kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #30218
[Bug 934812] Re: WARNING: at /build/buildd/linux-3.0.0/net/sched/sch_generic.c:255 dev_watchdog+0x1e6/0x1f0()
Daniel Richard G., this bug was reported a while ago and there hasn't
been any activity in it recently. We were wondering if this is still an
issue? If so, could you please test for this with the latest development
release of Ubuntu? ISO images are available from
http://cdimage.ubuntu.com/daily-live/current/ .
If it remains an issue, could you please run the following command in
the development release from a Terminal
(Applications->Accessories->Terminal), as it will automatically gather
and attach updated debug information to this report:
apport-collect -p linux <replace-with-bug-number>
Also, could you please test the latest upstream kernel available (not the daily folder) following https://wiki.ubuntu.com/KernelMainlineBuilds ? It will allow additional upstream developers to examine the issue. Once you've tested the upstream kernel, please comment on which kernel version specifically you tested. If this bug is fixed in the mainline kernel, please add the following tags:
kernel-fixed-upstream
kernel-fixed-upstream-VERSION-NUMBER
where VERSION-NUMBER is the version number of the kernel you tested. For example:
kernel-fixed-upstream-v3.12
This can be done by clicking on the yellow circle with a black pencil icon next to the word Tags located at the bottom of the bug description. As well, please remove the tag:
needs-upstream-testing
If the mainline kernel does not fix this bug, please add the following tags:
kernel-bug-exists-upstream
kernel-bug-exists-upstream-VERSION-NUMBER
As well, please remove the tag:
needs-upstream-testing
Once testing of the upstream kernel is complete, please mark this bug's
Status as Confirmed. Please let us know your results. Thank you for your
understanding.
** Changed in: linux (Ubuntu)
Status: Triaged => Incomplete
** Tags removed: apport-collected
** Tags added: needs-kernel-logs needs-upstream-testing regression-potential
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/934812
Title:
WARNING: at /build/buildd/linux-3.0.0/net/sched/sch_generic.c:255
dev_watchdog+0x1e6/0x1f0()
Status in The Linux Kernel:
Incomplete
Status in “linux” package in Ubuntu:
Incomplete
Bug description:
I have a Toshiba laptop (Satellite A65) with a built-in Ethernet
adapter, running Ubuntu Oneiric with the stock kernel 3.0.0-16.28.
After some time in operation, while the system is in use, the network
connection stops working and I find the following in /var/log/syslog:
Feb 18 02:20:44 lemon kernel: [12023.008097] ------------[ cut here ]------------
Feb 18 02:20:44 lemon kernel: [12023.008129] WARNING: at /build/buildd/linux-3.0.0/net/sched/sch_generic.c:255 dev_watchdog+0x1e6/0x1f0()
Feb 18 02:20:44 lemon kernel: [12023.008138] Hardware name: Satellite A65
Feb 18 02:20:44 lemon kernel: [12023.008146] NETDEV WATCHDOG: eth0 (8139too): transmit queue 0 timed out
Feb 18 02:20:44 lemon kernel: [12023.008152] Modules linked in: ppdev pcmcia snd_atiixp_modem snd_atiixp snd_ac97_codec ac97_bus snd_pcm snd_seq_midi snd_rawmidi snd_seq_midi_event snd_seq snd_timer snd_seq_device snd psmouse yenta_socket serio_raw pcmcia_rsrc pcmcia_core pcspkr soundcore snd_page_alloc joydev radeon ttm parport_pc drm_kms_helper drm i2c_algo_bit video i2c_piix4 shpchp ati_agp lp parport usbhid hid 8139too 8139cp pata_atiixp
Feb 18 02:20:44 lemon kernel: [12023.008276] Pid: 0, comm: swapper Not tainted 3.0.0-16-generic #28-Ubuntu
Feb 18 02:20:44 lemon kernel: [12023.008285] Call Trace:
Feb 18 02:20:44 lemon kernel: [12023.008306] [<c1047cd2>] warn_slowpath_common+0x72/0xa0
Feb 18 02:20:44 lemon kernel: [12023.008319] [<c14546a6>] ? dev_watchdog+0x1e6/0x1f0
Feb 18 02:20:44 lemon kernel: [12023.008332] [<c14546a6>] ? dev_watchdog+0x1e6/0x1f0
Feb 18 02:20:44 lemon kernel: [12023.008346] [<c1047da3>] warn_slowpath_fmt+0x33/0x40
Feb 18 02:20:44 lemon kernel: [12023.008359] [<c14546a6>] dev_watchdog+0x1e6/0x1f0
Feb 18 02:20:44 lemon kernel: [12023.008377] [<c1054c1f>] call_timer_fn+0x2f/0x110
Feb 18 02:20:44 lemon kernel: [12023.008394] [<c152e8bd>] ? _raw_spin_lock_irqsave+0x2d/0x40
Feb 18 02:20:44 lemon kernel: [12023.008410] [<c10ae98d>] ? force_qs_rnp+0xfd/0x140
Feb 18 02:20:44 lemon kernel: [12023.008423] [<c14544c0>] ? qdisc_reset+0x40/0x40
Feb 18 02:20:44 lemon kernel: [12023.008437] [<c105631b>] run_timer_softirq+0xeb/0x210
Feb 18 02:20:44 lemon kernel: [12023.008448] [<c14544c0>] ? qdisc_reset+0x40/0x40
Feb 18 02:20:44 lemon kernel: [12023.008464] [<c104e900>] ? local_bh_enable_ip+0x90/0x90
Feb 18 02:20:44 lemon kernel: [12023.008476] [<c104e900>] ? local_bh_enable_ip+0x90/0x90
Feb 18 02:20:44 lemon kernel: [12023.008487] [<c104e981>] __do_softirq+0x81/0x1a0
Feb 18 02:20:44 lemon kernel: [12023.008501] [<c104e900>] ? local_bh_enable_ip+0x90/0x90
Feb 18 02:20:44 lemon kernel: [12023.008510] <IRQ> [<c104ecc6>] ? irq_exit+0x76/0xa0
Feb 18 02:20:44 lemon kernel: [12023.008531] [<c1535ec9>] ? smp_apic_timer_interrupt+0x59/0x88
Feb 18 02:20:44 lemon kernel: [12023.008545] [<c1056ef5>] ? get_next_timer_interrupt+0x75/0xf0
Feb 18 02:20:44 lemon kernel: [12023.008556] [<c152ef29>] ? apic_timer_interrupt+0x31/0x38
Feb 18 02:20:44 lemon kernel: [12023.008569] [<c107007b>] ? sysctl_check_table+0x19b/0x240
Feb 18 02:20:44 lemon kernel: [12023.008585] [<c1009aec>] ? mwait_idle+0x7c/0x1d0
Feb 18 02:20:44 lemon kernel: [12023.008598] [<c100175a>] ? cpu_idle+0x8a/0xc0
Feb 18 02:20:44 lemon kernel: [12023.008611] [<c1501a75>] ? rest_init+0x5d/0x68
Feb 18 02:20:44 lemon kernel: [12023.008628] [<c17c1763>] ? start_kernel+0x352/0x358
Feb 18 02:20:44 lemon kernel: [12023.008642] [<c17c13a2>] ? pass_bootoption.constprop.2+0xe2/0xe2
Feb 18 02:20:44 lemon kernel: [12023.008655] [<c17c10a9>] ? i386_start_kernel+0xa9/0xaf
Feb 18 02:20:44 lemon kernel: [12023.008663] ---[ end trace e4b87fe15e496637 ]---
Feb 18 02:20:47 lemon kernel: [12026.016082] 8139too 0000:02:07.0: eth0: link up, 100Mbps, full-duplex, lpa 0x45E1
Feb 18 02:20:59 lemon kernel: [12038.016067] 8139too 0000:02:07.0: eth0: link up, 100Mbps, full-duplex, lpa 0x45E1
Feb 18 02:21:11 lemon kernel: [12050.016074] 8139too 0000:02:07.0: eth0: link up, 100Mbps, full-duplex, lpa 0x45E1
Feb 18 02:21:23 lemon kernel: [12062.016072] 8139too 0000:02:07.0: eth0: link up, 100Mbps, full-duplex, lpa 0x45E1
Feb 18 02:21:35 lemon kernel: [12074.016070] 8139too 0000:02:07.0: eth0: link up, 100Mbps, full-duplex, lpa 0x45E1
Feb 18 02:21:47 lemon kernel: [12086.016055] 8139too 0000:02:07.0: eth0: link up, 100Mbps, full-duplex, lpa 0x45E1
Feb 18 02:21:59 lemon kernel: [12098.016086] 8139too 0000:02:07.0: eth0: link up, 100Mbps, full-duplex, lpa 0x45E1
Feb 18 02:22:11 lemon kernel: [12110.016069] 8139too 0000:02:07.0: eth0: link up, 100Mbps, full-duplex, lpa 0x45E1
Feb 18 02:22:23 lemon kernel: [12122.016223] 8139too 0000:02:07.0: eth0: link up, 100Mbps, full-duplex, lpa 0x45E1
Unloading/reloading the 8139too/8139cp modules doesn't help at that point, only rebooting. Seeing as the logged stack trace goes through some SMP-related functions, I am currently running this system with the "nosmp" kernel parameter and so far that appears to be keeping this bug at bay.
---
ApportVersion: 1.23-0ubuntu4
Architecture: i386
DistroRelease: Ubuntu 11.10
Package: linux (not installed)
ProcEnviron:
PATH=(custom, user)
LANG=en_US.UTF-8
SHELL=/bin/bash
Tags: oneiric
Uname: Linux 3.2.13-030213-generic i686
UnreportableReason: The running kernel is not an Ubuntu kernel
UpgradeStatus: No upgrade log present (probably fresh install)
UserGroups: adm audio cdrom dialout floppy plugdev video
To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/934812/+subscriptions