[Date Prev][Date Next] [Chronological] [Thread] [Top]

Cannot lookup anything in the directory



Hello everyone,
I have a strange problem running slapd on my Debian box. I have installes the Debian packages with slapd and configured it using the frontend. Now I cannot lookup or add anything to the directory and the log shows the following:


slapd[22902]: daemon: activity on 1 descriptors
slapd[22902]: daemon: new connection on 13
slapd[22902]: daemon: conn=8 fd=13 connection from IP=127.0.0.1:50077 (IP=0.0.0.0:34049) accepted.
slapd[22902]: daemon: added 13r
slapd[22902]: daemon: activity on:
slapd[22902]:
slapd[22902]: daemon: select: listen=10 active_threads=0 tvp=NULL
slapd[22902]: daemon: activity on 1 descriptors
slapd[22902]: daemon: activity on:
slapd[22902]: 13r
slapd[22902]:
slapd[22902]: daemon: read activity on 13
slapd[22902]: connection_get(13): got connid=8
slapd[22902]: connection_read(13): checking for input on id=8
slapd[22902]: ber_get_next on fd 13 failed errno=11 (Resource temporarily unavailable)
slapd[22992]: do_search
Oct 21 14:35:09 mail slapd[22992]: begin get_filter
slapd[22992]: PRESENT
slapd[22992]: end get_filter 0
slapd[22902]: daemon: select: listen=10 active_threads=1 tvp=NULL
slapd[22992]: conn=8 op=0 SRCH base="" scope=0 filter="(objectClass=*)"
slapd[22992]: => test_filter
slapd[22992]: PRESENT
slapd[22992]: => access_allowed: search access to "" "objectClass" requested
slapd[22992]: => acl_get: [1] check attr objectClass
slapd[22992]: => acl_get: [2] check attr objectClass
slapd[22992]: <= acl_get: [2] acl attr: objectClass
slapd[22992]: => acl_mask: access to entry "", attr "objectClass" requested
slapd[22992]: => acl_mask: to all values by "", (=n)
slapd[22992]: <= check a_dn_pat: cn=admin,o=myorg,c=PL
slapd[22992]: => string_expand: pattern: cn=admin,o=myorg,c=PL
slapd[22992]: => string_expand: expanded: cn=admin,o=myorg,c=PL
slapd[22992]: => regex_matches: string:
slapd[22992]: => regex_matches: rc: 1 no matches
slapd[22992]: <= check a_dn_pat: *
slapd[22992]: <= acl_mask: [2] applying read (=rscx) (stop)
slapd[22992]: <= acl_mask: [2] mask: read (=rscx)
slapd[22992]: => access_allowed: search access granted by read (=rscx)
slapd[22992]: <= test_filter 6
slapd[22992]: => send_search_entry: ""
slapd[22992]: => access_allowed: read access to "" "entry" requested
slapd[22992]: => acl_get: [1] check attr entry
slapd[22992]: => acl_get: [2] check attr entry
slapd[22992]: <= acl_get: [2] acl attr: entry
slapd[22992]: => acl_mask: access to entry "", attr "entry" requested
slapd[22992]: => acl_mask: to all values by "", (=n)
slapd[22992]: <= check a_dn_pat: cn=admin,o=myorg,c=PL
slapd[22992]: => string_expand: pattern: cn=admin,o=myorg,c=PL
slapd[22992]: => string_expand: expanded: cn=admin,o=myorg,c=PL
slapd[22992]: => regex_matches: string:
slapd[22992]: => regex_matches: rc: 1 no matches
slapd[22992]: <= check a_dn_pat: *
slapd[22992]: <= acl_mask: [2] applying read (=rscx) (stop)
slapd[22992]: <= acl_mask: [2] mask: read (=rscx)
slapd[22992]: => access_allowed: read access granted by read (=rscx)
slapd[22992]: => access_allowed: read access to "" "supportedSASLMechanisms" requested
slapd[22992]: => acl_get: [1] check attr supportedSASLMechanisms
slapd[22992]: => acl_get: [2] check attr supportedSASLMechanisms
slapd[22992]: <= acl_get: [2] acl attr: supportedSASLMechanisms
slapd[22992]: => acl_mask: access to entry "", attr "supportedSASLMechanisms" requested
slapd[22992]: => acl_mask: to all values by "", (=n)
slapd[22992]: <= check a_dn_pat: cn=admin,o=myorg,c=PL
slapd[22992]: => string_expand: pattern: cn=admin,o=myorg,c=PL
slapd[22992]: => string_expand: expanded: cn=admin,o=myorg,c=PL
slapd[22992]: => regex_matches: string:
slapd[22992]: => regex_matches: rc: 1 no matches
slapd[22992]: <= check a_dn_pat: *
slapd[22992]: <= acl_mask: [2] applying read (=rscx) (stop)
slapd[22992]: <= acl_mask: [2] mask: read (=rscx)
slapd[22992]: => access_allowed: read access granted by read (=rscx)
slapd[22992]: => access_allowed: read access to "" "supportedSASLMechanisms" requested
slapd[22992]: => acl_get: [1] check attr supportedSASLMechanisms
slapd[22992]: => acl_get: [2] check attr supportedSASLMechanisms
slapd[22992]: <= acl_get: [2] acl attr: supportedSASLMechanisms
slapd[22992]: => acl_mask: access to entry "", attr "supportedSASLMechanisms" requested
slapd[22992]: => acl_mask: to value by "", (=n)
slapd[22992]: <= check a_dn_pat: cn=admin,o=myorg,c=PL
slapd[22992]: => string_expand: pattern: cn=admin,o=myorg,c=PL
slapd[22992]: => string_expand: expanded: cn=admin,o=myorg,c=PL
slapd[22992]: => regex_matches: string:
slapd[22992]: => regex_matches: rc: 1 no matches
slapd[22992]: <= check a_dn_pat: *
slapd[22992]: <= acl_mask: [2] applying read (=rscx) (stop)
slapd[22992]: <= acl_mask: [2] mask: read (=rscx)
slapd[22992]: => access_allowed: read access granted by read (=rscx)
slapd[22992]: conn=8 op=0 ENTRY dn=""
slapd[22992]: <= send_search_entry
slapd[22992]: send_ldap_result: conn=8 op=0 p=3
slapd[22992]: send_ldap_response: msgid=1 tag=101 err=0
slapd[22992]: conn=8 op=0 RESULT tag=101 err=0 text=
slapd[22902]: daemon: activity on 1 descriptors
slapd[22902]: daemon: activity on:
slapd[22902]: 13r
slapd[22902]:
slapd[22902]: daemon: read activity on 13
slapd[22902]: connection_get(13): got connid=8
slapd[22902]: connection_read(13): checking for input on id=8
slapd[22902]: ber_get_next on fd 13 failed errno=0 (Success)
slapd[22902]: connection_read(13): input error=-2 id=8, closing.
slapd[22902]: connection_closing: readying conn=8 sd=13 for close
slapd[22902]: connection_close: conn=8 sd=13
slapd[22902]: daemon: removing 13
slapd[22902]: conn=-1 fd=13 closed
slapd[22902]: daemon: select: listen=10 active_threads=0 tvp=NULL
slapd[22902]: daemon: activity on 1 descriptors
slapd[22902]: daemon: select: listen=10 active_threads=0 tvp=NULL


any chance of getting some information?