From mboxrd@z Thu Jan 1 00:00:00 1970 From: Leszek Urbanski Subject: Re: Huge memory leak in virtio, see kvm-Bugs-2989366 Date: Wed, 21 Apr 2010 15:29:37 +0200 Message-ID: <20100421132937.GA22350@moo.pl> References: <20100420222956.GA13218@moo.pl> <20100421015803.GV24351@us.ibm.com> <4BCE9654.2030604@msgid.tls.msk.ru> Mime-Version: 1.0 Content-Type: text/plain; charset=iso-8859-2 Cc: Ryan Harper , kvm@vger.kernel.org To: Michael Tokarev Return-path: Received: from moo.pl ([217.149.240.132]:33132 "EHLO moo.pl" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1753185Ab0DUN3l (ORCPT ); Wed, 21 Apr 2010 09:29:41 -0400 Content-Disposition: inline In-Reply-To: <4BCE9654.2030604@msgid.tls.msk.ru> Sender: kvm-owner@vger.kernel.org List-ID: <4BCE9654.2030604@msgid.tls.msk.ru>; from Michael Tokarev on Wed, Apr 21, 2010 at 10:08:20 +0400 > > There are only a few guests which are affected. So far it is not > really clear what differs them from others: a reinstall of a new > guest with the same components and doing same functions will not > necessary show the leak. I checked further and I can reproduce it on every guest with a simple: while true ; do dd if=/dev/urandom of=file bs=10M count=200 ; cat file > /dev/null ; done It will leak slowly. -- Leszek "Tygrys" Urbanski, SCSA, SCNA "Unix-to-Unix Copy Program;" said PDP-1. "You will never find a more wretched hive of bugs and flamers. We must be cautious." -- DECWARS http://cygnus.moo.pl/ -- Cygnus High Altitude Balloon