From owner-freebsd-net@FreeBSD.ORG Mon Aug 31 22:27:47 2009 Return-Path: Delivered-To: net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 9D95B1065670 for ; Mon, 31 Aug 2009 22:27:47 +0000 (UTC) (envelope-from bzeeb-lists@lists.zabbadoz.net) Received: from mail.cksoft.de (mail.cksoft.de [195.88.108.3]) by mx1.freebsd.org (Postfix) with ESMTP id 5B0838FC16 for ; Mon, 31 Aug 2009 22:27:47 +0000 (UTC) Received: from localhost (amavis.fra.cksoft.de [192.168.74.71]) by mail.cksoft.de (Postfix) with ESMTP id DDFB141C710; Tue, 1 Sep 2009 00:10:06 +0200 (CEST) X-Virus-Scanned: amavisd-new at cksoft.de Received: from mail.cksoft.de ([195.88.108.3]) by localhost (amavis.fra.cksoft.de [192.168.74.71]) (amavisd-new, port 10024) with ESMTP id s39HelIYH1Vi; Tue, 1 Sep 2009 00:10:06 +0200 (CEST) Received: by mail.cksoft.de (Postfix, from userid 66) id 3F7CE41C729; Tue, 1 Sep 2009 00:10:06 +0200 (CEST) Received: from maildrop.int.zabbadoz.net (maildrop.int.zabbadoz.net [10.111.66.10]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.int.zabbadoz.net (Postfix) with ESMTP id 5008A4448E6; Mon, 31 Aug 2009 22:08:37 +0000 (UTC) Date: Mon, 31 Aug 2009 22:08:37 +0000 (UTC) From: "Bjoern A. Zeeb" X-X-Sender: bz@maildrop.int.zabbadoz.net To: qingli@freebsd.org Message-ID: <20090831215129.V93661@maildrop.int.zabbadoz.net> X-OpenPGP-Key: 0x14003F198FEFA3E77207EE8D2B58B8F83CCF1842 MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed Cc: FreeBSD networkers mailing list Subject: CFR/CFT: plug mbuf leak in new arp code X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 31 Aug 2009 22:27:47 -0000 Hi, I have a patch for FreeBSD 8.x / 9-CURRENT that plugs an mbuf leak in the new arp code that needs review and further testing. Find a longer description of the problem at the beginning of the patch. There is a lot of context in the patch; if you want a shorter one, apply and re-gen it. If you want to see the current problem, log in to a remote 8/9 machine and repeatedly type ... over that connection (you need to be su): arp -ad > /dev/null ; netstat -m | head -1 Watch the first number. Warning: doing it too often will make that machine panic eventually. Here's the patch: http://people.freebsd.org/~bz/20090831-01-plug-new-arp-mbuf-leak.diff Thanks for your help in advance. /bz -- Bjoern A. Zeeb What was I talking about and who are you again?