Comment 3 for bug 1927076

Revision history for this message
Po-Hsu Lin (cypressyew) wrote : Re: IPv6 TCP in reuseport_bpf_cpu from ubuntu_kernel_selftests/net tend to fail on P8 node entei with 5.8 kernel

OK, it's a combination effect, this issue can be reproduced in the following order:
1. Run the cpu-hotplug test
   sudo ./autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/cpu-hotplug/cpu-on-off-test.sh
2. Run the reuseport_bpf_cpu test
   sudo ./autotest/client/tmp/ubuntu_kernel_selftests/src/linux/tools/testing/selftests/net/reuseport_bpf_cpu

You may need to run reuseport_bpf_cpu multiple times to trigger this.
But it looks OK if the cpu-hotplug test was not executed first

[ 287.477797] Oops: Exception in kernel mode, sig: 4 [#1]
[ 287.477841] LE PAGE_SIZE=64K MMU=Hash SMP NR_CPUS=2048 NUMA PowerNV
[ 287.477990] Modules linked in: binfmt_misc dm_multipath scsi_dh_rdac scsi_dh_emc scsi_dh_alua joydev input_leds mac_hid ofpart cmdlinepart plx_dma powernv_flash mtd at24 ipmi_powernv uio_pdrv_genirq powernv_rng ipmi_devintf ibmpowernv ipmi_msghandler opal_prd uio vmx_crypto sch_fq_codel ip_tables x_tables autofs4 btrfs blake2b_generic hid_generic raid10 raid456 usbhid uas async_raid6_recov hid async_memcpy async_pq usb_storage async_xor async_tx xor raid6_pq libcrc32c raid1 raid0 multipath linear ast drm_vram_helper drm_ttm_helper i2c_algo_bit ttm drm_kms_helper syscopyarea sysfillrect sysimgblt fb_sys_fops cec rc_core crct10dif_vpmsum crc32c_vpmsum drm ahci tg3 libahci drm_panel_orientation_quirks xhci_pci xhci_pci_renesas
[ 287.478276] CPU: 0 PID: 3267 Comm: reuseport_bpf_c Not tainted 5.8.0-50-generic #56-Ubuntu
[ 287.478294] NIP: c008000001592094 LR: c000000000ea092c CTR: c008000001592094
[ 287.478313] REGS: c0000007ff6eb510 TRAP: 0e40 Not tainted (5.8.0-50-generic)
[ 287.478330] MSR: 900000000288b033 <SF,HV,VEC,VSX,EE,FP,ME,IR,DR,RI,LE> CR: 24002488 XER: 20000000
[ 287.478356] CFAR: c000000000ea0928 IRQMASK: 0
[ 287.478356] GPR00: c000000000ea0b04 c0000007ff6eb7a0 c0000000020dd900 c000000712caf2e0
[ 287.478356] GPR04: c008000001260038 c008000001260000 c000000712caf2e0 0000000000000028
[ 287.478356] GPR08: 0000000129432812 0000000000000000 c00000077f82bd58 0000000000000000
[ 287.478356] GPR12: c008000001592094 c000000002380000 c000000002003e80 00000000000022b8
[ 287.478356] GPR16: 00000000000049c3 000000000000000a 0000000000000001 0000000000000001
[ 287.478356] GPR20: c00000077f82bd48 0000000000000000 00000000000022b8 0000000000000001
[ 287.478356] GPR24: 0000000000000001 0000000000000000 c008000001260000 0000000000000080
[ 287.478356] GPR28: c000000712caf2e0 0000000000000028 0000000000000028 c008000001260000
[ 287.478628] NIP [c008000001592094] 0xc008000001592094
[ 287.478645] LR [c000000000ea092c] __bpf_prog_run_save_cb+0x5c/0x190
[ 287.478660] Call Trace:
[ 287.478671] [c0000007ff6eb7a0] [c000000000f3f84c] __ip_queue_xmit+0x18c/0x4d0 (unreliable)
[ 287.478691] [c0000007ff6eb810] [c000000000ea0b04] run_bpf_filter+0xa4/0x1f0
[ 287.478709] [c0000007ff6eb870] [c000000000ea0cd0] reuseport_select_sock+0x80/0x170
[ 287.478728] [c0000007ff6eb8b0] [c0000000010838ec] inet6_lhash2_lookup+0x1dc/0x200
[ 287.478748] [c0000007ff6eb930] [c000000001083a7c] inet6_lookup_listener+0x16c/0x180
[ 287.478768] [c0000007ff6eba00] [c00000000105e968] tcp_v6_rcv+0x828/0xf50
[ 287.478785] [c0000007ff6ebb50] [c0000000010109a0] ip6_protocol_deliver_rcu+0x110/0x6c0
[ 287.478804] [c0000007ff6ebbd0] [c000000001011074] ip6_input+0xe4/0x100
[ 287.478820] [c0000007ff6ebc40] [c0000000010106a4] ipv6_rcv+0x164/0x190
[ 287.478838] [c0000007ff6ebcc0] [c000000000e63014] __netif_receive_skb_one_core+0x74/0xb0
[ 287.478856] [c0000007ff6ebd10] [c000000000e634b8] process_backlog+0x138/0x270
[ 287.478875] [c0000007ff6ebd80] [c000000000e64b60] napi_poll+0x100/0x350
[ 287.478892] [c0000007ff6ebe10] [c000000000e64ea4] net_rx_action+0xf4/0x2d0
[ 287.478909] [c0000007ff6ebea0] [c0000000010d0870] __do_softirq+0x150/0x3dc
[ 287.478927] [c0000007ff6ebf90] [c00000000002a48c] call_do_softirq+0x14/0x24
[ 287.478945] [c0000006e639f670] [c000000000015fd8] do_softirq_own_stack+0x38/0x50
[ 287.478965] [c0000006e639f690] [c00000000015daa0] do_softirq+0x90/0xa0
[ 287.478982] [c0000006e639f6c0] [c00000000015db68] __local_bh_enable_ip+0xb8/0xe0
[ 287.479001] [c0000006e639f6e0] [c00000000100ad98] ip6_finish_output2+0x208/0x660
[ 287.479020] [c0000006e639f780] [c00000000100a750] ip6_xmit+0x370/0x7b0
[ 287.479037] [c0000006e639f8a0] [c000000001067fc8] inet6_csk_xmit+0xb8/0x120
[ 287.479055] [c0000006e639f940] [c000000000f6b7b4] __tcp_transmit_skb+0x424/0x9d0
[ 287.479074] [c0000006e639fa50] [c000000000f6c5e8] tcp_connect+0x2d8/0x380
[ 287.479091] [c0000006e639fb00] [c00000000105b118] tcp_v6_connect+0x5c8/0x790
[ 287.479110] [c0000006e639fbe0] [c000000000f9e610] __inet_stream_connect+0x130/0x390
[ 287.479129] [c0000006e639fc40] [c000000000f9e8cc] inet_stream_connect+0x5c/0x90
[ 287.482595] [c0000006e639fc80] [c000000000e28328] __sys_connect_file+0xa8/0xe0
[ 287.485864] [c0000006e639fcc0] [c000000000e28444] __sys_connect+0xe4/0x140
[ 287.488920] [c0000006e639fda0] [c000000000e284c8] sys_connect+0x28/0x40
[ 287.493522] [c0000006e639fdc0] [c000000000035354] system_call_exception+0xf4/0x1c0
[ 287.499806] [c0000006e639fe20] [c00000000000ca70] system_call_common+0xf0/0x278
[ 287.502829] Instruction dump:
[ 287.506039] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
[ 287.509195] XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX XXXXXXXX
[ 287.514249] ---[ end trace ad377ffe0b8272bb ]---
[ 287.667686]
[ 288.667720] Kernel panic - not syncing: Aiee, killing interrupt handler!
[ [ 339.079983439,5] OPAL: Reboot request...