memory leakage messages (no talloc stackframe)
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
One Hundred Papercuts |
Fix Released
|
Undecided
|
Unassigned | ||
samba |
Fix Released
|
Medium
|
|||
samba (Debian) |
Fix Released
|
Unknown
|
|||
samba (Ubuntu) |
Fix Released
|
High
|
Unassigned | ||
Trusty |
Fix Released
|
High
|
Unassigned |
Bug Description
[Impact]
* Warning messages related to memory leaks "no talloc stackframe at"
are present at login and other PAM services when libpam-smbpass is
installed.
* Backporting the fix resolves the warning messages and memory leak.
* The upload incorporates the upstream fix from Samba.
[Test Case]
* On a Trusty 14.04 system:
1. sudo apt-get install libpam-smbpass
2. sudo passwd <user on the system>
3. if bug is present in samba, then the output looks like:
% sudo passwd <user>
no talloc stackframe at ../source3/
Enter new UNIX password:
4. After applying the updated packages the 'no talloc stackframe at'
message is no longer present during step 2.
[Regression Potential]
* The changes are in the area of samba password authentication so it would be worth exercising Samba client password manipulation.
[Original Description]
This message appears a lot as of a recent update to samba (Trusty development branch):
no talloc stackframe at ../source3/
From this upstream bug report, I am lead to believe the issue is in libpam-smbpass, but I don't really know for sure.
http://
I am filing this bug report mainly so that I can refer to it on the testing tracker as an issue, while still setting the test case to pass. Note that other than the error message itself, I am not aware of any bad side effect.
doug@v32-serv04:~$ lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description: Ubuntu Trusty Tahr (development branch)
Release: 14.04
Codename: trusty
Changed in samba (Ubuntu): | |
importance: | Undecided → Medium |
Changed in samba (Debian): | |
status: | Unknown → New |
Changed in samba: | |
importance: | Unknown → Medium |
status: | Unknown → Confirmed |
Changed in samba: | |
status: | Confirmed → In Progress |
Changed in samba (Ubuntu Trusty): | |
milestone: | none → ubuntu-14.04.1 |
status: | New → Triaged |
importance: | Undecided → Medium |
Changed in samba (Ubuntu Trusty): | |
status: | Triaged → In Progress |
Changed in samba (Ubuntu): | |
status: | Confirmed → Triaged |
Changed in samba (Ubuntu): | |
importance: | Medium → High |
Changed in samba (Ubuntu Trusty): | |
importance: | Medium → High |
Changed in samba: | |
status: | In Progress → Fix Released |
Changed in samba (Ubuntu Trusty): | |
milestone: | ubuntu-14.04.1 → ubuntu-14.04.2 |
tags: | added: patch |
summary: |
- memory leakage messages + memory leakage messages (no talloc stackframe) |
Changed in samba (Ubuntu Trusty): | |
status: | New → Confirmed |
description: | updated |
Changed in samba (Ubuntu): | |
status: | Triaged → Fix Released |
tags: |
added: verification-done removed: verification-needed |
Changed in hundredpapercuts: | |
status: | New → Fix Released |
Changed in samba (Debian): | |
status: | New → Fix Released |
This bug has been reported on the Ubuntu ISO testing tracker.
A list of all reports related to this bug can be found here: iso.qa. ubuntu. com/qatracker/ reports/ bugs/1257186
http://