Compilation rtl8139c

Voilà les résultats :

=> tcpdump -nei eth2 tcpdump: verbose output suppressed, use -v or -vv for full protocol decode listening on eth2, link-type EN10MB (Ethernet), capture size 96 bytes 18:37:17.957979 00:0e:2e:bc:78:9e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.1.1 tell 192.168.1.57 18:37:18.957946 00:0e:2e:bc:78:9e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.1.1 tell 192.168.1.57 18:37:19.957948 00:0e:2e:bc:78:9e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.1.1 tell 192.168.1.57 18:37:21.713434 00:1c:f0:da:b6:3f > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 342: 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:1c:f0:da:b6:3f, length 300 18:37:22.961948 00:0e:2e:bc:78:9e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.1.1 tell 192.168.1.57 18:37:23.961949 00:0e:2e:bc:78:9e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.1.1 tell 192.168.1.57 18:37:24.961950 00:0e:2e:bc:78:9e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.1.1 tell 192.168.1.57 18:37:27.965807 00:0e:2e:bc:78:9e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.1.1 tell 192.168.1.57 18:37:28.965950 00:0e:2e:bc:78:9e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.1.1 tell 192.168.1.57 18:37:29.965950 00:0e:2e:bc:78:9e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.1.1 tell 192.168.1.57 18:37:31.595014 00:1c:f0:da:b6:3f > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 342: 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:1c:f0:da:b6:3f, length 300 18:37:32.969950 00:0e:2e:bc:78:9e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.1.1 tell 192.168.1.57 18:37:33.969948 00:0e:2e:bc:78:9e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.1.1 tell 192.168.1.57 18:37:34.969951 00:0e:2e:bc:78:9e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.1.1 tell 192.168.1.57 18:37:37.985811 00:0e:2e:bc:78:9e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.1.1 tell 192.168.1.57 18:37:38.985951 00:0e:2e:bc:78:9e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.1.1 tell 192.168.1.57 18:37:39.985949 00:0e:2e:bc:78:9e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.1.1 tell 192.168.1.57 18:37:40.993997 00:0e:2e:bc:78:9e > 33:33:00:00:00:fb, ethertype IPv6 (0x86dd), length 102: fe80::20e:2eff:febc:789e.5353 > ff02::fb.5353: 0[|domain] 18:37:40.994059 00:0e:2e:bc:78:9e > 01:00:5e:00:00:fb, ethertype IPv4 (0x0800), length 82: 192.168.1.57.5353 > 224.0.0.251.5353: 0 PTR (QM)? _pgpkey-hkp._tcp.local. (40) 18:37:41.480014 00:1c:f0:da:b6:3f > ff:ff:ff:ff:ff:ff, ethertype IPv4 (0x0800), length 342: 0.0.0.0.68 > 255.255.255.255.67: BOOTP/DHCP, Request from 00:1c:f0:da:b6:3f, length 300 18:37:42.989947 00:0e:2e:bc:78:9e > ff:ff:ff:ff:ff:ff, ethertype ARP (0x0806), length 42: arp who-has 192.168.1.1 tell 192.168.1.57 ^C 21 packets captured 21 packets received by filter 0 packets dropped by kernel

=> route -n Table de routage IP du noyau Destination Passerelle Genmask Indic Metric Ref Use Iface 192.168.1.0 0.0.0.0 255.255.255.0 U 0 0 0 eth2 0.0.0.0 192.168.1.1 0.0.0.0 UG 0 0 0 eth2

=> ping 192.168.1.1 PING 192.168.1.1 (192.168.1.1) 56(84) bytes of data. From 192.168.1.57 icmp_seq=1 Destination Host Unreachable From 192.168.1.57 icmp_seq=5 Destination Host Unreachable ^C --- 192.168.1.1 ping statistics --- 8 packets transmitted, 0 received, +2 errors, 100% packet loss, time 7008ms

=> ping orange.fr ping: unknown host orange.fr

[code]=> iptables -L
Chain INPUT (policy ACCEPT)
target prot opt source destination

Chain FORWARD (policy ACCEPT)
target prot opt source destination

Chain OUTPUT (policy ACCEPT)
target prot opt source destination [/code]

La table de routage est correcte, les chaînes de filtrage iptables sont vides.
Le message d’erreur de ping est cohérent avec le trafic capturé. On voit des requêtes ARP émises par l’interface, mais pas de réponse. A part ça, quelques paquets multicast DNS (UDP 5353) en IPv4 et IPv6, sans intérêt. Et surtout l’interface reçoit des requêtes DHCP émises par une machine dont l’adresse MAC est 00:1c:f0:da:b6:3f, ce qui indique que la réception fonctionne. Si l’adresse de la passerelle est bien 192.168.1.1, il pourrait y avoir un problème en émission. Il serait intéressant de faire une capture de trafic sur une autre machine du réseau local pour voir si elle reçoit bien les requêtes ARP. Et éventuellement un essai de ping entre les deux machines, avec capture des deux côtés.

J’ai enfin réussi à faire tourner mon interface usb/lan, en utilisant “ndiswrapper”. Petit pb quand même, si je “déplugue” l’interface et que je la “replugue” çà merde grave.
Ce n’est donc pas satisfaisant.
Voilà ce que j’obtiens comme message:

[quote]Message from syslogd@mario-laptop at Aug 24 11:46:49 …
kernel:[49122.240172] unregister_netdevice: waiting for wlan1 to become free. Usage count = 3
[/quote]
Quelqu’un a t-il une idée???