This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window:
apport-collect 1845646 and then change the status of the bug to 'Confirmed'. If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'. This change has been made by an automated script, maintained by the Ubuntu Kernel Team. ** Changed in: linux (Ubuntu) Status: New => Incomplete ** Changed in: linux (Ubuntu Disco) Status: New => Incomplete -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1845646 Title: test_verifier in ubuntu_bpf on D-s390x failed with Failed to load prog 'Success'! Status in ubuntu-kernel-tests: New Status in linux package in Ubuntu: Incomplete Status in linux source package in Disco: Incomplete Bug description: There are 37 failures reported in the test result: 7167. #212/p runtime/jit: pass > 32bit index to tail_call FAIL retval 2 != 42 7431. #402/u sanitation: alu with different scalars FAIL retval 1048619 != 1048576 7461. #402/p sanitation: alu with different scalars FAIL retval 1048619 != 1048576 7830. #635/p calls: basic sanity FAIL 7850. #636/p calls: not on unpriviledged FAIL 7869. #637/p calls: div by 0 in subprog FAIL 7909. #646/p calls: conditional call 2 FAIL 7936. #648/p calls: conditional call 4 FAIL 7965. #651/p calls: using r0 returned by callee FAIL 7984. #653/p calls: callee is using r1 FAIL 8003. #654/p calls: callee using args1 FAIL 8023. #656/p calls: callee using two args FAIL 8046. #658/p calls: two calls with args FAIL 8094. #659/p calls: calls with stack arith FAIL 8145. #676/p calls: two calls with stack read FAIL 8196. #677/p calls: two calls with stack write FAIL 8254. #680/p calls: stack depth check using three frames. test1 FAIL 8300. #681/p calls: stack depth check using three frames. test2 FAIL 8350. #686/p calls: write into caller stack frame FAIL 8374. #688/p calls: two calls with stack write and void return FAIL 8428. #690/p calls: two calls that return map_value FAIL 8507. #691/p calls: two calls that return map_value with bool condition FAIL 8610. #694/p calls: two calls that receive map_value via arg=ptr_stack_of_caller. test2 FAIL 8733. #696/p calls: two calls that receive map_value_ptr_or_null via arg. test1 FAIL 8856. #698/p calls: pkt_ptr spill into caller stack FAIL 8895. #700/p calls: pkt_ptr spill into caller stack 3 FAIL 8941. #701/p calls: pkt_ptr spill into caller stack 4 FAIL 8989. #705/p calls: pkt_ptr spill into caller stack 8 FAIL 9042. #707/p calls: caller stack init to zero or map_value_or_null FAIL 9093. #709/p calls: two calls returning different map pointers for lookup (hash, array) FAIL 9185. #734/p ld_abs: jump around ld_abs FAIL 13304. #752/p reference tracking in call: free reference in subprog FAIL 13378. #773/u masking, test in bounds 3 FAIL retval 0 != -2 13389. #773/p masking, test in bounds 3 FAIL retval 0 != -2 13412. #781/p reference tracking in call: alloc in subprog, release outside FAIL 13450. #783/p reference tracking in call: sk_ptr spill into caller stack FAIL 13524. #799/p calls: ctx read at start of subprog FAIL Summary: 1142 PASSED, 0 SKIPPED, 37 FAILED Most of them are failing with: #635/p calls: basic sanity FAIL Failed to load prog 'Success'! 0: (85) call pc+2 caller: R10=fp0,call_-1 callee: frame1: R1=ctx(id=0,off=0,imm=0) R10=fp0,call_0 3: (b7) r0 = 2 4: (95) exit returning from callee: frame1: R0_w=inv2 R1=ctx(id=0,off=0,imm=0) R10=fp0,call_0 to caller at 1: R0_w=inv2 R10=fp0,call_-1 from 4 to 1: R0=inv2 R10=fp0,call_-1 1: (b7) r0 = 1 2: (95) exit processed 5 insns (limit 131072), stack depth 0+0 JIT doesn't support bpf-to-bpf calls Please find attachment for the detailed test report. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1845646/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp