_bind_req: decode request. 385
api_pipe_bind_req: \PIPE\netlogon -> \PIPE\netlogond
000000 smb_io_rpc_hdr_rb
api_pipe_bind_req: make response. 332
000000 smb_io_rpc_hdr_ba
000000 smb_io_rpc_hdr
000000 smb_io_rpc_hdr hdr
000000 smb_io_rpc_hdr hdr
000000 smb_io_rpc_hdr hdr
000000 smb_io_rpc_hdr_req req
000000 vuid_io_key key
0000 pid : 00005b74
0004 vuid: 0065
Skipping become_unix_sec_ctx - already user
Doing \PIPE\netlogon
api_rpc_command: api_netlog_rpc op 0x4 - NET_REQCHAL
000008 net_io_q_req_chal
root is in 1 groups: 0
uid 0 registered to name root
Clearing default real name
User name: root Real name: root
uid 0 vuid 100 registered to unix name root
000000 vuid_io_key key
0000 pid : 00005b76
0004 vuid: 0064
ncalrpc_l_establish_connection: connecting to lsarpc
000004 creds_io_cmd creds
000008 vuid_io_key key
0008 pid : 00005b76
000c vuid: 0064
Bind RPC Pipe: \PIPE\lsarpc
Bind Abstract Syntax:
[000] 78 57 34 12 34 12 CD AB  EF 00 01 23 45 67 89 AB  xW4.4... ...#Eg..
[010] 00 00 00 00                                       ....
Bind Transfer Syntax:
[000] 04 5D 88 8A EB 1C C9 11  9F E8 08 00 2B 10 48 60  .]...... ....+.H`
[010] 02 00 00 00                                       ....
000000 smb_io_rpc_hdr_rb
000000 smb_io_rpc_hdr hdr
000000 smb_io_rpc_hdr hdr
rpc_check_hdr: rdata->data_size: 68
000000 smb_io_rpc_hdr rpc_hdr
rpc_check_hdr: (after smb_io_rpc_hdr call) rdata->data_size: 68
rpc_api_pipe: return OK
000000 smb_io_rpc_hdr_ba
bind_rpc_pipe: pipe_name \PIPE\lsass != expected pipe \PIPE\lsarpcd.  oh
well!
bind_rpc_pipe: accepted!
LSA Open Policy2
make_open_pol2: attr:0 da:33554432
make_lsa_obj_attr
000000 lsa_io_q_open_pol2
create_rpc_request: opnum: 0x2c data_len: 0x4c
000000 smb_io_rpc_hdr hdr
000010 smb_io_rpc_hdr_req hdr_req
000000 smb_io_rpc_hdr hdr
rpc_check_hdr: rdata->data_size: 48
000000 smb_io_rpc_hdr rpc_hdr
rpc_check_hdr: (after smb_io_rpc_hdr call) rdata->data_size: 48
000010 smb_io_rpc_hdr_resp rpc_hdr_resp
000000 lsa_io_r_open_pol2
Opened policy hnd[1] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 77 5B 00
00  .......O .L..w[..
[010] 01 00 00 00                                       ....
Found policy hnd[1] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 77 5B 00
00  .......O .L..w[..
[010] 01 00 00 00                                       ....
policy(pnum=1 ): Setting policy state
setting policy con
LSA Open Secret
make_q_open_secret
000000 lsa_io_q_open_secret
Found policy hnd[1] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 77 5B 00
00  .......O .L..w[..
[010] 01 00 00 00                                       ....
policy(pnum=1 ): Getting policy state
Getting policy con state
create_rpc_request: opnum: 0x1c data_len: 0x5c
000000 smb_io_rpc_hdr hdr
000010 smb_io_rpc_hdr_req hdr_req
000000 smb_io_rpc_hdr hdr
rpc_check_hdr: rdata->data_size: 48
000000 smb_io_rpc_hdr rpc_hdr
rpc_check_hdr: (after smb_io_rpc_hdr call) rdata->data_size: 48
000010 smb_io_rpc_hdr_resp rpc_hdr_resp
000000 lsa_io_r_open_secret
Found policy hnd[1] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 77 5B 00
00  .......O .L..w[..
[010] 01 00 00 00                                       ....
policy(pnum=1 ): Getting policy state
Getting policy con state
Found policy hnd[1] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 77 5B 00
00  .......O .L..w[..
