Hi,

It seems that the {v4,v6}_session_hash is leaking entries. When creating
large amounts of TCP session (incoming and outgoing) we are observing
entries in the session_hash pointing to already deleted sessions.

I have verified with a somewhat hackish check in session_delete that
sometimes a session is deleted that still has an active entry in the
session hash. The entry does not get deleted later. Under the right
circumstances, that invalid entry is then picked up
by session_lookup_connection_wt4, leading to crash.

So far the cause seems to be the session_delete
in session_transport_delete_notify when the status is STATE_CLOSED. I have
no idea how the session ends up there.

Regards,
Andreas

-- 

Andreas Schultz
-=-=-=-=-=-=-=-=-=-=-=-
Links: You receive all messages sent to this group.

View/Reply Online (#16571): https://lists.fd.io/g/vpp-dev/message/16571
Mute This Topic: https://lists.fd.io/mt/74542352/21656
Group Owner: vpp-dev+ow...@lists.fd.io
Unsubscribe: https://lists.fd.io/g/vpp-dev/unsub  [arch...@mail-archive.com]
-=-=-=-=-=-=-=-=-=-=-=-

Reply via email to