From mboxrd@z Thu Jan 1 00:00:00 1970 From: Stefan Baranoff Subject: Re: Random mbuf corruption Date: Tue, 24 Jun 2014 21:31:57 -0400 Message-ID: References: <53A43E5E.3030809@windriver.com> <20140624104859.GA19229@hmsreliant.think-freely.org> <53A95AA3.90408@6wind.com> Mime-Version: 1.0 Content-Type: text/plain; charset=UTF-8 To: dev-VfR2kkLFssw@public.gmane.org Return-path: In-Reply-To: <53A95AA3.90408-pdR9zngts4EAvxtiuMwx3w@public.gmane.org> List-Id: patches and discussions about DPDK List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces-VfR2kkLFssw@public.gmane.org Sender: "dev" Thanks, all! We have alloc/free counters in place but I'll enable those debug options. I'll try older releases of RHEL and get back to you. I've also eradicated pthreads in this code but also have the mempool cache size set to 0 just in case. I should mention we hold onto mbufs for a while (up to 30s) and have many of them available (~8GB worth at 2K per). The entire app is fairly short (2k-3k lines) so it's not too hard to review. We'll take another look for buffer overruns. Thanks, Stefan Sent from my smart phone; people don't make typos, Swype does! On Jun 24, 2014 7:02 AM, "Olivier MATZ" wrote: > Hi, > > On 06/24/2014 12:48 PM, Neil Horman wrote: > >> Sounds like it might be time to add in some poisoning options to the mbuf >> allocator. >> > > Such option already exists: CONFIG_RTE_LIBRTE_MBUF_DEBUG and > RTE_LIBRTE_MEMPOOL_DEBUG will enable some runtime checks, at least > double free and buffer overflows. > > Olivier > >