From owner-freebsd-bugs@freebsd.org Sun Jan 6 17:30:05 2019 Return-Path: Delivered-To: freebsd-bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id B81FB1494EEB for ; Sun, 6 Jan 2019 17:30:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 3935986C03 for ; Sun, 6 Jan 2019 17:30:04 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id F1B6A1494EEA; Sun, 6 Jan 2019 17:30:03 +0000 (UTC) Delivered-To: bugs@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CC5EE1494EE9 for ; Sun, 6 Jan 2019 17:30:03 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 63E4086BF7 for ; Sun, 6 Jan 2019 17:30:03 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 91431AA9C for ; Sun, 6 Jan 2019 17:30:02 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x06HU2XT056828 for ; Sun, 6 Jan 2019 17:30:02 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x06HU2vg056827 for bugs@FreeBSD.org; Sun, 6 Jan 2019 17:30:02 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: bugs@FreeBSD.org Subject: [Bug 234668] RealTek 8168/8111 can no longer transfer large files Date: Sun, 06 Jan 2019 17:30:02 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: misc X-Bugzilla-Version: 12.0-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Only Me X-Bugzilla-Who: chadr@zang.com X-Bugzilla-Status: New X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: bugs@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Sun, 06 Jan 2019 17:30:05 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D234668 Bug ID: 234668 Summary: RealTek 8168/8111 can no longer transfer large files Product: Base System Version: 12.0-RELEASE Hardware: Any OS: Any Status: New Severity: Affects Only Me Priority: --- Component: misc Assignee: bugs@FreeBSD.org Reporter: chadr@zang.com I upgraded from 11.0 to 12.0 and since then have been unable to transfer la= rge files TO the host, though sending files from that host is unaffected. I've attempted file xfer via scp, rsync and cifs and in each case the file transfer starts, gets a few megabytes in, and then stalls, with the bandwidth-counters wuickly falling to zero. There are no errors reported via e.g. netstat -I, and nothing in the logs. Here's the dmesg for the interfac= e: % cat /var/run/dmesg.boot |grep re0 re0: port 0xa000-0xa0ff mem 0xd2104000-0xd2104fff,0xd2100000-0xd2103fff irq 17 at dev= ice 0.0 on pci12 re0: Using 1 MSI-X message re0: Chip rev. 0x2c000000 re0: MAC rev. 0x00200000 miibus0: on re0 re0: Using defaults for TSO: 65518/35/2048 re0: Ethernet address: aa:bb:cc:dd:ee:ff re0: netmap queues/slots: TX 1/256, RX 1/256 re0: link state changed to DOWN re0: link state changed to UP And here's ifconfig: % ifconfig re0 re0: flags=3D8843 metric 0 mtu 1500 =20=20=20=20=20=20=20 options=3D8209b ether bc:5f:f4:2c:f3:2e inet 192.168.235.4 netmask 0xffffff00 broadcast 192.168.235.255=20 inet 192.168.235.30 netmask 0xffffffff broadcast 192.168.235.30=20 inet 192.168.235.31 netmask 0xffffffff broadcast 192.168.235.31=20 inet 192.168.235.32 netmask 0xffffffff broadcast 192.168.235.32=20 media: Ethernet autoselect (1000baseT ) status: active nd6 options=3D29 This is the only interface on the host. Attempted debugging: - removed bridge0 and tap0 - moved physical switch ports - sysctl net.inet.ip.redirect=3D0 - sysctl net.link.ether.inet.allow_multicast=3D1 - attempted to limit bandwidth used with 'scp -l ', and for low values (1024, 2048, 4096...) I would get a 'stall' message after a couple of secon= ds, but then scp would recover and proceed normally (albeit slowly); I would terminate after 2 minutes of transfer just because I dont have all day, but= saw no further stall messages. This worked fine through 131072. At '-l 262144' = scp was unable to recover from the stall. --=20 You are receiving this mail because: You are the assignee for the bug.=