This is a multi-part message in MIME format.
--------------000701070908040607050107
Content-Type: text/plain; charset=ISO-8859-1
Content-Transfer-Encoding: 7bit
See gdb output attached.
--------------000701070908040607050107
Content-Type: text/plain; charset=UTF-8;
name="gdb-bt-its8041.txt"
Content-Transfer-Encoding: 7bit
Content-Disposition: attachment;
filename="gdb-bt-its8041.txt"
#0 send_ldap_control (ber=0x7fc9e8d45130, c=0x30303d6469726580) at result.c:419
rc = 32713
__PRETTY_FUNCTION__ = "send_ldap_control"
#1 0x0000000000452574 in slap_response_play (op=0x452574 <slap_response_play+83>, rs=0x7fc9e8d45100) at result.c:506
sc_next = 0x7fc9e8d45130
sc_nextp = 0x7fc9e8d45810
rc = 0
sc = 0x7fc9e0000908
scp = 0x7fc9e8d45130
#2 0x0000000000452d16 in send_ldap_response (op=0x7fc9e8d45810, rs=0x7fc9e8d45530) at result.c:693
berbuf = {
buffer = "\002\000\001\000\005A\000\000\377\377\377\377\377\377\377\377!", '\000' <repeats 15 times>, "\250\t\000\340\311\177\000\000\250\t\000\340\311\177\000\000\204\031\000\340\311\177\000\000\316\t\000\340\311\177\000\000\000\000\000\000\000\000\000\000\300\b\000\340\311\177\000\000\003\267>\352\311\177\000\000\000S\324\350\311\177\000\000(\t\000\340\311\177\000\000 \000\000\000\060\000\000\000\260R\324\350\311\177\000\000\360Q\324\350\311\177\000\000(\t\000\340\311\177\000\000P\000\000\000\000\000\000\000\315\350O\000\000\000\000\000X\267>\352\311\177\000\000\377\377\377\377\377\377\377\377(\t\000\340\311\177\000\000\377\377\377\377\377\377\377\377\001\000\000\000\377\377\377\000\300\b\000\340\311\177\000\000"..., ialign = 65538, lalign = 71489730707458, falign = 9.18382988e-41, dalign = 3.5320619972997032e-310,
palign = 0x410500010002 <error: Cannot access memory at address 0x410500010002>}
ber = 0x7fc9e8d45130
rc = 23
bytes = 140505023260880
__PRETTY_FUNCTION__ = "send_ldap_response"
#3 0x00000000004536eb in slap_send_ldap_result (op=0x7fc9e8d45810, rs=0x7fc9e8d45530) at result.c:863
tmp = 0x0
otext = 0x7fc9ea3eb758 "internal error"
oref = 0x0
__PRETTY_FUNCTION__ = "slap_send_ldap_result"
#4 0x00007fc9ea3e1053 in syncprov_state_ctrl (op=0x7fc9e8d45810, rs=0x7fc9e8d45530, e=0x7fc9e8d454b0, entry_sync_state=1, ctrls=0x7fc9e0000908, num_ctrls=0,
send_cookie=1, cookie=0x7fc9e8d45520) at syncprov.c:243
a = 0x7fc9e8d45480
ret = -1
berbuf = {
buffer = "\000\000\001\000\005A\000\000\377\377\377\377\377\377\377\377\001", '\000' <repeats 23 times>, "\250\t\000\340\311\177\000\000\204\031\000\340\311\177", '\000' <repeats 18 times>, "\300\b\000\340\311\177", '\000' <repeats 14 times>, "\001\000\000\000\020\237i\334\311\177\000\000 \t\000\340\311\177\000\000\300\b\000\340\311\177\000\000\000\000\000\000\000\000\000\000\266\237i\334\311\177\000\000\232\t\000\340\311\177\000\000\060T\324\350\311\177\000\000 \t\000\340\311\177", '\000' <repeats 18 times>, " U\324\350\311\177\000\000\020X\324\350\311\177\000\000\350\017\000\000\000\000\000\000"..., ialign = 65536, lalign = 71489730707456,
falign = 9.18354962e-41, dalign = 3.5320619972996044e-310, palign = 0x410500010000 <error: Cannot access memory at address 0x410500010000>}
ber = 0x7fc9e8d45300
cp = 0x7fc9e0000908
bv = {bv_len = 1, bv_val = 0x7 <error: Cannot access memory at address 0x7>}
entryuuid_bv = {bv_len = 8386118574382606194, bv_val = 0x696e556c616e6f69 <error: Cannot access memory at address 0x696e556c616e6f69>}
#5 0x00007fc9ea3e2f38 in syncprov_sendresp (op=0x7fc9e8d45810, ri=0x7fc9dc699ed0, so=0x7fc9dc685620, mode=1) at syncprov.c:854
rs = {sr_type = REP_RESULT, sr_tag = 101, sr_msgid = 2, sr_err = 80, sr_matched = 0x0, sr_text = 0x7fc9ea3eb758 "internal error", sr_ref = 0x0,
sr_ctrls = 0x7fc9e0000908, sr_un = {sru_search = {r_entry = 0x0, r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0, r_nentries = 0, r_v2ref = 0x0},
sru_sasl = {r_sasldata = 0x0}, sru_extended = {r_rspoid = 0x0, r_rspdata = 0x0}}, sr_flags = 64}
cookie = {bv_len = 121,
bv_val = 0x7fc9e0000920 "rid=001,sid=001,csn=rid=001,sid=001,csn=20150130194936.884757Z#000000#001#000000;20150130194935.766383Z#000000#003#000000"}
csns = {{bv_len = 101, bv_val = 0x7fc9dc699f50 "rid=001,sid=001,csn=20150130194936.884757Z#000000#001#000000;20150130194935.766383Z#000000#003#000000"}, {
bv_len = 0, bv_val = 0x0}}
e_uuid = {e_id = 0, e_name = {bv_len = 0, bv_val = 0x0}, e_nname = {bv_len = 0, bv_val = 0x0}, e_attrs = 0x7fc9e8d45480, e_ocflags = 0, e_bv = {bv_len = 0,
bv_val = 0x0}, e_private = 0x0}
a_uuid = {a_desc = 0x9df200, a_vals = 0x0, a_nvals = 0x7fc9dc699f00, a_numvals = 0, a_flags = 0, a_next = 0x0}
__PRETTY_FUNCTION__ = "syncprov_sendresp"
#6 0x00007fc9ea3e336a in syncprov_qplay (op=0x7fc9e8d45810, so=0x7fc9dc685620) at syncprov.c:925
on = 0x7fc9dc14bea0
sr = 0x7fc9dc699fe0
rc = 0
#7 0x00007fc9ea3e359f in syncprov_qtask (ctx=0x7fc9e8d45c10, arg=0x7fc9dc685620) at syncprov.c:986
so = 0x7fc9dc685620
opbuf = {ob_op = {o_hdr = 0x7fc9e8d45980, o_tag = 99, o_time = 1422647372, o_tincr = 0, o_bd = 0x7fc9e8d45680, o_req_dn = {bv_len = 17,
bv_val = 0x7fc9dc685bdd "dc=example,dc=com"}, o_req_ndn = {bv_len = 17, bv_val = 0x7fc9dc685bef "dc=example,dc=com"}, o_request = {oq_add = {
rs_modlist = 0x2, rs_e = 0xe10000001f4}, oq_bind = {rb_method = 2, rb_cred = {bv_len = 15461882266100, bv_val = 0x7fc9dc15315c "\020\016"}, rb_edn = {
bv_len = 0, bv_val = 0x7fc9dc685b48 "\001"}, rb_ssf = 3697825744, rb_mech = {bv_len = 15, bv_val = 0x7fc9dc685c01 "(objectClass=*)"}}, oq_compare = {
rs_ava = 0x2}, oq_modify = {rs_mods = {rs_modlist = 0x2, rs_no_opattrs = -12 '\364'}, rs_increment = -602590884}, oq_modrdn = {rs_mods = {
rs_modlist = 0x2, rs_no_opattrs = -12 '\364'}, rs_deleteoldrdn = -602590884, rs_newrdn = {bv_len = 0, bv_val = 0x7fc9dc685b48 "\001"}, rs_nnewrdn = {
bv_len = 140504962979792, bv_val = 0xf <error: Cannot access memory at address 0xf>}, rs_newSup = 0x7fc9dc685c01, rs_nnewSup = 0x0}, oq_search = {
rs_scope = 2, rs_deref = 0, rs_slimit = 500, rs_tlimit = 3600, rs_limit = 0x7fc9dc15315c, rs_attrsonly = 0, rs_attrs = 0x7fc9dc685b48,
rs_filter = 0x7fc9dc6857d0, rs_filterstr = {bv_len = 15, bv_val = 0x7fc9dc685c01 "(objectClass=*)"}}, oq_abandon = {rs_msgid = 2}, oq_cancel = {
rs_msgid = 2}, oq_extended = {rs_reqoid = {bv_len = 2, bv_val = 0xe10000001f4 <error: Cannot access memory at address 0xe10000001f4>},
rs_flags = -602590884, rs_reqdata = 0x0}, oq_pwdexop = {rs_extended = {rs_reqoid = {bv_len = 2,
bv_val = 0xe10000001f4 <error: Cannot access memory at address 0xe10000001f4>}, rs_flags = -602590884, rs_reqdata = 0x0}, rs_old = {
bv_len = 140504962980680, bv_val = 0x7fc9dc6857d0 "\207"}, rs_new = {bv_len = 15, bv_val = 0x7fc9dc685c01 "(objectClass=*)"}, rs_mods = 0x0,
rs_modtail = 0x0}}, o_abandon = 0, o_cancel = 0, o_groups = 0x0, o_do_not_cache = 1 '\001', o_is_auth_check = 0 '\000', o_dont_replicate = 0 '\000',
o_acl_priv = ACL_NONE, o_nocaching = 0 '\000', o_delete_glue_parent = 0 '\000', o_no_schema_check = 0 '\000', o_no_subordinate_glue = 0 '\000',
o_ctrlflag = '\000' <repeats 14 times>, "\003\000\000\001", '\000' <repeats 13 times>, o_controls = 0x7fc9e8d45ac8, o_authz = {sai_method = 128, sai_mech = {
bv_len = 0, bv_val = 0x0}, sai_dn = {bv_len = 24, bv_val = 0x7fc9dc685bc4 "ou=ou2,dc=example,dc=com"}, sai_ndn = {bv_len = 24,
bv_val = 0x7fc9dc685bc4 "ou=ou2,dc=example,dc=com"}, sai_ssf = 0, sai_transport_ssf = 0, sai_tls_ssf = 0, sai_sasl_ssf = 0}, o_ber = 0x0,
o_res_ber = 0x0, o_callback = 0x0, o_ctrls = 0x0, o_csn = {bv_len = 0, bv_val = 0x0}, o_private = 0x0, o_extra = {slh_first = 0x0}, o_next = {
stqe_next = 0x0}}, ob_hdr = {oh_opid = 1, oh_connid = 1008, oh_conn = 0xa51320, oh_msgid = 2, oh_protocol = 3, oh_tid = 140505208063744,
oh_threadctx = 0x7fc9e8d45c10, oh_tmpmemctx = 0x7fc9e00008c0, oh_tmpmfuncs = 0x7584c0 <slap_sl_mfuncs>, oh_counters = 0x7fc9dc002240,
oh_log_prefix = "conn=1008 op=1", '\000' <repeats 241 times>}, ob_controls = {0x0 <repeats 32 times>}}
op = 0x7fc9e8d45810
be = {bd_info = 0x7fc9dc14b730, bd_self = 0x7fc9dc153080,
be_ctrls = "\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001", '\000' <repeats 14 times>, "\001", be_flags = 65816, be_restrictops = 0,
be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls = 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls = 0,
sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x7fc9dc1467f0, be_nsuffix = 0x7fc9dc146820, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn = {
bv_len = 0, bv_val = 0x0}, be_rootdn = {bv_len = 28, bv_val = 0x7fc9dc146120 "cn=Manager,dc=example,dc=com"}, be_rootndn = {bv_len = 28,
bv_val = 0x7fc9dc146170 "cn=manager,dc=example,dc=com"}, be_rootpw = {bv_len = 6, bv_val = 0x7fc9dc146600 "secret"}, be_max_deref_depth = 15, be_def_limit = {
lms_t_soft = 3600, lms_t_hard = 0, lms_s_soft = 500, lms_s_hard = 0, lms_s_unchecked = -1, lms_s_pr = 0, lms_s_pr_hide = 0, lms_s_pr_total = 0},
be_limits = 0x0, be_acl = 0x0, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn = {bv_len = 0, bv_val = 0x0}, be_update_refs = 0x0,
be_pending_csn_list = 0x7fc9dc000990, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0, __nusers = 0, __kind = 0, __spins = 0, __elision = 0,
__list = {__prev = 0x0, __next = 0x0}}, __size = '\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x0, be_pb = 0x0,
be_cf_ocs = 0x7fc9ea826d00 <bdbocs>, be_private = 0x7fc9dc145ce0, be_next = {stqe_next = 0x0}}
rc = 0
#8 0x00007fc9f0386cf8 in ldap_int_thread_pool_wrapper (xpool=0x9e94c0) at tpool.c:696
pool = 0x9e94c0
task = 0x7fc9dc699fc0
work_list = 0x9e9558
ctx = {ltu_id = 140505171388160, ltu_key = {{ltk_key = 0x4af132 <slap_sl_mem_create+118>, ltk_data = 0x7fc9e00008c0,
ltk_free = 0x4aef57 <slap_sl_mem_destroy+144>}, {ltk_key = 0x43c75c <conn_counter_init+144>, ltk_data = 0x7fc9e01091b0,
ltk_free = 0x43c5ae <conn_counter_destroy+144>}, {ltk_key = 0x4572ef <slap_op_free+144>, ltk_data = 0x7fc9e0108df0,
ltk_free = 0x457242 <slap_op_groups_free+69>}, {ltk_key = 0x7fc9dc141650, ltk_data = 0x7fc9e0109410, ltk_free = 0x7fc9ea61d069 <bdb_reader_free>}, {
ltk_key = 0x7fc9ea60bef0 <search_stack>, ltk_data = 0x7fc9dafff010, ltk_free = 0x7fc9ea60becd <search_stack_free>}, {ltk_key = 0x7fc9dc5a2dd0,
ltk_data = 0x7fc9e0102d30, ltk_free = 0x7fc9ea61d069 <bdb_reader_free>}, {ltk_key = 0x7fc9dc4c6bd0, ltk_data = 0x7fc9e0102e40,
ltk_free = 0x7fc9ea61d069 <bdb_reader_free>}, {ltk_key = 0x7fc9dc3ea9d0, ltk_data = 0x7fc9e0102f50, ltk_free = 0x7fc9ea61d069 <bdb_reader_free>}, {
ltk_key = 0x7fc9dc30e310, ltk_data = 0x7fc9e0103060, ltk_free = 0x7fc9ea61d069 <bdb_reader_free>}, {ltk_key = 0x7fc9dc14dd20, ltk_data = 0x7fc9e0103170,
ltk_free = 0x7fc9ea61d069 <bdb_reader_free>}, {ltk_key = 0x0, ltk_data = 0x0, ltk_free = 0x0} <repeats 22 times>}}
kctx = 0x0
i = 32
keyslot = 395
hash = 1786060171
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#9 0x00007fc9ef55a0a4 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#10 0x00007fc9ee5967fd in clone () from /lib64/libc.so.6
No symbol table info available.
--------------000701070908040607050107--