[Bug 265588] [TCP] - tcp send a retransmission identical sequence number packet with different payload

From: <bugzilla-noreply_at_freebsd.org>
Date: Thu, 20 Oct 2022 10:14:53 UTC
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=265588

--- Comment #11 from Keyong <keyong.sun@smartx.com> ---
(In reply to Richard Scheffenegger from comment #10)
Yes, the capture created before issuing the read.

Because the issue was not reproduced 100%, so need to capture with a long time,
the origin packet was too big, and then filter with the "V4 Reply (Call In 1)
READ[Illegal Segments]"

-- 
You are receiving this mail because:
You are the assignee for the bug.