[Bug 1641618] Re: Apparmor denials caused by virt-aa-helper trying to read zvol devices (/dev/zdX) should be silenced
> DRBD devices are always followed by digit(s) so you could use this if > you haven't done the change already: > > /dev/drbd[0-9]* r, If they are referenced by name, instead of by minor, a DRBD path might look like this, too: /dev/drbd/by-disk// /dev/drbd/by-res// Examples: /dev/drbd/by-res/CV_ac2cca49-8de1-45c4-8fc8-15c22f444b37/0 /dev/drbd/by-disk/drbddata/CV_ac2cca49-8de1-45c4-8fc8-15c22f444b37_00 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1641618 Title: Apparmor denials caused by virt-aa-helper trying to read zvol devices (/dev/zdX) should be silenced To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1641618/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
Any update for me? Is there something that I can test? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555671 Title: Kernel crash with tshark/tcpdump To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
Perhaps "tcpdump" sets no filter, but tshark does have some default it's using? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555671 Title: Kernel crash with tshark/tcpdump To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
4.2.0-34-generic is ... strange. "tcpdump" works as expected: 14412 packets captured 14430 packets received by filter 15 packets dropped by kernel but "tshark" with the same options crashes the kernel: [ 137.709794] Oops: Exception in kernel mode, sig: 4 [#1] [ 137.709872] SMP NR_CPUS=2048 NUMA PowerNV [ 137.709879] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink bluetooth drbd lru_cache xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables x_tables nfsv3 nfs_acl nfs lockd grace fscache binfmt_misc bridge stp llc kvm_hv uio_pdrv_genirq kvm powernv_rng uio rdma_cm iw_cm mlx5_ib ib_ipoib sunrpc ib_uverbs ib_umad ib_cm ib_sa ib_mad ib_core ib_addr autofs4 ses enclosure mlx5_core bnx2x ipr nvme mdio libcrc32c [ 137.710598] CPU: 64 PID: 0 Comm: swapper/64 Not tainted 4.2.0-34-generic #39-Ubuntu [ 137.710666] task: c01e503de5e0 ti: c01fffd9 task.ti: c01e505a8000 [ 137.710735] NIP: d00016f5 LR: c0a7a6d4 CTR: d00016f5 [ 137.710803] REGS: c01fffd93620 TRAP: 0e40 Not tainted (4.2.0-34-generic) [ 137.710870] MSR: 90089033CR: 24002888 XER: [ 137.711042] CFAR: c0a7a6d0 SOFTE: 1 GPR00: c0a7a69c c01fffd938a0 c151af00 c00fa52fa500 GPR04: d00016f30028 c00fe3f55d80 c00fdf824000 GPR08: c1490b00 d00016f5 002e d00010f94c68 GPR12: d00016f5 c7b06000 c00fa360acc0 c00fdae18000 GPR16: c00fdf824880 02b3 c01fffd939f0 0001 GPR20: d00013356ba0 dd86 8000 GPR24: 0005 002e c00fa5427910 c00fdf824000 GPR28: 003c c00fdf824000 c00fe3f55800 c00fa52fa500 [ 137.711909] NIP [d00016f5] 0xd00016f5 [ 137.711959] LR [c0a7a6d4] tpacket_rcv+0x164/0xa80 [ 137.712004] Call Trace: [ 137.712029] [c01fffd938a0] [c0a7a69c] tpacket_rcv+0x12c/0xa80 (unreliable) [ 137.712110] [c01fffd93990] [c09301ac] __netif_receive_skb_core+0x4ec/0xd60 [ 137.712190] [c01fffd93a70] [c0933f74] netif_receive_skb_internal+0x34/0xd0 [ 137.712269] [c01fffd93ab0] [c09350ac] napi_gro_receive+0xec/0x1b0 [ 137.712346] [c01fffd93af0] [d00010f55a0c] bnx2x_rx_int+0xb4c/0x1710 [bnx2x] [ 137.712431] [c01fffd93c90] [d00010f56eb0] bnx2x_poll+0x310/0x440 [bnx2x] [ 137.712510] [c01fffd93d40] [c093472c] net_rx_action+0x2dc/0x470 [ 137.712580] [c01fffd93e50] [c00bb0b8] __do_softirq+0x188/0x3a0 [ 137.712648] [c01fffd93f40] [c00bb548] irq_exit+0xc8/0x100 [ 137.712731] [c01fffd93f60] [c00111bc] __do_irq+0x8c/0x190 [ 137.712867] [c01fffd93f90] [c00242f0] call_do_irq+0x14/0x24 [ 137.713004] [c01e505aba70] [c0011358] do_IRQ+0x98/0x140 [ 137.713141] [c01e505abac0] [c0002594] hardware_interrupt_common+0x114/0x180 [ 137.713301] --- interrupt: 501 at arch_local_irq_restore+0x5c/0x90 [ 137.713301] LR = arch_local_irq_restore+0x40/0x90 [ 137.713505] [c01e505abdb0] [c148db10] powernv_idle_driver+0xd8/0x3e8 (unreliable) [ 137.713686] [c01e505abdd0] [c08ca0a8] cpuidle_enter_state+0x1a8/0x3c0 [ 137.713845] [c01e505abe30] [c0113a68] call_cpuidle+0x78/0xd0 [ 137.713981] [c01e505abe70] [c0113e0c] cpu_startup_entry+0x34c/0x460 [ 137.714138] [c01e505abf30] [c0044f4c] start_secondary+0x33c/0x360 [ 137.714274] [c01e505abf90] [c0008b6c] start_secondary_prolog+0x10/0x14 [ 137.714433] Instruction dump: [ 137.714500] [ 137.714721] [ 137.714944] ---[ end trace fb709e6a13141985 ]--- [ 137.716201] [ 137.716253] Sending IPI to other CPUs -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555671 Title: Kernel crash with tshark/tcpdump To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
No. Are such essential things like the "standard" SCSI controller in an extra package? Really? Well, or would that be storage-core-modules-4.2.0-34-generic- di-4.2.0-34.39? Does the -extra encompass all the separate module packages? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555671 Title: Kernel crash with tshark/tcpdump To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
linux-image-4.4.0-1-generic_4.4.0-1.15_ppc64el.deb is missing the SCSI modules, too -- do I need to install additional packages? 4.4.0-15.31 gives me this: > [ 2256.803739] Netfilter messages via NETLINK v0.30. > [ 2257.806152] [ cut here ] > [ 2257.806231] Kernel BUG at ddd9 [verbose debug info unavailable] > [ 2257.806245] Oops: Exception in kernel mode, sig: 5 [#1] > [ 2257.806254] SMP NR_CPUS=2048 NUMA PowerNV > [ 2257.806305] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink > bluetooth drbd_transport_rdma(OE) drbd_transport_tcp(OE) drbd(OE) dm_zero > lru_cache xt_CHECKSUM iptable_mangle ipt_REJECT nf_reject_ipv4 xt_tcpudp > ebtable_filter ebtables ip6table_filter ip6_tables xt_addrtype xt_conntrack > ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 > nf_defrag_ipv4 nf_nat_ipv4 iptable_filter ip_tables x_tables nf_nat > nf_conntrack aufs nfsv3 nfs fscache binfmt_misc bridge stp llc aha3xx(OE) > uio_pdrv_genirq uio powernv_rng kvm_hv kvm rdma_cm iw_cm mlx5_ib ib_ipoib > ib_uverbs ib_umad nfsd ib_cm auth_rpcgss nfs_acl lockd ib_sa grace sunrpc > ib_mad ib_core ib_addr autofs4 raid10 raid456 async_raid6_recov async_memcpy > async_pq async_xor async_tx xor raid6_pq raid1 raid0 multipath linear ses > enclosure bnx2x mlx5_core vxlan ip6_udp_tunnel udp_tunnel ipr mdio nvme > libcrc32c [last unloaded: drbd] > [ 2257.807532] CPU: 40 PID: 0 Comm: swapper/40 Tainted: G OE > 4.4.0-15-generic #31-Ubuntu > [ 2257.807618] task: c00ff07c7e60 ti: c01fffe5 task.ti: > c01e5053c000 > [ 2257.807692] NIP: ddd9 LR: c0ab867c CTR: > ddd9 > [ 2257.807766] REGS: c01fffe535e0 TRAP: 0700 Tainted: G OE > (4.4.0-15-generic) > [ 2257.807851] MSR: 90029033CR: 24002228 > XER: > [ 2257.808039] CFAR: c0ab8678 SOFTE: 1 > GPR00: c0abe4b4 c01fffe53860 c15a4100 c00f989a3000 > GPR04: ddd70028 0042 c00fdd418000 > GPR08: c1516400 ddd9 d00011a58828 > GPR12: ddd9 c7af7c00 c00f936ecb40 c00fdd830920 > GPR16: c00fdd418900 1b2d c01fffe539f0 0001 > GPR20: d000158a6f50 dd86 8000 > GPR24: 0005 0034 c00fd4388a10 c00fdd418000 > GPR28: 0042 c00f8a3a7000 c00f989a3000 0042 > [ 2257.809096] NIP [ddd9] 0xddd9 > [ 2257.809192] LR [c0ab867c] run_filter+0x6c/0xc0 > [ 2257.809284] Call Trace: > [ 2257.809334] [c01fffe53860] [c00fa5230a90] 0xc00fa5230a90 > (unreliable) > [ 2257.809496] [c01fffe538a0] [c0abe4b4] tpacket_rcv+0x144/0xa50 > [ 2257.809634] [c01fffe53990] [c096cf7c] > __netif_receive_skb_core+0x4ac/0xdc0 > [ 2257.809793] [c01fffe53a70] [c0970f54] > netif_receive_skb_internal+0x34/0xd0 > [ 2257.809952] [c01fffe53ab0] [c097213c] > napi_gro_receive+0x11c/0x230 > [ 2257.810123] [c01fffe53af0] [d00011a17b1c] > bnx2x_rx_int+0xb4c/0x1710 [bnx2x] > [ 2257.810295] [c01fffe53c90] [d00011a18fc0] bnx2x_poll+0x310/0x440 > [bnx2x] > [ 2257.810453] [c01fffe53d40] [c09716ec] net_rx_action+0x2dc/0x4a0 > [ 2257.810592] [c01fffe53e50] [c00beb38] __do_softirq+0x188/0x3e0 > [ 2257.810728] [c01fffe53f40] [c00bf008] irq_exit+0xc8/0x100 > [ 2257.810867] [c01fffe53f60] [c001132c] __do_irq+0x8c/0x1d0 > [ 2257.811004] [c01fffe53f90] [c0024800] call_do_irq+0x14/0x24 > [ 2257.811141] [c01e5053fa70] [c0011508] do_IRQ+0x98/0x140 > [ 2257.811279] [c01e5053fac0] [c0002594] > hardware_interrupt_common+0x114/0x180 > [ 2257.811440] --- interrupt: 501 at arch_local_irq_restore+0x5c/0x90 > [ 2257.811440] LR = arch_local_irq_restore+0x40/0x90 > [ 2257.811646] [c01e5053fdb0] [c00ff921d678] 0xc00ff921d678 > (unreliable) > [ 2257.811809] [c01e5053fdd0] [c0907248] > cpuidle_enter_state+0x1a8/0x410 > [ 2257.811968] [c01e5053fe30] [c0119958] call_cpuidle+0x78/0xd0 > [ 2257.812104] [c01e5053fe70] [c0119d2c] > cpu_startup_entry+0x37c/0x490 > [ 2257.812265] [c01e5053ff30] [c004563c] > start_secondary+0x33c/0x360 > [ 2257.812402] [c01e5053ff90] [c0008b6c] > start_secondary_prolog+0x10/0x14 > [ 2257.812560] Instruction dump: > [ 2257.812631] > > [ 2257.812859] > > [ 2257.813097] ---[ end trace 25467d417868c3a8 ]--- > [ 2257.816033] -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555671 Title: Kernel
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
Sadly that is not reproducible in a VM - if it was, I'd have made an automated bisect run... No, I don't know, sorry. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555671 Title: Kernel crash with tshark/tcpdump To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
Sorry, got another crash right now, in run_filter+0x6c/0xc0. [93544.101832] [ cut here ] [93544.101920] Kernel BUG at ddc5 [verbose debug info unavailable] [93544.101935] Oops: Exception in kernel mode, sig: 5 [#1] [93544.101954] SMP NR_CPUS=2048 NUMA PowerNV [93544.102006] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink bluetooth aha3xx(OE) vhost_net vhost macvtap macvlan drbd_transport_rdma(OE) drbd_transport_tcp(OE) dm_zero drbd(OE) xt_CHECKSUM iptabl e_mangle ipt_REJECT nf_reject_ipv4 xt_tcpudp ebtable_filter ebtables ip6table_filter ip6_tables xt_addrtype xt_conntrack ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_na t_ipv4 iptable_filter ip_tables x_tables nf_nat nf_conntrack aufs nfsv3 nfs fscache binfmt_misc bridge stp llc powernv_rng uio_pdrv_genirq uio kvm_hv kvm rdma_cm nfsd iw_cm mlx5_ib auth_rpcgss nfs_acl lockd gr ace sunrpc ib_ipoib ib_uverbs ib_umad ib_cm ib_sa ib_mad ib_core ib_addr autofs4 raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 raid0 multipath linear ses enclosur e bnx2x mlx5_core vxlan ip6_udp_tunnel ipr udp_tunnel nvme mdio libcrc32c [last unloaded: aha3xx] [93544.103269] CPU: 64 PID: 0 Comm: swapper/64 Tainted: G OE 4.4.0-13-generic #29-Ubuntu [93544.103356] task: c00ff09a0e90 ti: c00ff0a1c000 task.ti: c00ff0a1c000 [93544.103429] NIP: ddc5 LR: c0ab21bc CTR: ddc5 [93544.103503] REGS: c00ff0a1f0d0 TRAP: 0700 Tainted: G OE (4.4.0-13-generic) [93544.103588] MSR: 900100029033CR: 22002848 XER: [93544.103774] CFAR: c0ab21b8 SOFTE: 1 GPR00: c0ab7ff4 c00ff0a1f350 c15a3b00 c00f85451400 GPR04: ddc30028 001c c00f9938 c01e3e2e962c GPR08: c1515f00 ddc5 001d GPR12: ddc5 c7b06000 c00ff980a938 0100 GPR16: c00ff980a738 c00ff980a538 c00ff0a1f5c0 c15e4cf8 GPR20: c15e4ce8 c00f991b0800 GPR24: 002a c01e3e2e9602 c00f9938 GPR28: 001c c01e4ad19000 c00f85451400 001c [93544.104713] NIP [ddc5] 0xddc5 [93544.104807] LR [c0ab21bc] run_filter+0x6c/0xc0 [93544.104899] Call Trace: [93544.104948] [c00ff0a1f350] [c00ff0a1f390] 0xc00ff0a1f390 (unreliable) [93544.105110] [c00ff0a1f390] [c0ab7ff4] tpacket_rcv+0x144/0xa50 [93544.105247] [c00ff0a1f480] [c096e4d0] dev_hard_start_xmit+0x2c0/0x530 [93544.105407] [c00ff0a1f560] [c096eff8] __dev_queue_xmit+0x668/0x770 [93544.105568] [c00ff0a1f600] [c0a0b160] arp_xmit+0x30/0xd0 [93544.105704] [c00ff0a1f670] [c0a0b294] arp_send_dst.part.0+0x94/0xb0 [93544.105864] [c00ff0a1f6e0] [c0a0be24] arp_solicit+0x114/0x2b0 [93544.106001] [c00ff0a1f7b0] [c097a5b4] neigh_probe+0x84/0xd0 [93544.106139] [c00ff0a1f7e0] [c098043c] neigh_timer_handler+0xbc/0x310 [93544.106299] [c00ff0a1f820] [c0149ebc] call_timer_fn+0x5c/0x1c0 [93544.106435] [c00ff0a1f8b0] [c014a37c] run_timer_softirq+0x31c/0x3f0 [93544.106596] [c00ff0a1f980] [c00beaf8] __do_softirq+0x188/0x3e0 [93544.106733] [c00ff0a1fa70] [c00befc8] irq_exit+0xc8/0x100 [93544.106872] [c00ff0a1fa90] [c001f954] timer_interrupt+0xa4/0xe0 [93544.107009] [c00ff0a1fac0] [c0002714] decrementer_common+0x114/0x180 [93544.107170] --- interrupt: 901 at arch_local_irq_restore+0x74/0x90 [93544.107170] LR = arch_local_irq_restore+0x74/0x90 [93544.107375] [c00ff0a1fdb0] [c00ff981d678] 0xc00ff981d678 (unreliable) [93544.107538] [c00ff0a1fdd0] [c0900da8] cpuidle_enter_state+0x1a8/0x410 [93544.107697] [c00ff0a1fe30] [c0119898] call_cpuidle+0x78/0xd0 [93544.107834] [c00ff0a1fe70] [c0119c6c] cpu_startup_entry+0x37c/0x490 [93544.107995] [c00ff0a1ff30] [c004565c] start_secondary+0x33c/0x360 [93544.108131] [c00ff0a1ff90] [c0008b6c] start_secondary_prolog+0x10/0x14 [93544.108289] Instruction dump: [93544.108360] [93544.108588] [93544.108821] ---[ end trace 8419e626fa8d7aaf ]--- [93544.111837] [93544.210799] [ cut here ] On the second machine (that ran the same command) the backtrace is a bit different: [94483.530269] Netfilter messages via NETLINK v0.30. [94484.521665] Oops: Exception in kernel mode, sig: 4 [#1] [94484.521754] SMP NR_CPUS=2048
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
linux-image-4.2.0-34-generic_4.2.0-34.39_ppc64el.deb doesn't boot, it seems to be missing some SCSI drivers. linux-image-4.4.0-13-generic ppc64el 4.4.0-13.29 did work for me: 17996 packets captured 18004 packets received by filter 6 packets dropped by kernel -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555671 Title: Kernel crash with tshark/tcpdump To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
Well, that's what I meant by "linux-image-4.4.0-13-generic ppc64el 4.4.0-13.29 did work for me". Would you care to point me to the fixing commit, just out of interest? Thanks a lot. -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555671 Title: Kernel crash with tshark/tcpdump To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
Is there a git tree that includes Ubuntu patches, so that I could try a bisect there? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555671 Title: Kernel crash with tshark/tcpdump To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.4.2-wily/linux- image-4.4.2-040402-generic_4.4.2-040402.201602171633_ppc64el.deb WORKSFORME ;) 39716 packets captured 39732 packets received by filter 14 packets dropped by kernel -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555671 Title: Kernel crash with tshark/tcpdump To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
Uh, sorry, but couldn't the bug also lurk in Ubuntu's patches? -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555671 Title: Kernel crash with tshark/tcpdump To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
This 4.5.0rc1 package works, too. 117 packets captured 131 packets received by filter 14 packets dropped by kernel -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555671 Title: Kernel crash with tshark/tcpdump To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
Using http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.5-rc7-wily/linux- image-4.5.0-040500rc7-generic_4.5.0-040500rc7.201603061830_ppc64el.deb the bnx2x interfaces don't come up by themselves; I've had to use the serial console to do "ifconfig eth3 up" manually. Other than that, "tcpdump -i br0" works on this kernel, or at least doesn't crash it immediately: 493 packets captured 536 packets received by filter 43 packets dropped by kernel [ 397.614186] device br0 left promiscuous mode ** Tags removed: kernel-da-key ** Tags added: kernel-fixed-upstream -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555671 Title: Kernel crash with tshark/tcpdump To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
# gdb /usr/lib/debug/boot/vmlinux-4.4.0-11-generic (gdb) l *run_filter+0x6c/0xc0 0xc0ab1ab0 is in run_filter (/build/linux-xlQMJr/linux-4.4.0/net/packet/af_packet.c:1951). -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555671 Title: Kernel crash with tshark/tcpdump To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1555671] Re: Kernel crash with tshark/tcpdump
Happened with 4.4.0-7-generic too, didn't try older versions. Happens every time, with or without filter on the "tcpdump" command line. ** Changed in: linux (Ubuntu) Status: Incomplete => Confirmed -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555671 Title: Kernel crash with tshark/tcpdump To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs
[Bug 1555671] [NEW] Kernel crash with tshark/tcpdump
Public bug reported: Reproducible crash when just running "tcpdump -i br0" (or any other interface). [ 95.615160] Oops: Exception in kernel mode, sig: 4 [#1] [ 95.615237] SMP NR_CPUS=2048 NUMA PowerNV [ 95.615245] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink bluetooth drbd(OE) xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables x_tables nfsv3 nfs_acl nfs lockd grace fscache binfmt_misc bridge stp llc kvm_hv kvm aha3xx(OE) uio_pdrv_genirq uio powernv_rng rdma_cm iw_cm mlx5_ib ib_ipoib ib_uverbs sunrpc ib_umad ib_cm ib_sa ib_mad ib_core ib_addr autofs4 ses enclosure bnx2x mlx5_core vxlan ip6_udp_tunnel udp_tunnel mdio ipr nvme libcrc32c [ 95.616011] CPU: 48 PID: 0 Comm: swapper/48 Tainted: G OE 4.4.0-11-generic #26-Ubuntu [ 95.616090] task: c00ff098bd90 ti: c01fffe1 task.ti: c00ff095c000 [ 95.616159] NIP: d0001736 LR: c0ab1b1c CTR: d0001736 [ 95.616227] REGS: c01fffe13360 TRAP: 0e40 Tainted: G OE (4.4.0-11-generic) [ 95.616305] MSR: 90089033CR: 24002828 XER: [ 95.616476] CFAR: c0ab1b18 SOFTE: 1 GPR00: c0ab7954 c01fffe135e0 c15a3b00 c00fc1cf9f00 GPR04: d00017340028 013a c00fdfc02000 GPR08: c1515f00 d0001736 d000141cb7c8 GPR12: d0001736 c7afc800 c00fba6423c0 c00fd94b0ff8 GPR16: c00fda398900 008f c01fffe139f0 0001 GPR20: dd86 8000 GPR24: 0005 012c c00fe063f010 c00fdfc02000 GPR28: 013a c00fde053800 c00fc1cf9f00 013a [ 95.617343] NIP [d0001736] 0xd0001736 [ 95.617393] LR [c0ab1b1c] run_filter+0x6c/0xc0 [ 95.617438] Call Trace: [ 95.617462] [c01fffe135e0] [c00fd8e27910] 0xc00fd8e27910 (unreliable) [ 95.617543] [c01fffe13620] [c0ab7954] tpacket_rcv+0x144/0xa50 [ 95.617613] [c01fffe13710] [c0966804] __netif_receive_skb_core+0x8b4/0xdc0 [ 95.617692] [c01fffe137f0] [c096a3d4] netif_receive_skb_internal+0x34/0xd0 [ 95.617775] [c01fffe13830] [d000141b6b04] br_handle_frame_finish+0x2a4/0x6f0 [bridge] [ 95.617857] [c01fffe13900] [d000141b717c] br_handle_frame+0x22c/0x3b0 [bridge] [ 95.617936] [c01fffe13990] [c0966418] __netif_receive_skb_core+0x4c8/0xdc0 [ 95.618016] [c01fffe13a70] [c096a3d4] netif_receive_skb_internal+0x34/0xd0 [ 95.618095] [c01fffe13ab0] [c096b5bc] napi_gro_receive+0x11c/0x230 [ 95.618182] [c01fffe13af0] [d00011b97b1c] bnx2x_rx_int+0xb4c/0x1710 [bnx2x] [ 95.618278] [c01fffe13c90] [d00011b98fc0] bnx2x_poll+0x310/0x440 [bnx2x] [ 95.618436] [c01fffe13d40] [c096ab6c] net_rx_action+0x2dc/0x4a0 [ 95.618575] [c01fffe13e50] [c00beaf8] __do_softirq+0x188/0x3e0 [ 95.618710] [c01fffe13f40] [c00befc8] irq_exit+0xc8/0x100 [ 95.618848] [c01fffe13f60] [c001132c] __do_irq+0x8c/0x1d0 [ 95.618985] [c01fffe13f90] [c0024800] call_do_irq+0x14/0x24 [ 95.619121] [c00ff095fa70] [c0011508] do_IRQ+0x98/0x140 [ 95.619255] [c00ff095fac0] [c0002594] hardware_interrupt_common+0x114/0x180 [ 95.619415] --- interrupt: 501 at arch_local_irq_restore+0x5c/0x90 [ 95.619415] LR = arch_local_irq_restore+0x40/0x90 [ 95.619617] [c00ff095fdb0] [c00ff941d678] 0xc00ff941d678 (unreliable) [ 95.619775] [c00ff095fdd0] [c0900708] cpuidle_enter_state+0x1a8/0x410 [ 95.619933] [c00ff095fe30] [c0119898] call_cpuidle+0x78/0xd0 [ 95.620069] [c00ff095fe70] [c0119c6c] cpu_startup_entry+0x37c/0x490 [ 95.620229] [c00ff095ff30] [c004565c] start_secondary+0x33c/0x360 [ 95.620365] [c00ff095ff90] [c0008b6c] start_secondary_prolog+0x10/0x14 [ 95.620524] Instruction dump: [ 95.620590] [ 95.620811] [ 95.621035] ---[ end trace 4e7432dd9190f0b2 ]--- ** Affects: linux (Ubuntu) Importance: Undecided Status: Incomplete -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1555671 Title: Kernel crash with tshark/tcpdump To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com