← Back to team overview

kernel-packages team mailing list archive

[Bug 1555671] Re: Kernel crash with tshark/tcpdump

 

Yes, the bug could have been introduced by an Ubuntu SAUCE patch.
Testing the upstream kernels will tell us whether that is the case.  Can
you next the upstream v4.4.2 kernel?  That is the upstream kernel Ubuntu
4.4.0-7-generic is based off of.  If it does have the bug, then we know
the bug was fixed in 4.5-rc1 and we need to perform a "Reverse" bisect.
If it does not have the but, then that indicates an Ubuntu SAUCE patch
introduced the bug, and we would want to perform a normal kernel bisect.

The v4.4.2 kernel can be downloaded from:
http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.4.2-wily/

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

Status in linux package in Ubuntu:
  Confirmed

Bug description:
  Reproducible crash when just running "tcpdump -i br0" (or any other
  interface).

  [   95.615160] Oops: Exception in kernel mode, sig: 4 [#1]
  [   95.615237] SMP NR_CPUS=2048 NUMA PowerNV
  [   95.615245] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink bluetooth drbd(OE) xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables x_tables nfsv3 nfs_acl nfs lockd grace fscache binfmt_misc bridge stp llc kvm_hv kvm aha3xx(OE) uio_pdrv_genirq uio powernv_rng rdma_cm iw_cm mlx5_ib ib_ipoib ib_uverbs sunrpc ib_umad ib_cm ib_sa ib_mad ib_core ib_addr autofs4 ses enclosure bnx2x mlx5_core vxlan ip6_udp_tunnel udp_tunnel mdio ipr nvme libcrc32c
  [   95.616011] CPU: 48 PID: 0 Comm: swapper/48 Tainted: G           OE   4.4.0-11-generic #26-Ubuntu
  [   95.616090] task: c000000ff098bd90 ti: c000001fffe10000 task.ti: c000000ff095c000
  [   95.616159] NIP: d000000017360000 LR: c000000000ab1b1c CTR: d000000017360000
  [   95.616227] REGS: c000001fffe13360 TRAP: 0e40   Tainted: G           OE    (4.4.0-11-generic)
  [   95.616305] MSR: 9000000000089033 <SF,HV,EE,ME,IR,DR,RI,LE>  CR: 24002828  XER: 00000000
  [   95.616476] CFAR: c000000000ab1b18 SOFTE: 1
  GPR00: c000000000ab7954 c000001fffe135e0 c0000000015a3b00 c000000fc1cf9f00
  GPR04: d000000017340028 000000000000013a c000000fdfc02000 000000000000ffff
  GPR08: c000000001515f00 d000000017360000 0000000000000000 d0000000141cb7c8
  GPR12: d000000017360000 c000000007afc800 c000000fba6423c0 c000000fd94b0ff8
  GPR16: c000000fda398900 000000000000008f c000001fffe139f0 0000000000000001
  GPR20: 0000000000000000 000000000000dd86 0000000000000000 ffffffff80000000
  GPR24: 0000000000000005 000000000000012c c000000fe063f010 c000000fdfc02000
  GPR28: 000000000000013a c000000fde053800 c000000fc1cf9f00 000000000000013a
  [   95.617343] NIP [d000000017360000] 0xd000000017360000
  [   95.617393] LR [c000000000ab1b1c] run_filter+0x6c/0xc0
  [   95.617438] Call Trace:
  [   95.617462] [c000001fffe135e0] [c000000fd8e27910] 0xc000000fd8e27910 (unreliable)
  [   95.617543] [c000001fffe13620] [c000000000ab7954] tpacket_rcv+0x144/0xa50
  [   95.617613] [c000001fffe13710] [c000000000966804] __netif_receive_skb_core+0x8b4/0xdc0
  [   95.617692] [c000001fffe137f0] [c00000000096a3d4] netif_receive_skb_internal+0x34/0xd0
  [   95.617775] [c000001fffe13830] [d0000000141b6b04] br_handle_frame_finish+0x2a4/0x6f0 [bridge]
  [   95.617857] [c000001fffe13900] [d0000000141b717c] br_handle_frame+0x22c/0x3b0 [bridge]
  [   95.617936] [c000001fffe13990] [c000000000966418] __netif_receive_skb_core+0x4c8/0xdc0
  [   95.618016] [c000001fffe13a70] [c00000000096a3d4] netif_receive_skb_internal+0x34/0xd0
  [   95.618095] [c000001fffe13ab0] [c00000000096b5bc] napi_gro_receive+0x11c/0x230
  [   95.618182] [c000001fffe13af0] [d000000011b97b1c] bnx2x_rx_int+0xb4c/0x1710 [bnx2x]
  [   95.618278] [c000001fffe13c90] [d000000011b98fc0] bnx2x_poll+0x310/0x440 [bnx2x]
  [   95.618436] [c000001fffe13d40] [c00000000096ab6c] net_rx_action+0x2dc/0x4a0
  [   95.618575] [c000001fffe13e50] [c0000000000beaf8] __do_softirq+0x188/0x3e0
  [   95.618710] [c000001fffe13f40] [c0000000000befc8] irq_exit+0xc8/0x100
  [   95.618848] [c000001fffe13f60] [c00000000001132c] __do_irq+0x8c/0x1d0
  [   95.618985] [c000001fffe13f90] [c000000000024800] call_do_irq+0x14/0x24
  [   95.619121] [c000000ff095fa70] [c000000000011508] do_IRQ+0x98/0x140
  [   95.619255] [c000000ff095fac0] [c000000000002594] hardware_interrupt_common+0x114/0x180
  [   95.619415] --- interrupt: 501 at arch_local_irq_restore+0x5c/0x90
  [   95.619415]     LR = arch_local_irq_restore+0x40/0x90
  [   95.619617] [c000000ff095fdb0] [c000000ff941d678] 0xc000000ff941d678 (unreliable)
  [   95.619775] [c000000ff095fdd0] [c000000000900708] cpuidle_enter_state+0x1a8/0x410
  [   95.619933] [c000000ff095fe30] [c000000000119898] call_cpuidle+0x78/0xd0
  [   95.620069] [c000000ff095fe70] [c000000000119c6c] cpu_startup_entry+0x37c/0x490
  [   95.620229] [c000000ff095ff30] [c00000000004565c] start_secondary+0x33c/0x360
  [   95.620365] [c000000ff095ff90] [c000000000008b6c] start_secondary_prolog+0x10/0x14
  [   95.620524] Instruction dump:
  [   95.620590] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
  [   95.620811] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
  [   95.621035] ---[ end trace 4e7432dd9190f0b2 ]---

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions


References