Support Center > Search Results > SecureKnowledge Details
Memory leak on loaded Security Gateway with UserCheck rules in the policy Technical Level
Symptoms
  • Memory leak on heavily loaded gateway with Application Control / URL Filtering with UserCheck rules in the Security policy.

  • Kernel debug shows:
    [fw4_0];fw_drv_fini: 292 bytes allocated by 'user_check_incident.c:59' leaked at ffff8103df329e10 allocation time 557a3c3b
    [fw4_0];FW-1: fw_smem_stat_report: total unfreed smem allocations: 5464, bytes 73407092
    [fw4_0];FW-1: SMEM Leak in: user_check_incident.c:59: smem bytes 954716, smem num of allocations 3198
    [fw4_0];FW-1: SMEM Leak in: user_check_incident.c:59: smem bytes 596164, smem num of allocations 2004
    [fw4_0];FW-1: SMEM Leak in: user_check_incident.c:59: smem bytes 44164, smem num of allocations 150
    [fw4_0];FW-1: SMEM None logged: smem bytes 346244, smem num of allocations 1157
    [fw4_0];FW-1: Leak in: user_check_incident.c:59: hmem_bytes 598604888
Cause

The uc_incidents kernel table is always full and as a result, some insertion operations may fail.


Solution
Note: To view this solution you need to Sign In .