Bug 103954

Summary: atmel driver receives packets, but can't send any packets not even arp packets
Product: [openSUSE] SUSE LINUX 10.0 Reporter: Dieter Bloms <dieter>
Component: NetworkAssignee: Joachim Gleissner <joachim.gleissner>
Status: RESOLVED INVALID QA Contact: E-mail List <qa-bugs>
Severity: Normal    
Priority: P5 - None    
Version: Beta 1   
Target Milestone: ---   
Hardware: i586   
OS: All   
Whiteboard:
Found By: Other Services Priority:
Business Priority: Blocker: ---
Marketing QA Status: --- IT Deployment: ---
Attachments: output of dmesg
output of hwinfo --all
yast2 logfiles; maybe it is inetressting for you

Description Dieter Bloms 2005-08-10 19:52:45 UTC
Hi,

I've set up my notebook with wlan on SuSE 9.3 and this wlan card works, because
if I boot the SuSE 9.3 on gateway with wlan, I have a connection.
When I start the SuSE 10.0 beta1, I can see the incoming ip packets on the
gateway with tcpdump, but I can't see any outgoing packet not even an arp packet.

here some data for better understanding:

Notebook:
SuSE9.3; IP 192.168.254.3/24

gateway:
SuSE 10.0 beta1; IP 192.168.254.1/24

when I ping from my notebook to the normal pc, I see the following tcpdump:
--snip--
gateway:~ # tcpdump -n -i wlan0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on wlan0, link-type EN10MB (Ethernet), capture size 96 bytes
21:47:46.066313 arp who-has 192.168.254.1 tell 192.168.254.3
21:47:47.066152 arp who-has 192.168.254.1 tell 192.168.254.3
21:47:48.065989 arp who-has 192.168.254.1 tell 192.168.254.3
--snip--

then I added the MAC adresse manual to the arp table, because I thought there
may be some arp filters for security reason.
There are no icmp replay packets
--snip--
gateway:~ # tcpdump -n -i wlan0
tcpdump: verbose output suppressed, use -v or -vv for full protocol decode
listening on wlan0, link-type EN10MB (Ethernet), capture size 96 bytes
21:43:53.677080 IP 192.168.254.3 > 192.168.254.1: ICMP echo request, id 3104,
seq 1, length 64
21:43:54.676743 IP 192.168.254.3 > 192.168.254.1: ICMP echo request, id 3104,
seq 2, length 64
21:43:55.676583 IP 192.168.254.3 > 192.168.254.1: ICMP echo request, id 3104,
seq 3, length 64
21:43:56.676418 IP 192.168.254.3 > 192.168.254.1: ICMP echo request, id 3104,
seq 4, length 64
--snip--

There is no netfilter aktivated:

--snip--
gateway:~ # iptables -L
Chain INPUT (policy ACCEPT)
target     prot opt source               destination

Chain FORWARD (policy ACCEPT)
target     prot opt source               destination

Chain OUTPUT (policy ACCEPT)
target     prot opt source               destination
--snip--

I have tried it with the firmware from SuSE 9.3 (atmel-firmware-1.1) and with
the actual ones atmel-firmware-1.3

I will add the yast2 logs, hwinfo and dmesg, maybe it helps you.

I don't know what I can do anymore
Comment 1 Dieter Bloms 2005-08-10 19:55:32 UTC
Created attachment 45604 [details]
output of dmesg
Comment 2 Dieter Bloms 2005-08-10 19:56:02 UTC
Created attachment 45605 [details]
output of hwinfo --all
Comment 3 Dieter Bloms 2005-08-10 19:56:41 UTC
Created attachment 45606 [details]
yast2 logfiles; maybe it is inetressting for you
Comment 4 Joachim Gleissner 2005-08-25 09:24:54 UTC
Do you get an association at all? I'm currently trying to reproduce this with  
a Netgear MA101 device (Ateml AT76C503), but I don't even get so far. 
Comment 5 Stefan Behlert 2005-11-24 10:56:45 UTC
Anything new here?  No action here since three month.
Comment 6 Dieter Bloms 2005-12-01 14:37:45 UTC
It doesn't work with AdHoc mode. Now I have a avm fritzbox and use the managed option. This works.
But till 9.3 the Adhoc mode worked good, too.