From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from nm.newmedia-net.de ([217.113.179.122]:42277 "EHLO webmail.newmedia-net.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1752364AbcGSQvR (ORCPT ); Tue, 19 Jul 2016 12:51:17 -0400 To: Jens Rottmann References: <83d21ffc-eeb8-40f8-7443-8d8291cd5973@ADLINKtech.com> <20160716144740.GA29708@bbox> <1361ec8d-b7ed-8cff-7c00-32d0afd729ac@ADLINKtech.com> Cc: Sasha Levin , stable@vger.kernel.org From: Sebastian Gottschall Message-ID: Date: Tue, 19 Jul 2016 18:51:12 +0200 MIME-Version: 1.0 In-Reply-To: <1361ec8d-b7ed-8cff-7c00-32d0afd729ac@ADLINKtech.com> Content-Type: text/plain; charset=windows-1252; format=flowed Content-Transfer-Encoding: 8bit Subject: Re: 3.18.37 broken / memory leak Sender: stable-owner@vger.kernel.org List-ID: Am 19.07.2016 um 16:22 schrieb Jens Rottmann: > On 07/18/2016 14:21, Sebastian Gottschall wrote: >> the kernel contains a big memory leak likelly within the >> network stack. each tcp packet consumes memory. on a >> embedded system a small scp transfer causes a oom after >> seconds. and reboots the system since init was killed. > Sounds like you might have hit the same leak in 3.18.37 that Steven > Rostedt and others found in 4.1.28? > > http://article.gmane.org/gmane.linux.kernel.stable/184384 yes an the solution fixed it. i validated it Sebastian > > Cheers, > Jens > -- Mit freundlichen Gr�ssen / Regards Sebastian Gottschall / CTO NewMedia-NET GmbH - DD-WRT Firmensitz: Berliner Ring 101, 64625 Bensheim Registergericht: Amtsgericht Darmstadt, HRB 25473 Gesch�ftsf�hrer: Peter Steinh�user, Christian Scheele http://www.dd-wrt.com email: s.gottschall@dd-wrt.com Tel.: +496251-582650 / Fax: +496251-5826565