Bug 1007841 - Leak 16 MB of memory per connection opened
Summary: Leak 16 MB of memory per connection opened
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 7
Classification: Red Hat
Component: spice-gtk
Version: 7.0
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Marc-Andre Lureau
QA Contact: Desktop QE
URL:
Whiteboard:
Depends On: 1028637 1109397
Blocks:
TreeView+ depends on / blocked
 
Reported: 2013-09-13 12:45 UTC by Daniel Berrangé
Modified: 2015-03-05 13:40 UTC (History)
4 users (show)

Fixed In Version: spice-gtk-0.22-1.el7
Doc Type: Bug Fix
Doc Text:
Clone Of: 1007837
Environment:
Last Closed: 2015-03-05 13:40:36 UTC
Target Upstream Version:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHBA-2015:0297 0 normal SHIPPED_LIVE spice-gtk bug fix and enhancement update 2015-03-05 17:33:27 UTC

Description Daniel Berrangé 2013-09-13 12:45:39 UTC
spice-gtk copied the gtk-vnc coroutine_ucontext.c so suffers from this same flaw

+++ This bug was initially created as a clone of Bug #1007837 +++

Description of problem:
The ucontext coroutine implementation mmap()s 16 MB of memory for the coroutine stack, but fails to ever unmap it. This causes the stack to leak for each coroutine started

Version-Release number of selected component (if applicable):
gtk-vnc-0.5.2-2.el7

How reproducible:
Always


Steps to Reproduce:
1. Run demo program in https://bugzilla.gnome.org/show_bug.cgi?id=705827 it will consume memory until exhausted, then crash.
2.
3.

Comment 4 Marc-Andre Lureau 2014-07-08 15:47:39 UTC
please QA ack, this is included in rebase

Comment 8 errata-xmlrpc 2015-03-05 13:40:36 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHBA-2015-0297.html


Note You need to log in before you can comment on or make changes to this bug.