Date: Mon, 13 Sep 1999 13:17:56 -0700 (PDT) From: Matthew Dillon <dillon@apollo.backplane.com> To: Garrett Wollman <wollman@khavrinen.lcs.mit.edu> Cc: Bosko Milekic <bmilekic@dsuper.net>, Stas Kisel <stas@sonet.crimea.ua>, avalon@coombs.anu.edu.au, freebsd-hackers@FreeBSD.ORG, freebsd-security@FreeBSD.ORG Subject: Re: mbuf shortage situations (followup) Message-ID: <199909132017.NAA25509@apollo.backplane.com> References: <199909091447.SAA24055@sonet.crimea.ua> <Pine.OSF.4.05.9909122304470.18795-300000@oracle.dsuper.net> <199909131840.OAA31048@khavrinen.lcs.mit.edu>
next in thread | previous in thread | raw e-mail | index | archive | help
:In 4.3, the code was able to deal with cluster allocation failing. We :have a somewhat different situation now, because many network :interface devices have less-flexible DMA mechanisms which don't allow :packet reception into non-contiguous buffers, so we need to have at :least a certain number of clusters available for this purpose. : :-GAWollman : :-- :Garrett A. Wollman | O Siem / We are all family / O Siem / We're all the same This is an interrupt level mechanism. The mbuf code is *already* allowed to (and does) return NULL in this case so I don't think it applies to the problem under discussion. The case that is causing the panics is with the non-interrupt mbuf allocation mechanism. Specifically, the case where M_WAIT is used. The second problem under discussion, which really ought to be separated out from the mbuf panic problem, is the potential for a deadlock or denial of service attack when the system is attacked in a manner that eats all available mbufs. :wollman@lcs.mit.edu | O Siem / The fires of freedom :Opinions not those of| Dance in the burning flame -Matt Matthew Dillon <dillon@backplane.com> To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?199909132017.NAA25509>