[OpenAFS] connection timeouts

Jeffrey Hutzelman jhutz@cmu.edu
Mon, 22 May 2006 14:12:28 -0400


On Monday, May 22, 2006 12:52:06 PM +0300 Juha J=E4ykk=E4 <juolja@utu.fi> =
wrote:

>> - Output of 'cmdebug <client-ip-addr>'
>
> Produced nothing at all. (Since this, and the next, line stated
> "client-ip", I assumed they should be run on the server and the last on
> the client. Hope I was correct! =3D) )

"nothing" is reasonable output from this command.  Any output would have=20
described the state of currently-held locks within the cache manager; if=20
the problem had been some sort of deadlock, this would have help to=20
identify it.

It doesn't matter where you run cmdebug or rxdebug; they query the thing=20
you name on the command line and print some debugging data.


>> - Output of 'rxdebug <client-ip-addr> 7001'
>
> Trying 130.232.104.188 (port 7001):
> Free packets: 130, packet reclaims: 0, calls: 17469, used FDs: 64
> not waiting for packets.
> 0 calls waiting for a thread
> 1 threads are idle
> Done.

Also fairly normal


>> - Output of 'rxdebug <fileserver-ip-addr>'
>
> lagrange:~# rxdebug dirac.tfy.utu.fi
> Trying 130.232.105.174 (port 7000):
> Free packets: 582, packet reclaims: 81, calls: 94967, used FDs: 64
> not waiting for packets.
> 0 calls waiting for a thread
> 11 threads are idle
> Connection from host 130.232.104.188, port 7001, Cuid 83aaa7c0/4dff9bc,
> error 19270409 serial 6,  natMTU 1444, flags pktCksum, security index 2,
> server conn rxkad: level clear, flags pktCksum
>   Received 0 bytes in 0 packets
>   Sent 0 bytes in 0 packets
>     call 0: # 182, state precall, mode: error

You've seen Derrick's comment on this connection.  The call is in state=20
precall mode error, with an error code that means the tickets are expired.=20
This was probably not the case when you were actually seeing a problem, so=20
it doesn't give us much.  You should collect the same data again next time=20
you see the problem.

As Derrick mentions, you should use tcpdump -s 1500 -x, which will print=20
full dumps of the contents of each packet.  A couple of more -v's wouldn't=20
hurt, either, though tcpdump's ability to decode AFS packets is a bit=20
limited.


> Connection from host 130.232.105.162, port 7001, Cuid b06eb0e7/118cd340
>   serial 1074,  natMTU 1444, security index 0, client conn
>     call 0: # 537, state dally, mode: receiving, flags: receive_done
>     call 1: # 0, state not initialized
>     call 2: # 0, state not initialized
>     call 3: # 0, state not initialized

This connection is irrelevant to this issue.  I probably should have told=20
you to use the '-nodally' switch to rxdebug, which would have suppressed=20
this connection.

-- Jeff