[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-04-04 Thread Philipp Marek
Any update for me? Is there something that I can test?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-22 Thread Philipp Marek
Perhaps "tcpdump" sets no filter, but tshark does have some default it's
using?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-22 Thread Philipp Marek
4.2.0-34-generic is ... strange.

"tcpdump" works as expected:
14412 packets captured
14430 packets received by filter
15 packets dropped by kernel

but "tshark" with the same options crashes the kernel:

[  137.709794] Oops: Exception in kernel mode, sig: 4 [#1]
[  137.709872] SMP NR_CPUS=2048 NUMA PowerNV
[  137.709879] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink 
bluetooth drbd lru_cache xt_CHECKSUM iptable_mangle ipt_MASQUERADE 
nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 
nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp 
ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables 
x_tables nfsv3 nfs_acl nfs lockd grace fscache binfmt_misc bridge stp llc 
kvm_hv uio_pdrv_genirq kvm powernv_rng uio rdma_cm iw_cm mlx5_ib ib_ipoib 
sunrpc ib_uverbs ib_umad ib_cm ib_sa ib_mad ib_core ib_addr autofs4 ses 
enclosure mlx5_core bnx2x ipr nvme mdio libcrc32c
[  137.710598] CPU: 64 PID: 0 Comm: swapper/64 Not tainted 4.2.0-34-generic 
#39-Ubuntu
[  137.710666] task: c01e503de5e0 ti: c01fffd9 task.ti: 
c01e505a8000
[  137.710735] NIP: d00016f5 LR: c0a7a6d4 CTR: d00016f5
[  137.710803] REGS: c01fffd93620 TRAP: 0e40   Not tainted  
(4.2.0-34-generic)
[  137.710870] MSR: 90089033   CR: 24002888  
XER: 
[  137.711042] CFAR: c0a7a6d0 SOFTE: 1
GPR00: c0a7a69c c01fffd938a0 c151af00 c00fa52fa500
GPR04: d00016f30028 c00fe3f55d80 c00fdf824000 
GPR08: c1490b00 d00016f5 002e d00010f94c68
GPR12: d00016f5 c7b06000 c00fa360acc0 c00fdae18000
GPR16: c00fdf824880 02b3 c01fffd939f0 0001
GPR20: d00013356ba0 dd86  8000
GPR24: 0005 002e c00fa5427910 c00fdf824000
GPR28: 003c c00fdf824000 c00fe3f55800 c00fa52fa500
[  137.711909] NIP [d00016f5] 0xd00016f5
[  137.711959] LR [c0a7a6d4] tpacket_rcv+0x164/0xa80
[  137.712004] Call Trace:
[  137.712029] [c01fffd938a0] [c0a7a69c] tpacket_rcv+0x12c/0xa80 
(unreliable)
[  137.712110] [c01fffd93990] [c09301ac] 
__netif_receive_skb_core+0x4ec/0xd60
[  137.712190] [c01fffd93a70] [c0933f74] 
netif_receive_skb_internal+0x34/0xd0
[  137.712269] [c01fffd93ab0] [c09350ac] napi_gro_receive+0xec/0x1b0
[  137.712346] [c01fffd93af0] [d00010f55a0c] bnx2x_rx_int+0xb4c/0x1710 
[bnx2x]
[  137.712431] [c01fffd93c90] [d00010f56eb0] bnx2x_poll+0x310/0x440 
[bnx2x]
[  137.712510] [c01fffd93d40] [c093472c] net_rx_action+0x2dc/0x470
[  137.712580] [c01fffd93e50] [c00bb0b8] __do_softirq+0x188/0x3a0
[  137.712648] [c01fffd93f40] [c00bb548] irq_exit+0xc8/0x100
[  137.712731] [c01fffd93f60] [c00111bc] __do_irq+0x8c/0x190
[  137.712867] [c01fffd93f90] [c00242f0] call_do_irq+0x14/0x24
[  137.713004] [c01e505aba70] [c0011358] do_IRQ+0x98/0x140
[  137.713141] [c01e505abac0] [c0002594] 
hardware_interrupt_common+0x114/0x180
[  137.713301] --- interrupt: 501 at arch_local_irq_restore+0x5c/0x90
[  137.713301] LR = arch_local_irq_restore+0x40/0x90
[  137.713505] [c01e505abdb0] [c148db10] 
powernv_idle_driver+0xd8/0x3e8 (unreliable)
[  137.713686] [c01e505abdd0] [c08ca0a8] 
cpuidle_enter_state+0x1a8/0x3c0
[  137.713845] [c01e505abe30] [c0113a68] call_cpuidle+0x78/0xd0
[  137.713981] [c01e505abe70] [c0113e0c] 
cpu_startup_entry+0x34c/0x460
[  137.714138] [c01e505abf30] [c0044f4c] start_secondary+0x33c/0x360
[  137.714274] [c01e505abf90] [c0008b6c] 
start_secondary_prolog+0x10/0x14
[  137.714433] Instruction dump:
[  137.714500]        

[  137.714721]        

[  137.714944] ---[ end trace fb709e6a13141985 ]---
[  137.716201]
[  137.716253] Sending IPI to other CPUs

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-21 Thread Joseph Salisbury
You only need to install the -extra packages when downloading the .deb
directly from launchpad.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-21 Thread Philipp Marek
No.

Are such essential things like the "standard" SCSI controller in an
extra package? Really?

Well, or would that be  storage-core-modules-4.2.0-34-generic-
di-4.2.0-34.39? Does the -extra encompass all the separate module
packages?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-21 Thread Joseph Salisbury
Hi Philipp,

Did you happen to install both the linux-image and linux-image-extra
.deb packages?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-21 Thread Philipp Marek
linux-image-4.4.0-1-generic_4.4.0-1.15_ppc64el.deb is missing the SCSI
modules, too -- do I need to install additional packages?

4.4.0-15.31 gives me this:

> [ 2256.803739] Netfilter messages via NETLINK v0.30.
> [ 2257.806152] [ cut here ]
> [ 2257.806231] Kernel BUG at ddd9 [verbose debug info unavailable]
> [ 2257.806245] Oops: Exception in kernel mode, sig: 5 [#1]
> [ 2257.806254] SMP NR_CPUS=2048 NUMA PowerNV
> [ 2257.806305] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink 
> bluetooth drbd_transport_rdma(OE) drbd_transport_tcp(OE) drbd(OE) dm_zero 
> lru_cache xt_CHECKSUM iptable_mangle ipt_REJECT nf_reject_ipv4 xt_tcpudp 
> ebtable_filter ebtables ip6table_filter ip6_tables xt_addrtype xt_conntrack 
> ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 
> nf_defrag_ipv4 nf_nat_ipv4 iptable_filter ip_tables x_tables nf_nat 
> nf_conntrack aufs nfsv3 nfs fscache binfmt_misc bridge stp llc aha3xx(OE) 
> uio_pdrv_genirq uio powernv_rng kvm_hv kvm rdma_cm iw_cm mlx5_ib ib_ipoib 
> ib_uverbs ib_umad nfsd ib_cm auth_rpcgss nfs_acl lockd ib_sa grace sunrpc 
> ib_mad ib_core ib_addr autofs4 raid10 raid456 async_raid6_recov async_memcpy 
> async_pq async_xor async_tx xor raid6_pq raid1 raid0 multipath linear ses 
> enclosure bnx2x mlx5_core vxlan ip6_udp_tunnel udp_tunnel ipr mdio nvme 
> libcrc32c [last unloaded: drbd]
> [ 2257.807532] CPU: 40 PID: 0 Comm: swapper/40 Tainted: G   OE   
> 4.4.0-15-generic #31-Ubuntu
> [ 2257.807618] task: c00ff07c7e60 ti: c01fffe5 task.ti: 
> c01e5053c000
> [ 2257.807692] NIP: ddd9 LR: c0ab867c CTR: 
> ddd9
> [ 2257.807766] REGS: c01fffe535e0 TRAP: 0700   Tainted: G   OE
> (4.4.0-15-generic)
> [ 2257.807851] MSR: 90029033   CR: 24002228  
> XER: 
> [ 2257.808039] CFAR: c0ab8678 SOFTE: 1
> GPR00: c0abe4b4 c01fffe53860 c15a4100 c00f989a3000
> GPR04: ddd70028 0042 c00fdd418000 
> GPR08: c1516400 ddd9  d00011a58828
> GPR12: ddd9 c7af7c00 c00f936ecb40 c00fdd830920
> GPR16: c00fdd418900 1b2d c01fffe539f0 0001
> GPR20: d000158a6f50 dd86  8000
> GPR24: 0005 0034 c00fd4388a10 c00fdd418000
> GPR28: 0042 c00f8a3a7000 c00f989a3000 0042
> [ 2257.809096] NIP [ddd9] 0xddd9
> [ 2257.809192] LR [c0ab867c] run_filter+0x6c/0xc0
> [ 2257.809284] Call Trace:
> [ 2257.809334] [c01fffe53860] [c00fa5230a90] 0xc00fa5230a90 
> (unreliable)
> [ 2257.809496] [c01fffe538a0] [c0abe4b4] tpacket_rcv+0x144/0xa50
> [ 2257.809634] [c01fffe53990] [c096cf7c] 
> __netif_receive_skb_core+0x4ac/0xdc0
> [ 2257.809793] [c01fffe53a70] [c0970f54] 
> netif_receive_skb_internal+0x34/0xd0
> [ 2257.809952] [c01fffe53ab0] [c097213c] 
> napi_gro_receive+0x11c/0x230
> [ 2257.810123] [c01fffe53af0] [d00011a17b1c] 
> bnx2x_rx_int+0xb4c/0x1710 [bnx2x]
> [ 2257.810295] [c01fffe53c90] [d00011a18fc0] bnx2x_poll+0x310/0x440 
> [bnx2x]
> [ 2257.810453] [c01fffe53d40] [c09716ec] net_rx_action+0x2dc/0x4a0
> [ 2257.810592] [c01fffe53e50] [c00beb38] __do_softirq+0x188/0x3e0
> [ 2257.810728] [c01fffe53f40] [c00bf008] irq_exit+0xc8/0x100
> [ 2257.810867] [c01fffe53f60] [c001132c] __do_irq+0x8c/0x1d0
> [ 2257.811004] [c01fffe53f90] [c0024800] call_do_irq+0x14/0x24
> [ 2257.811141] [c01e5053fa70] [c0011508] do_IRQ+0x98/0x140
> [ 2257.811279] [c01e5053fac0] [c0002594] 
> hardware_interrupt_common+0x114/0x180
> [ 2257.811440] --- interrupt: 501 at arch_local_irq_restore+0x5c/0x90
> [ 2257.811440] LR = arch_local_irq_restore+0x40/0x90
> [ 2257.811646] [c01e5053fdb0] [c00ff921d678] 0xc00ff921d678 
> (unreliable)
> [ 2257.811809] [c01e5053fdd0] [c0907248] 
> cpuidle_enter_state+0x1a8/0x410
> [ 2257.811968] [c01e5053fe30] [c0119958] call_cpuidle+0x78/0xd0
> [ 2257.812104] [c01e5053fe70] [c0119d2c] 
> cpu_startup_entry+0x37c/0x490
> [ 2257.812265] [c01e5053ff30] [c004563c] 
> start_secondary+0x33c/0x360
> [ 2257.812402] [c01e5053ff90] [c0008b6c] 
> start_secondary_prolog+0x10/0x14
> [ 2257.812560] Instruction dump:
> [ 2257.812631]        
> 
> [ 2257.812859]        
> 
> [ 2257.813097] ---[ end trace 25467d417868c3a8 ]---
> [ 2257.816033]

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel 

[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-19 Thread Joseph Salisbury
Do you happen to know if this bug is present in other releases as well
or only Xenial?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-19 Thread Joseph Salisbury
I'm not sure of the exact commit that fixed this.  Since Xenial is the
development kernel, we are constantly applying commits from upstream.
There were ~328 commits going from 4.4.0-11 to 4.4.0-13:

One way to pin point the exact fix would be to perform a reverse bisect,
but that can be time consuming.

** Also affects: linux (Ubuntu Xenial)
   Importance: Medium
   Status: Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-19 Thread Philipp Marek
Sadly that is not reproducible in a VM - if it was, I'd have made an
automated bisect run...

No, I don't know, sorry.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-19 Thread Philipp Marek
Sorry, got another crash right now, in run_filter+0x6c/0xc0.

  [93544.101832] [ cut here ]
  [93544.101920] Kernel BUG at ddc5 [verbose debug info unavailable]
  [93544.101935] Oops: Exception in kernel mode, sig: 5 [#1]
  [93544.101954] SMP NR_CPUS=2048 NUMA PowerNV
  [93544.102006] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink 
bluetooth aha3xx(OE) vhost_net vhost macvtap macvlan drbd_transport_rdma(OE) 
drbd_transport_tcp(OE) dm_zero drbd(OE) xt_CHECKSUM iptabl
  e_mangle ipt_REJECT nf_reject_ipv4 xt_tcpudp ebtable_filter ebtables 
ip6table_filter ip6_tables xt_addrtype xt_conntrack ipt_MASQUERADE 
nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_na
  t_ipv4 iptable_filter ip_tables x_tables nf_nat nf_conntrack aufs nfsv3 nfs 
fscache binfmt_misc bridge stp llc powernv_rng uio_pdrv_genirq uio kvm_hv kvm 
rdma_cm nfsd iw_cm mlx5_ib auth_rpcgss nfs_acl lockd gr
  ace sunrpc ib_ipoib ib_uverbs ib_umad ib_cm ib_sa ib_mad ib_core ib_addr 
autofs4 raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor 
async_tx xor raid6_pq raid1 raid0 multipath linear ses enclosur
  e bnx2x mlx5_core vxlan ip6_udp_tunnel ipr udp_tunnel nvme mdio libcrc32c 
[last unloaded: aha3xx]
  [93544.103269] CPU: 64 PID: 0 Comm: swapper/64 Tainted: G   OE   
4.4.0-13-generic #29-Ubuntu
  [93544.103356] task: c00ff09a0e90 ti: c00ff0a1c000 task.ti: 
c00ff0a1c000
  [93544.103429] NIP: ddc5 LR: c0ab21bc CTR: 
ddc5
  [93544.103503] REGS: c00ff0a1f0d0 TRAP: 0700   Tainted: G   OE
(4.4.0-13-generic)
  [93544.103588] MSR: 900100029033   CR: 22002848  
XER: 
  [93544.103774] CFAR: c0ab21b8 SOFTE: 1
  GPR00: c0ab7ff4 c00ff0a1f350 c15a3b00 c00f85451400
  GPR04: ddc30028 001c c00f9938 c01e3e2e962c
  GPR08: c1515f00 ddc5  001d
  GPR12: ddc5 c7b06000 c00ff980a938 0100
  GPR16: c00ff980a738 c00ff980a538 c00ff0a1f5c0 c15e4cf8
  GPR20:  c15e4ce8 c00f991b0800 
  GPR24:  002a c01e3e2e9602 c00f9938
  GPR28: 001c c01e4ad19000 c00f85451400 001c
  [93544.104713] NIP [ddc5] 0xddc5
  [93544.104807] LR [c0ab21bc] run_filter+0x6c/0xc0
  [93544.104899] Call Trace:
  [93544.104948] [c00ff0a1f350] [c00ff0a1f390] 0xc00ff0a1f390 
(unreliable)
  [93544.105110] [c00ff0a1f390] [c0ab7ff4] tpacket_rcv+0x144/0xa50
  [93544.105247] [c00ff0a1f480] [c096e4d0] 
dev_hard_start_xmit+0x2c0/0x530
  [93544.105407] [c00ff0a1f560] [c096eff8] 
__dev_queue_xmit+0x668/0x770
  [93544.105568] [c00ff0a1f600] [c0a0b160] arp_xmit+0x30/0xd0
  [93544.105704] [c00ff0a1f670] [c0a0b294] 
arp_send_dst.part.0+0x94/0xb0
  [93544.105864] [c00ff0a1f6e0] [c0a0be24] arp_solicit+0x114/0x2b0
  [93544.106001] [c00ff0a1f7b0] [c097a5b4] neigh_probe+0x84/0xd0
  [93544.106139] [c00ff0a1f7e0] [c098043c] 
neigh_timer_handler+0xbc/0x310
  [93544.106299] [c00ff0a1f820] [c0149ebc] call_timer_fn+0x5c/0x1c0
  [93544.106435] [c00ff0a1f8b0] [c014a37c] 
run_timer_softirq+0x31c/0x3f0
  [93544.106596] [c00ff0a1f980] [c00beaf8] __do_softirq+0x188/0x3e0
  [93544.106733] [c00ff0a1fa70] [c00befc8] irq_exit+0xc8/0x100
  [93544.106872] [c00ff0a1fa90] [c001f954] timer_interrupt+0xa4/0xe0
  [93544.107009] [c00ff0a1fac0] [c0002714] 
decrementer_common+0x114/0x180
  [93544.107170] --- interrupt: 901 at arch_local_irq_restore+0x74/0x90
  [93544.107170] LR = arch_local_irq_restore+0x74/0x90
  [93544.107375] [c00ff0a1fdb0] [c00ff981d678] 0xc00ff981d678 
(unreliable)
  [93544.107538] [c00ff0a1fdd0] [c0900da8] 
cpuidle_enter_state+0x1a8/0x410
  [93544.107697] [c00ff0a1fe30] [c0119898] call_cpuidle+0x78/0xd0
  [93544.107834] [c00ff0a1fe70] [c0119c6c] 
cpu_startup_entry+0x37c/0x490
  [93544.107995] [c00ff0a1ff30] [c004565c] 
start_secondary+0x33c/0x360
  [93544.108131] [c00ff0a1ff90] [c0008b6c] 
start_secondary_prolog+0x10/0x14
  [93544.108289] Instruction dump:
  [93544.108360]        

  [93544.108588]        

  [93544.108821] ---[ end trace 8419e626fa8d7aaf ]---
  [93544.111837]
  [93544.210799] [ cut here ]


On the second machine (that ran the same command) the backtrace is a bit 
different:

  [94483.530269] Netfilter messages via NETLINK v0.30.
  [94484.521665] Oops: Exception in kernel mode, sig: 4 [#1]
  [94484.521754] SMP NR_CPUS=2048 

[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-19 Thread Joseph Salisbury
It sounds like this bug may be fixed in the latest Xenial kernel.  Can
you apply the latest updates and see if the bug is resolved.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-19 Thread Philipp Marek
linux-image-4.2.0-34-generic_4.2.0-34.39_ppc64el.deb doesn't boot, it
seems to be missing some SCSI drivers.


linux-image-4.4.0-13-generic ppc64el 4.4.0-13.29 did work for me:

17996 packets captured
18004 packets received by filter
6 packets dropped by kernel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-18 Thread Philipp Marek
Well, that's what I meant by "linux-image-4.4.0-13-generic ppc64el
4.4.0-13.29 did work for me".

Would you care to point me to the fixing commit, just out of interest?

Thanks a lot.

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-14 Thread Joseph Salisbury
Thanks again for testing.  Your test results indicates this bug may have
been introduced by a SAUCE patch.  Can you test the following to kernels
to see if this was introduced in Xenial?:

First v4.4 Xenial kernel: 
https://launchpad.net/ubuntu/+source/linux/4.4.0-1.15/+build/8880829
Last WIly 
kernel:https://launchpad.net/~canonical-kernel-team/+archive/ubuntu/ppa/+build/9330348

The Xenial git repo is available from:
git://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/xenial

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-14 Thread Philipp Marek
Is there a git tree that includes Ubuntu patches, so that I could try a
bisect there?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-14 Thread Philipp Marek
http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.4.2-wily/linux-
image-4.4.2-040402-generic_4.4.2-040402.201602171633_ppc64el.deb
WORKSFORME ;)

39716 packets captured
39732 packets received by filter
14 packets dropped by kernel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-11 Thread Joseph Salisbury
Yes, the bug could have been introduced by an Ubuntu SAUCE patch.
Testing the upstream kernels will tell us whether that is the case.  Can
you next the upstream v4.4.2 kernel?  That is the upstream kernel Ubuntu
4.4.0-7-generic is based off of.  If it does have the bug, then we know
the bug was fixed in 4.5-rc1 and we need to perform a "Reverse" bisect.
If it does not have the but, then that indicates an Ubuntu SAUCE patch
introduced the bug, and we would want to perform a normal kernel bisect.

The v4.4.2 kernel can be downloaded from:
http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.4.2-wily/

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-11 Thread Philipp Marek
Uh, sorry, but couldn't the bug also lurk in Ubuntu's patches?

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-11 Thread Philipp Marek
This 4.5.0rc1 package works, too.

117 packets captured
131 packets received by filter
14 packets dropped by kernel

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-11 Thread Joseph Salisbury
Thanks for testing the mainline kernel.  It sounds like the bug is fixed
upstream.  We could perform a "Reverse" bisect to identify the commit
that fixes this issue.  We first need to identify the last bad kernel
and the first good kernel by testing some of the 4.5 release candidates.

Can you first test 4.5-rc1, which can be downloaded from:
http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.5-rc1-wily/

** Tags added: performing-bisect

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-10 Thread Philipp Marek
Using http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.5-rc7-wily/linux-
image-4.5.0-040500rc7-generic_4.5.0-040500rc7.201603061830_ppc64el.deb
the bnx2x interfaces don't come up by themselves; I've had to use the
serial console to do "ifconfig eth3 up" manually.

Other than that, "tcpdump -i br0" works on this kernel, or at least doesn't 
crash it immediately:
  493 packets captured
  536 packets received by filter
  43 packets dropped by kernel
  [  397.614186] device br0 left promiscuous mode


** Tags removed: kernel-da-key
** Tags added: kernel-fixed-upstream

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-10 Thread Joseph Salisbury
Would it be possible for you to test the latest upstream kernel? Refer
to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest
v4.5 kernel[0].

If this bug is fixed in the mainline kernel, please add the following
tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag:
'kernel-bug-exists-upstream'.

Once testing of the upstream kernel is complete, please mark this bug as
"Confirmed".


Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.5-rc7-wily/

** Changed in: linux (Ubuntu)
   Importance: Undecided => Medium

** Tags added: kernel-da-key

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-10 Thread Philipp Marek
# gdb /usr/lib/debug/boot/vmlinux-4.4.0-11-generic
(gdb) l *run_filter+0x6c/0xc0
0xc0ab1ab0 is in run_filter 
(/build/linux-xlQMJr/linux-4.4.0/net/packet/af_packet.c:1951).

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs


[Bug 1555671] Re: Kernel crash with tshark/tcpdump

2016-03-10 Thread Philipp Marek
Happened with 4.4.0-7-generic too, didn't try older versions.

Happens every time, with or without filter on the "tcpdump" command
line.

** Changed in: linux (Ubuntu)
   Status: Incomplete => Confirmed

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1555671

Title:
  Kernel crash with tshark/tcpdump

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu/+source/linux/+bug/1555671/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs