https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=273303

            Bug ID: 273303
           Summary: 5 sec delay happening intermenatingly from a
                    customized web server on freebsd 11.2
           Product: Base System
           Version: Unspecified
          Hardware: amd64
                OS: Any
            Status: New
          Severity: Affects Some People
          Priority: ---
         Component: misc
          Assignee: b...@freebsd.org
          Reporter: team_...@outlook.com

Created attachment 244294
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=244294&action=edit
5 sec delay Packet provided for inverstigation

Hi experts , 

We are using Version as unspecified because there is no option for FreeBSD 11.2
RELEASE provided. Experiencing a delay of 5 sec in TCP communication with slow
client and Fast server ie when the client send and small window size this issue
is happening  . 
Client is an Red hat machine and Server OS is FreeBSD 11.2 . 
There is less traffic in the scenario. The same test is done with 10.4 and no
such issue is seeing. 
Only difference in setup is we upgraded the 10.4 FreeBSD to 11.2. Providing the
Packet capture for 11.2 Server packets. Cap for verification. The following are
the observation: 

1.Packet number 367 with window size 1428 is send from client (10.30.75.26) to
the server (10.4.7.5) 
2. You can see a delay of 4.99 from the Server side to acknowledge the client . 
3. Only when Window size is increased by the client  then only server is
responding to client 
4. A deadlock is happening when it reach max TCP payload ie 1428 . 

Extract from wireshark of 1428 window size : 
Frame 370: 1494 bytes on wire (11952 bits), 1494 bytes captured (11952 bits)
Ethernet II, Src: IntelCor_d7:f2:70 (90:e2:ba:d7:f2:70), Dst:
MS-NLB-PhysServer-01_d7:a3:ab:03 (02:01:d7:a3:ab:03)
Internet Protocol Version 4, Src: 10.4.7.5, Dst: 10.30.75.26
Transmission Control Protocol, Src Port: 3128, Dst Port: 64533, Seq: 430554,
Ack: 1403, Len: 1428
    Source Port: 3128
    Destination Port: 64533
    [Stream index: 0]
    [Conversation completeness: Complete, WITH_DATA (31)]
    [TCP Segment Len: 1428]
    Sequence Number: 430554    (relative sequence number)
    Sequence Number (raw): 3852589341
    [Next Sequence Number: 431982    (relative sequence number)]
    Acknowledgment Number: 1403    (relative ack number)
    Acknowledgment number (raw): 2328136965
    1000 .... = Header Length: 32 bytes (8)
    Flags: 0x010 (ACK)
    Window: 1002
    [Calculated window size: 64128]
    [Window size scaling factor: 64]
    Checksum: 0x6bfb [unverified]
    [Checksum Status: Unverified]
    Urgent Pointer: 0
    Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps
        TCP Option - No-Operation (NOP)
        TCP Option - No-Operation (NOP)
        TCP Option - Timestamps
    [Timestamps]
    [SEQ/ACK analysis]
    TCP payload (1428 bytes)
    [Reassembled PDU in frame: 381]
    TCP segment data (1428 bytes)

-- 
You are receiving this mail because:
You are the assignee for the bug.

Reply via email to