[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-09-29 Thread Saverio Proto
Hello,

I still se this issue on Xenial with Kernel  4.4.0-93-generic
#116-Ubuntu

The server is bare-metal.

It is just a cosmetic problem in the log files or I should upgrade as
soon as possible ? I noticed the bad entries in my kern.log with my
monitoring tool, but I dont see any side effect so far.

Could anyone please clarify what is the operational impact of this bug ?
thanks !

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-09-12 Thread Joseph Salisbury
** Changed in: linux (Ubuntu)
   Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-09-12 Thread manojav
I am confirm that after I moved to the 4.4.0-95-generic kernel from the
proposed repository this, I dont see this issue any longer.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-09-01 Thread Joseph Salisbury
@manojav, since the original bug reporter, mailkons, says this bug is
now fixed, you may want to open a new separate bug to track your issue.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-09-01 Thread manojav
I am still seeing this issue with

Linux ___ 4.4.0-93-generic #116-Ubuntu SMP Fri Aug 11 21:17:51 UTC 2017
x86_64 x86_64 x86_64 GNU/Linux


[214343.266228] [ cut here ]
[214343.266235] WARNING: CPU: 1 PID: 10743 at 
/build/linux-YyUNAI/linux-4.4.0/net/core/dev.c:2445 
skb_warn_bad_offload+0xd1/0x120()
[214343.266239] tg3: caps=(0x000401b2, 0x) len=1444 
data_len=1402 gso_size=1376 gso_type=2 ip_summed=0
[214343.266241] Modules linked in: nf_conntrack_netlink nfnetlink binfmt_misc 
rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace fscache veth ipt_MASQUERADE 
nf_nat_masquerade_ipv4 xfrm_user xfrm_algo xt_addrtype iptable_filter 
xt_conntrack br_netfilter bridge stp llc aufs xt_nat xt_tcpudp iptable_nat 
nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 nf_nat nf_conntrack ip_tables 
x_tables hp_wmi gpio_ich sparse_keymap ppdev intel_powerclamp coretemp 
kvm_intel snd_hda_codec_realtek kvm snd_hda_codec_generic snd_hda_intel 
irqbypass snd_hda_codec snd_hda_core snd_hwdep snd_pcm snd_timer pl2303 snd 
usbserial soundcore input_leds serio_raw lpc_ich i7core_edac shpchp edac_core 
8250_fintek parport_pc tpm_infineon parport mac_hid ib_iser rdma_cm iw_cm ib_cm 
ib_sa ib_mad ib_core ib_addr iscsi_tcp libiscsi_tcp libiscsi
[214343.266302]  scsi_transport_iscsi sunrpc autofs4 btrfs raid10 raid456 
async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq 
libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid nouveau 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel mxm_wmi video 
aes_x86_64 i2c_algo_bit lrw ttm gf128mul glue_helper ablk_helper drm_kms_helper 
syscopyarea cryptd firewire_ohci sysfillrect tg3 psmouse sysimgblt fb_sys_fops 
firewire_core ahci ptp libahci drm crc_itu_t pps_core wmi floppy fjes
[214343.266347] CPU: 1 PID: 10743 Comm: transmission-da Tainted: GW I   
  4.4.0-93-generic #116-Ubuntu
