← Back to team overview

kernel-packages team mailing list archive

[Bug 1235649] Re: uevent spam causes libdbus client code in session upstart to consume massive amounts of memory on Ubuntu Touch

 

Just got a much more interesting valgrind run. Juicy excerpt:

==9366== 147,560 bytes in 1,190 blocks are still reachable in loss record 187 of 188
==9366==    at 0x402B965: calloc (in /usr/lib/valgrind/vgpreload_memcheck-x86-linux.so)
==9366==    by 0x408E730: dbus_malloc0 (dbus-memory.c:572)
==9366==    by 0x407983B: dbus_message_new_empty_header (dbus-message.c:1153)
==9366==    by 0x4079D0F: dbus_message_new_method_return (dbus-message.c:1319)
==9366==    by 0x80835F5: control_emit_event_reply (com.ubuntu.Upstart.c:2098)
==9366==    by 0x806BC6C: event_finished (event.c:501)
==9366==    by 0x806B26F: event_poll (event.c:259)
==9366==    by 0x4044B63: nih_main_loop (main.c:609)
==9366==    by 0x804D507: main (main.c:688)
==9366==
==9366== 228,394,752 bytes in 2,386 blocks are still reachable in loss record 188 of 188
==9366==    at 0x402BB88: realloc (in /usr/lib/valgrind/vgpreload_memcheck-x86-linux.so)
==9366==    by 0x408E778: dbus_realloc (dbus-memory.c:678)
==9366==    by 0x408F08C: reallocate_for_length (dbus-string.c:349)
==9366==    by 0x408F12B: set_length (dbus-string.c:390)
==9366==    by 0x408F1A9: open_gap (dbus-string.c:411)
==9366==    by 0x408FA67: copy (dbus-string.c:1198)
==9366==    by 0x408FCCE: _dbus_string_copy_len (dbus-string.c:1368)
==9366==    by 0x408DCF8: marshal_len_followed_by_bytes (dbus-marshal-basic.c:726)
==9366==    by 0x408DD95: marshal_string (dbus-marshal-basic.c:758)
==9366==    by 0x408DF60: _dbus_marshal_write_basic (dbus-marshal-basic.c:840)
==9366==    by 0x4075CD7: _dbus_type_writer_write_basic_no_typecode (dbus-marshal-recursive.c:1601)
==9366==    by 0x40768BB: _dbus_type_writer_write_basic (dbus-marshal-recursive.c:2323)
==9366==
==9366== LEAK SUMMARY:
==9366==    definitely lost: 28 bytes in 1 blocks
==9366==    indirectly lost: 24 bytes in 1 blocks
==9366==      possibly lost: 12,907 bytes in 290 blocks
==9366==    still reachable: 228,607,834 bytes in 3,732 blocks
==9366==         suppressed: 0 bytes in 0 blocks


** Attachment added: "vg.log"
   https://bugs.launchpad.net/ubuntu/+source/unity/+bug/1235649/+attachment/3877842/+files/vg.log

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1235649

Title:
  uevent spam causes libdbus client code in session upstart to consume
  massive amounts of memory on Ubuntu Touch

Status in Upstart:
  New
Status in “linux” package in Ubuntu:
  Invalid
Status in “systemd” package in Ubuntu:
  New
Status in “unity” package in Ubuntu:
  New
Status in “upstart” package in Ubuntu:
  Fix Released
Status in “linux” source package in Saucy:
  Invalid
Status in “systemd” source package in Saucy:
  New
Status in “unity” source package in Saucy:
  New
Status in “upstart” source package in Saucy:
  Fix Released

Bug description:
  using ubuntu touch image 82 i see the session init consume about 10MB per minute as long as the screen is on  with Mir.
  running the same session with surfaceflinger only consumes 1MB per minute.

  in both cases the system starts to swap heavily at some point, making
  the UI unresponsive.

  http://paste.ubuntu.com/6196223/ has the top output of a Mir session
  after 30min, the UI just got completely unresponsive when this
  snapshot was taken.

  http://paste.ubuntu.com/6196332/ is the top output of a surfaceflinger
  session where the screen was off for about 10min

  apparently the leak only occurs while the screen is on, it seems to be
  permanently there but in the case of surfaceflinger it hits less hard.

To manage notifications about this bug go to:
https://bugs.launchpad.net/upstart/+bug/1235649/+subscriptions