SSO (single sign-on) is being reconfigured. Maintenance started Jul 16 2:20PM UTC and will last 1 hour. Password-enabled login should still work.
Bug 1595937 - RGW Memory Leak
Summary: RGW Memory Leak
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Ceph Storage
Classification: Red Hat
Component: RGW
Version: 3.0
Hardware: x86_64
OS: Linux
unspecified
urgent
Target Milestone: z5
: 3.0
Assignee: Matt Benjamin (redhat)
QA Contact: Tejas
URL:
Whiteboard:
Depends On: 1522881
Blocks:
TreeView+ depends on / blocked
 
Reported: 2018-06-27 20:45 UTC by tserlin
Modified: 2018-08-09 18:28 UTC (History)
19 users (show)

Fixed In Version: RHEL: ceph-12.2.4-36.el7cp Ubuntu: ceph_12.2.4-40redhat1
Doc Type: Bug Fix
Doc Text:
.Fixed a memory leak with the Ceph Object Gateway A buffer used to transfer incoming PUT data was incorrectly sized at the maximum chunk value of 4 MB. This was leading to a space leak of unused buffer space when PUTs of smaller objects were processed. The Ceph Object Gateway can leak space when processing large numbers of PUT requests less than 4M in size. As a result, the incorrect buffer sizing logic was fixed.
Clone Of: 1522881
Environment:
Last Closed: 2018-08-09 18:27:13 UTC
Target Upstream Version:


Attachments (Terms of Use)


Links
System ID Priority Status Summary Last Updated
Ceph Project Bug Tracker 22410 None None None 2018-06-27 20:45:08 UTC
Ceph Project Bug Tracker 23162 None None None 2018-06-27 20:45:08 UTC
Ceph Project Bug Tracker 23207 None None None 2018-06-27 20:45:08 UTC
Red Hat Product Errata RHBA-2018:2375 None None None 2018-08-09 18:28:03 UTC

Comment 17 errata-xmlrpc 2018-08-09 18:27:13 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory, and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2018:2375


Note You need to log in before you can comment on or make changes to this bug.