Devuan bug report logs - #748
nfs-ganesha: ganesha has a memory leak

Package: nfs-ganesha; Severity: grave; Reported by: Bodo Eggert <[email protected]>; Keywords: debian; dated Wed, 8 Mar 2023 00:14:01 UTC; Maintainer for nfs-ganesha is (unknown).
Marked as fixed in versions 4.0.12-3~bpo11+1. Request was from Mark Hindley <[email protected]> to [email protected]. Full text available.
Added tag(s) debian. Request was from Mark Hindley <[email protected]> to [email protected]. Full text available.

Message received at [email protected]:


Received: (at 748) by bugs.devuan.org; 8 Mar 2023 08:58:37 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 08 Mar 2023 08:58:37 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id /h2qMA5OCGT5HQAAmSBk0A
	(envelope-from <[email protected]>)
	for <[email protected]>; Wed, 08 Mar 2023 08:57:50 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id B205296F; Wed,  8 Mar 2023 08:57:50 +0000 (UTC)
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS
	autolearn=no autolearn_force=no version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> 
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	by email.devuan.org (Postfix) with ESMTPS id 543DE66D
	for <[email protected]>; Wed,  8 Mar 2023 08:57:50 +0000 (UTC)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <[email protected]>)
	id 1pZpcL-00041c-Cd; Wed, 08 Mar 2023 08:57:49 +0000
Received: (nullmailer pid 22949 invoked by uid 1000);
	Wed, 08 Mar 2023 08:57:49 -0000
Date: Wed, 8 Mar 2023 08:57:49 +0000
From: Mark Hindley <[email protected]>
To: Bodo Eggert <[email protected]>, [email protected]
Subject: Re: bug#748: nfs-ganesha: ganesha has a memory leak
Message-ID: <[email protected]>
References: <[email protected]>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <[email protected]>
X-Debbugs-No-Ack: No Thanks

Control: tags -1 debian
Control: fixed -1 4.0.12-3~bpo11+1

Bodo,

On Wed, Mar 08, 2023 at 01:10:40AM +0100, Bodo Eggert wrote:
> Package: nfs-ganesha
> Version: 3.4-1
> Severity: grave
> Justification: renders package unusable
> 
> Dear Maintainer,
> 
> the shipped version of ganesha, version 3.4, does have a memory leak that
> causes it to consume all available RAM and more.  I have 4 GB installed, but
> yesterday ganesha did use about 6 GB and each stat() required swapping.

This is not a forked package in Devuan and we use Debian's packages directly
without recompilation. Please report this to Debian's BTS to be addressed.

If you think 4.x series will fix it, you might be interested in the stable-bpo
version 4.0.12-3~bpo11+1.

Mark

Information forwarded to [email protected], [email protected]:
bug#748; Package nfs-ganesha. Full text available.

Message received at [email protected]:


Received: (at submit) by bugs.devuan.org; 8 Mar 2023 00:12:02 +0000
Return-Path: <[email protected]>
Delivered-To: [email protected]
Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 08 Mar 2023 00:12:02 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id PMcGF4rSB2RkBQAAmSBk0A
	(envelope-from <[email protected]>)
	for <[email protected]>; Wed, 08 Mar 2023 00:10:50 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id 47C3D96F; Wed,  8 Mar 2023 00:10:50 +0000 (UTC)
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=-1.0 required=5.0 tests=FREEMAIL_FROM,
	RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_PASS,T_FILL_THIS_FORM_SHORT
	autolearn=ham autolearn_force=no version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=212.227.126.130; helo=mout.kundenserver.de; [email protected]; receiver=<UNKNOWN> 
Received: from mout.kundenserver.de (mout.kundenserver.de [212.227.126.130])
	by email.devuan.org (Postfix) with ESMTPS id 6BC278CF
	for <[email protected]>; Wed,  8 Mar 2023 00:10:43 +0000 (UTC)
Received: from be1.lan ([46.142.249.254]) by mrelayeu.kundenserver.de
 (mreue009 [212.227.15.167]) with ESMTPSA (Nemesis) id
 1N49Yn-1qYqhP3REf-0101ft; Wed, 08 Mar 2023 01:10:42 +0100
Received: from nas10.lan ([192.168.7.240])
	by be1.lan with esmtp (Exim 4.95)
	(envelope-from <[email protected]>)
	id 1pZhOC-0008QN-La;
	Wed, 08 Mar 2023 01:10:41 +0100
Content-Type: text/plain; charset="us-ascii"
MIME-Version: 1.0
Content-Transfer-Encoding: 7bit
From: Bodo Eggert <[email protected]>
To: Devuan Bug Tracking System <[email protected]>
Subject: nfs-ganesha: ganesha has a memory leak
Message-ID: <[email protected]>
X-Mailer: reportbug 7.10.3+devuan1
Date: Wed, 08 Mar 2023 01:10:40 +0100
X-Provags-ID: V03:K1:eguLIurMnT57GdryXfZjWRJlJ2JGj1QsYvIKIAOuyhhjD9roWlZ
 vA283BFoK13OJ1mbFFYOTNxYi4Blme1HferE8gTJcRGUMc6kkSpfFSanjjD22V6TVjyQ2mN
 DweNIpQ73FEwia/gOWBAv1ncpRyCTjsHlrXTMKnKIH2M8eYaBbFjM1WEVhv1ZYtwCXHO0CV
 Os22KtjNff0vfs0itnUrQ==
UI-OutboundReport: notjunk:1;M01:P0:9NWuh+nJxNQ=;ZJ7ouMCT2qj0KSXWRy/HK9TAljO
 m/r78AxrIrd6ECn3zkIOpaHYqnh//QgaPK1kReOkF0iq7NKcMsewhNRyQkz3BzkkMlVXogRnP
 Uwg8W5zArCPQEQM8ixWH692UGsLNdw7qhwjNkp4YYHSx/SuO0NQuYlVvdcfJBg+DdQofRz53l
 DJucbAFZx6HbuceVYwIqWebeHTfuWDazcQqw4TvITDNaN+8JnFUaHfWqOcxA4bZl47UNapcx2
 A7lfD9nnopra/QlBMSGiDsJ1Pw6ecd9qgY9p1nGeBZcVRh7vaDNOl39k7TlkeblTufFRBIxxi
 Qw/oArpsxEqrvo4hTHS8Sda84mMvhaldQyhfLcGYlgwwCm8Zh+T+slDIvQgsg9yTzSDW4cyb2
 wCMw6MzJr6EoPe2o7jaDr0KHOWM1ni6vcq7GQ1YeR4feAEHcs+xxrNJVJswvpk4F+GS4/GXZE
 b5d44qMq4SWnkUluVzLpYUaUPNuURI7NxrTV0eN/4aNR/S9aCNKAkfl4uR6WwuyGBHb5c6XYJ
 VEdX3FGqWeNia449L2vOcgn+NjYsBLidFNxbTqU5MulERivbpVCCiL+46swxMuAI8muZ6k/hy
 R8QqHmgcd1y5Ygdwhzh8egTL8rLeQTsGlYDGX7vyRmyVuN5yA+sUBlM8r/xdfadYAO2JJ+6jM
 YLS6+hchLUBWeezeSA8wRofFmhATr6Ho9/p1Fgbyng==

Package: nfs-ganesha
Version: 3.4-1
Severity: grave
Justification: renders package unusable

Dear Maintainer,

the shipped version of ganesha, version 3.4, does have a memory leak that
causes it to consume all available RAM and more.  I have 4 GB installed, but
yesterday ganesha did use about 6 GB and each stat() required swapping.

I did research about this some time ago, the recommended fix was to upgrade
to 4.x.  Today I tried to find that information again so I could link it but
I couldn't.  Still I think that it needs an upgrade as the proper fix, there
are a lot of memory leak threads on the maintainers' github.

In case the upgrade is not possible: (Otherwise ignore this please)

Currently I'm mitigating this with cgrpups and daily restarting the service. 
This (below) is the configuration that I'm trying since yesterday; I added
memory.soft_limit_in_bytes.  memory.limit_in_bytes alone did not help. 
Today the process did behave as expected.

$ cat /etc/boot.d/00cgconfig
#!/bin/sh
/usr/sbin/cgconfigparser -l /etc/cgconfig.conf
/usr/sbin/cgrulesengd
exit 0


/etc/cgconfig.conf:group daemon/nfsd {
/etc/cgconfig.conf:  cpu {
/etc/cgconfig.conf:    cpu.shares = 500;
/etc/cgconfig.conf:  }
/etc/cgconfig.conf:  memory {
/etc/cgconfig.conf:    memory.limit_in_bytes = 1000000000;
/etc/cgconfig.conf:    memory.soft_limit_in_bytes = 1000000000;
/etc/cgconfig.conf:  }
/etc/cgconfig.conf:}

/etc/cgrules.conf:*:/usr/bin/ganesha.nfsd       memory  daemon/nfsd


-- System Information:
Distributor ID:	Devuan
Description:	Devuan GNU/Linux 4 (chimaera)
Release:	4
Codename:	chimaera
Architecture: x86_64

Kernel: Linux 5.10.0-18-amd64 (SMP w/2 CPU threads)
Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set
Shell: /bin/sh linked to /bin/dash
Init: sysvinit (via /sbin/init)
LSM: AppArmor: enabled

Versions of packages nfs-ganesha depends on:
ii  dbus              1.12.24-0+deb11u1devuan1
ii  libacl1           2.2.53-10
ii  libblkid1         2.36.1-8+devuan2
ii  libc6             2.31-13+deb11u5
ii  libcap2           1:2.44-1
ii  libcom-err2       1.46.2-2
ii  libdbus-1-3       1.12.24-0+deb11u1devuan1
ii  libgssapi-krb5-2  1.18.3-6+deb11u3
ii  libkrb5-3         1.18.3-6+deb11u3
ii  libnfsidmap2      0.25-6
ii  libntirpc3.4      3.4-2
ii  librados2         14.2.21-1
ii  liburcu6          0.12.2-1
ii  libuuid1          2.36.1-8+devuan2
ii  libwbclient0      2:4.13.13+dfsg-1~deb11u5
ii  nfs-common        1:1.3.4-6
ii  rpcbind           1.2.5-9

nfs-ganesha recommends no packages.

nfs-ganesha suggests no packages.

-- Configuration Files:
/etc/ganesha/ganesha.conf changed:
NFS_CORE_PARAM {
	## Allow NFSv3 to mount paths with the Pseudo path, the same as NFSv4,
	## instead of using the physical paths.
	#mount_path_pseudo = true;
	## Configure the protocols that Ganesha will listen for.  This is a hard
	## limit, as this list determines which sockets are opened.  This list
	## can be restricted per export, but cannot be expanded.
	Protocols = 3,4,9P;
}
EXPORT_DEFAULTS {
	## Access type for clients.  Default is None, so some access must be
	## given either here or in the export itself.
	#Access_Type = RW;
	Protocols = 3,4,9P;
	#FSAL {
	#	Name = VFS;
	#}
}
MDCACHE {
	## The point at which object cache entries will start being reused.
	#Entries_HWMark = 100000;
	Entries_HWMark = 50000;
}
EXPORT
{
	## Export Id (mandatory, each EXPORT must have a unique Export_Id)
	Export_Id = 1;
	## Exported path (mandatory)
	Path = /export;
	## Pseudo Path (required for NFSv4 or if mount_path_pseudo = true)
	Pseudo = /;
	## Restrict the protocols that may use this export.  This cannot allow
	## access that is denied in NFS_CORE_PARAM.
	Protocols = 3,4,9P;
	## Access type for clients.  Default is None, so some access must be
	## given. It can be here, in the EXPORT_DEFAULTS, or in a CLIENT block
	## Whether to squash various users.
	## Allowed security types for this export
	#Sectype = sys,krb5,krb5i,krb5p;
        FSAL {
                Name = VFS;
        }
	CLIENT
	{
		Clients = 192.168.redacted.0/24;
		Squash = None;
		Access_Type = RW;
		Sectype = sys;
	}
}
	## Default log level for all components
	#Default_Log_Level = WARN;
	## Configure per-component log levels.
	#Components {
		#FSAL = INFO;
		#NFS4 = EVENT;
	#}
	## Where to log
	#Facility {
		#name = FILE;
		#destination = "/var/log/ganesha.log";
		#enable = active;
	#}


-- no debconf information

Acknowledgement sent to Bodo Eggert <[email protected]>:
New bug report received and forwarded. Copy sent to [email protected]. Full text available.
Report forwarded to [email protected], [email protected]:
bug#748; Package nfs-ganesha. Full text available.

Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd, 1994-97 Ian Jackson.

Devuan Bugs Owner <[email protected]>.
Last modified: Sun, 1 Dec 2024 00:39:02 UTC