http://lkml.org/lkml/2010/11/23/395 Reported by Vegard Nossum: "I found this program lying around on my laptop. It kills my box (2.6.35) instantly by consuming a lot of memory (allocated by the kernel, so the process doesn't get killed by the OOM killer). As far as I can tell, the memory isn't being freed when the program exits either. Maybe it will eventually get cleaned up the UNIX socket garbage collector thing, but in that case it doesn't get called quickly enough to save my machine at least." Reproducer: http://lkml.org/lkml/2010/11/23/395 Partial fix: http://lkml.org/lkml/2010/11/23/450 Remaining fix: http://marc.info/?l=linux-netdev&m=129059035929046&w=2 From Eric Dumazet: "we can eat all LOWMEM memory before unix_gc() being called from unix_release_sock(). Moreover, the thread blocked in unix_gc() can consume huge amount of time to perform cleanup because of huge working set. One way to handle this is to have a sensible limit on unix_tot_inflight, tested from wait_for_unix_gc() and to force a call to unix_gc() if this limit is hit. This solves the OOM and also reduce overall latencies, and should not slowdown normal workloads." Acknowledgements: Red Hat would like to thank Vegard Nossum for reporting this issue.
Upstream commit: http://git.kernel.org/?p=linux/kernel/git/davem/net-2.6.git;a=commit;h=9915672d41273f5b77f1b3c29b391ffb7732b84b
And http://thread.gmane.org/gmane.linux.network/179049/focus=179051 http://www.spinics.net/lists/netdev/msg147946.html
Note that9915672d41273f5b77f1b3c29b391ffb7732b84b is only part of the solution. We also need bba14de98753cb6599a2dae0e520714b2153522d from net-next.
This issue has been addressed in following products: Red Hat Enterprise Linux 6 Via RHSA-2011:0007 https://rhn.redhat.com/errata/RHSA-2011-0007.html
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Via RHSA-2011:0162 https://rhn.redhat.com/errata/RHSA-2011-0162.html
This issue has been addressed in following products: Red Hat Enterprise Linux 5 Via RHSA-2011:0303 https://rhn.redhat.com/errata/RHSA-2011-0303.html
This issue has been addressed in following products: MRG for RHEL-5 Via RHSA-2011:0330 https://rhn.redhat.com/errata/RHSA-2011-0330.html
Upstream commits: CVE-2010-4249.01 9915672d41273f5b77f1b3c29b391ffb7732b84b CVE-2010-4249.02 bba14de98753cb6599a2dae0e520714b2153522d CVE-2010-4249.03 25888e30319f8896fc656fc68643e6a078263060