[Bugs] [Bug 1405886] New: Fix potential leaks in INODELK cbk in protocol/client

bugzilla at redhat.com bugzilla at redhat.com
Mon Dec 19 04:21:51 UTC 2016


https://bugzilla.redhat.com/show_bug.cgi?id=1405886

            Bug ID: 1405886
           Summary: Fix potential leaks in INODELK cbk in protocol/client
           Product: GlusterFS
           Version: 3.8
         Component: core
          Keywords: Triaged
          Assignee: kdhananj at redhat.com
          Reporter: kdhananj at redhat.com
                CC: bugs at gluster.org
        Depends On: 1405885



+++ This bug was initially created as a clone of Bug #1405885 +++

Description of problem:

There is a potential leak in protocol/client's INODELK callback:

<code>
 31
 30         GF_PROTOCOL_DICT_UNSERIALIZE (this, xdata, (rsp.xdata.xdata_val),
 29                                       (rsp.xdata.xdata_len), ret,
 28                                       rsp.op_errno, out);
 27
 26         ret = client_post_inodelk (this, &rsp, &xdata);
 25         if (ret < 0)
 24                 goto out;
 23 out:
</code>

The dict xdata is unserialized twice - once at line 30 and once inside
client_post_inodelk function called at line 26. This is a memory leak. We're
safe as of today because none of the xlators on the client stack that invoke
inodelk fop (like AFR, DHT etc) pass xdata while winding it.



Version-Release number of selected component (if applicable):


How reproducible:


Steps to Reproduce:
1.
2.
3.

Actual results:


Expected results:


Additional info:

--- Additional comment from Worker Ant on 2016-12-18 23:16:03 EST ---

REVIEW: http://review.gluster.org/16186 (protocol/client: Fix potential
mem-leaks) posted (#1) for review on release-3.9 by Krutika Dhananjay
(kdhananj at redhat.com)


Referenced Bugs:

https://bugzilla.redhat.com/show_bug.cgi?id=1405885
[Bug 1405885] Fix potential leaks in INODELK cbk in protocol/client
-- 
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=rpobHkXZyd&a=cc_unsubscribe


More information about the Bugs mailing list