kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #37122
[Bug 1014350] Re: WARNING: at /build/buildd/linux-3.2.0/net/core/dev.c:1960 skb_gso_segment+0x341/0x3b0()
Bane Ivosev, did you have any collateral issues with using the
WORAKROUND, or preferred net drv over e1000 for your freebsd guests?
** Description changed:
we have IBM 3650 with 12.04 amd64 server as a kvm virtualization and
kern.log is suddenly fill at dramatic rate with this warning. system
work normaly for a while and problem start five days ago. any help?
+
+ WORKAROUND: We have several freebsd 9 amd64 guests with virtio network
+ drivers. After changing net drv to e1000 the problem disappears.
[29955.815267] WARNING: at /build/buildd/linux-3.2.0/net/core/dev.c:1980 skb_gso_segment+0x341/0x3b0()
[29955.815269] Hardware name: IBM System x3650 -[7979KPG]-
[29955.815272] 802.1Q VLAN Support: caps=(0x30095823, 0x0) len=1925 data_len=0 ip_summed=0
[29955.815275] Modules linked in: ip6table_filter ip6_tables ebtable_nat ebtables ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp iptable_filter ip_tables x_tables kvm_intel kvm nfsd nfs lockd fscache auth_rpcgss nfs_acl sunrpc bridge 8021q garp stp radeon ttm ibmpex drm_kms_helper shpchp ibmaem ipmi_msghandler ics932s401 psmouse drm serio_raw i2c_algo_bit i5000_edac edac_core i5k_amb ioatdma mac_hid dca lp parport ses enclosure bnx2 aacraid
[29955.815312] Pid: 7912, comm: kvm Tainted: G W 3.2.0-25-generic #40-Ubuntu
[29955.815314] Call Trace:
[29955.815316] <IRQ> [<ffffffff810672af>] warn_slowpath_common+0x7f/0xc0
[29955.815322] [<ffffffff810673a6>] warn_slowpath_fmt+0x46/0x50
[29955.815326] [<ffffffff8153ebd1>] skb_gso_segment+0x341/0x3b0
[29955.815330] [<ffffffff8105695e>] ? update_curr+0x21e/0x230
[29955.815335] [<ffffffff8154234a>] dev_hard_start_xmit+0x11a/0x580
[29955.815341] [<ffffffffa021c150>] ? br_flood+0xc0/0xc0 [bridge]
[29955.815345] [<ffffffff81542a5a>] dev_queue_xmit+0x2aa/0x420
[29955.815350] [<ffffffffa021c1bc>] br_dev_queue_push_xmit+0x6c/0xa0 [bridge]
[29955.815356] [<ffffffffa021c248>] br_forward_finish+0x58/0x60 [bridge]
[29955.815361] [<ffffffffa021c3fb>] __br_forward+0xab/0xd0 [bridge]
[29955.815367] [<ffffffffa021c4bd>] br_forward+0x5d/0x70 [bridge]
[29955.815372] [<ffffffffa021d182>] br_handle_frame_finish+0x182/0x2a0 [bridge]
[29955.815378] [<ffffffffa021d468>] br_handle_frame+0x1c8/0x270 [bridge]
[29955.815384] [<ffffffffa021d2a0>] ? br_handle_frame_finish+0x2a0/0x2a0 [bridge]
[29955.815388] [<ffffffff8153fd82>] __netif_receive_skb+0x1e2/0x520
[29955.815391] [<ffffffff815404e1>] process_backlog+0xb1/0x190
[29955.815395] [<ffffffff815417d4>] net_rx_action+0x134/0x290
[29955.815399] [<ffffffff8106ea58>] __do_softirq+0xa8/0x210
[29955.815402] [<ffffffff81667eac>] call_softirq+0x1c/0x30
[29955.815404] <EOI> [<ffffffff81015305>] do_softirq+0x65/0xa0
[29955.815410] [<ffffffff81541cb8>] netif_rx_ni+0x28/0x30
[29955.815414] [<ffffffff814787c6>] tun_get_user+0x306/0x4a0
[29955.815417] [<ffffffff81479ca4>] tun_chr_aio_write+0x64/0x90
[29955.815421] [<ffffffff81479c40>] ? tun_chr_aio_read+0xd0/0xd0
[29955.815424] [<ffffffff811784c3>] do_sync_readv_writev+0xd3/0x110
[29955.815428] [<ffffffff812d7768>] ? apparmor_file_permission+0x18/0x20
[29955.815431] [<ffffffff8129cefc>] ? security_file_permission+0x2c/0xb0
[29955.815435] [<ffffffff81177bc1>] ? rw_verify_area+0x61/0xf0
[29955.815438] [<ffffffff81178794>] do_readv_writev+0xd4/0x1d0
[29955.815441] [<ffffffff811be755>] ? eventfd_ctx_read+0x1a5/0x210
[29955.815445] [<ffffffff811788cc>] vfs_writev+0x3c/0x50
[29955.815447] [<ffffffff81178a2a>] sys_writev+0x4a/0xb0
[29955.815451] [<ffffffff81665c42>] system_call_fastpath+0x16/0x1b
[29955.815453] ---[ end trace 33dfb9cf0396c073 ]---
** Changed in: linux (Ubuntu)
Importance: Medium => Low
** Changed in: linux (Ubuntu)
Status: Triaged => Incomplete
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1014350
Title:
WARNING: at /build/buildd/linux-3.2.0/net/core/dev.c:1960
skb_gso_segment+0x341/0x3b0()
Status in “linux” package in Ubuntu:
Incomplete
Bug description:
we have IBM 3650 with 12.04 amd64 server as a kvm virtualization and
kern.log is suddenly fill at dramatic rate with this warning. system
work normaly for a while and problem start five days ago. any help?
WORKAROUND: We have several freebsd 9 amd64 guests with virtio network
drivers. After changing net drv to e1000 the problem disappears.
[29955.815267] WARNING: at /build/buildd/linux-3.2.0/net/core/dev.c:1980 skb_gso_segment+0x341/0x3b0()
[29955.815269] Hardware name: IBM System x3650 -[7979KPG]-
[29955.815272] 802.1Q VLAN Support: caps=(0x30095823, 0x0) len=1925 data_len=0 ip_summed=0
[29955.815275] Modules linked in: ip6table_filter ip6_tables ebtable_nat ebtables ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp iptable_filter ip_tables x_tables kvm_intel kvm nfsd nfs lockd fscache auth_rpcgss nfs_acl sunrpc bridge 8021q garp stp radeon ttm ibmpex drm_kms_helper shpchp ibmaem ipmi_msghandler ics932s401 psmouse drm serio_raw i2c_algo_bit i5000_edac edac_core i5k_amb ioatdma mac_hid dca lp parport ses enclosure bnx2 aacraid
[29955.815312] Pid: 7912, comm: kvm Tainted: G W 3.2.0-25-generic #40-Ubuntu
[29955.815314] Call Trace:
[29955.815316] <IRQ> [<ffffffff810672af>] warn_slowpath_common+0x7f/0xc0
[29955.815322] [<ffffffff810673a6>] warn_slowpath_fmt+0x46/0x50
[29955.815326] [<ffffffff8153ebd1>] skb_gso_segment+0x341/0x3b0
[29955.815330] [<ffffffff8105695e>] ? update_curr+0x21e/0x230
[29955.815335] [<ffffffff8154234a>] dev_hard_start_xmit+0x11a/0x580
[29955.815341] [<ffffffffa021c150>] ? br_flood+0xc0/0xc0 [bridge]
[29955.815345] [<ffffffff81542a5a>] dev_queue_xmit+0x2aa/0x420
[29955.815350] [<ffffffffa021c1bc>] br_dev_queue_push_xmit+0x6c/0xa0 [bridge]
[29955.815356] [<ffffffffa021c248>] br_forward_finish+0x58/0x60 [bridge]
[29955.815361] [<ffffffffa021c3fb>] __br_forward+0xab/0xd0 [bridge]
[29955.815367] [<ffffffffa021c4bd>] br_forward+0x5d/0x70 [bridge]
[29955.815372] [<ffffffffa021d182>] br_handle_frame_finish+0x182/0x2a0 [bridge]
[29955.815378] [<ffffffffa021d468>] br_handle_frame+0x1c8/0x270 [bridge]
[29955.815384] [<ffffffffa021d2a0>] ? br_handle_frame_finish+0x2a0/0x2a0 [bridge]
[29955.815388] [<ffffffff8153fd82>] __netif_receive_skb+0x1e2/0x520
[29955.815391] [<ffffffff815404e1>] process_backlog+0xb1/0x190
[29955.815395] [<ffffffff815417d4>] net_rx_action+0x134/0x290
[29955.815399] [<ffffffff8106ea58>] __do_softirq+0xa8/0x210
[29955.815402] [<ffffffff81667eac>] call_softirq+0x1c/0x30
[29955.815404] <EOI> [<ffffffff81015305>] do_softirq+0x65/0xa0
[29955.815410] [<ffffffff81541cb8>] netif_rx_ni+0x28/0x30
[29955.815414] [<ffffffff814787c6>] tun_get_user+0x306/0x4a0
[29955.815417] [<ffffffff81479ca4>] tun_chr_aio_write+0x64/0x90
[29955.815421] [<ffffffff81479c40>] ? tun_chr_aio_read+0xd0/0xd0
[29955.815424] [<ffffffff811784c3>] do_sync_readv_writev+0xd3/0x110
[29955.815428] [<ffffffff812d7768>] ? apparmor_file_permission+0x18/0x20
[29955.815431] [<ffffffff8129cefc>] ? security_file_permission+0x2c/0xb0
[29955.815435] [<ffffffff81177bc1>] ? rw_verify_area+0x61/0xf0
[29955.815438] [<ffffffff81178794>] do_readv_writev+0xd4/0x1d0
[29955.815441] [<ffffffff811be755>] ? eventfd_ctx_read+0x1a5/0x210
[29955.815445] [<ffffffff811788cc>] vfs_writev+0x3c/0x50
[29955.815447] [<ffffffff81178a2a>] sys_writev+0x4a/0xb0
[29955.815451] [<ffffffff81665c42>] system_call_fastpath+0x16/0x1b
[29955.815453] ---[ end trace 33dfb9cf0396c073 ]---
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1014350/+subscriptions