From owner-freebsd-bugs@FreeBSD.ORG Thu May 22 15:16:52 2014 Return-Path: Delivered-To: freebsd-bugs@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) (using TLSv1 with cipher ADH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id DEE175DB for ; Thu, 22 May 2014 15:16:52 +0000 (UTC) Received: from mx1.sbone.de (bird.sbone.de [46.4.1.90]) (using TLSv1 with cipher DHE-RSA-CAMELLIA256-SHA (256/256 bits)) (Client CN "mx1.sbone.de", Issuer "SBone.DE" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 922612C26 for ; Thu, 22 May 2014 15:16:52 +0000 (UTC) Received: from mail.sbone.de (mail.sbone.de [IPv6:fde9:577b:c1a9:31::2013:587]) (using TLSv1 with cipher ADH-CAMELLIA256-SHA (256/256 bits)) (No client certificate requested) by mx1.sbone.de (Postfix) with ESMTPS id A052B25D37C3; Thu, 22 May 2014 15:16:48 +0000 (UTC) Received: from content-filter.sbone.de (content-filter.sbone.de [IPv6:fde9:577b:c1a9:31::2013:2742]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPS id B54EDC22B9B; Thu, 22 May 2014 15:16:47 +0000 (UTC) X-Virus-Scanned: amavisd-new at sbone.de Received: from mail.sbone.de ([IPv6:fde9:577b:c1a9:31::2013:587]) by content-filter.sbone.de (content-filter.sbone.de [fde9:577b:c1a9:31::2013:2742]) (amavisd-new, port 10024) with ESMTP id YTa5BIlUm51a; Thu, 22 May 2014 15:16:46 +0000 (UTC) Received: from [IPv6:fde9:577b:c1a9:4420:cabc:c8ff:fe8b:4fe6] (unknown [IPv6:fde9:577b:c1a9:4420:cabc:c8ff:fe8b:4fe6]) (using TLSv1 with cipher AES128-SHA (128/128 bits)) (No client certificate requested) by mail.sbone.de (Postfix) with ESMTPSA id 3464BC22B97; Thu, 22 May 2014 15:16:44 +0000 (UTC) Content-Type: text/plain; charset=utf-8 Mime-Version: 1.0 (Mac OS X Mail 7.2 \(1874\)) Subject: Re: kern/164763: [vimage] Memory leak in VNET From: "Bjoern A. Zeeb" In-Reply-To: <201405221510.s4MFA2Ff029214@freefall.freebsd.org> Date: Thu, 22 May 2014 15:16:43 +0000 Content-Transfer-Encoding: quoted-printable Message-Id: References: <201405221510.s4MFA2Ff029214@freefall.freebsd.org> To: =?utf-8?Q?=22Hiroo_Ono_=28=E5=B0=8F=E9=87=8E=E5=AF=9B=E7=94=9F?= =?utf-8?Q?=29=22?= X-Mailer: Apple Mail (2.1874) Cc: freebsd-bugs@FreeBSD.org X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.18 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 22 May 2014 15:16:52 -0000 On 22 May 2014, at 15:10 , Hiroo Ono (=E5=B0=8F=E9=87=8E=E5=AF=9B=E7=94=9F= ) wrote: > The following reply was made to PR kern/164763; it has been noted by = GNATS. >=20 > From: =3D?UTF-8?B?SGlyb28gT25vICjlsI/ph47lr5vnlJ8p?=3D = > To: bug-followup@FreeBSD.org > Cc: =20 > Subject: Re: kern/164763: [vimage] Memory leak in VNET > Date: Fri, 23 May 2014 00:02:36 +0900 >=20 > I tracked this issue down a little. >=20 > I put some printf's and found that this occurs in the function > vnet_destroy() in sys/net/vnet.c. > The memory leak seems to happen when vnet_sysuninit() is called. > So, something needs to be done before or inside vnet_sysuninit(), but > I do not know > what to do. >=20 > The messages I saw on head and stable/10 around 2014-04-30 are: > Freed UMA keg (udp_inpcb) was not empty (135 items). Lost 9 pages of = memory. > Freed UMA keg (udpcb) was not empty (250 items). Lost 1 pages of = memory. > Freed UMA keg (tcp_inpcb) was not empty (75 items). Lost 5 pages of = memory. > Freed UMA keg (tcpcb) was not empty (15 items). Lost 3 pages of = memory. The fixes for UDP have been in a perforce branch for two years and need = updating and merging into HEAD. TCP was and is the only thing that could not be completely freed (back = two years ago) synchronously and thus would continue to leak. It=E2=80=99= s not not fixable and probably with some tw changes lately got better = (or maybe they didn=E2=80=99t happen). =E2=80=94=20 Bjoern A. Zeeb "Come on. Learn, goddamn it.", WarGames, 1983