From owner-freebsd-net@freebsd.org Tue Feb 9 20:00:54 2021 Return-Path: Delivered-To: freebsd-net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 3EF86529793 for ; Tue, 9 Feb 2021 20:00:54 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.nyi.freebsd.org (unknown [127.0.1.3]) by mx1.freebsd.org (Postfix) with ESMTP id 4DZv0617hpz3lpD for ; Tue, 9 Feb 2021 20:00:54 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.nyi.freebsd.org (Postfix) id 270625298AD; Tue, 9 Feb 2021 20:00:54 +0000 (UTC) Delivered-To: net@mailman.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.nyi.freebsd.org (Postfix) with ESMTP id 26D02529909 for ; Tue, 9 Feb 2021 20:00:54 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4DZv060YSKz3m2x for ; Tue, 9 Feb 2021 20:00:54 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 0642E10D3B for ; Tue, 9 Feb 2021 20:00:54 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 119K0rP5029053 for ; Tue, 9 Feb 2021 20:00:53 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 119K0r35029052 for net@FreeBSD.org; Tue, 9 Feb 2021 20:00:53 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 252913] [tcp] Using RACK leaks mbufs Date: Tue, 09 Feb 2021 20:00:54 +0000 X-Bugzilla-Reason: CC X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 12.2-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: iron.udjin@gmail.com X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: tuexen@freebsd.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 09 Feb 2021 20:00:54 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D252913 --- Comment #30 from iron.udjin@gmail.com --- (In reply to Michael Tuexen from comment #27) Today I had luck to capture the beginning of connection which being looping= in LAST_ACK state. Uptime 10 days. RAM usage: 1732691K/66655K/1799346K bytes allocated to network (current/cache/total) ...even at night when ~500 total connections. # sysctl net.inet.tcp.rack net.inet.tcp.rack.clear: 0 net.inet.tcp.rack.tlp_nada: 0 net.inet.tcp.rack.idle_reduce_oninput: 0 net.inet.tcp.rack.prog_drops: 0 net.inet.tcp.rack.runtsacks: 206499410 net.inet.tcp.rack.hit_tlp_method2: 1174282781 net.inet.tcp.rack.hit_tlp_method: 816793264 net.inet.tcp.rack.tlp_calc_entered: 4296358296 net.inet.tcp.rack.sack_short: 144131132 net.inet.tcp.rack.sack_restart: 0 net.inet.tcp.rack.sack_long: 14627478 net.inet.tcp.rack.split_limited: 155396 net.inet.tcp.rack.alloc_limited_conns: 1673 net.inet.tcp.rack.alloc_limited: 6547638618 net.inet.tcp.rack.allocemerg: 0 net.inet.tcp.rack.allochard: 0 net.inet.tcp.rack.allocs: 3101693560 net.inet.tcp.rack.saw_enetunreach: 0 net.inet.tcp.rack.saw_enobufs: 0 net.inet.tcp.rack.unpaced: 8990056544 net.inet.tcp.rack.paced: 328607481 net.inet.tcp.rack.arm_tlp: 0 net.inet.tcp.rack.arm_rack: 0 net.inet.tcp.rack.rack_to_tot: 4001642380 net.inet.tcp.rack.tlp_retran_fail: 1353037 net.inet.tcp.rack.tlp_retran_bytes: 7637629125 net.inet.tcp.rack.tlp_retran: 14327372 net.inet.tcp.rack.tlp_new: 2632317 net.inet.tcp.rack.tlp_to_total: 16766301 net.inet.tcp.rack.reordering: 21745075 net.inet.tcp.rack.findhigh: 480921 net.inet.tcp.rack.tsnf: 0 net.inet.tcp.rack.prrsndnew: 95096931 net.inet.tcp.rack.prrsndret: 6697135814 net.inet.tcp.rack.badfr_bytes: 8262477089 net.inet.tcp.rack.badfr: 7695368 net.inet.tcp.rack.inc_var: 0 net.inet.tcp.rack.pktdelay: 1 net.inet.tcp.rack.reorder_fade: 60000 net.inet.tcp.rack.rtt_tlp_thresh: 1 net.inet.tcp.rack.reorder_thresh: 2 net.inet.tcp.rack.earlyrecovery: 1 net.inet.tcp.rack.earlyrecoveryseg: 6 net.inet.tcp.rack.minto: 1 net.inet.tcp.rack.prr_sendalot: 1 net.inet.tcp.rack.hptsi_seg_max: 40 net.inet.tcp.rack.hptsi_every_seg: 1 net.inet.tcp.rack.hptsi_reduces: 4 net.inet.tcp.rack.tlp_cwnd_flag: 0 net.inet.tcp.rack.recovery_prop: 10 net.inet.tcp.rack.recovery_loss_prop: 0 net.inet.tcp.rack.tlp_retry: 2 net.inet.tcp.rack.maxrto: 30000 net.inet.tcp.rack.minrto: 30 net.inet.tcp.rack.rack_tlimit: 0 net.inet.tcp.rack.rack_tlp_in_recovery: 1 net.inet.tcp.rack.send_oldest: 0 net.inet.tcp.rack.sblklimit: 128 net.inet.tcp.rack.precache: 1 net.inet.tcp.rack.tlpminto: 10 net.inet.tcp.rack.delayed_ack: 200 net.inet.tcp.rack.sackfiltering: 1 net.inet.tcp.rack.bb_verbose: 0 net.inet.tcp.rack.idle_reduce_high: 0 net.inet.tcp.rack.min_pace_segs: 6 net.inet.tcp.rack.min_pace_time: 0 net.inet.tcp.rack.tlpmethod: 2 net.inet.tcp.rack.data_after_close: 1 net.inet.tcp.rack.rate_sample_method: 1 net.inet.tcp.rack.map_splitlimit: 256 net.inet.tcp.rack.map_limit: 1024 Michael, I just sent you .pcap file. Please let me know in case you need any other info. --=20 You are receiving this mail because: You are on the CC list for the bug.=