From mboxrd@z Thu Jan 1 00:00:00 1970 From: Vasily Evseenko Subject: Re: domU crash with kernel BUG at drivers/net/xen-netfront.c:305 Date: Tue, 31 Dec 2013 18:23:54 +0400 Message-ID: <52C2D37A.1020000@gmail.com> References: <52BD5FDD.6060009@gmail.com> <20131227115345.GR25969@zion.uk.xensource.com> <52BD70B6.7040300@gmail.com> Mime-Version: 1.0 Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Return-path: In-Reply-To: List-Unsubscribe: , List-Post: List-Help: List-Subscribe: , Sender: xen-devel-bounces@lists.xen.org Errors-To: xen-devel-bounces@lists.xen.org To: William Dauchy Cc: Wei Liu , xen-devel List-Id: xen-devel@lists.xenproject.org I've found workaround: Run "ethtool -K vifX.Y tx off tso off gso off" on dom0 side (in addition to "ethtool -K eth0 tx off tso off gso off" on domU). Disabling offloading only in domU is not sufficient. On 12/31/2013 04:56 PM, William Dauchy wrote: > On Fri, Dec 27, 2013 at 1:21 PM, Vasily Evseenko wrote: >> There are no clear steps to reproduce. >> Bug triggered only by high tcp network load (webserver pattern - many >> small connections) every one - two days. >> See xen, dom0 and domU's info in attachment. I can provide any >> additional info. >> I've tried dom0/domU kernels 3.10.23 (vanilla, from centos-xen) and >> 3.10.25, xen 4.2.3 and 4.3.1. > maybe testing with kmemleak enabled on the domU will help getting more info.