From owner-freebsd-current@FreeBSD.ORG Thu Mar 8 12:57:56 2007 Return-Path: X-Original-To: current@freebsd.org Delivered-To: freebsd-current@FreeBSD.ORG Received: from mx1.freebsd.org (mx1.freebsd.org [69.147.83.52]) by hub.freebsd.org (Postfix) with ESMTP id 3EE9E16A407 for ; Thu, 8 Mar 2007 12:57:56 +0000 (UTC) (envelope-from pyunyh@gmail.com) Received: from wx-out-0506.google.com (wx-out-0506.google.com [66.249.82.233]) by mx1.freebsd.org (Postfix) with ESMTP id E5E6113C4B3 for ; Thu, 8 Mar 2007 12:57:55 +0000 (UTC) (envelope-from pyunyh@gmail.com) Received: by wx-out-0506.google.com with SMTP id s18so442536wxc for ; Thu, 08 Mar 2007 04:57:55 -0800 (PST) DKIM-Signature: a=rsa-sha1; c=relaxed/relaxed; d=gmail.com; s=beta; h=domainkey-signature:received:received:received:received:date:from:to:cc:subject:message-id:reply-to:references:mime-version:content-type:content-disposition:in-reply-to:user-agent; b=bNLeqcV97fYKXkQ9NpPrJjg24JTvB7fqoDdUd/QC+QMwJRbA56wt1PIoQPiVeyz4gFJxndvI4pCaEo7zkVMRJMKhGJBbyKix8w71+GI1e31KCEQ0gDgBn90NDfxencvsrpBhb5kxR4eycFKweWe4I6koojS5CNhn33mZoHWyzu0= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=beta; h=received:date:from:to:cc:subject:message-id:reply-to:references:mime-version:content-type:content-disposition:in-reply-to:user-agent; b=G3jKGwkkObMrYUUh1mKR+J/XAr/rNzmh5zfRyg3w+3++Cf7jqt+8Rc5FemQvAuQagixIzcn+JJscUB4oB3y8ohXoLRPYl+nGF7L9U5Tt1WhJ06AlB4TP02w+YuqAmBaNG16xFnOJoCIiBGYAhQrl3oo8yH0BVLh+VL8J2hevONU= Received: by 10.90.79.6 with SMTP id c6mr164656agb.1173358675500; Thu, 08 Mar 2007 04:57:55 -0800 (PST) Received: from michelle.cdnetworks.co.kr ( [211.53.35.84]) by mx.google.com with ESMTP id 5sm7690775nzk.2007.03.08.04.57.52; Thu, 08 Mar 2007 04:57:54 -0800 (PST) Received: from michelle.cdnetworks.co.kr (localhost.cdnetworks.co.kr [127.0.0.1]) by michelle.cdnetworks.co.kr (8.13.5/8.13.5) with ESMTP id l28CxDZs068769 (version=TLSv1/SSLv3 cipher=DHE-RSA-AES256-SHA bits=256 verify=NO); Thu, 8 Mar 2007 21:59:13 +0900 (KST) (envelope-from pyunyh@gmail.com) Received: (from yongari@localhost) by michelle.cdnetworks.co.kr (8.13.5/8.13.5/Submit) id l28Cx8sI068768; Thu, 8 Mar 2007 21:59:08 +0900 (KST) (envelope-from pyunyh@gmail.com) Date: Thu, 8 Mar 2007 21:59:08 +0900 From: Pyun YongHyeon To: Danny Braniss Message-ID: <20070308125908.GD62062@cdnetworks.co.kr> References: Mime-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: User-Agent: Mutt/1.4.2.1i Cc: "Bjoern A. Zeeb" , "Andrey V. Elsukov" , FreeBSD current mailing list , Sergey Zaharchenko Subject: Re: nve related LOR triggered by lots of small packets, and a hard hang X-BeenThere: freebsd-current@freebsd.org X-Mailman-Version: 2.1.5 Precedence: list Reply-To: pyunyh@gmail.com List-Id: Discussions about the use of FreeBSD-current List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 08 Mar 2007 12:57:56 -0000 On Wed, Mar 07, 2007 at 02:05:35PM +0200, Danny Braniss wrote: > > On Wed, Feb 21, 2007 at 12:17:52PM +0200, Danny Braniss wrote: > > > > Pyun YongHyeon wrote: > > > > > Because your dmesg for nfe(4) shows 'obsoleted if_watchdog interface' > > > > > message I think you've used stock nfe(4) on CURRENT. > > > > > Try overhauld nfe(4) at the following URL. > > > > > > > > > > http://people.freebsd.org/~yongari/nfe/if_nfe.c > > > > > http://people.freebsd.org/~yongari/nfe/if_nfereg.h > > > > > http://people.freebsd.org/~yongari/nfe/if_nfevar.h > > > > > > > > > > The new nfe(4) has several protections for watchdog timeout errors > > > > > reported on the driver. One user repored TSO related issues for > > > > > the new driver so if you encounter strange errors in the new driver > > > > > please turn off TSO capability(e.g. #ifconfig nfe0 -tso) > > > > > > > hi, > > > I'm having 2 - probably related - problems: > > > 1- on a diskless host, it boots via PXE, attaches the NIC > > > but somehow the mount root nsf is bypassed. > > > 2- booting of the disk, and with ifconfig_nfe0="DHCP", dhclient > > > fails. > > > > > > if I run: > > > dhclient nfe0 > > > all is fine. > > > > > > adding 'net.inet.tcp.tso="0"' to sysctl.conf fixed 2, but > > > adding the same to loader.conf did not help with the PXE boot. > > > > > > danny > > > > > > > > > > Sorry for late reply. > > Do you use MCP65 based hardware? It seems that MCP65 does not have > > checksum offload capability on the hardware so TSO should not be > > used on MCP65. > > it's supposed to be a MCP51, but: > nfe0: > > > (Due to lack of datasheet I've unconditionally enabled TSO for > > hardwares that have checksum offload capability.) > > dmesg will show you what hardware were attached. > > > > If your hardware is not MCP65 based one please try latest tcp_output.c > > (rev, 1.125). Recently andre@ fixed TSO related bug. > > I tried the latest, and it 'seems' to work ok if I boot of the disk, but still having > problems when booting via PXE: > > ... > nfe0: port 0xdc00-0xdc07 mem 0xfe02c000-0xfe02cfff irq 22 at device 20.0 on pci0 > nfe0: Ethernet address: 57:6c:a9:f3:18:00 > miibus1: on nfe0 > e1000phy0: PHY 11 on miibus1 > e1000phy0: 10baseT, 10baseT-FDX, 100baseTX, 100baseTX-FDX, 1000baseTX-FDX, auto > nfe0: [ITHREAD] > ... > nfs_diskless: no interface > ... > > danny > PS: maybe it's time to change the Subject:? > Yes, but I guess PXE booting has nothing to do with nfe(4). If my memory serve me right I've used 'options BOOTP_WIRED_TO=hme0' to net-boot on sparc64. > -- Regards, Pyun YongHyeon