https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=273303
Bug ID: 273303 Summary: 5 sec delay happening intermenatingly from a customized web server on freebsd 11.2 Product: Base System Version: Unspecified Hardware: amd64 OS: Any Status: New Severity: Affects Some People Priority: --- Component: misc Assignee: b...@freebsd.org Reporter: team_...@outlook.com Created attachment 244294 --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=244294&action=edit 5 sec delay Packet provided for inverstigation Hi experts , We are using Version as unspecified because there is no option for FreeBSD 11.2 RELEASE provided. Experiencing a delay of 5 sec in TCP communication with slow client and Fast server ie when the client send and small window size this issue is happening . Client is an Red hat machine and Server OS is FreeBSD 11.2 . There is less traffic in the scenario. The same test is done with 10.4 and no such issue is seeing. Only difference in setup is we upgraded the 10.4 FreeBSD to 11.2. Providing the Packet capture for 11.2 Server packets. Cap for verification. The following are the observation: 1.Packet number 367 with window size 1428 is send from client (10.30.75.26) to the server (10.4.7.5) 2. You can see a delay of 4.99 from the Server side to acknowledge the client . 3. Only when Window size is increased by the client then only server is responding to client 4. A deadlock is happening when it reach max TCP payload ie 1428 . Extract from wireshark of 1428 window size : Frame 370: 1494 bytes on wire (11952 bits), 1494 bytes captured (11952 bits) Ethernet II, Src: IntelCor_d7:f2:70 (90:e2:ba:d7:f2:70), Dst: MS-NLB-PhysServer-01_d7:a3:ab:03 (02:01:d7:a3:ab:03) Internet Protocol Version 4, Src: 10.4.7.5, Dst: 10.30.75.26 Transmission Control Protocol, Src Port: 3128, Dst Port: 64533, Seq: 430554, Ack: 1403, Len: 1428 Source Port: 3128 Destination Port: 64533 [Stream index: 0] [Conversation completeness: Complete, WITH_DATA (31)] [TCP Segment Len: 1428] Sequence Number: 430554 (relative sequence number) Sequence Number (raw): 3852589341 [Next Sequence Number: 431982 (relative sequence number)] Acknowledgment Number: 1403 (relative ack number) Acknowledgment number (raw): 2328136965 1000 .... = Header Length: 32 bytes (8) Flags: 0x010 (ACK) Window: 1002 [Calculated window size: 64128] [Window size scaling factor: 64] Checksum: 0x6bfb [unverified] [Checksum Status: Unverified] Urgent Pointer: 0 Options: (12 bytes), No-Operation (NOP), No-Operation (NOP), Timestamps TCP Option - No-Operation (NOP) TCP Option - No-Operation (NOP) TCP Option - Timestamps [Timestamps] [SEQ/ACK analysis] TCP payload (1428 bytes) [Reassembled PDU in frame: 381] TCP segment data (1428 bytes) -- You are receiving this mail because: You are the assignee for the bug.