Date: Wed, 25 Jul 2007 10:32:36 +0400 From: Eygene Ryabinkin <rea-fbsd@codelabs.ru> To: Hugo Silva <hugo@barafranca.com> Cc: freebsd-current@FreeBSD.ORG Subject: Re: Spurious RST, segment rejected - possible pattern? Message-ID: <20070725063236.GG1510@void.codelabs.ru> In-Reply-To: <46A62DC9.7080409@barafranca.com> References: <46A62DC9.7080409@barafranca.com>
next in thread | previous in thread | raw e-mail | index | archive | help
Hugo, good day. Tue, Jul 24, 2007 at 05:50:17PM +0100, Hugo Silva wrote: >While conducting some benchmarks against various webserver software, (7-CURRENT >client vs 7-CURRENT server), I couldn't help notice that the flood of Spurious >RST (which only happens on the server side) seems to follow a specific pattern. <...> > Here's how it goes: > * webserver restarted @ #a > * benchmark runs and FAILS @ #b > Jul 24 17:31:46 bluebunny kernel: TCP: [192.168.0.1]:60033 to > [192.168.0.100]:80 tcpflags 0x4<RST>; tcp_input: Listen socket: Spurious RST, > segment rejected <...more RSTs...> This topic was raised in the freebsd-net, http://lists.freebsd.org/pipermail/freebsd-net/2007-July/014804.html http://lists.freebsd.org/pipermail/freebsd-net/2007-July/014808.html and in the freebsd-current, http://lists.freebsd.org/pipermail/freebsd-current/2007-July/074837.html The issue is understood, but it is currently not publicly known how to deal with it. But Andre Oppermann and Robert Watson are aware of it and Andre told us that he will think how to fix it. So, stay tuned for the fix ;)) Thank you. -- Eygene
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20070725063236.GG1510>