From owner-freebsd-net@freebsd.org Sat Jan 30 12:45:29 2021 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 2D92B4EBDF6 for ; Sat, 30 Jan 2021 12:45:29 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4DSYpK0MWmz4Vyb for ; Sat, 30 Jan 2021 12:45:29 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 0AA9C4EBDF4; Sat, 30 Jan 2021 12:45:29 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 0A6E24EBDF3 for ; Sat, 30 Jan 2021 12:45:29 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4DSYpJ63Wjz4W93 for ; Sat, 30 Jan 2021 12:45:28 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id BA3DF15E14 for ; Sat, 30 Jan 2021 12:45:28 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 10UCjSXl032473 for ; Sat, 30 Jan 2021 12:45:28 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 10UCjSd3032472 for net@FreeBSD.org; Sat, 30 Jan 2021 12:45:28 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 252913] [tcp] Using RACK leaks mbufs Date: Sat, 30 Jan 2021 12:45:28 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.2-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: iron.udjin@gmail.com X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: tuexen@freebsd.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sat, 30 Jan 2021 12:45:29 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D252913 --- Comment #29 from iron.udjin@gmail.com --- After 10 hours uptime I have 3 looping connection which produce 30Mibt/s of traffic. I cannot say exact time when they started looping because traffic graph has quite linear grow: https://prnt.sc/xv6ldt netstat -m: 265055/26920/291975 mbufs in use (current/cache/total) 130635K/124086K/254721K bytes allocated to network (current/cache/total) # sysctl net.inet.tcp.functions_available net.inet.tcp.rack net.inet.tcp.functions_available: Stack D Alias PCB count freebsd freebsd 3 rack * rack 4107 net.inet.tcp.rack.clear: 0 net.inet.tcp.rack.tlp_nada: 0 net.inet.tcp.rack.idle_reduce_oninput: 0 net.inet.tcp.rack.prog_drops: 0 net.inet.tcp.rack.runtsacks: 854985 net.inet.tcp.rack.hit_tlp_method2: 43498272 net.inet.tcp.rack.hit_tlp_method: 26318731 net.inet.tcp.rack.tlp_calc_entered: 143382781 net.inet.tcp.rack.sack_short: 4099975 net.inet.tcp.rack.sack_restart: 0 net.inet.tcp.rack.sack_long: 466643 net.inet.tcp.rack.split_limited: 7165 net.inet.tcp.rack.alloc_limited_conns: 45 net.inet.tcp.rack.alloc_limited: 51035137 net.inet.tcp.rack.allocemerg: 0 net.inet.tcp.rack.allochard: 0 net.inet.tcp.rack.allocs: 107989742 net.inet.tcp.rack.saw_enetunreach: 0 net.inet.tcp.rack.saw_enobufs: 0 net.inet.tcp.rack.unpaced: 138312500 net.inet.tcp.rack.paced: 9822106 net.inet.tcp.rack.arm_tlp: 0 net.inet.tcp.rack.arm_rack: 0 net.inet.tcp.rack.rack_to_tot: 51807262 net.inet.tcp.rack.tlp_retran_fail: 43664 net.inet.tcp.rack.tlp_retran_bytes: 249582917 net.inet.tcp.rack.tlp_retran: 487864 net.inet.tcp.rack.tlp_new: 80270 net.inet.tcp.rack.tlp_to_total: 543162 net.inet.tcp.rack.reordering: 686406 net.inet.tcp.rack.findhigh: 26081 net.inet.tcp.rack.tsnf: 0 net.inet.tcp.rack.prrsndnew: 2614014 net.inet.tcp.rack.prrsndret: 55895077 net.inet.tcp.rack.badfr_bytes: 255611021 net.inet.tcp.rack.badfr: 241600 net.inet.tcp.rack.inc_var: 0 net.inet.tcp.rack.pktdelay: 1 net.inet.tcp.rack.reorder_fade: 60000 net.inet.tcp.rack.rtt_tlp_thresh: 1 net.inet.tcp.rack.reorder_thresh: 2 net.inet.tcp.rack.earlyrecovery: 1 net.inet.tcp.rack.earlyrecoveryseg: 6 net.inet.tcp.rack.minto: 1 net.inet.tcp.rack.prr_sendalot: 1 net.inet.tcp.rack.hptsi_seg_max: 40 net.inet.tcp.rack.hptsi_every_seg: 1 net.inet.tcp.rack.hptsi_reduces: 4 net.inet.tcp.rack.tlp_cwnd_flag: 0 net.inet.tcp.rack.recovery_prop: 10 net.inet.tcp.rack.recovery_loss_prop: 0 net.inet.tcp.rack.tlp_retry: 2 net.inet.tcp.rack.maxrto: 30000 net.inet.tcp.rack.minrto: 30 net.inet.tcp.rack.rack_tlimit: 0 net.inet.tcp.rack.rack_tlp_in_recovery: 1 net.inet.tcp.rack.send_oldest: 0 net.inet.tcp.rack.sblklimit: 128 net.inet.tcp.rack.precache: 1 net.inet.tcp.rack.tlpminto: 10 net.inet.tcp.rack.delayed_ack: 200 net.inet.tcp.rack.sackfiltering: 1 net.inet.tcp.rack.bb_verbose: 0 net.inet.tcp.rack.idle_reduce_high: 0 net.inet.tcp.rack.min_pace_segs: 6 net.inet.tcp.rack.min_pace_time: 0 net.inet.tcp.rack.tlpmethod: 2 net.inet.tcp.rack.data_after_close: 1 net.inet.tcp.rack.rate_sample_method: 1 net.inet.tcp.rack.map_splitlimit: 256 net.inet.tcp.rack.map_limit: 1024 # sockstat -sSPtcp | grep AAA.AAA.AAA.AAA ? ? ? ? tcp4 XXX.XXX.XXX.XXX:443=20=20=20=20=20 AAA.AAA.AAA.AAA:62799 LAST_ACK rack # sockstat -sSPtcp | grep BBB.BBB.BBB.BBB ? ? ? ? tcp4 XXX.XXX.XXX.XXX:443=20=20=20=20=20 BBB.BBB.BBB.BBB:32440 LAST_ACK rack # sockstat -sSPtcp | grep CCC.CCC.CCC.CCC ? ? ? ? tcp4 XXX.XXX.XXX.XXX:443=20=20=20=20=20 CCC.CCC.CCC.CCC:50608 CLOSING rack --=20 You are receiving this mail because: You are on the CC list for the bug.=