OK, it's a combination effect, this issue can be reproduced in the following 
order:
1. Run the cpu-hotplug test
   sudo 
./autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/cpu-hotplug/cpu-on-off-test.sh
 
2. Run the reuseport_bpf_cpu test
   sudo 
./autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net/reuseport_bpf_cpu

You may need to run reuseport_bpf_cpu multiple times to trigger this.
But it looks OK if the cpu-hotplug test was not executed first

[  287.477797] Oops: Exception in kernel mode, sig: 4 [#1]
[  287.477841] LE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA PowerNV
[  287.477990] Modules linked in: binfmt_misc dm_multipath scsi_dh_rdac 
scsi_dh_emc scsi_dh_alua joydev input_leds mac_hid ofpart cmdlinepart plx_dma 
powernv_flash mtd at24 ipmi_powernv uio_pdrv_genirq powernv_rng ipmi_devintf 
ibmpowernv ipmi_msghandler opal_prd uio vmx_crypto sch_fq_codel ip_tables 
x_tables autofs4 btrfs blake2b_generic hid_generic raid10 raid456 usbhid uas 
async_raid6_recov hid async_memcpy async_pq usb_storage async_xor async_tx xor 
raid6_pq libcrc32c raid1 raid0 multipath linear ast drm_vram_helper 
drm_ttm_helper i2c_algo_bit ttm drm_kms_helper syscopyarea sysfillrect 
sysimgblt fb_sys_fops cec rc_core crct10dif_vpmsum crc32c_vpmsum drm ahci tg3 
libahci drm_panel_orientation_quirks xhci_pci xhci_pci_renesas
[  287.478276] CPU: 0 PID: 3267 Comm: reuseport_bpf_c Not tainted 
5.8.0-50-generic #56-Ubuntu
[  287.478294] NIP:  c008000001592094 LR: c000000000ea092c CTR: c008000001592094
[  287.478313] REGS: c0000007ff6eb510 TRAP: 0e40   Not tainted  
(5.8.0-50-generic)
[  287.478330] MSR:  900000000288b033 <SF,HV,VEC,VSX,EE,FP,ME,IR,DR,RI,LE>  CR: 
24002488  XER: 20000000
[  287.478356] CFAR: c000000000ea0928 IRQMASK: 0 
[  287.478356] GPR00: c000000000ea0b04 c0000007ff6eb7a0 c0000000020dd900 
c000000712caf2e0 
[  287.478356] GPR04: c008000001260038 c008000001260000 c000000712caf2e0 
0000000000000028 
[  287.478356] GPR08: 0000000129432812 0000000000000000 c00000077f82bd58 
0000000000000000 
[  287.478356] GPR12: c008000001592094 c000000002380000 c000000002003e80 
00000000000022b8 
[  287.478356] GPR16: 00000000000049c3 000000000000000a 0000000000000001 
0000000000000001 
[  287.478356] GPR20: c00000077f82bd48 0000000000000000 00000000000022b8 
0000000000000001 
[  287.478356] GPR24: 0000000000000001 0000000000000000 c008000001260000 
0000000000000080 
[  287.478356] GPR28: c000000712caf2e0 0000000000000028 0000000000000028 
c008000001260000 
[  287.478628] NIP [c008000001592094] 0xc008000001592094
[  287.478645] LR [c000000000ea092c] __bpf_prog_run_save_cb+0x5c/0x190
[  287.478660] Call Trace:
[  287.478671] [c0000007ff6eb7a0] [c000000000f3f84c] 
__ip_queue_xmit+0x18c/0x4d0 (unreliable)
[  287.478691] [c0000007ff6eb810] [c000000000ea0b04] run_bpf_filter+0xa4/0x1f0
[  287.478709] [c0000007ff6eb870] [c000000000ea0cd0] 
reuseport_select_sock+0x80/0x170
[  287.478728] [c0000007ff6eb8b0] [c0000000010838ec] 
inet6_lhash2_lookup+0x1dc/0x200
[  287.478748] [c0000007ff6eb930] [c000000001083a7c] 
inet6_lookup_listener+0x16c/0x180
[  287.478768] [c0000007ff6eba00] [c00000000105e968] tcp_v6_rcv+0x828/0xf50
[  287.478785] [c0000007ff6ebb50] [c0000000010109a0] 
ip6_protocol_deliver_rcu+0x110/0x6c0
[  287.478804] [c0000007ff6ebbd0] [c000000001011074] ip6_input+0xe4/0x100
[  287.478820] [c0000007ff6ebc40] [c0000000010106a4] ipv6_rcv+0x164/0x190
[  287.478838] [c0000007ff6ebcc0] [c000000000e63014] 
__netif_receive_skb_one_core+0x74/0xb0
[  287.478856] [c0000007ff6ebd10] [c000000000e634b8] process_backlog+0x138/0x270
[  287.478875] [c0000007ff6ebd80] [c000000000e64b60] napi_poll+0x100/0x350
[  287.478892] [c0000007ff6ebe10] [c000000000e64ea4] net_rx_action+0xf4/0x2d0
[  287.478909] [c0000007ff6ebea0] [c0000000010d0870] __do_softirq+0x150/0x3dc
[  287.478927] [c0000007ff6ebf90] [c00000000002a48c] call_do_softirq+0x14/0x24
[  287.478945] [c0000006e639f670] [c000000000015fd8] 
do_softirq_own_stack+0x38/0x50
[  287.478965] [c0000006e639f690] [c00000000015daa0] do_softirq+0x90/0xa0
[  287.478982] [c0000006e639f6c0] [c00000000015db68] 
__local_bh_enable_ip+0xb8/0xe0
[  287.479001] [c0000006e639f6e0] [c00000000100ad98] 
ip6_finish_output2+0x208/0x660
[  287.479020] [c0000006e639f780] [c00000000100a750] ip6_xmit+0x370/0x7b0
[  287.479037] [c0000006e639f8a0] [c000000001067fc8] inet6_csk_xmit+0xb8/0x120
[  287.479055] [c0000006e639f940] [c000000000f6b7b4] 
__tcp_transmit_skb+0x424/0x9d0
[  287.479074] [c0000006e639fa50] [c000000000f6c5e8] tcp_connect+0x2d8/0x380
[  287.479091] [c0000006e639fb00] [c00000000105b118] tcp_v6_connect+0x5c8/0x790
[  287.479110] [c0000006e639fbe0] [c000000000f9e610] 
__inet_stream_connect+0x130/0x390
[  287.479129] [c0000006e639fc40] [c000000000f9e8cc] 
inet_stream_connect+0x5c/0x90
[  287.482595] [c0000006e639fc80] [c000000000e28328] 
__sys_connect_file+0xa8/0xe0
[  287.485864] [c0000006e639fcc0] [c000000000e28444] __sys_connect+0xe4/0x140
[  287.488920] [c0000006e639fda0] [c000000000e284c8] sys_connect+0x28/0x40
[  287.493522] [c0000006e639fdc0] [c000000000035354] 
system_call_exception+0xf4/0x1c0
[  287.499806] [c0000006e639fe20] [c00000000000ca70] 
system_call_common+0xf0/0x278
[  287.502829] Instruction dump:
[  287.506039] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX 
XXXXXXXX 
[  287.509195] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX 
XXXXXXXX 
[  287.514249] ---[ end trace ad377ffe0b8272bb ]---
[  287.667686] 
[  288.667720] Kernel panic - not syncing: Aiee, killing interrupt handler!
[  [  339.079983439,5] OPAL: Reboot request...


** Summary changed:

- IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net tend to fail 
on P8 node entei with 5.8 kernel
+ IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node 
entei with 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1])

** Summary changed:

- IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node 
entei with 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1])
+ IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash P8 node 
entei on 5.8 kernel (Oops: Exception in kernel mode, sig: 4 [#1])

** Also affects: linux (Ubuntu)
   Importance: Undecided
       Status: New

** Tags removed: kqa-blocker

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1927076

Title:
  IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net crash
  P8 node entei on 5.8 kernel (Oops: Exception in kernel mode, sig: 4
  [#1])

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1927076/+subscriptions

-- 
ubuntu-bugs mailing list
[email protected]
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to