(no subject)

root root at cadfiles.fairfield.intermec.com
Tue Nov 20 14:38:17 GMT 2001


From: "Daniel Deimert" <d1dd at dtek.chalmers.se>
Subject: BUG: winbindd dumps core on redhat 7.2 (SAMBA_2_2 cvs 20 nov)

Samba team,

I would like to file a bug report: 

	winbindd from SAMBA_2_2 cvs dumps core on redhat 7.2.

This bug report is a followup of my previous report that samba 2.2.2
winbindd fails read all groups from a NT4 PDC controlled domain.

samba sources were checked out on Nov 20 with

 cvs -z5 -d :pserver:cvs at pserver.samba.org:/cvsroot co -r SAMBA_2_2 samba

samba was compiled using the build-rpms script in the packages directory.
up2date was run on the redhat system before compiling.

Please contact me directly by e-mail if you would like me to compile
and test any patches.



GNU gdb Red Hat Linux 7.x (5.0rh-15) (MI_OUT)
Copyright 2001 Free Software Foundation, Inc.
GDB is free software, covered by the GNU General Public License, and you are
welcome to change it and/or distribute copies of it under certain conditions.
Type "show copying" to see the conditions.
There is absolutely no warranty for GDB.  Type "show warranty" for details.
This GDB was configured as "i386-redhat-linux"...
(no debugging symbols found)...
(gdb) run winbind -d 10 -i
Starting program: /usr/sbin/winbindd winbind -d 10 -i
INFO: Debug class all level = 10   (pid 21380 from pid 21380)
doing parameter winbind separator = +
doing parameter winbind uid = 10000-20000
doing parameter winbind gid = 10000-20000
doing parameter winbind enum users = yes
doing parameter winbind enum groups = yes
doing parameter template shell = /bin/false
doing parameter template homedir = /home/%D/%U
doing parameter workgroup = FAIRFIELD
doing parameter server string = Samba Server
doing parameter hosts allow = 192.168. 10. 127.
doing parameter printcap name = /etc/printcap
doing parameter load printers = yes
doing parameter log file = /var/log/samba/log.%m
doing parameter max log size = 50
doing parameter security = domain
doing parameter password server = IMT_PDC *
doing parameter encrypt passwords = yes
doing parameter socket options = TCP_NODELAY SO_RCVBUF=8192 SO_SNDBUF=8192
doing parameter dns proxy = no
Processing section "[homes]"
doing parameter comment = Home Directories
doing parameter browseable = no
doing parameter writable = yes
Processing section "[printers]"
doing parameter comment = All Printers
doing parameter path = /var/spool/samba
doing parameter browseable = no
doing parameter guest ok = no
doing parameter writable = no
doing parameter printable = yes
Processing section "[cadfiles]"
doing parameter comment = Fairfield CAD files
doing parameter path = /home/CADFILES
doing parameter public = no
doing parameter read list = @FAIRFIELD+cadread
doing parameter write list = @FAIRFIELD+Cadcreate
pm_process() returned Yes
adding IPC service IPC$
adding IPC service ADMIN$
added interface ip=192.168.10.9 bcast=192.168.10.255 nmask=255.255.255.0
added interface ip=192.168.10.9 bcast=192.168.10.255 nmask=255.255.255.0
getting trusted domain list
Creating get_dc_name_cache entry for FAIRFIELD
resolve_lmhosts: Attempting lmhosts lookup for name FAIRFIELD<0x1c>
getlmhostsent: lmhost entry: 127.0.0.1 localhost 
resolve_wins: Attempting wins lookup for name FAIRFIELD<0x1c>
wins_srv_count: WINS status: 0 servers.
resolve_wins: WINS server resolution selected and no WINS servers listed.
