From owner-freebsd-net@freebsd.org Thu Jan 10 22:14:45 2019 Return-Path: Delivered-To: freebsd-net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id 9FC29149AC38 for ; Thu, 10 Jan 2019 22:14:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mailman.ysv.freebsd.org (mailman.ysv.freebsd.org [IPv6:2001:1900:2254:206a::50:5]) by mx1.freebsd.org (Postfix) with ESMTP id 3AABB723C1 for ; Thu, 10 Jan 2019 22:14:45 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: by mailman.ysv.freebsd.org (Postfix) id EF5A6149AC37; Thu, 10 Jan 2019 22:14:44 +0000 (UTC) Delivered-To: net@mailman.ysv.freebsd.org Received: from mx1.freebsd.org (mx1.freebsd.org [IPv6:2610:1c1:1:606c::19:1]) by mailman.ysv.freebsd.org (Postfix) with ESMTP id CCB68149AC36 for ; Thu, 10 Jan 2019 22:14:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from mxrelay.ysv.freebsd.org (mxrelay.ysv.freebsd.org [IPv6:2001:1900:2254:206a::19:3]) (using TLSv1.3 with cipher TLS_AES_256_GCM_SHA384 (256/256 bits) server-signature RSA-PSS (4096 bits) client-signature RSA-PSS (4096 bits) client-digest SHA256) (Client CN "mxrelay.ysv.freebsd.org", Issuer "Let's Encrypt Authority X3" (verified OK)) by mx1.freebsd.org (Postfix) with ESMTPS id 6A01F723BE for ; Thu, 10 Jan 2019 22:14:44 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org (kenobi.freebsd.org [IPv6:2001:1900:2254:206a::16:76]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (Client did not present a certificate) by mxrelay.ysv.freebsd.org (Postfix) with ESMTPS id 87A5E2BA6 for ; Thu, 10 Jan 2019 22:14:43 +0000 (UTC) (envelope-from bugzilla-noreply@freebsd.org) Received: from kenobi.freebsd.org ([127.0.1.118]) by kenobi.freebsd.org (8.15.2/8.15.2) with ESMTP id x0AMEhgJ085176 for ; Thu, 10 Jan 2019 22:14:43 GMT (envelope-from bugzilla-noreply@freebsd.org) Received: (from www@localhost) by kenobi.freebsd.org (8.15.2/8.15.2/Submit) id x0AMEhfV085175 for net@FreeBSD.org; Thu, 10 Jan 2019 22:14:43 GMT (envelope-from bugzilla-noreply@freebsd.org) X-Authentication-Warning: kenobi.freebsd.org: www set sender to bugzilla-noreply@freebsd.org using -f From: bugzilla-noreply@freebsd.org To: net@FreeBSD.org Subject: [Bug 226289] [igb] [netmap] Kernel NIC Driver conflict Date: Thu, 10 Jan 2019 22:14:42 +0000 X-Bugzilla-Reason: AssignedTo X-Bugzilla-Type: changed X-Bugzilla-Watch-Reason: None X-Bugzilla-Product: Base System X-Bugzilla-Component: kern X-Bugzilla-Version: 11.2-RELEASE X-Bugzilla-Keywords: X-Bugzilla-Severity: Affects Some People X-Bugzilla-Who: vmaffione@FreeBSD.org X-Bugzilla-Status: In Progress X-Bugzilla-Resolution: X-Bugzilla-Priority: --- X-Bugzilla-Assigned-To: net@FreeBSD.org X-Bugzilla-Flags: X-Bugzilla-Changed-Fields: bug_status Message-ID: In-Reply-To: References: Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Bugzilla-URL: https://bugs.freebsd.org/bugzilla/ Auto-Submitted: auto-generated MIME-Version: 1.0 X-BeenThere: freebsd-net@freebsd.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: Networking and TCP/IP with FreeBSD List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , X-List-Received-Date: Thu, 10 Jan 2019 22:14:45 -0000 https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=3D226289 Vincenzo Maffione changed: What |Removed |Added ---------------------------------------------------------------------------- Status|New |In Progress --- Comment #9 from Vincenzo Maffione --- Hi, I'm sorry, I saw this only now. Long story short: this looks like your netmap application behaving incorrec= tly, or is misconfigured, and netmap duly complaining about that. Netmap uses packet buffers of fixed size, which is 2048 by default (sysctl dev.netmap.buf_size, see netmap(4)). That piece of code (netmap_grab_packets) forwards packets from the netmap "= host TX ring" (associated to the interface igb1) and injects those into the Free= BSD kernel stack, so that kernel stack "thinks" that those packets are coming f= rom the igb1 link. Who puts packets in the igb1 "host TX ring"? Well, that's an userspace netm= ap application (maybe Suricata in your deployment? It's not clear from your description. You should check in your code who is opening netmap ports with nm_open(...) or ioctl(.., NIOCREGIF, ..). Unfortunately, some of the packets written to the host TX ring look larger = than the netmap buffer size, which means that Suricata (or whoever) is setting t= he len field (in struct netmap_slot) to something larger than 2048. This is clearly wrong, and those messages mean that netmap is complaining about tha= t. So the real question is: why is your application is doing that? If you don't find an answer for that of course you can increase dev.netmap.buf_size, e.g. double it to 4096 ... The real solution to your problem may be to simply disable TSO (TCP Segmentation Offloading) and LRO (Large receive offloading) in the network interfaces of your system (through ifconfig), because TSO and LRO are likely the reason why you see packets larger than the MTU (which I assume is 1500, since you said you are not using jumbo frames). Note that TSO and LRO should always be disabled when playing with netmap (r= ead the very end of netmap(4)). --=20 You are receiving this mail because: You are the assignee for the bug.=