Netgate Discussion Forum
    • Categories
    • Recent
    • Tags
    • Popular
    • Users
    • Search
    • Register
    • Login

    Increased Memory and CPU Spikes (causing latency/outage) with 2.4.5

    Scheduled Pinned Locked Moved Problems Installing or Upgrading pfSense Software
    141 Posts 40 Posters 43.0k Views
    Loading More Posts
    • Oldest to Newest
    • Newest to Oldest
    • Most Votes
    Reply
    • Reply as topic
    Log in to reply
    This topic has been deleted. Only users with topic management privileges can see it.
    • bmeeksB
      bmeeks
      last edited by

      I currently have no dog in this fight since I don't run pfBlockerNG-devel and I have not yet upgraded my SG-5100 to 2.4.5 (but I do plan to).

      I found this Errata Notice in the Release Notes for FreeBSD 11/STABLE -- https://www.freebsd.org/security/advisories/FreeBSD-EN-20:04.pfctl.asc. Since several of you, and some posters in other threads, are complaining about high utilization from pfctl, the patch this errata notice talks about might be of interest.

      ? 1 Reply Last reply Reply Quote 0
      • ?
        A Former User @bmeeks
        last edited by

        @bmeeks Thanks! I will add that the issue exists without pfblocker. pfblocker just adds a bunch of large alias's that exacerbate the issue.

        bmeeksB BBcan177B 2 Replies Last reply Reply Quote 0
        • bmeeksB
          bmeeks @A Former User
          last edited by bmeeks

          @jwj said in Increased Memory and CPU Spikes (causing latency/outage) with 2.4.5:

          @bmeeks Thanks! I will add that the issue exists without pfblocker. pfblocker just adds a bunch of large alias's that exacerbate the issue.

          Notice in the header for the posted Errata who is credited with the "fix" and read what the fix was about -- increasing table size limits (I think for IPv6 bogons and a side effect of allowing bigger pfBlockerNG lists). I have not looked at the actual patch, so maybe it is not related -- but it definitely might be worth looking into. Perhaps there are unintended adverse side effects from the change ???

          ? 1 Reply Last reply Reply Quote 0
          • BBcan177B
            BBcan177 Moderator @A Former User
            last edited by

            @jwj and others
            Try to reduce the setting in: pfSense > Advanced > Firewall & NAT > Firewall Maximum Table Entries as per this thread:
            https://www.reddit.com/r/PFSENSE/comments/fsx4mx/fix_for_tmprulesdebug28_cannot_define_table_pfb/

            "Experience is something you don't get until just after you need it."

            Website: http://pfBlockerNG.com
            Twitter: @BBcan177  #pfBlockerNG
            Reddit: https://www.reddit.com/r/pfBlockerNG/new/

            T 1 Reply Last reply Reply Quote 0
            • ?
              A Former User @bmeeks
              last edited by

              So, we already have the "fix".

              bmeeksB 1 Reply Last reply Reply Quote 0
              • T
                tman222 @BBcan177
                last edited by

                @BBcan177 said in Increased Memory and CPU Spikes (causing latency/outage) with 2.4.5:

                @jwj and others
                Try to reduce the setting in: pfSense > Advanced > Firewall & NAT > Firewall Maximum Table Entries as per this thread:
                https://www.reddit.com/r/PFSENSE/comments/fsx4mx/fix_for_tmprulesdebug28_cannot_define_table_pfb/

                Thanks @BBcan177 - mine is currently set at the default (2 Million). Should it be reduced below that to help mitigate the load and latency spikes?

                Thanks again.

                BBcan177B ? 2 Replies Last reply Reply Quote 0
                • BBcan177B
                  BBcan177 Moderator @tman222
                  last edited by

                  @tman222
                  I have no idea. This is why I am asking users to try lower values and see how it responds.

                  "Experience is something you don't get until just after you need it."

                  Website: http://pfBlockerNG.com
                  Twitter: @BBcan177  #pfBlockerNG
                  Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                  1 Reply Last reply Reply Quote 0
                  • bmeeksB
                    bmeeks @A Former User
                    last edited by bmeeks

                    @jwj said in Increased Memory and CPU Spikes (causing latency/outage) with 2.4.5:

                    So, we already have the "fix".

                    It appears to me, from reading the FreeBSD 11/STABLE Release Notes, that the patch submitted for pfctl was accepted and incorporated. So I would assume that patch also made its way into pfSense-2.4.5.

                    It's possible that patch has some unintended side effects. And since the problems seem to be triggered by users doing things that cause pfctl to come into play (reloading filters or updating alias tables), that is more circumstantial evidence of a possible link to recent pfctl changes and the utilization/latency issue.

                    1 Reply Last reply Reply Quote 0
                    • ?
                      A Former User @tman222
                      last edited by

                      @tman222 I just played about with this. Removed block bogons on my WAN. Tried various table size settings from 100000 to, what for me was the default. 4000000. Didn't notice any difference. Checked the system log to look for memory allocation issues, there were none at each setting.

                      BBcan177B 1 Reply Last reply Reply Quote 0
                      • BBcan177B
                        BBcan177 Moderator @A Former User
                        last edited by BBcan177

                        @jwj
                        You need to run a "Filter Reload" and/or a Reboot to fully ensure it took effect.

                        "Experience is something you don't get until just after you need it."

                        Website: http://pfBlockerNG.com
                        Twitter: @BBcan177  #pfBlockerNG
                        Reddit: https://www.reddit.com/r/pfBlockerNG/new/

                        ? 1 Reply Last reply Reply Quote 0
                        • ?
                          A Former User @BBcan177
                          last edited by

                          @BBcan177 I did, filter reload. It warns you if you increase it such that a reboot is required.

                          1 Reply Last reply Reply Quote 0
                          • ?
                            A Former User
                            last edited by A Former User

                            @BBcan177 @bmeeks Thanks for all your help and involvement since 2.4.5 was released. Your packages are fine but you have done your best to help as many as possible. 👏

                            1 Reply Last reply Reply Quote 0
                            • nzkiwi68N
                              nzkiwi68
                              last edited by

                              I'm experiencing the same issues as reported here under my post "Upgrade HA cluster 2.4.4-p3 to 2.4.5 - persistent CARP maintenance mode causes gateway instability" https://forum.netgate.com/topic/151698/upgrade-ha-cluster-2-4-4-p3-to-2-4-5-persistent-carp-maintenance-mode-causes-gateway-instability

                              2 sites now running really badly. Both sites running 10Gbase-SR with multi VLANs on the 10 Gb interfaces.

                              SiteA - main problem
                              Cannot have both firewalls up, primary and backup. If you do, zero VPN traffic passes over direct traditional site to site IPSEC or over the VTI routed FRR interfaces.
                              Left with the backup firewall powered off and the site is working.

                              SiteB - main problem
                              Massive instability following a reboot, and it just carries on and on, with all three gateways on both the primary and secondary firewall going nuts. The firewalls stagger and drop packets. In the end left the backup firewall powered off and after about 10-15 minutes following a reboot, the gateways stop going offline and the firewall settles down and becomes stable.

                              1 Reply Last reply Reply Quote 0
                              • ?
                                A Former User
                                last edited by A Former User

                                @bmeeks @BBcan177

                                I turned off bogons. I deactivated pfblocker. I set the max table size to 60000. Rebooted. The reboot was quick again, like 2.4.4-p3. I ping6 google.com from a lan side device while doing a filter reload. The ping times don't change by any meaningful amount.

                                Makes me wonder if the pfctl fix was overlooked when the release was built?

                                Set max table size to 100000. Reboot. Reboot is longer again. Turn on pfblocker and some ip lists that add up to more than 60000 but less than 100000. Problem returns. Latency when reloading the filters. Bigger tables bigger problem.

                                Edited to add: the max table size doesn't appear to make any difference, other than setting a hard limit on table size. The actual size of the aliases/tables is what triggers the problem.

                                It sure looks to me that anything over that sixty some thousand mark causes the issue. I could be wrong, wouldn't be the first time, but this sure looks like the issue.

                                bmeeksB 2 Replies Last reply Reply Quote 0
                                • bmeeksB
                                  bmeeks @A Former User
                                  last edited by bmeeks

                                  @jwj said in Increased Memory and CPU Spikes (causing latency/outage) with 2.4.5:

                                  @bmeeks @BBcan177

                                  I turned off bogons. I deactivated pfblocker. I set the max table size to 60000. Rebooted. The reboot was quick again, like 2.4.4-p3. I ping6 google.com from a lan side device while doing a filter reload. The ping times don't change by any meaningful amount.

                                  Makes me wonder if the pfctl fix was overlooked when the release was built?

                                  Set max table size to 100000. Reboot. Reboot is longer again. Turn on pfblocker and some ip lists that add up to more than 60000 but less than 100000. Problem returns. Latency when reloading the filters. Bigger tables bigger problem.

                                  Edited to add: the max table size doesn't appear to make any difference, other than setting a hard limit on table size. The actual size of the aliases/tables is what triggers the problem.

                                  It sure looks to me that anything over that sixty some thousand mark causes the issue. I could be wrong, wouldn't be the first time, but this sure looks like the issue.

                                  The actual patch file can be accessed here: https://security.FreeBSD.org/patches/EN-20:04/pfctl.patch. What the patch does is remove the former arbitrary hardcoded limit of 65,535 (defined as PF_TABLES_MAX_REQUEST) and allows the use of a sysctl parameter instead. Deeper research into the other pf related source code would be required to determine if allowing that larger PF_TABLES_MAX_REQUEST value has an adverse impact.

                                  Looking a bit farther into what the patch actually does gives me a theory. The 65,535 number does not appear to be a limit on the number of IP addresses in a given table. It appears, instead, to be a limit on the number of tables or addresses you can add to the firewall during a single call to the corresponding ioctl() function. That limit was formerly hardcoded to 65,535. Now, with the addition of a sysctl variable for customizing this limit, I can envision a scenario where with a very high value for this new sysctl value that you are overloading the other pf areas. In particular, you would be requesting "too many tables and/or addresses in a single ioctl() call". So this may well be why lowering the value improves performance! You are no longer "overloading" the other ioctl routines that are actually creating the tables or addresses in RAM.

                                  getcomG 2 Replies Last reply Reply Quote 0
                                  • getcomG
                                    getcom @getcom
                                    last edited by

                                    @getcom said in Increased Memory and CPU Spikes (causing latency/outage) with 2.4.5:

                                    The system is not accessible for minutes if anything changed.
                                    As I added some new VLANs it never came back, I had to go onsite for a reboot which is not so easy at the moment because everybody is working from home.

                                    It happened again: I need a VLAN tag on one interface which was previously working as normal device.

                                    • created a new VLAN
                                    • changed name of parent device because name should be reused in the VLAN device
                                    • changed static IPv4 to none
                                    • press Save
                                    • apply change
                                    • bamm...connection interrupted, VPN stays connected, but without any traffic...it does not come back, VPN reconnection not working
                                    • no chance to connect over the second gateway
                                    • again I have to go onsite

                                    This is a dual WAN/tier 1/tier 2 setup.
                                    With 2.4.5 in a multiwan setup you cannot change anything on the interfaces without loosing the firewall.
                                    This is a show blocker and loosing larger lists too.
                                    Tomorrow I will drive to the customer and rollback to the 2.4.4-p3 release and the previous pfB until there is a fix available..

                                    nzkiwi68N 1 Reply Last reply Reply Quote 0
                                    • ?
                                      A Former User
                                      last edited by

                                      Seeing as this appears to affect so many people, is it worth writing up a decent Redmine ticket and submitting it?

                                      D 1 Reply Last reply Reply Quote 1
                                      • bmeeksB
                                        bmeeks @A Former User
                                        last edited by bmeeks

                                        @jwj said in Increased Memory and CPU Spikes (causing latency/outage) with 2.4.5:

                                        @bmeeks @BBcan177

                                        I turned off bogons. I deactivated pfblocker. I set the max table size to 60000. Rebooted. The reboot was quick again, like 2.4.4-p3. I ping6 google.com from a lan side device while doing a filter reload. The ping times don't change by any meaningful amount.

                                        Makes me wonder if the pfctl fix was overlooked when the release was built?

                                        Set max table size to 100000. Reboot. Reboot is longer again. Turn on pfblocker and some ip lists that add up to more than 60000 but less than 100000. Problem returns. Latency when reloading the filters. Bigger tables bigger problem.

                                        Edited to add: the max table size doesn't appear to make any difference, other than setting a hard limit on table size. The actual size of the aliases/tables is what triggers the problem.

                                        It sure looks to me that anything over that sixty some thousand mark causes the issue. I could be wrong, wouldn't be the first time, but this sure looks like the issue.

                                        See my later edit to my post here: https://forum.netgate.com/topic/151690/increased-memory-and-cpu-spikes-causing-latency-outage-with-2-4-5/91. I have a theory why a value less that 65,536 seems to work better.

                                        ? 1 Reply Last reply Reply Quote 0
                                        • getcomG
                                          getcom @bmeeks
                                          last edited by

                                          This post is deleted!
                                          1 Reply Last reply Reply Quote 0
                                          • ?
                                            A Former User @bmeeks
                                            last edited by

                                            @bmeeks Makes sense, since they're all loaded with one call. Total number of all tables would have to be under that number.

                                            Also makes me take note of the fact that the "fork" of pfsense is still on 11.2 even as they have been more aggressive with pursuing freebsd upgrades historically.

                                            bmeeksB 1 Reply Last reply Reply Quote 0
                                            • First post
                                              Last post
                                            Copyright 2025 Rubicon Communications LLC (Netgate). All rights reserved.