(ITS#8664) lmdb fragmentation leads to DDoS for consumers
by quanah@openldap.org
Full_Name: Quanah Gibson-Mount
Version: 2.4.44
OS: Linux
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (47.208.148.239)
If a back-mdb database becomes highly fragmented, it can spend a bit of time
trying to find an open slot for an incoming write op. If it is a master server,
this will cause all of its consumers to block all incoming read requests until
the write op is finished. It also blocks all requests to the master as well.
Once the page split completes and the write op is done, things go back to normal
until the next page split is required. In the case I'm looking at today, it
causes sporadic outages of 6-10 minutes for the master and all consumers. It
seems poor design that a write operation on the master will cause its consumers
to block all ongoing read operations until that write op is completed. A
temporary workaround is to stop slapd, export the DB via slapcat, remove the old
db, and then re-import via slapadd to eliminate the database fragmentation.
Example gdb backtrace of a consumer:
(gdb) thr apply all bt full
Thread 10 (Thread 0x7f128f187700 (LWP 14660)):
#0 0x00007f3a93816f33 in epoll_wait () from /lib64/libc.so.6
No symbol table info available.
#1 0x00000000004366ff in slapd_daemon_task (ptr=0x2cf9eb8) at daemon.c:2517
ns = 1
at = 0
nfds = 20
revents = 0x2d9a000
tvp = 0x7f128f186d80
cat = {tv_sec = 1496211426, tv_usec = 0}
i = 1
nwriters = 0
now = 1496211138
tv = {tv_sec = 288, tv_usec = 0}
tdelta = 1
rtask = 0x2d2b360
l = 2
last_idle_check = 1495145226
ebadf = 0
tid = 0
#2 0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#3 0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 9 (Thread 0x7f128e986700 (LWP 14662)):
#0 0x00007f3a93acd68c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f3a94fe2c2f in ldap_pvt_thread_cond_wait (cond=0x2d36038,
mutex=0x2d36010) at thr_posix.c:277
No locals.
#2 0x00007f3a94fe147d in ldap_int_thread_pool_wrapper (xpool=0x2d36000) at
tpool.c:938
pq = 0x2d36000
pool = 0x2efa180
task = 0x0
work_list = 0x2d36070
ctx = {ltu_pq = 0x2d36000, ltu_id = 139717678491392, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x52c8240, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
ltk_key = 0x2f02d00, ltk_data = 0x54d1400, ltk_free =
0x7f3a9000778b <mdb_reader_free>}, {ltk_key = 0x43a3eb, ltk_data = 0x3280e00,
ltk_free = 0x43a22f <conn_counter_destroy>}, {ltk_key = 0x455939,
ltk_data = 0xad30800, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key =
0x7f3a8fffc5b7,
ltk_data = 0x8140000, ltk_free = 0x7f3a8fffc594
<search_stack_free>}, {ltk_key = 0x7f3a8fff9071, ltk_data = 0x7e40000,
---Type <return> to continue, or q <return> to quit---
ltk_free = 0x7f3a8fff9029 <scope_chunk_free>}, {ltk_key =
0x2f03400, ltk_data = 0xa519400, ltk_free = 0x7f3a9000778b <mdb_reader_free>},
{ltk_key = 0x0,
ltk_data = 0xabc9600, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
kctx = 0x0
i = 32
keyslot = 286
hash = 4262449438
pool_lock = 0
freeme = 0
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#3 0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#4 0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 8 (Thread 0x7f128e185700 (LWP 14663)):
#0 0x00007f3a93acd68c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f3a94fe2c2f in ldap_pvt_thread_cond_wait (cond=0x2d36038,
mutex=0x2d36010) at thr_posix.c:277
No locals.
#2 0x00007f3a94fe147d in ldap_int_thread_pool_wrapper (xpool=0x2d36000) at
tpool.c:938
pq = 0x2d36000
pool = 0x2efa180
task = 0x0
work_list = 0x2d36070
ctx = {ltu_pq = 0x2d36000, ltu_id = 139717670098688, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x52c9240, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
ltk_key = 0x2f02d00, ltk_data = 0x54d4800, ltk_free =
0x7f3a9000778b <mdb_reader_free>}, {ltk_key = 0x43a3eb, ltk_data = 0x3280a00,
ltk_free = 0x43a22f <conn_counter_destroy>}, {ltk_key = 0x455939,
ltk_data = 0x6b39800, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key =
0x7f3a8fffc5b7,
ltk_data = 0x6e3c000, ltk_free = 0x7f3a8fffc594
<search_stack_free>}, {ltk_key = 0x7f3a8fff9071, ltk_data = 0x6b3c000,
ltk_free = 0x7f3a8fff9029 <scope_chunk_free>}, {ltk_key =
0x2f03400, ltk_data = 0xa516000, ltk_free = 0x7f3a9000778b <mdb_reader_free>},
{ltk_key = 0x0,
ltk_data = 0x10034000, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
kctx = 0x0
i = 32
keyslot = 398
hash = 1493194126
pool_lock = 0
freeme = 0
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#3 0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#4 0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 7 (Thread 0x7f128d984700 (LWP 14664)):
#0 0x00007f3a93acd68c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f3a94fe2c2f in ldap_pvt_thread_cond_wait (cond=0x2d36038,
mutex=0x2d36010) at thr_posix.c:277
No locals.
#2 0x00007f3a94fe147d in ldap_int_thread_pool_wrapper (xpool=0x2d36000) at
tpool.c:938
pq = 0x2d36000
pool = 0x2efa180
task = 0x0
work_list = 0x2d36070
ctx = {ltu_pq = 0x2d36000, ltu_id = 139717661705984, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x52c8ec0, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
ltk_key = 0x2f02d00, ltk_data = 0x54d2e00, ltk_free =
0x7f3a9000778b <mdb_reader_free>}, {ltk_key = 0x43a3eb, ltk_data = 0x3280b00,
ltk_free = 0x43a22f <conn_counter_destroy>}, {ltk_key = 0x455939,
ltk_data = 0x6b38000, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key =
0x7f3a8fffc5b7,
ltk_data = 0xbb42000, ltk_free = 0x7f3a8fffc594
<search_stack_free>}, {ltk_key = 0x7f3a8fff9071, ltk_data = 0xb842000,
ltk_free = 0x7f3a8fff9029 <scope_chunk_free>}, {ltk_key =
0x2f03400, ltk_data = 0xa51c800, ltk_free = 0x7f3a9000778b <mdb_reader_free>},
{ltk_key = 0x0,
ltk_data = 0x1384b200, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
kctx = 0x0
i = 32
keyslot = 189
hash = 1589063869
pool_lock = 0
freeme = 0
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#3 0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#4 0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 6 (Thread 0x7f128d183700 (LWP 14665)):
#0 0x00007f3a93acd68c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f3a94fe2c2f in ldap_pvt_thread_cond_wait (cond=0x2d36038,
mutex=0x2d36010) at thr_posix.c:277
No locals.
#2 0x00007f3a94fe147d in ldap_int_thread_pool_wrapper (xpool=0x2d36000) at
tpool.c:938
pq = 0x2d36000
pool = 0x2efa180
task = 0x0
work_list = 0x2d36070
ctx = {ltu_pq = 0x2d36000, ltu_id = 139717653313280, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x52c8200, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
ltk_key = 0x2f03400, ltk_data = 0x54cfa00, ltk_free =
0x7f3a9000778b <mdb_reader_free>}, {ltk_key = 0x7f3a8fffc5b7, ltk_data =
0x58e0000,
ltk_free = 0x7f3a8fffc594 <search_stack_free>}, {ltk_key =
0x7f3a8fff9071, ltk_data = 0x55e0000, ltk_free = 0x7f3a8fff9029
<scope_chunk_free>}, {
ltk_key = 0x43a3eb, ltk_data = 0x3280200, ltk_free = 0x43a22f
<conn_counter_destroy>}, {ltk_key = 0x455939, ltk_data = 0x34e9800,
ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key = 0x2f02d00,
ltk_data = 0xa466000, ltk_free = 0x7f3a9000778b <mdb_reader_free>}, {ltk_key =
0x0,
ltk_data = 0xb5e7600, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
kctx = 0x0
i = 32
keyslot = 301
hash = 3114775853
pool_lock = 0
freeme = 0
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#3 0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#4 0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 5 (Thread 0x7f128c982700 (LWP 14666)):
#0 0x00007f3a93acd68c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f3a94fe2c2f in ldap_pvt_thread_cond_wait (cond=0x2d36038,
mutex=0x2d36010) at thr_posix.c:277
No locals.
#2 0x00007f3a94fe147d in ldap_int_thread_pool_wrapper (xpool=0x2d36000) at
tpool.c:938
pq = 0x2d36000
pool = 0x2efa180
task = 0x0
work_list = 0x2d36070
ctx = {ltu_pq = 0x2d36000, ltu_id = 139717644920576, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x52c81c0, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
ltk_key = 0x2f03400, ltk_data = 0x54ce000, ltk_free =
0x7f3a9000778b <mdb_reader_free>}, {ltk_key = 0x2f02d00, ltk_data = 0x54d6200,
ltk_free = 0x7f3a9000778b <mdb_reader_free>}, {ltk_key = 0x43a3eb,
ltk_data = 0x3280900, ltk_free = 0x43a22f <conn_counter_destroy>}, {ltk_key =
0x455939,
ltk_data = 0xa52d800, ltk_free = 0x45588c <slap_op_q_destroy>},
{ltk_key = 0x7f3a8fffc5b7, ltk_data = 0x9440000, ltk_free = 0x7f3a8fffc594
<search_stack_free>}, {
ltk_key = 0x7f3a8fff9071, ltk_data = 0x9140000, ltk_free =
0x7f3a8fff9029 <scope_chunk_free>}, {ltk_key = 0x0, ltk_data = 0xdd44800,
ltk_free = 0}, {
ltk_key = 0x0, ltk_data = 0x0, ltk_free = 0} <repeats 24 times>}}
kctx = 0x0
i = 32
keyslot = 92
hash = 3210645596
pool_lock = 0
freeme = 0
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#3 0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#4 0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 4 (Thread 0x7f128c181700 (LWP 20290)):
#0 0x00007f3a93acd68c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f3a94fe2c2f in ldap_pvt_thread_cond_wait (cond=0x2d36038,
mutex=0x2d36010) at thr_posix.c:277
No locals.
#2 0x00007f3a94fe147d in ldap_int_thread_pool_wrapper (xpool=0x2d36000) at
tpool.c:938
pq = 0x2d36000
pool = 0x2efa180
task = 0x0
work_list = 0x2d36070
ctx = {ltu_pq = 0x2d36000, ltu_id = 139717636527872, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x52c8980, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
ltk_key = 0x43a3eb, ltk_data = 0x3281100, ltk_free = 0x43a22f
<conn_counter_destroy>}, {ltk_key = 0x455939, ltk_data = 0xffefc00,
ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key = 0x2f02d00,
ltk_data = 0xa517a00, ltk_free = 0x7f3a9000778b <mdb_reader_free>}, {ltk_key =
0x7f3a8fffc5b7,
ltk_data = 0xcb42000, ltk_free = 0x7f3a8fffc594
<search_stack_free>}, {ltk_key = 0x7f3a8fff9071, ltk_data = 0xa852000,
ltk_free = 0x7f3a8fff9029 <scope_chunk_free>}, {ltk_key =
0x2f03400, ltk_data = 0xa51e200, ltk_free = 0x7f3a9000778b <mdb_reader_free>},
{ltk_key = 0x0,
ltk_data = 0x11699600, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
kctx = 0x0
i = 32
keyslot = 204
hash = 441390284
pool_lock = 0
freeme = 0
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#3 0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#4 0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 3 (Thread 0x7f128b980700 (LWP 32177)):
#0 0x00007f3a93acd68c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f3a94fe2c2f in ldap_pvt_thread_cond_wait (cond=0x2d36038,
mutex=0x2d36010) at thr_posix.c:277
No locals.
#2 0x00007f3a94fe147d in ldap_int_thread_pool_wrapper (xpool=0x2d36000) at
tpool.c:938
pq = 0x2d36000
pool = 0x2efa180
task = 0x0
work_list = 0x2d36070
ctx = {ltu_pq = 0x2d36000, ltu_id = 139717628135168, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0xde2cf00, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
ltk_key = 0x2f02d00, ltk_data = 0xa46e200, ltk_free =
0x7f3a9000778b <mdb_reader_free>}, {ltk_key = 0x43a3eb, ltk_data = 0x329a400,
ltk_free = 0x43a22f <conn_counter_destroy>}, {ltk_key = 0x455939,
ltk_data = 0x1001a800, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key =
0x7f3a8fffc5b7,
ltk_data = 0xe382000, ltk_free = 0x7f3a8fffc594
<search_stack_free>}, {ltk_key = 0x7f3a8fff9071, ltk_data = 0xe082000,
ltk_free = 0x7f3a8fff9029 <scope_chunk_free>}, {ltk_key =
0x2f03400, ltk_data = 0xa51ae00, ltk_free = 0x7f3a9000778b <mdb_reader_free>},
{ltk_key = 0x0,
ltk_data = 0x10034000, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
kctx = 0x0
i = 32
keyslot = 1019
hash = 537260027
pool_lock = 0
freeme = 0
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#3 0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#4 0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 2 (Thread 0x7f128b17f700 (LWP 11844)):
#0 0x00007f3a93acd68c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f3a94fe2c2f in ldap_pvt_thread_cond_wait (cond=0x2d36038,
mutex=0x2d36010) at thr_posix.c:277
No locals.
#2 0x00007f3a94fe147d in ldap_int_thread_pool_wrapper (xpool=0x2d36000) at
tpool.c:938
pq = 0x2d36000
pool = 0x2efa180
task = 0x0
work_list = 0x2d36070
ctx = {ltu_pq = 0x2d36000, ltu_id = 139717619742464, ltu_key = {{ltk_key
= 0x43a3eb, ltk_data = 0x2f04100, ltk_free = 0x43a22f <conn_counter_destroy>},
{
ltk_key = 0x4ae533, ltk_data = 0xaf35fc0, ltk_free = 0x4ae358
<slap_sl_mem_destroy>}, {ltk_key = 0x455939, ltk_data = 0xaf0f800,
ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key = 0x2f02d00,
ltk_data = 0xb810200, ltk_free = 0x7f3a9000778b <mdb_reader_free>}, {ltk_key =
0x7f3a8fffc5b7,
ltk_data = 0x117ca000, ltk_free = 0x7f3a8fffc594
<search_stack_free>}, {ltk_key = 0x7f3a8fff9071, ltk_data = 0x10626000,
ltk_free = 0x7f3a8fff9029 <scope_chunk_free>}, {ltk_key =
0x2f03400, ltk_data = 0xfdd6000, ltk_free = 0x7f3a9000778b <mdb_reader_free>},
{ltk_key = 0x0,
ltk_data = 0xb76a400, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
kctx = 0x0
i = 32
keyslot = 10
hash = 1926945802
pool_lock = 0
freeme = 0
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#3 0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#4 0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 1 (Thread 0x7f3a95690720 (LWP 14658)):
#0 0x00007f3a93aca2fd in pthread_join () from /lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f3a94fe2b70 in ldap_pvt_thread_join (thread=139717686884096,
thread_return=0x0) at thr_posix.c:197
No locals.
#2 0x000000000043785a in slapd_daemon () at daemon.c:2910
i = 0
rc = 0
#3 0x0000000000414c02 in main (argc=9, argv=0x7fff2a3e4818) at main.c:1017
i = 9
no_detach = 0
rc = 0
urls = 0x2cf4020 "ldap://0.0.0.0:389 ldapi:///"
username = 0x2cf8018 "TRUE"
groupname = 0x0
sandbox = 0x0
syslogUser = 128
pid = 0
waitfds = {9, 10}
g_argc = 9
g_argv = 0x7fff2a3e4818
configfile = 0x0
configdir = 0x2cf4060 "/opt/zimbra/data/ldap/config"
serverName = 0x7fff2a3e4deb "slapd"
serverMode = 1
scp = 0x0
scp_entry = 0x0
debug_unknowns = 0x0
syslog_unknowns = 0x0
serverNamePrefix = 0x4f2f08 ""
l = 5188080
slapd_pid_file_unlink = 1
slapd_args_file_unlink = 1
firstopt = 0
__PRETTY_FUNCTION__ = "main"
(gdb)
Example backtrace from the master. All threads are paused except thread 5 which
is the active write op:
(gdb) thr apply all bt full
Thread 10 (Thread 0x7f61102bc700 (LWP 18918)):
#0 0x00007f891494bf33 in epoll_wait () from /lib64/libc.so.6
No symbol table info available.
#1 0x00000000004366ff in slapd_daemon_task (ptr=0x2093eb8) at daemon.c:2517
ns = 1
at = 0
nfds = 1109
revents = 0x2134000
tvp = 0x7f61102bbd80
cat = {tv_sec = 1496211098, tv_usec = 0}
i = 1
nwriters = 0
now = 1496210912
tv = {tv_sec = 186, tv_usec = 0}
tdelta = 1
rtask = 0x20c5360
l = 2
last_idle_check = 1495145198
ebadf = 0
tid = 0
#2 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#3 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 9 (Thread 0x7f610fabb700 (LWP 18919)):
#0 0x00007f8914c0268c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f8916117c2f in ldap_pvt_thread_cond_wait (cond=0x2722808,
mutex=0x27227e0) at thr_posix.c:277
No locals.
#2 0x00007f891611478a in ldap_pvt_thread_rmutex_lock (rmutex=0x2469b28,
owner=140054851467008) at rmutex.c:129
rm = 0x27227e0
__PRETTY_FUNCTION__ = "ldap_pvt_thread_rmutex_lock"
#3 0x00007f8910adafcf in accesslog_op_mod (op=0x1178ac00, rs=0x7f610fabaa00) at
accesslog.c:1984
cb = 0x5c9a4c8
cb2 = 0x7f610fab94e0
on = 0x260cd20
li = 0x2469ac0
lo = 0x7f8910cdfb70
logop = 2
doit = 1
#4 0x00000000004cec1d in overlay_op_walk (op=0x1178ac00, rs=0x7f610fabaa00,
which=op_modify, oi=0x260c780, on=0x260cd20) at backover.c:661
func = 0x260cd78
rc = 32768
#5 0x00000000004ceee8 in over_op_func (op=0x1178ac00, rs=0x7f610fabaa00,
which=op_modify) at backover.c:730
oi = 0x260c780
on = 0x260c960
be = 0x25fc4e0
db = {bd_info = 0x260cd20, bd_self = 0x25fc4e0,
be_ctrls =
"\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001",
'\000' <repeats 14 times>, "\001", be_flags = 563464, be_restrictops = 0,
be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls
= 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls
= 0,
sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x25c20c0,
be_nsuffix = 0x25c2100, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn =
{bv_len = 0,
bv_val = 0x0}, be_rootdn = {bv_len = 9, bv_val = 0x2588440
"cn=config"}, be_rootndn = {bv_len = 9, bv_val = 0x2588460 "cn=config"},
be_rootpw = {bv_len = 0,
bv_val = 0x0}, be_max_deref_depth = 15, be_def_limit = {lms_t_soft =
-1, lms_t_hard = 0, lms_s_soft = -1, lms_s_hard = 0, lms_s_unchecked = -1,
lms_s_pr = 0,
lms_s_pr_hide = 0, lms_s_pr_total = 0}, be_limits = 0x0, be_acl =
0x25f1880, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn =
{bv_len = 0,
bv_val = 0x0}, be_update_refs = 0x0, be_pending_csn_list =
0x2629980, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
__nusers = 0, __kind = 0,
__spins = 0, __list = {__prev = 0x0, __next = 0x0}}, __size =
'\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x2418680, be_pb = 0x0,
be_cf_ocs = 0x7f8911361180, be_private = 0x297a000, be_next =
{stqe_next = 0x0}}
cb = {sc_next = 0x5c9a4c8, sc_response = 0x4cdc92 <over_back_response>,
sc_cleanup = 0, sc_writewait = 0, sc_private = 0x260c780}
sc = 0x7f610fab96e0
rc = 32768
__PRETTY_FUNCTION__ = "over_op_func"
#6 0x00000000004cf024 in over_op_modify (op=0x1178ac00, rs=0x7f610fabaa00) at
backover.c:769
No locals.
#7 0x000000000045b18e in fe_op_modify (op=0x1178ac00, rs=0x7f610fabaa00) at
modify.c:303
update = 0
repl_user = 0
op_be = 0x25fc4e0
bd = 0x75a900
textbuf = "\024\000\000\000\021\000\000\000\000)+\002\000\000\000\000\300\227\253\017a\177\000\000)\034F",
'\000' <repeats 13 times>"\340,
\235\016\021\000\000\000\000`\323\317\017\000\000\000\000\000v+\002\000\000\000\000\000\235B\002\000\000\000\000\002\000\000\000\000\000\000\000\300\062\241\021\000\000\000\000\300\227\253\017a\177",
'\000' <repeats 18 times>, "\017\000\000\000\000\000\000\000\020\353\071\020",
'\000' <repeats 12 times>, "
\000\000\000\000\000\000\000З\253\017a\177\000\000\000\000\000\000\000\000\000\000`\230\253\017a\177\000\000ܻE",
'\000' <repeats 14 times>,
"\001\000\000\000\000\000\000\220\250\253\017a\177\000\000 \252\253\017a\177",
'\000' <repeats 11 times>"\254,
x\021\000\000\000\000`\230\253\017a\177\000\000\065yE\000\000\000\000\000\060\230\253\017a\177\000\000\200"...
textlen = 256
#8 0x000000000045aa60 in do_modify (op=0x1178ac00, rs=0x7f610fabaa00) at
modify.c:177
dn = {bv_len = 48, bv_val = 0x10061b87
"uid=gerald,ou=people,dc=xxxxxxxx,dc=co,dc=za"}
textbuf = "\240\250\253\017a\177\000\000\000\000\000\000\000\000\000\000p\251\253\017a\177\000\000\020\330\373\020\000\000\000\000\377\377\377\377\377\377\377\377\271\317\311\000\000\000\000\000\006\000\000\000\000\000\000\000\354\006\360\025\211\177\000\000
\251\253\017a\177\000\000Z\373\357\025\211\177\000\000\000\000\000\000\000\000\000\000\b\---Type
<return> to continue, or q <return> to quit---
000\000\000\000\000\000\000\317\372\004\020\000\000\000\000
\342h\022\000\000\000\000\200$f\004", '\000' <repeats 12 times>"\200,
$f\004\000\000\000\000x\251\253\017a\177\000\000\063\345J\000\000\000\000\000\060\253\253\017a\177\000\000\060\253\253\017a\177\000\000\300\372\004\020\001\000\000\000Щ\253\017a\177\000\000\022\346J\000\000\000\000\000p\251\253\017\001\000\000\000\060\253\253\017a\177\000\000\000\000\000\000\001\000\000\000\000\000\020",
'\000' <repeats 13 times>"\200,
$f\004\000\000\000\000\200$f\004\000\000\000\000\060\253\253\017a\177\000"
textlen = 256
tmp = 0x0
#9 0x000000000043a89a in connection_operation (ctx=0x7f610fabab30,
arg_v=0x1178ac00) at connection.c:1135
rc = 80
cancel = 0
op = 0x1178ac00
rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0,
sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un =
{sru_search = {r_entry = 0x0,
r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0,
r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended =
{r_rspoid = 0x0,
r_rspdata = 0x0}}, sr_flags = 0}
tag = 102
opidx = SLAP_OP_MODIFY
conn = 0x2afc840
memctx = 0x4662480
memctx_null = 0x0
memsiz = 1048576
__PRETTY_FUNCTION__ = "connection_operation"
#10 0x000000000043ae3b in connection_read_thread (ctx=0x7f610fabab30,
argv=0x403) at connection.c:1271
rc = 0
cri = {op = 0x1178ac00, func = 0, arg = 0x0, ctx = 0x7f610fabab30,
nullop = 0}
s = 1027
#11 0x00007f8916116552 in ldap_int_thread_pool_wrapper (xpool=0x20d0000) at
tpool.c:956
pq = 0x20d0000
pool = 0x2294180
task = 0xfd71980
work_list = 0x20d0070
ctx = {ltu_pq = 0x20d0000, ltu_id = 140054851467008, ltu_key = {{ltk_key
= 0x43a3eb, ltk_data = 0x261ad00, ltk_free = 0x43a22f <conn_counter_destroy>},
{
ltk_key = 0x4ae533, ltk_data = 0x4662480, ltk_free = 0x4ae358
<slap_sl_mem_destroy>}, {ltk_key = 0x229cd00, ltk_data = 0x498ce00,
ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key = 0x455939,
ltk_data = 0x0, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key =
0x7f89111315b7,
ltk_data = 0x87c2000, ltk_free = 0x7f8911131594
<search_stack_free>}, {ltk_key = 0x7f891112e071, ltk_data = 0x84c2000,
ltk_free = 0x7f891112e029 <scope_chunk_free>}, {ltk_key =
0x229d400, ltk_data = 0x9857a00, ltk_free = 0x7f891113c78b <mdb_reader_free>},
{ltk_key = 0x0,
ltk_data = 0xdd55600, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
kctx = 0x0
i = 32
keyslot = 17
hash = 2893171729
pool_lock = 0
freeme = 0
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#12 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#13 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 8 (Thread 0x7f610f2ba700 (LWP 18920)):
#0 0x00007f8914c0268c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f8916117c2f in ldap_pvt_thread_cond_wait (cond=0x2722808,
mutex=0x27227e0) at thr_posix.c:277
No locals.
#2 0x00007f891611478a in ldap_pvt_thread_rmutex_lock (rmutex=0x2469b28,
owner=140054843074304) at rmutex.c:129
rm = 0x27227e0
__PRETTY_FUNCTION__ = "ldap_pvt_thread_rmutex_lock"
#3 0x00007f8910adafcf in accesslog_op_mod (op=0x1055e800, rs=0x7f610f2b9a00) at
accesslog.c:1984
cb = 0x46684c8
cb2 = 0x7f610f2b84e0
on = 0x260cd20
li = 0x2469ac0
lo = 0x7f8910cdfb70
logop = 2
doit = 1
#4 0x00000000004cec1d in overlay_op_walk (op=0x1055e800, rs=0x7f610f2b9a00,
which=op_modify, oi=0x260c780, on=0x260cd20) at backover.c:661
func = 0x260cd78
rc = 32768
#5 0x00000000004ceee8 in over_op_func (op=0x1055e800, rs=0x7f610f2b9a00,
which=op_modify) at backover.c:730
oi = 0x260c780
on = 0x260c960
be = 0x25fc4e0
db = {bd_info = 0x260cd20, bd_self = 0x25fc4e0,
be_ctrls =
"\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001",
'\000' <repeats 14 times>, "\001", be_flags = 563464, be_restrictops = 0,
be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls
= 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls
= 0,
sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x25c20c0,
be_nsuffix = 0x25c2100, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn =
{bv_len = 0,
bv_val = 0x0}, be_rootdn = {bv_len = 9, bv_val = 0x2588440
"cn=config"}, be_rootndn = {bv_len = 9, bv_val = 0x2588460 "cn=config"},
be_rootpw = {bv_len = 0,
bv_val = 0x0}, be_max_deref_depth = 15, be_def_limit = {lms_t_soft =
-1, lms_t_hard = 0, lms_s_soft = -1, lms_s_hard = 0, lms_s_unchecked = -1,
lms_s_pr = 0,
lms_s_pr_hide = 0, lms_s_pr_total = 0}, be_limits = 0x0, be_acl =
0x25f1880, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn =
{bv_len = 0,
bv_val = 0x0}, be_update_refs = 0x0, be_pending_csn_list =
0x2629980, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
__nusers = 0, __kind = 0,
__spins = 0, __list = {__prev = 0x0, __next = 0x0}}, __size =
'\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x2418680, be_pb = 0x0,
be_cf_ocs = 0x7f8911361180, be_private = 0x297a000, be_next =
{stqe_next = 0x0}}
cb = {sc_next = 0x46684c8, sc_response = 0x4cdc92 <over_back_response>,
sc_cleanup = 0, sc_writewait = 0, sc_private = 0x260c780}
sc = 0x7f610f2b86e0
rc = 32768
__PRETTY_FUNCTION__ = "over_op_func"
#6 0x00000000004cf024 in over_op_modify (op=0x1055e800, rs=0x7f610f2b9a00) at
backover.c:769
No locals.
#7 0x000000000045b18e in fe_op_modify (op=0x1055e800, rs=0x7f610f2b9a00) at
modify.c:303
update = 0
repl_user = 0
op_be = 0x25fc4e0
bd = 0x75a900
textbuf = "\024\000\000\000\021\000\000\000\000)+\002\000\000\000\000\300\207+\017a\177\000\000)\034F",
'\000' <repeats 13 times>"\240,
{S\020\000\000\000\000\240uS\020\000\000\000\000\000v+\002\000\000\000\000\000\235B\002\000\000\000\000\002\000\000\000\000\000\000\000\000\063\352\r\000\000\000\000\300\207+\017a\177",
'\000' <repeats 18 times>, "\017\000\000\000\000\000\000\000\220@\313\021",
'\000' <repeats 12 times>, "
\000\000\000\000\000\000\000Ї+\017a\177\000\000\000\000\000\000\000\000\000\000`\210+\017a\177\000\000ܻE",
'\000' <repeats 14 times>,
"\001\000\000\000\000\000\000\220\230+\017a\177\000\000 \232+\017a\177", '\000'
<repeats 11 times>"\350,
U\020\000\000\000\000`\210+\017a\177\000\000\065yE\000\000\000\000\000"...
textlen = 256
#8 0x000000000045aa60 in do_modify (op=0x1055e800, rs=0x7f610f2b9a00) at
modify.c:177
dn = {bv_len = 47, bv_val = 0x1064f967
"uid=lionel.xxxxxxxx,ou=people,dc=xxxxxxxxxx,dc=co,dc=za"}
textbuf = "\240\230+\017a\177\000\000\000\000\000\000\000\000\000\000p\231+\017a\177\000\000
h\201\020\000\000\000\000\377\377\377\377\377\377\377\377\376\315\311\000\000\000\000\000\004\000\000\000\000\000\000\000\354\006\360\025\211\177\000\000
\231+\017a\177\000\000Z\373\357\025\211\177\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000O]\246\020\000\000\000\000\320O\231\020\000\000\000\000\300!f\004",
'\000' <repeats 12 times>"\300,
!f\004\000\000\000\000x\231+\017a\177\000\000\063\345J\000\000\000\000\000\060\233+\017a\177\000\000\060\233+\017a\177\000\000@]\246\020\000\000\000\000Й+\017a\177\000\000\022\346J\000\000\000\000\000p\231+\017\001\000\000\000\060\233+\017a\177\000\000\000\000\000\000\001\000\000\000\000\000\020",
'\000' <repeats 13 times>"\300, !f\004\000\000\000\000\300!f"...
textlen = 256
tmp = 0x0
#9 0x000000000043a89a in connection_operation (ctx=0x7f610f2b9b30,
arg_v=0x1055e800) at connection.c:1135
rc = 80
cancel = 0
op = 0x1055e800
rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0,
sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un =
{sru_search = {r_entry = 0x0,
r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0,
r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended =
{r_rspoid = 0x0,
r_rspdata = 0x0}}, sr_flags = 0}
tag = 102
opidx = SLAP_OP_MODIFY
conn = 0x2a94300
memctx = 0x46621c0
memctx_null = 0x0
memsiz = 1048576
__PRETTY_FUNCTION__ = "connection_operation"
#10 0x000000000043ae3b in connection_read_thread (ctx=0x7f610f2b9b30,
argv=0x1a4) at connection.c:1271
rc = 0
cri = {op = 0x1055e800, func = 0, arg = 0x0, ctx = 0x7f610f2b9b30,
nullop = 0}
s = 420
#11 0x00007f8916116552 in ldap_int_thread_pool_wrapper (xpool=0x20d0000) at
tpool.c:956
pq = 0x20d0000
pool = 0x2294180
task = 0xfe6e2e0
work_list = 0x20d0070
ctx = {ltu_pq = 0x20d0000, ltu_id = 140054843074304, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x46621c0, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
ltk_key = 0x229d400, ltk_data = 0x4989a00, ltk_free =
0x7f891113c78b <mdb_reader_free>}, {ltk_key = 0x43a3eb, ltk_data = 0x261ac00,
ltk_free = 0x43a22f <conn_counter_destroy>}, {ltk_key = 0x229cd00,
ltk_data = 0x498e800, ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key =
0x455939,
ltk_data = 0x0, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key
= 0x7f89111315b7, ltk_data = 0x9dea000, ltk_free = 0x7f8911131594
<search_stack_free>}, {
ltk_key = 0x7f891112e071, ltk_data = 0x9aea000, ltk_free =
0x7f891112e029 <scope_chunk_free>}, {ltk_key = 0x0, ltk_data = 0x11d48800,
ltk_free = 0}, {
ltk_key = 0x0, ltk_data = 0x0, ltk_free = 0} <repeats 24 times>}}
kctx = 0x0
i = 32
keyslot = 129
hash = 123916417
pool_lock = 0
freeme = 0
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#12 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#13 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 7 (Thread 0x7f610eab9700 (LWP 18921)):
#0 0x00007f8914c0268c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f8916117c2f in ldap_pvt_thread_cond_wait (cond=0x2722808,
mutex=0x27227e0) at thr_posix.c:277
No locals.
#2 0x00007f891611478a in ldap_pvt_thread_rmutex_lock (rmutex=0x2469b28,
owner=140054834681600) at rmutex.c:129
rm = 0x27227e0
__PRETTY_FUNCTION__ = "ldap_pvt_thread_rmutex_lock"
#3 0x00007f8910adafcf in accesslog_op_mod (op=0xfeacc00, rs=0x7f610eab8a00) at
accesslog.c:1984
cb = 0x47684b8
cb2 = 0x7f610eab74e0
on = 0x260cd20
li = 0x2469ac0
lo = 0x7f8910cdfb70
logop = 2
doit = 1
#4 0x00000000004cec1d in overlay_op_walk (op=0xfeacc00, rs=0x7f610eab8a00,
which=op_modify, oi=0x260c780, on=0x260cd20) at backover.c:661
func = 0x260cd78
rc = 32768
#5 0x00000000004ceee8 in over_op_func (op=0xfeacc00, rs=0x7f610eab8a00,
which=op_modify) at backover.c:730
oi = 0x260c780
on = 0x260c960
be = 0x25fc4e0
db = {bd_info = 0x260cd20, bd_self = 0x25fc4e0,
be_ctrls =
"\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001",
'\000' <repeats 14 times>, "\001", be_flags = 563464, be_restrictops = 0,
be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls
= 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls
= 0,
sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x25c20c0,
be_nsuffix = 0x25c2100, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn =
{bv_len = 0,
bv_val = 0x0}, be_rootdn = {bv_len = 9, bv_val = 0x2588440
"cn=config"}, be_rootndn = {bv_len = 9, bv_val = 0x2588460 "cn=config"},
be_rootpw = {bv_len = 0,
bv_val = 0x0}, be_max_deref_depth = 15, be_def_limit = {lms_t_soft =
-1, lms_t_hard = 0, lms_s_soft = -1, lms_s_hard = 0, lms_s_unchecked = -1,
lms_s_pr = 0,
lms_s_pr_hide = 0, lms_s_pr_total = 0}, be_limits = 0x0, be_acl =
0x25f1880, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn =
{bv_len = 0,
bv_val = 0x0}, be_update_refs = 0x0, be_pending_csn_list =
0x2629980, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
__nusers = 0, __kind = 0,
__spins = 0, __list = {__prev = 0x0, __next = 0x0}}, __size =
'\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x2418680, be_pb = 0x0,
be_cf_ocs = 0x7f8911361180, be_private = 0x297a000, be_next =
{stqe_next = 0x0}}
cb = {sc_next = 0x47684b8, sc_response = 0x4cdc92 <over_back_response>,
sc_cleanup = 0, sc_writewait = 0, sc_private = 0x260c780}
sc = 0x7f610eab76e0
rc = 32768
__PRETTY_FUNCTION__ = "over_op_func"
#6 0x00000000004cf024 in over_op_modify (op=0xfeacc00, rs=0x7f610eab8a00) at
backover.c:769
No locals.
#7 0x000000000045b18e in fe_op_modify (op=0xfeacc00, rs=0x7f610eab8a00) at
modify.c:303
update = 0
repl_user = 0
op_be = 0x25fc4e0
bd = 0x75a900
textbuf = "\024\000\000\000\021\000\000\000\000)+\002\000\000\000\000\300w\253\016a\177\000\000)\034F",
'\000' <repeats 13 times>"\300,
'\314\020\000\000\000\000\240\217\214\017\000\000\000\000\000v+\002\000\000\000\000\000\235B\002\000\000\000\000\002\000\000\000\000\000\000\000@\227l\020\000\000\000\000\300w\253\016a\177",
'\000' <repeats 18 times>, "\017\000\000\000\000\000\000\000\360~\355\017",
'\000' <repeats 12 times>, "
\000\000\000\000\000\000\000\320w\253\016a\177\000\000\000\000\000\000\000\000\000\000`x\253\016a\177\000\000ܻE",
'\000' <repeats 14 times>,
"\001\000\000\000\000\000\000\220\210\253\016a\177\000\000 \212\253\016a\177",
'\000' <repeats 11 times>"\314,
\352\017\000\000\000\000`x\253\016a\177\000\000\065yE\000\000\000\000\000\005\000\000\000\000\000\000\000\000"...
textlen = 256
#8 0x000000000045aa60 in do_modify (op=0xfeacc00, rs=0x7f610eab8a00) at
modify.c:177
dn = {bv_len = 45, bv_val = 0x27252c7
"uid=brianvxxxxxx,ou=people,dc=xxxxxxxxx,dc=co,dc=za"}
textbuf = "\240\210\253\016a\177\000\000p\002i\022\000\000\000\000p\211\253\016a\177\000\000\200Y\243\020\000\000\000\000\377\377\377\377\377\377\377\377\266\316\311\000\---Type
<return> to continue, or q <return> to quit---
000\000\000\000\006\000\000\000\000\000\000\000\354\006\360\025\211\177\000\000
\211\253\016a\177\000\000Z\373\357\025\211\177\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000ϰ\003\v\000\000\000\000\320\306\333\021\000\000\000\000\000\"f\004",
'\000' <repeats 13 times>,
"\"f\004\000\000\000\000x\211\253\016a\177\000\000\063\345J\000\000\000\000\000\060\213\253\016a\177\000\000\060\213\253\016a\177\000\000\300\260\003\v\000\000\000\000Љ\253\016a\177\000\000\022\346J\000\000\000\000\000p\211\253\016\001\000\000\000\060\213\253\016a\177\000\000\000\000\000\000\001\000\000\000\000\000\020",
'\000' <repeats 14 times>,
"\"f\004\000\000\000\000\000\"f\004\000\000\000\000\060\213\253\016a\177\000"
textlen = 256
tmp = 0x0
#9 0x000000000043a89a in connection_operation (ctx=0x7f610eab8b30,
arg_v=0xfeacc00) at connection.c:1135
rc = 80
cancel = 0
op = 0xfeacc00
rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0,
sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un =
{sru_search = {r_entry = 0x0,
r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0,
r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended =
{r_rspoid = 0x0,
r_rspdata = 0x0}}, sr_flags = 0}
tag = 102
opidx = SLAP_OP_MODIFY
conn = 0x2ac9fc0
memctx = 0x4662200
memctx_null = 0x0
memsiz = 1048576
__PRETTY_FUNCTION__ = "connection_operation"
#10 0x000000000043ae3b in connection_read_thread (ctx=0x7f610eab8b30,
argv=0x2dd) at connection.c:1271
rc = 0
cri = {op = 0xfeacc00, func = 0, arg = 0x0, ctx = 0x7f610eab8b30, nullop
= 0}
s = 733
#11 0x00007f8916116552 in ldap_int_thread_pool_wrapper (xpool=0x20d0000) at
tpool.c:956
pq = 0x20d0000
pool = 0x2294180
task = 0x101f22a0
work_list = 0x20d0070
ctx = {ltu_pq = 0x20d0000, ltu_id = 140054834681600, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x4662200, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
ltk_key = 0x229d400, ltk_data = 0x4988000, ltk_free =
0x7f891113c78b <mdb_reader_free>}, {ltk_key = 0x7f89111315b7, ltk_data =
0x4c92000,
ltk_free = 0x7f8911131594 <search_stack_free>}, {ltk_key =
0x7f891112e071, ltk_data = 0x4992000, ltk_free = 0x7f891112e029
<scope_chunk_free>}, {
ltk_key = 0x43a3eb, ltk_data = 0x261a800, ltk_free = 0x43a22f
<conn_counter_destroy>}, {ltk_key = 0x229cd00, ltk_data = 0x71a9a00,
ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key = 0x455939,
ltk_data = 0xb14e800, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key = 0x0,
ltk_data = 0x99ab600, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
kctx = 0x0
i = 32
keyslot = 1008
hash = 222086128
pool_lock = 0
freeme = 0
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#12 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#13 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 6 (Thread 0x7f610e2b8700 (LWP 18922)):
#0 0x00007f8914c0268c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f8916117c2f in ldap_pvt_thread_cond_wait (cond=0x2722808,
mutex=0x27227e0) at thr_posix.c:277
No locals.
#2 0x00007f891611478a in ldap_pvt_thread_rmutex_lock (rmutex=0x2469b28,
owner=140054826288896) at rmutex.c:129
rm = 0x27227e0
__PRETTY_FUNCTION__ = "ldap_pvt_thread_rmutex_lock"
#3 0x00007f8910adafcf in accesslog_op_mod (op=0x11150400, rs=0x7f610e2b7a00) at
accesslog.c:1984
cb = 0x486c4b8
cb2 = 0x7f610e2b64e0
on = 0x260cd20
li = 0x2469ac0
lo = 0x7f8910cdfb70
logop = 2
doit = 1
#4 0x00000000004cec1d in overlay_op_walk (op=0x11150400, rs=0x7f610e2b7a00,
which=op_modify, oi=0x260c780, on=0x260cd20) at backover.c:661
func = 0x260cd78
rc = 32768
#5 0x00000000004ceee8 in over_op_func (op=0x11150400, rs=0x7f610e2b7a00,
which=op_modify) at backover.c:730
oi = 0x260c780
on = 0x260c960
be = 0x25fc4e0
db = {bd_info = 0x260cd20, bd_self = 0x25fc4e0,
be_ctrls =
"\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001",
'\000' <repeats 14 times>, "\001", be_flags = 563464, be_restrictops = 0,
be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls
= 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls
= 0,
sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x25c20c0,
be_nsuffix = 0x25c2100, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn =
{bv_len = 0,
bv_val = 0x0}, be_rootdn = {bv_len = 9, bv_val = 0x2588440
"cn=config"}, be_rootndn = {bv_len = 9, bv_val = 0x2588460 "cn=config"},
be_rootpw = {bv_len = 0,
bv_val = 0x0}, be_max_deref_depth = 15, be_def_limit = {lms_t_soft =
-1, lms_t_hard = 0, lms_s_soft = -1, lms_s_hard = 0, lms_s_unchecked = -1,
lms_s_pr = 0,
lms_s_pr_hide = 0, lms_s_pr_total = 0}, be_limits = 0x0, be_acl =
0x25f1880, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn =
{bv_len = 0,
bv_val = 0x0}, be_update_refs = 0x0, be_pending_csn_list =
0x2629980, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
__nusers = 0, __kind = 0,
__spins = 0, __list = {__prev = 0x0, __next = 0x0}}, __size =
'\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x2418680, be_pb = 0x0,
be_cf_ocs = 0x7f8911361180, be_private = 0x297a000, be_next =
{stqe_next = 0x0}}
cb = {sc_next = 0x486c4b8, sc_response = 0x4cdc92 <over_back_response>,
sc_cleanup = 0, sc_writewait = 0, sc_private = 0x260c780}
sc = 0x7f610e2b66e0
rc = 32768
__PRETTY_FUNCTION__ = "over_op_func"
#6 0x00000000004cf024 in over_op_modify (op=0x11150400, rs=0x7f610e2b7a00) at
backover.c:769
No locals.
#7 0x000000000045b18e in fe_op_modify (op=0x11150400, rs=0x7f610e2b7a00) at
modify.c:303
update = 0
repl_user = 0
op_be = 0x25fc4e0
bd = 0x75a900
textbuf = "\024\000\000\000\021\000\000\000\000)+\002\000\000\000\000\300g+\016a\177\000\000)\034F",
'\000' <repeats 13 times>, "@\227\016\021\000\000\000\000
\212\016\021\000\000\000\000\000v+\002\000\000\000\000\000\235B\002\000\000\000\000\002\000\000\000\000\000\000\000\200]\301\021\000\000\000\000\300g+\016a\177",
'\000' <repeats 18 times>, "\017\000\000\000\000\000\000\000\240\004\016\021",
'\000' <repeats 12 times>, "
\000\000\000\000\000\000\000\320g+\016a\177\000\000\000\000\000\000\000\000\000\000`h+\016a\177\000\000ܻE",
'\000' <repeats 14 times>, "\001\000\000\000\000\000\000\220x+\016a\177\000\000
z+\016a\177", '\000' <repeats 11 times>,
"\004\025\021\000\000\000\000`h+\016a"...
textlen = 256
#8 0x000000000045aa60 in do_modify (op=0x11150400, rs=0x7f610e2b7a00) at
modify.c:177
dn = {bv_len = 46, bv_val = 0x119b4d28
"uid=gerald,ou=people,dc=xxxxxxxxx,dc=co,dc=za"}
textbuf = "\240x+\016a\177\000\000\360\204\251\021\000\000\000\000py+\016a\177\000\000P\205%\v\000\000\000\000\377\377\377\377\377\377\377\377\231Q\275\000\000\000\000\000\347\v\000\000\000\000\000\000\354\006\360\025\211\177\000\000
y+\016a\177\000\000Z\373\357\025\211\177\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000o\030(\v\000\000\000\000\340\264W\022\000\000\000\000@\"f\004",
'\000' <repeats 12 times>,
"@\"f\004\000\000\000\000xy+\016a\177\000\000\063\345J\000\000\000\000\000\060{+\016a\177\000\000\060{+\016a\177\000\000`\030(\v\000\000\000\000\320y+\016a\177\000\000\022\346J\000\000\000\000\000py+\016\001\000\000\000\060{+\016a\177\000\000\000\000\000\000\001\000\000\000\000\000\020",
'\000' <repeats 13 times>...
textlen = 256
tmp = 0x0
#9 0x000000000043a89a in connection_operation (ctx=0x7f610e2b7b30,
arg_v=0x11150400) at connection.c:1135
rc = 80
cancel = 0
op = 0x11150400
rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0,
sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un =
{sru_search = {r_entry = 0x0,
r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0,
r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended =
{r_rspoid = 0x0,
r_rspdata = 0x0}}, sr_flags = 0}
tag = 102
opidx = SLAP_OP_MODIFY
conn = 0x2a6c500
memctx = 0x4662240
memctx_null = 0x0
memsiz = 1048576
__PRETTY_FUNCTION__ = "connection_operation"
#10 0x000000000043ae3b in connection_read_thread (ctx=0x7f610e2b7b30, argv=0xbc)
at connection.c:1271
rc = 0
cri = {op = 0x11150400, func = 0, arg = 0x0, ctx = 0x7f610e2b7b30,
nullop = 0}
s = 188
#11 0x00007f8916116552 in ldap_int_thread_pool_wrapper (xpool=0x20d0000) at
tpool.c:956
pq = 0x20d0000
pool = 0x2294180
task = 0xfc2dac0
work_list = 0x20d0070
ctx = {ltu_pq = 0x20d0000, ltu_id = 140054826288896, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x4662240, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
ltk_key = 0x229cd00, ltk_data = 0x498b400, ltk_free =
0x7f891113c78b <mdb_reader_free>}, {ltk_key = 0x43a3eb, ltk_data = 0x261ae00,
ltk_free = 0x43a22f <conn_counter_destroy>}, {ltk_key =
0x7f89111315b7, ltk_data = 0x609a000, ltk_free = 0x7f8911131594
<search_stack_free>}, {
ltk_key = 0x7f891112e071, ltk_data = 0x5d9a000, ltk_free =
0x7f891112e029 <scope_chunk_free>}, {ltk_key = 0x455939, ltk_data = 0x11151000,
ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key = 0x229d400,
ltk_data = 0x71b0200, ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key =
0x0,
ltk_data = 0xc8f8000, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
kctx = 0x0
i = 32
keyslot = 96
hash = 1747798112
pool_lock = 0
freeme = 0
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#12 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#13 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 5 (Thread 0x7f610dab7700 (LWP 18925)):
#0 0x00007f8911153c7a in mdb_midl_xmerge (idl=0x12ec2008, merge=0x7f6110b1b010)
at ./../../../libraries/liblmdb/midl.c:207
old_id = 876237
merge_id = 2291035
i = 508
j = 812516
k = 813025
total = 1138842
#1 0x00007f89111422f8 in mdb_page_alloc (mc=0x7f610dab4f80, num=212,
mp=0x7f610dab4a60) at ./../../../libraries/liblmdb/mdb.c:2215
key = {mv_size = 8, mv_data = 0x7f6110c05d68}
data = {mv_size = 4080, mv_data = 0x7f6110b1b010}
leaf = 0x7f6110c05d60
idl = 0x7f6110b1b010
rc = 0
retry = 10484
txn = 0x4654000
env = 0x229cd00
pgno = 2290667
mop = 0x12ec2008
i = 509
j = 32609
mop_len = 1138333
n2 = 211
np = 0x7f6110c05000
oldest = 139368742
last = 139366008
op = MDB_NEXT
m2 = {mc_next = 0x0, mc_backup = 0x0, mc_xcursor = 0x0, mc_txn =
0x4654000, mc_dbi = 0, mc_db = 0x4654088, mc_dbx = 0x2622800,
mc_dbflag = 0x4655f00 "\b\030\032\030\031\032\032\031", '\032'
<repeats 32 times>, mc_snum = 3, mc_top = 2, mc_flags = 1, mc_pg =
{0x7f61216da000, 0x7f61216db000,
0x7f6110c05000, 0x7f610dab5170, 0x7f610dab4f80, 0x7f610dab4aa0,
0x7f8911146e37, 0x0, 0x100000000, 0x2622950, 0x7f610dab4cb0, 0x0,
0x7f610dab4f30, 0x7f610dab4c90,
0x7f891114972c, 0x0, 0x111f6d80, 0x0 <repeats 15 times>}, mc_ki =
{0, 29, 27, 0 <repeats 13 times>, 16384, 1125, 0, 0, 1, 0, 32609, 0, 16568,
1125, 0, 0, 10288,
610, 0, 0}}
found_old = 0
#2 0x00007f891114bbc1 in mdb_page_new (mc=0x7f610dab4f80, flags=4, num=212,
mp=0x7f610dab4ac8) at ./../../../libraries/liblmdb/mdb.c:6940
np = 0x0
rc = 0
#3 0x00007f891114bfea in mdb_node_add (mc=0x7f610dab4f80, indx=3,
key=0x7f610dab5170, data=0x7f610dab5160, pgno=0, flags=65536) at
./../../../libraries/liblmdb/mdb.c:7081
ovpages = 212
rc = 0
i = 32609
node_size = 24
room = 124
ofs = 0
node = 0x7f61217c6000
mp = 0x7f61217c6000
ofp = 0x0
ndata = 0x7f610dab5170
__FUNCTION__ = "mdb_node_add"
#4 0x00007f891114ae20 in mdb_cursor_put (mc=0x7f610dab4f80, key=0x7f610dab5170,
data=0x7f610dab5160, flags=65536) at ./../../../libraries/liblmdb/mdb.c:6697
env = 0x229cd00
leaf = 0x7f61217c6088
fp = 0x5
mp = 0x7f6121753a4d
sub_root = 0x0
fp_flags = 0
xdata = {mv_size = 0, mv_data = 0x111f6f08}
rdata = 0x7f610dab5160
dkey = {mv_size = 0, mv_data = 0x7f610dab4d10}
olddata = {mv_size = 867304, mv_data = 0x7f61217c6098}
dummy = {md_pad = 229330192, md_flags = 0, md_depth = 0, md_branch_pages
= 0, md_leaf_pages = 287272712, md_overflow_pages = 140055149886356,
md_entries = 140054817885328, md_root = 140226673805067}
do_sub = 0
insert_key = 0
insert_data = 0
mcount = 0
dcount = 0
nospill = 0
nsize = 26
rc = 0
rc2 = 0
nflags = 65536
__FUNCTION__ = "mdb_cursor_put"
#5 0x00007f891115257f in mdb_put (txn=0x4654000, dbi=4, key=0x7f610dab5170,
data=0x7f610dab5160, flags=65536) at ./../../../libraries/liblmdb/mdb.c:8771
mc = {mc_next = 0x0, mc_backup = 0x0, mc_xcursor = 0x0, mc_txn =
0x4654000, mc_dbi = 4, mc_db = 0x4654148, mc_dbx = 0x26228c0,
mc_dbflag = 0x4655f04 "\031\032\032\031", '\032' <repeats 32 times>,
mc_snum = 4, mc_top = 3, mc_flags = 1, mc_pg = {0x7f612177f000, 0x7f6121787000,
0x7f61217a1000,
0x7f61217c6000, 0x7f8900000000, 0x7f891113e80a, 0x7f891115aec2,
0x70cb1f0, 0x4654000, 0x7f610dab50b0, 0x7f8911134687, 0x103, 0x1, 0x4,
0x7f8911132765, 0xb237ee0,
0x20b8860, 0x2096b40, 0x20b8840, 0x4654000, 0x10641000,
0x7f610dab50b8, 0x70cb1f0, 0x4, 0x104662780, 0x2584f00, 0x70cb130, 0x4020c25b0,
0x4654000, 0x7f610dab5120,
0x7f891113480e, 0x103}, mc_ki = {0, 0, 30, 3, 20864, 3499, 32609, 0,
21088, 3499, 32609, 0, 16384, 1125, 0, 0, 40960, 663, 0, 0, 16384, 1125, 0, 0,
15336, 13, 0, 0,
1, 0, 64, 0}}
mx = {mx_cursor = {mc_next = 0x7f610dab4e40, mc_backup = 0x2459000,
mc_xcursor = 0x229cd00, mc_txn = 0x7f6121753a40, mc_dbi = 561330765, mc_db =
0x0,
mc_dbx = 0x7f610dab4f30, mc_dbflag = 0x7f610dab4f20 "\b", mc_snum =
0, mc_top = 0, mc_flags = 0, mc_pg = {0x1, 0x0, 0x7f610dab4f30, 0xdab4e50,
0x7f6100000000,
0x4662780, 0x7f6121753000, 0x821753a40, 0x7f6121753000, 0x70cb218,
0x7f6121753d0b, 0x0, 0x111f6d80, 0x7f610dab4ec0, 0x7f8911149131, 0xf0dab4ec0,
0x7f610dab4f20,
0x7f610dab4f30, 0x8010, 0x52, 0x0, 0x111f6f08, 0x30dab4fe0,
0x7f6121753000, 0x40dab4ef8, 0x111f6d80, 0x7f8915efdec2, 0x7f6121753a40,
0x7f610dab4f30, 0x4662780,
0x70cb1f0, 0x4662780}, mc_ki = {40, 0, 0, 0, 45544, 1804, 0, 0,
45584, 1804, 0, 0, 32480, 2851, 0, 0, 82, 0, 0, 0, 33376, 555, 0, 0, 14720, 555,
0, 0, 4, 0, 0,
0}}, mx_db = {md_pad = 327, md_flags = 0, md_depth = 0,
md_branch_pages = 8, md_leaf_pages = 287272320, md_overflow_pages =
140054817886032,
md_entries = 287272320, md_root = 140054817886080}, mx_dbx =
{md_name = {mv_size = 140054859848832, mv_data = 0x7f610dab79c0},
md_cmp = 0x7f891114d1f2 <mdb_cursor_close+181>, md_dcmp = 0x4662780,
md_rel = 0x111f6d80, md_relctx = 0x100000001}, mx_dbflag = 32 ' '}
rc = 46
#6 0x00007f891113b932 in mdb_id2entry_put (op=0x10641000, txn=0x4654000,
mc=0x0, e=0x7f610dab5260, flag=65536) at id2entry.c:71
mdb = 0x297a000
ec = {len = 867304, nattrs = 64, nvals = 4271, offset = 4289}
key = {mv_size = 8, mv_data = 0x7f610dab5260}
data = {mv_size = 867304, mv_data = 0xf87dc00}
rc = 0
#7 0x00007f891113bac1 in mdb_id2entry_update (op=0x10641000, txn=0x4654000,
mc=0x0, e=0x7f610dab5260) at id2entry.c:114
No locals.
#8 0x00007f891112a52e in mdb_modify (op=0x10641000, rs=0x7f610dab6a00) at
modify.c:637
mdb = 0x297a000
e = 0x70b9c70
manageDSAit = 0
textbuf = "\200'f\004\000\000\000\000\360\205\n\a\000\000\000\000H\020d\020\000\000\000\000H\020d\020\000\000\000\000\200\307`\002\000\000\000\000\020U\253\ra\177\000\000@\313`\002\000\000\000\000\340ba\002\000\000\000\000\340ba\002\000\000\000\000\250\207\n\a\000\000\000\000\200S\253\r\000\000\000\000\000j\253\r\000\000\000\000\020U\253\ra\177\000\000p\361J\000\000\000\000\000\070\205\n\a\000\000\000\000\200'f\004\000\000\000\000\260\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\330\204\n\a\000\000\000\000\000j\253\ra\177\000\000PT\253\ra\177\000\000\213\243\316\020\211\177\000\000\000j\253\ra\177\000\000\000\020d\020\000\000\000\000\070\205\n\a\000\000\000\000\000\020d\020\000\000\000\000ؑ\n\a\000\000\000\000H\020d\020\000\000\000\000PT\253\ra\177"...
textlen = 256
txn = 0x4654000
opinfo = {moi_oe = {oe_next = {sle_next = 0x0}, oe_key = 0x297a000},
moi_txn = 0x4654000, moi_ref = 1, moi_flag = 0 '\000'}
moi = 0x7f610dab52c0
dummy = {e_id = 259, e_name = {bv_len = 43, bv_val = 0x70b9c38
"uid=george,ou=people,dc=xxxxxxx,dc=co,dc=za"}, e_nname = {bv_len = 43,
bv_val = 0x70cb1b8 "uid=george,ou=people,dc=xxxxxxxx,dc=co,dc=za"},
e_attrs = 0xfd2cf68, e_ocflags = 256, e_bv = {bv_len = 0, bv_val = 0x0},
e_private = 0x70b9c70}
preread_ctrl = 0x0
postread_ctrl = 0x0
ctrls = {0x0, 0x10641000, 0x0, 0x0, 0x0, 0x0}
num_ctrls = 0
numads = 1182
#9 0x00000000004cecbb in overlay_op_walk (op=0x10641000, rs=0x7f610dab6a00,
which=op_modify, oi=0x260c780, on=0x0) at backover.c:677
func = 0x7f8911361478
rc = 32768
#10 0x00000000004ceee8 in over_op_func (op=0x10641000, rs=0x7f610dab6a00,
which=op_modify) at backover.c:730
oi = 0x260c780
on = 0x260c960
be = 0x25fc4e0
db = {bd_info = 0x7f8911361420, bd_self = 0x25fc4e0,
be_ctrls =
"\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001",
'\000' <repeats 14 times>, "\001", be_flags = 563464, be_restrictops = 0,
be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls
= 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls
= 0,
sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x25c20c0,
be_nsuffix = 0x25c2100, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn =
{bv_len = 0,
bv_val = 0x0}, be_rootdn = {bv_len = 9, bv_val = 0x2588440
"cn=config"}, be_rootndn = {bv_len = 9, bv_val = 0x2588460 "cn=config"},
be_rootpw = {bv_len = 0,
bv_val = 0x0}, be_max_deref_depth = 15, be_def_limit = {lms_t_soft =
-1, lms_t_hard = 0, lms_s_soft = -1, lms_s_hard = 0, lms_s_unchecked = -1,
lms_s_pr = 0,
lms_s_pr_hide = 0, lms_s_pr_total = 0}, be_limits = 0x0, be_acl =
0x25f1880, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn =
{bv_len = 0,
bv_val = 0x0}, be_update_refs = 0x0, be_pending_csn_list =
0x2629980, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
__nusers = 0, __kind = 0,
__spins = 0, __list = {__prev = 0x0, __next = 0x0}}, __size =
'\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x2418680, be_pb = 0x0,
be_cf_ocs = 0x7f8911361180, be_private = 0x297a000, be_next =
{stqe_next = 0x0}}
cb = {sc_next = 0x70a84a8, sc_response = 0x4cdc92 <over_back_response>,
sc_cleanup = 0, sc_writewait = 0, sc_private = 0x260c780}
sc = 0x7f610dab56e0
rc = 32768
__PRETTY_FUNCTION__ = "over_op_func"
#11 0x00000000004cf024 in over_op_modify (op=0x10641000, rs=0x7f610dab6a00) at
backover.c:769
No locals.
#12 0x000000000045b18e in fe_op_modify (op=0x10641000, rs=0x7f610dab6a00) at
modify.c:303
update = 0
repl_user = 0
op_be = 0x25fc4e0
bd = 0x75a900
textbuf = "@\347\207\f\000\000\000\000\000&+\002\000\000\000\000\300W\253\ra\177\000\000)\034F",
'\000' <repeats 13 times>"\200,
V\330\017\000\000\000\000@\347\207\f\000\000\000\000\060f+\002\000\000\000\000\300\327e\004\000\000\000\000\002\000\000\000\000\000\000\000\000܇\017\000\000\000\000\300W\253\ra\177",
'\000' <repeats 18 times>, "W\001\000\000\000\000\000\000\240\312\303\020",
'\000' <repeats 12 times>, "
\000\000\000\000\000\000\000\320W\253\ra\177\000\000\000\000\000\000\000\000\000\000`X\253\ra\177\000\000ܻE",
'\000' <repeats 14 times>, "\001\000\000\000\000\000\000\220h\253\ra\177\000\000
j\253\ra\177", '\000' <repeats 11 times>,
"\020d\020\000\000\000\000`X\253\ra\177\000\000\065yE\000\000\000\000\000\060X\253"...
textlen = 256
#13 0x000000000045aa60 in do_modify (op=0x10641000, rs=0x7f610dab6a00) at
modify.c:177
dn = {bv_len = 43, bv_val = 0xfaa2c49
"uid=george,ou=people,dc=xxxxxx,dc=co,dc=za"}
textbuf = "\240h\253\ra\177\000\000\360\314\066\022\000\000\000\000pi\253\ra\177\000\000\260[\246\020\000\000\000\000\377\377\377\377\377\377\377\377l\315\311\000\000\000\000\000\a\000\000\000\000\000\000\000\354\006\360\025\211\177\000\000
i\253\ra\177\000\000Z\373\357\025\211\177\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\237\363\004\020\000\000\000\000Ю\300\020\000\000\000\000\200'f\004",
'\000' <repeats 12 times>"\200,
'f\004\000\000\000\000xi\253\ra\177\000\000\063\345J\000\000\000\000\000\060k\253\ra\177\000\000\060k\253\ra\177\000\000\220\363\004\020\001\000\000\000\320i\253\ra\177\000\000\022\346J\000\000\000\000\000pi\253\r\001\000\000\000\060k\253\ra\177\000\000\000\000\000\000\001\000\000\000\000\000\020",
'\000' <repeats 13 times>"\200,
'f\004\000\000\000\000\200'f\004\000\000\000\000"...
textlen = 256
tmp = 0x0
#14 0x000000000043a89a in connection_operation (ctx=0x7f610dab6b30,
arg_v=0x10641000) at connection.c:1135
rc = 80
cancel = 0
op = 0x10641000
rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0,
sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un =
{sru_search = {r_entry = 0x0,
r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0,
r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended =
{r_rspoid = 0x0,
r_rspdata = 0x0}}, sr_flags = 0}
tag = 102
opidx = SLAP_OP_MODIFY
conn = 0x2a6e080
memctx = 0x4662780
memctx_null = 0x0
memsiz = 1048576
__PRETTY_FUNCTION__ = "connection_operation"
#15 0x000000000043ae3b in connection_read_thread (ctx=0x7f610dab6b30, argv=0xc6)
at connection.c:1271
rc = 0
cri = {op = 0x10641000, func = 0, arg = 0x0, ctx = 0x7f610dab6b30,
nullop = 0}
s = 198
#16 0x00007f8916116552 in ldap_int_thread_pool_wrapper (xpool=0x20d0000) at
tpool.c:956
pq = 0x20d0000
pool = 0x2294180
task = 0xc87e1c0
work_list = 0x20d0070
ctx = {ltu_pq = 0x20d0000, ltu_id = 140054817896192, ltu_key = {{ltk_key
= 0x43a3eb, ltk_data = 0x261a900, ltk_free = 0x43a22f <conn_counter_destroy>},
{
ltk_key = 0x4ae533, ltk_data = 0x4662780, ltk_free = 0x4ae358
<slap_sl_mem_destroy>}, {ltk_key = 0x229cd00, ltk_data = 0x71a8000,
ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key = 0x455939,
ltk_data = 0x0, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key =
0x7f89111315b7,
ltk_data = 0x74c2000, ltk_free = 0x7f8911131594
<search_stack_free>}, {ltk_key = 0x7f891112e071, ltk_data = 0x71c2000,
ltk_free = 0x7f891112e029 <scope_chunk_free>}, {ltk_key =
0x229d400, ltk_data = 0x9856000, ltk_free = 0x7f891113c78b <mdb_reader_free>},
{ltk_key = 0x0,
ltk_data = 0xb1b6400, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
kctx = 0x0
i = 32
keyslot = 719
hash = 1836767951
pool_lock = 0
freeme = 0
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#17 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#18 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 4 (Thread 0x7f610d2b6700 (LWP 21499)):
#0 0x00007f8914c0268c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f8916117c2f in ldap_pvt_thread_cond_wait (cond=0x2722808,
mutex=0x27227e0) at thr_posix.c:277
No locals.
#2 0x00007f891611478a in ldap_pvt_thread_rmutex_lock (rmutex=0x2469b28,
owner=140054809503488) at rmutex.c:129
rm = 0x27227e0
__PRETTY_FUNCTION__ = "ldap_pvt_thread_rmutex_lock"
#3 0x00007f8910adafcf in accesslog_op_mod (op=0x11923c00, rs=0x7f610d2b5a00) at
accesslog.c:1984
cb = 0xb3ce498
cb2 = 0x7f610d2b44e0
on = 0x260cd20
li = 0x2469ac0
lo = 0x7f8910cdfb70
logop = 2
doit = 1
#4 0x00000000004cec1d in overlay_op_walk (op=0x11923c00, rs=0x7f610d2b5a00,
which=op_modify, oi=0x260c780, on=0x260cd20) at backover.c:661
func = 0x260cd78
rc = 32768
#5 0x00000000004ceee8 in over_op_func (op=0x11923c00, rs=0x7f610d2b5a00,
which=op_modify) at backover.c:730
oi = 0x260c780
on = 0x260c960
be = 0x25fc4e0
db = {bd_info = 0x260cd20, bd_self = 0x25fc4e0,
be_ctrls =
"\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001",
'\000' <repeats 14 times>, "\001", be_flags = 563464, be_restrictops = 0,
be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls
= 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls
= 0,
sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x25c20c0,
be_nsuffix = 0x25c2100, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn =
{bv_len = 0,
bv_val = 0x0}, be_rootdn = {bv_len = 9, bv_val = 0x2588440
"cn=config"}, be_rootndn = {bv_len = 9, bv_val = 0x2588460 "cn=config"},
be_rootpw = {bv_len = 0,
bv_val = 0x0}, be_max_deref_depth = 15, be_def_limit = {lms_t_soft =
-1, lms_t_hard = 0, lms_s_soft = -1, lms_s_hard = 0, lms_s_unchecked = -1,
lms_s_pr = 0,
lms_s_pr_hide = 0, lms_s_pr_total = 0}, be_limits = 0x0, be_acl =
0x25f1880, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn =
{bv_len = 0,
bv_val = 0x0}, be_update_refs = 0x0, be_pending_csn_list =
0x2629980, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
__nusers = 0, __kind = 0,
__spins = 0, __list = {__prev = 0x0, __next = 0x0}}, __size =
'\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x2418680, be_pb = 0x0,
be_cf_ocs = 0x7f8911361180, be_private = 0x297a000, be_next =
{stqe_next = 0x0}}
cb = {sc_next = 0xb3ce498, sc_response = 0x4cdc92 <over_back_response>,
sc_cleanup = 0, sc_writewait = 0, sc_private = 0x260c780}
sc = 0x7f610d2b46e0
rc = 32768
__PRETTY_FUNCTION__ = "over_op_func"
#6 0x00000000004cf024 in over_op_modify (op=0x11923c00, rs=0x7f610d2b5a00) at
backover.c:769
No locals.
#7 0x000000000045b18e in fe_op_modify (op=0x11923c00, rs=0x7f610d2b5a00) at
modify.c:303
update = 0
repl_user = 0
op_be = 0x25fc4e0
bd = 0x75a900
textbuf = "\024\000\000\000\021\000\000\000\000)+\002\000\000\000\000\300G+\ra\177\000\000)\034F",
'\000' <repeats 14 times>"\253,
\067\020\000\000\000\000\000r\324\017\000\000\000\000\000v+\002\000\000\000\000\200\332e\004\000\000\000\000\002\000\000\000\000\000\000\000\000\255\207\017\000\000\000\000\300G+\ra\177",
'\000' <repeats 18 times>, "\017\000\000\000\000\000\000\000\020\227\263\017",
'\000' <repeats 12 times>, "
\000\000\000\000\000\000\000\320G+\ra\177\000\000\000\000\000\000\000\000\000\000`H+\ra\177\000\000ܻE",
'\000' <repeats 14 times>, "\001\000\000\000\000\000\000\220X+\ra\177\000\000
Z+\ra\177", '\000' <repeats 11 times>,
"<\222\021\000\000\000\000`H+\ra\177\000\000\065"...
textlen = 256
#8 0x000000000045aa60 in do_modify (op=0x11923c00, rs=0x7f610d2b5a00) at
modify.c:177
dn = {bv_len = 37, bv_val = 0xf67be97
"uid=tsv,ou=people,dc=xxxxx,dc=co,dc=za"}
textbuf = "\240X+\ra\177\000\000\020\261\205\017\000\000\000\000pY+\ra\177\000\000`\330\004\020\000\000\000\000\377\377\377\377\377\377\377\377K\316\311\000\000\000\000\000\004\000\000\000\000\000\000\000\354\006\360\025\211\177\000\000
Y+\ra\177\000\000Z\373\357\025\211\177\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000?\3
40\373\020\000\000\000\000\360\265\205\017\000\000\000\000\300\375\f\v", '\000'
<repeats 12 times>"\300,
\375\f\v\000\000\000\000xY+\ra\177\000\000\063\345J\000\000\000\000\000\060[+\ra\177\000\000\060[+\ra\177\000\000\060\340\373\020\000\000\000\000\320Y+\ra\177\000\000\022\346J\000\000\000\000\000pY+\r\001\000\000\000\060[+\ra\177\000\000\000\000\000\000\001\000\000\000\000\000\020",
'\000' <repeats 13 times>"\300, \375\f\v\000\000\000\000\300\375\f"...
textlen = 256
tmp = 0x0
#9 0x000000000043a89a in connection_operation (ctx=0x7f610d2b5b30,
arg_v=0x11923c00) at connection.c:1135
rc = 80
cancel = 0
op = 0x11923c00
rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0,
sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un =
{sru_search = {r_entry = 0x0,
r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0,
r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended =
{r_rspoid = 0x0,
r_rspdata = 0x0}}, sr_flags = 0}
tag = 102
opidx = SLAP_OP_MODIFY
conn = 0x2ab29c0
memctx = 0xb0cfdc0
memctx_null = 0x0
memsiz = 1048576
__PRETTY_FUNCTION__ = "connection_operation"
#10 0x000000000043ae3b in connection_read_thread (ctx=0x7f610d2b5b30,
argv=0x255) at connection.c:1271
rc = 0
cri = {op = 0x11923c00, func = 0, arg = 0x0, ctx = 0x7f610d2b5b30,
nullop = 0}
s = 597
#11 0x00007f8916116552 in ldap_int_thread_pool_wrapper (xpool=0x20d0000) at
tpool.c:956
pq = 0x20d0000
pool = 0x2294180
task = 0xfc81c00
work_list = 0x20d0070
ctx = {ltu_pq = 0x20d0000, ltu_id = 140054809503488, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0xb0cfdc0, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
ltk_key = 0x43a3eb, ltk_data = 0x2619f00, ltk_free = 0x43a22f
<conn_counter_destroy>}, {ltk_key = 0x229cd00, ltk_data = 0x4990200,
ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key = 0x455939,
ltk_data = 0x11788800, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key =
0x7f89111315b7,
ltk_data = 0xb7ce000, ltk_free = 0x7f8911131594
<search_stack_free>}, {ltk_key = 0x7f891112e071, ltk_data = 0xb4ce000,
ltk_free = 0x7f891112e029 <scope_chunk_free>}, {ltk_key =
0x229d400, ltk_data = 0x985c800, ltk_free = 0x7f891113c78b <mdb_reader_free>},
{ltk_key = 0x0,
ltk_data = 0x11d48800, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
kctx = 0x0
i = 32
keyslot = 831
hash = 3362479935
pool_lock = 0
freeme = 0
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#12 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#13 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 3 (Thread 0x7f610cab5700 (LWP 22074)):
#0 0x00007f8914c0268c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f8916117c2f in ldap_pvt_thread_cond_wait (cond=0x2722808,
mutex=0x27227e0) at thr_posix.c:277
No locals.
#2 0x00007f891611478a in ldap_pvt_thread_rmutex_lock (rmutex=0x2469b28,
owner=140054801110784) at rmutex.c:129
rm = 0x27227e0
__PRETTY_FUNCTION__ = "ldap_pvt_thread_rmutex_lock"
#3 0x00007f8910adafcf in accesslog_op_mod (op=0x1259b800, rs=0x7f610cab4a00) at
accesslog.c:1984
cb = 0xc9384b0
cb2 = 0x7f610cab34e0
on = 0x260cd20
li = 0x2469ac0
lo = 0x7f8910cdfb70
logop = 2
doit = 1
#4 0x00000000004cec1d in overlay_op_walk (op=0x1259b800, rs=0x7f610cab4a00,
which=op_modify, oi=0x260c780, on=0x260cd20) at backover.c:661
func = 0x260cd78
rc = 32768
#5 0x00000000004ceee8 in over_op_func (op=0x1259b800, rs=0x7f610cab4a00,
which=op_modify) at backover.c:730
oi = 0x260c780
on = 0x260c960
be = 0x25fc4e0
db = {bd_info = 0x260cd20, bd_self = 0x25fc4e0,
be_ctrls =
"\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001",
'\000' <repeats 14 times>, "\001", be_flags = 563464, be_restrictops = 0,
be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls
= 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls
= 0,
sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x25c20c0,
be_nsuffix = 0x25c2100, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn =
{bv_len = 0,
bv_val = 0x0}, be_rootdn = {bv_len = 9, bv_val = 0x2588440
"cn=config"}, be_rootndn = {bv_len = 9, bv_val = 0x2588460 "cn=config"},
be_rootpw = {bv_len = 0,
bv_val = 0x0}, be_max_deref_depth = 15, be_def_limit = {lms_t_soft =
-1, lms_t_hard = 0, lms_s_soft = -1, lms_s_hard = 0, lms_s_unchecked = -1,
lms_s_pr = 0,
lms_s_pr_hide = 0, lms_s_pr_total = 0}, be_limits = 0x0, be_acl =
0x25f1880, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn =
{bv_len = 0,
bv_val = 0x0}, be_update_refs = 0x0, be_pending_csn_list =
0x2629980, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
__nusers = 0, __kind = 0,
__spins = 0, __list = {__prev = 0x0, __next = 0x0}}, __size =
'\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x2418680, be_pb = 0x0,
be_cf_ocs = 0x7f8911361180, be_private = 0x297a000, be_next =
{stqe_next = 0x0}}
cb = {sc_next = 0xc9384b0, sc_response = 0x4cdc92 <over_back_response>,
sc_cleanup = 0, sc_writewait = 0, sc_private = 0x260c780}
sc = 0x7f610cab36e0
rc = 32768
__PRETTY_FUNCTION__ = "over_op_func"
#6 0x00000000004cf024 in over_op_modify (op=0x1259b800, rs=0x7f610cab4a00) at
backover.c:769
No locals.
#7 0x000000000045b18e in fe_op_modify (op=0x1259b800, rs=0x7f610cab4a00) at
modify.c:303
update = 0
repl_user = 0
op_be = 0x25fc4e0
bd = 0x75a900
textbuf = "\024\000\000\000\021\000\000\000\000)+\002\000\000\000\000\300\067\253\fa\177\000\000)\034F",
'\000' <repeats 13 times>,
"`\226\210\f\000\000\000\000@\206\210\f\000\000\000\000\000v+\002\000\000\000\000\000\235B\002\000\000\000\000\002\000\000\000\000\000\000\000\200V\271\021\000\000\000\000\300\067\253\fa\177",
'\000' <repeats 18 times>, "\017\000\000\000\000\000\000\000\200\302e\017",
'\000' <repeats 12 times>, "
\000\000\000\000\000\000\000\320\067\253\fa\177\000\000\000\000\000\000\000\000\000\000`8\253\fa\177\000\000ܻE",
'\000' <repeats 14 times>, "\001\000\000\000\000\000\000\220H\253\fa\177\000\000
J\253\fa\177", '\000' <repeats 11 times>"\270,
Y\022\000\000\000\000`8\253\fa\177\000\000\065yE\000\000\000\000\000"...
textlen = 256
#8 0x000000000045aa60 in do_modify (op=0x1259b800, rs=0x7f610cab4a00) at
modify.c:177
dn = {bv_len = 44, bv_val = 0x119b6997
"uid=20238247,ou=people,dc=xxxxxxxx,dc=co,dc=za"}
textbuf = "\240H\253\fa\177\000\000\000\000\000\000\000\000\000\000pI\253\fa\177\000\000Ж\215\020\000\000\000\000\377\377\377\377\377\377\377\377{\310\311\000\000\000\000\000\020\000\000\000\000\000\000\000\354\006\360\025\211\177\000\000
I\253\fa\177\000\000Z\373\357\025\211\177\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000_(f\002\000\000\000\000`_\202\t\000\000\000\000\000\v%\v",
'\000' <repeats 13 times>,
"\v%\v\000\000\000\000xI\253\fa\177\000\000\063\345J\000\000\000\000\000\060K\253\fa\177\000\000\060K\253\fa\177\000\000P(f\002\001\000\000\000\320I\253\fa\177\000\000\022\346J\000\000\000\000\000pI\253\f\001\000\000\000\060K\253\fa\177\000\000\000\000\000\000\001\000\000\000\000\000\020",
'\000' <repeats 14 times>, "\v%\v\000\000\000\000\000"...
textlen = 256
tmp = 0x0
#9 0x000000000043a89a in connection_operation (ctx=0x7f610cab4b30,
arg_v=0x1259b800) at connection.c:1135
rc = 80
cancel = 0
op = 0x1259b800
rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0,
sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un =
{sru_search = {r_entry = 0x0,
r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0,
r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended =
{r_rspoid = 0x0,
r_rspdata = 0x0}}, sr_flags = 0}
tag = 102
opidx = SLAP_OP_MODIFY
conn = 0x2ab3a40
memctx = 0xb250b00
memctx_null = 0x0
memsiz = 1048576
__PRETTY_FUNCTION__ = "connection_operation"
#10 0x000000000043ae3b in connection_read_thread (ctx=0x7f610cab4b30,
argv=0x25b) at connection.c:1271
rc = 0
cri = {op = 0x1259b800, func = 0, arg = 0x0, ctx = 0x7f610cab4b30,
nullop = 0}
s = 603
#11 0x00007f8916116552 in ldap_int_thread_pool_wrapper (xpool=0x20d0000) at
tpool.c:956
pq = 0x20d0000
pool = 0x2294180
task = 0xfd01220
work_list = 0x20d0070
ctx = {ltu_pq = 0x20d0000, ltu_id = 140054801110784, ltu_key = {{ltk_key
= 0x43a3eb, ltk_data = 0x261ab00, ltk_free = 0x43a22f <conn_counter_destroy>},
{
ltk_key = 0x4ae533, ltk_data = 0xb250b00, ltk_free = 0x4ae358
<slap_sl_mem_destroy>}, {ltk_key = 0x455939, ltk_data = 0x0,
ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key = 0x229cd00,
ltk_data = 0x985e200, ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key =
0x7f89111315b7,
ltk_data = 0xcd38000, ltk_free = 0x7f8911131594
<search_stack_free>}, {ltk_key = 0x7f891112e071, ltk_data = 0xca38000,
ltk_free = 0x7f891112e029 <scope_chunk_free>}, {ltk_key =
0x229d400, ltk_data = 0x71ace00, ltk_free = 0x7f891113c78b <mdb_reader_free>},
{ltk_key = 0x0,
ltk_data = 0x11d48800, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
kctx = 0x0
i = 32
keyslot = 430
hash = 3460370862
pool_lock = 0
freeme = 0
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#12 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#13 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 2 (Thread 0x7f610c2b4700 (LWP 24941)):
#0 0x00007f8914c0268c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f8916117c2f in ldap_pvt_thread_cond_wait (cond=0x2722808,
mutex=0x27227e0) at thr_posix.c:277
No locals.
#2 0x00007f891611478a in ldap_pvt_thread_rmutex_lock (rmutex=0x2469b28,
owner=140054792718080) at rmutex.c:129
rm = 0x27227e0
__PRETTY_FUNCTION__ = "ldap_pvt_thread_rmutex_lock"
#3 0x00007f8910adafcf in accesslog_op_mod (op=0x108d0400, rs=0x7f610c2b3a00) at
accesslog.c:1984
cb = 0xe0a04b8
cb2 = 0x7f610c2b24e0
on = 0x260cd20
li = 0x2469ac0
lo = 0x7f8910cdfb70
logop = 2
doit = 1
#4 0x00000000004cec1d in overlay_op_walk (op=0x108d0400, rs=0x7f610c2b3a00,
which=op_modify, oi=0x260c780, on=0x260cd20) at backover.c:661
func = 0x260cd78
rc = 32768
#5 0x00000000004ceee8 in over_op_func (op=0x108d0400, rs=0x7f610c2b3a00,
which=op_modify) at backover.c:730
oi = 0x260c780
on = 0x260c960
be = 0x25fc4e0
db = {bd_info = 0x260cd20, bd_self = 0x25fc4e0,
be_ctrls =
"\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001",
'\000' <repeats 14 times>, "\001", be_flags = 563464, be_restrictops = 0,
be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls
= 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls
= 0,
sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x25c20c0,
be_nsuffix = 0x25c2100, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn =
{bv_len = 0,
bv_val = 0x0}, be_rootdn = {bv_len = 9, bv_val = 0x2588440
"cn=config"}, be_rootndn = {bv_len = 9, bv_val = 0x2588460 "cn=config"},
be_rootpw = {bv_len = 0,
bv_val = 0x0}, be_max_deref_depth = 15, be_def_limit = {lms_t_soft =
-1, lms_t_hard = 0, lms_s_soft = -1, lms_s_hard = 0, lms_s_unchecked = -1,
lms_s_pr = 0,
lms_s_pr_hide = 0, lms_s_pr_total = 0}, be_limits = 0x0, be_acl =
0x25f1880, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn =
{bv_len = 0,
bv_val = 0x0}, be_update_refs = 0x0, be_pending_csn_list =
0x2629980, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
__nusers = 0, __kind = 0,
__spins = 0, __list = {__prev = 0x0, __next = 0x0}}, __size =
'\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x2418680, be_pb = 0x0,
be_cf_ocs = 0x7f8911361180, be_private = 0x297a000, be_next =
{stqe_next = 0x0}}
cb = {sc_next = 0xe0a04b8, sc_response = 0x4cdc92 <over_back_response>,
sc_cleanup = 0, sc_writewait = 0, sc_private = 0x260c780}
sc = 0x7f610c2b26e0
rc = 32768
__PRETTY_FUNCTION__ = "over_op_func"
#6 0x00000000004cf024 in over_op_modify (op=0x108d0400, rs=0x7f610c2b3a00) at
backover.c:769
No locals.
#7 0x000000000045b18e in fe_op_modify (op=0x108d0400, rs=0x7f610c2b3a00) at
modify.c:303
update = 0
repl_user = 0
op_be = 0x25fc4e0
bd = 0x75a900
textbuf = "\024\000\000\000\021\000\000\000\000)+\002\000\000\000\000\300'+\fa\177\000\000)\034F",
'\000' <repeats 13 times>,
"`^U\020\000\000\000\000\340*-\020\000\000\000\000\000v+\002\000\000\000\000\000\235B\002\000\000\000\000\002\000\000\000\000\000\000\000@@\301\021\000\000\000\000\300'+\fa\177",
'\000' <repeats 18 times>, "\017\000\000\000\000\000\000\000`1\016\021", '\000'
<repeats 12 times>, "
\000\000\000\000\000\000\000\320'+\fa\177\000\000\000\000\000\000\000\000\000\000`(+\fa\177\000\000ܻE",
'\000' <repeats 14 times>, "\001\000\000\000\000\000\000\220\070+\fa\177\000\000
:+\fa\177", '\000' <repeats 11 times>, "\004\215\020\000\000\000\000`(+"...
textlen = 256
#8 0x000000000045aa60 in do_modify (op=0x108d0400, rs=0x7f610c2b3a00) at
modify.c:177
dn = {bv_len = 46, bv_val = 0x119b4f58
"uid=cwsa-account,ou=people,dc=xxxxxxx,dc=co,dc=za"}
textbuf = "\240\070+\fa\177\000\000\000\000\000\000\000\000\000\000p9+\fa\177\000\000`}k\017\000\000\000\000\377\377\377\377\377\377\377\377\024p\257\000\000\000\000\000q\025\000\000\000\000\000\000\354\006\360\025\211\177\000\000
9+\fa\177\000\000Z\373\357\025\211\177\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\377\022\224\t\000\000\000\000\300\366\340\021\000\000\000\000\300\356\f\v",
'\000' <repeats 12 times>"\300,
\356\f\v\000\000\000\000x9+\fa\177\000\000\063\345J\000\000\000\000\000\060;+\
fa\177\000\000\060;+\fa\177\000\000\360\022\224\t\000\000\000\000\320\071+\fa\177\000\000\022\346J\000\000\000\000\000p9+\f\001\000\000\000\060;+\fa\177\000\000\000\000\000\000\001\000\000\000\000\000\020",
'\000' <repeats 13 times>"\300, \356\f\v\000\000\000\000\300"...
textlen = 256
tmp = 0x0
#9 0x000000000043a89a in connection_operation (ctx=0x7f610c2b3b30,
arg_v=0x108d0400) at connection.c:1135
rc = 80
cancel = 0
op = 0x108d0400
rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0,
sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un =
{sru_search = {r_entry = 0x0,
r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0,
r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended =
{r_rspoid = 0x0,
r_rspdata = 0x0}}, sr_flags = 0}
tag = 102
opidx = SLAP_OP_MODIFY
conn = 0x2a82240
memctx = 0xb0ceec0
memctx_null = 0x0
memsiz = 1048576
__PRETTY_FUNCTION__ = "connection_operation"
#10 0x000000000043ae3b in connection_read_thread (ctx=0x7f610c2b3b30,
argv=0x13b) at connection.c:1271
rc = 0
cri = {op = 0x108d0400, func = 0, arg = 0x0, ctx = 0x7f610c2b3b30,
nullop = 0}
s = 315
#11 0x00007f8916116552 in ldap_int_thread_pool_wrapper (xpool=0x20d0000) at
tpool.c:956
pq = 0x20d0000
pool = 0x2294180
task = 0x11a1c860
work_list = 0x20d0070
ctx = {ltu_pq = 0x20d0000, ltu_id = 140054792718080, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0xb0ceec0, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
ltk_key = 0x43a3eb, ltk_data = 0x2619600, ltk_free = 0x43a22f
<conn_counter_destroy>}, {ltk_key = 0x229cd00, ltk_data = 0xc90e000,
ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key =
0x7f89111315b7, ltk_data = 0xe4a0000, ltk_free = 0x7f8911131594
<search_stack_free>}, {
ltk_key = 0x7f891112e071, ltk_data = 0xe1a0000, ltk_free =
0x7f891112e029 <scope_chunk_free>}, {ltk_key = 0x455939, ltk_data = 0x118aa800,
ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key = 0x229d400,
ltk_data = 0xdfa1a00, ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key =
0x0,
ltk_data = 0xfa21600, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
kctx = 0x0
i = 32
keyslot = 542
hash = 691115550
pool_lock = 0
freeme = 0
__PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#12 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#13 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.
Thread 1 (Thread 0x7f89167c5720 (LWP 18917)):
#0 0x00007f8914bff2fd in pthread_join () from /lib64/libpthread.so.0
No symbol table info available.
#1 0x00007f8916117b70 in ldap_pvt_thread_join (thread=140054859859712,
thread_return=0x0) at thr_posix.c:197
No locals.
#2 0x000000000043785a in slapd_daemon () at daemon.c:2910
i = 0
rc = 0
#3 0x0000000000414c02 in main (argc=9, argv=0x7fffb8df91e8) at main.c:1017
i = 9
no_detach = 0
rc = 0
urls = 0x208e020 "ldap://0.0.0.0:389 ldapi:///"
username = 0x2092018 "TRUE"
groupname = 0x0
sandbox = 0x0
syslogUser = 128
pid = 0
waitfds = {9, 10}
g_argc = 9
g_argv = 0x7fffb8df91e8
configfile = 0x0
configdir = 0x208e060 "/opt/zimbra/data/ldap/config"
serverName = 0x7fffb8dfadeb "slapd"
serverMode = 1
scp = 0x0
scp_entry = 0x0
debug_unknowns = 0x0
syslog_unknowns = 0x0
serverNamePrefix = 0x4f2f08 ""
l = 5188080
slapd_pid_file_unlink = 1
slapd_args_file_unlink = 1
firstopt = 0
__PRETTY_FUNCTION__ = "main"
(gdb)
Output from mdb_stat -eaf on the master shows significant fragmentation:
[zimbra@ldap01-dc01 db]$ mdb_stat -eaf .
Environment Info
Map address: (nil)
Map size: 85899345920
Page size: 4096
Max pages: 20971520
Number of pages used: 2739630
Last transaction ID: 139737905
Max readers: 126
Number of readers used: 9
Freelist Status
Tree depth: 3
Branch pages: 18
Leaf pages: 3311
Overflow pages: 397
Entries: 78618
Free pages: 1504751
Status of Main DB
Tree depth: 1
Branch pages: 0
Leaf pages: 1
Overflow pages: 0
Entries: 38
Status of DKIMIdentity
Tree depth: 0
Branch pages: 0
Leaf pages: 0
Overflow pages: 0
Entries: 0
Status of DKIMSelector
Tree depth: 0
Branch pages: 0
Leaf pages: 0
Overflow pages: 0
Entries: 0
Status of ad2i
Tree depth: 2
Branch pages: 1
Leaf pages: 13
Overflow pages: 0
Entries: 1183
Status of cn
Tree depth: 3
Branch pages: 159
Leaf pages: 35732
Overflow pages: 0
Entries: 13311385
Status of displayName
Tree depth: 3
Branch pages: 131
Leaf pages: 24914
Overflow pages: 0
Entries: 9306285
Status of dn2i
Tree depth: 4
Branch pages: 522
Leaf pages: 64580
Overflow pages: 0
Entries: 2727439
Status of entryCSN
Tree depth: 4
Branch pages: 1421
Leaf pages: 19563
Overflow pages: 0
Entries: 1363719
Status of entryUUID
Tree depth: 3
Branch pages: 65
Leaf pages: 11094
Overflow pages: 0
Entries: 1363719
Status of givenName
Tree depth: 3
Branch pages: 9
Leaf pages: 2126
Overflow pages: 0
Entries: 601575
Status of id2e
Tree depth: 4
Branch pages: 3955
Leaf pages: 500307
Overflow pages: 283335
Entries: 1363720
Status of mail
Tree depth: 3
Branch pages: 137
Leaf pages: 33259
Overflow pages: 0
Entries: 14426766
Status of objectClass
Tree depth: 2
Branch pages: 1
Leaf pages: 4
Overflow pages: 0
Entries: 278069
Status of sn
Tree depth: 3
Branch pages: 129
Leaf pages: 25165
Overflow pages: 0
Entries: 9769145
Status of uid
Tree depth: 3
Branch pages: 33
Leaf pages: 7109
Overflow pages: 0
Entries: 924205
Status of zimbraACE
Tree depth: 3
Branch pages: 17
Leaf pages: 3519
Overflow pages: 0
Entries: 1334426
Status of zimbraAuthKerberos5Realm
Tree depth: 0
Branch pages: 0
Leaf pages: 0
Overflow pages: 0
Entries: 0
Status of zimbraCalResBuilding
Tree depth: 2
Branch pages: 1
Leaf pages: 4
Overflow pages: 0
Entries: 641
Status of zimbraCalResCapacity
Tree depth: 1
Branch pages: 0
Leaf pages: 1
Overflow pages: 0
Entries: 27
Status of zimbraCalResFloor
Tree depth: 2
Branch pages: 1
Leaf pages: 2
Overflow pages: 0
Entries: 363
Status of zimbraCalResRoom
Tree depth: 1
Branch pages: 0
Leaf pages: 1
Overflow pages: 0
Entries: 178
Status of zimbraCalResSite
Tree depth: 2
Branch pages: 1
Leaf pages: 4
Overflow pages: 0
Entries: 543
Status of zimbraDomainAliasTargetId
Tree depth: 1
Branch pages: 0
Leaf pages: 1
Overflow pages: 0
Entries: 154
Status of zimbraDomainName
Tree depth: 3
Branch pages: 9
Leaf pages: 2152
Overflow pages: 0
Entries: 643609
Status of zimbraForeignPrincipal
Tree depth: 0
Branch pages: 0
Leaf pages: 0
Overflow pages: 0
Entries: 0
Status of zimbraId
Tree depth: 3
Branch pages: 33
Leaf pages: 7968
Overflow pages: 0
Entries: 955084
Status of zimbraMailAlias
Tree depth: 3
Branch pages: 65
Leaf pages: 13719
Overflow pages: 0
Entries: 4584536
Status of zimbraMailCatchAllAddress
Tree depth: 3
Branch pages: 9
Leaf pages: 208
Overflow pages: 0
Entries: 16676
Status of zimbraMailDeliveryAddress
Tree depth: 3
Branch pages: 130
Leaf pages: 26463
Overflow pages: 0
Entries: 11258680
Status of zimbraMailForwardingAddress
Tree depth: 3
Branch pages: 3
Leaf pages: 370
Overflow pages: 0
Entries: 43649
Status of zimbraMailHost
Tree depth: 2
Branch pages: 1
Leaf pages: 61
Overflow pages: 0
Entries: 659450
Status of zimbraMailTransport
Tree depth: 2
Branch pages: 1
Leaf pages: 60
Overflow pages: 0
Entries: 655378
Status of zimbraMemberOf
Tree depth: 0
Branch pages: 0
Leaf pages: 0
Overflow pages: 0
Entries: 0
Status of zimbraShareInfo
Tree depth: 0
Branch pages: 0
Leaf pages: 0
Overflow pages: 0
Entries: 0
Status of zimbraSharedItem
Tree depth: 3
Branch pages: 69
Leaf pages: 16765
Overflow pages: 0
Entries: 10835821
Status of zimbraUCServiceId
Tree depth: 0
Branch pages: 0
Leaf pages: 0
Overflow pages: 0
Entries: 0
Status of zimbraVirtualHostname
Tree depth: 2
Branch pages: 1
Leaf pages: 4
Overflow pages: 0
Entries: 28593
Status of zimbraVirtualIPAddress
Tree depth: 0
Branch pages: 0
Leaf pages: 0
Overflow pages: 0
Entries: 0
Status of zimbraYahooId
Tree depth: 0
Branch pages: 0
Leaf pages: 0
Overflow pages: 0
Entries: 0
[zimbra@ldap01-dc01 db]$ cd ../../accesslog/db/
[zimbra@ldap01-dc01 db]$ mdb_stat -eaf .
Environment Info
Map address: (nil)
Map size: 85899345920
Page size: 4096
Max pages: 20971520
Number of pages used: 481574
Last transaction ID: 56766713
Max readers: 126
Number of readers used: 10
Freelist Status
Tree depth: 3
Branch pages: 7
Leaf pages: 765
Overflow pages: 0
Entries: 9940
Free pages: 307284
Status of Main DB
Tree depth: 1
Branch pages: 0
Leaf pages: 1
Overflow pages: 0
Entries: 8
Status of ad2i
Tree depth: 1
Branch pages: 0
Leaf pages: 1
Overflow pages: 0
Entries: 22
Status of dn2i
Tree depth: 3
Branch pages: 57
Leaf pages: 12272
Overflow pages: 0
Entries: 1079831
Status of entryCSN
Tree depth: 3
Branch pages: 11
Leaf pages: 1988
Overflow pages: 0
Entries: 539915
Status of id2e
Tree depth: 4
Branch pages: 623
Leaf pages: 139166
Overflow pages: 2174
Entries: 539915
Status of objectClass
Tree depth: 1
Branch pages: 0
Leaf pages: 1
Overflow pages: 0
Entries: 10887
Status of reqEnd
Tree depth: 3
Branch pages: 11
Leaf pages: 1987
Overflow pages: 0
Entries: 539914
Status of reqResult
Tree depth: 1
Branch pages: 0
Leaf pages: 1
Overflow pages: 0
Entries: 3
Status of reqStart
Tree depth: 3
Branch pages: 11
Leaf pages: 1991
Overflow pages: 0
Entries: 539914
[zimbra@ldap01-dc01 db]$
6 years
(ITS#8663) slapo-memberof cannot replace "olcMemberOfRefInt"
by quanah@openldap.org
Full_Name: Quanah Gibson-Mount
Version: HEAD
OS: Linux
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (47.208.148.239)
While you can set olcMemberOfRefInt during an add operation when instantiating
slapo-memberOf with cn=config, you cannot modify the value after that point.
Attempting to change the value results in:
Running ldapmodify to change olcMemberOfRefInt value
ldapmodify failed (80)!
slapd log shows:
592ef748 <<< dnPrettyNormal:
<olcOverlay={0}memberof,olcDatabase={1}bdb,cn=config>,
<olcOverlay={0}memberof,olcDatabase={1}bdb,cn=config>
592ef748 conn=1003 op=1 modifications:
592ef748 replace: olcMemberOfRefInt
592ef748 one value, length 5
592ef748 conn=1003 op=1 MOD
dn="olcOverlay={0}memberof,olcDatabase={1}bdb,cn=config"
592ef748 conn=1003 op=1 MOD attr=olcMemberOfRefInt
592ef748 slap_queue_csn: queueing 0x7f326010add0
20170531170304.816445Z#000000#000#000000
592ef748 oc_check_required entry
(olcOverlay={0}memberof,olcDatabase={1}bdb,cn=config), objectClass
"olcMemberOf"
592ef748 oc_check_allowed type "objectClass"
592ef748 oc_check_allowed type "olcOverlay"
592ef748 oc_check_allowed type "olcMemberOfGroupOC"
592ef748 oc_check_allowed type "olcMemberOfMemberAD"
592ef748 oc_check_allowed type "olcMemberOfMemberOfAD"
592ef748 oc_check_allowed type "structuralObjectClass"
592ef748 oc_check_allowed type "entryUUID"
592ef748 oc_check_allowed type "creatorsName"
592ef748 oc_check_allowed type "createTimestamp"
592ef748 oc_check_allowed type "olcMemberOfRefInt"
592ef748 oc_check_allowed type "entryCSN"
592ef748 oc_check_allowed type "modifiersName"
592ef748 oc_check_allowed type "modifyTimestamp"
592ef748 send_ldap_result: conn=1003 op=1 p=3
592ef748 send_ldap_result: err=80 matched="" text=""
592ef748 send_ldap_response: msgid=2 tag=103 err=80
ber_flush2: 14 bytes to sd 8
592ef748 conn=1003 op=1 RESULT tag=103 err=80 qtime=0.000020 etime=0.816572
text=
592ef748 slap_graduate_commit_csn: removing 0x7f326010add0
20170531170304.816445Z#000000#000#000000
592ef748 connection_get(8)
6 years
Re: (ITS#8660) slapd segmentation faults (relay backend and rwm overlay)
by quanah@symas.com
--On Wednesday, May 24, 2017 3:14 PM +0000 nespor(a)id.ethz.ch wrote:
> I am not quite sure, if it is really the same problem. I do not use the
> Red Hat openldap package.
> I have downloaded openldap-2.4.44.tgz on January 5, 2017, and compiled
> myself.
Yes, it was fixed in May of 2016 (2.4.44 was released February of 2016).
So it is already fixed for the next release (2.4.45).
Hope that helps.
--Quanah
--
Quanah Gibson-Mount
Product Architect
Symas Corporation
Packaged, certified, and supported LDAP solutions powered by OpenLDAP:
<http://www.symas.com>
6 years
Re: (ITS#8660) slapd segmentation faults (relay backend and rwm overlay)
by nespor@id.ethz.ch
I am not quite sure, if it is really the same problem. I do not use the
Red Hat openldap package.
I have downloaded openldap-2.4.44.tgz on January 5, 2017, and compiled
myself.
On 05/24/17 15:48, Howard Chu wrote:
> Howard Chu wrote:
>> nespor(a)id.ethz.ch wrote:
>>> Full_Name: Vlado Nespor
>>> Version: 2.4.44
>>> OS: Red Hat el7
>>> URL: ftp://ftp.openldap.org/incoming/
>>> Submission from: (NULL) (2001:67c:10ec:32d0::222)
>>>
>>>
>>> We have experienced random slapd segmentation faults, when the relay
>>> backend and rwm overlay were used in the configuration. After some
>>> time I could reproduce the segmentation fault on a slow client and
>>> with test queries, which were supposed to return a larger set of
>>> entries.
>>>
>>> I could trace the problem to a wrong pointer in the slap_writewait_play
>>> function in the openldap-2.4.44/servers/slapd/result.c file, and then
>>> further to the openldap-2.4.44/servers/slapd/back-relay/op.c file.
>>> After
>>> the addition of the sc_writewait pointer initialisation (see the patch
>>> below), the test queries returned correct results and random slapd
>>> segmentation faults disappeared.
>>
>> Thanks for the report, but this was already fixed in ITS#8218
>> released in
>> 2.4.43. Sounds like Red Hat has botched their source code since the
>> official
>> fix has been out for nearly 2 years already.
>
> Sorry, a typo on my part. It was ITS#8428.
>
6 years
Re: (ITS#8660) slapd segmentation faults (relay backend and rwm overlay)
by hyc@symas.com
Howard Chu wrote:
> nespor(a)id.ethz.ch wrote:
>> Full_Name: Vlado Nespor
>> Version: 2.4.44
>> OS: Red Hat el7
>> URL: ftp://ftp.openldap.org/incoming/
>> Submission from: (NULL) (2001:67c:10ec:32d0::222)
>>
>>
>> We have experienced random slapd segmentation faults, when the relay
>> backend and rwm overlay were used in the configuration. After some
>> time I could reproduce the segmentation fault on a slow client and
>> with test queries, which were supposed to return a larger set of entries.
>>
>> I could trace the problem to a wrong pointer in the slap_writewait_play
>> function in the openldap-2.4.44/servers/slapd/result.c file, and then
>> further to the openldap-2.4.44/servers/slapd/back-relay/op.c file. After
>> the addition of the sc_writewait pointer initialisation (see the patch
>> below), the test queries returned correct results and random slapd
>> segmentation faults disappeared.
>
> Thanks for the report, but this was already fixed in ITS#8218 released in
> 2.4.43. Sounds like Red Hat has botched their source code since the official
> fix has been out for nearly 2 years already.
Sorry, a typo on my part. It was ITS#8428.
--
-- Howard Chu
CTO, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
6 years
Re: (ITS#8660) slapd segmentation faults (relay backend and rwm overlay)
by hyc@symas.com
nespor(a)id.ethz.ch wrote:
> Full_Name: Vlado Nespor
> Version: 2.4.44
> OS: Red Hat el7
> URL: ftp://ftp.openldap.org/incoming/
> Submission from: (NULL) (2001:67c:10ec:32d0::222)
>
>
> We have experienced random slapd segmentation faults, when the relay
> backend and rwm overlay were used in the configuration. After some
> time I could reproduce the segmentation fault on a slow client and
> with test queries, which were supposed to return a larger set of entries.
>
> I could trace the problem to a wrong pointer in the slap_writewait_play
> function in the openldap-2.4.44/servers/slapd/result.c file, and then
> further to the openldap-2.4.44/servers/slapd/back-relay/op.c file. After
> the addition of the sc_writewait pointer initialisation (see the patch
> below), the test queries returned correct results and random slapd
> segmentation faults disappeared.
Thanks for the report, but this was already fixed in ITS#8218 released in
2.4.43. Sounds like Red Hat has botched their source code since the official
fix has been out for nearly 2 years already.
>
> With best regards,
>
> Vlado Nespor
>
>
> diff -rupN openldap-2.4.44/servers/slapd/back-relay/op.c
> openldap-2.4.44_back-relay/servers/slapd/back-relay/op.c
> --- openldap-2.4.44/servers/slapd/back-relay/op.c 2016-02-06 00:57:45.000000000
> +0100
> +++ openldap-2.4.44_back-relay/servers/slapd/back-relay/op.c 2017-02-07
> 15:09:55.046188340 +0100
> @@ -97,6 +97,7 @@ relay_back_response_cb( Operation *op, S
> (rcb)->rcb_sc.sc_next = (op)->o_callback; \
> (rcb)->rcb_sc.sc_response = relay_back_response_cb; \
> (rcb)->rcb_sc.sc_cleanup = 0; \
> + (rcb)->rcb_sc.sc_writewait = 0; \
> (rcb)->rcb_sc.sc_private = (op)->o_bd; \
> (op)->o_callback = (slap_callback *) (rcb); \
> }
>
>
>
--
-- Howard Chu
CTO, Symas Corp. http://www.symas.com
Director, Highland Sun http://highlandsun.com/hyc/
Chief Architect, OpenLDAP http://www.openldap.org/project/
6 years