From owner-freebsd-current@freebsd.org Sat Mar 6 09:26:56 2021 Return-Path: Delivered-To: freebsd-current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 355D155E8D4 for ; Sat, 6 Mar 2021 09:26:56 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4Dszl40qkzz3MQg for ; Sat, 6 Mar 2021 09:26:56 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: by mailman.nyi.freebsd.org (Postfix) id 1C35555E9E5; Sat, 6 Mar 2021 09:26:56 +0000 (UTC) Delivered-To: current@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 1BF7155E8D2 for ; Sat, 6 Mar 2021 09:26:56 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from smtp.freebsd.org (smtp.freebsd.org [IPv6:2610:1c1:1:606c::24b:4]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "smtp.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4Dszl40PYbz3M6y; Sat, 6 Mar 2021 09:26:56 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: from venus.codepro.be (venus.codepro.be [5.9.86.228]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "mx1.codepro.be", Issuer "R3" (verified OK)) (Authenticated sender: kp) by smtp.freebsd.org (Postfix) with ESMTPSA id DA082213F4; Sat, 6 Mar 2021 09:26:55 +0000 (UTC) (envelope-from kp@FreeBSD.org) Received: by venus.codepro.be (Postfix, authenticated sender kp) id 942E94B2A0; Sat, 6 Mar 2021 10:26:54 +0100 (CET) From: "Kristof Provost" To: "Alexander V. Chernikov" Cc: "current@FreeBSD.org" , "Bjoern A. Zeeb" Subject: Re: ifa leak on VNET teardown Date: Sat, 06 Mar 2021 10:26:53 +0100 X-Mailer: MailMate (1.13.2r5673) Message-ID: In-Reply-To: <275831613248826@mail.yandex.ru> References: <275831613248826@mail.yandex.ru> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8"; format=flowed Content-Transfer-Encoding: 8bit X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 06 Mar 2021 09:26:56 -0000 On 13 Feb 2021, at 21:58, Alexander V. Chernikov wrote: > It turns out we're leaking some ifas for loopback interfaces on VNET > teardown: > There’s a recent bug about this as well: 253998. The problem’s been around for a long time though. The pf tests trigger it from time to time, although it doesn’t appear to be 100% consistent, so my current feeling is that it may be racy. I see ‘in6_purgeaddr: err=65, destination address delete failed’ when we do leak, and I’ve also been able to confirm this is about the ::1 IPv6 loopback address. Best regards, Kristof