Public bug reported:
Even when the packet says checksum calculation is unnecessary the kernel
will still check the checksum and display a warning that the checksum is
bad.
This has been fixed upstream in Kernel 4.11 by commit id:
b2504a5dbef3305ef41988ad270b0e8ec289331c
We have reports of Ubuntu 16.04 virtual machines (with ip forward
enabled) displaying these warnings:
[10480.074664] ------------[ cut here ]------------
[10480.074667] WARNING: CPU: 1 PID: 0 at
/build/linux-hwe-X3pKE5/linux-hwe-4.8.0/net/core/dev.c:2444
skb_warn_bad_offload+0xd1/0x120
[10480.074669] docker0: caps=(0x00000400ffbb78e9, 0x0000000000000000) len=2962
data_len=2834 gso_size=1448 gso_type=5 ip_summed=1
[10480.074670] Modules linked in: veth nfsv3 nfs_acl rpcsec_gss_krb5
auth_rpcgss nfsv4 nfs lockd grace sunrpc fscache ipt_MASQUERADE
nf_nat_masquerade_ipv4 xfrm_user xfrm_algo iptable_nat nf_conntrack_ipv4
nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype iptable_filter ip_tables xt_conntrack
x_tables nf_nat nf_conntrack br_netfilter bridge stp llc aufs zfs(PO)
zunicode(PO) zcommon(PO) znvpair(PO) spl(O) zavl(PO) crct10dif_pclmul
crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw glue_helper
ablk_helper cryptd input_leds joydev serio_raw i2c_piix4 mac_hid parport_pc
ppdev lp parport autofs4 hid_generic usbhid hid virtio_scsi psmouse virtio_net
pata_acpi floppy
[10480.074695] CPU: 1 PID: 0 Comm: swapper/1 Tainted: P W O
4.8.0-52-generic #55~16.04.1-Ubuntu
[10480.074696] Hardware name: Nutanix AHV, BIOS seabios-1.7.5-11.el6 04/01/2014
[10480.074697] 0000000000000286 ec176c2ae03bc036 ffff8beef5643870
ffffffffb7a2e7b3
[10480.074699] ffff8beef56438c0 0000000000000000 ffff8beef56438b0
ffffffffb768314b
[10480.074702] 0000098cb84fba80 ffff8bed61f82000 ffff8bee9915c000
0000000000000005
[10480.074704] Call Trace:
[10480.074704] <IRQ> [<ffffffffb7a2e7b3>] dump_stack+0x63/0x90
[10480.074708] [<ffffffffb768314b>] __warn+0xcb/0xf0
[10480.074710] [<ffffffffb76831cf>] warn_slowpath_fmt+0x5f/0x80
[10480.074713] [<ffffffffb7a35012>] ? ___ratelimit+0xa2/0xf0
[10480.074714] [<ffffffffb7d7c681>] skb_warn_bad_offload+0xd1/0x120
[10480.074716] [<ffffffffb7d80d58>] __skb_gso_segment+0xd8/0x140
[10480.074717] [<ffffffffb7d811af>] validate_xmit_skb+0x14f/0x2a0
[10480.074719] [<ffffffffb7d81972>] __dev_queue_xmit+0x322/0x6d0
[10480.074720] [<ffffffffc03cd746>] ? nf_nat_ipv4_fn+0x1a6/0x230 [nf_nat_ipv4]
[10480.074723] [<ffffffffb7d81d30>] dev_queue_xmit+0x10/0x20
[10480.074725] [<ffffffffb7dc5272>] ip_finish_output2+0x292/0x380
[10480.074726] [<ffffffffc040223d>] ? ipv4_confirm+0x7d/0x100
[nf_conntrack_ipv4]
[10480.074728] [<ffffffffb7dc60a2>] ip_finish_output+0x132/0x1d0
[10480.074729] [<ffffffffb7db9703>] ? nf_hook_slow+0x73/0xd0
[10480.074731] [<ffffffffb7dc6aee>] ip_output+0x6e/0xf0
[10480.074733] [<ffffffffb7dc5f70>] ?
__ip_flush_pending_frames.isra.40+0x90/0x90
[10480.074736] [<ffffffffb7dc2883>] ip_forward_finish+0x43/0x70
[10480.074738] [<ffffffffb7dc2c34>] ip_forward+0x384/0x480
[10480.074739] [<ffffffffb7dc2840>] ? ip_frag_mem+0x50/0x50
[10480.074741] [<ffffffffb7dc085b>] ip_rcv_finish+0x11b/0x400
[10480.074743] [<ffffffffb7dc11eb>] ip_rcv+0x28b/0x3c0
[10480.074744] [<ffffffffb7dc0740>] ? inet_del_offload+0x40/0x40
[10480.074746] [<ffffffffb7d7ec44>] __netif_receive_skb_core+0x524/0xab0
[10480.074747] [<ffffffffb780aaa7>] ? kmem_cache_alloc+0xd7/0x1b0
[10480.074749] [<ffffffffb7d6f7ca>] ? __build_skb+0x2a/0xe0
[10480.074751] [<ffffffffb7d7f1e8>] __netif_receive_skb+0x18/0x60
[10480.074753] [<ffffffffb7d7f262>] netif_receive_skb_internal+0x32/0xa0
[10480.074754] [<ffffffffb7d8025d>] napi_gro_receive+0xcd/0x120
[10480.074756] [<ffffffffc0286963>] virtnet_receive+0x1c3/0x970 [virtio_net]
[10480.074758] [<ffffffffb76b5e59>] ? update_cfs_rq_load_avg+0x1f9/0x4c0
[10480.074760] [<ffffffffc028712d>] virtnet_poll+0x1d/0x80 [virtio_net]
[10480.074762] [<ffffffffb7d7fa68>] net_rx_action+0x238/0x380
[10480.074764] [<ffffffffb7e9d406>] __do_softirq+0xf6/0x280
[10480.074765] [<ffffffffb7688eb3>] irq_exit+0xa3/0xb0
[10480.074766] [<ffffffffb7e9d164>] do_IRQ+0x54/0xd0
[10480.074768] [<ffffffffb7e9b242>] common_interrupt+0x82/0x82
[10480.074768] <EOI> [<ffffffffb7664296>] ? native_safe_halt+0x6/0x10
[10480.074772] [<ffffffffb7637e9e>] default_idle+0x1e/0xd0
[10480.074774] [<ffffffffb763861f>] arch_cpu_idle+0xf/0x20
[10480.074775] [<ffffffffb76c7b3a>] default_idle_call+0x2a/0x40
[10480.074776] [<ffffffffb76c7e3a>] cpu_startup_entry+0x2ea/0x350
[10480.074778] [<ffffffffb76518b1>] start_secondary+0x151/0x190
[10480.074781] ---[ end trace 3a9bd18de5564b05 ]---
We have recompiled your latest 16.04.2 kernel with this patch and confirmed
that this warning does not happen. Could you please consider including this fix
in your next 16.04 LTS release?
** Affects: linux (Ubuntu)
Importance: Undecided
Status: New
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1705447
Title:
misleading kernel warning skb_warn_bad_offload during checksum
calculation
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions
--
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs