From a6fe9a861fecb04bc6dc9d99bfa84327750c8907 Mon Sep 17 00:00:00 2001 From: kailixu Date: Tue, 16 Apr 2024 08:34:41 +0800 Subject: [PATCH] sdb release for dnode --- source/dnode/mnode/impl/src/mndDnode.c | 3 ++- 1 file changed, 2 insertions(+), 1 deletion(-) diff --git a/source/dnode/mnode/impl/src/mndDnode.c b/source/dnode/mnode/impl/src/mndDnode.c index 33a54b13c7..3bf975a5ee 100644 --- a/source/dnode/mnode/impl/src/mndDnode.c +++ b/source/dnode/mnode/impl/src/mndDnode.c @@ -1523,7 +1523,7 @@ static int32_t mndProcessCreateEncryptKeyReqImpl(SRpcMsg *pReq, int32_t dnodeId, if (klen > ENCRYPT_KEY_LEN || klen < ENCRYPT_KEY_LEN_MIN) { code = TSDB_CODE_DNODE_INVALID_ENCRYPT_KLEN; mGError("msg:%p, failed to create encrypt_key since invalid key length:%d, valid range:[%d, %d]", pReq, klen, - ENCRYPT_KEY_LEN_MIN, ENCRYPT_KEY_LEN); // ENCRYPT_TODO: range[min, max] + ENCRYPT_KEY_LEN_MIN, ENCRYPT_KEY_LEN); goto _exit; } @@ -1552,6 +1552,7 @@ static int32_t mndProcessCreateEncryptKeyReqImpl(SRpcMsg *pReq, int32_t dnodeId, if (pDnode->offlineReason != DND_REASON_ONLINE) { mGWarn("msg:%p, don't send create encrypt_key req since dnode:%d in offline state:%s", pReq, pDnode->id, offlineReason[pDnode->offlineReason]); + sdbRelease(pSdb, pDnode); continue; }