Hi,
I see that the issue still reproduced on newer kernels > 4.15.0-69, 
to fix the issue should get all the following upstream patches:

net/mlx5e: Rx, Fix checksum calculation for new hardware --> 
db849faa9bef993a1379dc510623f750a72fa7ce
 net/mlx5e: Rx, Check ip headers sanity - > 
0318a7b7fcad9765931146efa7ca3a034194737c
 net/mlx5e: Rx, Fixup skb checksum for packets with tail padding --> 
0aa1d18615c163f92935b806dcaff9157645233a
 net/mlx5e: XDP, Avoid checksum complete when XDP prog is loaded --> 
5d0bb3bac4b9f6c22280b04545626fdfd99edc6b
 mlx5: fix get_ip_proto() --> ef6fcd455278c2be3032a346cc66d9dd9866b787
 net/mlx5e: Allow reporting of checksum unnecessary --> 
b856df28f9230a47669efbdd57896084caadb2b3
 net/mlx5e: don't set CHECKSUM_COMPLETE on SCTP packets --> 
fe1dc069990c1f290ef6b99adb46332c03258f38
 net/mlx5e: Set ECN for received packets using CQE indication --> 
f007c13d4ad62f494c83897eda96437005df4a91
 net/mlx5e: Add likely to the common RX checksum flow --> 
63a612f984a1fae040ab6f1c6a0f1fdcdf1954b8 
 net/mlx5e: CHECKSUM_COMPLETE offload for VLAN/QinQ packets --> 
f938daeee95eb36ef6b431bf054a5cc6cdada112

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1840854

Title:
  mlx5_core reports hardware checksum error for padded packets on
  Mellanox NICs

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Bionic:
  Fix Released

Bug description:
  BugLink: https://bugs.launchpad.net/bugs/1840854

  [Impact]

  On machines equipped with Mellanox NIC's, in this particular case,
  Mellanox 5 series NICs using the mlx5_core driver, after installing
  4.15.0-56 or later there is the following kernel splat:

  bond0: hw csum failure
  CPU: 63 PID: 2473 Comm: in:imklog Tainted: P OE 4.15.0-58-generic 
#64~16.04.1-Ubuntu
  Call Trace:
  <IRQ>
  dump_stack+0x63/0x8b
  netdev_rx_csum_fault+0x38/0x40
  __skb_checksum_complete+0xc0/0xd0
  nf_ip_checksum+0xca/0xf0
  tcp_error+0xe0/0x1a0 [nf_conntrack]
  ? tcp_v4_rcv+0x7c6/0xa70
  nf_conntrack_in+0xde/0x520 [nf_conntrack]
  ipv4_conntrack_in+0x1c/0x20 [nf_conntrack_ipv4]
  nf_hook_slow+0x48/0xd0
  ? skb_send_sock+0x50/0x50
  ip_rcv+0x30f/0x370
  ? inet_del_offload+0x40/0x40
  __netif_receive_skb_core+0x879/0xba0
  ? tcp4_gro_receive+0x117/0x1b0
  __netif_receive_skb+0x18/0x60
  ? __netif_receive_skb+0x18/0x60
  netif_receive_skb_internal+0x45/0xf0
  napi_gro_receive+0xd0/0xf0
  mlx5e_handle_rx_cqe_mpwrq+0x4a1/0x8a0 [mlx5_core]
  mlx5e_poll_rx_cq+0xc3/0x880 [mlx5_core]
  mlx5e_napi_poll+0x9b/0x280 [mlx5_core]
  net_rx_action+0x265/0x3b0
  __do_softirq+0xf5/0x2a8
  irq_exit+0xca/0xd0
  do_IRQ+0x57/0xe0
  common_interrupt+0x8c/0x8c
  </IRQ>

  In 4.15.0-56, a commit was added from upstream -stable that introduced
  an optimisation for checksumming packets which have had zero bytes
  padded to the end of the packet.

  commit 88078d98d1bb085d72af8437707279e203524fa5
  Author: Eric Dumazet <eduma...@google.com>
  Date: Wed Apr 18 11:43:15 2018 -0700
  subject: net: pskb_trim_rcsum() and CHECKSUM_COMPLETE are friends

  You can read it here:
  
https://github.com/torvalds/linux/commit/88078d98d1bb085d72af8437707279e203524fa5

  It was discussed in this bugzilla link:
  https://bugzilla.kernel.org/show_bug.cgi?id=201849

  This commit causes problems with a number of NIC devices, including Mellanox.
  This is best described by the maintainer, Dimitris Michailidis:

  > > > MLNX devices have an issue with packets that are padded past the end of
  > > > the L3 payload with bytes that aren't all 0s. They use a mode of 
checksum
  > > > reporting which should be including the padding bytes but MLNX devices
  > > > leave those out. When the padding bytes aren't all 0 this omission 
causes
  > > > a checksum error. This device behavior has existed for a long time but 
it
  > > > has begun causing errors only this year. Before a padded packet had its
  > HW
  > > > checksum ignored so it wasn't material what HW had reported. More
  > recently
  > > > padded packet checksums started using the HW value and now it is
  > > > noticeable when that value isn't right.

  Now, some routers stick additional information in the zero padding
  section on occasion, which will change the hardware checksum. Since
  the hardware checksum was ignored until 4.15.0-56 with
  88078d98d1bb085d72af8437707279e203524fa5, this wasn't an issue. But
  with the optimisation, we start running into trouble since the
  hardware checksums no longer match what the kernel is expecting.

  [Fix]

  This was fixed for Mellanox 4 and 5 series drivers recently.

  Mellanox 4: 74abc07dee613086f9c0ded9e263ddc959a6de04
  
https://github.com/torvalds/linux/commit/74abc07dee613086f9c0ded9e263ddc959a6de04

  Mellanox 5: e8c8b53ccaff568fef4c13a6ccaf08bf241aa01a
  
https://github.com/torvalds/linux/commit/e8c8b53ccaff568fef4c13a6ccaf08bf241aa01a

  This customer hit the issue with mlx5_core driver, so the fix is:

  commit e8c8b53ccaff568fef4c13a6ccaf08bf241aa01a
  Author: Cong Wang <xiyou.wangc...@gmail.com>
  Date: Mon Dec 3 22:14:04 2018 -0800
  subject: net/mlx5e: Force CHECKSUM_UNNECESSARY for short ethernet frames

  This is actually present in 4.15.0-59, which is currently sitting in
  -proposed.

  The commits are a part of 4.9.156, 4.14.99, 4.19.21 upstream -stable
  releases, and have been pulled into bionic as a part of LP #1837664

  [Testcase]

  Simply try and bring an interface up on a machine with Mellanox series
  5 NICs.

  When a packet comes through which is smaller than required and padding
  is added, the problem will be triggered.

  The 4.15.0-59 from -proposed has been tested by the customer, and
  resolves the issue.

  [Regression Potential]

  This patch has a low chance of regression since it fixes a regression
  introduced by 88078d98d1bb085d72af8437707279e203524fa5 in 4.15.0-56.

  The changes are limited to mlx5_core driver, and have been well tested
  and accepted by the community due to their selection for upstream
  -stable.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1840854/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to