And the same with source references --- source code stack trace --- #0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:51 [Error: raise.c was not found in source tree] #1 0x00007f10b3933801 in __GI_abort () at abort.c:79 [Error: abort.c was not found in source tree] #2 0x00007f10b50ceca2 in dump_core () at ../source3/lib/dumpcore.c:338 333: /* Ensure we don't have a signal handler for abort. */ 334: #ifdef SIGABRT 335: CatchSignal(SIGABRT, SIG_DFL); 336: #endif 337: 338: abort(); 339: 340: #else /* DUMP_CORE */ 341: exit(1); 342: #endif /* DUMP_CORE */ 343: } #3 0x00007f10b50bbb6b in smb_panic_s3 (why=) at ../source3/lib/util.c:838 833: i += 2; /* skip two chars */ 834: } 835: 836: for (; i+1 < strhex_len && strhex[i] != 0 && strhex[i+1] != 0; i++) { 837: p1 = strchr(hexchars, toupper((unsigned char)strhex[i])); 838: if (p1 == NULL) { 839: break; 840: } 841: 842: i++; /* next hex digit */ 843: #4 0x00007f10b71a48cf in smb_panic (why=why@entry=0x7f10b71f2d37 "internal error") at ../lib/util/fault.c:166 161: Something really nasty happened - panic ! 162: **/ 163: _PUBLIC_ void smb_panic(const char *why) 164: { 165: if (fault_state.panic_handler) { 166: fault_state.panic_handler(why); 167: _exit(1); 168: } 169: smb_panic_default(why); 170: } #5 0x00007f10b71a4ae6 in fault_report (sig=) at ../lib/util/fault.c:83 78: DEBUGSEP(0); 79: DEBUG(0,("INTERNAL ERROR: Signal %d in pid %d (%s)",sig,(int)getpid(),SAMBA_VERSION_STRING)); 80: DEBUG(0,("\nPlease read the Trouble-Shooting section of the Samba HOWTO\n")); 81: DEBUGSEP(0); 82: 83: smb_panic("internal error"); 84: 85: /* smb_panic() never returns, so this is really redundant */ 86: exit(1); 87: } 88: #6 sig_fault (sig=) at ../lib/util/fault.c:94 89: /**************************************************************************** 90: catch serious errors 91: ****************************************************************************/ 92: static void sig_fault(int sig) 93: { 94: fault_report(sig); 95: } 96: 97: /******************************************************************* 98: setup our fault handlers 99: ********************************************************************/ #7 #8 __strlen_sse2 () at ../sysdeps/x86_64/multiarch/../strlen.S:120 [Error: strlen.S was not found in source tree] #9 0x00007f10b719d4fe in push_ucs2_talloc (ctx=ctx@entry=0x0, dest=dest@entry=0x7ffe76d586a8, src=src@entry=0x0, converted_size=converted_size@entry=0x7ffe76d586a0) at ../lib/util/charset/pull_push.c:41 36: * converted. 37: **/ 38: bool push_ucs2_talloc(TALLOC_CTX *ctx, smb_ucs2_t **dest, const char *src, 39: size_t *converted_size) 40: { 41: size_t src_len = strlen(src)+1; 42: 43: *dest = NULL; 44: return convert_string_talloc(ctx, CH_UNIX, CH_UTF16LE, src, src_len, 45: (void **)dest, converted_size); 46: } #10 0x00007f10b5bbd2d0 in E_md4hash (passwd=0x0, p16=p16@entry=0x7ffe76d58a70 "") at ../libcli/auth/smbencrypt.c:78 73: { 74: size_t len; 75: smb_ucs2_t *wpwd; 76: bool ret; 77: 78: ret = push_ucs2_talloc(NULL, &wpwd, passwd, &len); 79: if (!ret || len < 2) { 80: /* We don't want to return fixed data, as most callers 81: * don't check */ 82: mdfour(p16, (const uint8_t *)passwd, strlen(passwd)); 83: return false; #11 0x00007f10b6d9686a in create_volume_objectid (conn=conn@entry=0x55d33e2cd660, objid=objid@entry=0x7ffe76d58a70 "") at ../source3/smbd/trans2.c:3377 #12 0x00007f10b6d97503 in smbd_do_qfsinfo (xconn=0x55d33e2ba280, conn=conn@entry=0x55d33e2cd660, mem_ctx=, info_level=info_level@entry=1008, flags2=flags2@entry=8, max_data_bytes=max_data_bytes@entry=64, fixed_portion=0x7ffe76d58ba0, fname=0x55d33e2d2840, ppdata=0x7ffe76d58b90, ret_data_len=0x7ffe76d58b88) at ../source3/smbd/trans2.c:3806 #13 0x00007f10b6df20cf in smbd_smb2_getinfo_send (in_input_buffer=..., in_flags=, in_additional_information=, in_output_buffer_length=, in_file_info_class=, in_info_type=, fsp=0x55d33e2db7c0, smb2req=0x55d33e2d3f60, ev=0x55d33e29dcc0, mem_ctx=0x55d33e2d3f60) at ../source3/smbd/smb2_getinfo.c:430 425: size_t fixed_portion; 426: 427: /* the levels directly map to the passthru levels */ 428: file_info_level = in_file_info_class + 1000; 429: 430: status = smbd_do_qfsinfo(smb2req->xconn, conn, state, 431: file_info_level, 432: STR_UNICODE, 433: in_output_buffer_length, 434: &fixed_portion, 435: fsp->fsp_name, #14 smbd_smb2_request_process_getinfo (req=req@entry=0x55d33e2d3f60) at ../source3/smbd/smb2_getinfo.c:120 115: in_fsp = file_fsp_smb2(req, in_file_id_persistent, in_file_id_volatile); 116: if (in_fsp == NULL) { 117: return smbd_smb2_request_error(req, NT_STATUS_FILE_CLOSED); 118: } 119: 120: subreq = smbd_smb2_getinfo_send(req, req->sconn->ev_ctx, 121: req, in_fsp, 122: in_info_type, 123: in_file_info_class, 124: in_output_buffer_length, 125: in_input_buffer, #15 0x00007f10b6dde506 in smbd_smb2_request_dispatch (req=req@entry=0x55d33e2d3f60) at ../source3/smbd/smb2_server.c:2698 2693: break; 2694: 2695: case SMB2_OP_GETINFO: 2696: SMBPROFILE_IOBYTES_ASYNC_START(smb2_getinfo, profile_p, 2697: req->profile, _INBYTES(req)); 2698: return_value = smbd_smb2_request_process_getinfo(req); 2699: break; 2700: 2701: case SMB2_OP_SETINFO: 2702: SMBPROFILE_IOBYTES_ASYNC_START(smb2_setinfo, profile_p, 2703: req->profile, _INBYTES(req)); #16 0x00007f10b6ddf16c in smbd_smb2_io_handler (fde_flags=, xconn=0x55d33e2ba280) at ../source3/smbd/smb2_server.c:3914 3909: status = smbd_smb2_request_setup_out(req); 3910: if (!NT_STATUS_IS_OK(status)) { 3911: return status; 3912: } 3913: 3914: status = smbd_smb2_request_dispatch(req); 3915: if (!NT_STATUS_IS_OK(status)) { 3916: return status; 3917: } 3918: 3919: sconn->num_requests++; #17 smbd_smb2_connection_handler (ev=, fde=, flags=, private_data=) at ../source3/smbd/smb2_server.c:3952 3947: struct smbXsrv_connection *xconn = 3948: talloc_get_type_abort(private_data, 3949: struct smbXsrv_connection); 3950: NTSTATUS status; 3951: 3952: status = smbd_smb2_io_handler(xconn, flags); 3953: if (!NT_STATUS_IS_OK(status)) { 3954: smbd_server_connection_terminate(xconn, nt_errstr(status)); 3955: return; 3956: } 3957: } #18 0x00007f10b3ceded0 in epoll_event_loop (tvalp=0x7ffe76d58d10, epoll_ev=0x55d33e2b4eb0) at ../tevent_epoll.c:728 723: * make sure we only pass the flags 724: * the handler is expecting. 725: */ 726: flags &= fde->flags; 727: if (flags) { 728: fde->handler(epoll_ev->ev, fde, flags, fde->private_data); 729: break; 730: } 731: } 732: 733: return 0; #19 epoll_event_loop_once (ev=, location=) at ../tevent_epoll.c:930 925: return -1; 926: } 927: epoll_ev->panic_force_replay = false; 928: epoll_ev->panic_state = NULL; 929: 930: return epoll_event_loop(epoll_ev, &tval); 931: } 932: 933: static const struct tevent_ops epoll_event_ops = { 934: .context_init = epoll_event_context_init, 935: .add_fd = epoll_event_add_fd, #20 0x00007f10b3cec357 in std_event_loop_once (ev=0x55d33e29dcc0, location=0x7f10b6eeca68 "../source3/smbd/process.c:4127") at ../tevent_standard.c:114 109: struct std_event_glue *glue = 110: talloc_get_type_abort(glue_ptr, 111: struct std_event_glue); 112: int ret; 113: 114: ret = glue->epoll_ops->loop_once(ev, location); 115: /* 116: * If the above hasn't panicked due to an epoll interface failure, 117: * std_fallback_to_poll() wasn't called, and hasn't cleared epoll_ops to 118: * signify fallback to poll_ops. 119: */ #21 0x00007f10b3ce87cd in _tevent_loop_once (ev=ev@entry=0x55d33e29dcc0, location=location@entry=0x7f10b6eeca68 "../source3/smbd/process.c:4127") at ../tevent.c:725 720: } 721: } 722: } 723: 724: tevent_trace_point_callback(ev, TEVENT_TRACE_BEFORE_LOOP_ONCE); 725: ret = ev->ops->loop_once(ev, location); 726: tevent_trace_point_callback(ev, TEVENT_TRACE_AFTER_LOOP_ONCE); 727: 728: if (ev->nesting.level > 0) { 729: if (ev->nesting.hook_fn) { 730: int ret2; #22 0x00007f10b3ce89eb in tevent_common_loop_wait (ev=0x55d33e29dcc0, location=0x7f10b6eeca68 "../source3/smbd/process.c:4127") at ../tevent.c:848 843: /* 844: * loop as long as we have events pending 845: */ 846: while (tevent_common_have_events(ev)) { 847: int ret; 848: ret = _tevent_loop_once(ev, location); 849: if (ret != 0) { 850: tevent_debug(ev, TEVENT_DEBUG_FATAL, 851: "_tevent_loop_once() failed: %d - %s\n", 852: ret, strerror(errno)); 853: return ret; #23 0x00007f10b3cec2f7 in std_event_loop_wait (ev=0x55d33e29dcc0, location=0x7f10b6eeca68 "../source3/smbd/process.c:4127") at ../tevent_standard.c:145 140: struct std_event_glue *glue = 141: talloc_get_type_abort(glue_ptr, 142: struct std_event_glue); 143: int ret; 144: 145: ret = glue->epoll_ops->loop_wait(ev, location); 146: /* 147: * If the above hasn't panicked due to an epoll interface failure, 148: * std_fallback_to_poll() wasn't called, and hasn't cleared epoll_ops to 149: * signify fallback to poll_ops. 150: */ #24 0x00007f10b6dcef58 in smbd_process (ev_ctx=0x55d33e29dcc0, msg_ctx=, sock_fd=38, interactive=) at ../source3/smbd/process.c:4127 #25 0x000055d33c0f6fcc in smbd_accept_connection (ev=0x55d33e29dcc0, fde=, flags=, private_data=) at ../source3/smbd/server.c:1030 #26 0x00007f10b3ceded0 in epoll_event_loop (tvalp=0x7ffe76d58f50, epoll_ev=0x55d33e29de80) at ../tevent_epoll.c:728 723: * make sure we only pass the flags 724: * the handler is expecting. 725: */ 726: flags &= fde->flags; 727: if (flags) { 728: fde->handler(epoll_ev->ev, fde, flags, fde->private_data); 729: break; 730: } 731: } 732: 733: return 0; #27 epoll_event_loop_once (ev=, location=) at ../tevent_epoll.c:930 925: return -1; 926: } 927: epoll_ev->panic_force_replay = false; 928: epoll_ev->panic_state = NULL; 929: 930: return epoll_event_loop(epoll_ev, &tval); 931: } 932: 933: static const struct tevent_ops epoll_event_ops = { 934: .context_init = epoll_event_context_init, 935: .add_fd = epoll_event_add_fd, #28 0x00007f10b3cec357 in std_event_loop_once (ev=0x55d33e29dcc0, location=0x55d33c0fae2b "../source3/smbd/server.c:1397") at ../tevent_standard.c:114 109: struct std_event_glue *glue = 110: talloc_get_type_abort(glue_ptr, 111: struct std_event_glue); 112: int ret; 113: 114: ret = glue->epoll_ops->loop_once(ev, location); 115: /* 116: * If the above hasn't panicked due to an epoll interface failure, 117: * std_fallback_to_poll() wasn't called, and hasn't cleared epoll_ops to 118: * signify fallback to poll_ops. 119: */ #29 0x00007f10b3ce87cd in _tevent_loop_once (ev=ev@entry=0x55d33e29dcc0, location=location@entry=0x55d33c0fae2b "../source3/smbd/server.c:1397") at ../tevent.c:725 720: } 721: } 722: } 723: 724: tevent_trace_point_callback(ev, TEVENT_TRACE_BEFORE_LOOP_ONCE); 725: ret = ev->ops->loop_once(ev, location); 726: tevent_trace_point_callback(ev, TEVENT_TRACE_AFTER_LOOP_ONCE); 727: 728: if (ev->nesting.level > 0) { 729: if (ev->nesting.hook_fn) { 730: int ret2; #30 0x00007f10b3ce89eb in tevent_common_loop_wait (ev=0x55d33e29dcc0, location=0x55d33c0fae2b "../source3/smbd/server.c:1397") at ../tevent.c:848 843: /* 844: * loop as long as we have events pending 845: */ 846: while (tevent_common_have_events(ev)) { 847: int ret; 848: ret = _tevent_loop_once(ev, location); 849: if (ret != 0) { 850: tevent_debug(ev, TEVENT_DEBUG_FATAL, 851: "_tevent_loop_once() failed: %d - %s\n", 852: ret, strerror(errno)); 853: return ret; #31 0x00007f10b3cec2f7 in std_event_loop_wait (ev=0x55d33e29dcc0, location=0x55d33c0fae2b "../source3/smbd/server.c:1397") at ../tevent_standard.c:145 140: struct std_event_glue *glue = 141: talloc_get_type_abort(glue_ptr, 142: struct std_event_glue); 143: int ret; 144: 145: ret = glue->epoll_ops->loop_wait(ev, location); 146: /* 147: * If the above hasn't panicked due to an epoll interface failure, 148: * std_fallback_to_poll() wasn't called, and hasn't cleared epoll_ops to 149: * signify fallback to poll_ops. 150: */ #32 0x000055d33c0f234a in smbd_parent_loop (parent=0x55d33e29d1b0, ev_ctx=0x55d33e29dcc0) at ../source3/smbd/server.c:1397 #33 main (argc=, argv=) at ../source3/smbd/server.c:2164