DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://issues.apache.org/bugzilla/show_bug.cgi?id=24801>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND INSERTED IN THE BUG DATABASE.
http://issues.apache.org/bugzilla/show_bug.cgi?id=24801 Apache crashes when distinct users exceeds LDAPCacheEntries ------- Additional Comments From [EMAIL PROTECTED] 2004-05-24 20:07 ------- I applied the patch provided to 2.0.49 sources (the latest I had readily available) and get a crash with the following traceback (on Windows). Note this was for user 2161 with a cache size of 2150. Also note that this executable also includes the latest patches for util_ldap.c [for authenticated LDAP server access] and mod_auth_ldap.c [for avoiding double-escaping with Microsoft's LDAP SDK]. util_ldap_dn_compare_node_compare(void * 0x00815b98, void * 0x04d4de80) line 91 + 12 bytes util_ald_cache_fetch(util_ald_cache * 0x00d8008c, void * 0x04d4de80) line 351 + 17 bytes util_ldap_cache_checkuserid(request_rec * 0x6fb51341, util_ldap_connection_t * 0x007dd1e8, const char * 0x0078ced0, const char * 0x007799c8, int 7991832, char * * 0x00000002, const char * 0x00000000, const char * 0x04d4def0, const char * * 0x007dee59, const char * * * 0x04d4dee4) line 766 + 22 bytes mod_auth_ldap_check_user_id(request_rec * 0x6ff10e5f) line 334 ap_run_check_user_id(request_rec * 0x007dd1e8) line 69 + 31 bytes ap_process_request_internal(request_rec * 0x6ff0d6f8) line 193 + 6 bytes ap_process_request(request_rec * 0x007dd1e8) line 245 ap_process_http_connection(conn_rec * 0x6ff0423f) line 250 + 6 bytes ap_run_process_connection(conn_rec * 0x007c8ab8) line 42 + 31 bytes ap_process_connection(conn_rec * 0x007c8ab8, void * 0x007c89e8) line 175 + 6 bytes worker_main(long 2013300156) line 718 MSVCRT! 780085bc() KERNEL32! 7c581af6() Once I let this process die a new child process is created and the test set (of 2500 users) works fine. For testing this sort of thing, I recommend just exporting a single user (with password) from LDAP and using this export as a template to programmatically create many users all the same attributes except for the user name. You can then use a simple program, script, or even Ant to attempt to fetch an authenticated resource on behalf of each user in turn. --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
