Hi, A quick note on this patch: I have confirmed that without this patch a kernel crash occurs if we force a 'packet too short' error sufficiently many times. This patch eliminates the kernel crash. Since this crash would be triggered by a hypervisor bug, I made a small change not reflected in the above patch to make the crash easier to reproduce for testing purposes. I treated 1 out of every 128 packets with len < MERGE_BUFFER_LEN as 'too short'. With this change in place, just running netperf will cause the sender to crash very quickly (the receiver will transmit pure data ACKs that meet the drop criteria). If anyone would like to reproduce the crash using the above setup, I added an unsigned int num_packets field to struct receive_queue and changed the if condition for the packet too short check in receive_buf() from: if (unlikely(len < sizeof(struct virtio_net_hdr) + ETH_HLEN)) { to: if (unlikely((len < sizeof(struct virtio_net_hdr) + ETH_HLEN) || (len < MERGE_BUFFER_LEN && ((++rq->num_packets & 127) == 0)))) { Best, Mike _______________________________________________ Virtualization mailing list Virtualization@xxxxxxxxxxxxxxxxxxxxxxxxxx https://lists.linuxfoundation.org/mailman/listinfo/virtualization