* [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19)
@ 2006-01-21 5:41 Knut Petersen
2006-01-23 18:15 ` Stephen Hemminger
0 siblings, 1 reply; 13+ messages in thread
From: Knut Petersen @ 2006-01-21 5:41 UTC (permalink / raw)
To: shemminger; +Cc: linux-kernel
Hi Stephen!
System description:
- AOpen i915GMm-HFS, Pentium M 750
- Realtek 8139 PCI Adapter
- The software once was a SuSE 9.2
- kernel: various 2.6.15*, 2.6.16-rc*
The mainboard includes:
0000:02:00.0 Class 0200: 11ab:4362 (rev 19)
Subsystem: a0a0:0506
Flags: bus master, fast devsel, latency 0, IRQ 177
Memory at d0020000 (64-bit, non-prefetchable) [size=1024M]
I/O ports at a000 [size=256]
Expansion ROM at 00020000 [disabled]
Capabilities: [48] Power Management version 2
Capabilities: [50] Vital Product Data
Capabilities: [5c] Message Signalled Interrupts: 64bit+
Queue=0/1 Enable-
Capabilities: [e0] #10 [0011]
0000:03:00.0 Class 0200: 11ab:4362 (rev 19)
Subsystem: a0a0:0506
Flags: bus master, fast devsel, latency 0, IRQ 185
Memory at d0120000 (64-bit, non-prefetchable) [size=1025M]
I/O ports at b000 [size=256]
Expansion ROM at 00020000 [disabled]
Capabilities: [48] Power Management version 2
Capabilities: [50] Vital Product Data
Capabilities: [5c] Message Signalled Interrupts: 64bit+
Queue=0/1 Enable-
Capabilities: [e0] #10 [0011]
The sky2 driver is compiled into the kernel as well as the 8139 driver.
I am connected to the internet via adsl and do use the SuSE Firewall.
8139 with or without SuSEFirewall
=====================
Absolutely no problems.
SKY2 with SuSEFirewall
===============
Initiate or terminate a session: fine
host foo, ping bar, etc do not work,
Domain name lookup seems to be broken.
SKY2 without SuSEFirewall
=================
Seems to work.
Have a look at this part of /var/log/messages:
===========================
Jan 20 16:14:56 linux SuSEfirewall2: Firewall rules unloaded.
Jan 20 16:15:53 linux kernel: [ 1182.531241] dsl0: hw csum failure.
Jan 20 16:15:53 linux kernel: [ 1182.531251] [<c0104007>]
dump_stack+0x17/0x20
Jan 20 16:15:53 linux kernel: [ 1182.531283] [<c03a95c1>]
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:15:53 linux kernel: [ 1182.531302] [<c03a6d4a>]
__skb_checksum_complete+0x5a/0x60
Jan 20 16:15:53 linux kernel: [ 1182.531318] [<f88d892e>]
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:15:53 linux kernel: [ 1182.531357] [<f88d5d82>]
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:15:53 linux kernel: [ 1182.531390] [<c03bdfa7>]
nf_iterate+0x57/0x90
Jan 20 16:15:53 linux kernel: [ 1182.531406] [<c03be045>]
nf_hook_slow+0x65/0x120
Jan 20 16:15:53 linux kernel: [ 1182.531422] [<c03c48d6>]
ip_rcv+0x286/0x510
Jan 20 16:15:53 linux kernel: [ 1182.531436] [<c03a9e05>]
netif_receive_skb+0x165/0x1c0
Jan 20 16:15:53 linux kernel: [ 1182.531452] [<c03a9ee7>]
process_backlog+0x87/0x110
Jan 20 16:15:53 linux kernel: [ 1182.531468] [<c03aa01f>]
net_rx_action+0xaf/0x100
Jan 20 16:15:53 linux kernel: [ 1182.531484] [<c01242d5>]
__do_softirq+0x55/0xb0
Jan 20 16:15:53 linux kernel: [ 1182.531499] [<c0124363>]
do_softirq+0x33/0x40
Jan 20 16:15:53 linux kernel: [ 1182.531513] [<c0124453>]
irq_exit+0x43/0x50
Jan 20 16:15:53 linux kernel: [ 1182.531526] [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:15:53 linux kernel: [ 1182.531540] [<c0103baa>]
common_interrupt+0x1a/0x20
Jan 20 16:15:54 linux kernel: [ 1182.531565] [<c0101147>]
cpu_idle+0x87/0x90
Jan 20 16:15:54 linux kernel: [ 1182.531578] [<c0100257>] _stext+0x37/0x40
Jan 20 16:15:54 linux kernel: [ 1182.531591] [<c055a845>]
start_kernel+0x195/0x1e0
Jan 20 16:15:54 linux kernel: [ 1182.531606] [<c0100199>] 0xc0100199
Jan 20 16:15:54 linux kernel: [ 1183.548980] dsl0: hw csum failure.
Jan 20 16:15:54 linux kernel: [ 1183.548989] [<c0104007>]
dump_stack+0x17/0x20
Jan 20 16:15:54 linux kernel: [ 1183.549020] [<c03a95c1>]
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:15:54 linux kernel: [ 1183.549038] [<c03a6d4a>]
__skb_checksum_complete+0x5a/0x60
Jan 20 16:15:54 linux kernel: [ 1183.549054] [<f88d892e>]
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:15:55 linux kernel: [ 1183.549095] [<f88d5d82>]
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:15:55 linux kernel: [ 1183.549127] [<c03bdfa7>]
nf_iterate+0x57/0x90
Jan 20 16:15:55 linux kernel: [ 1183.549144] [<c03be045>]
nf_hook_slow+0x65/0x120
Jan 20 16:15:55 linux kernel: [ 1183.549159] [<c03c48d6>]
ip_rcv+0x286/0x510
Jan 20 16:15:55 linux kernel: [ 1183.549173] [<c03a9e05>]
netif_receive_skb+0x165/0x1c0
Jan 20 16:15:55 linux kernel: [ 1183.549190] [<c03a9ee7>]
process_backlog+0x87/0x110
Jan 20 16:15:55 linux kernel: [ 1183.549206] [<c03aa01f>]
net_rx_action+0xaf/0x100
Jan 20 16:15:55 linux kernel: [ 1183.549221] [<c01242d5>]
__do_softirq+0x55/0xb0
Jan 20 16:15:55 linux kernel: [ 1183.549236] [<c0124363>]
do_softirq+0x33/0x40
Jan 20 16:15:55 linux kernel: [ 1183.549250] [<c0124453>]
irq_exit+0x43/0x50
Jan 20 16:15:55 linux kernel: [ 1183.549264] [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:15:56 linux kernel: [ 1183.549278] [<c0103baa>]
common_interrupt+0x1a/0x20
Jan 20 16:15:56 linux kernel: [ 887.950383] dsl0: hw csum failure.
Jan 20 16:15:56 linux kernel: [ 887.950389] [<c0104007>]
dump_stack+0x17/0x20
Jan 20 16:15:56 linux kernel: [ 887.950416] [<c03a95c1>]
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:15:56 linux kernel: [ 887.950430] [<c03a6d4a>]
__skb_checksum_complete+0x5a/0x60
Jan 20 16:15:56 linux kernel: [ 887.950442] [<f88d892e>]
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:15:56 linux kernel: [ 887.950473] [<f88d5d82>]
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:15:56 linux kernel: [ 887.950498] [<c03bdfa7>]
nf_iterate+0x57/0x90
Jan 20 16:15:56 linux kernel: [ 887.950511] [<c03be045>]
nf_hook_slow+0x65/0x120
Jan 20 16:15:56 linux kernel: [ 887.950522] [<c03c48d6>]
ip_rcv+0x286/0x510
Jan 20 16:15:57 linux kernel: [ 887.950533] [<c03a9e05>]
netif_receive_skb+0x165/0x1c0
Jan 20 16:15:57 linux kernel: [ 887.950545] [<c03a9ee7>]
process_backlog+0x87/0x110
Jan 20 16:15:57 linux kernel: [ 887.950567] [<c03aa01f>]
net_rx_action+0xaf/0x100
Jan 20 16:15:57 linux kernel: [ 887.950579] [<c01242d5>]
__do_softirq+0x55/0xb0
Jan 20 16:15:57 linux kernel: [ 887.950590] [<c0124363>]
do_softirq+0x33/0x40
Jan 20 16:15:57 linux kernel: [ 887.950600] [<c0124453>]
irq_exit+0x43/0x50
Jan 20 16:15:57 linux kernel: [ 887.950610] [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:15:57 linux kernel: [ 887.950621] [<c0103baa>]
common_interrupt+0x1a/0x20
Jan 20 16:15:57 linux kernel: [ 889.050285] dsl0: hw csum failure.
Jan 20 16:15:57 linux kernel: [ 889.050291] [<c0104007>]
dump_stack+0x17/0x20
Jan 20 16:15:57 linux kernel: [ 889.050319] [<c03a95c1>]
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:15:57 linux kernel: [ 889.050340] [<c03a6d4a>]
__skb_checksum_complete+0x5a/0x60
Jan 20 16:15:57 linux kernel: [ 889.050352] [<f88d892e>]
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:15:57 linux kernel: [ 889.050384] [<f88d5d82>]
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:15:57 linux kernel: [ 889.050409] [<c03bdfa7>]
nf_iterate+0x57/0x90
Jan 20 16:15:57 linux kernel: [ 889.050422] [<c03be045>]
nf_hook_slow+0x65/0x120
Jan 20 16:15:57 linux kernel: [ 889.050433] [<c03c48d6>]
ip_rcv+0x286/0x510
Jan 20 16:15:57 linux kernel: [ 889.050444] [<c03a9e05>]
netif_receive_skb+0x165/0x1c0
Jan 20 16:15:57 linux kernel: [ 889.050456] [<c03a9ee7>]
process_backlog+0x87/0x110
Jan 20 16:15:57 linux kernel: [ 889.050467] [<c03aa01f>]
net_rx_action+0xaf/0x100
Jan 20 16:15:58 linux kernel: [ 889.050479] [<c01242d5>]
__do_softirq+0x55/0xb0
Jan 20 16:15:58 linux kernel: [ 889.050490] [<c0124363>]
do_softirq+0x33/0x40
Jan 20 16:15:58 linux kernel: [ 889.050500] [<c0124453>]
irq_exit+0x43/0x50
Jan 20 16:15:58 linux kernel: [ 889.050510] [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:15:58 linux kernel: [ 889.050520] [<c0103baa>]
common_interrupt+0x1a/0x20
Jan 20 16:15:58 linux kernel: [ 889.050532] [<c0101147>]
cpu_idle+0x87/0x90
Jan 20 16:15:58 linux kernel: [ 889.050542] [<c0100257>] _stext+0x37/0x40
Jan 20 16:15:58 linux kernel: [ 889.050551] [<c055a845>]
start_kernel+0x195/0x1e0
Jan 20 16:15:58 linux kernel: [ 889.050562] [<c0100199>] 0xc0100199
Jan 20 16:15:58 linux kernel: [ 712.515665] dsl0: hw csum failure.
Jan 20 16:15:58 linux kernel: [ 712.515670] [<c0104007>]
dump_stack+0x17/0x20
Jan 20 16:15:58 linux kernel: [ 712.515695] [<c03a95c1>]
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:15:58 linux kernel: [ 712.515706] [<c03a6d4a>]
__skb_checksum_complete+0x5a/0x60
Jan 20 16:15:58 linux kernel: [ 712.515716] [<f88d892e>]
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:15:58 linux kernel: [ 712.515742] [<f88d5d82>]
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:15:58 linux kernel: [ 712.515763] [<c03bdfa7>]
nf_iterate+0x57/0x90
Jan 20 16:15:58 linux kernel: [ 712.515774] [<c03be045>]
nf_hook_slow+0x65/0x120
Jan 20 16:15:58 linux kernel: [ 712.515783] [<c03c48d6>]
ip_rcv+0x286/0x510
Jan 20 16:15:58 linux kernel: [ 712.515792] [<c03a9e05>]
netif_receive_skb+0x165/0x1c0
Jan 20 16:15:58 linux kernel: [ 712.515801] [<c03a9ee7>]
process_backlog+0x87/0x110
Jan 20 16:15:58 linux kernel: [ 712.515811] [<c03aa01f>]
net_rx_action+0xaf/0x100
Jan 20 16:15:58 linux kernel: [ 712.515820] [<c01242d5>]
__do_softirq+0x55/0xb0
Jan 20 16:15:58 linux kernel: [ 712.515829] [<c0124363>]
do_softirq+0x33/0x40
Jan 20 16:15:58 linux kernel: [ 712.515837] [<c0124453>]
irq_exit+0x43/0x50
Jan 20 16:15:58 linux kernel: [ 712.515845] [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:15:58 linux kernel: [ 712.515854] [<c0103baa>]
common_interrupt+0x1a/0x20
Jan 20 16:15:59 linux kernel: [ 713.409544] dsl0: hw csum failure.
Jan 20 16:15:59 linux kernel: [ 713.409550] [<c0104007>]
dump_stack+0x17/0x20
Jan 20 16:15:59 linux kernel: [ 713.409575] [<c03a95c1>]
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:15:59 linux kernel: [ 713.409587] [<c03a6d4a>]
__skb_checksum_complete+0x5a/0x60
Jan 20 16:15:59 linux kernel: [ 713.409597] [<f88d892e>]
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:15:59 linux kernel: [ 713.409624] [<f88d5d82>]
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:15:59 linux kernel: [ 713.409644] [<c03bdfa7>]
nf_iterate+0x57/0x90
Jan 20 16:15:59 linux kernel: [ 713.409655] [<c03be045>]
nf_hook_slow+0x65/0x120
Jan 20 16:15:59 linux kernel: [ 713.409664] [<c03c48d6>]
ip_rcv+0x286/0x510
Jan 20 16:15:59 linux kernel: [ 713.409673] [<c03a9e05>]
netif_receive_skb+0x165/0x1c0
Jan 20 16:15:59 linux kernel: [ 713.409683] [<c03a9ee7>]
process_backlog+0x87/0x110
Jan 20 16:15:59 linux kernel: [ 713.409692] [<c03aa01f>]
net_rx_action+0xaf/0x100
Jan 20 16:15:59 linux kernel: [ 713.409701] [<c01242d5>]
__do_softirq+0x55/0xb0
Jan 20 16:15:59 linux kernel: [ 713.409711] [<c0124363>]
do_softirq+0x33/0x40
Jan 20 16:15:59 linux kernel: [ 713.409719] [<c0124453>]
irq_exit+0x43/0x50
Jan 20 16:15:59 linux kernel: [ 713.409727] [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:15:59 linux kernel: [ 713.409736] [<c0103baa>]
common_interrupt+0x1a/0x20
Jan 20 16:15:59 linux kernel: [ 595.536855] dsl0: hw csum failure.
