From owner-freebsd-net@freebsd.org Wed Nov 23 17:03:12 2016 Return-Path: Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:1900:2254:206a::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id BA54DC5129E for ; Wed, 23 Nov 2016 17:03:12 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id A9C84AF4 for ; Wed, 23 Nov 2016 17:03:12 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id uANH3CIT068669 for ; Wed, 23 Nov 2016 17:03:12 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-net@FreeBSD.org Subject: [Bug 214630] netstat displays spurious count for connections in LAST_ACK state inside jail with VIMAGE kernel Date: Wed, 23 Nov 2016 17:03:12 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.0-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: girgen@FreeBSD.org X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-net@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.23 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 23 Nov 2016 17:03:12 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D214630 --- Comment #9 from Palle Girgensohn --- I'm investigating strange sporadical short outages to the network i jails, = for a minute or less. They are related to=20 kernel: sonewconn: pcb 0xfffff80bfa0263a0: Listen queue overflow: 767 alrea= dy in queue awaiting acceptance (365 occurrences) Maybe they are not related at all, but I do see this kind of reports: TCP connection count by state: 0 connections in CLOSED state 11 connections in LISTEN state 0 connections in SYN_SENT state 3 connections in SYN_RCVD state 136 connections in ESTABLISHED state 4 connections in CLOSE_WAIT state 8 connections in FIN_WAIT_1 state 7 connections in CLOSING state 18446744073709551578 connections in LAST_ACK state 671 connections in FIN_WAIT_2 state 846 connections in TIME_WAIT state the large number is obviously < 0 so something is sending double packets. We use VIMAGE with netgraph interfaces (not epair). As I said, maybe it is not related to the sonewconn problem, I don't know enough about the internals, but we do see the same strange reports from netstat. --=20 You are receiving this mail because: You are the assignee for the bug.=