[010] 01 00 00 00                                       ....
policy(pnum=1 ): Duplicating policy
Opened policy hnd[2] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 77 5B 00
00  .......O .L..w[..
[010] 02 00 00 00                                       ....
Found policy hnd[2] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 77 5B 00
00  .......O .L..w[..
[010] 02 00 00 00                                       ....
policy(pnum=2 ): Setting policy state
setting policy con
Found policy hnd[2] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 77 5B 00
00  .......O .L..w[..
[010] 02 00 00 00                                       ....
policy(pnum=2): setting name to LSA_OPENSECRET
LSA Query Secret
make_q_query_secret
000000 lsa_io_q_query_secret
Found policy hnd[2] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 77 5B 00
00  .......O .L..w[..
[010] 02 00 00 00                                       ....
policy(pnum=2 LSA_OPENSECRET): Getting policy state
Getting policy con state
create_rpc_request: opnum: 0x1e data_len: 0x40
000000 smb_io_rpc_hdr hdr
000010 smb_io_rpc_hdr_req hdr_req
000000 smb_io_rpc_hdr hdr
rpc_check_hdr: rdata->data_size: 96
000000 smb_io_rpc_hdr rpc_hdr
rpc_check_hdr: (after smb_io_rpc_hdr call) rdata->data_size: 96
000010 smb_io_rpc_hdr_resp rpc_hdr_resp
000000 lsa_io_r_query_secret
Found policy hnd[2] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 77 5B 00
00  .......O .L..w[..
[010] 02 00 00 00                                       ....
policy(pnum=2 LSA_OPENSECRET): Getting policy state
Getting policy con state
LSA Close
make_lsa_q_close
000000 lsa_io_q_close
Found policy hnd[2] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 77 5B 00
00  .......O .L..w[..
[010] 02 00 00 00                                       ....
policy(pnum=2 LSA_OPENSECRET): Getting policy state
Getting policy con state
create_rpc_request: opnum: 0x0 data_len: 0x2c
000000 smb_io_rpc_hdr hdr
000010 smb_io_rpc_hdr_req hdr_req
000000 smb_io_rpc_hdr hdr
rpc_check_hdr: rdata->data_size: 48
000000 smb_io_rpc_hdr rpc_hdr
rpc_check_hdr: (after smb_io_rpc_hdr call) rdata->data_size: 48
000010 smb_io_rpc_hdr_resp rpc_hdr_resp
000000 lsa_io_r_close
Found policy hnd[2] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 77 5B 00
00  .......O .L..w[..
[010] 02 00 00 00                                       ....
policy(pnum=2 LSA_OPENSECRET): Closing
LSA Close
make_lsa_q_close
000000 lsa_io_q_close
Found policy hnd[1] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 77 5B 00
00  .......O .L..w[..
[010] 01 00 00 00                                       ....
policy(pnum=1 ): Getting policy state
Getting policy con state
create_rpc_request: opnum: 0x0 data_len: 0x2c
000000 smb_io_rpc_hdr hdr
000010 smb_io_rpc_hdr_req hdr_req
000000 smb_io_rpc_hdr hdr
rpc_check_hdr: rdata->data_size: 48
000000 smb_io_rpc_hdr rpc_hdr
rpc_check_hdr: (after smb_io_rpc_hdr call) rdata->data_size: 48
000010 smb_io_rpc_hdr_resp rpc_hdr_resp
000000 lsa_io_r_close
Found policy hnd[1] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 77 5B 00
00  .......O .L..w[..
[010] 01 00 00 00                                       ....
policy(pnum=1 ): Closing
cred_session_key
clnt_chal: 594FFE929B33BCCE
srv_chal : 706B82DB3EBB57B2
clnt+srv : C9BA806ED9EE1381
sess_key : C7550EAECF493FFD
000000 net_io_r_req_chal
create_noauth_reply: data_start: 0 data_end: 12 max_tsize: 5680
000000 smb_io_rpc_hdr rhdr
000010 smb_io_rpc_hdr_resp resp
WARNING: prs_create initialised a buffer in marshalling-mode
000000 smb_io_rpc_hdr hdr
000000 smb_io_rpc_hdr hdr
000000 smb_io_rpc_hdr hdr
000000 smb_io_rpc_hdr_req req
000000 vuid_io_key key
0000 pid : 00005b74
0004 vuid: 0065
Skipping become_unix_sec_ctx - already user
Doing \PIPE\netlogon
api_rpc_command: api_netlog_rpc op 0xf - NET_AUTH2
000008 net_io_q_auth_2
cred_create
sess_key : C7550EAECF493FFD
stor_cred: 594FFE929B33BCCE
timestamp: 0
timecred : 594FFE929B33BCCE
calc_cred: 0A1F7E4741605F39
cred_assert
challenge : 0A1F7E4741605F39
calculated: 0A1F7E4741605F39
credentials check ok
cred_create
sess_key : C7550EAECF493FFD
stor_cred: 706B82DB3EBB57B2
timestamp: 0
timecred : 706B82DB3EBB57B2
calc_cred: AAA0072AB545A5A6
000000 net_io_r_auth_2
create_noauth_reply: data_start: 0 data_end: 16 max_tsize: 5680
000000 smb_io_rpc_hdr rhdr
000010 smb_io_rpc_hdr_resp resp
WARNING: prs_create initialised a buffer in marshalling-mode
000000 smb_io_rpc_hdr hdr
000000 smb_io_rpc_hdr hdr
000000 smb_io_rpc_hdr hdr
000000 smb_io_rpc_hdr_req req
000000 vuid_io_key key
0000 pid : 00005b74
0004 vuid: 0065
Skipping become_unix_sec_ctx - already user
Doing \PIPE\netlogon
api_rpc_command: api_netlog_rpc op 0x2 - NET_SAMLOGON
000008 net_io_q_sam_logon
deal_with_creds: 187
cred_create
sess_key : C7550EAECF493FFD
stor_cred: 0A1F7E4741605F39
timestamp: 3bbca52e
timecred : 38C43A8341605F39
calc_cred: 8FCC313935F2AF88
cred_assert
challenge : 8FCC313935F2AF88
calculated: 8FCC313935F2AF88
credentials check ok
deal_with_creds: new_cred[0]=833ac439
deal_with_creds: new_clnt_time=3bbca52f
cred_create
sess_key : C7550EAECF493FFD
stor_cred: 0A1F7E4741605F39
timestamp: 3bbca52f
timecred : 39C43A8341605F39
calc_cred: E4F46E3A02FEC4F6
deal_with_creds: clnt_cred=0A1F7E4741605F39
SAM Logon (Network). Domain:[MCONNEXION] User:[ROOT]
Opened policy hnd[3] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 76 5B 00
00  .......O .L..v[..
[010] 01 00 00 00                                       ....
Found policy hnd[3] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 76 5B 00
00  .......O .L..v[..
[010] 01 00 00 00                                       ....
policy(pnum=3): setting name to sam_connect
Found policy hnd[3] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 76 5B 00
00  .......O .L..v[..
[010] 01 00 00 00                                       ....
Found policy hnd[3] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 76 5B 00
00  .......O .L..v[..
[010] 01 00 00 00                                       ....
Getting policy vuser_key pnum=3 pid=23412 vuid=65
Opened policy hnd[4] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 76 5B 00
00  .......O .L..v[..
[010] 02 00 00 00                                       ....
Found policy hnd[4] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 76 5B 00
00  .......O .L..v[..
[010] 02 00 00 00                                       ....
policy(pnum=4): setting name to sam_domain
Setting policy sid=S-1-5-21-737654797-3007802452-2889425168
Found policy hnd[4] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 76 5B 00
00  .......O .L..v[..
[010] 02 00 00 00                                       ....
policy(pnum=4 sam_domain): Setting policy state
Service setting policy sid=S-1-5-21-737654797-3007802452-2889425168
_samr_open_domain: 262
samr_lookup_names: 1513
Found policy hnd[4] [000] 00 00 00 00 00 0B AA 4F  FF 4C C1 01 76 5B 00
00  .......O .L..v[..
[010] 02 00 00 00                                       ....
policy(pnum=4 sam_domain): Getting policy state
Getting policy sid=S-1-5-21-737654797-3007802452-2889425168
pol_sid: MCONNEXION (S-1-5-21-737654797-3007802452-2889425168)
Connected to LDAP server
Searching in [dc=mconnexion,dc=com] for [(&(ntuid=ROOT)
(objectclass=sambaAccount))] with scope [2]
1 matching entries found
get: [uid] = [root]
Retrieving account [root]
get: [uidNumber] = [0]
get: [ntuid] = [root]
get: [rid] = [1f4]
get: [acctFlags] = [[U          ]]
get: [lmPassword] = [B45AE75B29647E5CAAD3B435B51404EE]
get: [ntPassword] = [18B9C48CB9A75535058BA36BDC3F3154]
get: [pwdLastSet] = [3bbc8893]
getsamfile21pwent
get: [gidNumber] = [0]
get: [grouprid] = [200]
get: [cn] = [root]
get: [description] = [Mconnexion.com user]
get: [smbHome] = [\\%N\%U\Profile]
get: [homeDrive] = [H:]
get: [script] = [logon.bat]
get: [profile] = [\\%N\%U]
get: [pwdCanChange] = [3A2CEBFF]
get: [pwdMustChange] = [FFFFFFFF]
get: [logonTime] = [00000000]
get: [logoffTime] = [00000000]
get: [kickoffTime] = [00000000]
Home server: ken
===============================================================
INTERNAL ERROR: Signal 11 in pid 23414 (TNG-alpha)
Please read the file BUGS.txt in the distribution
===============================================================
Stack backtrace:
/usr/local/samba-tng/lib/libsamba.so.0(generate_backtrace+0x29)
[0x400dc219]
/usr/local/samba-tng/lib/libsamba.so.0 [0x400dc069]
/usr/local/samba-tng/lib/libsamba.so.0 [0x400dc186]
/lib/libc.so.6 [0x402898d8]
/usr/local/samba-tng/lib/libsamba.so.0 [0x400e76ba]
/usr/local/samba-tng/lib/libsamba.so.0(standard_sub_vuser+0x32)
[0x400e77a2]
/usr/local/samba-tng/lib/libsmbpw.so.0 [0x4018dbf2]
/usr/local/samba-tng/lib/libsmbpw.so.0 [0x4018df69]
/usr/local/samba-tng/lib/libsmbpw.so.0(getsam21pwntnam+0x27) [0x4018c65f]
/usr/local/samba-tng/lib/libsamrpass.so.0 [0x401797b3]
/usr/local/samba-tng/lib/libsamrpass.so.0 [0x401798ee]
/usr/local/samba-tng/lib/libsamrpass.so.0(lookup_name+0x40) [0x4017994c]
/usr/local/samba-tng/lib/libsamrpass.so.0(_samr_lookup_names+0x28c)
[0x4017ca3c]
/usr/local/samba-tng/sbin/netlogond [0x804f03c]
/usr/local/samba-tng/sbin/netlogond [0x8050c84]
/usr/local/samba-tng/sbin/netlogond [0x8051b2f]
/usr/local/samba-tng/sbin/netlogond [0x8053fc9]
/usr/local/samba-tng/sbin/netlogond [0x8054098]
/usr/local/samba-tng/sbin/netlogond [0x8051ccf]
/usr/local/samba-tng/sbin/netlogond [0x8053972]
/usr/local/samba-tng/sbin/netlogond [0x8053cd2]
/usr/local/samba-tng/sbin/netlogond [0x8054189]
/usr/local/samba-tng/sbin/netlogond [0x804d43d]
/usr/local/samba-tng/sbin/netlogond [0x804dce5]
/usr/local/samba-tng/sbin/netlogond(main+0x598) [0x804d250]
/lib/libc.so.6(__libc_start_main+0xbb) [0x402796ef]
/usr/local/samba-tng/sbin/netlogond(get_trusted_serverlist+0x3d)
[0x804c521]
This program is now stopped for 60 seconds.
You can use this time to attach gdb to this process.
The command to do so is probably:
gdb /usr/local/samba-tng/sbin/DAEMON 23414
At the (gdb) prompt, please type `bt'.
If you're done with gdb, you can type
`kill' and `quit'.



--
nihil back



-----------------------------------------
This email was sent using SquirrelMail.
   "Webmail for nuts!"
http://squirrelmail.org/






More information about the samba-ntdom mailing list