Your message dated Tue, 6 Mar 2018 22:22:48 +1100
with message-id <20180306112248.ga5...@enc.com.au>
and subject line Fixed in upstream 5.4.3
has caused the Debian Bug report #510495,
regarding default install of snmpd leaks memory when VLAN interfaces present
to be marked as done.

This means that you claim that the problem has been dealt with.
If this is not the case it is now your responsibility to reopen the
Bug report if necessary, and/or fix the problem forthwith.

(NB: If you are a system administrator and have no idea what this
message is talking about, this may indicate a serious mail system
misconfiguration somewhere. Please contact ow...@bugs.debian.org
immediately.)


-- 
510495: https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=510495
Debian Bug Tracking System
Contact ow...@bugs.debian.org with problems
--- Begin Message ---
Package: snmpd
Version: 5.2.3-7etch4
Severity: important


The default etch install of snmpd with default config will leak memory if there 
is 1 or more VLAN ethernet interfaces on the system.

This appears to be a regression between sarge and etch.

After some investigation I've found:

* leak occurs every 60 seconds
* leak occurs at a rate of 1094KB/day _per_ VLAN interface
* rate of leak is directly proportional to the number of VLAN interfaces
* leak occurs even if no snmp activity is happening (get, set, get next, trap, 
etc..)
* the VLAN interface must have an IPv4 address assigned
* the VLAN interface can be either UP or DOWN
* the name of the VLAN interface doesn't matter

How to recreate:

apt-get install vlan
add to /etc/network/interfaces:

> iface eth0.100 inet static
>     address 10.2.100.1
>     netmask 255.255.255.0
>     broadcast 10.2.100.255

ifup eth0.100
watch snmpd grow...


start of test:
  USER       PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
  snmp      1886  0.0  0.7   6784  3860 ?        S    22:06   0:00 
/usr/sbin/snmpd
after 10 hours:
  USER       PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
  snmp      1886  0.0  0.8   7300  4316 ?        S    Jan01   0:00 
/usr/sbin/snmpd


To amplify the effect, configure 100 VLANs instead of just 1

100 vlans configured:
start of test:
  USER       PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
  snmp      4694  0.0  0.8   7184  4188 ?        S    09:16   0:00 
/usr/sbin/snmpd
after 20 minutes:
  USER       PID %CPU %MEM    VSZ   RSS TTY      STAT START   TIME COMMAND
  snmp      4694  0.0  1.1   8732  5720 ?        S    09:16   0:00 
/usr/sbin/snmpd


-- System Information:
Debian Release: 4.0
  APT prefers stable
  APT policy: (500, 'stable')
Architecture: i386 (i686)
Shell:  /bin/sh linked to /bin/bash
Kernel: Linux 2.6.18-6-686
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)

Versions of packages snmpd depends on:
ii  adduser                3.102             Add and remove users and groups
ii  debconf                1.5.11etch2       Debian configuration management sy
ii  libc6                  2.3.6.ds1-13etch8 GNU C Library: Shared libraries
ii  libsensors3            1:2.10.1-3        library to read temperature/voltag
ii  libsnmp9               5.2.3-7etch4      NET SNMP (Simple Network Managemen
ii  libwrap0               7.6.dbs-13        Wietse Venema's TCP wrappers libra

snmpd recommends no packages.

-- debconf information:
  snmpd/upgradefrom521:
  snmpd/upgradefrom36:



--- End Message ---
--- Begin Message ---
Package: snmpd
Version: 5.4.3-1

Upstream version 5.4.3 of net-snmp had the patch mentioned in this bug
report. Closing Debian bug as this should have fixed the leak.

 - Craig
-- 
Craig Small               https://dropbear.xyz/     csmall at : enc.com.au
Debian GNU/Linux          https://www.debian.org/   csmall at : debian.org
Mastodon: @smalls...@social.dropbear.xyz               Twitter: @smallsees  
GPG fingerprint:        5D2F B320 B825 D939 04D2  0519 3938 F96B DF50 FEA5

--- End Message ---

Reply via email to