I am still seeing this issue with

Linux ___ 4.4.0-93-generic #116-Ubuntu SMP Fri Aug 11 21:17:51 UTC 2017
x86_64 x86_64 x86_64 GNU/Linux


[214343.266228] ------------[ cut here ]------------
[214343.266235] WARNING: CPU: 1 PID: 10743 at 
/build/linux-YyUNAI/linux-4.4.0/net/core/dev.c:2445 
skb_warn_bad_offload+0xd1/0x120()
[214343.266239] tg3: caps=(0x00000004000001b2, 0x0000000000000000) len=1444 
data_len=1402 gso_size=1376 gso_type=2 ip_summed=0
[214343.266241] Modules linked in: nf_conntrack_netlink nfnetlink binfmt_misc 
rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace fscache veth ipt_MASQUERADE 
nf_nat_masquerade_ipv4 xfrm_user xfrm_algo xt_addrtype iptable_filter 
xt_conntrack br_netfilter bridge stp llc aufs xt_nat xt_tcpudp iptable_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ip_tables 
x_tables hp_wmi gpio_ich sparse_keymap ppdev intel_powerclamp coretemp 
kvm_intel snd_hda_codec_realtek kvm snd_hda_codec_generic snd_hda_intel 
irqbypass snd_hda_codec snd_hda_core snd_hwdep snd_pcm snd_timer pl2303 snd 
usbserial soundcore input_leds serio_raw lpc_ich i7core_edac shpchp edac_core 
8250_fintek parport_pc tpm_infineon parport mac_hid ib_iser rdma_cm iw_cm ib_cm 
ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi
[214343.266302]  scsi_transport_iscsi sunrpc autofs4 btrfs raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq 
libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid nouveau 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel mxm_wmi video 
aes_x86_64 i2c_algo_bit lrw ttm gf128mul glue_helper ablk_helper drm_kms_helper 
syscopyarea cryptd firewire_ohci sysfillrect tg3 psmouse sysimgblt fb_sys_fops 
firewire_core ahci ptp libahci drm crc_itu_t pps_core wmi floppy fjes
[214343.266347] CPU: 1 PID: 10743 Comm: transmission-da Tainted: G        W I   
  4.4.0-93-generic #116-Ubuntu
[214343.266349] Hardware name: Hewlett-Packard HP Z600 Workstation/0B54h, BIOS 
786G4 v03.13 10/13/2010
[214343.266351]  0000000000000286 4281c02c793d7594 ffff880313a434c8 
ffffffff813f9f83
[214343.266355]  ffff880313a43510 ffffffff81d6f780 ffff880313a43500 
ffffffff810812f2
[214343.266358]  ffff88030f710300 ffff8803114c0000 0000000000000002 
ffff880310cbd6ac
[214343.266361] Call Trace:
[214343.266363]  <IRQ>  [<ffffffff813f9f83>] dump_stack+0x63/0x90
[214343.266373]  [<ffffffff810812f2>] warn_slowpath_common+0x82/0xc0
[214343.266376]  [<ffffffff8108138c>] warn_slowpath_fmt+0x5c/0x80
[214343.266381]  [<ffffffff814000a2>] ? ___ratelimit+0xa2/0xe0
[214343.266385]  [<ffffffff81735cd1>] skb_warn_bad_offload+0xd1/0x120
[214343.266388]  [<ffffffff817393dd>] __skb_gso_segment+0xfd/0x110
[214343.266391]  [<ffffffff8173971d>] 
validate_xmit_skb.isra.97.part.98+0x10d/0x2b0
[214343.266394]  [<ffffffff817398fb>] validate_xmit_skb_list+0x3b/0x60
[214343.266399]  [<ffffffff8175efca>] sch_direct_xmit+0x16a/0x220
[214343.266402]  [<ffffffff8173a00d>] __dev_queue_xmit+0x23d/0x590
[214343.266405]  [<ffffffff8173a370>] dev_queue_xmit+0x10/0x20
[214343.266410]  [<ffffffff817436e8>] neigh_resolve_output+0x118/0x1c0
[214343.266415]  [<ffffffff81779d76>] ip_finish_output2+0x146/0x380
[214343.266420]  [<ffffffffc081e23d>] ? ipv4_confirm+0x7d/0x100 
[nf_conntrack_ipv4]
[214343.266424]  [<ffffffff8177ad96>] ip_finish_output+0x136/0x1f0
[214343.266428]  [<ffffffff8176e3a3>] ? nf_hook_slow+0x73/0xd0
[214343.266431]  [<ffffffff8177b79e>] ip_output+0x6e/0xe0
[214343.266435]  [<ffffffff8177ac60>] ? 
__ip_flush_pending_frames.isra.41+0x90/0x90
[214343.266438]  [<ffffffff81777363>] ip_forward_finish+0x43/0x70
[214343.266441]  [<ffffffff81777729>] ip_forward+0x399/0x480
[214343.266444]  [<ffffffff81777320>] ? ip_frag_mem+0x50/0x50
[214343.266447]  [<ffffffff817753b2>] ip_rcv_finish+0x92/0x320
[214343.266450]  [<ffffffff81775ce1>] ip_rcv+0x291/0x3a0
[214343.266453]  [<ffffffff81775320>] ? inet_del_offload+0x40/0x40
[214343.266456]  [<ffffffff81737844>] __netif_receive_skb_core+0x704/0xa60
[214343.266467]  [<ffffffffc08049a0>] ? nf_conntrack_tuple_taken+0x1b0/0x1d0 
[nf_conntrack]
[214343.266474]  [<ffffffffc0703b07>] ? get_unique_tuple+0x147/0x630 [nf_nat]
[214343.266476]  [<ffffffff81737bb8>] __netif_receive_skb+0x18/0x60
[214343.266479]  [<ffffffff81737c32>] netif_receive_skb_internal+0x32/0xa0
[214343.266482]  [<ffffffff81737cbc>] netif_receive_skb+0x1c/0x70
[214343.266491]  [<ffffffffc086b404>] br_netif_receive_skb+0x34/0x50 [bridge]
[214343.266498]  [<ffffffffc086b77b>] br_handle_frame_finish+0x2bb/0x620 
[bridge]
[214343.266505]  [<ffffffffc08039bb>] ? __nf_ct_refresh_acct+0xab/0xc0 
[nf_conntrack]
[214343.266513]  [<ffffffffc086b4c0>] ? br_handle_local_finish+0xa0/0xa0 
[bridge]
[214343.266520]  [<ffffffffc086b4c0>] ? br_handle_local_finish+0xa0/0xa0 
[bridge]
[214343.266524]  [<ffffffffc08912d7>] NF_HOOK_THRESH+0x57/0xb0 [br_netfilter]
[214343.266531]  [<ffffffffc086b4c0>] ? br_handle_local_finish+0xa0/0xa0 
[bridge]
[214343.266535]  [<ffffffffc08921c9>] br_nf_pre_routing_finish+0x1a9/0x350 
[br_netfilter]
[214343.266542]  [<ffffffffc086b4c0>] ? br_handle_local_finish+0xa0/0xa0 
[bridge]
[214343.266545]  [<ffffffff8176e312>] ? nf_iterate+0x62/0x80
[214343.266549]  [<ffffffffc0892f61>] br_nf_pre_routing+0x2e1/0x440 
[br_netfilter]
[214343.266553]  [<ffffffffc0892020>] ? br_nf_forward_ip+0x480/0x480 
[br_netfilter]
[214343.266556]  [<ffffffff8176e312>] nf_iterate+0x62/0x80
[214343.266560]  [<ffffffff8176e3a3>] nf_hook_slow+0x73/0xd0
[214343.266567]  [<ffffffffc086bcba>] br_handle_frame+0x1da/0x2b0 [bridge]
[214343.266573]  [<ffffffff810b3b07>] ? can_migrate_task+0x287/0x2b0
[214343.266580]  [<ffffffffc086b4c0>] ? br_handle_local_finish+0xa0/0xa0 
[bridge]
[214343.266583]  [<ffffffff817374a4>] __netif_receive_skb_core+0x364/0xa60
[214343.266586]  [<ffffffff810b1d4f>] ? sched_clock_cpu+0x8f/0xa0
[214343.266590]  [<ffffffff810ab614>] ? check_preempt_curr+0x54/0x90
[214343.266592]  [<ffffffff810ab669>] ? ttwu_do_wakeup+0x19/0xe0
[214343.266595]  [<ffffffff81737bb8>] __netif_receive_skb+0x18/0x60
[214343.266598]  [<ffffffff817389a8>] process_backlog+0xa8/0x150
[214343.266601]  [<ffffffff817380fe>] net_rx_action+0x21e/0x360
[214343.266605]  [<ffffffff81052d0d>] ? lapic_next_event+0x1d/0x30
[214343.266609]  [<ffffffff81085dd1>] __do_softirq+0x101/0x290
[214343.266613]  [<ffffffff81844f0c>] do_softirq_own_stack+0x1c/0x30
[214343.266615]  <EOI>  [<ffffffff81085818>] do_softirq.part.19+0x38/0x40
[214343.266621]  [<ffffffff8108589d>] __local_bh_enable_ip+0x7d/0x80
[214343.266624]  [<ffffffff81779d89>] ip_finish_output2+0x159/0x380
[214343.266627]  [<ffffffff8177ad96>] ip_finish_output+0x136/0x1f0
[214343.266630]  [<ffffffff8176e3a3>] ? nf_hook_slow+0x73/0xd0
[214343.266633]  [<ffffffff8177b79e>] ip_output+0x6e/0xe0
[214343.266636]  [<ffffffff8177ac60>] ? 
__ip_flush_pending_frames.isra.41+0x90/0x90
[214343.266639]  [<ffffffff8177af65>] ip_local_out+0x35/0x40
[214343.266642]  [<ffffffff8177c169>] ip_send_skb+0x19/0x40
[214343.266645]  [<ffffffff817a3dd2>] udp_send_skb+0xb2/0x290
[214343.266648]  [<ffffffff817a4d27>] udp_sendmsg+0x307/0xae0
[214343.266653]  [<ffffffff813a06f1>] ? aa_sock_msg_perm+0x61/0x150
[214343.266657]  [<ffffffff817b26c5>] inet_sendmsg+0x65/0xa0
[214343.266660]  [<ffffffff8171aad8>] sock_sendmsg+0x38/0x50
[214343.266663]  [<ffffffff8171b0c1>] SYSC_sendto+0x101/0x190
[214343.266666]  [<ffffffff810ac650>] ? wake_up_q+0x70/0x70
[214343.266670]  [<ffffffff81003938>] ? syscall_trace_enter_phase1+0xc8/0x140
[214343.266673]  [<ffffffff8171bbde>] SyS_sendto+0xe/0x10
[214343.266677]  [<ffffffff818431f2>] entry_SYSCALL_64_fastpath+0x16/0x71
[214343.266680] ---[ end trace f83874bb052259ee ]---

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Zesty:
  Fix Released

Bug description:
  Even when the packet says checksum calculation is unnecessary the
  kernel will still check the checksum and display a warning that the
  checksum is bad.

  This has been fixed upstream in Kernel 4.11 by commit id:
  b2504a5dbef3305ef41988ad270b0e8ec289331c

  We have reports of Ubuntu 16.04 virtual machines (with ip forward
  enabled) displaying these warnings:

  
  [10480.074664] ------------[ cut here ]------------
  [10480.074667] WARNING: CPU: 1 PID: 0 at 
/build/linux-hwe-X3pKE5/linux-hwe-4.8.0/net/core/dev.c:2444 
skb_warn_bad_offload+0xd1/0x120
  [10480.074669] docker0: caps=(0x00000400ffbb78e9, 0x0000000000000000) 
len=2962 data_len=2834 gso_size=1448 gso_type=5 ip_summed=1
  [10480.074670] Modules linked in: veth nfsv3 nfs_acl rpcsec_gss_krb5 
auth_rpcgss nfsv4 nfs lockd grace sunrpc fscache ipt_MASQUERADE 
nf_nat_masquerade_ipv4 xfrm_user xfrm_algo iptable_nat nf_conntrack_ipv4 
nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype iptable_filter ip_tables xt_conntrack 
x_tables nf_nat nf_conntrack br_netfilter bridge stp llc aufs zfs(PO) 
zunicode(PO) zcommon(PO) znvpair(PO) spl(O) zavl(PO) crct10dif_pclmul 
crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw glue_helper 
ablk_helper cryptd input_leds joydev serio_raw i2c_piix4 mac_hid parport_pc 
ppdev lp parport autofs4 hid_generic usbhid hid virtio_scsi psmouse virtio_net 
pata_acpi floppy
  [10480.074695] CPU: 1 PID: 0 Comm: swapper/1 Tainted: P        W  O    
4.8.0-52-generic #55~16.04.1-Ubuntu
  [10480.074696] Hardware name: Nutanix AHV, BIOS seabios-1.7.5-11.el6 
04/01/2014
  [10480.074697]  0000000000000286 ec176c2ae03bc036 ffff8beef5643870 
ffffffffb7a2e7b3
  [10480.074699]  ffff8beef56438c0 0000000000000000 ffff8beef56438b0 
ffffffffb768314b
  [10480.074702]  0000098cb84fba80 ffff8bed61f82000 ffff8bee9915c000 
0000000000000005
  [10480.074704] Call Trace:
  [10480.074704]  <IRQ>  [<ffffffffb7a2e7b3>] dump_stack+0x63/0x90
  [10480.074708]  [<ffffffffb768314b>] __warn+0xcb/0xf0
  [10480.074710]  [<ffffffffb76831cf>] warn_slowpath_fmt+0x5f/0x80
  [10480.074713]  [<ffffffffb7a35012>] ? ___ratelimit+0xa2/0xf0
  [10480.074714]  [<ffffffffb7d7c681>] skb_warn_bad_offload+0xd1/0x120
  [10480.074716]  [<ffffffffb7d80d58>] __skb_gso_segment+0xd8/0x140
  [10480.074717]  [<ffffffffb7d811af>] validate_xmit_skb+0x14f/0x2a0
  [10480.074719]  [<ffffffffb7d81972>] __dev_queue_xmit+0x322/0x6d0
  [10480.074720]  [<ffffffffc03cd746>] ? nf_nat_ipv4_fn+0x1a6/0x230 
[nf_nat_ipv4]
  [10480.074723]  [<ffffffffb7d81d30>] dev_queue_xmit+0x10/0x20
  [10480.074725]  [<ffffffffb7dc5272>] ip_finish_output2+0x292/0x380
  [10480.074726]  [<ffffffffc040223d>] ? ipv4_confirm+0x7d/0x100 
[nf_conntrack_ipv4]
  [10480.074728]  [<ffffffffb7dc60a2>] ip_finish_output+0x132/0x1d0
  [10480.074729]  [<ffffffffb7db9703>] ? nf_hook_slow+0x73/0xd0
  [10480.074731]  [<ffffffffb7dc6aee>] ip_output+0x6e/0xf0
  [10480.074733]  [<ffffffffb7dc5f70>] ? 
__ip_flush_pending_frames.isra.40+0x90/0x90
  [10480.074736]  [<ffffffffb7dc2883>] ip_forward_finish+0x43/0x70
  [10480.074738]  [<ffffffffb7dc2c34>] ip_forward+0x384/0x480
  [10480.074739]  [<ffffffffb7dc2840>] ? ip_frag_mem+0x50/0x50
  [10480.074741]  [<ffffffffb7dc085b>] ip_rcv_finish+0x11b/0x400
  [10480.074743]  [<ffffffffb7dc11eb>] ip_rcv+0x28b/0x3c0
  [10480.074744]  [<ffffffffb7dc0740>] ? inet_del_offload+0x40/0x40
  [10480.074746]  [<ffffffffb7d7ec44>] __netif_receive_skb_core+0x524/0xab0
  [10480.074747]  [<ffffffffb780aaa7>] ? kmem_cache_alloc+0xd7/0x1b0
  [10480.074749]  [<ffffffffb7d6f7ca>] ? __build_skb+0x2a/0xe0
  [10480.074751]  [<ffffffffb7d7f1e8>] __netif_receive_skb+0x18/0x60
  [10480.074753]  [<ffffffffb7d7f262>] netif_receive_skb_internal+0x32/0xa0
  [10480.074754]  [<ffffffffb7d8025d>] napi_gro_receive+0xcd/0x120
  [10480.074756]  [<ffffffffc0286963>] virtnet_receive+0x1c3/0x970 [virtio_net]
  [10480.074758]  [<ffffffffb76b5e59>] ? update_cfs_rq_load_avg+0x1f9/0x4c0
  [10480.074760]  [<ffffffffc028712d>] virtnet_poll+0x1d/0x80 [virtio_net]
  [10480.074762]  [<ffffffffb7d7fa68>] net_rx_action+0x238/0x380
  [10480.074764]  [<ffffffffb7e9d406>] __do_softirq+0xf6/0x280
  [10480.074765]  [<ffffffffb7688eb3>] irq_exit+0xa3/0xb0
  [10480.074766]  [<ffffffffb7e9d164>] do_IRQ+0x54/0xd0
  [10480.074768]  [<ffffffffb7e9b242>] common_interrupt+0x82/0x82
  [10480.074768]  <EOI>  [<ffffffffb7664296>] ? native_safe_halt+0x6/0x10
  [10480.074772]  [<ffffffffb7637e9e>] default_idle+0x1e/0xd0
  [10480.074774]  [<ffffffffb763861f>] arch_cpu_idle+0xf/0x20
  [10480.074775]  [<ffffffffb76c7b3a>] default_idle_call+0x2a/0x40
  [10480.074776]  [<ffffffffb76c7e3a>] cpu_startup_entry+0x2ea/0x350
  [10480.074778]  [<ffffffffb76518b1>] start_secondary+0x151/0x190
  [10480.074781] ---[ end trace 3a9bd18de5564b05 ]---

  
  We have recompiled your latest 16.04.2 kernel with this patch and confirmed 
that this warning does not happen. Could you please consider including this fix 
in your next 16.04 LTS release?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to