Jan 20 16:15:59 linux kernel: [ 595.536859] [<c0104007>]
dump_stack+0x17/0x20
Jan 20 16:15:59 linux kernel: [ 595.536876] [<c03a95c1>]
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:15:59 linux kernel: [ 595.536886] [<c03a6d4a>]
__skb_checksum_complete+0x5a/0x60
Jan 20 16:15:59 linux kernel: [ 595.536894] [<f88d892e>]
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:15:59 linux kernel: [ 595.536918] [<f88d5d82>]
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:15:59 linux kernel: [ 595.536935] [<c03bdfa7>]
nf_iterate+0x57/0x90
Jan 20 16:15:59 linux kernel: [ 595.536944] [<c03be045>]
nf_hook_slow+0x65/0x120
Jan 20 16:15:59 linux kernel: [ 595.536952] [<c03c48d6>]
ip_rcv+0x286/0x510
Jan 20 16:15:59 linux kernel: [ 595.536959] [<c03a9e05>]
netif_receive_skb+0x165/0x1c0
Jan 20 16:15:59 linux kernel: [ 595.536967] [<c03a9ee7>]
process_backlog+0x87/0x110
Jan 20 16:15:59 linux kernel: [ 595.536975] [<c03aa01f>]
net_rx_action+0xaf/0x100
Jan 20 16:15:59 linux kernel: [ 595.536983] [<c01242d5>]
__do_softirq+0x55/0xb0
Jan 20 16:15:59 linux kernel: [ 595.536991] [<c0124363>]
do_softirq+0x33/0x40
Jan 20 16:15:59 linux kernel: [ 595.536998] [<c0124453>]
irq_exit+0x43/0x50
Jan 20 16:15:59 linux kernel: [ 595.537004] [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:15:59 linux kernel: [ 595.537011] [<c0103baa>]
common_interrupt+0x1a/0x20
Jan 20 16:16:00 linux kernel: [ 511.194225] dsl0: hw csum failure.
Jan 20 16:16:00 linux kernel: [ 511.194232] [<c0104007>]
dump_stack+0x17/0x20
Jan 20 16:16:00 linux kernel: [ 511.194254] [<c03a95c1>]
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:16:00 linux kernel: [ 511.194263] [<c03a6d4a>]
__skb_checksum_complete+0x5a/0x60
Jan 20 16:16:00 linux kernel: [ 511.194270] [<f88d892e>]
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:16:00 linux kernel: [ 511.194291] [<f88d5d82>]
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:16:00 linux kernel: [ 511.194307] [<c03bdfa7>]
nf_iterate+0x57/0x90
Jan 20 16:16:00 linux kernel: [ 511.194315] [<c03be045>]
nf_hook_slow+0x65/0x120
Jan 20 16:16:00 linux kernel: [ 511.194321] [<c03c48d6>]
ip_rcv+0x286/0x510
Jan 20 16:16:00 linux kernel: [ 511.194327] [<c03a9e05>]
netif_receive_skb+0x165/0x1c0
Jan 20 16:16:00 linux kernel: [ 511.194335] [<c03a9ee7>]
process_backlog+0x87/0x110
Jan 20 16:16:00 linux kernel: [ 511.194341] [<c03aa01f>]
net_rx_action+0xaf/0x100
Jan 20 16:16:00 linux kernel: [ 511.194348] [<c01242d5>]
__do_softirq+0x55/0xb0
Jan 20 16:16:00 linux kernel: [ 511.194355] [<c0124363>]
do_softirq+0x33/0x40
Jan 20 16:16:00 linux kernel: [ 511.194361] [<c0124453>]
irq_exit+0x43/0x50
Jan 20 16:16:00 linux kernel: [ 511.194367] [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:16:00 linux kernel: [ 511.194373] [<c0103baa>]
common_interrupt+0x1a/0x20
Jan 20 16:16:00 linux kernel: [ 511.194379] [<c0101147>]
cpu_idle+0x87/0x90
Jan 20 16:16:00 linux kernel: [ 511.194385] [<c0100257>] _stext+0x37/0x40
Jan 20 16:16:00 linux kernel: [ 511.194390] [<c055a845>]
start_kernel+0x195/0x1e0
Jan 20 16:16:00 linux kernel: [ 511.194397] [<c0100199>] 0xc0100199
Jan 20 16:16:01 linux kernel: [ 511.933366] dsl0: hw csum failure.
Jan 20 16:16:01 linux kernel: [ 511.933373] [<c0104007>]
dump_stack+0x17/0x20
Jan 20 16:16:01 linux kernel: [ 511.933395] [<c03a95c1>]
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:16:01 linux kernel: [ 511.933405] [<c03a6d4a>]
__skb_checksum_complete+0x5a/0x60
Jan 20 16:16:01 linux kernel: [ 511.933411] [<f88d892e>]
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:16:01 linux kernel: [ 511.933433] [<f88d5d82>]
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:16:01 linux kernel: [ 511.933448] [<c03bdfa7>]
nf_iterate+0x57/0x90
Jan 20 16:16:01 linux kernel: [ 511.933464] [<c03be045>]
nf_hook_slow+0x65/0x120
Jan 20 16:16:01 linux kernel: [ 511.933471] [<c03c48d6>]
ip_rcv+0x286/0x510
Jan 20 16:16:01 linux kernel: [ 511.933477] [<c03a9e05>]
netif_receive_skb+0x165/0x1c0
Jan 20 16:16:01 linux kernel: [ 511.933484] [<c03a9ee7>]
process_backlog+0x87/0x110
Jan 20 16:16:01 linux kernel: [ 511.933491] [<c03aa01f>]
net_rx_action+0xaf/0x100
Jan 20 16:16:01 linux kernel: [ 511.933498] [<c01242d5>]
__do_softirq+0x55/0xb0
Jan 20 16:16:01 linux kernel: [ 511.933505] [<c0124363>]
do_softirq+0x33/0x40
Jan 20 16:16:01 linux kernel: [ 511.933511] [<c0124453>]
irq_exit+0x43/0x50
Jan 20 16:16:01 linux kernel: [ 511.933517] [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:16:01 linux kernel: [ 511.933523] [<c0103baa>]
common_interrupt+0x1a/0x20
Jan 20 16:16:01 linux kernel: [ 511.933529] [<c0101147>]
cpu_idle+0x87/0x90
Jan 20 16:16:01 linux kernel: [ 511.933535] [<c0100257>] _stext+0x37/0x40
Jan 20 16:16:01 linux kernel: [ 511.933540] [<c055a845>]
start_kernel+0x195/0x1e0
Jan 20 16:16:01 linux kernel: [ 511.933547] [<c0100199>] 0xc0100199
It seems that the SuSE Firewall locked something ....
I started with kernel 2.6.15-git7, tried 2.6.15.1 and 2.6.16-rc1*.
At the moment I do use a kernel 2.6.15-git7 patched with an updated sky2
(v.013).
I could not find a single working sky2 configuration.
Any ideas?
cu,
Knut
^ permalink raw reply [flat|nested] 13+ messages in thread* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19) 2006-01-21 5:41 [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19) Knut Petersen @ 2006-01-23 18:15 ` Stephen Hemminger 2006-01-23 19:20 ` Knut Petersen 0 siblings, 1 reply; 13+ messages in thread From: Stephen Hemminger @ 2006-01-23 18:15 UTC (permalink / raw) To: Knut Petersen; +Cc: linux-kernel, netdev O > > It seems that the SuSE Firewall locked something .... > > I started with kernel 2.6.15-git7, tried 2.6.15.1 and 2.6.16-rc1*. > At the moment I do use a kernel 2.6.15-git7 patched with an updated sky2 > (v.013). > I could not find a single working sky2 configuration. > Are you using the full kernel.org kernel, or are you putting sky2 driver into the SUSE kernel? There are a number of bug fixes related to hardware checksumming that are in the kernel.org kernel (2.6.15 or later). There was one in ICMP. These fixes relate to places in the code where a protocol decides to trim a packet by removing bytes. I am not familiar with the SuSE Firewall. Is it just standard netfilter modules or additional code? -- Stephen Hemminger <shemminger@osdl.org> OSDL http://developer.osdl.org/~shemminger ^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19) 2006-01-23 18:15 ` Stephen Hemminger @ 2006-01-23 19:20 ` Knut Petersen 2006-01-23 19:27 ` Stephen Hemminger 0 siblings, 1 reply; 13+ messages in thread From: Knut Petersen @ 2006-01-23 19:20 UTC (permalink / raw) To: Stephen Hemminger; +Cc: linux-kernel, netdev Stephen Hemminger wrote: >O > > >>It seems that the SuSE Firewall locked something .... >> >>I started with kernel 2.6.15-git7, tried 2.6.15.1 and 2.6.16-rc1*. >>At the moment I do use a kernel 2.6.15-git7 patched with an updated sky2 >>(v.013). >>I could not find a single working sky2 configuration. >> >> >> > >Are you using the full kernel.org kernel, or are you putting sky2 driver into >the SUSE kernel? > No SuSE kernels here. I started with kernel.org kernel 2.6.15-git7 and had those problems. Then I tried 2.6.16-rc3-git3, the most recent kernel at the time of my original writing. As I had some other problems with that kernel I had a look at the git tree of Linus and applied all sky2 related patches to the otherwise unchanged 2.6.15-git7. 2.6.15.1 also was no solution as sky2 seems to be not available there. > There are a number of bug fixes related to hardware checksumming >that are in the kernel.org kernel (2.6.15 or later). There was one in ICMP. >These fixes relate to places in the code where a protocol decides to trim a >packet by removing bytes. I am not familiar with the SuSE Firewall. Is it just >standard netfilter modules or additional code? > > I have to admit that I don´t know enough about the network layers of the kernel, so here is a list of the network modules loaded (sky2 compiled into the kernel). SuSEFirewall is just standard netfiltering using those modules. ipt_MASQUERADE 3968 1 pppoe 15360 2 pppox 4616 1 pppoe af_packet 23240 2 ppp_generic 30740 6 pppoe,pppox slhc 7040 1 ppp_generic ipt_TOS 2816 28 ipt_TCPMSS 4800 2 ipt_LOG 7232 77 ipt_limit 2880 77 ipt_pkttype 1984 2 ipt_state 2240 45 ip6t_REJECT 5824 3 ipt_REJECT 5952 3 iptable_mangle 3200 1 iptable_nat 8836 1 iptable_filter 3264 1 ip6table_mangle 2752 0 ip_nat_ftp 3776 0 ip_nat 18284 3 ipt_MASQUERADE,iptable_nat,ip_nat_ftp ip_conntrack_ftp 8240 1 ip_nat_ftp ip_conntrack 51020 6 ipt_MASQUERADE,ipt_state,iptable_nat,ip_nat_ftp,ip_nat,ip_conntrack_ftp ip_tables 24088 11 ipt_MASQUERADE,ipt_TOS,ipt_TCPMSS,ipt_LOG,ipt_limit,ipt_pkttype,ipt_state,ipt_REJECT,iptable_mangle,iptable_nat,iptable_filter ip6table_filter 3136 1 ip6_tables 25624 3 ip6t_REJECT,ip6table_mangle,ip6table_filter ipv6 271712 14 ip6t_REJECT As said before, rtl8139 does work perfectly well, the same is true for an identical system with a Via Rhine adapter. cu, Knut ^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19) 2006-01-23 19:20 ` Knut Petersen @ 2006-01-23 19:27 ` Stephen Hemminger 2006-01-24 9:43 ` Knut Petersen 0 siblings, 1 reply; 13+ messages in thread From: Stephen Hemminger @ 2006-01-23 19:27 UTC (permalink / raw) To: linux-kernel Could you try turning off rx checksumming (with ethtool). ethtool -K eth0 rx off There probably still are (generic) bugs in the netfilter code for CHECKSUM_HW socket buffers. -- Stephen Hemminger <shemminger@osdl.org> OSDL http://developer.osdl.org/~shemminger ^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19) 2006-01-23 19:27 ` Stephen Hemminger @ 2006-01-24 9:43 ` Knut Petersen 2006-01-24 17:54 ` Stephen Hemminger 2006-01-24 20:32 ` Herbert Xu 0 siblings, 2 replies; 13+ messages in thread From: Knut Petersen @ 2006-01-24 9:43 UTC (permalink / raw) To: Stephen Hemminger; +Cc: netdev, linux-kernel Stephen Hemminger schrieb: >Could you try turning off rx checksumming (with ethtool). > ethtool -K eth0 rx off > >There probably still are (generic) bugs in the netfilter code for CHECKSUM_HW >socket buffers. > > > "ethtool -K eth0 rx off" does cure my problem with sky2. Anybody is invited to send patches as the problem is 100% reproducible here. cu, Knut ^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19) 2006-01-24 9:43 ` Knut Petersen @ 2006-01-24 17:54 ` Stephen Hemminger 2006-01-24 20:32 ` Herbert Xu 1 sibling, 0 replies; 13+ messages in thread From: Stephen Hemminger @ 2006-01-24 17:54 UTC (permalink / raw) To: Knut Petersen; +Cc: netdev, linux-kernel On Tue, 24 Jan 2006 10:43:57 +0100 Knut Petersen <Knut_Petersen@t-online.de> wrote: > Stephen Hemminger schrieb: > > >Could you try turning off rx checksumming (with ethtool). > > ethtool -K eth0 rx off > > > >There probably still are (generic) bugs in the netfilter code for CHECKSUM_HW > >socket buffers. > > > > > > > "ethtool -K eth0 rx off" does cure my problem with sky2. > > Anybody is invited to send patches as the problem is 100% reproducible here. > Does it always show up on icmp only? What are the iptables rules (iptables -L) -- Stephen Hemminger <shemminger@osdl.org> OSDL http://developer.osdl.org/~shemminger ^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19) 2006-01-24 9:43 ` Knut Petersen 2006-01-24 17:54 ` Stephen Hemminger @ 2006-01-24 20:32 ` Herbert Xu 2006-01-27 6:07 ` Knut Petersen 1 sibling, 1 reply; 13+ messages in thread From: Herbert Xu @ 2006-01-24 20:32 UTC (permalink / raw) To: Knut Petersen; +Cc: shemminger, netdev, linux-kernel Knut Petersen <Knut_Petersen@t-online.de> wrote: > > "ethtool -K eth0 rx off" does cure my problem with sky2. > > Anybody is invited to send patches as the problem is 100% reproducible here. Does the problem go away if you disable conntrack by unloading its module? Please try to capture the offending ICMP packet with tcpdump and show us what it looks like. Thanks, -- Visit Openswan at http://www.openswan.org/ Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt ^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19) 2006-01-24 20:32 ` Herbert Xu @ 2006-01-27 6:07 ` Knut Petersen 2006-01-27 12:22 ` Herbert Xu 0 siblings, 1 reply; 13+ messages in thread From: Knut Petersen @ 2006-01-27 6:07 UTC (permalink / raw) To: Herbert Xu; +Cc: shemminger, netdev, linux-kernel [-- Attachment #1: Type: text/plain, Size: 3163 bytes --] * Herbert Xu wrote: >Does the problem go away if you disable conntrack by unloading its module? > >Please try to capture the offending ICMP packet with tcpdump and show us >what it looks like. > > Well, there are no problems if SuSEfirewall2 is disabled. But have a look at the loaded modules: ipt_MASQUERADE 3968 1 pppoe 15360 2 pppox 4616 1 pppoe af_packet 23240 2 ppp_generic 30740 6 pppoe,pppox slhc 7040 1 ppp_generic ipt_TOS 2816 28 ipt_TCPMSS 4800 2 ipt_LOG 7232 55 ipt_limit 2880 55 ipt_pkttype 1984 4 ipt_state 2240 46 ip6t_LOG 8000 1 ip6t_limit 3008 1 ip6t_REJECT 5824 3 ipt_REJECT 5952 3 iptable_mangle 3200 1 iptable_nat 8836 1 iptable_filter 3264 1 ip6table_mangle 2752 0 ip_nat_ftp 3776 0 ip_nat 18284 3 ipt_MASQUERADE,iptable_nat,ip_nat_ftp ip_conntrack_ftp 8240 1 ip_nat_ftp ip_conntrack 51020 6 ipt_MASQUERADE,ipt_state,iptable_nat,ip_nat_ftp,ip_nat,ip_conntrack_ftp ip_tables 24088 11 ipt_MASQUERADE,ipt_TOS,ipt_TCPMSS,ipt_LOG,ipt_limit,ipt_pkttype,ipt_state,ipt_REJECT,iptable_mangle,iptable_nat,iptable_filter ip6table_filter 3136 1 ip6_tables 25624 5 ip6t_LOG,ip6t_limit,ip6t_REJECT,ip6table_mangle,ip6table_filter ipv6 271712 14 ip6t_REJECT How should I unload ip_conntrack alone? * Stephen Hemminger wrote: >Does it always show up on icmp only? > >What are the iptables rules (iptables -L) > > > As far as I can see, all my sky2 problems are gone with -K rx off. So here is more information. I executed the following script: logger Starting test logger "Executing ethtool -K eth0 rx off" ethtool -K eth0 rx off logger "Executing tcpdump -i eth0 -vv > tcpdumpfile &" tcpdump -i eth0 -vv > tcpdumpfile & logger "Executing host www.suse.com" host www.suse.com logger "Sleeping 2 seconds" sleep 2 logger "Executing ping -c 2 195.135.220.3" ping -c 2 195.135.220.3 logger "Sleeping 2 seconds" sleep 2 logger "Executing ethtool -K eth0 rx on" ethtool -K eth0 rx on logger "Sleeping 2 seconds" sleep 2 logger "Executing host www.suse.com" host www.suse.com logger "Sleeping 2 seconds" sleep 2 logger "Executing ping -c 2 195.135.220.3" ping -c 2 195.135.220.3 logger "Sleeping 2 seconds" sleep 2 logger "Executing ethtool -K eth0 rx off" ethtool -K eth0 rx off logger "Sleeping 2 seconds" sleep 2 logger "killall tcpdump" killall tcpdump logger End of test The first host and ping worked fine, after the ethtool -K eth0 rx on the host www.suse.com timed out with ;; connection timed out; no servers could be reached and the ping 195.135.220.3 provoked the stack traces you see in sky2syslog. I attach the syslog for the time of the test, the output of iptables -L and the output of tcpdump as the very long lines included would be hard to read with linebreaks. No, I did _not_ delete anything from the tcpdump file. cu, Knut [-- Attachment #2: sky2syslog --] [-- Type: text/plain, Size: 5199 bytes --] Jan 27 06:29:38 linux knut: Starting test Jan 27 06:29:38 linux knut: Executing ethtool -K eth0 rx off Jan 27 06:29:38 linux knut: Executing tcpdump -i eth0 -vv > tcpdumpfile & Jan 27 06:29:38 linux knut: Executing host www.suse.com Jan 27 06:29:38 linux kernel: [ 403.606906] device eth0 entered promiscuous mode Jan 27 06:29:38 linux knut: Sleeping 2 seconds Jan 27 06:29:40 linux knut: Executing ping -c 2 195.135.220.3 Jan 27 06:29:41 linux dhcpd: icmp.c(274): trace_write_packet with null trace type Jan 27 06:29:42 linux dhcpd: icmp.c(274): trace_write_packet with null trace type Jan 27 06:29:42 linux knut: Sleeping 2 seconds Jan 27 06:29:44 linux knut: Executing ethtool -K eth0 rx on Jan 27 06:29:44 linux knut: Sleeping 2 seconds Jan 27 06:29:46 linux knut: Executing host www.suse.com Jan 27 06:29:46 linux kernel: [ 406.693484] SFW2-INext-DROP-DEFLT-INV IN=dsl0 OUT= MAC= SRC=217.237.150.33 DST=84.171.112.100 LEN=74 TOS=0x10 PREC=0x00 TTL=57 ID=53333 PROTO=UDP SPT=53 DPT=1076 LEN=54 Jan 27 06:29:47 linux kernel: [ 407.125112] SFW2-INext-DROP-DEFLT-INV IN=dsl0 OUT= MAC= SRC=217.237.150.33 DST=84.171.112.100 LEN=116 TOS=0x10 PREC=0x00 TTL=57 ID=24213 PROTO=UDP SPT=53 DPT=1078 LEN=96 Jan 27 06:29:58 linux knut: Sleeping 2 seconds Jan 27 06:30:00 linux knut: Executing ping -c 2 195.135.220.3 Jan 27 06:30:00 linux kernel: [ 412.693613] dsl0: hw csum failure. Jan 27 06:30:00 linux kernel: [ 412.693615] [<c0104007>] dump_stack+0x17/0x20 Jan 27 06:30:00 linux kernel: [ 412.693628] [<c03b2961>] netdev_rx_csum_fault+0x31/0x40 Jan 27 06:30:00 linux kernel: [ 412.693632] [<c03b00ea>] __skb_checksum_complete+0x5a/0x60 Jan 27 06:30:00 linux kernel: [ 412.693635] [<f88d892e>] icmp_error+0x10e/0x1e0 [ip_conntrack] Jan 27 06:30:00 linux kernel: [ 412.693644] [<f88d5d82>] ip_conntrack_in+0x72/0x240 [ip_conntrack] Jan 27 06:30:00 linux kernel: [ 412.693651] [<c03c7347>] nf_iterate+0x57/0x90 Jan 27 06:30:00 linux kernel: [ 412.693654] [<c03c73e5>] nf_hook_slow+0x65/0x120 Jan 27 06:30:00 linux kernel: [ 412.693657] [<c03cdc76>] ip_rcv+0x286/0x510 Jan 27 06:30:00 linux kernel: [ 412.693660] [<c03b31a5>] netif_receive_skb+0x165/0x1c0 Jan 27 06:30:00 linux kernel: [ 412.693663] [<c03b3287>] process_backlog+0x87/0x110 Jan 27 06:30:00 linux kernel: [ 412.693665] [<c03b33bf>] net_rx_action+0xaf/0x100 Jan 27 06:30:00 linux kernel: [ 412.693668] [<c01232d5>] __do_softirq+0x55/0xb0 Jan 27 06:30:00 linux kernel: [ 412.693671] [<c0123363>] do_softirq+0x33/0x40 Jan 27 06:30:00 linux kernel: [ 412.693674] [<c0123453>] irq_exit+0x43/0x50 Jan 27 06:30:00 linux kernel: [ 412.693676] [<c0105218>] do_IRQ+0x38/0x70 Jan 27 06:30:00 linux kernel: [ 412.693679] [<c0103baa>] common_interrupt+0x1a/0x20 Jan 27 06:30:00 linux kernel: [ 412.693682] [<c0101147>] cpu_idle+0x87/0x90 Jan 27 06:30:00 linux kernel: [ 412.693684] [<c0100257>] rest_init+0x37/0x40 Jan 27 06:30:00 linux kernel: [ 412.693686] [<c055e845>] start_kernel+0x195/0x1e0 Jan 27 06:30:00 linux kernel: [ 412.693690] [<c0100199>] 0xc0100199 Jan 27 06:30:00 linux dhcpd: icmp.c(274): trace_write_packet with null trace type Jan 27 06:30:01 linux kernel: [ 413.121225] dsl0: hw csum failure. Jan 27 06:30:01 linux kernel: [ 413.121227] [<c0104007>] dump_stack+0x17/0x20 Jan 27 06:30:01 linux kernel: [ 413.121236] [<c03b2961>] netdev_rx_csum_fault+0x31/0x40 Jan 27 06:30:01 linux kernel: [ 413.121240] [<c03b00ea>] __skb_checksum_complete+0x5a/0x60 Jan 27 06:30:01 linux kernel: [ 413.121242] [<f88d892e>] icmp_error+0x10e/0x1e0 [ip_conntrack] Jan 27 06:30:01 linux kernel: [ 413.121252] [<f88d5d82>] ip_conntrack_in+0x72/0x240 [ip_conntrack] Jan 27 06:30:01 linux kernel: [ 413.121258] [<c03c7347>] nf_iterate+0x57/0x90 Jan 27 06:30:01 linux kernel: [ 413.121261] [<c03c73e5>] nf_hook_slow+0x65/0x120 Jan 27 06:30:01 linux kernel: [ 413.121264] [<c03cdc76>] ip_rcv+0x286/0x510 Jan 27 06:30:01 linux kernel: [ 413.121267] [<c03b31a5>] netif_receive_skb+0x165/0x1c0 Jan 27 06:30:01 linux kernel: [ 413.121270] [<c03b3287>] process_backlog+0x87/0x110 Jan 27 06:30:01 linux kernel: [ 413.121272] [<c03b33bf>] net_rx_action+0xaf/0x100 Jan 27 06:30:01 linux knut: Sleeping 2 seconds Jan 27 06:30:01 linux kernel: [ 413.121275] [<c01232d5>] __do_softirq+0x55/0xb0 Jan 27 06:30:01 linux kernel: [ 413.121278] [<c0123363>] do_softirq+0x33/0x40 Jan 27 06:30:01 linux kernel: [ 413.121281] [<c0123453>] irq_exit+0x43/0x50 Jan 27 06:30:01 linux kernel: [ 413.121283] [<c0105218>] do_IRQ+0x38/0x70 Jan 27 06:30:01 linux kernel: [ 413.121286] [<c0103baa>] common_interrupt+0x1a/0x20 Jan 27 06:30:01 linux kernel: [ 413.121288] [<c0101147>] cpu_idle+0x87/0x90 Jan 27 06:30:01 linux kernel: [ 413.121291] [<c0100257>] rest_init+0x37/0x40 Jan 27 06:30:01 linux kernel: [ 413.121293] [<c055e845>] start_kernel+0x195/0x1e0 Jan 27 06:30:01 linux kernel: [ 413.121296] [<c0100199>] 0xc0100199 Jan 27 06:30:01 linux dhcpd: icmp.c(274): trace_write_packet with null trace type Jan 27 06:30:03 linux knut: Executing ethtool -K eth0 rx off Jan 27 06:30:03 linux knut: Sleeping 2 seconds Jan 27 06:30:05 linux knut: killall tcpdump Jan 27 06:30:05 linux knut: End of test [-- Attachment #3: tcpdumpfile --] [-- Type: text/plain, Size: 3558 bytes --] 06:29:38.899532 PPPoE [ses 0x385] IP (tos 0x10, ttl 64, id 0, offset 0, flags [DF], length: 58) p54AB7064.dip.t-dialin.net.rdrmshc > www-proxy.F2.srv.t-online.de.domain: [udp sum ok] 22324+ A? www.suse.com. (30) 06:29:38.899812 PPPoE [ses 0x385] IP (tos 0x10, ttl 64, id 51975, offset 0, flags [DF], length: 73) p54AB7064.dip.t-dialin.net.dab-sti-c > www-proxy.F2.srv.t-online.de.domain: [udp sum ok] 2117+ PTR? 33.150.237.217.in-addr.arpa. (45) 06:29:38.946775 PPPoE [ses 0x385] IP (tos 0x0, ttl 57, id 16399, offset 0, flags [none], length: 74) www-proxy.F2.srv.t-online.de.domain > p54AB7064.dip.t-dialin.net.rdrmshc: [udp sum ok] 22324 q: A? www.suse.com. 1/0/0 www.suse.com. A turing.suse.de (46) 06:29:38.955734 PPPoE [ses 0x385] IP (tos 0x0, ttl 57, id 63158, offset 0, flags [none], length: 115) www-proxy.F2.srv.t-online.de.domain > p54AB7064.dip.t-dialin.net.dab-sti-c: 2117 q: PTR? 33.150.237.217.in-addr.arpa. 1/0/0 [|domain] 06:29:38.955816 PPPoE [ses 0x385] IP (tos 0x10, ttl 64, id 52031, offset 0, flags [DF], length: 73) p54AB7064.dip.t-dialin.net.dab-sti-c > www-proxy.F2.srv.t-online.de.domain: [udp sum ok] 2118+ PTR? 100.112.171.84.in-addr.arpa. (45) 06:29:39.009499 PPPoE [ses 0x385] IP (tos 0x0, ttl 57, id 59142, offset 0, flags [none], length: 113) www-proxy.F2.srv.t-online.de.domain > p54AB7064.dip.t-dialin.net.dab-sti-c: 2118 q: PTR? 100.112.171.84.in-addr.arpa. 1/0/0 [|domain] 06:29:39.009587 PPPoE [ses 0x385] IP (tos 0x10, ttl 64, id 52085, offset 0, flags [DF], length: 72) p54AB7064.dip.t-dialin.net.dab-sti-c > www-proxy.F2.srv.t-online.de.domain: [udp sum ok] 2119+ PTR? 3.220.135.195.in-addr.arpa. (44) 06:29:39.055627 PPPoE [ses 0x385] IP (tos 0x0, ttl 57, id 39957, offset 0, flags [none], length: 100) www-proxy.F2.srv.t-online.de.domain > p54AB7064.dip.t-dialin.net.dab-sti-c: 2119 q: PTR? 3.220.135.195.in-addr.arpa. 1/0/0 3.220.135.195.in-addr.arpa. (72) 06:29:40.953234 PPPoE [ses 0x385] IP (tos 0x0, ttl 64, id 0, offset 0, flags [DF], length: 84) p54AB7064.dip.t-dialin.net > turing.suse.de: icmp 64: echo request seq 1 06:29:41.022500 PPPoE [ses 0x385] IP (tos 0x0, ttl 55, id 36207, offset 0, flags [none], length: 84) turing.suse.de > p54AB7064.dip.t-dialin.net: icmp 64: echo reply seq 1 06:29:41.952973 PPPoE [ses 0x385] IP (tos 0x0, ttl 64, id 1, offset 0, flags [DF], length: 84) p54AB7064.dip.t-dialin.net > turing.suse.de: icmp 64: echo request seq 2 06:29:42.019352 PPPoE [ses 0x385] IP (tos 0x0, ttl 55, id 36398, offset 0, flags [none], length: 84) turing.suse.de > p54AB7064.dip.t-dialin.net: icmp 64: echo reply seq 2 06:29:42.719838 PPPoE [ses 0x385] LCP, Echo-Request (0x09), id 56, Magic-Num 0x8a5b3542, length 8 0x0000: c021 0938 0008 8a5b 3542 06:29:42.761102 PPPoE [ses 0x385] LCP, Echo-Reply (0x0a), id 56, Magic-Num 0x15c96251, length 8 0x0000: c021 0a38 0008 15c9 6251 06:29:46.031631 PPPoE [ses 0x385] IP (tos 0x10, ttl 64, id 0, offset 0, flags [DF], length: 58) p54AB7064.dip.t-dialin.net.dab-sti-c > www-proxy.F2.srv.t-online.de.domain: [udp sum ok] 35750+ A? www.suse.com. (30) 06:29:46.078624 PPPoE [ses 0x385] IP (tos 0x0, ttl 57, id 53333, offset 0, flags [none], length: 74) www-proxy.F2.srv.t-online.de.domain > p54AB7064.dip.t-dialin.net.dab-sti-c: [udp sum ok] 35750 q: A? www.suse.com. 1/0/0 www.suse.com. A turing.suse.de (46) 06:29:47.033244 PPPoE [ses 0x385] IP (tos 0x10, ttl 64, id 0, offset 0, flags [DF], length: 58) p54AB7064.dip.t-dialin.net.imgames > 217.237.151.161.domain: [udp sum ok] 35750+ A? www.suse.com. (30) [-- Attachment #4: iptablesdump --] [-- Type: text/plain, Size: 20978 bytes --] Chain INPUT (policy DROP) target prot opt source destination ACCEPT all -- anywhere anywhere ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED input_ext all -- anywhere anywhere input_int all -- anywhere anywhere LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-IN-ILL-TARGET ' DROP all -- anywhere anywhere Chain FORWARD (policy DROP) target prot opt source destination TCPMSS tcp -- anywhere anywhere tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU TCPMSS tcp -- anywhere anywhere tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU forward_ext all -- anywhere anywhere forward_int all -- anywhere anywhere LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-FWD-ILL-ROUTING ' DROP all -- anywhere anywhere Chain OUTPUT (policy DROP) target prot opt source destination ACCEPT all -- anywhere anywhere LOG icmp -- anywhere anywhere limit: avg 3/min burst 5 icmp time-exceeded LOG level warning tcp-options ip-options prefix `SFW2-OUT-TRACERT-ATTEMPT ' ACCEPT icmp -- anywhere anywhere icmp time-exceeded ACCEPT icmp -- anywhere anywhere icmp port-unreachable ACCEPT icmp -- anywhere anywhere icmp fragmentation-needed ACCEPT icmp -- anywhere anywhere icmp network-prohibited ACCEPT icmp -- anywhere anywhere icmp host-prohibited ACCEPT icmp -- anywhere anywhere icmp communication-prohibited DROP icmp -- anywhere anywhere icmp destination-unreachable ACCEPT all -- anywhere anywhere state NEW,RELATED,ESTABLISHED LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-OUT-ERROR ' Chain forward_dmz (0 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-FWDdmz-DROP-DEFLT-INV ' DROP all -- anywhere anywhere state INVALID ACCEPT icmp -- anywhere anywhere state RELATED icmp destination-unreachable ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp echo-reply ACCEPT all -- anywhere anywhere state NEW,RELATED,ESTABLISHED ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-FWDdmz-DROP-DEFLT ' DROP all -- anywhere anywhere Chain forward_ext (1 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-FWDext-DROP-DEFLT-INV ' DROP all -- anywhere anywhere state INVALID ACCEPT icmp -- anywhere anywhere state RELATED icmp destination-unreachable ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp echo-reply ACCEPT all -- anywhere anywhere state NEW,RELATED,ESTABLISHED ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-FWDext-DROP-DEFLT ' DROP all -- anywhere anywhere Chain forward_int (1 references) target prot opt source destination LOG all -- anywhere anywhere limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-FWDint-DROP-DEFLT-INV ' DROP all -- anywhere anywhere state INVALID ACCEPT icmp -- anywhere anywhere state RELATED icmp destination-unreachable ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp echo-reply ACCEPT all -- anywhere anywhere state NEW,RELATED,ESTABLISHED ACCEPT all -- anywhere anywhere state RELATED,ESTABLISHED LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-FWDint-DROP-DEFLT ' DROP all -- anywhere anywhere Chain input_dmz (0 references) target prot opt source destination LOG all -- anywhere anywhere PKTTYPE = broadcast limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-DROP-BCASTd ' DROP all -- anywhere anywhere PKTTYPE = broadcast ACCEPT icmp -- anywhere anywhere icmp source-quench ACCEPT icmp -- anywhere anywhere icmp echo-request ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp echo-reply ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp destination-unreachable ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp time-exceeded ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp parameter-problem ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp timestamp-reply ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp address-mask-reply LOG all -- anywhere anywhere limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP-DEFLT-INV ' DROP all -- anywhere anywhere state INVALID LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:827 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:827 flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:827 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:827 flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:827 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:827 flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' DROP tcp -- anywhere anywhere tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP-DEFLT ' DROP all -- anywhere anywhere Chain input_ext (1 references) target prot opt source destination LOG all -- anywhere anywhere PKTTYPE = broadcast limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-DROP-BCASTe ' DROP all -- anywhere anywhere PKTTYPE = broadcast ACCEPT icmp -- anywhere anywhere icmp source-quench ACCEPT icmp -- anywhere anywhere icmp echo-request ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp echo-reply ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp destination-unreachable ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp time-exceeded ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp parameter-problem ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp timestamp-reply ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp address-mask-reply LOG all -- anywhere anywhere limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT-INV ' DROP all -- anywhere anywhere state INVALID LOG tcp -- anywhere anywhere tcp dpt:ident state NEW limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-INext-REJECT ' reject_func tcp -- anywhere anywhere tcp dpt:ident state NEW LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:827 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:827 flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:827 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:827 flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:827 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:827 flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG tcp -- anywhere anywhere limit: avg 3/min burst 5 tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' DROP tcp -- anywhere anywhere tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT ' DROP all -- anywhere anywhere Chain input_int (1 references) target prot opt source destination ACCEPT all -- anywhere anywhere ACCEPT icmp -- anywhere anywhere icmp source-quench ACCEPT icmp -- anywhere anywhere icmp echo-request ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp echo-reply ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp destination-unreachable ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp time-exceeded ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp parameter-problem ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp timestamp-reply ACCEPT icmp -- anywhere anywhere state RELATED,ESTABLISHED icmp address-mask-reply LOG all -- anywhere anywhere limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-INint-DROP-DEFLT-INV ' DROP all -- anywhere anywhere state INVALID LOG all -- anywhere anywhere limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-INint-DROP-DEFLT ' DROP all -- anywhere anywhere Chain reject_func (1 references) target prot opt source destination REJECT tcp -- anywhere anywhere reject-with tcp-reset REJECT udp -- anywhere anywhere reject-with icmp-port-unreachable REJECT all -- anywhere anywhere reject-with icmp-proto-unreachable ^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19) 2006-01-27 6:07 ` Knut Petersen @ 2006-01-27 12:22 ` Herbert Xu 2006-01-27 15:28 ` Patrick McHardy ` (2 more replies) 0 siblings, 3 replies; 13+ messages in thread From: Herbert Xu @ 2006-01-27 12:22 UTC (permalink / raw) To: Knut Petersen; +Cc: shemminger, netdev, linux-kernel, David S. Miller [-- Attachment #1: Type: text/plain, Size: 1128 bytes --] On Fri, Jan 27, 2006 at 07:07:34AM +0100, Knut Petersen wrote: > > Well, there are no problems if SuSEfirewall2 is disabled. But have a look > at the loaded modules: > > ipt_MASQUERADE 3968 1 > pppoe 15360 2 > pppox 4616 1 pppoe OK, although we can't rule out sky2/netfilter from the enquiry, I've identified two bugs in ppp/pppoe that may be responsible for what you are seeing. So please try the following patch and let us know if the problem still exists (or deteriorates/improves). [PPP]: Fixed hardware RX checksum handling When we pull the PPP protocol off the skb, we forgot to update the hardware RX checksum. This may lead to messages such as dsl0: hw csum failure. Similarly, we need to clear the hardware checksum flag when we use the existing packet to store the decompressed result. Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> Cheers, -- Visit Openswan at http://www.openswan.org/ Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au> Home Page: http://gondor.apana.org.au/~herbert/ PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt [-- Attachment #2: ppp-rxcsum --] [-- Type: text/plain, Size: 682 bytes --] diff --git a/drivers/net/ppp_generic.c b/drivers/net/ppp_generic.c --- a/drivers/net/ppp_generic.c +++ b/drivers/net/ppp_generic.c @@ -1610,6 +1610,8 @@ ppp_receive_nonmp_frame(struct ppp *ppp, } else if (!pskb_may_pull(skb, skb->len)) goto err; + else + skb->ip_summed = CHECKSUM_NONE; len = slhc_uncompress(ppp->vj, skb->data + 2, skb->len - 2); if (len <= 0) { @@ -1690,6 +1692,7 @@ ppp_receive_nonmp_frame(struct ppp *ppp, kfree_skb(skb); } else { skb_pull(skb, 2); /* chop off protocol */ + skb_postpull_rcsum(skb, skb->data - 2, 2); skb->dev = ppp->dev; skb->protocol = htons(npindex_to_ethertype[npi]); skb->mac.raw = skb->data; ^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19) 2006-01-27 12:22 ` Herbert Xu @ 2006-01-27 15:28 ` Patrick McHardy 2006-01-27 16:04 ` Knut Petersen 2006-02-04 10:32 ` Knut Petersen 2 siblings, 0 replies; 13+ messages in thread From: Patrick McHardy @ 2006-01-27 15:28 UTC (permalink / raw) To: Herbert Xu, KdF Cc: Knut Petersen, shemminger, netdev, linux-kernel, David S. Miller, netfilter-devel [-- Attachment #1: Type: text/plain, Size: 1050 bytes --] Herbert Xu wrote: > On Fri, Jan 27, 2006 at 07:07:34AM +0100, Knut Petersen wrote: > >>Well, there are no problems if SuSEfirewall2 is disabled. But have a look >>at the loaded modules: >> >>ipt_MASQUERADE 3968 1 >>pppoe 15360 2 >>pppox 4616 1 pppoe > > > OK, although we can't rule out sky2/netfilter from the enquiry, I've > identified two bugs in ppp/pppoe that may be responsible for what you > are seeing. So please try the following patch and let us know if the > problem still exists (or deteriorates/improves). > > [PPP]: Fixed hardware RX checksum handling > > When we pull the PPP protocol off the skb, we forgot to update the > hardware RX checksum. This may lead to messages such as > > dsl0: hw csum failure. > > Similarly, we need to clear the hardware checksum flag when we use > the existing packet to store the decompressed result. We had a couple of reports of incorrect hardware checksums with PPPoE. KdF, can you test Herbert's patch (attached again to this mail) please? [-- Attachment #2: ppp-rxcsum --] [-- Type: text/plain, Size: 682 bytes --] diff --git a/drivers/net/ppp_generic.c b/drivers/net/ppp_generic.c --- a/drivers/net/ppp_generic.c +++ b/drivers/net/ppp_generic.c @@ -1610,6 +1610,8 @@ ppp_receive_nonmp_frame(struct ppp *ppp, } else if (!pskb_may_pull(skb, skb->len)) goto err; + else + skb->ip_summed = CHECKSUM_NONE; len = slhc_uncompress(ppp->vj, skb->data + 2, skb->len - 2); if (len <= 0) { @@ -1690,6 +1692,7 @@ ppp_receive_nonmp_frame(struct ppp *ppp, kfree_skb(skb); } else { skb_pull(skb, 2); /* chop off protocol */ + skb_postpull_rcsum(skb, skb->data - 2, 2); skb->dev = ppp->dev; skb->protocol = htons(npindex_to_ethertype[npi]); skb->mac.raw = skb->data; ^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19) 2006-01-27 12:22 ` Herbert Xu 2006-01-27 15:28 ` Patrick McHardy @ 2006-01-27 16:04 ` Knut Petersen 2006-02-04 10:32 ` Knut Petersen 2 siblings, 0 replies; 13+ messages in thread From: Knut Petersen @ 2006-01-27 16:04 UTC (permalink / raw) To: Herbert Xu; +Cc: shemminger, netdev, linux-kernel, David S. Miller Herbert Xu wrote: >When we pull the PPP protocol off the skb, we forgot to update the >hardware RX checksum. This may lead to messages such as > > dsl0: hw csum failure. > >Similarly, we need to clear the hardware checksum flag when we use >the existing packet to store the decompressed result. > >Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> > ACK That patch seems to solve all my problems with sky2 / pppoe / SuSE 9.2 Firewall. Thanks a lot! cu, Knut ^ permalink raw reply [flat|nested] 13+ messages in thread
* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19) 2006-01-27 12:22 ` Herbert Xu 2006-01-27 15:28 ` Patrick McHardy 2006-01-27 16:04 ` Knut Petersen @ 2006-02-04 10:32 ` Knut Petersen 2 siblings, 0 replies; 13+ messages in thread From: Knut Petersen @ 2006-02-04 10:32 UTC (permalink / raw) To: Herbert Xu; +Cc: shemminger, netdev, linux-kernel, David S. Miller 2.6.16-rc2 still misses your patch. Was there a special reason not to send it to Linus? cu, Knut >On Fri, Jan 27, 2006 at 07:07:34AM +0100, Knut Petersen wrote: > > >>Well, there are no problems if SuSEfirewall2 is disabled. But have a look >>at the loaded modules: >> >>ipt_MASQUERADE 3968 1 >>pppoe 15360 2 >>pppox 4616 1 pppoe >> >> > >OK, although we can't rule out sky2/netfilter from the enquiry, I've >identified two bugs in ppp/pppoe that may be responsible for what you >are seeing. So please try the following patch and let us know if the >problem still exists (or deteriorates/improves). > >[PPP]: Fixed hardware RX checksum handling > >When we pull the PPP protocol off the skb, we forgot to update the >hardware RX checksum. This may lead to messages such as > > dsl0: hw csum failure. > >Similarly, we need to clear the hardware checksum flag when we use >the existing packet to store the decompressed result. > >Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au> > >Cheers, > > >------------------------------------------------------------------------ > >diff --git a/drivers/net/ppp_generic.c b/drivers/net/ppp_generic.c >--- a/drivers/net/ppp_generic.c >+++ b/drivers/net/ppp_generic.c >@@ -1610,6 +1610,8 @@ ppp_receive_nonmp_frame(struct ppp *ppp, > } > else if (!pskb_may_pull(skb, skb->len)) > goto err; >+ else >+ skb->ip_summed = CHECKSUM_NONE; > > len = slhc_uncompress(ppp->vj, skb->data + 2, skb->len - 2); > if (len <= 0) { >@@ -1690,6 +1692,7 @@ ppp_receive_nonmp_frame(struct ppp *ppp, > kfree_skb(skb); > } else { > skb_pull(skb, 2); /* chop off protocol */ >+ skb_postpull_rcsum(skb, skb->data - 2, 2); > skb->dev = ppp->dev; > skb->protocol = htons(npindex_to_ethertype[npi]); > skb->mac.raw = skb->data; > > ^ permalink raw reply [flat|nested] 13+ messages in thread
* [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19) @ 2006-01-21 12:11 Knut Petersen 0 siblings, 0 replies; 13+ messages in thread From: Knut Petersen @ 2006-01-21 12:11 UTC (permalink / raw) To: shemminger; +Cc: linux-kernel Hi Stephen! > > It seems that the SuSE Firewall locked something .... > The decreasing time stamp counters are not a sign of delayed printks but of broken printk timestamping. That means that you probably see the correct order of printks, but cpu load is increasing fast at that point ... see my lkml mail about timer problems. cu, Knut ^ permalink raw reply [flat|nested] 13+ messages in thread
end of thread, other threads:[~2006-02-04 10:33 UTC | newest] Thread overview: 13+ messages (download: mbox.gz follow: Atom feed -- links below jump to the message on this page -- 2006-01-21 5:41 [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19) Knut Petersen 2006-01-23 18:15 ` Stephen Hemminger 2006-01-23 19:20 ` Knut Petersen 2006-01-23 19:27 ` Stephen Hemminger 2006-01-24 9:43 ` Knut Petersen 2006-01-24 17:54 ` Stephen Hemminger 2006-01-24 20:32 ` Herbert Xu 2006-01-27 6:07 ` Knut Petersen 2006-01-27 12:22 ` Herbert Xu 2006-01-27 15:28 ` Patrick McHardy 2006-01-27 16:04 ` Knut Petersen 2006-02-04 10:32 ` Knut Petersen -- strict thread matches above, loose matches on Subject: below -- 2006-01-21 12:11 Knut Petersen
This is a public inbox, see mirroring instructions for how to clone and mirror all data and code used for this inbox