Bug 156354 - x86 bits leaks memory
x86 bits leaks memory
Status: CLOSED WORKSFORME
Product: Red Hat Enterprise Linux 3
Classification: Red Hat
Component: kernel (Show other bugs)
3.0
ia64 Linux
medium Severity high
: ---
: ---
Assigned To: Geoff Gustafson
Brian Brock
:
Depends On:
Blocks:
  Show dependency treegraph
 
Reported: 2005-04-29 06:11 EDT by Ramakrishnan T M
Modified: 2007-11-30 17:07 EST (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2005-09-12 15:24:46 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Ramakrishnan T M 2005-04-29 06:11:08 EDT
From Bugzilla Helper:
User-Agent: Mozilla/5.0 (Windows; U; Windows NT 5.1; en-US; rv:1.7.6) Gecko/20050317 Firefox/1.0.2

Description of problem:
When applications compiled on x86 are run on an IA64 machine with 2.4 kernel the application experiences memory growth and crashes. The same binaries works fine on an x86 machine with AS 3.0 (2.4 kernel) installed. The application uses api's like gethostbyname, communicates using sockets. etc.

Version-Release number of selected component (if applicable):


How reproducible:
Always

Steps to Reproduce:
1.Create an application as per description
2.Compile and create binaries on x86 machine
3.Run the same binaries on ia64 machine
  

Actual Results:  The application showed memory growth over a period of 4hours and crached. Memory levels reached 1 GB in some cases.

Expected Results:  The applications should have run without problem. The typical memory consumption is about 60 MB on x86 machine.

Additional info:
Comment 1 Ernie Petrides 2005-04-29 15:00:22 EDT
Please provide the source code to a simple reproducer program.  Thanks.
Comment 2 Ernie Petrides 2005-09-12 15:24:46 EDT
Closing due to lack of response.

Note You need to log in before you can comment on or make changes to this bug.