Univention Bugzilla – Attachment 10231 Details for
Bug 49780
slapd: Bus error
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Requests
|
Help
|
New Account
|
Log In
[x]
|
Forgot Password
Login:
[x]
bt full log
bt-full.log (text/x-log), 13.16 KB, created by
Felix Botner
on 2019-11-25 15:44 CET
(
hide
)
Description:
bt full log
Filename:
MIME Type:
Creator:
Felix Botner
Created:
2019-11-25 15:44 CET
Size:
13.16 KB
patch
obsolete
>(gdb) bt full --help >No symbol "help" in current context. >(gdb) bt full > /tmp/bt-full.txt >A syntax error in expression, near `> /tmp/bt-full.txt '. >(gdb) bt full > bt-full.txt >A syntax error in expression, near `> bt-full.txt '. >(gdb) bt full > bt-full >A syntax error in expression, near `> bt-full '. >(gdb) set logging on >Copying output to gdb.txt. >(gdb) set logging file /tmp/gdb.log >(gdb) bt full >#0 0x00005555555d0dc4 in strchrlen (len=<synthetic pointer>, ch=59 ';', end=0x7fff6bd62000 <error: Cannot access memory at address 0x7fff6bd62000>, > beg=0x7fff6bd61ff5 "entry-de-de"<error: Cannot access memory at address 0x7fff6bd62000>) at ../../../../servers/slapd/ad.c:148 > p = 0x7fff6bd62000 <error: Cannot access memory at address 0x7fff6bd62000> >#1 slap_bv2ad (bv=bv@entry=0x7fffffffdbe0, ad=ad@entry=0x7fffffffdbb8, text=text@entry=0x7fffffffdbb0) at ../../../../servers/slapd/ad.c:224 > optlen = <optimized out> > desc = {ad_next = 0x0, ad_type = 0x5555559d55c0, ad_cname = {bv_len = 48, > bv_val = 0x7fff6bd61fc4 "univentionUDMPropertyTranslationShortDescription;entry-de-de"<error: Cannot access memory at address 0x7fff6bd62000>}, ad_tags = {bv_len = 0, bv_val = 0x0}, ad_flags = 0, > ad_index = 0} > d2 = <optimized out> > name = <optimized out> > options = <optimized out> > optn = 0x7fff6bd62000 <error: Cannot access memory at address 0x7fff6bd62000> > opt = 0x7fff6bd61ff5 "entry-de-de"<error: Cannot access memory at address 0x7fff6bd62000> > ntags = 0 > tagslen = 0 > tags = {{bv_len = 50, bv_val = 0x7fff6bc67245 "entry-hex-6c6461702f7365727665722f6164646974696f6e"}, {bv_len = 0, bv_val = 0x0} <repeats 15 times>, {bv_len = 0, > bv_val = 0x55555561a1b0 <avl_find+48> "\203", <incomplete sequence \370>}, {bv_len = 140737488343248, bv_val = 0x555555b5f920 " "}, {bv_len = 2, > bv_val = 0x5555555d2ef6 <at_bvfind+70> "H\205\300H\211\303tJH\213@\020\366\200", <incomplete sequence \312>}, {bv_len = 93824998570224, > bv_val = 0x5555555d0d32 <slap_bv2ad+354> "H\205\300H\211D$X\017\205\367\003"}, {bv_len = 0, bv_val = 0x0}, {bv_len = 0, bv_val = 0x0}, {bv_len = 0, bv_val = 0x0}, {bv_len = 0, bv_val = 0x0}, { > bv_len = 0, bv_val = 0x0}, {bv_len = 0, bv_val = 0x5555558ef890 "\220\367\216UUU"}, {bv_len = 2, bv_val = 0x555555b5f920 " "}, {bv_len = 0, bv_val = 0x0} <repeats 15 times>, {bv_len = 0, > bv_val = 0x55555561a1b0 <avl_find+48> "\203", <incomplete sequence \370>}, {bv_len = 140737488343664, bv_val = 0x555555b63b60 "olcThreads"}, {bv_len = 2, > bv_val = 0x5555555d2ef6 <at_bvfind+70> "H\205\300H\211\303tJH\213@\020\366\200", <incomplete sequence \312>}, {bv_len = 93824998587184, > bv_val = 0x5555555d0d32 <slap_bv2ad+354> "H\205\300H\211D$X\017\205\367\003"}, {bv_len = 0, bv_val = 0x0}, {bv_len = 0, bv_val = 0x0}, {bv_len = 0, bv_val = 0x0}, {bv_len = 0, bv_val = 0x0}, { > bv_len = 0, bv_val = 0x0}, {bv_len = 0, bv_val = 0x5555558ef890 "\220\367\216UUU"}, {bv_len = 2, bv_val = 0x555555b63b60 "olcThreads"}, {bv_len = 0, bv_val = 0x0} <repeats 38 times>, {bv_len = 0, > bv_val = 0x7fffee7182f6 <mdb_cmp_memn+38> "\205\300u\016H\205\333H\307\300\377\377\377\377H\017I\303[\303f\017\037D"}, {bv_len = 140735002120168, > bv_val = 0x7fffee717d7c <mdb_node_search+220> "\203", <incomplete sequence \370>}, {bv_len = 0, bv_val = 0x7fffffffd890 "\300\333\377\377\377\177"}, {bv_len = 140737488344368, > bv_val = 0x7fffffffd8e0 ""}, {bv_len = 12884901888, bv_val = 0x7fffffffd5ac ""}, {bv_len = 8, bv_val = 0x7fffffffd5b0 ""}, {bv_len = 0, bv_val = 0x555555c48ed0 "\003"}, {bv_len = 0, bv_val = 0x0}, { > bv_len = 0, bv_val = 0x7fffffffd5b0 ""}, {bv_len = 0, bv_val = 0x7fffffffd8e0 ""}, {bv_len = 0, bv_val = 0x7fffee71b0b8 <mdb_page_search_root+152> "\205\300\017\205\r\001"}, { > bv_len = 140737488345232, bv_val = 0x7fffffffd5ac ""}, {bv_len = 0, bv_val = 0xffffd928 <error: Cannot access memory at address 0xffffd928>}, {bv_len = 140735002124288, > bv_val = 0xc11d9297d6a50b00 <error: Cannot access memory at address 0xc11d9297d6a50b00>}, {bv_len = 0, bv_val = 0x7fffffffd8e0 ""}, {bv_len = 140737488345232, bv_val = 0x0}, { > bv_len = 140737488345312, bv_val = 0x7fffffffd88c "\377\177"}, {bv_len = 140737488345248, bv_val = 0x7fffee71b468 <mdb_page_search+168> "\353%f\017\037D"}, {bv_len = 0, > bv_val = 0x0} <repeats 12 times>, {bv_len = 0, bv_val = 0x3 <error: Cannot access memory at address 0x3>}, {bv_len = 0, bv_val = 0x7fffffffdc80 "\220\253\304UUU"}, {bv_len = 140737488346224, > bv_val = 0x555555622210 "%s: line %d"}, {bv_len = 140737488346616, bv_val = 0x0}, {bv_len = 140737317970240, > bv_val = 0x7ffff5a334b9 <_IO_vfprintf_internal+1929> "H\213\225h\373\377\377H\211\321L)\371H9\310\017\205p\371\377\377D\213\215H\373\377\377\271\377\377\377\177D)\311Hc\311H9\310\017\217\307\025"}, > {bv_len = 0, bv_val = 0x1b00000000 <error: Cannot access memory at address 0x1b00000000>}, {bv_len = 140737488346168, bv_val = 0x16e <error: Cannot access memory at address 0x16e>}, { > bv_len = 140737488345048, bv_val = 0x7fffee7182f6 <mdb_cmp_memn+38> "\205\300u\016H\205\333H\307\300\377\377\377\377H\017I\303[\303f\017\037D"}} > tagbuf = "entry-hex-6c6461702f7365727665722f6164646974696f6e\000\000 \000\000\000\214\330\377\377\377\177\000\000\004\000\000\000\000\000\000\000\002\000\000\000\377\177\000\000\005\000\000\000\000\000\000\000@", '\000' <repeats 15 times>, "\002\000\000\000\060", '\000' <repeats 19 times>, "[\000\000\000n", '\000' <repeats 19 times>, "w\000\000\000|", '\000' <repeats 12 times>, "[\330\365\377\177\000\000\005\000\000\000\000\000\000\000|}q\356\377\177\000\000\340\330\377\377\377\177\000\000"... > __PRETTY_FUNCTION__ = "slap_bv2ad" >#2 0x00007fffee70e043 in mdb_ad_read (mdb=mdb@entry=0x555555a58240, txn=<optimized out>) at ../../../../../servers/slapd/back-mdb/attr.c:573 > i = 121 > rc = 0 > mc = 0x555555c4c530 > key = {mv_size = 4, mv_data = 0x7fff6bd61fc0} > data = {mv_size = 60, mv_data = 0x7fff6bd61fc4} > bdata = {bv_len = 60, bv_val = 0x7fff6bd61fc4 "univentionUDMPropertyTranslationShortDescription;entry-de-de"<error: Cannot access memory at address 0x7fff6bd62000>} > text = 0x7fffffffdca0 "B" > ad = 0x0 >#3 0x00007fffee6fe4ad in mdb_db_open (be=0x7fffffffdd90, cr=0x7fffffffdf80) at ../../../../../servers/slapd/back-mdb/init.c:263 > rc = <optimized out> > i = <optimized out> > mdb = 0x555555a58240 > stat1 = {st_dev = 64768, st_ino = 4713968, st_nlink = 2, st_mode = 16877, st_uid = 115, st_gid = 123, __pad0 = 0, st_rdev = 0, st_size = 4096, st_blksize = 4096, st_blocks = 8, st_atim = { > tv_sec = 1574692643, tv_nsec = 816244384}, st_mtim = {tv_sec = 1574692711, tv_nsec = 754257835}, st_ctim = {tv_sec = 1574692711, tv_nsec = 754257835}, __glibc_reserved = {0, 0, 0}} >---Type <return> to continue, or q <return> to quit--- > flags = <optimized out> > dbhome = <optimized out> > txn = 0x555555c4ab90 >#4 0x00005555555fa601 in over_db_open (be=<optimized out>, cr=0x7fffffffdf80) at ../../../../servers/slapd/backover.c:149 > oi = <optimized out> > on = 0x555555b200b0 > db = {bd_info = 0x7fffee930560 <bi>, bd_self = 0x555555a580a0, be_ctrls = "\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001", '\000' <repeats 17 times>, "\001", be_flags = 196872, > be_restrictops = 0, be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls = 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls = 0, sss_update_sasl = 0, > sss_simple_bind = 0}, be_suffix = 0x555555b183e0, be_nsuffix = 0x555555b18410, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn = {bv_len = 0, bv_val = 0x0}, be_rootdn = {bv_len = 32, > bv_val = 0x555555b19cd0 "cn=admin,dc=autotest097,dc=local"}, be_rootndn = {bv_len = 32, bv_val = 0x555555b1a700 "cn=admin,dc=autotest097,dc=local"}, be_rootpw = {bv_len = 0, bv_val = 0x0}, > be_max_deref_depth = 15, be_def_limit = {lms_t_soft = 3600, lms_t_hard = 0, lms_s_soft = 400000, lms_s_hard = 0, lms_s_unchecked = -1, lms_s_pr = 0, lms_s_pr_hide = 0, lms_s_pr_total = 0}, > be_limits = 0x555555b19380, be_acl = 0x555555b22730, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn = {bv_len = 0, bv_val = 0x0}, be_update_refs = 0x0, > be_pending_csn_list = 0x555555c47390, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0, __nusers = 0, __kind = 0, __spins = 0, __elision = 0, __list = {__prev = 0x0, __next = 0x0}}, > __size = '\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x0, be_pb = 0x0, be_cf_ocs = 0x7fffee930120 <mdbocs>, be_private = 0x555555a58240, be_next = {stqe_next = 0x555555b64010}} > rc = 0 >#5 0x000055555559a317 in backend_startup_one (be=be@entry=0x555555a580a0, cr=cr@entry=0x7fffffffdf80) at ../../../../servers/slapd/backend.c:224 > rc = 0 > __PRETTY_FUNCTION__ = "backend_startup_one" >#6 0x000055555559a4cb in backend_startup (be=be@entry=0x555555a580a0) at ../../../../servers/slapd/backend.c:278 > i = <optimized out> > rc = <optimized out> > bi = <optimized out> > cr = {err = 0, msg = '\000' <repeats 255 times>} >#7 0x00005555555bc0e1 in slap_startup (be=0x555555a580a0) at ../../../../servers/slapd/init.c:219 > rc = <optimized out> >#8 0x00005555555ffc84 in slap_tool_init (progname=progname@entry=0x55555561d2c1 "slapcat", tool=tool@entry=2, argc=<optimized out>, argv=<optimized out>) at ../../../../servers/slapd/slapcommon.c:908 > options = 0x55555563afe8 "a:b:cd:f:F:gH:l:n:o:s:v" > conffile = <optimized out> > confdir = <optimized out> > base = {bv_len = 0, bv_val = 0x0} > filterstr = <optimized out> > subtree = <optimized out> > ldiffile = <optimized out> > debug_unknowns = 0x0 > rc = <optimized out> > i = <optimized out> > mode = 1538 > truncatemode = <optimized out> > use_glue = 1 > writer = <optimized out> >#9 0x00005555555fec90 in slapcat (argc=<optimized out>, argv=<optimized out>) at ../../../../servers/slapd/slapcat.c:53 > id = <optimized out> > rc = 0 > op = {o_hdr = 0x0, o_tag = 0, o_time = 0, o_tincr = 0, o_bd = 0x0, o_req_dn = {bv_len = 0, bv_val = 0x0}, o_req_ndn = {bv_len = 0, bv_val = 0x0}, o_request = {oq_add = {rs_modlist = 0x0, rs_e = 0x0}, > oq_bind = {rb_method = 0, rb_cred = {bv_len = 0, bv_val = 0x0}, rb_edn = {bv_len = 0, bv_val = 0x0}, rb_ssf = 0, rb_mech = {bv_len = 0, bv_val = 0x0}}, oq_compare = {rs_ava = 0x0}, oq_modify = { > rs_mods = {rs_modlist = 0x0, rs_no_opattrs = 0 '\000'}, rs_increment = 0}, oq_modrdn = {rs_mods = {rs_modlist = 0x0, rs_no_opattrs = 0 '\000'}, rs_deleteoldrdn = 0, rs_newrdn = {bv_len = 0, > bv_val = 0x0}, rs_nnewrdn = {bv_len = 0, bv_val = 0x0}, rs_newSup = 0x0, rs_nnewSup = 0x0}, oq_search = {rs_scope = 0, rs_deref = 0, rs_slimit = 0, rs_tlimit = 0, rs_limit = 0x0, > rs_attrsonly = 0, rs_attrs = 0x0, rs_filter = 0x0, rs_filterstr = {bv_len = 0, bv_val = 0x0}}, oq_abandon = {rs_msgid = 0}, oq_cancel = {rs_msgid = 0}, oq_extended = {rs_reqoid = {bv_len = 0, > bv_val = 0x0}, rs_flags = 0, rs_reqdata = 0x0}, oq_pwdexop = {rs_extended = {rs_reqoid = {bv_len = 0, bv_val = 0x0}, rs_flags = 0, rs_reqdata = 0x0}, rs_old = {bv_len = 0, bv_val = 0x0}, > rs_new = {bv_len = 0, bv_val = 0x0}, rs_mods = 0x0, rs_modtail = 0x0}}, o_abandon = 0, o_cancel = 0, o_groups = 0x0, o_do_not_cache = 0 '\000', o_is_auth_check = 0 '\000', > o_dont_replicate = 0 '\000', o_acl_priv = ACL_NONE, o_nocaching = 0 '\000', o_delete_glue_parent = 0 '\000', o_no_schema_check = 0 '\000', o_no_subordinate_glue = 0 '\000', > o_ctrlflag = '\000' <repeats 31 times>, o_controls = 0x0, o_authz = {sai_method = 0, sai_mech = {bv_len = 0, bv_val = 0x0}, sai_dn = {bv_len = 0, bv_val = 0x0}, sai_ndn = {bv_len = 0, bv_val = 0x0}, > sai_ssf = 0, sai_transport_ssf = 0, sai_tls_ssf = 0, sai_sasl_ssf = 0}, o_ber = 0x0, o_res_ber = 0x0, o_callback = 0x0, o_ctrls = 0x0, o_csn = {bv_len = 0, bv_val = 0x0}, o_private = 0x0, > o_extra = {slh_first = 0x0}, o_next = {stqe_next = 0x0}} > progname = 0x55555561d2c1 "slapcat" >---Type <return> to continue, or q <return> to quit--- > requestBSF = <optimized out> > doBSF = 0 > __PRETTY_FUNCTION__ = "slapcat" >#10 0x0000555555570867 in main (argc=1, argv=0x7fffffffe568) at ../../../../servers/slapd/main.c:410 > i = 1 > no_detach = 0 > rc = 1 > urls = 0x0 > username = 0x0 > groupname = 0x0 > sandbox = 0x0 > syslogUser = 160 > pid = <optimized out> > waitfds = {32767, 1} > g_argc = 1 > g_argv = 0x7fffffffe568 > configfile = 0x0 > configdir = 0x0 > serverName = <optimized out> > scp = 0x0 > scp_entry = 0x0 > debug_unknowns = 0x0 > syslog_unknowns = 0x0 > serverNamePrefix = <synthetic pointer> > l = <optimized out> > slapd_pid_file_unlink = 0 > slapd_args_file_unlink = 0 > firstopt = 1 > __PRETTY_FUNCTION__ = "main"
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
Actions:
View
Attachments on
bug 49780
:
10230
| 10231 |
10232