From mboxrd@z Thu Jan 1 00:00:00 1970 From: Yuchung Cheng Subject: Re: 3.10.0 network trace Date: Sat, 20 Jul 2013 23:04:56 -0700 Message-ID: References: Mime-Version: 1.0 Content-Type: text/plain; charset=ISO-8859-1 Cc: netdev To: Michael Sterrett Return-path: Received: from mail-ie0-f173.google.com ([209.85.223.173]:56739 "EHLO mail-ie0-f173.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1751558Ab3GUGFS (ORCPT ); Sun, 21 Jul 2013 02:05:18 -0400 Received: by mail-ie0-f173.google.com with SMTP id k13so12830070iea.32 for ; Sat, 20 Jul 2013 23:05:17 -0700 (PDT) In-Reply-To: Sender: netdev-owner@vger.kernel.org List-ID: On Sat, Jul 13, 2013 at 2:10 PM, Michael Sterrett wrote: > After changing those two sysctl settings the WARN hasn't reappeared. > I'm willing to mess around with this box though if you want to try to > narrow down the root cause with different settings and/or patches. Could you try to disable F-RTO but enable loss probe by sysctl net.ipv4.tcp_frto=0 net.ipv4.tcp_early_retrans=3 to help us identify if this is loss probe bug or f-rto. Thanks. > > On Fri, Jul 12, 2013 at 5:39 PM, Yuchung Cheng wrote: >> On Fri, Jul 12, 2013 at 2:33 PM, Michael Sterrett wrote: >>> Thanks for the reply. The sysctl -a output is attached. >> >> Hi Michael: my guess is some of the recent changes like TLP or F-RTO >> rewrite has bugs. It'd be best if you can provide tcp traces that >> triggers this. If not and this WARN appears frequently enough, please >> try i) sysctl tcp_early_retrans=2 ii) sysctl tcp_frto=0 and see if >> that WARN goes away. Thanks.