Backtrace of ldap related crash

Franks Andy (IT Technical Architecture Manager) Andy.Franks at sath.nhs.uk
Tue Sep 22 12:16:18 CEST 2015


Hi all,
  FreeRADIUS Version 3.1.0 (git #390f216), built from source (just testing!)

I'm getting the below when having timeouts and connectivity issues with our ldap servers, normally it's fine, but it's still a crash..
Can anybody tell if this issue is fixed and we should upgrade?
Ideally we'd have ldap go completely wrong but freeradius ride on through it.
Thanks
Andy

Debug: (-X)

rlm_ldap (ldap2): Bind with cn=LDAPQuery,OU=SpecialUsers,OU=SATHUsers,DC=SATH,DC=nhs,DC=uk to ldap://10.51.0.39:389 failed: Timed out while waiting for server to respond
rlm_ldap (ldap2): Failed to reconnect (24), no free connections are available
(265) ldap2: ERROR: Bind with cn=LDAPQuery,OU=SpecialUsers,OU=SATHUsers,DC=SATH,DC=nhs,DC=uk to ldap://10.51.0.39:389 failed: Timed out while waiting for server to respond
(265) ldap2: Processing user attributes
Program received signal SIGSEGV, Segmentation fault.

Backtrace:

  Program received signal SIGSEGV, Segmentation fault.
0x00007ffff2fc2b8a in mod_authorize (instance=0xb3c680, request=0xd5f060) at src/modules/rlm_ldap/rlm_ldap.c:1455
1455                    if (rlm_ldap_map_do(inst, request, conn->handle, &expanded, entry) > 0) rcode = RLM_MODULE_UPDATED;
(gdb) bt
#0  0x00007ffff2fc2b8a in mod_authorize (instance=0xb3c680, request=0xd5f060) at src/modules/rlm_ldap/rlm_ldap.c:1455
#1  0x00000000004297bb in call_modsingle (component=RLM_COMPONENT_AUTZ, sp=0xc121e0, request=0xd5f060) at src/main/modcall.c:302
#2  0x0000000000429f52 in modcall_recurse (request=0xd5f060, component=RLM_COMPONENT_AUTZ, depth=5, entry=0x7fffffffd828, do_next_sibling=false)
    at src/main/modcall.c:584
#3  0x000000000042999e in modcall_child (request=0xd5f060, component=RLM_COMPONENT_AUTZ, depth=5, entry=0x7fffffffd810, c=0xc121e0, result=0x7fffffffb8f0,
    do_next_sibling=false) at src/main/modcall.c:408
#4  0x000000000042b241 in modcall_recurse (request=0xd5f060, component=RLM_COMPONENT_AUTZ, depth=4, entry=0x7fffffffd810, do_next_sibling=true)
    at src/main/modcall.c:963
#5  0x000000000042999e in modcall_child (request=0xd5f060, component=RLM_COMPONENT_AUTZ, depth=4, entry=0x7fffffffd7f8, c=0xc12020, result=0x7fffffffbf30,
    do_next_sibling=true) at src/main/modcall.c:408
#6  0x000000000042aa27 in modcall_recurse (request=0xd5f060, component=RLM_COMPONENT_AUTZ, depth=3, entry=0x7fffffffd7f8, do_next_sibling=true)
    at src/main/modcall.c:788
#7  0x000000000042999e in modcall_child (request=0xd5f060, component=RLM_COMPONENT_AUTZ, depth=3, entry=0x7fffffffd7e0, c=0xc11f20, result=0x7fffffffc570,
    do_next_sibling=true) at src/main/modcall.c:408
#8  0x000000000042aff2 in modcall_recurse (request=0xd5f060, component=RLM_COMPONENT_AUTZ, depth=2, entry=0x7fffffffd7e0, do_next_sibling=true)
    at src/main/modcall.c:925
#9  0x000000000042999e in modcall_child (request=0xd5f060, component=RLM_COMPONENT_AUTZ, depth=2, entry=0x7fffffffd7c8, c=0xc11930, result=0x7fffffffcbb0,
    do_next_sibling=true) at src/main/modcall.c:408
#10 0x000000000042aa27 in modcall_recurse (request=0xd5f060, component=RLM_COMPONENT_AUTZ, depth=1, entry=0x7fffffffd7c8, do_next_sibling=true)
    at src/main/modcall.c:788
#11 0x000000000042999e in modcall_child (request=0xd5f060, component=RLM_COMPONENT_AUTZ, depth=1, entry=0x7fffffffd7b0, c=0xbff230, result=0x7fffffffd1f0,
    do_next_sibling=true) at src/main/modcall.c:408
#12 0x000000000042aa27 in modcall_recurse (request=0xd5f060, component=RLM_COMPONENT_AUTZ, depth=0, entry=0x7fffffffd7b0, do_next_sibling=true)
    at src/main/modcall.c:788
#13 0x000000000042b864 in modcall (component=RLM_COMPONENT_AUTZ, c=0xbff130, request=0xd5f060) at src/main/modcall.c:1134
#14 0x0000000000426d1f in indexed_modcall (comp=RLM_COMPONENT_AUTZ, idx=0, request=0xd5f060) at src/main/modules.c:890
#15 0x0000000000429088 in process_authorize (autz_type=0, request=0xd5f060) at src/main/modules.c:2000
#16 0x000000000040f2a3 in rad_authenticate (request=0xd5f060) at src/main/auth.c:436
#17 0x000000000043e09e in request_running (request=0xd5f060, action=1) at src/main/process.c:1492
#18 0x000000000043cef5 in request_queue_or_run (request=0xd5f060, process=0x43df60 <request_running>) at src/main/process.c:986
#19 0x000000000043e94a in request_receive (ctx=0xd5ecf0, listener=0xca6ec0, packet=0xd5ed50, client=0xad7d00, fun=0x40f029 <rad_authenticate>)
    at src/main/process.c:1751
#20 0x00000000004183e8 in auth_socket_recv (listener=0xca6ec0) at src/main/listen.c:1566
#21 0x0000000000445bc6 in event_socket_handler (xel=0xada7a0, fd=12, ctx=0xca6ec0) at src/main/process.c:4473
#22 0x00007ffff7986bf1 in fr_event_loop (el=0xada7a0) at src/lib/event.c:638
#23 0x00000000004479dc in radius_event_process () at src/main/process.c:5420
#24 0x00000000004319b0 in main (argc=2, argv=0x7fffffffe648) at src/main/radiusd.c:581


More information about the Freeradius-Users mailing list