[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

Bug#283107: kernel-image-2.4.27-1-sparc64-smp: telnet-connections to some hosts fail



Package: kernel-image-2.4.27-1-sparc64-smp
Version: 2.4.27-1
Severity: important


After upgrading one of our Ultra 2 from woody to sarge telnet-connections
to some hosts fail with kernel-image-2.4.27-1-sparc64-smp.

Here is what I get with kernel-image-2.4.19-sun4u-smp fom woody:

 ---------------------------------------
raoul@dns1:~$ telnet m-nas1
Trying 188.1.74.38...
Connected to muenchen-nas1.shuttle.de.
Escape character is '^]'.


(m-nas1.shuttle.de) Enter password:

Incorrect password.

(m-nas1.shuttle.de) Enter password:

Incorrect password.

(m-nas1.shuttle.de) Enter password:

Authentication failed. Closing telnet session.

Connection closed by foreign host.
raoul@dns1:~$
 ---------------------------------------

With kernel-image-2.4.27-1-sparc64-smp I get:

 ---------------------------------------
raoul@testsparc:~$ telnet m-nas1
Trying 188.1.74.38...
Connected to muenchen-nas1.shuttle.de.
Escape character is '^]'.


(m-nas1.shuttle.de) Enter password:
 ---------------------------------------

After that the session is 'frozen'. It's not possible to type
anything else than '^]' and make the telnet-client quit the session.

Could it be related to the known problems with the onboard 100 Mbit/s
interface on these old SBUS-Ultra-2s? If I use an 10 Mbit/s sbus-card
everything works fine.
Also this problem does not show up on our other Ultras (which all have
only 10 Mbit/s interfaces).

I have attached tcpdump-output for both kernels to this email and hope
that this gives someone any idea what's going on.

I'd be happy to help in testing kernel-patches...

Thanx for any help

 Raoul


-- System Information:
Debian Release: 3.1
  APT prefers testing
  APT policy: (500, 'testing')
Architecture: sparc (sparc64)
Kernel: Linux 2.4.27-1-sparc64-smp
Locale: LANG=C, LC_CTYPE=C

Versions of packages kernel-image-2.4.27-1-sparc64-smp depends on:
ii  initrd-tools                  0.1.74     tools to create initrd image for p

-- no debconf information
root@testsparc:~# tcpdump -n -i eth0 host m-nas1
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
15:25:02.657054 IP 193.174.247.152.32769 > 188.1.74.38.23: S 1125197291:1125197291(0) win 5840 <mss 1460,sackOK,timestamp 9856 0,nop,wscale 0>
15:25:02.664246 IP 188.1.74.38.23 > 193.174.247.152.32769: S 231464214:231464214(0) ack 1125197292 win 4380 <mss 536>
15:25:02.664337 IP 193.174.247.152.32769 > 188.1.74.38.23: . ack 1 win 5840
15:25:02.665866 IP 193.174.247.152.32769 > 188.1.74.38.23: P 1:25(24) ack 1 win 5840
15:25:02.672629 IP 188.1.74.38.23 > 193.174.247.152.32769: P 1:4(3) ack 1 win 4380
15:25:02.672694 IP 193.174.247.152.32769 > 188.1.74.38.23: . ack 4 win 5840
15:25:02.674285 IP 188.1.74.38.23 > 193.174.247.152.32769: P 4:50(46) ack 25 win 4380
15:25:02.674344 IP 193.174.247.152.32769 > 188.1.74.38.23: P 25:28(3) ack 50 win 5840
15:25:02.681929 IP 188.1.74.38.23 > 193.174.247.152.32769: P 50:74(24) ack 28 win 4380
15:25:02.682014 IP 193.174.247.152.32769 > 188.1.74.38.23: P 28:31(3) ack 74 win 5840
15:25:02.688951 IP 188.1.74.38.23 > 193.174.247.152.32769: P 74:77(3) ack 31 win 4380
15:25:02.725518 IP 193.174.247.152.32769 > 188.1.74.38.23: . ack 77 win 5840

 [...now hitting 'ENTER' three times...]
                                
15:25:06.342206 IP 193.174.247.152.32769 > 188.1.74.38.23: P 31:33(2) ack 77 win 5840
15:25:06.349372 IP 188.1.74.38.23 > 193.174.247.152.32769: P 77:100(23) ack 33 win 4380
15:25:06.349447 IP 193.174.247.152.32769 > 188.1.74.38.23: . ack 100 win 5840
15:25:06.356277 IP 188.1.74.38.23 > 193.174.247.152.32769: P 100:140(40) ack 33 win 4380
15:25:06.356337 IP 193.174.247.152.32769 > 188.1.74.38.23: . ack 140 win 5840
15:25:06.826687 IP 193.174.247.152.32769 > 188.1.74.38.23: P 33:35(2) ack 140 win 5840
15:25:06.833959 IP 188.1.74.38.23 > 193.174.247.152.32769: P 140:163(23) ack 35 win 4380
15:25:06.834026 IP 193.174.247.152.32769 > 188.1.74.38.23: . ack 163 win 5840
15:25:06.841318 IP 188.1.74.38.23 > 193.174.247.152.32769: P 163:203(40) ack 35 win 4380
15:25:06.841376 IP 193.174.247.152.32769 > 188.1.74.38.23: . ack 203 win 5840
15:25:07.313460 IP 193.174.247.152.32769 > 188.1.74.38.23: P 35:37(2) ack 203 win 5840
15:25:07.324426 IP 188.1.74.38.23 > 193.174.247.152.32769: P 203:257(54) ack 37 win 4380
15:25:07.324497 IP 193.174.247.152.32769 > 188.1.74.38.23: . ack 257 win 5840
15:25:07.325120 IP 188.1.74.38.23 > 193.174.247.152.32769: F 257:257(0) ack 37 win 4380
15:25:07.325395 IP 193.174.247.152.32769 > 188.1.74.38.23: F 37:37(0) ack 258 win 5840
15:25:07.332924 IP 188.1.74.38.23 > 193.174.247.152.32769: . ack 38 win 4380

28 packets captured
32 packets received by filter
0 packets dropped by kernel
root@testsparc:~# 
root@testsparc:~# tcpdump -n -i eth0  host m-nas1
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on eth0, link-type EN10MB (Ethernet), capture size 96 bytes
15:36:59.712542 IP 193.174.247.152.32769 > 188.1.74.38.23: S 1127367887:1127367887(0) win 5840 <mss 1460,sackOK,timestamp 54408 0,nop,wscale 0>
15:36:59.719576 IP 188.1.74.38.23 > 193.174.247.152.32769: S 323278224:323278224(0) ack 1127367888 win 4380 <mss 536>
15:36:59.719680 IP 193.174.247.152.32769 > 188.1.74.38.23: . ack 1 win 5840
15:36:59.721400 IP 193.174.247.152.32769 > 188.1.74.38.23: P 1:25(24) ack 1 win 5840
15:36:59.727603 IP 188.1.74.38.23 > 193.174.247.152.32769: P 1:4(3) ack 1 win 4380
15:36:59.727669 IP 193.174.247.152.32769 > 188.1.74.38.23: . ack 4 win 5840
15:36:59.729249 IP 188.1.74.38.23 > 193.174.247.152.32769: P 4:50(46) ack 25 win 4380
15:36:59.729306 IP 193.174.247.152.32769 > 188.1.74.38.23: P 25:28(3) ack 50 win 5840
15:36:59.736291 IP 188.1.74.38.23 > 193.174.247.152.32769: P 50:74(24) ack 28 win 4380
15:36:59.736374 IP 193.174.247.152.32769 > 188.1.74.38.23: P 28:31(3) ack 74 win 5840
15:36:59.743329 IP 188.1.74.38.23 > 193.174.247.152.32769: P 74:77(3) ack 31 win 4380
15:36:59.773541 IP 193.174.247.152.32769 > 188.1.74.38.23: . ack 77 win 5840

[...now hitting 'ENTER' once...]

15:37:06.449611 IP 193.174.247.152.32769 > 188.1.74.38.23: P 31:33(2) ack 77 win 5840
15:37:06.653546 IP 193.174.247.152.32769 > 188.1.74.38.23: P 31:33(2) ack 77 win 5840
15:37:07.073536 IP 193.174.247.152.32769 > 188.1.74.38.23: P 31:33(2) ack 77 win 5840
15:37:07.913534 IP 193.174.247.152.32769 > 188.1.74.38.23: P 31:33(2) ack 77 win 5840
15:37:09.593538 IP 193.174.247.152.32769 > 188.1.74.38.23: P 31:33(2) ack 77 win 5840
15:37:12.953543 IP 193.174.247.152.32769 > 188.1.74.38.23: P 31:33(2) ack 77 win 5840
15:37:19.673541 IP 193.174.247.152.32769 > 188.1.74.38.23: P 31:33(2) ack 77 win 5840
15:37:33.113539 IP 193.174.247.152.32769 > 188.1.74.38.23: P 31:33(2) ack 77 win 5840
15:37:59.683255 IP 188.1.74.38.23 > 193.174.247.152.32769: P 77:114(37) ack 31 win 4380
15:37:59.683331 IP 193.174.247.152.32769 > 188.1.74.38.23: . ack 114 win 5840
15:37:59.683580 IP 188.1.74.38.23 > 193.174.247.152.32769: F 114:114(0) ack 31 win 4380
15:37:59.684509 IP 193.174.247.152.32769 > 188.1.74.38.23: F 33:33(0) ack 115 win 5840
15:37:59.691605 IP 188.1.74.38.23 > 193.174.247.152.32769: . ack 31 win 4380
15:37:59.993562 IP 193.174.247.152.32769 > 188.1.74.38.23: FP 31:33(2) ack 115 win 5840

26 packets captured
30 packets received by filter
0 packets dropped by kernel


Reply to: