Kernel crash with tshark/tcpdump

Bug #1555671 reported by Philipp Marek
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
linux (Ubuntu)
Confirmed
Medium
Unassigned
Xenial
Confirmed
Medium
Unassigned

Bug Description

Reproducible crash when just running "tcpdump -i br0" (or any other interface).

[ 95.615160] Oops: Exception in kernel mode, sig: 4 [#1]
[ 95.615237] SMP NR_CPUS=2048 NUMA PowerNV
[ 95.615245] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink bluetooth drbd(OE) xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables x_tables nfsv3 nfs_acl nfs lockd grace fscache binfmt_misc bridge stp llc kvm_hv kvm aha3xx(OE) uio_pdrv_genirq uio powernv_rng rdma_cm iw_cm mlx5_ib ib_ipoib ib_uverbs sunrpc ib_umad ib_cm ib_sa ib_mad ib_core ib_addr autofs4 ses enclosure bnx2x mlx5_core vxlan ip6_udp_tunnel udp_tunnel mdio ipr nvme libcrc32c
[ 95.616011] CPU: 48 PID: 0 Comm: swapper/48 Tainted: G OE 4.4.0-11-generic #26-Ubuntu
[ 95.616090] task: c000000ff098bd90 ti: c000001fffe10000 task.ti: c000000ff095c000
[ 95.616159] NIP: d000000017360000 LR: c000000000ab1b1c CTR: d000000017360000
[ 95.616227] REGS: c000001fffe13360 TRAP: 0e40 Tainted: G OE (4.4.0-11-generic)
[ 95.616305] MSR: 9000000000089033 <SF,HV,EE,ME,IR,DR,RI,LE> CR: 24002828 XER: 00000000
[ 95.616476] CFAR: c000000000ab1b18 SOFTE: 1
GPR00: c000000000ab7954 c000001fffe135e0 c0000000015a3b00 c000000fc1cf9f00
GPR04: d000000017340028 000000000000013a c000000fdfc02000 000000000000ffff
GPR08: c000000001515f00 d000000017360000 0000000000000000 d0000000141cb7c8
GPR12: d000000017360000 c000000007afc800 c000000fba6423c0 c000000fd94b0ff8
GPR16: c000000fda398900 000000000000008f c000001fffe139f0 0000000000000001
GPR20: 0000000000000000 000000000000dd86 0000000000000000 ffffffff80000000
GPR24: 0000000000000005 000000000000012c c000000fe063f010 c000000fdfc02000
GPR28: 000000000000013a c000000fde053800 c000000fc1cf9f00 000000000000013a
[ 95.617343] NIP [d000000017360000] 0xd000000017360000
[ 95.617393] LR [c000000000ab1b1c] run_filter+0x6c/0xc0
[ 95.617438] Call Trace:
[ 95.617462] [c000001fffe135e0] [c000000fd8e27910] 0xc000000fd8e27910 (unreliable)
