Demonstrations of tcpdrop, the Linux BPF/bcc version. tcpdrop prints details of TCP packets or segments that were dropped by the kernel, including the kernel stack trace that led to the drop: # ./tcpdrop.py TIME PID IP SADDR:SPORT > DADDR:DPORT STATE (FLAGS) 20:49:06 0 4 10.32.119.56:443 > 10.66.65.252:22912 CLOSE (ACK) tcp_drop+0x1 tcp_v4_do_rcv+0x135 tcp_v4_rcv+0x9c7 ip_local_deliver_finish+0x62 ip_local_deliver+0x6f ip_rcv_finish+0x129 ip_rcv+0x28f __netif_receive_skb_core+0x432 __netif_receive_skb+0x18 netif_receive_skb_internal+0x37 napi_gro_receive+0xc5 ena_clean_rx_irq+0x3c3 ena_io_poll+0x33f net_rx_action+0x140 __softirqentry_text_start+0xdf irq_exit+0xb6 do_IRQ+0x82 ret_from_intr+0x0 native_safe_halt+0x6 default_idle+0x20 arch_cpu_idle+0x15 default_idle_call+0x23 do_idle+0x17f cpu_startup_entry+0x73 rest_init+0xae start_kernel+0x4dc x86_64_start_reservations+0x24 x86_64_start_kernel+0x74 secondary_startup_64+0xa5 20:49:50 12431 4 127.0.0.1:8198 > 127.0.0.1:48280 CLOSE (RST|ACK) tcp_drop+0x1 tcp_v4_do_rcv+0x135 __release_sock+0x88 release_sock+0x30 inet_stream_connect+0x47 SYSC_connect+0x9e sys_connect+0xe do_syscall_64+0x73 entry_SYSCALL_64_after_hwframe+0x3d [...] The last two columns show the state of the TCP session, and the TCP flags. These two examples show packets arriving for a session in the closed state, that were dropped by the kernel. This tool is useful for debugging high rates of drops, which can cause the remote end to do timer-based retransmits, hurting performance. USAGE: # ./tcpdrop.py -h usage: tcpdrop.py [-h] Trace TCP drops by the kernel optional arguments: -h, --help show this help message and exit examples: ./tcpdrop # trace kernel TCP drops