kernel: br0: received packet on eth0 with own address as source address


Go to solution Solved by Arbadacarba,

Recommended Posts

Feb 14 21:52:45 Jupiter kernel: br0: received packet on eth0 with own address as source address (addr:a8:a1:59:89:af:49, vlan:0)

 

I get thousands of these messages a day…

 

I’ve looked through several pages of questions on the forum, and nothing has rung true as a solution.

 

Notes:

  • Running 6.10.0-rc2
  • Not Bonding any NICs
  • I am running pfsense in a VM, so there are mutlitple cables going from the server to the switch, but they have different IP addresses…
  • No special configuration on my switch that I can find

 

Attempted so far:

  • I tried shutting down the Docker and VM services… but still got them.
  • I disabled bridging, and they seemed to stop, but as soon as I re-enabled bridging they were back…

 

I’m fairly close to throwing in the towel and reinstalling everything from scratch.

 

Thanks for any help

 

jupiter-syslog-20220215-0300.zip

Link to comment

Yes, I had read that... I assumed that since the NIC was passed through to the VM (and the VM service is off) that it should not be interfering... 

 

I disconnected the two network cables that work with the pfsense box from the server (from ~420pm to 7pm) and still got that error... Along with a bunch of complaining about not having an internet connection (I assume)

 

 

 

jupiter-syslog-20220216-0022.zip

Link to comment

OK, Tried something new:

 

I reformatted the USB drive Using the Unraid USB Creator

 

Booted Fresh to a new copy of the OS with GUI and checked the logs (Attached)

jupiter-syslog-20220218-2039.zip

I also reset my Switch to factory new so there is no Port controlled VLAN

 

And Pulled the 2 port Intel Nic right out of the machine.

 

All still resulted in the error message spamming my Logs...

 

I did take a picture of the Unraid USB Creator configured for my USB drive:

image.thumb.png.ff9ead81587ffc85812a25aaf3ed6134.png

 

 

 

Link to comment
  • Solution

OK, Much like the Poster of that thread I was sent, my problem seems to have lain with the switch... I had reset the switch, so it wasn't a change I had made... But rather a default configuration of the TP-link switch... (TL-SG1016PE)

 

I turned OFF IGMP Snooping and it seems to have stopped the error.

 

Does this make sense? MAybe it has something to do with the multiple Dockers using the same connection? (No, It happened with NO dockers installed)

 

I will take a CLOSE look at my switching tonight and make sure that I do not have a loop, but honestly, I don't think I do (It's behind my server so I can't see it easily.

Link to comment
  • 8 months later...

I've been having the exact same issue as you and others on this forum, though I'm using a TrendNet TEG-30284 managed switch. Like you, no mirroring enabled on my switch.

 

Read your follow-up post and was excited by your progress with IGMP snooping. My switch has IGMP Snooping turned OFF by default to my initial dismay. In a last ditch effort to stop this error, I turned it ON. That stopped the error. Dude, what the hell? This is the opposite of your solution, and it seems to have worked.

Link to comment

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.
Note: Your post will require moderator approval before it will be visible.

Guest
Reply to this topic...

×   Pasted as rich text.   Restore formatting

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.