Hi, I got this on 4.4.0-116-generic :
[266447.178906] ------------[ cut here ]------------ [266447.178919] WARNING: CPU: 0 PID: 3343 at /build/linux-fQ94TU/linux-4.4.0/net/core/dev.c:2448 skb_warn_bad_offload+0xd1/0x120() [266447.178924] qr-8a4bd2f3-04: caps=(0x00000184075b59e9, 0x00000184075b59e9) len=2058 data_len=582 gso_size=1406 gso_type=1 ip_summed=3 [266447.178926] Modules linked in: kpatch_livepatch_Ubuntu_4_4_0_116_140_generic_36(OE) xt_REDIRECT nf_nat_redirect ip6table_mangle xt_nat xt_mark xt_connmark ip6table_raw iptable_raw ip_gre ip_tunnel gre xt_recent ip6t_REJECT nf_reject_ipv6 nf_log_ipv6 xt_hl ip6t_rt nf_conntrack_ipv6 ipt_REJECT nf_reject_ipv4 nf_log_ipv4 nf_log_common xt_LOG xt_limit xt_addrtype xt_conntrack dccp_diag dccp tcp_diag udp_diag inet_diag unix_diag veth netlink_diag nbd ip6table_filter ip6_tables xt_CHECKSUM iptable_mangle xt_tcpudp ipt_MASQUERADE nf_nat_masquerade_ipv4 xt_comment iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat iptable_filter ip_tables x_tables openvswitch nf_defrag_ipv6 nf_conntrack binfmt_misc ipmi_ssif intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel bridge stp kvm llc [266447.178988] irqbypass sb_edac edac_core ipmi_si hpilo ipmi_msghandler serio_raw 8250_fintek lpc_ich shpchp acpi_power_meter ioatdma mac_hid dca ib_iser rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper cryptd psmouse tg3 ptp pps_core hpsa scsi_transport_sas wmi fjes [266447.179045] CPU: 0 PID: 3343 Comm: haproxy Tainted: G W OE K 4.4.0-116-generic #140-Ubuntu [266447.179048] Hardware name: HP ProLiant DL360 Gen9/ProLiant DL360 Gen9, BIOS P89 01/22/2018 [266447.179050] 0000000000000286 6f5737dc927d16dd ffff880a3646b818 ffffffff813ffc13 [266447.179055] ffff880a3646b860 ffffffff81d715e8 ffff880a3646b850 ffffffff810830f2 [266447.179059] ffff880064507ce8 ffff880b4ff12000 0000000000000001 ffff8808723268fc [266447.179064] Call Trace: [266447.179072] [<ffffffff813ffc13>] dump_stack+0x63/0x90 [266447.179079] [<ffffffff810830f2>] warn_slowpath_common+0x82/0xc0 [266447.179084] [<ffffffff8108318c>] warn_slowpath_fmt+0x5c/0x80 [266447.179090] [<ffffffff81405d92>] ? ___ratelimit+0xa2/0xe0 [266447.179094] [<ffffffff8173ff81>] skb_warn_bad_offload+0xd1/0x120 [266447.179100] [<ffffffff81740155>] skb_checksum_help+0x185/0x1a0 [266447.179106] [<ffffffffc0524072>] checksum_tg+0x22/0x29 [xt_CHECKSUM] [266447.179112] [<ffffffffc03a4e21>] ipt_do_table+0x301/0x720 [ip_tables] [266447.179117] [<ffffffffc03a4e69>] ? ipt_do_table+0x349/0x720 [ip_tables] [266447.179122] [<ffffffff810bae37>] ? enqueue_entity+0x3a7/0xd20 [266447.179129] [<ffffffffc04980c9>] iptable_mangle_hook+0x39/0x107 [iptable_mangle] [266447.179134] [<ffffffff81778e48>] nf_iterate+0x68/0x80 [266447.179137] [<ffffffff81778ed3>] nf_hook_slow+0x73/0xd0 [266447.179143] [<ffffffff8178642f>] ip_output+0xcf/0xe0 [266447.179148] [<ffffffff81785880>] ? __ip_flush_pending_frames.isra.42+0x90/0x90 [266447.179153] [<ffffffff81785b8b>] ip_local_out+0x3b/0x50 [266447.179158] [<ffffffff81785eb4>] ip_queue_xmit+0x154/0x380 [266447.179164] [<ffffffff8179e2bb>] tcp_transmit_skb+0x51b/0x980 [266447.179169] [<ffffffff8179e8f6>] tcp_write_xmit+0x1d6/0xf40 [266447.179174] [<ffffffff8179f8f1>] __tcp_push_pending_frames+0x31/0xd0 [266447.179178] [<ffffffff8178d7ec>] tcp_push+0xec/0x110 [266447.179181] [<ffffffff81791969>] tcp_sendmsg+0x739/0xb80 [266447.179186] [<ffffffff817bd91b>] inet_sendmsg+0x6b/0xa0 [266447.179192] [<ffffffff81724b5e>] sock_sendmsg+0x3e/0x50 [266447.179196] [<ffffffff81725151>] SYSC_sendto+0x101/0x190 [266447.179203] [<ffffffff81003938>] ? syscall_trace_enter_phase1+0xc8/0x140 [266447.179208] [<ffffffff81725c7e>] SyS_sendto+0xe/0x10 [266447.179215] [<ffffffff8184efc8>] entry_SYSCALL_64_fastpath+0x1c/0xbb [266447.179218] ---[ end trace 4c054fa8d617289c ]--- Joseph, can we maybe get a new kernel to test ? The one in your last comment is gone. Note that this isn't appearing a lot (~10 occurrences on a server with 3 days of uptime) ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed ** Changed in: linux (Ubuntu Xenial) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1715609 Title: kernel warning: skb_warn_bad_offload Status in linux package in Ubuntu: Confirmed Status in linux source package in Xenial: Confirmed Bug description: Since upgrading to kernel version 4.10.0-33.37, we're seeing a lot of call traces triggered by skb_warn_bad_offload in the syslog. Regression introduced when fixing this bug? https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447 kernel: [570943.494444] ------------[ cut here ]------------ kernel: [570943.494448] WARNING: CPU: 3 PID: 21982 at /build/linux-hwe-YA6IuF/linux-hwe-4.10.0/net/core/dev.c:2576 skb_warn_bad_offload+0xd1/0x120 kernel: [570943.494450] e1000e: caps=(0x00000030002149a9, 0x0000000000000000) len=1701 data_len=1659 gso_size=1480 gso_type=2 ip_summed=0 kernel: [570943.494451] Modules linked in: udp_diag tcp_diag inet_diag echainiv authenc xfrm4_mode_tunnel xt_state binfmt_misc veth xfrm_user xfrm4_tunnel tunnel4 ipcomp xfrm_ipcomp esp4 ah4 af_key xfrm_algo bridge stp llc iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat ipt_REJECT nf_reject_ipv4 xt_tcpudp nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack iptable_filter ip_tables x_tables intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm ppdev irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd glue_helper cryptd intel_cstate intel_rapl_perf hci_uart ie31200_edac btbcm edac_core intel_pch_thermal btqca serio_raw btintel bluetooth parport_pc parport mac_hid intel_lpss_acpi acpi_pad intel_lpss autofs4 kernel: [570943.494500] btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid0 multipath linear raid1 e1000e psmouse ptp ahci pps_core libahci wmi pinctrl_sunrisepoint i2c_hid video pinctrl_intel hid fjes kernel: [570943.494524] CPU: 3 PID: 21982 Comm: charon Tainted: G W 4.10.0-33-generic #37~16.04.1-Ubuntu kernel: [570943.494524] Hardware name: ... kernel: [570943.494525] Call Trace: kernel: [570943.494541] <IRQ> kernel: [570943.494544] dump_stack+0x63/0x90 kernel: [570943.494545] __warn+0xcb/0xf0 kernel: [570943.494546] warn_slowpath_fmt+0x5f/0x80 kernel: [570943.494547] ? ___ratelimit+0xa2/0xf0 kernel: [570943.494549] skb_warn_bad_offload+0xd1/0x120 kernel: [570943.494550] __skb_gso_segment+0x17d/0x190 kernel: [570943.494564] validate_xmit_skb+0x14f/0x2a0 kernel: [570943.494565] validate_xmit_skb_list+0x43/0x70 kernel: [570943.494567] sch_direct_xmit+0x16b/0x1c0 kernel: [570943.494568] __dev_queue_xmit+0x47e/0x690 kernel: [570943.494569] dev_queue_xmit+0x10/0x20 kernel: [570943.494570] ip_finish_output2+0x27a/0x370 kernel: [570943.494571] ip_finish_output+0x176/0x270 kernel: [570943.494571] ip_output+0x76/0xe0 kernel: [570943.494572] ? ip_fragment.constprop.49+0x80/0x80 kernel: [570943.494573] ip_forward_finish+0x43/0x70 kernel: [570943.494574] ip_forward+0x385/0x460 kernel: [570943.494575] ? ip_frag_mem+0x50/0x50 kernel: [570943.494575] ip_rcv_finish+0x11b/0x400 kernel: [570943.494576] ip_rcv+0x28b/0x3a0 ... kernel: [570943.494632] ---[ end trace f01d0adcc1256afe ]--- To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1715609/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp