[Bug 1257186] Re: memory leakage messages (no talloc stackframe)
Chris J Arges
1257186 at bugs.launchpad.net
Wed Jul 1 15:31:27 UTC 2015
Hello Doug, or anyone else affected,
Accepted samba into trusty-proposed. The package will build now and be
available at https://launchpad.net/ubuntu/+source/samba/2:4.1.6+dfsg-
1ubuntu2.14.04.8 in a few hours, and then in the -proposed repository.
Please help us by testing this new package. See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
enable and use -proposed. Your feedback will aid us getting this update
out to other Ubuntu users.
If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested, and change the tag
from verification-needed to verification-done. If it does not fix the
bug for you, please add a comment stating that, and change the tag to
verification-failed. In either case, details of your testing will help
us make a better decision.
Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification . Thank you in
advance!
** Changed in: samba (Ubuntu Trusty)
Status: In Progress => Fix Committed
** Tags added: verification-needed
--
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
Status in One Hundred Papercuts:
New
Status in Samba:
Fix Released
Status in samba package in Ubuntu:
Fix Released
Status in samba source package in Trusty:
Fix Committed
Status in samba package in Debian:
New
Bug description:
[Impact]
* Warning messages related to memory leaks "no talloc stackframe at"
are present at login and other PAM services when libpam-smbpass is
installed.
* Backporting the fix resolves the warning messages and memory leak.
* The upload incorporates the upstream fix from Samba.
[Test Case]
* On a Trusty 14.04 system:
1. sudo apt-get install libpam-smbpass
2. sudo passwd <user on the system>
3. if bug is present in samba, then the output looks like:
% sudo passwd <user>
no talloc stackframe at ../source3/param/loadparm.c:4864, leaking memory
Enter new UNIX password:
4. After applying the updated packages the 'no talloc stackframe at'
message is no longer present during step 2.
[Regression Potential]
* The changes are in the area of samba password authentication so it
would be worth exercising Samba client password manipulation.
[Original Description]
This message appears a lot as of a recent update to samba (Trusty development branch):
no talloc stackframe at ../source3/param/loadparm.c:4831, leaking
memory
From this upstream bug report, I am lead to believe the issue is in
libpam-smbpass, but I don't really know for sure.
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728666
I am filing this bug report mainly so that I can refer to it on the
testing tracker as an issue, while still setting the test case to
pass. Note that other than the error message itself, I am not aware of
any bad side effect.
doug at v32-serv04:~$ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu Trusty Tahr (development branch)
Release: 14.04
Codename: trusty
To manage notifications about this bug go to:
https://bugs.launchpad.net/hundredpapercuts/+bug/1257186/+subscriptions
More information about the foundations-bugs
mailing list