| To: | netdev@xxxxxxxxxxx |
|---|---|
| Subject: | Demonstration code on how to trigger tcp6_sock leak |
| From: | Erik Hensema <erik@xxxxxxxxxxx> |
| Date: | Sat, 24 Jan 2004 14:13:07 +0100 |
| Reply-to: | erik@xxxxxxxxxxx |
| Sender: | netdev-bounce@xxxxxxxxxxx |
| User-agent: | Mutt/1.5.5i |
Hi, I wrote some quick&dirty code showing the tcp6_sock leak in Linux 2.6.x. The server part listens for incoming connections and accept()'s them. The client will simply connect() to the server and close the connection. Do a 'grep tcp6_sock /proc/slabinfo' before and after running the programs, and you will clearly see the leak. -- Erik Hensema (erik@xxxxxxxxxxx)
|
| <Prev in Thread] | Current Thread | [Next in Thread> |
|---|---|---|
| ||
| Previous by Date: | [PATCH] [bonding 2.4] Fixes for balance-xor and balance-rr, Per Hedeland |
|---|---|
| Next by Date: | Re: FW: Submission for S2io 10GbE driver, Andi Kleen |
| Previous by Thread: | FW: Submission for S2io 10GbE driver, Leonid Grossman |
| Next by Thread: | Re: Demonstration code on how to trigger tcp6_sock leak, YOSHIFUJI Hideaki / 吉藤英明 |
| Indexes: | [Date] [Thread] [Top] [All Lists] |