← Back to team overview

kernel-packages team mailing list archive

[Bug 1014350] Re: WARNING: at /build/buildd/linux-3.2.0/net/core/dev.c:1960 skb_gso_segment+0x341/0x3b0()

 

working workaroud, thoroughly tested, without any problems:

variant 1:
use e1000 as a kvm network driver

variant 2:
use virtio driver and disable tso for the network card in the guest. for example in rc.conf 
ifconfig_vtnet0="inet 192.168.X.X/24 -tso"

both variants work without problems.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1014350

Title:
  WARNING: at /build/buildd/linux-3.2.0/net/core/dev.c:1960
  skb_gso_segment+0x341/0x3b0()

Status in “linux” package in Ubuntu:
  Invalid

Bug description:
  we have IBM 3650  with 12.04 amd64 server as a kvm virtualization and
  kern.log is suddenly fill at dramatic rate with this warning.  system
  work normaly for a while and problem start five days ago. any help?

  WORKAROUND: We have several freebsd 9 amd64 guests with virtio network
  drivers. After changing net drv to e1000 the problem disappears.

  [29955.815267] WARNING: at /build/buildd/linux-3.2.0/net/core/dev.c:1980 skb_gso_segment+0x341/0x3b0()
  [29955.815269] Hardware name: IBM System x3650 -[7979KPG]-
  [29955.815272] 802.1Q VLAN Support: caps=(0x30095823, 0x0) len=1925 data_len=0 ip_summed=0
  [29955.815275] Modules linked in: ip6table_filter ip6_tables ebtable_nat ebtables ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp iptable_filter ip_tables x_tables kvm_intel kvm nfsd nfs lockd fscache auth_rpcgss nfs_acl sunrpc bridge 8021q garp stp radeon ttm ibmpex drm_kms_helper shpchp ibmaem ipmi_msghandler ics932s401 psmouse drm serio_raw i2c_algo_bit i5000_edac edac_core i5k_amb ioatdma mac_hid dca lp parport ses enclosure bnx2 aacraid
  [29955.815312] Pid: 7912, comm: kvm Tainted: G        W    3.2.0-25-generic #40-Ubuntu
  [29955.815314] Call Trace:
  [29955.815316]  <IRQ>  [<ffffffff810672af>] warn_slowpath_common+0x7f/0xc0
  [29955.815322]  [<ffffffff810673a6>] warn_slowpath_fmt+0x46/0x50
  [29955.815326]  [<ffffffff8153ebd1>] skb_gso_segment+0x341/0x3b0
  [29955.815330]  [<ffffffff8105695e>] ? update_curr+0x21e/0x230
  [29955.815335]  [<ffffffff8154234a>] dev_hard_start_xmit+0x11a/0x580
  [29955.815341]  [<ffffffffa021c150>] ? br_flood+0xc0/0xc0 [bridge]
  [29955.815345]  [<ffffffff81542a5a>] dev_queue_xmit+0x2aa/0x420
  [29955.815350]  [<ffffffffa021c1bc>] br_dev_queue_push_xmit+0x6c/0xa0 [bridge]
  [29955.815356]  [<ffffffffa021c248>] br_forward_finish+0x58/0x60 [bridge]
  [29955.815361]  [<ffffffffa021c3fb>] __br_forward+0xab/0xd0 [bridge]
  [29955.815367]  [<ffffffffa021c4bd>] br_forward+0x5d/0x70 [bridge]
  [29955.815372]  [<ffffffffa021d182>] br_handle_frame_finish+0x182/0x2a0 [bridge]
  [29955.815378]  [<ffffffffa021d468>] br_handle_frame+0x1c8/0x270 [bridge]
  [29955.815384]  [<ffffffffa021d2a0>] ? br_handle_frame_finish+0x2a0/0x2a0 [bridge]
  [29955.815388]  [<ffffffff8153fd82>] __netif_receive_skb+0x1e2/0x520
  [29955.815391]  [<ffffffff815404e1>] process_backlog+0xb1/0x190
  [29955.815395]  [<ffffffff815417d4>] net_rx_action+0x134/0x290
  [29955.815399]  [<ffffffff8106ea58>] __do_softirq+0xa8/0x210
  [29955.815402]  [<ffffffff81667eac>] call_softirq+0x1c/0x30
  [29955.815404]  <EOI>  [<ffffffff81015305>] do_softirq+0x65/0xa0
  [29955.815410]  [<ffffffff81541cb8>] netif_rx_ni+0x28/0x30
  [29955.815414]  [<ffffffff814787c6>] tun_get_user+0x306/0x4a0
  [29955.815417]  [<ffffffff81479ca4>] tun_chr_aio_write+0x64/0x90
  [29955.815421]  [<ffffffff81479c40>] ? tun_chr_aio_read+0xd0/0xd0
  [29955.815424]  [<ffffffff811784c3>] do_sync_readv_writev+0xd3/0x110
  [29955.815428]  [<ffffffff812d7768>] ? apparmor_file_permission+0x18/0x20
  [29955.815431]  [<ffffffff8129cefc>] ? security_file_permission+0x2c/0xb0
  [29955.815435]  [<ffffffff81177bc1>] ? rw_verify_area+0x61/0xf0
  [29955.815438]  [<ffffffff81178794>] do_readv_writev+0xd4/0x1d0
  [29955.815441]  [<ffffffff811be755>] ? eventfd_ctx_read+0x1a5/0x210
  [29955.815445]  [<ffffffff811788cc>] vfs_writev+0x3c/0x50
  [29955.815447]  [<ffffffff81178a2a>] sys_writev+0x4a/0xb0
  [29955.815451]  [<ffffffff81665c42>] system_call_fastpath+0x16/0x1b
  [29955.815453] ---[ end trace 33dfb9cf0396c073 ]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1014350/+subscriptions