Hi! I'm facing this problem, it is very easy to reproduce.
1- Host: Ubuntu 12.04.3 (Linux 3.8 or 3.11); 2- KVM (1.5.0 from Ubuntu Cloud Archive, new KVM for LTS); 3- OpenVSwitch 2.0.0 compiled for Ubuntu LTS by me (using `dpkg-buildpackage` on the host itself); 4- Guest: PFSense 2.1 with VirtIO drivers; Every time you access the PFSense web GUI, just every single click, triggers the following error at host kern.log: http://paste.ubuntu.com/6800489/ Also, this very same problem happens with Ubuntu 14.04 with Linux 3.13 / KVM 1.7.0. NOTE: You'll need to manuaaly enable VirtIO for your PFSense, follow it here: https://doc.pfsense.org/index.php/VirtIO_Driver_Support BTW, all my KVM Guests running behind this bnx2 NIC, have poor network performance. For example: * From client-x to host: iperf shows ~900Mbits/s * From client-x to guest-1 (ubuntu): iperf shows ~150Mbits/s * From client-x to guest-2 (pfsense - e1000): iperf shows ~200Mbits/s * From client-x to guest-2 (pfsense - virtio): iperf shows ~120MBtis/s So, I starting to think that the bnx2 drivers for Linux is crap. What do you guys think?! Tks! Thiago -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1014350 Title: WARNING: at /build/buildd/linux-3.2.0/net/core/dev.c:1960 skb_gso_segment+0x341/0x3b0() Status in “linux” package in Ubuntu: Invalid Bug description: we have IBM 3650 with 12.04 amd64 server as a kvm virtualization and kern.log is suddenly fill at dramatic rate with this warning. system work normaly for a while and problem start five days ago. any help? WORKAROUND: We have several freebsd 9 amd64 guests with virtio network drivers. After changing net drv to e1000 the problem disappears. [29955.815267] WARNING: at /build/buildd/linux-3.2.0/net/core/dev.c:1980 skb_gso_segment+0x341/0x3b0() [29955.815269] Hardware name: IBM System x3650 -[7979KPG]- [29955.815272] 802.1Q VLAN Support: caps=(0x30095823, 0x0) len=1925 data_len=0 ip_summed=0 [29955.815275] Modules linked in: ip6table_filter ip6_tables ebtable_nat ebtables ipt_MASQUERADE iptable_nat nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_state nf_conntrack ipt_REJECT xt_CHECKSUM iptable_mangle xt_tcpudp iptable_filter ip_tables x_tables kvm_intel kvm nfsd nfs lockd fscache auth_rpcgss nfs_acl sunrpc bridge 8021q garp stp radeon ttm ibmpex drm_kms_helper shpchp ibmaem ipmi_msghandler ics932s401 psmouse drm serio_raw i2c_algo_bit i5000_edac edac_core i5k_amb ioatdma mac_hid dca lp parport ses enclosure bnx2 aacraid [29955.815312] Pid: 7912, comm: kvm Tainted: G W 3.2.0-25-generic #40-Ubuntu [29955.815314] Call Trace: [29955.815316] <IRQ> [<ffffffff810672af>] warn_slowpath_common+0x7f/0xc0 [29955.815322] [<ffffffff810673a6>] warn_slowpath_fmt+0x46/0x50 [29955.815326] [<ffffffff8153ebd1>] skb_gso_segment+0x341/0x3b0 [29955.815330] [<ffffffff8105695e>] ? update_curr+0x21e/0x230 [29955.815335] [<ffffffff8154234a>] dev_hard_start_xmit+0x11a/0x580 [29955.815341] [<ffffffffa021c150>] ? br_flood+0xc0/0xc0 [bridge] [29955.815345] [<ffffffff81542a5a>] dev_queue_xmit+0x2aa/0x420 [29955.815350] [<ffffffffa021c1bc>] br_dev_queue_push_xmit+0x6c/0xa0 [bridge] [29955.815356] [<ffffffffa021c248>] br_forward_finish+0x58/0x60 [bridge] [29955.815361] [<ffffffffa021c3fb>] __br_forward+0xab/0xd0 [bridge] [29955.815367] [<ffffffffa021c4bd>] br_forward+0x5d/0x70 [bridge] [29955.815372] [<ffffffffa021d182>] br_handle_frame_finish+0x182/0x2a0 [bridge] [29955.815378] [<ffffffffa021d468>] br_handle_frame+0x1c8/0x270 [bridge] [29955.815384] [<ffffffffa021d2a0>] ? br_handle_frame_finish+0x2a0/0x2a0 [bridge] [29955.815388] [<ffffffff8153fd82>] __netif_receive_skb+0x1e2/0x520 [29955.815391] [<ffffffff815404e1>] process_backlog+0xb1/0x190 [29955.815395] [<ffffffff815417d4>] net_rx_action+0x134/0x290 [29955.815399] [<ffffffff8106ea58>] __do_softirq+0xa8/0x210 [29955.815402] [<ffffffff81667eac>] call_softirq+0x1c/0x30 [29955.815404] <EOI> [<ffffffff81015305>] do_softirq+0x65/0xa0 [29955.815410] [<ffffffff81541cb8>] netif_rx_ni+0x28/0x30 [29955.815414] [<ffffffff814787c6>] tun_get_user+0x306/0x4a0 [29955.815417] [<ffffffff81479ca4>] tun_chr_aio_write+0x64/0x90 [29955.815421] [<ffffffff81479c40>] ? tun_chr_aio_read+0xd0/0xd0 [29955.815424] [<ffffffff811784c3>] do_sync_readv_writev+0xd3/0x110 [29955.815428] [<ffffffff812d7768>] ? apparmor_file_permission+0x18/0x20 [29955.815431] [<ffffffff8129cefc>] ? security_file_permission+0x2c/0xb0 [29955.815435] [<ffffffff81177bc1>] ? rw_verify_area+0x61/0xf0 [29955.815438] [<ffffffff81178794>] do_readv_writev+0xd4/0x1d0 [29955.815441] [<ffffffff811be755>] ? eventfd_ctx_read+0x1a5/0x210 [29955.815445] [<ffffffff811788cc>] vfs_writev+0x3c/0x50 [29955.815447] [<ffffffff81178a2a>] sys_writev+0x4a/0xb0 [29955.815451] [<ffffffff81665c42>] system_call_fastpath+0x16/0x1b [29955.815453] ---[ end trace 33dfb9cf0396c073 ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1014350/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp