...
A memory leak can be seen under MallocLite/AAA proxy when using NETCONF/RESTCONF to get information from the device. The leak is seen if the device has AAA remote authentication configured. # show processes memory sorted | include Processor|PID|MallocLite Processor Pool Total: 3789108700 Used: 407430776 Free: 3381677924 PID TTY Allocated Freed Holding Getbufs Retbufs Process 0 0 0 0 3414432 0 0 *MallocLite* # # show memory lite-chunks totals Tracekey : 1#72257e896f3759d22c0de6b7878543ef Total Count PC 800000 10000 :5592FCDD5000+11FF07F9 250592 3748 :5592FCDD5000+1217E444 ## 10000 GET AAA Authorization successful # show processes memory sorted | include Processor|PID|MallocLite Processor Pool Total: 3789108700 Used: 407594848 Free: 3381513852 PID TTY Allocated Freed Holding Getbufs Retbufs Process 0 0 0 0 3480064 0 0 *MallocLite* # # show memory lite-chunks totals Tracekey : 1#72257e896f3759d22c0de6b7878543ef Total Count PC 816320 10204 :5592FCDD5000+11FF07F9 250592 3748 :5592FCDD5000+1217E444
- NETCONF/RESTCONF. - AAA remote authentication has been configured.
- A reload can be used to clear the leaked memory. - Use local authentication.
The leak can occur at a faster rate if AAA authorization requests fail. # show processes memory sorted | include Processor|PID|MallocLite Processor Pool Total: 3789108700 Used: 407594848 Free: 3381513852 PID TTY Allocated Freed Holding Getbufs Retbufs Process 0 0 0 0 3480064 0 0 *MallocLite* # # show memory lite-chunks totals Tracekey : 1#72257e896f3759d22c0de6b7878543ef Total Count PC 816320 10204 :5592FCDD5000+11FF07F9 250592 3748 :5592FCDD5000+1217E444 ## 10000 GET with 0ms delay and AAA Authorization failed %DMI-5-AUTHENTICATION_FAILED: R0/0: dmiauthd: Authentication failure from x.x.x.x for rest over http. #show processes memory sorted | include Processor|PID|MallocLite Processor Pool Total: 3789108700 Used: 408579328 Free: 3380529372 PID TTY Allocated Freed Holding Getbufs Retbufs Process 0 0 0 0 4464544 0 0 *MallocLite* # # show memory lite-chunks totals Tracekey : 1#72257e896f3759d22c0de6b7878543ef Total Count PC 1616240 20203 :5592FCDD5000+11FF07F9 250592 3748 :5592FCDD5000+1217E444 - Additionally, the leak can cause Out of IDs messages. This causes a break on NETCONF/RESTCONF functionality since the requests are no longer being processed. %ID_MANAGER-3-INVALID_ID: R0/0: dmiauthd: bad id in id_get (Out of IDs!) (id: 0x00000000) -Traceback= 1#84162d00e2da3955199f9b40db3afa98 errmsg:7FC12E5D9000+E9A id_manager:7FC130F13000+1D8A aaaproxy:7FC13134B000+2822D aaaproxy:7FC13134B000+1CF5A :5571C1938000+212EE :5571C1938000+202C4 evlib:7FC12E3C8000+8FF6 evlib:7FC12E3C8000+9D50 :5571C1938000+1F484 :5571C1938000+1EFCF :5571C1938000+2D49D :5571C1938000+2B6FB c:7FC11A9DC000+27ED0 :5571C1938000+14E3A # show id-manager statistics | include Name|AAA TableKey Allocated InUse InUseHWM Name 16 18 18 18 AAA SG ID table 81 12636425 63 150 AAA attr list handle IDs 127 2 2 2 AAA mlist ID table 148 6291410 43 97 AAA multi stage ctx IDs 153 12611311 0 98 AAA Proxy Table 182 0 0 0 AAA flow handle IDs # - Disable/Enable NETCONF/RESTCONF works around the issue however eventually this is seen again. After the disable/enable we can start to see duplicate dmiauthd and ndbmand processes. # show processes memory platform accounting Hourly Stats process callsite_ID(bytes) max_diff_bytes callsite_ID(calls) max_diff_calls tracekey timestamp(UTC) ----------------------------------------------------------------------------------------------------------------------------------------------------------------------- dmiauthd_rp_0 4A50E5F47C048005 33558528 EA36F04F08F08011 282 1#84162d00e2da3955199f9b40db3afa98 2023-09-18 11:16 dmiauthd_rp_0 4A50E5F47C048005 33558528 4A50E5F47C048005 256 1#84162d00e2da3955199f9b40db3afa98 2023-09-12 13:01 dmiauthd_rp_0 4A50E5F47C048005 33296352 4A50E5F47C048005 254 1#84162d00e2da3955199f9b40db3afa98 2023-09-16 06:57 ndbmand_rp_0 2650225DA6590001 5712784 AA1D1A90B246C001 243 1#6489820a00159bf14c38a0e6963aa552 2023-09-12 15:02 ndbmand_rp_0 2650225DA6590001 5712784 3929896AA7660009 478 1#6489820a00159bf14c38a0e6963aa552 2023-09-14 14:18 smand_rp_0 3DFF8F3C424F400A 1664136 C34A609190E3C001 297 1#03e83f3faad57165eb3c409e886ea39f 2023-09-09 11:08