← Back to team overview

group.of.nepali.translators team mailing list archive

[Bug 1705447] Re: misleading kernel warning skb_warn_bad_offload during checksum calculation

 

** Changed in: linux (Ubuntu)
       Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Zesty:
  Fix Released

Bug description:
  Even when the packet says checksum calculation is unnecessary the
  kernel will still check the checksum and display a warning that the
  checksum is bad.

  This has been fixed upstream in Kernel 4.11 by commit id:
  b2504a5dbef3305ef41988ad270b0e8ec289331c

  We have reports of Ubuntu 16.04 virtual machines (with ip forward
  enabled) displaying these warnings:

  
  [10480.074664] ------------[ cut here ]------------
  [10480.074667] WARNING: CPU: 1 PID: 0 at /build/linux-hwe-X3pKE5/linux-hwe-4.8.0/net/core/dev.c:2444 skb_warn_bad_offload+0xd1/0x120
  [10480.074669] docker0: caps=(0x00000400ffbb78e9, 0x0000000000000000) len=2962 data_len=2834 gso_size=1448 gso_type=5 ip_summed=1
  [10480.074670] Modules linked in: veth nfsv3 nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace sunrpc fscache ipt_MASQUERADE nf_nat_masquerade_ipv4 xfrm_user xfrm_algo iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype iptable_filter ip_tables xt_conntrack x_tables nf_nat nf_conntrack br_netfilter bridge stp llc aufs zfs(PO) zunicode(PO) zcommon(PO) znvpair(PO) spl(O) zavl(PO) crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw glue_helper ablk_helper cryptd input_leds joydev serio_raw i2c_piix4 mac_hid parport_pc ppdev lp parport autofs4 hid_generic usbhid hid virtio_scsi psmouse virtio_net pata_acpi floppy
  [10480.074695] CPU: 1 PID: 0 Comm: swapper/1 Tainted: P        W  O    4.8.0-52-generic #55~16.04.1-Ubuntu
  [10480.074696] Hardware name: Nutanix AHV, BIOS seabios-1.7.5-11.el6 04/01/2014
  [10480.074697]  0000000000000286 ec176c2ae03bc036 ffff8beef5643870 ffffffffb7a2e7b3
  [10480.074699]  ffff8beef56438c0 0000000000000000 ffff8beef56438b0 ffffffffb768314b
  [10480.074702]  0000098cb84fba80 ffff8bed61f82000 ffff8bee9915c000 0000000000000005
  [10480.074704] Call Trace:
  [10480.074704]  <IRQ>  [<ffffffffb7a2e7b3>] dump_stack+0x63/0x90
  [10480.074708]  [<ffffffffb768314b>] __warn+0xcb/0xf0
  [10480.074710]  [<ffffffffb76831cf>] warn_slowpath_fmt+0x5f/0x80
  [10480.074713]  [<ffffffffb7a35012>] ? ___ratelimit+0xa2/0xf0
  [10480.074714]  [<ffffffffb7d7c681>] skb_warn_bad_offload+0xd1/0x120
  [10480.074716]  [<ffffffffb7d80d58>] __skb_gso_segment+0xd8/0x140
  [10480.074717]  [<ffffffffb7d811af>] validate_xmit_skb+0x14f/0x2a0
  [10480.074719]  [<ffffffffb7d81972>] __dev_queue_xmit+0x322/0x6d0
  [10480.074720]  [<ffffffffc03cd746>] ? nf_nat_ipv4_fn+0x1a6/0x230 [nf_nat_ipv4]
  [10480.074723]  [<ffffffffb7d81d30>] dev_queue_xmit+0x10/0x20
  [10480.074725]  [<ffffffffb7dc5272>] ip_finish_output2+0x292/0x380
  [10480.074726]  [<ffffffffc040223d>] ? ipv4_confirm+0x7d/0x100 [nf_conntrack_ipv4]
  [10480.074728]  [<ffffffffb7dc60a2>] ip_finish_output+0x132/0x1d0
  [10480.074729]  [<ffffffffb7db9703>] ? nf_hook_slow+0x73/0xd0
  [10480.074731]  [<ffffffffb7dc6aee>] ip_output+0x6e/0xf0
  [10480.074733]  [<ffffffffb7dc5f70>] ? __ip_flush_pending_frames.isra.40+0x90/0x90
  [10480.074736]  [<ffffffffb7dc2883>] ip_forward_finish+0x43/0x70
  [10480.074738]  [<ffffffffb7dc2c34>] ip_forward+0x384/0x480
  [10480.074739]  [<ffffffffb7dc2840>] ? ip_frag_mem+0x50/0x50
  [10480.074741]  [<ffffffffb7dc085b>] ip_rcv_finish+0x11b/0x400
  [10480.074743]  [<ffffffffb7dc11eb>] ip_rcv+0x28b/0x3c0
  [10480.074744]  [<ffffffffb7dc0740>] ? inet_del_offload+0x40/0x40
  [10480.074746]  [<ffffffffb7d7ec44>] __netif_receive_skb_core+0x524/0xab0
  [10480.074747]  [<ffffffffb780aaa7>] ? kmem_cache_alloc+0xd7/0x1b0
  [10480.074749]  [<ffffffffb7d6f7ca>] ? __build_skb+0x2a/0xe0
  [10480.074751]  [<ffffffffb7d7f1e8>] __netif_receive_skb+0x18/0x60
  [10480.074753]  [<ffffffffb7d7f262>] netif_receive_skb_internal+0x32/0xa0
  [10480.074754]  [<ffffffffb7d8025d>] napi_gro_receive+0xcd/0x120
  [10480.074756]  [<ffffffffc0286963>] virtnet_receive+0x1c3/0x970 [virtio_net]
  [10480.074758]  [<ffffffffb76b5e59>] ? update_cfs_rq_load_avg+0x1f9/0x4c0
  [10480.074760]  [<ffffffffc028712d>] virtnet_poll+0x1d/0x80 [virtio_net]
  [10480.074762]  [<ffffffffb7d7fa68>] net_rx_action+0x238/0x380
  [10480.074764]  [<ffffffffb7e9d406>] __do_softirq+0xf6/0x280
  [10480.074765]  [<ffffffffb7688eb3>] irq_exit+0xa3/0xb0
  [10480.074766]  [<ffffffffb7e9d164>] do_IRQ+0x54/0xd0
  [10480.074768]  [<ffffffffb7e9b242>] common_interrupt+0x82/0x82
  [10480.074768]  <EOI>  [<ffffffffb7664296>] ? native_safe_halt+0x6/0x10
  [10480.074772]  [<ffffffffb7637e9e>] default_idle+0x1e/0xd0
  [10480.074774]  [<ffffffffb763861f>] arch_cpu_idle+0xf/0x20
  [10480.074775]  [<ffffffffb76c7b3a>] default_idle_call+0x2a/0x40
  [10480.074776]  [<ffffffffb76c7e3a>] cpu_startup_entry+0x2ea/0x350
  [10480.074778]  [<ffffffffb76518b1>] start_secondary+0x151/0x190
  [10480.074781] ---[ end trace 3a9bd18de5564b05 ]---

  
  We have recompiled your latest 16.04.2 kernel with this patch and confirmed that this warning does not happen. Could you please consider including this fix in your next 16.04 LTS release?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions