Your message dated Thu, 22 Mar 2007 20:47:03 +0000
with message-id <[EMAIL PROTECTED]>
and subject line Bug#415840: fixed in db4.2 4.2.52+dfsg-2
has caused the attached Bug report to be marked as done.
This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.
(NB: If you are a system administrator and have no idea what I am
talking about this indicates a serious mail system misconfiguration
somewhere. Please contact me immediately.)
Debian bug tracking system administrator
(administrator, Debian Bugs database)
--- Begin Message ---
Package: db4.2
Severity: wishlist
Tags: patch
Hi,
please consider adding the transactions patch (attached) to db4.2.
This patch is recommended for OpenLDAP 2.2.6 and 2.2.27, while it is
required for all higher OpenLDAP versions (2.2.28 enginieering as well
as 2.3.x).
Accordung to OpenLDAP developers db4.2 is the recommended Berkeley DB
library for OpenLDAP. So not having this patch in Debian's db4.2
would hinder the further development of openldap2.x packages in Debian.
You may find further finormation about this patch on Standord's
Directory pages where it was first published (accoeding to my
knowledge):
http://www.stanford.edu/services/directory/openldap/configuration/openldap-build-42.html
As you can see the patch is quite trivial and does not affect
packages that are not aware of the flag introduced with this patch.
(BTW, I have db 4.2 with this patch running for half a year without any
problems [except the need to re-build my private package whenever a new
official package comes out ;-])
Please do not hesitate to to aks if you have any questions.
Thanks in advance
PEter
-- System Information:
Debian Release: testing/unstable
APT prefers testing
APT policy: (990, 'testing'), (500, 'unstable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.11-1-k7
Locale: [EMAIL PROTECTED], [EMAIL PROTECTED] (charmap=ISO-8859-15)
## transactions.patch by Quanah Gibson-Mount <[EMAIL PROTECTED]>
##
## fixes transaction behaviour; required for openLDAP
## published on Stanford's Directory Services pages:
## http://www.stanford.edu/services/directory/openldap/configuration/openldap-build-42.html
--- dbinc/db.in
+++ dbinc/db.in 2004-09-09 18:30:00.547903000 -0700
@@ -839,6 +839,7 @@
#define TXN_NOWAIT 0x040 /* Do not wait on locks. */
#define TXN_RESTORED 0x080 /* Transaction has been restored. */
#define TXN_SYNC 0x100 /* Sync on prepare and commit. */
+#define TXN_NOLOG 0x200 /* Do not log this transaction. */
u_int32_t flags;
};
--- txn/txn.c
+++ txn/txn.c 2004-09-09 18:32:14.559561000 -0700
@@ -127,7 +127,7 @@
if ((ret = __db_fchk(dbenv,
"txn_begin", flags,
DB_DIRTY_READ | DB_TXN_NOWAIT |
- DB_TXN_NOSYNC | DB_TXN_SYNC)) != 0)
+ DB_TXN_NOSYNC | DB_TXN_SYNC | DB_TXN_NOT_DURABLE )) != 0)
return (ret);
if ((ret = __db_fcchk(dbenv,
"txn_begin", flags, DB_TXN_NOSYNC, DB_TXN_SYNC)) != 0)
@@ -193,6 +193,8 @@
F_SET(txn, TXN_SYNC);
if (LF_ISSET(DB_TXN_NOWAIT))
F_SET(txn, TXN_NOWAIT);
+ if (LF_ISSET(DB_TXN_NOT_DURABLE))
+ F_SET(txn, TXN_NOLOG);
if ((ret = __txn_begin_int(txn, 0)) != 0)
goto err;
@@ -328,7 +330,7 @@
* We should set this value when we write the first log record, not
* here.
*/
- if (DBENV_LOGGING(dbenv))
+ if (DBENV_LOGGING(dbenv) && !F_ISSET(txn, TXN_NOLOG))
__log_txn_lsn(dbenv, &begin_lsn, NULL, NULL);
else
ZERO_LSN(begin_lsn);
--- End Message ---
--- Begin Message ---
Source: db4.2
Source-Version: 4.2.52+dfsg-2
We believe that the bug you reported is fixed in the latest version of
db4.2, which is due to be installed in the Debian FTP archive:
db4.2-util_4.2.52+dfsg-2_i386.deb
to pool/main/d/db4.2/db4.2-util_4.2.52+dfsg-2_i386.deb
db4.2_4.2.52+dfsg-2.diff.gz
to pool/main/d/db4.2/db4.2_4.2.52+dfsg-2.diff.gz
db4.2_4.2.52+dfsg-2.dsc
to pool/main/d/db4.2/db4.2_4.2.52+dfsg-2.dsc
libdb4.2++-dev_4.2.52+dfsg-2_i386.deb
to pool/main/d/db4.2/libdb4.2++-dev_4.2.52+dfsg-2_i386.deb
libdb4.2++c2_4.2.52+dfsg-2_i386.deb
to pool/main/d/db4.2/libdb4.2++c2_4.2.52+dfsg-2_i386.deb
libdb4.2-dev_4.2.52+dfsg-2_i386.deb
to pool/main/d/db4.2/libdb4.2-dev_4.2.52+dfsg-2_i386.deb
libdb4.2-java-dev_4.2.52+dfsg-2_i386.deb
to pool/main/d/db4.2/libdb4.2-java-dev_4.2.52+dfsg-2_i386.deb
libdb4.2-java_4.2.52+dfsg-2_i386.deb
to pool/main/d/db4.2/libdb4.2-java_4.2.52+dfsg-2_i386.deb
libdb4.2-tcl_4.2.52+dfsg-2_i386.deb
to pool/main/d/db4.2/libdb4.2-tcl_4.2.52+dfsg-2_i386.deb
libdb4.2_4.2.52+dfsg-2_i386.deb
to pool/main/d/db4.2/libdb4.2_4.2.52+dfsg-2_i386.deb
A summary of the changes between this version and the previous one is
attached.
Thank you for reporting the bug, which will now be closed. If you
have further comments please address them to [EMAIL PROTECTED],
and the maintainer will reopen the bug report if appropriate.
Debian distribution maintenance software
pp.
Clint Adams <[EMAIL PROTECTED]> (supplier of updated db4.2 package)
(This message was generated automatically at their request; if you
believe that there is a problem with it please contact the archive
administrators by mailing [EMAIL PROTECTED])
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
Format: 1.7
Date: Thu, 22 Mar 2007 15:22:35 -0400
Source: db4.2
Binary: db4.2-util libdb4.2-tcl libdb4.2-java libdb4.2 libdb4.2-dev
libdb4.2++c2 libdb4.2-java-dev libdb4.2++-dev
Architecture: source i386
Version: 4.2.52+dfsg-2
Distribution: unstable
Urgency: high
Maintainer: Debian Berkeley DB Maintainers <[EMAIL PROTECTED]>
Changed-By: Clint Adams <[EMAIL PROTECTED]>
Description:
db4.2-util - Berkeley v4.2 Database Utilities
libdb4.2 - Berkeley v4.2 Database Libraries [runtime]
libdb4.2++-dev - Berkeley v4.2 Database Libraries for C++ [development]
libdb4.2++c2 - Berkeley v4.2 Database Libraries for C++ [runtime]
libdb4.2-dev - Berkeley v4.2 Database Libraries [development]
libdb4.2-java - Berkeley v4.2 Database Libraries for Java
libdb4.2-java-dev - Berkeley v4.2 Database Libraries for Java [development]
libdb4.2-tcl - Berkeley v4.2 Database Libraries for TCL [module]
Closes: 375595 395679 409874 415840
Changes:
db4.2 (4.2.52+dfsg-2) unstable; urgency=high
.
* Remove previous Java fixes for db_java_wrap.c.
* Apply patch 4.2.52.3: Java applications that repeatedly open and close
database environments can leak memory. (This patch is only applicable
to Berkeley DB library builds which include Java API support, that is,
libraries configured with the --enable-java option.)
* Apply patch 4.2.52.4: Fix a bug where recovery of a page split after a
non-transactional update to the next page would fail to update the back
pointer. This bug could result in log sequence errors and missing data
when when the database is walked with a cursor, after data was initially
loaded into a database non-transactionally (for example, by using the
db_load utility).
* Apply patch 4.2.52.5: Fix a bug where cache buffer retrieval could race
with a checkpoint call, potentially causing database environment recovery
to fail. [#14657]. closes: #415840.
* Update config.guess and config.sub to 2006-07-02, thereby including
support for m32r. closes: #375595, #409874.
* Add empty binary-indep target. closes: #395679.
Files:
02eac0a968e0975f2bc820c684f5d5e6 982 libs standard db4.2_4.2.52+dfsg-2.dsc
9933b837a5057958f7512c158a4b7df0 109851 libs standard
db4.2_4.2.52+dfsg-2.diff.gz
f5a0a21e5b148b307d72349f7df76e05 391296 libs standard
libdb4.2_4.2.52+dfsg-2_i386.deb
6fd2cc1fdb6a2da44f83beb78cae943d 464034 libdevel extra
libdb4.2-dev_4.2.52+dfsg-2_i386.deb
ec7eb0c935ed53283a435ba051c0df9d 417810 libs optional
libdb4.2++c2_4.2.52+dfsg-2_i386.deb
d6f98c95fcde000aeb8f7b21e389dba9 938042 libdevel extra
libdb4.2++-dev_4.2.52+dfsg-2_i386.deb
7e66749d0077ea62a76e6fe97f3253c6 947748 interpreters extra
libdb4.2-tcl_4.2.52+dfsg-2_i386.deb
35889b618646a608448efaa220c98ac8 60430 utils optional
db4.2-util_4.2.52+dfsg-2_i386.deb
23831cb660535134b510c6da90097651 562444 libs optional
libdb4.2-java_4.2.52+dfsg-2_i386.deb
1320687399fab31fabe8660b2e35bd8c 466128 libs optional
libdb4.2-java-dev_4.2.52+dfsg-2_i386.deb
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.4.6 (GNU/Linux)
Comment: Debian!
iD8DBQFGAuZr5m0u66uWM3ARAl6aAJ9LmyC5GdXgy1TpuuniyffeRQrTSwCg3nQT
vkMDn6gMocikgy/XVMFIqj4=
=m1/p
-----END PGP SIGNATURE-----
--- End Message ---