In D4295#1077477, @gallatin wrote:Why is this re-surfacing?
I think the ratelimit code has a better solution, since TCP can query how full the nic queue is and avoid ENOBUFs entirely by avoiding sending on a full queue. The problem with doing this in general is that, outside of ratelimit, the TCP stack has no way to determine what NIC queue a packet will be sent on.
- Queries
- All Stories
- Search
- Advanced Search
- Transactions
- Transaction Logs
Feed Advanced Search
Advanced Search
Advanced Search
Nov 14 2024
Nov 14 2024
Oct 22 2024
Oct 22 2024
Why is this re-surfacing?
Aug 22 2024
Aug 22 2024
Jun 29 2022
Jun 29 2022
Jan 27 2022
Jan 27 2022
Jun 11 2021
Jun 11 2021
Mar 17 2021
Mar 17 2021
Jan 24 2021
Jan 24 2021
Jul 17 2020
Jul 17 2020
nc added a comment to D25681: if_spppsubr: Define a few LCP options, Recognize (but still reject) multilink PPP config options.
In D25681#568379, @lutz_donnerhacke.de wrote:In D25681#568368, @eugen_grosbein.net wrote:ce(4) for PCI G.703/E1 card,
cp(4) for PCI V.35/RS-232/RS-530/RS-449/X.21/G.703/E1/E3/T3/STS-1 cards,
and cx(4)/ctau(4) for some ISA cards but these do not exist in FreeBSD 13 anymore,
removed by emaste@ recently.Both ce(4) and cp(4) are i386-only drivers at present.
Such synchronous lines are still in use (here):
- G.703 is common in phone systems.
- X.21 for leased lines (with old contracts),
- E1/E3 for SDH (carrier grade) leases lines.
- RS-232 is the ordinary serial port, the other RS- are industry specific serials (mainly other voltages)
But you are right: Do we really need a specialized PPP hardware support these days?
Do we really want to run a recent kernel on this antique hardware? It would be a sacrilege.Normal PPP over serial lines (currently available) does work using ppp(4)
Jul 16 2020
Jul 16 2020
donner added a comment to D25681: if_spppsubr: Define a few LCP options, Recognize (but still reject) multilink PPP config options.
In D25681#568368, @eugen_grosbein.net wrote:ce(4) for PCI G.703/E1 card,
cp(4) for PCI V.35/RS-232/RS-530/RS-449/X.21/G.703/E1/E3/T3/STS-1 cards,
and cx(4)/ctau(4) for some ISA cards but these do not exist in FreeBSD 13 anymore,
removed by emaste@ recently.Both ce(4) and cp(4) are i386-only drivers at present.
eugen_grosbein.net updated subscribers of D25681: if_spppsubr: Define a few LCP options, Recognize (but still reject) multilink PPP config options.
Sorry for the mess, my latest actions on this differential were unintentional, some problems with old Firefox.
eugen_grosbein.net updated subscribers of D25681: if_spppsubr: Define a few LCP options, Recognize (but still reject) multilink PPP config options.
CCing Roman Kurakin (ce(4)) and Serge Vakulenko (cp(4)), see later.
nc added a comment to D25681: if_spppsubr: Define a few LCP options, Recognize (but still reject) multilink PPP config options.
In case anybody is wondering, the source of the commit is here: https://freshbsd.org/commit/netbsd/src/hRr2tvIj1vj7QI2C
Jul 7 2020
Jul 7 2020
Jun 25 2020
Jun 25 2020
nc updated the diff for D24011: ipfw: Support [w:x:y::z]:port (bracketed) IPv6 addresses in the fwd command.
Good catch on the tidbits, here's an revised patch.
This looks ok to me modulo the nits I pointed out.
donner added inline comments to D24011: ipfw: Support [w:x:y::z]:port (bracketed) IPv6 addresses in the fwd command.
Jun 24 2020
Jun 24 2020
nc updated the diff for D24011: ipfw: Support [w:x:y::z]:port (bracketed) IPv6 addresses in the fwd command.
Made the corrections.
markj added inline comments to D24011: ipfw: Support [w:x:y::z]:port (bracketed) IPv6 addresses in the fwd command.
allanjude added reviewers for D24011: ipfw: Support [w:x:y::z]:port (bracketed) IPv6 addresses in the fwd command: thj, markj.
Jun 23 2020
Jun 23 2020
nc added a project to D24403: ipfw(8): In fill_ip6(), use a single statement for both "me" and "me6": transport.
Jan 20 2020
Jan 20 2020
Jan 16 2020
Jan 16 2020
Dec 31 2019
Dec 31 2019
Sep 30 2019
Sep 30 2019
May 9 2019
May 9 2019
Apr 25 2019
Apr 25 2019
rscheff added a comment to D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery.
Lawrence reviewed this during IETF104, Michael volunteered to follup up with the full commit process.
Apr 24 2019
Apr 24 2019
Mar 28 2019
Mar 28 2019
Feb 15 2019
Feb 15 2019
Feb 5 2019
Feb 5 2019
rscheff updated the diff for D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery.
- prepare to land
rscheff added a comment to D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery.
Over the last two or three weeks, we have run a large number of performance regression tests including this patch, in particular again workloads with frequent app-stalls (no additional data to send for about an RTO interval). That type of workload very often causes burst to be transmitted, including self-inflicted packet drops.
Jan 31 2019
Jan 31 2019
Looks good. I think Richard can update more that we recently tested this patch.
Jan 24 2019
Jan 24 2019
rscheff added a comment to D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery.
Looking at D8225, that all seems to be code while in loss recovery. This patch is to restore a sane minimum cwnd once exiting loss recovery - so I don't see how these would be directly related.
kbowling added a comment to D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery.
I remember we tried to analyze and improve this and found some unintended consequences between @hiren and @lstewart https://reviews.freebsd.org/D8225 so it got backed out. @lstewart do you remember the details for backing it out?
Jan 18 2019
Jan 18 2019
rscheff updated the diff for D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery.
- fixing trailing whitespaces
rscheff updated the diff for D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery.
- remove siftr patch
rscheff updated the diff for D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery.
- fixing trailing whitespaces
rscheff added a comment to D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery.
Here is the output of the now functional siftr, without and with the patch;
Jan 16 2019
Jan 16 2019
rscheff added a comment to D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery.
In D17614#402480, @chengc_netapp.com wrote:I have been testing this patch against a stable/11 build. Over a 1Gb/s link with emulated 40ms RTT and (10^-4) loss rate, I use iperf from a FreeBSD node to send traffic to a 4.15.0-39-generic Ubuntu16.04 client.
[...]
Using siftr, I still see the single MSS cwnd, and sometimes with a 40ms delay to update a second cwnd. The full cwnd log is attached.
cwnd_33710.txt106 KBDownloadThe congestion control in use is newreno.
timestamp cwnd ssthresh
...
1.92838096618652 115052 70875
1.92838382720947 1448 56940 <<< single MSS
1.96786689758301 2896 56940 <<< 40ms delay
1.96786999702454 4344 56940
1.96787786483765 5792 56940
1.96788096427917 7240 56940
Jan 15 2019
Jan 15 2019
cc added a comment to D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery.
I have been testing this patch against a stable/11 build. Over a 1Gb/s link with emulated 40ms RTT and (10^-4) loss rate, I use iperf from a FreeBSD node to send traffic to a 4.15.0-39-generic Ubuntu16.04 client.
Jan 3 2019
Jan 3 2019
rscheff added a comment to D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery.
Attached is a tcptrace of a real-world observed issue, where the lack of RFC6582 results in cwnd shrinking down to 1 MSS, followed by delayed ACK timeout and congestion avoidance growth of cwnd (1 MSS per RTT).
Jan 2 2019
Jan 2 2019
cc added a comment to D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery.
Thanks for the review request.
I will test this patch in Emulab.net before I give more feedback.
Dec 18 2018
Dec 18 2018
rscheff added a comment to D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery.
This packetdrill script should complete without error, when IW10 and the above patch are applied, for a SACK session, or non-SACK session.
rfc6582-test.pkt6 KBDownload
Dec 15 2018
Dec 15 2018
rscheff updated the diff for D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery.
Minor comment edit
and moving to GIT/Phabricator/ARC workflow
Nov 29 2018
Nov 29 2018
rscheff added a reviewer for D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery: cc.
rscheff added reviewers for D17614: RFC6582 - prevent cwnd to collapse down to 1 mss after exiting recovery: tuexen, rrs, hiren.
Oct 18 2018
Oct 18 2018
Oct 3 2018
Oct 3 2018
Oct 1 2018
Oct 1 2018
This LGTM taking @hiren suggestion to drop the unused TCPTV_CPU_VAR define. At LLNW we ran w/o delack to work around most of the issues this addresses in a more elegant way.
Jun 9 2018
Jun 9 2018
Jun 8 2018
Jun 8 2018
May 23 2018
May 23 2018
May 15 2018
May 15 2018
May 7 2018
May 7 2018
May 4 2018
May 4 2018
@lstewart ping
May 3 2018
May 3 2018
We needed to refine this further at ISLN.
@lstewart is this worth updating or should I just abandon?
Mar 9 2018
Mar 9 2018
Mar 8 2018
Mar 8 2018
I'll grab this and shovel it in after builds are done.
Fix comment per rstone and jegg
Mar 7 2018
Mar 7 2018
I've written some unit tests that covering these cases here:
Dec 17 2017
Dec 17 2017
Aug 29 2017
Aug 29 2017
Aug 25 2017
Aug 25 2017
sbruno closed D12003: Use counter(9) for PLPMTUD counters by committing rS322900: Use counter(9) for PLPMTUD counters..
Aug 15 2017
Aug 15 2017
Aug 14 2017
Aug 14 2017
Noob question, should freebsdversion bump since this alters the ABI?
Use the libxo plurals and fix the pmtud-failed label
Looks good (with one minor nit inline).
Aug 12 2017
Aug 12 2017
Oct 14 2016
Oct 14 2016
Oct 4 2016
Oct 4 2016