Page MenuHomeFreeBSD

Fix a memory leak when ip_output_send() returns EAGAIN due to send tag issues
ClosedPublic

Authored by gallatin on Jan 26 2022, 9:19 PM.
Tags
None
Referenced Files
Unknown Object (File)
Sun, Dec 7, 5:27 AM
Unknown Object (File)
Sun, Nov 23, 3:18 PM
Unknown Object (File)
Thu, Nov 20, 5:39 PM
Unknown Object (File)
Wed, Nov 19, 10:19 PM
Unknown Object (File)
Wed, Nov 19, 1:32 PM
Unknown Object (File)
Nov 11 2025, 11:50 AM
Unknown Object (File)
Nov 8 2025, 4:19 AM
Unknown Object (File)
Nov 3 2025, 3:20 PM

Details

Summary

When ip_output_send() returns EAGAIN due to issues with send tags (route change, lagg failover, etc), it must free the mbuf. This is because ip_output_send() was written as a replacement for a direct call to if_output(), and the contract with if_output() has historically been that it owns the mbufs once called. When ip_output_send() failed to free mbufs, it violated this assumption and lead to leaked mbufs.

This was noticed when using NIC TLS in combination with hardware rate-limited connections. When seeing lots of NIC output drops triggered ratelimit send tag changes, we noticed we were leaking tls_sessions, send tags and mbufs. This was due ip_output_send() leaking mbufs which held references to ktls_sessions, which in turn held references to send tags.

Many thanks to @jhb @rrs @hselasky and @markj for helping to debug this at various stages

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable