xfs
[Top] [All Lists]

[Bug 209] New: Kernel 2.4.20-xfs memory leaks

To: xfs-master@xxxxxxxxxxx
Subject: [Bug 209] New: Kernel 2.4.20-xfs memory leaks
From: bugzilla-daemon@xxxxxxxxxxx
Date: Sun, 12 Jan 2003 20:24:59 -0800
Sender: linux-xfs-bounce@xxxxxxxxxxx
http://oss.sgi.com/bugzilla/show_bug.cgi?id=209

           Summary: Kernel 2.4.20-xfs memory leaks
           Product: Linux XFS
           Version: 1.2.x
          Platform: IA32
        OS/Version: Linux
            Status: NEW
          Severity: blocker
          Priority: High
         Component: XFS kernel code
        AssignedTo: xfs-master@xxxxxxxxxxx
        ReportedBy: crypope@xxxxxxx


If this is a userspace bug, what version of the package are you using:

What kernel are you using: 2.4.20-xfs

Where did the XFS code come from?  (CVS, Linus, your distribution, etc):

CVS from cvs@xxxxxxxxxxx

Description of Problem:

I have memory leaks even if I but in single user mode...



How Reproducible: I can send the kernel configuration and I will perform and 
give the results for any requested debugging task. 

I can give ftp access to the 2.4.20-xfs sources if this can help... 
I've also used Netfilter with Patch-O-Matic to compile IPTABLES some fetures 
built-into the kernel or as modules. 

Because is my first time when I use Bugzilla to report a bug I need help to do 
it right. I am a systems administrator and not a developer.

Steps to Reproduce:
1. 
2. 
3. 

Actual Results:


Expected Results:


Additional Information:


If this is a userspace bug, what version of the package are you using:

What kernel are you using:

Where did the XFS code come from?  (CVS, Linus, your distribution, etc):

Description of Problem:



How Reproducible:


Steps to Reproduce:
1. 
2. 
3. 

Actual Results:


Expected Results:


Additional Information:



------- You are receiving this mail because: -------
You are the assignee for the bug, or are watching the assignee.


<Prev in Thread] Current Thread [Next in Thread>
  • [Bug 209] New: Kernel 2.4.20-xfs memory leaks, bugzilla-daemon <=