lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <508DDB49.1060400@phi9.com>
Date:	Sun, 28 Oct 2012 18:26:33 -0700
From:	Abbas <akhan@...9.com>
To:	linux-kernel@...r.kernel.org
Subject: iwlwifi crash with queue full and qos errors

Reporting a possible regression with latest kernel 3.6.2-1. Intel's 
iwlwifi crashes intermittently.
Downgraded to 3.5.3.1 including the microcode drivers and didnot notice 
any crashes since.

Chunks from stack trace:

[108759.658475] iwlwifi 0000:03:00.0: fail to flush all tx fifo queues
[108761.655855] iwlwifi 0000:03:00.0: Error sending REPLY_QOS_PARAM: time out
after 2000ms.
[108761.655867] iwlwifi 0000:03:00.0: Failed to update QoS
..... repetitions ....
[108844.230466] iwlwifi 0000:03:00.0: Restarting adapter queue is full
[108844.230479] iwlwifi 0000:03:00.0: Error sending REPLY_SCAN_CMD:
enqueue_hcmd failed: -28
[108844.251368] ------------[ cut here ]------------
[108844.251383] WARNING: at drivers/net/wireless/iwlwifi/iwl-io.c:150
iwl_grab_nic_access+0x7f/0xf0 [iwlwifi]()
[108844.251385] Hardware name: 2306CTO
[108844.251477] Pid: 12818, comm: kworker/u:0 Not tainted 3.6.2-1-ARCH #1
[108844.251479] Call Trace:
[108844.251489]  [<ffffffff81055c2f>] warn_slowpath_common+0x7f/0xc0
[108844.251495]  [<ffffffff81055d26>] warn_slowpath_fmt+0x46/0x50
[108844.251501]  [<ffffffffa04e4838>] ? iwl_grab_nic_access_silent+0x188/0x200


------
abbas


--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html
Please read the FAQ at  http://www.tux.org/lkml/

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