From owner-freebsd-net@FreeBSD.ORG Tue Oct 28 11:32:11 2003 Return-Path: Delivered-To: freebsd-net@freebsd.org Received: from mx1.FreeBSD.org (mx1.freebsd.org [216.136.204.125]) by hub.freebsd.org (Postfix) with ESMTP id B076316A4CF for ; Tue, 28 Oct 2003 11:32:11 -0800 (PST) Received: from arginine.spc.org (arginine.spc.org [195.206.69.236]) by mx1.FreeBSD.org (Postfix) with ESMTP id 9E35843FF7 for ; Tue, 28 Oct 2003 11:32:06 -0800 (PST) (envelope-from bms@spc.org) Received: from localhost (localhost [127.0.0.1]) by arginine.spc.org (Postfix) with ESMTP id A52B76530D; Tue, 28 Oct 2003 05:01:10 +0000 (GMT) Received: from arginine.spc.org ([127.0.0.1]) by localhost (arginine.spc.org [127.0.0.1]) (amavisd-new, port 10024) with LMTP id 93379-05-3; Tue, 28 Oct 2003 05:01:10 +0000 (GMT) Received: from saboteur.dek.spc.org (unknown [81.3.72.68]) (using TLSv1 with cipher DHE-RSA-AES256-SHA (256/256 bits)) (No client certificate requested) by arginine.spc.org (Postfix) with ESMTP id 763E06530A; Tue, 28 Oct 2003 05:01:09 +0000 (GMT) Received: by saboteur.dek.spc.org (Postfix, from userid 1001) id 3D5CE28; Tue, 28 Oct 2003 05:01:04 +0000 (GMT) Date: Tue, 28 Oct 2003 05:01:03 +0000 From: Bruce M Simpson To: Mike Silbersack Message-ID: <20031028050103.GA7279@saboteur.dek.spc.org> Mail-Followup-To: Mike Silbersack , freebsd-net@freebsd.org References: <20031027014854.K2023@odysseus.silby.com> Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20031027014854.K2023@odysseus.silby.com> cc: freebsd-net@freebsd.org Subject: Re: Changes to PCBPORTHASH wrt TCP, review needed X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.1 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Tue, 28 Oct 2003 19:32:11 -0000 On Mon, Oct 27, 2003 at 02:16:13AM -0600, Mike Silbersack wrote: > One easy way to test this patch is to install http_load, set your > ephemeral port range to something in the range of 30, and have it start > testing a host. It will quickly create TIME_WAIT sockets filling all > ephemeral ports. Without this patch, you will be unable to create > outgoing connections; with this patch, other outgoing connections will be > fine. I can confirm I can replicate this behaviour with 5.1-CURRENT and 5.1-RELEASE with http_load. We discussed on IRC that this problem of ephemeral port hash mapping may also affect udp PCBs, and that it may be having undesirable effects with multiple concurrent media streams, as RTP/RTCP is a heavy udp socket consumer in a large installation, and has specific requirements for binding consecutive odd/even port pairs (more details in RFC 3550 for those who care). I will test the patch shortly. I have looked over it and can't find any immediate problems with it, but further digestion on my part is required. BMS