Skip site navigation (1)Skip section navigation (2)
Date:      Wed, 23 Aug 2023 04:34:11 +0000
From:      bugzilla-noreply@freebsd.org
To:        bugs@FreeBSD.org
Subject:   [Bug 273303] 5 sec delay happening intermenatingly from a customized web server on freebsd 11.2
Message-ID:  <bug-273303-227@https.bugs.freebsd.org/bugzilla/>

next in thread | raw e-mail | index | archive | help
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D273303

            Bug ID: 273303
           Summary: 5 sec delay happening intermenatingly from a
                    customized web server on freebsd 11.2
           Product: Base System
           Version: Unspecified
          Hardware: amd64
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: misc
          Assignee: bugs@FreeBSD.org
          Reporter: team_sus@outlook.com

Created attachment 244294
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=3D244294&action=
=3Dedit
5 sec delay Packet provided for inverstigation

Hi experts ,=20

We are using Version as unspecified because there is no option for FreeBSD =
11.2
RELEASE provided. Experiencing a delay of 5 sec in TCP communication with s=
low
client and Fast server ie when the client send and small window size this i=
ssue
is happening  .=20
Client is an Red hat machine and Server OS is FreeBSD 11.2 .=20
There is less traffic in the scenario. The same test is done with 10.4 and =
no
such issue is seeing.=20
Only difference in setup is we upgraded the 10.4 FreeBSD to 11.2. Providing=
 the
Packet capture for 11.2 Server packets. Cap for verification. The following=
 are
the observation:=20

1.Packet number 367 with window size 1428 is send from client (10.30.75.26)=
 to
the server (10.4.7.5)=20
2. You can see a delay of 4.99 from the Server side to acknowledge the clie=
nt .=20
3. Only when Window size is increased by the client  then only server is
responding to client=20
4. A deadlock is happening when it reach max TCP payload ie 1428 .=20

Extract from wireshark of 1428 window size :=20
Frame 370: 1494 bytes on wire (11952 bits), 1494 bytes captured (11952 bits)
Ethernet II, Src: IntelCor_d7:f2:70 (90:e2:ba:d7:f2:70), Dst:
MS-NLB-PhysServer-01_d7:a3:ab:03 (02:01:d7:a3:ab:03)
Internet Protocol Version 4, Src: 10.4.7.5, Dst: 10.30.75.26
Transmission Control Protocol, Src Port: 3128, Dst Port: 64533, Seq: 430554,
Ack: 1403, Len: 1428
    Source Port: 3128
    Destination Port: 64533
    [Stream index: 0]
    [Conversation completeness: Complete, WITH_DATA (31)]
    [TCP Segment Len: 1428]
    Sequence Number: 430554    (relative sequence number)
    Sequence Number (raw): 3852589341
    [Next Sequence Number: 431982    (relative sequence number)]
    Acknowledgment Number: 1403    (relative ack number)
    Acknowledgment number (raw): 2328136965
    1000 .... =3D Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window: 1002
    [Calculated window size: 64128]
    [Window size scaling factor: 64]
    Checksum: 0x6bfb [unverified]
    [Checksum Status: Unverified]
    Urgent Pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
        TCP Option - No-Operation (NOP)
        TCP Option - No-Operation (NOP)
        TCP Option - Timestamps
    [Timestamps]
    [SEQ/ACK analysis]
    TCP payload (1428 bytes)
    [Reassembled PDU in frame: 381]
    TCP segment data (1428 bytes)

--=20
You are receiving this mail because:
You are the assignee for the bug.=



Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?bug-273303-227>