[Date Prev][Date Next]
[Chronological]
[Thread]
[Top]
slapd 2.4.7-2.4.9 segfaults with some specific search
Hello,
I build openldap 2.4.7 a few weeks ago, and 2.4.9 yesterday,
with 2.4.7 and 2.4.9, without any my patches, just a clean build.
After adding my custom schema, uploading my data from production version,
and indexing, I still have it crash with some specific search -
I was hoping 2.4.9 have this resolved, seems not, so posting this.
I distracted example search which always causes segfault, each time,
100% reproductible.
Have nice reading.. :) I'd be glad to report I replaced my
production with 2.4.x series, thanx upwards for any hint :)
Should I perform some gdb-enabled build, and post some core?
I'm currently ahead to do this.
Details:
==============
==============
slapd.conf:
include /etc/ldap/schema/core.schema
include /etc/ldap/schema/cosine.schema
include /etc/ldap/schema/nis.schema
include /etc/ldap/schema/inetorgperson.schema
include /etc/ldap/schema/dnsdomain2.schema
include /etc/ldap/schema/sendmail.pw.schema
include /etc/ldap/schema/misc.schema
include /etc/ldap/schema/ISPEnv2.schema
include /etc/ldap/schema/mod_vhost_ldap.schema
include /etc/ldap/schema/local.schema
include /etc/ldap/schema/hpl.schema
include /etc/ldap/schema/apache_ext.schema
include /etc/ldap/schema/apache_alias.schema
include /etc/ldap/schema/autofs.schema
pidfile /var/run/slapd/slapd.pid
argsfile /var/run/slapd/slapd.args
modulepath /usr/lib/ldap
moduleload back_bdb
backend bdb
loglevel 0
database bdb
cachesize 300000
concurrency 256
threads 32
lastmod on
suffix "dc=ROOT"
checkpoint 128 60
directory "/var/lib/ldap"
sizelimit unlimited
timelimit 16
include /etc/ldap/indexes
rootdn "cn=Directory Manager,dc=ROOT"
access to *
by dn="cn=Read Only,dc=ROOT" read
by * auth
access to attrs=userPassword
by anonymous auth
by self write
by * auth
access to dn.base="dc=ROOT"
by * auth
access to dn.base=""
by * auth
==============
==============
/var/lib/ldap/DB_CONFIG is as follows:
set_cachesize 0 2097152 0
set_lg_regionmax 1048576
set_lg_max 1048576
set_lk_max_objects 5000
set_lk_max_locks 5000
set_lk_max_lockers 5000
==============
==============
the database is loaded with slapadd (no -q)
just before search, and after indexing, with or
without any changes before fatal search slapd is started as follows:
root@gnp34:~# slaptest
config file testing succeeded
root@gnp34:~# slapd -u root -g root \
-h ldap://192.168.0.221:389/ ldapi:/// \
-d $((1+2+4+8+16+32+64+128+256+512+1024+2048+4096+8192+16384))
==============
==============
the search parameters are:
root@gnp34:~# ldapsearch -vvv -xh 192.168.0.221 \
-WD "cn=Directory Manager,dc=ROOT" -b "dc=dns,dc=nameservers,dc=ROOT"
'(&(objectClass=dNSDomain)(associatedDomain=*fakedomain.com)(customerID=10125)(SOARecord=*)(NSRecord=*)(topLevelDomain=TRUE))'
ldap_initialize( ldap://192.168.0.221 )
Enter LDAP Password:
# extended LDIF
#
# LDAPv3
# base <dc=dns,dc=nameservers,dc=ROOT> with scope subtree
# filter: (&(objectClass=dNSDomain)(associatedDomain=*fakedomain.com)(customerID=10125)(SOARecord=*)(NSRecord=*)(topLevelDomain=TRUE))
# requesting: ALL
#
ldap_result: Can't contact LDAP server (-1)
================================================================== The
same search on 2.3.x (production, old stable) with the same data, same
indexing, same DB_CONFIG etc. returns the following object: (all my custom
attributes are SUP of some standard text/bool attrs, no custom syntaxes
nor other advanced customizing )
# fakedomain.com.dns.nameservers.ROOT
dn: dc=fakedomain.com,dc=dns,dc=nameservers,dc=ROOT
objectClass: top
objectClass: dNSDomain
objectClass: domainRelatedObject
objectClass: managedAccessObject
associatedDomain: fakedomain.com
dc: fakedomain.com
aRecord: AA.BB.CC.DD
nSRecord: ns0.otherfakedomain.com
nSRecord: ns1.otherfakedomain.com
sOARecord: ns0.otherfakedomain.com hostmaster.otherfakedomain.com 2008011307 300 150 2592000 300
mXRecord: 10 mx10.fakedomain.com
mXRecord: 20 mx20.fakedomain.com
mXRecord: 30 mx10.otherfakedomain.com
mXRecord: 40 mx20.otherfakedomain.com
customerID: 10125
topLevelDomain: TRUE
isActive: TRUE
isBlocked: FALSE
# search result
search: 2
result: 0 Success
# numResponses: 2
# numEntries: 1
====================
====================
build configuration is:
--prefix=/usr
--libexecdir='${prefix}/lib'
--sysconfdir=/etc
--localstatedir=/var
--mandir='${prefix}/share/man'
--enable-debug
--enable-dynamic
--enable-syslog
--enable-proctitle
--enable-ipv6
--enable-local
--enable-slapd
--enable-aci
--enable-cleartext
--enable-crypt
--disable-lmpasswd
--enable-spasswd
--enable-modules
--enable-rewrite
--enable-rlookups
--enable-slapi
--enable-slp
--enable-wrappers
--enable-backends=mod
--enable-ldbm=no
--enable-overlays=mod
--with-subdir=ldap
--with-cyrus-sasl
--with-threads
--with-tls=gnutls
--with-odbc=unixodbc
====================
====================
and finally debug log collected contains (1000+ lines of initialization
skipped ) as follows:
slapd starting
daemon: added 4r listener=(nil)
daemon: added 7r listener=0x8199078
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: activity on 1 descriptor
daemon: activity on:
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: activity on 1 descriptor
daemon: activity on:
slap_listener_activate(7):
daemon: epoll: listen=7 busy
>>> slap_listener(ldap://192.168.0.221:389/)
daemon: listen=7, new connection on 12
daemon: activity on 1 descriptor
daemon: activity on:
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: added 12r (active) listener=(nil)
daemon: activity on 1 descriptor
conn=0 fd=12 ACCEPT from IP=XX.YY.ZZ.MM:53598 (IP=192.168.0.221:389)
daemon: activity on: 12r
daemon: read active on 12
connection_get(12)
daemon: epoll: listen=7 active_threads=0 tvp=zero
daemon: activity on 1 descriptor
daemon: activity on:
daemon: epoll: listen=7 active_threads=0 tvp=zero
connection_get(12): got connid=0
connection_read(12): checking for input on id=0
ber_get_next
ldap_read: want=8, got=8
0000: 30 30 02 01 01 60 2b 02 00...`+.
ldap_read: want=42, got=42
0000: 01 03 04 1c 63 6e 3d 44 69 72 65 63 74 6f 72 79 ....cn=Directory
0010: 20 4d 61 6e 61 67 65 72 2c 64 63 3d 52 4f 4f 54 Manager,dc=ROOT
0020: 80 08 6b 7a 64 70 6d 31 6f 75 ..SECRET
ber_get_next: tag 0x30 len 48 contents:
ber_dump: buf=0x8263190 ptr=0x8263190 end=0x82631c0 len=48
0000: 02 01 01 60 2b 02 01 03 04 1c 63 6e 3d 44 69 72 ...`+.....cn=Dir
0010: 65 63 74 6f 72 79 20 4d 61 6e 61 67 65 72 2c 64 ectory Manager,d
0020: 63 3d 52 4f 4f 54 80 08 6b 7a 64 70 6d 31 6f 75 c=ROOT..SECRET
ber_get_next
ldap_read: want=8 error=Resource temporarily unavailable
daemon: activity on 1 descriptor
daemon: activity on:
daemon: epoll: listen=7 active_threads=0 tvp=zero
conn=0 op=0 do_bind
ber_scanf fmt ({imt) ber:
ber_dump: buf=0x8263190 ptr=0x8263193 end=0x82631c0 len=45
0000: 60 2b 02 01 03 04 1c 63 6e 3d 44 69 72 65 63 74 `+.....cn=Direct
0010: 6f 72 79 20 4d 61 6e 61 67 65 72 2c 64 63 3d 52 ory Manager,dc=R
0020: 4f 4f 54 80 08 6b 7a 64 70 6d 31 6f 75 OOT..SECRET
ber_scanf fmt (m}) ber:
ber_dump: buf=0x8263190 ptr=0x82631b6 end=0x82631c0 len=10
0000: 00 08 6b 7a 64 70 6d 31 6f 75 ..SECRET
>>> dnPrettyNormal: <cn=Directory Manager,dc=ROOT>
=> ldap_bv2dn(cn=Directory Manager,dc=ROOT,0)
<= ldap_bv2dn(cn=Directory Manager,dc=ROOT)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=Directory Manager,dc=ROOT)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(cn=directory manager,dc=root)=0
<<< dnPrettyNormal: <cn=Directory Manager,dc=ROOT>, <cn=directory manager,dc=root>
conn=0 op=0 BIND dn="cn=Directory Manager,dc=ROOT" method=128
do_bind: version=3 dn="cn=Directory Manager,dc=ROOT" method=128
==> bdb_bind: dn: cn=Directory Manager,dc=ROOT
bdb_dn2entry("cn=directory manager,dc=root")
=> bdb_dn2id("dc=root")
<= bdb_dn2id: got id=0x1
=> bdb_dn2id("cn=directory manager,dc=root")
<= bdb_dn2id: got id=0x2
entry_decode: "cn=Directory Manager,dc=ROOT"
<= entry_decode(cn=Directory Manager,dc=ROOT)
=> access_allowed: auth access to "cn=Directory Manager,dc=ROOT" "userPassword" requested
=> acl_get: [1] attr userPassword
=> slap_access_allowed: result not in cache (userPassword)
=> acl_mask: access to entry "cn=Directory Manager,dc=ROOT", attr "userPassword" requested
=> acl_mask: to value by "", (=0)
<= check a_dn_pat: cn=nobody,dc=root
<= check a_dn_pat: *
<= acl_mask: [2] applying auth(=xd) (stop)
<= acl_mask: [2] mask: auth(=xd)
=> slap_access_allowed: auth access granted by auth(=xd)
=> access_allowed: auth access granted by auth(=xd)
conn=0 op=0 BIND dn="cn=Directory Manager,dc=ROOT" mech=SIMPLE ssf=0
do_bind: v3 bind: "cn=Directory Manager,dc=ROOT" to "cn=Directory Manager,dc=ROOT"
send_ldap_result: conn=0 op=0 p=3
send_ldap_result: err=0 matched="" text=""
send_ldap_response: msgid=1 tag=97 err=0
ber_flush2: 14 bytes to sd 12
0000: 30 0c 02 01 01 61 07 0a 01 00 04 00 04 00 0....a........
daemon: activity on 1 descriptor
daemon: activity on: 12r
daemon: read active on 12
daemon: epoll: listen=7 active_threads=0 tvp=zero
ldap_write: want=14, written=14
0000: 30 0c 02 01 01 61 07 0a 01 00 04 00 04 00 0....a........
conn=0 op=0 RESULT tag=97 err=0 text=
connection_get(12)
connection_get(12): got connid=0
connection_read(12): checking for input on id=0
ber_get_next
ldap_read: want=8, got=8
0000: 30 81 b7 02 01 02 63 81 0.....c.
ldap_read: want=178, got=178
0000: b1 04 1d 64 63 3d 64 6e 73 2c 64 63 3d 6e 61 6d ...dc=dns,dc=nam
0010: 65 73 65 72 76 65 72 73 2c 64 63 3d 52 4f 4f 54 eservers,dc=ROOT
0020: 0a 01 02 0a 01 03 02 01 00 02 01 00 01 01 00 a0 ................
0030: 7f a3 18 04 0b 6f 62 6a 65 63 74 43 6c 61 73 73 .....objectClass
0040: 04 09 64 4e 53 44 6f 6d 61 69 6e a4 21 04 10 61 ..dNSDomain.!..a
0050: 73 73 6f 63 69 61 74 65 64 44 6f 6d 61 69 6e 30 ssociatedDomain0
0060: 0d 82 0b 63 6f 72 73 61 72 69 6f 2e 70 6c a3 13 ...fakedomain.com..
0070: 04 0a 63 75 73 74 6f 6d 65 72 49 44 04 05 31 30 ..customerID..10
0080: 31 32 35 87 09 53 4f 41 52 65 63 6f 72 64 87 08 125..SOARecord..
0090: 4e 53 52 65 63 6f 72 64 a3 16 04 0e 74 6f 70 4c NSRecord....topL
00a0: 65 76 65 6c 44 6f 6d 61 69 6e 04 04 54 52 55 45 evelDomain..TRUE
00b0: 30 00 0.
ber_get_next: tag 0x30 len 183 contents:
ber_dump: buf=0x8273e80 ptr=0x8273e80 end=0x8273f37 len=183
0000: 02 01 02 63 81 b1 04 1d 64 63 3d 64 6e 73 2c 64 ...c....dc=dns,d
0010: 63 3d 6e 61 6d 65 73 65 72 76 65 72 73 2c 64 63 c=nameservers,dc
0020: 3d 52 4f 4f 54 0a 01 02 0a 01 03 02 01 00 02 01 =ROOT...........
0030: 00 01 01 00 a0 7f a3 18 04 0b 6f 62 6a 65 63 74 ..........object
0040: 43 6c 61 73 73 04 09 64 4e 53 44 6f 6d 61 69 6e Class..dNSDomain
0050: a4 21 04 10 61 73 73 6f 63 69 61 74 65 64 44 6f .!..associatedDo
0060: 6d 61 69 6e 30 0d 82 0b 63 6f 72 73 61 72 69 6f main0...corsario
0070: 2e 70 6c a3 13 04 0a 63 75 73 74 6f 6d 65 72 49 .pl....customerI
0080: 44 04 05 31 30 31 32 35 87 09 53 4f 41 52 65 63 D..10125..SOARec
0090: 6f 72 64 87 08 4e 53 52 65 63 6f 72 64 a3 16 04 ord..NSRecord...
00a0: 0e 74 6f 70 4c 65 76 65 6c 44 6f 6d 61 69 6e 04 .topLevelDomain.
00b0: 04 54 52 55 45 30 00 .TRUE0.
ber_get_next
ldap_read: want=8 error=Resource temporarily unavailable
daemon: activity on 1 descriptor
daemon: activity on:
daemon: epoll: listen=7 active_threads=0 tvp=zero
conn=0 op=1 do_search
ber_scanf fmt ({miiiib) ber:
ber_dump: buf=0x8273e80 ptr=0x8273e83 end=0x8273f37 len=180
0000: 63 81 b1 04 1d 64 63 3d 64 6e 73 2c 64 63 3d 6e c....dc=dns,dc=n
0010: 61 6d 65 73 65 72 76 65 72 73 2c 64 63 3d 52 4f ameservers,dc=RO
0020: 4f 54 0a 01 02 0a 01 03 02 01 00 02 01 00 01 01 OT..............
0030: 00 a0 7f a3 18 04 0b 6f 62 6a 65 63 74 43 6c 61 .......objectCla
0040: 73 73 04 09 64 4e 53 44 6f 6d 61 69 6e a4 21 04 ss..dNSDomain.!.
0050: 10 61 73 73 6f 63 69 61 74 65 64 44 6f 6d 61 69 .associatedDomai
0060: 6e 30 0d 82 0b 63 6f 72 73 61 72 69 6f 2e 70 6c n0...fakedomain.com
0070: a3 13 04 0a 63 75 73 74 6f 6d 65 72 49 44 04 05 ....customerID..
0080: 31 30 31 32 35 87 09 53 4f 41 52 65 63 6f 72 64 10125..SOARecord
0090: 87 08 4e 53 52 65 63 6f 72 64 a3 16 04 0e 74 6f ..NSRecord....to
00a0: 70 4c 65 76 65 6c 44 6f 6d 61 69 6e 04 04 54 52 pLevelDomain..TR
00b0: 55 45 30 00 UE0.
>>> dnPrettyNormal: <dc=dns,dc=nameservers,dc=ROOT>
=> ldap_bv2dn(dc=dns,dc=nameservers,dc=ROOT,0)
<= ldap_bv2dn(dc=dns,dc=nameservers,dc=ROOT)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(dc=dns,dc=nameservers,dc=ROOT)=0
=> ldap_dn2bv(272)
<= ldap_dn2bv(dc=dns,dc=nameservers,dc=root)=0
<<< dnPrettyNormal: <dc=dns,dc=nameservers,dc=ROOT>, <dc=dns,dc=nameservers,dc=root>
SRCH "dc=dns,dc=nameservers,dc=ROOT" 2 3 0 0 0
begin get_filter
AND
begin get_filter_list
begin get_filter
EQUALITY
ber_scanf fmt ({mm}) ber:
ber_dump: buf=0x8273e80 ptr=0x8273eb6 end=0x8273f37 len=129
0000: a3 18 04 0b 6f 62 6a 65 63 74 43 6c 61 73 73 04 ....objectClass.
0010: 09 64 4e 53 44 6f 6d 61 69 6e a4 21 04 10 61 73 .dNSDomain.!..as
0020: 73 6f 63 69 61 74 65 64 44 6f 6d 61 69 6e 30 0d sociatedDomain0.
0030: 82 0b 63 6f 72 73 61 72 69 6f 2e 70 6c a3 13 04 ..fakedomain.com...
0040: 0a 63 75 73 74 6f 6d 65 72 49 44 04 05 31 30 31 .customerID..101
0050: 32 35 87 09 53 4f 41 52 65 63 6f 72 64 87 08 4e 25..SOARecord..N
0060: 53 52 65 63 6f 72 64 a3 16 04 0e 74 6f 70 4c 65 SRecord....topLe
0070: 76 65 6c 44 6f 6d 61 69 6e 04 04 54 52 55 45 30 velDomain..TRUE0
0080: 00 .
end get_filter 0
begin get_filter
SUBSTRINGS
begin get_ssa
ber_scanf fmt ({m) ber:
ber_dump: buf=0x8273e80 ptr=0x8273ed0 end=0x8273f37 len=103
0000: 00 21 04 10 61 73 73 6f 63 69 61 74 65 64 44 6f .!..associatedDo
0010: 6d 61 69 6e 30 0d 82 0b 63 6f 72 73 61 72 69 6f main0...corsario
0020: 2e 70 6c a3 13 04 0a 63 75 73 74 6f 6d 65 72 49 .pl....customerI
0030: 44 04 05 31 30 31 32 35 87 09 53 4f 41 52 65 63 D..10125..SOARec
0040: 6f 72 64 87 08 4e 53 52 65 63 6f 72 64 a3 16 04 ord..NSRecord...
0050: 0e 74 6f 70 4c 65 76 65 6c 44 6f 6d 61 69 6e 04 .topLevelDomain.
0060: 04 54 52 55 45 30 00 .TRUE0.
ber_scanf fmt (m) ber:
ber_dump: buf=0x8273e80 ptr=0x8273ee6 end=0x8273f37 len=81
0000: 82 0b 63 6f 72 73 61 72 69 6f 2e 70 6c a3 13 04 ..fakedomain.com...
0010: 0a 63 75 73 74 6f 6d 65 72 49 44 04 05 31 30 31 .customerID..101
0020: 32 35 87 09 53 4f 41 52 65 63 6f 72 64 87 08 4e 25..SOARecord..N
0030: 53 52 65 63 6f 72 64 a3 16 04 0e 74 6f 70 4c 65 SRecord....topLe
0040: 76 65 6c 44 6f 6d 61 69 6e 04 04 54 52 55 45 30 velDomain..TRUE0
0050: 00 .
FINAL
end get_ssa
end get_filter 0
begin get_filter
EQUALITY
ber_scanf fmt ({mm}) ber:
ber_dump: buf=0x8273e80 ptr=0x8273ef3 end=0x8273f37 len=68
0000: 00 13 04 0a 63 75 73 74 6f 6d 65 72 49 44 04 05 ....customerID..
0010: 31 30 31 32 35 87 09 53 4f 41 52 65 63 6f 72 64 10125..SOARecord
0020: 87 08 4e 53 52 65 63 6f 72 64 a3 16 04 0e 74 6f ..NSRecord....to
0030: 70 4c 65 76 65 6c 44 6f 6d 61 69 6e 04 04 54 52 pLevelDomain..TR
0040: 55 45 30 00 UE0.
end get_filter 0
begin get_filter
PRESENT
ber_scanf fmt (m) ber:
ber_dump: buf=0x8273e80 ptr=0x8273f08 end=0x8273f37 len=47
0000: 00 09 53 4f 41 52 65 63 6f 72 64 87 08 4e 53 52 ..SOARecord..NSR
0010: 65 63 6f 72 64 a3 16 04 0e 74 6f 70 4c 65 76 65 ecord....topLeve
0020: 6c 44 6f 6d 61 69 6e 04 04 54 52 55 45 30 00 lDomain..TRUE0.
end get_filter 0
begin get_filter
PRESENT
ber_scanf fmt (m) ber:
ber_dump: buf=0x8273e80 ptr=0x8273f13 end=0x8273f37 len=36
0000: 00 08 4e 53 52 65 63 6f 72 64 a3 16 04 0e 74 6f ..NSRecord....to
0010: 70 4c 65 76 65 6c 44 6f 6d 61 69 6e 04 04 54 52 pLevelDomain..TR
0020: 55 45 30 00 UE0.
end get_filter 0
begin get_filter
EQUALITY
ber_scanf fmt ({mm}) ber:
ber_dump: buf=0x8273e80 ptr=0x8273f1d end=0x8273f37 len=26
0000: 00 16 04 0e 74 6f 70 4c 65 76 65 6c 44 6f 6d 61 ....topLevelDoma
0010: 69 6e 04 04 54 52 55 45 30 00 in..TRUE0.
end get_filter 0
end get_filter_list
end get_filter 0
filter: (&(objectClass=dNSDomain)(associatedDomain=*fakedomain.com)(customerID=10125)(sOARecord=*)(nSRecord=*)(topLevelDomain=TRUE))
ber_scanf fmt ({M}}) ber:
ber_dump: buf=0x8273e80 ptr=0x8273f35 end=0x8273f37 len=2
0000: 00 00 ..
attrs:
conn=0 op=1 SRCH base="dc=dns,dc=nameservers,dc=ROOT" scope=2 deref=3 filter="(&(objectClass=dNSDomain)(associatedDomain=*fakedomain.com)(customerID=10125)(sOARecord=*)(nSRecord=*)(topLevelDomain=TRUE))"
=> bdb_search
bdb_dn2entry("dc=dns,dc=nameservers,dc=root")
=> bdb_dn2id("dc=nameservers,dc=root")
<= bdb_dn2id: got id=0x4
=> bdb_dn2id("dc=dns,dc=nameservers,dc=root")
<= bdb_dn2id: got id=0x5
entry_decode: "dc=dns,dc=nameservers,dc=ROOT"
<= entry_decode(dc=dns,dc=nameservers,dc=ROOT)
=> access_allowed: search access to "dc=dns,dc=nameservers,dc=ROOT" "entry" requested
<= root access granted
=> access_allowed: search access granted by manage(=mwrscxd)
search_candidates: base="dc=dns,dc=nameservers,dc=root" (0x00000005) scope=2
=> bdb_filter_candidates
EQUALITY
=> bdb_equality_candidates (objectClass)
=> key_read
bdb_idl_fetch_key: [01872a84]
<= bdb_index_read: failed (-30990)
<= bdb_equality_candidates: id=0, first=0, last=0
<= bdb_filter_candidates: id=0 first=0 last=0
=> bdb_dn2idl("dc=dns,dc=nameservers,dc=root")
bdb_idl_fetch_key: @dc=dns,dc=nameservers,dc=root
<= bdb_dn2idl: id=4010 first=5 last=13487
=> bdb_filter_candidates
AND
=> bdb_list_candidates 0xa0
=> bdb_filter_candidates
OR
=> bdb_list_candidates 0xa1
=> bdb_filter_candidates
EQUALITY
=> bdb_equality_candidates (objectClass)
=> key_read
bdb_idl_fetch_key: [b49dA1940]
<= bdb_index_read: failed (-30990)
<= bdb_equality_candidates: id=0, first=0, last=0
<= bdb_filter_candidates: id=0 first=0 last=0
=> bdb_filter_candidates
AND
=> bdb_list_candidates 0xa0
=> bdb_filter_candidates
EQUALITY
=> bdb_equality_candidates (objectClass)
=> key_read
bdb_idl_fetch_key: [a45a345e]
<= bdb_index_read 4049 candidates
<= bdb_equality_candidates: id=4049, first=6, last=13487
<= bdb_filter_candidates: id=4049 first=6 last=13487
=> bdb_filter_candidates
SUBSTRINGS
=> bdb_substring_candidates (associatedDomain)
=> key_read
bdb_idl_fetch_key: [612e9033]
<= bdb_index_read 1127 candidates
=> key_read
bdb_idl_fetch_key: [0ba8920a]
<= bdb_index_read 46 candidates
=> key_read
bdb_idl_fetch_key: [003a7d56]
<= bdb_index_read 63 candidates
=> key_read
bdb_idl_fetch_key: [d9fbeb39]
<= bdb_index_read 63 candidates
=> key_read
bdb_idl_fetch_key: [5eaf4814]
<= bdb_index_read 29 candidates
<= bdb_substring_candidates: 29, first=5287, last=12929
<= bdb_filter_candidates: id=29 first=5287 last=12929
=> bdb_filter_candidates
EQUALITY
=> bdb_equality_candidates (customerID)
=> key_read
bdb_idl_fetch_key: [8000278d]
<= bdb_index_read 125 candidates
=> key_read
bdb_idl_fetch_key: [0ba8920a]
<= bdb_index_read: failed (-30990)
Segmentation fault
===============================================
=================================================