Bug 1442162
Summary: | Using jdb triggers OOME on the debugged application | |||
---|---|---|---|---|
Product: | Red Hat Enterprise Linux 7 | Reporter: | Jaroslav Reznik <jreznik> | |
Component: | java-1.8.0-openjdk | Assignee: | Andrew John Hughes <ahughes> | |
Status: | CLOSED ERRATA | QA Contact: | Jan Kepler <jkejda> | |
Severity: | high | Docs Contact: | ||
Priority: | high | |||
Version: | 7.0 | CC: | ahughes, cww, dbhole, iweiss, jkejda, jvanek, leiyu, lkuprova, loskutov, salmy, sgehwolf | |
Target Milestone: | rc | Keywords: | Reopened, ZStream | |
Target Release: | --- | |||
Hardware: | x86_64 | |||
OS: | Linux | |||
Whiteboard: | ||||
Fixed In Version: | java-1.8.0-openjdk-1.8.0.131-2.b11.el7_3 | Doc Type: | Bug Fix | |
Doc Text: |
When a method is called using the Java Debug Wire Protocol (JDWP) "invokeMethod" command in a target Java virtual machine, JDWP creates global references for every Object that is implied in the method invocation, as well as for the returned argument of the reference type. Previously, the global references created for such arguments were not collected (deallocated) by the garbage collector after "invokeMethod" finished. This consequently caused memory leaks, and because references to such objects were never released, the debugged application could be terminated with an Out of Memory error. This bug has been fixed, and the described problem no longer occurs.
|
Story Points: | --- | |
Clone Of: | 1284948 | |||
: | 1443684 (view as bug list) | Environment: | ||
Last Closed: | 2017-04-21 02:11:16 UTC | Type: | --- | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | 1284948 | |||
Bug Blocks: |
Description
Jaroslav Reznik
2017-04-13 17:10:02 UTC
Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2017:1108 |