[Bug 1257186] Re: memory leakage messages (no talloc stackframe)

Chris J Arges 1257186 at bugs.launchpad.net
Wed Jul 1 15:31:27 UTC 2015


Hello Doug, or anyone else affected,

Accepted samba into trusty-proposed. The package will build now and be
available at https://launchpad.net/ubuntu/+source/samba/2:4.1.6+dfsg-
1ubuntu2.14.04.8 in a few hours, and then in the -proposed repository.

Please help us by testing this new package.  See
https://wiki.ubuntu.com/Testing/EnableProposed for documentation how to
enable and use -proposed.  Your feedback will aid us getting this update
out to other Ubuntu users.

If this package fixes the bug for you, please add a comment to this bug,
mentioning the version of the package you tested, and change the tag
from verification-needed to verification-done. If it does not fix the
bug for you, please add a comment stating that, and change the tag to
verification-failed.  In either case, details of your testing will help
us make a better decision.

Further information regarding the verification process can be found at
https://wiki.ubuntu.com/QATeam/PerformingSRUVerification .  Thank you in
advance!

** Changed in: samba (Ubuntu Trusty)
       Status: In Progress => Fix Committed

** Tags added: verification-needed

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1257186

Title:
  memory leakage messages (no talloc stackframe)

Status in One Hundred Papercuts:
  New
Status in Samba:
  Fix Released
Status in samba package in Ubuntu:
  Fix Released
Status in samba source package in Trusty:
  Fix Committed
Status in samba package in Debian:
  New

Bug description:
  [Impact]

   * Warning messages related to memory leaks "no talloc stackframe at"
     are present at login and other PAM services when libpam-smbpass is
     installed.

   * Backporting the fix resolves the warning messages and memory leak.

   * The upload incorporates the upstream fix from Samba.

  [Test Case]

   * On a Trusty 14.04 system:
     1. sudo apt-get install libpam-smbpass
     2. sudo passwd <user on the system>
     3. if bug is present in samba, then the output looks like:

  % sudo passwd <user>
  no talloc stackframe at ../source3/param/loadparm.c:4864, leaking memory
  Enter new UNIX password: 

     4. After applying the updated packages the 'no talloc stackframe at'
     message is no longer present during step 2.

  
  [Regression Potential] 

   * The changes are in the area of samba password authentication so it
  would be worth exercising Samba client password manipulation.


  [Original Description]
  This message appears a lot as of a recent update to samba (Trusty development branch):

  no talloc stackframe at ../source3/param/loadparm.c:4831, leaking
  memory

  From this upstream bug report, I am lead to believe the issue is in
  libpam-smbpass, but I don't really know for sure.

  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728666

  I am filing this bug report mainly so that I can refer to it on the
  testing tracker as an issue, while still setting the test case to
  pass. Note that other than the error message itself, I am not aware of
  any bad side effect.

  doug at v32-serv04:~$ lsb_release -a
  No LSB modules are available.
  Distributor ID: Ubuntu
  Description:    Ubuntu Trusty Tahr (development branch)
  Release:        14.04
  Codename:       trusty

To manage notifications about this bug go to:
https://bugs.launchpad.net/hundredpapercuts/+bug/1257186/+subscriptions



More information about the foundations-bugs mailing list