[Bug 1935051] [NEW] systemd pid 1 memory leak

2021-07-08 Thread Sergey Borodavkin
Public bug reported: Hi everybody. We've meet a memory leak of pid1 process on the focal release. When we launch chef-client, several systemd .service and .timers are checked for state. Every time of this run pid1 increase VSZ/RSS on ~ 232 Kb, this don't happen on xenial and bionic releases. I

[Bug 1935051] Re: systemd pid 1 memory leak

2021-07-08 Thread Sergey Borodavkin
** Attachment added: "pmap_pid1_focal" https://bugs.launchpad.net/ubuntu/+source/systemd/+bug/1935051/+attachment/5509911/+files/pmap_pid1_focal ** Description changed: Hi everybody. We've meet a memory leak of pid1 process on the focal release. When we launch chef-client, several sy

[Bug 1975501] [NEW] bfq_deactivate_entity: NULL pointer dereference

2022-05-23 Thread Sergey Borodavkin
Public bug reported: Hello. We meet a kernel panic with next trace: bfq_insert+0x5c/0x70 [bfq] __bfq_deactivate_entity+0xe7/0x1b0 [bfq] bfq_deactivate_entity+0x5d/0xd0 [bfq] bfq_del_bfqq_busy+0xac/0x150 [bfq] __bfq_bfqq_expire+0x64/0xd0 [bfq] bfq_bfqq_expire+0x331/0x930 [bfq] ? try_to_wake_up+0x2

[Bug 1935051] Re: systemd pid 1 memory leak

2021-08-20 Thread Sergey Borodavkin
Thanks for answering! Yep, that build fixed leak for me. # apt-cache policy systemd systemd: Installed: 245.4-4ubuntu3.12~202108090622~ubuntu20.04.1 This build will be used for official systemd-245.4-4ubuntu3.12 package ? -- You received this bug notification because you are a member of Ubunt

[Bug 1935051] Re: systemd pid 1 memory leak

2021-09-06 Thread Sergey Borodavkin
Yep, i checked on friday and no memory leak since then. Version of package and source repository: # apt-cache policy systemd systemd: Installed: 245.4-4ubuntu3.12 Candidate: 245.4-4ubuntu3.12 Version table: *** 245.4-4ubuntu3.12 500 500 http://archive.ubuntu.com/ubuntu focal-propos

[Bug 1935051] Re: systemd pid 1 memory leak

2021-09-08 Thread Sergey Borodavkin
@brian-murray Hi. Tested that build, all seems fine, still no memory leak. # apt-cache policy systemd systemd: Installed: 245.4-4ubuntu3.13 Candidate: 245.4-4ubuntu3.13 Version table: *** 245.4-4ubuntu3.13 500 500 http://archive.ubuntu.com/ubuntu focal-proposed/main amd64 Packages

[Bug 1952193] Re: NULL pointer dereference at _mod_memcg_state+0x14/0xb0

2021-11-24 Thread Sergey Borodavkin
Link to crash dump https://drive.google.com/file/d/14FRxK0RKi7HFRYdkQRhyImnS7ZfNuVla/view -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1952193 Title: NULL pointer dereference at _mod_memcg_state+0x

[Bug 1952193] [NEW] NULL pointer dereference at _mod_memcg_state+0x14/0xb0

2021-11-24 Thread Sergey Borodavkin
Public bug reported: Hello. We meet a randomly host kernel panics with same RIP and "BUG: kernel NULL pointer dereference". At current time affected kernel versions was from 5.4.0-53 to 5.4.0-84. For now i have a dmesg log and crash file, but no clue where what to do next. -

[Bug 1952193] Re: NULL pointer dereference at _mod_memcg_state+0x14/0xb0

2022-01-10 Thread Sergey Borodavkin
** Description changed: Hello. We meet a randomly host kernel panics with same RIP and "BUG: kernel NULL pointer dereference". - At current time affected kernel versions was from 5.4.0-53 to 5.4.0-84. + At current time affected kernel versions was from 5.4.0-53 to 5.4.0-87. For now i hav

[Bug 1935051] Re: systemd pid 1 memory leak

2021-08-18 Thread Sergey Borodavkin
Just checked again, bug still exist for latest systemd package on focal. # apt-cache policy systemd systemd: Installed: 245.4-4ubuntu3.11 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1935051 Title

[Bug 1949247] Re: kernel: BUG: unable to handle page fault for address (5.4.0-89)

2022-04-07 Thread Sergey Borodavkin
Met same problem with kernel version 5.4.0-81 I have kdump file for that bug, can attach that file if necessary. # lsb_release -rd Description:Ubuntu 18.04.6 LTS Release:18.04 dmesg log BUG: unable to handle page fault for address: 003e3898 #PF: supervisor write access in k