Date: Fri, 16 Jan 2009 16:50:30 -0800 From: "Jason DiCioccio" <jd@ods.org> To: vwe@freebsd.org Cc: freebsd-net@freebsd.org, freebsd-bugs@freebsd.org, bugs-followup@freebsd.org Subject: Re: kern/130059: [panic] Leaking 50k mbufs/hour Message-ID: <f372a76b0901161650r3bbbad25raf1fedfb24d68063@mail.gmail.com> In-Reply-To: <f372a76b0901021301k4a13d7aem980c3bc591bd44c4@mail.gmail.com> References: <200812311353.mBVDraLJ042040@freefall.freebsd.org> <f372a76b0812311041t35762cd2nd9b0bb7634001054@mail.gmail.com> <f372a76b0901021301k4a13d7aem980c3bc591bd44c4@mail.gmail.com>
index | next in thread | previous in thread | raw e-mail
I narrowed this bug down to the following patch to djb's ucspi-tcp (adds ipv6 functionality): http://www.fefe.de/ucspi/ I don't think that userland processes should be able to wreak that much havoc on the network stack. Another thing of note is that even if I kill the processes causing the problem, the mbufs are never reclaimed. Seems like a permanent leak. When I got rid of the ipv6 patch, the mbufs stopped building up and everything has been fine.. Note that the ipv6 traffic for this process was fairly minimal.home | help
Want to link to this message? Use this
URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?f372a76b0901161650r3bbbad25raf1fedfb24d68063>
