#50715 Memory leak detected in acl/keywords_test
Closed: wontfix 4 years ago by mreynolds. Opened 4 years ago by tbordaz.

Issue Description

The signature of the leak is

Direct leak of 88 byte(s) in 1 object(s) allocated from:
#0 0x7fd372212c58 in __interceptor_malloc (/lib64/libasan.so.5+0x10dc58)
#1 0x7fd36d9b714c in INTsystem_malloc_perm (/usr/lib64/dirsrv/libns-dshttpd-1.4.2.3.so+0x5a14c)
#2 0x7fd36d9a00a4  (/usr/lib64/dirsrv/libns-dshttpd-1.4.2.3.so+0x430a4)
#3 0x7fd36d9a1bfb in LASIpEval (/usr/lib64/dirsrv/libns-dshttpd-1.4.2.3.so+0x44bfb)
#4 0x7fd36d9a5168 in ACLEvalAce(NSErr_s*, ACLEvalHandle*, ACLExprHandle*, unsigned long*, PListStruct_s**, PListStruct_s*) (/usr/lib64/dirsrv/libns-dshttpd-1.4.2.3.so+0x48168)
#5 0x7fd36d9a6ef2  (/usr/lib64/dirsrv/libns-dshttpd-1.4.2.3.so+0x49ef2)
#6 0x7fd36d9a7f2d in ACL_EvalTestRights (/usr/lib64/dirsrv/libns-dshttpd-1.4.2.3.so+0x4af2d)
#7 0x7fd36db2aa00 in acl__TestRights ldap/servers/plugins/acl/acl.c:3289
#8 0x7fd36db33e3e in acl_access_allowed (/usr/lib64/dirsrv/plugins/libacl-plugin.so+0x22e3e)
#9 0x7fd36db66450 in acl_access_allowed_main ldap/servers/plugins/acl/aclplugin.c:371
#10 0x7fd371f565d9 in plugin_call_acl_plugin (/usr/lib64/dirsrv/libslapd.so.0+0x1c05d9)
#11 0x7fd371f572cd in slapi_access_allowed (/usr/lib64/dirsrv/libslapd.so.0+0x1c12cd)
#12 0x7fd36db36d11 in acl_check_mods (/usr/lib64/dirsrv/plugins/libacl-plugin.so+0x25d11)
#13 0x7fd371f56842 in plugin_call_acl_mods_access (/usr/lib64/dirsrv/libslapd.so.0+0x1c0842)
#14 0x7fd36aa326a9 in ldbm_back_modify ldap/servers/slapd/back-ldbm/ldbm_modify.c:616
#15 0x7fd371f12069  (/usr/lib64/dirsrv/libslapd.so.0+0x17c069)
#16 0x7fd371f15ae3 in do_modify (/usr/lib64/dirsrv/libslapd.so.0+0x17fae3)
#17 0x56152436a552 in connection_dispatch_operation ldap/servers/slapd/connection.c:638
#18 0x56152436a552 in connection_threadmain ldap/servers/slapd/connection.c:1767
#19 0x7fd371b5b868  (/lib64/libnspr4.so+0x2a868)

Package Version and Platform

All versions

Steps to reproduce

  1. run suites/acl/keywords_test.py suite

Actual results

There is a leak with ip resource acl

Expected results

Should not be a leak


The leak is related to LAS_cookie returned by the evaluation of a 'ip' resource ACI (LASIpEval).
This cookie contains a 'treetop' or 'treetop_ipv6'. This cookie should be freed when the aci evaluation complete (ACL_ExprDestroy) but it is not. Either ACL_ExprDestroy is not called or the expression is not in a state to be freed.

A simpler option should be to not return any cookie as it seems this cookie is not used !

I prefer to open a separate ticket to decide what to do with this leak

Metadata Update from @tbordaz:
- Custom field origin adjusted to None
- Custom field reviewstatus adjusted to None

4 years ago

Metadata Update from @mreynolds:
- Issue set to the milestone: 1.4.0

4 years ago

Metadata Update from @mreynolds:
- Issue close_status updated to: duplicate
- Issue set to the milestone: 1.3.10 (was: 1.4.0)
- Issue status updated to: Closed (was: Open)

4 years ago

389-ds-base is moving from Pagure to Github. This means that new issues and pull requests
will be accepted only in 389-ds-base's github repository.

This issue has been cloned to Github and is available here:
- https://github.com/389ds/389-ds-base/issues/3770

If you want to receive further updates on the issue, please navigate to the github issue
and click on subscribe button.

Thank you for understanding. We apologize for all inconvenience.

Metadata Update from @spichugi:
- Issue close_status updated to: wontfix (was: duplicate)

3 years ago

Login to comment on this ticket.

Metadata