public inbox for netdev@vger.kernel.org
 help / color / mirror / Atom feed
From: Ben Hutchings <bhutchings@solarflare.com>
To: Eric Dumazet <eric.dumazet@gmail.com>
Cc: Yann Dupont <Yann.Dupont@univ-nantes.fr>,
	"netdev@vger.kernel.org" <netdev@vger.kernel.org>,
	Herbert Xu <herbert@gondor.apana.org.au>
Subject: Re: skb_warn_bad_offload with kernel 3.5 (maybe gso/bridge related ?)
Date: Fri, 3 Aug 2012 16:40:08 +0100	[thread overview]
Message-ID: <1344008408.4642.160.camel@deadeye.wl.decadent.org.uk> (raw)
In-Reply-To: <1343983887.9299.817.camel@edumazet-glaptop>

On Fri, 2012-08-03 at 10:51 +0200, Eric Dumazet wrote:
> On Fri, 2012-08-03 at 10:10 +0200, Yann Dupont wrote:
> > Hello everybody,
> > 
> > I have a machine using ceph rbd volume, as a client (rbd module) to 
> > backup data.
> > 
> > I was running kernel 3.2.22 ok. Tried 3.5.0 because some rbd fixes went in.
> > 
> > Now, shortly after the start, my logs are filled by that :
> > 
> > Jul 31 18:15:01 singleton.u06.univ-nantes.prive kernel: [ 1175.780860] 
> > WARNING: at net/core/dev.c:1888 skb_warn_bad_offload+0xb6/0xc1()
> > Jul 31 18:15:01 singleton.u06.univ-nantes.prive kernel: [ 1175.780920] 
> > Hardware name: PowerEdge M605
> > Jul 31 18:15:01 singleton.u06.univ-nantes.prive kernel: [ 1175.780990] : 
> > caps=(0x0000000000005000, 0x0000000000000000) len=7292 data_len=5792 
> > gso_size=1448 gso_type=1 ip_summed=1
> > Jul 31 18:15:01 singleton.u06.univ-nantes.prive kernel: [ 1175.781071] 
> > Modules linked in: rbd libceph ipt_MASQUERADE iptable_nat nf_nat 
> > ipt_REJECT veth fuse xt_physdev xt_iprange xt_multiport ip6table_filter 
> > ip6_tables xt_LOG xt_limit xt_tcpudp xt_state iptable_filter ip_tables 
> > x_tables nf_conntrack_tftp nf_conntrack_ftp nf_conntrack_ipv4 
> > nf_defrag_ipv4 8021q bridge stp llc ext2 mbcache dm_round_robin 
> > dm_multipath scsi_dh nf_conntrack_ipv6 nf_conntrack nf_defrag_ipv6 ipv6 
> > powernow_k8 freq_table mperf kvm_amd snd_pcm kvm snd_timer snd soundcore 
> > snd_page_alloc tpm_tis tpm tpm_bios pcspkr evdev psmouse microcode 
> > joydev dcdbas shpchp i2c_nforce2 pci_hotplug serio_raw processor 
> > i2c_core hid_generic thermal_sys hed button xfs exportfs dm_mod ses 
> > enclosure usbhid hid sg sr_mod sd_mod cdrom usb_storage lpfc 
> > scsi_transport_fc scsi_tgt ohci_hcd bnx2x mptsas mptscsih bnx2 mptbase 
> > scsi_transport_sas crc32c scsi_mod libcrc32c mdio ehci_hcd [last 
> > unloaded: scsi_wait_scan]
> > Jul 31 18:15:01 singleton.u06.univ-nantes.prive kernel: [ 1175.785995] 
> > Pid: 0, comm: swapper/0 Not tainted 3.5.0-dsiun-120521 #5
> > Jul 31 18:15:01 singleton.u06.univ-nantes.prive kernel: [ 1175.786055] 
> > Call Trace:
> > Jul 31 18:15:01 singleton.u06.univ-nantes.prive kernel: [ 1175.786108]  
> > <IRQ>  [<ffffffff813bde00>] ? skb_warn_bad_offload+0x6f/0xc1
> > Jul 31 18:15:01 singleton.u06.univ-nantes.prive kernel: [ 1175.786209]  
> > [<ffffffff8103a109>] ? warn_slowpath_common+0x79/0xc0
> > Jul 31 18:15:01 singleton.u06.univ-nantes.prive kernel: [ 1175.786269]  
> > [<ffffffff8103a205>] ? warn_slowpath_fmt+0x45/0x50
> > Jul 31 18:15:01 singleton.u06.univ-nantes.prive kernel: [ 1175.786330]  
> > [<ffffffff81068647>] ? get_nohz_timer_target+0x57/0xd0
> > Jul 31 18:15:01 singleton.u06.univ-nantes.prive kernel: [ 1175.786390]  
> > [<ffffffff813bde47>] ? skb_warn_bad_offload+0xb6/0xc1
> > Jul 31 18:15:01 singleton.u06.univ-nantes.prive kernel: [ 1175.786452]  
> > [<ffffffff813110e7>] ? skb_gso_segment+0x207/0x280
[...]
> I dont know, maybe its more a GRO issue ?
>
> When a NIC delivers skbs with ip_summed set to CHECKSUM_UNNECESSARY,
> should resulting GRO packet have ip_summed set to CHECKSUM_PARTIAL ?

I think GRO is doing the right thing, and I can't think why we should
see ip_summed = CHECKSUM_PARTIAL if the skb is forwarded by a bridge.  I
think skb_gso_segment() now needs to handle CHECKSUM_UNNECESSARY
without warning, and it can be done somewhat more efficiently (as there
is no need to copy payload and generate checksums).

By the way, the warning in skb_gso_segment() is not new, even though I
changed it recently.  I don't know why it might have started being
triggered between 3.2 and 3.5.

Ben.

-- 
Ben Hutchings, Staff Engineer, Solarflare
Not speaking for my employer; that's the marketing department's job.
They asked us to note that Solarflare product names are trademarked.

  reply	other threads:[~2012-08-03 15:40 UTC|newest]

Thread overview: 9+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2012-08-03  8:10 skb_warn_bad_offload with kernel 3.5 (maybe gso/bridge related ?) Yann Dupont
2012-08-03  8:51 ` Eric Dumazet
2012-08-03 15:40   ` Ben Hutchings [this message]
2012-08-06  9:18     ` Herbert Xu
2012-08-06 10:50       ` Dmitry Kravkov
2012-08-06 10:57       ` Eric Dumazet
2012-08-06 13:42         ` Herbert Xu
2012-08-06 13:54           ` Eric Dumazet
2012-12-18 14:13   ` Yann Dupont

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=1344008408.4642.160.camel@deadeye.wl.decadent.org.uk \
    --to=bhutchings@solarflare.com \
    --cc=Yann.Dupont@univ-nantes.fr \
    --cc=eric.dumazet@gmail.com \
    --cc=herbert@gondor.apana.org.au \
    --cc=netdev@vger.kernel.org \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox