I'm still seeing this in the latest 4.10, 4.11, 4.13 and 4.15 (from mainline).
Dec 10 23:09:05 infra1 kernel: [ 571.226805] RIP: 0010:skb_warn_bad_offload+0xb7/0xf0 Dec 10 23:09:05 infra1 kernel: [ 571.226810] FS: 0000000000000000(0000) GS:ffff97c25eb80000(0000) knlGS:0000000000000000 Dec 10 23:09:05 infra1 kernel: [ 571.226818] ipt_do_table+0x2eb/0x5f0 [ip_tables] Dec 10 23:09:05 infra1 kernel: [ 571.226829] nf_hook_slow+0x42/0xb0 Dec 10 23:09:05 infra1 kernel: [ 571.226849] ? br_dev_queue_push_xmit+0x140/0x140 [bridge] Dec 10 23:09:05 infra1 kernel: [ 571.226866] br_handle_frame_finish+0x2a4/0x540 [bridge] Dec 10 23:09:05 infra1 kernel: [ 571.226881] ? iptable_nat_ipv4_in+0x15/0x20 [iptable_nat] Dec 10 23:09:05 infra1 kernel: [ 571.226895] __netif_receive_skb+0x18/0x60 Dec 10 23:09:05 infra1 kernel: [ 571.226906] common_interrupt+0x93/0x93 Dec 10 23:09:05 infra1 kernel: [ 571.226912] R10: ffffbc4f00cf3e40 R11: 000000000000012b R12: ffff97c25eba4e30 Dec 10 23:09:05 infra1 kernel: [ 571.226921] secondary_startup_64+0xa5/0xa5 Dec 10 23:09:15 infra1 kernel: [ 582.507590] CPU: 0 PID: 20250 Comm: apache2 Tainted: G W 4.14.5-041405-generic #201712101332 Dec 10 23:09:15 infra1 kernel: [ 582.507595] RBP: ffff97c25ea036e0 R08: 0000000000000001 R09: 0000000000000c10 Dec 10 23:09:15 infra1 kernel: [ 582.507599] Call Trace: Dec 10 23:09:15 infra1 kernel: [ 582.507610] iptable_mangle_hook+0x37/0x110 [iptable_mangle] Dec 10 23:09:15 infra1 kernel: [ 582.507622] br_forward_finish+0x9d/0xb0 [bridge] Dec 10 23:09:15 infra1 kernel: [ 582.507631] br_nf_forward_ip+0x30c/0x430 [br_netfilter] Dec 10 23:09:15 infra1 kernel: [ 582.507641] br_forward+0x97/0xa0 [bridge] Dec 10 23:09:15 infra1 kernel: [ 582.507650] ? br_pass_frame_up+0x150/0x150 [bridge] Dec 10 23:09:15 infra1 kernel: [ 582.507659] br_handle_frame+0x1ec/0x300 [bridge] Dec 10 23:09:15 infra1 kernel: [ 582.507667] net_rx_action+0x13b/0x380 Dec 10 23:09:15 infra1 kernel: [ 582.507678] ip_finish_output2+0x172/0x3a0 Dec 10 23:09:15 infra1 kernel: [ 582.507684] ip_local_out+0x35/0x40 Dec 10 23:09:15 infra1 kernel: [ 582.507692] tcp_sendmsg_locked+0xb4c/0xe90 Dec 10 23:09:15 infra1 kernel: [ 582.507699] do_iter_write+0x86/0x190 Dec 10 23:09:15 infra1 kernel: [ 582.507708] do_syscall_64+0x61/0x120 Dec 10 23:09:15 infra1 kernel: [ 582.507712] RBP: 00007f906c1800b0 R08: 00007f906c1807e0 R09: 00007f906c1802c8 Dec 10 23:09:15 infra1 kernel: [ 582.528496] Hardware name: Dell Inc. OptiPlex 9020/00V62H, BIOS A09 11/20/2014 Dec 10 23:09:15 infra1 kernel: [ 582.528501] RBP: ffff97c25ea036e0 R08: 0000000000000001 R09: 0000000000000c75 Dec 10 23:09:15 infra1 kernel: [ 582.528505] Call Trace: Dec 10 23:09:15 infra1 kernel: [ 582.528517] iptable_mangle_hook+0x37/0x110 [iptable_mangle] Dec 10 23:09:15 infra1 kernel: [ 582.528530] ? br_dev_queue_push_xmit+0x140/0x140 [bridge] Dec 10 23:09:15 infra1 kernel: [ 582.528543] ? br_dev_queue_push_xmit+0x140/0x140 [bridge] Dec 10 23:09:15 infra1 kernel: [ 582.528554] ? br_dev_queue_push_xmit+0x140/0x140 [bridge] Dec 10 23:09:15 infra1 kernel: [ 582.528568] br_nf_pre_routing_finish+0x13b/0x3b0 [br_netfilter] Dec 10 23:09:15 infra1 kernel: [ 582.528577] nf_hook_slow+0x42/0xb0 Dec 10 23:09:15 infra1 kernel: [ 582.528590] ? __netif_receive_skb+0x18/0x60 Dec 10 23:09:15 infra1 kernel: [ 582.528600] do_softirq.part.17+0x4e/0x50 Dec 10 23:09:15 infra1 kernel: [ 582.528609] ip_output+0x70/0xe0 Dec 10 23:09:15 infra1 kernel: [ 582.528619] __tcp_push_pending_frames+0x35/0xd0 Dec 10 23:09:15 infra1 kernel: [ 582.528627] sock_write_iter+0x8c/0xf0 Dec 10 23:09:15 infra1 kernel: [ 582.528637] ? do_writev+0x61/0xf0 Dec 10 23:09:15 infra1 kernel: [ 582.528645] RAX: ffffffffffffffda RBX: 0000000000001269 RCX: 00007f90736b2fbd Dec 10 23:09:15 infra1 kernel: [ 582.528668] ---[ end trace 7229c85888453410 ]--- Dec 10 23:09:16 infra1 kernel: [ 582.556414] Hardware name: Dell Inc. OptiPlex 9020/00V62H, BIOS A09 11/20/2014 Dec 10 23:09:16 infra1 kernel: [ 582.556420] RDX: 0000000000000000 RSI: ffff97c25ea4dc98 RDI: ffff97c25ea4dc98 Dec 10 23:09:16 infra1 kernel: [ 582.556424] CS: 0010 DS: 0000 ES: 0000 CR0: 0000000080050033 Dec 10 23:09:16 infra1 kernel: [ 582.556433] checksum_tg+0x22/0x29 [xt_CHECKSUM] Dec 10 23:09:16 infra1 kernel: [ 582.556444] nf_hook_slow+0x42/0xb0 Dec 10 23:09:16 infra1 kernel: [ 582.556459] br_forward_finish+0x9d/0xb0 [bridge] Dec 10 23:09:16 infra1 kernel: [ 582.556472] ? br_dev_queue_push_xmit+0x140/0x140 [bridge] Dec 10 23:09:16 infra1 kernel: [ 582.556483] ? br_dev_queue_push_xmit+0x140/0x140 [bridge] Dec 10 23:09:16 infra1 kernel: [ 582.556498] ? br_pass_frame_up+0x150/0x150 [bridge] Dec 10 23:09:16 infra1 kernel: [ 582.556509] ? br_nf_forward_arp+0x250/0x250 [br_netfilter] Dec 10 23:09:16 infra1 kernel: [ 582.556522] ? wake_up_process+0x15/0x20 Dec 10 23:09:16 infra1 kernel: [ 582.556534] do_softirq_own_stack+0x2a/0x40 Dec 10 23:09:16 infra1 kernel: [ 582.556544] ? ip_finish_output+0x190/0x250 Dec 10 23:09:16 infra1 kernel: [ 582.556555] tcp_transmit_skb+0x539/0x9e0 Dec 10 23:09:16 infra1 kernel: [ 582.556563] tcp_sendmsg+0x2c/0x50 Dec 10 23:09:16 infra1 kernel: [ 582.556573] do_iter_write+0x86/0x190 Dec 10 23:09:16 infra1 kernel: [ 582.556584] entry_SYSCALL64_slow_path+0x25/0x25 Dec 10 23:09:16 infra1 kernel: [ 582.556590] R10: 000055bf0d4e7320 R11: 0000000000000293 R12: 0000000000000005 Dec 10 23:09:16 infra1 kernel: [ 582.557587] RDX: 0000000000000003 RSI: 00007f9066ffc860 RDI: 0000000000000013 Dec 10 23:09:16 infra1 kernel: [ 582.557589] R10: 000055bf0d4e7320 R11: 0000000000000293 R12: 0000000000000003 Dec 10 23:09:16 infra1 kernel: [ 582.557592] 48 c7 c0 Dec 10 23:09:16 infra1 kernel: [ 582.557594] d8 01 Dec 10 23:09:16 infra1 kernel: [ 582.557597] ---[ end trace 7229c85888453412 ]--- -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1715609 Title: kernel warning: skb_warn_bad_offload Status in linux package in Ubuntu: In Progress Status in linux source package in Xenial: In Progress Status in linux source package in Zesty: In Progress Bug description: Since upgrading to kernel version 4.10.0-33.37, we're seeing a lot of call traces triggered by skb_warn_bad_offload in the syslog. Regression introduced when fixing this bug? https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447 kernel: [570943.494444] ------------[ cut here ]------------ kernel: [570943.494448] WARNING: CPU: 3 PID: 21982 at /build/linux-hwe-YA6IuF/linux-hwe-4.10.0/net/core/dev.c:2576 skb_warn_bad_offload+0xd1/0x120 kernel: [570943.494450] e1000e: caps=(0x00000030002149a9, 0x0000000000000000) len=1701 data_len=1659 gso_size=1480 gso_type=2 ip_summed=0 kernel: [570943.494451] Modules linked in: udp_diag tcp_diag inet_diag echainiv authenc xfrm4_mode_tunnel xt_state binfmt_misc veth xfrm_user xfrm4_tunnel tunnel4 ipcomp xfrm_ipcomp esp4 ah4 af_key xfrm_algo bridge stp llc iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat ipt_REJECT nf_reject_ipv4 xt_tcpudp nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack iptable_filter ip_tables x_tables intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm ppdev irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd glue_helper cryptd intel_cstate intel_rapl_perf hci_uart ie31200_edac btbcm edac_core intel_pch_thermal btqca serio_raw btintel bluetooth parport_pc parport mac_hid intel_lpss_acpi acpi_pad intel_lpss autofs4 kernel: [570943.494500] btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid0 multipath linear raid1 e1000e psmouse ptp ahci pps_core libahci wmi pinctrl_sunrisepoint i2c_hid video pinctrl_intel hid fjes kernel: [570943.494524] CPU: 3 PID: 21982 Comm: charon Tainted: G W 4.10.0-33-generic #37~16.04.1-Ubuntu kernel: [570943.494524] Hardware name: ... kernel: [570943.494525] Call Trace: kernel: [570943.494541] <IRQ> kernel: [570943.494544] dump_stack+0x63/0x90 kernel: [570943.494545] __warn+0xcb/0xf0 kernel: [570943.494546] warn_slowpath_fmt+0x5f/0x80 kernel: [570943.494547] ? ___ratelimit+0xa2/0xf0 kernel: [570943.494549] skb_warn_bad_offload+0xd1/0x120 kernel: [570943.494550] __skb_gso_segment+0x17d/0x190 kernel: [570943.494564] validate_xmit_skb+0x14f/0x2a0 kernel: [570943.494565] validate_xmit_skb_list+0x43/0x70 kernel: [570943.494567] sch_direct_xmit+0x16b/0x1c0 kernel: [570943.494568] __dev_queue_xmit+0x47e/0x690 kernel: [570943.494569] dev_queue_xmit+0x10/0x20 kernel: [570943.494570] ip_finish_output2+0x27a/0x370 kernel: [570943.494571] ip_finish_output+0x176/0x270 kernel: [570943.494571] ip_output+0x76/0xe0 kernel: [570943.494572] ? ip_fragment.constprop.49+0x80/0x80 kernel: [570943.494573] ip_forward_finish+0x43/0x70 kernel: [570943.494574] ip_forward+0x385/0x460 kernel: [570943.494575] ? ip_frag_mem+0x50/0x50 kernel: [570943.494575] ip_rcv_finish+0x11b/0x400 kernel: [570943.494576] ip_rcv+0x28b/0x3a0 ... kernel: [570943.494632] ---[ end trace f01d0adcc1256afe ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1715609/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp