From nobody Tue Apr 04 12:54:13 2023 X-Original-To: bugs@mlmmj.nyi.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mlmmj.nyi.freebsd.org (Postfix) with ESMTP id 4PrSPx6Gftz43XVY for ; Tue, 4 Apr 2023 12:54:13 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.nyi.freebsd.org (mxrelay.nyi.freebsd.org [IPv6:2610:1c1:1:606c::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256 client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.nyi.freebsd.org", Issuer "R3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 4PrSPx2lRGz4P8j for ; Tue, 4 Apr 2023 12:54:13 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=freebsd.org; s=dkim; t=1680612853; h=from:from:reply-to:subject:subject:date:date:message-id:message-id: to:to:cc:mime-version:mime-version:content-type:content-type: content-transfer-encoding:content-transfer-encoding; bh=NmW2ReDMXoK/GH4+Kabcc5IopY3QCh2V6UmC8hk4BLI=; b=rv3nk2yqwS1opz4uEK5ihxMpIZTAdA9/2tW7s35SB+74tWhH/Q48d8usv00/Y0KuhMCY/L EGrec6uweyeoyP2EX7/aPfPWwoUB8yFogmbXf2hrm2Knc7vXsHprLh3pLMTq7pmkc73+Pf F0TO3VX47X7ovpWfSLFaCvqYfp9mSYr9ID5XVvWWx5Ftas4v/ic0cO8sMmI+kYsJniqhl3 cxqAdmhb2j+bNF3Sndfw+BmAih7Dux597Tlp/pmJq9iJE/rOh4LENGwxGLtmYBLYtnBaeD TCfD53NmYa1ql9kt7HQukt+K1Ngs55lmcb4zJnGePjlMTCtXoNEzp29pNSk08w== ARC-Authentication-Results: i=1; mx1.freebsd.org; none ARC-Seal: i=1; s=dkim; d=freebsd.org; t=1680612853; a=rsa-sha256; cv=none; b=tAMmOAYTYBaGv2D+j378kPni0GLkxhmeW/mQTD7Uhehk+mwbAHkjdEUuCrIVMUsRWOE8Vl IPgxOlAY/NDehGFLVYtDApYT58PFIvBHEMeJKWH35ynxdJZt19BNuSEL+Ggvu+UA59vqnc PwzjUSyXAvyhyD/Fe6X/JTvKS20XkiiP6j7rbEBWHndNIS3dVYdK7lgYI9+DnrWP7nA7ID XdXDG5tun8VHo4FCzluG9dwUG+xZnG5ojUL6QggxnzSkRqcND7X8EO9LlX2qed0roaUNQd wQ9x7OGT1JBsV7eou3WCAMiPEqiQ1HkcvBKExlbLAnPMSchkpjzWNJQ+5xcJBA== Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2610:1c1:1:606c::50:1d]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) key-exchange X25519 server-signature RSA-PSS (4096 bits) server-digest SHA256) (Client did not present a certificate) by mxrelay.nyi.freebsd.org (Postfix) with ESMTPS id 4PrSPx1nXMzgYV for ; Tue, 4 Apr 2023 12:54:13 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.5]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id 334CsDYk090293 for ; Tue, 4 Apr 2023 12:54:13 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id 334CsD9B090292 for bugs@FreeBSD.org; Tue, 4 Apr 2023 12:54:13 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 270636] Netmap leaks mbufs when receiving frames in generic mode on AMD Ryzen Date: Tue, 04 Apr 2023 12:54:13 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 13.1-STABLE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: koverskeid@gmail.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated List-Id: Bug reports List-Archive: https://lists.freebsd.org/archives/freebsd-bugs List-Help: List-Post: List-Subscribe: List-Unsubscribe: Sender: owner-freebsd-bugs@freebsd.org MIME-Version: 1.0 X-ThisMailContainsUnwantedMimeParts: N https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D270636 Bug ID: 270636 Summary: Netmap leaks mbufs when receiving frames in generic mode on AMD Ryzen Product: Base System Version: 13.1-STABLE Hardware: amd64 OS: Any Status: New Severity: Affects Only Me Priority: --- Component: kern Assignee: bugs@FreeBSD.org Reporter: koverskeid@gmail.com $uname -a FreeBSD freebsd 13.1-RELEASE FreeBSD 13.1-RELEASE releng/13.1-n250148-fc952ac2212 GENERIC amd64 $sysctl hw.model hw.machine hw.ncpu hw.model: AMD Ryzen Embedded V1202B with Radeon Vega Gfx hw.machine: amd64 hw.ncpu: 2 $pciconf -lv | grep -A1 -B3 network igb0@pci0:1:0:0: class=3D0x020000 rev=3D0x03 hdr=3D0x00 vendor=3D0x8= 086 device=3D0x1533 subvendor=3D0x8086 subdevice=3D0x1533 vendor =3D 'Intel Corporation' device =3D 'I210 Gigabit Network Connection' class =3D network subclass =3D ethernet $sysctl net.inet.tcp.functions_available net.inet.tcp.functions_available: Stack D Alias PCB count freebsd * freebsd 6 In netmap native mode after bombarding the machine with packets: $netstat -m 6145/2240/8385 mbufs in use (current/cache/total) 2048/2270/4318/438928 mbuf clusters in use (current/cache/total/max) 0/508 mbuf+clusters out of packet secondary zone in use (current/cache) 0/508/508/219464 4k (page size) jumbo clusters in use (current/cache/total/= max) 0/0/0/65026 9k jumbo clusters in use (current/cache/total/max) 0/0/0/36577 16k jumbo clusters in use (current/cache/total/max) 5632K/7132K/12764K bytes allocated to network (current/cache/total) 0/0/0 requests for mbufs denied (mbufs/clusters/mbuf+clusters) 0/0/0 requests for mbufs delayed (mbufs/clusters/mbuf+clusters) 0/0/0 requests for jumbo clusters delayed (4k/9k/16k) 0/0/0 requests for jumbo clusters denied (4k/9k/16k) 0 sendfile syscalls 0 sendfile syscalls completed without I/O request 0 requests for I/O initiated by sendfile 0 pages read by sendfile as part of a request 0 pages were valid at time of a sendfile request 0 pages were valid and substituted to bogus page 0 pages were requested for read ahead by applications 0 pages were read ahead by sendfile 0 times sendfile encountered an already busy page 0 requests for sfbufs denied 0 requests for sfbufs delayed In generic mode: $sysctl dev.netmap.admode=3D2 ***bombarding the machine with frames***=20 $netstat -m 442160/1330/443490 mbufs in use (current/cache/total) 438080/848/438928/438928 mbuf clusters in use (current/cache/total/max) 0/508 mbuf+clusters out of packet secondary zone in use (current/cache) 0/508/508/219464 4k (page size) jumbo clusters in use (current/cache/total/= max) 0/0/0/65026 9k jumbo clusters in use (current/cache/total/max) 0/0/0/36577 16k jumbo clusters in use (current/cache/total/max) 986700K/4060K/990760K bytes allocated to network (current/cache/total) 0/264033/0 requests for mbufs denied (mbufs/clusters/mbuf+clusters) 0/0/0 requests for mbufs delayed (mbufs/clusters/mbuf+clusters) 0/0/0 requests for jumbo clusters delayed (4k/9k/16k) 0/0/0 requests for jumbo clusters denied (4k/9k/16k) 0 sendfile syscalls 0 sendfile syscalls completed without I/O request 0 requests for I/O initiated by sendfile 0 pages read by sendfile as part of a request 0 pages were valid at time of a sendfile request 0 pages were valid and substituted to bogus page 0 pages were requested for read ahead by applications 0 pages were read ahead by sendfile 0 times sendfile encountered an already busy page 0 requests for sfbufs denied 0 requests for sfbufs delayed $dmesg [zone: mbuf_cluster] kern.ipc.nmbclusters limit reached The number of mbuf clusters in use doesn't decrease even if I remove the network traffic or close the netmap port.=20 I am testing withouth sending any frames from the machine. I have reproduced the behavior on 13.2-STABLE and 14.0-CURRENT. I am running exactly the same testprogram on HW with Intel Atom processor a= nd the same NIC(I210) without a problem. --=20 You are receiving this mail because: You are the assignee for the bug.=