[Date Prev][Date Next] [Chronological] [Thread] [Top]

(ITS#8664) lmdb fragmentation leads to DDoS for consumers



Full_Name: Quanah Gibson-Mount
Version: 2.4.44
OS: Linux
URL: ftp://ftp.openldap.org/incoming/
Submission from: (NULL) (47.208.148.239)


If a back-mdb database becomes highly fragmented, it can spend a bit of time
trying to find an open slot for an incoming write op.  If it is a master server,
this will cause all of its consumers to block all incoming read requests until
the write op is finished.  It also blocks all requests to the master as well. 
Once the page split completes and the write op is done, things go back to normal
until the next page split is required.  In the case I'm looking at today, it
causes sporadic outages of 6-10 minutes for the master and all consumers.  It
seems poor design that a write operation on the master will cause its consumers
to block all ongoing read operations until that write op is completed.  A
temporary workaround is to stop slapd, export the DB via slapcat, remove the old
db, and then re-import via slapadd to eliminate the database fragmentation.

Example gdb backtrace of a consumer:

(gdb) thr apply all bt full

Thread 10 (Thread 0x7f128f187700 (LWP 14660)):
#0  0x00007f3a93816f33 in epoll_wait () from /lib64/libc.so.6
No symbol table info available.
#1  0x00000000004366ff in slapd_daemon_task (ptr=0x2cf9eb8) at daemon.c:2517
        ns = 1
        at = 0
        nfds = 20
        revents = 0x2d9a000
        tvp = 0x7f128f186d80
        cat = {tv_sec = 1496211426, tv_usec = 0}
        i = 1
        nwriters = 0
        now = 1496211138
        tv = {tv_sec = 288, tv_usec = 0}
        tdelta = 1
        rtask = 0x2d2b360
        l = 2
        last_idle_check = 1495145226
        ebadf = 0
        tid = 0
#2  0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#3  0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 9 (Thread 0x7f128e986700 (LWP 14662)):
#0  0x00007f3a93acd68c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f3a94fe2c2f in ldap_pvt_thread_cond_wait (cond=0x2d36038,
mutex=0x2d36010) at thr_posix.c:277
No locals.
#2  0x00007f3a94fe147d in ldap_int_thread_pool_wrapper (xpool=0x2d36000) at
tpool.c:938
        pq = 0x2d36000
        pool = 0x2efa180
        task = 0x0
        work_list = 0x2d36070
        ctx = {ltu_pq = 0x2d36000, ltu_id = 139717678491392, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x52c8240, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
              ltk_key = 0x2f02d00, ltk_data = 0x54d1400, ltk_free =
0x7f3a9000778b <mdb_reader_free>}, {ltk_key = 0x43a3eb, ltk_data = 0x3280e00, 
              ltk_free = 0x43a22f <conn_counter_destroy>}, {ltk_key = 0x455939,
ltk_data = 0xad30800, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key =
0x7f3a8fffc5b7, 
              ltk_data = 0x8140000, ltk_free = 0x7f3a8fffc594
<search_stack_free>}, {ltk_key = 0x7f3a8fff9071, ltk_data = 0x7e40000, 
---Type <return> to continue, or q <return> to quit---
              ltk_free = 0x7f3a8fff9029 <scope_chunk_free>}, {ltk_key =
0x2f03400, ltk_data = 0xa519400, ltk_free = 0x7f3a9000778b <mdb_reader_free>},
{ltk_key = 0x0, 
              ltk_data = 0xabc9600, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
        kctx = 0x0
        i = 32
        keyslot = 286
        hash = 4262449438
        pool_lock = 0
        freeme = 0
        __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#3  0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#4  0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 8 (Thread 0x7f128e185700 (LWP 14663)):
#0  0x00007f3a93acd68c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f3a94fe2c2f in ldap_pvt_thread_cond_wait (cond=0x2d36038,
mutex=0x2d36010) at thr_posix.c:277
No locals.
#2  0x00007f3a94fe147d in ldap_int_thread_pool_wrapper (xpool=0x2d36000) at
tpool.c:938
        pq = 0x2d36000
        pool = 0x2efa180
        task = 0x0
        work_list = 0x2d36070
        ctx = {ltu_pq = 0x2d36000, ltu_id = 139717670098688, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x52c9240, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
              ltk_key = 0x2f02d00, ltk_data = 0x54d4800, ltk_free =
0x7f3a9000778b <mdb_reader_free>}, {ltk_key = 0x43a3eb, ltk_data = 0x3280a00, 
              ltk_free = 0x43a22f <conn_counter_destroy>}, {ltk_key = 0x455939,
ltk_data = 0x6b39800, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key =
0x7f3a8fffc5b7, 
              ltk_data = 0x6e3c000, ltk_free = 0x7f3a8fffc594
<search_stack_free>}, {ltk_key = 0x7f3a8fff9071, ltk_data = 0x6b3c000, 
              ltk_free = 0x7f3a8fff9029 <scope_chunk_free>}, {ltk_key =
0x2f03400, ltk_data = 0xa516000, ltk_free = 0x7f3a9000778b <mdb_reader_free>},
{ltk_key = 0x0, 
              ltk_data = 0x10034000, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
        kctx = 0x0
        i = 32
        keyslot = 398
        hash = 1493194126
        pool_lock = 0
        freeme = 0
        __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#3  0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#4  0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 7 (Thread 0x7f128d984700 (LWP 14664)):
#0  0x00007f3a93acd68c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f3a94fe2c2f in ldap_pvt_thread_cond_wait (cond=0x2d36038,
mutex=0x2d36010) at thr_posix.c:277
No locals.
#2  0x00007f3a94fe147d in ldap_int_thread_pool_wrapper (xpool=0x2d36000) at
tpool.c:938
        pq = 0x2d36000
        pool = 0x2efa180
        task = 0x0
        work_list = 0x2d36070
        ctx = {ltu_pq = 0x2d36000, ltu_id = 139717661705984, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x52c8ec0, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
              ltk_key = 0x2f02d00, ltk_data = 0x54d2e00, ltk_free =
0x7f3a9000778b <mdb_reader_free>}, {ltk_key = 0x43a3eb, ltk_data = 0x3280b00, 
              ltk_free = 0x43a22f <conn_counter_destroy>}, {ltk_key = 0x455939,
ltk_data = 0x6b38000, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key =
0x7f3a8fffc5b7, 
              ltk_data = 0xbb42000, ltk_free = 0x7f3a8fffc594
<search_stack_free>}, {ltk_key = 0x7f3a8fff9071, ltk_data = 0xb842000, 
              ltk_free = 0x7f3a8fff9029 <scope_chunk_free>}, {ltk_key =
0x2f03400, ltk_data = 0xa51c800, ltk_free = 0x7f3a9000778b <mdb_reader_free>},
{ltk_key = 0x0, 
              ltk_data = 0x1384b200, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
        kctx = 0x0
        i = 32
        keyslot = 189
        hash = 1589063869
        pool_lock = 0
        freeme = 0
        __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#3  0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#4  0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 6 (Thread 0x7f128d183700 (LWP 14665)):
#0  0x00007f3a93acd68c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f3a94fe2c2f in ldap_pvt_thread_cond_wait (cond=0x2d36038,
mutex=0x2d36010) at thr_posix.c:277
No locals.
#2  0x00007f3a94fe147d in ldap_int_thread_pool_wrapper (xpool=0x2d36000) at
tpool.c:938
        pq = 0x2d36000
        pool = 0x2efa180
        task = 0x0
        work_list = 0x2d36070
        ctx = {ltu_pq = 0x2d36000, ltu_id = 139717653313280, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x52c8200, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
              ltk_key = 0x2f03400, ltk_data = 0x54cfa00, ltk_free =
0x7f3a9000778b <mdb_reader_free>}, {ltk_key = 0x7f3a8fffc5b7, ltk_data =
0x58e0000, 
              ltk_free = 0x7f3a8fffc594 <search_stack_free>}, {ltk_key =
0x7f3a8fff9071, ltk_data = 0x55e0000, ltk_free = 0x7f3a8fff9029
<scope_chunk_free>}, {
              ltk_key = 0x43a3eb, ltk_data = 0x3280200, ltk_free = 0x43a22f
<conn_counter_destroy>}, {ltk_key = 0x455939, ltk_data = 0x34e9800, 
              ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key = 0x2f02d00,
ltk_data = 0xa466000, ltk_free = 0x7f3a9000778b <mdb_reader_free>}, {ltk_key =
0x0, 
              ltk_data = 0xb5e7600, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
        kctx = 0x0
        i = 32
        keyslot = 301
        hash = 3114775853
        pool_lock = 0
        freeme = 0
        __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#3  0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#4  0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 5 (Thread 0x7f128c982700 (LWP 14666)):
#0  0x00007f3a93acd68c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f3a94fe2c2f in ldap_pvt_thread_cond_wait (cond=0x2d36038,
mutex=0x2d36010) at thr_posix.c:277
No locals.
#2  0x00007f3a94fe147d in ldap_int_thread_pool_wrapper (xpool=0x2d36000) at
tpool.c:938
        pq = 0x2d36000
        pool = 0x2efa180
        task = 0x0
        work_list = 0x2d36070
        ctx = {ltu_pq = 0x2d36000, ltu_id = 139717644920576, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x52c81c0, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
              ltk_key = 0x2f03400, ltk_data = 0x54ce000, ltk_free =
0x7f3a9000778b <mdb_reader_free>}, {ltk_key = 0x2f02d00, ltk_data = 0x54d6200, 
              ltk_free = 0x7f3a9000778b <mdb_reader_free>}, {ltk_key = 0x43a3eb,
ltk_data = 0x3280900, ltk_free = 0x43a22f <conn_counter_destroy>}, {ltk_key =
0x455939, 
              ltk_data = 0xa52d800, ltk_free = 0x45588c <slap_op_q_destroy>},
{ltk_key = 0x7f3a8fffc5b7, ltk_data = 0x9440000, ltk_free = 0x7f3a8fffc594
<search_stack_free>}, {
              ltk_key = 0x7f3a8fff9071, ltk_data = 0x9140000, ltk_free =
0x7f3a8fff9029 <scope_chunk_free>}, {ltk_key = 0x0, ltk_data = 0xdd44800,
ltk_free = 0}, {
              ltk_key = 0x0, ltk_data = 0x0, ltk_free = 0} <repeats 24 times>}}
        kctx = 0x0
        i = 32
        keyslot = 92
        hash = 3210645596
        pool_lock = 0
        freeme = 0
        __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#3  0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#4  0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 4 (Thread 0x7f128c181700 (LWP 20290)):
#0  0x00007f3a93acd68c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f3a94fe2c2f in ldap_pvt_thread_cond_wait (cond=0x2d36038,
mutex=0x2d36010) at thr_posix.c:277
No locals.
#2  0x00007f3a94fe147d in ldap_int_thread_pool_wrapper (xpool=0x2d36000) at
tpool.c:938
        pq = 0x2d36000
        pool = 0x2efa180
        task = 0x0
        work_list = 0x2d36070
        ctx = {ltu_pq = 0x2d36000, ltu_id = 139717636527872, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x52c8980, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
              ltk_key = 0x43a3eb, ltk_data = 0x3281100, ltk_free = 0x43a22f
<conn_counter_destroy>}, {ltk_key = 0x455939, ltk_data = 0xffefc00, 
              ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key = 0x2f02d00,
ltk_data = 0xa517a00, ltk_free = 0x7f3a9000778b <mdb_reader_free>}, {ltk_key =
0x7f3a8fffc5b7, 
              ltk_data = 0xcb42000, ltk_free = 0x7f3a8fffc594
<search_stack_free>}, {ltk_key = 0x7f3a8fff9071, ltk_data = 0xa852000, 
              ltk_free = 0x7f3a8fff9029 <scope_chunk_free>}, {ltk_key =
0x2f03400, ltk_data = 0xa51e200, ltk_free = 0x7f3a9000778b <mdb_reader_free>},
{ltk_key = 0x0, 
              ltk_data = 0x11699600, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
        kctx = 0x0
        i = 32
        keyslot = 204
        hash = 441390284
        pool_lock = 0
        freeme = 0
        __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#3  0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#4  0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 3 (Thread 0x7f128b980700 (LWP 32177)):
#0  0x00007f3a93acd68c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f3a94fe2c2f in ldap_pvt_thread_cond_wait (cond=0x2d36038,
mutex=0x2d36010) at thr_posix.c:277
No locals.
#2  0x00007f3a94fe147d in ldap_int_thread_pool_wrapper (xpool=0x2d36000) at
tpool.c:938
        pq = 0x2d36000
        pool = 0x2efa180
        task = 0x0
        work_list = 0x2d36070
        ctx = {ltu_pq = 0x2d36000, ltu_id = 139717628135168, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0xde2cf00, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
              ltk_key = 0x2f02d00, ltk_data = 0xa46e200, ltk_free =
0x7f3a9000778b <mdb_reader_free>}, {ltk_key = 0x43a3eb, ltk_data = 0x329a400, 
              ltk_free = 0x43a22f <conn_counter_destroy>}, {ltk_key = 0x455939,
ltk_data = 0x1001a800, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key =
0x7f3a8fffc5b7, 
              ltk_data = 0xe382000, ltk_free = 0x7f3a8fffc594
<search_stack_free>}, {ltk_key = 0x7f3a8fff9071, ltk_data = 0xe082000, 
              ltk_free = 0x7f3a8fff9029 <scope_chunk_free>}, {ltk_key =
0x2f03400, ltk_data = 0xa51ae00, ltk_free = 0x7f3a9000778b <mdb_reader_free>},
{ltk_key = 0x0, 
              ltk_data = 0x10034000, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
        kctx = 0x0
        i = 32
        keyslot = 1019
        hash = 537260027
        pool_lock = 0
        freeme = 0
        __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#3  0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#4  0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 2 (Thread 0x7f128b17f700 (LWP 11844)):
#0  0x00007f3a93acd68c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f3a94fe2c2f in ldap_pvt_thread_cond_wait (cond=0x2d36038,
mutex=0x2d36010) at thr_posix.c:277
No locals.
#2  0x00007f3a94fe147d in ldap_int_thread_pool_wrapper (xpool=0x2d36000) at
tpool.c:938
        pq = 0x2d36000
        pool = 0x2efa180
        task = 0x0
        work_list = 0x2d36070
        ctx = {ltu_pq = 0x2d36000, ltu_id = 139717619742464, ltu_key = {{ltk_key
= 0x43a3eb, ltk_data = 0x2f04100, ltk_free = 0x43a22f <conn_counter_destroy>},
{
              ltk_key = 0x4ae533, ltk_data = 0xaf35fc0, ltk_free = 0x4ae358
<slap_sl_mem_destroy>}, {ltk_key = 0x455939, ltk_data = 0xaf0f800, 
              ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key = 0x2f02d00,
ltk_data = 0xb810200, ltk_free = 0x7f3a9000778b <mdb_reader_free>}, {ltk_key =
0x7f3a8fffc5b7, 
              ltk_data = 0x117ca000, ltk_free = 0x7f3a8fffc594
<search_stack_free>}, {ltk_key = 0x7f3a8fff9071, ltk_data = 0x10626000, 
              ltk_free = 0x7f3a8fff9029 <scope_chunk_free>}, {ltk_key =
0x2f03400, ltk_data = 0xfdd6000, ltk_free = 0x7f3a9000778b <mdb_reader_free>},
{ltk_key = 0x0, 
              ltk_data = 0xb76a400, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
        kctx = 0x0
        i = 32
        keyslot = 10
        hash = 1926945802
        pool_lock = 0
        freeme = 0
        __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#3  0x00007f3a93ac9aa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#4  0x00007f3a9381693d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 1 (Thread 0x7f3a95690720 (LWP 14658)):
#0  0x00007f3a93aca2fd in pthread_join () from /lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f3a94fe2b70 in ldap_pvt_thread_join (thread=139717686884096,
thread_return=0x0) at thr_posix.c:197
No locals.
#2  0x000000000043785a in slapd_daemon () at daemon.c:2910
        i = 0
        rc = 0
#3  0x0000000000414c02 in main (argc=9, argv=0x7fff2a3e4818) at main.c:1017
        i = 9
        no_detach = 0
        rc = 0
        urls = 0x2cf4020 "ldap://0.0.0.0:389 ldapi:///"
        username = 0x2cf8018 "TRUE"
        groupname = 0x0
        sandbox = 0x0
        syslogUser = 128
        pid = 0
        waitfds = {9, 10}
        g_argc = 9
        g_argv = 0x7fff2a3e4818
        configfile = 0x0
        configdir = 0x2cf4060 "/opt/zimbra/data/ldap/config"
        serverName = 0x7fff2a3e4deb "slapd"
        serverMode = 1
        scp = 0x0
        scp_entry = 0x0
        debug_unknowns = 0x0
        syslog_unknowns = 0x0
        serverNamePrefix = 0x4f2f08 ""
        l = 5188080
        slapd_pid_file_unlink = 1
        slapd_args_file_unlink = 1
        firstopt = 0
        __PRETTY_FUNCTION__ = "main"
(gdb) 


Example backtrace from the master.  All threads are paused except thread 5 which
is the active write op:

(gdb) thr apply all bt full

Thread 10 (Thread 0x7f61102bc700 (LWP 18918)):
#0  0x00007f891494bf33 in epoll_wait () from /lib64/libc.so.6
No symbol table info available.
#1  0x00000000004366ff in slapd_daemon_task (ptr=0x2093eb8) at daemon.c:2517
        ns = 1
        at = 0
        nfds = 1109
        revents = 0x2134000
        tvp = 0x7f61102bbd80
        cat = {tv_sec = 1496211098, tv_usec = 0}
        i = 1
        nwriters = 0
        now = 1496210912
        tv = {tv_sec = 186, tv_usec = 0}
        tdelta = 1
        rtask = 0x20c5360
        l = 2
        last_idle_check = 1495145198
        ebadf = 0
        tid = 0
#2  0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#3  0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 9 (Thread 0x7f610fabb700 (LWP 18919)):
#0  0x00007f8914c0268c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f8916117c2f in ldap_pvt_thread_cond_wait (cond=0x2722808,
mutex=0x27227e0) at thr_posix.c:277
No locals.
#2  0x00007f891611478a in ldap_pvt_thread_rmutex_lock (rmutex=0x2469b28,
owner=140054851467008) at rmutex.c:129
        rm = 0x27227e0
        __PRETTY_FUNCTION__ = "ldap_pvt_thread_rmutex_lock"
#3  0x00007f8910adafcf in accesslog_op_mod (op=0x1178ac00, rs=0x7f610fabaa00) at
accesslog.c:1984
        cb = 0x5c9a4c8
        cb2 = 0x7f610fab94e0
        on = 0x260cd20
        li = 0x2469ac0
        lo = 0x7f8910cdfb70
        logop = 2
        doit = 1
#4  0x00000000004cec1d in overlay_op_walk (op=0x1178ac00, rs=0x7f610fabaa00,
which=op_modify, oi=0x260c780, on=0x260cd20) at backover.c:661
        func = 0x260cd78
        rc = 32768
#5  0x00000000004ceee8 in over_op_func (op=0x1178ac00, rs=0x7f610fabaa00,
which=op_modify) at backover.c:730
        oi = 0x260c780
        on = 0x260c960
        be = 0x25fc4e0
        db = {bd_info = 0x260cd20, bd_self = 0x25fc4e0, 
          be_ctrls =
"\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001",
'\000' <repeats 14 times>, "\001", be_flags = 563464, be_restrictops = 0, 
          be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls
= 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls
= 0, 
            sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x25c20c0,
be_nsuffix = 0x25c2100, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn =
{bv_len = 0, 
            bv_val = 0x0}, be_rootdn = {bv_len = 9, bv_val = 0x2588440
"cn=config"}, be_rootndn = {bv_len = 9, bv_val = 0x2588460 "cn=config"},
be_rootpw = {bv_len = 0, 
            bv_val = 0x0}, be_max_deref_depth = 15, be_def_limit = {lms_t_soft =
-1, lms_t_hard = 0, lms_s_soft = -1, lms_s_hard = 0, lms_s_unchecked = -1,
lms_s_pr = 0, 
            lms_s_pr_hide = 0, lms_s_pr_total = 0}, be_limits = 0x0, be_acl =
0x25f1880, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn =
{bv_len = 0, 
            bv_val = 0x0}, be_update_refs = 0x0, be_pending_csn_list =
0x2629980, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
__nusers = 0, __kind = 0, 
              __spins = 0, __list = {__prev = 0x0, __next = 0x0}}, __size =
'\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x2418680, be_pb = 0x0, 
          be_cf_ocs = 0x7f8911361180, be_private = 0x297a000, be_next =
{stqe_next = 0x0}}
        cb = {sc_next = 0x5c9a4c8, sc_response = 0x4cdc92 <over_back_response>,
sc_cleanup = 0, sc_writewait = 0, sc_private = 0x260c780}
        sc = 0x7f610fab96e0
        rc = 32768
        __PRETTY_FUNCTION__ = "over_op_func"
#6  0x00000000004cf024 in over_op_modify (op=0x1178ac00, rs=0x7f610fabaa00) at
backover.c:769
No locals.
#7  0x000000000045b18e in fe_op_modify (op=0x1178ac00, rs=0x7f610fabaa00) at
modify.c:303
        update = 0
        repl_user = 0
        op_be = 0x25fc4e0
        bd = 0x75a900
        textbuf = "\024\000\000\000\021\000\000\000\000)+\002\000\000\000\000\300\227\253\017a\177\000\000)\034F",
'\000' <repeats 13 times>"\340,
\235\016\021\000\000\000\000`\323\317\017\000\000\000\000\000v+\002\000\000\000\000\000\235B\002\000\000\000\000\002\000\000\000\000\000\000\000\300\062\241\021\000\000\000\000\300\227\253\017a\177",
'\000' <repeats 18 times>, "\017\000\000\000\000\000\000\000\020\353\071\020",
'\000' <repeats 12 times>, "
\000\000\000\000\000\000\000&#1047;\253\017a\177\000\000\000\000\000\000\000\000\000\000`\230\253\017a\177\000\000&#1851;E",
'\000' <repeats 14 times>,
"\001\000\000\000\000\000\000\220\250\253\017a\177\000\000 \252\253\017a\177",
'\000' <repeats 11 times>"\254,
x\021\000\000\000\000`\230\253\017a\177\000\000\065yE\000\000\000\000\000\060\230\253\017a\177\000\000\200"...
        textlen = 256
#8  0x000000000045aa60 in do_modify (op=0x1178ac00, rs=0x7f610fabaa00) at
modify.c:177
        dn = {bv_len = 48, bv_val = 0x10061b87
"uid=gerald,ou=people,dc=xxxxxxxx,dc=co,dc=za"}
        textbuf = "\240\250\253\017a\177\000\000\000\000\000\000\000\000\000\000p\251\253\017a\177\000\000\020\330\373\020\000\000\000\000\377\377\377\377\377\377\377\377\271\317\311\000\000\000\000\000\006\000\000\000\000\000\000\000\354\006\360\025\211\177\000\000
\251\253\017a\177\000\000Z\373\357\025\211\177\000\000\000\000\000\000\000\000\000\000\b\---Type
<return> to continue, or q <return> to quit---
000\000\000\000\000\000\000\317\372\004\020\000\000\000\000
\342h\022\000\000\000\000\200$f\004", '\000' <repeats 12 times>"\200,
$f\004\000\000\000\000x\251\253\017a\177\000\000\063\345J\000\000\000\000\000\060\253\253\017a\177\000\000\060\253\253\017a\177\000\000\300\372\004\020\001\000\000\000&#1065;\253\017a\177\000\000\022\346J\000\000\000\000\000p\251\253\017\001\000\000\000\060\253\253\017a\177\000\000\000\000\000\000\001\000\000\000\000\000\020",
'\000' <repeats 13 times>"\200,
$f\004\000\000\000\000\200$f\004\000\000\000\000\060\253\253\017a\177\000"
        textlen = 256
        tmp = 0x0
#9  0x000000000043a89a in connection_operation (ctx=0x7f610fabab30,
arg_v=0x1178ac00) at connection.c:1135
        rc = 80
        cancel = 0
        op = 0x1178ac00
        rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0,
sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un =
{sru_search = {r_entry = 0x0, 
              r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0,
r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended =
{r_rspoid = 0x0, 
              r_rspdata = 0x0}}, sr_flags = 0}
        tag = 102
        opidx = SLAP_OP_MODIFY
        conn = 0x2afc840
        memctx = 0x4662480
        memctx_null = 0x0
        memsiz = 1048576
        __PRETTY_FUNCTION__ = "connection_operation"
#10 0x000000000043ae3b in connection_read_thread (ctx=0x7f610fabab30,
argv=0x403) at connection.c:1271
        rc = 0
        cri = {op = 0x1178ac00, func = 0, arg = 0x0, ctx = 0x7f610fabab30,
nullop = 0}
        s = 1027
#11 0x00007f8916116552 in ldap_int_thread_pool_wrapper (xpool=0x20d0000) at
tpool.c:956
        pq = 0x20d0000
        pool = 0x2294180
        task = 0xfd71980
        work_list = 0x20d0070
        ctx = {ltu_pq = 0x20d0000, ltu_id = 140054851467008, ltu_key = {{ltk_key
= 0x43a3eb, ltk_data = 0x261ad00, ltk_free = 0x43a22f <conn_counter_destroy>},
{
              ltk_key = 0x4ae533, ltk_data = 0x4662480, ltk_free = 0x4ae358
<slap_sl_mem_destroy>}, {ltk_key = 0x229cd00, ltk_data = 0x498ce00, 
              ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key = 0x455939,
ltk_data = 0x0, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key =
0x7f89111315b7, 
              ltk_data = 0x87c2000, ltk_free = 0x7f8911131594
<search_stack_free>}, {ltk_key = 0x7f891112e071, ltk_data = 0x84c2000, 
              ltk_free = 0x7f891112e029 <scope_chunk_free>}, {ltk_key =
0x229d400, ltk_data = 0x9857a00, ltk_free = 0x7f891113c78b <mdb_reader_free>},
{ltk_key = 0x0, 
              ltk_data = 0xdd55600, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
        kctx = 0x0
        i = 32
        keyslot = 17
        hash = 2893171729
        pool_lock = 0
        freeme = 0
        __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#12 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#13 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 8 (Thread 0x7f610f2ba700 (LWP 18920)):
#0  0x00007f8914c0268c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f8916117c2f in ldap_pvt_thread_cond_wait (cond=0x2722808,
mutex=0x27227e0) at thr_posix.c:277
No locals.
#2  0x00007f891611478a in ldap_pvt_thread_rmutex_lock (rmutex=0x2469b28,
owner=140054843074304) at rmutex.c:129
        rm = 0x27227e0
        __PRETTY_FUNCTION__ = "ldap_pvt_thread_rmutex_lock"
#3  0x00007f8910adafcf in accesslog_op_mod (op=0x1055e800, rs=0x7f610f2b9a00) at
accesslog.c:1984
        cb = 0x46684c8
        cb2 = 0x7f610f2b84e0
        on = 0x260cd20
        li = 0x2469ac0
        lo = 0x7f8910cdfb70
        logop = 2
        doit = 1
#4  0x00000000004cec1d in overlay_op_walk (op=0x1055e800, rs=0x7f610f2b9a00,
which=op_modify, oi=0x260c780, on=0x260cd20) at backover.c:661
        func = 0x260cd78
        rc = 32768
#5  0x00000000004ceee8 in over_op_func (op=0x1055e800, rs=0x7f610f2b9a00,
which=op_modify) at backover.c:730
        oi = 0x260c780
        on = 0x260c960
        be = 0x25fc4e0
        db = {bd_info = 0x260cd20, bd_self = 0x25fc4e0, 
          be_ctrls =
"\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001",
'\000' <repeats 14 times>, "\001", be_flags = 563464, be_restrictops = 0, 
          be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls
= 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls
= 0, 
            sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x25c20c0,
be_nsuffix = 0x25c2100, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn =
{bv_len = 0, 
            bv_val = 0x0}, be_rootdn = {bv_len = 9, bv_val = 0x2588440
"cn=config"}, be_rootndn = {bv_len = 9, bv_val = 0x2588460 "cn=config"},
be_rootpw = {bv_len = 0, 
            bv_val = 0x0}, be_max_deref_depth = 15, be_def_limit = {lms_t_soft =
-1, lms_t_hard = 0, lms_s_soft = -1, lms_s_hard = 0, lms_s_unchecked = -1,
lms_s_pr = 0, 
            lms_s_pr_hide = 0, lms_s_pr_total = 0}, be_limits = 0x0, be_acl =
0x25f1880, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn =
{bv_len = 0, 
            bv_val = 0x0}, be_update_refs = 0x0, be_pending_csn_list =
0x2629980, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
__nusers = 0, __kind = 0, 
              __spins = 0, __list = {__prev = 0x0, __next = 0x0}}, __size =
'\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x2418680, be_pb = 0x0, 
          be_cf_ocs = 0x7f8911361180, be_private = 0x297a000, be_next =
{stqe_next = 0x0}}
        cb = {sc_next = 0x46684c8, sc_response = 0x4cdc92 <over_back_response>,
sc_cleanup = 0, sc_writewait = 0, sc_private = 0x260c780}
        sc = 0x7f610f2b86e0
        rc = 32768
        __PRETTY_FUNCTION__ = "over_op_func"
#6  0x00000000004cf024 in over_op_modify (op=0x1055e800, rs=0x7f610f2b9a00) at
backover.c:769
No locals.
#7  0x000000000045b18e in fe_op_modify (op=0x1055e800, rs=0x7f610f2b9a00) at
modify.c:303
        update = 0
        repl_user = 0
        op_be = 0x25fc4e0
        bd = 0x75a900
        textbuf = "\024\000\000\000\021\000\000\000\000)+\002\000\000\000\000\300\207+\017a\177\000\000)\034F",
'\000' <repeats 13 times>"\240,
{S\020\000\000\000\000\240uS\020\000\000\000\000\000v+\002\000\000\000\000\000\235B\002\000\000\000\000\002\000\000\000\000\000\000\000\000\063\352\r\000\000\000\000\300\207+\017a\177",
'\000' <repeats 18 times>, "\017\000\000\000\000\000\000\000\220@\313\021",
'\000' <repeats 12 times>, "
\000\000\000\000\000\000\000&#1031;+\017a\177\000\000\000\000\000\000\000\000\000\000`\210+\017a\177\000\000&#1851;E",
'\000' <repeats 14 times>,
"\001\000\000\000\000\000\000\220\230+\017a\177\000\000 \232+\017a\177", '\000'
<repeats 11 times>"\350,
U\020\000\000\000\000`\210+\017a\177\000\000\065yE\000\000\000\000\000"...
        textlen = 256
#8  0x000000000045aa60 in do_modify (op=0x1055e800, rs=0x7f610f2b9a00) at
modify.c:177
        dn = {bv_len = 47, bv_val = 0x1064f967
"uid=lionel.xxxxxxxx,ou=people,dc=xxxxxxxxxx,dc=co,dc=za"}
        textbuf = "\240\230+\017a\177\000\000\000\000\000\000\000\000\000\000p\231+\017a\177\000\000
h\201\020\000\000\000\000\377\377\377\377\377\377\377\377\376\315\311\000\000\000\000\000\004\000\000\000\000\000\000\000\354\006\360\025\211\177\000\000
\231+\017a\177\000\000Z\373\357\025\211\177\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000O]\246\020\000\000\000\000\320O\231\020\000\000\000\000\300!f\004",
'\000' <repeats 12 times>"\300,
!f\004\000\000\000\000x\231+\017a\177\000\000\063\345J\000\000\000\000\000\060\233+\017a\177\000\000\060\233+\017a\177\000\000@]\246\020\000\000\000\000&#1049;+\017a\177\000\000\022\346J\000\000\000\000\000p\231+\017\001\000\000\000\060\233+\017a\177\000\000\000\000\000\000\001\000\000\000\000\000\020",
'\000' <repeats 13 times>"\300, !f\004\000\000\000\000\300!f"...
        textlen = 256
        tmp = 0x0
#9  0x000000000043a89a in connection_operation (ctx=0x7f610f2b9b30,
arg_v=0x1055e800) at connection.c:1135
        rc = 80
        cancel = 0
        op = 0x1055e800
        rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0,
sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un =
{sru_search = {r_entry = 0x0, 
              r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0,
r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended =
{r_rspoid = 0x0, 
              r_rspdata = 0x0}}, sr_flags = 0}
        tag = 102
        opidx = SLAP_OP_MODIFY
        conn = 0x2a94300
        memctx = 0x46621c0
        memctx_null = 0x0
        memsiz = 1048576
        __PRETTY_FUNCTION__ = "connection_operation"
#10 0x000000000043ae3b in connection_read_thread (ctx=0x7f610f2b9b30,
argv=0x1a4) at connection.c:1271
        rc = 0
        cri = {op = 0x1055e800, func = 0, arg = 0x0, ctx = 0x7f610f2b9b30,
nullop = 0}
        s = 420
#11 0x00007f8916116552 in ldap_int_thread_pool_wrapper (xpool=0x20d0000) at
tpool.c:956
        pq = 0x20d0000
        pool = 0x2294180
        task = 0xfe6e2e0
        work_list = 0x20d0070
        ctx = {ltu_pq = 0x20d0000, ltu_id = 140054843074304, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x46621c0, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
              ltk_key = 0x229d400, ltk_data = 0x4989a00, ltk_free =
0x7f891113c78b <mdb_reader_free>}, {ltk_key = 0x43a3eb, ltk_data = 0x261ac00, 
              ltk_free = 0x43a22f <conn_counter_destroy>}, {ltk_key = 0x229cd00,
ltk_data = 0x498e800, ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key =
0x455939, 
              ltk_data = 0x0, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key
= 0x7f89111315b7, ltk_data = 0x9dea000, ltk_free = 0x7f8911131594
<search_stack_free>}, {
              ltk_key = 0x7f891112e071, ltk_data = 0x9aea000, ltk_free =
0x7f891112e029 <scope_chunk_free>}, {ltk_key = 0x0, ltk_data = 0x11d48800,
ltk_free = 0}, {
              ltk_key = 0x0, ltk_data = 0x0, ltk_free = 0} <repeats 24 times>}}
        kctx = 0x0
        i = 32
        keyslot = 129
        hash = 123916417
        pool_lock = 0
        freeme = 0
        __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#12 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#13 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 7 (Thread 0x7f610eab9700 (LWP 18921)):
#0  0x00007f8914c0268c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f8916117c2f in ldap_pvt_thread_cond_wait (cond=0x2722808,
mutex=0x27227e0) at thr_posix.c:277
No locals.
#2  0x00007f891611478a in ldap_pvt_thread_rmutex_lock (rmutex=0x2469b28,
owner=140054834681600) at rmutex.c:129
        rm = 0x27227e0
        __PRETTY_FUNCTION__ = "ldap_pvt_thread_rmutex_lock"
#3  0x00007f8910adafcf in accesslog_op_mod (op=0xfeacc00, rs=0x7f610eab8a00) at
accesslog.c:1984
        cb = 0x47684b8
        cb2 = 0x7f610eab74e0
        on = 0x260cd20
        li = 0x2469ac0
        lo = 0x7f8910cdfb70
        logop = 2
        doit = 1
#4  0x00000000004cec1d in overlay_op_walk (op=0xfeacc00, rs=0x7f610eab8a00,
which=op_modify, oi=0x260c780, on=0x260cd20) at backover.c:661
        func = 0x260cd78
        rc = 32768
#5  0x00000000004ceee8 in over_op_func (op=0xfeacc00, rs=0x7f610eab8a00,
which=op_modify) at backover.c:730
        oi = 0x260c780
        on = 0x260c960
        be = 0x25fc4e0
        db = {bd_info = 0x260cd20, bd_self = 0x25fc4e0, 
          be_ctrls =
"\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001",
'\000' <repeats 14 times>, "\001", be_flags = 563464, be_restrictops = 0, 
          be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls
= 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls
= 0, 
            sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x25c20c0,
be_nsuffix = 0x25c2100, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn =
{bv_len = 0, 
            bv_val = 0x0}, be_rootdn = {bv_len = 9, bv_val = 0x2588440
"cn=config"}, be_rootndn = {bv_len = 9, bv_val = 0x2588460 "cn=config"},
be_rootpw = {bv_len = 0, 
            bv_val = 0x0}, be_max_deref_depth = 15, be_def_limit = {lms_t_soft =
-1, lms_t_hard = 0, lms_s_soft = -1, lms_s_hard = 0, lms_s_unchecked = -1,
lms_s_pr = 0, 
            lms_s_pr_hide = 0, lms_s_pr_total = 0}, be_limits = 0x0, be_acl =
0x25f1880, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn =
{bv_len = 0, 
            bv_val = 0x0}, be_update_refs = 0x0, be_pending_csn_list =
0x2629980, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
__nusers = 0, __kind = 0, 
              __spins = 0, __list = {__prev = 0x0, __next = 0x0}}, __size =
'\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x2418680, be_pb = 0x0, 
          be_cf_ocs = 0x7f8911361180, be_private = 0x297a000, be_next =
{stqe_next = 0x0}}
        cb = {sc_next = 0x47684b8, sc_response = 0x4cdc92 <over_back_response>,
sc_cleanup = 0, sc_writewait = 0, sc_private = 0x260c780}
        sc = 0x7f610eab76e0
        rc = 32768
        __PRETTY_FUNCTION__ = "over_op_func"
#6  0x00000000004cf024 in over_op_modify (op=0xfeacc00, rs=0x7f610eab8a00) at
backover.c:769
No locals.
#7  0x000000000045b18e in fe_op_modify (op=0xfeacc00, rs=0x7f610eab8a00) at
modify.c:303
        update = 0
        repl_user = 0
        op_be = 0x25fc4e0
        bd = 0x75a900
        textbuf = "\024\000\000\000\021\000\000\000\000)+\002\000\000\000\000\300w\253\016a\177\000\000)\034F",
'\000' <repeats 13 times>"\300,
'\314\020\000\000\000\000\240\217\214\017\000\000\000\000\000v+\002\000\000\000\000\000\235B\002\000\000\000\000\002\000\000\000\000\000\000\000@\227l\020\000\000\000\000\300w\253\016a\177",
'\000' <repeats 18 times>, "\017\000\000\000\000\000\000\000\360~\355\017",
'\000' <repeats 12 times>, "
\000\000\000\000\000\000\000\320w\253\016a\177\000\000\000\000\000\000\000\000\000\000`x\253\016a\177\000\000&#1851;E",
'\000' <repeats 14 times>,
"\001\000\000\000\000\000\000\220\210\253\016a\177\000\000 \212\253\016a\177",
'\000' <repeats 11 times>"\314,
\352\017\000\000\000\000`x\253\016a\177\000\000\065yE\000\000\000\000\000\005\000\000\000\000\000\000\000\000"...
        textlen = 256
#8  0x000000000045aa60 in do_modify (op=0xfeacc00, rs=0x7f610eab8a00) at
modify.c:177
        dn = {bv_len = 45, bv_val = 0x27252c7
"uid=brianvxxxxxx,ou=people,dc=xxxxxxxxx,dc=co,dc=za"}
        textbuf = "\240\210\253\016a\177\000\000p\002i\022\000\000\000\000p\211\253\016a\177\000\000\200Y\243\020\000\000\000\000\377\377\377\377\377\377\377\377\266\316\311\000\---Type
<return> to continue, or q <return> to quit---
000\000\000\000\006\000\000\000\000\000\000\000\354\006\360\025\211\177\000\000
\211\253\016a\177\000\000Z\373\357\025\211\177\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000&#1008;\003\v\000\000\000\000\320\306\333\021\000\000\000\000\000\"f\004",
'\000' <repeats 13 times>,
"\"f\004\000\000\000\000x\211\253\016a\177\000\000\063\345J\000\000\000\000\000\060\213\253\016a\177\000\000\060\213\253\016a\177\000\000\300\260\003\v\000\000\000\000&#1033;\253\016a\177\000\000\022\346J\000\000\000\000\000p\211\253\016\001\000\000\000\060\213\253\016a\177\000\000\000\000\000\000\001\000\000\000\000\000\020",
'\000' <repeats 14 times>,
"\"f\004\000\000\000\000\000\"f\004\000\000\000\000\060\213\253\016a\177\000"
        textlen = 256
        tmp = 0x0
#9  0x000000000043a89a in connection_operation (ctx=0x7f610eab8b30,
arg_v=0xfeacc00) at connection.c:1135
        rc = 80
        cancel = 0
        op = 0xfeacc00
        rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0,
sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un =
{sru_search = {r_entry = 0x0, 
              r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0,
r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended =
{r_rspoid = 0x0, 
              r_rspdata = 0x0}}, sr_flags = 0}
        tag = 102
        opidx = SLAP_OP_MODIFY
        conn = 0x2ac9fc0
        memctx = 0x4662200
        memctx_null = 0x0
        memsiz = 1048576
        __PRETTY_FUNCTION__ = "connection_operation"
#10 0x000000000043ae3b in connection_read_thread (ctx=0x7f610eab8b30,
argv=0x2dd) at connection.c:1271
        rc = 0
        cri = {op = 0xfeacc00, func = 0, arg = 0x0, ctx = 0x7f610eab8b30, nullop
= 0}
        s = 733
#11 0x00007f8916116552 in ldap_int_thread_pool_wrapper (xpool=0x20d0000) at
tpool.c:956
        pq = 0x20d0000
        pool = 0x2294180
        task = 0x101f22a0
        work_list = 0x20d0070
        ctx = {ltu_pq = 0x20d0000, ltu_id = 140054834681600, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x4662200, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
              ltk_key = 0x229d400, ltk_data = 0x4988000, ltk_free =
0x7f891113c78b <mdb_reader_free>}, {ltk_key = 0x7f89111315b7, ltk_data =
0x4c92000, 
              ltk_free = 0x7f8911131594 <search_stack_free>}, {ltk_key =
0x7f891112e071, ltk_data = 0x4992000, ltk_free = 0x7f891112e029
<scope_chunk_free>}, {
              ltk_key = 0x43a3eb, ltk_data = 0x261a800, ltk_free = 0x43a22f
<conn_counter_destroy>}, {ltk_key = 0x229cd00, ltk_data = 0x71a9a00, 
              ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key = 0x455939,
ltk_data = 0xb14e800, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key = 0x0,

              ltk_data = 0x99ab600, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
        kctx = 0x0
        i = 32
        keyslot = 1008
        hash = 222086128
        pool_lock = 0
        freeme = 0
        __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#12 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#13 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 6 (Thread 0x7f610e2b8700 (LWP 18922)):
#0  0x00007f8914c0268c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f8916117c2f in ldap_pvt_thread_cond_wait (cond=0x2722808,
mutex=0x27227e0) at thr_posix.c:277
No locals.
#2  0x00007f891611478a in ldap_pvt_thread_rmutex_lock (rmutex=0x2469b28,
owner=140054826288896) at rmutex.c:129
        rm = 0x27227e0
        __PRETTY_FUNCTION__ = "ldap_pvt_thread_rmutex_lock"
#3  0x00007f8910adafcf in accesslog_op_mod (op=0x11150400, rs=0x7f610e2b7a00) at
accesslog.c:1984
        cb = 0x486c4b8
        cb2 = 0x7f610e2b64e0
        on = 0x260cd20
        li = 0x2469ac0
        lo = 0x7f8910cdfb70
        logop = 2
        doit = 1
#4  0x00000000004cec1d in overlay_op_walk (op=0x11150400, rs=0x7f610e2b7a00,
which=op_modify, oi=0x260c780, on=0x260cd20) at backover.c:661
        func = 0x260cd78
        rc = 32768
#5  0x00000000004ceee8 in over_op_func (op=0x11150400, rs=0x7f610e2b7a00,
which=op_modify) at backover.c:730
        oi = 0x260c780
        on = 0x260c960
        be = 0x25fc4e0
        db = {bd_info = 0x260cd20, bd_self = 0x25fc4e0, 
          be_ctrls =
"\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001",
'\000' <repeats 14 times>, "\001", be_flags = 563464, be_restrictops = 0, 
          be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls
= 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls
= 0, 
            sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x25c20c0,
be_nsuffix = 0x25c2100, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn =
{bv_len = 0, 
            bv_val = 0x0}, be_rootdn = {bv_len = 9, bv_val = 0x2588440
"cn=config"}, be_rootndn = {bv_len = 9, bv_val = 0x2588460 "cn=config"},
be_rootpw = {bv_len = 0, 
            bv_val = 0x0}, be_max_deref_depth = 15, be_def_limit = {lms_t_soft =
-1, lms_t_hard = 0, lms_s_soft = -1, lms_s_hard = 0, lms_s_unchecked = -1,
lms_s_pr = 0, 
            lms_s_pr_hide = 0, lms_s_pr_total = 0}, be_limits = 0x0, be_acl =
0x25f1880, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn =
{bv_len = 0, 
            bv_val = 0x0}, be_update_refs = 0x0, be_pending_csn_list =
0x2629980, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
__nusers = 0, __kind = 0, 
              __spins = 0, __list = {__prev = 0x0, __next = 0x0}}, __size =
'\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x2418680, be_pb = 0x0, 
          be_cf_ocs = 0x7f8911361180, be_private = 0x297a000, be_next =
{stqe_next = 0x0}}
        cb = {sc_next = 0x486c4b8, sc_response = 0x4cdc92 <over_back_response>,
sc_cleanup = 0, sc_writewait = 0, sc_private = 0x260c780}
        sc = 0x7f610e2b66e0
        rc = 32768
        __PRETTY_FUNCTION__ = "over_op_func"
#6  0x00000000004cf024 in over_op_modify (op=0x11150400, rs=0x7f610e2b7a00) at
backover.c:769
No locals.
#7  0x000000000045b18e in fe_op_modify (op=0x11150400, rs=0x7f610e2b7a00) at
modify.c:303
        update = 0
        repl_user = 0
        op_be = 0x25fc4e0
        bd = 0x75a900
        textbuf = "\024\000\000\000\021\000\000\000\000)+\002\000\000\000\000\300g+\016a\177\000\000)\034F",
'\000' <repeats 13 times>, "@\227\016\021\000\000\000\000
\212\016\021\000\000\000\000\000v+\002\000\000\000\000\000\235B\002\000\000\000\000\002\000\000\000\000\000\000\000\200]\301\021\000\000\000\000\300g+\016a\177",
'\000' <repeats 18 times>, "\017\000\000\000\000\000\000\000\240\004\016\021",
'\000' <repeats 12 times>, "
\000\000\000\000\000\000\000\320g+\016a\177\000\000\000\000\000\000\000\000\000\000`h+\016a\177\000\000&#1851;E",
'\000' <repeats 14 times>, "\001\000\000\000\000\000\000\220x+\016a\177\000\000
z+\016a\177", '\000' <repeats 11 times>,
"\004\025\021\000\000\000\000`h+\016a"...
        textlen = 256
#8  0x000000000045aa60 in do_modify (op=0x11150400, rs=0x7f610e2b7a00) at
modify.c:177
        dn = {bv_len = 46, bv_val = 0x119b4d28
"uid=gerald,ou=people,dc=xxxxxxxxx,dc=co,dc=za"}
        textbuf = "\240x+\016a\177\000\000\360\204\251\021\000\000\000\000py+\016a\177\000\000P\205%\v\000\000\000\000\377\377\377\377\377\377\377\377\231Q\275\000\000\000\000\000\347\v\000\000\000\000\000\000\354\006\360\025\211\177\000\000
y+\016a\177\000\000Z\373\357\025\211\177\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000o\030(\v\000\000\000\000\340\264W\022\000\000\000\000@\"f\004",
'\000' <repeats 12 times>,
"@\"f\004\000\000\000\000xy+\016a\177\000\000\063\345J\000\000\000\000\000\060{+\016a\177\000\000\060{+\016a\177\000\000`\030(\v\000\000\000\000\320y+\016a\177\000\000\022\346J\000\000\000\000\000py+\016\001\000\000\000\060{+\016a\177\000\000\000\000\000\000\001\000\000\000\000\000\020",
'\000' <repeats 13 times>...
        textlen = 256
        tmp = 0x0
#9  0x000000000043a89a in connection_operation (ctx=0x7f610e2b7b30,
arg_v=0x11150400) at connection.c:1135
        rc = 80
        cancel = 0
        op = 0x11150400
        rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0,
sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un =
{sru_search = {r_entry = 0x0, 
              r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0,
r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended =
{r_rspoid = 0x0, 
              r_rspdata = 0x0}}, sr_flags = 0}
        tag = 102
        opidx = SLAP_OP_MODIFY
        conn = 0x2a6c500
        memctx = 0x4662240
        memctx_null = 0x0
        memsiz = 1048576
        __PRETTY_FUNCTION__ = "connection_operation"
#10 0x000000000043ae3b in connection_read_thread (ctx=0x7f610e2b7b30, argv=0xbc)
at connection.c:1271
        rc = 0
        cri = {op = 0x11150400, func = 0, arg = 0x0, ctx = 0x7f610e2b7b30,
nullop = 0}
        s = 188
#11 0x00007f8916116552 in ldap_int_thread_pool_wrapper (xpool=0x20d0000) at
tpool.c:956
        pq = 0x20d0000
        pool = 0x2294180
        task = 0xfc2dac0
        work_list = 0x20d0070
        ctx = {ltu_pq = 0x20d0000, ltu_id = 140054826288896, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0x4662240, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
              ltk_key = 0x229cd00, ltk_data = 0x498b400, ltk_free =
0x7f891113c78b <mdb_reader_free>}, {ltk_key = 0x43a3eb, ltk_data = 0x261ae00, 
              ltk_free = 0x43a22f <conn_counter_destroy>}, {ltk_key =
0x7f89111315b7, ltk_data = 0x609a000, ltk_free = 0x7f8911131594
<search_stack_free>}, {
              ltk_key = 0x7f891112e071, ltk_data = 0x5d9a000, ltk_free =
0x7f891112e029 <scope_chunk_free>}, {ltk_key = 0x455939, ltk_data = 0x11151000,

              ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key = 0x229d400,
ltk_data = 0x71b0200, ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key =
0x0, 
              ltk_data = 0xc8f8000, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
        kctx = 0x0
        i = 32
        keyslot = 96
        hash = 1747798112
        pool_lock = 0
        freeme = 0
        __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#12 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#13 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 5 (Thread 0x7f610dab7700 (LWP 18925)):
#0  0x00007f8911153c7a in mdb_midl_xmerge (idl=0x12ec2008, merge=0x7f6110b1b010)
at ./../../../libraries/liblmdb/midl.c:207
        old_id = 876237
        merge_id = 2291035
        i = 508
        j = 812516
        k = 813025
        total = 1138842
#1  0x00007f89111422f8 in mdb_page_alloc (mc=0x7f610dab4f80, num=212,
mp=0x7f610dab4a60) at ./../../../libraries/liblmdb/mdb.c:2215
        key = {mv_size = 8, mv_data = 0x7f6110c05d68}
        data = {mv_size = 4080, mv_data = 0x7f6110b1b010}
        leaf = 0x7f6110c05d60
        idl = 0x7f6110b1b010
        rc = 0
        retry = 10484
        txn = 0x4654000
        env = 0x229cd00
        pgno = 2290667
        mop = 0x12ec2008
        i = 509
        j = 32609
        mop_len = 1138333
        n2 = 211
        np = 0x7f6110c05000
        oldest = 139368742
        last = 139366008
        op = MDB_NEXT
        m2 = {mc_next = 0x0, mc_backup = 0x0, mc_xcursor = 0x0, mc_txn =
0x4654000, mc_dbi = 0, mc_db = 0x4654088, mc_dbx = 0x2622800, 
          mc_dbflag = 0x4655f00 "\b\030\032\030\031\032\032\031", '\032'
<repeats 32 times>, mc_snum = 3, mc_top = 2, mc_flags = 1, mc_pg =
{0x7f61216da000, 0x7f61216db000, 
            0x7f6110c05000, 0x7f610dab5170, 0x7f610dab4f80, 0x7f610dab4aa0,
0x7f8911146e37, 0x0, 0x100000000, 0x2622950, 0x7f610dab4cb0, 0x0,
0x7f610dab4f30, 0x7f610dab4c90, 
            0x7f891114972c, 0x0, 0x111f6d80, 0x0 <repeats 15 times>}, mc_ki =
{0, 29, 27, 0 <repeats 13 times>, 16384, 1125, 0, 0, 1, 0, 32609, 0, 16568,
1125, 0, 0, 10288, 
            610, 0, 0}}
        found_old = 0
#2  0x00007f891114bbc1 in mdb_page_new (mc=0x7f610dab4f80, flags=4, num=212,
mp=0x7f610dab4ac8) at ./../../../libraries/liblmdb/mdb.c:6940
        np = 0x0
        rc = 0
#3  0x00007f891114bfea in mdb_node_add (mc=0x7f610dab4f80, indx=3,
key=0x7f610dab5170, data=0x7f610dab5160, pgno=0, flags=65536) at
./../../../libraries/liblmdb/mdb.c:7081
        ovpages = 212
        rc = 0
        i = 32609
        node_size = 24
        room = 124
        ofs = 0
        node = 0x7f61217c6000
        mp = 0x7f61217c6000
        ofp = 0x0
        ndata = 0x7f610dab5170
        __FUNCTION__ = "mdb_node_add"
#4  0x00007f891114ae20 in mdb_cursor_put (mc=0x7f610dab4f80, key=0x7f610dab5170,
data=0x7f610dab5160, flags=65536) at ./../../../libraries/liblmdb/mdb.c:6697
        env = 0x229cd00
        leaf = 0x7f61217c6088
        fp = 0x5
        mp = 0x7f6121753a4d
        sub_root = 0x0
        fp_flags = 0
        xdata = {mv_size = 0, mv_data = 0x111f6f08}
        rdata = 0x7f610dab5160
        dkey = {mv_size = 0, mv_data = 0x7f610dab4d10}
        olddata = {mv_size = 867304, mv_data = 0x7f61217c6098}
        dummy = {md_pad = 229330192, md_flags = 0, md_depth = 0, md_branch_pages
= 0, md_leaf_pages = 287272712, md_overflow_pages = 140055149886356, 
          md_entries = 140054817885328, md_root = 140226673805067}
        do_sub = 0
        insert_key = 0
        insert_data = 0
        mcount = 0
        dcount = 0
        nospill = 0
        nsize = 26
        rc = 0
        rc2 = 0
        nflags = 65536
        __FUNCTION__ = "mdb_cursor_put"
#5  0x00007f891115257f in mdb_put (txn=0x4654000, dbi=4, key=0x7f610dab5170,
data=0x7f610dab5160, flags=65536) at ./../../../libraries/liblmdb/mdb.c:8771
        mc = {mc_next = 0x0, mc_backup = 0x0, mc_xcursor = 0x0, mc_txn =
0x4654000, mc_dbi = 4, mc_db = 0x4654148, mc_dbx = 0x26228c0, 
          mc_dbflag = 0x4655f04 "\031\032\032\031", '\032' <repeats 32 times>,
mc_snum = 4, mc_top = 3, mc_flags = 1, mc_pg = {0x7f612177f000, 0x7f6121787000,
0x7f61217a1000, 
            0x7f61217c6000, 0x7f8900000000, 0x7f891113e80a, 0x7f891115aec2,
0x70cb1f0, 0x4654000, 0x7f610dab50b0, 0x7f8911134687, 0x103, 0x1, 0x4,
0x7f8911132765, 0xb237ee0, 
            0x20b8860, 0x2096b40, 0x20b8840, 0x4654000, 0x10641000,
0x7f610dab50b8, 0x70cb1f0, 0x4, 0x104662780, 0x2584f00, 0x70cb130, 0x4020c25b0,
0x4654000, 0x7f610dab5120, 
            0x7f891113480e, 0x103}, mc_ki = {0, 0, 30, 3, 20864, 3499, 32609, 0,
21088, 3499, 32609, 0, 16384, 1125, 0, 0, 40960, 663, 0, 0, 16384, 1125, 0, 0,
15336, 13, 0, 0, 
            1, 0, 64, 0}}
        mx = {mx_cursor = {mc_next = 0x7f610dab4e40, mc_backup = 0x2459000,
mc_xcursor = 0x229cd00, mc_txn = 0x7f6121753a40, mc_dbi = 561330765, mc_db =
0x0, 
            mc_dbx = 0x7f610dab4f30, mc_dbflag = 0x7f610dab4f20 "\b", mc_snum =
0, mc_top = 0, mc_flags = 0, mc_pg = {0x1, 0x0, 0x7f610dab4f30, 0xdab4e50,
0x7f6100000000, 
              0x4662780, 0x7f6121753000, 0x821753a40, 0x7f6121753000, 0x70cb218,
0x7f6121753d0b, 0x0, 0x111f6d80, 0x7f610dab4ec0, 0x7f8911149131, 0xf0dab4ec0,
0x7f610dab4f20, 
              0x7f610dab4f30, 0x8010, 0x52, 0x0, 0x111f6f08, 0x30dab4fe0,
0x7f6121753000, 0x40dab4ef8, 0x111f6d80, 0x7f8915efdec2, 0x7f6121753a40,
0x7f610dab4f30, 0x4662780, 
              0x70cb1f0, 0x4662780}, mc_ki = {40, 0, 0, 0, 45544, 1804, 0, 0,
45584, 1804, 0, 0, 32480, 2851, 0, 0, 82, 0, 0, 0, 33376, 555, 0, 0, 14720, 555,
0, 0, 4, 0, 0, 
              0}}, mx_db = {md_pad = 327, md_flags = 0, md_depth = 0,
md_branch_pages = 8, md_leaf_pages = 287272320, md_overflow_pages =
140054817886032, 
            md_entries = 287272320, md_root = 140054817886080}, mx_dbx =
{md_name = {mv_size = 140054859848832, mv_data = 0x7f610dab79c0}, 
            md_cmp = 0x7f891114d1f2 <mdb_cursor_close+181>, md_dcmp = 0x4662780,
md_rel = 0x111f6d80, md_relctx = 0x100000001}, mx_dbflag = 32 ' '}
        rc = 46
#6  0x00007f891113b932 in mdb_id2entry_put (op=0x10641000, txn=0x4654000,
mc=0x0, e=0x7f610dab5260, flag=65536) at id2entry.c:71
        mdb = 0x297a000
        ec = {len = 867304, nattrs = 64, nvals = 4271, offset = 4289}
        key = {mv_size = 8, mv_data = 0x7f610dab5260}
        data = {mv_size = 867304, mv_data = 0xf87dc00}
        rc = 0
#7  0x00007f891113bac1 in mdb_id2entry_update (op=0x10641000, txn=0x4654000,
mc=0x0, e=0x7f610dab5260) at id2entry.c:114
No locals.
#8  0x00007f891112a52e in mdb_modify (op=0x10641000, rs=0x7f610dab6a00) at
modify.c:637
        mdb = 0x297a000
        e = 0x70b9c70
        manageDSAit = 0
        textbuf = "\200'f\004\000\000\000\000\360\205\n\a\000\000\000\000H\020d\020\000\000\000\000H\020d\020\000\000\000\000\200\307`\002\000\000\000\000\020U\253\ra\177\000\000@\313`\002\000\000\000\000\340ba\002\000\000\000\000\340ba\002\000\000\000\000\250\207\n\a\000\000\000\000\200S\253\r\000\000\000\000\000j\253\r\000\000\000\000\020U\253\ra\177\000\000p\361J\000\000\000\000\000\070\205\n\a\000\000\000\000\200'f\004\000\000\000\000\260\000\000\000\000\000\000\000\001\000\000\000\000\000\000\000\330\204\n\a\000\000\000\000\000j\253\ra\177\000\000PT\253\ra\177\000\000\213\243\316\020\211\177\000\000\000j\253\ra\177\000\000\000\020d\020\000\000\000\000\070\205\n\a\000\000\000\000\000\020d\020\000\000\000\000&#1553;\n\a\000\000\000\000H\020d\020\000\000\000\000PT\253\ra\177"...
        textlen = 256
        txn = 0x4654000
        opinfo = {moi_oe = {oe_next = {sle_next = 0x0}, oe_key = 0x297a000},
moi_txn = 0x4654000, moi_ref = 1, moi_flag = 0 '\000'}
        moi = 0x7f610dab52c0
        dummy = {e_id = 259, e_name = {bv_len = 43, bv_val = 0x70b9c38
"uid=george,ou=people,dc=xxxxxxx,dc=co,dc=za"}, e_nname = {bv_len = 43, 
            bv_val = 0x70cb1b8 "uid=george,ou=people,dc=xxxxxxxx,dc=co,dc=za"},
e_attrs = 0xfd2cf68, e_ocflags = 256, e_bv = {bv_len = 0, bv_val = 0x0},
e_private = 0x70b9c70}
        preread_ctrl = 0x0
        postread_ctrl = 0x0
        ctrls = {0x0, 0x10641000, 0x0, 0x0, 0x0, 0x0}
        num_ctrls = 0
        numads = 1182
#9  0x00000000004cecbb in overlay_op_walk (op=0x10641000, rs=0x7f610dab6a00,
which=op_modify, oi=0x260c780, on=0x0) at backover.c:677
        func = 0x7f8911361478
        rc = 32768
#10 0x00000000004ceee8 in over_op_func (op=0x10641000, rs=0x7f610dab6a00,
which=op_modify) at backover.c:730
        oi = 0x260c780
        on = 0x260c960
        be = 0x25fc4e0
        db = {bd_info = 0x7f8911361420, bd_self = 0x25fc4e0, 
          be_ctrls =
"\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001",
'\000' <repeats 14 times>, "\001", be_flags = 563464, be_restrictops = 0, 
          be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls
= 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls
= 0, 
            sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x25c20c0,
be_nsuffix = 0x25c2100, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn =
{bv_len = 0, 
            bv_val = 0x0}, be_rootdn = {bv_len = 9, bv_val = 0x2588440
"cn=config"}, be_rootndn = {bv_len = 9, bv_val = 0x2588460 "cn=config"},
be_rootpw = {bv_len = 0, 
            bv_val = 0x0}, be_max_deref_depth = 15, be_def_limit = {lms_t_soft =
-1, lms_t_hard = 0, lms_s_soft = -1, lms_s_hard = 0, lms_s_unchecked = -1,
lms_s_pr = 0, 
            lms_s_pr_hide = 0, lms_s_pr_total = 0}, be_limits = 0x0, be_acl =
0x25f1880, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn =
{bv_len = 0, 
            bv_val = 0x0}, be_update_refs = 0x0, be_pending_csn_list =
0x2629980, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
__nusers = 0, __kind = 0, 
              __spins = 0, __list = {__prev = 0x0, __next = 0x0}}, __size =
'\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x2418680, be_pb = 0x0, 
          be_cf_ocs = 0x7f8911361180, be_private = 0x297a000, be_next =
{stqe_next = 0x0}}
        cb = {sc_next = 0x70a84a8, sc_response = 0x4cdc92 <over_back_response>,
sc_cleanup = 0, sc_writewait = 0, sc_private = 0x260c780}
        sc = 0x7f610dab56e0
        rc = 32768
        __PRETTY_FUNCTION__ = "over_op_func"
#11 0x00000000004cf024 in over_op_modify (op=0x10641000, rs=0x7f610dab6a00) at
backover.c:769
No locals.
#12 0x000000000045b18e in fe_op_modify (op=0x10641000, rs=0x7f610dab6a00) at
modify.c:303
        update = 0
        repl_user = 0
        op_be = 0x25fc4e0
        bd = 0x75a900
        textbuf = "@\347\207\f\000\000\000\000\000&+\002\000\000\000\000\300W\253\ra\177\000\000)\034F",
'\000' <repeats 13 times>"\200,
V\330\017\000\000\000\000@\347\207\f\000\000\000\000\060f+\002\000\000\000\000\300\327e\004\000\000\000\000\002\000\000\000\000\000\000\000\000&#1799;\017\000\000\000\000\300W\253\ra\177",
'\000' <repeats 18 times>, "W\001\000\000\000\000\000\000\240\312\303\020",
'\000' <repeats 12 times>, "
\000\000\000\000\000\000\000\320W\253\ra\177\000\000\000\000\000\000\000\000\000\000`X\253\ra\177\000\000&#1851;E",
'\000' <repeats 14 times>, "\001\000\000\000\000\000\000\220h\253\ra\177\000\000
j\253\ra\177", '\000' <repeats 11 times>,
"\020d\020\000\000\000\000`X\253\ra\177\000\000\065yE\000\000\000\000\000\060X\253"...
        textlen = 256
#13 0x000000000045aa60 in do_modify (op=0x10641000, rs=0x7f610dab6a00) at
modify.c:177
        dn = {bv_len = 43, bv_val = 0xfaa2c49
"uid=george,ou=people,dc=xxxxxx,dc=co,dc=za"}
        textbuf = "\240h\253\ra\177\000\000\360\314\066\022\000\000\000\000pi\253\ra\177\000\000\260[\246\020\000\000\000\000\377\377\377\377\377\377\377\377l\315\311\000\000\000\000\000\a\000\000\000\000\000\000\000\354\006\360\025\211\177\000\000
i\253\ra\177\000\000Z\373\357\025\211\177\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\237\363\004\020\000\000\000\000&#1070;\300\020\000\000\000\000\200'f\004",
'\000' <repeats 12 times>"\200,
'f\004\000\000\000\000xi\253\ra\177\000\000\063\345J\000\000\000\000\000\060k\253\ra\177\000\000\060k\253\ra\177\000\000\220\363\004\020\001\000\000\000\320i\253\ra\177\000\000\022\346J\000\000\000\000\000pi\253\r\001\000\000\000\060k\253\ra\177\000\000\000\000\000\000\001\000\000\000\000\000\020",
'\000' <repeats 13 times>"\200,
'f\004\000\000\000\000\200'f\004\000\000\000\000"...
        textlen = 256
        tmp = 0x0
#14 0x000000000043a89a in connection_operation (ctx=0x7f610dab6b30,
arg_v=0x10641000) at connection.c:1135
        rc = 80
        cancel = 0
        op = 0x10641000
        rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0,
sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un =
{sru_search = {r_entry = 0x0, 
              r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0,
r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended =
{r_rspoid = 0x0, 
              r_rspdata = 0x0}}, sr_flags = 0}
        tag = 102
        opidx = SLAP_OP_MODIFY
        conn = 0x2a6e080
        memctx = 0x4662780
        memctx_null = 0x0
        memsiz = 1048576
        __PRETTY_FUNCTION__ = "connection_operation"
#15 0x000000000043ae3b in connection_read_thread (ctx=0x7f610dab6b30, argv=0xc6)
at connection.c:1271
        rc = 0
        cri = {op = 0x10641000, func = 0, arg = 0x0, ctx = 0x7f610dab6b30,
nullop = 0}
        s = 198
#16 0x00007f8916116552 in ldap_int_thread_pool_wrapper (xpool=0x20d0000) at
tpool.c:956
        pq = 0x20d0000
        pool = 0x2294180
        task = 0xc87e1c0
        work_list = 0x20d0070
        ctx = {ltu_pq = 0x20d0000, ltu_id = 140054817896192, ltu_key = {{ltk_key
= 0x43a3eb, ltk_data = 0x261a900, ltk_free = 0x43a22f <conn_counter_destroy>},
{
              ltk_key = 0x4ae533, ltk_data = 0x4662780, ltk_free = 0x4ae358
<slap_sl_mem_destroy>}, {ltk_key = 0x229cd00, ltk_data = 0x71a8000, 
              ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key = 0x455939,
ltk_data = 0x0, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key =
0x7f89111315b7, 
              ltk_data = 0x74c2000, ltk_free = 0x7f8911131594
<search_stack_free>}, {ltk_key = 0x7f891112e071, ltk_data = 0x71c2000, 
              ltk_free = 0x7f891112e029 <scope_chunk_free>}, {ltk_key =
0x229d400, ltk_data = 0x9856000, ltk_free = 0x7f891113c78b <mdb_reader_free>},
{ltk_key = 0x0, 
              ltk_data = 0xb1b6400, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
        kctx = 0x0
        i = 32
        keyslot = 719
        hash = 1836767951
        pool_lock = 0
        freeme = 0
        __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#17 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#18 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 4 (Thread 0x7f610d2b6700 (LWP 21499)):
#0  0x00007f8914c0268c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f8916117c2f in ldap_pvt_thread_cond_wait (cond=0x2722808,
mutex=0x27227e0) at thr_posix.c:277
No locals.
#2  0x00007f891611478a in ldap_pvt_thread_rmutex_lock (rmutex=0x2469b28,
owner=140054809503488) at rmutex.c:129
        rm = 0x27227e0
        __PRETTY_FUNCTION__ = "ldap_pvt_thread_rmutex_lock"
#3  0x00007f8910adafcf in accesslog_op_mod (op=0x11923c00, rs=0x7f610d2b5a00) at
accesslog.c:1984
        cb = 0xb3ce498
        cb2 = 0x7f610d2b44e0
        on = 0x260cd20
        li = 0x2469ac0
        lo = 0x7f8910cdfb70
        logop = 2
        doit = 1
#4  0x00000000004cec1d in overlay_op_walk (op=0x11923c00, rs=0x7f610d2b5a00,
which=op_modify, oi=0x260c780, on=0x260cd20) at backover.c:661
        func = 0x260cd78
        rc = 32768
#5  0x00000000004ceee8 in over_op_func (op=0x11923c00, rs=0x7f610d2b5a00,
which=op_modify) at backover.c:730
        oi = 0x260c780
        on = 0x260c960
        be = 0x25fc4e0
        db = {bd_info = 0x260cd20, bd_self = 0x25fc4e0, 
          be_ctrls =
"\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001",
'\000' <repeats 14 times>, "\001", be_flags = 563464, be_restrictops = 0, 
          be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls
= 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls
= 0, 
            sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x25c20c0,
be_nsuffix = 0x25c2100, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn =
{bv_len = 0, 
            bv_val = 0x0}, be_rootdn = {bv_len = 9, bv_val = 0x2588440
"cn=config"}, be_rootndn = {bv_len = 9, bv_val = 0x2588460 "cn=config"},
be_rootpw = {bv_len = 0, 
            bv_val = 0x0}, be_max_deref_depth = 15, be_def_limit = {lms_t_soft =
-1, lms_t_hard = 0, lms_s_soft = -1, lms_s_hard = 0, lms_s_unchecked = -1,
lms_s_pr = 0, 
            lms_s_pr_hide = 0, lms_s_pr_total = 0}, be_limits = 0x0, be_acl =
0x25f1880, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn =
{bv_len = 0, 
            bv_val = 0x0}, be_update_refs = 0x0, be_pending_csn_list =
0x2629980, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
__nusers = 0, __kind = 0, 
              __spins = 0, __list = {__prev = 0x0, __next = 0x0}}, __size =
'\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x2418680, be_pb = 0x0, 
          be_cf_ocs = 0x7f8911361180, be_private = 0x297a000, be_next =
{stqe_next = 0x0}}
        cb = {sc_next = 0xb3ce498, sc_response = 0x4cdc92 <over_back_response>,
sc_cleanup = 0, sc_writewait = 0, sc_private = 0x260c780}
        sc = 0x7f610d2b46e0
        rc = 32768
        __PRETTY_FUNCTION__ = "over_op_func"
#6  0x00000000004cf024 in over_op_modify (op=0x11923c00, rs=0x7f610d2b5a00) at
backover.c:769
No locals.
#7  0x000000000045b18e in fe_op_modify (op=0x11923c00, rs=0x7f610d2b5a00) at
modify.c:303
        update = 0
        repl_user = 0
        op_be = 0x25fc4e0
        bd = 0x75a900
        textbuf = "\024\000\000\000\021\000\000\000\000)+\002\000\000\000\000\300G+\ra\177\000\000)\034F",
'\000' <repeats 14 times>"\253,
\067\020\000\000\000\000\000r\324\017\000\000\000\000\000v+\002\000\000\000\000\200\332e\004\000\000\000\000\002\000\000\000\000\000\000\000\000\255\207\017\000\000\000\000\300G+\ra\177",
'\000' <repeats 18 times>, "\017\000\000\000\000\000\000\000\020\227\263\017",
'\000' <repeats 12 times>, "
\000\000\000\000\000\000\000\320G+\ra\177\000\000\000\000\000\000\000\000\000\000`H+\ra\177\000\000&#1851;E",
'\000' <repeats 14 times>, "\001\000\000\000\000\000\000\220X+\ra\177\000\000
Z+\ra\177", '\000' <repeats 11 times>,
"<\222\021\000\000\000\000`H+\ra\177\000\000\065"...
        textlen = 256
#8  0x000000000045aa60 in do_modify (op=0x11923c00, rs=0x7f610d2b5a00) at
modify.c:177
        dn = {bv_len = 37, bv_val = 0xf67be97
"uid=tsv,ou=people,dc=xxxxx,dc=co,dc=za"}
        textbuf = "\240X+\ra\177\000\000\020\261\205\017\000\000\000\000pY+\ra\177\000\000`\330\004\020\000\000\000\000\377\377\377\377\377\377\377\377K\316\311\000\000\000\000\000\004\000\000\000\000\000\000\000\354\006\360\025\211\177\000\000
Y+\ra\177\000\000Z\373\357\025\211\177\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000?\3
40\373\020\000\000\000\000\360\265\205\017\000\000\000\000\300\375\f\v", '\000'
<repeats 12 times>"\300,
\375\f\v\000\000\000\000xY+\ra\177\000\000\063\345J\000\000\000\000\000\060[+\ra\177\000\000\060[+\ra\177\000\000\060\340\373\020\000\000\000\000\320Y+\ra\177\000\000\022\346J\000\000\000\000\000pY+\r\001\000\000\000\060[+\ra\177\000\000\000\000\000\000\001\000\000\000\000\000\020",
'\000' <repeats 13 times>"\300, \375\f\v\000\000\000\000\300\375\f"...
        textlen = 256
        tmp = 0x0
#9  0x000000000043a89a in connection_operation (ctx=0x7f610d2b5b30,
arg_v=0x11923c00) at connection.c:1135
        rc = 80
        cancel = 0
        op = 0x11923c00
        rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0,
sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un =
{sru_search = {r_entry = 0x0, 
              r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0,
r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended =
{r_rspoid = 0x0, 
              r_rspdata = 0x0}}, sr_flags = 0}
        tag = 102
        opidx = SLAP_OP_MODIFY
        conn = 0x2ab29c0
        memctx = 0xb0cfdc0
        memctx_null = 0x0
        memsiz = 1048576
        __PRETTY_FUNCTION__ = "connection_operation"
#10 0x000000000043ae3b in connection_read_thread (ctx=0x7f610d2b5b30,
argv=0x255) at connection.c:1271
        rc = 0
        cri = {op = 0x11923c00, func = 0, arg = 0x0, ctx = 0x7f610d2b5b30,
nullop = 0}
        s = 597
#11 0x00007f8916116552 in ldap_int_thread_pool_wrapper (xpool=0x20d0000) at
tpool.c:956
        pq = 0x20d0000
        pool = 0x2294180
        task = 0xfc81c00
        work_list = 0x20d0070
        ctx = {ltu_pq = 0x20d0000, ltu_id = 140054809503488, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0xb0cfdc0, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
              ltk_key = 0x43a3eb, ltk_data = 0x2619f00, ltk_free = 0x43a22f
<conn_counter_destroy>}, {ltk_key = 0x229cd00, ltk_data = 0x4990200, 
              ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key = 0x455939,
ltk_data = 0x11788800, ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key =
0x7f89111315b7, 
              ltk_data = 0xb7ce000, ltk_free = 0x7f8911131594
<search_stack_free>}, {ltk_key = 0x7f891112e071, ltk_data = 0xb4ce000, 
              ltk_free = 0x7f891112e029 <scope_chunk_free>}, {ltk_key =
0x229d400, ltk_data = 0x985c800, ltk_free = 0x7f891113c78b <mdb_reader_free>},
{ltk_key = 0x0, 
              ltk_data = 0x11d48800, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
        kctx = 0x0
        i = 32
        keyslot = 831
        hash = 3362479935
        pool_lock = 0
        freeme = 0
        __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#12 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#13 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 3 (Thread 0x7f610cab5700 (LWP 22074)):
#0  0x00007f8914c0268c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f8916117c2f in ldap_pvt_thread_cond_wait (cond=0x2722808,
mutex=0x27227e0) at thr_posix.c:277
No locals.
#2  0x00007f891611478a in ldap_pvt_thread_rmutex_lock (rmutex=0x2469b28,
owner=140054801110784) at rmutex.c:129
        rm = 0x27227e0
        __PRETTY_FUNCTION__ = "ldap_pvt_thread_rmutex_lock"
#3  0x00007f8910adafcf in accesslog_op_mod (op=0x1259b800, rs=0x7f610cab4a00) at
accesslog.c:1984
        cb = 0xc9384b0
        cb2 = 0x7f610cab34e0
        on = 0x260cd20
        li = 0x2469ac0
        lo = 0x7f8910cdfb70
        logop = 2
        doit = 1
#4  0x00000000004cec1d in overlay_op_walk (op=0x1259b800, rs=0x7f610cab4a00,
which=op_modify, oi=0x260c780, on=0x260cd20) at backover.c:661
        func = 0x260cd78
        rc = 32768
#5  0x00000000004ceee8 in over_op_func (op=0x1259b800, rs=0x7f610cab4a00,
which=op_modify) at backover.c:730
        oi = 0x260c780
        on = 0x260c960
        be = 0x25fc4e0
        db = {bd_info = 0x260cd20, bd_self = 0x25fc4e0, 
          be_ctrls =
"\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001",
'\000' <repeats 14 times>, "\001", be_flags = 563464, be_restrictops = 0, 
          be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls
= 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls
= 0, 
            sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x25c20c0,
be_nsuffix = 0x25c2100, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn =
{bv_len = 0, 
            bv_val = 0x0}, be_rootdn = {bv_len = 9, bv_val = 0x2588440
"cn=config"}, be_rootndn = {bv_len = 9, bv_val = 0x2588460 "cn=config"},
be_rootpw = {bv_len = 0, 
            bv_val = 0x0}, be_max_deref_depth = 15, be_def_limit = {lms_t_soft =
-1, lms_t_hard = 0, lms_s_soft = -1, lms_s_hard = 0, lms_s_unchecked = -1,
lms_s_pr = 0, 
            lms_s_pr_hide = 0, lms_s_pr_total = 0}, be_limits = 0x0, be_acl =
0x25f1880, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn =
{bv_len = 0, 
            bv_val = 0x0}, be_update_refs = 0x0, be_pending_csn_list =
0x2629980, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
__nusers = 0, __kind = 0, 
              __spins = 0, __list = {__prev = 0x0, __next = 0x0}}, __size =
'\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x2418680, be_pb = 0x0, 
          be_cf_ocs = 0x7f8911361180, be_private = 0x297a000, be_next =
{stqe_next = 0x0}}
        cb = {sc_next = 0xc9384b0, sc_response = 0x4cdc92 <over_back_response>,
sc_cleanup = 0, sc_writewait = 0, sc_private = 0x260c780}
        sc = 0x7f610cab36e0
        rc = 32768
        __PRETTY_FUNCTION__ = "over_op_func"
#6  0x00000000004cf024 in over_op_modify (op=0x1259b800, rs=0x7f610cab4a00) at
backover.c:769
No locals.
#7  0x000000000045b18e in fe_op_modify (op=0x1259b800, rs=0x7f610cab4a00) at
modify.c:303
        update = 0
        repl_user = 0
        op_be = 0x25fc4e0
        bd = 0x75a900
        textbuf = "\024\000\000\000\021\000\000\000\000)+\002\000\000\000\000\300\067\253\fa\177\000\000)\034F",
'\000' <repeats 13 times>,
"`\226\210\f\000\000\000\000@\206\210\f\000\000\000\000\000v+\002\000\000\000\000\000\235B\002\000\000\000\000\002\000\000\000\000\000\000\000\200V\271\021\000\000\000\000\300\067\253\fa\177",
'\000' <repeats 18 times>, "\017\000\000\000\000\000\000\000\200\302e\017",
'\000' <repeats 12 times>, "
\000\000\000\000\000\000\000\320\067\253\fa\177\000\000\000\000\000\000\000\000\000\000`8\253\fa\177\000\000&#1851;E",
'\000' <repeats 14 times>, "\001\000\000\000\000\000\000\220H\253\fa\177\000\000
J\253\fa\177", '\000' <repeats 11 times>"\270,
Y\022\000\000\000\000`8\253\fa\177\000\000\065yE\000\000\000\000\000"...
        textlen = 256
#8  0x000000000045aa60 in do_modify (op=0x1259b800, rs=0x7f610cab4a00) at
modify.c:177
        dn = {bv_len = 44, bv_val = 0x119b6997
"uid=20238247,ou=people,dc=xxxxxxxx,dc=co,dc=za"}
        textbuf = "\240H\253\fa\177\000\000\000\000\000\000\000\000\000\000pI\253\fa\177\000\000&#1046;\215\020\000\000\000\000\377\377\377\377\377\377\377\377{\310\311\000\000\000\000\000\020\000\000\000\000\000\000\000\354\006\360\025\211\177\000\000
I\253\fa\177\000\000Z\373\357\025\211\177\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000_(f\002\000\000\000\000`_\202\t\000\000\000\000\000\v%\v",
'\000' <repeats 13 times>,
"\v%\v\000\000\000\000xI\253\fa\177\000\000\063\345J\000\000\000\000\000\060K\253\fa\177\000\000\060K\253\fa\177\000\000P(f\002\001\000\000\000\320I\253\fa\177\000\000\022\346J\000\000\000\000\000pI\253\f\001\000\000\000\060K\253\fa\177\000\000\000\000\000\000\001\000\000\000\000\000\020",
'\000' <repeats 14 times>, "\v%\v\000\000\000\000\000"...
        textlen = 256
        tmp = 0x0
#9  0x000000000043a89a in connection_operation (ctx=0x7f610cab4b30,
arg_v=0x1259b800) at connection.c:1135
        rc = 80
        cancel = 0
        op = 0x1259b800
        rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0,
sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un =
{sru_search = {r_entry = 0x0, 
              r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0,
r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended =
{r_rspoid = 0x0, 
              r_rspdata = 0x0}}, sr_flags = 0}
        tag = 102
        opidx = SLAP_OP_MODIFY
        conn = 0x2ab3a40
        memctx = 0xb250b00
        memctx_null = 0x0
        memsiz = 1048576
        __PRETTY_FUNCTION__ = "connection_operation"
#10 0x000000000043ae3b in connection_read_thread (ctx=0x7f610cab4b30,
argv=0x25b) at connection.c:1271
        rc = 0
        cri = {op = 0x1259b800, func = 0, arg = 0x0, ctx = 0x7f610cab4b30,
nullop = 0}
        s = 603
#11 0x00007f8916116552 in ldap_int_thread_pool_wrapper (xpool=0x20d0000) at
tpool.c:956
        pq = 0x20d0000
        pool = 0x2294180
        task = 0xfd01220
        work_list = 0x20d0070
        ctx = {ltu_pq = 0x20d0000, ltu_id = 140054801110784, ltu_key = {{ltk_key
= 0x43a3eb, ltk_data = 0x261ab00, ltk_free = 0x43a22f <conn_counter_destroy>},
{
              ltk_key = 0x4ae533, ltk_data = 0xb250b00, ltk_free = 0x4ae358
<slap_sl_mem_destroy>}, {ltk_key = 0x455939, ltk_data = 0x0, 
              ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key = 0x229cd00,
ltk_data = 0x985e200, ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key =
0x7f89111315b7, 
              ltk_data = 0xcd38000, ltk_free = 0x7f8911131594
<search_stack_free>}, {ltk_key = 0x7f891112e071, ltk_data = 0xca38000, 
              ltk_free = 0x7f891112e029 <scope_chunk_free>}, {ltk_key =
0x229d400, ltk_data = 0x71ace00, ltk_free = 0x7f891113c78b <mdb_reader_free>},
{ltk_key = 0x0, 
              ltk_data = 0x11d48800, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
        kctx = 0x0
        i = 32
        keyslot = 430
        hash = 3460370862
        pool_lock = 0
        freeme = 0
        __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#12 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#13 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 2 (Thread 0x7f610c2b4700 (LWP 24941)):
#0  0x00007f8914c0268c in pthread_cond_wait@@GLIBC_2.3.2 () from
/lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f8916117c2f in ldap_pvt_thread_cond_wait (cond=0x2722808,
mutex=0x27227e0) at thr_posix.c:277
No locals.
#2  0x00007f891611478a in ldap_pvt_thread_rmutex_lock (rmutex=0x2469b28,
owner=140054792718080) at rmutex.c:129
        rm = 0x27227e0
        __PRETTY_FUNCTION__ = "ldap_pvt_thread_rmutex_lock"
#3  0x00007f8910adafcf in accesslog_op_mod (op=0x108d0400, rs=0x7f610c2b3a00) at
accesslog.c:1984
        cb = 0xe0a04b8
        cb2 = 0x7f610c2b24e0
        on = 0x260cd20
        li = 0x2469ac0
        lo = 0x7f8910cdfb70
        logop = 2
        doit = 1
#4  0x00000000004cec1d in overlay_op_walk (op=0x108d0400, rs=0x7f610c2b3a00,
which=op_modify, oi=0x260c780, on=0x260cd20) at backover.c:661
        func = 0x260cd78
        rc = 32768
#5  0x00000000004ceee8 in over_op_func (op=0x108d0400, rs=0x7f610c2b3a00,
which=op_modify) at backover.c:730
        oi = 0x260c780
        on = 0x260c960
        be = 0x25fc4e0
        db = {bd_info = 0x260cd20, bd_self = 0x25fc4e0, 
          be_ctrls =
"\000\001\001\001\000\001\000\000\001\000\000\001\001\000\001\000\000\001",
'\000' <repeats 14 times>, "\001", be_flags = 563464, be_restrictops = 0, 
          be_requires = 0, be_ssf_set = {sss_ssf = 0, sss_transport = 0, sss_tls
= 0, sss_sasl = 0, sss_update_ssf = 0, sss_update_transport = 0, sss_update_tls
= 0, 
            sss_update_sasl = 0, sss_simple_bind = 0}, be_suffix = 0x25c20c0,
be_nsuffix = 0x25c2100, be_schemadn = {bv_len = 0, bv_val = 0x0}, be_schemandn =
{bv_len = 0, 
            bv_val = 0x0}, be_rootdn = {bv_len = 9, bv_val = 0x2588440
"cn=config"}, be_rootndn = {bv_len = 9, bv_val = 0x2588460 "cn=config"},
be_rootpw = {bv_len = 0, 
            bv_val = 0x0}, be_max_deref_depth = 15, be_def_limit = {lms_t_soft =
-1, lms_t_hard = 0, lms_s_soft = -1, lms_s_hard = 0, lms_s_unchecked = -1,
lms_s_pr = 0, 
            lms_s_pr_hide = 0, lms_s_pr_total = 0}, be_limits = 0x0, be_acl =
0x25f1880, be_dfltaccess = ACL_READ, be_extra_anlist = 0x0, be_update_ndn =
{bv_len = 0, 
            bv_val = 0x0}, be_update_refs = 0x0, be_pending_csn_list =
0x2629980, be_pcl_mutex = {__data = {__lock = 0, __count = 0, __owner = 0,
__nusers = 0, __kind = 0, 
              __spins = 0, __list = {__prev = 0x0, __next = 0x0}}, __size =
'\000' <repeats 39 times>, __align = 0}, be_syncinfo = 0x2418680, be_pb = 0x0, 
          be_cf_ocs = 0x7f8911361180, be_private = 0x297a000, be_next =
{stqe_next = 0x0}}
        cb = {sc_next = 0xe0a04b8, sc_response = 0x4cdc92 <over_back_response>,
sc_cleanup = 0, sc_writewait = 0, sc_private = 0x260c780}
        sc = 0x7f610c2b26e0
        rc = 32768
        __PRETTY_FUNCTION__ = "over_op_func"
#6  0x00000000004cf024 in over_op_modify (op=0x108d0400, rs=0x7f610c2b3a00) at
backover.c:769
No locals.
#7  0x000000000045b18e in fe_op_modify (op=0x108d0400, rs=0x7f610c2b3a00) at
modify.c:303
        update = 0
        repl_user = 0
        op_be = 0x25fc4e0
        bd = 0x75a900
        textbuf = "\024\000\000\000\021\000\000\000\000)+\002\000\000\000\000\300'+\fa\177\000\000)\034F",
'\000' <repeats 13 times>,
"`^U\020\000\000\000\000\340*-\020\000\000\000\000\000v+\002\000\000\000\000\000\235B\002\000\000\000\000\002\000\000\000\000\000\000\000@@\301\021\000\000\000\000\300'+\fa\177",
'\000' <repeats 18 times>, "\017\000\000\000\000\000\000\000`1\016\021", '\000'
<repeats 12 times>, "
\000\000\000\000\000\000\000\320'+\fa\177\000\000\000\000\000\000\000\000\000\000`(+\fa\177\000\000&#1851;E",
'\000' <repeats 14 times>, "\001\000\000\000\000\000\000\220\070+\fa\177\000\000
:+\fa\177", '\000' <repeats 11 times>, "\004\215\020\000\000\000\000`(+"...
        textlen = 256
#8  0x000000000045aa60 in do_modify (op=0x108d0400, rs=0x7f610c2b3a00) at
modify.c:177
        dn = {bv_len = 46, bv_val = 0x119b4f58
"uid=cwsa-account,ou=people,dc=xxxxxxx,dc=co,dc=za"}
        textbuf = "\240\070+\fa\177\000\000\000\000\000\000\000\000\000\000p9+\fa\177\000\000`}k\017\000\000\000\000\377\377\377\377\377\377\377\377\024p\257\000\000\000\000\000q\025\000\000\000\000\000\000\354\006\360\025\211\177\000\000
9+\fa\177\000\000Z\373\357\025\211\177\000\000\000\000\000\000\000\000\000\000\b\000\000\000\000\000\000\000\377\022\224\t\000\000\000\000\300\366\340\021\000\000\000\000\300\356\f\v",
'\000' <repeats 12 times>"\300,
\356\f\v\000\000\000\000x9+\fa\177\000\000\063\345J\000\000\000\000\000\060;+\
fa\177\000\000\060;+\fa\177\000\000\360\022\224\t\000\000\000\000\320\071+\fa\177\000\000\022\346J\000\000\000\000\000p9+\f\001\000\000\000\060;+\fa\177\000\000\000\000\000\000\001\000\000\000\000\000\020",
'\000' <repeats 13 times>"\300, \356\f\v\000\000\000\000\300"...
        textlen = 256
        tmp = 0x0
#9  0x000000000043a89a in connection_operation (ctx=0x7f610c2b3b30,
arg_v=0x108d0400) at connection.c:1135
        rc = 80
        cancel = 0
        op = 0x108d0400
        rs = {sr_type = REP_RESULT, sr_tag = 0, sr_msgid = 0, sr_err = 0,
sr_matched = 0x0, sr_text = 0x0, sr_ref = 0x0, sr_ctrls = 0x0, sr_un =
{sru_search = {r_entry = 0x0, 
              r_attr_flags = 0, r_operational_attrs = 0x0, r_attrs = 0x0,
r_nentries = 0, r_v2ref = 0x0}, sru_sasl = {r_sasldata = 0x0}, sru_extended =
{r_rspoid = 0x0, 
              r_rspdata = 0x0}}, sr_flags = 0}
        tag = 102
        opidx = SLAP_OP_MODIFY
        conn = 0x2a82240
        memctx = 0xb0ceec0
        memctx_null = 0x0
        memsiz = 1048576
        __PRETTY_FUNCTION__ = "connection_operation"
#10 0x000000000043ae3b in connection_read_thread (ctx=0x7f610c2b3b30,
argv=0x13b) at connection.c:1271
        rc = 0
        cri = {op = 0x108d0400, func = 0, arg = 0x0, ctx = 0x7f610c2b3b30,
nullop = 0}
        s = 315
#11 0x00007f8916116552 in ldap_int_thread_pool_wrapper (xpool=0x20d0000) at
tpool.c:956
        pq = 0x20d0000
        pool = 0x2294180
        task = 0x11a1c860
        work_list = 0x20d0070
        ctx = {ltu_pq = 0x20d0000, ltu_id = 140054792718080, ltu_key = {{ltk_key
= 0x4ae533, ltk_data = 0xb0ceec0, ltk_free = 0x4ae358 <slap_sl_mem_destroy>}, {
              ltk_key = 0x43a3eb, ltk_data = 0x2619600, ltk_free = 0x43a22f
<conn_counter_destroy>}, {ltk_key = 0x229cd00, ltk_data = 0xc90e000, 
              ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key =
0x7f89111315b7, ltk_data = 0xe4a0000, ltk_free = 0x7f8911131594
<search_stack_free>}, {
              ltk_key = 0x7f891112e071, ltk_data = 0xe1a0000, ltk_free =
0x7f891112e029 <scope_chunk_free>}, {ltk_key = 0x455939, ltk_data = 0x118aa800,

              ltk_free = 0x45588c <slap_op_q_destroy>}, {ltk_key = 0x229d400,
ltk_data = 0xdfa1a00, ltk_free = 0x7f891113c78b <mdb_reader_free>}, {ltk_key =
0x0, 
              ltk_data = 0xfa21600, ltk_free = 0}, {ltk_key = 0x0, ltk_data =
0x0, ltk_free = 0} <repeats 24 times>}}
        kctx = 0x0
        i = 32
        keyslot = 542
        hash = 691115550
        pool_lock = 0
        freeme = 0
        __PRETTY_FUNCTION__ = "ldap_int_thread_pool_wrapper"
#12 0x00007f8914bfeaa1 in start_thread () from /lib64/libpthread.so.0
No symbol table info available.
#13 0x00007f891494b93d in clone () from /lib64/libc.so.6
No symbol table info available.

Thread 1 (Thread 0x7f89167c5720 (LWP 18917)):
#0  0x00007f8914bff2fd in pthread_join () from /lib64/libpthread.so.0
No symbol table info available.
#1  0x00007f8916117b70 in ldap_pvt_thread_join (thread=140054859859712,
thread_return=0x0) at thr_posix.c:197
No locals.
#2  0x000000000043785a in slapd_daemon () at daemon.c:2910
        i = 0
        rc = 0
#3  0x0000000000414c02 in main (argc=9, argv=0x7fffb8df91e8) at main.c:1017
        i = 9
        no_detach = 0
        rc = 0
        urls = 0x208e020 "ldap://0.0.0.0:389 ldapi:///"
        username = 0x2092018 "TRUE"
        groupname = 0x0
        sandbox = 0x0
        syslogUser = 128
        pid = 0
        waitfds = {9, 10}
        g_argc = 9
        g_argv = 0x7fffb8df91e8
        configfile = 0x0
        configdir = 0x208e060 "/opt/zimbra/data/ldap/config"
        serverName = 0x7fffb8dfadeb "slapd"
        serverMode = 1
        scp = 0x0
        scp_entry = 0x0
        debug_unknowns = 0x0
        syslog_unknowns = 0x0
        serverNamePrefix = 0x4f2f08 ""
        l = 5188080
        slapd_pid_file_unlink = 1
        slapd_args_file_unlink = 1
        firstopt = 0
        __PRETTY_FUNCTION__ = "main"
(gdb) 



Output from mdb_stat -eaf on the master shows significant fragmentation:

[zimbra@ldap01-dc01 db]$ mdb_stat -eaf .
Environment Info
  Map address: (nil)
  Map size: 85899345920
  Page size: 4096
  Max pages: 20971520
  Number of pages used: 2739630
  Last transaction ID: 139737905
  Max readers: 126
  Number of readers used: 9
Freelist Status
  Tree depth: 3
  Branch pages: 18
  Leaf pages: 3311
  Overflow pages: 397
  Entries: 78618
  Free pages: 1504751
Status of Main DB
  Tree depth: 1
  Branch pages: 0
  Leaf pages: 1
  Overflow pages: 0
  Entries: 38
Status of DKIMIdentity
  Tree depth: 0
  Branch pages: 0
  Leaf pages: 0
  Overflow pages: 0
  Entries: 0
Status of DKIMSelector
  Tree depth: 0
  Branch pages: 0
  Leaf pages: 0
  Overflow pages: 0
  Entries: 0
Status of ad2i
  Tree depth: 2
  Branch pages: 1
  Leaf pages: 13
  Overflow pages: 0
  Entries: 1183
Status of cn
  Tree depth: 3
  Branch pages: 159
  Leaf pages: 35732
  Overflow pages: 0
  Entries: 13311385
Status of displayName
  Tree depth: 3
  Branch pages: 131
  Leaf pages: 24914
  Overflow pages: 0
  Entries: 9306285
Status of dn2i
  Tree depth: 4
  Branch pages: 522
  Leaf pages: 64580
  Overflow pages: 0
  Entries: 2727439
Status of entryCSN
  Tree depth: 4
  Branch pages: 1421
  Leaf pages: 19563
  Overflow pages: 0
  Entries: 1363719
Status of entryUUID
  Tree depth: 3
  Branch pages: 65
  Leaf pages: 11094
  Overflow pages: 0
  Entries: 1363719
Status of givenName
  Tree depth: 3
  Branch pages: 9
  Leaf pages: 2126
  Overflow pages: 0
  Entries: 601575
Status of id2e
  Tree depth: 4
  Branch pages: 3955
  Leaf pages: 500307
  Overflow pages: 283335
  Entries: 1363720
Status of mail
  Tree depth: 3
  Branch pages: 137
  Leaf pages: 33259
  Overflow pages: 0
  Entries: 14426766
Status of objectClass
  Tree depth: 2
  Branch pages: 1
  Leaf pages: 4
  Overflow pages: 0
  Entries: 278069
Status of sn
  Tree depth: 3
  Branch pages: 129
  Leaf pages: 25165
  Overflow pages: 0
  Entries: 9769145
Status of uid
  Tree depth: 3
  Branch pages: 33
  Leaf pages: 7109
  Overflow pages: 0
  Entries: 924205
Status of zimbraACE
  Tree depth: 3
  Branch pages: 17
  Leaf pages: 3519
  Overflow pages: 0
  Entries: 1334426
Status of zimbraAuthKerberos5Realm
  Tree depth: 0
  Branch pages: 0
  Leaf pages: 0
  Overflow pages: 0
  Entries: 0
Status of zimbraCalResBuilding
  Tree depth: 2
  Branch pages: 1
  Leaf pages: 4
  Overflow pages: 0
  Entries: 641
Status of zimbraCalResCapacity
  Tree depth: 1
  Branch pages: 0
  Leaf pages: 1
  Overflow pages: 0
  Entries: 27
Status of zimbraCalResFloor
  Tree depth: 2
  Branch pages: 1
  Leaf pages: 2
  Overflow pages: 0
  Entries: 363
Status of zimbraCalResRoom
  Tree depth: 1
  Branch pages: 0
  Leaf pages: 1
  Overflow pages: 0
  Entries: 178
Status of zimbraCalResSite
  Tree depth: 2
  Branch pages: 1
  Leaf pages: 4
  Overflow pages: 0
  Entries: 543
Status of zimbraDomainAliasTargetId
  Tree depth: 1
  Branch pages: 0
  Leaf pages: 1
  Overflow pages: 0
  Entries: 154
Status of zimbraDomainName
  Tree depth: 3
  Branch pages: 9
  Leaf pages: 2152
  Overflow pages: 0
  Entries: 643609
Status of zimbraForeignPrincipal
  Tree depth: 0
  Branch pages: 0
  Leaf pages: 0
  Overflow pages: 0
  Entries: 0
Status of zimbraId
  Tree depth: 3
  Branch pages: 33
  Leaf pages: 7968
  Overflow pages: 0
  Entries: 955084
Status of zimbraMailAlias
  Tree depth: 3
  Branch pages: 65
  Leaf pages: 13719
  Overflow pages: 0
  Entries: 4584536
Status of zimbraMailCatchAllAddress
  Tree depth: 3
  Branch pages: 9
  Leaf pages: 208
  Overflow pages: 0
  Entries: 16676
Status of zimbraMailDeliveryAddress
  Tree depth: 3
  Branch pages: 130
  Leaf pages: 26463
  Overflow pages: 0
  Entries: 11258680
Status of zimbraMailForwardingAddress
  Tree depth: 3
  Branch pages: 3
  Leaf pages: 370
  Overflow pages: 0
  Entries: 43649
Status of zimbraMailHost
  Tree depth: 2
  Branch pages: 1
  Leaf pages: 61
  Overflow pages: 0
  Entries: 659450
Status of zimbraMailTransport
  Tree depth: 2
  Branch pages: 1
  Leaf pages: 60
  Overflow pages: 0
  Entries: 655378
Status of zimbraMemberOf
  Tree depth: 0
  Branch pages: 0
  Leaf pages: 0
  Overflow pages: 0
  Entries: 0
Status of zimbraShareInfo
  Tree depth: 0
  Branch pages: 0
  Leaf pages: 0
  Overflow pages: 0
  Entries: 0
Status of zimbraSharedItem
  Tree depth: 3
  Branch pages: 69
  Leaf pages: 16765
  Overflow pages: 0
  Entries: 10835821
Status of zimbraUCServiceId
  Tree depth: 0
  Branch pages: 0
  Leaf pages: 0
  Overflow pages: 0
  Entries: 0
Status of zimbraVirtualHostname
  Tree depth: 2
  Branch pages: 1
  Leaf pages: 4
  Overflow pages: 0
  Entries: 28593
Status of zimbraVirtualIPAddress
  Tree depth: 0
  Branch pages: 0
  Leaf pages: 0
  Overflow pages: 0
  Entries: 0
Status of zimbraYahooId
  Tree depth: 0
  Branch pages: 0
  Leaf pages: 0
  Overflow pages: 0
  Entries: 0
[zimbra@ldap01-dc01 db]$ cd ../../accesslog/db/
[zimbra@ldap01-dc01 db]$ mdb_stat -eaf .
Environment Info
  Map address: (nil)
  Map size: 85899345920
  Page size: 4096
  Max pages: 20971520
  Number of pages used: 481574
  Last transaction ID: 56766713
  Max readers: 126
  Number of readers used: 10
Freelist Status
  Tree depth: 3
  Branch pages: 7
  Leaf pages: 765
  Overflow pages: 0
  Entries: 9940
  Free pages: 307284
Status of Main DB
  Tree depth: 1
  Branch pages: 0
  Leaf pages: 1
  Overflow pages: 0
  Entries: 8
Status of ad2i
  Tree depth: 1
  Branch pages: 0
  Leaf pages: 1
  Overflow pages: 0
  Entries: 22
Status of dn2i
  Tree depth: 3
  Branch pages: 57
  Leaf pages: 12272
  Overflow pages: 0
  Entries: 1079831
Status of entryCSN
  Tree depth: 3
  Branch pages: 11
  Leaf pages: 1988
  Overflow pages: 0
  Entries: 539915
Status of id2e
  Tree depth: 4
  Branch pages: 623
  Leaf pages: 139166
  Overflow pages: 2174
  Entries: 539915
Status of objectClass
  Tree depth: 1
  Branch pages: 0
  Leaf pages: 1
  Overflow pages: 0
  Entries: 10887
Status of reqEnd
  Tree depth: 3
  Branch pages: 11
  Leaf pages: 1987
  Overflow pages: 0
  Entries: 539914
Status of reqResult
  Tree depth: 1
  Branch pages: 0
  Leaf pages: 1
  Overflow pages: 0
  Entries: 3
Status of reqStart
  Tree depth: 3
  Branch pages: 11
  Leaf pages: 1991
  Overflow pages: 0
  Entries: 539914
[zimbra@ldap01-dc01 db]$