Page MenuHomeFreeBSD

Fix a memory leak when ip_output_send() returns EAGAIN due to send tag issues
ClosedPublic

Authored by gallatin on Jan 26 2022, 9:19 PM.
Tags
None
Referenced Files
Unknown Object (File)
Mon, Apr 15, 5:57 AM
Unknown Object (File)
Mar 7 2024, 6:03 PM
Unknown Object (File)
Jan 15 2024, 12:15 AM
Unknown Object (File)
Dec 20 2023, 7:36 AM
Unknown Object (File)
Nov 23 2023, 10:51 AM
Unknown Object (File)
Oct 25 2023, 1:35 AM
Unknown Object (File)
Sep 25 2023, 8:25 PM
Unknown Object (File)
Sep 9 2023, 3:43 AM

Details

Summary

When ip_output_send() returns EAGAIN due to issues with send tags (route change, lagg failover, etc), it must free the mbuf. This is because ip_output_send() was written as a replacement for a direct call to if_output(), and the contract with if_output() has historically been that it owns the mbufs once called. When ip_output_send() failed to free mbufs, it violated this assumption and lead to leaked mbufs.

This was noticed when using NIC TLS in combination with hardware rate-limited connections. When seeing lots of NIC output drops triggered ratelimit send tag changes, we noticed we were leaking tls_sessions, send tags and mbufs. This was due ip_output_send() leaking mbufs which held references to ktls_sessions, which in turn held references to send tags.

Many thanks to @jhb @rrs @hselasky and @markj for helping to debug this at various stages

Diff Detail

Repository
rG FreeBSD src repository
Lint
Lint Not Applicable
Unit
Tests Not Applicable