+++ This bug was initially created as a clone of Bug #238725 +++ Description of problem: IPV4 networking stack emits the following type of messages occasionally TCP: Treason uncloaked! Peer A.B.C.D:4138/80 shrinks window 2421420804:2421422264. Repaired. TCP: Treason uncloaked! Peer E.F.G.H:5013/80 shrinks window 281635575:281635576. Repaired. TCP: Treason uncloaked! Peer I.J.K.L:38740/80 shrinks window 1393004015:1393005475. Repaired. Version-Release number of selected component (if applicable): kernel-2.6.9-55 How reproducible: Tricky Steps to Reproduce: 1. run networking and wait. 2. 3. Actual results: TCP: Treason uncloaked! Peer A.B.C.D:4138/80 shrinks window 2421420804:2421422264. Repaired. TCP: Treason uncloaked! Peer E.F.G.H:5013/80 shrinks window 281635575:281635576. Repaired. TCP: Treason uncloaked! Peer I.J.K.L:38740/80 shrinks window 1393004015:1393005475. Repaired. Expected results: no logs. Additional info: Root cause has been identified and fixed upstream http://kernel.org/git/?p=linux/kernel/git/torvalds/linux-2.6.git;a=commitdiff;h=2ad41065d9fe518759b695fc2640cf9c07261dd2
Created attachment 159762 [details] patch for treason warnings derived from upstream change
A patch for this issue has been included in build 2.4.21-53.EL.
An advisory has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2007-1049.html