From owner-freebsd-stable@FreeBSD.ORG Wed Oct 1 11:33:36 2014 Return-Path: Delivered-To: stable@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id CD166F7; Wed, 1 Oct 2014 11:33:36 +0000 (UTC) Received: from cell.glebius.int.ru (glebius.int.ru [81.19.69.10]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client CN "cell.glebius.int.ru", Issuer "cell.glebius.int.ru" (not verified)) by mx1.freebsd.org (Postfix) with ESMTPS id 4CA7A6B0; Wed, 1 Oct 2014 11:33:35 +0000 (UTC) Received: from cell.glebius.int.ru (localhost [127.0.0.1]) by cell.glebius.int.ru (8.14.9/8.14.9) with ESMTP id s91BXRQi081147 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-GCM-SHA384 bits=256 verify=NO); Wed, 1 Oct 2014 15:33:27 +0400 (MSK) (envelope-from glebius@FreeBSD.org) Received: (from glebius@localhost) by cell.glebius.int.ru (8.14.9/8.14.9/Submit) id s91BXRLN081146; Wed, 1 Oct 2014 15:33:27 +0400 (MSK) (envelope-from glebius@FreeBSD.org) X-Authentication-Warning: cell.glebius.int.ru: glebius set sender to glebius@FreeBSD.org using -f Date: Wed, 1 Oct 2014 15:33:27 +0400 From: Gleb Smirnoff To: Rumen Telbizov Subject: Re: 10.1-BETA2 possible kernel memory leak in routing table Message-ID: <20141001113327.GK73266@glebius.int.ru> References: <542AAA3C.1080803@ipfw.ru> <542AE376.6000003@FreeBSD.org> <542AFAE3.9030705@FreeBSD.org> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.5.23 (2014-03-12) Cc: brian@freebsd.org, stable@FreeBSD.org, "Alexander V. Chernikov" X-BeenThere: freebsd-stable@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Production branch of FreeBSD source code List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 01 Oct 2014 11:33:36 -0000 On Tue, Sep 30, 2014 at 04:56:00PM -0700, Rumen Telbizov wrote: R> Brian Somers and I are currently looking into the source of PF in latest R> 10-STABLE and trying to figure out what is going on. We were able to R> replicate this problem on a 11-CURRENT (Sep 12th) machine as well. A simple R> PF ruleset with 1 rule and 1 table. Every few reloads of the firewall R> and vmstat R> -m | grep routetbl shows increased memory usage. Reproduced. Will look. -- Totus tuus, Glebius.