Date: Sat, 22 Jul 2017 12:11:31 +0300 From: "Andrey V. Elsukov" <bu7cher@yandex.ru> To: Daniel Bilik <ddb@neosystem.org>, freebsd-net@freebsd.org Subject: Re: mbuf clusters leak in netinet6 Message-ID: <5dadd0d0-d5ce-3a2c-7ad6-1c0a39a4a0e7@yandex.ru> In-Reply-To: <20170721232112.82f6e78b76057312183be937@neosystem.cz> References: <20170721232112.82f6e78b76057312183be937@neosystem.cz>
next in thread | previous in thread | raw e-mail | index | archive | help
22.07.17 0:21, Daniel Bilik пишет: > Hi. > > (Please keep me in cc, I'm not subscribed to the list.) > > After deploying ndproxy[1] on a few 10-stable hosts, some of them have > experienced mbuf clusters exhaustion. Initial analysis showed that after > loading ndproxy.ko, "current" values of "mbuf clusters" and "mbuf+clusters > out of packet secondary zone" (from netstat -m output) keep continuously > increasing and never decrease. More thorough inspection of ndproxy source > code pointed me at function packet() in ndpacket.c[2], to the very last > "return 1". With this line changed to "return 0", mbuf clusters do not > increase anymore, ie. it fixes the issue. As the leak does not come from > "return" itself, I suspect "the proper solution" is to modify code in > the upper layer to not leak anything on any returned value. If I read it > right, the upper layer in this case is function ip6_input() in > sys/netinet6/ip6_input.c[3], specifically pfil_run_hooks() call at line > 765. I guess it should be changed like this to avoid the leak: > > --- ip6_input.c.orig 2017-07-21 22:42:17.780594000 +0200 > +++ ip6_input.c 2017-07-21 22:45:28.981497000 +0200 > @@ -620,8 +620,11 @@ > goto passin; > > if (pfil_run_hooks(&V_inet6_pfil_hook, &m, > - m->m_pkthdr.rcvif, PFIL_IN, NULL)) > + m->m_pkthdr.rcvif, PFIL_IN, NULL)) { > + if (m) > + m_free(m); > return; > + } > if (m == NULL) /* consumed by filter */ > return; > ip6 = mtod(m, struct ip6_hdr *); > > I haven't actually tested this modification. I prefer to know your > opinions first before trying to panic production hosts running hundreds of > miles from me. ;-) Thanks. Freeing mbuf is under pfil hook responsibility, if it returns nonzero value it must call m_freem(). So, it is bug in the ndpacket.c. https://github.com/AlexandreFenyo/ndproxy/blob/master/ndpacket.c Also, ip6_output() always consumes mbuf, it is wrong to call m_freem() after calling ip6_output(), even when it returns error. -- WBR, Andrey V. Elsukov
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?5dadd0d0-d5ce-3a2c-7ad6-1c0a39a4a0e7>