PROBLEM: The FILE* associated with the pidfile was leaked if pmap_registry_search on the brickinfo' path failed. FIX: Eliminates the use of the FILE* that was leaked. Uses glusterd_is_service_running utility function in place of the earlier attempt to check for the same. Change-Id: I94082bd5a94b8a6340f8cc11726d3264e364efe6 BUG: 916549 Signed-off-by: Krishnan Parthasarathi <kparthas@redhat.com> Reviewed-on: http://review.gluster.org/4596 Tested-by: Gluster Build System <jenkins@build.gluster.com> Reviewed-by: Jeff Darcy <jdarcy@redhat.com> Reviewed-by: Anand Avati <avati@redhat.com>
20 lines
363 B
Bash
Executable File
20 lines
363 B
Bash
Executable File
#!/bin/bash
|
|
|
|
. $(dirname $0)/../include.rc
|
|
|
|
cleanup;
|
|
|
|
TEST glusterd;
|
|
TEST $CLI volume create $V0 $H0:$B0/${V0}1;
|
|
TEST $CLI volume start $V0;
|
|
|
|
pid_file=$(ls /var/lib/glusterd/vols/$V0/run);
|
|
brick_pid=$(cat /var/lib/glusterd/vols/$V0/run/$pid_file);
|
|
|
|
|
|
kill -SIGKILL $brick_pid;
|
|
TEST $CLI volume start $V0 force;
|
|
TEST process_leak_count $(pidof glusterd);
|
|
|
|
cleanup;
|