lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:	Tue, 18 Mar 2008 19:59:14 +0100
From:	Tobias Diedrich <ranma+kernel@...edrich.de>
To:	Herbert Xu <herbert@...dor.apana.org.au>,
	linux-net@...r.kernel.org, linux-kernel@...r.kernel.org,
	dada1@...mosbay.com
Subject: Re: dst cache overflow

Tobias Diedrich wrote:

> just a reminder, the server is now running 2.6.24 and the leak is
> still there.  I noticed there is a slab leak debug option and turned
> it on, results should be visible in a few days I guess.

Current (20080318 19:42) biggest net-related numbers:

skbuff_head_cache: 1614 __alloc_skb+0x29/0x108
ip_dst_cache: 1579 dst_alloc+0x25/0x5f
skbuff_fclone_cache: 965 __alloc_skb+0x29/0x108
size-512: 895 sock_wmalloc+0x2b/0x4d
TCPv6: 856 sk_clone+0x14/0x16a
size-2048: 733 tcp_sendmsg+0x174/0x9fc
size-512: 279 sock_alloc_send_skb+0x7c/0x193
size-512: 238 tcp_send_ack+0x2a/0xec
size-512: 223 tcp_send_fin+0x60/0x12e
sock_inode_cache: 172 sock_alloc_inode+0x10/0x4e
size-1024: 147 sock_alloc_send_skb+0x7c/0x193


ranma@oni:~$ netstat -6 -an | wc -l
29

-- 
Tobias						PGP: http://9ac7e0bc.uguu.de
このメールは十割再利用されたビットで作られています。
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists