Note: This bug is displayed in read-only format because the product is no longer active in Red Hat Bugzilla.
For bugs related to Red Hat Enterprise Linux 5 product line. The current stable release is 5.10. For Red Hat Enterprise Linux 6 and above, please visit Red Hat JIRA https://issues.redhat.com/secure/CreateIssue!default.jspa?pid=12332745 to report new issues.

Bug 574913

Summary: memory leak when ipv6 interface disabled in sysctl.conf
Product: Red Hat Enterprise Linux 5 Reporter: rob_thomas
Component: kernelAssignee: Thomas Graf <tgraf>
Status: CLOSED ERRATA QA Contact: Network QE <network-qe>
Severity: medium Docs Contact:
Priority: low    
Version: 5.5CC: hjia, martinez, qcai, rkhan, wwlinuxengineering
Target Milestone: rc   
Target Release: 5.6   
Hardware: All   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2011-01-13 21:19:33 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Embargoed:
Attachments:
Description Flags
patch to fix memory leak
none
proposed patch none

Description rob_thomas 2010-03-18 19:57:27 UTC
Description of problem:

memory leak occurs when IPv6 is disabled per interface via sysctl.conf

Version-Release number of selected component (if applicable):

5.4 and 5.5

How reproducible:

Always

Steps to Reproduce:
1.  Add the following parameter to /etc/sysctl.conf:

net.ipv6.conf.xxxx.disable_ipv6 = 1

where xxxx = interface, in my case bond0

2.  reboot

3.  start networking
  
Actual results:

memory leak is observed.

Expected results:

no memory leak.

Additional info:

Fixed upstream, I checked 2.6.33.

Comment 1 rob_thomas 2010-03-18 19:58:35 UTC
Created attachment 401119 [details]
patch to fix memory leak

Comment 2 Thomas Graf 2010-08-25 15:07:22 UTC
Created attachment 440963 [details]
proposed patch

Comment 4 RHEL Program Management 2010-09-07 23:19:06 UTC
This request was evaluated by Red Hat Product Management for inclusion in a Red
Hat Enterprise Linux maintenance release.  Product Management has requested
further review of this request by Red Hat Engineering, for potential
inclusion in a Red Hat Enterprise Linux Update release for currently deployed
products.  This request is not yet committed for inclusion in an Update
release.

Comment 6 Jarod Wilson 2010-09-15 14:00:57 UTC
in kernel-2.6.18-221.el5
You can download this test kernel from http://people.redhat.com/jwilson/el5

Detailed testing feedback is always welcomed.

Comment 8 Hushan Jia 2010-11-25 08:02:01 UTC
Hi Rob,
Could you test 5.6 kernels from http://people.redhat.com/jwilson/el5, to see if this problem is resolved?

Thanks.

Comment 9 rob_thomas 2010-12-01 15:14:12 UTC
I will look at it soon.

Comment 10 Chris Ward 2010-12-02 15:29:56 UTC
Reminder! There should be a fix present for this BZ in snapshot 3 -- unless otherwise noted in a previous comment.

Please test and update this BZ with test results as soon as possible.

Comment 12 rob_thomas 2011-01-05 19:17:12 UTC
Looks good.

Comment 14 errata-xmlrpc 2011-01-13 21:19:33 UTC
An advisory has been issued which should help the problem
described in this bug report. This report is therefore being
closed with a resolution of ERRATA. For more information
on therefore solution and/or where to find the updated files,
please follow the link below. You may reopen this bug report
if the solution does not work for you.

http://rhn.redhat.com/errata/RHSA-2011-0017.html