From owner-freebsd-bugs@FreeBSD.ORG Wed Nov 5 16:51:41 2014 Return-Path: Delivered-To: freebsd-bugs@FreeBSD.org Received: from mx1.freebsd.org (mx1.freebsd.org [8.8.178.115]) (using TLSv1.2 with cipher AECDH-AES256-SHA (256/256 bits)) (No client certificate requested) by hub.freebsd.org (Postfix) with ESMTPS id 187E9735 for ; Wed, 5 Nov 2014 16:51:41 +0000 (UTC) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mx1.freebsd.org (Postfix) with ESMTPS id 00789881 for ; Wed, 5 Nov 2014 16:51:41 +0000 (UTC) Received: from bugs.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.14.9/8.14.9) with ESMTP id sA5Gpehi001141 for ; Wed, 5 Nov 2014 16:51:40 GMT (envelope-from bugzilla-noreply@freebsd.org) From: bugzilla-noreply@freebsd.org To: freebsd-bugs@FreeBSD.org Subject: [Bug 194838] New: virtio: linux kvm kernel stack traces Date: Wed, 05 Nov 2014 16:51:41 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: new X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 10.0-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: ruben.kerkhof@gmail.com X-Bugzilla-Status: Needs Triage X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: freebsd-bugs@FreeBSD.org X-Bugzilla-Target-Milestone: --- X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_id short_desc product version rep_platform op_sys bug_status bug_severity priority component assigned_to reporter Message-ID: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: 7bit X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-bugs@freebsd.org X-Mailman-Version: 2.1.18-1 Precedence: list List-Id: Bug reports List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Wed, 05 Nov 2014 16:51:41 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=194838 Bug ID: 194838 Summary: virtio: linux kvm kernel stack traces Product: Base System Version: 10.0-RELEASE Hardware: Any OS: Any Status: Needs Triage Severity: Affects Some People Priority: --- Component: kern Assignee: freebsd-bugs@FreeBSD.org Reporter: ruben.kerkhof@gmail.com I work for a cloud provider and we run various version of FreeBSD under KVM (host is CentOS 6.5). When our customers enable pf, the host logs the following stack trace: ------------[ cut here ]------------ WARNING: at net/core/dev.c:1907 skb_warn_bad_offload+0xc2/0xf0() (Tainted: G W --------------- ) Hardware name: X9DR3-F 802.1Q VLAN Support: caps=(0x114825, 0x0) len=1618 data_len=0 ip_summed=0 Modules linked in: dm_snapshot ebt_log ebt_ip6 ebt_arp ebt_ip ebtable_filter ebtable_nat ebtables ipmi_devintf cpufreq_ondemand acpi_cpufreq freq_table mperf bridge bonding 8021q garp stp llc ipt_REJECT nf_conntrack_ipv4 nf_defrag_ipv4 iptable_filter xt_NOTRACK iptable_raw ip_tables ip6t_REJECT nf_conntrack_ipv6 nf_defrag_ipv6 xt_state nf_conntrack xt_comment ip6table_filter ip6_tables ipv6 xt_limit ebt_limit vhost_net macvtap macvlan tun kvm_intel kvm microcode acpi_pad sg ses enclosure sb_edac edac_core i2c_i801 lpc_ich mfd_core ioatdma igb dca i2c_algo_bit i2c_core ptp pps_core ext4 jbd2 mbcache sd_mod crc_t10dif megaraid_sas wmi dm_mirror dm_region_hash dm_log dm_mod [last unloaded: scsi_wait_scan] Pid: 32328, comm: vhost-32324 Tainted: G W --------------- 2.6.32-431.17.1.el6.x86_64 #1 Call Trace: [] ? warn_slowpath_common+0x87/0xc0 [] ? warn_slowpath_fmt+0x46/0x50 [] ? skb_warn_bad_offload+0xc2/0xf0 [] ? _read_unlock_bh+0x15/0x20 [] ? __skb_gso_segment+0x71/0xc0 [] ? skb_gso_segment+0x13/0x20 [] ? dev_hard_start_xmit+0x9b/0x480 [] ? br_dev_queue_push_xmit+0x0/0xc0 [bridge] [] ? dev_queue_xmit+0x1bd/0x320 [] ? br_dev_queue_push_xmit+0x88/0xc0 [bridge] [] ? br_forward_finish+0x58/0x60 [bridge] [] ? __br_forward+0xaa/0xd0 [bridge] [] ? nf_hook_slow+0x76/0x120 [] ? br_forward+0x5d/0x70 [bridge] [] ? br_handle_frame_finish+0x17b/0x2a0 [bridge] [] ? igb_poll+0xb66/0x1020 [igb] [] ? br_handle_frame+0x1aa/0x250 [bridge] [] ? __netif_receive_skb+0x529/0x750 [] ? dma_issue_pending_all+0x68/0xa0 [] ? process_backlog+0x9a/0x100 [] ? net_rx_action+0x103/0x2f0 [] ? __do_softirq+0xc1/0x1e0 [] ? call_softirq+0x1c/0x30 [] ? do_softirq+0x65/0xa0 [] ? netif_rx_ni+0x28/0x30 [] ? tun_sendmsg+0x229/0x4ec [tun] [] ? handle_tx+0x275/0x5e0 [vhost_net] [] ? handle_tx_kick+0x15/0x20 [vhost_net] [] ? vhost_worker+0xbc/0x140 [vhost_net] [] ? vhost_worker+0x0/0x140 [vhost_net] [] ? kthread+0x96/0xa0 [] ? child_rip+0xa/0x20 [] ? kthread+0x0/0xa0 [] ? child_rip+0x0/0x20 ---[ end trace 2ecb09f2dc7bf7a9 ]--- I found this on -hackers: http://comments.gmane.org/gmane.os.freebsd.devel.hackers/53927 but could not find an existing bug report in Bugzilla. I can reliably reproduce this on both amd64 and i386. Please let me know when more info is needed. -- You are receiving this mail because: You are the assignee for the bug.