Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 1012410 Details for
Bug 1210086
skb_warn_bad_offload if a bond of Intel interfaces and VLANs are used
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh90 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
Host Traceback if guest NIC is e1000
host-trace.log (text/plain), 4.42 KB, created by
Sebastian Schrader
on 2015-04-08 21:26:38 UTC
(
hide
)
Description:
Host Traceback if guest NIC is e1000
Filename:
MIME Type:
Creator:
Sebastian Schrader
Created:
2015-04-08 21:26:38 UTC
Size:
4.42 KB
patch
obsolete
>Apr 08 21:00:43 newton.agdsn kernel: ------------[ cut here ]------------ >Apr 08 21:00:43 newton.agdsn kernel: WARNING: at net/core/dev.c:2191 skb_warn_bad_offload+0xcd/0xda() >Apr 08 21:00:43 newton.agdsn kernel: : caps=(0x0000000200004841, 0x0000000000000000) len=1514 data_len=1448 gso_size=1448 gso_type=1 ip_summed=1 >Apr 08 21:00:43 newton.agdsn kernel: Modules linked in: vhost_net macvtap macvlan ebt_arp iscsi_tcp libiscsi_tcp libiscsi nfsv3 nfs fscache dm_service_time ip6table_filter ip6_tables ebtabl...ck softdog ipt >Apr 08 21:00:43 newton.agdsn kernel: megaraid_sas sunrpc dm_mirror dm_region_hash dm_log loop dm_multipath dm_mod >Apr 08 21:00:43 newton.agdsn kernel: CPU: 6 PID: 0 Comm: swapper/6 Tainted: G W -------------- 3.10.0-123.20.1.el7.x86_64 #1 >Apr 08 21:00:43 newton.agdsn kernel: Hardware name: Dell Inc. PowerEdge R630/0CNCJW, BIOS 1.0.4 08/28/2014 >Apr 08 21:00:43 newton.agdsn kernel: ffff88085f4639d0 3fd4f8ae847a4ec9 ffff88085f463988 ffffffff815e2b0c >Apr 08 21:00:43 newton.agdsn kernel: ffff88085f4639c0 ffffffff8105dee1 ffff88084a1be600 ffff880738968000 >Apr 08 21:00:43 newton.agdsn kernel: 0000000000000001 0000000000000001 ffff88084a1be600 ffff88085f463a28 >Apr 08 21:00:43 newton.agdsn kernel: Call Trace: >Apr 08 21:00:43 newton.agdsn kernel: <IRQ> [<ffffffff815e2b0c>] dump_stack+0x19/0x1b >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff8105dee1>] warn_slowpath_common+0x61/0x80 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff8105df5c>] warn_slowpath_fmt+0x5c/0x80 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff812be763>] ? ___ratelimit+0x93/0x100 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff815e59f6>] skb_warn_bad_offload+0xcd/0xda >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff814d1ec9>] __skb_gso_segment+0x79/0xb0 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff814d21ba>] dev_hard_start_xmit+0x18a/0x570 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffffa02bd220>] ? deliver_clone+0x50/0x50 [bridge] >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff814f153e>] sch_direct_xmit+0xee/0x1c0 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff814d2798>] dev_queue_xmit+0x1f8/0x4a0 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffffa02bd29b>] br_dev_queue_push_xmit+0x7b/0xc0 [bridge] >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffffa02bd4b2>] br_forward_finish+0x22/0x60 [bridge] >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffffa02bd570>] __br_forward+0x80/0xf0 [bridge] >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffffa02be4d0>] ? br_handle_local_finish+0x50/0x50 [bridge] >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffffa02bd93b>] br_forward+0x8b/0xa0 [bridge] >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffffa02be778>] br_handle_frame_finish+0x2a8/0x3c0 [bridge] >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffffa02bea05>] br_handle_frame+0x175/0x260 [bridge] >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff814d01a2>] __netif_receive_skb_core+0x282/0x870 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff8101a0d9>] ? read_tsc+0x9/0x20 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff814d07a8>] __netif_receive_skb+0x18/0x60 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff814d0830>] netif_receive_skb+0x40/0xd0 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff814d1290>] napi_gro_receive+0x80/0xb0 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffffa01d40ac>] ixgbe_clean_rx_irq+0x7ac/0xb00 [ixgbe] >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffffa01d50f1>] ixgbe_poll+0x481/0x7e0 [ixgbe] >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff814d0bfa>] net_rx_action+0x15a/0x250 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff81067047>] __do_softirq+0xf7/0x290 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff815f4b5c>] call_softirq+0x1c/0x30 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff81014cf5>] do_softirq+0x55/0x90 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff810673e5>] irq_exit+0x115/0x120 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff815f5458>] do_IRQ+0x58/0xf0 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff815ea5ad>] common_interrupt+0x6d/0x6d >Apr 08 21:00:43 newton.agdsn kernel: <EOI> [<ffffffff81483af2>] ? cpuidle_enter_state+0x52/0xc0 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff81483c25>] cpuidle_idle_call+0xc5/0x200 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff8101bc7e>] arch_cpu_idle+0xe/0x30 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff810b47e5>] cpu_startup_entry+0xf5/0x290 >Apr 08 21:00:43 newton.agdsn kernel: [<ffffffff815d0a6e>] start_secondary+0x1c4/0x1da >Apr 08 21:00:43 newton.agdsn kernel: ---[ end trace b1742d134180c89a ]---
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1210086
: 1012410 |
1012411