Hi,
Last weekend I updated our ASG120 to UTM9.1, this morning I got complaints that there was no connection with our remote site. The kernel log shows the following, is this the same issue that existed with Intel NICs and UTM9?
2013:05:21-00:34:07 evpn-sd kernel: [250521.824105] ------------[ cut here ]------------
2013:05:21-00:34:07 evpn-sd kernel: [250521.824130] WARNING: at net/sched/sch_generic.c:254 dev_watchdog+0xe7/0x182()
2013:05:21-00:34:07 evpn-sd kernel: [250521.824138] Hardware name: UTM
2013:05:21-00:34:07 evpn-sd kernel: [250521.824145] NETDEV WATCHDOG: eth0 (e1000e): transmit queue 0 timed out
2013:05:21-00:34:07 evpn-sd kernel: [250521.824151] Modules linked in: sr_mod cdrom xt_length2(O) xt_CLASSIFY xt_connmark xt_tcpudp xt_set xt_multiport xt_addrtype ip_set_hash_ip ip_set_hash_net nf_nat_pptp nf_nat_proto_gre nf_nat_irc nf_nat_ftp nf_conntrack_pptp nf_conntrack_proto_gre nf_conntrack_irc nf_conntrack_ftp sch_prio sch_hfsc sch_fq_codel sch_tbf act_mirred cls_u32 sch_ingress ifb af_packet ebt_arp bridge stp llc ebtable_filter ebtables ip6table_ips ip6table_mangle ip6table_nat nf_nat_ipv6 iptable_ips iptable_mangle iptable_nat nf_nat_ipv4 nf_nat xt_NFLOG xt_condition(O) xt_logmark xt_confirmed xt_owner ip6t_REJECT ipt_REJECT xt_state ip_set red2 ip_scheduler nfnetlink_log nf_conntrack_ipv6 nf_defrag_ipv6 ip6table_filter ip6table_raw nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack iptable_filter iptable_raw xt_CT nf_conntrack_netlink nfnetlink nf_conntrack ip6_tables ip_tables x_tables ipv6 red loop acpi_cpufreq mperf coretemp evdev ppdev parport_pc ehci_pci parport rtc_cmos e1000e(O) i2c_i801 sg pcspkr button microcode sd_mod uhci_hcd ehci_hcd processor thermal_sys hwmon ata_generic pata_acpi ata_piix ahci libahci libata scsi_mod edd
2013:05:21-00:34:07 evpn-sd kernel: [250521.824362] Pid: 0, comm: swapper/0 Tainted: G O 3.8.6-5.g613ca40-smp64 #1
2013:05:21-00:34:07 evpn-sd kernel: [250521.824369] Call Trace:
2013:05:21-00:34:07 evpn-sd kernel: [250521.824376] [] ? dev_watchdog+0xe7/0x182
2013:05:21-00:34:07 evpn-sd kernel: [250521.824400] [] ? warn_slowpath_common+0x78/0x8d
2013:05:21-00:34:07 evpn-sd kernel: [250521.824412] [] ? netif_tx_lock+0x7e/0x7e
2013:05:21-00:34:07 evpn-sd kernel: [250521.824424] [] ? warn_slowpath_fmt+0x45/0x4a
2013:05:21-00:34:07 evpn-sd kernel: [250521.824436] [] ? netif_tx_lock+0x43/0x7e
2013:05:21-00:34:07 evpn-sd kernel: [250521.824459] [] ? dev_watchdog+0xe7/0x182
2013:05:21-00:34:07 evpn-sd kernel: [250521.824472] [] ? call_timer_fn+0x1b/0x6e
2013:05:21-00:34:07 evpn-sd kernel: [250521.824484] [] ? run_timer_softirq+0x16c/0x1b3
2013:05:21-00:34:07 evpn-sd kernel: [250521.824498] [] ? __do_softirq+0x9d/0x15f
2013:05:21-00:34:07 evpn-sd kernel: [250521.824511] [] ? clockevents_program_event+0x9a/0xb9
2013:05:21-00:34:07 evpn-sd kernel: [250521.824525] [] ? disable_cpuidle+0xb/0xb
2013:05:21-00:34:07 evpn-sd kernel: [250521.824539] [] ? call_softirq+0x1c/0x30
2013:05:21-00:34:07 evpn-sd kernel: [250521.824552] [] ? do_softirq+0x3f/0x79
2013:05:21-00:34:07 evpn-sd kernel: [250521.824564] [] ? irq_exit+0x43/0xb0
2013:05:21-00:34:07 evpn-sd kernel: [250521.824577] [] ? smp_apic_timer_interrupt+0x85/0x93
2013:05:21-00:34:07 evpn-sd kernel: [250521.824590] [] ? apic_timer_interrupt+0x6d/0x80
2013:05:21-00:34:07 evpn-sd kernel: [250521.824596] [] ? __setup_broadcast_timer+0x2d/0x2d
2013:05:21-00:34:07 evpn-sd kernel: [250521.824617] [] ? cpuidle_wrap_enter+0x3c/0x71
2013:05:21-00:34:07 evpn-sd kernel: [250521.824629] [] ? cpuidle_wrap_enter+0x32/0x71
2013:05:21-00:34:07 evpn-sd kernel: [250521.824642] [] ? cpuidle_enter_state+0xa/0x33
2013:05:21-00:34:07 evpn-sd kernel: [250521.824653] [] ? cpuidle_idle_call+0x9e/0xcc
2013:05:21-00:34:07 evpn-sd kernel: [250521.824665] [] ? cpu_idle+0x61/0xa9
2013:05:21-00:34:07 evpn-sd kernel: [250521.824677] [] ? early_idt_handlers+0x120/0x120
2013:05:21-00:34:07 evpn-sd kernel: [250521.824688] [] ? start_kernel+0x372/0x37e
2013:05:21-00:34:07 evpn-sd kernel: [250521.824700] [] ? repair_env_string+0x5d/0x5d
2013:05:21-00:34:07 evpn-sd kernel: [250521.824712] [] ? x86_64_start_kernel+0x102/0x10f
2013:05:21-00:34:07 evpn-sd kernel: [250521.824720] ---[ end trace ded262413d4488f1 ]---
2013:05:21-00:34:07 evpn-sd kernel: [250521.824756] e1000e 0000:05:00.0 eth0: Reset adapter unexpectedly
2013:05:21-00:34:07 evpn-sd kernel: [250521.928794] br0: port 1(eth0) entered disabled state
2013:05:21-07:56:04 evpn-sd kernel: [ 75.008076] br0: port 1(eth0) entered forwarding state
2013:05:21-07:56:04 evpn-sd kernel: [ 75.076027] br0: port 2(eth1) entered forwarding state
2013:05:21-07:56:06 evpn-sd kernel: [ 77.137942] u32 classifier
2013:05:21-07:56:06 evpn-sd kernel: [ 77.137951] input device check on
2013:05:21-07:56:06 evpn-sd kernel: [ 77.137955] Actions configured
2013:05:21-07:56:06 evpn-sd kernel: [ 77.142255] Mirror/redirect action on
2013:05:21-11:05:24 evpn-sd kernel: [11435.016032] hrtimer: interrupt took 29193 ns
This thread was automatically locked due to age.