Public bug reported: Binary package hint: bridge-utils
I'm running "Ubuntu 8.04.1" (Italian Locale) with all updates up to 24/9/2008 I suspect the bug to be in: bridge-utils: Installato: 1.2-2 Candidato: 1.2-2 Tabella versione: *** 1.2-2 0 500 http://it.archive.ubuntu.com hardy/main Packages 100 /var/lib/dpkg/status ... but it might be also filed in "kernel": please advise. I defined a series of tapX and brY devices for use with VirtualBox (I installed the closed-source version, but that is beyond the point). This is my /etc/network/interfaces: ================================== auto lo iface lo inet loopback #-------------------------- # permanent host interfaces #-------------------------- # LAN ------------------------------- auto eth0 tap0 br0 iface eth0 inet manual iface tap0 inet manual up ifconfig $IFACE 0.0.0.0 up down ifconfig $IFACE down tunctl_user mauro iface br0 inet static address 192.168.0.5 netmask 255.255.255.0 #gateway 192.168.0.254 bridge_ports eth0 tap0 bridge_maxwait 0 #----------------------------------- # WAN ------------------------------ auto eth2 tap2 tap4 br2 # physical interface to Ydea net iface eth2 inet static address 192.168.120.5 netmask 255.255.255.0 iface tap2 inet manual up ifconfig $IFACE 0.0.0.0 up down ifconfig $IFACE down tunctl_user mauro iface tap4 inet manual up /root/Ydea/tap-up.sh down /root/Ydea/tap-down.sh tunctl_user mauro iface br2 inet manual # address 192.168.120.5 # netmask 255.255.255.0 bridge_ports tap4 tap2 bridge_maxwait 0 #----------------------------------- # DMZ ------------------------------ auto tap1 tap3 br1 iface tap1 inet manual up ifconfig $IFACE 0.0.0.0 up down ifconfig $IFACE down tunctl_user mauro iface tap3 inet manual up ifconfig $IFACE 0.0.0.0 up down ifconfig $IFACE down tunctl_user mauro iface br1 inet static address 192.168.77.5 netmask 255.255.255.0 bridge_ports tap1 tap3 bridge_maxwait 0 #----------------------------------- ================================== While bringing up the interfaces I see the following messages: ================================== ... Sep 25 08:51:28 heimdall kernel: [ 47.261241] ip_tables: (C) 2000-2006 Netfilter Core Team Sep 25 08:51:28 heimdall kernel: [ 47.401043] tun: Universal TUN/TAP device driver, 1.6 Sep 25 08:51:28 heimdall kernel: [ 47.401049] tun: (C) 1999-2004 Max Krasnyansky <[EMAIL PROTECTED]> Sep 25 08:51:28 heimdall kernel: [ 47.565493] Bridge firewalling registered Sep 25 08:51:28 heimdall kernel: [ 47.565709] br0: Dropping NETIF_F_UFO since no NETIF_F_HW_CSUM feature. Sep 25 08:51:28 heimdall kernel: [ 47.570157] device eth0 entered promiscuous mode Sep 25 08:51:28 heimdall kernel: [ 47.570168] audit(1222325483.656:2): dev=eth0 prom=256 old_prom=0 auid=4294967295 Sep 25 08:51:28 heimdall kernel: [ 47.573490] device tap0 entered promiscuous mode Sep 25 08:51:28 heimdall kernel: [ 47.573499] audit(1222325483.660:3): dev=tap0 prom=256 old_prom=0 auid=4294967295 Sep 25 08:51:28 heimdall kernel: [ 47.575940] br0: port 2(tap0) entering learning state Sep 25 08:51:28 heimdall kernel: [ 47.575945] br0: port 1(eth0) entering learning state Sep 25 08:51:28 heimdall kernel: [ 48.855641] br2: Dropping NETIF_F_UFO since no NETIF_F_HW_CSUM feature. Sep 25 08:51:28 heimdall kernel: [ 48.859899] device tap4 entered promiscuous mode Sep 25 08:51:28 heimdall kernel: [ 48.859909] audit(1222325484.948:4): dev=tap4 prom=256 old_prom=0 auid=4294967295 Sep 25 08:51:28 heimdall kernel: [ 48.866610] device tap2 entered promiscuous mode Sep 25 08:51:28 heimdall kernel: [ 48.866620] audit(1222325484.956:5): dev=tap2 prom=256 old_prom=0 auid=4294967295 Sep 25 08:51:28 heimdall kernel: [ 48.869110] br2: port 2(tap2) entering learning state Sep 25 08:51:28 heimdall kernel: [ 48.869115] br2: port 1(tap4) entering learning state Sep 25 08:51:28 heimdall kernel: [ 49.068262] br1: Dropping NETIF_F_UFO since no NETIF_F_HW_CSUM feature. Sep 25 08:51:28 heimdall kernel: [ 49.072613] device tap1 entered promiscuous mode Sep 25 08:51:28 heimdall kernel: [ 49.072623] audit(1222325485.160:6): dev=tap1 prom=256 old_prom=0 auid=4294967295 Sep 25 08:51:28 heimdall kernel: [ 49.075919] device tap3 entered promiscuous mode Sep 25 08:51:28 heimdall kernel: [ 49.075928] audit(1222325485.164:7): dev=tap3 prom=256 old_prom=0 auid=4294967295 Sep 25 08:51:28 heimdall kernel: [ 49.078420] br1: port 2(tap3) entering learning state Sep 25 08:51:28 heimdall kernel: [ 49.078425] br1: port 1(tap1) entering learning state Sep 25 08:51:28 heimdall kernel: [ 51.566701] No dock devices found. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Found user 'avahi' (UID 106) and group 'avahi' (GID 114). Sep 25 08:51:29 heimdall avahi-daemon[6034]: Successfully dropped root privileges. Sep 25 08:51:29 heimdall avahi-daemon[6034]: avahi-daemon 0.6.22 starting up. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Successfully called chroot(). Sep 25 08:51:29 heimdall avahi-daemon[6034]: Successfully dropped remaining capabilities. Sep 25 08:51:29 heimdall avahi-daemon[6034]: No service file found in /etc/avahi/services. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Joining mDNS multicast group on interface br1.IPv4 with address 192.168.77.5. Sep 25 08:51:29 heimdall avahi-daemon[6034]: New relevant interface br1.IPv4 for mDNS. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Joining mDNS multicast group on interface br0.IPv4 with address 192.168.0.5. Sep 25 08:51:29 heimdall avahi-daemon[6034]: New relevant interface br0.IPv4 for mDNS. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Joining mDNS multicast group on interface eth2.IPv4 with address 192.168.120.5. Sep 25 08:51:29 heimdall avahi-daemon[6034]: New relevant interface eth2.IPv4 for mDNS. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Network interface enumeration completed. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Registering new address record for fe80::2ff:bcff:fea5:ab41 on br1.*. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Registering new address record for 192.168.77.5 on br1.IPv4. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Registering new address record for fe80::2ff:ceff:feda:680c on tap3.*. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Registering new address record for fe80::2ff:bcff:fea5:ab41 on tap1.*. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Registering new address record for fe80::2ff:9fff:fea8:7c20 on br2.*. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Registering new address record for fe80::2ff:dbff:fe99:ea66 on tap4.*. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Registering new address record for fe80::2ff:9fff:fea8:7c20 on tap2.*. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Registering new address record for fe80::211:11ff:fe0a:23b2 on br0.*. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Registering new address record for 192.168.0.5 on br0.IPv4. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Registering new address record for fe80::2ff:33ff:fe03:5d62 on tap0.*. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Registering new address record for fe80::211:11ff:fe0a:23b2 on eth0.*. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Registering new address record for fe80::20e:2eff:fef6:fd13 on eth2.*. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Registering new address record for 192.168.120.5 on eth2.IPv4. Sep 25 08:51:29 heimdall avahi-daemon[6034]: Registering HINFO record with values 'I686'/'LINUX'. Sep 25 08:51:29 heimdall kernel: [ 53.571650] ppdev: user-space parallel port driver Sep 25 08:51:29 heimdall kernel: [ 53.888963] audit(1222325489.984:8): type=1503 operation="inode_permission" requested_mask="a::" denied_mask="a::" name="/dev/tty" pid=6076 profile="/usr/sbin/cupsd" namespace="default" Sep 25 08:51:30 heimdall kernel: [ 54.173143] eth0: no IPv6 routers present Sep 25 08:51:30 heimdall avahi-daemon[6034]: Server startup complete. Host name is heimdall.local. Local service cookie is 1221156342. Sep 25 08:51:30 heimdall kernel: [ 54.544520] eth2: no IPv6 routers present ... ================================== Everything *seems* to work, but a couple of times I got some weird behavior with lost packets over one of the bridges; one of the occurrences looked like: ================================== [EMAIL PROTECTED]:~$ ping fw PING fw (192.168.0.15) 56(84) bytes of data. 64 bytes from fw (192.168.0.15): icmp_seq=3 ttl=64 time=0.730 ms 64 bytes from fw (192.168.0.15): icmp_seq=4 ttl=64 time=0.381 ms 64 bytes from fw (192.168.0.15): icmp_seq=9 ttl=64 time=0.383 ms 64 bytes from fw (192.168.0.15): icmp_seq=10 ttl=64 time=0.292 ms 64 bytes from fw (192.168.0.15): icmp_seq=11 ttl=64 time=0.459 ms 64 bytes from fw (192.168.0.15): icmp_seq=12 ttl=64 time=0.408 ms 64 bytes from fw (192.168.0.15): icmp_seq=16 ttl=64 time=0.903 ms 64 bytes from fw (192.168.0.15): icmp_seq=17 ttl=64 time=0.394 ms 64 bytes from fw (192.168.0.15): icmp_seq=19 ttl=64 time=0.383 ms --- fw ping statistics --- 21 packets transmitted, 9 received, 57% packet loss, time 20003ms rtt min/avg/max/mdev = 0.292/0.481/0.903/0.189 ms [EMAIL PROTECTED]:~$ traceroute fw traceroute to fw (192.168.0.15), 30 hops max, 40 byte packets 1 fw (192.168.0.15) 1.980 ms 1.872 ms 1.778 ms [EMAIL PROTECTED]:~$ ping fw PING fw (192.168.0.15) 56(84) bytes of data. 64 bytes from fw (192.168.0.15): icmp_seq=3 ttl=64 time=0.313 ms 64 bytes from fw (192.168.0.15): icmp_seq=18 ttl=64 time=0.394 ms 64 bytes from fw (192.168.0.15): icmp_seq=19 ttl=64 time=0.366 ms 64 bytes from fw (192.168.0.15): icmp_seq=20 ttl=64 time=0.393 ms 64 bytes from fw (192.168.0.15): icmp_seq=21 ttl=64 time=0.309 ms 64 bytes from fw (192.168.0.15): icmp_seq=31 ttl=64 time=0.380 ms 64 bytes from fw (192.168.0.15): icmp_seq=62 ttl=64 time=0.562 ms 64 bytes from fw (192.168.0.15): icmp_seq=63 ttl=64 time=0.369 ms --- fw ping statistics --- 64 packets transmitted, 8 received, 87% packet loss, time 63084ms rtt min/avg/max/mdev = 0.309/0.385/0.562/0.077 ms [EMAIL PROTECTED]:~$ ================================== This pings are actually between two sides of br0: from the ubuntu host (heimdall) to the virtual machine (fw) on the other side of br0. How can I lose packets there?? Notice that br0 was still working somehow, I know because I had an open ssh connection to fw and that was working flawlessly; in that condition I was *not* able to initiate a second (new) ssh connection; apparently existing connections were ok but new ones had problems. Does this make any sense? Shutting down the virtual client and networking and restarting them cures the problem (but I see the warnings again). I found the following browsing the Internet. It could be relevant. ================================== "This means that for some reason the UFO flag has been enabled on the bridge device without also enabling TX checksum offload. This is an illegal configuration which is why the kernel warns about it. As to why the UFO flag is set at all more investigation is needed on the actual machine. However, this is harmless as UFO isn't supported by Xen anyway." ================================== It seems this problem is known, but I didn't find a solution. Thanks Mauro ** Affects: bridge-utils (Ubuntu) Importance: Undecided Status: New -- br0: Dropping NETIF_F_UFO since no NETIF_F_HW_CSUM feature. https://bugs.launchpad.net/bugs/274298 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs