lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [day] [month] [year] [list]
Date:	Mon, 23 Nov 2009 11:02:43 -0700
From:	"Tantilov, Emil S" <emil.s.tantilov@...el.com>
To:	David Miller <davem@...emloft.net>, "rjw@...k.pl" <rjw@...k.pl>
CC:	"linux-kernel@...r.kernel.org" <linux-kernel@...r.kernel.org>,
	"kernel-testers@...r.kernel.org" <kernel-testers@...r.kernel.org>,
	"skraw@...net.com" <skraw@...net.com>,
	"netdev@...r.kernel.org" <netdev@...r.kernel.org>
Subject: RE: [Bug #14252] WARNING: at include/linux/skbuff.h:1382 w/ e1000

David Miller wrote:
> From: "Rafael J. Wysocki" <rjw@...k.pl>
> Date: Tue, 17 Nov 2009 00:01:18 +0100 (CET)
> 
>> This message has been generated automatically as a part of a report
>> of regressions introduced between 2.6.30 and 2.6.31.
>> 
>> The following bug entry is on the current list of known regressions
>> introduced between 2.6.30 and 2.6.31.  Please verify if it still
>> should be listed and let me know (either way).
>> 
>> 
>> Bug-Entry	: http://bugzilla.kernel.org/show_bug.cgi?id=14252
>> Subject		: WARNING: at include/linux/skbuff.h:1382 w/ e1000
>> Submitter	: Stephan von Krawczynski <skraw@...net.com>
>> Date		: 2009-09-20 11:26 (58 days old)
>> References	: http://marc.info/?l=linux-kernel&m=125344599006033&w=4
> 
> Please CC: netdev when reporting networking problems, thank you.
> 
> Intel folks can you please take a look at this?  Thanks.

I have not been able to reproduce this issue so far. I don't have the exact same HW, but I tested on stock 2.6.31 with 82541 based NIC. More than 3 days now of stress without a problem.

If the reporter can provide some additional information that may be of help:
1. cat /proc/interrupts
2. ethtool -i ethX (where ethX is the interface that is causing the problem
3. lspci -vvv
4. ethtool -e ethX
5. specific settings that may deviate from the default configuration (like MTU)
6. type of traffic that is causing the issue.

Thanks,
Emil--
To unsubscribe from this list: send the line "unsubscribe netdev" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at  http://vger.kernel.org/majordomo-info.html

Powered by blists - more mailing lists