lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [thread-next>] [day] [month] [year] [list]
Date:	Thu, 17 Jan 2008 22:57:44 +0100
From:	Alejandro Riveira Fernández 
	<ariveira@...il.com>
To:	linux-wireless@...r.kernel.org
Cc:	rt2400-devel@...ts.sourceforge.net, linux-kernel@...r.kernel.org,
	IvDoorn@...il.com
Subject: Spammed logs again rt2500pci 2.6.24-rc8

Running

Linux Varda 2.6.24-rc8 #1 SMP PREEMPT Wed Jan 16 15:09:43 CET 2008 x86_64 GNU/Linux

my logs are spmmed with:


[20126.343240] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20126.343242] Please file bug report to http://rt2x00.serialmonkey.com.
[20126.848277] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20126.848280] Please file bug report to http://rt2x00.serialmonkey.com.
[20126.851693] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20126.851696] Please file bug report to http://rt2x00.serialmonkey.com.
[20126.851854] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20126.851856] Please file bug report to http://rt2x00.serialmonkey.com.
[20126.852082] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20126.852084] Please file bug report to http://rt2x00.serialmonkey.com.
[20126.852224] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20126.852226] Please file bug report to http://rt2x00.serialmonkey.com.
[20127.349691] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20127.349694] Please file bug report to http://rt2x00.serialmonkey.com.
[20127.352425] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20127.352428] Please file bug report to http://rt2x00.serialmonkey.com.
[20127.853345] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20127.853348] Please file bug report to http://rt2x00.serialmonkey.com.
[20127.853699] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20127.853701] Please file bug report to http://rt2x00.serialmonkey.com.
[20128.858569] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20128.858572] Please file bug report to http://rt2x00.serialmonkey.com.
[20131.875550] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20131.875554] Please file bug report to http://rt2x00.serialmonkey.com.
[20154.693853] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20154.693856] Please file bug report to http://rt2x00.serialmonkey.com.
[20185.527974] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20185.527977] Please file bug report to http://rt2x00.serialmonkey.com.
[20189.812334] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20189.812337] Please file bug report to http://rt2x00.serialmonkey.com.
[20189.812374] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20189.812376] Please file bug report to http://rt2x00.serialmonkey.com.
[20189.812507] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20189.812509] Please file bug report to http://rt2x00.serialmonkey.com.
[20189.813100] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20189.813102] Please file bug report to http://rt2x00.serialmonkey.com.
[20189.813474] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20189.813476] Please file bug report to http://rt2x00.serialmonkey.com.
[20189.813909] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20189.813911] Please file bug report to http://rt2x00.serialmonkey.com.
[20212.242858] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20212.242861] Please file bug report to http://rt2x00.serialmonkey.com.
[20212.243587] phy0 -> rt2x00pci_write_tx_data: Error - Arrived at non-free entry in the non-full queue 1.
[20212.243589] Please file bug report to http://rt2x00.serialmonkey.com.


As the last time the thing is triggered with a p2p app making a lot of connections (this time not bt but mldonkey)
Back to top 	
View user's profile Send private message 	
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