[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <CAM_iQpXLNyHG1qo8y-53ZRwyeL30v0JANFWfK=2b58L8vpQMbw@mail.gmail.com>
Date: Wed, 31 Oct 2018 14:17:40 -0700
From: Cong Wang <xiyou.wangcong@...il.com>
To: Saeed Mahameed <saeedm@...lanox.com>
Cc: Eric Dumazet <eric.dumazet@...il.com>,
Paweł Staszewski <pstaszewski@...are.pl>,
Linux Kernel Network Developers <netdev@...r.kernel.org>,
dmichail@...gle.com
Subject: Re: Latest net-next kernel 4.19.0+
On Wed, Oct 31, 2018 at 2:05 PM Saeed Mahameed <saeedm@...lanox.com> wrote:
>
> Cong, How often does this happen ? can you some how verify if the
> problematic packet has extra end padding after the ip payload ?
For us, we need 10+ hours to get one warning. This is also
why we never capture the packet that causes this warning.
>
> It would be cool if we had a feature in kernel to store such SKB in
> memory when such issue occurs, and let the user dump it later (via
> tcpdump) and send the dump to the vendor for debug so we could just
> replay and see what happens.
>
Yeah, the warning kinda sucks, it tells almost nothing, the SKB
should be dumped up on this warning.
Powered by blists - more mailing lists