Activity log for bug #2001618

Date Who What changed Old value New value Message
2023-01-04 10:52:57 Po-Hsu Lin bug added bug
2023-01-04 11:03:02 Po-Hsu Lin attachment added bpf-failed.log https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/2001618/+attachment/5639130/+files/bpf-failed.log
2023-01-04 11:03:13 Po-Hsu Lin ubuntu-kernel-tests: assignee Po-Hsu Lin (cypressyew)
2023-01-04 11:03:16 Po-Hsu Lin ubuntu-kernel-tests: status New In Progress
2023-01-04 11:19:55 Po-Hsu Lin description [Impact] The BPF_AND, BPF_OR, BPF_XOR, BPF_FETCH, BPF_XCHG and BPF_CMPXCHG related tests will fail in net:test_bpf test from ubuntu_kernel_selftests as they are not supported. test_bpf: #361 BPF_ATOMIC | BPF_W, BPF_AND: Test: 0x12 & 0xab = 0x02 eBPF filter atomic op code c3 (@3) unsupported FAIL to select_runtime err=-524 ... test_bpf: #365 BPF_ATOMIC | BPF_W, BPF_AND | BPF_FETCH: Test: 0x12 & 0xab = 0x02 eBPF filter atomic op code c3 (@3) unsupported FAIL to select_runtime err=-524 ... test_bpf: #377 BPF_ATOMIC | BPF_W, BPF_OR: Test: 0x12 | 0xab = 0xbb FAIL to select_runtime err=-524 ... test_bpf: #393 BPF_ATOMIC | BPF_W, BPF_XOR: Test: 0x12 ^ 0xab = 0xb9 FAIL to select_runtime err=-524 ... test_bpf: #409 BPF_ATOMIC | BPF_W, BPF_XCHG: Test: 0x12 xchg 0xab = 0xab eBPF filter atomic op code c3 (@3) unsupported FAIL to select_runtime err=-524 ... test_bpf: #417 BPF_ATOMIC | BPF_W, BPF_CMPXCHG: Test successful return eBPF filter atomic op code c3 (@3) unsupported FAIL to select_runtime err=-524 ... test_bpf: Summary: 894 PASSED, 132 FAILED, [882/882 JIT'ed] Please find attachment for the complete test log. [Fix] * 6511270911 powerpc/bpf/64: add support for BPF_ATOMIC bitwise operations * dbe6e2456f powerpc/bpf/64: add support for atomic fetch operations * 1e82dfaa78 powerpc/bpf/64: Add instructions for atomic_[cmp]xchg These patches can be cherry-picked into Kinetic kernel. [Test] Test kernel can be found here: [Where problems could occur] [Impact] The BPF_AND, BPF_OR, BPF_XOR, BPF_FETCH, BPF_XCHG and BPF_CMPXCHG related tests will fail in net:test_bpf test from ubuntu_kernel_selftests as they are not supported.  test_bpf: #361 BPF_ATOMIC | BPF_W, BPF_AND: Test: 0x12 & 0xab = 0x02  eBPF filter atomic op code c3 (@3) unsupported  FAIL to select_runtime err=-524  ...  test_bpf: #365 BPF_ATOMIC | BPF_W, BPF_AND | BPF_FETCH: Test: 0x12 & 0xab = 0x02  eBPF filter atomic op code c3 (@3) unsupported  FAIL to select_runtime err=-524  ...  test_bpf: #377 BPF_ATOMIC | BPF_W, BPF_OR: Test: 0x12 | 0xab = 0xbb FAIL to select_runtime err=-524  ...  test_bpf: #393 BPF_ATOMIC | BPF_W, BPF_XOR: Test: 0x12 ^ 0xab = 0xb9 FAIL to select_runtime err=-524  ...  test_bpf: #409 BPF_ATOMIC | BPF_W, BPF_XCHG: Test: 0x12 xchg 0xab = 0xab  eBPF filter atomic op code c3 (@3) unsupported  FAIL to select_runtime err=-524  ...  test_bpf: #417 BPF_ATOMIC | BPF_W, BPF_CMPXCHG: Test successful return  eBPF filter atomic op code c3 (@3) unsupported  FAIL to select_runtime err=-524  ...  test_bpf: Summary: 894 PASSED, 132 FAILED, [882/882 JIT'ed] Please find attachment for the complete test log. [Fix] * 6511270911 powerpc/bpf/64: add support for BPF_ATOMIC bitwise operations * dbe6e2456f powerpc/bpf/64: add support for atomic fetch operations * 1e82dfaa78 powerpc/bpf/64: Add instructions for atomic_[cmp]xchg These patches can be cherry-picked into Kinetic kernel. [Test] Test kernel can be found here: https://people.canonical.com/~phlin/kernel/lp-2001618-ppcbpf/ Steps: 1. Reboot with the patched kernel 2. Run: sudo dmesg -C sudo modprobe test_bpf sudo dmesg Tested with Power9 node baltar, with the patched kernel there will be no failure reported by the test_bpf: test_bpf: Summary: 1026 PASSED, 0 FAILED, [1014/1014 JIT'ed] [Where problems could occur] This patchset just broaden the BPF operations support on ppc64, we might see some new failures when using these instruction somewhere in the future.
