[Bug 60764] Re: Large file transfer gives error: Corrupted MAC on input
I can confirm this "Corrupted MAC on input" bug on i386 desktop version of Ubuntu 9.10 karmic. Silent file corruption also happens when downloading files using HTTP or FTP protocols. This bug is easily reproducible. The computer on which this bug manifests itself is an Asus Eee PC 1000HE with 2 GB of RAM and an Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller (1969:1026). I tried upgrading the 1000HE AMI BIOS from version 0607 to 1002, but that didn't help. - $ uname -a Linux eeepc 2.6.31-15-generic #50-Ubuntu SMP Tue Nov 10 14:54:29 UTC 2009 i686 GNU/Linux - $ sudo lspci -vvvn 03:00.0 0200: 1969:1026 (rev b0) Subsystem: 1043:8324 Control: I/O+ Mem+ BusMaster+ SpecCycle- MemWINV- VGASnoop- ParErr- Stepping- SERR- FastB2B- DisINTx+ Status: Cap+ 66MHz- UDF- FastB2B- ParErr- DEVSEL=fast >TAbort- SERR- Capabilities: [100] Advanced Error Reporting Capabilities: [180] Device Serial Number Kernel driver in use: ATL1E Kernel modules: atl1e - $ sudo ethtool -i eth0 driver: ATL1E version: 1.0.0.7-NAPI firmware-version: L1e bus-info: :03:00.0 - $ sudo ethtool eth0 Settings for eth0: Supported ports: [ TP ] Supported link modes: 10baseT/Half 10baseT/Full 100baseT/Half 100baseT/Full Supports auto-negotiation: Yes Advertised link modes: 10baseT/Half 10baseT/Full 100baseT/Half 100baseT/Full Advertised auto-negotiation: Yes Speed: 100Mb/s Duplex: Full Port: Twisted Pair PHYAD: 0 Transceiver: internal Auto-negotiation: on Supports Wake-on: pg Wake-on: d Current message level: 0x (0) Link detected: yes - $ sudo ethtool -k eth0 Cannot get device rx csum settings: Operation not supported Cannot get device flags: Operation not supported Offload parameters for eth0: rx-checksumming: off tx-checksumming: on scatter-gather: on tcp-segmentation-offload: on udp-fragmentation-offload: off generic-segmentation-offload: on generic-receive-offload: off large-receive-offload: off I have tried the workarounds mentioned in this thread and elsewhere, but none of them works. - $ sudo ethtool -K eth0 rx off Cannot set device rx csum settings: Operation not supported - $ sudo ethtool -K eth0 tx off Cannot set device tx csum settings: Operation not supported - $ sudo ethtool -K eth0 tso off Cannot set device tcp segmentation offload settings: Operation not supported After running above 3 commands "sudo ethtool -k eth0" still prints exactly the same values as listed above. How can I disable these offload settings for good? To reproduce the bug repeat the following steps 1-3. 1. Suspend the computer (Fn+F1 on Asus Eee PC 1000HE) 2. Wake up from Suspend (Press any key) 3. $ scp u...@remoteserver:~/ubuntu-9.10-server-amd64.iso . ubuntu-9.10-server-amd64.iso0%0 0.0KB/s --:-- ETA Disconnecting: Corrupted MAC on input. lost connection It seems that after this initial "Corrupted MAC on input" error the bug takes a longer time to emerge again, but it always shows up right after waking up from suspend and downloading something with scp. The bug is _not_ openssh or scp related. Silent file corruption happens when downloading files using HTTP or FTP protocols. Let me know if you need any more information and I will provide it. This is a major problem and concerns many people. -- Large file transfer gives error: Corrupted MAC on input https://bugs.launchpad.net/bugs/60764 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 60764] Re: Large file transfer gives error: Corrupted MAC on input
Peter P.: If you download Linux kernel source from www.kernel.org and then check the md5sum of the downloaded file, do you get different results on the computers? If not, suspend, resume, download and check md5sum again to see if that changes anything. -- Large file transfer gives error: Corrupted MAC on input https://bugs.launchpad.net/bugs/60764 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 432814] Re: Action for middle and right click is reversed since jaunty
I wrote a small program that can be used to work-around the gnome- settings-daemon TapButton2/TapButton3 switching problem. It may be useful if you don't want to manually compile gnome-settings-daemon every time it is updated. If you switch between VTs or insert and remove other pointing devices it will reset TapButton settings back to what you want. It uses "xinput watch-props" to monitor changes to xinput properties. Whenever a certain property is changed the program resets this property back to the one configured in the properties array. You may want to edit this part of the code before compiling. To compile: $ gcc -o xinputd xinputd.c To install: $ sudo install -p -m 0755 xinputd /usr/local/bin/ To automatically start the program when logging in add "xinputd" to "System" -> "Preferences" -> "Startup Applications". ** Attachment added: "xinputd.c" http://launchpadlibrarian.net/36476056/xinputd.c -- Action for middle and right click is reversed since jaunty https://bugs.launchpad.net/bugs/432814 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 18605] Re: Touchpad doesn't tap-to-click anymore after suspend
I wrote a small program that can be used to work-around the gnome- settings-daemon TapButton2/TapButton3 switching problem. It may be useful if you don't want to manually compile gnome-settings-daemon every time it is updated. If you switch between VTs, suspend and resume or insert and remove other pointing devices it will reset TapButton settings back to what you want. It uses "xinput watch-props" to monitor changes to xinput properties. Whenever a certain property is changed the program resets this property back to the one configured in the properties array. You may want to edit this part of the code before compiling. To compile: $ gcc -o xinputd xinputd.c To install: $ sudo install -p -m 0755 xinputd /usr/local/bin/ To automatically start the program when logging in add "xinputd" to "System" -> "Preferences" -> "Startup Applications". ** Attachment added: "xinputd.c" http://launchpadlibrarian.net/36479768/xinputd.c -- Touchpad doesn't tap-to-click anymore after suspend https://bugs.launchpad.net/bugs/18605 You received this bug notification because you are a member of Ubuntu Bugs, which is a direct subscriber. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 60764] Re: Large file transfer gives error: Corrupted MAC on input
Ignore my comment #62. The bug is more difficult to reproduce when downloading random files from the Internet, but it does occur every once in a while. This difficulty may have something to do with the speed or bandwidth of the download, ie. the probability of the bug showing up is less likely with low download speeds. @Peter P. Could you try this instead: On machine 1: $ nc -l -p 8080 -q 10 -v -v < ubuntu-9.10-server-amd64.iso On machine 2: $ nc 8080 > ubuntu-9.10-server-amd64.iso And then compare the md5sums. Try also reversing the test. -- Large file transfer gives error: Corrupted MAC on input https://bugs.launchpad.net/bugs/60764 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 60764] Re: Large file transfer gives error: Corrupted MAC on input
Unfortunately the workaround does not work on Asus Eee PC 1000HE with an Atheros AR8121/AR8113/AR8114 PCI-E Ethernet Controller (1969:1026) and atl1e driver. -- Large file transfer gives error: Corrupted MAC on input https://bugs.launchpad.net/bugs/60764 You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs