From owner-freebsd-hackers Mon Jan 11 02:21:26 1999 Return-Path: Received: (from majordom@localhost) by hub.freebsd.org (8.8.8/8.8.8) id CAA11456 for freebsd-hackers-outgoing; Mon, 11 Jan 1999 02:21:26 -0800 (PST) (envelope-from owner-freebsd-hackers@FreeBSD.ORG) Received: from widefw.csl.sony.co.jp (widefw.csl.sony.co.jp [133.138.1.1]) by hub.freebsd.org (8.8.8/8.8.8) with ESMTP id CAA11419 for ; Mon, 11 Jan 1999 02:20:49 -0800 (PST) (envelope-from kjc@csl.sony.co.jp) Received: from hotaka.csl.sony.co.jp (root@hotaka.csl.sony.co.jp [43.27.98.57]) by widefw.csl.sony.co.jp (8.8.8/3.6W) with ESMTP id TAA24683; Mon, 11 Jan 1999 19:20:07 +0900 (JST) Received: from localhost (kjc@[127.0.0.1]) by hotaka.csl.sony.co.jp (8.8.8/3.6W/hotaka/98122515) with ESMTP id TAA13847; Mon, 11 Jan 1999 19:20:06 +0900 (JST) Message-Id: <199901111020.TAA13847@hotaka.csl.sony.co.jp> To: Mohit Aron cc: freebsd-hackers@FreeBSD.ORG Subject: Re: TCP bug report for FreeBSD-2.2.6 In-reply-to: Your message of "Mon, 11 Jan 1999 00:22:43 CST." <199901110622.AAA00358@cs.rice.edu> Date: Mon, 11 Jan 1999 19:20:06 +0900 From: Kenjiro Cho Sender: owner-freebsd-hackers@FreeBSD.ORG Precedence: bulk X-Loop: FreeBSD.ORG Mohit Aron said: >> I'm using FreeBSD-2.2.6. I've discovered that the TCP implementation has a >> nasty bug that can cause problems in general for any TCP connection with >> respect to the end and receive buffer sizes used by a connection. The latter >> are important for fully utilizing the bandwidth (long fat pipes). I'll outline >> the problem below. This is a well-known problem since 2.1. It was fixed in -current long time ago but the fix didn't go into -stable. I've been using the following patch to enable SO_SNDBUF/SO_RCVBUF. As a side-effect, it disables copying the pipesize in the route. --Kenjiro -------------------------------------------------------------------------- diff -urN ../sys/netinet/in_rmx.c ./netinet/in_rmx.c --- ../sys/netinet/in_rmx.c Fri Jun 21 00:41:23 1996 +++ ./netinet/in_rmx.c Tue Dec 8 18:59:00 1998 @@ -130,11 +130,13 @@ * as it sees fit. This will hopefully allow TCP more * opportunities to save its ssthresh value. */ +#if 0 /* commented out for the tcp window problem --kjc */ if (!rt->rt_rmx.rmx_sendpipe && !(rt->rt_rmx.rmx_locks & RTV_SPIPE)) rt->rt_rmx.rmx_sendpipe = tcp_sendspace; if (!rt->rt_rmx.rmx_recvpipe && !(rt->rt_rmx.rmx_locks & RTV_RPIPE)) rt->rt_rmx.rmx_recvpipe = tcp_recvspace; +#endif if (!rt->rt_rmx.rmx_mtu && !(rt->rt_rmx.rmx_locks & RTV_MTU) && rt->rt_ifp) -------------------------------------------------------------------------- To Unsubscribe: send mail to majordomo@FreeBSD.org with "unsubscribe freebsd-hackers" in the body of the message