This bug was fixed in the package linux - 4.10.0-33.37 --------------- linux (4.10.0-33.37) zesty; urgency=low
* linux: 4.10.0-33.37 -proposed tracker (LP: #1709303) * CVE-2017-1000112 - Revert "udp: consistently apply ufo or fragmentation" - udp: consistently apply ufo or fragmentation * CVE-2017-1000111 - Revert "net-packet: fix race in packet_set_ring on PACKET_RESERVE" - packet: fix tp_reserve race in packet_set_ring * ThunderX: soft lockup on 4.8+ kernels when running qemu-efi with vhost=on (LP: #1673564) - irqchip/gic-v3: Add missing system register definitions - arm64: KVM: Do not use stack-protector to compile EL2 code - KVM: arm/arm64: vgic-v3: Use PREbits to infer the number of ICH_APxRn_EL2 registers - KVM: arm/arm64: vgic-v3: Fix nr_pre_bits bitfield extraction - arm64: Add a facility to turn an ESR syndrome into a sysreg encoding - KVM: arm/arm64: vgic-v3: Add accessors for the ICH_APxRn_EL2 registers - KVM: arm64: Make kvm_condition_valid32() accessible from EL2 - KVM: arm64: vgic-v3: Add hook to handle guest GICv3 sysreg accesses at EL2 - KVM: arm64: vgic-v3: Add ICV_BPR1_EL1 handler - KVM: arm64: vgic-v3: Add ICV_IGRPEN1_EL1 handler - KVM: arm64: vgic-v3: Add ICV_IAR1_EL1 handler - KVM: arm64: vgic-v3: Add ICV_EOIR1_EL1 handler - KVM: arm64: vgic-v3: Add ICV_AP1Rn_EL1 handler - KVM: arm64: vgic-v3: Add ICV_HPPIR1_EL1 handler - KVM: arm64: vgic-v3: Enable trapping of Group-1 system registers - KVM: arm64: Enable GICv3 Group-1 sysreg trapping via command-line - KVM: arm64: vgic-v3: Add ICV_BPR0_EL1 handler - KVM: arm64: vgic-v3: Add ICV_IGNREN0_EL1 handler - KVM: arm64: vgic-v3: Add misc Group-0 handlers - KVM: arm64: vgic-v3: Enable trapping of Group-0 system registers - KVM: arm64: Enable GICv3 Group-0 sysreg trapping via command-line - arm64: Add MIDR values for Cavium cn83XX SoCs - [Config] CONFIG_CAVIUM_ERRATUM_30115=y - arm64: Add workaround for Cavium Thunder erratum 30115 - KVM: arm64: vgic-v3: Add ICV_DIR_EL1 handler - KVM: arm64: vgic-v3: Add ICV_RPR_EL1 handler - KVM: arm64: vgic-v3: Add ICV_CTLR_EL1 handler - KVM: arm64: vgic-v3: Add ICV_PMR_EL1 handler - KVM: arm64: Enable GICv3 common sysreg trapping via command-line - KVM: arm64: vgic-v3: Log which GICv3 system registers are trapped - arm64: KVM: Make unexpected reads from WO registers inject an undef - KVM: arm64: Log an error if trapping a read-from-write-only GICv3 access - KVM: arm64: Log an error if trapping a write-to-read-only GICv3 access * ibmvscsis: Do not send aborted task response (LP: #1689365) - target: Fix unknown fabric callback queue-full errors - ibmvscsis: Do not send aborted task response - ibmvscsis: Clear left-over abort_cmd pointers - ibmvscsis: Fix the incorrect req_lim_delta * hisi_sas performance improvements (LP: #1708734) - scsi: hisi_sas: define hisi_sas_device.device_id as int - scsi: hisi_sas: optimise the usage of hisi_hba.lock - scsi: hisi_sas: relocate sata_done_v2_hw() - scsi: hisi_sas: optimise DMA slot memory * hisi_sas driver reports mistakes timed out task for internal abort (LP: #1708730) - scsi: hisi_sas: fix timeout check in hisi_sas_internal_task_abort() * scsi: hisi_sas: add null check before indirect pointer dereference (LP: #1708714) - scsi: hisi_sas: add null check before indirect pointer dereference * [LTCTest][Opal][FW860.20] HMI recoverable errors failed to recover and system goes to dump state. (LP: #1684054) - powerpc/64: Fix HMI exception on LE with CONFIG_RELOCATABLE=y * Set CONFIG_SATA_HIGHBANK=y on armhf (LP: #1703430) - [Config] CONFIG_SATA_HIGHBANK=y * Adt tests of src:linux time out often on armhf lxc containers (LP: #1705495) - [Packaging] tests -- reduce rebuild test to one flavour * support Hip07/08 I2C controller (LP: #1708293) - ACPI / APD: Add clock frequency for Hisilicon Hip07/08 I2C controller - i2c: designware: Add ACPI HID for Hisilicon Hip07/08 I2C controller * Mute key LED does not work on HP ProBook 440 (LP: #1705586) - ALSA: hda - Add HP ZBook 15u G3 Conexant CX20724 GPIO mute leds - ALSA: hda - Add mute led support for HP ProBook 440 G4 * Hisilicon D05 onboard fibre NIC link indicator LEDs don't work (LP: #1704903) - net: hns: add acpi function of xge led control * zesty unable to handle kernel NULL pointer dereference (LP: #1680904) - drm/i915: Do not drop pagetables when empty * hns: use after free in hns_nic_net_xmit_hw (LP: #1704885) - net: hns: Fix a skb used after free bug * [ARM64] config EDAC_GHES=y depends on EDAC_MM_EDAC=y (LP: #1706141) - [Config] set EDAC_MM_EDAC=y for ARM64 * [Hyper-V] hv_netvsc: Exclude non-TCP port numbers from vRSS hashing (LP: #1690174) - hv_netvsc: Exclude non-TCP port numbers from vRSS hashing * ath10k doesn't report full RSSI information (LP: #1706531) - ath10k: add per chain RSSI reporting * ideapad_laptop don't support v310-14isk (LP: #1705378) - platform/x86: ideapad-laptop: Add several models to no_hw_rfkill * hns: ethtool selftest crashes system (LP: #1705712) - net/hns:bugfix of ethtool -t phy self_test * ath9k freezes suspend resume Ubuntu 17.04 (LP: #1697027) - ath9k: fix an invalid pointer dereference in ath9k_rng_stop() * xhci_hcd: ERROR Transfer event TRB DMA ptr not part of current TD ep_index 2 comp_code 13 (LP: #1667750) - xhci: Bad Ethernet performance plugged in ASM1042A host * Migrating KSM page causes the VM lock up as the KSM page merging list is too large (LP: #1680513) - ksm: introduce ksm_max_page_sharing per page deduplication limit - ksm: fix use after free with merge_across_nodes = 0 - ksm: cleanup stable_node chain collapse case - ksm: swap the two output parameters of chain/chain_prune - ksm: optimize refile of stable_node_dup at the head of the chain * Change CONFIG_IBMVETH to module (LP: #1704479) - [Config] CONFIG_IBMVETH=m * CVE-2017-7487 - ipx: call ipxitf_put() in ioctl error path * Hotkeys on new Thinkpad systems aren't working (LP: #1705169) - platform/x86: thinkpad_acpi: guard generic hotkey case - platform/x86: thinkpad_acpi: add mapping for new hotkeys * misleading kernel warning skb_warn_bad_offload during checksum calculation (LP: #1705447) - net: reduce skb_warn_bad_offload() noise * Ubuntu 16.04.02: ibmveth: Support to enable LSO/CSO for Trunk VEA (LP: #1692538) - ibmveth: Support to enable LSO/CSO for Trunk VEA. * bonding: stack dump when unregistering a netdev (LP: #1704102) - bonding: avoid NETDEV_CHANGEMTU event when unregistering slave * Ubuntu 16.04 IOB Error when the Mustang board rebooted (LP: #1693673) - drivers: net: xgene: Fix redundant prefetch buffer cleanup * Ubuntu16.04: NVMe 4K+T10 DIF/DIX format returns I/O error on dd with split op (LP: #1689946) - blk-mq: NVMe 512B/4K+T10 DIF/DIX format returns I/O error on dd with split op * linux >= 4.2: bonding 802.3ad does not work with 5G, 25G and 50G link speeds (LP: #1697892) - bonding: add 802.3ad support for 25G speeds - bonding: fix 802.3ad support for 5G and 50G speeds * [SRU][Zesty] arm64: Add support for handling memory corruption (LP: #1696852) - arm64: mm: Update perf accounting to handle poison faults - arm64: hugetlb: Fix huge_pte_offset to return poisoned page table entries - arm64: kconfig: allow support for memory failure handling - arm64: hwpoison: add VM_FAULT_HWPOISON[_LARGE] handling * [SRU][Zesty] Add UEFI 2.6 and ACPI 6.1 updates for RAS on ARM64 (LP: #1696570) - acpi: apei: read ack upon ghes record consumption - ras: acpi/apei: cper: add support for generic data v3 structure - cper: add timestamp print to CPER status printing - efi: parse ARM processor error - arm64: exception: handle Synchronous External Abort - acpi: apei: handle SEA notification type for ARMv8 - acpi: apei: panic OS with fatal error status block - efi: print unrecognized CPER section - ras: acpi / apei: generate trace event for unrecognized CPER section - trace, ras: add ARM processor error trace event - ras: mark stub functions as 'inline' - arm/arm64: KVM: add guest SEA support - acpi: apei: check for pending errors when probing GHES entries - [Config] CONFIG_ACPI_APEI_SEA=y -- Stefan Bader <stefan.ba...@canonical.com> Fri, 11 Aug 2017 11:40:30 +0200 -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1705447 Title: misleading kernel warning skb_warn_bad_offload during checksum calculation Status in linux package in Ubuntu: In Progress Status in linux source package in Xenial: Fix Released Status in linux source package in Zesty: Fix Released Bug description: Even when the packet says checksum calculation is unnecessary the kernel will still check the checksum and display a warning that the checksum is bad. This has been fixed upstream in Kernel 4.11 by commit id: b2504a5dbef3305ef41988ad270b0e8ec289331c We have reports of Ubuntu 16.04 virtual machines (with ip forward enabled) displaying these warnings: [10480.074664] ------------[ cut here ]------------ [10480.074667] WARNING: CPU: 1 PID: 0 at /build/linux-hwe-X3pKE5/linux-hwe-4.8.0/net/core/dev.c:2444 skb_warn_bad_offload+0xd1/0x120 [10480.074669] docker0: caps=(0x00000400ffbb78e9, 0x0000000000000000) len=2962 data_len=2834 gso_size=1448 gso_type=5 ip_summed=1 [10480.074670] Modules linked in: veth nfsv3 nfs_acl rpcsec_gss_krb5 auth_rpcgss nfsv4 nfs lockd grace sunrpc fscache ipt_MASQUERADE nf_nat_masquerade_ipv4 xfrm_user xfrm_algo iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 xt_addrtype iptable_filter ip_tables xt_conntrack x_tables nf_nat nf_conntrack br_netfilter bridge stp llc aufs zfs(PO) zunicode(PO) zcommon(PO) znvpair(PO) spl(O) zavl(PO) crct10dif_pclmul crc32_pclmul ghash_clmulni_intel aesni_intel aes_x86_64 lrw glue_helper ablk_helper cryptd input_leds joydev serio_raw i2c_piix4 mac_hid parport_pc ppdev lp parport autofs4 hid_generic usbhid hid virtio_scsi psmouse virtio_net pata_acpi floppy [10480.074695] CPU: 1 PID: 0 Comm: swapper/1 Tainted: P W O 4.8.0-52-generic #55~16.04.1-Ubuntu [10480.074696] Hardware name: Nutanix AHV, BIOS seabios-1.7.5-11.el6 04/01/2014 [10480.074697] 0000000000000286 ec176c2ae03bc036 ffff8beef5643870 ffffffffb7a2e7b3 [10480.074699] ffff8beef56438c0 0000000000000000 ffff8beef56438b0 ffffffffb768314b [10480.074702] 0000098cb84fba80 ffff8bed61f82000 ffff8bee9915c000 0000000000000005 [10480.074704] Call Trace: [10480.074704] <IRQ> [<ffffffffb7a2e7b3>] dump_stack+0x63/0x90 [10480.074708] [<ffffffffb768314b>] __warn+0xcb/0xf0 [10480.074710] [<ffffffffb76831cf>] warn_slowpath_fmt+0x5f/0x80 [10480.074713] [<ffffffffb7a35012>] ? ___ratelimit+0xa2/0xf0 [10480.074714] [<ffffffffb7d7c681>] skb_warn_bad_offload+0xd1/0x120 [10480.074716] [<ffffffffb7d80d58>] __skb_gso_segment+0xd8/0x140 [10480.074717] [<ffffffffb7d811af>] validate_xmit_skb+0x14f/0x2a0 [10480.074719] [<ffffffffb7d81972>] __dev_queue_xmit+0x322/0x6d0 [10480.074720] [<ffffffffc03cd746>] ? nf_nat_ipv4_fn+0x1a6/0x230 [nf_nat_ipv4] [10480.074723] [<ffffffffb7d81d30>] dev_queue_xmit+0x10/0x20 [10480.074725] [<ffffffffb7dc5272>] ip_finish_output2+0x292/0x380 [10480.074726] [<ffffffffc040223d>] ? ipv4_confirm+0x7d/0x100 [nf_conntrack_ipv4] [10480.074728] [<ffffffffb7dc60a2>] ip_finish_output+0x132/0x1d0 [10480.074729] [<ffffffffb7db9703>] ? nf_hook_slow+0x73/0xd0 [10480.074731] [<ffffffffb7dc6aee>] ip_output+0x6e/0xf0 [10480.074733] [<ffffffffb7dc5f70>] ? __ip_flush_pending_frames.isra.40+0x90/0x90 [10480.074736] [<ffffffffb7dc2883>] ip_forward_finish+0x43/0x70 [10480.074738] [<ffffffffb7dc2c34>] ip_forward+0x384/0x480 [10480.074739] [<ffffffffb7dc2840>] ? ip_frag_mem+0x50/0x50 [10480.074741] [<ffffffffb7dc085b>] ip_rcv_finish+0x11b/0x400 [10480.074743] [<ffffffffb7dc11eb>] ip_rcv+0x28b/0x3c0 [10480.074744] [<ffffffffb7dc0740>] ? inet_del_offload+0x40/0x40 [10480.074746] [<ffffffffb7d7ec44>] __netif_receive_skb_core+0x524/0xab0 [10480.074747] [<ffffffffb780aaa7>] ? kmem_cache_alloc+0xd7/0x1b0 [10480.074749] [<ffffffffb7d6f7ca>] ? __build_skb+0x2a/0xe0 [10480.074751] [<ffffffffb7d7f1e8>] __netif_receive_skb+0x18/0x60 [10480.074753] [<ffffffffb7d7f262>] netif_receive_skb_internal+0x32/0xa0 [10480.074754] [<ffffffffb7d8025d>] napi_gro_receive+0xcd/0x120 [10480.074756] [<ffffffffc0286963>] virtnet_receive+0x1c3/0x970 [virtio_net] [10480.074758] [<ffffffffb76b5e59>] ? update_cfs_rq_load_avg+0x1f9/0x4c0 [10480.074760] [<ffffffffc028712d>] virtnet_poll+0x1d/0x80 [virtio_net] [10480.074762] [<ffffffffb7d7fa68>] net_rx_action+0x238/0x380 [10480.074764] [<ffffffffb7e9d406>] __do_softirq+0xf6/0x280 [10480.074765] [<ffffffffb7688eb3>] irq_exit+0xa3/0xb0 [10480.074766] [<ffffffffb7e9d164>] do_IRQ+0x54/0xd0 [10480.074768] [<ffffffffb7e9b242>] common_interrupt+0x82/0x82 [10480.074768] <EOI> [<ffffffffb7664296>] ? native_safe_halt+0x6/0x10 [10480.074772] [<ffffffffb7637e9e>] default_idle+0x1e/0xd0 [10480.074774] [<ffffffffb763861f>] arch_cpu_idle+0xf/0x20 [10480.074775] [<ffffffffb76c7b3a>] default_idle_call+0x2a/0x40 [10480.074776] [<ffffffffb76c7e3a>] cpu_startup_entry+0x2ea/0x350 [10480.074778] [<ffffffffb76518b1>] start_secondary+0x151/0x190 [10480.074781] ---[ end trace 3a9bd18de5564b05 ]--- We have recompiled your latest 16.04.2 kernel with this patch and confirmed that this warning does not happen. Could you please consider including this fix in your next 16.04 LTS release? To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1705447/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp