From owner-freebsd-current@freebsd.org Mon May 9 22:34:46 2016 Return-Path: Delivered-To: freebsd-current@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B8D2DB3320A; Mon, 9 May 2016 22:34:46 +0000 (UTC) (envelope-from wolfgang@lyxys.ka.sub.org) Received: from saturn.lyxys.ka.sub.org (saturn.lyxys.ka.sub.org [217.29.35.151]) (using TLSv1 with cipher ECDHE-RSA-AES128-SHA (128/128 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 199CA16D6; Mon, 9 May 2016 22:34:45 +0000 (UTC) (envelope-from wolfgang@lyxys.ka.sub.org) Received: from juno.lyxys.ka.sub.org (juno.lyx [IPv6:fd2a:89ca:7d54:0:240:caff:fe92:4f47]) by saturn.lyxys.ka.sub.org (8.15.2/8.15.2) with ESMTPS id u49MUxOi080666 (version=TLSv1 cipher=DHE-RSA-AES128-SHA bits=128 verify=FAIL); Tue, 10 May 2016 00:31:01 +0200 (CEST) (envelope-from wolfgang@lyxys.ka.sub.org) Received: from juno.lyxys.ka.sub.org (localhost [127.0.0.1]) by juno.lyxys.ka.sub.org (8.15.2/8.15.2) with ESMTPS id u49MUxMj035161 (version=TLSv1.2 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Tue, 10 May 2016 00:30:59 +0200 (CEST) (envelope-from wolfgang@lyxys.ka.sub.org) Received: (from wolfgang@localhost) by juno.lyxys.ka.sub.org (8.15.2/8.15.2/Submit) id u49MUw6J035160; Tue, 10 May 2016 00:30:58 +0200 (CEST) (envelope-from wolfgang@lyxys.ka.sub.org) X-Authentication-Warning: juno.lyx: wolfgang set sender to wolfgang@lyxys.ka.sub.org using -f Date: Tue, 10 May 2016 00:30:58 +0200 From: Wolfgang Zenker To: Scott Long Cc: Mark Johnston , Steve Wills , FreeBSD PowerPC ML , freebsd-current@freebsd.org, scottl@FreeBSD.org, Warner Losh Subject: Re: wired memory leak at r298785 Message-ID: <20160509223058.GA35132@lyxys.ka.sub.org> References: <572756DF.1010809@FreeBSD.org> <5727F71E.20101@FreeBSD.org> <20160503062031.GA2209@raichu> MIME-Version: 1.0 Content-Type: text/plain; charset=utf-8 Content-Disposition: inline Content-Transfer-Encoding: 8bit In-Reply-To: Organization: private site User-Agent: Mutt/1.6.1 (2016-04-27) X-Greylist: Sender IP whitelisted, not delayed by milter-greylist-4.4.3 (saturn.lyxys.ka.sub.org [IPv6:fd2a:89ca:7d54:1:200:24ff:feca:b4cc]); Tue, 10 May 2016 00:31:01 +0200 (CEST) X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.22 Precedence: list List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 09 May 2016 22:34:46 -0000 * Scott Long [160503 16:27]: >> On May 3, 2016, at 12:20 AM, Mark Johnston wrote: >> [..] >> This was causing problems on one of my amd64 systems, so it's not >> specific to powerpc64. It turns out to be due to r298004: the CCB >> allocated in cam_periph_devctl_notify() never gets freed. The patch >> below seems to fix it. > Thanks Mark, that looks like the right fix. I’ll put it in today. Thanks for committing the patch. I noticed that it has not been MFCed to 10-STABLE yet. Is this due to problems with the patch or did nobody get around to it yet? I am running the patch on a few 10-STABLE machines (amd64 and i386) and didn't notice any problems so far. Wolfgang