Date: Sun, 8 Feb 2009 20:16:56 +1100 From: Peter Jeremy <peter@vk2pj.dyndns.org> To: Danny Braniss <danny@cs.huji.ac.il> Cc: hackers@freebsd.org, freebsd-stable@freebsd.org Subject: Re: impossible packet length ... Message-ID: <20090208091656.GA31876@test71.vk2pj.dyndns.org> In-Reply-To: <E1LW5Ht-0000VH-D8@kabab.cs.huji.ac.il> References: <E1LW5Ht-0000VH-D8@kabab.cs.huji.ac.il>
next in thread | previous in thread | raw e-mail | index | archive | help
--jI8keyz6grp/JLjh Content-Type: text/plain; charset=us-ascii Content-Disposition: inline Content-Transfer-Encoding: quoted-printable On 2009-Feb-08 10:45:13 +0200, Danny Braniss <danny@cs.huji.ac.il> wrote: >Feb 6 18:00:13 warhol-00.cs.huji.ac.il kernel: bce0: discard frame w/o=20 >leading ethernet header (len 0 pkt len 0) =2E.. >Feb 6 19:00:00 warhol-00.cs.huji.ac.il amd[715]: Unknown $ sequence in=20 >"rhost:=3D${RHOST};type:=3Dnfsl;fs:=3D${FS};rfs:=3D$huldig<C0>#^ZM-^KoM- a= base" >Feb 6 19:00:00 warhol-00.cs.huji.ac.il kernel: impossible packet length= =20 >(2068989523) from nfs server sunfire:/dist > >which seems to point fingers at bce... It does rather suggest that bce is not behaving. What happens if you turn off checksum off-loading? This should make the kernel drop the corrupt packets instead of trying to process them. If practical, you could also try (temporarily) plugging in a different NIC. --=20 Peter Jeremy --jI8keyz6grp/JLjh Content-Type: application/pgp-signature Content-Disposition: inline -----BEGIN PGP SIGNATURE----- Version: GnuPG v2.0.10 (FreeBSD) iEYEARECAAYFAkmOowgACgkQ/opHv/APuIezPgCZAfCn11OW1g/XoLQ7O0NXfWNe Re4AoIij1aRiYCYM+YTXlg01ZPtDrUVa =Qm+c -----END PGP SIGNATURE----- --jI8keyz6grp/JLjh--
Want to link to this message? Use this URL: <https://mail-archive.FreeBSD.org/cgi/mid.cgi?20090208091656.GA31876>