Your message dated Sun, 29 May 2005 13:34:57 -0400 with message-id <[EMAIL PROTECTED]> and subject line Bug#255276: fixed in openldap2.2 2.2.23-6 has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with. If this is not the case it is now your responsibility to reopen the Bug report if necessary, and/or fix the problem forthwith. (NB: If you are a system administrator and have no idea what I am talking about this indicates a serious mail system misconfiguration somewhere. Please contact me immediately.) Debian bug tracking system administrator (administrator, Debian Bugs database) -------------------------------------- Received: (at submit) by bugs.debian.org; 4 Apr 2005 15:25:47 +0000 >From [EMAIL PROTECTED] Mon Apr 04 08:25:47 2005 Return-path: <[EMAIL PROTECTED]> Received: from (feyerabend.lis.bremen.de) [134.102.64.25] by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DITSV-0000Id-00; Mon, 04 Apr 2005 08:25:47 -0700 Received: from wollie by feyerabend.lis.bremen.de with local (Exim 4.50) id 1DITSJ-0000p6-HT for [EMAIL PROTECTED]; Mon, 04 Apr 2005 17:25:35 +0200 Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Wolfgang Kohnen <[EMAIL PROTECTED]> To: Debian Bug Tracking System <[EMAIL PROTECTED]> Subject: slapd goes into endless sched_yield() loop X-Mailer: reportbug 3.8 Date: Mon, 04 Apr 2005 17:25:35 +0200 Message-Id: <[EMAIL PROTECTED]> X-lis.bremen.de-MailScanner: Found to be clean X-MailScanner-From: [EMAIL PROTECTED] Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-8.0 required=4.0 tests=BAYES_00,HAS_PACKAGE autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: Package: slapd Version: 2.1.30-3 Severity: important Sometimes all openldap programs (slapd, slapcat, slapindex) which want to access my bdb_backend the program eats up all cpu cycles and doesn't react anymore except of SIGNAL 2 and 4 (not 15; didn't check any other). Increasing the loglevel didn't show anything interesting (to me; I am no programmer). I did a strace on slapindex and slapcat which showed both times that there is an endless invocation of sched_yield(). A strace of slapcat can be found here: http://duplo.lis.bremen.de/~wollie/slapcat.strace Please drop me a line if you would like to have a look into my exact configureation. Maybe the index lines in slapd.conf are interesting (I am using gosa): index default sub index uid,mail eq index gosaMailAlternateAddress,gosaMailForwardingAddress eq index cn,sn,givenName,ou pres,eq,sub index objectClass pres,eq index uidNumber,gidNumber,memberuid eq index gosaSubtreeACL,gosaObject,gosaUser pres,eq Greets, Wollie -- System Information: Debian Release: 3.1 APT prefers testing APT policy: (500, 'testing') Architecture: i386 (i686) Kernel: Linux 2.6.8 Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15) Versions of packages slapd depends on: ii coreutils [fileutils] 5.2.1-2 The GNU core utilities ii debconf 1.4.30.11 Debian configuration management sy ii libc6 2.3.2.ds1-20 GNU C Library: Shared libraries an ii libdb4.2 4.2.52-18 Berkeley v4.2 Database Libraries [ ii libgcrypt11 1.2.0-4 LGPL Crypto library - runtime libr ii libgnutls11 1.0.16-9 GNU TLS library - runtime library ii libgpg-error0 1.0-1 library for common error values an ii libiodbc2 3.52.2-3 iODBC Driver Manager ii libldap2 2.1.30-3 OpenLDAP libraries ii libltdl3 1.5.6-4 A system independent dlopen wrappe ii libsasl2 2.1.19-1.5 Authentication abstraction library ii libslp1 1.0.11a-2 OpenSLP libraries ii libwrap0 7.6.dbs-8 Wietse Venema's TCP wrappers libra ii perl [libmime-base64-perl] 5.8.4-8 Larry Wall's Practical Extraction ii psmisc 21.5-1 Utilities that use the proc filesy ii zlib1g 1:1.2.2-3 compression library - runtime -- debconf information: slapd/password_mismatch: slapd/fix_directory: true slapd/invalid_config: true * shared/organization: sub.example.com slapd/upgrade_slapcat_failure: slapd/upgrade_slapadd_failure: slapd/backend: BDB * slapd/allow_ldap_v2: false slapd/no_configuration: false slapd/move_old_database: true slapd/suffix_change: false slapd/slave_databases_require_updateref: slapd/autoconf_modules: true slapd/purge_database: false slapd/admin: * slapd/domain: sub.example.com --------------------------------------- Received: (at 255276-close) by bugs.debian.org; 29 May 2005 19:43:31 +0000 >From [EMAIL PROTECTED] Sun May 29 12:43:31 2005 Return-path: <[EMAIL PROTECTED]> Received: from newraff.debian.org [208.185.25.31] (mail) by spohr.debian.org with esmtp (Exim 3.35 1 (Debian)) id 1DcRlm-0006oJ-00; Sun, 29 May 2005 10:40:14 -0700 Received: from katie by newraff.debian.org with local (Exim 3.35 1 (Debian)) id 1DcRgf-0007HL-00; Sun, 29 May 2005 13:34:57 -0400 From: Torsten Landschoff <[EMAIL PROTECTED]> To: [EMAIL PROTECTED] X-Katie: $Revision: 1.56 $ Subject: Bug#255276: fixed in openldap2.2 2.2.23-6 Message-Id: <[EMAIL PROTECTED]> Sender: Archive Administrator <[EMAIL PROTECTED]> Date: Sun, 29 May 2005 13:34:57 -0400 Delivered-To: [EMAIL PROTECTED] X-Spam-Checker-Version: SpamAssassin 2.60-bugs.debian.org_2005_01_02 (1.212-2003-09-23-exp) on spohr.debian.org X-Spam-Status: No, hits=-6.0 required=4.0 tests=BAYES_00,HAS_BUG_NUMBER autolearn=no version=2.60-bugs.debian.org_2005_01_02 X-Spam-Level: X-CrossAssassin-Score: 4 Source: openldap2.2 Source-Version: 2.2.23-6 We believe that the bug you reported is fixed in the latest version of openldap2.2, which is due to be installed in the Debian FTP archive: ldap-utils_2.2.23-6_i386.deb to pool/main/o/openldap2.2/ldap-utils_2.2.23-6_i386.deb libldap-2.2-7_2.2.23-6_i386.deb to pool/main/o/openldap2.2/libldap-2.2-7_2.2.23-6_i386.deb openldap2.2_2.2.23-6.diff.gz to pool/main/o/openldap2.2/openldap2.2_2.2.23-6.diff.gz openldap2.2_2.2.23-6.dsc to pool/main/o/openldap2.2/openldap2.2_2.2.23-6.dsc slapd_2.2.23-6_i386.deb to pool/main/o/openldap2.2/slapd_2.2.23-6_i386.deb A summary of the changes between this version and the previous one is attached. Thank you for reporting the bug, which will now be closed. If you have further comments please address them to [EMAIL PROTECTED], and the maintainer will reopen the bug report if appropriate. Debian distribution maintenance software pp. Torsten Landschoff <[EMAIL PROTECTED]> (supplier of updated openldap2.2 package) (This message was generated automatically at their request; if you believe that there is a problem with it please contact the archive administrators by mailing [EMAIL PROTECTED]) -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Format: 1.7 Date: Sun, 29 May 2005 18:23:20 +0200 Source: openldap2.2 Binary: slapd ldap-utils libldap-2.2-7 Architecture: source i386 Version: 2.2.23-6 Distribution: unstable Urgency: low Maintainer: Torsten Landschoff <[EMAIL PROTECTED]> Changed-By: Torsten Landschoff <[EMAIL PROTECTED]> Description: ldap-utils - OpenLDAP utilities libldap-2.2-7 - OpenLDAP libraries slapd - OpenLDAP server (slapd) Closes: 255276 303505 306229 308234 310422 Changes: openldap2.2 (2.2.23-6) unstable; urgency=low . Torsten Landschoff <[EMAIL PROTECTED]>: * debian/po/ja.po: Merge updates from Kenshi Muto (closes: #303505). * debian/po/fr.po: Merge updates from Christian Perrier (closes: #306229). * debian/slapd.scripts-common: If the user enters the empty value for the database dumping directory use the default value. Seems like the readline interface does not care about the default value (closes: #308234). * debian/slapd.postinst: Make sure the debhelper commands are executed in all cases (closes: #310422). * Merged suggested changes by Eugene Konev to automatically run db_recover before starting slapd (closes: #255276). + debian/slapd.init: Run db_recover if enabled and available and no slapd process running. + debian/slapd.default: Add configuration option to disable it. * Applied and improved patch by Matthijs Mohlmann to support migration from ldbm to bdb backend. + debian/slapd.config: Ask if migration is wanted. + debian/slapd.postinst: Update configuration from ldbm to bdb if yes. + debian/slapd.scripts-common: Implemented some parts in their own functions. * Add a README.DB_CONFIG.gz and reference it where referring to BDB configuration. * Update default DB_CONFIG with some senseful values. . Steve Langasek <[EMAIL PROTECTED]>: * libraries/libldap_r/Makefile.in: make sure the ximian-connector ntlm patch is applied to libldap_r, not just to libldap * debian/move_files: make libldap a symlink to libldap_r, as carrying two versions of this library around is more trouble than it's worth, and can cause glorious segfaults down the line Files: 1b46caee7a3377aff6ab29c3034dde86 1035 net optional openldap2.2_2.2.23-6.dsc 20983ed8e341b87a04116cd7db075e20 489688 net optional openldap2.2_2.2.23-6.diff.gz 80f24b17e4700ef5b8763c13f8051d3e 809150 net optional slapd_2.2.23-6_i386.deb 8e72f04c89b139f48da941138113fa5a 118614 net optional ldap-utils_2.2.23-6_i386.deb 73b838fd8862e1b6c2fd7e029dc84d47 151250 libs important libldap-2.2-7_2.2.23-6_i386.deb -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.1 (GNU/Linux) iD8DBQFCmfsCdQgHtVUb5EcRAj1rAJwPK6SUSnp1F8D0jy5j4rUUc4CksACfdNCI gb84g+HfrrjhwJuSVlH0CQg= =r31z -----END PGP SIGNATURE----- -- To UNSUBSCRIBE, email to [EMAIL PROTECTED] with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]