[dpdk-dev] [Bug 358] KNI packets dropped on ARM

bugzilla at dpdk.org bugzilla at dpdk.org
Mon Oct 28 15:53:49 CET 2019


https://bugs.dpdk.org/show_bug.cgi?id=358

            Bug ID: 358
           Summary: KNI packets dropped on ARM
           Product: DPDK
           Version: 19.08
          Hardware: ARM
                OS: Linux
            Status: UNCONFIRMED
          Severity: normal
          Priority: Normal
         Component: ethdev
          Assignee: dev at dpdk.org
          Reporter: michael.pfeiffer at tu-ilmenau.de
  Target Milestone: ---

Our DPDK application sends some management packets to a KNI device to be
processed by another applicton. This works fine on x86, but on an ARM Box
(Mellanox Bluefield, Kernel 4.20.17), all frames to the KNI are dropped,
including Pings, ARP, NDP, and so on.


The frames are still visible for tcpdump (and seem ok there), but are not
processed any further. A perf on del_skb gives the following backtrace:


> kni_single  9643 [015]   699.450949: skb:kfree_skb:
> skbaddr=0xffff8003fc406100 > protocol=0 location=0xffff000008c9f4bc
>         ffff000008c846b8 kfree_skb+0xc8 ([kernel.kallsyms])
>         ffff000008c846b8 kfree_skb+0xc8 ([kernel.kallsyms])
>         ffff000008c9f4bc __netif_receive_skb_core+0x674 ([kernel.kallsyms])
>         ffff000008c9fa04 __netif_receive_skb_one_core+0x4c
>         ([kernel.kallsyms])
>         ffff000008c9fab0 __netif_receive_skb+0x28 ([kernel.kallsyms])
>         ffff000008c9fbac process_backlog+0xa4 ([kernel.kallsyms])
>         ffff000008ca026c net_rx_action+0x10c ([kernel.kallsyms])
>         ffff000008081ce8 __softirqentry_text_start+0x118 ([kernel.kallsyms])
>         ffff0000080f0b7c do_softirq.part.3+0x54 ([kernel.kallsyms])
>         ffff0000080f0c74 do_softirq+0x24 ([kernel.kallsyms])
>         ffff000008c9e94c netif_rx_ni+0x124 ([kernel.kallsyms])
>         ffff000000e6b570 kni_net_rx_normal+0x1f8 ([rte_kni])
>         ffff000000e6c428 kni_net_rx+0x28 ([rte_kni])
>         ffff000000e6ab70 kni_thread_single+0x68 ([rte_kni])
>         ffff0000081109d4 kthread+0x134 ([kernel.kallsyms])
>         ffff000008085f54 ret_from_fork+0x10 ([kernel.kallsyms])


Please let me know if there is any further information I could provide.

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the dev mailing list