And the same with source references

--- source code stack trace ---
#0  __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:51
  [Error: raise.c was not found in source tree]
#1  0x00007f10b3933801 in __GI_abort () at abort.c:79
  [Error: abort.c was not found in source tree]
#2  0x00007f10b50ceca2 in dump_core () at ../source3/lib/dumpcore.c:338
  333:  /* Ensure we don't have a signal handler for abort. */
  334: #ifdef SIGABRT
  335:  CatchSignal(SIGABRT, SIG_DFL);
  336: #endif
  337: 
  338:  abort();
  339: 
  340: #else /* DUMP_CORE */
  341:  exit(1);
  342: #endif /* DUMP_CORE */
  343: }
#3  0x00007f10b50bbb6b in smb_panic_s3 (why=<optimized out>) at 
../source3/lib/util.c:838
  833:          i += 2; /* skip two chars */
  834:  }
  835: 
  836:  for (; i+1 < strhex_len && strhex[i] != 0 && strhex[i+1] != 0; i++) {
  837:          p1 = strchr(hexchars, toupper((unsigned char)strhex[i]));
  838:          if (p1 == NULL) {
  839:                  break;
  840:          }
  841: 
  842:          i++; /* next hex digit */
  843: 
#4  0x00007f10b71a48cf in smb_panic (why=why@entry=0x7f10b71f2d37 "internal 
error") at ../lib/util/fault.c:166
  161:    Something really nasty happened - panic !
  162: **/
  163: _PUBLIC_ void smb_panic(const char *why)
  164: {
  165:  if (fault_state.panic_handler) {
  166:          fault_state.panic_handler(why);
  167:          _exit(1);
  168:  }
  169:  smb_panic_default(why);
  170: }
#5  0x00007f10b71a4ae6 in fault_report (sig=<optimized out>) at 
../lib/util/fault.c:83
  78:   DEBUGSEP(0);
  79:   DEBUG(0,("INTERNAL ERROR: Signal %d in pid %d 
(%s)",sig,(int)getpid(),SAMBA_VERSION_STRING));
  80:   DEBUG(0,("\nPlease read the Trouble-Shooting section of the Samba 
HOWTO\n"));
  81:   DEBUGSEP(0);
  82: 
  83:   smb_panic("internal error");
  84: 
  85:   /* smb_panic() never returns, so this is really redundant */
  86:   exit(1);
  87: }
  88: 
#6  sig_fault (sig=<optimized out>) at ../lib/util/fault.c:94
  89: 
/****************************************************************************
  90: catch serious errors
  91: 
****************************************************************************/
  92: static void sig_fault(int sig)
  93: {
  94:   fault_report(sig);
  95: }
  96: 
  97: /*******************************************************************
  98: setup our fault handlers
  99: ********************************************************************/
#7  <signal handler called>
#8  __strlen_sse2 () at ../sysdeps/x86_64/multiarch/../strlen.S:120
  [Error: strlen.S was not found in source tree]
#9  0x00007f10b719d4fe in push_ucs2_talloc (ctx=ctx@entry=0x0, 
dest=dest@entry=0x7ffe76d586a8, src=src@entry=0x0, 
converted_size=converted_size@entry=0x7ffe76d586a0) at 
../lib/util/charset/pull_push.c:41
  36:  * converted.
  37:  **/
  38: bool push_ucs2_talloc(TALLOC_CTX *ctx, smb_ucs2_t **dest, const char *src,
  39:                 size_t *converted_size)
  40: {
  41:   size_t src_len = strlen(src)+1;
  42: 
  43:   *dest = NULL;
  44:   return convert_string_talloc(ctx, CH_UNIX, CH_UTF16LE, src, src_len,
  45:                                (void **)dest, converted_size);
  46: }
#10 0x00007f10b5bbd2d0 in E_md4hash (passwd=0x0, p16=p16@entry=0x7ffe76d58a70 
"") at ../libcli/auth/smbencrypt.c:78
  73: {
  74:   size_t len;
  75:   smb_ucs2_t *wpwd;
  76:   bool ret;
  77: 
  78:   ret = push_ucs2_talloc(NULL, &wpwd, passwd, &len);
  79:   if (!ret || len < 2) {
  80:           /* We don't want to return fixed data, as most callers
  81:            * don't check */
  82:           mdfour(p16, (const uint8_t *)passwd, strlen(passwd));
  83:           return false;
#11 0x00007f10b6d9686a in create_volume_objectid 
(conn=conn@entry=0x55d33e2cd660, objid=objid@entry=0x7ffe76d58a70 "") at 
../source3/smbd/trans2.c:3377
#12 0x00007f10b6d97503 in smbd_do_qfsinfo (xconn=0x55d33e2ba280, 
conn=conn@entry=0x55d33e2cd660, mem_ctx=<optimized out>, 
info_level=info_level@entry=1008, flags2=flags2@entry=8, 
max_data_bytes=max_data_bytes@entry=64, fixed_portion=0x7ffe76d58ba0, 
fname=0x55d33e2d2840, ppdata=0x7ffe76d58b90, ret_data_len=0x7ffe76d58b88) at 
../source3/smbd/trans2.c:3806
#13 0x00007f10b6df20cf in smbd_smb2_getinfo_send (in_input_buffer=..., 
in_flags=<optimized out>, in_additional_information=<optimized out>, 
in_output_buffer_length=<optimized out>, in_file_info_class=<optimized out>, 
in_info_type=<optimized out>, fsp=0x55d33e2db7c0, smb2req=0x55d33e2d3f60, 
ev=0x55d33e29dcc0, mem_ctx=0x55d33e2d3f60) at ../source3/smbd/smb2_getinfo.c:430
  425:          size_t fixed_portion;
  426: 
  427:          /* the levels directly map to the passthru levels */
  428:          file_info_level = in_file_info_class + 1000;
  429: 
  430:          status = smbd_do_qfsinfo(smb2req->xconn, conn, state,
  431:                                   file_info_level,
  432:                                   STR_UNICODE,
  433:                                   in_output_buffer_length,
  434:                                   &fixed_portion,
  435:                                   fsp->fsp_name,
#14 smbd_smb2_request_process_getinfo (req=req@entry=0x55d33e2d3f60) at 
../source3/smbd/smb2_getinfo.c:120
  115:  in_fsp = file_fsp_smb2(req, in_file_id_persistent, in_file_id_volatile);
  116:  if (in_fsp == NULL) {
  117:          return smbd_smb2_request_error(req, NT_STATUS_FILE_CLOSED);
  118:  }
  119: 
  120:  subreq = smbd_smb2_getinfo_send(req, req->sconn->ev_ctx,
  121:                                  req, in_fsp,
  122:                                  in_info_type,
  123:                                  in_file_info_class,
  124:                                  in_output_buffer_length,
  125:                                  in_input_buffer,
#15 0x00007f10b6dde506 in smbd_smb2_request_dispatch 
(req=req@entry=0x55d33e2d3f60) at ../source3/smbd/smb2_server.c:2698
  2693:                 break;
  2694: 
  2695:         case SMB2_OP_GETINFO:
  2696:                 SMBPROFILE_IOBYTES_ASYNC_START(smb2_getinfo, profile_p,
  2697:                                                req->profile, 
_INBYTES(req));
  2698:                 return_value = smbd_smb2_request_process_getinfo(req);
  2699:                 break;
  2700: 
  2701:         case SMB2_OP_SETINFO:
  2702:                 SMBPROFILE_IOBYTES_ASYNC_START(smb2_setinfo, profile_p,
  2703:                                                req->profile, 
_INBYTES(req));
#16 0x00007f10b6ddf16c in smbd_smb2_io_handler (fde_flags=<optimized out>, 
xconn=0x55d33e2ba280) at ../source3/smbd/smb2_server.c:3914
  3909:         status = smbd_smb2_request_setup_out(req);
  3910:         if (!NT_STATUS_IS_OK(status)) {
  3911:                 return status;
  3912:         }
  3913: 
  3914:         status = smbd_smb2_request_dispatch(req);
  3915:         if (!NT_STATUS_IS_OK(status)) {
  3916:                 return status;
  3917:         }
  3918: 
  3919:         sconn->num_requests++;
#17 smbd_smb2_connection_handler (ev=<optimized out>, fde=<optimized out>, 
flags=<optimized out>, private_data=<optimized out>) at 
../source3/smbd/smb2_server.c:3952
  3947:         struct smbXsrv_connection *xconn =
  3948:                 talloc_get_type_abort(private_data,
  3949:                 struct smbXsrv_connection);
  3950:         NTSTATUS status;
  3951: 
  3952:         status = smbd_smb2_io_handler(xconn, flags);
  3953:         if (!NT_STATUS_IS_OK(status)) {
  3954:                 smbd_server_connection_terminate(xconn, 
nt_errstr(status));
  3955:                 return;
  3956:         }
  3957: }
#18 0x00007f10b3ceded0 in epoll_event_loop (tvalp=0x7ffe76d58d10, 
epoll_ev=0x55d33e2b4eb0) at ../tevent_epoll.c:728
  723:           * make sure we only pass the flags
  724:           * the handler is expecting.
  725:           */
  726:          flags &= fde->flags;
  727:          if (flags) {
  728:                  fde->handler(epoll_ev->ev, fde, flags, 
fde->private_data);
  729:                  break;
  730:          }
  731:  }
  732: 
  733:  return 0;
#19 epoll_event_loop_once (ev=<optimized out>, location=<optimized out>) at 
../tevent_epoll.c:930
  925:          return -1;
  926:  }
  927:  epoll_ev->panic_force_replay = false;
  928:  epoll_ev->panic_state = NULL;
  929: 
  930:  return epoll_event_loop(epoll_ev, &tval);
  931: }
  932: 
  933: static const struct tevent_ops epoll_event_ops = {
  934:  .context_init           = epoll_event_context_init,
  935:  .add_fd                 = epoll_event_add_fd,
#20 0x00007f10b3cec357 in std_event_loop_once (ev=0x55d33e29dcc0, 
location=0x7f10b6eeca68 "../source3/smbd/process.c:4127") at 
../tevent_standard.c:114
  109:  struct std_event_glue *glue =
  110:          talloc_get_type_abort(glue_ptr,
  111:          struct std_event_glue);
  112:  int ret;
  113: 
  114:  ret = glue->epoll_ops->loop_once(ev, location);
  115:  /*
  116:   * If the above hasn't panicked due to an epoll interface failure,
  117:   * std_fallback_to_poll() wasn't called, and hasn't cleared epoll_ops to
  118:   * signify fallback to poll_ops.
  119:   */
#21 0x00007f10b3ce87cd in _tevent_loop_once (ev=ev@entry=0x55d33e29dcc0, 
location=location@entry=0x7f10b6eeca68 "../source3/smbd/process.c:4127") at 
../tevent.c:725
  720:                  }
  721:          }
  722:  }
  723: 
  724:  tevent_trace_point_callback(ev, TEVENT_TRACE_BEFORE_LOOP_ONCE);
  725:  ret = ev->ops->loop_once(ev, location);
  726:  tevent_trace_point_callback(ev, TEVENT_TRACE_AFTER_LOOP_ONCE);
  727: 
  728:  if (ev->nesting.level > 0) {
  729:          if (ev->nesting.hook_fn) {
  730:                  int ret2;
#22 0x00007f10b3ce89eb in tevent_common_loop_wait (ev=0x55d33e29dcc0, 
location=0x7f10b6eeca68 "../source3/smbd/process.c:4127") at ../tevent.c:848
  843:  /*
  844:   * loop as long as we have events pending
  845:   */
  846:  while (tevent_common_have_events(ev)) {
  847:          int ret;
  848:          ret = _tevent_loop_once(ev, location);
  849:          if (ret != 0) {
  850:                  tevent_debug(ev, TEVENT_DEBUG_FATAL,
  851:                               "_tevent_loop_once() failed: %d - %s\n",
  852:                               ret, strerror(errno));
  853:                  return ret;
#23 0x00007f10b3cec2f7 in std_event_loop_wait (ev=0x55d33e29dcc0, 
location=0x7f10b6eeca68 "../source3/smbd/process.c:4127") at 
../tevent_standard.c:145
  140:  struct std_event_glue *glue =
  141:          talloc_get_type_abort(glue_ptr,
  142:          struct std_event_glue);
  143:  int ret;
  144: 
  145:  ret = glue->epoll_ops->loop_wait(ev, location);
  146:  /*
  147:   * If the above hasn't panicked due to an epoll interface failure,
  148:   * std_fallback_to_poll() wasn't called, and hasn't cleared epoll_ops to
  149:   * signify fallback to poll_ops.
  150:   */
#24 0x00007f10b6dcef58 in smbd_process (ev_ctx=0x55d33e29dcc0, 
msg_ctx=<optimized out>, sock_fd=38, interactive=<optimized out>) at 
../source3/smbd/process.c:4127
#25 0x000055d33c0f6fcc in smbd_accept_connection (ev=0x55d33e29dcc0, 
fde=<optimized out>, flags=<optimized out>, private_data=<optimized out>) at 
../source3/smbd/server.c:1030
#26 0x00007f10b3ceded0 in epoll_event_loop (tvalp=0x7ffe76d58f50, 
epoll_ev=0x55d33e29de80) at ../tevent_epoll.c:728
  723:           * make sure we only pass the flags
  724:           * the handler is expecting.
  725:           */
  726:          flags &= fde->flags;
  727:          if (flags) {
  728:                  fde->handler(epoll_ev->ev, fde, flags, 
fde->private_data);
  729:                  break;
  730:          }
  731:  }
  732: 
  733:  return 0;
#27 epoll_event_loop_once (ev=<optimized out>, location=<optimized out>) at 
../tevent_epoll.c:930
  925:          return -1;
  926:  }
  927:  epoll_ev->panic_force_replay = false;
  928:  epoll_ev->panic_state = NULL;
  929: 
  930:  return epoll_event_loop(epoll_ev, &tval);
  931: }
  932: 
  933: static const struct tevent_ops epoll_event_ops = {
  934:  .context_init           = epoll_event_context_init,
  935:  .add_fd                 = epoll_event_add_fd,
#28 0x00007f10b3cec357 in std_event_loop_once (ev=0x55d33e29dcc0, 
location=0x55d33c0fae2b "../source3/smbd/server.c:1397") at 
../tevent_standard.c:114
  109:  struct std_event_glue *glue =
  110:          talloc_get_type_abort(glue_ptr,
  111:          struct std_event_glue);
  112:  int ret;
  113: 
  114:  ret = glue->epoll_ops->loop_once(ev, location);
  115:  /*
  116:   * If the above hasn't panicked due to an epoll interface failure,
  117:   * std_fallback_to_poll() wasn't called, and hasn't cleared epoll_ops to
  118:   * signify fallback to poll_ops.
  119:   */
#29 0x00007f10b3ce87cd in _tevent_loop_once (ev=ev@entry=0x55d33e29dcc0, 
location=location@entry=0x55d33c0fae2b "../source3/smbd/server.c:1397") at 
../tevent.c:725
  720:                  }
  721:          }
  722:  }
  723: 
  724:  tevent_trace_point_callback(ev, TEVENT_TRACE_BEFORE_LOOP_ONCE);
  725:  ret = ev->ops->loop_once(ev, location);
  726:  tevent_trace_point_callback(ev, TEVENT_TRACE_AFTER_LOOP_ONCE);
  727: 
  728:  if (ev->nesting.level > 0) {
  729:          if (ev->nesting.hook_fn) {
  730:                  int ret2;
#30 0x00007f10b3ce89eb in tevent_common_loop_wait (ev=0x55d33e29dcc0, 
location=0x55d33c0fae2b "../source3/smbd/server.c:1397") at ../tevent.c:848
  843:  /*
  844:   * loop as long as we have events pending
  845:   */
  846:  while (tevent_common_have_events(ev)) {
  847:          int ret;
  848:          ret = _tevent_loop_once(ev, location);
  849:          if (ret != 0) {
  850:                  tevent_debug(ev, TEVENT_DEBUG_FATAL,
  851:                               "_tevent_loop_once() failed: %d - %s\n",
  852:                               ret, strerror(errno));
  853:                  return ret;
#31 0x00007f10b3cec2f7 in std_event_loop_wait (ev=0x55d33e29dcc0, 
location=0x55d33c0fae2b "../source3/smbd/server.c:1397") at 
../tevent_standard.c:145
  140:  struct std_event_glue *glue =
  141:          talloc_get_type_abort(glue_ptr,
  142:          struct std_event_glue);
  143:  int ret;
  144: 
  145:  ret = glue->epoll_ops->loop_wait(ev, location);
  146:  /*
  147:   * If the above hasn't panicked due to an epoll interface failure,
  148:   * std_fallback_to_poll() wasn't called, and hasn't cleared epoll_ops to
  149:   * signify fallback to poll_ops.
  150:   */
#32 0x000055d33c0f234a in smbd_parent_loop (parent=0x55d33e29d1b0, 
ev_ctx=0x55d33e29dcc0) at ../source3/smbd/server.c:1397
#33 main (argc=<optimized out>, argv=<optimized out>) at 
../source3/smbd/server.c:2164

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1817027

Title:
  samba crashes when uploading files

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1817027/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to