** Changed in: samba (Debian)
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage notifications
** Changed in: hundredpapercuts
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage
This bug was fixed in the package samba - 2:4.1.6+dfsg-1ubuntu2.14.04.8
---
samba (2:4.1.6+dfsg-1ubuntu2.14.04.8) trusty; urgency=medium
* Fix for no talloc stackframe at warning messages (LP: #1257186)
-- Ryan Harper ryan.har...@canonical.com Mon, 22 Jun 2015 08:48:37
-0500
**
This bug was fixed in the package samba - 2:4.1.6+dfsg-1ubuntu2.14.04.8
---
samba (2:4.1.6+dfsg-1ubuntu2.14.04.8) trusty; urgency=medium
* Fix for no talloc stackframe at warning messages (LP: #1257186)
-- Ryan Harper ryan.har...@canonical.com Mon, 22 Jun 2015 08:48:37
-0500
**
Unable to test at this time, too many umet dependencies
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage
Unable to test at this time, too many umet dependencies
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage notifications about
libpam-smbpass 2:4.1.6+dfsg-1ubuntu2.14.04.8 fixes it for me.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage notifications
libpam-smbpass 2:4.1.6+dfsg-1ubuntu2.14.04.8 fixes it for me.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To
** Tags removed: verification-needed
** Tags added: verification-done
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage
Hello Doug, or anyone else affected,
Accepted samba into trusty-proposed. The package will build now and be
available at https://launchpad.net/ubuntu/+source/samba/2:4.1.6+dfsg-
1ubuntu2.14.04.8 in a few hours, and then in the -proposed repository.
Please help us by testing this new package.
Hello Doug, or anyone else affected,
Accepted samba into trusty-proposed. The package will build now and be
available at https://launchpad.net/ubuntu/+source/samba/2:4.1.6+dfsg-
1ubuntu2.14.04.8 in a few hours, and then in the -proposed repository.
Please help us by testing this new package.
I did a dist-upgrade with trusty proposed and the leakage message is
gone for me...
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc
I did a dist-upgrade with trusty proposed and the leakage message is
gone for me...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To
On Thu, Jun 25, 2015 at 7:44 PM, Chad c...@finkenbiner.com wrote:
Would someone explain the last several updates? What is the SRU team
and what kind of review are they performing? Finally (and possibly most
Hi, I think most of your questions will be answered by looking at the
Stable Release
On Thu, Jun 25, 2015 at 7:44 PM, Chad c...@finkenbiner.com wrote:
Would someone explain the last several updates? What is the SRU team
and what kind of review are they performing? Finally (and possibly most
Hi, I think most of your questions will be answered by looking at the
Stable Release
Would someone explain the last several updates? What is the SRU team
and what kind of review are they performing? Finally (and possibly most
importantly), how can the status be In Progress when the ticket is
still Unassigned?
Thanks in advance!
--
You received this bug notification because
Would someone explain the last several updates? What is the SRU team
and what kind of review are they performing? Finally (and possibly most
importantly), how can the status be In Progress when the ticket is
still Unassigned?
Thanks in advance!
--
You received this bug notification because
** Description changed:
- This message appears a lot as of a recent update to samba (Trusty
- development branch):
+ [Impact]
+
+ * Warning messages related to memory leaks no talloc stackframe at
+are present at login and other PAM services when libpam-smbpass is
+installed.
+
+ *
SRU from Ryan Harper sponsored and uploaded. Thanks! Now awaiting review
from the SRU team.
** Changed in: samba (Ubuntu Trusty)
Status: Confirmed = In Progress
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
** Changed in: samba (Ubuntu)
Status: Triaged = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage
** Changed in: samba (Ubuntu)
Status: Triaged = Fix Released
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To
** Description changed:
- This message appears a lot as of a recent update to samba (Trusty
- development branch):
+ [Impact]
+
+ * Warning messages related to memory leaks no talloc stackframe at
+are present at login and other PAM services when libpam-smbpass is
+installed.
+
+ *
SRU from Ryan Harper sponsored and uploaded. Thanks! Now awaiting review
from the SRU team.
** Changed in: samba (Ubuntu Trusty)
Status: Confirmed = In Progress
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
I've confirmed that this is already fixed in Wily.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage
I've confirmed that this is already fixed in Wily.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage notifications about this
This bug also affects vsftpd functionality. When SMB password
synchronisation is selected in pam-auth-update, vsftpd can not
authenticate users and segfaults with OOPS message.
This sounds like bug 1348972 in vsftpd and I don't think a fix to this
samba bug will affect it.
--
You received this
This bug also affects vsftpd functionality. When SMB password
synchronisation is selected in pam-auth-update, vsftpd can not
authenticate users and segfaults with OOPS message.
This sounds like bug 1348972 in vsftpd and I don't think a fix to this
samba bug will affect it.
--
You received this
gollum53 wrote in comment #96:
This bug also affects vsftpd functionality. When SMB password synchronisation
is selected in pam-auth-update, vsftpd can not authenticate users and
segfaults with OOPS message.
I had a quick go at trying to reproduce that to see if I could install a
modified
gollum53 wrote in comment #96:
This bug also affects vsftpd functionality. When SMB password synchronisation
is selected in pam-auth-update, vsftpd can not authenticate users and
segfaults with OOPS message.
I had a quick go at trying to reproduce that to see if I could install a
modified
This bug also affects vsftpd functionality. When SMB password
synchronisation is selected in pam-auth-update, vsftpd can not
authenticate users and segfaults with OOPS message. This seems like a
critical bug to me and should be corrected as soon as possible in a LTS
server release...
--
You
This bug also affects vsftpd functionality. When SMB password
synchronisation is selected in pam-auth-update, vsftpd can not
authenticate users and segfaults with OOPS message. This seems like a
critical bug to me and should be corrected as soon as possible in a LTS
server release...
--
You
Xavier wrote that this needs to be moved somewhere else. Does anyone
know how to do that? If someone can explain to me what needs to happen,
I'll be happy to do it myself. Removing libpam-smbpass is not an option
for me, nor is it, in my opinion, an appropriate fix. I can't believe
no one is
Xavier wrote that this needs to be moved somewhere else. Does anyone
know how to do that? If someone can explain to me what needs to happen,
I'll be happy to do it myself. Removing libpam-smbpass is not an option
for me, nor is it, in my opinion, an appropriate fix. I can't believe
no one is
Chad wrote:
Xavier wrote that this needs to be moved somewhere else.
Does anyone know how to do that?
If someone can explain to me what needs to happen,
I changed the trusty target from 14.04.2 (which is in the past) to
14.04.3 (which is in the future, albeit, not far off)
** Changed in:
Chad wrote:
Xavier wrote that this needs to be moved somewhere else.
Does anyone know how to do that?
If someone can explain to me what needs to happen,
I changed the trusty target from 14.04.2 (which is in the past) to
14.04.3 (which is in the future, albeit, not far off)
** Changed in:
Thank you #89. It's a PITA to do, but it does work as Ian described and
the error no longer appears when I use sudo.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage
Thank you #89. It's a PITA to do, but it does work as Ian described and
the error no longer appears when I use sudo.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1257186
Title:
** Also affects: hundredpapercuts
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc
** Also affects: hundredpapercuts
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage
I'm not sure why unresolved bugs for missed milestones can't be moved to
the next milestone automatically. Less chance of them being ignored that
way!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I'm not sure why unresolved bugs for missed milestones can't be moved to
the next milestone automatically. Less chance of them being ignored that
way!
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
This should me moved to the
https://launchpad.net/ubuntu/+milestone/ubuntu-14.04.3 or
https://launchpad.net/ubuntu/+milestone/ubuntu-14.04.4 milestone.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
This should me moved to the
https://launchpad.net/ubuntu/+milestone/ubuntu-14.04.3 or
https://launchpad.net/ubuntu/+milestone/ubuntu-14.04.4 milestone.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
I can also confirm this is still an issue:
no talloc stackframe at ../source3/param/loadparm.c:4864, leaking memory
SYSTEM SETTINGS:
Operating system : Linux Mint 17.1 Cinnamon 64bit
Cinnamon Version : 2.4.5
Linux Kernel : 3.13.0-37 generic
Confirmed no longer an issue once
I can also confirm this is still an issue:
no talloc stackframe at ../source3/param/loadparm.c:4864, leaking memory
SYSTEM SETTINGS:
Operating system : Linux Mint 17.1 Cinnamon 64bit
Cinnamon Version : 2.4.5
Linux Kernel : 3.13.0-37 generic
Confirmed no longer an issue once
I think this should be easy to fix if Canonical can find anyone to
assign the bug to. I managed to fix it locally by following the guide at
https://help.ubuntu.com/community/UpdatingADeb to rebuild the samba
packages from source with the upstream patch applied. For the final
step, I used sudo debi
I think this should be easy to fix if Canonical can find anyone to
assign the bug to. I managed to fix it locally by following the guide at
https://help.ubuntu.com/community/UpdatingADeb to rebuild the samba
packages from source with the upstream patch applied. For the final
step, I used sudo debi
This is happening still in 14.04.2.
I installed libpam-smbpass:amd64 2:4.1.6+dfsg-1ubuntu2.14.04.7
Whenever I do sudo commands and login in the issue shows up with talloc.
lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu 14.04.2 LTS
Release:
This is happening still in 14.04.2.
I installed libpam-smbpass:amd64 2:4.1.6+dfsg-1ubuntu2.14.04.7
Whenever I do sudo commands and login in the issue shows up with talloc.
lsb_release -a
No LSB modules are available.
Distributor ID: Ubuntu
Description:Ubuntu 14.04.2 LTS
Release:
Wow, this bug has a long history.
I can confirm the issue as well with 4.1.6 and 4.2.1 I've isolated to
the line:
authoptionalpam_smbpass.so migrate
Configured in /etc/pam.d/common-auth
That line is added by libpam package installation and also by using pam-
Wow, this bug has a long history.
I can confirm the issue as well with 4.1.6 and 4.2.1 I've isolated to
the line:
authoptionalpam_smbpass.so migrate
Configured in /etc/pam.d/common-auth
That line is added by libpam package installation and also by using pam-
Still and issue. Ubuntu 14.04.2 LTS (GNU/Linux 3.16.0-37-generic
x86_64)
chad@server:~$ sudo su
[sudo] password for chad:
no talloc stackframe at ../source3/param/loadparm.c:4864, leaking memory
root@server:/home/chad#
--
You received this bug notification because you are a member of Ubuntu
Still and issue. Ubuntu 14.04.2 LTS (GNU/Linux 3.16.0-37-generic
x86_64)
chad@server:~$ sudo su
[sudo] password for chad:
no talloc stackframe at ../source3/param/loadparm.c:4864, leaking memory
root@server:/home/chad#
--
You received this bug notification because you are a member of Ubuntu
Confirmed in Ubuntu 14.04.02 LST x64.
Fresh install.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage
Confirmed in Ubuntu 14.04.02 LST x64.
Fresh install.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage notifications about this
Confirmed in Ubuntu 14.04.02 LST x64.
I did not notice it until after I updated, but maybe it was there.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no
Confirmed in Ubuntu 14.04.02 LST x64.
I did not notice it until after I updated, but maybe it was there.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to the bug report.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage
Confirmed in Ubuntu 14.04.02 LST x64 after fresh install.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage
Confirmed in Ubuntu 14.04.02 LST x64 after fresh install.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage notifications about
I also get it when starting python:
Ignoring unknown parameter password level
Ignoring unknown parameter update encrypted
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
I also get it when starting python:
Ignoring unknown parameter password level
Ignoring unknown parameter update encrypted
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage
Confirmed in Ubuntu 14.04.02 LST after fresh install.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage notifications about this
Correction: make that 14.04.02 LTS Server.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage notifications about
Correction: make that 14.04.02 LTS Server.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage notifications about this bug go to:
Confirmed in Ubuntu 14.04.02 LST after fresh install.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage
Confirmed in Ubuntu 14.04.02 LTS after recent upgrade from Ubuntu 12.04
LTS.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc
Confirmed in Ubuntu 14.04.02 LTS after recent upgrade from Ubuntu 12.04
LTS.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc stackframe)
To manage
This error makes my dovecot's auth-worker get down since I use both
system accounts and virtual mail boxes... So it's serious to me...
Probably, there occur such problems...
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in
This error makes my dovecot's auth-worker get down since I use both
system accounts and virtual mail boxes... So it's serious to me...
Probably, there occur such problems...
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
Still broken in 14.04.2.
** Changed in: samba (Ubuntu Trusty)
Status: Triaged = Incomplete
** Changed in: samba (Ubuntu Trusty)
Status: Incomplete = New
** Changed in: samba (Ubuntu Trusty)
Status: New = Confirmed
--
You received this bug notification because you are a
Still broken in 14.04.2.
** Changed in: samba (Ubuntu Trusty)
Status: Triaged = Incomplete
** Changed in: samba (Ubuntu Trusty)
Status: Incomplete = New
** Changed in: samba (Ubuntu Trusty)
Status: New = Confirmed
--
You received this bug notification because you are a
i really cant think how this could be waited so long to ship a fix. this
is really not acceptable.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage messages (no talloc
i really cant think how this could be waited so long to ship a fix. this
is really not acceptable.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory leakage
On my machine message looks like this (i.e. when i sudo winecfg):
xxx@xxx-pc:~$ sudo winecfg
[sudo] password for xxx:
no talloc stackframe at ../source3/param/loadparm.c:4864, leaking memory
Ignoring unknown parameter password level
Ignoring unknown parameter update encrypted
wine:
On my machine message looks like this (i.e. when i sudo winecfg):
xxx@xxx-pc:~$ sudo winecfg
[sudo] password for xxx:
no talloc stackframe at ../source3/param/loadparm.c:4864, leaking memory
Ignoring unknown parameter password level
Ignoring unknown parameter update encrypted
wine:
Another Ubuntu user with the same memory leak issue.
Just like others said, how can it be that the LTS version hasn't got the fix
that was already released in July?
This is another one of these Linux quirks that makes you wonder if using LTS
was worth it?
Should be top priority but seemingly
Another Ubuntu user with the same memory leak issue.
Just like others said, how can it be that the LTS version hasn't got the fix
that was already released in July?
This is another one of these Linux quirks that makes you wonder if using LTS
was worth it?
Should be top priority but seemingly
I also can't understand why it is not fixed already. Because on 14.10
the fix is already released ...so it exists one! :-(
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory
I also can't understand why it is not fixed already. Because on 14.10
the fix is already released ...so it exists one! :-(
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
No one can make a patch for this release?
We have to wait for ubuntu-14.04.2 ? really?
This MUST be a HIGH priority bug!
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
No one can make a patch for this release?
We have to wait for ubuntu-14.04.2 ? really?
This MUST be a HIGH priority bug!
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory
It would be interesting to hear about timelines from upstream Canonical
support when the fix is finally integrated in the 14.04 LTS codebase.
Any updates on this?
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
It would be interesting to hear about timelines from upstream Canonical
support when the fix is finally integrated in the 14.04 LTS codebase.
Any updates on this?
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
I installed the 14.04.1 LTS for my server. Samba was not selected during
the installation. I Installed it manually without a problem. The problem
occured immediately after installing the libpam-smbpass. My Samba
version is 4.1.6-Ubuntu
This issue seems to be resolved by the samba team already in
I installed the 14.04.1 LTS for my server. Samba was not selected during
the installation. I Installed it manually without a problem. The problem
occured immediately after installing the libpam-smbpass. My Samba
version is 4.1.6-Ubuntu
This issue seems to be resolved by the samba team already in
I'm using netatalk as well, and this bug was causing
/run/samba/gencache_notrans.tdb to grow to several hundred MB until /run
was out of space. According to tdbtool the database itself was basically
empty, but it was still taking up disk even after a repack. Disabling
the module with
Disabling the module with pam-auth-update makes the problem go away for
me. If I re-enable the problem comes back.
This should be a HIGH priority bug.
The problem will occur after a successful su command.
Running with all the available patches available today.
--
You received this bug
I'm using netatalk as well, and this bug was causing
/run/samba/gencache_notrans.tdb to grow to several hundred MB until /run
was out of space. According to tdbtool the database itself was basically
empty, but it was still taking up disk even after a repack. Disabling
the module with
Disabling the module with pam-auth-update makes the problem go away for
me. If I re-enable the problem comes back.
This should be a HIGH priority bug.
The problem will occur after a successful su command.
Running with all the available patches available today.
--
You received this bug
I've just installed (L)uBuntu 14.04.1 from mini.iso - with samba.
'no talloc stackframe at ../source3/param/loadparm.c:4864, leaking
memory' is also there.
Before trying anything to get rid of that error message, is this worth
trying ?
What are the consequences of just let it as is and waiting
@Coeur: I entered this bug report over 11 months ago, and have simply
ignored the error ever since. I haven't had any problems.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1257186
I think that I'll just remove it - see:
https://bugzilla.samba.org/show_bug.cgi?id=10669
(libpam-smbpass leaks file descriptors when PAM authenticates multiple times in
a single process)
** Bug watch added: Samba Bugzilla #10669
https://bugzilla.samba.org/show_bug.cgi?id=10669
--
You
I've just installed (L)uBuntu 14.04.1 from mini.iso - with samba.
'no talloc stackframe at ../source3/param/loadparm.c:4864, leaking
memory' is also there.
Before trying anything to get rid of that error message, is this worth
trying ?
What are the consequences of just let it as is and waiting
@Coeur: I entered this bug report over 11 months ago, and have simply
ignored the error ever since. I haven't had any problems.
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1257186
Title:
memory
I think that I'll just remove it - see:
https://bugzilla.samba.org/show_bug.cgi?id=10669
(libpam-smbpass leaks file descriptors when PAM authenticates multiple times in
a single process)
** Bug watch added: Samba Bugzilla #10669
https://bugzilla.samba.org/show_bug.cgi?id=10669
--
You
I've had this error since installing the Beta of 14.04 Server, upgrading
it periodically to current release.
Using Thomas' suggestion, I ran sudo pam-auth-update and unchecked
SMB Password Synchronization.
Did a test and found the problem disappeared. Good stuff.
I then decided to re-run sudo
I am running 14.04.1 and have reproduced Jeff's steps above [pam-auth-
update off then back on] and in my case the error message simply re-
appears once SMB is re-enabled.
'no talloc stackframe at ../source3/param/loadparm.c:4864, leaking
memory'
--
You received this bug notification because
This still might point back to the talloc issue I pointed out earlier in
this thread.
Checking libtalloc2 on both trusty and utopic (14.04.1 and 14.10)
reveals the following:
trusty: 49704 Oct 21 2013 /usr/lib/x86_64-linux-gnu/libtalloc.so.2.1.0
utopic: 59560 Jul 6 07:12
I followed Jeff's steps as well but I got the same results as Nick. The
problem reappears when pam-auth-update is turned back on.
--
You received this bug notification because you are a member of Ubuntu
Server Team, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1257186
1 - 100 of 122 matches
Mail list logo