lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Message-ID: <20061017164308.10124.qmail@web57808.mail.re3.yahoo.com>
Date:	Tue, 17 Oct 2006 09:43:08 -0700 (PDT)
From:	John Philips <johnphilips42@...oo.com>
To:	Eric Dumazet <dada1@...mosbay.com>
Cc:	linux-kernel@...r.kernel.org, linux-net@...r.kernel.org
Subject: Re: BUG: warning at kernel/softirq.c:141/local_bh_enable()

>OK, could you please send now :
>
>ifconfig eth6
>cat /proc/interrupts

Eric,

Here you go:

ifconfig eth6:
eth6      Link encap:Ethernet  HWaddr XX:XX:XX:XX:XX:XX
          inet addr:X.X.X.X  Bcast:X.X.X.X  Mask:X.X.X.X
          UP BROADCAST RUNNING MULTICAST  MTU:1500  Metric:1
          RX packets:19015877 errors:0 dropped:880 overruns:82 frame:0
          TX packets:18771972 errors:1970 dropped:17259 overruns:25 carrier:25
          collisions:0 txqueuelen:1000
          RX bytes:2956503786 (2.7 GiB)  TX bytes:2149556909 (2.0 GiB)
          Interrupt:12 Base address:0x8000


cat /proc/interrupts:
           CPU0
  0:   71570907          XT-PIC  timer
  2:          0          XT-PIC  cascade
  4:        465          XT-PIC  serial
  8:          4          XT-PIC  rtc
 10:   17076423          XT-PIC  eth1
 11:    3602236          XT-PIC  eth2
 12:   52112382          XT-PIC  eth0, eth6
 14:     955580          XT-PIC  ide0
NMI:          0
LOC:          0
ERR:          0





-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