kernel-packages team mailing list archive
-
kernel-packages team
-
Mailing list archive
-
Message #166574
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
Thanks for testing the mainline kernel. It sounds like the bug is fixed
upstream. We could perform a "Reverse" bisect to identify the commit
that fixes this issue. We first need to identify the last bad kernel
and the first good kernel by testing some of the 4.5 release candidates.
Can you first test 4.5-rc1, which can be downloaded from:
http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.5-rc1-wily/
** Tags added: performing-bisect
--
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1555671
Title:
Kernel crash with tshark/tcpdump
Status in linux package in Ubuntu:
Confirmed
Bug description:
Reproducible crash when just running "tcpdump -i br0" (or any other
interface).
[ 95.615160] Oops: Exception in kernel mode, sig: 4 [#1]
[ 95.615237] SMP NR_CPUS=2048 NUMA PowerNV
[ 95.615245] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink bluetooth drbd(OE) xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables x_tables nfsv3 nfs_acl nfs lockd grace fscache binfmt_misc bridge stp llc kvm_hv kvm aha3xx(OE) uio_pdrv_genirq uio powernv_rng rdma_cm iw_cm mlx5_ib ib_ipoib ib_uverbs sunrpc ib_umad ib_cm ib_sa ib_mad ib_core ib_addr autofs4 ses enclosure bnx2x mlx5_core vxlan ip6_udp_tunnel udp_tunnel mdio ipr nvme libcrc32c
[ 95.616011] CPU: 48 PID: 0 Comm: swapper/48 Tainted: G OE 4.4.0-11-generic #26-Ubuntu
[ 95.616090] task: c000000ff098bd90 ti: c000001fffe10000 task.ti: c000000ff095c000
[ 95.616159] NIP: d000000017360000 LR: c000000000ab1b1c CTR: d000000017360000
[ 95.616227] REGS: c000001fffe13360 TRAP: 0e40 Tainted: G OE (4.4.0-11-generic)
[ 95.616305] MSR: 9000000000089033 <SF,HV,EE,ME,IR,DR,RI,LE> CR: 24002828 XER: 00000000
[ 95.616476] CFAR: c000000000ab1b18 SOFTE: 1
GPR00: c000000000ab7954 c000001fffe135e0 c0000000015a3b00 c000000fc1cf9f00
GPR04: d000000017340028 000000000000013a c000000fdfc02000 000000000000ffff
GPR08: c000000001515f00 d000000017360000 0000000000000000 d0000000141cb7c8
GPR12: d000000017360000 c000000007afc800 c000000fba6423c0 c000000fd94b0ff8
GPR16: c000000fda398900 000000000000008f c000001fffe139f0 0000000000000001
GPR20: 0000000000000000 000000000000dd86 0000000000000000 ffffffff80000000
GPR24: 0000000000000005 000000000000012c c000000fe063f010 c000000fdfc02000
GPR28: 000000000000013a c000000fde053800 c000000fc1cf9f00 000000000000013a
[ 95.617343] NIP [d000000017360000] 0xd000000017360000
[ 95.617393] LR [c000000000ab1b1c] run_filter+0x6c/0xc0
[ 95.617438] Call Trace:
[ 95.617462] [c000001fffe135e0] [c000000fd8e27910] 0xc000000fd8e27910 (unreliable)
[ 95.617543] [c000001fffe13620] [c000000000ab7954] tpacket_rcv+0x144/0xa50
[ 95.617613] [c000001fffe13710] [c000000000966804] __netif_receive_skb_core+0x8b4/0xdc0
[ 95.617692] [c000001fffe137f0] [c00000000096a3d4] netif_receive_skb_internal+0x34/0xd0
[ 95.617775] [c000001fffe13830] [d0000000141b6b04] br_handle_frame_finish+0x2a4/0x6f0 [bridge]
[ 95.617857] [c000001fffe13900] [d0000000141b717c] br_handle_frame+0x22c/0x3b0 [bridge]
[ 95.617936] [c000001fffe13990] [c000000000966418] __netif_receive_skb_core+0x4c8/0xdc0
[ 95.618016] [c000001fffe13a70] [c00000000096a3d4] netif_receive_skb_internal+0x34/0xd0
[ 95.618095] [c000001fffe13ab0] [c00000000096b5bc] napi_gro_receive+0x11c/0x230
[ 95.618182] [c000001fffe13af0] [d000000011b97b1c] bnx2x_rx_int+0xb4c/0x1710 [bnx2x]
[ 95.618278] [c000001fffe13c90] [d000000011b98fc0] bnx2x_poll+0x310/0x440 [bnx2x]
[ 95.618436] [c000001fffe13d40] [c00000000096ab6c] net_rx_action+0x2dc/0x4a0
[ 95.618575] [c000001fffe13e50] [c0000000000beaf8] __do_softirq+0x188/0x3e0
[ 95.618710] [c000001fffe13f40] [c0000000000befc8] irq_exit+0xc8/0x100
[ 95.618848] [c000001fffe13f60] [c00000000001132c] __do_irq+0x8c/0x1d0
[ 95.618985] [c000001fffe13f90] [c000000000024800] call_do_irq+0x14/0x24
[ 95.619121] [c000000ff095fa70] [c000000000011508] do_IRQ+0x98/0x140
[ 95.619255] [c000000ff095fac0] [c000000000002594] hardware_interrupt_common+0x114/0x180
[ 95.619415] --- interrupt: 501 at arch_local_irq_restore+0x5c/0x90
[ 95.619415] LR = arch_local_irq_restore+0x40/0x90
[ 95.619617] [c000000ff095fdb0] [c000000ff941d678] 0xc000000ff941d678 (unreliable)
[ 95.619775] [c000000ff095fdd0] [c000000000900708] cpuidle_enter_state+0x1a8/0x410
[ 95.619933] [c000000ff095fe30] [c000000000119898] call_cpuidle+0x78/0xd0
[ 95.620069] [c000000ff095fe70] [c000000000119c6c] cpu_startup_entry+0x37c/0x490
[ 95.620229] [c000000ff095ff30] [c00000000004565c] start_secondary+0x33c/0x360
[ 95.620365] [c000000ff095ff90] [c000000000008b6c] start_secondary_prolog+0x10/0x14
[ 95.620524] Instruction dump:
[ 95.620590] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
[ 95.620811] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
[ 95.621035] ---[ end trace 4e7432dd9190f0b2 ]---
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions
References