--- Begin Message ---
- To: Debian Bug Tracking System <submit@bugs.debian.org>
- Subject: nfs_common: nfs client crash nfs server? ; [TCP CHECKSUM INCORRECT]
- From: Jean-Michel <jeanmichel.123@free.fr>
- Date: Thu, 06 Jul 2006 11:26:23 +0200
- Message-id: <20060706092623.21458.325.reportbug@localhost.internal.isoscope.com>
Package: nfs_common
Severity: normal
In the context of a debian etch nfs client, and a debian potato nfs
server (with low memory),
Since an upgrade from client to kernel 2-6-15, the systems seems to
freeze from time to time. This seems to be due to nfs not responding.
When nfs replies again, system then works fine again.
On the client side is installed vmware 4.0; it migth interact with
network and kernel.
Moreover at looking packets on the network, it appears that some NFS/TCP
packets seems to have bad checksum (value 0x5a1c).
In a short laps, 12018 / 15510 (77%) TCP packets originated from same machine
have this 0x5a1c bad checksum value (according to ethereal (selection TCP
+ ip source + value 5a1c in checksum field).
two computers are connected via DLink 10/100 Fast ethernet switch.
Here after is a short extract:
1 No. Time Source Destination
Protocol Info
2 30876 1328.078832 192.168.236.33 192.168.236.22
TCP 1023 > nfs [ACK] Seq=2510020 Ack=3272024 Win=32767 Len=0
3
4 Frame 30876 (54 bytes on wire, 54 bytes captured)
5 Ethernet II, Src: chypre (00:11:d8:25:30:97), Dst:
192.168.236.22 (00:80:5f:b6:8b:b6)
6 Internet Protocol, Src: 192.168.236.33 (192.168.236.33), Dst:
192.168.236.22 (192.168.236.22)
7 Transmission Control Protocol, Src Port: 1023 (1023), Dst Port:
nfs (2049), Seq: 2510020, Ack: 3272024, Len: 0
8 Source port: 1023 (1023)
9 Destination port: nfs (2049)
10 Sequence number: 2510020 (relative sequence number)
11 Acknowledgement number: 3272024 (relative ack number)
12 Header length: 20 bytes
13 Flags: 0x0010 (ACK)
14 Window size: 32767
15 Checksum: 0x1d15 [correct]
16 SEQ/ACK analysis
17
18 No. Time Source Destination
Protocol Info
19 30877 1328.079095 192.168.236.22 192.168.236.33
TCP nfs > 1023 [PSH, ACK] Seq=3272024 Ack=2510020 Win=32120
Len=1004
20
21 Frame 30877 (1058 bytes on wire, 1058 bytes captured)
22 Ethernet II, Src: 192.168.236.22 (00:80:5f:b6:8b:b6), Dst:
chypre (00:11:d8:25:30:97)
23 Internet Protocol, Src: 192.168.236.22 (192.168.236.22), Dst:
192.168.236.33 (192.168.236.33)
24 Transmission Control Protocol, Src Port: nfs (2049), Dst Port:
1023 (1023), Seq: 3272024, Ack: 2510020, Len: 1004
25 Source port: nfs (2049)
26 Destination port: 1023 (1023)
27 Sequence number: 3272024 (relative sequence number)
28 Next sequence number: 3273028 (relative sequence number)
29 Acknowledgement number: 2510020 (relative ack number)
30 Header length: 20 bytes
31 Flags: 0x0018 (PSH, ACK)
32 Window size: 32120
33 Checksum: 0x4975 [correct]
34 TCP segment data (1004 bytes)
35 Reassembled TCP Segments (4304 bytes): #30872(380),
#30874(1460), #30875(1460), #30877(1004)
36 Remote Procedure Call Fragment
37 Fragment header: 3996 bytes
38 Fragment Data
39 Remote Procedure Call Fragment
40 Fragment header: Last fragment, 300 bytes
41 Fragment Data
42
43 No. Time Source Destination
Protocol Info
44 30880 1328.118910 192.168.236.33 192.168.236.22
TCP 1023 > nfs [ACK] Seq=2510020 Ack=3273028 Win=32767 Len=0
45
46 Frame 30880 (54 bytes on wire, 54 bytes captured) 47
Ethernet II, Src: chypre (00:11:d8:25:30:97), Dst: 192.168.236.22
(00:80:5f:b6:8b:b6)
48 Internet Protocol, Src: 192.168.236.33 (192.168.236.33), Dst:
192.168.236.22 (192.168.236.22)
49 Transmission Control Protocol, Src Port: 1023 (1023), Dst Port:
nfs (2049), Seq: 2510020, Ack: 3273028, Len: 0
50 Source port: 1023 (1023)
51 Destination port: nfs (2049)
52 Sequence number: 2510020 (relative sequence number)
53 Acknowledgement number: 3273028 (relative ack number)
54 Header length: 20 bytes
55 Flags: 0x0010 (ACK)
56 Window size: 32767
57 Checksum: 0x1929 [correct]
58 SEQ/ACK analysis
59
60 No. Time Source Destination
Protocol Info
61 30887 1332.000497 192.168.236.33 192.168.236.22
TCP 1023 > nfs [PSH, ACK] Seq=2510020 Ack=3273028 Win=32767 [TCP
CHECKSUM INC ORRECT] Len=120
62
63 Frame 30887 (174 bytes on wire, 174 bytes captured)
64 Ethernet II, Src: chypre (00:11:d8:25:30:97), Dst:
192.168.236.22 (00:80:5f:b6:8b:b6)
65 Internet Protocol, Src: 192.168.236.33 (192.168.236.33), Dst:
192.168.236.22 (192.168.236.22)
66 Transmission Control Protocol, Src Port: 1023 (1023), Dst Port:
nfs (2049), Seq: 2510020, Ack: 3273028, Len: 120
67 Source port: 1023 (1023)
68 Destination port: nfs (2049)
69 Sequence number: 2510020 (relative sequence number)
70 Next sequence number: 2510140 (relative sequence number)
71 Acknowledgement number: 3273028 (relative ack number)
72 Header length: 20 bytes
73 Flags: 0x0018 (PSH, ACK)
74 Window size: 32767
75 Checksum: 0x5a1c [incorrect, should be 0xd02a]
76 Remote Procedure Call Fragment
77 Fragment header: Last fragment, 116 bytes
78 Fragment Data
79
80 No. Time Source Destination
Protocol Info
81 30888 1332.001194 192.168.236.22 192.168.236.33
TCP nfs > 1023 [PSH, ACK] Seq=3273028 Ack=2510140 Win=32120 Len=100
82
83 Frame 30888 (154 bytes on wire, 154 bytes captured)
84 Ethernet II, Src: 192.168.236.22 (00:80:5f:b6:8b:b6), Dst:
chypre (00:11:d8:25:30:97)
85 Internet Protocol, Src: 192.168.236.22 (192.168.236.22), Dst:
192.168.236.33 (192.168.236.33)
86 Transmission Control Protocol, Src Port: nfs (2049), Dst Port:
1023 (1023), Seq: 3273028, Ack: 2510140, Len: 100
87 Source port: nfs (2049)
88 Destination port: 1023 (1023)
89 Sequence number: 3273028 (relative sequence number)
90 Next sequence number: 3273128 (relative sequence number)
91 Acknowledgement number: 2510140 (relative ack number)
92 Header length: 20 bytes
93 Flags: 0x0018 (PSH, ACK)
94 Window size: 32120
95 Checksum: 0x7a95 [correct]
96 SEQ/ACK analysis
97 Remote Procedure Call Fragment
98 Fragment header: Last fragment, 96 bytes
99 Fragment Data
100
101 No. Time Source Destination
Protocol Info
102 30889 1332.001210 192.168.236.33 192.168.236.22
TCP 1023 > nfs [ACK] Seq=2510140 Ack=3273128 Win=32767 Len=0
103
104 Frame 30889 (54 bytes on wire, 54 bytes captured)
105 Ethernet II, Src: chypre (00:11:d8:25:30:97), Dst:
192.168.236.22 (00:80:5f:b6:8b:b6)
106 Internet Protocol, Src: 192.168.236.33 (192.168.236.33), Dst:
192.168.236.22 (192.168.236.22)
107 Transmission Control Protocol, Src Port: 1023 (1023), Dst Port:
nfs (2049), Seq: 2510140, Ack: 3273128, Len: 0
108 Source port: 1023 (1023) 109 Destination port: nfs
(2049)
110 Sequence number: 2510140 (relative sequence number)
111 Acknowledgement number: 3273128 (relative ack number)
112 Header length: 20 bytes
113 Flags: 0x0010 (ACK)
114 Window size: 32767
115 Checksum: 0x184d [correct]
116 SEQ/ACK analysis
117
118 No. Time Source Destination
Protocol Info
119 30890 1332.001286 192.168.236.33 192.168.236.22
TCP 1023 > nfs [PSH, ACK] Seq=2510140 Ack=3273128 Win=32767 [TCP
CHECKSUM INC ORRECT] Len=120
120
121 Frame 30890 (174 bytes on wire, 174 bytes captured)
122 Ethernet II, Src: chypre (00:11:d8:25:30:97), Dst:
192.168.236.22 (00:80:5f:b6:8b:b6)
123 Internet Protocol, Src: 192.168.236.33 (192.168.236.33), Dst:
192.168.236.22 (192.168.236.22)
124 Transmission Control Protocol, Src Port: 1023 (1023), Dst Port:
nfs (2049), Seq: 2510140, Ack: 3273128, Len: 120
125 Source port: 1023 (1023)
126 Destination port: nfs (2049)
127 Sequence number: 2510140 (relative sequence number)
128 Next sequence number: 2510260 (relative sequence number)
129 Acknowledgement number: 3273128 (relative ack number)
130 Header length: 20 bytes
131 Flags: 0x0018 (PSH, ACK)
132 Window size: 32767
133 Checksum: 0x5a1c [incorrect, should be 0xc93e]
134 Remote Procedure Call Fragment
135 Fragment header: Last fragment, 116 bytes
136 Fragment Data
Why are there Checksum: 0x5a1c [incorrect, ?
Regards.
-- System Information:
Debian Release: testing/unstable
APT prefers testing
APT policy: (500, 'testing'), (500, 'stable')
Architecture: i386 (i686)
Shell: /bin/sh linked to /bin/bash
Kernel: Linux 2.6.15-1-686
Locale: LANG=fr_FR@euro, LC_CTYPE=fr_FR@euro (charmap=ISO-8859-15)
--- End Message ---