View Issue Details

IDProjectCategoryView StatusLast Update
0000766Samba ServerBugpublic2022-07-19 09:53
ReporterBuck Assigned Topsmedley  
PrioritynormalSeverityminorReproducibilityalways
Status resolvedResolutionfixed 
PlatformOS/2OSArcaOSOS Version5.0.7
Summary0000766: tdbtool crashes when given command line argument
Descriptiontdbtool serverid.tdb will open a tdbtool prompt and info or check (etc) can be run successfully, however;
tdbtool serverid info (or any other command, or just any character even) will fail:
{0}[d:\mptn\etc\samba\lock] e:\Programs\Samba\tdbtool.exe serverid.tdb info
fcntl_lock: (fd=5) offset=0 rw_type=3 len=1 waitflag=1 (rc=0) pid=387
fcntl_unlock: (fd=5) offset=0 rw_type=3 len=1 (rc=0) pid=387

Killed by SIGSEGV
pid=0x0183 ppid=0x0059 tid=0x0001 slot=0x00aa pri=0x0200 mc=0x0001 ps=0x0010
E:\PROGRAMS\SAMBA\TDBTOOL.EXE
cs:eip=0000:00000000 ss:esp=000b5f09:0031fc58 ebp=00000053
 ds=0000 es=0000 fs=0004 gs=0000 efl=00000004
eax=0031fcb8 ebx=1ffc9d7c ecx=0031fccc edx=0031fcf0 edi=18039100 esi=0031ff6c
Creating 0183_01.TRP
Moved 0183_01.TRP to D:\var\log\app\62c9a180-0183_01-TDBTOOL-exceptq.txt
Steps To Reproducetdbtool serverid.tdb info (or any character(s) in the place of info)
TagsNo tags attached.
Attached Files
62c9a180-0183_01-TDBTOOL-exceptq.txt (18,616 bytes)   
______________________________________________________________________

 Exception Report - created 2022/07/09 15:40:48
______________________________________________________________________

 LIBC: Killed by SIGSEGV

 Hostname:         Agaradzo
 OS2/eCS Version:  2.45
 # of Processors:  4
 Physical Memory:  3431 mb
 Virt Addr Limit:  3072 mb
 Exceptq Version:  7.11.5-shl BETA8 (Jun  1 2020 18:37:02)

______________________________________________________________________

 Exception C0000005 - Access Violation
______________________________________________________________________

 Process:  E:\PROGRAMS\SAMBA\TDBTOOL.EXE (07/08/2022 02:14:13 3,695,080)
 PID:      183 (387)
 TID:      01 (1)
 Priority: 200

 Filename: E:\PROGRAMS\SAMBA\TDBTOOL.EXE (07/08/2022 02:14:13 3,695,080)
 Address:  005B:000216A9 (0001:000116A9)
 Cause:    Attempted to read from 00000006
           (not a valid address)

______________________________________________________________________

 Failing Instruction
______________________________________________________________________

 00021696  MOV   BYTE [EBP-0x19], 0x0   (c645 e7 00)
 0002169A  MOV   DWORD [EBP-0x20], 0x0  (c745 e0 00000000)
 000216A1  JMP   0x2173f                (e9 99000000)
 000216A6  MOV   EAX, [EBP-0xc]         (8b45 f4)
 000216A9 >MOVZX EAX, BYTE [EAX]        (0fb600)
 000216AC  MOV   [EBP-0x19], AL         (8845 e7)
 000216AF  MOVZX EAX, BYTE [EBP-0x19]   (0fb645 e7)
 000216B3  TEST  AL, AL                 (84c0)

______________________________________________________________________

 Registers
______________________________________________________________________

 EAX : 00000006   EBX  : 0031FF60   ECX : 00000000   EDX  : 0031FFA4
 ESI : 00000000   EDI  : 00000000
 ESP : 0031FE20   EBP  : 0031FE98   EIP : 000216A9   EFLG : 00010202
 CS  : 005B       CSLIM: FFFFFFFF   SS  : 0053       SSLIM: FFFFFFFF

 EAX : not a valid address
 EBX : read/write memory on this thread's stack
 ECX : not a valid address
 EDX : read/write memory on this thread's stack
 ESI : not a valid address
 EDI : not a valid address

______________________________________________________________________

 Stack Info for Thread 01
______________________________________________________________________

   Size       Base        ESP         Max         Top
 00100000   00320000 -> 0031FE20 -> 0031D000 -> 00220000

______________________________________________________________________

 Call Stack
______________________________________________________________________

   EBP     Address    Module     Obj:Offset    Nearest Public Symbol
 --------  ---------  --------  -------------  -----------------------
 Trap  ->  000216A9   TDBTOOL   0001:000116A9  convert_string.c#146 _convert_string_error_handle + 69 0001:00011640 (convert_string.c.2.obj)

  Offset Name                 Type                         Hex Value
  ������ �������������������� ���������������������������� ���������
  -12    p                    8 bit unsigned               6
  -16    q                    pointer to 8 bit unsigned    0
  -20    slen                 32 bit unsigned              31FF44
  -24    dlen                 32 bit unsigned              2
  -25    lastp                8 bit unsigned               0
  -32    retval               32 bit unsigned              0
  -78    ret                  0x202                        8E720031
  -36    p                    8 bit unsigned               103027
  -40    q                    pointer to 8 bit unsigned    20036710
  -44    retval               32 bit unsigned              FA735
  -48    slen                 32 bit unsigned              31FEA8
  -52    dlen                 32 bit unsigned              0
  -53    lastp                8 bit unsigned               0
  -79    ret                  0x202                        720031FE
  -60    p                    8 bit unsigned               103027
  -64    q                    pointer to 8 bit unsigned    0
  -68    retval               32 bit unsigned              103027
  -72    slen                 32 bit unsigned              20036710
  -76    dlen                 32 bit unsigned              28E72
  -77    lastp                8 bit unsigned               0
  -80    ret                  0x202                        31FE68

 0031FE98  00021C8F   TDBTOOL   0001:00011C8F  convert_string.c#291 _convert_string_handle + 43 0001:00011C4C (convert_string.c.2.obj)

  Offset Name                 Type                         Hex Value
  ������ �������������������� ���������������������������� ���������
   8     ic                   pointer to type 0x213        200365F0
   12    from                 0x217                        31FFA4
   16    to                   0x217                        2158BC
   20    src                  void                         6
   24    srclen               32 bit unsigned              31FF44
   28    dest                 pointer to void              0
   32    destlen              32 bit unsigned              2
   36    converted_size       pointer to 32 bit unsigned   5
  -9     ret                  0x202                        0
  -16    reason               8 bit unsigned               10261

 0031FED8  000229BA   TDBTOOL   0001:000129BA  convert_string.c#513 _convert_string + 44 0001:00012976 (convert_string.c.2.obj)

  Offset Name                 Type                         Hex Value
  ������ �������������������� ���������������������������� ���������
   8     from                 0x217                        31FFA4
   12    to                   0x217                        2158BC
   16    src                  void                         6
   20    srclen               32 bit unsigned              31FF44
   24    dest                 pointer to void              0
   28    destlen              32 bit unsigned              2
   32    converted_size       pointer to 32 bit unsigned   5

 0031FF08  000126C3   TDBTOOL   0001:000026C3  tdbtool.c#965 main + 2EE 0001:000023D5 (..\..\lib\tdb\tools\tdbtool.c)

 0031FF30  00010027   TDBTOOL   0001:00000027  crt0.s#90 __text + 27 0001:00000000 ({standard input})

 0031FF54  1E23F621   LIBCX0    0001:0000F621   ___init_app + 11 0001:0000F610 (main.obj)

 0031FFE0  1E3B6C9B   LIBCN0    0001:00046C9B  appinit.s#16 ___init_app + B 0001:00046C90 (appinit.obj)


______________________________________________________________________

 Labels on the Stack
______________________________________________________________________

   ESP     Address    Module     Obj:Offset    Nearest Public Symbol
 --------  ---------  --------  -------------  -----------------------
 0031FE4C  00028E72   TDBTOOL   0001:00018E72  talloc.c#2472 _talloc_strdup + 3C 0001:00018E36 (talloc.c.1.obj)
 0031FE54  00103027   TDBTOOL   0001:000F3027  loadparm.c#495 _store_lp_set_cmdline + 3EC 0001:000F2C3B (loadparm.c.72.obj)
 0031FE5C  00103027   TDBTOOL   0001:000F3027  loadparm.c#495 _store_lp_set_cmdline + 3EC 0001:000F2C3B (loadparm.c.72.obj)
 0031FE6C  000FA735   TDBTOOL   0001:000EA735  codepoints.c#16635 _smb_iconv_handle_reinit + 18E 0001:000EA5A7 (codepoints.c.2.obj)
 0031FE74  00103027   TDBTOOL   0001:000F3027  loadparm.c#495 _store_lp_set_cmdline + 3EC 0001:000F2C3B (loadparm.c.72.obj)
 0031FE9C  00021C8F   TDBTOOL   0001:00011C8F  convert_string.c#291 _convert_string_handle + 43 0001:00011C4C (convert_string.c.2.obj)
 0031FEC8  00010261   TDBTOOL   0001:00000261  tdbtool.c#160 _main - 2174 0001:000023D5 (..\..\lib\tdb\tools\tdbtool.c)
 0031FEDC  000229BA   TDBTOOL   0001:000129BA  convert_string.c#513 _convert_string + 44 0001:00012976 (convert_string.c.2.obj)
 0031FF0C  000126C3   TDBTOOL   0001:000026C3  tdbtool.c#965 main + 2EE 0001:000023D5 (..\..\lib\tdb\tools\tdbtool.c)
 0031FF34  00010027   TDBTOOL   0001:00000027  crt0.s#90 __text + 27 0001:00000000 ({standard input})
 0031FF48  1E23F2B5   LIBCX0    0001:0000F2B5  main.c#80 libcxExceptionHandler 0001:0000F2B5 (.\libcx-0.7.2\src\main.c)
 0031FF58  1E23F621   LIBCX0    0001:0000F621   ___init_app + 11 0001:0000F610 (main.obj)
 0031FF70  1E3ECDB0   LIBCN0    0001:0007CDB0  exceptions.c#74 __libc_Back_exceptionHandler 0001:0007CDB0 (exceptions.obj)
 0031FFC4  1E38A0E4   LIBCN0    0001:0001A0E4  __init.c#307 ___init + 64 0001:0001A080 (.\libc-0.1.10\src\emx\src\lib\sys\__init.c)
 0031FFE4  1E3B6C9B   LIBCN0    0001:00046C9B  appinit.s#16 ___init_app + B 0001:00046C90 (appinit.obj)
 0031FFEC  1FFECE38   DOSCALL1  0004:0000CE38  DOS32R3EXITADDR

______________________________________________________________________

 Stack Contents from ESP-100 to Stack Base  (ESP = 0031FE20)
______________________________________________________________________

 --addr--   --------------dwords---------------   -----chars------
 0031FD20 : 00000000 00000183 00080000 00000000 : ................
 0031FD30 : FFFF0000 00120000 00000000 00000000 : ................
 0031FD40 : 00000000 00000000 00000000 00000000 : ................
 0031FD50 : 20200000 00004020 00000000 00000000 : ..   @..........
 0031FD60 : 00000000 0000150B 00000053 00000053 : ........S...S...
 0031FD70 : 00000000 00000000 00000006 0031FF60 : ............`.1.
 0031FD80 : 00000000 0031FFA4 0031FE98 000216A9 : ......1...1.....
 0031FD90 : 0000005B 00010202 0031FE20 00000053 : [....... .1.S...
 0031FDA0 : 20030000 00000031 200366E0 00000000 : ... 1....f. ....
 0031FDB0 : 00000000 00000000 0031FDF8 00026443 : ..........1.Cd..
 0031FDC0 : 00000000 00000031 00000000 200365C0 : ....1........e. 
 0031FDD0 : 00000108 00000000 20036760 20036760 : ........`g. `g. 
 0031FDE0 : 00000031 200366E0 00000000 20036760 : 1....f. ....`g. 
 0031FDF0 : 00000000 000000D8 0031FE18 0002653D : ..........1.=e..
 0031FE00 : 20036710 00000001 00000000 0031FE38 : .g. ........8.1.
 0031FE10 : 200365C0 00000000 0031FE48 00028E31 : .e. ....H.1.1...
 0031FE20 : 20036760 20036790 00000000 200365F0 : `g. .g. .....e. 
 0031FE30 : 00000000 00000000 20036760 20036790 : ........`g. .g. 
 0031FE40 : 200365F0 00000000 0031FE68 00028E72 : .e. ....h.1.r...
 0031FE50 : 20036710 00103027 00000000 00103027 : .g. '0......'0..
 0031FE60 : 00000000 00000000 0031FEA8 000FA735 : ..........1.5...
 0031FE70 : 20036710 00103027 00000000 00000000 : .g. '0..........
 0031FE80 : 00000002 0031FF44 00000000 00000006 : ....D.1.........
 0031FE90 : 00000000 00000000 0031FED8 00021C8F : ..........1.....
 0031FEA0 : 200365F0 0031FFA4 002158BC 00000006 : .e. ..1..X!.....
 0031FEB0 : 0031FF44 00000000 00000002 00000005 : D.1.............
 0031FEC0 : 00000000 00000000 00010261 00000000 : ........a.......
 0031FED0 : 00000000 0031FF60 0031FF08 000229BA : ....`.1...1..)..
 0031FEE0 : 200365F0 0031FFA4 002158BC 00000006 : .e. ..1..X!.....
 0031FEF0 : 0031FF44 00000000 00000002 00000005 : D.1.............
 0031FF00 : 00000000 0031FF60 0031FF30 000126C3 : ....`.1.0.1..&..
 0031FF10 : 0031FFA4 002158BC 00000006 0031FF44 : ..1..X!.....D.1.
 0031FF20 : 00000000 00000002 00000005 00000003 : ................
 0031FF30 : 0031FF54 00010027 00000003 0031FF74 : T.1.'.......t.1.
 0031FF40 : 20030180 0031FF6C 1E23F2B5 00000000 : ... l.1...#.....
 0031FF50 : 0031FFE0 0031FFE0 1E23F621 0031FF60 : ..1...1.!.#.`.1.
 0031FF60 : 00000003 0031FF74 20030180 FFFFFFFF : ....t.1.... ....
 0031FF70 : 1E3ECDB0 0031FF85 0031FFA4 0031FFB2 : ..>...1...1...1.
 0031FF80 : 00000000 5C3A4580 676F7250 736D6172 : .....E:\Programs
 0031FF90 : 6D61535C 745C6162 6F746264 652E6C6F : \Samba\tdbtool.e
 0031FFA0 : 80006578 76726573 64697265 6264742E : xe..serverid.tdb
 0031FFB0 : 6E698000 00006F66 00000000 00000070 : ..info......p...
 0031FFC0 : 00000028 1E38A0E4 00000000 00000000 : (.....8.........
 0031FFD0 : 00000000 00000000 00000000 00000000 : ................
 0031FFE0 : 00000000 1E3B6C9B 00000000 1FFECE38 : .....l;.....8...
 0031FFF0 : 000016AE 00000000 00320000 00320D5B : ..........2.[.2.

______________________________________________________________________

 Memory addressed by EBX (0031FF60) for 160 bytes
______________________________________________________________________

 --addr--   -----dwords------   ---------bytes---------   -chars--
 0031FF60 : 00000003 0031FF74 : 03 00 00 00 74 FF 31 00 : ....t.1.
 0031FF68 : 20030180 FFFFFFFF : 80 01 03 20 FF FF FF FF : ... ....
 0031FF70 : 1E3ECDB0 0031FF85 : B0 CD 3E 1E 85 FF 31 00 : ..>...1.
 0031FF78 : 0031FFA4 0031FFB2 : A4 FF 31 00 B2 FF 31 00 : ..1...1.
 0031FF80 : 00000000 5C3A4580 : 00 00 00 00 80 45 3A 5C : .....E:\
 0031FF88 : 676F7250 736D6172 : 50 72 6F 67 72 61 6D 73 : Programs
 0031FF90 : 6D61535C 745C6162 : 5C 53 61 6D 62 61 5C 74 : \Samba\t
 0031FF98 : 6F746264 652E6C6F : 64 62 74 6F 6F 6C 2E 65 : dbtool.e
 0031FFA0 : 80006578 76726573 : 78 65 00 80 73 65 72 76 : xe..serv
 0031FFA8 : 64697265 6264742E : 65 72 69 64 2E 74 64 62 : erid.tdb
 0031FFB0 : 6E698000 00006F66 : 00 80 69 6E 66 6F 00 00 : ..info..
 0031FFB8 : 00000000 00000070 : 00 00 00 00 70 00 00 00 : ....p...
 0031FFC0 : 00000028 1E38A0E4 : 28 00 00 00 E4 A0 38 1E : (.....8.
 0031FFC8 : 00000000 00000000 : 00 00 00 00 00 00 00 00 : ........
 0031FFD8 : 2 lines not printed duplicate the line above
 0031FFE0 : 00000000 1E3B6C9B : 00 00 00 00 9B 6C 3B 1E : .....l;.
 0031FFE8 : 00000000 1FFECE38 : 00 00 00 00 38 CE FE 1F : ....8...
 0031FFF0 : 000016AE 00000000 : AE 16 00 00 00 00 00 00 : ........
 0031FFF8 : 00320000 00320D5B : 00 00 32 00 5B 0D 32 00 : ..2.[.2.

______________________________________________________________________

 Memory addressed by EDX (0031FFA4) for 92 bytes
______________________________________________________________________

 --addr--   -----dwords------   ---------bytes---------   -chars--
 0031FFA4 : 76726573 64697265 : 73 65 72 76 65 72 69 64 : serverid
 0031FFAC : 6264742E 6E698000 : 2E 74 64 62 00 80 69 6E : .tdb..in
 0031FFB4 : 00006F66 00000000 : 66 6F 00 00 00 00 00 00 : fo......
 0031FFBC : 00000070 00000028 : 70 00 00 00 28 00 00 00 : p...(...
 0031FFC4 : 1E38A0E4 00000000 : E4 A0 38 1E 00 00 00 00 : ..8.....
 0031FFCC : 00000000 00000000 : 00 00 00 00 00 00 00 00 : ........
 0031FFDC : 2 lines not printed duplicate the line above
 0031FFE4 : 1E3B6C9B 00000000 : 9B 6C 3B 1E 00 00 00 00 : .l;.....
 0031FFEC : 1FFECE38 000016AE : 38 CE FE 1F AE 16 00 00 : 8.......
 0031FFF4 : 00000000 00320000 : 00 00 00 00 00 00 32 00 : ......2.
 0031FFFC : 00320D5B          : 5B 0D 32 00             : [.2.

______________________________________________________________________

 DLLs accessible from this process
______________________________________________________________________

 DOSCALLS                   06/03/2021 22:27:29    870,886 D:\OS2KRNL
 DISTORM  0f380000 0000a274 11/11/2012 23:43:02     57,491 E:\USR\LIB\DISTORM.DLL
 PMMERGE  18e20000 00001000 04/10/2007 18:26:01  1,270,275 D:\OS2\DLL\PMMERGE.DLL
 PMGPI    1aae0000 00010000 10/16/2001 13:31:09    248,446 D:\OS2\DLL\PMGPI.DLL
 URPO     1c820000 00000bc0 06/30/2016 09:51:09      2,768 E:\USR\LIB\URPO.DLL
 GMP10    1c830000 000620b0 09/07/2020 01:53:06    309,676 E:\USR\LIB\GMP10.DLL
 HOGWEE50 1c8a0000 00026780 03/25/2020 08:12:12    143,989 E:\USR\LIB\HOGWEE50.DLL
 P11KIT0  1c8d0000 000b7b70 12/10/2020 01:01:01    405,938 E:\USR\LIB\P11KIT0.DLL
 IDN20    1c990000 0001c2c0 01/13/2020 08:40:27     82,574 E:\USR\LIB\IDN20.DLL
 UNISTRI2 1c9b0000 00186540 01/13/2020 03:37:12    887,595 E:\USR\LIB\UNISTRI2.DLL
 PTHR01   1cb40000 00002070 10/04/2021 02:08:26      7,787 E:\USR\LIB\PTHR01.DLL
 TASN16   1cb50000 0000dcb0 11/04/2019 06:02:15     42,862 E:\USR\LIB\TASN16.DLL
 INTL8    1cb60000 000082f0 06/30/2016 15:21:21     27,573 E:\USR\LIB\INTL8.DLL
 GTLS30   1cb70000 00155ba0 04/04/2020 05:20:28  1,009,710 E:\USR\LIB\GTLS30.DLL
 LDAP     1ccd0000 001a1900 04/28/2018 03:52:24  1,040,317 E:\USR\LIB\LDAP.DLL
 NETTLE70 1e010000 0002ceb0 03/25/2020 08:12:12    145,225 E:\USR\LIB\NETTLE70.DLL
 MMAP     1e1f0000 00002de0 08/25/2014 09:08:27      9,568 E:\USR\LIB\MMAP.DLL
 LIBCX0   1e230000 00012f60 08/26/2021 08:27:23     59,049 E:\USR\LIB\LIBCX0.DLL
 GCC1     1e260000 00013070 07/22/2020 21:00:13     59,120 E:\USR\LIB\GCC1.DLL
 EXCEPTQ  1e290000 000136c6 06/01/2020 20:37:01    162,595 E:\USR\LIB\EXCEPTQ.DLL
 PREWRITE 1e360000 00001e00 07/25/2021 01:09:19     11,521 D:\SYS\DLL\PREWRITE.DLL
 LIBCN0   1e370000 00116540 03/22/2022 14:09:09  1,266,157 E:\USR\LIB\LIBCN0.DLL
 LIBC066  1e4b0000 0002f2c0 03/22/2022 14:09:08    316,300 E:\USR\LIB\LIBC066.DLL
 TCPIP32  1f210000 0001bb20 08/16/2011 06:01:00     87,504 D:\MPTN\DLL\TCPIP32.DLL
 VBE2GRAD 1f330000 000048f0 10/31/2020 12:28:16     65,425 D:\OS2\DLL\VBE2GRAD.DLL
 PANOGREX 1f350000 0000030d 10/31/2020 11:14:09      2,041 D:\OS2\DLL\PANOGREX.DLL
 VMAN     1f360000 0000d9f9 03/22/2006 14:20:26     67,993 D:\OS2\DLL\VMAN.DLL
 GRE2VMAN 1f3b0000 000044a8 10/25/2007 16:54:19     21,325 D:\OS2\DLL\GRE2VMAN.DLL
 FREETYPE 1f450000 0001729c 03/23/2020 22:38:23     82,402 D:\OS2\DLL\FREETYPE.DLL
 PMUNIF   1f480000 0000c3a0 10/16/2001 14:59:29     43,823 D:\OS2\DLL\PMUNIF.DLL
 PMATM    1f4a0000 0003bd25 09/14/2001 15:41:26    224,343 D:\OS2\DLL\PMATM.DLL
 DISPLAY  1f500000 0000004c 03/22/2006 08:54:14     44,198 D:\OS2\DLL\DISPLAY.DLL
 LOCALE   1f5a0000 00025fd0 09/04/2002 17:31:00    108,353 D:\OS2\DLL\LOCALE.DLL
 BVHWNDW  1f600000 00004316 09/10/2001 16:17:17     16,797 D:\OS2\DLL\BVHWNDW.DLL
 SOFTDRAW 1f680000 000c5a96 12/29/2004 11:15:00    417,095 D:\OS2\DLL\SOFTDRAW.DLL
 SPL1B    1f750000 00000822 01/18/2005 13:37:00      7,125 D:\OS2\DLL\SPL1B.DLL
 PMSPL    1f760000 00006a46 01/18/2005 13:37:00    280,283 D:\OS2\DLL\PMSPL.DLL
 PMSHLTKT 1f7e0000 0000e000 09/06/2000 12:45:10     44,232 D:\OS2\DLL\PMSHLTKT.DLL
 PMVIOP   1f7f0000 0000e204 12/29/2004 11:46:00     66,820 D:\OS2\DLL\PMVIOP.DLL
 UCV32    1f820000 00005c91 09/04/2002 22:30:00     27,463 D:\OS2\DLL\UCV32.DLL
 UCONV    1f9a0000 0000024f 01/20/2020 07:34:15      1,682 D:\OS2\DLL\UCONV.DLL
 LIBUNI   1f9b0000 00012b9c 01/20/2020 07:34:15     80,766 D:\OS2\DLL\LIBUNI.DLL
 FFST     1ff40000 00002234 03/08/2002 18:23:00     11,425 D:\OS2\DLL\FFST.DLL
 DOSCALL1 1ffc0000 0000c1f4 11/24/2011 03:24:00    132,401 D:\OS2\DLL\DOSCALL1.DLL

______________________________________________________________________

 End of Exception Report - report took 193 ms to generate
______________________________________________________________________

Activities

Buck

2022-07-09 21:05

reporter   ~0004458

This could be limited to my machine, I have a tdbtool.exe from where you had fixed another issue... it had worked fine then but when trying it now, it fails as well

psmedley

2022-07-09 21:35

administrator   ~0004460

Seems to work here:
{2}[u:\dev\samba-ubuntu-4.11.6\samba] \samba\tdbtool.exe c:\MPTN\ETC\samba\private\secrets.tdb
fcntl_lock: (fd=5) offset=0 rw_type=3 len=1 waitflag=1 (rc=0) pid=55757
fcntl_unlock: (fd=5) offset=0 rw_type=3 len=1 (rc=0) pid=55757
tdb>

Can you upload serverid.tdb incase it's a corrupt tdb?

psmedley

2022-07-09 22:03

administrator   ~0004461

Oops I should have fully read your report.
{127}[u:\dev\samba-ubuntu-4.11.6\samba] \samba\tdbtool.exe c:\MPTN\ETC\samba\private\secrets.tdb info
fcntl_lock: (fd=5) offset=0 rw_type=3 len=1 waitflag=1 (rc=0) pid=55758
fcntl_unlock: (fd=5) offset=0 rw_type=3 len=1 (rc=0) pid=55758

Killed by SIGSEGV
pid=0xd9ce ppid=0xd3fd tid=0x0001 slot=0x00ca pri=0x0200 mc=0x0001 ps=0x0010
U:\SAMBA\TDBTOOL.EXE
cs:eip=0000:00000000 ss:esp=20034620:000b5f09 ebp=00010053
 ds=0000 es=0000 fs=0031fba8 gs=0000 efl=0031fc48
eax=0031fca8 ebx=1ffc9d54 ecx=0031fcbc edx=0031fce0 edi=000b5cc8 esi=0031ff5c
Creating D9CE_01.TRP
Moved d9ce_01.TRP to C:\var\log\app\62ca8080-d9ce_01-TDBTOOL-exceptq.txt

psmedley

2022-07-16 09:02

administrator   ~0004487

Last edited: 2022-07-16 09:04

Please test with https://smedley.id.au/tmp/tdbtool.zip

There's an OS/2 specific patch in tdbtool.c causing this - reverting it seems to help :P

diff --git a/lib/tdb/tools/tdbtool.c b/lib/tdb/tools/tdbtool.c
index d30991645..96a6ae935 100644
--- a/lib/tdb/tools/tdbtool.c
+++ b/lib/tdb/tools/tdbtool.c
@@ -960,7 +960,7 @@ int main(int argc, char *argv[])
         cmdname = argv[2];
         FALL_THROUGH;
     default:
-#ifdef __OS2__
+#ifdef __OS2__x
             if (argc == 3) {
                arg1 = convert_string(argv[1], &arg1len);
             }

Buck

2022-07-16 15:44

reporter   ~0004489

Looks like it is working correctly here.

psmedley

2022-07-16 22:31

administrator   ~0004490

Thanks, now to work out where this patch came from... potentially misapplied from 3.x

Will do some digging then commit the fix

psmedley

2022-07-17 08:35

administrator   ~0004491

ok bww reverted the changes to tdbtool.c in https://trac.netlabs.org/samba/changeset/907 - I've committed the equivalent to this in git.

Buck

2022-07-18 02:19

reporter   ~0004492

I think bww made a change in either libc or libcx,. I had tried a build you had fixed an issue with previously (it had been working) and now fails too (at first I thought maybe the fix for it had been missed).

psmedley

2022-07-19 09:53

administrator   ~0004493

Resolved in latest build

Issue History

Date Modified Username Field Change
2022-07-09 21:01 Buck New Issue
2022-07-09 21:01 Buck File Added: 62c9a180-0183_01-TDBTOOL-exceptq.txt
2022-07-09 21:05 Buck Note Added: 0004458
2022-07-09 21:35 psmedley Note Added: 0004460
2022-07-09 22:03 psmedley Note Added: 0004461
2022-07-09 22:56 psmedley Assigned To => psmedley
2022-07-09 22:56 psmedley Status new => confirmed
2022-07-16 09:02 psmedley Note Added: 0004487
2022-07-16 09:04 psmedley Note Edited: 0004487
2022-07-16 09:06 psmedley Status confirmed => feedback
2022-07-16 15:44 Buck Note Added: 0004489
2022-07-16 15:44 Buck Status feedback => assigned
2022-07-16 22:31 psmedley Note Added: 0004490
2022-07-17 08:35 psmedley Note Added: 0004491
2022-07-18 02:19 Buck Note Added: 0004492
2022-07-19 09:53 psmedley Status assigned => resolved
2022-07-19 09:53 psmedley Resolution open => fixed
2022-07-19 09:53 psmedley Note Added: 0004493
2024-01-19 21:01 psmedley Category 10 => Bug