[Kernel-packages] [Bug 1738219] Re: the kernel is blackholing IPv6 packets to linkdown nexthops

2018-03-20 Thread Saverio Proto
** Tags removed: verification-needed-xenial
** Tags added: verification-done-xenial

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1738219

Title:
  the kernel is blackholing IPv6 packets to linkdown nexthops

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Xenial:
  Fix Committed
Status in linux source package in Zesty:
  Won't Fix
Status in linux source package in Artful:
  Fix Committed
Status in linux source package in Bionic:
  In Progress

Bug description:
  == SRU Justification ==
  When the 'ignore_routes_with_linkdown' sysctl is set, we should not
  consider linkdown nexthops during route lookup.

  While the code correctly verifies that the initially selected route
  ('match') has a carrier, it does not perform the same check in the
  subsequent multipath selection, resulting in a potential packet loss.

  In case the chosen route does not have a carrier and the sysctl is set,
  choose the initially selected route.

  This is a regression introduced by commit 35103d11173b in 4.3-rc1.  Commit
  bbfcd7763 resolves this regression and is mainline as of 4.15-rc1.

  == Fix ==
  commit bbfcd77631573ac4a9f57eb6169e04256a111bc1
  Author: Ido Schimmel 
  Date:   Tue Nov 21 09:50:12 2017 +0200

  ipv6: Do not consider linkdown nexthops during multipath

  == Regression Potential ==
  This fix is specific to ipv6 and fixes a current regression.

  == Test Case ==
  A test kernel was built with this patch and tested by the original bug 
reporter.
  The bug reporter states the test kernel resolved the bug.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1738219/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1738219] Re: the kernel is blackholing IPv6 packets to linkdown nexthops

2018-03-19 Thread Saverio Proto
I tested the proposed Kernel in Xenial and it is working for me

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1738219

Title:
  the kernel is blackholing IPv6 packets to linkdown nexthops

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Xenial:
  Fix Committed
Status in linux source package in Zesty:
  Won't Fix
Status in linux source package in Artful:
  Fix Committed
Status in linux source package in Bionic:
  In Progress

Bug description:
  == SRU Justification ==
  When the 'ignore_routes_with_linkdown' sysctl is set, we should not
  consider linkdown nexthops during route lookup.

  While the code correctly verifies that the initially selected route
  ('match') has a carrier, it does not perform the same check in the
  subsequent multipath selection, resulting in a potential packet loss.

  In case the chosen route does not have a carrier and the sysctl is set,
  choose the initially selected route.

  This is a regression introduced by commit 35103d11173b in 4.3-rc1.  Commit
  bbfcd7763 resolves this regression and is mainline as of 4.15-rc1.

  == Fix ==
  commit bbfcd77631573ac4a9f57eb6169e04256a111bc1
  Author: Ido Schimmel 
  Date:   Tue Nov 21 09:50:12 2017 +0200

  ipv6: Do not consider linkdown nexthops during multipath

  == Regression Potential ==
  This fix is specific to ipv6 and fixes a current regression.

  == Test Case ==
  A test kernel was built with this patch and tested by the original bug 
reporter.
  The bug reporter states the test kernel resolved the bug.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1738219/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1742630] Re: Booting from 4.13 leads to Oops: NULL pointer dereference - RIP: isci_task_abort_task+0x30/0x3e0 [isci]

2018-01-12 Thread Saverio Proto
I have the kernel running and I confirm that it resolved the bug

Linux s0008 4.13.0-25-generic #29~lp1742630 SMP Thu Jan 11 18:42:42 UTC
2018 x86_64 x86_64 x86_64 GNU/Linux

thank you

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742630

Title:
  Booting from 4.13 leads to Oops: NULL pointer dereference - RIP:
  isci_task_abort_task+0x30/0x3e0 [isci]

Status in Linux:
  Fix Released
Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Artful:
  Triaged

Bug description:
  I cannot boot from 4.13.0-21-generic

  Oops: NULL pointer dereference - RIP: isci_task_abort_task+0x30/0x3e0
  [isci]

  This Kernel bug was already fixed in Debian:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882414

  Relevant discussion:
  https://marc.info/?l=linux-scsi&m=151523964725984&w=2

  Ubuntu needs to fix this, because otherwise _many_ people will
  complain about crashes when they upgrade from 4.9 (or 4.4) to 4.13,
  which Ubuntu defined as their new “HWE” kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/linux/+bug/1742630/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1742630] Re: Booting from 4.13.0-21-generic leads to Oops: NULL pointer dereference - RIP: isci_task_abort_task+0x30/0x3e0 [isci]

2018-01-11 Thread Saverio Proto
I have tested this version linux-image-generic-hwe-16.04 4.13.0.26.46
It does not work for me

** Summary changed:

- Booting from 4.13.0-21-generic leads to Oops: NULL pointer dereference - RIP: 
isci_task_abort_task+0x30/0x3e0 [isci]
+ PTI Kernels: Booting from 4.13.0-21-generic leads to Oops: NULL pointer 
dereference - RIP: isci_task_abort_task+0x30/0x3e0 [isci]

** Summary changed:

- PTI Kernels: Booting from 4.13.0-21-generic leads to Oops: NULL pointer 
dereference - RIP: isci_task_abort_task+0x30/0x3e0 [isci]
+ PTI Kernels: Booting from 4.13 leads to Oops: NULL pointer dereference - RIP: 
isci_task_abort_task+0x30/0x3e0 [isci]

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742630

Title:
  PTI Kernels: Booting from 4.13 leads to Oops: NULL pointer dereference
  - RIP: isci_task_abort_task+0x30/0x3e0 [isci]

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I cannot boot from 4.13.0-21-generic

  Oops: NULL pointer dereference - RIP: isci_task_abort_task+0x30/0x3e0
  [isci]

  This Kernel bug was already fixed in Debian:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882414

  Relevant discussion:
  https://marc.info/?l=linux-scsi&m=151523964725984&w=2

  Ubuntu needs to fix this, because otherwise _many_ people will
  complain about crashes when they upgrade from 4.9 (or 4.4) to 4.13,
  which Ubuntu defined as their new “HWE” kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1742630/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1742630] Re: Booting from 4.13.0-21-generic leads to Oops: NULL pointer dereference - RIP: isci_task_abort_task+0x30/0x3e0 [isci]

2018-01-11 Thread Saverio Proto
The Kernel does not boot at all, so it is not possible to collect the
data with apport-collect

** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742630

Title:
  Booting from 4.13.0-21-generic leads to Oops: NULL pointer dereference
  - RIP: isci_task_abort_task+0x30/0x3e0 [isci]

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  I cannot boot from 4.13.0-21-generic

  Oops: NULL pointer dereference - RIP: isci_task_abort_task+0x30/0x3e0
  [isci]

  This Kernel bug was already fixed in Debian:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882414

  Relevant discussion:
  https://marc.info/?l=linux-scsi&m=151523964725984&w=2

  Ubuntu needs to fix this, because otherwise _many_ people will
  complain about crashes when they upgrade from 4.9 (or 4.4) to 4.13,
  which Ubuntu defined as their new “HWE” kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1742630/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1742630] [NEW] Booting from 4.13.0-21-generic leads to Oops: NULL pointer dereference - RIP: isci_task_abort_task+0x30/0x3e0 [isci]

2018-01-11 Thread Saverio Proto
Public bug reported:

I cannot boot from 4.13.0-21-generic

Oops: NULL pointer dereference - RIP: isci_task_abort_task+0x30/0x3e0
[isci]

This Kernel bug was already fixed in Debian:
https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882414

Relevant discussion:
https://marc.info/?l=linux-scsi&m=151523964725984&w=2

Ubuntu needs to fix this, because otherwise _many_ people will complain
about crashes when they upgrade from 4.9 (or 4.4) to 4.13, which Ubuntu
defined as their new “HWE” kernel.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Incomplete

** Description changed:

  I cannot boot from 4.13.0-21-generic
+ 
+ Oops: NULL pointer dereference - RIP: isci_task_abort_task+0x30/0x3e0
+ [isci]
  
  This Kernel bug was already fixed in Debian:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882414
  
  Relevant discussion:
  https://marc.info/?l=linux-scsi&m=151523964725984&w=2
  
  Ubuntu needs to fix this, because otherwise _many_ people will complain
  about crashes when they upgrade from 4.9 (or 4.4) to 4.13, which Ubuntu
  defined as their new “HWE” kernel.

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1742630

Title:
  Booting from 4.13.0-21-generic leads to Oops: NULL pointer dereference
  - RIP: isci_task_abort_task+0x30/0x3e0 [isci]

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  I cannot boot from 4.13.0-21-generic

  Oops: NULL pointer dereference - RIP: isci_task_abort_task+0x30/0x3e0
  [isci]

  This Kernel bug was already fixed in Debian:
  https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=882414

  Relevant discussion:
  https://marc.info/?l=linux-scsi&m=151523964725984&w=2

  Ubuntu needs to fix this, because otherwise _many_ people will
  complain about crashes when they upgrade from 4.9 (or 4.4) to 4.13,
  which Ubuntu defined as their new “HWE” kernel.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1742630/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1738219] Re: the kernel is blackholing IPv6 packets to linkdown nexthops

2017-12-15 Thread Saverio Proto
I tested the packages on Xenial:

; uname -a
Linux s0006 4.4.0-103-generic #126~lp1738219 SMP Thu Dec 14 16:37:03 UTC 2017 
x86_64 x86_64 x86_64 GNU/Linux

It LGTM. The bug is fixed when using this kernel.

thank you

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1738219

Title:
  the kernel is blackholing IPv6 packets to linkdown nexthops

Status in linux package in Ubuntu:
  In Progress
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Zesty:
  In Progress
Status in linux source package in Artful:
  In Progress
Status in linux source package in Bionic:
  In Progress

Bug description:
  When the 'ignore_routes_with_linkdown' sysctl is set, we should not
  consider linkdown nexthops during route lookup.

  While the code correctly verifies that the initially selected route
  ('match') has a carrier, it does not perform the same check in the
  subsequent multipath selection, resulting in a potential packet loss.

  In case the chosen route does not have a carrier and the sysctl is set,
  choose the initially selected route.

  Fixed in the upstream kernel with patch:

  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bbfcd77631573ac4a9f57eb6169e04256a111bc1

  I think this patch must be backported to stable kernel in Xenial. I
  tested in patching the Ubuntu Xenial 4.4.0-21-generic and it works for
  me.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1738219/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1738219] Re: the kernel is blackholing IPv6 packets to linkdown nexthops

2017-12-14 Thread Saverio Proto
I tested now with Kernel 4.4.0-103-generic + the patch from commit
bbfcd7 and it works for me

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bbfcd77631573ac4a9f57eb6169e04256a111bc1

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1738219

Title:
  the kernel is blackholing IPv6 packets to linkdown nexthops

Status in linux package in Ubuntu:
  Triaged
Status in linux source package in Xenial:
  Triaged
Status in linux-lts-xenial source package in Xenial:
  New

Bug description:
  When the 'ignore_routes_with_linkdown' sysctl is set, we should not
  consider linkdown nexthops during route lookup.

  While the code correctly verifies that the initially selected route
  ('match') has a carrier, it does not perform the same check in the
  subsequent multipath selection, resulting in a potential packet loss.

  In case the chosen route does not have a carrier and the sysctl is set,
  choose the initially selected route.

  Fixed in the upstream kernel with patch:

  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bbfcd77631573ac4a9f57eb6169e04256a111bc1

  I think this patch must be backported to stable kernel in Xenial. I
  tested in patching the Ubuntu Xenial 4.4.0-21-generic and it works for
  me.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1738219/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1738219] Re: the kernel is blackholing IPv6 packets to linkdown nexthops

2017-12-14 Thread Saverio Proto
** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1738219

Title:
  the kernel is blackholing IPv6 packets to linkdown nexthops

Status in linux package in Ubuntu:
  Confirmed
Status in linux-lts-xenial package in Ubuntu:
  New

Bug description:
  When the 'ignore_routes_with_linkdown' sysctl is set, we should not
  consider linkdown nexthops during route lookup.

  While the code correctly verifies that the initially selected route
  ('match') has a carrier, it does not perform the same check in the
  subsequent multipath selection, resulting in a potential packet loss.

  In case the chosen route does not have a carrier and the sysctl is set,
  choose the initially selected route.

  Fixed in the upstream kernel with patch:

  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bbfcd77631573ac4a9f57eb6169e04256a111bc1

  I think this patch must be backported to stable kernel in Xenial. I
  tested in patching the Ubuntu Xenial 4.4.0-21-generic and it works for
  me.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1738219/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1738219] [NEW] the kernel is blackholing IPv6 packets to linkdown nexthops

2017-12-14 Thread Saverio Proto
Public bug reported:

When the 'ignore_routes_with_linkdown' sysctl is set, we should not
consider linkdown nexthops during route lookup.

While the code correctly verifies that the initially selected route
('match') has a carrier, it does not perform the same check in the
subsequent multipath selection, resulting in a potential packet loss.

In case the chosen route does not have a carrier and the sysctl is set,
choose the initially selected route.

Fixed in the upstream kernel with patch:

https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bbfcd77631573ac4a9f57eb6169e04256a111bc1

I think this patch must be backported to stable kernel in Xenial. I
tested in patching the Ubuntu Xenial 4.4.0-21-generic and it works for
me.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Incomplete

** Affects: linux-lts-xenial (Ubuntu)
 Importance: Undecided
 Status: New


** Tags: xenial

** Also affects: linux-lts-xenial (Ubuntu)
   Importance: Undecided
   Status: New

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1738219

Title:
  the kernel is blackholing IPv6 packets to linkdown nexthops

Status in linux package in Ubuntu:
  Incomplete
Status in linux-lts-xenial package in Ubuntu:
  New

Bug description:
  When the 'ignore_routes_with_linkdown' sysctl is set, we should not
  consider linkdown nexthops during route lookup.

  While the code correctly verifies that the initially selected route
  ('match') has a carrier, it does not perform the same check in the
  subsequent multipath selection, resulting in a potential packet loss.

  In case the chosen route does not have a carrier and the sysctl is set,
  choose the initially selected route.

  Fixed in the upstream kernel with patch:

  
https://git.kernel.org/pub/scm/linux/kernel/git/torvalds/linux.git/commit/?id=bbfcd77631573ac4a9f57eb6169e04256a111bc1

  I think this patch must be backported to stable kernel in Xenial. I
  tested in patching the Ubuntu Xenial 4.4.0-21-generic and it works for
  me.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1738219/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp


[Kernel-packages] [Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

2017-09-29 Thread Saverio Proto
Hello,

I still se this issue on Xenial with Kernel  4.4.0-93-generic
#116-Ubuntu

The server is bare-metal.

It is just a cosmetic problem in the log files or I should upgrade as
soon as possible ? I noticed the bad entries in my kern.log with my
monitoring tool, but I dont see any side effect so far.

Could anyone please clarify what is the operational impact of this bug ?
thanks !

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Zesty:
  Fix Released

Bug description:
  Even when the packet says checksum calculation is unnecessary the
  kernel will still check the checksum and display a warning that the
  checksum is bad.

  This has been fixed upstream in Kernel 4.11 by commit id:
  b2504a5dbef3305ef41988ad270b0e8ec289331c

  We have reports of Ubuntu 16.04 virtual machines (with ip forward
  enabled) displaying these warnings:

  
  [10480.074664] [ cut here ]
  [10480.074667] WARNING: CPU: 1 PID: 0 at 
/build/linux-hwe-X3pKE5/linux-hwe-4.8.0/net/core/dev.c:2444 
skb_warn_bad_offload+0xd1/0x120
  [10480.074669] docker0: caps=(0x0400ffbb78e9, 0x) 
len=2962 data_len=2834 gso_size=1448 gso_type=5 ip_summed=1
  [10480.074670] Modules linked in: veth nfsv3 nfs_acl rpcsec_gss_krb5 
auth_rpcgss nfsv4 nfs lockd grace sunrpc fscache ipt_MASQUERADE 
nf_nat_masquerade_ipv4 xfrm_user xfrm_algo iptable_nat nf_conntrack_ipv4 
nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype iptable_filter ip_tables xt_conntrack 
x_tables nf_nat nf_conntrack br_netfilter bridge stp llc aufs zfs(PO) 
zunicode(PO) zcommon(PO) znvpair(PO) spl(O) zavl(PO) crct10dif_pclmul 
crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw glue_helper 
ablk_helper cryptd input_leds joydev serio_raw i2c_piix4 mac_hid parport_pc 
ppdev lp parport autofs4 hid_generic usbhid hid virtio_scsi psmouse virtio_net 
pata_acpi floppy
  [10480.074695] CPU: 1 PID: 0 Comm: swapper/1 Tainted: PW  O
4.8.0-52-generic #55~16.04.1-Ubuntu
  [10480.074696] Hardware name: Nutanix AHV, BIOS seabios-1.7.5-11.el6 
04/01/2014
  [10480.074697]  0286 ec176c2ae03bc036 8beef5643870 
b7a2e7b3
  [10480.074699]  8beef56438c0  8beef56438b0 
b768314b
  [10480.074702]  098cb84fba80 8bed61f82000 8bee9915c000 
0005
  [10480.074704] Call Trace:
  [10480.074704][] dump_stack+0x63/0x90
  [10480.074708]  [] __warn+0xcb/0xf0
  [10480.074710]  [] warn_slowpath_fmt+0x5f/0x80
  [10480.074713]  [] ? ___ratelimit+0xa2/0xf0
  [10480.074714]  [] skb_warn_bad_offload+0xd1/0x120
  [10480.074716]  [] __skb_gso_segment+0xd8/0x140
  [10480.074717]  [] validate_xmit_skb+0x14f/0x2a0
  [10480.074719]  [] __dev_queue_xmit+0x322/0x6d0
  [10480.074720]  [] ? nf_nat_ipv4_fn+0x1a6/0x230 
[nf_nat_ipv4]
  [10480.074723]  [] dev_queue_xmit+0x10/0x20
  [10480.074725]  [] ip_finish_output2+0x292/0x380
  [10480.074726]  [] ? ipv4_confirm+0x7d/0x100 
[nf_conntrack_ipv4]
  [10480.074728]  [] ip_finish_output+0x132/0x1d0
  [10480.074729]  [] ? nf_hook_slow+0x73/0xd0
  [10480.074731]  [] ip_output+0x6e/0xf0
  [10480.074733]  [] ? 
__ip_flush_pending_frames.isra.40+0x90/0x90
  [10480.074736]  [] ip_forward_finish+0x43/0x70
  [10480.074738]  [] ip_forward+0x384/0x480
  [10480.074739]  [] ? ip_frag_mem+0x50/0x50
  [10480.074741]  [] ip_rcv_finish+0x11b/0x400
  [10480.074743]  [] ip_rcv+0x28b/0x3c0
  [10480.074744]  [] ? inet_del_offload+0x40/0x40
  [10480.074746]  [] __netif_receive_skb_core+0x524/0xab0
  [10480.074747]  [] ? kmem_cache_alloc+0xd7/0x1b0
  [10480.074749]  [] ? __build_skb+0x2a/0xe0
  [10480.074751]  [] __netif_receive_skb+0x18/0x60
  [10480.074753]  [] netif_receive_skb_internal+0x32/0xa0
  [10480.074754]  [] napi_gro_receive+0xcd/0x120
  [10480.074756]  [] virtnet_receive+0x1c3/0x970 [virtio_net]
  [10480.074758]  [] ? update_cfs_rq_load_avg+0x1f9/0x4c0
  [10480.074760]  [] virtnet_poll+0x1d/0x80 [virtio_net]
  [10480.074762]  [] net_rx_action+0x238/0x380
  [10480.074764]  [] __do_softirq+0xf6/0x280
  [10480.074765]  [] irq_exit+0xa3/0xb0
  [10480.074766]  [] do_IRQ+0x54/0xd0
  [10480.074768]  [] common_interrupt+0x82/0x82
  [10480.074768][] ? native_safe_halt+0x6/0x10
  [10480.074772]  [] default_idle+0x1e/0xd0
  [10480.074774]  [] arch_cpu_idle+0xf/0x20
  [10480.074775]  [] default_idle_call+0x2a/0x40
  [10480.074776]  [] cpu_startup_entry+0x2ea/0x350
  [10480.074778]  [] start_secondary+0x151/0x190
  [10480.074781] ---[ end trace 3a9bd18de5564b05 ]---

  
  We have recompiled your latest 16.04.2 kernel with this patch and confirmed 
that this warning does not happen. Could you please consider including this fix 
in your next 16.0

[Kernel-packages] [Bug 1660634] [NEW] Enable CONFIG_NET_DROP_MONITOR=m in Ubuntu Kernel

2017-01-31 Thread Saverio Proto
Public bug reported:

CONFIG_NET_DROP_MONITOR=m is needed for the dropwatch software.

At the moment dropwatch is packaged only for Fedora:
https://fedorahosted.org/dropwatch/

The kernel compiled with CONFIG_NET_DROP_MONITOR=n makes not possible to
use this software.

** Affects: linux (Ubuntu)
 Importance: Undecided
 Assignee: Tim Gardner (timg-tpi)
 Status: Fix Committed

** Affects: linux (Ubuntu Trusty)
 Importance: Undecided
 Assignee: Tim Gardner (timg-tpi)
 Status: In Progress

** Affects: linux (Ubuntu Xenial)
 Importance: Undecided
 Assignee: Tim Gardner (timg-tpi)
 Status: In Progress

** Affects: linux (Ubuntu Yakkety)
 Importance: Undecided
 Assignee: Tim Gardner (timg-tpi)
 Status: In Progress

** Affects: linux (Ubuntu Zesty)
 Importance: Undecided
 Assignee: Tim Gardner (timg-tpi)
 Status: Fix Committed

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1660634

Title:
  Enable CONFIG_NET_DROP_MONITOR=m in Ubuntu Kernel

Status in linux package in Ubuntu:
  Fix Committed
Status in linux source package in Trusty:
  In Progress
Status in linux source package in Xenial:
  In Progress
Status in linux source package in Yakkety:
  In Progress
Status in linux source package in Zesty:
  Fix Committed

Bug description:
  CONFIG_NET_DROP_MONITOR=m is needed for the dropwatch software.

  At the moment dropwatch is packaged only for Fedora:
  https://fedorahosted.org/dropwatch/

  The kernel compiled with CONFIG_NET_DROP_MONITOR=n makes not possible
  to use this software.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1660634/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp