[Bug 1257186] Re: memory leakage messages (no talloc stackframe)

Ryan Harper 1257186 at bugs.launchpad.net
Wed Jun 24 15:06:45 UTC 2015


** Description changed:

- This message appears a lot as of a recent update to samba (Trusty
- development branch):
+ [Impact]
+ 
+  * Warning messages related to memory leaks "no talloc stackframe at"
+    are present at login and other PAM services when libpam-smbpass is
+    installed.
+ 
+  * Backporting the fix resolves the warning messages and memory leak.
+ 
+  * The upload incorporates the upstream fix from Samba.
+ 
+ [Test Case]
+ 
+  * On a Trusty 14.04 system:
+    1. sudo apt-get install libpam-smbpass
+    2. sudo passwd <user on the system>
+    3. if bug is present in samba, then the output looks like:
+ 
+ % sudo passwd <user>
+ no talloc stackframe at ../source3/param/loadparm.c:4864, leaking memory
+ Enter new UNIX password: 
+ 
+    4. After applying the updated packages the 'no talloc stackframe at'
+    message is no longer present during step 2.
+ 
+ 
+ [Regression Potential] 
+ 
+  * The changes are in the area of samba password authentication so it
+ would be worth exercising Samba client password manipulation.
+ 
+ 
+ [Original Description]
+ This message appears a lot as of a recent update to samba (Trusty development branch):
  
  no talloc stackframe at ../source3/param/loadparm.c:4831, leaking memory
  
  From this upstream bug report, I am lead to believe the issue is in
  libpam-smbpass, but I don't really know for sure.
  
  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728666
  
  I am filing this bug report mainly so that I can refer to it on the
  testing tracker as an issue, while still setting the test case to pass.
  Note that other than the error message itself, I am not aware of any bad
  side effect.
  
  doug at v32-serv04:~$ lsb_release -a
  No LSB modules are available.
  Distributor ID: Ubuntu
  Description:    Ubuntu Trusty Tahr (development branch)
  Release:        14.04
  Codename:       trusty

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1257186

Title:
  memory leakage messages (no talloc stackframe)

Status in One Hundred Papercuts:
  New
Status in Samba:
  Fix Released
Status in samba package in Ubuntu:
  Triaged
Status in samba source package in Trusty:
  Confirmed
Status in samba package in Debian:
  New

Bug description:
  [Impact]

   * Warning messages related to memory leaks "no talloc stackframe at"
     are present at login and other PAM services when libpam-smbpass is
     installed.

   * Backporting the fix resolves the warning messages and memory leak.

   * The upload incorporates the upstream fix from Samba.

  [Test Case]

   * On a Trusty 14.04 system:
     1. sudo apt-get install libpam-smbpass
     2. sudo passwd <user on the system>
     3. if bug is present in samba, then the output looks like:

  % sudo passwd <user>
  no talloc stackframe at ../source3/param/loadparm.c:4864, leaking memory
  Enter new UNIX password: 

     4. After applying the updated packages the 'no talloc stackframe at'
     message is no longer present during step 2.

  
  [Regression Potential] 

   * The changes are in the area of samba password authentication so it
  would be worth exercising Samba client password manipulation.


  [Original Description]
  This message appears a lot as of a recent update to samba (Trusty development branch):

  no talloc stackframe at ../source3/param/loadparm.c:4831, leaking
  memory

  From this upstream bug report, I am lead to believe the issue is in
  libpam-smbpass, but I don't really know for sure.

  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728666

  I am filing this bug report mainly so that I can refer to it on the
  testing tracker as an issue, while still setting the test case to
  pass. Note that other than the error message itself, I am not aware of
  any bad side effect.

  doug at v32-serv04:~$ lsb_release -a
  No LSB modules are available.
  Distributor ID: Ubuntu
  Description:    Ubuntu Trusty Tahr (development branch)
  Release:        14.04
  Codename:       trusty

To manage notifications about this bug go to:
https://bugs.launchpad.net/hundredpapercuts/+bug/1257186/+subscriptions



More information about the foundations-bugs mailing list