retitle 511963 linux-image-2.6.26-1-xen-amd64: bridge + ipv6 = WARNING:
at net/core/dev.c:1457 skb_gso_segment+0x88/0x1af()
found 511963 2.6.26-13
tag 511963 ipv6
thank you
I found #506419 (cloned to 509156, set to wishlist) which is about
exactly the same issue:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=506419
Strange enough that bug did not show up in my search. Anyway, #506419
contains extra information, as well as another link to kerneltrap:
http://kerneltrap.org/mailarchive/linux-netdev/2008/10/16/3674714
It seems this issue is only Bridge + IPv6 related and it not related to
do with the specific network card/driver. At least, I can reproduce
immediately with latest lenny 2.6.26-13 on different hardware. The first
box using tg3, this one is a SuperMicro system with "nVidia Corporation
MCP55" chipset, like the system #506419 was originally about. Hm it
could be SuperMicro related, I'll try to reproduce on some other system
tomorrow.
Also in this case, issuing `ethtool -K eth0 gso off` is a workaround
now, but probably not a solution. ;]
Hans van Kranenburg
[134650.920807] WARNING: at net/core/dev.c:1451 skb_gso_segment+0x88/0x1af()
[134651.001951] Modules linked in: bridge ipv6 loop ide_cd_mod cdrom
snd_pcm snd_timer snd soundcore snd_page_alloc floppy k8temp psmouse
serio_raw shpchp pcspkr pci_hotplug forcedeth amd74xx ohci_hcd
i2c_nforce2 ehci_hcd button i2c_core evdev reiserfs dm_mirror dm_log
dm_snapshot dm_mod raid1 md_mod sd_mod thermal processor fan thermal_sys
ide_pci_generic ide_core ata_generic sata_nv libata scsi_mod dock
[134651.348821] Pid: 0, comm: swapper Not tainted 2.6.26-1-amd64 #1
[134651.348821]
[134651.348821] Call Trace:
[134651.348821] <IRQ> [<ffffffff802349b8>] warn_on_slowpath+0x51/0x7a
[134651.348821] [<ffffffff803bd4b6>] dev_queue_xmit+0x273/0x2b1
[134651.348821] [<ffffffffa0249da3>]
:bridge:br_dev_queue_push_xmit+0x75/0x79
[134651.348821] [<ffffffffa0249198>] :bridge:br_dev_xmit+0x60/0x74
[134651.348821] [<ffffffff803bd4b6>] dev_queue_xmit+0x273/0x2b1
[134651.348821] [<ffffffffa0203d61>] :ipv6:ip6_output+0xc11/0xc37
[134651.348821] [<ffffffff803bac16>] skb_gso_segment+0x88/0x1af
[134651.348821] [<ffffffff803baebc>] dev_hard_start_xmit+0x17f/0x24e
[134651.348821] [<ffffffff803bd433>] dev_queue_xmit+0x1f0/0x2b1
[134651.348821] [<ffffffffa0203d61>] :ipv6:ip6_output+0xc11/0xc37
[134651.348821] [<ffffffffa020590e>] :ipv6:ip6_xmit+0x35c/0x44e
[134651.348821] [<ffffffff803c094e>] neigh_update+0x3b9/0x3e7
[134651.348821] [<ffffffffa0226654>] :ipv6:inet6_csk_xmit+0x219/0x235
[134651.348821] [<ffffffff803edf78>] tcp_transmit_skb+0x731/0x76e
[134651.348821] [<ffffffff803ef16f>] tso_fragment+0xef/0x13b
[134651.348821] [<ffffffff803ef891>] __tcp_push_pending_frames+0x6d6/0x7a9
[134651.348821] [<ffffffff803ec854>] tcp_rcv_established+0x10c/0x8b4
[134651.348821] [<ffffffffa0220335>] :ipv6:tcp_v6_do_rcv+0x626/0x8ff
[134651.348821] [<ffffffff80228939>] enqueue_task+0x56/0x61
[134651.348821] [<ffffffffa020df54>] :ipv6:ip6_pol_route_input+0x0/0x11
[134651.348821] [<ffffffffa0229de3>] :ipv6:fib6_rule_action+0x79/0x196
[134651.348821] [<ffffffff80429f16>] _write_lock_bh+0x9/0x1c
[134651.348821] [<ffffffff80417074>] __inet6_lookup_established+0xed/0x258
[134651.348821] [<ffffffffa0222b3f>] :ipv6:tcp_v6_rcv+0x638/0x685
[134651.348821] [<ffffffffa0205bd5>] :ipv6:ip6_input_finish+0x1d5/0x34c
[134651.348821] [<ffffffffa02062a3>] :ipv6:ipv6_rcv+0x32d/0x38e
[134651.348821] [<ffffffffa024a808>]
:bridge:br_handle_frame_finish+0x107/0x13e
[134651.348821] [<ffffffffa024a9ef>] :bridge:br_handle_frame+0x1b0/0x1c9
[134651.348821] [<ffffffff803ba7fc>] netif_receive_skb+0x29f/0x3b8
[134651.348821] [<ffffffff803b5f34>] __alloc_skb+0x7f/0x12d
[134651.348821] [<ffffffff803bcf8f>] process_backlog+0x86/0xef
[134651.348821] [<ffffffff803b6296>] dev_alloc_skb+0x16/0x2d
[134651.348821] [<ffffffff803bca0f>] net_rx_action+0xab/0x1da
[134651.348821] [<ffffffff802393b7>] __do_softirq+0x5c/0xd1
[134651.348821] [<ffffffff8020d2cc>] call_softirq+0x1c/0x28
[134651.348821] [<ffffffff8020f3d0>] do_softirq+0x3c/0x81
[134651.348821] [<ffffffff80239317>] irq_exit+0x3f/0x83
[134651.348821] [<ffffffff8020f630>] do_IRQ+0xb9/0xd9
[134651.348821] [<ffffffff8020b0a3>] default_idle+0x0/0x49
[134651.348821] [<ffffffff8020c46d>] ret_from_intr+0x0/0x19
[134651.348821] <EOI> [<ffffffff8021a817>] lapic_next_event+0x0/0x13
[134651.348821] [<ffffffff8021eb54>] native_safe_halt+0x2/0x3
[134651.348821] [<ffffffff8020b0cd>] default_idle+0x2a/0x49
[134651.348821] [<ffffffff8020ac79>] cpu_idle+0x89/0xb3
[134651.348821]
[134651.348821] ---[ end trace 0af407c51eea6e77 ]---
--
To UNSUBSCRIBE, email to debian-bugs-dist-requ...@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmas...@lists.debian.org