On May 7, 2009, at 6:51 PM, Mark Andrews wrote:

(gdb) backtrace
#0  0x00002adb2b0e0215 in raise () from /lib64/libc.so.6
#1  0x00002adb2b0e1cc0 in abort () from /lib64/libc.so.6
#2  0x00002adb27c4c9e0 in assertion_failed (file=0x2adb2922428b
"mem.c", line=918, type=<value optimized out>, cond=0x2adb292245b5
"ctx->stats[i].gets == 0U")
    at ./main.c:166
#3  0x00002adb29202488 in destroy (ctx=0x2adb27ece6c0) at mem.c:918
#4  0x00002adb29202755 in isc_mem_destroy (ctxp=0x2adb27ea0340) at
mem.c:1067
#5  0x00002adb27c4dc78 in main (argc=0, argv=0x7fff82e7e928) at ./
main.c:1064

        This is indicative of a memory / reference leak being
        detected on shutdown.


I just had two more happen. This is not even a production server as of yet, it is being readied for that though. There should be very little hitting named-sdb at this point...

(gdb) backtrace
#0 0x00002af5a089fdfb in ?? () from /usr/lib64/mysql/ libmysqlclient.so.15 #1 0x00002af5a08a0179 in my_net_read () from /usr/lib64/mysql/ libmysqlclient.so.15 #2 0x00002af5a0899922 in cli_safe_read () from /usr/lib64/mysql/ libmysqlclient.so.15 #3 0x00002af5a089a9f9 in ?? () from /usr/lib64/mysql/ libmysqlclient.so.15
#4  0x00002af5a0898f9e in mysql_real_query ()
   from /usr/lib64/mysql/libmysqlclient.so.15
#5 0x00002af59f09c67a in mysql_get_resultset (zone=0x4542f960 "ns1.*****.com", record=<value optimized out>, client=0x0, query=4, dbdata=0x2af59f3391e0,
    rs=0x4542f918) at ../../contrib/dlz/drivers/dlz_mysql_driver.c:324
#6 0x00002af59f09c80b in mysql_findzone (driverarg=<value optimized out>,
    dbdata=0x2af59f3391e0, name=0x4542f960 "ns1.******.com")
    at ../../contrib/dlz/drivers/dlz_mysql_driver.c:515
#7  0x00002af59f7c8353 in dns_sdlzfindzone (driverarg=0x2af59f2fc410,
dbdata=0x2af59f3391e0, mctx=0x2af59f2ea6c0, rdclass=1, name=0x4542fdf0,
    dbp=0x45430058) at sdlz.c:1461
#8 0x00002af59f72cf22 in dns_dlzfindzone (view=0x2af59f3d8d20, name=0x2aaaaafda090,
    minlabels=3, dbp=0x45430058) at dlz.c:294
#9 0x00002af59f06add4 in query_getdb (client=0x2aaaaafd1b20, name=0x2aaaaafda090, qtype=<value optimized out>, options=0, zonep=0x45431050, dbp=0x454310b8,
    versionp=0x45431058, is_zonep=0x454310cc) at query.c:925
#10 0x00002af59f06fe92 in query_find (client=0x2aaaaafd1b20, event=0x0, qtype=1)
    at query.c:3805
#11 0x00002af59f0735cd in ns_query_start (client=0x2aaaaafd1b20) at query.c:5095
#12 0x00002af59f06026d in client_request (task=<value optimized out>,
    event=<value optimized out>) at client.c:1898
#13 0x00002af5a0629e2c in run (uap=<value optimized out>) at task.c:862
#14 0x00002af5a1ae2367 in start_thread () from /lib64/libpthread.so.0
#15 0x00002af5a259f0ad in clone () from /lib64/libc.so.6

This looks MySql related. I have mysql query logging enabled, so I can see what comes in. So far, nothing looks malformed, which is a sure fire way to make one of these core dumps happen.
--
Scott * If you contact me off list replace talklists@ with scott@ *

_______________________________________________
bind-users mailing list
bind-users@lists.isc.org
https://lists.isc.org/mailman/listinfo/bind-users

Reply via email to