[Samba] Issues after upgrade to 3.0.6 from 3.0.4; fixed in 3.0.7?

Alex de Vaal a.vaal at nh-hotels.com
Wed Sep 1 15:42:19 GMT 2004


Hello,
 
I run samba 3.0.4 on a RHL9 server. Samba is a domain member of a W2k3 ADS
and I use CUPS as printing mechanism; therefore Samba is compiled with
Kerberos 1.3.1-7 and cups-devel.
 
3.0.4 runs pretty good, printing via CUPS runs well too, only the following
messages I see constantly (this flooding my logs) while using 3.0.4:
 
winbindd.log
=========
[2004/07/27 16:07:04, 1] nsswitch/winbindd_group.c:winbindd_getgroups(1059)
  user 'root' does not exist 
 
<ip address>.log
============
[2004/07/27 16:17:13, 0] smbd/connection.c:register_message_flags(220)
  register_message_flags: tdb_fetch failed 
 
 
Here are some issues I faced after the upgrade to 3.0.6 from 3.0.4:
 
- "user 'root' does not exist" and "register_message_flags: tdb_fetch
failed" messages are not gone in 3.0.6
 
- The biggest issue is however CUPS; while my smb.conf file wasn't changed
(of course verified with testparm), but since the upgrade the log files are
flooded with these messages:
[2004/09/01 16:16:10, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]

My XP clients (sp1), that get their printers installed via the ADS logon
script (e.g. \\DUSSEL.XXX.COM\DUSSEL_LASER01 ) now get 2 printers installed:
"DUSSEL_LASER01 on dussel" and "DUSSEL_LASER01 on 192.168.100.151"
How is this possible? When I downgrade to 3.0.4 everything is the same as it
used to be. I know that a change in 3.0.6 is that different CUPS servers can
be used for printing, which is probably the cause of this behavior between
CUPS and Samba (?).

Fortunately printing is working normally. The flooding of my log files with
this new CUPS behavior in Samba is however terrible, just a login of 1
client produces this in the log file of the client (The client gets 3 shares
and 2 printers installed via the logon script):

[2004/09/01 16:15:49, 1] smbd/service.c:make_connection_snum(648)
  192.168.100.2 (192.168.100.2) connect to service fo1.dussel initially as
user NH-HOTELES\fo1.dussel (uid=10169, gid=10000) (pid 1143)
[2004/09/01 16:16:09, 1] smbd/service.c:make_connection_snum(648)
  192.168.100.2 (192.168.100.2) connect to service grp initially as user
NH-HOTELES\fo1.dussel (uid=10169, gid=10000) (pid 1143)
[2004/09/01 16:16:09, 1] smbd/service.c:make_connection_snum(648)
  192.168.100.2 (192.168.100.2) connect to service pub initially as user
NH-HOTELES\fo1.dussel (uid=10169, gid=10000) (pid 1143)
[2004/09/01 16:16:10, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:10, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:10, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:10, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:10, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:10, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:19, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:19, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:19, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:19, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:19, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:19, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER02]
[2004/09/01 16:16:19, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER02]
[2004/09/01 16:16:19, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER02]
[2004/09/01 16:16:19, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:19, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:19, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER02]
[2004/09/01 16:16:19, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER02]
[2004/09/01 16:16:19, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER02]
[2004/09/01 16:16:20, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER02]
[2004/09/01 16:16:23, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:24, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER02]
[2004/09/01 16:16:24, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER02]
[2004/09/01 16:16:25, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER02]
[2004/09/01 16:16:25, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:25, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:25, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:25, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:25, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:25, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:25, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:25, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:25, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:16:25, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER02]
[2004/09/01 16:17:12, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:17:12, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:17:12, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER02]
[2004/09/01 16:17:12, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:17:13, 0] smbd/connection.c:register_message_flags(220)
  register_message_flags: tdb_fetch failed
[2004/09/01 16:17:13, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01]
[2004/09/01 16:17:13, 0] lib/util_str.c:safe_strcpy_fn(600)
  ERROR: string overflow by 1 (32 - 31) in safe_strcpy
[\\192.168.100.151\DUSSEL_LASER01] 

Is there any way I can change this CUPS behaviour in 3.0.6? Or some things
will be changed in 3.0.7? 

-- 
Regards, 

Alex de Vaal. 


(sorry for the stupid disclaimer; this is put by our mail server, not by me
;)


Visit our Web site: http://www.nh-hotels.com
This message is from NH HOTELES and it is private and confidential.
Its content may be legally protected.Reception by a non-intended person does not waive legal protection rights.
If you receive this message by mistake, please delete it from your system and report the sender.
Although this message has been cleared for viruses using currently available virus definitions before sending,
it is the responsibility of the receiver to ensure it is virus-free.Thank you.

 


More information about the samba mailing list