Current-Users archive

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index][Old Index]

Re: current userland slapd no response



On Tuesday 16 September 2008 22:51:33 matthew sporleder wrote:
> > slapd shutdown: waiting for 33 threads to terminate
> >
> > I imagine it's a threads issue. I'm updating/building/installing as we
> > speak but only saw one change to libpthread.
> >
> > Anyone know what might be causing this?
>
> That's a pretty normal shutdown message (assuming you have a bunch of
> open connections, anyway).  Can you try starting slapd with -d -1 and
> seeing if someone obvious comes up?

Yeah, I'd imagine it's normal under a heavy load ... these were all stalled 
transactions. Nothing was occurring.

Also, I forgot to mention that I could only stop slapd with 'kill -9'.

Now there is no load at all ... a simple ldapsearch returns:

# /usr/pkg/bin/ldapsearch
ldap_sasl_interactive_bind_s: No such attribute (16)

daemon: activity on 1 descriptor
slap_listener_activate(7):      
daemon: select: listen=6 active_threads=0 tvp=NULL
daemon: select: listen=7 busy                     
>>> slap_listener(ldap:///)                       
daemon: activity on 1 descriptor                  
daemon: waked                                     
daemon: select: listen=6 active_threads=0 tvp=NULL
daemon: select: listen=7 active_threads=0 tvp=NULL
daemon: listen=7, new connection on 11            
daemon: added 11r (active) listener=0x0           
daemon: activity on 1 descriptor                  
daemon: waked                                     
daemon: select: listen=6 active_threads=0 tvp=NULL
daemon: select: listen=7 active_threads=0 tvp=NULL
daemon: activity on 1 descriptor                  
daemon: activity on: 11r                          
daemon: read activity on 11                       
daemon: select: listen=6 active_threads=0 tvp=NULL
daemon: select: listen=7 active_threads=0 tvp=NULL
conn=0 fd=11 ACCEPT from IP=127.0.0.1:65515 (IP=0.0.0.0:389)
connection_get(11)                                          
connection_get(11): got connid=0                            
connection_read(11): checking for input on id=0             
ber_get_next                                                
ldap_read: want=8, got=8                                    
  0000:  30 3e 02 01 01 63 39 04                            0>...c9.          
ldap_read: want=56, got=56                                                    
  0000:  00 0a 01 00 0a 01 00 02  01 00 02 01 00 01 01 00   ................  
  0010:  87 0b 6f 62 6a 65 63 74  63 6c 61 73 73 30 19 04   ..objectclass0..  
  0020:  17 73 75 70 70 6f 72 74  65 64 53 41 53 4c 4d 65   .supportedSASLMe  
  0030:  63 68 61 6e 69 73 6d 73                            chanisms          
ber_get_next: tag 0x30 len 62 contents:                                       
ber_dump: buf=0x7f7ffc4a6ec0 ptr=0x7f7ffc4a6ec0 end=0x7f7ffc4a6efe len=62     
  0000:  02 01 01 63 39 04 00 0a  01 00 0a 01 00 02 01 00   ...c9...........  
  0010:  02 01 00 01 01 00 87 0b  6f 62 6a 65 63 74 63 6c   ........objectcl  
  0020:  61 73 73 30 19 04 17 73  75 70 70 6f 72 74 65 64   ass0...supported  
  0030:  53 41 53 4c 4d 65 63 68  61 6e 69 73 6d 73         SASLMechanisms    
ber_get_next                                                                  
ldap_read: want=8 error=Resource temporarily unavailable                      
daemon: activity on 1 descriptor                                              
daemon: waked                                                                 
daemon: select: listen=6 active_threads=0 tvp=NULL                            
daemon: select: listen=7 active_threads=0 tvp=NULL                            
conn=0 op=0 do_search                                                         
ber_scanf fmt ({miiiib) ber:                                                  
ber_dump: buf=0x7f7ffc4a6ec0 ptr=0x7f7ffc4a6ec3 end=0x7f7ffc4a6efe len=59     
  0000:  63 39 04 00 0a 01 00 0a  01 00 02 01 00 02 01 00   c9..............  
  0010:  01 01 00 87 0b 6f 62 6a  65 63 74 63 6c 61 73 73   .....objectclass  
  0020:  30 19 04 17 73 75 70 70  6f 72 74 65 64 53 41 53   0...supportedSAS  
  0030:  4c 4d 65 63 68 61 6e 69  73 6d 73                  LMechanisms       
>>> dnPrettyNormal: <>                                                        
<<< dnPrettyNormal: <>, <>                                                    
SRCH "" 0 0    0 0 0                                                          
begin get_filter                                                              
PRESENT                                                                       
ber_scanf fmt (m) ber:                                                        
ber_dump: buf=0x7f7ffc4a6ec0 ptr=0x7f7ffc4a6ed6 end=0x7f7ffc4a6efe len=40     
  0000:  87 0b 6f 62 6a 65 63 74  63 6c 61 73 73 30 19 04   ..objectclass0..  
  0010:  17 73 75 70 70 6f 72 74  65 64 53 41 53 4c 4d 65   .supportedSASLMe  
  0020:  63 68 61 6e 69 73 6d 73                            chanisms          
end get_filter 0                                                              
    filter: (objectClass=*)                                                   
ber_scanf fmt ({M}}) ber:                                                     
ber_dump: buf=0x7f7ffc4a6ec0 ptr=0x7f7ffc4a6ee3 end=0x7f7ffc4a6efe len=27     
  0000:  00 19 04 17 73 75 70 70  6f 72 74 65 64 53 41 53   ....supportedSAS  
  0010:  4c 4d 65 63 68 61 6e 69  73 6d 73                  LMechanisms       
    attrs: supportedSASLMechanisms                                            
conn=0 op=0 SRCH base="" scope=0 deref=0 filter="(objectClass=*)"             
conn=0 op=0 SRCH attr=supportedSASLMechanisms                                 
=> test_filter                                                                
    PRESENT                                                                   
=> access_allowed: search access to "" "objectClass" requested                
=> slap_access_allowed: backend default search access granted to "(anonymous)"
=> access_allowed: search access granted by read(=rscxd)                      
<= test_filter 6                                                              
=> send_search_entry: conn 0 dn=""                                            
=> access_allowed: read access to "" "entry" requested                        
=> slap_access_allowed: backend default read access granted to "(anonymous)"  
=> access_allowed: read access granted by read(=rscxd)                        
ber_flush2: 11 bytes to sd 11                                                 
  0000:  30 09 02 01 01 64 04 04  00 30 00                  0....d...0.       
ldap_write: want=11, written=11                                               
  0000:  30 09 02 01 01 64 04 04  00 30 00                  0....d...0.       
conn=0 op=0 ENTRY dn=""                                                       
<= send_search_entry: conn 0 exit.                                            
send_ldap_result: conn=0 op=0 p=3                                             
send_ldap_result: err=0 matched="" text=""                                    
send_ldap_response: msgid=1 tag=101 err=0                                     
ber_flush2: 14 bytes to sd 11                                                 
  0000:  30 0c 02 01 01 65 07 0a  01 00 04 00 04 00         0....e........    
ldap_write: want=14, written=14                                               
  0000:  30 0c 02 01 01 65 07 0a  01 00 04 00 04 00         0....e........    
conn=0 op=0 SEARCH RESULT tag=101 err=0 nentries=1 text=
daemon: activity on 1 descriptor
daemon: activity on: 11r
daemon: read activity on 11
daemon: select: listen=6 active_threads=0 tvp=NULL
daemon: select: listen=7 active_threads=0 tvp=NULL
connection_get(11)
connection_get(11): got connid=0
connection_read(11): checking for input on id=0
ber_get_next
ldap_read: want=8, got=0

ber_get_next on fd 11 failed errno=0 (Undefined error: 0)
connection_read(11): input error=-2 id=0, closing.
connection_closing: readying conn=0 sd=11 for close
daemon: activity on 1 descriptor
daemon: waked
daemon: select: listen=6 active_threads=0 tvp=NULL
daemon: select: listen=7 active_threads=0 tvp=NULL
connection_close: conn=0 sd=11
daemon: removing 11
conn=0 fd=11 closed (connection lost)


Undefined error?

But now I can actually kill slapd. I caught a dump yesterday but it may not be 
relevant as I hadn't set my stacksize to 4096 as required on amd64.

Sarton


Home | Main Index | Thread Index | Old Index