Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 25 Jul 2007 10:32:36 +0400
From:      Eygene Ryabinkin <rea-fbsd@codelabs.ru>
To:        Hugo Silva <hugo@barafranca.com>
Cc:        freebsd-current@FreeBSD.ORG
Subject:   Re: Spurious RST, segment rejected - possible pattern?
Message-ID:  <20070725063236.GG1510@void.codelabs.ru>
In-Reply-To: <46A62DC9.7080409@barafranca.com>
References:  <46A62DC9.7080409@barafranca.com>

next in thread | previous in thread | raw e-mail | index | archive | help
Hugo, good day.

Tue, Jul 24, 2007 at 05:50:17PM +0100, Hugo Silva wrote:
>While conducting some benchmarks against various webserver software, (7-CURRENT
>client vs 7-CURRENT server), I couldn't help notice that the flood of Spurious
>RST (which only happens on the server side) seems to follow a specific pattern.
<...>
> Here's how it goes:
> * webserver restarted @ #a
> * benchmark runs and FAILS @ #b
> Jul 24 17:31:46 bluebunny kernel: TCP: [192.168.0.1]:60033 to 
> [192.168.0.100]:80 tcpflags 0x4<RST>; tcp_input: Listen socket: Spurious RST, 
> segment rejected
<...more RSTs...>

This topic was raised in the freebsd-net,
    http://lists.freebsd.org/pipermail/freebsd-net/2007-July/014804.html
    http://lists.freebsd.org/pipermail/freebsd-net/2007-July/014808.html
and in the freebsd-current,
    http://lists.freebsd.org/pipermail/freebsd-current/2007-July/074837.html

The issue is understood, but it is currently not publicly known
how to deal with it.  But Andre Oppermann and Robert Watson are
aware of it and Andre told us that he will think how to fix it.

So, stay tuned for the fix ;))

Thank you.
-- 
Eygene



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20070725063236.GG1510>