This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
zesty' to 'verification-done-zesty'. If the problem still exists, change
the tag 'verification-needed-zesty' to 'verification-failed-zesty'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Xenial:
  Fix Committed
Status in linux source package in Zesty:
  Fix Committed

Bug description:
  Even when the packet says checksum calculation is unnecessary the
  kernel will still check the checksum and display a warning that the
  checksum is bad.

  This has been fixed upstream in Kernel 4.11 by commit id:
  b2504a5dbef3305ef41988ad270b0e8ec289331c

  We have reports of Ubuntu 16.04 virtual machines (with ip forward
  enabled) displaying these warnings:

  
  [10480.074664] ------------[ cut here ]------------
  [10480.074667] WARNING: CPU: 1 PID: 0 at 
/build/linux-hwe-X3pKE5/linux-hwe-4.8.0/net/core/dev.c:2444 
skb_warn_bad_offload+0xd1/0x120
  [10480.074669] docker0: caps=(0x00000400ffbb78e9, 0x0000000000000000) 
len=2962 data_len=2834 gso_size=1448 gso_type=5 ip_summed=1
  [10480.074670] Modules linked in: veth nfsv3 nfs_acl rpcsec_gss_krb5 
auth_rpcgss nfsv4 nfs lockd grace sunrpc fscache ipt_MASQUERADE 
nf_nat_masquerade_ipv4 xfrm_user xfrm_algo iptable_nat nf_conntrack_ipv4 
nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype iptable_filter ip_tables xt_conntrack 
x_tables nf_nat nf_conntrack br_netfilter bridge stp llc aufs zfs(PO) 
zunicode(PO) zcommon(PO) znvpair(PO) spl(O) zavl(PO) crct10dif_pclmul 
crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw glue_helper 
ablk_helper cryptd input_leds joydev serio_raw i2c_piix4 mac_hid parport_pc 
ppdev lp parport autofs4 hid_generic usbhid hid virtio_scsi psmouse virtio_net 
pata_acpi floppy
  [10480.074695] CPU: 1 PID: 0 Comm: swapper/1 Tainted: P        W  O    
4.8.0-52-generic #55~16.04.1-Ubuntu
  [10480.074696] Hardware name: Nutanix AHV, BIOS seabios-1.7.5-11.el6 
04/01/2014
  [10480.074697]  0000000000000286 ec176c2ae03bc036 ffff8beef5643870 
ffffffffb7a2e7b3
  [10480.074699]  ffff8beef56438c0 0000000000000000 ffff8beef56438b0 
ffffffffb768314b
  [10480.074702]  0000098cb84fba80 ffff8bed61f82000 ffff8bee9915c000 
0000000000000005
  [10480.074704] Call Trace:
  [10480.074704]  <IRQ>  [<ffffffffb7a2e7b3>] dump_stack+0x63/0x90
  [10480.074708]  [<ffffffffb768314b>] __warn+0xcb/0xf0
  [10480.074710]  [<ffffffffb76831cf>] warn_slowpath_fmt+0x5f/0x80
  [10480.074713]  [<ffffffffb7a35012>] ? ___ratelimit+0xa2/0xf0
  [10480.074714]  [<ffffffffb7d7c681>] skb_warn_bad_offload+0xd1/0x120
  [10480.074716]  [<ffffffffb7d80d58>] __skb_gso_segment+0xd8/0x140
  [10480.074717]  [<ffffffffb7d811af>] validate_xmit_skb+0x14f/0x2a0
  [10480.074719]  [<ffffffffb7d81972>] __dev_queue_xmit+0x322/0x6d0
  [10480.074720]  [<ffffffffc03cd746>] ? nf_nat_ipv4_fn+0x1a6/0x230 
[nf_nat_ipv4]
  [10480.074723]  [<ffffffffb7d81d30>] dev_queue_xmit+0x10/0x20
  [10480.074725]  [<ffffffffb7dc5272>] ip_finish_output2+0x292/0x380
  [10480.074726]  [<ffffffffc040223d>] ? ipv4_confirm+0x7d/0x100 
[nf_conntrack_ipv4]
  [10480.074728]  [<ffffffffb7dc60a2>] ip_finish_output+0x132/0x1d0
  [10480.074729]  [<ffffffffb7db9703>] ? nf_hook_slow+0x73/0xd0
  [10480.074731]  [<ffffffffb7dc6aee>] ip_output+0x6e/0xf0
  [10480.074733]  [<ffffffffb7dc5f70>] ? 
__ip_flush_pending_frames.isra.40+0x90/0x90
  [10480.074736]  [<ffffffffb7dc2883>] ip_forward_finish+0x43/0x70
  [10480.074738]  [<ffffffffb7dc2c34>] ip_forward+0x384/0x480
  [10480.074739]  [<ffffffffb7dc2840>] ? ip_frag_mem+0x50/0x50
  [10480.074741]  [<ffffffffb7dc085b>] ip_rcv_finish+0x11b/0x400
  [10480.074743]  [<ffffffffb7dc11eb>] ip_rcv+0x28b/0x3c0
  [10480.074744]  [<ffffffffb7dc0740>] ? inet_del_offload+0x40/0x40
  [10480.074746]  [<ffffffffb7d7ec44>] __netif_receive_skb_core+0x524/0xab0
  [10480.074747]  [<ffffffffb780aaa7>] ? kmem_cache_alloc+0xd7/0x1b0
  [10480.074749]  [<ffffffffb7d6f7ca>] ? __build_skb+0x2a/0xe0
  [10480.074751]  [<ffffffffb7d7f1e8>] __netif_receive_skb+0x18/0x60
  [10480.074753]  [<ffffffffb7d7f262>] netif_receive_skb_internal+0x32/0xa0
  [10480.074754]  [<ffffffffb7d8025d>] napi_gro_receive+0xcd/0x120
  [10480.074756]  [<ffffffffc0286963>] virtnet_receive+0x1c3/0x970 [virtio_net]
  [10480.074758]  [<ffffffffb76b5e59>] ? update_cfs_rq_load_avg+0x1f9/0x4c0
  [10480.074760]  [<ffffffffc028712d>] virtnet_poll+0x1d/0x80 [virtio_net]
  [10480.074762]  [<ffffffffb7d7fa68>] net_rx_action+0x238/0x380
  [10480.074764]  [<ffffffffb7e9d406>] __do_softirq+0xf6/0x280
  [10480.074765]  [<ffffffffb7688eb3>] irq_exit+0xa3/0xb0
  [10480.074766]  [<ffffffffb7e9d164>] do_IRQ+0x54/0xd0
  [10480.074768]  [<ffffffffb7e9b242>] common_interrupt+0x82/0x82
  [10480.074768]  <EOI>  [<ffffffffb7664296>] ? native_safe_halt+0x6/0x10
  [10480.074772]  [<ffffffffb7637e9e>] default_idle+0x1e/0xd0
  [10480.074774]  [<ffffffffb763861f>] arch_cpu_idle+0xf/0x20
  [10480.074775]  [<ffffffffb76c7b3a>] default_idle_call+0x2a/0x40
  [10480.074776]  [<ffffffffb76c7e3a>] cpu_startup_entry+0x2ea/0x350
  [10480.074778]  [<ffffffffb76518b1>] start_secondary+0x151/0x190
  [10480.074781] ---[ end trace 3a9bd18de5564b05 ]---

  
  We have recompiled your latest 16.04.2 kernel with this patch and confirmed 
that this warning does not happen. Could you please consider including this fix 
in your next 16.04 LTS release?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to