-
Notifications
You must be signed in to change notification settings - Fork 153
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Bug] server memory leak with netty #1355
Comments
PTAL @leixm |
rickyma
added a commit
to rickyma/incubator-uniffle
that referenced
this issue
Jan 15, 2024
rickyma
added a commit
to rickyma/incubator-uniffle
that referenced
this issue
Jan 15, 2024
rickyma
added a commit
to rickyma/incubator-uniffle
that referenced
this issue
Jan 16, 2024
rickyma
added a commit
to rickyma/incubator-uniffle
that referenced
this issue
Jan 16, 2024
rickyma
added a commit
to rickyma/incubator-uniffle
that referenced
this issue
Jan 16, 2024
rickyma
added a commit
to rickyma/incubator-uniffle
that referenced
this issue
Jan 16, 2024
rickyma
added a commit
to rickyma/incubator-uniffle
that referenced
this issue
Jan 16, 2024
rickyma
added a commit
to rickyma/incubator-uniffle
that referenced
this issue
Jan 16, 2024
jerqi
pushed a commit
that referenced
this issue
Jan 19, 2024
…1455) ### What changes were proposed in this pull request? The current code logic is that the `ByteBuf` is only released when `msg.body() == null`. However, when `msg.body != null`, `msg.body().byteBuf()` returns a `NettyManagedBuffer.EMPTY_BUFFER`, and the `ByteBuf` is not released in this case, resulting in a memory leak issue every time decoding an RPC response from ShuffleServer. Over time, if the Spark Job runs long enough and there are enough requests, it will eventually cause a significant memory leak on the client side (Spark Executor). The modifications to the other code are mainly for readability and enhanced protection, and will not cause any side effects. ### Why are the changes needed? To fix the memory leak issue in the Netty client when decoding RPC responses. For [#1359](#1359) ### Does this PR introduce _any_ user-facing change? No. ### How was this patch tested? Rerun successfully and no more Netty leak logs.
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Code of Conduct
Search before asking
Describe the bug
Affects Version(s)
master
Uniffle Server Log Output
No response
Uniffle Engine Log Output
No response
Uniffle Server Configurations
Uniffle Engine Configurations
spark.rss.client.type GRPC_NETTY
Additional context
No response
Are you willing to submit PR?
The text was updated successfully, but these errors were encountered: