This bug is missing log files that will aid in diagnosing the problem.
While running an Ubuntu kernel (not a mainline or third-party kernel)
please enter the following command in a terminal window:

apport-collect 1845646

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable
to run this command, please add a comment stating that fact and change
the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the
Ubuntu Kernel Team.

** Changed in: linux (Ubuntu)
       Status: New => Incomplete

** Changed in: linux (Ubuntu Disco)
       Status: New => Incomplete

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/1845646

Title:
  test_verifier in ubuntu_bpf on D-s390x failed with Failed to load prog
  'Success'!

Status in ubuntu-kernel-tests:
  New
Status in linux package in Ubuntu:
  Incomplete
Status in linux source package in Disco:
  Incomplete

Bug description:
  There are 37 failures reported in the test result:

  7167. #212/p runtime/jit: pass > 32bit index to tail_call FAIL retval 2 != 42
  7431. #402/u sanitation: alu with different scalars FAIL retval 1048619 != 
1048576
  7461. #402/p sanitation: alu with different scalars FAIL retval 1048619 != 
1048576
  7830. #635/p calls: basic sanity FAIL
  7850. #636/p calls: not on unpriviledged FAIL
  7869. #637/p calls: div by 0 in subprog FAIL
  7909. #646/p calls: conditional call 2 FAIL
  7936. #648/p calls: conditional call 4 FAIL
  7965. #651/p calls: using r0 returned by callee FAIL
  7984. #653/p calls: callee is using r1 FAIL
  8003. #654/p calls: callee using args1 FAIL
  8023. #656/p calls: callee using two args FAIL
  8046. #658/p calls: two calls with args FAIL
  8094. #659/p calls: calls with stack arith FAIL
  8145. #676/p calls: two calls with stack read FAIL
  8196. #677/p calls: two calls with stack write FAIL
  8254. #680/p calls: stack depth check using three frames. test1 FAIL
  8300. #681/p calls: stack depth check using three frames. test2 FAIL
  8350. #686/p calls: write into caller stack frame FAIL
  8374. #688/p calls: two calls with stack write and void return FAIL
  8428. #690/p calls: two calls that return map_value FAIL
  8507. #691/p calls: two calls that return map_value with bool condition FAIL
  8610. #694/p calls: two calls that receive map_value via 
arg=ptr_stack_of_caller. test2 FAIL
  8733. #696/p calls: two calls that receive map_value_ptr_or_null via arg. 
test1 FAIL
  8856. #698/p calls: pkt_ptr spill into caller stack FAIL
  8895. #700/p calls: pkt_ptr spill into caller stack 3 FAIL
  8941. #701/p calls: pkt_ptr spill into caller stack 4 FAIL
  8989. #705/p calls: pkt_ptr spill into caller stack 8 FAIL
  9042. #707/p calls: caller stack init to zero or map_value_or_null FAIL
  9093. #709/p calls: two calls returning different map pointers for lookup 
(hash, array) FAIL
  9185. #734/p ld_abs: jump around ld_abs FAIL
  13304.        #752/p reference tracking in call: free reference in subprog 
FAIL
  13378.        #773/u masking, test in bounds 3 FAIL retval 0 != -2
  13389.        #773/p masking, test in bounds 3 FAIL retval 0 != -2
  13412.        #781/p reference tracking in call: alloc in subprog, release 
outside FAIL
  13450.        #783/p reference tracking in call: sk_ptr spill into caller 
stack FAIL
  13524.        #799/p calls: ctx read at start of subprog FAIL

  Summary: 1142 PASSED, 0 SKIPPED, 37 FAILED

  Most of them are failing with:
   #635/p calls: basic sanity FAIL
   Failed to load prog 'Success'!
   0: (85) call pc+2
   caller:
   R10=fp0,call_-1
   callee:
   frame1: R1=ctx(id=0,off=0,imm=0) R10=fp0,call_0
   3: (b7) r0 = 2
   4: (95) exit
   returning from callee:
   frame1: R0_w=inv2 R1=ctx(id=0,off=0,imm=0) R10=fp0,call_0
   to caller at 1:
   R0_w=inv2 R10=fp0,call_-1

   from 4 to 1: R0=inv2 R10=fp0,call_-1
   1: (b7) r0 = 1
   2: (95) exit
   processed 5 insns (limit 131072), stack depth 0+0
   JIT doesn't support bpf-to-bpf calls

  
  Please find attachment for the detailed test report.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1845646/+subscriptions

-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to