Hi
Right after restarting PPP interface the following TCP/IP agony occured
on the connection (which was probably closing that time) right during the
2 minute temporary drop of both PPP links noted below. The connection
was from "ssh" (with SO_KEEPALIVE flag set).
linux-2.2.10 machine is behind masquerade of linux-2.3.9 but the ACKs are
going even between these two hosts:
'client' 'masquerading' 'server'
linux-2.2.10 --(MAQUERADING)-- linux-2.3.9 --(outer line)-- linux-2.0.35
^^^ even here are ACKs hogging
Netstat from client linux-2.2.10 machine:
-------------------------------------------------------------------------------
Active Internet connections (servers and established)
Proto Recv-Q Send-Q Local Address Foreign Address State PID/Program name
tcp 0 221 linux-2.2.10:1019 linux-2.0.35:22 FIN_WAIT1 -
-------------------------------------------------------------------------------
As you can see Send-Q is not empty and both sides are hogging the line (not
the 100% capacity of it - only very fast periodically). Also the rate of ACKs
is slowly increasing (it approx. doubled after I wrote this mail up to here).
No other communication (except NTP updates) is running on this line.
Tcpdump from client linux-2.2.10 machine:
-------------------------------------------------------------------------------
18:47:50.575617 linux-2.0.35.22 > linux-2.2.10.1019: . ack 1644304467 win 32736 (DF)
[tos 0x10]
18:47:50.585605 linux-2.2.10.1019 > linux-2.0.35.22: . ack 1107997898 win 32256 (DF)
[tos 0x10]
18:47:50.595609 linux-2.0.35.22 > linux-2.2.10.1019: . ack 1 win 32736 (DF) [tos 0x10]
18:47:50.605593 linux-2.2.10.1019 > linux-2.0.35.22: . ack 1107997898 win 32256 (DF)
[tos 0x10]
18:47:50.875612 linux-2.0.35.22 > linux-2.2.10.1019: . ack 1 win 32736 (DF) [tos 0x10]
18:47:50.875673 linux-2.2.10.1019 > linux-2.0.35.22: . ack 1107997898 win 32256 (DF)
[tos 0x10]
-------------------------------------------------------------------------------
and so on...
Attached is this dump in tcpdump libpcap packet capture format.
/proc/net/ip_masquerade from masquerading linux-2.3.9 machine:
-------------------------------------------------------------------------------
Prc FromIP FPrt ToIP TPrt Masq Init-seq Delta PDelta Expires
(free=40960,40958,40960)
TCP 0A064201:03FB C3711F7B:0016 EE48 00000000 0 0 90000
-------------------------------------------------------------------------------
Netstat from server linux-2.0.35 machine:
-------------------------------------------------------------------------------
Active Internet connections (w/o servers)
Proto Recv-Q Send-Q Local Address Foreign Address State
tcp 0 72 linux-2.0.35:22 linux-2.3.9:61000 ESTABLISHED
-------------------------------------------------------------------------------
After writing this mail, it all fortunately suddenly stopped. I don't have
the record how the double-ACK from above transformed into this single-ACK
stream:
Tcpdump from client linux-2.2.10 machine:
A lot of the same ACKs and ...
-------------------------------------------------------------------------------
19:02:44.224007 linux-2.0.35.22 > linux-2.2.10.1019: . ack 4119390369 win 32736 (DF)
[tos 0x10]
19:02:44.254002 linux-2.0.35.22 > linux-2.2.10.1019: . ack 4119390369 win 32736 (DF)
[tos 0x10]
19:02:44.264010 linux-2.0.35.22 > linux-2.2.10.1019: . ack 4119390369 win 32736 (DF)
[tos 0x10]
19:02:44.464006 linux-2.0.35.22 > linux-2.2.10.1019: . ack 4119390369 win 32736 (DF)
[tos 0x10]
19:03:10.393537 linux-2.0.35.22 > linux-2.2.10.1019: P 3186969399:3186969451(52) ack
4119390369 win 32736 (DF) [tos 0x10]
19:05:10.290858 linux-2.0.35.22 > linux-2.2.10.1019: P 3186969399:3186969451(52) ack
4119390369 win 32736 (DF) [tos 0x10]
19:05:10.290952 linux-2.2.10.1019 > linux-2.0.35.22: R 1644304467:1644304467(0) win 0
[tos 0x10]
-------------------------------------------------------------------------------
Lace
PS: Please gimme a CC as I'm not on this list. And I'm not able to provide
further info from this connection as it was apparently resetted. Ignore
this mail if the bug report is not useful.
snap.gz