Devuan bug report logs - #748
nfs-ganesha: ganesha has a memory leak

version graph

Package: nfs-ganesha; Maintainer for nfs-ganesha is (unknown); Source for nfs-ganesha is src:nfs-ganesha.

Reported by: Bodo Eggert <7eggert@gmx.de>

Date: Wed, 8 Mar 2023 00:14:01 UTC

Severity: grave

Tags: debian

Found in version 3.4-1

Fixed in version 4.0.12-3~bpo11+1

Full log


🔗 View this message in rfc822 format

X-Loop: owner@bugs.devuan.org
Subject: bug#748: nfs-ganesha: ganesha has a memory leak
Reply-To: Mark Hindley <mark@hindley.org.uk>, 748@bugs.devuan.org
Resent-From: Mark Hindley <mark@hindley.org.uk>
Resent-To: devuan-bugs@lists.dyne.org
Resent-CC: devuan-dev@lists.dyne.org
X-Loop: owner@bugs.devuan.org
Resent-Date: Wed, 08 Mar 2023 09:00:01 +0000
Resent-Message-ID: <handler.748.B748.16782659176926@bugs.devuan.org>
Resent-Sender: owner@bugs.devuan.org
X-Devuan-PR-Message: followup 748
X-Devuan-PR-Package: nfs-ganesha
X-Devuan-PR-Keywords: 
References: <167823424058.6029.9134929213701540816.reportbug@nas10.lan> <167823424058.6029.9134929213701540816.reportbug@nas10.lan>
Received: via spool by 748-submit@bugs.devuan.org id=B748.16782659176926
          (code B ref 748); Wed, 08 Mar 2023 09:00:01 +0000
Received: (at 748) by bugs.devuan.org; 8 Mar 2023 08:58:37 +0000
Delivered-To: bugs@devuan.org
Received: from email.devuan.org [2001:41d0:2:d06e::5c4:2612]
	by doc.devuan.org with IMAP (fetchmail-6.4.16)
	for <debbugs@localhost> (single-drop); Wed, 08 Mar 2023 08:58:37 +0000 (UTC)
Received: from email.devuan.org
	by email.devuan.org with LMTP
	id /h2qMA5OCGT5HQAAmSBk0A
	(envelope-from <mark@hindley.org.uk>)
	for <bugs@devuan.org>; Wed, 08 Mar 2023 08:57:50 +0000
Received: by email.devuan.org (Postfix, from userid 109)
	id B205296F; Wed,  8 Mar 2023 08:57:50 +0000 (UTC)
X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on email.devuan.org
X-Spam-Level: 
X-Spam-Status: No, score=0.4 required=5.0 tests=RDNS_DYNAMIC,SPF_PASS
	autolearn=no autolearn_force=no version=3.4.6
Received-SPF: Pass (mailfrom) identity=mailfrom; client-ip=193.36.131.86; helo=mx.hindley.org.uk; envelope-from=mark@hindley.org.uk; receiver=<UNKNOWN> 
Received: from mx.hindley.org.uk (193-36-131-86.cfwn.uk [193.36.131.86])
	by email.devuan.org (Postfix) with ESMTPS id 543DE66D
	for <748@bugs.devuan.org>; Wed,  8 Mar 2023 08:57:50 +0000 (UTC)
Received: from apollo.hindleynet ([192.168.1.3] helo=hindley.org.uk)
	by mx.hindley.org.uk with smtp (Exim 4.84_2)
	(envelope-from <mark@hindley.org.uk>)
	id 1pZpcL-00041c-Cd; Wed, 08 Mar 2023 08:57:49 +0000
Received: (nullmailer pid 22949 invoked by uid 1000);
	Wed, 08 Mar 2023 08:57:49 -0000
Date: Wed, 8 Mar 2023 08:57:49 +0000
From: Mark Hindley <mark@hindley.org.uk>
To: Bodo Eggert <7eggert@gmx.de>, 748@bugs.devuan.org
Message-ID: <ZAhODcFosgYlvylB@hindley.org.uk>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Disposition: inline
In-Reply-To: <167823424058.6029.9134929213701540816.reportbug@nas10.lan>
Control: tags -1 debian
Control: fixed -1 4.0.12-3~bpo11+1

Bodo,

On Wed, Mar 08, 2023 at 01:10:40AM +0100, Bodo Eggert wrote:
> Package: nfs-ganesha
> Version: 3.4-1
> Severity: grave
> Justification: renders package unusable
> 
> Dear Maintainer,
> 
> the shipped version of ganesha, version 3.4, does have a memory leak that
> causes it to consume all available RAM and more.  I have 4 GB installed, but
> yesterday ganesha did use about 6 GB and each stat() required swapping.

This is not a forked package in Devuan and we use Debian's packages directly
without recompilation. Please report this to Debian's BTS to be addressed.

If you think 4.x series will fix it, you might be interested in the stable-bpo
version 4.0.12-3~bpo11+1.

Mark

Send a report that this bug log contains spam.


Devuan BTS -- Powered by Debian bug tracking system
Copyright (C) 1999 Darren O. Benham,
1997,2003 nCipher Corporation Ltd, 1994-97 Ian Jackson,
2005-2017 Don Armstrong, and many other contributors.

Devuan Bugs Owner <owner@bugs.devuan.org>.
Last modified: Thu Dec 19 23:49:09 2024;