Your message dated Sat, 14 May 2011 08:16:11 +0200
with message-id <[email protected]>
and subject line Re: Bug#587563: Bug 587563: More information about "samba:  
too low value for rlimit_max"
has caused the Debian Bug report #587563,
regarding samba: too low value for rlimit_max
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact [email protected]
immediately.)


-- 
587563: http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=587563
Debian Bug Tracking System
Contact [email protected] with problems
--- Begin Message ---
Package: samba
Version: 2:3.4.8~dfsg-1~bpo50+1
Severity: normal

testparm warns about a too low value of rlimit_max, it should be
increased via ulimit in the init.d script or by patching [n,s]mbd.

-- System Information:
Debian Release: 5.0.5
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)

Kernel: Linux 2.6.26-2-686 (SMP w/2 CPU cores)
Locale: LANG=it_IT@euro, LC_CTYPE=it_IT@euro (charmap=ISO-8859-15)
Shell: /bin/sh linked to /bin/bash

Versions of packages samba depends on:
ii  adduser         3.110                    add and remove users and groups
ii  debconf [debcon 1.5.24                   Debian configuration management sy
ii  libacl1         2.2.47-2                 Access control list shared library
ii  libattr1        1:2.4.43-2               Extended attribute shared library
ii  libc6           2.7-18lenny4             GNU C Library: Shared libraries
ii  libcap2         2.11-2                   support for getting/setting POSIX.
ii  libcomerr2      1.41.3-1                 common error description library
ii  libcups2        1.3.8-1+lenny8           Common UNIX Printing System(tm) - 
ii  libgnutls26     2.4.2-6+lenny2           the GNU TLS library - runtime libr
ii  libkrb53        1.6.dfsg.4~beta1-5lenny4 MIT Kerberos runtime libraries
ii  libldap-2.4-2   2.4.11-1+lenny1          OpenLDAP libraries
ii  libpam-modules  1.0.1-5+lenny1           Pluggable Authentication Modules f
ii  libpam-runtime  1.0.1-5+lenny1           Runtime support for the PAM librar
ii  libpam0g        1.0.1-5+lenny1           Pluggable Authentication Modules l
ii  libpopt0        1.14-4                   lib for parsing cmdline parameters
ii  libtalloc2      2.0.1-1~bpo50+1          hierarchical pool based memory all
ii  libwbclient0    2:3.4.8~dfsg-1~bpo50+1   Samba winbind client library
ii  lsb-base        3.2-20                   Linux Standard Base 3.2 init scrip
ii  procps          1:3.2.7-11               /proc file system utilities
ii  samba-common    2:3.4.8~dfsg-1~bpo50+1   common files used by both the Samb
ii  update-inetd    4.31                     inetd configuration file updater
ii  zlib1g          1:1.2.3.3.dfsg-12        compression library - runtime

Versions of packages samba recommends:
ii  logrotate                     3.7.1-5    Log rotation utility

Versions of packages samba suggests:
pn  ctdb                          <none>     (no description available)
pn  ldb-tools                     <none>     (no description available)
pn  openbsd-inetd | inet-superser <none>     (no description available)
ii  smbldap-tools                 0.9.4-1    Scripts to manage Unix and Samba a

-- debconf information:
  samba/nmbd_from_inetd:
  samba/log_files_moved:
  samba/tdbsam: false
* samba/generate_smbpasswd: true
* samba/run_mode: daemons



--- End Message ---
--- Begin Message ---
Version: 2:3.5.8~dfsg-1

Quoting Giovanni Bechis ([email protected]):

> Recently I upgraded the server to Debian 6.0.1 but I have the same
> warning in testparm.
> To work around the issue I have to run `ulimit -n 16384` before the
> testparm command.
> The main problem was that I had to tweek limits.conf to allow
> workstations to login on the pdc, I think a warning during upgrade would
> be useful.

Well, now that I see the full message, It reminds me another bug
report we had.

http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=608624

linked to upstream:

https://bugzilla.samba.org/show_bug.cgi?id=7898

and closed there in 3.5.8


Hence closing with version tagging.

Thanks for your followup which helped in identifying this.

(of course, the bug is still valid in squeeze, but that's what closing
it with version tagging is about..:-))


Attachment: signature.asc
Description: Digital signature


--- End Message ---

Reply via email to