Sean Hefty wrote:
I reviewed the file mad_rmpp.c and it seems that there is a leak of the Address Handle. The AH that is being created in the function "alloc_response_msg" is never being destroyed.

The AH is destroyed in ib_rmpp_send_handler().
I checked this issue again and I added the following prints:
 the AH handler which is being created in alloc_response_msg()
 the AH handler which is being destroyed in ib_rmpp_send_handler()

It seems that the AHs which are being created in alloc_response_msg() (which is being called from ack_ds_ack()) are not being destroyed because the rmpp_type of this packet is
IB_MGMT_RMPP_TYPE_ACK, so the destroy AH is not being executed.

We saw this issue in our daily regression during the osmtest, here are the reproduction instructions:

Start the openSM (during the following commands, the openSM needs to be online)
execute: # osmtest -f c
execute: # osmtest -f a

during the test, the AHs which were mentioned above will be created.


thanks
Dotan
_______________________________________________
general mailing list
[email protected]
http://lists.openfabrics.org/cgi-bin/mailman/listinfo/general

To unsubscribe, please visit http://openib.org/mailman/listinfo/openib-general

Reply via email to