Public bug reported:

Even when the packet says checksum calculation is unnecessary the kernel
will still check the checksum and display a warning that the checksum is
bad.

This has been fixed upstream in Kernel 4.11 by commit id:
b2504a5dbef3305ef41988ad270b0e8ec289331c

We have reports of Ubuntu 16.04 virtual machines (with ip forward
enabled) displaying these warnings:


[10480.074664] ------------[ cut here ]------------
[10480.074667] WARNING: CPU: 1 PID: 0 at 
/build/linux-hwe-X3pKE5/linux-hwe-4.8.0/net/core/dev.c:2444 
skb_warn_bad_offload+0xd1/0x120
[10480.074669] docker0: caps=(0x00000400ffbb78e9, 0x0000000000000000) len=2962 
data_len=2834 gso_size=1448 gso_type=5 ip_summed=1
[10480.074670] Modules linked in: veth nfsv3 nfs_acl rpcsec_gss_krb5 
auth_rpcgss nfsv4 nfs lockd grace sunrpc fscache ipt_MASQUERADE 
nf_nat_masquerade_ipv4 xfrm_user xfrm_algo iptable_nat nf_conntrack_ipv4 
nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype iptable_filter ip_tables xt_conntrack 
x_tables nf_nat nf_conntrack br_netfilter bridge stp llc aufs zfs(PO) 
zunicode(PO) zcommon(PO) znvpair(PO) spl(O) zavl(PO) crct10dif_pclmul 
crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw glue_helper 
ablk_helper cryptd input_leds joydev serio_raw i2c_piix4 mac_hid parport_pc 
ppdev lp parport autofs4 hid_generic usbhid hid virtio_scsi psmouse virtio_net 
pata_acpi floppy
[10480.074695] CPU: 1 PID: 0 Comm: swapper/1 Tainted: P        W  O    
4.8.0-52-generic #55~16.04.1-Ubuntu
[10480.074696] Hardware name: Nutanix AHV, BIOS seabios-1.7.5-11.el6 04/01/2014
[10480.074697]  0000000000000286 ec176c2ae03bc036 ffff8beef5643870 
ffffffffb7a2e7b3
[10480.074699]  ffff8beef56438c0 0000000000000000 ffff8beef56438b0 
ffffffffb768314b
[10480.074702]  0000098cb84fba80 ffff8bed61f82000 ffff8bee9915c000 
0000000000000005
[10480.074704] Call Trace:
[10480.074704]  <IRQ>  [<ffffffffb7a2e7b3>] dump_stack+0x63/0x90
[10480.074708]  [<ffffffffb768314b>] __warn+0xcb/0xf0
[10480.074710]  [<ffffffffb76831cf>] warn_slowpath_fmt+0x5f/0x80
[10480.074713]  [<ffffffffb7a35012>] ? ___ratelimit+0xa2/0xf0
[10480.074714]  [<ffffffffb7d7c681>] skb_warn_bad_offload+0xd1/0x120
[10480.074716]  [<ffffffffb7d80d58>] __skb_gso_segment+0xd8/0x140
[10480.074717]  [<ffffffffb7d811af>] validate_xmit_skb+0x14f/0x2a0
[10480.074719]  [<ffffffffb7d81972>] __dev_queue_xmit+0x322/0x6d0
[10480.074720]  [<ffffffffc03cd746>] ? nf_nat_ipv4_fn+0x1a6/0x230 [nf_nat_ipv4]
[10480.074723]  [<ffffffffb7d81d30>] dev_queue_xmit+0x10/0x20
[10480.074725]  [<ffffffffb7dc5272>] ip_finish_output2+0x292/0x380
[10480.074726]  [<ffffffffc040223d>] ? ipv4_confirm+0x7d/0x100 
[nf_conntrack_ipv4]
[10480.074728]  [<ffffffffb7dc60a2>] ip_finish_output+0x132/0x1d0
[10480.074729]  [<ffffffffb7db9703>] ? nf_hook_slow+0x73/0xd0
[10480.074731]  [<ffffffffb7dc6aee>] ip_output+0x6e/0xf0
[10480.074733]  [<ffffffffb7dc5f70>] ? 
__ip_flush_pending_frames.isra.40+0x90/0x90
[10480.074736]  [<ffffffffb7dc2883>] ip_forward_finish+0x43/0x70
[10480.074738]  [<ffffffffb7dc2c34>] ip_forward+0x384/0x480
[10480.074739]  [<ffffffffb7dc2840>] ? ip_frag_mem+0x50/0x50
[10480.074741]  [<ffffffffb7dc085b>] ip_rcv_finish+0x11b/0x400
[10480.074743]  [<ffffffffb7dc11eb>] ip_rcv+0x28b/0x3c0
[10480.074744]  [<ffffffffb7dc0740>] ? inet_del_offload+0x40/0x40
[10480.074746]  [<ffffffffb7d7ec44>] __netif_receive_skb_core+0x524/0xab0
[10480.074747]  [<ffffffffb780aaa7>] ? kmem_cache_alloc+0xd7/0x1b0
[10480.074749]  [<ffffffffb7d6f7ca>] ? __build_skb+0x2a/0xe0
[10480.074751]  [<ffffffffb7d7f1e8>] __netif_receive_skb+0x18/0x60
[10480.074753]  [<ffffffffb7d7f262>] netif_receive_skb_internal+0x32/0xa0
[10480.074754]  [<ffffffffb7d8025d>] napi_gro_receive+0xcd/0x120
[10480.074756]  [<ffffffffc0286963>] virtnet_receive+0x1c3/0x970 [virtio_net]
[10480.074758]  [<ffffffffb76b5e59>] ? update_cfs_rq_load_avg+0x1f9/0x4c0
[10480.074760]  [<ffffffffc028712d>] virtnet_poll+0x1d/0x80 [virtio_net]
[10480.074762]  [<ffffffffb7d7fa68>] net_rx_action+0x238/0x380
[10480.074764]  [<ffffffffb7e9d406>] __do_softirq+0xf6/0x280
[10480.074765]  [<ffffffffb7688eb3>] irq_exit+0xa3/0xb0
[10480.074766]  [<ffffffffb7e9d164>] do_IRQ+0x54/0xd0
[10480.074768]  [<ffffffffb7e9b242>] common_interrupt+0x82/0x82
[10480.074768]  <EOI>  [<ffffffffb7664296>] ? native_safe_halt+0x6/0x10
[10480.074772]  [<ffffffffb7637e9e>] default_idle+0x1e/0xd0
[10480.074774]  [<ffffffffb763861f>] arch_cpu_idle+0xf/0x20
[10480.074775]  [<ffffffffb76c7b3a>] default_idle_call+0x2a/0x40
[10480.074776]  [<ffffffffb76c7e3a>] cpu_startup_entry+0x2ea/0x350
[10480.074778]  [<ffffffffb76518b1>] start_secondary+0x151/0x190
[10480.074781] ---[ end trace 3a9bd18de5564b05 ]---


We have recompiled your latest 16.04.2 kernel with this patch and confirmed 
that this warning does not happen. Could you please consider including this fix 
in your next 16.04 LTS release?

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: New

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to