bond解除 centos7_centos7.1-bond丢包问题

服务器配置:

品牌:SA5212H2  CPU:Intel(R) Xeon(R) CPU E5-2407 0 @ 2.20GHz  内存:16g

服务器资源使用

操作系统版本:

[root@]# uname -a

Linux 3.10.0-229.20.1.el7.x86_64 #1 SMP Tue Nov 3 19:10:07 UTC 2015 x86_64 x86_64 x86_64 GNU/Linux

[root@f ]# cat /etc/redhat-release

CentOS Linux release 7.1.1503 (Core)

bond0配置(bond是我在重装系统的时候做的)

网卡配置

eth0

NAME=bond0 slave 1

MASTER=a25343c6-c96c-4683-ae48-848e3fca704f

HWADDR=

TYPE=Ethernet

ONBOOT=yes

UUID=0a553f1d-85a8-4446-9ee2-88dc085a4e92

eth1

# Generated by parse-kickstart

NAME=bond0 slave 2

MASTER=a25343c6-c96c-4683-ae48-848e3fca704f

HWADDR=

TYPE=Ethernet

ONBOOT=yes

UUID=f0426c72-a3c4-4803-b797-37824fa34c87

出现的问题是:

bond0 (bond0使用的mac地址是eth1的)接口dropped 丢包每一秒丢一个包。

关掉eth0 bond0 dropped 丢包消失

以下是我截取到的http报文

tcpdump -i bond0 dst port 80

17:05:40.338486 IP 61.1.10.1.39215 > 61.156.241.174.http: Flags [F.], seq 978338840, ack 1177028699, win 31, length 0

17:05:40.710831 IP 61.1.10.1.35946 > 61.158.164.155.http: Flags [F.], seq 47910714, ack 2457429085, win 31, length 0

17:05:46.027797 IP 115.29.222.217.63731 > 61.1.10.1.http: Flags [S], seq 4281715269, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0

17:05:46.061259 IP 115.29.222.217.63731 > 61.1.10.1.http: Flags [.], ack 2669976514, win 256, length 0

17:05:46.061901 IP 115.29.222.217.63731 > 61.1.10.1.http: Flags [P.], seq 0:208, ack 1, win 256, length 208

17:05:46.110941 IP 115.29.222.217.63732 > 61.1.10.1.http: Flags [S], seq 2654506387, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0

17:05:46.139890 IP 115.29.222.217.63732 > 61.1.10.1.http: Flags [.], ack 3781507412, win 256, length 0

17:05:46.140269 IP 115.29.222.217.63732 > 61.1.10.1.http: Flags [P.], seq 0:558, ack 1, win 256, length 558

17:05:46.297245 IP 115.29.222.217.63731 > 61.1.10.1.http: Flags [.], ack 239, win 255, length 0

17:05:46.374184 IP 115.29.222.217.63732 > 61.1.10.1.http: Flags [.], ack 239, win 255, length 0

17:05:46.852699 IP 115.29.222.217.63731 > 61.1.10.1.http: Flags [F.], seq 208, ack 239, win 255, length 0

17:05:46.886398 IP 115.29.222.217.63731 > 61.1.10.1.http: Flags [.], ack 240, win 255, length 0

17:05:50.981886 IP 139.226.22.194.53517 > 61.1.10.1.http: Flags [.], ack 1945224633, win 35250, length 0

17:05:51.050212 IP 61.135.170.194.43668 > 61.1.10.1.http: Flags [S], seq 464709165, win 5840, options [mss 1460,sackOK,TS val 2835300322 ecr 0,nop,wscale 7], length 0

17:05:51.053238 IP 61.135.170.194.51171 > 112.65.222.182.http: Flags [S], seq 470525896, win 5840, options [mss 1460,sackOK,TS val 2835300323 ecr 0,nop,wscale 7], length 0

17:05:51.076869 IP 61.135.170.194.43668 > 61.1.10.1.http: Flags [.], ack 2979511321, win 46, options [nop,nop,TS val 2835300329 ecr 1148734261], length 0

17:05:51.077953 IP 61.135.170.194.51171 > 112.65.222.182.http: Flags [.], ack 1019414286, win 46, options [nop,nop,TS val 2835300330 ecr 1148734264], length 0

17:05:51.079276 IP 61.135.170.194.43668 > 61.1.10.1.http: Flags [P.], seq 0:279, ack 1, win 46, options [nop,nop,TS val 2835300330 ecr 1148734261], length 279

17:05:51.081615 IP 61.135.170.194.51171 > 112.65.222.182.http: Flags [P.], seq 0:279, ack 1, win 46, options [nop,nop,TS val 2835300330 ecr 1148734264], length 279

17:05:51.106661 IP 61.135.170.194.51171 > 112.65.222.182.http: Flags [.], ack 258, win 54, options [nop,nop,TS val 2835300337 ecr 1148734293], length 0

17:05:51.114997 IP 61.135.170.194.51171 > 112.65.222.182.http: Flags [F.], seq 279, ack 259, win 54, options [nop,nop,TS val 2835300339 ecr 1148734293], length 0

17:05:51.115768 IP 61.135.170.194.43668 > 61.1.10.1.http: Flags [F.], seq 279, ack 259, win 54, options [nop,nop,TS val 2835300339 ecr 1148734291], length 0

17:05:58.889023 IP 58.247.15.35.nm-assessor > 61.1.10.1.http: Flags [S], seq 3404001604, win 65535, options [mss 1460,nop,wscale 0,nop,nop,sackOK], length 0

17:05:58.892591 IP 58.247.15.35.nm-assessor > 61.1.10.1.http: Flags [.], ack 4119620738, win 65535, length 0

17:05:58.892947 IP 58.247.15.35.nm-assessor > 61.1.10.1.http: Flags [P.], seq 0:260, ack 1, win 65535, length 260

17:05:58.897836 IP 58.247.15.35.nm-assessor > 61.1.10.1.http: Flags [P.], seq 260:448, ack 444, win 65092, length 188

17:05:58.902468 IP 58.247.15.35.nm-assessor > 61.1.10.1.http: Flags [.], ack 3364, win 65535, length 0

17:05:58.902505 IP 58.247.15.35.nm-assessor > 61.1.10.1.http: Flags [.], ack 4824, win 65535, length 0

17:05:59.199284 IP 58.247.15.35.nm-assessor > 61.1.10.1.http: Flags [.], ack 582292, win 64767, length 0

17:06:02.428984 IP 112.64.235.86.44454 > 61.1.10.1.http: Flags [S], seq 3264687314, win 5840, options [mss 1460,sackOK,TS val 24553782 ecr 0,nop,wscale 9], length 0

17:06:02.431358 IP 112.64.235.86.44454 > 61.1.10.1.http: Flags [.], ack 4086212070, win 12, options [nop,nop,TS val 24553782 ecr 1148745640], length 0

17:06:02.431406 IP 112.64.235.86.44454 > 61.1.10.1.http: Flags [P.], seq 0:439, ack 1, win 12, options [nop,nop,TS val 24553782 ecr 1148745640], length 439

17:06:02.432274 IP 61.1.10.1.50392 > 61.156.241.175.http: Flags [S], seq 3530807695, win 14600, options [mss 1460,sackOK,TS val 1148745643 ecr 0,nop,wscale 9], length 0

17:06:02.448167 IP 61.1.10.1.50392 > 61.156.241.175.http: Flags [.], ack 152401547, win 29, length 0

17:06:02.448227 IP 61.1.10.1.50392 > 61.156.241.175.http: Flags [P.], seq 0:533, ack 1, win 29, length 533

17:06:02.546523 IP 61.1.10.1.50392 > 61.156.241.175.http: Flags [.], ack 360, win 31, length 0

17:06:02.549152 IP 112.64.235.86.44454 > 61.1.10.1.http: Flags [.], ack 391, win 14, options [nop,nop,TS val 24553812 ecr 1148745758], length 0

17:06:02.549215 IP 112.64.235.86.44454 > 61.1.10.1.http: Flags [F.], seq 439, ack 392, win 14, options [nop,nop,TS val 24553812 ecr 1148745758], length 0

17:06:02.549241 IP 112.64.235.86.44485 > 61.1.10.1.http: Flags [S], seq 3266762300, win 5840, options [mss 1460,sackOK,TS val 24553812 ecr 0,nop,wscale 9], length 0

17:06:02.551294 IP 112.64.235.86.44485 > 61.1.10.1.http: Flags [.], ack 535628582, win 12, options [nop,nop,TS val 24553812 ecr 1148745760], length 0

17:06:02.551344 IP 112.64.235.86.44485 > 61.1.10.1.http: Flags [P.], seq 0:417, ack 1, win 12, options [nop,nop,TS val 24553812 ecr 1148745760], length 417

17:06:02.554195 IP 112.64.235.86.44485 > 61.1.10.1.http: Flags [.], ack 1449, win 18, options [nop,nop,TS val 24553813 ecr 1148745763], length 0

17:06:02.554215 IP 112.64.235.86.44485 > 61.1.10.1.http: Flags [.], ack 4345, win 23, options [nop,nop,TS val 24553813 ecr 1148745763], length 0

17:06:02.554228 IP 112.64.235.86.44485 > 61.1.10.1.http: Flags [R.], seq 417, ack 4345, win 23, options [nop,nop,TS val 24553813 ecr 1148745763], length 0

17:06:16.171119 IP 115.29.222.217.63732 > 61.1.10.1.http: Flags [.], ack 240, win 255, length 0

17:06:20.817635 IP 139.226.22.194.53517 > 61.1.10.1.http: Flags [F.], seq 0, ack 1, win 35250, length 0

17:06:20.831027 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [S], seq 2255959654, win 8192, options [mss 1400,nop,wscale 2,nop,nop,sackOK], length 0

17:06:20.846405 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 3361684270, win 16567, length 0

17:06:20.846442 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [P.], seq 0:260, ack 1, win 16567, length 260

17:06:20.856858 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [P.], seq 260:448, ack 444, win 16456, length 188

17:06:20.863273 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 3244, win 16567, length 0

17:06:20.865772 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 7444, win 16567, length 0

17:06:20.866249 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 11644, win 16567, length 0

17:06:21.055303 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 571644, win 16567, length 0

17:06:21.064680 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 575508, win 16567, length 0

17:06:21.064693 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 579260, win 16567, length 0

17:06:21.064696 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 582292, win 16567, length 0

17:06:28.981425 IP 58.247.15.35.nm-assessor > 61.1.10.1.http: Flags [.], ack 582293, win 64767, length 0

17:06:32.545946 IP 61.1.10.1.50392 > 61.156.241.175.http: Flags [F.], seq 533, ack 361, win 31, length 0

17:06:33.019369 IP 61.1.10.1.50392 > 61.156.241.175.http: Flags [.], ack 361, win 31, options [nop,nop,sack 1 {360:361}], length 0

17:06:33.301454 IP 61.1.10.1.50392 > 61.156.241.175.http: Flags [F.], seq 533, ack 361, win 31, length 0

17:06:35.354688 IP 210.13.94.157.16702 > 61.1.10.1.http: Flags [F.], seq 999380700, ack 53647190, win 65535, length 0

17:06:35.355157 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [S], seq 3536386158, win 65535, options [mss 1460,nop,nop,sackOK], length 0

17:06:35.361759 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 2449944162, win 65535, length 0

17:06:35.362296 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [P.], seq 0:235, ack 1, win 65535, length 235

17:06:35.373074 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 7301, win 65535, length 0

17:06:35.373846 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 16061, win 59695, length 0

17:06:35.374822 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 20441, win 55315, length 0

17:06:35.376290 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 35041, win 40715, length 0

17:06:35.380174 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 37961, win 37795, length 0

17:06:35.380765 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 43801, win 31955, length 0

17:06:35.381143 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 48181, win 27575, length 0

17:06:35.381153 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 52561, win 23195, length 0

17:06:35.382164 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 59861, win 15895, length 0

17:06:35.382694 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 65701, win 10055, length 0

17:06:35.383286 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 71541, win 4215, length 0

17:06:35.383714 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 74461, win 1295, length 0

17:06:35.393351 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 74461, win 5055, length 0

17:06:35.393399 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 74461, win 65535, length 0

17:06:35.401663 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 80301, win 65535, length 0

17:06:35.402996 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 83221, win 65535, length 0

17:06:35.403311 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 87601, win 65535, length 0

17:06:35.403335 IP 210.13.94.157.16703 > 61.1.10.1.http: Flags [.], ack 93314, win 65535, length 0

17:06:48.552942 IP 115.29.222.217.64786 > 61.1.10.1.http: Flags [S], seq 3863560027, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0

17:06:48.587482 IP 115.29.222.217.64786 > 61.1.10.1.http: Flags [.], ack 516459580, win 256, length 0

17:06:48.587529 IP 115.29.222.217.64786 > 61.1.10.1.http: Flags [P.], seq 0:208, ack 1, win 256, length 208

17:06:48.636870 IP 115.29.222.217.64790 > 61.1.10.1.http: Flags [S], seq 1459101229, win 8192, options [mss 1460,nop,wscale 8,nop,nop,sackOK], length 0

17:06:48.664935 IP 115.29.222.217.64790 > 61.1.10.1.http: Flags [.], ack 3239240326, win 256, length 0

17:06:48.665547 IP 115.29.222.217.64790 > 61.1.10.1.http: Flags [P.], seq 0:558, ack 1, win 256, length 558

17:06:48.821821 IP 115.29.222.217.64786 > 61.1.10.1.http: Flags [.], ack 239, win 255, length 0

17:06:48.890830 IP 115.29.222.217.64790 > 61.1.10.1.http: Flags [.], ack 239, win 255, length 0

17:06:49.742476 IP 115.29.222.217.64786 > 61.1.10.1.http: Flags [F.], seq 208, ack 239, win 255, length 0

17:06:49.775921 IP 115.29.222.217.64786 > 61.1.10.1.http: Flags [.], ack 240, win 255, length 0

17:06:50.976340 IP 139.226.22.194.53523 > 61.1.10.1.http: Flags [.], ack 582293, win 16567, length 0

17:06:58.888931 IP 58.247.15.35.s8-client-port > 61.1.10.1.http: Flags [S], seq 264411760, win 65535, options [mss 1460,nop,wscale 0,nop,nop,sackOK], length 0

17:06:58.891584 IP 58.247.15.35.s8-client-port > 61.1.10.1.http: Flags [.], ack 2739712364, win 65535, length 0

17:06:58.891978 IP 58.247.15.35.s8-client-port > 61.1.10.1.http: Flags [P.], seq 0:260, ack 1, win 65535, length 260

17:06:58.896269 IP 58.247.15.35.s8-client-port > 61.1.10.1.http: Flags [P.], seq 260:448, ack 444, win 65092, length 188

17:06:58.900719 IP 58.247.15.35.s8-client-port > 61.1.10.1.http: Flags [.], ack 3364, win 65535, length 0

17:06:58.900765 IP 58.247.15.35.s8-client-port > 61.1.10.1.http: Flags [.], ack 4824, win 65535, length 0

17:06:58.901119 IP 58.247.15.35.s8-client-port > 61.1.10.1.http: Flags [.], ack 7744, win 65535, length 0

17:06:58.901133 IP 58.247.15.35.s8-client-port > 61.1.10.1.http: Flags [.], ack 9204, win 65535, length 0

dropwatch -l kas

2 drops at ip_rcv_finish+16c (0xffffffff815364ec)

3 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)

3 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)

1 drops at sk_stream_kill_queues+50 (0xffffffff814f3090)

2 drops at unix_stream_connect+2ca (0xffffffff815a340a)

1 drops at __netif_receive_skb_core+703 (0xffffffff814fc173)

1 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)

1 drops at sk_stream_kill_queues+50 (0xffffffff814f3090)

6 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)

6 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)

2 drops at ip_rcv_finish+16c (0xffffffff815364ec)

2 drops at unix_stream_connect+2ca (0xffffffff815a340a)

5 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)

5 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)

2 drops at ip_rcv_finish+16c (0xffffffff815364ec)

2 drops at unix_stream_connect+2ca (0xffffffff815a340a)

1 drops at __netif_receive_skb_core+703 (0xffffffff814fc173)

8 drops at skb_queue_purge+18 (0xffffffff814ecd38)

2 drops at unix_stream_connect+2ca (0xffffffff815a340a)

3 drops at ip_rcv_finish+16c (0xffffffff815364ec)

2 drops at unix_stream_connect+2ca (0xffffffff815a340a)

2 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)

2 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)

2 drops at unix_stream_connect+2ca (0xffffffff815a340a)

3 drops at ip_rcv_finish+16c (0xffffffff815364ec)

2 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)

2 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)

2 drops at unix_stream_connect+2ca (0xffffffff815a340a)

1 drops at __netif_receive_skb_core+703 (0xffffffff814fc173)

4 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)

4 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)

14 drops at unix_stream_connect+2ca (0xffffffff815a340a)

2 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)

2 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)

1 drops at __netif_receive_skb_core+703 (0xffffffff814fc173)

8 drops at skb_queue_purge+18 (0xffffffff814ecd38)

1 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)

1 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)

8 drops at unix_stream_connect+2ca (0xffffffff815a340a)

20 drops at unix_stream_connect+2ca (0xffffffff815a340a)

12 drops at unix_stream_connect+2ca (0xffffffff815a340a)

1 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)

1 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)

2 drops at ip_rcv_finish+16c (0xffffffff815364ec)

2 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)

2 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)

1 drops at tcp_v4_rcv+78 (0xffffffff8155bf88)

2 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)

2 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)

2 drops at ip_rcv_finish+16c (0xffffffff815364ec)

2 drops at unix_stream_connect+2ca (0xffffffff815a340a)

4 drops at tcp_rcv_state_process+1b0 (0xffffffff81550af0)

4 drops at tcp_v4_do_rcv+ac (0xffffffff8155a19c)

^CGot a stop message

请高手指点谢谢

  • 1
    点赞
  • 0
    收藏
    觉得还不错? 一键收藏
  • 0
    评论
评论
添加红包

请填写红包祝福语或标题

红包个数最小为10个

红包金额最低5元

当前余额3.43前往充值 >
需支付:10.00
成就一亿技术人!
领取后你会自动成为博主和红包主的粉丝 规则
hope_wisdom
发出的红包
实付
使用余额支付
点击重新获取
扫码支付
钱包余额 0

抵扣说明:

1.余额是钱包充值的虚拟货币,按照1:1的比例进行支付金额的抵扣。
2.余额无法直接购买下载,可以购买VIP、付费专栏及课程。

余额充值