Bug 1396420

Summary: Integer overflow in cn=monitor counters
Product: Red Hat Enterprise Linux 7 Reporter: Viktor Ashirov <vashirov>
Component: 389-ds-baseAssignee: Noriko Hosoi <nhosoi>
Status: CLOSED DUPLICATE QA Contact: Viktor Ashirov <vashirov>
Severity: unspecified Docs Contact:
Priority: unspecified    
Version: 7.3CC: mreynolds, nkinder, rmeggins
Target Milestone: rc   
Target Release: ---   
Hardware: Unspecified   
OS: Unspecified   
Whiteboard:
Fixed In Version: Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2017-03-20 15:12:45 UTC Type: Bug
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
bytessent_overflow_test.py none

Description Viktor Ashirov 2016-11-18 09:41:55 UTC
Description of problem:
In cn=monitor bytessent and possibly other values (like entriessent, opsinitiated, opscompleted) are overflowing at 2^32-1.

Version-Release number of selected component (if applicable):
389-ds-base-1.3.5.10-11.el7

How reproducible:
always

Steps to Reproduce:
1. Add 100k entries
2. Search for all entries
3. Check value of bytessent in cn=monitor
4. Repeat steps 2-3 

Actual results:
After some time bytessent passes 2^32-1 boundary and starts from 0

Expected results:
Max value of bytessent is expected to be 2^64-1.

Additional info:
389-ds-base-1.2.11 is not affected.

Comment 1 Viktor Ashirov 2016-11-18 11:56:55 UTC
Created attachment 1221855 [details]
bytessent_overflow_test.py

Comment 2 Noriko Hosoi 2016-11-18 17:29:56 UTC
Upstream ticket:
https://fedorahosted.org/389/ticket/49045

Comment 3 mreynolds 2017-03-20 15:12:45 UTC
Going to close this as a duplicate of https://bugzilla.redhat.com/show_bug.cgi?id=1377452

*** This bug has been marked as a duplicate of bug 1377452 ***