name_resolve_bcast: Attempting broadcast lookup for name FAIRFIELD<0x1c>
bind succeeded on port 0
socket option SO_KEEPALIVE = 0
socket option SO_REUSEADDR = 1
socket option SO_BROADCAST = 1
Could not test socket option TCP_NODELAY.
socket option IPTOS_LOWDELAY = 0
socket option IPTOS_THROUGHPUT = 0
socket option SO_SNDBUF = 65535
socket option SO_RCVBUF = 65535
socket option SO_SNDLOWAT = 1
socket option SO_RCVLOWAT = 1
socket option SO_SNDTIMEO = 0
socket option SO_RCVTIMEO = 0
Sending a packet of len 50 to (192.168.10.255) on port 137
read_udp_socket: lastip 192.168.10.28 lastport 137 read: 62
parse_nmb: packet id = 973
Received a packet of len 62 from (192.168.10.28) port 137
nmb packet from 192.168.10.28(137) header: id=973 opcode=Query(0) response=Yes
    header: flags: bcast=No rec_avail=No rec_des=Yes trunc=No auth=Yes
    header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0
    answers: nmb_name=FAIRFIELD<1c> rr_type=32 rr_class=1 ttl=300000
    answers   0 char ......   hex E000C0A80A1C
Got a positive name query response from 192.168.10.28 ( 192.168.10.28 )
read_udp_socket: lastip 192.168.10.11 lastport 31734 read: 58
parse_nmb: packet id = 973
Received a packet of len 58 from (192.168.10.11) port 31734
nmb packet from 192.168.10.11(31734) header: id=973 opcode=WACK(7) response=Yes
    header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes
    header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0
    answers: nmb_name=FAIRFIELD<1c> rr_type=32 rr_class=1 ttl=10
    answers   0 char ..   hex 0100
bind succeeded on port 0
Sending a packet of len 50 to (192.168.10.28) on port 137
read_udp_socket: lastip 192.168.10.28 lastport 137 read: 283
parse_nmb: packet id = 27970
Received a packet of len 283 from (192.168.10.28) port 137
nmb packet from 192.168.10.28(137) header: id=27970 opcode=Query(0) response=Yes
    header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes
    header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0
    answers: nmb_name=*<00> rr_type=33 rr_class=1 ttl=0
    answers   0 char .IMT_BDC           hex 09494D545F4244432020202020202020
    answers  10 char .D.IMT_BDC         hex 004400494D545F424443202020202020
    answers  20 char    D.FAIRFIELD     hex 2020204400464149524649454C442020
    answers  30 char     ...FAIRFIELD   hex 2020202000C400464149524649454C44
    answers  40 char       ...IMT_BDC   hex 2020202020201CC400494D545F424443
    answers  50 char         .D.SMS&_   hex 2020202020202020034400534D53265F
    answers  60 char IMT_BDC   .D.INe   hex 494D545F424443202020034400494E65
    answers  70 char t~Services  ...I   hex 747E536572766963657320201CC40049
    answers  80 char S~IMT_BDC......D   hex 537E494D545F42444300000000000044
    answers  90 char .FAIRFIELD         hex 00464149524649454C44202020202020
    answers  a0 char ........I.......   hex 1EC40000A0C9ECD64900000000000000
    answers  b0 char ................   hex 00000000000000000000000000000000
    answers  c0 char ................   hex 00000000000000000000000000000000
    answers  d0 char .   hex 00
resolve_srv_name: IMT_BDC
resolve_lmhosts: Attempting lmhosts lookup for name IMT_BDC<0x20>
getlmhostsent: lmhost entry: 127.0.0.1 localhost 
resolve_hosts: Attempting host lookup for name IMT_BDC<0x20>
resolve_wins: Attempting wins lookup for name IMT_BDC<0x20>
wins_srv_count: WINS status: 0 servers.
resolve_wins: WINS server resolution selected and no WINS servers listed.
name_resolve_bcast: Attempting broadcast lookup for name IMT_BDC<0x20>
bind succeeded on port 0
socket option SO_KEEPALIVE = 0
socket option SO_REUSEADDR = 1
socket option SO_BROADCAST = 1
Could not test socket option TCP_NODELAY.
socket option IPTOS_LOWDELAY = 0
socket option IPTOS_THROUGHPUT = 0
socket option SO_SNDBUF = 65535
socket option SO_RCVBUF = 65535
socket option SO_SNDLOWAT = 1
socket option SO_RCVLOWAT = 1
socket option SO_SNDTIMEO = 0
socket option SO_RCVTIMEO = 0
Sending a packet of len 50 to (192.168.10.255) on port 137
read_udp_socket: lastip 192.168.10.28 lastport 137 read: 62
parse_nmb: packet id = 8600
Received a packet of len 62 from (192.168.10.28) port 137
nmb packet from 192.168.10.28(137) header: id=8600 opcode=Query(0) response=Yes
    header: flags: bcast=No rec_avail=No rec_des=Yes trunc=No auth=Yes
    header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0
    answers: nmb_name=IMT_BDC<20> rr_type=32 rr_class=1 ttl=300000
    answers   0 char `.....   hex 6000C0A80A1C
Got a positive name query response from 192.168.10.28 ( 192.168.10.28 )
read_udp_socket: lastip 192.168.10.11 lastport 31739 read: 58
parse_nmb: packet id = 8600
Received a packet of len 58 from (192.168.10.11) port 31739
nmb packet from 192.168.10.11(31739) header: id=8600 opcode=WACK(7) response=Yes
    header: flags: bcast=No rec_avail=No rec_des=No trunc=No auth=Yes
    header: rcode=0 qdcount=0 ancount=1 nscount=0 arcount=0
    answers: nmb_name=IMT_BDC<20> rr_type=32 rr_class=1 ttl=10
    answers   0 char ..   hex 0100
cli_init_creds: user  domain  flgs: 0
ntlmssp_cli_flgs:0
cli_establish_connection: CADFILES<00> connecting to IMT_BDC<20> (192.168.10.28) -  []
Connecting to 192.168.10.28 at port 445
error connecting to 192.168.10.28:445 (Connection refused)
Connecting to 192.168.10.28 at port 139
socket option SO_KEEPALIVE = 0
socket option SO_REUSEADDR = 0
socket option SO_BROADCAST = 0
socket option TCP_NODELAY = 1
socket option IPTOS_LOWDELAY = 0
socket option IPTOS_THROUGHPUT = 0
socket option SO_SNDBUF = 16384
socket option SO_RCVBUF = 16384
socket option SO_SNDLOWAT = 1
socket option SO_RCVLOWAT = 1
socket option SO_SNDTIMEO = 0
socket option SO_RCVTIMEO = 0
write_socket(6,76)
write_socket(6,76) wrote 76
Sent session request
got smb length of 0
size=0
smb_com=0x0
smb_rcls=0
smb_reh=0
smb_err=0
smb_flg=0
smb_flg2=0
smb_tid=0
smb_pid=0
smb_uid=0
smb_mid=0
smt_wct=0
smb_bcc=0
write_socket(6,168)
write_socket(6,168) wrote 168
got smb length of 97
size=97
smb_com=0x72
smb_rcls=0
smb_reh=0
smb_err=0
smb_flg=136
smb_flg2=1
smb_tid=0
smb_pid=21380
smb_uid=0
smb_mid=1
smt_wct=17
smb_vwv[0]=7 (0x7)
smb_vwv[1]=12803
Program received signal SIGSEGV, Segmentation fault.
0x0807153c in chroot ()
(gdb) bt
#0  0x0807153c in chroot ()
#1  0x081534f0 in ?? () at eval.c:41
#2  0x0808c6cc in chroot ()
#3  0x080814fc in chroot ()
#4  0x08082235 in chroot ()
#5  0x0805323e in chroot ()
#6  0x08053494 in chroot ()
#7  0x08050254 in chroot ()
#8  0x0804c4f0 in chroot ()
#9  0x40064306 in __libc_start_main (main=0x804c310 <chroot+4004>, argc=5, 
    ubp_av=0xbffffb14, init=0x804a6a4 <_init>, fini=0x80cf390 <_fini>, 
    rtld_fini=0x4000d2cc <_dl_fini>, stack_end=0xbffffb0c)
    at ../sysdeps/generic/libc-start.c:129
(gdb) quit
The program is running.  Exit anyway? (y or n) 




More information about the samba-technical mailing list