lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <4FA3EE49.7070805@palosanto.com> Date: Fri, 04 May 2012 09:57:13 -0500 From: Alex Villacís Lasso <a_villacis@...osanto.com> To: netdev@...r.kernel.org, Francois Romieu <romieu@...zoreil.com> Subject: Re: Fwd: Re: WARNING: at net/sched/sch_generic.c:256 dev_watchdog+0x277/0x280() (Resending to netdev@...r.kernel.org since previous attempt was rejected as spam) El 03/05/12 10:39, Alex Villacís Lasso escribió: > Alex Villacís Lasso<avillaci@...c.espol.edu.ec> : > [...] > > I am currently away from the target computer. How should I check for this? lspci? > > lspci can not tell much. Use 'dmesg | grep XID' instead. [alex@...lalex linux-git]$ dmesg | grep -i xid [ 10.647557] r8169 0000:02:00.0: eth0: RTL8168b/8111b at 0xffffc90000352000, 00:22:68:44:17:2f, XID 98500000 IRQ 43 > A complete dmesg would be welcome. > > It could help to know a few things : > - does the problem qualify as a regression since some kernel version ? > If so which one ? I have only seen these messages since 3.4-rc1. Vanilla kernels up to 3.3, and stock Fedora 16 kernels (kernel-3.3.2-6.fc16.x86_64) did not display this problem. However, I cannot confirm that the latest stock kernel is free from the message, since I prefer to run the latest RC kernel on my home machine. > - can it be reproduced with a kernel that has not been vbox tainted ? I will check this. However, since the message only appears after an hour of so of moderate bittorrent traffic, it might take a while to confirm. > - does networking recover ? It does recover, after a few seconds. > > Thanks. > > -- > Ueimor > -- To unsubscribe from this list: send the line "unsubscribe netdev" in the body of a message to majordomo@...r.kernel.org More majordomo info at http://vger.kernel.org/majordomo-info.html
Powered by blists - more mailing lists