RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 2031337 - IPA LDAP memory leak reason x (investigation)
Summary: IPA LDAP memory leak reason x (investigation)
Keywords:
Status: CLOSED DUPLICATE of bug 2032738
Alias: None
Product: Red Hat Enterprise Linux 8
Classification: Red Hat
Component: 389-ds-base
Version: 8.5
Hardware: x86_64
OS: Linux
high
high
Target Milestone: rc
: ---
Assignee: LDAP Maintainers
QA Contact: RHDS QE
URL:
Whiteboard: sync-to-jira
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2021-12-11 03:25 UTC by Marc Sauton
Modified: 2023-07-04 17:04 UTC (History)
5 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2022-01-19 17:02:04 UTC
Type: Bug
Target Upstream Version:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHELPLAN-105432 0 None None None 2021-12-11 03:30:09 UTC

Description Marc Sauton 2021-12-11 03:25:29 UTC
Description of problem:
This a bug report to investigate a LDAP memory leak in RHEL-8.5.0 , IPA context, possibly in slapi-nis.

debuginfo and libasan had been installed, dirsrv systemd service drop-in config file created, and we need the /run/dirsrv/ns-slapd*asan* files to be reviewed.


Version-Release number of selected component (if applicable):

VMWare guest
16GB RAM
RHEL-8.5 IdM, 4 replicas topology 

small DB, under 10MB

redhat-release-8.5-0.8.el8.x86_64
389-ds-base-1.4.3.23-10.module+el8.5.0+12398+47000435.x86_64
ipa-server-4.9.6-6.module+el8.5.0+12660+88e16a2c.x86_64
slapi-nis-0.56.6-4.module+el8.5.0+12583+bf7ffcf6.x86_64


How reproducible:
"rapidely" iafter a LDAP restart, in customer's environment, unclear how fast or how often.


Steps to Reproduce:
1. N/A
2.
3.


Actual results:

[3183493.688447] oom-kill:constraint=CONSTRAINT_NONE,nodemask=(null),cpuset=/,mems_allowed=0,global_oom,task_memcg=/system.slice/system-dirsrv.slice/dirsrv,task=ns-slapd,pid=1823,uid=389
[3183493.691422] Out of memory: Killed process 1823 (ns-slapd) total-vm:39127536kB, anon-rss:11999352kB, file-rss:0kB, shmem-rss:8kB, UID:389 pgtables:68564kB oom_score_adj:0
[3183496.595555] oom_reaper: reaped process 1823 (ns-slapd), now anon-rss:0kB, file-rss:164kB, shmem-rss:8kB


Expected results:
yes


Additional info:

The situation was initially happening on RHEL-8.4 with

389-ds-base-1.4.3.16-13.module+el8.4.0+10307+74bbfb4e.x86_64 Sun May 23 15:54:36 2021
certmonger-0.79.13-2.el8.x86_64                             Sun May 23 15:54:35 2021
custodia-0.6.0-3.module+el8.1.0+4098+f286395e.noarch        Fri Nov 13 14:29:41 2020
ipa-client-4.9.2-3.module+el8.4.0+10412+5ecb5b37.x86_64     Sun May 23 15:54:41 2021
ipa-client-common-4.9.2-3.module+el8.4.0+10412+5ecb5b37.noarch Sun May 23 15:52:40 2021
ipa-server-4.9.2-3.module+el8.4.0+10412+5ecb5b37.x86_64     Sun May 23 15:54:57 2021
nspr-4.25.0-2.el8_2.x86_64                                  Fri Nov 13 14:21:26 2020
nss-3.53.1-17.el8_3.x86_64                                  Sun May 23 15:52:50 2021
nss-softokn-3.53.1-17.el8_3.x86_64                          Sun May 23 15:52:50 2021
nss-softokn-freebl-3.53.1-17.el8_3.x86_64                   Sun May 23 15:52:50 2021
nss-sysinit-3.53.1-17.el8_3.x86_64                          Sun May 23 15:52:50 2021
nss-tools-3.53.1-17.el8_3.x86_64                            Sun May 23 15:52:56 2021
nss-util-3.53.1-17.el8_3.x86_64                             Sun May 23 15:52:38 2021
pki-ca-10.10.5-2.module+el8.4.0+10466+9830f79e.noarch       Sun May 23 15:54:57 2021
redhat-release-8.4-0.6.el8.x86_64                           Sun May 23 15:55:17 2021
redhat-release-eula-8.4-0.6.el8.x86_64                      Sun May 23 15:54:54 2021
slapi-nis-0.56.6-2.module+el8.4.0+10615+2234cc2c.x86_64     Sun May 23 15:54:37 2021
sssd-client-2.4.0-9.el8.x86_64                              Sun May 23 15:52:48 2021

Comment 9 mreynolds 2022-01-19 17:02:04 UTC
Closing bug since the 3 issues were split into different bugs

*** This bug has been marked as a duplicate of bug 2032738 ***


Note You need to log in before you can comment on or make changes to this bug.