[Bug 1257186] Re: memory leakage messages (no talloc stackframe)

monochromec monochromec at gmail.com
Mon Nov 10 14:16:20 UTC 2014


This still might point back to the talloc issue I pointed out earlier in
this thread.

Checking libtalloc2 on both trusty and utopic (14.04.1 and 14.10)
reveals the following:

trusty:  49704 Oct 21  2013 /usr/lib/x86_64-linux-gnu/libtalloc.so.2.1.0
utopic: 59560 Jul  6 07:12 /usr/lib/x86_64-linux-gnu/libtalloc.so.2.1.1

So different versions, patchlevels and sizes...

Apparently the talloc2 patch present in 14.10 didn't make into 14.4.1;
if somebody upstream is reading this it would be great to have a
timeline for inclusion into the 14.4 base.

-- 
You received this bug notification because you are a member of Ubuntu
Foundations Bugs, which is subscribed to samba in Ubuntu.
https://bugs.launchpad.net/bugs/1257186

Title:
  memory leakage messages (no talloc stackframe)

Status in Samba:
  Fix Released
Status in “samba” package in Ubuntu:
  Triaged
Status in “samba” source package in Trusty:
  Triaged
Status in “samba” package in Debian:
  New

Bug description:
  This message appears a lot as of a recent update to samba (Trusty
  development branch):

  no talloc stackframe at ../source3/param/loadparm.c:4831, leaking
  memory

  From this upstream bug report, I am lead to believe the issue is in
  libpam-smbpass, but I don't really know for sure.

  http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=728666

  I am filing this bug report mainly so that I can refer to it on the
  testing tracker as an issue, while still setting the test case to
  pass. Note that other than the error message itself, I am not aware of
  any bad side effect.

  doug at v32-serv04:~$ lsb_release -a
  No LSB modules are available.
  Distributor ID: Ubuntu
  Description:    Ubuntu Trusty Tahr (development branch)
  Release:        14.04
  Codename:       trusty

To manage notifications about this bug go to:
https://bugs.launchpad.net/samba/+bug/1257186/+subscriptions



More information about the foundations-bugs mailing list