OK, it's a combination effect, this issue can be reproduced in the following order: 1. Run the cpu-hotplug test sudo ./autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/cpu-hotplug/cpu-on-off-test.sh 2. Run the reuseport_bpf_cpu test sudo ./autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net/reuseport_bpf_cpu
You may need to run reuseport_bpf_cpu multiple times to trigger this. But it looks OK if the cpu-hotplug test was not executed first [ 287.477797] Oops: Exception in kernel mode, sig: 4 [#1] [ 287.477841] LE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA PowerNV [ 287.477990] Modules linked in: binfmt_misc dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua joydev input_leds mac_hid ofpart cmdlinepart plx_dma powernv_flash mtd at24 ipmi_powernv uio_pdrv_genirq powernv_rng ipmi_devintf ibmpowernv ipmi_msghandler opal_prd uio vmx_crypto sch_fq_codel ip_tables x_tables autofs4 btrfs blake2b_generic hid_generic raid10 raid456 usbhid uas async_raid6_recov hid async_memcpy async_pq usb_storage async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear ast drm_vram_helper drm_ttm_helper i2c_algo_bit ttm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops cec rc_core crct10dif_vpmsum crc32c_vpmsum drm ahci tg3 libahci drm_panel_orientation_quirks xhci_pci xhci_pci_renesas [ 287.478276] CPU: 0 PID: 3267 Comm: reuseport_bpf_c Not tainted 5.8.0-50-generic #56-Ubuntu [ 287.478294] NIP: c008000001592094 LR: c000000000ea092c CTR: c008000001592094 [ 287.478313] REGS: c0000007ff6eb510 TRAP: 0e40 Not tainted (5.8.0-50-generic) [ 287.478330] MSR: 900000000288b033 <SF,HV,VEC,VSX,EE,FP,ME,IR,DR,RI,LE> CR: 24002488 XER: 20000000 [ 287.478356] CFAR: c000000000ea0928 IRQMASK: 0 [ 287.478356] GPR00: c000000000ea0b04 c0000007ff6eb7a0 c0000000020dd900 c000000712caf2e0 [ 287.478356] GPR04: c008000001260038 c008000001260000 c000000712caf2e0 0000000000000028 [ 287.478356] GPR08: 0000000129432812 0000000000000000 c00000077f82bd58 0000000000000000 [ 287.478356] GPR12: c008000001592094 c000000002380000 c000000002003e80 00000000000022b8 [ 287.478356] GPR16: 00000000000049c3 000000000000000a 0000000000000001 0000000000000001 [ 287.478356] GPR20: c00000077f82bd48 0000000000000000 00000000000022b8 0000000000000001 [ 287.478356] GPR24: 0000000000000001 0000000000000000 c008000001260000 0000000000000080 [ 287.478356] GPR28: c000000712caf2e0 0000000000000028 0000000000000028 c008000001260000 [ 287.478628] NIP [c008000001592094] 0xc008000001592094 [ 287.478645] LR [c000000000ea092c] __bpf_prog_run_save_cb+0x5c/0x190 [ 287.478660] Call Trace: [ 287.478671] [c0000007ff6eb7a0] [c000000000f3f84c] __ip_queue_xmit+0x18c/0x4d0 (unreliable) [ 287.478691] [c0000007ff6eb810] [c000000000ea0b04] run_bpf_filter+0xa4/0x1f0 [ 287.478709] [c0000007ff6eb870] [c000000000ea0cd0] reuseport_select_sock+0x80/0x170 [ 287.478728] [c0000007ff6eb8b0] [c0000000010838ec] inet6_lhash2_lookup+0x1dc/0x200 [ 287.478748] [c0000007ff6eb930] [c000000001083a7c] inet6_lookup_listener+0x16c/0x180 [ 287.478768] [c0000007ff6eba00] [c00000000105e968] tcp_v6_rcv+0x828/0xf50 [ 287.478785] [c0000007ff6ebb50] [c0000000010109a0] ip6_protocol_deliver_rcu+0x110/0x6c0 [ 287.478804] [c0000007ff6ebbd0] [c000000001011074] ip6_input+0xe4/0x100 [ 287.478820] [c0000007ff6ebc40] [c0000000010106a4] ipv6_rcv+0x164/0x190 [ 287.478838] [c0000007ff6ebcc0] [c000000000e63014] __netif_receive_skb_one_core+0x74/0xb0 [ 287.478856] [c0000007ff6ebd10] [c000000000e634b8] process_backlog+0x138/0x270 [ 287.478875] [c0000007ff6ebd80] [c000000000e64b60] napi_poll+0x100/0x350 [ 287.478892] [c0000007ff6ebe10] [c000000000e64ea4] net_rx_action+0xf4/0x2d0 [ 287.478909] [c0000007ff6ebea0] [c0000000010d0870] __do_softirq+0x150/0x3dc [ 287.478927] [c0000007ff6ebf90] [c00000000002a48c] call_do_softirq+0x14/0x24 [ 287.478945] [c0000006e639f670] [c000000000015fd8] do_softirq_own_stack+0x38/0x50 [ 287.478965] [c0000006e639f690] [c00000000015daa0] do_softirq+0x90/0xa0 [ 287.478982] [c0000006e639f6c0] [c00000000015db68] __local_bh_enable_ip+0xb8/0xe0 [ 287.479001] [c0000006e639f6e0] [c00000000100ad98] ip6_finish_output2+0x208/0x660 [ 287.479020] [c0000006e639f780] [c00000000100a750] ip6_xmit+0x370/0x7b0 [ 287.479037] [c0000006e639f8a0] [c000000001067fc8] inet6_csk_xmit+0xb8/0x120 [ 287.479055] [c0000006e639f940] [c000000000f6b7b4] __tcp_transmit_skb+0x424/0x9d0 [ 287.479074] [c0000006e639fa50] [c000000000f6c5e8] tcp_connect+0x2d8/0x380 [ 287.479091] [c0000006e639fb00] [c00000000105b118] tcp_v6_connect+0x5c8/0x790 [ 287.479110] [c0000006e639fbe0] [c000000000f9e610] __inet_stream_connect+0x130/0x390 [ 287.479129] [c0000006e639fc40] [c000000000f9e8cc] inet_stream_connect+0x5c/0x90 [ 287.482595] [c0000006e639fc80] [c000000000e28328] __sys_connect_file+0xa8/0xe0 [ 287.485864] [c0000006e639fcc0] [c000000000e28444] __sys_connect+0xe4/0x140 [ 287.488920] [c0000006e639fda0] [c000000000e284c8] sys_connect+0x28/0x40 [ 287.493522] [c0000006e639fdc0] [c000000000035354] system_call_exception+0xf4/0x1c0 [ 287.499806] [c0000006e639fe20] [c00000000000ca70] system_call_common+0xf0/0x278 [ 287.502829] Instruction dump: [ 287.506039] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX [ 287.509195] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX [ 287.514249] ---[ end trace ad377ffe0b8272bb ]--- [ 287.667686] [ 288.667720] Kernel panic - not syncing: Aiee, killing interrupt handler! [ [ 339.079983439,5] OPAL: Reboot request... ** Summary changed: - IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net tend to fail on P8 node entei with 5.8 kernel + IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node entei with 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1]) ** Summary changed: - IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node entei with 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1]) + IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node entei on 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1]) ** Also affects: linux (Ubuntu) Importance: Undecided Status: New ** Tags removed: kqa-blocker -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1927076 Title: IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node entei on 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1]) Status in ubuntu-kernel-tests: New Status in linux package in Ubuntu: New Bug description: It looks like our P8 node "entei" tend to fail with the IPv6 TCP test from reuseport_bpf_cpu in ubuntu_kernel_selftests/net on 5.8 kernels: # send cpu 119, receive socket 119 # send cpu 121, receive socket 121 # send cpu 123, receive socket 123 # send cpu 125, receive socket 125 # send cpu 127, receive socket 127 # ---- IPv6 TCP ---- publish-job-status: using request.json It failed silently here, this can be 100% reproduced with Groovy 5.8 and Focal 5.8. This will cause the ubuntu_kernel_selftests being interrupted, the test result for other tests cannot be processed to our result page. Please find attachment for the complete "net" test result on this node with Groovy 5.8.0-52.59 Add the kqa-blocker tag as this might needs to be manually verified. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1927076/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp