On 31.10.2018 05:08, Andre Tomt wrote:
On 30.10.2018 12:04, Andre Tomt wrote:
On 30.10.2018 11:58, Andre Tomt wrote:
On 27.10.2018 23:41, Andre Tomt wrote:
On 26.10.2018 13:45, Andre Tomt wrote:
On 25.10.2018 19:38, Eric Dumazet wrote:
On 10/24/2018 12:41 PM, Andre Tomt wrote:
It eventually showed up again with mlx4, on 4.18.16 + fix and
also on 4.19. I still do not have a useful packet capture.
It is running a torrent client serving up various linux
distributions.
Have you also applied this fix ?
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=db4f1be3ca9b0ef7330763d07bf4ace83ad6f913
No. I've applied it now to 4.19 and will report back if anything
shows up.
Just hit it on the simpler server; no VRF, no tunnels, no
nat/conntrack. Only a basic stateless nftables ruleset and a vlan
netdev (unlikely to be the one triggering this I guess; it has only
v4 traffic).
I'm currently testing 4.19 with the recomended commit added, plus
these to sort out some GRO issues (on a hunch, unsure if related):
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=a8305bff685252e80b7c60f4f5e7dd2e63e38218
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=992cba7e276d438ac8b0a8c17b147b37c8c286f7
https://git.kernel.org/pub/scm/linux/kernel/git/davem/net.git/commit/?id=ece23711dd956cd5053c9cb03e9fe0668f9c8894
and I *think* it is behaving better now? it's not conclusive as it
could take a while to trip in this environment but some of the test
servers have not shown anything bad in almost 24h.
Sorry, s/some of the/none of the
I think it is fairly safe to say 4.19 + mlx4 + these 4 commits is OK. At
least for my workload. Servers are now 51-61 hours in, no splats. I also
added ntp pool traffic to one of them to make things a little more
exciting.
Not sure what is needed for 4.18, I dont have the mental bandwidth to
test that right now. Also no idea about the similar looking mlx5 splats
reported elsewhere.
As expected conntrack/nat + vlan + forwarding still splats.
sch_cake, IFB and VRF was removed from this setup.
Here is a conntrack splat without IFB/VRF/Cake inteference:
[34458.506346] wanib: hw csum failure
[34458.506371] CPU: 1 PID: 0 Comm: swapper/1 Not tainted 4.19.0-1 #1
[34458.506374] Hardware name: Supermicro Super Server/X10SDV-4C-TLN2F, BIOS 2.0
06/13/2018
[34458.506377] Call Trace:
[34458.506381] <IRQ>
[34458.506388] dump_stack+0x5c/0x80
[34458.506392] __skb_checksum_complete+0xac/0xc0
[34458.506402] icmp_error+0x1c8/0x1f0 [nf_conntrack]
[34458.506406] ? skb_copy_bits+0x13d/0x220
[34458.506411] nf_conntrack_in+0xd8/0x390 [nf_conntrack]
[34458.506416] ? ___pskb_trim+0x192/0x330
[34458.506421] nf_hook_slow+0x43/0xc0
[34458.506426] ip_rcv+0x90/0xb0
[34458.506430] ? ip_rcv_finish_core.isra.0+0x310/0x310
[34458.506435] __netif_receive_skb_one_core+0x42/0x50
[34458.506438] netif_receive_skb_internal+0x24/0xb0
[34458.506441] napi_gro_frags+0x177/0x210
[34458.506446] mlx4_en_process_rx_cq+0x8df/0xb50 [mlx4_en]
[34458.506459] ? mlx4_eq_int+0x38f/0xcb0 [mlx4_core]
[34458.506463] mlx4_en_poll_rx_cq+0x55/0xf0 [mlx4_en]
[34458.506466] net_rx_action+0xe1/0x2c0
[34458.506469] __do_softirq+0xe7/0x2d3
[34458.506475] irq_exit+0x96/0xd0
[34458.506478] do_IRQ+0x85/0xd0
[34458.506483] common_interrupt+0xf/0xf
[34458.506486] </IRQ>
[34458.506491] RIP: 0010:cpuidle_enter_state+0xb9/0x320
[34458.506495] Code: e8 3c 16 bc ff 80 7c 24 0b 00 74 17 9c 58 0f 1f 44 00 00 f6 c4
02 0f 85 3b 02 00 00 31 ff e8 5e fb c0 ff fb 66 0f 1f 44 00 00 <48> b8 ff ff ff
ff f3 01 00 00 48 2b 1c 24 ba ff ff ff 7f 48 39 c3
[34458.506497] RSP: 0018:ffff978d41943ea8 EFLAGS: 00000246 ORIG_RAX:
ffffffffffffffdb
[34458.506500] RAX: ffff8d8f6fa60fc0 RBX: 00001f56ff07af28 RCX: 000000000000001f
[34458.506501] RDX: 00001f56ff07af28 RSI: 000000003a2e90d6 RDI: 0000000000000000
[34458.506503] RBP: ffff8d8f6fa698c0 R08: 0000000000000002 R09: 0000000000020840
[34458.506504] R10: 0004ea58f2899595 R11: ffff8d8f6fa601e8 R12: 0000000000000001
[34458.506505] R13: ffffffff8a0ac638 R14: 0000000000000001 R15: 0000000000000000
[34458.506509] ? cpuidle_enter_state+0x94/0x320
[34458.506512] do_idle+0x1e4/0x220
[34458.506515] cpu_startup_entry+0x5f/0x70
[34458.506519] start_secondary+0x185/0x1a0
[34458.506521] secondary_startup_64+0xa4/0xb0
Stateless filtered non-forwarding host still looks like it has been
fixed (the udp6_gro_* splats are still all gone). Also seems fine when
moving the traffic over a vlan device. These fixes went into 4.19.1-rc1
(checksum_complete + unlink gro packets on overflow fixes)