Bug 1328443
| Summary: | [RHEL-6] gluster-swift: During GETs, duplicate fd leaks for files that need Etag recomputed | ||
|---|---|---|---|
| Product: | [Red Hat Storage] Red Hat Gluster Storage | Reporter: | Prashanth Pai <ppai> |
| Component: | gluster-swift | Assignee: | Prashanth Pai <ppai> |
| Status: | CLOSED ERRATA | QA Contact: | surabhi <sbhaloth> |
| Severity: | high | Docs Contact: | |
| Priority: | high | ||
| Version: | rhgs-3.1 | CC: | asrivast, nlevinki, rcyriac, rhinduja, rhs-bugs, sbhaloth, thiago |
| Target Milestone: | --- | Keywords: | ZStream |
| Target Release: | RHGS 3.1.3 | ||
| Hardware: | All | ||
| OS: | All | ||
| Whiteboard: | |||
| Fixed In Version: | swiftonfile-1.13.1-7 | Doc Type: | Bug Fix |
| Doc Text: | Story Points: | --- | |
| Clone Of: | 1314622 | Environment: | |
| Last Closed: | 2016-06-23 05:36:15 UTC | Type: | Bug |
| Regression: | --- | Mount Type: | --- |
| Documentation: | --- | CRM: | |
| Verified Versions: | Category: | --- | |
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
| Cloudforms Team: | --- | Target Upstream Version: | |
| Embargoed: | |||
| Bug Depends On: | 1314622 | ||
| Bug Blocks: | 1299184 | ||
|
Comment 2
Prashanth Pai
2016-04-22 07:11:56 UTC
1. PUT an object with some data : curl -i -d "swiftonfile" http://localhost:8080/v1/AUTH_test/c1/file1 -X PUT 2. curl -i http://localhost:8080/v1/AUTH_test/c1/file1 -X GET 3. Observe the process by attaching to strace: strace -ff -p 10245 -e open,close,dup Process 19074 attached with 21 threads [pid 19074] open("/mnt/gluster-object/test/c1/file1", O_RDONLY|O_CLOEXEC) = 10 [pid 19074] close(10) = 0 [pid 19074] close(6) = 0 4. # echo "aaaaaaaaaaa" > /mnt/gluster-object/test/c1/file1 [pid 19074] open("/mnt/gluster-object/test/c1/file1", O_RDONLY|O_CLOEXEC) = 10 [pid 19074] dup(10) = 12 [pid 19074] close(12) = 0 [pid 19074] close(10) = 0 5. # curl -i http://localhost:8080/v1/AUTH_test/c1/file1 -X GET Process 19074 attached with 21 threads [pid 19074] open("/mnt/gluster-object/test/c1/file1", O_RDONLY|O_CLOEXEC) = 10 [pid 19074] close(10) = 0 [pid 19074] close(6) = 0 [pid 19074] open("/mnt/gluster-object/test/c1/file1", O_RDONLY|O_CLOEXEC) = 10 [pid 19074] dup(10) = 12 [pid 19074] close(12) = 0 [pid 19074] close(10) = 0 [pid 19074] close(6) = 0 ls -l /proc/19074/fd | grep file1 No fd leaks observed.Marking the BZ verified. swiftonfile-1.13.1-7.el6rhs.noarch Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHEA-2016:1246 |