Support Support Downloads Knowledge Base Case Manager My Juniper Community

Knowledge Base

Search our Knowledge Base sites to find answers to your questions.

Ask All Knowledge Base Sites All Knowledge Base Sites JunosE Defect (KA)Knowledge BaseSecurity AdvisoriesTechnical BulletinsTechnotes Sign in to display secure content and recently viewed articles

PR1324531 - The memory leakage seen in mosquitto-nossl daemon

0

0

Article ID: TSB17607 TECHNICAL_BULLETINS Last Updated: 02 Aug 2019Version: 3.0
Alert Type:
PSN - Product Support Notification
Product Affected:
MX EX PTX vMX
Alert Description:
In a deployment using Message Queue Telemetry Transport (MQTT), a system can experience memory leakage (about 4k memory leakage every 30 seconds).  If the "mosquitto-nossl" runs for a long time, this leads to it using high memory and can indirectly impact other running processes.

The mosquitto-nossl process is used to back the MQTT states and is enabled by default. 
The mosquitto-nossl process might have memory leak as follows. If there is no mosquitto-nossl process, the device is not affected by this issue.

user@device> show system processes extensive | match mos   
Nov 27 20:19:33
19910 daemon      1  20    0 22740K  1864K select  1   0:00   0.00% mosquitto-nossl
20622 daemon      1  20    0 22740K  2596K select  1   0:00   0.00% mosquitto-nossl
20624 daemon      1  20    0 22740K  2596K select  0   0:00   0.00% mosquitto-nossl

user@device> show system processes extensive | match mos   
Nov 27 20:26:09
20622 daemon      1  20    0 22740K  2648K select  0   0:00   0.00% mosquitto-nossl
20624 daemon      1  20    0 22740K  2648K select  1   0:00   0.00% mosquitto-nossl
19910 daemon      1  20    0 22740K  1908K select  1   0:00   0.00% mosquitto-nossl

The error messages might be seen as follows:

  rpd[14910]: RPD_KRT_Q_RETRIES: route add: Resource temporarily unavailable
  kernel: rt_pfe_veto: Severe memory pressure, low-free-pages is below threshold. Op 1 err 12, rtsm_id 5:-1, msg type 2
  kernel: rt_pfe_veto: free page threshold = (15519) number of pages free = (39444) number of pages on buffer cache queue = (0) curproc = rpd

   
Solution:
This issue is being tracked via PR1324531. Customers running the affected software are encouraged to evaluate and deploy Junos Software with the fix.
The following is the list of affected software:
  • 16.2R1 or later​ ​
    • fixed in 16.2R2-S7 or later, and 16.2R3
  • 17.1R1 or later
    • fixed in 17.1R2-S7 or later, and 17.1R3
  • 17.2R1 or later
    • fixed in 17.2R2-S6 or later, and 17.2R3
  • 17.3R1 or later
    • fixed in 17.3R2-S3 or later, and 17.3R3
  • 17.4R1 or later
    • fixed in 17.4R1-S1 or later, 17.4R2 or later
  • Does not affect Junos 18.x or later releases

If you can not upgrade Junos software, there is a workaround available. Please check PR1324531 for the workaround and current information.
Modification History:
First publication 2019-08-02

Related Links

Comment on this article > Affected Products Browse the Knowledge Base for more articles related to these product categories. Select a category to begin.

Getting Up and Running with Junos

Getting Up and Running with Junos Security Alerts and Vulnerabilities Product Alerts and Software Release Notices Problem Report (PR) Search Tool EOL Notices and Bulletins JTAC User Guide Customer Care User Guide Pathfinder SRX High Availability Configurator SRX VPN Configurator Training Courses and Videos End User Licence Agreement Global Search