group.of.nepali.translators team mailing list archive
-
group.of.nepali.translators team
-
Mailing list archive
-
Message #47558
[Bug 1715609] Re: kernel warning: skb_warn_bad_offload
[Expired for linux (Ubuntu) because there has been no activity for 60
days.]
** Changed in: linux (Ubuntu)
Status: Incomplete => Expired
--
You received this bug notification because you are a member of नेपाली
भाषा समायोजकहरुको समूह, which is subscribed to Xenial.
Matching subscriptions: Ubuntu 16.04 Bugs
https://bugs.launchpad.net/bugs/1715609
Title:
kernel warning: skb_warn_bad_offload
Status in linux package in Ubuntu:
Expired
Status in linux source package in Xenial:
Expired
Bug description:
Since upgrading to kernel version 4.10.0-33.37, we're seeing a lot of
call traces triggered by skb_warn_bad_offload in the syslog.
Regression introduced when fixing this bug?
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447
kernel: [570943.494444] ------------[ cut here ]------------
kernel: [570943.494448] WARNING: CPU: 3 PID: 21982 at /build/linux-hwe-YA6IuF/linux-hwe-4.10.0/net/core/dev.c:2576 skb_warn_bad_offload+0xd1/0x120
kernel: [570943.494450] e1000e: caps=(0x00000030002149a9, 0x0000000000000000) len=1701 data_len=1659 gso_size=1480 gso_type=2 ip_summed=0
kernel: [570943.494451] Modules linked in: udp_diag tcp_diag inet_diag echainiv authenc xfrm4_mode_tunnel xt_state binfmt_misc veth xfrm_user xfrm4_tunnel tunnel4 ipcomp xfrm_ipcomp esp4 ah4 af_key xfrm_algo bridge stp llc iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat ipt_REJECT nf_reject_ipv4 xt_tcpudp nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack iptable_filter ip_tables x_tables intel_rapl x86_pkg_temp_thermal intel_powerclamp coretemp kvm_intel kvm ppdev irqbypass crct10dif_pclmul crc32_pclmul ghash_clmulni_intel pcbc aesni_intel aes_x86_64 crypto_simd glue_helper cryptd intel_cstate intel_rapl_perf hci_uart ie31200_edac btbcm edac_core intel_pch_thermal btqca serio_raw btintel bluetooth parport_pc parport mac_hid intel_lpss_acpi acpi_pad intel_lpss autofs4
kernel: [570943.494500] btrfs raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq libcrc32c raid0 multipath linear raid1 e1000e psmouse ptp ahci pps_core libahci wmi pinctrl_sunrisepoint i2c_hid video pinctrl_intel hid fjes
kernel: [570943.494524] CPU: 3 PID: 21982 Comm: charon Tainted: G W 4.10.0-33-generic #37~16.04.1-Ubuntu
kernel: [570943.494524] Hardware name: ...
kernel: [570943.494525] Call Trace:
kernel: [570943.494541] <IRQ>
kernel: [570943.494544] dump_stack+0x63/0x90
kernel: [570943.494545] __warn+0xcb/0xf0
kernel: [570943.494546] warn_slowpath_fmt+0x5f/0x80
kernel: [570943.494547] ? ___ratelimit+0xa2/0xf0
kernel: [570943.494549] skb_warn_bad_offload+0xd1/0x120
kernel: [570943.494550] __skb_gso_segment+0x17d/0x190
kernel: [570943.494564] validate_xmit_skb+0x14f/0x2a0
kernel: [570943.494565] validate_xmit_skb_list+0x43/0x70
kernel: [570943.494567] sch_direct_xmit+0x16b/0x1c0
kernel: [570943.494568] __dev_queue_xmit+0x47e/0x690
kernel: [570943.494569] dev_queue_xmit+0x10/0x20
kernel: [570943.494570] ip_finish_output2+0x27a/0x370
kernel: [570943.494571] ip_finish_output+0x176/0x270
kernel: [570943.494571] ip_output+0x76/0xe0
kernel: [570943.494572] ? ip_fragment.constprop.49+0x80/0x80
kernel: [570943.494573] ip_forward_finish+0x43/0x70
kernel: [570943.494574] ip_forward+0x385/0x460
kernel: [570943.494575] ? ip_frag_mem+0x50/0x50
kernel: [570943.494575] ip_rcv_finish+0x11b/0x400
kernel: [570943.494576] ip_rcv+0x28b/0x3a0
...
kernel: [570943.494632] ---[ end trace f01d0adcc1256afe ]---
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1715609/+subscriptions