Re: FC4 - IBM e326 - network problems.

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



When I do reinitialise I get this :

tg3: eth0: Link is down.
tg3: eth0: Link is up at 100 Mbps, full duplex.
tg3: eth0: Flow control is off for TX and off for RX.



On Mon, 2005-08-22 at 12:53 +0900, Naoki wrote:
> Hi all.
> 
> I have a networking problem here I'd like to share.
> 
> Cut down FC4 build on an IBM e326.  
> 
> I am attempting to SCP 2.4MB of data to this box ( from anywhere the
> results are the same ).
> 
> It connects, asks for password, which I give.  And then after a few
> packets I see it all go very ugly indeed.  Throwing retransmissions and,
> segment losts, and DUP ACK messages. 
> Which just kills the scp with a "Stalled" message. If I leave it then
> _eventaully_ the file will transfer.
> 
> I've changed switches and have the same result.  Starting to wonder if
> there is a problem with the Broadcom ethernet controller?  One of the
> reasons I suspect the controller is performance jumps to normal (good)
> after I reinitialise the card.
> 
> 
> Server end :
> 
>   4.913749    10.0.2.27 -> 10.0.2.31    SSHv2 Encrypted request packet
> len=144
>   4.916377    10.0.2.31 -> 10.0.2.27    SSHv2 Encrypted response packet
> len=32
>   4.916533    10.0.2.27 -> 10.0.2.31    TCP 60952 > ssh [ACK] Seq=1293
> Ack=1597 Win=8400 Len=0 TSV=2056922151 TSER=5310028
>   4.916828    10.0.2.27 -> 10.0.2.31    SSHv2 Encrypted request packet
> len=64
>   4.916965    10.0.2.31 -> 10.0.2.27    SSHv2 Encrypted response packet
> len=48
>   4.917276    10.0.2.27 -> 10.0.2.31    SSHv2 Encrypted request packet
> len=64
>   4.918916    10.0.2.31 -> 10.0.2.27    SSHv2 Encrypted response packet
> len=48
>   4.958139    10.0.2.27 -> 10.0.2.31    TCP 60952 > ssh [ACK] Seq=1421
> Ack=1693 Win=8400 Len=0 TSV=2056922193 TSER=5310031
>   4.958153    10.0.2.31 -> 10.0.2.27    SSHv2 Encrypted response packet
> len=48
>   4.958306    10.0.2.27 -> 10.0.2.31    TCP 60952 > ssh [ACK] Seq=1421
> Ack=1741 Win=8400 Len=0 TSV=2056922193 TSER=5310070
>   4.958609    10.0.2.27 -> 10.0.2.31    SSHv2 Encrypted request packet
> len=64
>   4.958762    10.0.2.31 -> 10.0.2.27    SSHv2 Encrypted response packet
> len=48
>   4.962323    10.0.2.27 -> 10.0.2.31    SSHv2 Encrypted request packet
> len=1448
>   4.962446    10.0.2.27 -> 10.0.2.31    SSHv2 Encrypted request packet
> len=1448
>   4.962451    10.0.2.31 -> 10.0.2.27    TCP ssh > 60952 [ACK] Seq=1789
> Ack=4381 Win=15424 Len=0 TSV=5310074 TSER=2056922196
>   4.962986    10.0.2.27 -> 10.0.2.31    SSHv2 Encrypted request packet
> len=1448
>   4.963239    10.0.2.27 -> 10.0.2.31    SSHv2 [TCP Previous segment
> lost] Encrypted request packet len=1448
>   4.963244    10.0.2.31 -> 10.0.2.27    TCP ssh > 60952 [ACK] Seq=1789
> Ack=5829 Win=18320 Len=0 TSV=5310075 TSER=2056922197 SLE=7277 SRE=8725
>   4.963780    10.0.2.27 -> 10.0.2.31    SSHv2 Encrypted request packet
> len=1448
>   4.963785    10.0.2.31 -> 10.0.2.27    TCP [TCP Dup ACK 46#1] ssh >
> 60952 [ACK] Seq=1789 Ack=5829 Win=18320 Len=0 TSV=5310076
> TSER=2056922197 SLE=7277 SRE=10173
>   5.178550    10.0.2.27 -> 10.0.2.31    SSHv2 [TCP Retransmission]
> Encrypted request packet len=1448
>   5.178557    10.0.2.31 -> 10.0.2.27    TCP ssh > 60952 [ACK] Seq=1789
> Ack=10173 Win=21216 Len=0 TSV=5310290 TSER=2056922413
>   5.179217    10.0.2.27 -> 10.0.2.31    SSHv2 [TCP Previous segment
> lost] Encrypted request packet len=1448
>   5.179221    10.0.2.31 -> 10.0.2.27    TCP [TCP Dup ACK 50#1] ssh >
> 60952 [ACK] Seq=1789 Ack=10173 Win=21216 Len=0 TSV=5310291
> TSER=2056922413 SLE=11621 SRE=13069
>   5.179741    10.0.2.27 -> 10.0.2.31    SSHv2 Encrypted request packet
> len=1448
>   5.179745    10.0.2.31 -> 10.0.2.27    TCP [TCP Dup ACK 50#2] ssh >
> 60952 [ACK] Seq=1789 Ack=10173 Win=21216 Len=0 TSV=5310292
> TSER=2056922413 SLE=11621 SRE=14517
>   5.180252    10.0.2.27 -> 10.0.2.31    SSHv2 Encrypted request packet
> len=1448
>   5.180255    10.0.2.31 -> 10.0.2.27    TCP [TCP Dup ACK 50#3] ssh >
> 60952 [ACK] Seq=1789 Ack=10173 Win=21216 Len=0 TSV=5310292
> TSER=2056922413 SLE=11621 SRE=15965
>   5.391515    10.0.2.27 -> 10.0.2.31    SSHv2 [TCP Retransmission]
> Encrypted request packet len=1448
>   5.391520    10.0.2.31 -> 10.0.2.27    TCP ssh > 60952 [ACK] Seq=1789
> Ack=15965 Win=24112 Len=0 TSV=5310503 TSER=2056922626
>   5.392043    10.0.2.27 -> 10.0.2.31    SSHv2 Encrypted request packet
> len=1448
>   5.392048    10.0.2.31 -> 10.0.2.27    TCP ssh > 60952 [ACK] Seq=1789
> Ack=17413 Win=27008 Len=0 TSV=5310504 TSER=2056922626
>   5.603540    10.0.2.27 -> 10.0.2.31    SSHv2 [TCP Out-Of-Order]
> Encrypted request packet len=1448
>   5.603546    10.0.2.31 -> 10.0.2.27    TCP [TCP Dup ACK 60#1] ssh >
> 60952 [ACK] Seq=1789 Ack=17413 Win=27008 Len=0 TSV=5310715
> TSER=2056922838 SLE=15965 SRE=17413
> 
> Broadcom Corporation NetXtreme BCM5704 Gigabit Ethernet - tg3 driver.
> # ethtool eth0
> Settings for eth0:
>         Supported ports: [ MII ]
>         Supported link modes:   10baseT/Half 10baseT/Full
>                                 100baseT/Half 100baseT/Full
>                                 1000baseT/Half 1000baseT/Full
>         Supports auto-negotiation: Yes
>         Advertised link modes:  Not reported
>         Advertised auto-negotiation: No
>         Speed: 100Mb/s
>         Duplex: Full
>         Port: Twisted Pair
>         PHYAD: 1
>         Transceiver: internal
>         Auto-negotiation: off
>         Supports Wake-on: g
>         Wake-on: d
>         Current message level: 0x000000ff (255)
>         Link detected: yes
> 
> 
> 
> Client end : 
>   5.019926    10.0.2.27 -> 10.0.2.31    SSHv2 [TCP Retransmission]
> Encrypted request packet len=1448
>   5.020438    10.0.2.31 -> 10.0.2.27    TCP ssh > 35380 [ACK] Seq=1789
> Ack=7277 Win=21216 Len=0 TSV=6343633 TSER=2057955472 SLE=4381 SRE=5829
>   5.020513    10.0.2.27 -> 10.0.2.31    SSHv2 Encrypted request packet
> len=1448
>   5.020523    10.0.2.27 -> 10.0.2.31    SSHv2 Encrypted request packet
> len=1448
>   5.263902    10.0.2.27 -> 10.0.2.31    SSHv2 [TCP Retransmission]
> Encrypted request packet len=1448
>   5.264426    10.0.2.31 -> 10.0.2.27    TCP ssh > 35380 [ACK] Seq=1789
> Ack=10173 Win=24112 Len=0 TSV=6343877 TSER=2057955920
>   5.264464    10.0.2.27 -> 10.0.2.31    SSHv2 [TCP Retransmission]
> Encrypted request packet len=1448
>   5.264475    10.0.2.27 -> 10.0.2.31    SSHv2 Encrypted request packet
> len=1448
>   5.500935    10.0.2.27 -> 10.0.2.31    SSHv2 [TCP Retransmission]
> Encrypted request packet len=1448
> 
> Client shows retransmissions but no DUP Ack or segment lost messages.
> 
> Any ideas? I have other servers running with Broadcom BCM5703X chips and
> using the tg3 driver without problem.



[Index of Archives]     [Current Fedora Users]     [Fedora Desktop]     [Fedora SELinux]     [Yosemite News]     [Yosemite Photos]     [KDE Users]     [Fedora Tools]     [Fedora Docs]

  Powered by Linux