kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #166295
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.5 kernel[0].
If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.
If the mainline kernel does not fix this bug, please add the tag:
'kernel-bug-exists-upstream'.
Once testing of the upstream kernel is complete, please mark this bug as
"Confirmed".
Thanks in advance.
[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.5-rc7-wily/
** Changed in: linux (Ubuntu)
Importance: Undecided => Medium
** Tags added: kernel-da-key
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1555671
Title:
Kernel crash with tshark/tcpdump
Status in linux package in Ubuntu:
Confirmed
Bug description:
Reproducible crash when just running "tcpdump -i br0" (or any other
interface).
[ 95.615160] Oops: Exception in kernel mode, sig: 4 [#1]
[ 95.615237] SMP NR_CPUS=2048 NUMA PowerNV
[ 95.615245] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink bluetooth drbd(OE) xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables x_tables nfsv3 nfs_acl nfs lockd grace fscache binfmt_misc bridge stp llc kvm_hv kvm aha3xx(OE) uio_pdrv_genirq uio powernv_rng rdma_cm iw_cm mlx5_ib ib_ipoib ib_uverbs sunrpc ib_umad ib_cm ib_sa ib_mad ib_core ib_addr autofs4 ses enclosure bnx2x mlx5_core vxlan ip6_udp_tunnel udp_tunnel mdio ipr nvme libcrc32c
[ 95.616011] CPU: 48 PID: 0 Comm: swapper/48 Tainted: G OE 4.4.0-11-generic #26-Ubuntu
[ 95.616090] task: c000000ff098bd90 ti: c000001fffe10000 task.ti: c000000ff095c000
[ 95.616159] NIP: d000000017360000 LR: c000000000ab1b1c CTR: d000000017360000
[ 95.616227] REGS: c000001fffe13360 TRAP: 0e40 Tainted: G OE (4.4.0-11-generic)
[ 95.616305] MSR: 9000000000089033 <SF,HV,EE,ME,IR,DR,RI,LE> CR: 24002828 XER: 00000000
[ 95.616476] CFAR: c000000000ab1b18 SOFTE: 1
GPR00: c000000000ab7954 c000001fffe135e0 c0000000015a3b00 c000000fc1cf9f00
GPR04: d000000017340028 000000000000013a c000000fdfc02000 000000000000ffff
GPR08: c000000001515f00 d000000017360000 0000000000000000 d0000000141cb7c8
GPR12: d000000017360000 c000000007afc800 c000000fba6423c0 c000000fd94b0ff8
GPR16: c000000fda398900 000000000000008f c000001fffe139f0 0000000000000001
GPR20: 0000000000000000 000000000000dd86 0000000000000000 ffffffff80000000
GPR24: 0000000000000005 000000000000012c c000000fe063f010 c000000fdfc02000
GPR28: 000000000000013a c000000fde053800 c000000fc1cf9f00 000000000000013a
[ 95.617343] NIP [d000000017360000] 0xd000000017360000
[ 95.617393] LR [c000000000ab1b1c] run_filter+0x6c/0xc0
[ 95.617438] Call Trace:
[ 95.617462] [c000001fffe135e0] [c000000fd8e27910] 0xc000000fd8e27910 (unreliable)
[ 95.617543] [c000001fffe13620] [c000000000ab7954] tpacket_rcv+0x144/0xa50
[ 95.617613] [c000001fffe13710] [c000000000966804] __netif_receive_skb_core+0x8b4/0xdc0
[ 95.617692] [c000001fffe137f0] [c00000000096a3d4] netif_receive_skb_internal+0x34/0xd0
[ 95.617775] [c000001fffe13830] [d0000000141b6b04] br_handle_frame_finish+0x2a4/0x6f0 [bridge]
[ 95.617857] [c000001fffe13900] [d0000000141b717c] br_handle_frame+0x22c/0x3b0 [bridge]
[ 95.617936] [c000001fffe13990] [c000000000966418] __netif_receive_skb_core+0x4c8/0xdc0
[ 95.618016] [c000001fffe13a70] [c00000000096a3d4] netif_receive_skb_internal+0x34/0xd0
[ 95.618095] [c000001fffe13ab0] [c00000000096b5bc] napi_gro_receive+0x11c/0x230
[ 95.618182] [c000001fffe13af0] [d000000011b97b1c] bnx2x_rx_int+0xb4c/0x1710 [bnx2x]
[ 95.618278] [c000001fffe13c90] [d000000011b98fc0] bnx2x_poll+0x310/0x440 [bnx2x]
[ 95.618436] [c000001fffe13d40] [c00000000096ab6c] net_rx_action+0x2dc/0x4a0
[ 95.618575] [c000001fffe13e50] [c0000000000beaf8] __do_softirq+0x188/0x3e0
[ 95.618710] [c000001fffe13f40] [c0000000000befc8] irq_exit+0xc8/0x100
[ 95.618848] [c000001fffe13f60] [c00000000001132c] __do_irq+0x8c/0x1d0
[ 95.618985] [c000001fffe13f90] [c000000000024800] call_do_irq+0x14/0x24
[ 95.619121] [c000000ff095fa70] [c000000000011508] do_IRQ+0x98/0x140
[ 95.619255] [c000000ff095fac0] [c000000000002594] hardware_interrupt_common+0x114/0x180
[ 95.619415] --- interrupt: 501 at arch_local_irq_restore+0x5c/0x90
[ 95.619415] LR = arch_local_irq_restore+0x40/0x90
[ 95.619617] [c000000ff095fdb0] [c000000ff941d678] 0xc000000ff941d678 (unreliable)
[ 95.619775] [c000000ff095fdd0] [c000000000900708] cpuidle_enter_state+0x1a8/0x410
[ 95.619933] [c000000ff095fe30] [c000000000119898] call_cpuidle+0x78/0xd0
[ 95.620069] [c000000ff095fe70] [c000000000119c6c] cpu_startup_entry+0x37c/0x490
[ 95.620229] [c000000ff095ff30] [c00000000004565c] start_secondary+0x33c/0x360
[ 95.620365] [c000000ff095ff90] [c000000000008b6c] start_secondary_prolog+0x10/0x14
[ 95.620524] Instruction dump:
[ 95.620590] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
[ 95.620811] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
[ 95.621035] ---[ end trace 4e7432dd9190f0b2 ]---
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions
References