Seg Fault - radius 3.0 Debug

Breuer Nicolas Nicolas.Breuer at Belcenter.biz
Thu Mar 17 18:46:03 CET 2011


 More messages

------- Forwarded message follows -------
From:           	root <root at mail-mx-out.belcenter.com>
Date sent:      	Thu, 17 Mar 2011 18:43:14 +0100
To:             	nicolas.breuer at belcenter.be

Program received signal SIGSEGV, Segmentation fault.
0x00007ffff6032890 in mysql_field_count () from /usr/lib64/mysql/libmysqlclient_r.so.16
Missing separate debuginfos, use: debuginfo-install glibc-2.13-1.x86_64 keyutils-libs-1.2-
6.fc12.x86_64 krb5-libs-1.8.2-7.fc14.x86_64 libcom_err-1.41.12-6.fc14.x86_64 libgcc-4.5.1-
4.fc14.x86_64 libselinux-2.0.96-6.fc14.1.x86_64 mysql-libs-5.1.55-1.fc14.x86_64 nss-
softokn-freebl-3.12.9-2.fc14.x86_64 openssl-1.0.0d-1.fc14.x86_64 zlib-1.2.5-2.fc14.x86_64
* 1 Thread 0x7ffff7bba720 (LWP 23430)  0x00007ffff6032890 in mysql_field_count () from 
/usr/lib64/mysql/libmysqlclient_r.so.16

Thread 1 (Thread 0x7ffff7bba720 (LWP 23430)):
#0  0x00007ffff6032890 in mysql_field_count () from /usr/lib64/mysql/libmysqlclient_r.so.16
No symbol table info available.
#1  0x00007ffff6391dee in sql_num_fields (sqlsocket=<value optimized out>, config=<value 
optimized out>) at sql_mysql.c:239
        num = 0
        mysql_sock = 0x8986b0
#2  0x00007ffff639233d in sql_select_query (sqlsocket=0x898640, config=0x847480, 
querystr=<value optimized out>) at sql_mysql.c:275
        ret = 0
#3  0x00007ffff6598c67 in rlm_sql_select_query (sqlsocket=0x898640, inst=0x847410, 
    query=0x7fffffffaf40 "SELECT ip_address FROM radippool WHERE pool_name = 'BC*' 
AND expiry_time < NOW() ORDER BY rand(), pool_name, expiry_time LIMIT 1 FOR 
UPDATE") at sql.c:566
        ret = <value optimized out>
#4  0x00007ffff4ff1c3b in sqlippool_query1 (out=0x7fffffffd180 "\001", fmt=<value optimized 
out>, sqlsocket=0x898640, data=0x8c59f0, 
    request=0x8d5b20, param_len=0, param=0x0, outlen=-2) at rlm_sqlippool.c:359
        expansion = "SELECT ip_address FROM radippool WHERE pool_name = 
'%{reply:Pool-Suffix}*%{Huntgroup-Name}' AND expiry_time < NOW() ORDER BY rand(), 
pool_name, expiry_time LIMIT 1 FOR 
UPDATE\000\000.\341\377\377\377\177\000\000\000\000\000\000\377\177", '\000' <repeats 
34 times>, " ", '\000' <repeats 15 times>...
        query = "SELECT ip_address FROM radippool WHERE pool_name = 'BC*' AND 
expiry_time < NOW() ORDER BY rand(), pool_name, expiry_time LIMIT 1 FOR 
UPDATE\000\377\177\000\000\220\322\377\377\377\177\000\000(\256C", '\000' <repeats 
13 times>, "[xA\000\000\000\000\000[LIVE-SYSTEM-01] \texpand: COMMIT -"...
        rlen = <value optimized out>
        retval = 0
#5  0x00007ffff4ff1f6c in sqlippool_postauth (instance=0x8c59f0, request=0x8d5b20) at 
rlm_sqlippool.c:596
        data = 0x8c59f0
        allocation = "\001\000\000\000\000\000\000\000\237\314\336\367\377\177\000\000 
[\215\000\000\000\000\000\350\003", '\000' <repeats 14 times>, 
"O\317\336\367\377\177\000\000\000\004\000\000\000\000\000\000H[\215\000\000\000\000
\000 [\215\000\000\000\000\000\001", '\000' <repeats 15 times>"\305, 
#B\000\000\000\000\000 
\000\000\000\060\000\000\000\340\322\377\377\377\177\000\000\000\322\377\377\377\177
\000\000\026\371:\367\377\177\000\000\060\000\000\000\060\000\000\000\020\323\377\37
7\377\177\000\000 
\322\377\377\377\177\000\000\000\000\000\000\000\000\000\000]pC\000\000\000\000\000\
260X\214\000\000\000\000\000\200\033y\000\000\000\000\000H[\215\000\000\000\000\000\
002\000\000\000\000\000\000\000\300\204C\000\000\000\000\000\310t\335\367\377\177\00
0\000\000\000\000\000\377\177\000\000\000\000\000\000\000\000\000\000 
[\215\000\000\000\000\000\340\060y\000\000\000\000\000Saf\000\000"
        allocation_len = <value optimized out>
        ip_allocation = <value optimized out>
        vp = <value optimized out>
        sqlsocket = 0x898640
        ipaddr = {af = 6709588, ipaddr = {ip4addr = {s_addr = 0}, ip6addr = {__in6_u = {
                __u6_addr8 = "\000\000\000\000\265=a\234\061\000\000\000 at Y\215", 
__u6_addr16 = {0, 0, 15797, 40033, 49, 0, 22848, 141}, 
                __u6_addr32 = {0, 2623618485, 49, 9263424}}}}, scope = 0}
        logstr = 
"@E{\367\377\177\000\000/\346:\367\377\177\000\000\000\000\000\000\000\000\000\000\0
22\004\000\000\000\000\000\000Pv\215\000\000\000\000\000\025\000\000\000\000\000\00
0\000\005", '\000' <repeats 15 times>, "\020\321\377\377\377\177\000\000p\001", '\000' 
<repeats 30 times>, 
"\025\000\000\000\065\000\000\000[\000\000\000n\000\000\000w\000\000\000|\000\000\000 
\321\377\377\377\177\000\000\017\321\377\377\377\177\000\000\377\377\377\377\000\000
\000\000\062\316\335\367\377\177\000\000\000\000\000\000\000\000\000\000\342\v\336\3
67\377\177\000\000\360\070 
\000\000\000\000\000\300qÜ1\000\000\000@\001\000\000\000\000\000\000\001\000\000\0
00\000\000\000\000\270\274w\000\000\000\000\000@\322\377\377\377\177\000\000PCy\0
00\000\000\000\000\375\237\247\234\061\000\000\000\350\003\000\000\000\000\000\000\2
70\274w\000\000"
        sqlusername = 
"BCa10733 at BELCENTER\000\367\377\177\000\000\230\066@\000\000\000\000\000ؐ\244
\234\061\000\000\000\227%C\000\000\000\000\000\000\000\000\000\001\000\000\000\001\
000\000\000\377\177\000\000\225%C\000\000\000\000\000\000\000\000\000\n\000\000\000
P\321\377\377\377\177\000\000p\321\377\377\377\177\000\000\220\024y", '\000' <repeats 
13 times>, "l\312\071X\000\000\000\000\242\226`\234\061", '\000' <repeats 1ֹ times>, 
"\005", '\000' <repeats 15 times>, 
"\001\000\000\000\377\177\000\000\220\024y\000\000\000\000\000\005\000\000\000\377\1
77\000\000\000\000\000\000\000\000\000\000\310t\335\367\377\177", '\000' <repeats 18 
times>"\350, 
\027y\000\000\000\000\000\360\320\377\377\377\177\000\000\001\000\000\000\000\000\00
0\000\020\321\377\377ל377\177\000\000\265=a\234\001"
#6  0x000000000041afd9 in call_modsingle (component=7, c=0x8c4a40, request=<value 
optimized out>) at modcall.c:297
        myresult = <value optimized out>
#7  modcall (component=7, c=0x8c4a40, request=<value optimized out>) at modcall.c:670
        myresult = <value optimized out>
        stack = {pointer = 2, priority = {0 <repeats 32 times>}, result = {0 <repeats 32 times>}, 
children = {
            <value optimized out> <repeats 32 times>}, start = {<value optimized out> <repeats 
32 times>}}
        parent = 0x8c5840
        child = 0x8c6500
        if_taken = 0
        was_if = 1
#8  0x0000000000419d45 in indexed_modcall (comp=7, idx=0, request=0x8d5b20) at 
modules.c:759
        rcode = <value optimized out>
        list = <value optimized out>
        server = <value optimized out>
#9  0x0000000000408495 in rad_postauth (request=0x8d5b20) at auth.c:422
        result = <value optimized out>
        postauth_type = <value optimized out>
        vp = 0x0
#10 0x0000000000408afb in rad_authenticate (request=0x8d5b20) at auth.c:812
        namepair = 0x8d7500
        check_item = 0x0
        auth_item = 0x8d5e90
        module_msg = <value optimized out>
        tmp = <value optimized out>
        result = 0
        password = 0x436e91 ""
        autz_retry = <value optimized out>
        autz_type = <value optimized out>
#11 0x0000000000429813 in radius_handle_request (request=0x8d5b20, fun=0x4084e0 
<rad_authenticate>) at event.c:4243
No locals.
#12 0x0000000000420a55 in thread_pool_addrequest (request=0x8d5b20, fun=0x4084e0 
<rad_authenticate>) at threads.c:900
No locals.
#13 0x000000000042746d in event_socket_handler (xel=<value optimized out>, fd=<value 
optimized out>, ctx=0x8d5580) at event.c:3957
        listener = 0x8d5580
        fun = 0x4084e0 <rad_authenticate>
        request = 0x8d5b20
#14 0x00007ffff7df0fdf in fr_event_loop (el=0x8c7a80) at event.c:413
        ef = <value optimized out>
        i = <value optimized out>
        rcode = 1
        maxfd = 26
        when = {tv_sec = 0, tv_usec = 0}
        wake = <value optimized out>
        read_fds = {fds_bits = {33554432, 0 <repeats 15 times>}}
        master_fds = {fds_bits = {109051904, 0 <repeats 15 times>}}
#15 0x000000000041d434 in main (argc=<value optimized out>, argv=<value optimized 
out>) at radiusd.c:408
        rcode = <value optimized out>
        argval = <value optimized out>
        spawn_flag = 0
        dont_fork = 1
        flag = 0
        act = {__sigaction_handler = {sa_handler = 0x41cef0 <sig_fatal>,
------- End of forwarded message -------

Breuer Nicolas
Network Supervisor
Sales Executive

BELCENTER sprl/bvba
Avenue Henri Consciencelaan, 94 
Bruxelles 1140 Brussel

T. : +32 (0)2 403 04 60
F. : +32 (0)2 403 04 63
M. :+32 (0)486 50 27 87
E. : Nicolas.Breuer at Belcenter.biz
W. : http://www.BelCenter.be | http://www.BelCenter.net


-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://lists.freeradius.org/pipermail/freeradius-users/attachments/20110317/08ffbfac/attachment.html>


More information about the Freeradius-Users mailing list