Bug 1595937 - RGW Memory Leak
Summary: RGW Memory Leak
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Ceph Storage
Classification: Red Hat Storage
Component: RGW
Version: 3.0
Hardware: x86_64
OS: Linux
unspecified
urgent
Target Milestone: z5
: 3.0
Assignee: Matt Benjamin (redhat)
QA Contact: Tejas
URL:
Whiteboard:
Depends On: 1522881
Blocks:
TreeView+ depends on / blocked
 
Reported: 2018-06-27 20:45 UTC by tserlin
Modified: 2021-09-09 14:49 UTC (History)
19 users (show)

Fixed In Version: RHEL: ceph-12.2.4-36.el7cp Ubuntu: ceph_12.2.4-40redhat1
Doc Type: Bug Fix
Doc Text:
.Fixed a memory leak with the Ceph Object Gateway A buffer used to transfer incoming PUT data was incorrectly sized at the maximum chunk value of 4 MB. This was leading to a space leak of unused buffer space when PUTs of smaller objects were processed. The Ceph Object Gateway can leak space when processing large numbers of PUT requests less than 4M in size. As a result, the incorrect buffer sizing logic was fixed.
Clone Of: 1522881
Environment:
Last Closed: 2018-08-09 18:27:13 UTC
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Ceph Project Bug Tracker 22410 0 None None None 2018-06-27 20:45:08 UTC
Ceph Project Bug Tracker 23162 0 None None None 2018-06-27 20:45:08 UTC
Ceph Project Bug Tracker 23207 0 None None None 2018-06-27 20:45:08 UTC
Red Hat Issue Tracker RHCEPH-1623 0 None None None 2021-09-09 14:49:01 UTC
Red Hat Product Errata RHBA-2018:2375 0 None None None 2018-08-09 18:28:03 UTC

Comment 17 errata-xmlrpc 2018-08-09 18:27:13 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2018:2375


Note You need to log in before you can comment on or make changes to this bug.