Bug 769224
Summary: | memory leak when run 'virsh domxml-to-native' | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Alex Jia <ajia> |
Component: | libvirt | Assignee: | Alex Jia <ajia> |
Status: | CLOSED ERRATA | QA Contact: | Virtualization Bugs <virt-bugs> |
Severity: | high | Docs Contact: | |
Priority: | high | ||
Version: | 6.3 | CC: | acathrow, dallan, dyuan, eblake, mshao, mzhan, rwu, veillard |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | x86_64 | ||
OS: | Linux | ||
Whiteboard: | |||
Fixed In Version: | libvirt-0.9.9-1.el6 | Doc Type: | Bug Fix |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2012-06-20 06:39:27 UTC | Type: | --- |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Alex Jia
2011-12-20 10:35:25 UTC
Patch for upstream: http://www.redhat.com/archives/libvir-list/2011-December/msg00875.html commit ea964658af7a54216e3c7c3ee2e0d2ea719ba018 Author: Alex Jia <ajia> Date: Tue Dec 20 18:33:52 2011 +0800 virsh: plug mem leaks in domxml-*-native Detected by valgrind. Leaks introduced in commit 4d5383f. * tools/virsh.c: fix memory leaks on cmdDomXMLFromNative and cmdDomXMLToNative. * how to reproduce? % virsh dumpxml ${guest} > foo.xml % valgrind -v --leak-check=full virsh domxml-from-native qemu-argv foo.xml % valgrind -v --leak-check=full virsh domxml-to-native qemu-argv foo.xml *** Bug 769225 has been marked as a duplicate of this bug. *** (In reply to comment #3) > *** Bug 769225 has been marked as a duplicate of this bug. *** Be sure to also test domxml-from-native when verifying this bug, since it was a single patch for both leaks. Reproduce it with libvirt-0.9.8-1.el6.x86_64. Verify it with libvirt-0.9.9-1.el6 and it passed. Since the problem described in this bug report should be resolved in a recent advisory, it has been closed with a resolution of ERRATA. For information on the advisory, and where to find the updated files, follow the link below. If the solution does not work for you, open a new bug report. http://rhn.redhat.com/errata/RHSA-2012-0748.html |