Bug 1522881
Summary: | RGW Memory Leak | |||
---|---|---|---|---|
Product: | [Red Hat Storage] Red Hat Ceph Storage | Reporter: | Benjamin Schmaus <bschmaus> | |
Component: | RGW | Assignee: | Matt Benjamin (redhat) <mbenjamin> | |
Status: | CLOSED ERRATA | QA Contact: | Tejas <tchandra> | |
Severity: | urgent | Docs Contact: | Aron Gunn <agunn> | |
Priority: | unspecified | |||
Version: | 2.4 | CC: | agunn, bschmaus, cbodley, ceph-eng-bugs, kbader, kdreyer, kdudka, linuxkidd, mbenjamin, mhackett, mkogan, mwatts, owasserm, skinjo, sweil, tchandra, tserlin, vumrao | |
Target Milestone: | z1 | |||
Target Release: | 2.5 | |||
Hardware: | x86_64 | |||
OS: | Linux | |||
Whiteboard: | ||||
Fixed In Version: | RHEL: ceph-10.2.10-22.el7cp Ubuntu: ceph_10.2.10-19redhat1 | Doc Type: | Bug Fix | |
Doc Text: |
.Fixed a memory leak with the Ceph Object Gateway
A buffer used to transfer incoming PUT data was incorrectly sized at the maximum chunk value of 4 MB. This was leading to a space leak of unused buffer space when PUTs of smaller objects were processed. The Ceph Object Gateway can leak space when processing large numbers of PUT requests less than 4M in size. As a result, the incorrect buffer sizing logic was fixed.
|
Story Points: | --- | |
Clone Of: | ||||
: | 1595937 (view as bug list) | Environment: | ||
Last Closed: | 2018-07-26 18:06:41 UTC | Type: | Bug | |
Regression: | --- | Mount Type: | --- | |
Documentation: | --- | CRM: | ||
Verified Versions: | Category: | --- | ||
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | ||
Cloudforms Team: | --- | Target Upstream Version: | ||
Embargoed: | ||||
Bug Depends On: | ||||
Bug Blocks: | 1536401, 1595937 |
Description
Benjamin Schmaus
2017-12-06 16:37:52 UTC
Customer ran atop from radosgw node with the following: $atop -a 0 1 -w <name of output file) Attachment in comment 9 Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. https://access.redhat.com/errata/RHSA-2018:2261 |