On Wed, 11 Mar 2009, Aaron Richton wrote:
https://www.nbcs.rutgers.edu/~richton/test050failures.tar.gz contains 12 bad
See also https://www.nbcs.rutgers.edu/~richton/test050backtraces.tar.gz; match to testrun directories by timestamp. There are six that I focused on that have both testrun AND core available.
Oh yeah, I compile with CHECK_CSN. Where there's smoke...
big picture:
==> backtrace.2009030049 <== two cores slapd #1:
t@8 (l@8) terminated by signal SEGV (no mapping at the fault address) 0xff2c8038: memchr+0x0010: ldub [%o0], %o0 Current function is slap_parse_csn_sid 129 p = ber_bvchr( &csn, '#' );
slapd #2:
t@3 (l@3) terminated by signal ABRT (Abort) 0xff31feb0: __lwp_kill+0x0008: bgeu,a __lwp_kill+0x1c ! 0xff31fec4 Current function is connection_state_closing 686 assert( c->c_struct_state == SLAP_C_USED );
==> backtrace.2009030126 <== t@4 (l@4) terminated by signal ABRT (Abort) 0xff31feb0: __lwp_kill+0x0008: bgeu,a __lwp_kill+0x1c ! 0xff31fec4 Current function is ldap_get_option 111 assert( LDAP_VALID( ld ) );
==> backtrace.2009030140 <== t@6 (l@6) terminated by signal SEGV (no mapping at the fault address) 0xff2b467c: strlen+0x0080: ld [%o1], %o2 Current function is lutil_debug 66 vsnprintf( buffer, sizeof(buffer), fmt, vl );
==> backtrace.2009030219 <== t@4 (l@4) terminated by signal ABRT (Abort) 0xff31feb0: __lwp_kill+0x0008: bgeu,a __lwp_kill+0x1c ! 0xff31fec4 Current function is ldap_get_option 111 assert( LDAP_VALID( ld ) );
==> backtrace.2009030221 <== t@7 (l@7) terminated by signal ABRT (Abort) 0xff31feb0: __lwp_kill+0x0008: bgeu,a __lwp_kill+0x1c ! 0xff31fec4 Current function is ldap_pvt_runqueue_resched 165 assert ( e == entry );
==> backtrace.2009031933 <== t@8 (l@8) terminated by signal ABRT (Abort) 0xff31feb0: __lwp_kill+0x0008: bgeu,a __lwp_kill+0x1c ! 0xff31fec4 Current function is syncrepl_updateCookie 3018 assert( !syn->ssyn_validate( syn, si->si_cookieState->cs_vals+i ));