← Back to team overview

kernel-packages team mailing list archive

[Bug 1544978] Re: PCI Call Traces hw csum failure in dmesg with 4.4.0-2-generic

 

This bug was fixed in the package linux - 4.4.0-24.43

---------------
linux (4.4.0-24.43) xenial; urgency=low

  [ Kamal Mostafa ]

  * CVE-2016-1583 (LP: #1588871)
    - ecryptfs: fix handling of directory opening
    - SAUCE: proc: prevent stacking filesystems on top
    - SAUCE: ecryptfs: forbid opening files without mmap handler
    - SAUCE: sched: panic on corrupted stack end

  * arm64: statically link rtc-efi (LP: #1583738)
    - [Config] Link rtc-efi statically on arm64

 -- Kamal Mostafa <kamal@xxxxxxxxxxxxx>  Fri, 03 Jun 2016 10:02:16 -0700

** Changed in: linux (Ubuntu Xenial)
       Status: Fix Committed => Fix Released

** CVE added: http://www.cve.mitre.org/cgi-
bin/cvename.cgi?name=2016-1583

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1544978

Title:
  PCI Call Traces  hw csum failure in dmesg with  4.4.0-2-generic

Status in Ubuntu on IBM z Systems:
  Fix Committed
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Xenial:
  Fix Released
Status in linux source package in Yakkety:
  Fix Released

Bug description:
  == Comment: #0 - Helmut Grauer <helmut.grauer@xxxxxxxxxx> - 2016-02-12 03:00:03 ==
  Hi
   getting the following Call Traces when PCI interfaces will be configured
  [  246.051566] enp0s0: hw csum failure
  [  246.051571] CPU: 2 PID: 0 Comm: swapper/2 Tainted: G            E   4.4.0-2-generic #16-Ubuntu
  [  246.051573]        00000000f9793778 00000000f9793808 0000000000000002 0000000000000000
                        00000000f97938a8 00000000f9793820 00000000f9793820 0000000000114182
                        0000000000000166 000000000091e9ca 000000000000000a 000000000000000a
                        00000000f9793868 00000000f9793808 0000000000000000 00000000f9d38000
                        0000000000000000 0000000000114182 00000000f9793808 00000000f9793868
  [  246.051581] Call Trace:
  [  246.051589] ([<00000000001140b8>] show_trace+0x140/0x148)
  [  246.051590]  [<0000000000114136>] show_stack+0x76/0xe8
  [  246.051595]  [<00000000005172d6>] dump_stack+0x6e/0x90
  [  246.051599]  [<0000000000673500>] __skb_checksum_complete+0xd0/0xd8
  [  246.051605]  [<000000000076ae24>] icmpv6_rcv+0x124/0x500
  [  246.051608]  [<0000000000746e60>] ip6_input_finish+0x170/0x4e0
  [  246.051610]  [<000000000074775c>] ip6_input+0x4c/0xd0
  [  246.051611]  [<00000000007478ee>] ip6_mc_input+0x10e/0x280
  [  246.051612]  [<0000000000747538>] ipv6_rcv+0x368/0x540
  [  246.051616]  [<000000000067e5d4>] __netif_receive_skb_core+0x6fc/0xaf8
  [  246.051618]  [<0000000000681a56>] netif_receive_skb_internal+0x3e/0xd8
  [  246.051619]  [<0000000000682314>] napi_gro_frags+0x17c/0x208
  [  246.051627]  [<000003ff805f3a2c>] mlx4_en_process_rx_cq+0x8b4/0xbd0 [mlx4_en]
  [  246.051630]  [<000003ff805f3e62>] mlx4_en_poll_rx_cq+0xc2/0x1a0 [mlx4_en]
  [  246.051631]  [<00000000006839e2>] net_rx_action+0x2a2/0x418
  [  246.051635]  [<0000000000162726>] __do_softirq+0x156/0x300
  [  246.051637]  [<0000000000162ace>] irq_exit+0xd6/0xf8
  [  246.051641]  [<000000000010cc5a>] do_IRQ+0x6a/0x88
  [  246.051644]  [<00000000007a99c2>] io_int_handler+0x112/0x220
  [  246.051646]  [<0000000000104856>] enabled_wait+0x56/0xa8
  [  246.051649] ([<0000000000ccb888>] cpu_dead_idle+0x0/0x8)
  [  246.051651]  [<0000000000104b5a>] arch_cpu_idle+0x32/0x48
  [  246.051669]  [<00000000001a8198>] cpu_startup_entry+0x200/0x278
  [  246.051674]  [<00000000001156ba>] smp_start_secondary+0xea/0xf8
  [  246.051679]  [<00000000007a9f42>] restart_int_handler+0x62/0x78
  [  246.051680]  [<0000000000000000>]           (null)

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-z-systems/+bug/1544978/+subscriptions