-
Notifications
You must be signed in to change notification settings - Fork 24.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Memory leak due to DocumentSubsetBitsetCache.keysByIndex #49261
Comments
Pinging @elastic/es-security (:Security/Authorization) |
So that the tests can also run in a FIPS 140 JVM, where using a JKS keystore is not allowed. Resolves: elastic#49261
So that the tests can also run in a FIPS 140 JVM, where using a JKS keystore is not allowed. Resolves: #49261 * resolve name collision
So that the tests can also run in a FIPS 140 JVM, where using a JKS keystore is not allowed. Resolves: elastic#49261 * resolve name collision
@jkakavas Did you close the wrong issue? |
Yeap, wrong resolves link :/ |
Hi @jpountz! If I understand you correctly we can try using a |
Yes this is the idea. The tricky part is to make sure there are no race conditions in case a query is removed from the cache and shortly added back afterwards. |
@jpountz, I'm not a concurrency expert but should we make adding to the cache and adding to the hashmap a single atomic operation? Aren't they atomic now? |
@olegbonar Have you made any progress on this? I'd like to fix this bug in the next couple of weeks, but I'm happy to leave it for you if you've got something underway. |
@tvernum, I haven't. Please take it. |
While reviewing
DocumentSubsetBitsetCache
, I noticed that it might leak memory since size-based evictions don't trigger evictions inDocumentSubsetBitsetCache.keysByIndex
. SokeysByIndex
might keep holding a reference to cache keys long after they have been removed from the cache.The text was updated successfully, but these errors were encountered: