Bug 1270892
Summary: | Debian Testing guest causes 'kernel: WARNING: at net/core/dev.c:1915 skb_warn_bad_offload+0x99/0xb0() (Not tainted)' | ||
---|---|---|---|
Product: | Red Hat Enterprise Linux 6 | Reporter: | Madison Kelly <mkelly> |
Component: | qemu-kvm | Assignee: | Vlad Yasevich <vyasevic> |
Status: | CLOSED DUPLICATE | QA Contact: | Virtualization Bugs <virt-bugs> |
Severity: | unspecified | Docs Contact: | |
Priority: | unspecified | ||
Version: | 6.7 | CC: | ailan, fc-bugzilla, mkelly, mkenneth, ralf.aumueller, rbalakri, virt-maint |
Target Milestone: | rc | ||
Target Release: | --- | ||
Hardware: | Unspecified | ||
OS: | Unspecified | ||
Whiteboard: | |||
Fixed In Version: | Doc Type: | Bug Fix | |
Doc Text: | Story Points: | --- | |
Clone Of: | Environment: | ||
Last Closed: | 2016-02-01 02:41:51 UTC | Type: | Bug |
Regression: | --- | Mount Type: | --- |
Documentation: | --- | CRM: | |
Verified Versions: | Category: | --- | |
oVirt Team: | --- | RHEL 7.3 requirements from Atomic Host: | |
Cloudforms Team: | --- | Target Upstream Version: | |
Embargoed: |
Description
Madison Kelly
2015-10-12 15:35:09 UTC
I should mention; The IFN bond (used by the guests) span the two Intel NICs. The corosync traffic spans one emulex NIC (primary link) and one intel NIC (backup link). If the corosync retransmit messages relate, then it is unlikely to be the brand of NIC. Correction; The guest was created emulating an e1000 nic, as seen in the virsh dumpxml output. Hello, we had very similar problem and resolved it (hopefully) by turning off large-receive-offload. [root@lxhvehv407 ~]# tail -2 /etc/rc.d/rc.local ethtool -K eth0 lro off; ethtool -K eth1 lro off HTH The only way I can reproduce this is to make ethX devices that are part of the bond to have LRO enabled. Can you please provide the output of #ethtool -k if_link1 #ethtool -k if_link2 after the bridge has been created. Thanks -vlad Hello, after updating my cluster (6.6->6.7) I had the same problem (same network config than digimer). I guess the problem was introduced with kernel 2.6.32-515. From changelog info: - [netdrv] revert "bonding: Allow Bonding driver to disable/enable LRO on slaves" (Nikolay Aleksandrov) [1159818] If I understand correct the feature was removed. And in a test VM I found the following: Adding a bond interface to a bridge automatically disables LRO on the bonding interface. So I guess in older kernels these change was also send to the child's of the bond. Best regards This should happen in the recent rhel6 kernels as well. commit 0b044e4d4358a5ddcc335c31b39efd2abe95c173 Author: Jarod Wilson <jarod> Date: Fri Sep 25 16:59:32 2015 -0400 [net] bonding: propagate LRO disable to slave devices There is a z-stream bug 1287993 in progress already. Closing this one as duplicate of 1259008 *** This bug has been marked as a duplicate of bug 1259008 *** Commenting to stop the "outstanding bugs" emails. |