[ 95.617543] [c000001fffe13620] [c000000000ab7954] tpacket_rcv+0x144/0xa50
[ 95.617613] [c000001fffe13710] [c000000000966804] __netif_receive_skb_core+0x8b4/0xdc0
[ 95.617692] [c000001fffe137f0] [c00000000096a3d4] netif_receive_skb_internal+0x34/0xd0
[ 95.617775] [c000001fffe13830] [d0000000141b6b04] br_handle_frame_finish+0x2a4/0x6f0 [bridge]
[ 95.617857] [c000001fffe13900] [d0000000141b717c] br_handle_frame+0x22c/0x3b0 [bridge]
[ 95.617936] [c000001fffe13990] [c000000000966418] __netif_receive_skb_core+0x4c8/0xdc0
[ 95.618016] [c000001fffe13a70] [c00000000096a3d4] netif_receive_skb_internal+0x34/0xd0
[ 95.618095] [c000001fffe13ab0] [c00000000096b5bc] napi_gro_receive+0x11c/0x230
[ 95.618182] [c000001fffe13af0] [d000000011b97b1c] bnx2x_rx_int+0xb4c/0x1710 [bnx2x]
[ 95.618278] [c000001fffe13c90] [d000000011b98fc0] bnx2x_poll+0x310/0x440 [bnx2x]
[ 95.618436] [c000001fffe13d40] [c00000000096ab6c] net_rx_action+0x2dc/0x4a0
[ 95.618575] [c000001fffe13e50] [c0000000000beaf8] __do_softirq+0x188/0x3e0
[ 95.618710] [c000001fffe13f40] [c0000000000befc8] irq_exit+0xc8/0x100
[ 95.618848] [c000001fffe13f60] [c00000000001132c] __do_irq+0x8c/0x1d0
[ 95.618985] [c000001fffe13f90] [c000000000024800] call_do_irq+0x14/0x24
[ 95.619121] [c000000ff095fa70] [c000000000011508] do_IRQ+0x98/0x140
[ 95.619255] [c000000ff095fac0] [c000000000002594] hardware_interrupt_common+0x114/0x180
[ 95.619415] --- interrupt: 501 at arch_local_irq_restore+0x5c/0x90
[ 95.619415] LR = arch_local_irq_restore+0x40/0x90
[ 95.619617] [c000000ff095fdb0] [c000000ff941d678] 0xc000000ff941d678 (unreliable)
[ 95.619775] [c000000ff095fdd0] [c000000000900708] cpuidle_enter_state+0x1a8/0x410
[ 95.619933] [c000000ff095fe30] [c000000000119898] call_cpuidle+0x78/0xd0
[ 95.620069] [c000000ff095fe70] [c000000000119c6c] cpu_startup_entry+0x37c/0x490
[ 95.620229] [c000000ff095ff30] [c00000000004565c] start_secondary+0x33c/0x360
[ 95.620365] [c000000ff095ff90] [c000000000008b6c] start_secondary_prolog+0x10/0x14
[ 95.620524] Instruction dump:
[ 95.620590] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
[ 95.620811] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
[ 95.621035] ---[ end trace 4e7432dd9190f0b2 ]---

Revision history for this message
Brad Figg (brad-figg) wrote : Missing required logs.

This bug is missing log files that will aid in diagnosing the problem. From a terminal window please run:

apport-collect 1555671

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the Ubuntu Kernel Team.

Changed in linux (Ubuntu):
status: New → Incomplete
Revision history for this message
Philipp Marek (philipp-marek) wrote :

Happened with 4.4.0-7-generic too, didn't try older versions.

Happens every time, with or without filter on the "tcpdump" command line.

Changed in linux (Ubuntu):
status: Incomplete → Confirmed
Revision history for this message
Philipp Marek (philipp-marek) wrote :

# gdb /usr/lib/debug/boot/vmlinux-4.4.0-11-generic
(gdb) l *run_filter+0x6c/0xc0
0xc000000000ab1ab0 is in run_filter (/build/linux-xlQMJr/linux-4.4.0/net/packet/af_packet.c:1951).

Revision history for this message
Joseph Salisbury (jsalisbury) wrote :

Would it be possible for you to test the latest upstream kernel? Refer to https://wiki.ubuntu.com/KernelMainlineBuilds . Please test the latest v4.5 kernel[0].

If this bug is fixed in the mainline kernel, please add the following tag 'kernel-fixed-upstream'.

If the mainline kernel does not fix this bug, please add the tag: 'kernel-bug-exists-upstream'.

Once testing of the upstream kernel is complete, please mark this bug as "Confirmed".

Thanks in advance.

[0] http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.5-rc7-wily/

Changed in linux (Ubuntu):
importance: Undecided → Medium
tags: added: kernel-da-key
Revision history for this message
Philipp Marek (philipp-marek) wrote :

Using http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.5-rc7-wily/linux-image-4.5.0-040500rc7-generic_4.5.0-040500rc7.201603061830_ppc64el.deb the bnx2x interfaces don't come up by themselves; I've had to use the serial console to do "ifconfig eth3 up" manually.

Other than that, "tcpdump -i br0" works on this kernel, or at least doesn't crash it immediately:
  493 packets captured
  536 packets received by filter
  43 packets dropped by kernel
  [ 397.614186] device br0 left promiscuous mode

tags: added: kernel-fixed-upstream
removed: kernel-da-key
Revision history for this message
Joseph Salisbury (jsalisbury) wrote :

Thanks for testing the mainline kernel. It sounds like the bug is fixed upstream. We could perform a "Reverse" bisect to identify the commit that fixes this issue. We first need to identify the last bad kernel and the first good kernel by testing some of the 4.5 release candidates.

Can you first test 4.5-rc1, which can be downloaded from:
http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.5-rc1-wily/

tags: added: performing-bisect
Revision history for this message
Philipp Marek (philipp-marek) wrote :

This 4.5.0rc1 package works, too.

117 packets captured
131 packets received by filter
14 packets dropped by kernel

Revision history for this message
Philipp Marek (philipp-marek) wrote :

Uh, sorry, but couldn't the bug also lurk in Ubuntu's patches?

Revision history for this message
Joseph Salisbury (jsalisbury) wrote :

Yes, the bug could have been introduced by an Ubuntu SAUCE patch. Testing the upstream kernels will tell us whether that is the case. Can you next the upstream v4.4.2 kernel? That is the upstream kernel Ubuntu 4.4.0-7-generic is based off of. If it does have the bug, then we know the bug was fixed in 4.5-rc1 and we need to perform a "Reverse" bisect. If it does not have the but, then that indicates an Ubuntu SAUCE patch introduced the bug, and we would want to perform a normal kernel bisect.

The v4.4.2 kernel can be downloaded from:
http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.4.2-wily/

Revision history for this message
Philipp Marek (philipp-marek) wrote :

http://kernel.ubuntu.com/~kernel-ppa/mainline/v4.4.2-wily/linux-image-4.4.2-040402-generic_4.4.2-040402.201602171633_ppc64el.deb WORKSFORME ;)

    39716 packets captured
    39732 packets received by filter
    14 packets dropped by kernel

Revision history for this message
Philipp Marek (philipp-marek) wrote :

Is there a git tree that includes Ubuntu patches, so that I could try a bisect there?

Revision history for this message
Joseph Salisbury (jsalisbury) wrote :

Thanks again for testing. Your test results indicates this bug may have been introduced by a SAUCE patch. Can you test the following to kernels to see if this was introduced in Xenial?:

First v4.4 Xenial kernel: https://launchpad.net/ubuntu/+source/linux/4.4.0-1.15/+build/8880829
Last WIly kernel:https://launchpad.net/~canonical-kernel-team/+archive/ubuntu/ppa/+build/9330348

The Xenial git repo is available from:
git://git.launchpad.net/~ubuntu-kernel/ubuntu/+source/linux/+git/xenial

Revision history for this message
Philipp Marek (philipp-marek) wrote :

linux-image-4.2.0-34-generic_4.2.0-34.39_ppc64el.deb doesn't boot, it seems to be missing some SCSI drivers.

linux-image-4.4.0-13-generic ppc64el 4.4.0-13.29 did work for me:

17996 packets captured
18004 packets received by filter
6 packets dropped by kernel

Revision history for this message
Joseph Salisbury (jsalisbury) wrote :

It sounds like this bug may be fixed in the latest Xenial kernel. Can you apply the latest updates and see if the bug is resolved.

Revision history for this message
Philipp Marek (philipp-marek) wrote :

Well, that's what I meant by "linux-image-4.4.0-13-generic ppc64el 4.4.0-13.29 did work for me".

Would you care to point me to the fixing commit, just out of interest?

Thanks a lot.

Revision history for this message
Joseph Salisbury (jsalisbury) wrote :

I'm not sure of the exact commit that fixed this. Since Xenial is the development kernel, we are constantly applying commits from upstream. There were ~328 commits going from 4.4.0-11 to 4.4.0-13:

One way to pin point the exact fix would be to perform a reverse bisect, but that can be time consuming.

Revision history for this message
Joseph Salisbury (jsalisbury) wrote :

Do you happen to know if this bug is present in other releases as well or only Xenial?

Revision history for this message
Philipp Marek (philipp-marek) wrote :

Sadly that is not reproducible in a VM - if it was, I'd have made an automated bisect run...

No, I don't know, sorry.

Revision history for this message
Philipp Marek (philipp-marek) wrote :
Download full text (9.2 KiB)

Sorry, got another crash right now, in run_filter+0x6c/0xc0.

  [93544.101832] ------------[ cut here ]------------
  [93544.101920] Kernel BUG at d00000000dc50000 [verbose debug info unavailable]
  [93544.101935] Oops: Exception in kernel mode, sig: 5 [#1]
  [93544.101954] SMP NR_CPUS=2048 NUMA PowerNV
  [93544.102006] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink bluetooth aha3xx(OE) vhost_net vhost macvtap macvlan drbd_transport_rdma(OE) drbd_transport_tcp(OE) dm_zero drbd(OE) xt_CHECKSUM iptabl
  e_mangle ipt_REJECT nf_reject_ipv4 xt_tcpudp ebtable_filter ebtables ip6table_filter ip6_tables xt_addrtype xt_conntrack ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_na
  t_ipv4 iptable_filter ip_tables x_tables nf_nat nf_conntrack aufs nfsv3 nfs fscache binfmt_misc bridge stp llc powernv_rng uio_pdrv_genirq uio kvm_hv kvm rdma_cm nfsd iw_cm mlx5_ib auth_rpcgss nfs_acl lockd gr
  ace sunrpc ib_ipoib ib_uverbs ib_umad ib_cm ib_sa ib_mad ib_core ib_addr autofs4 raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 raid0 multipath linear ses enclosur
  e bnx2x mlx5_core vxlan ip6_udp_tunnel ipr udp_tunnel nvme mdio libcrc32c [last unloaded: aha3xx]
  [93544.103269] CPU: 64 PID: 0 Comm: swapper/64 Tainted: G OE 4.4.0-13-generic #29-Ubuntu
  [93544.103356] task: c000000ff09a0e90 ti: c000000ff0a1c000 task.ti: c000000ff0a1c000
  [93544.103429] NIP: d00000000dc50000 LR: c000000000ab21bc CTR: d00000000dc50000
  [93544.103503] REGS: c000000ff0a1f0d0 TRAP: 0700 Tainted: G OE (4.4.0-13-generic)
  [93544.103588] MSR: 9000000100029033 <SF,HV,EE,ME,IR,DR,RI,LE> CR: 22002848 XER: 00000000
  [93544.103774] CFAR: c000000000ab21b8 SOFTE: 1
  GPR00: c000000000ab7ff4 c000000ff0a1f350 c0000000015a3b00 c000000f85451400
  GPR04: d00000000dc30028 000000000000001c c000000f99380000 c000001e3e2e962c
  GPR08: c000000001515f00 d00000000dc50000 0000000000000000 000000000000001d
  GPR12: d00000000dc50000 c000000007b06000 c000000ff980a938 0000000000000100
  GPR16: c000000ff980a738 c000000ff980a538 c000000ff0a1f5c0 c0000000015e4cf8
  GPR20: 0000000000000000 c0000000015e4ce8 c000000f991b0800 0000000000000000
  GPR24: 0000000000000000 000000000000002a c000001e3e2e9602 c000000f99380000
  GPR28: 000000000000001c c000001e4ad19000 c000000f85451400 000000000000001c
  [93544.104713] NIP [d00000000dc50000] 0xd00000000dc50000
  [93544.104807] LR [c000000000ab21bc] run_filter+0x6c/0xc0
  [93544.104899] Call Trace:
  [93544.104948] [c000000ff0a1f350] [c000000ff0a1f390] 0xc000000ff0a1f390 (unreliable)
  [93544.105110] [c000000ff0a1f390] [c000000000ab7ff4] tpacket_rcv+0x144/0xa50
  [93544.105247] [c000000ff0a1f480] [c00000000096e4d0] dev_hard_start_xmit+0x2c0/0x530
  [93544.105407] [c000000ff0a1f560] [c00000000096eff8] __dev_queue_xmit+0x668/0x770
  [93544.105568] [c000000ff0a1f600] [c000000000a0b160] arp_xmit+0x30/0xd0
  [93544.105704] [c000000ff0a1f670] [c000000000a0b294] arp_send_dst.part.0+0x94/0xb0
  [93544.105864] [c000000ff0a1f6e0] [c000000000a0be24] arp_solicit+0x114/0x2b0
  [93544.106001] [c000000ff0a1f7b0] [c00000000097a5b4] neigh_probe+0x84/0xd0
  [93544.106139] ...

Read more...

Revision history for this message
Philipp Marek (philipp-marek) wrote :
Download full text (4.6 KiB)

linux-image-4.4.0-1-generic_4.4.0-1.15_ppc64el.deb is missing the SCSI modules, too -- do I need to install additional packages?

4.4.0-15.31 gives me this:

> [ 2256.803739] Netfilter messages via NETLINK v0.30.
> [ 2257.806152] ------------[ cut here ]------------
> [ 2257.806231] Kernel BUG at d00000000dd90000 [verbose debug info unavailable]
> [ 2257.806245] Oops: Exception in kernel mode, sig: 5 [#1]
> [ 2257.806254] SMP NR_CPUS=2048 NUMA PowerNV
> [ 2257.806305] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink bluetooth drbd_transport_rdma(OE) drbd_transport_tcp(OE) drbd(OE) dm_zero lru_cache xt_CHECKSUM iptable_mangle ipt_REJECT nf_reject_ipv4 xt_tcpudp ebtable_filter ebtables ip6table_filter ip6_tables xt_addrtype xt_conntrack ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_conntrack_ipv4 nf_defrag_ipv4 nf_nat_ipv4 iptable_filter ip_tables x_tables nf_nat nf_conntrack aufs nfsv3 nfs fscache binfmt_misc bridge stp llc aha3xx(OE) uio_pdrv_genirq uio powernv_rng kvm_hv kvm rdma_cm iw_cm mlx5_ib ib_ipoib ib_uverbs ib_umad nfsd ib_cm auth_rpcgss nfs_acl lockd ib_sa grace sunrpc ib_mad ib_core ib_addr autofs4 raid10 raid456 async_raid6_recov async_memcpy async_pq async_xor async_tx xor raid6_pq raid1 raid0 multipath linear ses enclosure bnx2x mlx5_core vxlan ip6_udp_tunnel udp_tunnel ipr mdio nvme libcrc32c [last unloaded: drbd]
> [ 2257.807532] CPU: 40 PID: 0 Comm: swapper/40 Tainted: G OE 4.4.0-15-generic #31-Ubuntu
> [ 2257.807618] task: c000000ff07c7e60 ti: c000001fffe50000 task.ti: c000001e5053c000
> [ 2257.807692] NIP: d00000000dd90000 LR: c000000000ab867c CTR: d00000000dd90000
> [ 2257.807766] REGS: c000001fffe535e0 TRAP: 0700 Tainted: G OE (4.4.0-15-generic)
> [ 2257.807851] MSR: 9000000000029033 <SF,HV,EE,ME,IR,DR,RI,LE> CR: 24002228 XER: 00000000
> [ 2257.808039] CFAR: c000000000ab8678 SOFTE: 1
> GPR00: c000000000abe4b4 c000001fffe53860 c0000000015a4100 c000000f989a3000
> GPR04: d00000000dd70028 0000000000000042 c000000fdd418000 000000000000ffff
> GPR08: c000000001516400 d00000000dd90000 0000000000000000 d000000011a58828
> GPR12: d00000000dd90000 c000000007af7c00 c000000f936ecb40 c000000fdd830920
> GPR16: c000000fdd418900 0000000000001b2d c000001fffe539f0 0000000000000001
> GPR20: d0000000158a6f50 000000000000dd86 0000000000000000 ffffffff80000000
> GPR24: 0000000000000005 0000000000000034 c000000fd4388a10 c000000fdd418000
> GPR28: 0000000000000042 c000000f8a3a7000 c000000f989a3000 0000000000000042
> [ 2257.809096] NIP [d00000000dd90000] 0xd00000000dd90000
> [ 2257.809192] LR [c000000000ab867c] run_filter+0x6c/0xc0
> [ 2257.809284] Call Trace:
> [ 2257.809334] [c000001fffe53860] [c000000fa5230a90] 0xc000000fa5230a90 (unreliable)
> [ 2257.809496] [c000001fffe538a0] [c000000000abe4b4] tpacket_rcv+0x144/0xa50
> [ 2257.809634] [c000001fffe53990] [c00000000096cf7c] __netif_receive_skb_core+0x4ac/0xdc0
> [ 2257.809793] [c000001fffe53a70] [c000000000970f54] netif_receive_skb_internal+0x34/0xd0
> [ 2257.809952] [c000001fffe53ab0] [c00000000097213c] napi_gro_receive+0x11c/0x230
> [ 2257.810123] [c000001fffe53af0] [d000000011a17b1c] bnx2x_rx_int+0xb4c/0x1710 [bnx2x]
> [ 2257.810295] [c000001fffe53...

Read more...

Revision history for this message
Joseph Salisbury (jsalisbury) wrote :

Hi Philipp,

Did you happen to install both the linux-image and linux-image-extra .deb packages?

Revision history for this message
Philipp Marek (philipp-marek) wrote :

No.

Are such essential things like the "standard" SCSI controller in an extra package? Really?

Well, or would that be storage-core-modules-4.2.0-34-generic-di-4.2.0-34.39? Does the -extra encompass all the separate module packages?

Revision history for this message
Joseph Salisbury (jsalisbury) wrote :

You only need to install the -extra packages when downloading the .deb directly from launchpad.

Revision history for this message
Philipp Marek (philipp-marek) wrote :
Download full text (4.1 KiB)

4.2.0-34-generic is ... strange.

"tcpdump" works as expected:
    14412 packets captured
    14430 packets received by filter
    15 packets dropped by kernel

but "tshark" with the same options crashes the kernel:

[ 137.709794] Oops: Exception in kernel mode, sig: 4 [#1]
[ 137.709872] SMP NR_CPUS=2048 NUMA PowerNV
[ 137.709879] Modules linked in: nfnetlink_queue nfnetlink_log nfnetlink bluetooth drbd lru_cache xt_CHECKSUM iptable_mangle ipt_MASQUERADE nf_nat_masquerade_ipv4 iptable_nat nf_nat_ipv4 nf_nat nf_conntrack_ipv4 nf_defrag_ipv4 xt_conntrack nf_conntrack ipt_REJECT nf_reject_ipv4 xt_tcpudp ebtable_filter ebtables ip6table_filter ip6_tables iptable_filter ip_tables x_tables nfsv3 nfs_acl nfs lockd grace fscache binfmt_misc bridge stp llc kvm_hv uio_pdrv_genirq kvm powernv_rng uio rdma_cm iw_cm mlx5_ib ib_ipoib sunrpc ib_uverbs ib_umad ib_cm ib_sa ib_mad ib_core ib_addr autofs4 ses enclosure mlx5_core bnx2x ipr nvme mdio libcrc32c
[ 137.710598] CPU: 64 PID: 0 Comm: swapper/64 Not tainted 4.2.0-34-generic #39-Ubuntu
[ 137.710666] task: c000001e503de5e0 ti: c000001fffd90000 task.ti: c000001e505a8000
[ 137.710735] NIP: d000000016f50000 LR: c000000000a7a6d4 CTR: d000000016f50000
[ 137.710803] REGS: c000001fffd93620 TRAP: 0e40 Not tainted (4.2.0-34-generic)
[ 137.710870] MSR: 9000000000089033 <SF,HV,EE,ME,IR,DR,RI,LE> CR: 24002888 XER: 00000000
[ 137.711042] CFAR: c000000000a7a6d0 SOFTE: 1
GPR00: c000000000a7a69c c000001fffd938a0 c00000000151af00 c000000fa52fa500
GPR04: d000000016f30028 c000000fe3f55d80 c000000fdf824000 000000000000ffff
GPR08: c000000001490b00 d000000016f50000 000000000000002e d000000010f94c68
GPR12: d000000016f50000 c000000007b06000 c000000fa360acc0 c000000fdae18000
GPR16: c000000fdf824880 00000000000002b3 c000001fffd939f0 0000000000000001
GPR20: d000000013356ba0 000000000000dd86 0000000000000000 ffffffff80000000
GPR24: 0000000000000005 000000000000002e c000000fa5427910 c000000fdf824000
GPR28: 000000000000003c c000000fdf824000 c000000fe3f55800 c000000fa52fa500
[ 137.711909] NIP [d000000016f50000] 0xd000000016f50000
[ 137.711959] LR [c000000000a7a6d4] tpacket_rcv+0x164/0xa80
[ 137.712004] Call Trace:
[ 137.712029] [c000001fffd938a0] [c000000000a7a69c] tpacket_rcv+0x12c/0xa80 (unreliable)
[ 137.712110] [c000001fffd93990] [c0000000009301ac] __netif_receive_skb_core+0x4ec/0xd60
[ 137.712190] [c000001fffd93a70] [c000000000933f74] netif_receive_skb_internal+0x34/0xd0
[ 137.712269] [c000001fffd93ab0] [c0000000009350ac] napi_gro_receive+0xec/0x1b0
[ 137.712346] [c000001fffd93af0] [d000000010f55a0c] bnx2x_rx_int+0xb4c/0x1710 [bnx2x]
[ 137.712431] [c000001fffd93c90] [d000000010f56eb0] bnx2x_poll+0x310/0x440 [bnx2x]
[ 137.712510] [c000001fffd93d40] [c00000000093472c] net_rx_action+0x2dc/0x470
[ 137.712580] [c000001fffd93e50] [c0000000000bb0b8] __do_softirq+0x188/0x3a0
[ 137.712648] [c000001fffd93f40] [c0000000000bb548] irq_exit+0xc8/0x100
[ 137.712731] [c000001fffd93f60] [c0000000000111bc] __do_irq+0x8c/0x190
[ 137.712867] [c000001fffd93f90] [c0000000000242f0] call_do_irq+0x14/0x24
[ 137.713004] [c000001e505aba70] [c000000000011358] do_IRQ+0x98/0x140
[ 137.713141] [c000001e505abac0] [c000000000002594] ...

Read more...

Revision history for this message
Philipp Marek (philipp-marek) wrote :

Perhaps "tcpdump" sets no filter, but tshark does have some default it's using?

Revision history for this message
Philipp Marek (philipp-marek) wrote :

Any update for me? Is there something that I can test?

To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.