Advertisement
Guest User

Untitled

a guest
May 23rd, 2013
124
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 25.68 KB | None | 0 0
  1. (gdb) thread apply all bt full
  2.  
  3. Thread 6 (Thread 0x7f8a8fb97700 (LWP 21808)):
  4. #0 0x000000393f0f1c73 in epoll_wait () from /lib64/libc.so.6
  5. No symbol table info available.
  6. #1 0x000000000042631f in slapd_daemon_task (ptr=0x23c43e0) at daemon.c:2536
  7. ns = 1
  8. at = 0
  9. nfds = 8
  10. revents = 0x21ffb20
  11. tvp = 0x7f8a8fb96d90
  12. cat = {tv_sec = 1369300590, tv_usec = 0}
  13. i = 1
  14. nwriters = 0
  15. now = 1369299856
  16. tv = {tv_sec = 734, tv_usec = 0}
  17. tdelta = 1
  18. rtask = 0x2252bf0
  19. l = 2
  20. last_idle_check = 1369299690
  21. ebadf = 0
  22. tid = 0
  23. #2 0x000000393f807d14 in start_thread () from /lib64/libpthread.so.0
  24. No symbol table info available.
  25. #3 0x000000393f0f168d in clone () from /lib64/libc.so.6
  26. No symbol table info available.
  27.  
  28. Thread 5 (Thread 0x7f8a8f396700 (LWP 21809)):
  29. #0 0x000000393f80b595 in pthread_cond_wait@@GLIBC_2.3.2 () from /lib64/libpthread.so.0
  30. No symbol table info available.
  31. #1 0x000000000058047a in ldap_pvt_thread_cond_wait (cond=0x2220500, mutex=0x22204d8) at thr_posix.c:277
  32. No locals.
  33. #2 0x000000000057ee89 in ldap_int_thread_pool_wrapper (xpool=0x22204d0) at tpool.c:675
  34. pool = 0x22204d0
  35. task = 0x0
  36. work_list = 0x2220568
  37. ctx = {ltu_id = 140233085118208, ltu_key = {{ltk_key = 0x42a10c, ltk_data = 0x7f8a800026c0, ltk_free = 0x429f5e <conn_counter_destroy>}, {
  38. ltk_key = 0x49b81b, ltk_data = 0x7f8a800027d0, ltk_free = 0x49b640 <slap_sl_mem_destroy>}, {ltk_key = 0x444bf5,
  39. ltk_data = 0x7f8a800028d0, ltk_free = 0x444b48 <slap_op_q_destroy>}, {ltk_key = 0x22f1710, ltk_data = 0x7f8a80102d60,
  40. ltk_free = 0x51d321 <bdb_reader_free>}, {ltk_key = 0x4d31a4, ltk_data = 0x7f8a8db95010, ltk_free = 0x4d3181 <search_stack_free>}, {
  41. ltk_key = 0x0, ltk_data = 0x0, ltk_free = 0} <repeats 27 times>}}
  42. kctx = 0x0
  43. i = 32
  44. keyslot = 152
  45. ---Type <return> to continue, or q <return> to quit---
  46. hash = 4063648920
  47. __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
  48. #3 0x000000393f807d14 in start_thread () from /lib64/libpthread.so.0
  49. No symbol table info available.
  50. #4 0x000000393f0f168d in clone () from /lib64/libc.so.6
  51. No symbol table info available.
  52.  
  53. Thread 4 (Thread 0x7f8a8db94700 (LWP 21839)):
  54. #0 0x000000393f80b595 in pthread_cond_wait@@GLIBC_2.3.2 () from /lib64/libpthread.so.0
  55. No symbol table info available.
  56. #1 0x00007f8aae6e7273 in __db_pthread_mutex_lock () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  57. No symbol table info available.
  58. #2 0x00007f8aae793b62 in __lock_get_internal () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  59. No symbol table info available.
  60. #3 0x00007f8aae79410b in __lock_get () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  61. No symbol table info available.
  62. #4 0x00007f8aae7bffaa in __db_lget () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  63. No symbol table info available.
  64. #5 0x00007f8aae7062b7 in __bam_search () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  65. No symbol table info available.
  66. #6 0x00007f8aae6f0611 in __bamc_search () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  67. No symbol table info available.
  68. #7 0x00007f8aae6f2677 in __bamc_get () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  69. No symbol table info available.
  70. #8 0x00007f8aae7ac8e1 in __dbc_iget () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  71. No symbol table info available.
  72. #9 0x00007f8aae7bb71c in __dbc_get_pp () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  73. No symbol table info available.
  74. #10 0x000000000052a0c2 in bdb_idl_fetch_key (be=0x22513e0, db=0x22f4580, txn=0x7f8a84100f30, key=0x7f8a8da12570, ids=0x7f8a8da92880,
  75. saved_cursor=0x0, get_flag=0) at idl.c:603
  76. bdb = 0x2251580
  77. rc = 0
  78. data = {data = 0x7f8a8d992450, size = 0, ulen = 524288, dlen = 0, doff = 0, app_data = 0x0, flags = 2048}
  79. key2 = {data = 0x7f8a8da12880, size = 2376673408, ulen = 32650, dlen = 2215644976, doff = 32650, app_data = 0x7f8a8da12830,
  80. flags = 2377726512}
  81. kptr = 0x7f8a8da12570
  82. cursor = 0x7f8a80105530
  83. i = 0x7f8a840013a9
  84. ptr = 0x5d9dc4
  85. len = 28
  86. rc2 = 57
  87. flags = 2048
  88. opflag = 26
  89. ---Type <return> to continue, or q <return> to quit---
  90. buf = {57544049141219328, 65544, 281509349650434, 56418149234376704, 65544, 281509349388290, 54447824397402112, 65544, 281509348929538,
  91. 52758974537138176, 65544, 281509348536322, 51351599653584896, 65544, 281509348208642, 49662749793320960, 65544, 281509347815426,
  92. 47973899933057024, 65544, 281509347422210, 46285050072793088, 65544, 281509347028994, 44596200212529152, 65544, 281509346766850,
  93. 42907350352265216, 65544, 281509346373634, 41781450445422592, 65544, 281509346111490, 40092600585158656, 65544, 281509345587202,
  94. 38685225701605376, 65544, 281509345193986, 36714900864630784, 65544, 281509344800770, 35026051004366848, 65544, 281509344342018,
  95. 33055726167392256, 65544, 281509344079874, 32492776213970944, 65544, 281509343686658, 29959501423575040, 65544, 281509343293442,
  96. 29115076493443072, 65544, 281509343031298, 27426226633179136, 65544, 281509342769154, 25737376772915200, 65544, 281509342375938,
  97. 24611476866072576, 65544, 281509341982722, 22922627005808640, 65544, 281509341589506, 21515252122255360, 65544, 281509341261826,
  98. 20389352215412736, 65544, 281509341130754, 18981977331859456, 65544, 281509340672002, 17574602448306176, 65544, 281509340213250,
  99. 15885752588042240, 65544, 281509339951106, 14196902727778304, 65544, 281509339557890, 12508052867514368, 65544, 281509339164674,
  100. 10256253053829120, 65544, 281509338771458, 8004453240143872, 65544, 281509338116098, 6315603379879936, 65544, 281509337657346,
  101. 4345278542905344, 65544, 281509337264130, 2656428682641408, 65544, 281509336870914, 967578822377472, 65544, 281509336543234,
  102. 71616698465124352, 65544, 281509352926978, 69927848604860416, 65544, 281509352533762, 68238998744596480, 65544, 281509352271618,
  103. 67113098837753856, 65544, 281509351878402, 64861299024068608, 65544, 281509351354114, 63735399117225984, 65544, 281509351223042,
  104. 62609499210383360, 65544, 281509350829826, 60920649350119424, 65544, 281509350436610, 59231799489855488, 65544, 281509350043394,
  105. 57542949629591552, 65544, 281509349650178, 55854099769327616, 65544, 281509349256962, 54165249909063680, 65544, 281509348863746,
  106. 52757875025510400, 65544, 281509348470530, 50787550188535808, 65544, 281509348077314, 49098700328271872, 65544, 281509347815170,
  107. 48535750374850560, 65544, 281509347290882, 45721000607744000, 65544, 281509346897666, 44595100700901376, 65544, 281509346635522,
  108. 42906250840637440, 65544, 281509346307842, 41498875957084160, 65544, 281509345914626, 39810026096820224, 65544, 281509345521410,
  109. 38121176236556288, 65544, 281509345259266, 36995276329713664, 65544, 281509344866050, 34743476516028416, 65544, 281509344472834,
  110. 33617576609185792, 65544, 281509343948546, 31365776795500544, 65544, 281509343555330, 30239876888657920, 65544, 281509343162114,
  111. 27988077074972672, 65544, 281509342899970, 26299227214708736, 65544, 281509342375682, 24610377354444800, 65544, 281509341982466,
  112. 22921527494180864, 65544...}
  113. keybuf = "\b\000\001\000\000\000\000\000\002p\317\000\b\000\001"
  114. __PRETTY_FUNCTION__ = "bdb_idl_fetch_key"
  115. #11 0x0000000000524278 in bdb_dn2idl (op=0x7f8a84000950, txn=0x7f8a84100f30, ndn=0x7f8a8da12848, ei=0x7f8a80103450, ids=0x7f8a8da92880,
  116. stack=0x7f8a7efff010) at dn2id.c:376
  117. rc = -2080372400
  118. key = {data = 0x7f8a840013a8, size = 28, ulen = 28, dlen = 0, doff = 0, app_data = 0x0, flags = 2056}
  119. bdb = 0x2251580
  120. db = 0x22f4580
  121. prefix = 37
  122. #12 0x00000000004d36bb in search_candidates (op=0x7f8a84000950, rs=0x7f8a8db93a30, e=0x7f8a8da12830, txn=0x7f8a84100f30, ids=0x7f8a8da92880,
  123. scopes=0x7f8a8da12880) at search.c:1257
  124. bdb = 0x2251580
  125. rc = 0
  126. depth = 4
  127. f = {f_choice = 160, f_un = {f_un_result = -1918818688, f_un_desc = 0x7f8a8da12680, f_un_ava = 0x7f8a8da12680, f_un_ssa = 0x7f8a8da12680,
  128. f_un_mra = 0x7f8a8da12680, f_un_complex = 0x7f8a8da12680}, f_next = 0x0}
  129. rf = {f_choice = 163, f_un = {f_un_result = -1918818720, f_un_desc = 0x7f8a8da12660, f_un_ava = 0x7f8a8da12660, f_un_ssa = 0x7f8a8da12660,
  130. f_un_mra = 0x7f8a8da12660, f_un_complex = 0x7f8a8da12660}, f_next = 0x7f8a840012f8}
  131. xf = {f_choice = 161, f_un = {f_un_result = -1918818624, f_un_desc = 0x7f8a8da126c0, f_un_ava = 0x7f8a8da126c0, f_un_ssa = 0x7f8a8da126c0,
  132. f_un_mra = 0x7f8a8da126c0, f_un_complex = 0x7f8a8da126c0}, f_next = 0x0}
  133. ---Type <return> to continue, or q <return> to quit---
  134. nf = {f_choice = 0, f_un = {f_un_result = 0, f_un_desc = 0x7f8a00000000, f_un_ava = 0x7f8a00000000, f_un_ssa = 0x7f8a00000000,
  135. f_un_mra = 0x7f8a00000000, f_un_complex = 0x7f8a00000000}, f_next = 0x7f8a8da126a0}
  136. stack = 0x7f8a7efff010
  137. aa_ref = {aa_desc = 0x220dcb0, aa_value = {bv_len = 8, bv_val = 0x5d9fb1 "referral"}}
  138. sf = {f_choice = 140233059944192, f_un = {f_un_result = -1367792893, f_un_desc = 0x7f8aae792303, f_un_ava = 0x7f8aae792303,
  139. f_un_ssa = 0x7f8aae792303, f_un_mra = 0x7f8aae792303, f_un_complex = 0x7f8aae792303}, f_next = 0x0}
  140. aa_subentry = {aa_desc = 0x0, aa_value = {bv_len = 0, bv_val = 0x0}}
  141. #13 0x00000000004d1985 in bdb_search (op=0x7f8a84000950, rs=0x7f8a8db93a30) at search.c:616
  142. bdb = 0x2251580
  143. id = 140232896809296
  144. cursor = 140233059936576
  145. lastid = 18446744073709551615
  146. candidates = {0, 0, 0, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36,
  147. 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70,
  148. 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87, 88, 89, 90, 91, 92, 93, 94, 95, 96, 97, 98, 99, 100, 101, 102, 103,
  149. 104, 105, 106, 107, 108, 109, 110, 111, 112, 113, 114, 115, 116, 117, 118, 119, 120, 121, 122, 123, 124, 125, 126, 127, 128, 129, 130,
  150. 131, 132, 133, 134, 135, 136, 137, 138, 139, 140, 141, 142, 143, 144, 145, 146, 147, 148, 149, 150, 151, 152, 153, 154, 155, 156, 157,
  151. 158, 159, 160, 161, 162, 163, 164, 165, 166, 167, 168, 169, 170, 171, 172, 173, 174, 175, 176, 177, 178, 179, 180, 181, 182, 183, 184,
  152. 185, 186, 187, 188, 189, 190, 191, 192, 193, 194, 195, 196, 197, 198, 199, 200, 201, 202, 203...}
  153. scopes = {0 <repeats 65536 times>}
  154. e = 0x0
  155. base = {e_id = 2, e_name = {bv_len = 0, bv_val = 0x0}, e_nname = {bv_len = 26, bv_val = 0x7f8a84102280 "ou=users,dc=codenvy,dc=com"},
  156. e_attrs = 0x0, e_ocflags = 0, e_bv = {bv_len = 0, bv_val = 0x0}, e_private = 0x7f8a80103450}
  157. e_root = 0x22f59f8
  158. matched = 0x0
  159. ei = 0x7f8a80103450
  160. attrs = 0x0
  161. realbase = {bv_len = 26, bv_val = 0x7f8a84102280 "ou=users,dc=codenvy,dc=com"}
  162. mask = 5119
  163. stoptime = 1369299855
  164. manageDSAit = 0
  165. tentries = 0
  166. nentries = 0
  167. idflag = 0
  168. lock = {off = 0, ndx = 1365, gen = 72, mode = DB_LOCK_READ}
  169. opinfo = 0x0
  170. ltid = 0x7f8a84100f30
  171. oex = 0x0
  172. #14 0x000000000042e056 in fe_op_search (op=0x7f8a84000950, rs=0x7f8a8db93a30) at search.c:402
  173. bd = 0x848de0
  174. #15 0x000000000042d8a6 in do_search (op=0x7f8a84000950, rs=0x7f8a8db93a30) at search.c:247
  175. base = {bv_len = 26, bv_val = 0x7f8a84101fa7 "ou=users,dc=codenvy,dc=com"}
  176. siz = 0
  177. ---Type <return> to continue, or q <return> to quit---
  178. off = 0
  179. i = 0
  180. #16 0x000000000042a5b5 in connection_operation (ctx=0x7f8a8db93b60, arg_v=0x7f8a84000950) at connection.c:1155
  181. rc = 80
  182. cancel = 32650
  183. op = 0x7f8a84000950
  184. rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0, sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un = {
  185. sru_search = {r_entry = 0x0, r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0, r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {
  186. r_sasldata = 0x0}, sru_extended = {r_rspoid = 0x0, r_rspdata = 0x0}}, sr_flags = 0}
  187. tag = 99
  188. opidx = SLAP_OP_SEARCH
  189. conn = 0x7f8aad5a2210
  190. memctx = 0x7f8a84000ee0
  191. memctx_null = 0x0
  192. memsiz = 1048576
  193. __PRETTY_FUNCTION__ = "connection_operation"
  194. #17 0x000000000042ab4a in connection_read_thread (ctx=0x7f8a8db93b60, argv=0x18) at connection.c:1291
  195. rc = 0
  196. cri = {op = 0x7f8a84000950, func = 0, arg = 0x0, ctx = 0x7f8a8db93b60, nullop = 0}
  197. s = 24
  198. #18 0x000000000057ef30 in ldap_int_thread_pool_wrapper (xpool=0x22204d0) at tpool.c:688
  199. pool = 0x22204d0
  200. task = 0x7f8a88000a20
  201. work_list = 0x2220568
  202. ctx = {ltu_id = 140233059944192, ltu_key = {{ltk_key = 0x42a10c, ltk_data = 0x7f8a84000dd0, ltk_free = 0x429f5e <conn_counter_destroy>}, {
  203. ltk_key = 0x49b81b, ltk_data = 0x7f8a84000ee0, ltk_free = 0x49b640 <slap_sl_mem_destroy>}, {ltk_key = 0x22f1710,
  204. ltk_data = 0x7f8a84100f30, ltk_free = 0x51d321 <bdb_reader_free>}, {ltk_key = 0x4d31a4, ltk_data = 0x7f8a7efff010,
  205. ltk_free = 0x4d3181 <search_stack_free>}, {ltk_key = 0x444bf5, ltk_data = 0x0, ltk_free = 0x444b48 <slap_op_q_destroy>}, {
  206. ltk_key = 0x0, ltk_data = 0x0, ltk_free = 0} <repeats 27 times>}}
  207. kctx = 0x0
  208. i = 32
  209. keyslot = 630
  210. hash = 674505334
  211. __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
  212. #19 0x000000393f807d14 in start_thread () from /lib64/libpthread.so.0
  213. No symbol table info available.
  214. #20 0x000000393f0f168d in clone () from /lib64/libc.so.6
  215. No symbol table info available.
  216.  
  217. Thread 3 (Thread 0x7f8a8d393700 (LWP 21840)):
  218. #0 0x000000393f80b595 in pthread_cond_wait@@GLIBC_2.3.2 () from /lib64/libpthread.so.0
  219. No symbol table info available.
  220. #1 0x00007f8aae6e7273 in __db_pthread_mutex_lock () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  221. ---Type <return> to continue, or q <return> to quit---
  222. No symbol table info available.
  223. #2 0x00007f8aae793b62 in __lock_get_internal () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  224. No symbol table info available.
  225. #3 0x00007f8aae79410b in __lock_get () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  226. No symbol table info available.
  227. #4 0x00007f8aae7bffaa in __db_lget () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  228. No symbol table info available.
  229. #5 0x00007f8aae7062b7 in __bam_search () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  230. No symbol table info available.
  231. #6 0x00007f8aae6f0611 in __bamc_search () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  232. No symbol table info available.
  233. #7 0x00007f8aae6f2677 in __bamc_get () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  234. No symbol table info available.
  235. #8 0x00007f8aae7ac8e1 in __dbc_iget () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  236. No symbol table info available.
  237. #9 0x00007f8aae7bb71c in __dbc_get_pp () from /usr/local/BerkeleyDB.5.3/lib/libdb-5.3.so
  238. No symbol table info available.
  239. #10 0x000000000052a99c in bdb_idl_insert_key (be=0x22513e0, db=0x22f4580, tid=0x7f8a701035a0, key=0x7f8a8d392380, id=165609) at idl.c:733
  240. bdb = 0x2251580
  241. rc = 0
  242. data = {data = 0x7f8a8d392110, size = 8, ulen = 8, dlen = 0, doff = 0, app_data = 0x0, flags = 2048}
  243. cursor = 0x22f4f50
  244. lo = 140232830758592
  245. hi = 140230682214400
  246. nlo = 140233588837048
  247. nhi = 1
  248. nid = 16827139256739692544
  249. err = 0x393ea20000 "\250\022\242>9"
  250. __PRETTY_FUNCTION__ = "bdb_idl_insert_key"
  251. #11 0x0000000000523157 in bdb_dn2id_add (op=0x7f8a70000960, txn=0x7f8a701035a0, eip=0x7f8a80103450, e=0x22f6da8) at dn2id.c:99
  252. bdb = 0x2251580
  253. db = 0x22f4580
  254. rc = 0
  255. key = {data = 0x7f8a70001358, size = 28, ulen = 28, dlen = 0, doff = 0, app_data = 0x0, flags = 2056}
  256. data = {data = 0x7f8a8d392348, size = 8, ulen = 0, dlen = 0, doff = 0, app_data = 0x0, flags = 0}
  257. nid = 16827139256739692544
  258. buf = 0x7f8a70001340 "@ou=useryerhska9tsb2sopy%ou=users,dc=codenvy,dc=com"
  259. ptr = {bv_len = 26, bv_val = 0x7f8a70001359 "ou=users,dc=codenvy,dc=com"}
  260. pdn = {bv_len = 26, bv_val = 0x7f8a70001359 "ou=users,dc=codenvy,dc=com"}
  261. __PRETTY_FUNCTION__ = "bdb_dn2id_add"
  262. #12 0x00000000005188df in bdb_add (op=0x7f8a70000960, rs=0x7f8a8d392a30) at add.c:385
  263. bdb = 0x2251580
  264. pdn = {bv_len = 26, bv_val = 0x7f8a70102788 "ou=users,dc=codenvy,dc=com"}
  265. ---Type <return> to continue, or q <return> to quit---
  266. p = 0x0
  267. oe = 0x22f6da8
  268. ei = 0x7f8a80103450
  269. textbuf = "\360%9\215\212\177\000\000\000\000\000\000\000\000\000\000@\037/\002", '\000' <repeats 12 times>"\260, $/\002\000\000\000\000 &9\215\212\177\000\000\000\067\071\215\212\177\000\000\003#y\256\212\177", '\000' <repeats 26 times>, "@\037/\002\000\000\000\000 &9\215\212\177", '\000' <repeats 12 times>"\242, >9\000\000\000\277$y\256\212\177", '\000' <repeats 18 times>"\320, \n\000p\212\177\000\000\300%9\215\212\177\000\000\000\000\000\000\000\000\000\000s\255Q\000\000\000\000\000 &9\215\212\177\000\000\200\025%\002\000\000\000\000\000&9\215\212\177\000\000X+R\000\000\000\000\000\000&9\215\212\177\000\000+\256Q\000\000\000\000\000 &9\215\212\177\000\000\230\t\000p\000\000\000\000Xm/\002\000\000\000\000\200\025%\002\000\000\000"
  270. textlen = 256
  271. children = 0x221bbd0
  272. entry = 0x221b930
  273. ltid = 0x7f8a70103440
  274. lt2 = 0x7f8a701035a0
  275. eid = 165609
  276. opinfo = {boi_oe = {oe_next = {sle_next = 0x7f8a8d392830}, oe_key = 0x2251580}, boi_txn = 0x7f8a70103440, boi_locks = 0x0, boi_err = 0,
  277. boi_acl_cache = 0 '\000', boi_flag = 0 '\000'}
  278. subentry = 0
  279. lock = {off = 2355152, ndx = 1365, gen = 116, mode = DB_LOCK_READ}
  280. num_retries = 0
  281. success = 1879050592
  282. postread_ctrl = 0x0
  283. ctrls = {0x0, 0x7f8aad3c9da0, 0x7f8aad4031b8, 0x7f8aae791dee, 0x7f8aac2f3470, 0x7f8aad3c45b0}
  284. num_ctrls = 0
  285. #13 0x0000000000433c7e in fe_op_add (op=0x7f8a70000960, rs=0x7f8a8d392a30) at add.c:334
  286. update = 0
  287. repl_user = 0
  288. modtail = 0x7f8a701031b0
  289. rc = 0
  290. op_be = 0x22513e0
  291. bd = 0x848de0
  292. textbuf = "&\000\000\000\000\000\000\000\300\061\020p\212\177\000\000&\000\000\000\000\000\000\000\300\061\020p\212\177\000\000\320/\020p\212\177\000\000\240\274\037\002\001\000\000\000&", '\000' <repeats 15 times>, "p'9\215\212\177\000\000v\vE", '\000' <repeats 13 times>"\260, '\020p\212\177\000\000\320/\020p\212\177\000\000\260\356 \002\000\000\000\000\060b\020\200\212\177\000\000\002\000\000\000\000\000\000\000@.\020p\212\177\000\000\320\n\000p\212\177", '\000' <repeats 18 times>, "&\000\000\000\000\000\000\000\001\005X", '\000' <repeats 13 times>"\200, \202\204\000\000\000\000\000\240'9\215\212\177\000\000_\\C", '\000' <repeats 13 times>, "0b\020\200\212\177\000\000\060b\020\200\212\177\000\000\360ٹ\217\212\177\000\000\000(9\215\212\177\000\000\267BC\000\000\000\000"
  293. textlen = 256
  294. __PRETTY_FUNCTION__ = "fe_op_add"
  295. #14 0x000000000043359e in do_add (op=0x7f8a70000960, rs=0x7f8a8d392a30) at add.c:194
  296. ber = 0x7f8a781079f0
  297. last = 0x7f8a70102747 ""
  298. dn = {bv_len = 50, bv_val = 0x7f8a701025ca "ou=useryerhska9tsb2sopy,ou=users,dc=codenvy,dc=com"}
  299. ---Type <return> to continue, or q <return> to quit---
  300. len = 63
  301. tag = 18446744073709551615
  302. modlist = 0x7f8a70103310
  303. modtail = 0x7f8a701031b0
  304. tmp = {sml_mod = {sm_desc = 0x49b81b, sm_values = 0x7f8a70102fd0, sm_nvalues = 0x0, sm_numvals = 1880111456, sm_op = 1, sm_flags = 0,
  305. sm_type = {bv_len = 19, bv_val = 0x7f8a7010270a "cloudIdeMemberships"}}, sml_next = 0x7f8a8d3929c0}
  306. textbuf = "\000\000\020\200\212\177\000\000\000\000\000\000\000\000\000\000\032\000\000\000\000\000\000\000\340\022\000p\212\177\000\000\345\206\002", '\000' <repeats 13 times>, "0\271!\002\000\000\000\000\271\340\200?9", '\000' <repeats 11 times>"\341, P[\000\000\000\000\000\001\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\257\070\020p\212\177\000\000 \266\020\200\212\177\000\000\200)9\215\212\177\000\000bZ[\000\000\000\000\000\002\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\257\070\020p\212\177\000\000\360b\020\200\212\177", '\000' <repeats 26 times>, " *9\215\212\177", '\000' <repeats 12 times>"\242, >9\000\000\000\000\067\071\215\212\177\000\000\022\t\005?9\000\000\000\300\016\000p\212\177", '\000' <repeats 18 times>"\240, )9\215\212\177\000"
  307. textlen = 256
  308. rc = 0
  309. freevals = 0
  310. oex = {oe = {oe_next = {sle_next = 0x0}, oe_key = 0x432944}, oe_db = 0x0}
  311. #15 0x000000000042a5b5 in connection_operation (ctx=0x7f8a8d392b60, arg_v=0x7f8a70000960) at connection.c:1155
  312. rc = 80
  313. cancel = 32650
  314. op = 0x7f8a70000960
  315. rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0, sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un = {
  316. sru_search = {r_entry = 0x0, r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0, r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {
  317. r_sasldata = 0x0}, sru_extended = {r_rspoid = 0x0, r_rspdata = 0x0}}, sr_flags = 0}
  318. tag = 104
  319. opidx = SLAP_OP_ADD
  320. conn = 0x7f8aad5a1f50
  321. memctx = 0x7f8a70000ec0
  322. memctx_null = 0x0
  323. memsiz = 1048576
  324. __PRETTY_FUNCTION__ = "connection_operation"
  325. #16 0x000000000042ab4a in connection_read_thread (ctx=0x7f8a8d392b60, argv=0x17) at connection.c:1291
  326. rc = 0
  327. cri = {op = 0x7f8a70000960, func = 0, arg = 0x0, ctx = 0x7f8a8d392b60, nullop = 0}
  328. s = 23
  329. #17 0x000000000057ef30 in ldap_int_thread_pool_wrapper (xpool=0x22204d0) at tpool.c:688
  330. pool = 0x22204d0
  331. task = 0x7f8a880008c0
  332. work_list = 0x2220568
  333. ctx = {ltu_id = 140233051551488, ltu_key = {{ltk_key = 0x42a10c, ltk_data = 0x7f8a70000db0, ltk_free = 0x429f5e <conn_counter_destroy>}, {
  334. ltk_key = 0x49b81b, ltk_data = 0x7f8a70000ec0, ltk_free = 0x49b640 <slap_sl_mem_destroy>}, {ltk_key = 0x444bf5, ltk_data = 0x0,
  335. ltk_free = 0x444b48 <slap_op_q_destroy>}, {ltk_key = 0x22f1710, ltk_data = 0x7f8a70101020, ltk_free = 0x51d321 <bdb_reader_free>}, {
  336. ltk_key = 0x4d31a4, ltk_data = 0x7f8a7cffd010, ltk_free = 0x4d3181 <search_stack_free>}, {ltk_key = 0x0, ltk_data = 0x0,
  337. ltk_free = 0} <repeats 27 times>}}
  338. ---Type <return> to continue, or q <return> to quit---
  339. kctx = 0x0
  340. i = 32
  341. keyslot = 742
  342. hash = 2200217318
  343. __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
  344. #18 0x000000393f807d14 in start_thread () from /lib64/libpthread.so.0
  345. No symbol table info available.
  346. #19 0x000000393f0f168d in clone () from /lib64/libc.so.6
  347. No symbol table info available.
  348.  
  349. Thread 2 (Thread 0x7f8a8cb92700 (LWP 21841)):
  350. #0 0x000000393f80b595 in pthread_cond_wait@@GLIBC_2.3.2 () from /lib64/libpthread.so.0
  351. No symbol table info available.
  352. #1 0x000000000058047a in ldap_pvt_thread_cond_wait (cond=0x2220500, mutex=0x22204d8) at thr_posix.c:277
  353. No locals.
  354. #2 0x000000000057ee89 in ldap_int_thread_pool_wrapper (xpool=0x22204d0) at tpool.c:675
  355. pool = 0x22204d0
  356. task = 0x0
  357. work_list = 0x2220568
  358. ctx = {ltu_id = 140233043158784, ltu_key = {{ltk_key = 0x42a10c, ltk_data = 0x7f8a780026c0, ltk_free = 0x429f5e <conn_counter_destroy>}, {
  359. ltk_key = 0x49b81b, ltk_data = 0x7f8a780027d0, ltk_free = 0x49b640 <slap_sl_mem_destroy>}, {ltk_key = 0x444bf5,
  360. ltk_data = 0x7f8a780028d0, ltk_free = 0x444b48 <slap_op_q_destroy>}, {ltk_key = 0x22f1710, ltk_data = 0x7f8a78102d60,
  361. ltk_free = 0x51d321 <bdb_reader_free>}, {ltk_key = 0x4d31a4, ltk_data = 0x7f8a7dffe010, ltk_free = 0x4d3181 <search_stack_free>}, {
  362. ltk_key = 0x0, ltk_data = 0x0, ltk_free = 0} <repeats 27 times>}}
  363. kctx = 0x0
  364. i = 32
  365. keyslot = 533
  366. hash = 2296087061
  367. __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
  368. #3 0x000000393f807d14 in start_thread () from /lib64/libpthread.so.0
  369. No symbol table info available.
  370. #4 0x000000393f0f168d in clone () from /lib64/libc.so.6
  371. No symbol table info available.
  372.  
  373. Thread 1 (Thread 0x7f8aae68c740 (LWP 21807)):
  374. #0 0x000000393f808e60 in pthread_join () from /lib64/libpthread.so.0
  375. No symbol table info available.
  376. #1 0x00000000005803bb in ldap_pvt_thread_join (thread=140233093510912, thread_return=0x0) at thr_posix.c:197
  377. No locals.
  378. #2 0x00000000004274fc in slapd_daemon () at daemon.c:2929
  379. i = 0
  380. rc = 0
  381. #3 0x0000000000406817 in main (argc=1, argv=0x7fffb306e848) at main.c:1012
  382. ---Type <return> to continue, or q <return> to quit---
  383. i = -1
  384. no_detach = 0
  385. rc = 0
  386. urls = 0x0
  387. username = 0x0
  388. groupname = 0x0
  389. sandbox = 0x0
  390. syslogUser = 160
  391. pid = 0
  392. waitfds = {10, 11}
  393. g_argc = 1
  394. g_argv = 0x7fffb306e848
  395. configfile = 0x0
  396. configdir = 0x0
  397. serverName = 0x7fffb3070b7d "slapd"
  398. serverMode = 1
  399. scp = 0x0
  400. scp_entry = 0x0
  401. debug_unknowns = 0x0
  402. syslog_unknowns = 0x0
  403. serverNamePrefix = 0x5b61b8 ""
  404. l = 4203680
  405. slapd_pid_file_unlink = 0
  406. slapd_args_file_unlink = 0
  407. firstopt = 1
  408. __PRETTY_FUNCTION__ = "main"
  409. (gdb)
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement