kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #21596
[Bug 1235649] Re: uevent spam causes libdbus client code in session upstart to consume massive amounts of memory on Ubuntu Touch
Just got a much more interesting valgrind run. Juicy excerpt:
==9366== 147,560 bytes in 1,190 blocks are still reachable in loss record 187 of 188
==9366== at 0x402B965: calloc (in /usr/lib/valgrind/vgpreload_memcheck-x86-linux.so)
==9366== by 0x408E730: dbus_malloc0 (dbus-memory.c:572)
==9366== by 0x407983B: dbus_message_new_empty_header (dbus-message.c:1153)
==9366== by 0x4079D0F: dbus_message_new_method_return (dbus-message.c:1319)
==9366== by 0x80835F5: control_emit_event_reply (com.ubuntu.Upstart.c:2098)
==9366== by 0x806BC6C: event_finished (event.c:501)
==9366== by 0x806B26F: event_poll (event.c:259)
==9366== by 0x4044B63: nih_main_loop (main.c:609)
==9366== by 0x804D507: main (main.c:688)
==9366==
==9366== 228,394,752 bytes in 2,386 blocks are still reachable in loss record 188 of 188
==9366== at 0x402BB88: realloc (in /usr/lib/valgrind/vgpreload_memcheck-x86-linux.so)
==9366== by 0x408E778: dbus_realloc (dbus-memory.c:678)
==9366== by 0x408F08C: reallocate_for_length (dbus-string.c:349)
==9366== by 0x408F12B: set_length (dbus-string.c:390)
==9366== by 0x408F1A9: open_gap (dbus-string.c:411)
==9366== by 0x408FA67: copy (dbus-string.c:1198)
==9366== by 0x408FCCE: _dbus_string_copy_len (dbus-string.c:1368)
==9366== by 0x408DCF8: marshal_len_followed_by_bytes (dbus-marshal-basic.c:726)
==9366== by 0x408DD95: marshal_string (dbus-marshal-basic.c:758)
==9366== by 0x408DF60: _dbus_marshal_write_basic (dbus-marshal-basic.c:840)
==9366== by 0x4075CD7: _dbus_type_writer_write_basic_no_typecode (dbus-marshal-recursive.c:1601)
==9366== by 0x40768BB: _dbus_type_writer_write_basic (dbus-marshal-recursive.c:2323)
==9366==
==9366== LEAK SUMMARY:
==9366== definitely lost: 28 bytes in 1 blocks
==9366== indirectly lost: 24 bytes in 1 blocks
==9366== possibly lost: 12,907 bytes in 290 blocks
==9366== still reachable: 228,607,834 bytes in 3,732 blocks
==9366== suppressed: 0 bytes in 0 blocks
** Attachment added: "vg.log"
https://bugs.launchpad.net/ubuntu/+source/unity/+bug/1235649/+attachment/3877842/+files/vg.log
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1235649
Title:
uevent spam causes libdbus client code in session upstart to consume
massive amounts of memory on Ubuntu Touch
Status in Upstart:
New
Status in “linux” package in Ubuntu:
Invalid
Status in “systemd” package in Ubuntu:
New
Status in “unity” package in Ubuntu:
New
Status in “upstart” package in Ubuntu:
Fix Released
Status in “linux” source package in Saucy:
Invalid
Status in “systemd” source package in Saucy:
New
Status in “unity” source package in Saucy:
New
Status in “upstart” source package in Saucy:
Fix Released
Bug description:
using ubuntu touch image 82 i see the session init consume about 10MB per minute as long as the screen is on with Mir.
running the same session with surfaceflinger only consumes 1MB per minute.
in both cases the system starts to swap heavily at some point, making
the UI unresponsive.
http://paste.ubuntu.com/6196223/ has the top output of a Mir session
after 30min, the UI just got completely unresponsive when this
snapshot was taken.
http://paste.ubuntu.com/6196332/ is the top output of a surfaceflinger
session where the screen was off for about 10min
apparently the leak only occurs while the screen is on, it seems to be
permanently there but in the case of surfaceflinger it hits less hard.
To manage notifications about this bug go to:
https://bugs.launchpad.net/upstart/+bug/1235649/+subscriptions