[Bug 1641618] Re: Apparmor denials caused by virt-aa-helper trying to read zvol devices (/dev/zdX) should be silenced

2016-11-28 Thread Philipp Marek
> DRBD devices are always followed by digit(s) so you could use this if
> you haven't done the change already:
> 
>   /dev/drbd[0-9]* r,
If they are referenced by name, instead of by minor, a DRBD path might look
like this, too:

  /dev/drbd/by-disk//
  /dev/drbd/by-res//


Examples:

  /dev/drbd/by-res/CV_ac2cca49-8de1-45c4-8fc8-15c22f444b37/0
  /dev/drbd/by-disk/drbddata/CV_ac2cca49-8de1-45c4-8fc8-15c22f444b37_00

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1641618

Title:
  Apparmor denials caused by virt-aa-helper trying to read zvol devices
  (/dev/zdX) should be silenced

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/libvirt/+bug/1641618/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-04-04 Thread Philipp Marek
Any update for me? Is there something that I can test?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-22 Thread Philipp Marek
Perhaps "tcpdump" sets no filter, but tshark does have some default it's
using?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-22 Thread Philipp Marek
4.2.0-34-generic is ... strange.

"tcpdump" works as expected:
14412 packets captured
14430 packets received by filter
15 packets dropped by kernel

but "tshark" with the same options crashes the kernel:

[  137.709794] Oops: Exception in kernel mode, sig: 4 [#1]
[  137.709872] SMP NR_CPUS=2048 NUMA PowerNV
[  137.709879] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink 
bluetooth drbd lru_cache xt_CHECKSUM iptable_mangle ipt_MASQUERADE 
nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 
nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp 
ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables 
x_tables nfsv3 nfs_acl nfs lockd grace fscache binfmt_misc bridge stp llc 
kvm_hv uio_pdrv_genirq kvm powernv_rng uio rdma_cm iw_cm mlx5_ib ib_ipoib 
sunrpc ib_uverbs ib_umad ib_cm ib_sa ib_mad ib_core ib_addr autofs4 ses 
enclosure mlx5_core bnx2x ipr nvme mdio libcrc32c
[  137.710598] CPU: 64 PID: 0 Comm: swapper/64 Not tainted 4.2.0-34-generic 
#39-Ubuntu
[  137.710666] task: c01e503de5e0 ti: c01fffd9 task.ti: 
c01e505a8000
[  137.710735] NIP: d00016f5 LR: c0a7a6d4 CTR: d00016f5
[  137.710803] REGS: c01fffd93620 TRAP: 0e40   Not tainted  
(4.2.0-34-generic)
[  137.710870] MSR: 90089033   CR: 24002888  
XER: 
[  137.711042] CFAR: c0a7a6d0 SOFTE: 1
GPR00: c0a7a69c c01fffd938a0 c151af00 c00fa52fa500
GPR04: d00016f30028 c00fe3f55d80 c00fdf824000 
GPR08: c1490b00 d00016f5 002e d00010f94c68
GPR12: d00016f5 c7b06000 c00fa360acc0 c00fdae18000
GPR16: c00fdf824880 02b3 c01fffd939f0 0001
GPR20: d00013356ba0 dd86  8000
GPR24: 0005 002e c00fa5427910 c00fdf824000
GPR28: 003c c00fdf824000 c00fe3f55800 c00fa52fa500
[  137.711909] NIP [d00016f5] 0xd00016f5
[  137.711959] LR [c0a7a6d4] tpacket_rcv+0x164/0xa80
[  137.712004] Call Trace:
[  137.712029] [c01fffd938a0] [c0a7a69c] tpacket_rcv+0x12c/0xa80 
(unreliable)
[  137.712110] [c01fffd93990] [c09301ac] 
__netif_receive_skb_core+0x4ec/0xd60
[  137.712190] [c01fffd93a70] [c0933f74] 
netif_receive_skb_internal+0x34/0xd0
[  137.712269] [c01fffd93ab0] [c09350ac] napi_gro_receive+0xec/0x1b0
[  137.712346] [c01fffd93af0] [d00010f55a0c] bnx2x_rx_int+0xb4c/0x1710 
[bnx2x]
[  137.712431] [c01fffd93c90] [d00010f56eb0] bnx2x_poll+0x310/0x440 
[bnx2x]
[  137.712510] [c01fffd93d40] [c093472c] net_rx_action+0x2dc/0x470
[  137.712580] [c01fffd93e50] [c00bb0b8] __do_softirq+0x188/0x3a0
[  137.712648] [c01fffd93f40] [c00bb548] irq_exit+0xc8/0x100
[  137.712731] [c01fffd93f60] [c00111bc] __do_irq+0x8c/0x190
[  137.712867] [c01fffd93f90] [c00242f0] call_do_irq+0x14/0x24
[  137.713004] [c01e505aba70] [c0011358] do_IRQ+0x98/0x140
[  137.713141] [c01e505abac0] [c0002594] 
hardware_interrupt_common+0x114/0x180
[  137.713301] --- interrupt: 501 at arch_local_irq_restore+0x5c/0x90
[  137.713301] LR = arch_local_irq_restore+0x40/0x90
[  137.713505] [c01e505abdb0] [c148db10] 
powernv_idle_driver+0xd8/0x3e8 (unreliable)
[  137.713686] [c01e505abdd0] [c08ca0a8] 
cpuidle_enter_state+0x1a8/0x3c0
[  137.713845] [c01e505abe30] [c0113a68] call_cpuidle+0x78/0xd0
[  137.713981] [c01e505abe70] [c0113e0c] 
cpu_startup_entry+0x34c/0x460
[  137.714138] [c01e505abf30] [c0044f4c] start_secondary+0x33c/0x360
[  137.714274] [c01e505abf90] [c0008b6c] 
start_secondary_prolog+0x10/0x14
[  137.714433] Instruction dump:
[  137.714500]        

[  137.714721]        

[  137.714944] ---[ end trace fb709e6a13141985 ]---
[  137.716201]
[  137.716253] Sending IPI to other CPUs

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-21 Thread Philipp Marek
No.

Are such essential things like the "standard" SCSI controller in an
extra package? Really?

Well, or would that be  storage-core-modules-4.2.0-34-generic-
di-4.2.0-34.39? Does the -extra encompass all the separate module
packages?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-21 Thread Philipp Marek
linux-image-4.4.0-1-generic_4.4.0-1.15_ppc64el.deb is missing the SCSI
modules, too -- do I need to install additional packages?

4.4.0-15.31 gives me this:

> [ 2256.803739] Netfilter messages via NETLINK v0.30.
> [ 2257.806152] [ cut here ]
> [ 2257.806231] Kernel BUG at ddd9 [verbose debug info unavailable]
> [ 2257.806245] Oops: Exception in kernel mode, sig: 5 [#1]
> [ 2257.806254] SMP NR_CPUS=2048 NUMA PowerNV
> [ 2257.806305] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink 
> bluetooth drbd_transport_rdma(OE) drbd_transport_tcp(OE) drbd(OE) dm_zero 
> lru_cache xt_CHECKSUM iptable_mangle ipt_REJECT nf_reject_ipv4 xt_tcpudp 
> ebtable_filter ebtables ip6table_filter ip6_tables xt_addrtype xt_conntrack 
> ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 
> nf_defrag_ipv4 nf_nat_ipv4 iptable_filter ip_tables x_tables nf_nat 
> nf_conntrack aufs nfsv3 nfs fscache binfmt_misc bridge stp llc aha3xx(OE) 
> uio_pdrv_genirq uio powernv_rng kvm_hv kvm rdma_cm iw_cm mlx5_ib ib_ipoib 
> ib_uverbs ib_umad nfsd ib_cm auth_rpcgss nfs_acl lockd ib_sa grace sunrpc 
> ib_mad ib_core ib_addr autofs4 raid10 raid456 async_raid6_recov async_memcpy 
> async_pq async_xor async_tx xor raid6_pq raid1 raid0 multipath linear ses 
> enclosure bnx2x mlx5_core vxlan ip6_udp_tunnel udp_tunnel ipr mdio nvme 
> libcrc32c [last unloaded: drbd]
> [ 2257.807532] CPU: 40 PID: 0 Comm: swapper/40 Tainted: G   OE   
> 4.4.0-15-generic #31-Ubuntu
> [ 2257.807618] task: c00ff07c7e60 ti: c01fffe5 task.ti: 
> c01e5053c000
> [ 2257.807692] NIP: ddd9 LR: c0ab867c CTR: 
> ddd9
> [ 2257.807766] REGS: c01fffe535e0 TRAP: 0700   Tainted: G   OE
> (4.4.0-15-generic)
> [ 2257.807851] MSR: 90029033   CR: 24002228  
> XER: 
> [ 2257.808039] CFAR: c0ab8678 SOFTE: 1
> GPR00: c0abe4b4 c01fffe53860 c15a4100 c00f989a3000
> GPR04: ddd70028 0042 c00fdd418000 
> GPR08: c1516400 ddd9  d00011a58828
> GPR12: ddd9 c7af7c00 c00f936ecb40 c00fdd830920
> GPR16: c00fdd418900 1b2d c01fffe539f0 0001
> GPR20: d000158a6f50 dd86  8000
> GPR24: 0005 0034 c00fd4388a10 c00fdd418000
> GPR28: 0042 c00f8a3a7000 c00f989a3000 0042
> [ 2257.809096] NIP [ddd9] 0xddd9
> [ 2257.809192] LR [c0ab867c] run_filter+0x6c/0xc0
> [ 2257.809284] Call Trace:
> [ 2257.809334] [c01fffe53860] [c00fa5230a90] 0xc00fa5230a90 
> (unreliable)
> [ 2257.809496] [c01fffe538a0] [c0abe4b4] tpacket_rcv+0x144/0xa50
> [ 2257.809634] [c01fffe53990] [c096cf7c] 
> __netif_receive_skb_core+0x4ac/0xdc0
> [ 2257.809793] [c01fffe53a70] [c0970f54] 
> netif_receive_skb_internal+0x34/0xd0
> [ 2257.809952] [c01fffe53ab0] [c097213c] 
> napi_gro_receive+0x11c/0x230
> [ 2257.810123] [c01fffe53af0] [d00011a17b1c] 
> bnx2x_rx_int+0xb4c/0x1710 [bnx2x]
> [ 2257.810295] [c01fffe53c90] [d00011a18fc0] bnx2x_poll+0x310/0x440 
> [bnx2x]
> [ 2257.810453] [c01fffe53d40] [c09716ec] net_rx_action+0x2dc/0x4a0
> [ 2257.810592] [c01fffe53e50] [c00beb38] __do_softirq+0x188/0x3e0
> [ 2257.810728] [c01fffe53f40] [c00bf008] irq_exit+0xc8/0x100
> [ 2257.810867] [c01fffe53f60] [c001132c] __do_irq+0x8c/0x1d0
> [ 2257.811004] [c01fffe53f90] [c0024800] call_do_irq+0x14/0x24
> [ 2257.811141] [c01e5053fa70] [c0011508] do_IRQ+0x98/0x140
> [ 2257.811279] [c01e5053fac0] [c0002594] 
> hardware_interrupt_common+0x114/0x180
> [ 2257.811440] --- interrupt: 501 at arch_local_irq_restore+0x5c/0x90
> [ 2257.811440] LR = arch_local_irq_restore+0x40/0x90
> [ 2257.811646] [c01e5053fdb0] [c00ff921d678] 0xc00ff921d678 
> (unreliable)
> [ 2257.811809] [c01e5053fdd0] [c0907248] 
> cpuidle_enter_state+0x1a8/0x410
> [ 2257.811968] [c01e5053fe30] [c0119958] call_cpuidle+0x78/0xd0
> [ 2257.812104] [c01e5053fe70] [c0119d2c] 
> cpu_startup_entry+0x37c/0x490
> [ 2257.812265] [c01e5053ff30] [c004563c] 
> start_secondary+0x33c/0x360
> [ 2257.812402] [c01e5053ff90] [c0008b6c] 
> start_secondary_prolog+0x10/0x14
> [ 2257.812560] Instruction dump:
> [ 2257.812631]        
> 
> [ 2257.812859]        
> 
> [ 2257.813097] ---[ end trace 25467d417868c3a8 ]---
> [ 2257.816033]

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel 

[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-19 Thread Philipp Marek
Sadly that is not reproducible in a VM - if it was, I'd have made an
automated bisect run...

No, I don't know, sorry.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-19 Thread Philipp Marek
Sorry, got another crash right now, in run_filter+0x6c/0xc0.

  [93544.101832] [ cut here ]
  [93544.101920] Kernel BUG at ddc5 [verbose debug info unavailable]
  [93544.101935] Oops: Exception in kernel mode, sig: 5 [#1]
  [93544.101954] SMP NR_CPUS=2048 NUMA PowerNV
  [93544.102006] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink 
bluetooth aha3xx(OE) vhost_net vhost macvtap macvlan drbd_transport_rdma(OE) 
drbd_transport_tcp(OE) dm_zero drbd(OE) xt_CHECKSUM iptabl
  e_mangle ipt_REJECT nf_reject_ipv4 xt_tcpudp ebtable_filter ebtables 
ip6table_filter ip6_tables xt_addrtype xt_conntrack ipt_MASQUERADE 
nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_na
  t_ipv4 iptable_filter ip_tables x_tables nf_nat nf_conntrack aufs nfsv3 nfs 
fscache binfmt_misc bridge stp llc powernv_rng uio_pdrv_genirq uio kvm_hv kvm 
rdma_cm nfsd iw_cm mlx5_ib auth_rpcgss nfs_acl lockd gr
  ace sunrpc ib_ipoib ib_uverbs ib_umad ib_cm ib_sa ib_mad ib_core ib_addr 
autofs4 raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor 
async_tx xor raid6_pq raid1 raid0 multipath linear ses enclosur
  e bnx2x mlx5_core vxlan ip6_udp_tunnel ipr udp_tunnel nvme mdio libcrc32c 
[last unloaded: aha3xx]
  [93544.103269] CPU: 64 PID: 0 Comm: swapper/64 Tainted: G   OE   
4.4.0-13-generic #29-Ubuntu
  [93544.103356] task: c00ff09a0e90 ti: c00ff0a1c000 task.ti: 
c00ff0a1c000
  [93544.103429] NIP: ddc5 LR: c0ab21bc CTR: 
ddc5
  [93544.103503] REGS: c00ff0a1f0d0 TRAP: 0700   Tainted: G   OE
(4.4.0-13-generic)
  [93544.103588] MSR: 900100029033   CR: 22002848  
XER: 
  [93544.103774] CFAR: c0ab21b8 SOFTE: 1
  GPR00: c0ab7ff4 c00ff0a1f350 c15a3b00 c00f85451400
  GPR04: ddc30028 001c c00f9938 c01e3e2e962c
  GPR08: c1515f00 ddc5  001d
  GPR12: ddc5 c7b06000 c00ff980a938 0100
  GPR16: c00ff980a738 c00ff980a538 c00ff0a1f5c0 c15e4cf8
  GPR20:  c15e4ce8 c00f991b0800 
  GPR24:  002a c01e3e2e9602 c00f9938
  GPR28: 001c c01e4ad19000 c00f85451400 001c
  [93544.104713] NIP [ddc5] 0xddc5
  [93544.104807] LR [c0ab21bc] run_filter+0x6c/0xc0
  [93544.104899] Call Trace:
  [93544.104948] [c00ff0a1f350] [c00ff0a1f390] 0xc00ff0a1f390 
(unreliable)
  [93544.105110] [c00ff0a1f390] [c0ab7ff4] tpacket_rcv+0x144/0xa50
  [93544.105247] [c00ff0a1f480] [c096e4d0] 
dev_hard_start_xmit+0x2c0/0x530
  [93544.105407] [c00ff0a1f560] [c096eff8] 
__dev_queue_xmit+0x668/0x770
  [93544.105568] [c00ff0a1f600] [c0a0b160] arp_xmit+0x30/0xd0
  [93544.105704] [c00ff0a1f670] [c0a0b294] 
arp_send_dst.part.0+0x94/0xb0
  [93544.105864] [c00ff0a1f6e0] [c0a0be24] arp_solicit+0x114/0x2b0
  [93544.106001] [c00ff0a1f7b0] [c097a5b4] neigh_probe+0x84/0xd0
  [93544.106139] [c00ff0a1f7e0] [c098043c] 
neigh_timer_handler+0xbc/0x310
  [93544.106299] [c00ff0a1f820] [c0149ebc] call_timer_fn+0x5c/0x1c0
  [93544.106435] [c00ff0a1f8b0] [c014a37c] 
run_timer_softirq+0x31c/0x3f0
  [93544.106596] [c00ff0a1f980] [c00beaf8] __do_softirq+0x188/0x3e0
  [93544.106733] [c00ff0a1fa70] [c00befc8] irq_exit+0xc8/0x100
  [93544.106872] [c00ff0a1fa90] [c001f954] timer_interrupt+0xa4/0xe0
  [93544.107009] [c00ff0a1fac0] [c0002714] 
decrementer_common+0x114/0x180
  [93544.107170] --- interrupt: 901 at arch_local_irq_restore+0x74/0x90
  [93544.107170] LR = arch_local_irq_restore+0x74/0x90
  [93544.107375] [c00ff0a1fdb0] [c00ff981d678] 0xc00ff981d678 
(unreliable)
  [93544.107538] [c00ff0a1fdd0] [c0900da8] 
cpuidle_enter_state+0x1a8/0x410
  [93544.107697] [c00ff0a1fe30] [c0119898] call_cpuidle+0x78/0xd0
  [93544.107834] [c00ff0a1fe70] [c0119c6c] 
cpu_startup_entry+0x37c/0x490
  [93544.107995] [c00ff0a1ff30] [c004565c] 
start_secondary+0x33c/0x360
  [93544.108131] [c00ff0a1ff90] [c0008b6c] 
start_secondary_prolog+0x10/0x14
  [93544.108289] Instruction dump:
  [93544.108360]        

  [93544.108588]        

  [93544.108821] ---[ end trace 8419e626fa8d7aaf ]---
  [93544.111837]
  [93544.210799] [ cut here ]


On the second machine (that ran the same command) the backtrace is a bit 
different:

  [94483.530269] Netfilter messages via NETLINK v0.30.
  [94484.521665] Oops: Exception in kernel mode, sig: 4 [#1]
  [94484.521754] SMP NR_CPUS=2048 

[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-19 Thread Philipp Marek
linux-image-4.2.0-34-generic_4.2.0-34.39_ppc64el.deb doesn't boot, it
seems to be missing some SCSI drivers.


linux-image-4.4.0-13-generic ppc64el 4.4.0-13.29 did work for me:

17996 packets captured
18004 packets received by filter
6 packets dropped by kernel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-18 Thread Philipp Marek
Well, that's what I meant by "linux-image-4.4.0-13-generic ppc64el
4.4.0-13.29 did work for me".

Would you care to point me to the fixing commit, just out of interest?

Thanks a lot.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-14 Thread Philipp Marek
Is there a git tree that includes Ubuntu patches, so that I could try a
bisect there?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-14 Thread Philipp Marek
http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.4.2-wily/linux-
image-4.4.2-040402-generic_4.4.2-040402.201602171633_ppc64el.deb
WORKSFORME ;)

39716 packets captured
39732 packets received by filter
14 packets dropped by kernel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-11 Thread Philipp Marek
Uh, sorry, but couldn't the bug also lurk in Ubuntu's patches?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-11 Thread Philipp Marek
This 4.5.0rc1 package works, too.

117 packets captured
131 packets received by filter
14 packets dropped by kernel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-10 Thread Philipp Marek
Using http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.5-rc7-wily/linux-
image-4.5.0-040500rc7-generic_4.5.0-040500rc7.201603061830_ppc64el.deb
the bnx2x interfaces don't come up by themselves; I've had to use the
serial console to do "ifconfig eth3 up" manually.

Other than that, "tcpdump -i br0" works on this kernel, or at least doesn't 
crash it immediately:
  493 packets captured
  536 packets received by filter
  43 packets dropped by kernel
  [  397.614186] device br0 left promiscuous mode


** Tags removed: kernel-da-key
** Tags added: kernel-fixed-upstream

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-10 Thread Philipp Marek
# gdb /usr/lib/debug/boot/vmlinux-4.4.0-11-generic
(gdb) l *run_filter+0x6c/0xc0
0xc0ab1ab0 is in run_filter 
(/build/linux-xlQMJr/linux-4.4.0/net/packet/af_packet.c:1951).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-10 Thread Philipp Marek
Happened with 4.4.0-7-generic too, didn't try older versions.

Happens every time, with or without filter on the "tcpdump" command
line.

** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] [NEW] Kernel crash with tshark/tcpdump

2016-03-10 Thread Philipp Marek
Public bug reported:

Reproducible crash when just running "tcpdump -i br0" (or any other
interface).

[   95.615160] Oops: Exception in kernel mode, sig: 4 [#1]
[   95.615237] SMP NR_CPUS=2048 NUMA PowerNV
[   95.615245] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink 
bluetooth drbd(OE) xt_CHECKSUM iptable_mangle ipt_MASQUERADE 
nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 
nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp 
ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables 
x_tables nfsv3 nfs_acl nfs lockd grace fscache binfmt_misc bridge stp llc 
kvm_hv kvm aha3xx(OE) uio_pdrv_genirq uio powernv_rng rdma_cm iw_cm mlx5_ib 
ib_ipoib ib_uverbs sunrpc ib_umad ib_cm ib_sa ib_mad ib_core ib_addr autofs4 
ses enclosure bnx2x mlx5_core vxlan ip6_udp_tunnel udp_tunnel mdio ipr nvme 
libcrc32c
[   95.616011] CPU: 48 PID: 0 Comm: swapper/48 Tainted: G   OE   
4.4.0-11-generic #26-Ubuntu
[   95.616090] task: c00ff098bd90 ti: c01fffe1 task.ti: 
c00ff095c000
[   95.616159] NIP: d0001736 LR: c0ab1b1c CTR: d0001736
[   95.616227] REGS: c01fffe13360 TRAP: 0e40   Tainted: G   OE
(4.4.0-11-generic)
[   95.616305] MSR: 90089033   CR: 24002828  
XER: 
[   95.616476] CFAR: c0ab1b18 SOFTE: 1
GPR00: c0ab7954 c01fffe135e0 c15a3b00 c00fc1cf9f00
GPR04: d00017340028 013a c00fdfc02000 
GPR08: c1515f00 d0001736  d000141cb7c8
GPR12: d0001736 c7afc800 c00fba6423c0 c00fd94b0ff8
GPR16: c00fda398900 008f c01fffe139f0 0001
GPR20:  dd86  8000
GPR24: 0005 012c c00fe063f010 c00fdfc02000
GPR28: 013a c00fde053800 c00fc1cf9f00 013a
[   95.617343] NIP [d0001736] 0xd0001736
[   95.617393] LR [c0ab1b1c] run_filter+0x6c/0xc0
[   95.617438] Call Trace:
[   95.617462] [c01fffe135e0] [c00fd8e27910] 0xc00fd8e27910 
(unreliable)
[   95.617543] [c01fffe13620] [c0ab7954] tpacket_rcv+0x144/0xa50
[   95.617613] [c01fffe13710] [c0966804] 
__netif_receive_skb_core+0x8b4/0xdc0
[   95.617692] [c01fffe137f0] [c096a3d4] 
netif_receive_skb_internal+0x34/0xd0
[   95.617775] [c01fffe13830] [d000141b6b04] 
br_handle_frame_finish+0x2a4/0x6f0 [bridge]
[   95.617857] [c01fffe13900] [d000141b717c] 
br_handle_frame+0x22c/0x3b0 [bridge]
[   95.617936] [c01fffe13990] [c0966418] 
__netif_receive_skb_core+0x4c8/0xdc0
[   95.618016] [c01fffe13a70] [c096a3d4] 
netif_receive_skb_internal+0x34/0xd0
[   95.618095] [c01fffe13ab0] [c096b5bc] 
napi_gro_receive+0x11c/0x230
[   95.618182] [c01fffe13af0] [d00011b97b1c] bnx2x_rx_int+0xb4c/0x1710 
[bnx2x]
[   95.618278] [c01fffe13c90] [d00011b98fc0] bnx2x_poll+0x310/0x440 
[bnx2x]
[   95.618436] [c01fffe13d40] [c096ab6c] net_rx_action+0x2dc/0x4a0
[   95.618575] [c01fffe13e50] [c00beaf8] __do_softirq+0x188/0x3e0
[   95.618710] [c01fffe13f40] [c00befc8] irq_exit+0xc8/0x100
[   95.618848] [c01fffe13f60] [c001132c] __do_irq+0x8c/0x1d0
[   95.618985] [c01fffe13f90] [c0024800] call_do_irq+0x14/0x24
[   95.619121] [c00ff095fa70] [c0011508] do_IRQ+0x98/0x140
[   95.619255] [c00ff095fac0] [c0002594] 
hardware_interrupt_common+0x114/0x180
[   95.619415] --- interrupt: 501 at arch_local_irq_restore+0x5c/0x90
[   95.619415] LR = arch_local_irq_restore+0x40/0x90
[   95.619617] [c00ff095fdb0] [c00ff941d678] 0xc00ff941d678 
(unreliable)
[   95.619775] [c00ff095fdd0] [c0900708] 
cpuidle_enter_state+0x1a8/0x410
[   95.619933] [c00ff095fe30] [c0119898] call_cpuidle+0x78/0xd0
[   95.620069] [c00ff095fe70] [c0119c6c] 
cpu_startup_entry+0x37c/0x490
[   95.620229] [c00ff095ff30] [c004565c] start_secondary+0x33c/0x360
[   95.620365] [c00ff095ff90] [c0008b6c] 
start_secondary_prolog+0x10/0x14
[   95.620524] Instruction dump:
[   95.620590]        

[   95.620811]        

[   95.621035] ---[ end trace 4e7432dd9190f0b2 ]---

** Affects: linux (Ubuntu)
 Importance: Undecided
 Status: Incomplete

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com