DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://issues.apache.org/bugzilla/show_bug.cgi?id=24801>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://issues.apache.org/bugzilla/show_bug.cgi?id=24801

Apache crashes when distinct users exceeds LDAPCacheEntries





------- Additional Comments From [EMAIL PROTECTED]  2004-05-24 20:07 -------
I applied the patch provided to 2.0.49 sources (the latest I had readily
available) and get a crash with the following traceback (on Windows).  Note this
was for user 2161 with a cache size of 2150.  Also note that this executable
also includes the latest patches for util_ldap.c [for authenticated LDAP server
access] and mod_auth_ldap.c [for avoiding double-escaping with Microsoft's LDAP
SDK].

util_ldap_dn_compare_node_compare(void * 0x00815b98, void * 0x04d4de80) line 91
+ 12 bytes
util_ald_cache_fetch(util_ald_cache * 0x00d8008c, void * 0x04d4de80) line 351 +
17 bytes
util_ldap_cache_checkuserid(request_rec * 0x6fb51341, util_ldap_connection_t *
0x007dd1e8, const char * 0x0078ced0, const char * 0x007799c8, int 7991832, char
* * 0x00000002, const char * 0x00000000, const char * 0x04d4def0, const char * *
0x007dee59, const char * * * 0x04d4dee4) line 766 + 22 bytes
mod_auth_ldap_check_user_id(request_rec * 0x6ff10e5f) line 334
ap_run_check_user_id(request_rec * 0x007dd1e8) line 69 + 31 bytes
ap_process_request_internal(request_rec * 0x6ff0d6f8) line 193 + 6 bytes
ap_process_request(request_rec * 0x007dd1e8) line 245
ap_process_http_connection(conn_rec * 0x6ff0423f) line 250 + 6 bytes
ap_run_process_connection(conn_rec * 0x007c8ab8) line 42 + 31 bytes
ap_process_connection(conn_rec * 0x007c8ab8, void * 0x007c89e8) line 175 + 6 
bytes
worker_main(long 2013300156) line 718
MSVCRT! 780085bc()
KERNEL32! 7c581af6()

Once I let this process die a new child process is created and the test set (of
2500 users) works fine.

For testing this sort of thing, I recommend just exporting a single user (with
password) from LDAP and using this export as a template to programmatically
create many users all the same attributes except for the user name.  You can
then use a simple program, script, or even Ant to attempt to fetch an
authenticated resource on behalf of each user in turn.

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to