Bug 1223708
Summary: | Out of memory: Direct Buffer Memory | ||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
Product: | [JBoss] JBoss Enterprise Application Platform 6 | Reporter: | Jan Stefl <jstefl> | ||||||||||||
Component: | Web | Assignee: | baranowb <bbaranow> | ||||||||||||
Status: | CLOSED CURRENTRELEASE | QA Contact: | Jan Stefl <jstefl> | ||||||||||||
Severity: | high | Docs Contact: | |||||||||||||
Priority: | unspecified | ||||||||||||||
Version: | 6.4.1 | CC: | bbaranow, bmaxwell, istudens, jstefl, rhatlapa, rmaucher | ||||||||||||
Target Milestone: | CR1 | ||||||||||||||
Target Release: | EAP 6.4.3 | ||||||||||||||
Hardware: | Unspecified | ||||||||||||||
OS: | Unspecified | ||||||||||||||
Whiteboard: | |||||||||||||||
Fixed In Version: | Doc Type: | Bug Fix | |||||||||||||
Doc Text: | Story Points: | --- | |||||||||||||
Clone Of: | Environment: | ||||||||||||||
Last Closed: | 2017-01-17 10:38:09 UTC | Type: | Bug | ||||||||||||
Regression: | --- | Mount Type: | --- | ||||||||||||
Documentation: | --- | CRM: | |||||||||||||
Verified Versions: | Category: | --- | |||||||||||||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||||||||||
Cloudforms Team: | --- | Target Upstream Version: | |||||||||||||
Embargoed: | |||||||||||||||
Bug Depends On: | |||||||||||||||
Bug Blocks: | 1221875, 1231259 | ||||||||||||||
Attachments: |
|
Description
Jan Stefl
2015-05-21 09:50:06 UTC
Created attachment 1028056 [details]
server.log
Created attachment 1028057 [details]
server.log
Created attachment 1028058 [details]
exception.txt
Created attachment 1028061 [details]
standalone-ha.xml
From direct-buffer-memory-monitor.log these appear to be the results of GC: 09:54:01 PM 49720 561833612 561833612 11:09:01 PM 14595 178052887 178052887 12:28:01 AM 17866 216067099 216067099 01:48:01 AM 17717 211701469 211701469 03:07:01 AM 13474 170090946 170090946 04:23:01 AM 17971 219654123 219654123 I see no problem there. Here, the SecureNioChannel does not need to use direct buffers, so it would be good to change that to regular ones and use that to determine there's a leak [I doubt it]. It looks like the JVM would have a much harder time GCing those direct buffers. Example of the problem: http://stackoverflow.com/questions/1854398/how-to-garbage-collect-a-direct-buffer-java > x60 times? does this mean 4x60x256 concurrent calls or 4x256 concurrent calls and 60 repetitions. 4x256 concurrent calls and 60 repetitions. > Jan can you share JDK/OS pair? Oracle JDK7 / RHEL7 > So can you hack a bit SecureNioChannel and replace all ByteBuffer.allocateDirect ... If anyone provide patch to me I will execute the test over it. Testing time depends on load in lab. I did testing with provided patch and exception did not appear anymore. I didn't notice performance drop - result of patched and not patched server are same basically. r2617 in web. great, thanks Remy. Verified in 6.4.3.CR1. PASSED. Thank you. Retroactively bulk-closing issues from released EAP 6.4 cummulative patches. |