Guest User

slapd freezing backtrace

a guest
Sep 18th, 2013
143
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
  1.  
  2. Netstat of TCP Replication connections, the second is initiated by the
  3. passive system polling from the active
  4.  
  5. tcp 0 53 10.169.127.13:389 10.169.126.13:43340 ESTABLISHED
  6. tcp 1905336 0 10.169.127.13:52384 10.169.126.13:389 ESTABLISHED
  7.  
  8.  
  9. top -H of the LDAP Processes:
  10.  
  11. 7767 ldap 20 0 84.4g 7.1g 6.9g S 1 10.1 1:02.13 slapd
  12. 7768 ldap 20 0 84.4g 7.1g 6.9g S 0 10.1 7:54.44 slapd
  13. 8023 ldap 20 0 84.4g 7.1g 6.9g S 0 10.1 0:32.31 slapd
  14. 7766 ldap 20 0 84.4g 7.1g 6.9g S 0 10.1 0:00.00 slapd
  15. 7769 ldap 20 0 84.4g 7.1g 6.9g S 0 10.1 0:32.81 slapd
  16. 7770 ldap 20 0 84.4g 7.1g 6.9g S 0 10.1 7:44.94 slapd
  17. 8024 ldap 20 0 84.4g 7.1g 6.9g t 0 10.1 0:32.53 slapd
  18.  
  19.  
  20. --------------------------------------------------
  21. PID (Main Program) 7766
  22. --------------------------------------------------
  23.  
  24. (gdb) bt full
  25. #0 0x00007f2b8e42df95 in pthread_join () from /lib64/libpthread.so.0
  26. No symbol table info available.
  27. #1 0x00007f2b8f4b92b9 in slapd_daemon () at daemon.c:2929
  28. i = 1
  29. rc = 0
  30. #2 0x00007f2b8f4a36dd in main (argc=11, argv=0x7ffffcb8b5a8) at main.c:1012
  31. i = 11
  32. no_detach = 0
  33. rc = -12
  34. urls = 0x7f2b8f912090 "ldap:/// "
  35. username = 0x7f2b8f9120e0 "ldap"
  36. groupname = 0x7f2b8f912100 "localhost"
  37. sandbox = 0x0
  38. syslogUser = 160
  39. pid = <optimized out>
  40. waitfds = {8, 9}
  41. configfile = 0x7f2b8f9120b0 "/etc/openldap/slapd.conf"
  42. configdir = 0x0
  43. serverName = 0x7f2b8fa283d0 ""
  44. scp = <optimized out>
  45. scp_entry = <optimized out>
  46. debug_unknowns = 0x0
  47. syslog_unknowns = 0x0
  48. ---Type <return> to continue, or q <return> to quit---
  49. slapd_pid_file_unlink = 1
  50. slapd_args_file_unlink = 1
  51. firstopt = <optimized out>
  52. __PRETTY_FUNCTION__ = "main"
  53. (gdb)
  54.  
  55.  
  56.  
  57. ---------------------------------------------
  58. PID: 7767
  59. ---------------------------------------------
  60.  
  61. (gdb) bt full
  62. #0 0x00007f2b8ca6e2e3 in epoll_wait () from /lib64/libc.so.6
  63. No symbol table info available.
  64. #1 0x00007f2b8f4ba354 in slapd_daemon_task (ptr=<optimized out>) at daemon.c:2536
  65. ns = <optimized out>
  66. at = 0
  67. revents = 0x7f2b8f9162e0
  68. tvp = 0x7f1695ebce80
  69. cat = {tv_sec = 1379583460, tv_usec = 0}
  70. now = 1379506629
  71. tv = {tv_sec = 76831, tv_usec = 0}
  72. rtask = <optimized out>
  73. l = 16
  74. last_idle_check = 1379497060
  75. ebadf = 0
  76. tid = 0
  77. #2 0x00007f2b8e42d7b6 in start_thread () from /lib64/libpthread.so.0
  78. No symbol table info available.
  79. #3 0x00007f2b8ca6dc5d in clone () from /lib64/libc.so.6
  80. No symbol table info available.
  81. #4 0x0000000000000000 in ?? ()
  82. No symbol table info available.
  83. (gdb)
  84.  
  85.  
  86. ----------------------------------------------------------------------------
  87. PID: 7768
  88. ----------------------------------------------------------------------------
  89.  
  90. (gdb) bt full
  91. #0 0x00007f2b8e43161c in pthread_cond_wait@@GLIBC_2.3.2 () from /lib64/libpthread.so.0
  92. No symbol table info available.
  93. #1 0x00007f2b8f012ca5 in ldap_int_thread_pool_wrapper (xpool=<optimized out>) at tpool.c:675
  94. pool = 0x7f2b8f942830
  95. task = 0x0
  96. work_list = 0x2d88ac
  97. ctx = {ltu_id = 139734964496128, ltu_key = {{ltk_key = 0x7f2b8f51af50,
  98. ltk_data = 0x7f2b8fed98b0, ltk_free = 0x7f2b8f51af70 <slap_sl_mem_destroy>}, {
  99. ltk_key = 0x7f2b8fbb2500, ltk_data = 0x7f1684000bf0,
  100. ltk_free = 0x7f2b8f5c30a0 <mdb_reader_free>}, {ltk_key = 0x7f2b8f574a60,
  101. ltk_data = 0x7f1689fff010, ltk_free = 0x7f2b8f574b40 <search_stack_free>}, {
  102. ltk_key = 0x7f2b8f5749d0, ltk_data = 0x7f16912ba010,
  103. ltk_free = 0x7f2b8f574b10 <scope_chunk_free>}, {ltk_key = 0x7f2b8f4be790,
  104. ltk_data = 0x7f1684004040, ltk_free = 0x7f2b8f4be860 <conn_counter_destroy>}, {
  105. ltk_key = 0x7f2b8fa85990, ltk_data = 0x7f16704d0580,
  106. ltk_free = 0x7f2b8f5c30a0 <mdb_reader_free>}, {ltk_key = 0x7f2b8f4d4dc0,
  107. ltk_data = 0x7f16704a3ac0, ltk_free = 0x7f2b8f4d4b90 <slap_op_q_destroy>}, {
  108. ltk_key = 0x0, ltk_data = 0x0, ltk_free = 0} <repeats 25 times>}}
  109. kctx = <optimized out>
  110. keyslot = 859
  111. hash = <optimized out>
  112. __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
  113. #2 0x00007f2b8e42d7b6 in start_thread () from /lib64/libpthread.so.0
  114. No symbol table info available.
  115. #3 0x00007f2b8ca6dc5d in clone () from /lib64/libc.so.6
  116. No symbol table info available.
  117. #4 0x0000000000000000 in ?? ()
  118. No symbol table info available.
  119. (gdb)
  120.  
  121.  
  122. -------------------------------------------------------------------------------
  123. PID: 7769
  124. -------------------------------------------------------------------------------
  125.  
  126. (gdb) bt full
  127. #0 0x00007f2b8e43161c in pthread_cond_wait@@GLIBC_2.3.2 () from /lib64/libpthread.so.0
  128. No symbol table info available.
  129. #1 0x00007f2b8f012ca5 in ldap_int_thread_pool_wrapper (xpool=<optimized out>) at tpool.c:675
  130. pool = 0x7f2b8f942830
  131. task = 0x0
  132. work_list = 0x2d88ac
  133. ctx = {ltu_id = 139734947714816, ltu_key = {{ltk_key = 0x7f2b8f51af50,
  134. ltk_data = 0x7f168c0008b0, ltk_free = 0x7f2b8f51af70 <slap_sl_mem_destroy>}, {
  135. ltk_key = 0x7f2b8fa85990, ltk_data = 0x7f2b8ffe5130,
  136. ltk_free = 0x7f2b8f5c30a0 <mdb_reader_free>}, {ltk_key = 0x7f2b8f5749d0,
  137. ltk_data = 0x7f16918bb010, ltk_free = 0x7f2b8f574b10 <scope_chunk_free>}, {
  138. ltk_key = 0x7f2b8f4be790, ltk_data = 0x7f2b8ffe3b00,
  139. ltk_free = 0x7f2b8f4be860 <conn_counter_destroy>}, {ltk_key = 0x7f2b8f4d4dc0,
  140. ltk_data = 0x7f2b8ffe3740, ltk_free = 0x7f2b8f4d4b90 <slap_op_q_destroy>}, {
  141. ltk_key = 0x7f2b8fbb2500, ltk_data = 0x7f2b8ffe6a90,
  142. ltk_free = 0x7f2b8f5c30a0 <mdb_reader_free>}, {ltk_key = 0x7f2b8f574a60,
  143. ltk_data = 0x7f167fffe010, ltk_free = 0x7f2b8f574b40 <search_stack_free>}, {
  144. ltk_key = 0x0, ltk_data = 0x0, ltk_free = 0} <repeats 25 times>}}
  145. kctx = <optimized out>
  146. keyslot = 522
  147. hash = <optimized out>
  148. __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
  149. #2 0x00007f2b8e42d7b6 in start_thread () from /lib64/libpthread.so.0
  150. No symbol table info available.
  151. #3 0x00007f2b8ca6dc5d in clone () from /lib64/libc.so.6
  152. No symbol table info available.
  153. #4 0x0000000000000000 in ?? ()
  154. No symbol table info available.
  155. (gdb)
  156.  
  157. -----------------------------------------------------------------------------------------
  158. PID: 7770
  159. -----------------------------------------------------------------------------------------
  160.  
  161. (gdb) bt full
  162. #0 0x00007f2b8e43161c in pthread_cond_wait@@GLIBC_2.3.2 () from /lib64/libpthread.so.0
  163. No symbol table info available.
  164. #1 0x00007f2b8f0117db in ldap_pvt_thread_rmutex_lock (rmutex=<optimized out>,
  165. owner=139734930933504) at rmutex.c:129
  166. rm = 0x7f2b8fa01200
  167. __PRETTY_FUNCTION__ = "ldap_pvt_thread_rmutex_lock"
  168. #2 0x00007f2b8aa3d0ef in accesslog_op_mod (op=0x7f1692ebb310, rs=<optimized out>)
  169. at accesslog.c:1946
  170. cb = <optimized out>
  171. cb2 = 0x1
  172. on = 0x7f2b8fa00f80
  173. lo = 0x7f2b8ac415d8
  174. #3 0x00007f2b8f53083a in overlay_op_walk (op=0x7f1692ebb310, rs=0x7f1692eba420, which=op_delete,
  175. oi=0x7f2b8fa036c0, on=0x7f2b8fa00f80) at backover.c:661
  176. rc = -1830046960
  177. #4 0x00007f2b8f5315b9 in over_op_func (op=0x7f1692ebb310, rs=0x0, which=op_unbind)
  178. at backover.c:723
  179. oi = 0x0
  180. on = 0x0
  181. be = 0x7f2b8f9fe800
  182. db = {bd_info = 0x7f2b8fa00f80, bd_self = 0x7f2b8f9fe800,
  183. be_ctrls = "\000\000\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\000\001", '\000' <repeats 11 times>, "\001", be_flags = 563464, be_restrictops = 0,
  184. be_requires = 4, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls = 0,
  185. sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls = 0,
  186. sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x7f2b8f9fec80,
  187. be_nsuffix = 0x7f2b8f9ff420, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn = {
  188. bv_len = 0, bv_val = 0x0}, be_rootdn = {bv_len = 25,
  189. bv_val = 0x7f2b8fa00050 "cn=root,ou=admins,ou=root"}, be_rootndn = {bv_len = 25,
  190. bv_val = 0x7f2b8fa00080 "cn=root,ou=admins,ou=root"}, be_rootpw = {bv_len = 8,
  191. bv_val = 0x7f2b8f9ff370 "et3aLDAP"}, be_max_deref_depth = 15, be_def_limit = {
  192. lms_t_soft = -1, lms_t_hard = -1, lms_s_soft = -1, lms_s_hard = -1,
  193. lms_s_unchecked = -1, lms_s_pr = 0, lms_s_pr_hide = 0, lms_s_pr_total = 0},
  194. be_limits = 0x0, be_acl = 0x0, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0,
  195. be_update_ndn = {bv_len = 0, bv_val = 0x0}, be_update_refs = 0x0,
  196. be_pending_csn_list = 0x7f2b8fa85bd0, be_pcl_mutex = {__data = {__lock = 0, __count = 0,
  197. __owner = 0, __nusers = 0, __kind = 0, __spins = 0, __list = {__prev = 0x0,
  198. __next = 0x0}}, __size = '\000' <repeats 39 times>, __align = 0},
  199. be_syncinfo = 0x7f2b8fa031a0, be_pb = 0x0, be_cf_ocs = 0x7f2b8f8708c0,
  200. be_private = 0x7f2b8a975010, be_next = {stqe_next = 0x7f2b8fa024e0}}
  201. cb = {sc_next = 0x7f1692eba490, sc_response = 0x7f2b8f530540 <over_back_response>,
  202. sc_cleanup = 0, sc_private = 0x7f2b8fa036c0}
  203. sc = <optimized out>
  204. rc = <optimized out>
  205. __PRETTY_FUNCTION__ = "over_op_func"
  206. #5 0x00007f2b8f521acb in syncrepl_message_to_op (si=0x7f2b8fa031a0, op=0x7f1692ebb310,
  207. msg=0x7f168c1485b0) at syncrepl.c:2390
  208. ber = 0x7f168c148220
  209. modlist = 0x0
  210. ls = 0x7f2b8f86cec0
  211. rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0, sr_matched = 0x0,
  212. sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un = {sru_search = {r_entry = 0x0,
  213. r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0, r_nentries = 0,
  214. r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended = {r_rspoid = 0x0,
  215. r_rspdata = 0x0}}, sr_flags = 0}
  216. cb = {sc_next = 0x7f2b8fdd65a0, sc_response = 0x7f2b8f51f190 <null_callback>,
  217. sc_cleanup = 0, sc_private = 0x0}
  218. text = <optimized out>
  219. txtbuf = '\000' <repeats 24 times>"\360, \245\353\222\026\177", '\000' <repeats 18 times>, "
  220. @\246\353\222\026\177", '\000' <repeats 18 times>, "\001", '\000' <repeats 15 times>, "\a\000\000\000\000\000\000\000\240\300\237\217+\177\000\000\a\000\000\000\000\000\000\000\240\300\237\217+\177\000\000\220\246\353\222\026\177", '\000' <repeats 34 times>, "\n\000\000\000\000\000\000\000\360\220\223\217+\177\000\000\200\223\223\217+\177\000\000\372\070S\217+\177\000\000\250\246\353\222\026\177", '\000' <repeats 18 times>, "?\024\214\026\177\000\000(\000\000\017\000\000\000\000\341\206\024\214\026\177\000\000\200\223\223\217+\177\000\000\220\177\024\214\026\177\000"
  221. bdn = {bv_len = 148,
  222. bv_val = 0x7f168c14845d "cn=1363239294-18372,cn=1363261442-25467,cn=1335952855-39797,cn=hsia,cn=1242374917-14980,cn=1242374838-84024,cn=1241012570-41143,cn=companies,ou=root"}
  223. dn = {bv_len = 148,
  224. bv_val = 0x7f2b8fdd6ca0 "cn=1363239294-18372,cn=1363261442-25467,cn=1335952855-39797,cn=hsia,cn=1242374917-14980,cn=1242374838-84024,cn=1241012570-41143,cn=companies,ou=root"}
  225. ndn = {bv_len = 148,
  226. bv_val = 0x7f2b8fdd6e48 "cn=1363239294-18372,cn=1363261442-25467,cn=1335952855-39797,cn=hsia,cn=1242374917-14980,cn=1242374838-84024,cn=1241012570-41143,cn=companies,ou=root"}
  227. bv = {bv_len = 0, bv_val = 0x0}
  228. bv2 = {bv_len = 0, bv_val = 0x0}
  229. bvals = 0x7f168c148750
  230. rdn = {bv_len = 0, bv_val = 0x0}
  231. sup = {bv_len = 0, bv_val = 0x0}
  232. prdn = {bv_len = 0, bv_val = 0x0}
  233. nrdn = {bv_len = 0, bv_val = 0x0}
  234. psup = {bv_len = 0, bv_val = 0x0}
  235. nsup = {bv_len = 0, bv_val = 0x0}
  236. rc = 0
  237. deleteOldRdn = 0
  238. freeReqDn = 1
  239. do_graduate = 1
  240. #6 0x00007f2b8f528b2f in do_syncrep2 (op=0x7f1692ebb310, si=0x7f2b8fa031a0) at syncrepl.c:996
  241. match = <optimized out>
  242. syncUUID = {{bv_len = 16,
  243. bv_val = 0x7f168c148617 "^\221\217\300\264\227\020\062\233\225#\b"}, {bv_len = 0,
  244. bv_val = 0x7f2b8f32e010 "\220Y\250\217+\177"}}
  245. cookie = {bv_len = 60,
  246. bv_val = 0x7f168c148629 "rid=000,sid=001,csn=20130918101813.014217Z#000000#001#000000"}
  247. rctrls = 0x7f168c1485f0
  248. rctrlp = 0x1
  249. bdn = {bv_len = 44, bv_val = 0x7f168c148409 "reqStart=20130918101813.000000Z,cn=accesslog"}
  250. si_tag = 0
  251. entry = 0x7f2b8fdd6738
  252. punlock = 0
  253. syncstate = 1
  254. retdata = 0x7f1692ebb570
  255. retoid = 0x1 <Address 0x1 out of bounds>
  256. syncUUIDs = 0xfffff3de00000008
  257. len = 60
  258. berbuf = {
  259. buffer = "\002\000\001", '\000' <repeats 29 times>, "\020\206\024\214\026\177\000\000e\206\024\214\026\177\000\000e\206\024\214\026\177", '\000' <repeats 26 times>, "@\n\240\217+\177\000\000\333\027\250\214+\177\000\000\060\000\000\000\060\000\000\000\300\262\353\222\026\177\000\000\000\262\353\222\026\177\000\000\063\266\353\222\026\177\000\000\000\000\000\000\000\000\000\000\304\nC\216+\177\000\000\001\000\000\000\000\000\000\000\000\000\020\000\000\000\000\000\220\273\353\222\026\177\000\000\000\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000+\261Q\217+\177", '\000' <repeats 14 times>, "\001\000\000\000\300b?+\177\000\000\020\263\353\222\026\177\000\000\240\061\240\217+\177\000\000\065\206\201\367\226\314\301\206\200\264\353\222\026\177\000\000\000\000\000\000\000\000\000", ialign = 65538, lalign = 65538, falign = 9.18382988e-41,
  260. dalign = 3.2380074297143616e-319, palign = 0x10002 <Address 0x10002 out of bounds>}
  261. ber = 0x7f1692ebb180
  262. msg = 0x7f168c1485b0
  263. syncCookie = {ctxcsn = 0x7f168c148700, sids = 0x7f168c148730, numcsns = 1, rid = 0,
  264. octet_str = {bv_len = 60,
  265. bv_val = 0x7f168c148670 "rid=000,sid=001,csn=20130918101813.014217Z#000000#001#000000"}, sid = 1, sc_next = {stqe_next = 0x0}}
  266. syncCookie_req = {ctxcsn = 0x7f168c147eb0, sids = 0x7f168c147f70, numcsns = 2, rid = 1,
  267. octet_str = {bv_len = 0, bv_val = 0x0}, sid = 2, sc_next = {stqe_next = 0x0}}
  268. rc = 0
  269. err = 0
  270. modlist = 0x0
  271. m = -3106
  272. tout_p = 0x7f1692ebad10
  273. tout = {tv_sec = 0, tv_usec = 0}
  274. refreshDeletes = 0
  275. empty = "empty"
  276. #7 0x00007f2b8f52ca3d in do_syncrepl (ctx=<optimized out>, arg=0x7f2b8fa00a40) at syncrepl.c:1538
  277. si = 0x7f2b8fa031a0
  278. conn = {c_struct_state = SLAP_C_UNINITIALIZED, c_conn_state = SLAP_C_INVALID,
  279. c_conn_idx = -1, c_sd = 0, c_close_reason = 0x0, c_mutex = {__data = {__lock = 0,
  280. __count = 0, __owner = 0, __nusers = 0, __kind = 0, __spins = 0, __list = {
  281. __prev = 0x0, __next = 0x0}}, __size = '\000' <repeats 39 times>, __align = 0},
  282. c_sb = 0x0, c_starttime = 0, c_activitytime = 0, c_connid = 18446744073709551615,
  283. c_peer_domain = {bv_len = 0, bv_val = 0x7f2b8f6199c5 ""}, c_peer_name = {bv_len = 0,
  284. bv_val = 0x7f2b8f6199c5 ""}, c_listener = 0x7f2b8f862020, c_sasl_bind_mech = {
  285. bv_len = 0, bv_val = 0x0}, c_sasl_dn = {bv_len = 0, bv_val = 0x0}, c_sasl_authz_dn = {
  286. bv_len = 0, bv_val = 0x0}, c_authz_backend = 0x0, c_authz_cookie = 0x0, c_authz = {
  287. sai_method = 0, sai_mech = {bv_len = 0, bv_val = 0x0}, sai_dn = {bv_len = 0,
  288. bv_val = 0x0}, sai_ndn = {bv_len = 0, bv_val = 0x0}, sai_ssf = 0,
  289. sai_transport_ssf = 0, sai_tls_ssf = 0, sai_sasl_ssf = 0}, c_protocol = 0, c_ops = {
  290. stqh_first = 0x0, stqh_last = 0x0}, c_pending_ops = {stqh_first = 0x0,
  291. stqh_last = 0x0}, c_write1_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
  292. __nusers = 0, __kind = 0, __spins = 0, __list = {__prev = 0x0, __next = 0x0}},
  293. __size = '\000' <repeats 39 times>, __align = 0}, c_write1_cv = {__data = {__lock = 0,
  294. __futex = 0, __total_seq = 0, __wakeup_seq = 0, __woken_seq = 0, __mutex = 0x0,
  295. __nwaiters = 0, __broadcast_seq = 0}, __size = '\000' <repeats 47 times>,
  296. __align = 0}, c_write2_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
  297. __nusers = 0, __kind = 0, __spins = 0, __list = {__prev = 0x0, __next = 0x0}},
  298. __size = '\000' <repeats 39 times>, __align = 0}, c_write2_cv = {__data = {__lock = 0,
  299. __futex = 0, __total_seq = 0, __wakeup_seq = 0, __woken_seq = 0, __mutex = 0x0,
  300. __nwaiters = 0, __broadcast_seq = 0}, __size = '\000' <repeats 47 times>,
  301. __align = 0}, c_currentber = 0x0, c_writers = 0, c_writing = 0 '\000',
  302. c_sasl_bind_in_progress = 0 '\000', c_writewaiter = 0 '\000', c_is_udp = 0 '\000',
  303. c_is_tls = 0 '\000', c_needs_tls_accept = 0 '\000', c_sasl_layers = 0 '\000',
  304. c_sasl_done = 0 '\000', c_sasl_authctx = 0x0, c_sasl_sockctx = 0x0, c_sasl_extra = 0x0,
  305. c_sasl_bindop = 0x0, c_pagedresults_state = {ps_be = 0x0, ps_size = 0, ps_count = 0,
  306. ps_cookie = 0, ps_cookieval = {bv_len = 0, bv_val = 0x0}}, c_n_ops_received = 0,
  307. c_n_ops_executing = 0, c_n_ops_pending = 0, c_n_ops_completed = 0, c_n_get = 0,
  308. c_n_read = 0, c_n_write = 0, c_extensions = 0x0, c_clientfunc = 0, c_clientarg = 0x0,
  309. c_send_ldap_result = 0x7f2b8f4d1f70 <slap_send_ldap_result>,
  310. c_send_search_entry = 0x7f2b8f4d2e60 <slap_send_search_entry>,
  311. c_send_search_reference = 0x7f2b8f4d2620 <slap_send_search_reference>,
  312. c_send_ldap_extended = 0x7f2b8f4d19d0 <slap_send_ldap_extended>,
  313. c_send_ldap_intermediate = 0x7f2b8f4d1820 <slap_send_ldap_intermediate>}
  314. opbuf = {ob_op = {o_hdr = 0x7f1692ebb480, o_tag = 74, o_time = 1379499493, o_tincr = 2,
  315. o_bd = 0x7f1692eba1f0, o_req_dn = {bv_len = 148,
  316. bv_val = 0x7f168c148ea0 "cn=1363239294-18372,cn=1363261442-25467,cn=1335952855-39797,cn=hsia,cn=1242374917-14980,cn=1242374838-84024,cn=1241012570-41143,cn=companies,ou=root"},
  317. o_req_ndn = {bv_len = 148,
  318. bv_val = 0x7f168c148f40 "cn=1363239294-18372,cn=1363261442-25467,cn=1335952855-39797,cn=hsia,cn=1242374917-14980,cn=1242374838-84024,cn=1241012570-41143,cn=companies,ou=root"},
  319. o_request = {oq_add = {rs_modlist = 0x0, rs_e = 0x0}, oq_bind = {rb_method = 0,
  320. rb_cred = {bv_len = 0, bv_val = 0x0}, rb_edn = {bv_len = 0, bv_val = 0x0},
  321. rb_ssf = 0, rb_mech = {bv_len = 0, bv_val = 0x0}}, oq_compare = {rs_ava = 0x0},
  322. oq_modify = {rs_mods = {rs_modlist = 0x0, rs_no_opattrs = 0 '\000'},
  323. rs_increment = 0}, oq_modrdn = {rs_mods = {rs_modlist = 0x0,
  324. rs_no_opattrs = 0 '\000'}, rs_deleteoldrdn = 0, rs_newrdn = {bv_len = 0,
  325. bv_val = 0x0}, rs_nnewrdn = {bv_len = 0, bv_val = 0x0}, rs_newSup = 0x0,
  326. rs_nnewSup = 0x0}, oq_search = {rs_scope = 0, rs_deref = 0, rs_slimit = 0,
  327. rs_tlimit = 0, rs_limit = 0x0, rs_attrsonly = 0, rs_attrs = 0x0, rs_filter = 0x0,
  328. rs_filterstr = {bv_len = 0, bv_val = 0x0}}, oq_abandon = {rs_msgid = 0},
  329. oq_cancel = {rs_msgid = 0}, oq_extended = {rs_reqoid = {bv_len = 0, bv_val = 0x0},
  330. rs_flags = 0, rs_reqdata = 0x0}, oq_pwdexop = {rs_extended = {rs_reqoid = {
  331. bv_len = 0, bv_val = 0x0}, rs_flags = 0, rs_reqdata = 0x0}, rs_old = {
  332. bv_len = 0, bv_val = 0x0}, rs_new = {bv_len = 0, bv_val = 0x0}, rs_mods = 0x0,
  333. rs_modtail = 0x0}}, o_abandon = 0, o_cancel = 0, o_groups = 0x0,
  334. o_do_not_cache = 0 '\000', o_is_auth_check = 0 '\000', o_dont_replicate = 0 '\000',
  335. o_acl_priv = ACL_NONE, o_nocaching = 0 '\000', o_delete_glue_parent = 0 '\000',
  336. o_no_schema_check = 1 '\001', o_no_subordinate_glue = 0 '\000',
  337. o_ctrlflag = '\000' <repeats 16 times>, "\002", '\000' <repeats 14 times>,
  338. o_controls = 0x7f1692ebb5c8, o_authz = {sai_method = 0, sai_mech = {bv_len = 0,
  339. bv_val = 0x0}, sai_dn = {bv_len = 25,
  340. bv_val = 0x7f2b8fa00050 "cn=root,ou=admins,ou=root"}, sai_ndn = {bv_len = 25,
  341. bv_val = 0x7f2b8fa00080 "cn=root,ou=admins,ou=root"}, sai_ssf = 0,
  342. sai_transport_ssf = 0, sai_tls_ssf = 0, sai_sasl_ssf = 0}, o_ber = 0x0,
  343. o_res_ber = 0x0, o_callback = 0x7f1692eba1d0, o_ctrls = 0x0, o_csn = {bv_len = 40,
  344. bv_val = 0x7f2b8fdd6568 "20130918101813.014217Z#000000#001#000000"},
  345. o_private = 0x0, o_extra = {slh_first = 0x0}, o_next = {stqe_next = 0x0}}, ob_hdr = {
  346. oh_opid = 0, oh_connid = 1, oh_conn = 0x7f1692ebb6d0, oh_msgid = 0, oh_protocol = 0,
  347. oh_tid = 139734930933504, oh_threadctx = 0x7f1692ebbb90,
  348. oh_tmpmemctx = 0x7f2b8fdd62c0, oh_tmpmfuncs = 0x7f2b8f86ce20,
  349. oh_counters = 0x7f2b8f8c17a0,
  350. oh_log_prefix = "conn=-1 op=0", '\000' <repeats 243 times>}, ob_controls = {
  351. 0x0 <repeats 20 times>, 0x7f1692ebac10, 0x0 <repeats 11 times>}}
  352. rc = -1886970480
  353. dostop = <optimized out>
  354. s = <optimized out>
  355. i = <optimized out>
  356. defer = <optimized out>
  357. fail = <optimized out>
  358. freeinfo = <optimized out>
  359. be = 0x7f2b8f9fe800
  360. #8 0x00007f2b8f4c087b in connection_read_thread (ctx=0x7f1692ebbb90, argv=<optimized out>)
  361. at connection.c:1293
  362. s = 9
  363. #9 0x00007f2b8f012c48 in ldap_int_thread_pool_wrapper (xpool=<optimized out>) at tpool.c:688
  364. pool = 0x7f2b8f942830
  365. task = 0x7f2b919401b0
  366. work_list = <optimized out>
  367. ctx = {ltu_id = 139734930933504, ltu_key = {{ltk_key = 0x7f2b8f51af50,
  368. ltk_data = 0x7f2b8fdd62c0, ltk_free = 0x7f2b8f51af70 <slap_sl_mem_destroy>}, {
  369. ltk_key = 0x7f2b8fa85990, ltk_data = 0x7f2b8fed6570,
  370. ltk_free = 0x7f2b8f5c30a0 <mdb_reader_free>}, {ltk_key = 0x7f2b8fbb2500,
  371. ltk_data = 0x7f2b8fed7ed0, ltk_free = 0x7f2b8f5c30a0 <mdb_reader_free>}, {
  372. ltk_key = 0x7f2b8f4be790, ltk_data = 0x7f168c100a10,
  373. ltk_free = 0x7f2b8f4be860 <conn_counter_destroy>}, {ltk_key = 0x7f2b8f4d4dc0,
  374. ltk_data = 0x7f168c106d00, ltk_free = 0x7f2b8f4d4b90 <slap_op_q_destroy>}, {
  375. ltk_key = 0x7f2b8f5749d0, ltk_data = 0x7f1690cb9010,
  376. ltk_free = 0x7f2b8f574b10 <scope_chunk_free>}, {ltk_key = 0x7f2b8f574a60,
  377. ltk_data = 0x7f1681fff010, ltk_free = 0x7f2b8f574b40 <search_stack_free>}, {
  378. ltk_key = 0x0, ltk_data = 0x7f168c109070, ltk_free = 0}, {ltk_key = 0x0,
  379. ltk_data = 0x0, ltk_free = 0} <repeats 24 times>}}
  380. kctx = <optimized out>
  381. keyslot = 441
  382. hash = <optimized out>
  383. __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
  384. #10 0x00007f2b8e42d7b6 in start_thread () from /lib64/libpthread.so.0
  385. No symbol table info available.
  386. #11 0x00007f2b8ca6dc5d in clone () from /lib64/libc.so.6
  387. No symbol table info available.
  388. #12 0x0000000000000000 in ?? ()
  389. No symbol table info available.
  390.  
  391. -------------------------------------------------------------------------------------------
  392. PID: 8023
  393. -------------------------------------------------------------------------------------------
  394.  
  395. #0 0x00007f2b8e43161c in pthread_cond_wait@@GLIBC_2.3.2 () from /lib64/libpthread.so.0
  396. No symbol table info available.
  397. #1 0x00007f2b8f012ca5 in ldap_int_thread_pool_wrapper (xpool=<optimized out>) at tpool.c:675
  398. pool = 0x7f2b8f942830
  399. task = 0x0
  400. work_list = 0x2d88ac
  401. ctx = {ltu_id = 139734781257472, ltu_key = {{ltk_key = 0x7f2b8f51af50,
  402. ltk_data = 0x7f2b91263780, ltk_free = 0x7f2b8f51af70 <slap_sl_mem_destroy>}, {
  403. ltk_key = 0x7f2b8f4be790, ltk_data = 0x7f2b8ffe47e0,
  404. ltk_free = 0x7f2b8f4be860 <conn_counter_destroy>}, {ltk_key = 0x7f2b8f4d4dc0,
  405. ltk_data = 0x7f2b8ffe4420, ltk_free = 0x7f2b8f4d4b90 <slap_op_q_destroy>}, {
  406. ltk_key = 0x7f2b8fa85990, ltk_data = 0x7f2b9197e320,
  407. ltk_free = 0x7f2b8f5c30a0 <mdb_reader_free>}, {ltk_key = 0x7f2b8f5749d0,
  408. ltk_data = 0x7f2b8ffe83f0, ltk_free = 0x7f2b8f574b10 <scope_chunk_free>}, {
  409. ltk_key = 0x7f2b8f574a60, ltk_data = 0x7f167dffd010,
  410. ltk_free = 0x7f2b8f574b40 <search_stack_free>}, {ltk_key = 0x0, ltk_data = 0x0,
  411. ltk_free = 0} <repeats 26 times>}}
  412. kctx = <optimized out>
  413. keyslot = 292
  414. hash = <optimized out>
  415. __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
  416. #2 0x00007f2b8e42d7b6 in start_thread () from /lib64/libpthread.so.0
  417. No symbol table info available.
  418. #3 0x00007f2b8ca6dc5d in clone () from /lib64/libc.so.6
  419. No symbol table info available.
  420. #4 0x0000000000000000 in ?? ()
  421. No symbol table info available.
  422.  
  423.  
  424. --------------------------------------------------------------------------------------
  425. PID: 8024
  426. --------------------------------------------------------------------------------------
  427.  
  428. #0 0x00007f2b8e43161c in pthread_cond_wait@@GLIBC_2.3.2 () from /lib64/libpthread.so.0
  429. No symbol table info available.
  430. #1 0x00007f2b8f012ca5 in ldap_int_thread_pool_wrapper (xpool=<optimized out>) at tpool.c:675
  431. pool = 0x7f2b8f942830
  432. task = 0x0
  433. work_list = 0x2d88ac
  434. ctx = {ltu_id = 139734579922688, ltu_key = {{ltk_key = 0x7f2b8f51af50,
  435. ltk_data = 0x7f2b919806f0, ltk_free = 0x7f2b8f51af70 <slap_sl_mem_destroy>}, {
  436. ltk_key = 0x7f2b8f4be790, ltk_data = 0x7f2b9196b700,
  437. ltk_free = 0x7f2b8f4be860 <conn_counter_destroy>}, {ltk_key = 0x7f2b8fa85990,
  438. ltk_data = 0x7f2b9196c590, ltk_free = 0x7f2b8f5c30a0 <mdb_reader_free>}, {
  439. ltk_key = 0x7f2b8f5749d0, ltk_data = 0x7f2b905e8400,
  440. ltk_free = 0x7f2b8f574b10 <scope_chunk_free>}, {ltk_key = 0x7f2b8f574a60,
  441. ltk_data = 0x7f1675fff010, ltk_free = 0x7f2b8f574b40 <search_stack_free>}, {
  442. ltk_key = 0x7f2b8f4d4dc0, ltk_data = 0x7f2b9196b340,
  443. ltk_free = 0x7f2b8f4d4b90 <slap_op_q_destroy>}, {ltk_key = 0x0, ltk_data = 0x0,
  444. ltk_free = 0} <repeats 26 times>}}
  445. kctx = <optimized out>
  446. keyslot = 888
  447. hash = <optimized out>
  448. __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
  449. #2 0x00007f2b8e42d7b6 in start_thread () from /lib64/libpthread.so.0
  450. No symbol table info available.
  451. #3 0x00007f2b8ca6dc5d in clone () from /lib64/libc.so.6
  452. No symbol table info available.
  453. #4 0x0000000000000000 in ?? ()
  454. No symbol table info available.
  455. (gdb)
Add Comment
Please, Sign In to add comment