OK, it's a combination effect, this issue can be reproduced in the following 
order:
1. Run the cpu-hotplug test
   sudo 
./autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/cpu-hotplug/cpu-on-off-test.sh
 
2. Run the reuseport_bpf_cpu test
   sudo 
./autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net/reuseport_bpf_cpu

You may need to run reuseport_bpf_cpu multiple times to trigger this.
But it looks OK if the cpu-hotplug test was not executed first

[  287.477797] Oops: Exception in kernel mode, sig: 4 [#1]
[  287.477841] LE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA PowerNV
[  287.477990] Modules linked in: binfmt_misc dm_multipath scsi_dh_rdac 
scsi_dh_emc scsi_dh_alua joydev input_leds mac_hid ofpart cmdlinepart plx_dma 
powernv_flash mtd at24 ipmi_powernv uio_pdrv_genirq powernv_rng ipmi_devintf 
ibmpowernv ipmi_msghandler opal_prd uio vmx_crypto sch_fq_codel ip_tables 
x_tables autofs4 btrfs blake2b_generic hid_generic raid10 raid456 usbhid uas 
async_raid6_recov hid async_memcpy async_pq usb_storage async_xor async_tx xor 
raid6_pq libcrc32c raid1 raid0 multipath linear ast drm_vram_helper 
drm_ttm_helper i2c_algo_bit ttm drm_kms_helper syscopyarea sysfillrect 
sysimgblt fb_sys_fops cec rc_core crct10dif_vpmsum crc32c_vpmsum drm ahci tg3 
libahci drm_panel_orientation_quirks xhci_pci xhci_pci_renesas
[  287.478276] CPU: 0 PID: 3267 Comm: reuseport_bpf_c Not tainted 
5.8.0-50-generic #56-Ubuntu
[  287.478294] NIP:  c008000001592094 LR: c000000000ea092c CTR: c008000001592094
[  287.478313] REGS: c0000007ff6eb510 TRAP: 0e40   Not tainted  
(5.8.0-50-generic)
[  287.478330] MSR:  900000000288b033 <SF,HV,VEC,VSX,EE,FP,ME,IR,DR,RI,LE>  CR: 
24002488  XER: 20000000
[  287.478356] CFAR: c000000000ea0928 IRQMASK: 0 
[  287.478356] GPR00: c000000000ea0b04 c0000007ff6eb7a0 c0000000020dd900 
c000000712caf2e0 
[  287.478356] GPR04: c008000001260038 c008000001260000 c000000712caf2e0 
0000000000000028 
[  287.478356] GPR08: 0000000129432812 0000000000000000 c00000077f82bd58 
0000000000000000 
[  287.478356] GPR12: c008000001592094 c000000002380000 c000000002003e80 
00000000000022b8 
[  287.478356] GPR16: 00000000000049c3 000000000000000a 0000000000000001 
0000000000000001 
[  287.478356] GPR20: c00000077f82bd48 0000000000000000 00000000000022b8 
0000000000000001 
[  287.478356] GPR24: 0000000000000001 0000000000000000 c008000001260000 
0000000000000080 
[  287.478356] GPR28: c000000712caf2e0 0000000000000028 0000000000000028 
c008000001260000 
[  287.478628] NIP [c008000001592094] 0xc008000001592094
[  287.478645] LR [c000000000ea092c] __bpf_prog_run_save_cb+0x5c/0x190
[  287.478660] Call Trace:
[  287.478671] [c0000007ff6eb7a0] [c000000000f3f84c] 
__ip_queue_xmit+0x18c/0x4d0 (unreliable)
[  287.478691] [c0000007ff6eb810] [c000000000ea0b04] run_bpf_filter+0xa4/0x1f0
[  287.478709] [c0000007ff6eb870] [c000000000ea0cd0] 
reuseport_select_sock+0x80/0x170
[  287.478728] [c0000007ff6eb8b0] [c0000000010838ec] 
inet6_lhash2_lookup+0x1dc/0x200
[  287.478748] [c0000007ff6eb930] [c000000001083a7c] 
inet6_lookup_listener+0x16c/0x180
[  287.478768] [c0000007ff6eba00] [c00000000105e968] tcp_v6_rcv+0x828/0xf50
[  287.478785] [c0000007ff6ebb50] [c0000000010109a0] 
ip6_protocol_deliver_rcu+0x110/0x6c0
[  287.478804] [c0000007ff6ebbd0] [c000000001011074] ip6_input+0xe4/0x100
[  287.478820] [c0000007ff6ebc40] [c0000000010106a4] ipv6_rcv+0x164/0x190
[  287.478838] [c0000007ff6ebcc0] [c000000000e63014] 
__netif_receive_skb_one_core+0x74/0xb0
[  287.478856] [c0000007ff6ebd10] [c000000000e634b8] process_backlog+0x138/0x270
[  287.478875] [c0000007ff6ebd80] [c000000000e64b60] napi_poll+0x100/0x350
[  287.478892] [c0000007ff6ebe10] [c000000000e64ea4] net_rx_action+0xf4/0x2d0
[  287.478909] [c0000007ff6ebea0] [c0000000010d0870] __do_softirq+0x150/0x3dc
[  287.478927] [c0000007ff6ebf90] [c00000000002a48c] call_do_softirq+0x14/0x24
[  287.478945] [c0000006e639f670] [c000000000015fd8] 
do_softirq_own_stack+0x38/0x50
[  287.478965] [c0000006e639f690] [c00000000015daa0] do_softirq+0x90/0xa0
[  287.478982] [c0000006e639f6c0] [c00000000015db68] 
__local_bh_enable_ip+0xb8/0xe0
[  287.479001] [c0000006e639f6e0] [c00000000100ad98] 
ip6_finish_output2+0x208/0x660
[  287.479020] [c0000006e639f780] [c00000000100a750] ip6_xmit+0x370/0x7b0
[  287.479037] [c0000006e639f8a0] [c000000001067fc8] inet6_csk_xmit+0xb8/0x120
[  287.479055] [c0000006e639f940] [c000000000f6b7b4] 
__tcp_transmit_skb+0x424/0x9d0
[  287.479074] [c0000006e639fa50] [c000000000f6c5e8] tcp_connect+0x2d8/0x380
[  287.479091] [c0000006e639fb00] [c00000000105b118] tcp_v6_connect+0x5c8/0x790
[  287.479110] [c0000006e639fbe0] [c000000000f9e610] 
__inet_stream_connect+0x130/0x390
[  287.479129] [c0000006e639fc40] [c000000000f9e8cc] 
inet_stream_connect+0x5c/0x90
[  287.482595] [c0000006e639fc80] [c000000000e28328] 
__sys_connect_file+0xa8/0xe0
[  287.485864] [c0000006e639fcc0] [c000000000e28444] __sys_connect+0xe4/0x140
[  287.488920] [c0000006e639fda0] [c000000000e284c8] sys_connect+0x28/0x40
[  287.493522] [c0000006e639fdc0] [c000000000035354] 
system_call_exception+0xf4/0x1c0
[  287.499806] [c0000006e639fe20] [c00000000000ca70] 
system_call_common+0xf0/0x278
[  287.502829] Instruction dump:
[  287.506039] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX 
XXXXXXXX 
[  287.509195] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX 
XXXXXXXX 
[  287.514249] ---[ end trace ad377ffe0b8272bb ]---
[  287.667686] 
[  288.667720] Kernel panic - not syncing: Aiee, killing interrupt handler!
[  [  339.079983439,5] OPAL: Reboot request...


** Summary changed:

- IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net tend to fail 
on P8 node entei with 5.8 kernel
+ IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node 
entei with 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1])

** Summary changed:

- IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node 
entei with 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1])
+ IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node 
entei on 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1])

** Also affects: linux (Ubuntu)
   Importance: Undecided
       Status: New

** Tags removed: kqa-blocker

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1927076

Title:
  IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash
  P8 node entei on 5.8 kernel (Oops: Exception in kernel mode, sig: 4
  [#1])

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  New

Bug description:
  It looks like our P8 node "entei" tend to fail with the IPv6 TCP test
  from reuseport_bpf_cpu in ubuntu_kernel_selftests/net on 5.8 kernels:

   # send cpu 119, receive socket 119
   # send cpu 121, receive socket 121
   # send cpu 123, receive socket 123
   # send cpu 125, receive socket 125
   # send cpu 127, receive socket 127
   # ---- IPv6 TCP ----
  publish-job-status: using request.json

  It failed silently here, this can be 100% reproduced with Groovy 5.8
  and Focal 5.8.

  This will cause the ubuntu_kernel_selftests being interrupted, the
  test result for other tests cannot be processed to our result page.

  Please find attachment for the complete "net" test result on this node
  with Groovy 5.8.0-52.59

  Add the kqa-blocker tag as this might needs to be manually verified.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1927076/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to