[Bugs] [Bug 1400833] possible memory leak on client when writing to a file while another client issues a truncate
bugzilla at redhat.com
bugzilla at redhat.com
Thu Jan 12 06:21:43 UTC 2017
https://bugzilla.redhat.com/show_bug.cgi?id=1400833
--- Comment #3 from Worker Ant <bugzilla-bot at gluster.org> ---
COMMIT: http://review.gluster.org/16006 committed in release-3.9 by Pranith
Kumar Karampuri (pkarampu at redhat.com)
------
commit 3f63362b6058d13dc51730d7b343fda0384e0091
Author: Ashish Pandey <aspandey at redhat.com>
Date: Fri Dec 2 13:15:20 2016 +0530
cluster/ec: Check xdata to avoid memory leak
Problem: ec_writev_start calls ec_make_internal_fop_xdata
to set "yes" in xdata before ec_readv (an internal fop)
is called for head and tail. Second call to this function
is overwriting the previous allocated dict_t to "xdata",
which results in memory leak.
Solution: In ec_make_internal_fop_xdata, check if *xdata
is NULL or not to avoid overwriting *xdata.
>Change-Id: I49b83923e11aff9b92d002e86424c0c2e1f5f74f
>BUG: 1400818
>Signed-off-by: Ashish Pandey <aspandey at redhat.com>
>Reviewed-on: http://review.gluster.org/16007
>Reviewed-by: Xavier Hernandez <xhernandez at datalab.es>
>Reviewed-by: Pranith Kumar Karampuri <pkarampu at redhat.com>
>Tested-by: Pranith Kumar Karampuri <pkarampu at redhat.com>
>Smoke: Gluster Build System <jenkins at build.gluster.org>
>NetBSD-regression: NetBSD Build System <jenkins at build.gluster.org>
>CentOS-regression: Gluster Build System <jenkins at build.gluster.org>
Change-Id: I49b83923e11aff9b92d002e86424c0c2e1f5f74f
BUG: 1400833
Signed-off-by: Ashish Pandey <aspandey at redhat.com>
Reviewed-on: http://review.gluster.org/16006
NetBSD-regression: NetBSD Build System <jenkins at build.gluster.org>
CentOS-regression: Gluster Build System <jenkins at build.gluster.org>
Smoke: Gluster Build System <jenkins at build.gluster.org>
Reviewed-by: Xavier Hernandez <xhernandez at datalab.es>
--
You are receiving this mail because:
You are on the CC list for the bug.
Unsubscribe from this bug https://bugzilla.redhat.com/token.cgi?t=s4MaaxINth&a=cc_unsubscribe
More information about the Bugs
mailing list