And the same with source references
--- source code stack trace ---
#0 __GI_raise (sig=sig@entry=6) at ../sysdeps/unix/sysv/linux/raise.c:51
[Error: raise.c was not found in source tree]
#1 0x00007f10b3933801 in __GI_abort () at abort.c:79
[Error: abort.c was not found in source tree]
#2 0x00007f10b50ceca2 in dump_core () at ../source3/lib/dumpcore.c:338
333: /* Ensure we don't have a signal handler for abort. */
334: #ifdef SIGABRT
335: CatchSignal(SIGABRT, SIG_DFL);
336: #endif
337:
338: abort();
339:
340: #else /* DUMP_CORE */
341: exit(1);
342: #endif /* DUMP_CORE */
343: }
#3 0x00007f10b50bbb6b in smb_panic_s3 (why=<optimized out>) at
../source3/lib/util.c:838
833: i += 2; /* skip two chars */
834: }
835:
836: for (; i+1 < strhex_len && strhex[i] != 0 && strhex[i+1] != 0; i++) {
837: p1 = strchr(hexchars, toupper((unsigned char)strhex[i]));
838: if (p1 == NULL) {
839: break;
840: }
841:
842: i++; /* next hex digit */
843:
#4 0x00007f10b71a48cf in smb_panic (why=why@entry=0x7f10b71f2d37 "internal
error") at ../lib/util/fault.c:166
161: Something really nasty happened - panic !
162: **/
163: _PUBLIC_ void smb_panic(const char *why)
164: {
165: if (fault_state.panic_handler) {
166: fault_state.panic_handler(why);
167: _exit(1);
168: }
169: smb_panic_default(why);
170: }
#5 0x00007f10b71a4ae6 in fault_report (sig=<optimized out>) at
../lib/util/fault.c:83
78: DEBUGSEP(0);
79: DEBUG(0,("INTERNAL ERROR: Signal %d in pid %d
(%s)",sig,(int)getpid(),SAMBA_VERSION_STRING));
80: DEBUG(0,("\nPlease read the Trouble-Shooting section of the Samba
HOWTO\n"));
81: DEBUGSEP(0);
82:
83: smb_panic("internal error");
84:
85: /* smb_panic() never returns, so this is really redundant */
86: exit(1);
87: }
88:
#6 sig_fault (sig=<optimized out>) at ../lib/util/fault.c:94
89:
/****************************************************************************
90: catch serious errors
91:
****************************************************************************/
92: static void sig_fault(int sig)
93: {
94: fault_report(sig);
95: }
96:
97: /*******************************************************************
98: setup our fault handlers
99: ********************************************************************/
#7 <signal handler called>
#8 __strlen_sse2 () at ../sysdeps/x86_64/multiarch/../strlen.S:120
[Error: strlen.S was not found in source tree]
#9 0x00007f10b719d4fe in push_ucs2_talloc (ctx=ctx@entry=0x0,
dest=dest@entry=0x7ffe76d586a8, src=src@entry=0x0,
converted_size=converted_size@entry=0x7ffe76d586a0) at
../lib/util/charset/pull_push.c:41
36: * converted.
37: **/
38: bool push_ucs2_talloc(TALLOC_CTX *ctx, smb_ucs2_t **dest, const char *src,
39: size_t *converted_size)
40: {
41: size_t src_len = strlen(src)+1;
42:
43: *dest = NULL;
44: return convert_string_talloc(ctx, CH_UNIX, CH_UTF16LE, src, src_len,
45: (void **)dest, converted_size);
46: }
#10 0x00007f10b5bbd2d0 in E_md4hash (passwd=0x0, p16=p16@entry=0x7ffe76d58a70
"") at ../libcli/auth/smbencrypt.c:78
73: {
74: size_t len;
75: smb_ucs2_t *wpwd;
76: bool ret;
77:
78: ret = push_ucs2_talloc(NULL, &wpwd, passwd, &len);
79: if (!ret || len < 2) {
80: /* We don't want to return fixed data, as most callers
81: * don't check */
82: mdfour(p16, (const uint8_t *)passwd, strlen(passwd));
83: return false;
#11 0x00007f10b6d9686a in create_volume_objectid
(conn=conn@entry=0x55d33e2cd660, objid=objid@entry=0x7ffe76d58a70 "") at
../source3/smbd/trans2.c:3377
#12 0x00007f10b6d97503 in smbd_do_qfsinfo (xconn=0x55d33e2ba280,
conn=conn@entry=0x55d33e2cd660, mem_ctx=<optimized out>,
info_level=info_level@entry=1008, flags2=flags2@entry=8,
max_data_bytes=max_data_bytes@entry=64, fixed_portion=0x7ffe76d58ba0,
fname=0x55d33e2d2840, ppdata=0x7ffe76d58b90, ret_data_len=0x7ffe76d58b88) at
../source3/smbd/trans2.c:3806
#13 0x00007f10b6df20cf in smbd_smb2_getinfo_send (in_input_buffer=...,
in_flags=<optimized out>, in_additional_information=<optimized out>,
in_output_buffer_length=<optimized out>, in_file_info_class=<optimized out>,
in_info_type=<optimized out>, fsp=0x55d33e2db7c0, smb2req=0x55d33e2d3f60,
ev=0x55d33e29dcc0, mem_ctx=0x55d33e2d3f60) at ../source3/smbd/smb2_getinfo.c:430
425: size_t fixed_portion;
426:
427: /* the levels directly map to the passthru levels */
428: file_info_level = in_file_info_class + 1000;
429:
430: status = smbd_do_qfsinfo(smb2req->xconn, conn, state,
431: file_info_level,
432: STR_UNICODE,
433: in_output_buffer_length,
434: &fixed_portion,
435: fsp->fsp_name,
#14 smbd_smb2_request_process_getinfo (req=req@entry=0x55d33e2d3f60) at
../source3/smbd/smb2_getinfo.c:120
115: in_fsp = file_fsp_smb2(req, in_file_id_persistent, in_file_id_volatile);
116: if (in_fsp == NULL) {
117: return smbd_smb2_request_error(req, NT_STATUS_FILE_CLOSED);
118: }
119:
120: subreq = smbd_smb2_getinfo_send(req, req->sconn->ev_ctx,
121: req, in_fsp,
122: in_info_type,
123: in_file_info_class,
124: in_output_buffer_length,
125: in_input_buffer,
#15 0x00007f10b6dde506 in smbd_smb2_request_dispatch
(req=req@entry=0x55d33e2d3f60) at ../source3/smbd/smb2_server.c:2698
2693: break;
2694:
2695: case SMB2_OP_GETINFO:
2696: SMBPROFILE_IOBYTES_ASYNC_START(smb2_getinfo, profile_p,
2697: req->profile,
_INBYTES(req));
2698: return_value = smbd_smb2_request_process_getinfo(req);
2699: break;
2700:
2701: case SMB2_OP_SETINFO:
2702: SMBPROFILE_IOBYTES_ASYNC_START(smb2_setinfo, profile_p,
2703: req->profile,
_INBYTES(req));
#16 0x00007f10b6ddf16c in smbd_smb2_io_handler (fde_flags=<optimized out>,
xconn=0x55d33e2ba280) at ../source3/smbd/smb2_server.c:3914
3909: status = smbd_smb2_request_setup_out(req);
3910: if (!NT_STATUS_IS_OK(status)) {
3911: return status;
3912: }
3913:
3914: status = smbd_smb2_request_dispatch(req);
3915: if (!NT_STATUS_IS_OK(status)) {
3916: return status;
3917: }
3918:
3919: sconn->num_requests++;
#17 smbd_smb2_connection_handler (ev=<optimized out>, fde=<optimized out>,
flags=<optimized out>, private_data=<optimized out>) at
../source3/smbd/smb2_server.c:3952
3947: struct smbXsrv_connection *xconn =
3948: talloc_get_type_abort(private_data,
3949: struct smbXsrv_connection);
3950: NTSTATUS status;
3951:
3952: status = smbd_smb2_io_handler(xconn, flags);
3953: if (!NT_STATUS_IS_OK(status)) {
3954: smbd_server_connection_terminate(xconn,
nt_errstr(status));
3955: return;
3956: }
3957: }
#18 0x00007f10b3ceded0 in epoll_event_loop (tvalp=0x7ffe76d58d10,
epoll_ev=0x55d33e2b4eb0) at ../tevent_epoll.c:728
723: * make sure we only pass the flags
724: * the handler is expecting.
725: */
726: flags &= fde->flags;
727: if (flags) {
728: fde->handler(epoll_ev->ev, fde, flags,
fde->private_data);
729: break;
730: }
731: }
732:
733: return 0;
#19 epoll_event_loop_once (ev=<optimized out>, location=<optimized out>) at
../tevent_epoll.c:930
925: return -1;
926: }
927: epoll_ev->panic_force_replay = false;
928: epoll_ev->panic_state = NULL;
929:
930: return epoll_event_loop(epoll_ev, &tval);
931: }
932:
933: static const struct tevent_ops epoll_event_ops = {
934: .context_init = epoll_event_context_init,
935: .add_fd = epoll_event_add_fd,
#20 0x00007f10b3cec357 in std_event_loop_once (ev=0x55d33e29dcc0,
location=0x7f10b6eeca68 "../source3/smbd/process.c:4127") at
../tevent_standard.c:114
109: struct std_event_glue *glue =
110: talloc_get_type_abort(glue_ptr,
111: struct std_event_glue);
112: int ret;
113:
114: ret = glue->epoll_ops->loop_once(ev, location);
115: /*
116: * If the above hasn't panicked due to an epoll interface failure,
117: * std_fallback_to_poll() wasn't called, and hasn't cleared epoll_ops to
118: * signify fallback to poll_ops.
119: */
#21 0x00007f10b3ce87cd in _tevent_loop_once (ev=ev@entry=0x55d33e29dcc0,
location=location@entry=0x7f10b6eeca68 "../source3/smbd/process.c:4127") at
../tevent.c:725
720: }
721: }
722: }
723:
724: tevent_trace_point_callback(ev, TEVENT_TRACE_BEFORE_LOOP_ONCE);
725: ret = ev->ops->loop_once(ev, location);
726: tevent_trace_point_callback(ev, TEVENT_TRACE_AFTER_LOOP_ONCE);
727:
728: if (ev->nesting.level > 0) {
729: if (ev->nesting.hook_fn) {
730: int ret2;
#22 0x00007f10b3ce89eb in tevent_common_loop_wait (ev=0x55d33e29dcc0,
location=0x7f10b6eeca68 "../source3/smbd/process.c:4127") at ../tevent.c:848
843: /*
844: * loop as long as we have events pending
845: */
846: while (tevent_common_have_events(ev)) {
847: int ret;
848: ret = _tevent_loop_once(ev, location);
849: if (ret != 0) {
850: tevent_debug(ev, TEVENT_DEBUG_FATAL,
851: "_tevent_loop_once() failed: %d - %s\n",
852: ret, strerror(errno));
853: return ret;
#23 0x00007f10b3cec2f7 in std_event_loop_wait (ev=0x55d33e29dcc0,
location=0x7f10b6eeca68 "../source3/smbd/process.c:4127") at
../tevent_standard.c:145
140: struct std_event_glue *glue =
141: talloc_get_type_abort(glue_ptr,
142: struct std_event_glue);
143: int ret;
144:
145: ret = glue->epoll_ops->loop_wait(ev, location);
146: /*
147: * If the above hasn't panicked due to an epoll interface failure,
148: * std_fallback_to_poll() wasn't called, and hasn't cleared epoll_ops to
149: * signify fallback to poll_ops.
150: */
#24 0x00007f10b6dcef58 in smbd_process (ev_ctx=0x55d33e29dcc0,
msg_ctx=<optimized out>, sock_fd=38, interactive=<optimized out>) at
../source3/smbd/process.c:4127
#25 0x000055d33c0f6fcc in smbd_accept_connection (ev=0x55d33e29dcc0,
fde=<optimized out>, flags=<optimized out>, private_data=<optimized out>) at
../source3/smbd/server.c:1030
#26 0x00007f10b3ceded0 in epoll_event_loop (tvalp=0x7ffe76d58f50,
epoll_ev=0x55d33e29de80) at ../tevent_epoll.c:728
723: * make sure we only pass the flags
724: * the handler is expecting.
725: */
726: flags &= fde->flags;
727: if (flags) {
728: fde->handler(epoll_ev->ev, fde, flags,
fde->private_data);
729: break;
730: }
731: }
732:
733: return 0;
#27 epoll_event_loop_once (ev=<optimized out>, location=<optimized out>) at
../tevent_epoll.c:930
925: return -1;
926: }
927: epoll_ev->panic_force_replay = false;
928: epoll_ev->panic_state = NULL;
929:
930: return epoll_event_loop(epoll_ev, &tval);
931: }
932:
933: static const struct tevent_ops epoll_event_ops = {
934: .context_init = epoll_event_context_init,
935: .add_fd = epoll_event_add_fd,
#28 0x00007f10b3cec357 in std_event_loop_once (ev=0x55d33e29dcc0,
location=0x55d33c0fae2b "../source3/smbd/server.c:1397") at
../tevent_standard.c:114
109: struct std_event_glue *glue =
110: talloc_get_type_abort(glue_ptr,
111: struct std_event_glue);
112: int ret;
113:
114: ret = glue->epoll_ops->loop_once(ev, location);
115: /*
116: * If the above hasn't panicked due to an epoll interface failure,
117: * std_fallback_to_poll() wasn't called, and hasn't cleared epoll_ops to
118: * signify fallback to poll_ops.
119: */
#29 0x00007f10b3ce87cd in _tevent_loop_once (ev=ev@entry=0x55d33e29dcc0,
location=location@entry=0x55d33c0fae2b "../source3/smbd/server.c:1397") at
../tevent.c:725
720: }
721: }
722: }
723:
724: tevent_trace_point_callback(ev, TEVENT_TRACE_BEFORE_LOOP_ONCE);
725: ret = ev->ops->loop_once(ev, location);
726: tevent_trace_point_callback(ev, TEVENT_TRACE_AFTER_LOOP_ONCE);
727:
728: if (ev->nesting.level > 0) {
729: if (ev->nesting.hook_fn) {
730: int ret2;
#30 0x00007f10b3ce89eb in tevent_common_loop_wait (ev=0x55d33e29dcc0,
location=0x55d33c0fae2b "../source3/smbd/server.c:1397") at ../tevent.c:848
843: /*
844: * loop as long as we have events pending
845: */
846: while (tevent_common_have_events(ev)) {
847: int ret;
848: ret = _tevent_loop_once(ev, location);
849: if (ret != 0) {
850: tevent_debug(ev, TEVENT_DEBUG_FATAL,
851: "_tevent_loop_once() failed: %d - %s\n",
852: ret, strerror(errno));
853: return ret;
#31 0x00007f10b3cec2f7 in std_event_loop_wait (ev=0x55d33e29dcc0,
location=0x55d33c0fae2b "../source3/smbd/server.c:1397") at
../tevent_standard.c:145
140: struct std_event_glue *glue =
141: talloc_get_type_abort(glue_ptr,
142: struct std_event_glue);
143: int ret;
144:
145: ret = glue->epoll_ops->loop_wait(ev, location);
146: /*
147: * If the above hasn't panicked due to an epoll interface failure,
148: * std_fallback_to_poll() wasn't called, and hasn't cleared epoll_ops to
149: * signify fallback to poll_ops.
150: */
#32 0x000055d33c0f234a in smbd_parent_loop (parent=0x55d33e29d1b0,
ev_ctx=0x55d33e29dcc0) at ../source3/smbd/server.c:1397
#33 main (argc=<optimized out>, argv=<optimized out>) at
../source3/smbd/server.c:2164
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1817027
Title:
samba crashes when uploading files
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/samba/+bug/1817027/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs