From owner-freebsd-fs@FreeBSD.ORG Thu Mar 25 00:51:55 2010 Return-Path: Delivered-To: freebsd-fs@freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2001:4f8:fff6::34]) by hub.freebsd.org (Postfix) with ESMTP id 9AF45106564A; Thu, 25 Mar 2010 00:51:55 +0000 (UTC) (envelope-from rmacklem@uoguelph.ca) Received: from esa-jnhn.mail.uoguelph.ca (esa-jnhn.mail.uoguelph.ca [131.104.91.44]) by mx1.freebsd.org (Postfix) with ESMTP id 381778FC0A; Thu, 25 Mar 2010 00:51:54 +0000 (UTC) X-IronPort-Anti-Spam-Filtered: true X-IronPort-Anti-Spam-Result: AvsEAMtQqkuDaFvI/2dsb2JhbACbG3O/fIR+BA X-IronPort-AV: E=Sophos;i="4.51,304,1267419600"; d="scan'208";a="69867893" Received: from darling.cs.uoguelph.ca ([131.104.91.200]) by esa-jnhn-pri.mail.uoguelph.ca with ESMTP; 24 Mar 2010 20:51:54 -0400 Received: from localhost (localhost.localdomain [127.0.0.1]) by darling.cs.uoguelph.ca (Postfix) with ESMTP id 654C694006C; Wed, 24 Mar 2010 20:51:54 -0400 (EDT) X-Virus-Scanned: amavisd-new at darling.cs.uoguelph.ca Received: from darling.cs.uoguelph.ca ([127.0.0.1]) by localhost (darling.cs.uoguelph.ca [127.0.0.1]) (amavisd-new, port 10024) with ESMTP id mN1xKYHG7YXP; Wed, 24 Mar 2010 20:51:53 -0400 (EDT) Received: from muncher.cs.uoguelph.ca (muncher.cs.uoguelph.ca [131.104.91.102]) by darling.cs.uoguelph.ca (Postfix) with ESMTP id 9A9C1940064; Wed, 24 Mar 2010 20:51:53 -0400 (EDT) Received: from localhost (rmacklem@localhost) by muncher.cs.uoguelph.ca (8.11.7p3+Sun/8.11.6) with ESMTP id o2P14s205017; Wed, 24 Mar 2010 21:04:55 -0400 (EDT) X-Authentication-Warning: muncher.cs.uoguelph.ca: rmacklem owned process doing -bs Date: Wed, 24 Mar 2010 21:04:53 -0400 (EDT) From: Rick Macklem X-X-Sender: rmacklem@muncher.cs.uoguelph.ca To: Kai Kockro In-Reply-To: <201003240739.04994.kkockro@web.de> Message-ID: References: <201003171120.o2HBK3CV082081@freefall.freebsd.org> <201003240739.04994.kkockro@web.de> MIME-Version: 1.0 Content-Type: TEXT/PLAIN; charset=US-ASCII; format=flowed Cc: bug-followup@freebsd.org, freebsd-fs@freebsd.org, Daniel Braniss Subject: Re: kern/144330: [nfs] mbuf leakage in nfsd with zfs X-BeenThere: freebsd-fs@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list List-Id: Filesystems List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 25 Mar 2010 00:51:55 -0000 On Wed, 24 Mar 2010, Kai Kockro wrote: > Hi, > > after 3 days with the first patch ( FreeBSD 8-STABLE AMD64, old nfsd ): > > netstat -m > 5732/10528/16260 mbufs in use (current/cache/total) > 4825/10131/14956/262144 mbuf clusters in use (current/cache/total/max) > > It looks very fine. I'll patch with the final corrections and then test again. > Sounds good. Thanks for letting us know. > But why i have the same issues? I dont use UDP connects, only TCP?! > Hmm, from what I can see, the replay cache is used for both UDP and TCP in the regular NFS server. If I'm correct on that, any retry of an RPC over TCP could cause the leak. (Retries of an RPC over TCP are infrequent, with the likelyhood differing between clients. I can only guess that your TCP clients do retries?) rick