Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!
Bug 597200 - sys-kernel/gentoo-sources-4.4.21: Memory leak regression
Summary: sys-kernel/gentoo-sources-4.4.21: Memory leak regression
Status: RESOLVED FIXED
Alias: None
Product: Gentoo Linux
Classification: Unclassified
Component: Current packages (show other bugs)
Hardware: AMD64 Linux
: High normal
Assignee: Gentoo Kernel Bug Wranglers and Kernel Maintainers
URL:
Whiteboard:
Keywords:
Depends on:
Blocks:
 
Reported: 2016-10-15 17:42 UTC by Kyle Sanderson
Modified: 2016-10-27 06:46 UTC (History)
2 users (show)

See Also:
Package list:
Runtime testing required: ---


Attachments

Note You need to log in before you can comment on or make changes to this bug.
Description Kyle Sanderson 2016-10-15 17:42:49 UTC
Booted up a new 4.4.21 kernel from my previous 4.4.6 kernel build, exact same kconfig.

Reproducible: Always

Actual Results:  
Samba stopped, then sshd stopped... Upon accessing the console line for the server and running dmesg rendered the OOM killer was killing all processes on the box...

Expected Results:  
My atom machine shouldn't have died.

Reverting to 4.4.6 didn't reproduce the issue, showing it's a bad kernel and not user-space...

Please mask 4.4.21.
Comment 1 Kyle Sanderson 2016-10-15 17:45:06 UTC
I'm lucky because I have console access to the box, this kernel is pretty dangerous to anyone loading the presumably problematic kmodule.

Attachment is https://bugs.gentoo.org/attachment.cgi?id=449778
Comment 2 urcindalo 2016-10-18 08:22:06 UTC
It seems some things are not quite right with this version.
My issue is not related to yours, but it is also solved by reverting back to 4.4.6. Like you, the .config file for 4.4.21 is exactly the same as for 4.4.6. Nothing else has changed except the gentoo-sources version:

https://bugs.gentoo.org/show_bug.cgi?id=596880
Comment 3 Tomáš Mózes 2016-10-20 07:45:08 UTC
Why did you CC amd64?
Comment 4 Kyle Sanderson 2016-10-26 22:36:22 UTC
(In reply to Tomáš Mózes from comment #3)
> Why did you CC amd64?

Because this impacts atleast amd64, and is up to amd64 to mask for that architecture? Is that not what Arches are for?

This is fixed in sys-kernel/gentoo-sources-4.4.26, clearly an issue with the release... .21 is masked for other reasons, so this is fixed.
Comment 5 Tomáš Mózes 2016-10-27 04:31:27 UTC
(In reply to Kyle Sanderson from comment #4)
> (In reply to Tomáš Mózes from comment #3)
> > Why did you CC amd64?
> 
> Because this impacts atleast amd64, and is up to amd64 to mask for that
> architecture? Is that not what Arches are for?

Mostly stabilization ;) The kernel team will take care of that, please do not CC arches.
Comment 6 Kyle Sanderson 2016-10-27 04:34:14 UTC
(In reply to Tomáš Mózes from comment #5)
> (In reply to Kyle Sanderson from comment #4)
> > (In reply to Tomáš Mózes from comment #3)
> > > Why did you CC amd64?
> > 
> > Because this impacts atleast amd64, and is up to amd64 to mask for that
> > architecture? Is that not what Arches are for?
> 
> Mostly stabilization ;) The kernel team will take care of that, please do
> not CC arches.

Right, but that's exactly what this bug is about. This buggy broken kernel was stabilised when it had serious issues. The bug was asking for a hard mask.
Comment 7 Tomáš Mózes 2016-10-27 06:46:09 UTC
(In reply to Kyle Sanderson from comment #6)
> (In reply to Tomáš Mózes from comment #5)
> > (In reply to Kyle Sanderson from comment #4)
> > > (In reply to Tomáš Mózes from comment #3)
> > > > Why did you CC amd64?
> > > 
> > > Because this impacts atleast amd64, and is up to amd64 to mask for that
> > > architecture? Is that not what Arches are for?
> > 
> > Mostly stabilization ;) The kernel team will take care of that, please do
> > not CC arches.
> 
> Right, but that's exactly what this bug is about. This buggy broken kernel
> was stabilised when it had serious issues. The bug was asking for a hard
> mask.

Ok, but that decision is made by the kernel team, that's all. Great you reported this, but it's up to the kernel team to take further steps.