[ovs-discuss] Could someone help me to confirm whether this is a bug of ovs or not?

ZHANG Zhiming zhangzhiming at yunshan.net.cn
Sun Dec 6 12:10:23 UTC 2015


Hi,

I have a private module named dfi hooked into OVS, and there is a userspace module with it. 
When the user space agent sends packets with size about 60000 bytes, the kernel prints some strange warnings.

Could some help me to confirm whether this is a OVS bug or not?
Thanks!

ovs-vsctl --version
ovs-vsctl (Open vSwitch) 2.3.1
Compiled Dec  6 2015 17:54:12
DB Schema 7.6.2


[ 6676.521563] WARNING: at net/core/dev.c:2191 skb_warn_bad_offload+0xcd/0xda()
[ 6676.521564] bnx2x: caps=(0x0000000383d949b3, 0x0000000000000000) len=60010 data_len=59968 gso_size=1480 gso_type=2 ip_summed=0
[ 6676.521565] Modules linked in: dfi(OF) fuse btrfs zlib_deflate raid6_pq xor vfat msdos fat ext4 mbcache jbd2 sch_sfq sch_htb cls_u32 sch_ingress vhost_net macvtap macvlan tun bridge ip6table_filter ip6_tables iptable_filter ip_tables act_mirred ifb uio ebtable_filter ebtables 8021q garp stp mrp llc openvswitch(OF) vxlan ip_tunnel gre sg ipmi_devintf iTCO_wdt iTCO_vendor_support dcdbas bnx2x coretemp kvm_intel ixgbe kvm mdio crct10dif_pclmul crc32_pclmul crc32c_intel ghash_clmulni_intel tg3 ptp aesni_intel lrw gf128mul glue_helper ablk_helper cryptd pps_core mei_me mei dca pcspkr wmi sb_edac edac_core ipmi_si ipmi_msghandler lpc_ich mfd_core shpchp acpi_pad nfsd acpi_power_meter mperf auth_rpcgss nfs_acl lockd sunrpc binfmt_misc xfs libcrc32c sr_mod cdrom sd_mod crc_t10dif crct10dif_common mgag200
[ 6676.521597]  syscopyarea sysfillrect sysimgblt i2c_algo_bit drm_kms_helper ttm ahci drm libahci libata i2c_core megaraid_sas dm_mirror dm_region_hash dm_log dm_mod [last unloaded: dfi]
[ 6676.521604] CPU: 3 PID: 26954 Comm: ovs-dfi-agent Tainted: GF       W  O--------------   3.10.0-123.el7.x86_64 #1
[ 6676.521605] Hardware name: Dell Inc. PowerEdge R720/0DCWD1, BIOS 2.2.2 01/16/2014
[ 6676.521606]  ffff8804a49a55d8 00000000a5306ab9 ffff8804a49a5590 ffffffff815e0fb8
[ 6676.521608]  ffff8804a49a55c8 ffffffff8105de21 ffff880c4255d900 ffff880bf992c000
[ 6676.521610]  0000000000000002 0000000000000000 ffff880c4255d900 ffff8804a49a5630
[ 6676.521612] Call Trace:
[ 6676.521614]  [<ffffffff815e0fb8>] dump_stack+0x19/0x1b
[ 6676.521617]  [<ffffffff8105de21>] warn_slowpath_common+0x61/0x80
[ 6676.521620]  [<ffffffff8105de9c>] warn_slowpath_fmt+0x5c/0x80
[ 6676.521622]  [<ffffffff812bdea3>] ? ___ratelimit+0x93/0x100
[ 6676.521625]  [<ffffffff815e3eb2>] skb_warn_bad_offload+0xcd/0xda
[ 6676.521627]  [<ffffffff814d0c79>] __skb_gso_segment+0x79/0xb0
[ 6676.521629]  [<ffffffff814d0f6a>] dev_hard_start_xmit+0x18a/0x570
[ 6676.521632]  [<ffffffff814f031e>] sch_direct_xmit+0xee/0x1c0
[ 6676.521634]  [<ffffffff814d1548>] dev_queue_xmit+0x1f8/0x4a0
[ 6676.521638]  [<ffffffffa047573b>] netdev_send+0x4b/0xc0 [openvswitch]
[ 6676.521642]  [<ffffffffa0473ddf>] ovs_vport_send+0x1f/0xa0 [openvswitch]
[ 6676.521645]  [<ffffffffa04691aa>] do_output+0x2a/0x50 [openvswitch]
[ 6676.521648]  [<ffffffffa0469b2c>] do_execute_actions+0x41c/0xcc0 [openvswitch]
[ 6676.521651]  [<ffffffffa046a437>] ovs_execute_actions+0x67/0x100 [openvswitch]
[ 6676.521655]  [<ffffffffa046d68e>] ovs_dp_process_packet_with_key+0x9e/0x180 [openvswitch]
[ 6676.521657]  [<ffffffffa06c900d>] ? dfi_drop+0x8d/0xc0 [dfi]
[ 6676.521661]  [<ffffffffa046d7d4>] ovs_dp_process_received_packet+0x64/0x90 [openvswitch]
[ 6676.521665]  [<ffffffffa0473dba>] ovs_vport_receive+0x2a/0x30 [openvswitch]
[ 6676.521668]  [<ffffffffa0474a8d>] internal_dev_xmit+0x1d/0x30 [openvswitch]
[ 6676.521670]  [<ffffffff814d10f8>] dev_hard_start_xmit+0x318/0x570
[ 6676.521672]  [<ffffffff8150bf90>] ? ip_forward_options+0x1c0/0x1c0
[ 6676.521674]  [<ffffffff814d1680>] dev_queue_xmit+0x330/0x4a0
[ 6676.521676]  [<ffffffff8150bf90>] ? ip_forward_options+0x1c0/0x1c0
[ 6676.521678]  [<ffffffff8150d361>] ip_finish_output+0x2e1/0x3c0
[ 6676.521680]  [<ffffffff8150e798>] ip_output+0x58/0x90
[ 6676.521682]  [<ffffffff8150ded2>] ? __ip_local_out+0xa2/0xb0
[ 6676.521684]  [<ffffffff8150df05>] ip_local_out+0x25/0x30
[ 6676.521686]  [<ffffffff8150f275>] ip_send_skb+0x15/0x50
[ 6676.521688]  [<ffffffff81534ee2>] udp_send_skb+0x2b2/0x380
[ 6676.521690]  [<ffffffff8150c680>] ? ip_copy_metadata+0x170/0x170
[ 6676.521693]  [<ffffffff81535e77>] udp_sendmsg+0x2f7/0xa10
[ 6676.521695]  [<ffffffff814b97ba>] ? sock_def_readable+0x3a/0x70
[ 6676.521698]  [<ffffffff81574363>] ? unix_dgram_sendmsg+0x5d3/0x640
[ 6676.521700]  [<ffffffff815420b4>] inet_sendmsg+0x64/0xb0
[ 6676.521703]  [<ffffffff814b6f30>] sock_sendmsg+0xb0/0xf0
[ 6676.521705]  [<ffffffff8154bc26>] ? fib_table_lookup+0x2e6/0x390
[ 6676.521708]  [<ffffffff814b74a1>] SYSC_sendto+0x121/0x1c0
[ 6676.521711]  [<ffffffff815e62c8>] ? __schedule+0x2d8/0x7b0
[ 6676.521713]  [<ffffffff814b7f2e>] SyS_sendto+0xe/0x10
[ 6676.521715]  [<ffffffff815f1699>] system_call_fastpath+0x16/0x1b
[ 6676.521716] ---[ end trace 9eb243d0b823fed8 ]---




ZHANG Zhiming
Yunshan Networks
-------------- next part --------------
An HTML attachment was scrubbed...
URL: <http://openvswitch.org/pipermail/ovs-discuss/attachments/20151206/e4bc14de/attachment-0002.html>


More information about the discuss mailing list