Date: Wed, 23 Aug 2023 04:34:11 +0000 From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 273303] 5 sec delay happening intermenatingly from a customized web server on freebsd 11.2 Message-ID: <bug-273303-227@https.bugs.freebsd.org/bugzilla/>
next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D273303 Bug ID: 273303 Summary: 5 sec delay happening intermenatingly from a customized web server on freebsd 11.2 Product: Base System Version: Unspecified Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: misc Assignee: bugs@FreeBSD.org Reporter: team_sus@outlook.com Created attachment 244294 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D244294&action= =3Dedit 5 sec delay Packet provided for inverstigation Hi experts ,=20 We are using Version as unspecified because there is no option for FreeBSD = 11.2 RELEASE provided. Experiencing a delay of 5 sec in TCP communication with s= low client and Fast server ie when the client send and small window size this i= ssue is happening .=20 Client is an Red hat machine and Server OS is FreeBSD 11.2 .=20 There is less traffic in the scenario. The same test is done with 10.4 and = no such issue is seeing.=20 Only difference in setup is we upgraded the 10.4 FreeBSD to 11.2. Providing= the Packet capture for 11.2 Server packets. Cap for verification. The following= are the observation:=20 1.Packet number 367 with window size 1428 is send from client (10.30.75.26)= to the server (10.4.7.5)=20 2. You can see a delay of 4.99 from the Server side to acknowledge the clie= nt .=20 3. Only when Window size is increased by the client then only server is responding to client=20 4. A deadlock is happening when it reach max TCP payload ie 1428 .=20 Extract from wireshark of 1428 window size :=20 Frame 370: 1494 bytes on wire (11952 bits), 1494 bytes captured (11952 bits) Ethernet II, Src: IntelCor_d7:f2:70 (90:e2:ba:d7:f2:70), Dst: MS-NLB-PhysServer-01_d7:a3:ab:03 (02:01:d7:a3:ab:03) Internet Protocol Version 4, Src: 10.4.7.5, Dst: 10.30.75.26 Transmission Control Protocol, Src Port: 3128, Dst Port: 64533, Seq: 430554, Ack: 1403, Len: 1428 Source Port: 3128 Destination Port: 64533 [Stream index: 0] [Conversation completeness: Complete, WITH_DATA (31)] [TCP Segment Len: 1428] Sequence Number: 430554 (relative sequence number) Sequence Number (raw): 3852589341 [Next Sequence Number: 431982 (relative sequence number)] Acknowledgment Number: 1403 (relative ack number) Acknowledgment number (raw): 2328136965 1000 .... =3D Header Length: 32 bytes (8) Flags: 0x010 (ACK) Window: 1002 [Calculated window size: 64128] [Window size scaling factor: 64] Checksum: 0x6bfb [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps TCP Option - No-Operation (NOP) TCP Option - No-Operation (NOP) TCP Option - Timestamps [Timestamps] [SEQ/ACK analysis] TCP payload (1428 bytes) [Reassembled PDU in frame: 381] TCP segment data (1428 bytes) --=20 You are receiving this mail because: You are the assignee for the bug.=
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-273303-227>