lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Fri, 24 Sep 2010 19:34:47 -0700
From:	Sunny <sunyucong@...il.com>
To:	Eric Dumazet <eric.dumazet@...il.com>
Cc:	linux-kernel <linux-kernel@...r.kernel.org>,
	netdev <netdev@...r.kernel.org>,
	Ilpo Järvinen <ilpo.jarvinen@...sinki.fi>
Subject: Re: tcp_fastretrans_alert since 2.6.32 ?

ping, anyone?

On Tue, Sep 21, 2010 at 11:48 PM, Eric Dumazet <eric.dumazet@...il.com> wrote:
> CC netdev and Ilpo
>
> Le mardi 21 septembre 2010 à 23:37 -0700, Sunny a écrit :
>> Hi,
>>
>> After upgrading to the latest ubuntu kernel, I started to have this
>> alert showing up, this is a vm running on ESXi host with vmxnet3
>> adapter, mainly serving large traffic ~70Mbps towards overboard
>> customers, so I expect packet loss and retrans is pretty high. So I'm
>> posting to ask whether others been seeing the same issue? When this
>> happens, machine freeze several seconds for about three times in a row
>> then seems to start working again.
>>
>> Please cc me on the thread, thanks in advance.
>>
>>
>> [212670.327617] ------------[ cut here ]------------
>> [212670.327689] WARNING: at
>> /build/buildd/linux-2.6.32/net/ipv4/tcp_input.c:2919 tcp_fastret
>> rans_alert+0x3f9/0xd90()
>> [212670.327692] Hardware name: VMware Virtual Platform
>> [212670.327693] Modules linked in: btrfs zlib_deflate crc32c libcrc32c
>> ufs qnx4 hfsplus hfs  minix ntfs vfat msdos fat jfs xfs exportfs
>> reiserfs sch_sfq cls_u32 sch_htb nf_conntrack_ipv 6 ip6table_filter
>> ip6_tables xt_tcpudp xt_state xt_multiport iptable_filter iptable_nat
>> nf_n at nf_conntrack_ipv4 sit nf_conntrack nf_defrag_ipv4 tunnel4
>> ip_tables x_tables acpiphp ppde v psmouse parport_pc serio_raw fbcon
>> tileblit font bitblit softcursor vmxnet3 vga16fb vgasta te lp parport
>> floppy vmw_pvscsi
>> [212670.327741] Pid: 0, comm: swapper Not tainted 2.6.32-24-server #42-Ubuntu
>> [212670.327742] Call Trace:
>> [212670.327744]  <IRQ>  [<ffffffff81066dab>] warn_slowpath_common+0x7b/0xc0
>> [212670.327754]  [<ffffffff81066e04>] warn_slowpath_null+0x14/0x20
>> [212670.327757]  [<ffffffff814b98f9>] tcp_fastretrans_alert+0x3f9/0xd90
>> [212670.327759]  [<ffffffff814bad24>] tcp_ack+0x284/0x6b0
>> [212670.327762]  [<ffffffff814bbab0>] tcp_rcv_established+0x400/0x730
>> [212670.327766]  [<ffffffff814c3553>] tcp_v4_do_rcv+0xf3/0x160
>> [212670.327769]  [<ffffffff814c4ca5>] tcp_v4_rcv+0x5b5/0x7e0
>> [212670.327772]  [<ffffffff814a2c00>] ? ip_local_deliver_finish+0x0/0x2d0
>> [212670.327776]  [<ffffffff8149a6b4>] ? nf_hook_slow+0x74/0x100
>> [212670.327779]  [<ffffffff814a2c00>] ? ip_local_deliver_finish+0x0/0x2d0
>> [212670.327781]  [<ffffffff814a2cdd>] ip_local_deliver_finish+0xdd/0x2d0
>> [212670.327783]  [<ffffffff814a2f60>] ip_local_deliver+0x90/0xa0
>> [212670.327785]  [<ffffffff814a241d>] ip_rcv_finish+0x12d/0x440
>> [212670.327787]  [<ffffffff814a29a5>] ip_rcv+0x275/0x360
>> [212670.327794]  [<ffffffff8147319a>] netif_receive_skb+0x38a/0x5d0
>> [212670.327801]  [<ffffffffa005203c>]
>> vmxnet3_rq_rx_complete+0x23c/0x610 [vmxnet3]
>> [212670.327806]  [<ffffffffa005245f>] vmxnet3_do_poll+0x4f/0xf0 [vmxnet3]
>> [212670.327809]  [<ffffffffa005252d>] vmxnet3_poll+0x2d/0x60 [vmxnet3]
>> [212670.327816]  [<ffffffff810397a9>] ? default_spin_lock_flags+0x9/0x10
>> [212670.327820]  [<ffffffff81473c8f>] net_rx_action+0x10f/0x250
>> [212670.327824]  [<ffffffff8106e2f7>] __do_softirq+0xb7/0x1e0
>> [212670.327828]  [<ffffffff810c4d40>] ? handle_IRQ_event+0x60/0x170
>> [212670.327833]  [<ffffffff810142ec>] call_softirq+0x1c/0x30
>> [212670.327836]  [<ffffffff81015cb5>] do_softirq+0x65/0xa0
>> [212670.327837]  [<ffffffff8106e195>] irq_exit+0x85/0x90
>> [212670.327845]  [<ffffffff8155fd45>] do_IRQ+0x75/0xf0
>> [212670.327848]  [<ffffffff81013b13>] ret_from_intr+0x0/0x11
>> [212670.327849]  <EOI>  [<ffffffff81038acb>] ? native_safe_halt+0xb/0x10
>> [212670.327855]  [<ffffffff8101b69d>] ? default_idle+0x3d/0x90
>> [212670.327860]  [<ffffffff81011e63>] ? cpu_idle+0xb3/0x110
>> [212670.327867]  [<ffffffff81552b53>] ? start_secondary+0xa8/0xaa
>> [212670.327869] ---[ end trace e26694ca94def524 ]---
>>
>>
>> Here's netstat -s output
>>
>> Ip:
>>     362267935 total packets received
>>     0 forwarded
>>     0 incoming packets discarded
>>     362257901 incoming packets delivered
>>     326868094 requests sent out
>>     9 fragments dropped after timeout
>>     2777 reassemblies required
>>     1357 packets reassembled ok
>>     9 packet reassembles failed
>>     490 fragments received ok
>>     1034 fragments created
>> Icmp:
>>     22430 ICMP messages received
>>     283 input ICMP message failed.
>>     ICMP input histogram:
>>         destination unreachable: 17113
>>         timeout in transit: 613
>>         redirects: 9
>>         echo requests: 4685
>>         echo replies: 10
>>     7383 ICMP messages sent
>>     0 ICMP messages failed
>>     ICMP output histogram:
>>         destination unreachable: 2695
>>         echo request: 11
>>         echo replies: 4677
>> IcmpMsg:
>>         InType0: 10
>>         InType3: 17113
>>         InType5: 9
>>         InType8: 4685
>>         InType11: 613
>>         OutType0: 4677
>>         OutType3: 2695
>>         OutType8: 11
>> Tcp:
>>     6563076 active connections openings
>>     1610183 passive connection openings
>>     1646225 failed connection attempts
>>     75246 connection resets received
>>     1141 connections established
>>     361192315 segments received
>>     323797760 segments send out
>>     1997456 segments retransmited
>>     12990 bad segments received.
>>     1851272 resets sent
>> Udp:
>>     4138313 packets received
>>     186 packets to unknown port received.
>>     0 packet receive errors
>>     4161268 packets sent
>> UdpLite:
>> TcpExt:
>>     5096 invalid SYN cookies received
>>     167 resets received for embryonic SYN_RECV sockets
>>     58826 packets pruned from receive queue because of socket buffer overrun
>>     312 packets pruned from receive queue
>>     19 packets dropped from out-of-order queue because of socket buffer overrun
>>     365 ICMP packets dropped because they were out-of-window
>>     2712111 TCP sockets finished time wait in fast timer
>>     82068 time wait sockets recycled by time stamp
>>     311 packets rejects in established connections because of timestamp
>>     11516250 delayed acks sent
>>     6415 delayed acks further delayed because of locked socket
>>     Quick ack mode was activated 208750 times
>>     41789 packets directly queued to recvmsg prequeue.
>>     1 bytes directly in process context from backlog
>>     2969 bytes directly received in process context from prequeue
>>     155660989 packet headers predicted
>>     55448128 acknowledgments not containing data payload received
>>     89389461 predicted acknowledgments
>>     9544 times recovered from packet loss due to fast retransmit
>>     585991 times recovered from packet loss by selective acknowledgements
>>     710 bad SACK blocks received
>>     Detected reordering 1944 times using FACK
>>     Detected reordering 26599 times using SACK
>>     Detected reordering 267 times using reno fast retransmit
>>     Detected reordering 1819 times using time stamp
>>     3169 congestion windows fully recovered without slow start
>>     26810 congestion windows partially recovered using Hoe heuristic
>>     14402 congestion windows recovered without slow start by DSACK
>>     40392 congestion windows recovered without slow start after partial ack
>>     115772 TCP data loss events
>>     TCPLostRetransmit: 5320
>>     1922 timeouts after reno fast retransmit
>>     69095 timeouts after SACK recovery
>>     11101 timeouts in loss state
>>     1151834 fast retransmits
>>     74479 forward retransmits
>>     225380 retransmits in slow start
>>     275631 other TCP timeouts
>>     2606 classic Reno fast retransmits failed
>>     30507 SACK retransmits failed
>>     4862645 packets collapsed in receive queue due to low socket buffer
>>     260934 DSACKs sent for old packets
>>     5109 DSACKs sent for out of order packets
>>     95650 DSACKs received
>>     819 DSACKs for out of order packets received
>>     28142 connections reset due to unexpected data
>>     22325 connections reset due to early user close
>>     85423 connections aborted due to timeout
>>     TCPSACKDiscard: 2319
>>     TCPDSACKIgnoredOld: 52587
>>     TCPDSACKIgnoredNoUndo: 29859
>>     TCPSpuriousRTOs: 2605
>>     TCPSackShifted: 3539688
>>     TCPSackMerged: 3241543
>>     TCPSackShiftFallback: 8938458
>> IpExt:
>>     InMcastPkts: 2105
>>     InBcastPkts: 12
>>     InOctets: 1670966745
>>     OutOctets: -417434189
>>     InMcastOctets: 58940
>>     InBcastOctets: 1792
>
>
>
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists