Date: Wed, 13 Dec 2000 14:53:41 -0800 From: Alfred Perlstein <bright@wintelcom.net> To: Matt Dillon <dillon@earth.backplane.com> Cc: Kirk McKusick <mckusick@mckusick.com>, arch@FreeBSD.ORG, net@FreeBSD.ORG Subject: Re: patch to cleanup inflight desciptor handling. Message-ID: <20001213145341.S16205@fw.wintelcom.net> In-Reply-To: <20001213141917.Q16205@fw.wintelcom.net>; from bright@wintelcom.net on Wed, Dec 13, 2000 at 02:19:18PM -0800 References: <200012131852.KAA17423@beastie.mckusick.com> <200012132106.eBDL6Sg86570@earth.backplane.com> <20001213141917.Q16205@fw.wintelcom.net>
next in thread | previous in thread | raw e-mail | index | archive | help
* Alfred Perlstein <bright@wintelcom.net> [001213 14:20] wrote:
> * Matt Dillon <dillon@earth.backplane.com> [001213 13:07] wrote:
> > :I believe that your changes have been sorely needed for many
> > :years. While I would like to see regular mbufs given a callback
> > :mechanism, your present approach of using an mbuf cluster
> > :solves 90% of the problem.
> > :
> > : Kirk McKusick
> >
> > ... Aflred, be careful that you don't break things we only just fixed
> > last year. The descriptor passing code has been broken for many years.
> >
> > I think the reason we have to scan the descriptor list is related to
> > locating isolated self-referential 'loops' with descriptor passing and
> > unix domain sockets and closing them. e.g. when you pass a descriptor
> > for a unix-domain socket through a unix-domain socket, it is possible
> > for the socket descriptors to reference each other and thus never have
> > their ref count drop to 0 even when all associated processes have
> > close()'d. This happens all the time. Be sure you don't break the
> > fix that solves that particular problem.
>
> Ok, I'll see if that can happen. Basically since the reference
> never goes to zero on the socket, the buffers are never forced to
> be flushed/cleared and the mbuf will then never be free'd resulting
> it it leaking itself. Basically a socket hanging there with an
> mbuf referencing itself.
>
> I wonder if Linux fixed/has this problem.
Ok, my patch has this problem:
void
parent(int con)
{
int fd;
fd = open("/tmp/wank", O_RDONLY);
send_fd_withdata(con, con, "wank", 4);
sleep (5);
exit(1);
}
void
child(int con)
{
int fd, error;
char buf[100];
sleep(5);
get_fd_withdata(con, &fd, buf, sizeof(buf));
send_fd_withdata(con, fd, "foo", 3);
exit(1);
buf[4] = '\0';
printf("%s\n", buf);
if ((error = read(fd, buf, sizeof(buf))) < 0)
perror("read");
buf[sizeof(buf)-1] = '\0';
printf("%s\n", buf);
}
This causes a leak, I think the trick is to just always call sorflush()
when the pcb is free'd.
Looking at linux they still are using gc. I'll give this a lot
more thought before resubmitting this idea.
sorry,
--
-Alfred Perlstein - [bright@wintelcom.net|alfred@freebsd.org]
"I have the heart of a child; I keep it in a jar on my desk."
To Unsubscribe: send mail to majordomo@FreeBSD.org
with "unsubscribe freebsd-arch" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20001213145341.S16205>
