Mark Hindley <[email protected]>
to [email protected]
.
Full text available.Mark Hindley <[email protected]>
to [email protected]
.
Full text available.Received: (at 748) by bugs.devuan.org; 8 Mar 2023 08:58:37 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Wed, 08 Mar 2023 08:58:37 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id /h2qMA5OCGT5HQAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Wed, 08 Mar 2023 08:57:50 +0000 Received: by email.devuan.org (Postfix, from userid 109) id B205296F; Wed, 8 Mar 2023 08:57:50 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS autolearn=no autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; [email protected]; receiver=<UNKNOWN> Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86]) by email.devuan.org (Postfix) with ESMTPS id 543DE66D for <[email protected]>; Wed, 8 Mar 2023 08:57:50 +0000 (UTC) Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk) by mx.hindley.org.uk with smtp (Exim 4.84_2) (envelope-from <[email protected]>) id 1pZpcL-00041c-Cd; Wed, 08 Mar 2023 08:57:49 +0000 Received: (nullmailer pid 22949 invoked by uid 1000); Wed, 08 Mar 2023 08:57:49 -0000 Date: Wed, 8 Mar 2023 08:57:49 +0000 From: Mark Hindley <[email protected]> To: Bodo Eggert <[email protected]>, [email protected] Subject: Re: bug#748: nfs-ganesha: ganesha has a memory leak Message-ID: <[email protected]> References: <[email protected]> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <[email protected]> X-Debbugs-No-Ack: No Thanks Control: tags -1 debian Control: fixed -1 4.0.12-3~bpo11+1 Bodo, On Wed, Mar 08, 2023 at 01:10:40AM +0100, Bodo Eggert wrote: > Package: nfs-ganesha > Version: 3.4-1 > Severity: grave > Justification: renders package unusable > > Dear Maintainer, > > the shipped version of ganesha, version 3.4, does have a memory leak that > causes it to consume all available RAM and more. I have 4 GB installed, but > yesterday ganesha did use about 6 GB and each stat() required swapping. This is not a forked package in Devuan and we use Debian's packages directly without recompilation. Please report this to Debian's BTS to be addressed. If you think 4.x series will fix it, you might be interested in the stable-bpo version 4.0.12-3~bpo11+1. Mark
[email protected], [email protected]
:bug#748
; Package nfs-ganesha
.
Full text available.Received: (at submit) by bugs.devuan.org; 8 Mar 2023 00:12:02 +0000 Return-Path: <[email protected]> Delivered-To: [email protected] Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612] by doc.devuan.org with IMAP (fetchmail-6.4.16) for <debbugs@localhost> (single-drop); Wed, 08 Mar 2023 00:12:02 +0000 (UTC) Received: from email.devuan.org by email.devuan.org with LMTP id PMcGF4rSB2RkBQAAmSBk0A (envelope-from <[email protected]>) for <[email protected]>; Wed, 08 Mar 2023 00:10:50 +0000 Received: by email.devuan.org (Postfix, from userid 109) id 47C3D96F; Wed, 8 Mar 2023 00:10:50 +0000 (UTC) X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org X-Spam-Level: X-Spam-Status: No, score=-1.0 required=5.0 tests=FREEMAIL_FROM, RCVD_IN_DNSWL_NONE,RCVD_IN_MSPIKE_H2,SPF_PASS,T_FILL_THIS_FORM_SHORT autolearn=ham autolearn_force=no version=3.4.6 Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=212.227.126.130; helo=mout.kundenserver.de; [email protected]; receiver=<UNKNOWN> Received: from mout.kundenserver.de (mout.kundenserver.de [212.227.126.130]) by email.devuan.org (Postfix) with ESMTPS id 6BC278CF for <[email protected]>; Wed, 8 Mar 2023 00:10:43 +0000 (UTC) Received: from be1.lan ([46.142.249.254]) by mrelayeu.kundenserver.de (mreue009 [212.227.15.167]) with ESMTPSA (Nemesis) id 1N49Yn-1qYqhP3REf-0101ft; Wed, 08 Mar 2023 01:10:42 +0100 Received: from nas10.lan ([192.168.7.240]) by be1.lan with esmtp (Exim 4.95) (envelope-from <[email protected]>) id 1pZhOC-0008QN-La; Wed, 08 Mar 2023 01:10:41 +0100 Content-Type: text/plain; charset="us-ascii" MIME-Version: 1.0 Content-Transfer-Encoding: 7bit From: Bodo Eggert <[email protected]> To: Devuan Bug Tracking System <[email protected]> Subject: nfs-ganesha: ganesha has a memory leak Message-ID: <[email protected]> X-Mailer: reportbug 7.10.3+devuan1 Date: Wed, 08 Mar 2023 01:10:40 +0100 X-Provags-ID: V03:K1:eguLIurMnT57GdryXfZjWRJlJ2JGj1QsYvIKIAOuyhhjD9roWlZ vA283BFoK13OJ1mbFFYOTNxYi4Blme1HferE8gTJcRGUMc6kkSpfFSanjjD22V6TVjyQ2mN DweNIpQ73FEwia/gOWBAv1ncpRyCTjsHlrXTMKnKIH2M8eYaBbFjM1WEVhv1ZYtwCXHO0CV Os22KtjNff0vfs0itnUrQ== UI-OutboundReport: notjunk:1;M01:P0:9NWuh+nJxNQ=;ZJ7ouMCT2qj0KSXWRy/HK9TAljO m/r78AxrIrd6ECn3zkIOpaHYqnh//QgaPK1kReOkF0iq7NKcMsewhNRyQkz3BzkkMlVXogRnP Uwg8W5zArCPQEQM8ixWH692UGsLNdw7qhwjNkp4YYHSx/SuO0NQuYlVvdcfJBg+DdQofRz53l DJucbAFZx6HbuceVYwIqWebeHTfuWDazcQqw4TvITDNaN+8JnFUaHfWqOcxA4bZl47UNapcx2 A7lfD9nnopra/QlBMSGiDsJ1Pw6ecd9qgY9p1nGeBZcVRh7vaDNOl39k7TlkeblTufFRBIxxi Qw/oArpsxEqrvo4hTHS8Sda84mMvhaldQyhfLcGYlgwwCm8Zh+T+slDIvQgsg9yTzSDW4cyb2 wCMw6MzJr6EoPe2o7jaDr0KHOWM1ni6vcq7GQ1YeR4feAEHcs+xxrNJVJswvpk4F+GS4/GXZE b5d44qMq4SWnkUluVzLpYUaUPNuURI7NxrTV0eN/4aNR/S9aCNKAkfl4uR6WwuyGBHb5c6XYJ VEdX3FGqWeNia449L2vOcgn+NjYsBLidFNxbTqU5MulERivbpVCCiL+46swxMuAI8muZ6k/hy R8QqHmgcd1y5Ygdwhzh8egTL8rLeQTsGlYDGX7vyRmyVuN5yA+sUBlM8r/xdfadYAO2JJ+6jM YLS6+hchLUBWeezeSA8wRofFmhATr6Ho9/p1Fgbyng== Package: nfs-ganesha Version: 3.4-1 Severity: grave Justification: renders package unusable Dear Maintainer, the shipped version of ganesha, version 3.4, does have a memory leak that causes it to consume all available RAM and more. I have 4 GB installed, but yesterday ganesha did use about 6 GB and each stat() required swapping. I did research about this some time ago, the recommended fix was to upgrade to 4.x. Today I tried to find that information again so I could link it but I couldn't. Still I think that it needs an upgrade as the proper fix, there are a lot of memory leak threads on the maintainers' github. In case the upgrade is not possible: (Otherwise ignore this please) Currently I'm mitigating this with cgrpups and daily restarting the service. This (below) is the configuration that I'm trying since yesterday; I added memory.soft_limit_in_bytes. memory.limit_in_bytes alone did not help. Today the process did behave as expected. $ cat /etc/boot.d/00cgconfig #!/bin/sh /usr/sbin/cgconfigparser -l /etc/cgconfig.conf /usr/sbin/cgrulesengd exit 0 /etc/cgconfig.conf:group daemon/nfsd { /etc/cgconfig.conf: cpu { /etc/cgconfig.conf: cpu.shares = 500; /etc/cgconfig.conf: } /etc/cgconfig.conf: memory { /etc/cgconfig.conf: memory.limit_in_bytes = 1000000000; /etc/cgconfig.conf: memory.soft_limit_in_bytes = 1000000000; /etc/cgconfig.conf: } /etc/cgconfig.conf:} /etc/cgrules.conf:*:/usr/bin/ganesha.nfsd memory daemon/nfsd -- System Information: Distributor ID: Devuan Description: Devuan GNU/Linux 4 (chimaera) Release: 4 Codename: chimaera Architecture: x86_64 Kernel: Linux 5.10.0-18-amd64 (SMP w/2 CPU threads) Locale: LANG=C, LC_CTYPE=C.UTF-8 (charmap=UTF-8), LANGUAGE not set Shell: /bin/sh linked to /bin/dash Init: sysvinit (via /sbin/init) LSM: AppArmor: enabled Versions of packages nfs-ganesha depends on: ii dbus 1.12.24-0+deb11u1devuan1 ii libacl1 2.2.53-10 ii libblkid1 2.36.1-8+devuan2 ii libc6 2.31-13+deb11u5 ii libcap2 1:2.44-1 ii libcom-err2 1.46.2-2 ii libdbus-1-3 1.12.24-0+deb11u1devuan1 ii libgssapi-krb5-2 1.18.3-6+deb11u3 ii libkrb5-3 1.18.3-6+deb11u3 ii libnfsidmap2 0.25-6 ii libntirpc3.4 3.4-2 ii librados2 14.2.21-1 ii liburcu6 0.12.2-1 ii libuuid1 2.36.1-8+devuan2 ii libwbclient0 2:4.13.13+dfsg-1~deb11u5 ii nfs-common 1:1.3.4-6 ii rpcbind 1.2.5-9 nfs-ganesha recommends no packages. nfs-ganesha suggests no packages. -- Configuration Files: /etc/ganesha/ganesha.conf changed: NFS_CORE_PARAM { ## Allow NFSv3 to mount paths with the Pseudo path, the same as NFSv4, ## instead of using the physical paths. #mount_path_pseudo = true; ## Configure the protocols that Ganesha will listen for. This is a hard ## limit, as this list determines which sockets are opened. This list ## can be restricted per export, but cannot be expanded. Protocols = 3,4,9P; } EXPORT_DEFAULTS { ## Access type for clients. Default is None, so some access must be ## given either here or in the export itself. #Access_Type = RW; Protocols = 3,4,9P; #FSAL { # Name = VFS; #} } MDCACHE { ## The point at which object cache entries will start being reused. #Entries_HWMark = 100000; Entries_HWMark = 50000; } EXPORT { ## Export Id (mandatory, each EXPORT must have a unique Export_Id) Export_Id = 1; ## Exported path (mandatory) Path = /export; ## Pseudo Path (required for NFSv4 or if mount_path_pseudo = true) Pseudo = /; ## Restrict the protocols that may use this export. This cannot allow ## access that is denied in NFS_CORE_PARAM. Protocols = 3,4,9P; ## Access type for clients. Default is None, so some access must be ## given. It can be here, in the EXPORT_DEFAULTS, or in a CLIENT block ## Whether to squash various users. ## Allowed security types for this export #Sectype = sys,krb5,krb5i,krb5p; FSAL { Name = VFS; } CLIENT { Clients = 192.168.redacted.0/24; Squash = None; Access_Type = RW; Sectype = sys; } } ## Default log level for all components #Default_Log_Level = WARN; ## Configure per-component log levels. #Components { #FSAL = INFO; #NFS4 = EVENT; #} ## Where to log #Facility { #name = FILE; #destination = "/var/log/ganesha.log"; #enable = active; #} -- no debconf information
Bodo Eggert <[email protected]>
:[email protected]
.
Full text available.[email protected], [email protected]
:bug#748
; Package nfs-ganesha
.
Full text available.Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997 nCipher Corporation Ltd,
1994-97 Ian Jackson.
Devuan Bugs Owner <[email protected]>.
Last modified:
Sun, 1 Dec 2024 00:39:02 UTC