Bugzilla will be upgraded to version 5.0. The upgrade date is tentatively scheduled for 2 December 2018, pending final testing and feedback.
Bug 1400395 - Memory leak in client-side background heals.
Memory leak in client-side background heals.
Status: CLOSED ERRATA
Product: Red Hat Gluster Storage
Classification: Red Hat
Component: replicate (Show other bugs)
3.2
Unspecified Unspecified
unspecified Severity unspecified
: ---
: RHGS 3.2.0
Assigned To: Ravishankar N
nchilaka
:
Depends On:
Blocks: 1351528
  Show dependency treegraph
 
Reported: 2016-12-01 00:12 EST by Ravishankar N
Modified: 2017-03-23 01:53 EDT (History)
4 users (show)

See Also:
Fixed In Version: glusterfs-3.8.4-7
Doc Type: If docs needed, set a value
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2017-03-23 01:53:50 EDT
Type: Bug
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)


External Trackers
Tracker ID Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2017:0486 normal SHIPPED_LIVE Moderate: Red Hat Gluster Storage 3.2.0 security, bug fix, and enhancement update 2017-03-23 05:18:45 EDT

  None (edit)
Description Ravishankar N 2016-12-01 00:12:18 EST
Description of problem:
A community user found the issue in BZ 1399592. When the client side background heal queue is full, we were not freeing up the frames that we created for queuing in the heal.
Comment 2 Ravishankar N 2016-12-01 00:35:27 EST
Downstream patch https://code.engineering.redhat.com/gerrit/#/c/91823/
Comment 6 nchilaka 2017-02-13 04:23:04 EST
I have verified on 3.8.4-14
on both cifs mount and fuse mount
didn't find any leak
hence moving to verified
Comment 8 errata-xmlrpc 2017-03-23 01:53:50 EDT
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://rhn.redhat.com/errata/RHSA-2017-0486.html

Note You need to log in before you can comment on or make changes to this bug.