On Mon, Jan 27, 2025 at 11:01 AM Stefano Brivio
On Fri, 24 Jan 2025 12:40:16 -0500 Jon Maloy
wrote: I can certainly clear tp->pred_flags and post it again, maybe with an improved and shortened log. Would that be acceptable?
Talking about an improved log, what strikes me the most of the whole problem is:
$ tshark -r iperf3_jon_zero_window.pcap -td -Y 'frame.number in { 1064 .. 1068 }' 1064 0.004416 192.168.122.1 → 192.168.122.198 TCP 65534 34482 → 5201 [ACK] Seq=1611679466 Ack=1 Win=36864 Len=65480 1065 0.007334 192.168.122.1 → 192.168.122.198 TCP 65534 34482 → 5201 [ACK] Seq=1611744946 Ack=1 Win=36864 Len=65480 1066 0.005104 192.168.122.1 → 192.168.122.198 TCP 56382 [TCP Window Full] 34482 → 5201 [ACK] Seq=1611810426 Ack=1 Win=36864 Len=56328 1067 0.015226 192.168.122.198 → 192.168.122.1 TCP 54 [TCP ZeroWindow] 5201 → 34482 [ACK] Seq=1 Ack=1611090146 Win=0 Len=0 1068 6.298138 fe80::44b3:f5ff:fe86:c529 → ff02::2 ICMPv6 70 Router Solicitation from 46:b3:f5:86:c5:29
...and then the silence, 192.168.122.198 never announces that its window is not zero, so the peer gives up 15 seconds later:
$ tshark -r iperf3_jon_zero_window_cut.pcap -td -Y 'frame.number in { 1069 .. 1070 }' 1069 8.709313 192.168.122.1 → 192.168.122.198 TCP 55 34466 → 5201 [ACK] Seq=166 Ack=5 Win=36864 Len=1 1070 0.008943 192.168.122.198 → 192.168.122.1 TCP 54 5201 → 34482 [FIN, ACK] Seq=1 Ack=1611090146 Win=778240 Len=0
Data in frame #1069 is iperf3 ending the test.
This didn't happen before e2142825c120 ("net: tcp: send zero-window ACK when no memory") so it's a relatively recent (17 months) regression.
It actually looks pretty simple (and rather serious) to me.
With all that, it should be pretty easy to cook a packetdrill test, right ? packetdrill tests are part of tools/testing/selftests/net/ already, we are not asking for something unreasonable.