Hello, I've tested the proposed patch, using ethtool to disable TSO, but I was hit by the same problem again :-( [for record, it was applied on the Squeeze's linux-source-2.6.32 package in its 2.6.32-29 version.
I took time to test it because before that, I've tested another patch found on the Linux kernel's bugzilla : https://bugzilla.kernel.org/show_bug.cgi?id=12282#c18 and it worked well (i tested it about at least ten hibernation/resume cycles with success), I'll attach it to this e-mail for the record. -- Frédéric Boiteux
--- ./drivers/net/atl1e/atl1e_main.c.orig 2010-11-19 13:22:23.000000000 +0100 +++ ./drivers/net/atl1e/atl1e_main.c 2010-11-19 13:23:20.000000000 +0100 @@ -1445,7 +1445,10 @@ memcpy(skb->data, (u8 *)(prrs + 1), packet_size); skb_put(skb, packet_size); skb->protocol = eth_type_trans(skb, netdev); - atl1e_rx_checksum(adapter, skb, prrs); + // Fred : + // Suggestion trouvée dans : + // https://bugzilla.kernel.org/show_bug.cgi?id=12282 + // atl1e_rx_checksum(adapter, skb, prrs); if (unlikely(adapter->vlgrp && (prrs->pkt_flag & RRS_IS_VLAN_TAG))) {