[214343.266349] Hardware name: Hewlett-Packard HP Z600 Workstation/0B54h, BIOS 
786G4 v03.13 10/13/2010
[214343.266351]  0286 4281c02c793d7594 880313a434c8 
813f9f83
[214343.266355]  880313a43510 81d6f780 880313a43500 
810812f2
[214343.266358]  88030f710300 8803114c 0002 
880310cbd6ac
[214343.266361] Call Trace:
[214343.266363][] dump_stack+0x63/0x90
[214343.266373]  [] warn_slowpath_common+0x82/0xc0
[214343.266376]  [] warn_slowpath_fmt+0x5c/0x80
[214343.266381]  [] ? ___ratelimit+0xa2/0xe0
[214343.266385]  [] skb_warn_bad_offload+0xd1/0x120
[214343.266388]  [] __skb_gso_segment+0xfd/0x110
[214343.266391]  [] 
validate_xmit_skb.isra.97.part.98+0x10d/0x2b0
[214343.266394]  [] validate_xmit_skb_list+0x3b/0x60
[214343.266399]  [] sch_direct_xmit+0x16a/0x220
[214343.266402]  [] __dev_queue_xmit+0x23d/0x590
[214343.266405]  [] dev_queue_xmit+0x10/0x20
[214343.266410]  [] neigh_resolve_output+0x118/0x1c0
[214343.266415]  [] ip_finish_output2+0x146/0x380
[214343.266420]  [] ? ipv4_confirm+0x7d/0x100 
[nf_conntrack_ipv4]
[214343.266424]  [] ip_finish_output+0x136/0x1f0
[214343.266428]  [] ? nf_hook_slow+0x73/0xd0
[214343.266431]  [] ip_output+0x6e/0xe0
[214343.266435]  [] ? 
__ip_flush_pending_frames.isra.41+0x90/0x90
[214343.266438]  [] ip_forward_finish+0x43/0x70
[214343.266441]  [] ip_forward+0x399/0x480
[214343.266444]  [] ? ip_frag_mem+0x50/0x50
[214343.266447]  [] ip_rcv_finish+0x92/0x320
[214343.266450]  [] ip_rcv+0x291/0x3a0
[214343.266453]  [] ? inet_del_offload+0x40/0x40
[214343.266456]  [] __netif_receive_skb_core+0x704/0xa60
[214343.266467]  [] ? nf_conntrack_tuple_taken+0x1b0/0x1d0 
[nf_conntrack]
[214343.266474]  [] ? get_unique_tuple+0x147/0x630 [nf_nat]
[214343.266476]  [] __netif_receive_skb+0x18/0x60
[214343.266479]  [] netif_receive_skb_internal+0x32/0xa0
[214343.266482]  [] netif_receive_skb+0x1c/0x70
[214343.266491]  [] br_netif_receive_skb+0x34/0x50 [bridge]
[214343.266498]  [] br_handle_frame_finish+0x2bb/0x620 
[bridge]
[214343.266505]  [] ? __nf_ct_refresh_acct+0xab/0xc0 
[nf_conntrack]
[214343.266513]  [] ? br_handle_local_finish+0xa0/0xa0 
[bridge]
[214343.266520]  [] ? br_handle_local_finish+0xa0/0xa0 
[bridge]
[214343.266524]  [] NF_HOOK_THRESH+0x57/0xb0 [br_netfilter]
[214343.266531]  [] ? br_handle_local_finish+0xa0/0xa0 
[bridge]
[214343.266535]  [] br_nf_pre_routing_finish+0x1a9/0x350 
[br_netfilter]
[214343.266542]  [] ? br_handle_local_finish+0xa0/0xa0 
[bridge]
[214343.266545]  [] ? nf_iterate+0x62/0x80
[214343.266549]  [] br_nf_pre_routing+0x2e1/0x440 
[br_netfilter]
[214343.266553]  [] ? br_nf_forward_ip+0x480/0x480 
[br_netfilter]
[214343.266556]  [] nf_iterate+0x62/0x80
[214343.266560]  [] nf_hook_slow+0x73/0xd0
[214343.266567]  [] br_handle_frame+0x1da/0x2b0 [bridge]
[214343.266573]  [] ? can_migrate_task+0x287/0x2b0
[214343.266580]  [] ? br_handle_local_finish+0xa0/0xa0 
[bridge]
[214343.266583]  [] __netif_receive_skb_core+0x364/0xa60
[214343.266586]  [] ? sched_clock_cpu+0x8f/0xa0
[214343.266590]  [] ? 

[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-09-01 Thread manojav
** Attachment added: "appport from crash"
   
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+attachment/4942420/+files/apport.linux-image-4.4.0-93-generic.36d989m1.apport

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-08-28 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.10.0-33.37

---
linux (4.10.0-33.37) zesty; urgency=low

  * linux: 4.10.0-33.37 -proposed tracker (LP: #1709303)

  * CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentation

  * CVE-2017-1000111
- Revert "net-packet: fix race in packet_set_ring on PACKET_RESERVE"
- packet: fix tp_reserve race in packet_set_ring

  * ThunderX: soft lockup on 4.8+ kernels when running qemu-efi with vhost=on
(LP: #1673564)
- irqchip/gic-v3: Add missing system register definitions
- arm64: KVM: Do not use stack-protector to compile EL2 code
- KVM: arm/arm64: vgic-v3: Use PREbits to infer the number of ICH_APxRn_EL2
  registers
- KVM: arm/arm64: vgic-v3: Fix nr_pre_bits bitfield extraction
- arm64: Add a facility to turn an ESR syndrome into a sysreg encoding
- KVM: arm/arm64: vgic-v3: Add accessors for the ICH_APxRn_EL2 registers
- KVM: arm64: Make kvm_condition_valid32() accessible from EL2
- KVM: arm64: vgic-v3: Add hook to handle guest GICv3 sysreg accesses at EL2
- KVM: arm64: vgic-v3: Add ICV_BPR1_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_IGRPEN1_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_IAR1_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_EOIR1_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_AP1Rn_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_HPPIR1_EL1 handler
- KVM: arm64: vgic-v3: Enable trapping of Group-1 system registers
- KVM: arm64: Enable GICv3 Group-1 sysreg trapping via command-line
- KVM: arm64: vgic-v3: Add ICV_BPR0_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_IGNREN0_EL1 handler
- KVM: arm64: vgic-v3: Add misc Group-0 handlers
- KVM: arm64: vgic-v3: Enable trapping of Group-0 system registers
- KVM: arm64: Enable GICv3 Group-0 sysreg trapping via command-line
- arm64: Add MIDR values for Cavium cn83XX SoCs
- [Config] CONFIG_CAVIUM_ERRATUM_30115=y
- arm64: Add workaround for Cavium Thunder erratum 30115
- KVM: arm64: vgic-v3: Add ICV_DIR_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_RPR_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_CTLR_EL1 handler
- KVM: arm64: vgic-v3: Add ICV_PMR_EL1 handler
- KVM: arm64: Enable GICv3 common sysreg trapping via command-line
- KVM: arm64: vgic-v3: Log which GICv3 system registers are trapped
- arm64: KVM: Make unexpected reads from WO registers inject an undef
- KVM: arm64: Log an error if trapping a read-from-write-only GICv3 access
- KVM: arm64: Log an error if trapping a write-to-read-only GICv3 access

  * ibmvscsis: Do not send aborted task response (LP: #1689365)
- target: Fix unknown fabric callback queue-full errors
- ibmvscsis: Do not send aborted task response
- ibmvscsis: Clear left-over abort_cmd pointers
- ibmvscsis: Fix the incorrect req_lim_delta

  * hisi_sas performance improvements (LP: #1708734)
- scsi: hisi_sas: define hisi_sas_device.device_id as int
- scsi: hisi_sas: optimise the usage of hisi_hba.lock
- scsi: hisi_sas: relocate sata_done_v2_hw()
- scsi: hisi_sas: optimise DMA slot memory

  * hisi_sas driver reports mistakes timed out task for internal abort
(LP: #1708730)
- scsi: hisi_sas: fix timeout check in hisi_sas_internal_task_abort()

  * scsi: hisi_sas: add null check before indirect pointer dereference
(LP: #1708714)
- scsi: hisi_sas: add null check before indirect pointer dereference

  * [LTCTest][Opal][FW860.20] HMI recoverable errors failed to recover and
system goes to dump state. (LP: #1684054)
- powerpc/64: Fix HMI exception on LE with CONFIG_RELOCATABLE=y

  * Set CONFIG_SATA_HIGHBANK=y on armhf (LP: #1703430)
- [Config] CONFIG_SATA_HIGHBANK=y

  * Adt tests of src:linux time out often on armhf lxc containers (LP: #1705495)
- [Packaging] tests -- reduce rebuild test to one flavour

  * support Hip07/08 I2C controller (LP: #1708293)
- ACPI / APD: Add clock frequency for Hisilicon Hip07/08 I2C controller
- i2c: designware: Add ACPI HID for Hisilicon Hip07/08 I2C controller

  * Mute key LED does not work on HP ProBook 440 (LP: #1705586)
- ALSA: hda - Add HP ZBook 15u G3 Conexant CX20724 GPIO mute leds
- ALSA: hda - Add mute led support for HP ProBook 440 G4

  * Hisilicon D05 onboard fibre NIC link indicator LEDs don't work
(LP: #1704903)
- net: hns: add acpi function of xge led control

  * zesty unable to handle kernel NULL pointer dereference (LP: #1680904)
- drm/i915: Do not drop pagetables when empty

  * hns: use after free in hns_nic_net_xmit_hw (LP: #1704885)
- net: hns: Fix a skb used after free bug

  * [ARM64] config EDAC_GHES=y depends on EDAC_MM_EDAC=y (LP: #1706141)
- [Config] set EDAC_MM_EDAC=y for ARM64

  * [Hyper-V] hv_netvsc: Exclude non-TCP port numbers from vRSS hashing
(LP: #1690174)
- hv_netvsc: Exclude non-TCP port numbers from vRSS hashing

  * 

[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-08-28 Thread Launchpad Bug Tracker
This bug was fixed in the package linux - 4.4.0-93.116

---
linux (4.4.0-93.116) xenial; urgency=low

  * linux: 4.4.0-93.116 -proposed tracker (LP: #1709296)

  * Creating conntrack entry failure with kernel 4.4.0-89 (LP: #1709032)
- Revert "Revert "netfilter: synproxy: fix conntrackd interaction""
- netfilter: nf_ct_ext: fix possible panic after nf_ct_extend_unregister

  * CVE-2017-1000112
- Revert "udp: consistently apply ufo or fragmentation"
- udp: consistently apply ufo or fragmentation

  * CVE-2017-1000111
- Revert "net-packet: fix race in packet_set_ring on PACKET_RESERVE"
- packet: fix tp_reserve race in packet_set_ring

  * kernel BUG at [tty_ldisc_reinit] mm/slub.c! (LP: #1709126)
- tty: Simplify tty_set_ldisc() exit handling
- tty: Reset c_line from driver's init_termios
- tty: Handle NULL tty->ldisc
- tty: Move tty_ldisc_kill()
- tty: Use 'disc' for line discipline index name
- tty: Refactor tty_ldisc_reinit() for reuse
- tty: Destroy ldisc instance on hangup

  * atheros bt failed after S3 (LP: #1706833)
- SAUCE: Bluetooth: Make request workqueue freezable

  * The Precision Touchpad(PTP) button sends incorrect event code (LP: #1708372)
- HID: multitouch: handle external buttons for Precision Touchpads

  * Set CONFIG_SATA_HIGHBANK=y on armhf (LP: #1703430)
- [Config] CONFIG_SATA_HIGHBANK=y

  * xfs slab objects (memory) leak when xfs shutdown is called (LP: #1706132)
- xfs: fix xfs_log_ticket leak in xfs_end_io() after fs shutdown

  * Adt tests of src:linux time out often on armhf lxc containers (LP: #1705495)
- [Packaging] tests -- reduce rebuild test to one flavour

