We noticed the same kernel warning with the latest LTS kernel:

[ 159.617976] ------------[ cut here ]------------
[ 159.617987] WARNING: CPU: 3 PID: 5436 at 
/build/linux-Hlembm/linux-4.4.0/net/core/dev.c:2444 
skb_warn_bad_offload+0xd1/0x120()
[ 159.617990] docker_gwbridge: caps=(0x000000801fdb78e9, 0x0000000000000000) 
len=2103 data_len=1975 gso_size=1448 gso_type=5 ip_summed=1
[ 159.617991] Modules linked in: ip_vs_rr xt_ipvs ip_vs xt_nat xt_tcpudp veth 
tcp_diag udp_diag inet_diag binfmt_misc vxlan ip6_udp_tunnel udp_tunnel 
iptable_mangle xt_mark ipt_MASQUERADE nf_nat_masquerade_ipv4 xfrm_user 
xfrm_algo iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype 
iptable_filter ip_tables xt_conntrack x_tables nf_nat nf_conntrack br_netfilter 
bridge stp llc overlay ppdev joydev input_leds serio_raw parport_pc parport 
i2c_piix4 8250_fintek mac_hid ib_iser rdma_cm iw_cm ib_cm ib_sa ib_mad ib_core 
ib_addr iscsi_tcp libiscsi_tcp libiscsi scsi_transport_iscsi autofs4 btrfs 
raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor 
raid6_pq libcrc32c raid1 raid0 multipath linear hid_generic usbhid hid 
crct10dif_pclmul crc32_pclmul ghash_clmulni_intel
[ 159.618043] aesni_intel aes_x86_64 lrw gf128mul glue_helper ablk_helper 
cryptd psmouse virtio_scsi pata_acpi floppy
[ 159.618053] CPU: 3 PID: 5436 Comm: java Tainted: G W 4.4.0-75-generic 
#96-Ubuntu
[ 159.618054] Hardware name: Nutanix AHV, BIOS seabios-1.7.5-11.el6 04/01/2014
[ 159.618056] 0000000000000286 0000000021eefd21 ffff88042d6c3870 
ffffffff813f8493
[ 159.618058] ffff88042d6c38b8 ffffffff81d6e7b0 ffff88042d6c38a8 
ffffffff81081302
[ 159.618061] ffff880395dbf500 ffff88042a1f0000 0000000000000005 
ffff880395dbf500
[ 159.618063] Call Trace:
[ 159.618065] <IRQ> [<ffffffff813f8493>] dump_stack+0x63/0x90
[ 159.618075] [<ffffffff81081302>] warn_slowpath_common+0x82/0xc0
[ 159.618077] [<ffffffff8108139c>] warn_slowpath_fmt+0x5c/0x80
[ 159.618081] [<ffffffff813fe562>] ? ___ratelimit+0xa2/0xe0
[ 159.618082] [<ffffffff8172ec31>] skb_warn_bad_offload+0xd1/0x120
[ 159.618085] [<ffffffff817322ce>] __skb_gso_segment+0x7e/0xd0
[ 159.618087] [<ffffffff8173267d>] validate_xmit_skb.isra.97.part.98+0x10d/0x2b0
[ 159.618089] [<ffffffff817332b2>] __dev_queue_xmit+0x582/0x590
[ 159.618091] [<ffffffff817332d0>] dev_queue_xmit+0x10/0x20
[ 159.618094] [<ffffffff8173c568>] neigh_resolve_output+0x118/0x1c0
[ 159.618099] [<ffffffff81772b56>] ip_finish_output2+0x146/0x380
[ 159.618104] [<ffffffffc03e023d>] ? ipv4_confirm+0x7d/0x100 [nf_conntrack_ipv4]
[ 159.618106] [<ffffffff81773af6>] ip_finish_output+0x136/0x1f0
[ 159.618109] [<ffffffff817671b3>] ? nf_hook_slow+0x73/0xd0
[ 159.618111] [<ffffffff817744fe>] ip_output+0x6e/0xe0
[ 159.618114] [<ffffffff817739c0>] ? __ip_flush_pending_frames.isra.39+0x90/0x90
[ 159.618116] [<ffffffff81770143>] ip_forward_finish+0x43/0x70
[ 159.618117] [<ffffffff81770509>] ip_forward+0x399/0x480
[ 159.618119] [<ffffffff81770100>] ? ip_frag_mem+0x50/0x50
[ 159.618121] [<ffffffff8176e192>] ip_rcv_finish+0x92/0x320
[ 159.618123] [<ffffffff8176eac1>] ip_rcv+0x291/0x3a0
[ 159.618125] [<ffffffff8176e100>] ? inet_del_offload+0x40/0x40
[ 159.618126] [<ffffffff817307a4>] __netif_receive_skb_core+0x704/0xa60
[ 159.618129] [<ffffffff8172185a>] ? __build_skb+0x2a/0xe0
[ 159.618131] [<ffffffff81730b18>] __netif_receive_skb+0x18/0x60
[ 159.618132] [<ffffffff81730b92>] netif_receive_skb_internal+0x32/0xa0
[ 159.618134] [<ffffffff81731813>] napi_gro_receive+0xc3/0x120
[ 159.618137] [<ffffffff81604694>] virtnet_receive+0x4a4/0x8f0
[ 159.618139] [<ffffffff81604afd>] virtnet_poll+0x1d/0x80
[ 159.618140] [<ffffffff8173105e>] net_rx_action+0x21e/0x360
[ 159.618144] [<ffffffff81601ed3>] ? skb_recv_done+0x43/0x50
[ 159.618147] [<ffffffff81085de1>] __do_softirq+0x101/0x290
[ 159.618149] [<ffffffff810860e3>] irq_exit+0xa3/0xb0
[ 159.618153] [<ffffffff8183e364>] do_IRQ+0x54/0xd0
[ 159.618157] [<ffffffff8183c442>] common_interrupt+0x82/0x82
[ 159.618158] <EOI>
[ 159.618159] ---[ end trace 579561cac9470a51 ]---

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1705447

Title:
  misleading kernel warning skb_warn_bad_offload during checksum
  calculation

Status in linux package in Ubuntu:
  Incomplete

Bug description:
  Even when the packet says checksum calculation is unnecessary the
  kernel will still check the checksum and display a warning that the
  checksum is bad.

  This has been fixed upstream in Kernel 4.11 by commit id:
  b2504a5dbef3305ef41988ad270b0e8ec289331c

  We have reports of Ubuntu 16.04 virtual machines (with ip forward
  enabled) displaying these warnings:

  
  [10480.074664] ------------[ cut here ]------------
  [10480.074667] WARNING: CPU: 1 PID: 0 at 
/build/linux-hwe-X3pKE5/linux-hwe-4.8.0/net/core/dev.c:2444 
skb_warn_bad_offload+0xd1/0x120
  [10480.074669] docker0: caps=(0x00000400ffbb78e9, 0x0000000000000000) 
len=2962 data_len=2834 gso_size=1448 gso_type=5 ip_summed=1
  [10480.074670] Modules linked in: veth nfsv3 nfs_acl rpcsec_gss_krb5 
auth_rpcgss nfsv4 nfs lockd grace sunrpc fscache ipt_MASQUERADE 
nf_nat_masquerade_ipv4 xfrm_user xfrm_algo iptable_nat nf_conntrack_ipv4 
nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype iptable_filter ip_tables xt_conntrack 
x_tables nf_nat nf_conntrack br_netfilter bridge stp llc aufs zfs(PO) 
zunicode(PO) zcommon(PO) znvpair(PO) spl(O) zavl(PO) crct10dif_pclmul 
crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw glue_helper 
ablk_helper cryptd input_leds joydev serio_raw i2c_piix4 mac_hid parport_pc 
ppdev lp parport autofs4 hid_generic usbhid hid virtio_scsi psmouse virtio_net 
pata_acpi floppy
  [10480.074695] CPU: 1 PID: 0 Comm: swapper/1 Tainted: P        W  O    
4.8.0-52-generic #55~16.04.1-Ubuntu
  [10480.074696] Hardware name: Nutanix AHV, BIOS seabios-1.7.5-11.el6 
04/01/2014
  [10480.074697]  0000000000000286 ec176c2ae03bc036 ffff8beef5643870 
ffffffffb7a2e7b3
  [10480.074699]  ffff8beef56438c0 0000000000000000 ffff8beef56438b0 
ffffffffb768314b
  [10480.074702]  0000098cb84fba80 ffff8bed61f82000 ffff8bee9915c000 
0000000000000005
  [10480.074704] Call Trace:
  [10480.074704]  <IRQ>  [<ffffffffb7a2e7b3>] dump_stack+0x63/0x90
  [10480.074708]  [<ffffffffb768314b>] __warn+0xcb/0xf0
  [10480.074710]  [<ffffffffb76831cf>] warn_slowpath_fmt+0x5f/0x80
  [10480.074713]  [<ffffffffb7a35012>] ? ___ratelimit+0xa2/0xf0
  [10480.074714]  [<ffffffffb7d7c681>] skb_warn_bad_offload+0xd1/0x120
  [10480.074716]  [<ffffffffb7d80d58>] __skb_gso_segment+0xd8/0x140
  [10480.074717]  [<ffffffffb7d811af>] validate_xmit_skb+0x14f/0x2a0
  [10480.074719]  [<ffffffffb7d81972>] __dev_queue_xmit+0x322/0x6d0
  [10480.074720]  [<ffffffffc03cd746>] ? nf_nat_ipv4_fn+0x1a6/0x230 
[nf_nat_ipv4]
  [10480.074723]  [<ffffffffb7d81d30>] dev_queue_xmit+0x10/0x20
  [10480.074725]  [<ffffffffb7dc5272>] ip_finish_output2+0x292/0x380
  [10480.074726]  [<ffffffffc040223d>] ? ipv4_confirm+0x7d/0x100 
[nf_conntrack_ipv4]
  [10480.074728]  [<ffffffffb7dc60a2>] ip_finish_output+0x132/0x1d0
  [10480.074729]  [<ffffffffb7db9703>] ? nf_hook_slow+0x73/0xd0
  [10480.074731]  [<ffffffffb7dc6aee>] ip_output+0x6e/0xf0
  [10480.074733]  [<ffffffffb7dc5f70>] ? 
__ip_flush_pending_frames.isra.40+0x90/0x90
  [10480.074736]  [<ffffffffb7dc2883>] ip_forward_finish+0x43/0x70
  [10480.074738]  [<ffffffffb7dc2c34>] ip_forward+0x384/0x480
  [10480.074739]  [<ffffffffb7dc2840>] ? ip_frag_mem+0x50/0x50
  [10480.074741]  [<ffffffffb7dc085b>] ip_rcv_finish+0x11b/0x400
  [10480.074743]  [<ffffffffb7dc11eb>] ip_rcv+0x28b/0x3c0
  [10480.074744]  [<ffffffffb7dc0740>] ? inet_del_offload+0x40/0x40
  [10480.074746]  [<ffffffffb7d7ec44>] __netif_receive_skb_core+0x524/0xab0
  [10480.074747]  [<ffffffffb780aaa7>] ? kmem_cache_alloc+0xd7/0x1b0
  [10480.074749]  [<ffffffffb7d6f7ca>] ? __build_skb+0x2a/0xe0
  [10480.074751]  [<ffffffffb7d7f1e8>] __netif_receive_skb+0x18/0x60
  [10480.074753]  [<ffffffffb7d7f262>] netif_receive_skb_internal+0x32/0xa0
  [10480.074754]  [<ffffffffb7d8025d>] napi_gro_receive+0xcd/0x120
  [10480.074756]  [<ffffffffc0286963>] virtnet_receive+0x1c3/0x970 [virtio_net]
  [10480.074758]  [<ffffffffb76b5e59>] ? update_cfs_rq_load_avg+0x1f9/0x4c0
  [10480.074760]  [<ffffffffc028712d>] virtnet_poll+0x1d/0x80 [virtio_net]
  [10480.074762]  [<ffffffffb7d7fa68>] net_rx_action+0x238/0x380
  [10480.074764]  [<ffffffffb7e9d406>] __do_softirq+0xf6/0x280
  [10480.074765]  [<ffffffffb7688eb3>] irq_exit+0xa3/0xb0
  [10480.074766]  [<ffffffffb7e9d164>] do_IRQ+0x54/0xd0
  [10480.074768]  [<ffffffffb7e9b242>] common_interrupt+0x82/0x82
  [10480.074768]  <EOI>  [<ffffffffb7664296>] ? native_safe_halt+0x6/0x10
  [10480.074772]  [<ffffffffb7637e9e>] default_idle+0x1e/0xd0
  [10480.074774]  [<ffffffffb763861f>] arch_cpu_idle+0xf/0x20
  [10480.074775]  [<ffffffffb76c7b3a>] default_idle_call+0x2a/0x40
  [10480.074776]  [<ffffffffb76c7e3a>] cpu_startup_entry+0x2ea/0x350
  [10480.074778]  [<ffffffffb76518b1>] start_secondary+0x151/0x190
  [10480.074781] ---[ end trace 3a9bd18de5564b05 ]---

  
  We have recompiled your latest 16.04.2 kernel with this patch and confirmed 
that this warning does not happen. Could you please consider including this fix 
in your next 16.04 LTS release?

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to