|
Bugzilla – Full Text Bug Listing |
| Summary: | tcpdump cannot deal with TSO packets | ||
|---|---|---|---|
| Product: | [openSUSE] SUSE LINUX 10.0 | Reporter: | Olaf Kirch <okir> |
| Component: | Network | Assignee: | Petr Ostadal <postadal> |
| Status: | RESOLVED WONTFIX | QA Contact: | E-mail List <qa-bugs> |
| Severity: | Normal | ||
| Priority: | P5 - None | CC: | postadal |
| Version: | Beta 3 | ||
| Target Milestone: | --- | ||
| Hardware: | Other | ||
| OS: | All | ||
| Whiteboard: | |||
| Found By: | Other | Services Priority: | |
| Business Priority: | Blocker: | --- | |
| Marketing QA Status: | --- | IT Deployment: | --- |
| Attachments: | Proposed patch | ||
|
Description
Olaf Kirch
2005-08-30 16:05:50 UTC
I have added the GUESS_TSO, where to test it (and make sure the TSO is used)? You can try any of the tcp dumps in bug 105539, for instance http://rudin.suse.de:8888/attachment.cgi?id=47765 They have lots of those packets. Displaying this with tcpdump -nr should show a lot of those: IP bad-len 0 Thanks, Olaf the GUESS_TSO works epsilon:/# tcpdump -nr x.log | grep bad reading from file x.log, link-type EN10MB (Ethernet) epsilon:/# I can't find the hack for ethereal, where did you hear about it? For tcpdump it is fixed and for SL10 I think is too late, I decrease severity to normal. Created attachment 49027 [details]
Proposed patch
Something like the above patch should help. Beware, this is untested. Proposed patch doesn't work in ethereal, I will investigate it later. Petr, what's the status of this? I didn't catch this, I will investigate it in the next distro. mass reopening all SuSE Linux bugs that are set to REMIND+LATER to change the resolution to WONTFIX (adapting to new policy) mass reopening all SuSE Linux bugs that are set to REMIND+LATER to change the resolution to WONTFIX (adapting to new policy) mass reopening all SuSE Linux bugs that are set to REMIND+LATER to change the resolution to WONTFIX (adapting to new policy) Closing old LATER+REMIND bugs as WONTFIX - if you still plan to work on it, feel free to reopen and set to ASSIGNED. In case the report saw repeated reopen comments, it's due to bugzilla timing out on the huge request ;( |