| Summary: | Memory leak in server_connection_cleanup | ||||||
|---|---|---|---|---|---|---|---|
| Product: | [Community] GlusterFS | Reporter: | zls <zls0424> | ||||
| Component: | protocol | Assignee: | Pranith Kumar K <pkarampu> | ||||
| Status: | CLOSED CURRENTRELEASE | QA Contact: | |||||
| Severity: | low | Docs Contact: | |||||
| Priority: | low | ||||||
| Version: | 3.0.4 | CC: | gluster-bugs, vijay | ||||
| Target Milestone: | --- | ||||||
| Target Release: | --- | ||||||
| Hardware: | x86_64 | ||||||
| OS: | Linux | ||||||
| Whiteboard: | |||||||
| Fixed In Version: | Doc Type: | Bug Fix | |||||
| Doc Text: | Story Points: | --- | |||||
| Clone Of: | Environment: | ||||||
| Last Closed: | Type: | --- | |||||
| Regression: | RTP | Mount Type: | --- | ||||
| Documentation: | --- | CRM: | |||||
| Verified Versions: | Category: | --- | |||||
| oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |||||
| Cloudforms Team: | --- | Target Upstream Version: | |||||
| Attachments: |
|
||||||
|
Description
zls
2010-06-19 05:31:11 UTC
We have a volume that only opens to some particular ip addresses specified by option "option auth.addr.brick00.allow 10.10.10.10 10.10.10.11". But we have many other clients that are trying for the volume. Then we see the glusterfsd process eating up to 7G memory, and have to kill it. It's easy to reproduce the problem. Just setup the option and try connecting to it from clients that are not allowed, the more the better. /* In function server_connection_cleanup, some memories are only freed if conn->bound_xl is assigned. But in mop_setvolume, this can only happen when gf_authenticate returns AUTH_ACCEPT. So for clients rejected, it prints "Cannot authenticate client from %s" and leaves conn->bound_xl NULL. Then in server_connection_cleanup, do_connection_cleanup will not be called. fdentries has no chance to be freed. */ also in server_connection_destroy, ltable and fdentries are not freed if bound_xl is NULL :) Created attachment 246 [details]
patch to fix typo and add s390 architecture
PATCH: http://patches.gluster.com/patch/3573 in release-3.0 (protocol/server: Fix memory leak when server authentication fails.) |