Login
Log in using an SSO provider:
Fedora Account System
Red Hat Associate
Red Hat Customer
Login using a Red Hat Bugzilla account
Forgot Password
Create an Account
Red Hat Bugzilla – Attachment 1012411 Details for
Bug 1210086
skb_warn_bad_offload if a bond of Intel interfaces and VLANs are used
Home
New
Search
Simple Search
Advanced Search
My Links
Browse
Requests
Reports
Current State
Search
Tabular reports
Graphical reports
Duplicates
Other Reports
User Changes
Plotly Reports
Bug Status
Bug Severity
Non-Defaults
Product Dashboard
Help
Page Help!
Bug Writing Guidelines
What's new
Browser Support Policy
5.0.4.rh90 Release notes
FAQ
Guides index
User guide
Web Services
Contact
Legal
[?]
This site requires JavaScript to be enabled to function correctly, please enable it.
Guest Traceback if guest NIC is virtio_net
guest-traceback.log (text/plain), 4.49 KB, created by
Sebastian Schrader
on 2015-04-08 21:27:28 UTC
(
hide
)
Description:
Guest Traceback if guest NIC is virtio_net
Filename:
MIME Type:
Creator:
Sebastian Schrader
Created:
2015-04-08 21:27:28 UTC
Size:
4.49 KB
patch
obsolete
>Apr 8 22:39:47 pfsrvm kernel: [ 222.572815] ------------[ cut here ]------------ [604/643] >Apr 8 22:39:47 pfsrvm kernel: [ 222.572831] WARNING: CPU: 0 PID: 0 at /build/linux-P15SNz/linux-3.16.3/net/core/dev. >c:2246 skb_warn_bad_offload+0xc6/0xd1() >Apr 8 22:39:47 pfsrvm kernel: [ 222.572836] : caps=(0x000000801fdb78e9, 0x0000000000000000) len=2962 data_len=2834 g >so_size=1448 gso_type=5 ip_summed=1 >Apr 8 22:39:47 pfsrvm kernel: [ 222.572838] Modules linked in: veth xt_addrtype xt_conntrack ipt_MASQUERADE iptable_ >nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack iptable_filter ip_tables x_tables bridge stp llc >aufs(C) joydev hid_generic usbhid hid sg sr_mod cdrom ata_generic crc32_pclmul ghash_clmulni_intel ppdev aesni_intel a >es_x86_64 lrw gf128mul glue_helper ablk_helper cryptd psmouse evdev serio_raw ata_piix pcspkr ttm virtio_net virtio_co >nsole uhci_hcd ehci_hcd libata pvpanic virtio_balloon virtio_scsi floppy drm_kms_helper i2c_piix4 parport_pc parport d >rm scsi_mod usbcore processor i2c_core thermal_sys usb_common button autofs4 xfs libcrc32c virtio_blk crct10dif_pclmul > crct10dif_common crc32c_intel virtio_pci virtio_ring virtio >Apr 8 22:39:47 pfsrvm kernel: [ 222.572915] CPU: 0 PID: 0 Comm: swapper/0 Tainted: G C 3.16-2-amd64 #1 De >bian 3.16.3-2 >Apr 8 22:39:47 pfsrvm kernel: [ 222.572918] Hardware name: oVirt oVirt Node, BIOS 0.5.1 01/01/2011 >Apr 8 22:39:47 pfsrvm kernel: [ 222.572920] 0000000000000009 ffffffff81506188 ffff88003fc03c48 ffffffff81065707 >Apr 8 22:39:47 pfsrvm kernel: [ 222.572924] ffff88003db1a600 ffff88003fc03c98 0000000000000005 0000000000000001 >Apr 8 22:39:47 pfsrvm kernel: [ 222.572928] ffff88003db1a600 ffffffff8106576c ffffffff817742a0 ffff880000000030 >Apr 8 22:39:47 pfsrvm kernel: [ 222.572933] Call Trace: >Apr 8 22:39:47 pfsrvm kernel: [ 222.572935] <IRQ> [<ffffffff81506188>] ? dump_stack+0x41/0x51 >Apr 8 22:39:47 pfsrvm kernel: [ 222.572949] [<ffffffff81065707>] ? warn_slowpath_common+0x77/0x90 >Apr 8 22:39:47 pfsrvm kernel: [ 222.572954] [<ffffffff8106576c>] ? warn_slowpath_fmt+0x4c/0x50 >Apr 8 22:39:47 pfsrvm kernel: [ 222.572959] [<ffffffff81507821>] ? skb_warn_bad_offload+0xc6/0xd1 >Apr 8 22:39:47 pfsrvm kernel: [ 222.572969] [<ffffffff814199e1>] ? __skb_gso_segment+0x71/0xc0 >Apr 8 22:39:47 pfsrvm kernel: [ 222.572974] [<ffffffff81419cda>] ? dev_hard_start_xmit+0x16a/0x560 >Apr 8 22:39:47 pfsrvm kernel: [ 222.572982] [<ffffffff81448725>] ? nf_iterate+0x65/0xa0 >Apr 8 22:39:47 pfsrvm kernel: [ 222.572988] [<ffffffff8141a414>] ? __dev_queue_xmit+0x344/0x4c0 >Apr 8 22:39:47 pfsrvm kernel: [ 222.572994] [<ffffffff814222f1>] ? neigh_resolve_output+0xf1/0x200 >Apr 8 22:39:47 pfsrvm kernel: [ 222.573002] [<ffffffff81453342>] ? ip_finish_output+0x3e2/0x840 >Apr 8 22:39:47 pfsrvm kernel: [ 222.573007] [<ffffffff81418263>] ? __netif_receive_skb_core+0x533/0x750 >Apr 8 22:39:47 pfsrvm kernel: [ 222.573016] [<ffffffff8105095b>] ? kvm_clock_get_cycles+0x1b/0x20 >Apr 8 22:39:47 pfsrvm kernel: [ 222.573021] [<ffffffff814184ff>] ? netif_receive_skb_internal+0x1f/0x90 >Apr 8 22:39:47 pfsrvm kernel: [ 222.573029] [<ffffffffa029e5aa>] ? virtnet_poll+0x52a/0x880 [virtio_net] >Apr 8 22:39:47 pfsrvm kernel: [ 222.573034] [<ffffffff81418890>] ? net_rx_action+0x140/0x240 >Apr 8 22:39:47 pfsrvm kernel: [ 222.573041] [<ffffffff8106a5a1>] ? __do_softirq+0xf1/0x290 >Apr 8 22:39:47 pfsrvm kernel: [ 222.573045] [<ffffffff8106a975>] ? irq_exit+0x95/0xa0 >Apr 8 22:39:47 pfsrvm kernel: [ 222.573053] [<ffffffff8150f082>] ? do_IRQ+0x52/0xe0 >Apr 8 22:39:47 pfsrvm kernel: [ 222.573058] [<ffffffff8150ceed>] ? common_interrupt+0x6d/0x6d >Apr 8 22:39:47 pfsrvm kernel: [ 222.573060] <EOI> [<ffffffff8101c830>] ? idle_notifier_unregister+0x20/0x20 >Apr 8 22:39:47 pfsrvm kernel: [ 222.573076] [<ffffffff81050be2>] ? native_safe_halt+0x2/0x10 >Apr 8 22:39:47 pfsrvm kernel: [ 222.573081] [<ffffffff8101c849>] ? default_idle+0x19/0xb0 >Apr 8 22:39:47 pfsrvm kernel: [ 222.573088] [<ffffffff810a5d70>] ? cpu_startup_entry+0x340/0x400 >Apr 8 22:39:47 pfsrvm kernel: [ 222.573094] [<ffffffff8190305a>] ? start_kernel+0x47b/0x486 >Apr 8 22:39:47 pfsrvm kernel: [ 222.573099] [<ffffffff81902a04>] ? set_init_arg+0x4e/0x4e >Apr 8 22:39:47 pfsrvm kernel: [ 222.573104] [<ffffffff81902120>] ? early_idt_handlers+0x120/0x120 >Apr 8 22:39:47 pfsrvm kernel: [ 222.573109] [<ffffffff8190271f>] ? x86_64_start_kernel+0x14d/0x15c >Apr 8 22:39:47 pfsrvm kernel: [ 222.573112] ---[ end trace a4d8aba393c704c9 ]---
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 1210086
:
1012410
| 1012411