From owner-freebsd-net@FreeBSD.ORG Mon Oct 5 11:46:39 2009 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 4723E1065676 for ; Mon, 5 Oct 2009 11:46:39 +0000 (UTC) (envelope-from eugen@kuzbass.ru) Received: from www.svzserv.kemerovo.su (www.svzserv.kemerovo.su [213.184.65.80]) by mx1.freebsd.org (Postfix) with ESMTP id A80358FC12 for ; Mon, 5 Oct 2009 11:46:37 +0000 (UTC) Received: from www.svzserv.kemerovo.su (eugen@localhost [127.0.0.1]) by www.svzserv.kemerovo.su (8.13.8/8.13.8) with ESMTP id n95Bka6c079927; Mon, 5 Oct 2009 19:46:36 +0800 (KRAST) (envelope-from eugen@www.svzserv.kemerovo.su) Received: (from eugen@localhost) by www.svzserv.kemerovo.su (8.13.8/8.13.8/Submit) id n95Bkagr079926; Mon, 5 Oct 2009 19:46:36 +0800 (KRAST) (envelope-from eugen) Date: Mon, 5 Oct 2009 19:46:36 +0800 From: Eugene Grosbein To: rihad Message-ID: <20091005114636.GB77999@svzserv.kemerovo.su> References: <4AC8A76B.3050502@mail.ru> <20091004144909.GA42503@onelab2.iet.unipi.it> <4AC8B6E3.2070101@mail.ru> <20091004151518.GB42877@onelab2.iet.unipi.it> <4AC8BF3B.10601@mail.ru> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <4AC8BF3B.10601@mail.ru> User-Agent: Mutt/1.4.2.3i Cc: freebsd-net@freebsd.org, Luigi Rizzo Subject: Re: dummynet dropping too many packets X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Mon, 05 Oct 2009 11:46:39 -0000 On Sun, Oct 04, 2009 at 08:28:59PM +0500, rihad wrote: > Thanks for the tip. although I took an easier route by simply doing > "ipfw add allow ip from any to any" before the pipe rules, and the buf > drop rate instantly became 0. So the problem is dummynet/ipfw. You should also estimate volume of non-TCP traffic that is generally has not flow control capabilities of TCP. Or, try something like this: ipfw add 100 skipto 200 tcp from any to any # direct only TCP to dummynet ipfw add 150 allow ip from any to any # pass non-TCP ipfw add 200 ... # here dummynet rules go And take a look at drop counters. Eugene Grosbein