lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Message-ID: <Pine.LNX.4.64.0612260757120.10234@p34.internal.lan>
Date:	Tue, 26 Dec 2006 07:57:29 -0500 (EST)
From:	Justin Piszcz <jpiszcz@...idpixels.com>
To:	Robert Hancock <hancockr@...w.ca>
cc:	linux-kernel@...r.kernel.org
Subject: Re: Kernel 2.6.17.13: eth2: TX underrun, threshold adjusted.



On Mon, 25 Dec 2006, Robert Hancock wrote:

> Justin Piszcz wrote:
> > I am using a dual port Intel NIC on an A-Bit IC7-G; any reason why I get
> > these?
> > 
> > [4298634.444000] eth2: TX underrun, threshold adjusted.
> > [4299146.645000] eth2: TX underrun, threshold adjusted.
> 
> ...
> 
> > I am using the e100 driver, MAC addr commented out with **.
> > 
> > [4294675.208000] eth2: 0000:04:04.0, 00:**:**:**:**:**, IRQ 18.
> > [4294675.209000]   Receiver lock-up bug exists -- enabling work-around.
> > [4294675.209000]   Board assembly 711269-003, Physical connectors present:
> > RJ45
> 
> I don't think you are using e100, these messages seem to be from eepro100, not
> e100. Try disabling eepro100 and see if e100 works.
> 
> -- 
> Robert Hancock      Saskatoon, SK, Canada
> To email, remove "nospam" from hancockr@...pamshaw.ca
> Home Page: http://www.roberthancock.com/
> 

Oops-- thanks, e100 has not produced the error yet.

Justin.
-
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