osdir.com


[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[Bug 61301] ab slows dramatically with requests >8192 bytes, httpd seems to be working correctly


https://bz.apache.org/bugzilla/show_bug.cgi?id=61301

--- Comment #8 from Luca Toscano <toscano.luca@xxxxxxxxx> ---
As proof of concept I just tested this code:

Index: support/ab.c
===================================================================
--- support/ab.c        (revision 1811570)
+++ support/ab.c        (working copy)
@@ -1508,7 +1508,7 @@
     r = sizeof(buffer);
 #ifdef USE_SSL
     if (c->ssl) {
-        status = SSL_read(c->ssl, buffer, r);
+        status = SSL_read(c->ssl, buffer, r+1);
         if (status <= 0) {
             int scode = SSL_get_error(c->ssl, status);

Since the buffer size is '8192', I added '1' to force the SSL_read to grab all
the 8193 bytes, and the response comes super quick without waiting the 5
seconds. 

New tcpdump:

18:53:14.492000 IP 10.0.2.15.54540 > ip231.ip-144-217-33.net.https: Flags [S],
seq 4209997998, win 29200, options [mss 1460,sackOK,TS val 111017592 ecr
0,nop,wscale 6], length 0
18:53:14.601366 IP ip231.ip-144-217-33.net.https > 10.0.2.15.54540: Flags [S.],
seq 153201153, ack 4209997999, win 65535, options [mss 1460], length 0
18:53:14.601425 IP 10.0.2.15.54540 > ip231.ip-144-217-33.net.https: Flags [.],
ack 1, win 29200, length 0
18:53:14.601842 IP 10.0.2.15.54540 > ip231.ip-144-217-33.net.https: Flags [P.],
seq 1:200, ack 1, win 29200, length 199
18:53:14.602031 IP ip231.ip-144-217-33.net.https > 10.0.2.15.54540: Flags [.],
ack 200, win 65535, length 0
18:53:14.730307 IP ip231.ip-144-217-33.net.https > 10.0.2.15.54540: Flags [P.],
seq 1:1441, ack 200, win 65535, length 1440
18:53:14.730334 IP 10.0.2.15.54540 > ip231.ip-144-217-33.net.https: Flags [.],
ack 1441, win 31240, length 0
18:53:14.730609 IP ip231.ip-144-217-33.net.https > 10.0.2.15.54540: Flags [P.],
seq 1441:2881, ack 200, win 65535, length 1440
18:53:14.730624 IP 10.0.2.15.54540 > ip231.ip-144-217-33.net.https: Flags [.],
ack 2881, win 34080, length 0
18:53:14.730659 IP ip231.ip-144-217-33.net.https > 10.0.2.15.54540: Flags [P.],
seq 2881:3461, ack 200, win 65535, length 580
18:53:14.730662 IP 10.0.2.15.54540 > ip231.ip-144-217-33.net.https: Flags [.],
ack 3461, win 36920, length 0
18:53:14.733660 IP 10.0.2.15.54540 > ip231.ip-144-217-33.net.https: Flags [P.],
seq 200:358, ack 3461, win 36920, length 158
18:53:14.733837 IP ip231.ip-144-217-33.net.https > 10.0.2.15.54540: Flags [.],
ack 358, win 65535, length 0
18:53:14.863159 IP ip231.ip-144-217-33.net.https > 10.0.2.15.54540: Flags [P.],
seq 3461:3735, ack 358, win 65535, length 274
18:53:14.863562 IP 10.0.2.15.54540 > ip231.ip-144-217-33.net.https: Flags [P.],
seq 358:505, ack 3735, win 39760, length 147
18:53:14.863723 IP ip231.ip-144-217-33.net.https > 10.0.2.15.54540: Flags [.],
ack 505, win 65535, length 0
18:53:14.975417 IP ip231.ip-144-217-33.net.https > 10.0.2.15.54540: Flags [P.],
seq 3735:5175, ack 505, win 65535, length 1440
18:53:14.975451 IP 10.0.2.15.54540 > ip231.ip-144-217-33.net.https: Flags [.],
ack 5175, win 42600, length 0
18:53:14.975733 IP ip231.ip-144-217-33.net.https > 10.0.2.15.54540: Flags [P.],
seq 5175:6615, ack 505, win 65535, length 1440
18:53:14.975753 IP 10.0.2.15.54540 > ip231.ip-144-217-33.net.https: Flags [.],
ack 6615, win 45440, length 0
18:53:14.975803 IP ip231.ip-144-217-33.net.https > 10.0.2.15.54540: Flags [P.],
seq 6615:9495, ack 505, win 65535, length 2880
18:53:14.975811 IP 10.0.2.15.54540 > ip231.ip-144-217-33.net.https: Flags [.],
ack 9495, win 51120, length 0
18:53:14.977422 IP ip231.ip-144-217-33.net.https > 10.0.2.15.54540: Flags [P.],
seq 9495:12349, ack 505, win 65535, length 2854
18:53:14.977457 IP 10.0.2.15.54540 > ip231.ip-144-217-33.net.https: Flags [.],
ack 12349, win 56800, length 0
18:53:14.982993 IP 10.0.2.15.54540 > ip231.ip-144-217-33.net.https: Flags [F.],
seq 505, ack 12349, win 56800, length 0
18:53:14.983322 IP ip231.ip-144-217-33.net.https > 10.0.2.15.54540: Flags [.],
ack 506, win 65535, length 0
18:53:15.092616 IP ip231.ip-144-217-33.net.https > 10.0.2.15.54540: Flags [P.],
seq 12349:12380, ack 506, win 65535, length 31
18:53:15.092688 IP 10.0.2.15.54540 > ip231.ip-144-217-33.net.https: Flags [R],
seq 4209998504, win 0, length 0
18:53:15.092746 IP ip231.ip-144-217-33.net.https > 10.0.2.15.54540: Flags [F.],
seq 12380, ack 506, win 65535, length 0
18:53:15.092779 IP 10.0.2.15.54540 > ip231.ip-144-217-33.net.https: Flags [R],
seq 4209998504, win 0, length 0
18:53:15.093107 IP ip231.ip-144-217-33.net.https > 10.0.2.15.54540: Flags [R.],
seq 4141766143, ack 506, win 0, length 0

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: bugs-unsubscribe@xxxxxxxxxxxxxxxx
For additional commands, e-mail: bugs-help@xxxxxxxxxxxxxxxx