lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <20120927222147.GA29047@electric-eye.fr.zoreil.com>
Date:	Fri, 28 Sep 2012 00:21:47 +0200
From:	Francois Romieu <romieu@...zoreil.com>
To:	Nolwenn <donolwenn@...il.com>
Cc:	hayeswang <hayeswang@...ltek.com>, netdev@...r.kernel.org
Subject: Re: Possible bug with r8169 driver

Nolwenn <donolwenn@...il.com> :
[...]
> I'm on Archlinux (kernel 3.5.4), I need to set eth0 to promiscuous to get a 
> stable IPv6 connectivity. My internet access provider is Free (France) and 
> IPv6 is enable on the box. 
> If eth0 is not set to promiscuous, I need to intercep packets with 
> "tcpdump -nvvv ip6" to get an IPv6 connectivity and it's lost, a few later, 
> when interception is stopped. 

Can you send an 'ip -s link' before any ipv6 traffic flows, then
after ?

> % dmesg | grep r8169 
> 
> [    1.810423] r8169 Gigabit Ethernet driver 2.3LK-NAPI loaded
> [    1.810548] r8169 0000:03:00.0: irq 44 for MSI/MSI-X
> [    1.810671] r8169 0000:03:00.0: eth0: RTL8168f/8111f at 0xffffc900057ae000, 30:85:a9:ee:43:fa, XID 08000800 IRQ 44
> [    1.810672] r8169 0000:03:00.0: eth0: jumbo features [frames: 9200 bytes, tx checksumming: ko]

Hayes, is there by any luck something different for the 8168f regarding
the layout of the multicast filtering registers ?

Thanks.

-- 
Ueimor
--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