  * CVE-2017-7495
- ext4: fix data exposure after a crash

  * ubuntu/rsi driver downlink wifi throughput drops to 5-6 Mbps when BT
keyboard is connected (LP: #1706991)
- SAUCE: Redpine: enable power save by default for coex mode
- SAUCE: Redpine: uapsd configuration changes

  * [Hyper-V] hv_netvsc: Exclude non-TCP port numbers from vRSS hashing
(LP: #1690174)
- hv_netvsc: Exclude non-TCP port numbers from vRSS hashing

  * ath10k doesn't report full RSSI information (LP: #1706531)
- ath10k: add per chain RSSI reporting

  * ideapad_laptop don't support v310-14isk (LP: #1705378)
- platform/x86: ideapad-laptop: Add several models to no_hw_rfkill

  * [8087:0a2b] Failed to load bluetooth firmware(might affect some other Intel
bt devices) (LP: #1705633)
- Bluetooth: btintel: Create common Intel Version Read function
- Bluetooth: Use switch statement for Intel hardware variants
- Bluetooth: Replace constant hw_variant from Intel Bluetooth firmware
  filename
- Bluetooth: hci_intel: Fix firmware file name to use hw_variant
- Bluetooth: btintel: Add MODULE_FIRMWARE entries for iBT 3.5 controllers

  * xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2
comp_code 13 (LP: #1667750)
- xhci: Bad Ethernet performance plugged in ASM1042A host

  * OpenPower: Some multipaths temporarily have only a single path
(LP: #1696445)
- scsi: ses: don't get power status of SES device slot on probe

  * Hotkeys on new Thinkpad systems aren't working (LP: #1705169)
- platform/x86: thinkpad_acpi: Adding new hotkey ID for Lenovo thinkpad
- platform/x86: thinkpad_acpi: guard generic hotkey case
- platform/x86: thinkpad_acpi: add mapping for new hotkeys

  * CVE-2015-7837
- SAUCE: (no-up) kexec/uefi: copy secure_boot flag in boot params across 
kexec
  reboot

  * misleading kernel warning skb_warn_bad_offload during checksum calculation
(LP: #1705447)
- net: reduce skb_warn_bad_offload() noise

  * bonding: stack dump when unregistering a netdev (LP: #1704102)
- bonding: avoid NETDEV_CHANGEMTU event when unregistering slave

  * Ubuntu 16.04 IOB Error when the Mustang board rebooted (LP: #1693673)
- drivers: net: xgene: Fix redundant prefetch buffer cleanup

  * Ubuntu16.04: NVMe 4K+T10 DIF/DIX format returns I/O error on dd with split
op (LP: #1689946)
- blk-mq: NVMe 512B/4K+T10 DIF/DIX format returns I/O error on dd with split
  op

  * linux >= 4.2: bonding 802.3ad does not work with 5G, 25G and 50G link speeds
(LP: #1697892)
- bonding: add 802.3ad support for 100G speeds
- bonding: fix 802.3ad aggregator reselection
- bonding: add 802.3ad support for 25G speeds
- bonding: fix 802.3ad support for 5G and 50G speeds

  * Xenial update to 4.4.79 stable release (LP: #1707233)
- disable new gcc-7.1.1 warnings for now
- ir-core: fix gcc-7 warning on bool arithmetic
- s5p-jpeg: don't return a random width/height
- thermal: cpu_cooling: Avoid accessing potentially freed structures
- ath9k: fix tx99 use after free
- ath9k: fix tx99 bus error
- NFC: fix broken device allocation
- NFC: nfcmrvl_uart: add missing tty-device sanity check
- NFC: nfcmrvl: do not use 

[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-08-22 Thread malikons
Hi,

Sorry for the delay in responding. I have tested the kernel few days ago
and it is working as expected. I do not see anymore kernel warnings.

Thanks,
Shiraz

** Tags removed: verification-needed-xenial verification-needed-zesty
** Tags added: verification-done-xenial verification-done-zesty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-08-22 Thread Kleber Sacilotto de Souza
Hi @malikons,

Would you be able to verify the fix with the xenial and zesty kernels on
-proposed?

Thanks.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-08-16 Thread Kleber Sacilotto de Souza
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
xenial' to 'verification-done-xenial'. If the problem still exists,
change the tag 'verification-needed-xenial' to 'verification-failed-
xenial'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!


** Tags added: verification-needed-xenial

** Tags added: verification-needed-zesty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-08-16 Thread Kleber Sacilotto de Souza
This bug is awaiting verification that the kernel in -proposed solves
the problem. Please test the kernel and update this bug with the
results. If the problem is solved, change the tag 'verification-needed-
zesty' to 'verification-done-zesty'. If the problem still exists, change
the tag 'verification-needed-zesty' to 'verification-failed-zesty'.

If verification is not done by 5 working days from today, this fix will
be dropped from the source code, and this bug will be closed.

See https://wiki.ubuntu.com/Testing/EnableProposed for documentation how
to enable and use -proposed. Thank you!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-08-11 Thread Kleber Sacilotto de Souza
** Changed in: linux (Ubuntu Xenial)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-08-11 Thread Stefan Bader
** Changed in: linux (Ubuntu Zesty)
   Status: In Progress => Fix Committed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-07-20 Thread malikons
Tested with your test kernel and I can confirm that the problem has been
resolved.

Thanks a lot!

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-07-20 Thread malikons
Brilliant! Testing it now.

Cheers,

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-07-20 Thread Joseph Salisbury
I built Xenial and Zesty test kernels with commit b2504a5dbef.  The test
kernels can be downloaded from:

http://kernel.ubuntu.com/~jsalisbury/lp1705447

Can you test these kernels and see if they resolve this bug?

Thanks in advance!

** Changed in: linux (Ubuntu Xenial)
 Assignee: (unassigned) => Joseph Salisbury (jsalisbury)

** Changed in: linux (Ubuntu Zesty)
 Assignee: (unassigned) => Joseph Salisbury (jsalisbury)

** Changed in: linux (Ubuntu)
 Assignee: (unassigned) => Joseph Salisbury (jsalisbury)

** Changed in: linux (Ubuntu)
   Status: Triaged => In Progress

** Changed in: linux (Ubuntu Xenial)
   Status: Triaged => In Progress

** Changed in: linux (Ubuntu Zesty)
   Status: Triaged => In Progress

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-07-20 Thread Joseph Salisbury
** Changed in: linux (Ubuntu)
   Importance: Undecided => Medium

** Also affects: linux (Ubuntu Zesty)
   Importance: Undecided
   Status: New

** Also affects: linux (Ubuntu Xenial)
   Importance: Undecided
   Status: New

** Changed in: linux (Ubuntu Xenial)
   Status: New => Triaged

** Changed in: linux (Ubuntu Zesty)
   Status: New => Triaged

** Changed in: linux (Ubuntu)
   Status: Incomplete => Triaged

** Changed in: linux (Ubuntu Xenial)
   Importance: Undecided => Medium

** Changed in: linux (Ubuntu Zesty)
   Importance: Undecided => Medium

** Tags added: kernel-da-key xenial zesty

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-07-20 Thread malikons
We noticed the same kernel warning with the latest LTS kernel:

[ 159.617976] [ cut here ]
[ 159.617987] WARNING: CPU: 3 PID: 5436 at 
/build/linux-Hlembm/linux-4.4.0/net/core/dev.c:2444 
skb_warn_bad_offload+0xd1/0x120()
[ 159.617990] docker_gwbridge: caps=(0x00801fdb78e9, 0x) 
len=2103 data_len=1975 gso_size=1448 gso_type=5 ip_summed=1
[ 159.617991] Modules linked in: ip_vs_rr xt_ipvs ip_vs xt_nat xt_tcpudp veth 
tcp_diag udp_diag inet_diag binfmt_misc vxlan ip6_udp_tunnel udp_tunnel 
iptable_mangle xt_mark ipt_MASQUERADE nf_nat_masquerade_ipv4 xfrm_user 
xfrm_algo iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype 
iptable_filter ip_tables xt_conntrack x_tables nf_nat nf_conntrack br_netfilter 
bridge stp llc overlay ppdev joydev input_leds serio_raw parport_pc parport 
i2c_piix4 8250_fintek mac_hid ib_iser rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core 
ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs 
raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor 
raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel
[ 159.618043] aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper 
cryptd psmouse virtio_scsi pata_acpi floppy
[ 159.618053] CPU: 3 PID: 5436 Comm: java Tainted: G W 4.4.0-75-generic 
#96-Ubuntu
[ 159.618054] Hardware name: Nutanix AHV, BIOS seabios-1.7.5-11.el6 04/01/2014
[ 159.618056] 0286 21eefd21 88042d6c3870 
813f8493
[ 159.618058] 88042d6c38b8 81d6e7b0 88042d6c38a8 
81081302
[ 159.618061] 880395dbf500 88042a1f 0005 
880395dbf500
[ 159.618063] Call Trace:
[ 159.618065]  [] dump_stack+0x63/0x90
[ 159.618075] [] warn_slowpath_common+0x82/0xc0
[ 159.618077] [] warn_slowpath_fmt+0x5c/0x80
[ 159.618081] [] ? ___ratelimit+0xa2/0xe0
[ 159.618082] [] skb_warn_bad_offload+0xd1/0x120
[ 159.618085] [] __skb_gso_segment+0x7e/0xd0
[ 159.618087] [] validate_xmit_skb.isra.97.part.98+0x10d/0x2b0
[ 159.618089] [] __dev_queue_xmit+0x582/0x590
[ 159.618091] [] dev_queue_xmit+0x10/0x20
[ 159.618094] [] neigh_resolve_output+0x118/0x1c0
[ 159.618099] [] ip_finish_output2+0x146/0x380
[ 159.618104] [] ? ipv4_confirm+0x7d/0x100 [nf_conntrack_ipv4]
[ 159.618106] [] ip_finish_output+0x136/0x1f0
[ 159.618109] [] ? nf_hook_slow+0x73/0xd0
[ 159.618111] [] ip_output+0x6e/0xe0
[ 159.618114] [] ? __ip_flush_pending_frames.isra.39+0x90/0x90
[ 159.618116] [] ip_forward_finish+0x43/0x70
[ 159.618117] [] ip_forward+0x399/0x480
[ 159.618119] [] ? ip_frag_mem+0x50/0x50
[ 159.618121] [] ip_rcv_finish+0x92/0x320
[ 159.618123] [] ip_rcv+0x291/0x3a0
[ 159.618125] [] ? inet_del_offload+0x40/0x40
[ 159.618126] [] __netif_receive_skb_core+0x704/0xa60
[ 159.618129] [] ? __build_skb+0x2a/0xe0
[ 159.618131] [] __netif_receive_skb+0x18/0x60
[ 159.618132] [] netif_receive_skb_internal+0x32/0xa0
[ 159.618134] [] napi_gro_receive+0xc3/0x120
[ 159.618137] [] virtnet_receive+0x4a4/0x8f0
[ 159.618139] [] virtnet_poll+0x1d/0x80
[ 159.618140] [] net_rx_action+0x21e/0x360
[ 159.618144] [] ? skb_recv_done+0x43/0x50
[ 159.618147] [] __do_softirq+0x101/0x290
[ 159.618149] [] irq_exit+0xa3/0xb0
[ 159.618153] [] do_IRQ+0x54/0xd0
[ 159.618157] [] common_interrupt+0x82/0x82
[ 159.618158] 
[ 159.618159] ---[ end trace 579561cac9470a51 ]---

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs