FreeBSD Bugzilla – Attachment 183064 Details for
Bug 219644
FreeBSD 11 + nginx + apache delay +0.1 second on files greater than 32768 bytes
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
tcpdump on FresBSD11
tcpdump_freebsd11.txt (text/plain), 2.00 KB, created by
Alexey Koscheev
on 2017-05-30 10:31:43 UTC
(
hide
)
Description:
tcpdump on FresBSD11
Filename:
MIME Type:
Creator:
Alexey Koscheev
Created:
2017-05-30 10:31:43 UTC
Size:
2.00 KB
patch
obsolete
>tcpdump -n -i lo0 host 127.0.0.1 >tcpdump: verbose output suppressed, use -v or -vv for full protocol decode >listening on lo0, link-type NULL (BSD loopback), capture size 262144 bytes >12:45:38.286264 IP 127.0.0.1.36654 > 127.0.0.1.80: Flags [S], seq 217921756, win 65535, options [mss 16344,nop,wscale 6,sackOK,TS val 1989698682 ecr 0], length 0 >12:45:38.286284 IP 127.0.0.1.80 > 127.0.0.1.36654: Flags [S.], seq 1557012138, ack 217921757, win 65535, options [mss 16344,nop,wscale 6,sackOK,TS val 4239743513 ecr 1989698682], length 0 >12:45:38.286297 IP 127.0.0.1.36654 > 127.0.0.1.80: Flags [.], ack 1, win 1276, options [nop,nop,TS val 1989698682 ecr 4239743513], length 0 >12:45:38.286327 IP 127.0.0.1.36654 > 127.0.0.1.80: Flags [P.], seq 1:457, ack 1, win 1276, options [nop,nop,TS val 1989698682 ecr 4239743513], length 456: HTTP: GET /ihead.txt HTTP/1.0 >12:45:38.286536 IP 127.0.0.1.80 > 127.0.0.1.36654: Flags [.], seq 1:16333, ack 457, win 1276, options [nop,nop,TS val 4239743513 ecr 1989698682], length 16332: HTTP: HTTP/1.1 200 OK >12:45:38.392445 IP 127.0.0.1.36654 > 127.0.0.1.80: Flags [.], ack 16333, win 1276, options [nop,nop,TS val 1989698788 ecr 4239743513], length 0 >12:45:38.392471 IP 127.0.0.1.80 > 127.0.0.1.36654: Flags [.], seq 16333:32665, ack 457, win 1276, options [nop,nop,TS val 4239743619 ecr 1989698788], length 16332: HTTP >12:45:38.392481 IP 127.0.0.1.80 > 127.0.0.1.36654: Flags [FP.], seq 32665:35458, ack 457, win 1276, options [nop,nop,TS val 4239743619 ecr 1989698788], length 2793: HTTP >12:45:38.392498 IP 127.0.0.1.36654 > 127.0.0.1.80: Flags [.], ack 35459, win 978, options [nop,nop,TS val 1989698788 ecr 4239743619], length 0 >12:45:38.393014 IP 127.0.0.1.36654 > 127.0.0.1.80: Flags [F.], seq 457, ack 35459, win 1276, options [nop,nop,TS val 1989698788 ecr 4239743619], length 0 >12:45:38.393032 IP 127.0.0.1.80 > 127.0.0.1.36654: Flags [.], ack 458, win 1276, options [nop,nop,TS val 4239743619 ecr 1989698788], length 0 >^C >11 packets captured >11 packets received by filter >0 packets dropped by kernel
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 219644
:
183041
|
183042
|
183043
|
183061
|
183062
|
183063
| 183064