add new Congestion-Control Algorithms
-
Typically when you see counters for packets not forwardable in netstat, it is because you are missing a route to localhost.
For reference :
https://docs.oracle.com/cd/E19253-01/816-4555/ppp.trouble-108/index.html
-
@mrancier said in add new Congestion-Control Algorithms:
Typically when you see counters for packets not forwardable in netstat, it is because you are missing a route to localhost
What rules or routes do I need to add?
-
@yon-0 Hard to say without a visual, but I will ask this : If the issue does happen on 2.4.4p3, there is a possibility, albeit small, that there may be a bug in the PPPoE client.
-
@mrancier i am using pf2.5 newest version
-
ip6:
1301746 total packets received
0 with size smaller than minimum
0 with data size < data length
0 with bad options
18 with incorrect version number
0 fragments received
0 fragments dropped (dup or out of space)
0 fragments dropped after timeout
0 fragments that exceeded limit
0 packets reassembled ok
416553 packets for this host
855286 packets forwarded
2615 packets not forwardable
0 redirects sent
500503 packets sent from this host
0 packets sent with fabricated ip header
0 output packets dropped due to no bufs, etc.
1225 output packets discarded due to no route
0 output datagrams fragmented
0 fragments created
0 datagrams that can't be fragmented
0 packets that violated scope rules
325 multicast packets which we don't join
Input histogram:
hop by hop: 235
TCP: 568585
UDP: 597299
ICMP6: 135609
Mbuf statistics:
557747 one mbuf
two or more mbuf:
lo0= 2398
741601 one ext mbuf
0 two or more ext mbuf
0 packets whose headers are not contiguous
0 tunneling packets that can't find gif
0 packets discarded because of too many headers
450 failures of source address selection
source addresses on an outgoing I/F
8986 link-locals
11506 globals
source addresses on a non-outgoing I/F
2 globals
450 addresses scope=0xf
source addresses of same scope
8984 link-locals
11508 globals
source addresses of a different scope
2 link-locals
Source addresses selection rule applied:
20494 first candidate
450 same address
8290 appropriate scope
3216 outgoing interface
885 longest match -
@yon-0 said in add new Congestion-Control Algorithms:
packets not forwardable
netstat -m
40123/4667/44790 mbufs in use (current/cache/total)
11125/2311/13436/1000000 mbuf clusters in use (current/cache/total/max)
102/2175 mbuf+clusters out of packet secondary zone in use (current/cache)
2/206/208/524288 4k (page size) jumbo clusters in use (current/cache/total/max)
0/0/0/524288 9k jumbo clusters in use (current/cache/total/max)
0/0/0/124480 16k jumbo clusters in use (current/cache/total/max)
32295K/6612K/38908K bytes allocated to network (current/cache/total)
0/0/0 requests for mbufs denied (mbufs/clusters/mbuf+clusters)
0/0/0 requests for mbufs delayed (mbufs/clusters/mbuf+clusters)
0/0/0 requests for jumbo clusters delayed (4k/9k/16k)
0/0/0 requests for jumbo clusters denied (4k/9k/16k)
0 sendfile syscalls
0 sendfile syscalls completed without I/O request
0 requests for I/O initiated by sendfile
0 pages read by sendfile as part of a request
0 pages were valid at time of a sendfile request
0 pages were valid and substituted to bogus page
0 pages were requested for read ahead by applications
0 pages were read ahead by sendfile
0 times sendfile encountered an already busy page
0 requests for sfbufs denied
0 requests for sfbufs delayed -
@mrancier said in add new Congestion-Control Algorithms:
Cc_cdg.ko depends on h_ertt, so both modules need to be there, otherwise cdg will fail kload.
what's CUBIC need load modules?
-
cc_cubic.ko is the name.
-
cubic and cdg still unable to solve the problem of no speed caused by carrier network packet loss. There is a need to increase competitiveness and prevent the impact of ISP QOS on us.
-
now the pf 2.5 version not work for this .
-
why pfsense v2.5 cant load the freebsd v12.1 cc_htcp so on?
kldload h_ertt kldload: an error occurred while loading module h_ertt. Please check dmesg(8) for more details. [2.5.0-DEVELOPMENT][admin@]/root: kldload cc_htcp kldload: an error occurred while loading module cc_htcp. Please check dmesg(8) for more details
-
pf 2.4.5 -p1 still work, pf2.5 not work, added cdg
kldstat Id Refs Address Size Name 1 18 0xffffffff80200000 37191d8 kernel 2 1 0xffffffff83a21000 10c0 cpuctl.ko 3 1 0xffffffff83a23000 7028 aesni.ko 4 1 0xffffffff83a2b000 32d8 cryptodev.ko 5 1 0xffffffff83a2f000 1580 amdtemp.ko 6 1 0xffffffff83a31000 848 amdsmn.ko 7 2 0xffffffff83a32000 850 h_ertt.ko 8 1 0xffffffff83a33000 1dc4 cc_cdg.ko
-
@yon-0 Liked your consistent testing ... good job!
-
@yon-0 Sorry about the lack of response. I was unaware you'd replied. Unfortunately, I've moved on to a competing product which is already on the freebsd 12.1 release in production and has ZERO issues with any and all mods to the underlying OS.
-
@mrancier said in add new Congestion-Control Algorithms:
@yon-0 Sorry about the lack of response. I was unaware you'd replied. Unfortunately, I've moved on to a competing product which is already on the freebsd 12.1 release in production and has ZERO issues with any and all mods to the underlying OS.
what is your using system now? i have try opnsense, But I am not very familiar with it, and there are some usage problems.
Yes, there are a lot of system problems here. Many of them are too late to report, and there are still many problems that have not been reported. It's just that I have been using it and the operation is more familiar.
-
@yon-0 Opnsense 20.7.1. Modules are readily available in the OS and load without issue. I have used htcp, cdg and cubic. Currently on Cubic and works quite well. Also, seems to be better at respecting loader.conf and loader.conf.local mods. No hardcoded kernel patches that I am aware of anyway.
-
@mrancier said in add new Congestion-Control Algorithms:
@yon-0 Opnsense 20.7.1. Modules are readily available in the OS and load without issue. I have used htcp, cdg and cubic. Currently on Cubic and works quite well. Also, seems to be better at respecting loader.conf and loader.conf.local mods. No hardcoded kernel patches that I am aware of anyway.
Have a chance to learn from you.