Return-Path: Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S269755AbUJWBuL (ORCPT ); Fri, 22 Oct 2004 21:50:11 -0400 Received: (majordomo@vger.kernel.org) by vger.kernel.org id S269841AbUJWBsB (ORCPT ); Fri, 22 Oct 2004 21:48:01 -0400 Received: from quechua.inka.de ([193.197.184.2]:5299 "EHLO mail.inka.de") by vger.kernel.org with ESMTP id S269805AbUJWBov (ORCPT ); Fri, 22 Oct 2004 21:44:51 -0400 From: Bernd Eckenfels To: linux-kernel@vger.kernel.org Subject: Re: Gigantic memory leak in linux-2.6.[789]! Organization: Deban GNU/Linux Homesite In-Reply-To: <200410221613.35913.ks@cs.aau.dk> X-Newsgroups: ka.lists.linux.kernel User-Agent: tin/1.7.6-20040906 ("Baleshare") (UNIX) (Linux/2.6.8.1 (i686)) Message-Id: Date: Sat, 23 Oct 2004 03:44:49 +0200 Sender: linux-kernel-owner@vger.kernel.org X-Mailing-List: linux-kernel@vger.kernel.org Content-Length: 909 Lines: 23 In article <200410221613.35913.ks@cs.aau.dk> you wrote: > When the loop has completed, the system use 124 MB memory more _each_ time.... > so it is pretty easy to make a denial-of-service attack :-( for starters i recommend to look at "free" and only at the marked number: total used free shared buffers cached Mem: 126368 108432 17936 0 6532 42104 -/+ buffers/cache: 59796* 66572* Swap: 262128 43400 218728 or at the swap numbers if you have low memory (like i do). Gruss Bernd -- eckes privat - http://www.eckes.org/ Project Freefire - http://www.freefire.org/ - To unsubscribe from this list: send the line "unsubscribe linux-kernel" in the body of a message to majordomo@vger.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html Please read the FAQ at http://www.tux.org/lkml/