linux-kernel.vger.kernel.org archive mirror
 help / color / mirror / Atom feed
* [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19)
@ 2006-01-21  5:41 Knut Petersen
  2006-01-23 18:15 ` Stephen Hemminger
  0 siblings, 1 reply; 13+ messages in thread
From: Knut Petersen @ 2006-01-21  5:41 UTC (permalink / raw)
  To: shemminger; +Cc: linux-kernel

Hi Stephen!

System description:
    - AOpen i915GMm-HFS, Pentium M 750
    - Realtek 8139 PCI Adapter
    - The software once was a SuSE 9.2
    - kernel: various 2.6.15*, 2.6.16-rc*

The mainboard includes:

0000:02:00.0 Class 0200: 11ab:4362 (rev 19)
        Subsystem: a0a0:0506
        Flags: bus master, fast devsel, latency 0, IRQ 177
        Memory at d0020000 (64-bit, non-prefetchable) [size=1024M]
        I/O ports at a000 [size=256]
        Expansion ROM at 00020000 [disabled]
        Capabilities: [48] Power Management version 2
        Capabilities: [50] Vital Product Data
        Capabilities: [5c] Message Signalled Interrupts: 64bit+ 
Queue=0/1 Enable-
        Capabilities: [e0] #10 [0011]

0000:03:00.0 Class 0200: 11ab:4362 (rev 19)
        Subsystem: a0a0:0506
        Flags: bus master, fast devsel, latency 0, IRQ 185
        Memory at d0120000 (64-bit, non-prefetchable) [size=1025M]
        I/O ports at b000 [size=256]
        Expansion ROM at 00020000 [disabled]
        Capabilities: [48] Power Management version 2
        Capabilities: [50] Vital Product Data
        Capabilities: [5c] Message Signalled Interrupts: 64bit+ 
Queue=0/1 Enable-
        Capabilities: [e0] #10 [0011]

The sky2 driver is compiled into the kernel as well as the 8139 driver.
I am connected to the internet via adsl and do use the SuSE Firewall.

8139 with or without SuSEFirewall
=====================

Absolutely no problems.

SKY2 with SuSEFirewall
===============

Initiate or terminate a session: fine
host foo, ping bar, etc do not work,
Domain name lookup seems to be broken.

SKY2 without SuSEFirewall
=================

Seems to work.


Have a look at this part of /var/log/messages:
===========================
Jan 20 16:14:56 linux SuSEfirewall2: Firewall rules unloaded.
Jan 20 16:15:53 linux kernel: [ 1182.531241] dsl0: hw csum failure.
Jan 20 16:15:53 linux kernel: [ 1182.531251]  [<c0104007>] 
dump_stack+0x17/0x20
Jan 20 16:15:53 linux kernel: [ 1182.531283]  [<c03a95c1>] 
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:15:53 linux kernel: [ 1182.531302]  [<c03a6d4a>] 
__skb_checksum_complete+0x5a/0x60
Jan 20 16:15:53 linux kernel: [ 1182.531318]  [<f88d892e>] 
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:15:53 linux kernel: [ 1182.531357]  [<f88d5d82>] 
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:15:53 linux kernel: [ 1182.531390]  [<c03bdfa7>] 
nf_iterate+0x57/0x90
Jan 20 16:15:53 linux kernel: [ 1182.531406]  [<c03be045>] 
nf_hook_slow+0x65/0x120
Jan 20 16:15:53 linux kernel: [ 1182.531422]  [<c03c48d6>] 
ip_rcv+0x286/0x510
Jan 20 16:15:53 linux kernel: [ 1182.531436]  [<c03a9e05>] 
netif_receive_skb+0x165/0x1c0
Jan 20 16:15:53 linux kernel: [ 1182.531452]  [<c03a9ee7>] 
process_backlog+0x87/0x110
Jan 20 16:15:53 linux kernel: [ 1182.531468]  [<c03aa01f>] 
net_rx_action+0xaf/0x100
Jan 20 16:15:53 linux kernel: [ 1182.531484]  [<c01242d5>] 
__do_softirq+0x55/0xb0
Jan 20 16:15:53 linux kernel: [ 1182.531499]  [<c0124363>] 
do_softirq+0x33/0x40
Jan 20 16:15:53 linux kernel: [ 1182.531513]  [<c0124453>] 
irq_exit+0x43/0x50
Jan 20 16:15:53 linux kernel: [ 1182.531526]  [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:15:53 linux kernel: [ 1182.531540]  [<c0103baa>] 
common_interrupt+0x1a/0x20
Jan 20 16:15:54 linux kernel: [ 1182.531565]  [<c0101147>] 
cpu_idle+0x87/0x90
Jan 20 16:15:54 linux kernel: [ 1182.531578]  [<c0100257>] _stext+0x37/0x40
Jan 20 16:15:54 linux kernel: [ 1182.531591]  [<c055a845>] 
start_kernel+0x195/0x1e0
Jan 20 16:15:54 linux kernel: [ 1182.531606]  [<c0100199>] 0xc0100199
Jan 20 16:15:54 linux kernel: [ 1183.548980] dsl0: hw csum failure.
Jan 20 16:15:54 linux kernel: [ 1183.548989]  [<c0104007>] 
dump_stack+0x17/0x20
Jan 20 16:15:54 linux kernel: [ 1183.549020]  [<c03a95c1>] 
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:15:54 linux kernel: [ 1183.549038]  [<c03a6d4a>] 
__skb_checksum_complete+0x5a/0x60
Jan 20 16:15:54 linux kernel: [ 1183.549054]  [<f88d892e>] 
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:15:55 linux kernel: [ 1183.549095]  [<f88d5d82>] 
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:15:55 linux kernel: [ 1183.549127]  [<c03bdfa7>] 
nf_iterate+0x57/0x90
Jan 20 16:15:55 linux kernel: [ 1183.549144]  [<c03be045>] 
nf_hook_slow+0x65/0x120
Jan 20 16:15:55 linux kernel: [ 1183.549159]  [<c03c48d6>] 
ip_rcv+0x286/0x510
Jan 20 16:15:55 linux kernel: [ 1183.549173]  [<c03a9e05>] 
netif_receive_skb+0x165/0x1c0
Jan 20 16:15:55 linux kernel: [ 1183.549190]  [<c03a9ee7>] 
process_backlog+0x87/0x110
Jan 20 16:15:55 linux kernel: [ 1183.549206]  [<c03aa01f>] 
net_rx_action+0xaf/0x100
Jan 20 16:15:55 linux kernel: [ 1183.549221]  [<c01242d5>] 
__do_softirq+0x55/0xb0
Jan 20 16:15:55 linux kernel: [ 1183.549236]  [<c0124363>] 
do_softirq+0x33/0x40
Jan 20 16:15:55 linux kernel: [ 1183.549250]  [<c0124453>] 
irq_exit+0x43/0x50
Jan 20 16:15:55 linux kernel: [ 1183.549264]  [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:15:56 linux kernel: [ 1183.549278]  [<c0103baa>] 
common_interrupt+0x1a/0x20
Jan 20 16:15:56 linux kernel: [  887.950383] dsl0: hw csum failure.
Jan 20 16:15:56 linux kernel: [  887.950389]  [<c0104007>] 
dump_stack+0x17/0x20
Jan 20 16:15:56 linux kernel: [  887.950416]  [<c03a95c1>] 
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:15:56 linux kernel: [  887.950430]  [<c03a6d4a>] 
__skb_checksum_complete+0x5a/0x60
Jan 20 16:15:56 linux kernel: [  887.950442]  [<f88d892e>] 
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:15:56 linux kernel: [  887.950473]  [<f88d5d82>] 
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:15:56 linux kernel: [  887.950498]  [<c03bdfa7>] 
nf_iterate+0x57/0x90
Jan 20 16:15:56 linux kernel: [  887.950511]  [<c03be045>] 
nf_hook_slow+0x65/0x120
Jan 20 16:15:56 linux kernel: [  887.950522]  [<c03c48d6>] 
ip_rcv+0x286/0x510
Jan 20 16:15:57 linux kernel: [  887.950533]  [<c03a9e05>] 
netif_receive_skb+0x165/0x1c0
Jan 20 16:15:57 linux kernel: [  887.950545]  [<c03a9ee7>] 
process_backlog+0x87/0x110
Jan 20 16:15:57 linux kernel: [  887.950567]  [<c03aa01f>] 
net_rx_action+0xaf/0x100
Jan 20 16:15:57 linux kernel: [  887.950579]  [<c01242d5>] 
__do_softirq+0x55/0xb0
Jan 20 16:15:57 linux kernel: [  887.950590]  [<c0124363>] 
do_softirq+0x33/0x40
Jan 20 16:15:57 linux kernel: [  887.950600]  [<c0124453>] 
irq_exit+0x43/0x50
Jan 20 16:15:57 linux kernel: [  887.950610]  [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:15:57 linux kernel: [  887.950621]  [<c0103baa>] 
common_interrupt+0x1a/0x20
Jan 20 16:15:57 linux kernel: [  889.050285] dsl0: hw csum failure.
Jan 20 16:15:57 linux kernel: [  889.050291]  [<c0104007>] 
dump_stack+0x17/0x20
Jan 20 16:15:57 linux kernel: [  889.050319]  [<c03a95c1>] 
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:15:57 linux kernel: [  889.050340]  [<c03a6d4a>] 
__skb_checksum_complete+0x5a/0x60
Jan 20 16:15:57 linux kernel: [  889.050352]  [<f88d892e>] 
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:15:57 linux kernel: [  889.050384]  [<f88d5d82>] 
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:15:57 linux kernel: [  889.050409]  [<c03bdfa7>] 
nf_iterate+0x57/0x90
Jan 20 16:15:57 linux kernel: [  889.050422]  [<c03be045>] 
nf_hook_slow+0x65/0x120
Jan 20 16:15:57 linux kernel: [  889.050433]  [<c03c48d6>] 
ip_rcv+0x286/0x510
Jan 20 16:15:57 linux kernel: [  889.050444]  [<c03a9e05>] 
netif_receive_skb+0x165/0x1c0
Jan 20 16:15:57 linux kernel: [  889.050456]  [<c03a9ee7>] 
process_backlog+0x87/0x110
Jan 20 16:15:57 linux kernel: [  889.050467]  [<c03aa01f>] 
net_rx_action+0xaf/0x100
Jan 20 16:15:58 linux kernel: [  889.050479]  [<c01242d5>] 
__do_softirq+0x55/0xb0
Jan 20 16:15:58 linux kernel: [  889.050490]  [<c0124363>] 
do_softirq+0x33/0x40
Jan 20 16:15:58 linux kernel: [  889.050500]  [<c0124453>] 
irq_exit+0x43/0x50
Jan 20 16:15:58 linux kernel: [  889.050510]  [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:15:58 linux kernel: [  889.050520]  [<c0103baa>] 
common_interrupt+0x1a/0x20
Jan 20 16:15:58 linux kernel: [  889.050532]  [<c0101147>] 
cpu_idle+0x87/0x90
Jan 20 16:15:58 linux kernel: [  889.050542]  [<c0100257>] _stext+0x37/0x40
Jan 20 16:15:58 linux kernel: [  889.050551]  [<c055a845>] 
start_kernel+0x195/0x1e0
Jan 20 16:15:58 linux kernel: [  889.050562]  [<c0100199>] 0xc0100199
Jan 20 16:15:58 linux kernel: [  712.515665] dsl0: hw csum failure.
Jan 20 16:15:58 linux kernel: [  712.515670]  [<c0104007>] 
dump_stack+0x17/0x20
Jan 20 16:15:58 linux kernel: [  712.515695]  [<c03a95c1>] 
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:15:58 linux kernel: [  712.515706]  [<c03a6d4a>] 
__skb_checksum_complete+0x5a/0x60
Jan 20 16:15:58 linux kernel: [  712.515716]  [<f88d892e>] 
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:15:58 linux kernel: [  712.515742]  [<f88d5d82>] 
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:15:58 linux kernel: [  712.515763]  [<c03bdfa7>] 
nf_iterate+0x57/0x90
Jan 20 16:15:58 linux kernel: [  712.515774]  [<c03be045>] 
nf_hook_slow+0x65/0x120
Jan 20 16:15:58 linux kernel: [  712.515783]  [<c03c48d6>] 
ip_rcv+0x286/0x510
Jan 20 16:15:58 linux kernel: [  712.515792]  [<c03a9e05>] 
netif_receive_skb+0x165/0x1c0
Jan 20 16:15:58 linux kernel: [  712.515801]  [<c03a9ee7>] 
process_backlog+0x87/0x110
Jan 20 16:15:58 linux kernel: [  712.515811]  [<c03aa01f>] 
net_rx_action+0xaf/0x100
Jan 20 16:15:58 linux kernel: [  712.515820]  [<c01242d5>] 
__do_softirq+0x55/0xb0
Jan 20 16:15:58 linux kernel: [  712.515829]  [<c0124363>] 
do_softirq+0x33/0x40
Jan 20 16:15:58 linux kernel: [  712.515837]  [<c0124453>] 
irq_exit+0x43/0x50
Jan 20 16:15:58 linux kernel: [  712.515845]  [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:15:58 linux kernel: [  712.515854]  [<c0103baa>] 
common_interrupt+0x1a/0x20
Jan 20 16:15:59 linux kernel: [  713.409544] dsl0: hw csum failure.
Jan 20 16:15:59 linux kernel: [  713.409550]  [<c0104007>] 
dump_stack+0x17/0x20
Jan 20 16:15:59 linux kernel: [  713.409575]  [<c03a95c1>] 
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:15:59 linux kernel: [  713.409587]  [<c03a6d4a>] 
__skb_checksum_complete+0x5a/0x60
Jan 20 16:15:59 linux kernel: [  713.409597]  [<f88d892e>] 
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:15:59 linux kernel: [  713.409624]  [<f88d5d82>] 
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:15:59 linux kernel: [  713.409644]  [<c03bdfa7>] 
nf_iterate+0x57/0x90
Jan 20 16:15:59 linux kernel: [  713.409655]  [<c03be045>] 
nf_hook_slow+0x65/0x120
Jan 20 16:15:59 linux kernel: [  713.409664]  [<c03c48d6>] 
ip_rcv+0x286/0x510
Jan 20 16:15:59 linux kernel: [  713.409673]  [<c03a9e05>] 
netif_receive_skb+0x165/0x1c0
Jan 20 16:15:59 linux kernel: [  713.409683]  [<c03a9ee7>] 
process_backlog+0x87/0x110
Jan 20 16:15:59 linux kernel: [  713.409692]  [<c03aa01f>] 
net_rx_action+0xaf/0x100
Jan 20 16:15:59 linux kernel: [  713.409701]  [<c01242d5>] 
__do_softirq+0x55/0xb0
Jan 20 16:15:59 linux kernel: [  713.409711]  [<c0124363>] 
do_softirq+0x33/0x40
Jan 20 16:15:59 linux kernel: [  713.409719]  [<c0124453>] 
irq_exit+0x43/0x50
Jan 20 16:15:59 linux kernel: [  713.409727]  [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:15:59 linux kernel: [  713.409736]  [<c0103baa>] 
common_interrupt+0x1a/0x20
Jan 20 16:15:59 linux kernel: [  595.536855] dsl0: hw csum failure.
Jan 20 16:15:59 linux kernel: [  595.536859]  [<c0104007>] 
dump_stack+0x17/0x20
Jan 20 16:15:59 linux kernel: [  595.536876]  [<c03a95c1>] 
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:15:59 linux kernel: [  595.536886]  [<c03a6d4a>] 
__skb_checksum_complete+0x5a/0x60
Jan 20 16:15:59 linux kernel: [  595.536894]  [<f88d892e>] 
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:15:59 linux kernel: [  595.536918]  [<f88d5d82>] 
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:15:59 linux kernel: [  595.536935]  [<c03bdfa7>] 
nf_iterate+0x57/0x90
Jan 20 16:15:59 linux kernel: [  595.536944]  [<c03be045>] 
nf_hook_slow+0x65/0x120
Jan 20 16:15:59 linux kernel: [  595.536952]  [<c03c48d6>] 
ip_rcv+0x286/0x510
Jan 20 16:15:59 linux kernel: [  595.536959]  [<c03a9e05>] 
netif_receive_skb+0x165/0x1c0
Jan 20 16:15:59 linux kernel: [  595.536967]  [<c03a9ee7>] 
process_backlog+0x87/0x110
Jan 20 16:15:59 linux kernel: [  595.536975]  [<c03aa01f>] 
net_rx_action+0xaf/0x100
Jan 20 16:15:59 linux kernel: [  595.536983]  [<c01242d5>] 
__do_softirq+0x55/0xb0
Jan 20 16:15:59 linux kernel: [  595.536991]  [<c0124363>] 
do_softirq+0x33/0x40
Jan 20 16:15:59 linux kernel: [  595.536998]  [<c0124453>] 
irq_exit+0x43/0x50
Jan 20 16:15:59 linux kernel: [  595.537004]  [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:15:59 linux kernel: [  595.537011]  [<c0103baa>] 
common_interrupt+0x1a/0x20
Jan 20 16:16:00 linux kernel: [  511.194225] dsl0: hw csum failure.
Jan 20 16:16:00 linux kernel: [  511.194232]  [<c0104007>] 
dump_stack+0x17/0x20
Jan 20 16:16:00 linux kernel: [  511.194254]  [<c03a95c1>] 
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:16:00 linux kernel: [  511.194263]  [<c03a6d4a>] 
__skb_checksum_complete+0x5a/0x60
Jan 20 16:16:00 linux kernel: [  511.194270]  [<f88d892e>] 
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:16:00 linux kernel: [  511.194291]  [<f88d5d82>] 
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:16:00 linux kernel: [  511.194307]  [<c03bdfa7>] 
nf_iterate+0x57/0x90
Jan 20 16:16:00 linux kernel: [  511.194315]  [<c03be045>] 
nf_hook_slow+0x65/0x120
Jan 20 16:16:00 linux kernel: [  511.194321]  [<c03c48d6>] 
ip_rcv+0x286/0x510
Jan 20 16:16:00 linux kernel: [  511.194327]  [<c03a9e05>] 
netif_receive_skb+0x165/0x1c0
Jan 20 16:16:00 linux kernel: [  511.194335]  [<c03a9ee7>] 
process_backlog+0x87/0x110
Jan 20 16:16:00 linux kernel: [  511.194341]  [<c03aa01f>] 
net_rx_action+0xaf/0x100
Jan 20 16:16:00 linux kernel: [  511.194348]  [<c01242d5>] 
__do_softirq+0x55/0xb0
Jan 20 16:16:00 linux kernel: [  511.194355]  [<c0124363>] 
do_softirq+0x33/0x40
Jan 20 16:16:00 linux kernel: [  511.194361]  [<c0124453>] 
irq_exit+0x43/0x50
Jan 20 16:16:00 linux kernel: [  511.194367]  [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:16:00 linux kernel: [  511.194373]  [<c0103baa>] 
common_interrupt+0x1a/0x20
Jan 20 16:16:00 linux kernel: [  511.194379]  [<c0101147>] 
cpu_idle+0x87/0x90
Jan 20 16:16:00 linux kernel: [  511.194385]  [<c0100257>] _stext+0x37/0x40
Jan 20 16:16:00 linux kernel: [  511.194390]  [<c055a845>] 
start_kernel+0x195/0x1e0
Jan 20 16:16:00 linux kernel: [  511.194397]  [<c0100199>] 0xc0100199
Jan 20 16:16:01 linux kernel: [  511.933366] dsl0: hw csum failure.
Jan 20 16:16:01 linux kernel: [  511.933373]  [<c0104007>] 
dump_stack+0x17/0x20
Jan 20 16:16:01 linux kernel: [  511.933395]  [<c03a95c1>] 
netdev_rx_csum_fault+0x31/0x40
Jan 20 16:16:01 linux kernel: [  511.933405]  [<c03a6d4a>] 
__skb_checksum_complete+0x5a/0x60
Jan 20 16:16:01 linux kernel: [  511.933411]  [<f88d892e>] 
icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 20 16:16:01 linux kernel: [  511.933433]  [<f88d5d82>] 
ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 20 16:16:01 linux kernel: [  511.933448]  [<c03bdfa7>] 
nf_iterate+0x57/0x90
Jan 20 16:16:01 linux kernel: [  511.933464]  [<c03be045>] 
nf_hook_slow+0x65/0x120
Jan 20 16:16:01 linux kernel: [  511.933471]  [<c03c48d6>] 
ip_rcv+0x286/0x510
Jan 20 16:16:01 linux kernel: [  511.933477]  [<c03a9e05>] 
netif_receive_skb+0x165/0x1c0
Jan 20 16:16:01 linux kernel: [  511.933484]  [<c03a9ee7>] 
process_backlog+0x87/0x110
Jan 20 16:16:01 linux kernel: [  511.933491]  [<c03aa01f>] 
net_rx_action+0xaf/0x100
Jan 20 16:16:01 linux kernel: [  511.933498]  [<c01242d5>] 
__do_softirq+0x55/0xb0
Jan 20 16:16:01 linux kernel: [  511.933505]  [<c0124363>] 
do_softirq+0x33/0x40
Jan 20 16:16:01 linux kernel: [  511.933511]  [<c0124453>] 
irq_exit+0x43/0x50
Jan 20 16:16:01 linux kernel: [  511.933517]  [<c0105218>] do_IRQ+0x38/0x70
Jan 20 16:16:01 linux kernel: [  511.933523]  [<c0103baa>] 
common_interrupt+0x1a/0x20
Jan 20 16:16:01 linux kernel: [  511.933529]  [<c0101147>] 
cpu_idle+0x87/0x90
Jan 20 16:16:01 linux kernel: [  511.933535]  [<c0100257>] _stext+0x37/0x40
Jan 20 16:16:01 linux kernel: [  511.933540]  [<c055a845>] 
start_kernel+0x195/0x1e0
Jan 20 16:16:01 linux kernel: [  511.933547]  [<c0100199>] 0xc0100199

It seems that the SuSE Firewall locked something ....

I started with kernel 2.6.15-git7, tried 2.6.15.1 and 2.6.16-rc1*.
At the moment I do use a kernel 2.6.15-git7 patched with an updated sky2 
(v.013).
I could not find a single working sky2 configuration.

Any ideas?

cu,
 Knut

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19)
  2006-01-21  5:41 [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19) Knut Petersen
@ 2006-01-23 18:15 ` Stephen Hemminger
  2006-01-23 19:20   ` Knut Petersen
  0 siblings, 1 reply; 13+ messages in thread
From: Stephen Hemminger @ 2006-01-23 18:15 UTC (permalink / raw)
  To: Knut Petersen; +Cc: linux-kernel, netdev

O
> 
> It seems that the SuSE Firewall locked something ....
> 
> I started with kernel 2.6.15-git7, tried 2.6.15.1 and 2.6.16-rc1*.
> At the moment I do use a kernel 2.6.15-git7 patched with an updated sky2 
> (v.013).
> I could not find a single working sky2 configuration.
> 

Are you using the full kernel.org kernel, or are you putting sky2 driver into
the SUSE kernel? There are a number of bug fixes related to hardware checksumming
that are in the kernel.org kernel (2.6.15 or later).  There was one in ICMP.
These fixes relate to places in the code where a protocol decides to trim a
packet by removing bytes. I am not familiar with the SuSE Firewall. Is it just
standard netfilter modules or additional code?

-- 
Stephen Hemminger <shemminger@osdl.org>
OSDL http://developer.osdl.org/~shemminger

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19)
  2006-01-23 18:15 ` Stephen Hemminger
@ 2006-01-23 19:20   ` Knut Petersen
  2006-01-23 19:27     ` Stephen Hemminger
  0 siblings, 1 reply; 13+ messages in thread
From: Knut Petersen @ 2006-01-23 19:20 UTC (permalink / raw)
  To: Stephen Hemminger; +Cc: linux-kernel, netdev

Stephen Hemminger wrote:

>O
>  
>
>>It seems that the SuSE Firewall locked something ....
>>
>>I started with kernel 2.6.15-git7, tried 2.6.15.1 and 2.6.16-rc1*.
>>At the moment I do use a kernel 2.6.15-git7 patched with an updated sky2 
>>(v.013).
>>I could not find a single working sky2 configuration.
>>
>>    
>>
>
>Are you using the full kernel.org kernel, or are you putting sky2 driver into
>the SUSE kernel?
>
No SuSE kernels here. I started with kernel.org kernel 2.6.15-git7 and
had those problems. Then I tried 2.6.16-rc3-git3, the most recent kernel
at the time of my original writing. As I had some other problems with
that kernel I had a look at the git tree of Linus and applied all sky2 
related
patches to the otherwise unchanged 2.6.15-git7. 2.6.15.1 also was no
solution as sky2 seems to be not available there.

> There are a number of bug fixes related to hardware checksumming
>that are in the kernel.org kernel (2.6.15 or later).  There was one in ICMP.
>These fixes relate to places in the code where a protocol decides to trim a
>packet by removing bytes. I am not familiar with the SuSE Firewall. Is it just
>standard netfilter modules or additional code?
>  
>
I have to admit that I don´t know enough about the network layers
of the kernel, so here is a list of the network modules loaded (sky2
compiled into the kernel). SuSEFirewall is just standard netfiltering
using those modules.

ipt_MASQUERADE          3968  1
pppoe                  15360  2
pppox                   4616  1 pppoe
af_packet              23240  2
ppp_generic            30740  6 pppoe,pppox
slhc                    7040  1 ppp_generic
ipt_TOS                 2816  28
ipt_TCPMSS              4800  2
ipt_LOG                 7232  77
ipt_limit               2880  77
ipt_pkttype             1984  2
ipt_state               2240  45
ip6t_REJECT             5824  3
ipt_REJECT              5952  3
iptable_mangle          3200  1
iptable_nat             8836  1
iptable_filter          3264  1
ip6table_mangle         2752  0
ip_nat_ftp              3776  0
ip_nat                 18284  3 ipt_MASQUERADE,iptable_nat,ip_nat_ftp
ip_conntrack_ftp        8240  1 ip_nat_ftp
ip_conntrack           51020  6 
ipt_MASQUERADE,ipt_state,iptable_nat,ip_nat_ftp,ip_nat,ip_conntrack_ftp
ip_tables              24088  11 
ipt_MASQUERADE,ipt_TOS,ipt_TCPMSS,ipt_LOG,ipt_limit,ipt_pkttype,ipt_state,ipt_REJECT,iptable_mangle,iptable_nat,iptable_filter
ip6table_filter         3136  1
ip6_tables             25624  3 ip6t_REJECT,ip6table_mangle,ip6table_filter
ipv6                  271712  14 ip6t_REJECT

As said before, rtl8139 does work perfectly well, the same is true
for an identical system with a Via Rhine adapter.


cu,
 Knut

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19)
  2006-01-23 19:20   ` Knut Petersen
@ 2006-01-23 19:27     ` Stephen Hemminger
  2006-01-24  9:43       ` Knut Petersen
  0 siblings, 1 reply; 13+ messages in thread
From: Stephen Hemminger @ 2006-01-23 19:27 UTC (permalink / raw)
  To: linux-kernel

Could you try turning off rx checksumming (with ethtool).
	ethtool -K eth0 rx off

There probably still are (generic) bugs in the netfilter code for CHECKSUM_HW
socket buffers.

-- 
Stephen Hemminger <shemminger@osdl.org>
OSDL http://developer.osdl.org/~shemminger

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19)
  2006-01-23 19:27     ` Stephen Hemminger
@ 2006-01-24  9:43       ` Knut Petersen
  2006-01-24 17:54         ` Stephen Hemminger
  2006-01-24 20:32         ` Herbert Xu
  0 siblings, 2 replies; 13+ messages in thread
From: Knut Petersen @ 2006-01-24  9:43 UTC (permalink / raw)
  To: Stephen Hemminger; +Cc: netdev, linux-kernel

Stephen Hemminger schrieb:

>Could you try turning off rx checksumming (with ethtool).
>	ethtool -K eth0 rx off
>
>There probably still are (generic) bugs in the netfilter code for CHECKSUM_HW
>socket buffers.
>
>  
>
"ethtool -K eth0 rx off" does cure my problem with sky2.

Anybody is invited to send patches as the problem is 100% reproducible here.

cu,
 Knut


^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19)
  2006-01-24  9:43       ` Knut Petersen
@ 2006-01-24 17:54         ` Stephen Hemminger
  2006-01-24 20:32         ` Herbert Xu
  1 sibling, 0 replies; 13+ messages in thread
From: Stephen Hemminger @ 2006-01-24 17:54 UTC (permalink / raw)
  To: Knut Petersen; +Cc: netdev, linux-kernel

On Tue, 24 Jan 2006 10:43:57 +0100
Knut Petersen <Knut_Petersen@t-online.de> wrote:

> Stephen Hemminger schrieb:
> 
> >Could you try turning off rx checksumming (with ethtool).
> >	ethtool -K eth0 rx off
> >
> >There probably still are (generic) bugs in the netfilter code for CHECKSUM_HW
> >socket buffers.
> >
> >  
> >
> "ethtool -K eth0 rx off" does cure my problem with sky2.
> 
> Anybody is invited to send patches as the problem is 100% reproducible here.
>

Does it always show up on icmp only?

What are the iptables rules (iptables -L)

-- 
Stephen Hemminger <shemminger@osdl.org>
OSDL http://developer.osdl.org/~shemminger

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19)
  2006-01-24  9:43       ` Knut Petersen
  2006-01-24 17:54         ` Stephen Hemminger
@ 2006-01-24 20:32         ` Herbert Xu
  2006-01-27  6:07           ` Knut Petersen
  1 sibling, 1 reply; 13+ messages in thread
From: Herbert Xu @ 2006-01-24 20:32 UTC (permalink / raw)
  To: Knut Petersen; +Cc: shemminger, netdev, linux-kernel

Knut Petersen <Knut_Petersen@t-online.de> wrote:
>
> "ethtool -K eth0 rx off" does cure my problem with sky2.
> 
> Anybody is invited to send patches as the problem is 100% reproducible here.

Does the problem go away if you disable conntrack by unloading its module?

Please try to capture the offending ICMP packet with tcpdump and show us
what it looks like.

Thanks,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19)
  2006-01-24 20:32         ` Herbert Xu
@ 2006-01-27  6:07           ` Knut Petersen
  2006-01-27 12:22             ` Herbert Xu
  0 siblings, 1 reply; 13+ messages in thread
From: Knut Petersen @ 2006-01-27  6:07 UTC (permalink / raw)
  To: Herbert Xu; +Cc: shemminger, netdev, linux-kernel

[-- Attachment #1: Type: text/plain, Size: 3163 bytes --]

* Herbert Xu wrote:

>Does the problem go away if you disable conntrack by unloading its module?
>
>Please try to capture the offending ICMP packet with tcpdump and show us
>what it looks like.
>  
>
Well, there are no problems if SuSEfirewall2 is disabled. But have a look
at the loaded modules:

ipt_MASQUERADE          3968  1
pppoe                  15360  2
pppox                   4616  1 pppoe
af_packet              23240  2
ppp_generic            30740  6 pppoe,pppox
slhc                    7040  1 ppp_generic
ipt_TOS                 2816  28
ipt_TCPMSS              4800  2
ipt_LOG                 7232  55
ipt_limit               2880  55
ipt_pkttype             1984  4
ipt_state               2240  46
ip6t_LOG                8000  1
ip6t_limit              3008  1
ip6t_REJECT             5824  3
ipt_REJECT              5952  3
iptable_mangle          3200  1
iptable_nat             8836  1
iptable_filter          3264  1
ip6table_mangle         2752  0
ip_nat_ftp              3776  0
ip_nat                 18284  3 ipt_MASQUERADE,iptable_nat,ip_nat_ftp
ip_conntrack_ftp        8240  1 ip_nat_ftp
ip_conntrack           51020  6 
ipt_MASQUERADE,ipt_state,iptable_nat,ip_nat_ftp,ip_nat,ip_conntrack_ftp
ip_tables              24088  11 
ipt_MASQUERADE,ipt_TOS,ipt_TCPMSS,ipt_LOG,ipt_limit,ipt_pkttype,ipt_state,ipt_REJECT,iptable_mangle,iptable_nat,iptable_filter
ip6table_filter         3136  1
ip6_tables             25624  5 
ip6t_LOG,ip6t_limit,ip6t_REJECT,ip6table_mangle,ip6table_filter
ipv6                  271712  14 ip6t_REJECT

How should I unload ip_conntrack alone?

* Stephen Hemminger wrote:

>Does it always show up on icmp only?
>
>What are the iptables rules (iptables -L)
>
>  
>

As far as I can see, all my sky2 problems are gone with -K rx off.

So here is more information. I executed the following script:

logger Starting test
logger "Executing ethtool -K eth0 rx off"
ethtool -K eth0 rx off
logger "Executing tcpdump -i eth0 -vv > tcpdumpfile &"
tcpdump -i eth0 -vv > tcpdumpfile &
logger "Executing host www.suse.com"
host www.suse.com
logger "Sleeping 2 seconds"
sleep 2 
logger "Executing ping -c 2 195.135.220.3"
ping -c 2 195.135.220.3
logger "Sleeping 2 seconds"
sleep 2
logger "Executing ethtool -K eth0 rx on"
ethtool -K eth0 rx on
logger "Sleeping 2 seconds"
sleep 2 
logger "Executing host www.suse.com"
host www.suse.com
logger "Sleeping 2 seconds"
sleep 2 
logger "Executing ping -c 2 195.135.220.3"
ping -c 2 195.135.220.3
logger "Sleeping 2 seconds"
sleep 2 
logger "Executing ethtool -K eth0 rx off"
ethtool -K eth0 rx off
logger "Sleeping 2 seconds"
sleep 2 
logger "killall tcpdump"
killall tcpdump
logger End of test


The first host and ping worked fine, after the ethtool -K eth0 rx on
the host www.suse.com timed out  with

   ;; connection timed out; no servers could be reached

and the ping 195.135.220.3 provoked the stack traces you see in sky2syslog.

I attach the syslog for the time of the test, the output of iptables -L 
and the
output of tcpdump as the very long lines included would be hard to read
with linebreaks.

No, I did _not_ delete anything from the tcpdump file.

cu,
 Knut



[-- Attachment #2: sky2syslog --]
[-- Type: text/plain, Size: 5199 bytes --]

Jan 27 06:29:38 linux knut: Starting test
Jan 27 06:29:38 linux knut: Executing ethtool -K eth0 rx off
Jan 27 06:29:38 linux knut: Executing tcpdump -i eth0 -vv > tcpdumpfile &
Jan 27 06:29:38 linux knut: Executing host www.suse.com
Jan 27 06:29:38 linux kernel: [  403.606906] device eth0 entered promiscuous mode
Jan 27 06:29:38 linux knut: Sleeping 2 seconds
Jan 27 06:29:40 linux knut: Executing ping -c 2 195.135.220.3
Jan 27 06:29:41 linux dhcpd: icmp.c(274): trace_write_packet with null trace type
Jan 27 06:29:42 linux dhcpd: icmp.c(274): trace_write_packet with null trace type
Jan 27 06:29:42 linux knut: Sleeping 2 seconds
Jan 27 06:29:44 linux knut: Executing ethtool -K eth0 rx on
Jan 27 06:29:44 linux knut: Sleeping 2 seconds
Jan 27 06:29:46 linux knut: Executing host www.suse.com
Jan 27 06:29:46 linux kernel: [  406.693484] SFW2-INext-DROP-DEFLT-INV IN=dsl0 OUT= MAC= SRC=217.237.150.33 DST=84.171.112.100 LEN=74 TOS=0x10 PREC=0x00 TTL=57 ID=53333 PROTO=UDP SPT=53 DPT=1076 LEN=54
Jan 27 06:29:47 linux kernel: [  407.125112] SFW2-INext-DROP-DEFLT-INV IN=dsl0 OUT= MAC= SRC=217.237.150.33 DST=84.171.112.100 LEN=116 TOS=0x10 PREC=0x00 TTL=57 ID=24213 PROTO=UDP SPT=53 DPT=1078 LEN=96
Jan 27 06:29:58 linux knut: Sleeping 2 seconds
Jan 27 06:30:00 linux knut: Executing ping -c 2 195.135.220.3
Jan 27 06:30:00 linux kernel: [  412.693613] dsl0: hw csum failure.
Jan 27 06:30:00 linux kernel: [  412.693615]  [<c0104007>] dump_stack+0x17/0x20
Jan 27 06:30:00 linux kernel: [  412.693628]  [<c03b2961>] netdev_rx_csum_fault+0x31/0x40
Jan 27 06:30:00 linux kernel: [  412.693632]  [<c03b00ea>] __skb_checksum_complete+0x5a/0x60
Jan 27 06:30:00 linux kernel: [  412.693635]  [<f88d892e>] icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 27 06:30:00 linux kernel: [  412.693644]  [<f88d5d82>] ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 27 06:30:00 linux kernel: [  412.693651]  [<c03c7347>] nf_iterate+0x57/0x90
Jan 27 06:30:00 linux kernel: [  412.693654]  [<c03c73e5>] nf_hook_slow+0x65/0x120
Jan 27 06:30:00 linux kernel: [  412.693657]  [<c03cdc76>] ip_rcv+0x286/0x510
Jan 27 06:30:00 linux kernel: [  412.693660]  [<c03b31a5>] netif_receive_skb+0x165/0x1c0
Jan 27 06:30:00 linux kernel: [  412.693663]  [<c03b3287>] process_backlog+0x87/0x110
Jan 27 06:30:00 linux kernel: [  412.693665]  [<c03b33bf>] net_rx_action+0xaf/0x100
Jan 27 06:30:00 linux kernel: [  412.693668]  [<c01232d5>] __do_softirq+0x55/0xb0
Jan 27 06:30:00 linux kernel: [  412.693671]  [<c0123363>] do_softirq+0x33/0x40
Jan 27 06:30:00 linux kernel: [  412.693674]  [<c0123453>] irq_exit+0x43/0x50
Jan 27 06:30:00 linux kernel: [  412.693676]  [<c0105218>] do_IRQ+0x38/0x70
Jan 27 06:30:00 linux kernel: [  412.693679]  [<c0103baa>] common_interrupt+0x1a/0x20
Jan 27 06:30:00 linux kernel: [  412.693682]  [<c0101147>] cpu_idle+0x87/0x90
Jan 27 06:30:00 linux kernel: [  412.693684]  [<c0100257>] rest_init+0x37/0x40
Jan 27 06:30:00 linux kernel: [  412.693686]  [<c055e845>] start_kernel+0x195/0x1e0
Jan 27 06:30:00 linux kernel: [  412.693690]  [<c0100199>] 0xc0100199
Jan 27 06:30:00 linux dhcpd: icmp.c(274): trace_write_packet with null trace type
Jan 27 06:30:01 linux kernel: [  413.121225] dsl0: hw csum failure.
Jan 27 06:30:01 linux kernel: [  413.121227]  [<c0104007>] dump_stack+0x17/0x20
Jan 27 06:30:01 linux kernel: [  413.121236]  [<c03b2961>] netdev_rx_csum_fault+0x31/0x40
Jan 27 06:30:01 linux kernel: [  413.121240]  [<c03b00ea>] __skb_checksum_complete+0x5a/0x60
Jan 27 06:30:01 linux kernel: [  413.121242]  [<f88d892e>] icmp_error+0x10e/0x1e0 [ip_conntrack]
Jan 27 06:30:01 linux kernel: [  413.121252]  [<f88d5d82>] ip_conntrack_in+0x72/0x240 [ip_conntrack]
Jan 27 06:30:01 linux kernel: [  413.121258]  [<c03c7347>] nf_iterate+0x57/0x90
Jan 27 06:30:01 linux kernel: [  413.121261]  [<c03c73e5>] nf_hook_slow+0x65/0x120
Jan 27 06:30:01 linux kernel: [  413.121264]  [<c03cdc76>] ip_rcv+0x286/0x510
Jan 27 06:30:01 linux kernel: [  413.121267]  [<c03b31a5>] netif_receive_skb+0x165/0x1c0
Jan 27 06:30:01 linux kernel: [  413.121270]  [<c03b3287>] process_backlog+0x87/0x110
Jan 27 06:30:01 linux kernel: [  413.121272]  [<c03b33bf>] net_rx_action+0xaf/0x100
Jan 27 06:30:01 linux knut: Sleeping 2 seconds
Jan 27 06:30:01 linux kernel: [  413.121275]  [<c01232d5>] __do_softirq+0x55/0xb0
Jan 27 06:30:01 linux kernel: [  413.121278]  [<c0123363>] do_softirq+0x33/0x40
Jan 27 06:30:01 linux kernel: [  413.121281]  [<c0123453>] irq_exit+0x43/0x50
Jan 27 06:30:01 linux kernel: [  413.121283]  [<c0105218>] do_IRQ+0x38/0x70
Jan 27 06:30:01 linux kernel: [  413.121286]  [<c0103baa>] common_interrupt+0x1a/0x20
Jan 27 06:30:01 linux kernel: [  413.121288]  [<c0101147>] cpu_idle+0x87/0x90
Jan 27 06:30:01 linux kernel: [  413.121291]  [<c0100257>] rest_init+0x37/0x40
Jan 27 06:30:01 linux kernel: [  413.121293]  [<c055e845>] start_kernel+0x195/0x1e0
Jan 27 06:30:01 linux kernel: [  413.121296]  [<c0100199>] 0xc0100199
Jan 27 06:30:01 linux dhcpd: icmp.c(274): trace_write_packet with null trace type
Jan 27 06:30:03 linux knut: Executing ethtool -K eth0 rx off
Jan 27 06:30:03 linux knut: Sleeping 2 seconds
Jan 27 06:30:05 linux knut: killall tcpdump
Jan 27 06:30:05 linux knut: End of test

[-- Attachment #3: tcpdumpfile --]
[-- Type: text/plain, Size: 3558 bytes --]

06:29:38.899532 PPPoE  [ses 0x385] IP (tos 0x10, ttl  64, id 0, offset 0, flags [DF], length: 58) p54AB7064.dip.t-dialin.net.rdrmshc > www-proxy.F2.srv.t-online.de.domain: [udp sum ok]  22324+ A? www.suse.com. (30)
06:29:38.899812 PPPoE  [ses 0x385] IP (tos 0x10, ttl  64, id 51975, offset 0, flags [DF], length: 73) p54AB7064.dip.t-dialin.net.dab-sti-c > www-proxy.F2.srv.t-online.de.domain: [udp sum ok]  2117+ PTR? 33.150.237.217.in-addr.arpa. (45)
06:29:38.946775 PPPoE  [ses 0x385] IP (tos 0x0, ttl  57, id 16399, offset 0, flags [none], length: 74) www-proxy.F2.srv.t-online.de.domain > p54AB7064.dip.t-dialin.net.rdrmshc: [udp sum ok]  22324 q: A? www.suse.com. 1/0/0 www.suse.com. A turing.suse.de (46)
06:29:38.955734 PPPoE  [ses 0x385] IP (tos 0x0, ttl  57, id 63158, offset 0, flags [none], length: 115) www-proxy.F2.srv.t-online.de.domain > p54AB7064.dip.t-dialin.net.dab-sti-c:  2117 q: PTR? 33.150.237.217.in-addr.arpa. 1/0/0 [|domain]
06:29:38.955816 PPPoE  [ses 0x385] IP (tos 0x10, ttl  64, id 52031, offset 0, flags [DF], length: 73) p54AB7064.dip.t-dialin.net.dab-sti-c > www-proxy.F2.srv.t-online.de.domain: [udp sum ok]  2118+ PTR? 100.112.171.84.in-addr.arpa. (45)
06:29:39.009499 PPPoE  [ses 0x385] IP (tos 0x0, ttl  57, id 59142, offset 0, flags [none], length: 113) www-proxy.F2.srv.t-online.de.domain > p54AB7064.dip.t-dialin.net.dab-sti-c:  2118 q: PTR? 100.112.171.84.in-addr.arpa. 1/0/0 [|domain]
06:29:39.009587 PPPoE  [ses 0x385] IP (tos 0x10, ttl  64, id 52085, offset 0, flags [DF], length: 72) p54AB7064.dip.t-dialin.net.dab-sti-c > www-proxy.F2.srv.t-online.de.domain: [udp sum ok]  2119+ PTR? 3.220.135.195.in-addr.arpa. (44)
06:29:39.055627 PPPoE  [ses 0x385] IP (tos 0x0, ttl  57, id 39957, offset 0, flags [none], length: 100) www-proxy.F2.srv.t-online.de.domain > p54AB7064.dip.t-dialin.net.dab-sti-c:  2119 q: PTR? 3.220.135.195.in-addr.arpa. 1/0/0 3.220.135.195.in-addr.arpa. (72)
06:29:40.953234 PPPoE  [ses 0x385] IP (tos 0x0, ttl  64, id 0, offset 0, flags [DF], length: 84) p54AB7064.dip.t-dialin.net > turing.suse.de: icmp 64: echo request seq 1
06:29:41.022500 PPPoE  [ses 0x385] IP (tos 0x0, ttl  55, id 36207, offset 0, flags [none], length: 84) turing.suse.de > p54AB7064.dip.t-dialin.net: icmp 64: echo reply seq 1
06:29:41.952973 PPPoE  [ses 0x385] IP (tos 0x0, ttl  64, id 1, offset 0, flags [DF], length: 84) p54AB7064.dip.t-dialin.net > turing.suse.de: icmp 64: echo request seq 2
06:29:42.019352 PPPoE  [ses 0x385] IP (tos 0x0, ttl  55, id 36398, offset 0, flags [none], length: 84) turing.suse.de > p54AB7064.dip.t-dialin.net: icmp 64: echo reply seq 2
06:29:42.719838 PPPoE  [ses 0x385] LCP, Echo-Request (0x09), id 56, Magic-Num 0x8a5b3542, length 8
	0x0000:  c021 0938 0008 8a5b 3542
06:29:42.761102 PPPoE  [ses 0x385] LCP, Echo-Reply (0x0a), id 56, Magic-Num 0x15c96251, length 8
	0x0000:  c021 0a38 0008 15c9 6251
06:29:46.031631 PPPoE  [ses 0x385] IP (tos 0x10, ttl  64, id 0, offset 0, flags [DF], length: 58) p54AB7064.dip.t-dialin.net.dab-sti-c > www-proxy.F2.srv.t-online.de.domain: [udp sum ok]  35750+ A? www.suse.com. (30)
06:29:46.078624 PPPoE  [ses 0x385] IP (tos 0x0, ttl  57, id 53333, offset 0, flags [none], length: 74) www-proxy.F2.srv.t-online.de.domain > p54AB7064.dip.t-dialin.net.dab-sti-c: [udp sum ok]  35750 q: A? www.suse.com. 1/0/0 www.suse.com. A turing.suse.de (46)
06:29:47.033244 PPPoE  [ses 0x385] IP (tos 0x10, ttl  64, id 0, offset 0, flags [DF], length: 58) p54AB7064.dip.t-dialin.net.imgames > 217.237.151.161.domain: [udp sum ok]  35750+ A? www.suse.com. (30)


[-- Attachment #4: iptablesdump --]
[-- Type: text/plain, Size: 20978 bytes --]

Chain INPUT (policy DROP)
target     prot opt source               destination         
ACCEPT     all  --  anywhere             anywhere            
ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED 
input_ext  all  --  anywhere             anywhere            
input_int  all  --  anywhere             anywhere            
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-IN-ILL-TARGET ' 
DROP       all  --  anywhere             anywhere            

Chain FORWARD (policy DROP)
target     prot opt source               destination         
TCPMSS     tcp  --  anywhere             anywhere            tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU 
TCPMSS     tcp  --  anywhere             anywhere            tcp flags:SYN,RST/SYN TCPMSS clamp to PMTU 
forward_ext  all  --  anywhere             anywhere            
forward_int  all  --  anywhere             anywhere            
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-FWD-ILL-ROUTING ' 
DROP       all  --  anywhere             anywhere            

Chain OUTPUT (policy DROP)
target     prot opt source               destination         
ACCEPT     all  --  anywhere             anywhere            
LOG        icmp --  anywhere             anywhere            limit: avg 3/min burst 5 icmp time-exceeded LOG level warning tcp-options ip-options prefix `SFW2-OUT-TRACERT-ATTEMPT ' 
ACCEPT     icmp --  anywhere             anywhere            icmp time-exceeded 
ACCEPT     icmp --  anywhere             anywhere            icmp port-unreachable 
ACCEPT     icmp --  anywhere             anywhere            icmp fragmentation-needed 
ACCEPT     icmp --  anywhere             anywhere            icmp network-prohibited 
ACCEPT     icmp --  anywhere             anywhere            icmp host-prohibited 
ACCEPT     icmp --  anywhere             anywhere            icmp communication-prohibited 
DROP       icmp --  anywhere             anywhere            icmp destination-unreachable 
ACCEPT     all  --  anywhere             anywhere            state NEW,RELATED,ESTABLISHED 
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-OUT-ERROR ' 

Chain forward_dmz (0 references)
target     prot opt source               destination         
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-FWDdmz-DROP-DEFLT-INV ' 
DROP       all  --  anywhere             anywhere            state INVALID 
ACCEPT     icmp --  anywhere             anywhere            state RELATED icmp destination-unreachable 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp echo-reply 
ACCEPT     all  --  anywhere             anywhere            state NEW,RELATED,ESTABLISHED 
ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED 
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-FWDdmz-DROP-DEFLT ' 
DROP       all  --  anywhere             anywhere            

Chain forward_ext (1 references)
target     prot opt source               destination         
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-FWDext-DROP-DEFLT-INV ' 
DROP       all  --  anywhere             anywhere            state INVALID 
ACCEPT     icmp --  anywhere             anywhere            state RELATED icmp destination-unreachable 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp echo-reply 
ACCEPT     all  --  anywhere             anywhere            state NEW,RELATED,ESTABLISHED 
ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED 
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-FWDext-DROP-DEFLT ' 
DROP       all  --  anywhere             anywhere            

Chain forward_int (1 references)
target     prot opt source               destination         
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-FWDint-DROP-DEFLT-INV ' 
DROP       all  --  anywhere             anywhere            state INVALID 
ACCEPT     icmp --  anywhere             anywhere            state RELATED icmp destination-unreachable 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp echo-reply 
ACCEPT     all  --  anywhere             anywhere            state NEW,RELATED,ESTABLISHED 
ACCEPT     all  --  anywhere             anywhere            state RELATED,ESTABLISHED 
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-FWDint-DROP-DEFLT ' 
DROP       all  --  anywhere             anywhere            

Chain input_dmz (0 references)
target     prot opt source               destination         
LOG        all  --  anywhere             anywhere            PKTTYPE = broadcast limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-DROP-BCASTd ' 
DROP       all  --  anywhere             anywhere            PKTTYPE = broadcast 
ACCEPT     icmp --  anywhere             anywhere            icmp source-quench 
ACCEPT     icmp --  anywhere             anywhere            icmp echo-request 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp echo-reply 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp destination-unreachable 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp time-exceeded 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp parameter-problem 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp timestamp-reply 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp address-mask-reply 
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP-DEFLT-INV ' 
DROP       all  --  anywhere             anywhere            state INVALID 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:ssh flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:sunrpc flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:ipp flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:827 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:827 flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:nfs flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:16273 flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:ssh flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:ssh flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:sunrpc flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:sunrpc flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:ipp flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:ipp flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:827 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:827 flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:827 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:827 flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:nfs flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:nfs flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:16273 flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:16273 flags:SYN,RST,ACK/SYN 
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-INdmz-DROP-DEFLT ' 
DROP       all  --  anywhere             anywhere            

Chain input_ext (1 references)
target     prot opt source               destination         
LOG        all  --  anywhere             anywhere            PKTTYPE = broadcast limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-DROP-BCASTe ' 
DROP       all  --  anywhere             anywhere            PKTTYPE = broadcast 
ACCEPT     icmp --  anywhere             anywhere            icmp source-quench 
ACCEPT     icmp --  anywhere             anywhere            icmp echo-request 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp echo-reply 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp destination-unreachable 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp time-exceeded 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp parameter-problem 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp timestamp-reply 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp address-mask-reply 
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT-INV ' 
DROP       all  --  anywhere             anywhere            state INVALID 
LOG        tcp  --  anywhere             anywhere            tcp dpt:ident state NEW limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-INext-REJECT ' 
reject_func  tcp  --  anywhere             anywhere            tcp dpt:ident state NEW 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:ssh flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:sunrpc flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:ipp flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:827 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:827 flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:nfs flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:16273 flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:ssh flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:ssh flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:ssh flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:sunrpc flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:sunrpc flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:sunrpc flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:ipp flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:ipp flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:ipp flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:827 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:827 flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:827 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:827 flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:nfs flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:nfs flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:nfs flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:16273 flags:SYN,RST,ACK/SYN 
LOG        tcp  --  anywhere             anywhere            limit: avg 3/min burst 5 tcp dpt:16273 flags:SYN,RST,ACK/SYN LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP ' 
DROP       tcp  --  anywhere             anywhere            tcp dpt:16273 flags:SYN,RST,ACK/SYN 
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-INext-DROP-DEFLT ' 
DROP       all  --  anywhere             anywhere            

Chain input_int (1 references)
target     prot opt source               destination         
ACCEPT     all  --  anywhere             anywhere            
ACCEPT     icmp --  anywhere             anywhere            icmp source-quench 
ACCEPT     icmp --  anywhere             anywhere            icmp echo-request 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp echo-reply 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp destination-unreachable 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp time-exceeded 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp parameter-problem 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp timestamp-reply 
ACCEPT     icmp --  anywhere             anywhere            state RELATED,ESTABLISHED icmp address-mask-reply 
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 state INVALID LOG level warning tcp-options ip-options prefix `SFW2-INint-DROP-DEFLT-INV ' 
DROP       all  --  anywhere             anywhere            state INVALID 
LOG        all  --  anywhere             anywhere            limit: avg 3/min burst 5 LOG level warning tcp-options ip-options prefix `SFW2-INint-DROP-DEFLT ' 
DROP       all  --  anywhere             anywhere            

Chain reject_func (1 references)
target     prot opt source               destination         
REJECT     tcp  --  anywhere             anywhere            reject-with tcp-reset 
REJECT     udp  --  anywhere             anywhere            reject-with icmp-port-unreachable 
REJECT     all  --  anywhere             anywhere            reject-with icmp-proto-unreachable 

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19)
  2006-01-27  6:07           ` Knut Petersen
@ 2006-01-27 12:22             ` Herbert Xu
  2006-01-27 15:28               ` Patrick McHardy
                                 ` (2 more replies)
  0 siblings, 3 replies; 13+ messages in thread
From: Herbert Xu @ 2006-01-27 12:22 UTC (permalink / raw)
  To: Knut Petersen; +Cc: shemminger, netdev, linux-kernel, David S. Miller

[-- Attachment #1: Type: text/plain, Size: 1128 bytes --]

On Fri, Jan 27, 2006 at 07:07:34AM +0100, Knut Petersen wrote:
>
> Well, there are no problems if SuSEfirewall2 is disabled. But have a look
> at the loaded modules:
> 
> ipt_MASQUERADE          3968  1
> pppoe                  15360  2
> pppox                   4616  1 pppoe

OK, although we can't rule out sky2/netfilter from the enquiry, I've
identified two bugs in ppp/pppoe that may be responsible for what you
are seeing.  So please try the following patch and let us know if the
problem still exists (or deteriorates/improves).

[PPP]: Fixed hardware RX checksum handling

When we pull the PPP protocol off the skb, we forgot to update the
hardware RX checksum.  This may lead to messages such as

	dsl0: hw csum failure.

Similarly, we need to clear the hardware checksum flag when we use
the existing packet to store the decompressed result.

Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>

Cheers,
-- 
Visit Openswan at http://www.openswan.org/
Email: Herbert Xu ~{PmV>HI~} <herbert@gondor.apana.org.au>
Home Page: http://gondor.apana.org.au/~herbert/
PGP Key: http://gondor.apana.org.au/~herbert/pubkey.txt

[-- Attachment #2: ppp-rxcsum --]
[-- Type: text/plain, Size: 682 bytes --]

diff --git a/drivers/net/ppp_generic.c b/drivers/net/ppp_generic.c
--- a/drivers/net/ppp_generic.c
+++ b/drivers/net/ppp_generic.c
@@ -1610,6 +1610,8 @@ ppp_receive_nonmp_frame(struct ppp *ppp,
 		}
 		else if (!pskb_may_pull(skb, skb->len))
 			goto err;
+		else
+			skb->ip_summed = CHECKSUM_NONE;
 
 		len = slhc_uncompress(ppp->vj, skb->data + 2, skb->len - 2);
 		if (len <= 0) {
@@ -1690,6 +1692,7 @@ ppp_receive_nonmp_frame(struct ppp *ppp,
 			kfree_skb(skb);
 		} else {
 			skb_pull(skb, 2);	/* chop off protocol */
+			skb_postpull_rcsum(skb, skb->data - 2, 2);
 			skb->dev = ppp->dev;
 			skb->protocol = htons(npindex_to_ethertype[npi]);
 			skb->mac.raw = skb->data;

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19)
  2006-01-27 12:22             ` Herbert Xu
@ 2006-01-27 15:28               ` Patrick McHardy
  2006-01-27 16:04               ` Knut Petersen
  2006-02-04 10:32               ` Knut Petersen
  2 siblings, 0 replies; 13+ messages in thread
From: Patrick McHardy @ 2006-01-27 15:28 UTC (permalink / raw)
  To: Herbert Xu, KdF
  Cc: Knut Petersen, shemminger, netdev, linux-kernel, David S. Miller,
	netfilter-devel

[-- Attachment #1: Type: text/plain, Size: 1050 bytes --]

Herbert Xu wrote:
> On Fri, Jan 27, 2006 at 07:07:34AM +0100, Knut Petersen wrote:
> 
>>Well, there are no problems if SuSEfirewall2 is disabled. But have a look
>>at the loaded modules:
>>
>>ipt_MASQUERADE          3968  1
>>pppoe                  15360  2
>>pppox                   4616  1 pppoe
> 
> 
> OK, although we can't rule out sky2/netfilter from the enquiry, I've
> identified two bugs in ppp/pppoe that may be responsible for what you
> are seeing.  So please try the following patch and let us know if the
> problem still exists (or deteriorates/improves).
> 
> [PPP]: Fixed hardware RX checksum handling
> 
> When we pull the PPP protocol off the skb, we forgot to update the
> hardware RX checksum.  This may lead to messages such as
> 
> 	dsl0: hw csum failure.
> 
> Similarly, we need to clear the hardware checksum flag when we use
> the existing packet to store the decompressed result.

We had a couple of reports of incorrect hardware checksums with
PPPoE. KdF, can you test Herbert's patch (attached again to this
mail) please?

[-- Attachment #2: ppp-rxcsum --]
[-- Type: text/plain, Size: 682 bytes --]

diff --git a/drivers/net/ppp_generic.c b/drivers/net/ppp_generic.c
--- a/drivers/net/ppp_generic.c
+++ b/drivers/net/ppp_generic.c
@@ -1610,6 +1610,8 @@ ppp_receive_nonmp_frame(struct ppp *ppp,
 		}
 		else if (!pskb_may_pull(skb, skb->len))
 			goto err;
+		else
+			skb->ip_summed = CHECKSUM_NONE;
 
 		len = slhc_uncompress(ppp->vj, skb->data + 2, skb->len - 2);
 		if (len <= 0) {
@@ -1690,6 +1692,7 @@ ppp_receive_nonmp_frame(struct ppp *ppp,
 			kfree_skb(skb);
 		} else {
 			skb_pull(skb, 2);	/* chop off protocol */
+			skb_postpull_rcsum(skb, skb->data - 2, 2);
 			skb->dev = ppp->dev;
 			skb->protocol = htons(npindex_to_ethertype[npi]);
 			skb->mac.raw = skb->data;

^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19)
  2006-01-27 12:22             ` Herbert Xu
  2006-01-27 15:28               ` Patrick McHardy
@ 2006-01-27 16:04               ` Knut Petersen
  2006-02-04 10:32               ` Knut Petersen
  2 siblings, 0 replies; 13+ messages in thread
From: Knut Petersen @ 2006-01-27 16:04 UTC (permalink / raw)
  To: Herbert Xu; +Cc: shemminger, netdev, linux-kernel, David S. Miller

Herbert Xu wrote:

>When we pull the PPP protocol off the skb, we forgot to update the
>hardware RX checksum.  This may lead to messages such as
>
>	dsl0: hw csum failure.
>
>Similarly, we need to clear the hardware checksum flag when we use
>the existing packet to store the decompressed result.
>
>Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
>

ACK

That patch seems to solve all my problems with 
sky2 / pppoe / SuSE 9.2 Firewall. 

Thanks a lot!

cu,
 Knut


^ permalink raw reply	[flat|nested] 13+ messages in thread

* Re: [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19)
  2006-01-27 12:22             ` Herbert Xu
  2006-01-27 15:28               ` Patrick McHardy
  2006-01-27 16:04               ` Knut Petersen
@ 2006-02-04 10:32               ` Knut Petersen
  2 siblings, 0 replies; 13+ messages in thread
From: Knut Petersen @ 2006-02-04 10:32 UTC (permalink / raw)
  To: Herbert Xu; +Cc: shemminger, netdev, linux-kernel, David S. Miller

2.6.16-rc2 still misses your patch. Was there a special reason not to 
send it
to Linus?

cu,
 Knut

>On Fri, Jan 27, 2006 at 07:07:34AM +0100, Knut Petersen wrote:
>  
>
>>Well, there are no problems if SuSEfirewall2 is disabled. But have a look
>>at the loaded modules:
>>
>>ipt_MASQUERADE          3968  1
>>pppoe                  15360  2
>>pppox                   4616  1 pppoe
>>    
>>
>
>OK, although we can't rule out sky2/netfilter from the enquiry, I've
>identified two bugs in ppp/pppoe that may be responsible for what you
>are seeing.  So please try the following patch and let us know if the
>problem still exists (or deteriorates/improves).
>
>[PPP]: Fixed hardware RX checksum handling
>
>When we pull the PPP protocol off the skb, we forgot to update the
>hardware RX checksum.  This may lead to messages such as
>
>	dsl0: hw csum failure.
>
>Similarly, we need to clear the hardware checksum flag when we use
>the existing packet to store the decompressed result.
>
>Signed-off-by: Herbert Xu <herbert@gondor.apana.org.au>
>
>Cheers,
>  
>
>------------------------------------------------------------------------
>
>diff --git a/drivers/net/ppp_generic.c b/drivers/net/ppp_generic.c
>--- a/drivers/net/ppp_generic.c
>+++ b/drivers/net/ppp_generic.c
>@@ -1610,6 +1610,8 @@ ppp_receive_nonmp_frame(struct ppp *ppp,
> 		}
> 		else if (!pskb_may_pull(skb, skb->len))
> 			goto err;
>+		else
>+			skb->ip_summed = CHECKSUM_NONE;
> 
> 		len = slhc_uncompress(ppp->vj, skb->data + 2, skb->len - 2);
> 		if (len <= 0) {
>@@ -1690,6 +1692,7 @@ ppp_receive_nonmp_frame(struct ppp *ppp,
> 			kfree_skb(skb);
> 		} else {
> 			skb_pull(skb, 2);	/* chop off protocol */
>+			skb_postpull_rcsum(skb, skb->data - 2, 2);
> 			skb->dev = ppp->dev;
> 			skb->protocol = htons(npindex_to_ethertype[npi]);
> 			skb->mac.raw = skb->data;
>  
>


^ permalink raw reply	[flat|nested] 13+ messages in thread

* [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19)
@ 2006-01-21 12:11 Knut Petersen
  0 siblings, 0 replies; 13+ messages in thread
From: Knut Petersen @ 2006-01-21 12:11 UTC (permalink / raw)
  To: shemminger; +Cc: linux-kernel

Hi Stephen!

 >
 > It seems that the SuSE Firewall locked something ....
 >

The decreasing time stamp counters are not a sign of delayed printks
but of broken printk timestamping. That means that you probably see
the correct order of printks, but cpu load is increasing fast at that
point ... see my lkml mail about timer problems.

cu,
Knut


^ permalink raw reply	[flat|nested] 13+ messages in thread

end of thread, other threads:[~2006-02-04 10:33 UTC | newest]

Thread overview: 13+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2006-01-21  5:41 [BUG] sky2 broken for Yukon PCI-E Gigabit Ethernet Controller 11ab:4362 (rev 19) Knut Petersen
2006-01-23 18:15 ` Stephen Hemminger
2006-01-23 19:20   ` Knut Petersen
2006-01-23 19:27     ` Stephen Hemminger
2006-01-24  9:43       ` Knut Petersen
2006-01-24 17:54         ` Stephen Hemminger
2006-01-24 20:32         ` Herbert Xu
2006-01-27  6:07           ` Knut Petersen
2006-01-27 12:22             ` Herbert Xu
2006-01-27 15:28               ` Patrick McHardy
2006-01-27 16:04               ` Knut Petersen
2006-02-04 10:32               ` Knut Petersen
2006-01-21 12:11 Knut Petersen

This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).