The signature of the leak is
Direct leak of 88 byte(s) in 1 object(s) allocated from: #0 0x7fd372212c58 in __interceptor_malloc (/lib64/libasan.so.5+0x10dc58) #1 0x7fd36d9b714c in INTsystem_malloc_perm (/usr/lib64/dirsrv/libns-dshttpd-1.4.2.3.so+0x5a14c) #2 0x7fd36d9a00a4 (/usr/lib64/dirsrv/libns-dshttpd-1.4.2.3.so+0x430a4) #3 0x7fd36d9a1bfb in LASIpEval (/usr/lib64/dirsrv/libns-dshttpd-1.4.2.3.so+0x44bfb) #4 0x7fd36d9a5168 in ACLEvalAce(NSErr_s*, ACLEvalHandle*, ACLExprHandle*, unsigned long*, PListStruct_s**, PListStruct_s*) (/usr/lib64/dirsrv/libns-dshttpd-1.4.2.3.so+0x48168) #5 0x7fd36d9a6ef2 (/usr/lib64/dirsrv/libns-dshttpd-1.4.2.3.so+0x49ef2) #6 0x7fd36d9a7f2d in ACL_EvalTestRights (/usr/lib64/dirsrv/libns-dshttpd-1.4.2.3.so+0x4af2d) #7 0x7fd36db2aa00 in acl__TestRights ldap/servers/plugins/acl/acl.c:3289 #8 0x7fd36db33e3e in acl_access_allowed (/usr/lib64/dirsrv/plugins/libacl-plugin.so+0x22e3e) #9 0x7fd36db66450 in acl_access_allowed_main ldap/servers/plugins/acl/aclplugin.c:371 #10 0x7fd371f565d9 in plugin_call_acl_plugin (/usr/lib64/dirsrv/libslapd.so.0+0x1c05d9) #11 0x7fd371f572cd in slapi_access_allowed (/usr/lib64/dirsrv/libslapd.so.0+0x1c12cd) #12 0x7fd36db36d11 in acl_check_mods (/usr/lib64/dirsrv/plugins/libacl-plugin.so+0x25d11) #13 0x7fd371f56842 in plugin_call_acl_mods_access (/usr/lib64/dirsrv/libslapd.so.0+0x1c0842) #14 0x7fd36aa326a9 in ldbm_back_modify ldap/servers/slapd/back-ldbm/ldbm_modify.c:616 #15 0x7fd371f12069 (/usr/lib64/dirsrv/libslapd.so.0+0x17c069) #16 0x7fd371f15ae3 in do_modify (/usr/lib64/dirsrv/libslapd.so.0+0x17fae3) #17 0x56152436a552 in connection_dispatch_operation ldap/servers/slapd/connection.c:638 #18 0x56152436a552 in connection_threadmain ldap/servers/slapd/connection.c:1767 #19 0x7fd371b5b868 (/lib64/libnspr4.so+0x2a868)
All versions
There is a leak with ip resource acl
Should not be a leak
The leak is related to LAS_cookie returned by the evaluation of a 'ip' resource ACI (LASIpEval). This cookie contains a 'treetop' or 'treetop_ipv6'. This cookie should be freed when the aci evaluation complete (ACL_ExprDestroy) but it is not. Either ACL_ExprDestroy is not called or the expression is not in a state to be freed.
A simpler option should be to not return any cookie as it seems this cookie is not used !
I prefer to open a separate ticket to decide what to do with this leak
Metadata Update from @tbordaz: - Custom field origin adjusted to None - Custom field reviewstatus adjusted to None
Metadata Update from @mreynolds: - Issue set to the milestone: 1.4.0
https://pagure.io/389-ds-base/issue/50857
Metadata Update from @mreynolds: - Issue close_status updated to: duplicate - Issue set to the milestone: 1.3.10 (was: 1.4.0) - Issue status updated to: Closed (was: Open)
389-ds-base is moving from Pagure to Github. This means that new issues and pull requests will be accepted only in 389-ds-base's github repository.
This issue has been cloned to Github and is available here: - https://github.com/389ds/389-ds-base/issues/3770
If you want to receive further updates on the issue, please navigate to the github issue and click on subscribe button.
subscribe
Thank you for understanding. We apologize for all inconvenience.
Metadata Update from @spichugi: - Issue close_status updated to: wontfix (was: duplicate)
Login to comment on this ticket.