Bug 2003607

Summary: Dirsrv memory leak [rhel-8.4.0.z]
Product: Red Hat Enterprise Linux 8 Reporter: RHEL Program Management Team <pgm-rhel-tools>
Component: slapi-nisAssignee: Alexander Bokovoy <abokovoy>
Status: CLOSED ERRATA QA Contact: ipa-qe <ipa-qe>
Severity: high Docs Contact:
Priority: high    
Version: 8.4CC: abokovoy, amore, ldap-maint, lmiksik, mreynolds, msauton, sgouvern, ssidhaye, tmihinto, tscherf, vashirov
Target Milestone: rcKeywords: Reopened, Triaged, ZStream
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: slapi-nis-0.56.6-2.1 Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of: 1967906 Environment:
Last Closed: 2021-11-02 11:40:49 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Bug Depends On: 1967906    
Bug Blocks:    

Comment 1 RHEL Program Management 2021-09-13 10:09:40 UTC
Quality Engineering Management has reviewed and declined this request. You may appeal this decision by reopening this request.

Comment 10 Viktor Ashirov 2021-09-15 09:16:07 UTC
Steps to reproduce:

[1] Install libasan and debuginfo:
# dnf install libasan -y
# debuginfo-install 389-ds-base 389-ds-base-libs slapi-nis -y

[2] Stop dirsrv:
# systemctl stop dirsrv@IPA-TEST

[3] Edit systemd drop-in config file for dirsrv service:
# vi /usr/lib/systemd/system/dirsrv@.service.d/custom.conf

Add these lines at the very end of the file:

TimeoutStartSec=3600
TimeoutStopSec=3600
Environment=
ExecStartPre=
Environment=LD_PRELOAD=/usr/lib64/libasan.so.5
Environment=ASAN_OPTIONS=log_path=/run/dirsrv/ns-slapd-%i.asan:print_stacktrace=1:detect_leaks=1:exit_code=0:fast_unwind_on_malloc=0

[4] After saving the file, reload systemd:
# systemd reload-daemon

[5] Set SELinux to permissive mode and start dirsrv:
# setenforce 0
# systemctl start dirsrv@IPA-TEST

[6] Once it's up, run several searches against cn=config:
# ldapsearch -LLL -b cn=config '(objectClass=*)'

[7] Stop dirsrv:
# systemctl stop dirsrv@IPA-TEST

[8] Check AddressSanitizer output for backend_search_cb:
# grep backend_search_cb /run/dirsrv/ns-slapd*asan*
/var/run/dirsrv/ns-slapd-IPA-TEST.asan.24662:57:    #4 0x7f4e2d4fb29f in backend_search_cb back-sch.c:1746
/var/run/dirsrv/ns-slapd-IPA-TEST.asan.24662:2048:    #7 0x7f4e2d4fb2ac in backend_search_cb back-sch.c:1748
/var/run/dirsrv/ns-slapd-IPA-TEST.asan.24662:2069:    #9 0x7f4e2d4fb2ac in backend_search_cb back-sch.c:1748
/var/run/dirsrv/ns-slapd-IPA-TEST.asan.24662:2085:    #4 0x7f4e2d4fb29f in backend_search_cb back-sch.c:1746


On the version with the fix you should not see any output.

Comment 11 anuja 2021-09-15 11:24:26 UTC
Reproduced using comment #10
Using version:
[root@master ~]# rpm -qa slapi-nis ipa-server
ipa-server-4.9.2-4.module+el8.4.0+11156+94d209c1.x86_64
slapi-nis-0.56.6-2.module+el8.4.0+10615+2234cc2c.x86_64
[root@master ~]# 

Console logs:
[root@master ~]#   grep backend_search_cb /run/dirsrv/ns-slapd*asan*
/run/dirsrv/ns-slapd-IPA-TEST.asan.27179:    #4 0x7f0cdb2fa2bf in backend_search_cb back-sch.c:1746
/run/dirsrv/ns-slapd-IPA-TEST.asan.27179:    #4 0x7f0cdb2fa2bf in backend_search_cb back-sch.c:1746
/run/dirsrv/ns-slapd-IPA-TEST.asan.27179:    #7 0x7f0cdb2fa2cc in backend_search_cb back-sch.c:1748
/run/dirsrv/ns-slapd-IPA-TEST.asan.27179:    #9 0x7f0cdb2fa2cc in backend_search_cb back-sch.c:1748
/run/dirsrv/ns-slapd-IPA-TEST.asan.27179:    #7 0x7f0cdb2fa2cc in backend_search_cb back-sch.c:1748
[root@master ~]# date
Wed Sep 15 07:01:17 EDT 2021


Verified using version:
[root@master ~]# rpm -qa ipa-server slapi-nis
ipa-server-4.9.2-4.module+el8.4.0+11156+94d209c1.x86_64
slapi-nis-0.56.6-2.1.module+el8.4.0+12579+0538eac8.x86_64
Console logs:

[root@master ~]# date
Wed Sep 15 07:00:45 EDT 2021
[root@master ~]#  grep backend_search_cb /run/dirsrv/ns-slapd*asan*
[root@master ~]# 

There is no backend_search_cb in logs.
Based on this marking bug as verified.

Comment 16 errata-xmlrpc 2021-11-02 11:40:49 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (idm:DL1 bug fix update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2021:4094