2023-01-04 11:22:56 Po-Hsu Lin bug task added linux (Ubuntu)
2023-01-04 11:24:47 Po-Hsu Lin nominated for series Ubuntu Kinetic
2023-01-04 11:24:47 Po-Hsu Lin bug task added linux (Ubuntu Kinetic)
2023-01-04 11:24:52 Po-Hsu Lin linux (Ubuntu Kinetic): assignee Po-Hsu Lin (cypressyew)
2023-01-04 11:24:55 Po-Hsu Lin linux (Ubuntu Kinetic): status New In Progress
2023-01-05 03:43:23 Po-Hsu Lin linux (Ubuntu): status New Fix Released
2023-01-05 04:06:07 Po-Hsu Lin description [Impact] The BPF_AND, BPF_OR, BPF_XOR, BPF_FETCH, BPF_XCHG and BPF_CMPXCHG related tests will fail in net:test_bpf test from ubuntu_kernel_selftests as they are not supported.  test_bpf: #361 BPF_ATOMIC | BPF_W, BPF_AND: Test: 0x12 & 0xab = 0x02  eBPF filter atomic op code c3 (@3) unsupported  FAIL to select_runtime err=-524  ...  test_bpf: #365 BPF_ATOMIC | BPF_W, BPF_AND | BPF_FETCH: Test: 0x12 & 0xab = 0x02  eBPF filter atomic op code c3 (@3) unsupported  FAIL to select_runtime err=-524  ...  test_bpf: #377 BPF_ATOMIC | BPF_W, BPF_OR: Test: 0x12 | 0xab = 0xbb FAIL to select_runtime err=-524  ...  test_bpf: #393 BPF_ATOMIC | BPF_W, BPF_XOR: Test: 0x12 ^ 0xab = 0xb9 FAIL to select_runtime err=-524  ...  test_bpf: #409 BPF_ATOMIC | BPF_W, BPF_XCHG: Test: 0x12 xchg 0xab = 0xab  eBPF filter atomic op code c3 (@3) unsupported  FAIL to select_runtime err=-524  ...  test_bpf: #417 BPF_ATOMIC | BPF_W, BPF_CMPXCHG: Test successful return  eBPF filter atomic op code c3 (@3) unsupported  FAIL to select_runtime err=-524  ...  test_bpf: Summary: 894 PASSED, 132 FAILED, [882/882 JIT'ed] Please find attachment for the complete test log. [Fix] * 6511270911 powerpc/bpf/64: add support for BPF_ATOMIC bitwise operations * dbe6e2456f powerpc/bpf/64: add support for atomic fetch operations * 1e82dfaa78 powerpc/bpf/64: Add instructions for atomic_[cmp]xchg These patches can be cherry-picked into Kinetic kernel. [Test] Test kernel can be found here: https://people.canonical.com/~phlin/kernel/lp-2001618-ppcbpf/ Steps: 1. Reboot with the patched kernel 2. Run: sudo dmesg -C sudo modprobe test_bpf sudo dmesg Tested with Power9 node baltar, with the patched kernel there will be no failure reported by the test_bpf: test_bpf: Summary: 1026 PASSED, 0 FAILED, [1014/1014 JIT'ed] [Where problems could occur] This patchset just broaden the BPF operations support on ppc64, we might see some new failures when using these instruction somewhere in the future. [Impact] The BPF_AND, BPF_OR, BPF_XOR, BPF_FETCH, BPF_XCHG and BPF_CMPXCHG related tests will fail in net:test_bpf test from ubuntu_kernel_selftests as they are not supported.  test_bpf: #361 BPF_ATOMIC | BPF_W, BPF_AND: Test: 0x12 & 0xab = 0x02  eBPF filter atomic op code c3 (@3) unsupported  FAIL to select_runtime err=-524  ...  test_bpf: #365 BPF_ATOMIC | BPF_W, BPF_AND | BPF_FETCH: Test: 0x12 & 0xab = 0x02  eBPF filter atomic op code c3 (@3) unsupported  FAIL to select_runtime err=-524  ...  test_bpf: #377 BPF_ATOMIC | BPF_W, BPF_OR: Test: 0x12 | 0xab = 0xbb FAIL to select_runtime err=-524  ...  test_bpf: #393 BPF_ATOMIC | BPF_W, BPF_XOR: Test: 0x12 ^ 0xab = 0xb9 FAIL to select_runtime err=-524  ...  test_bpf: #409 BPF_ATOMIC | BPF_W, BPF_XCHG: Test: 0x12 xchg 0xab = 0xab  eBPF filter atomic op code c3 (@3) unsupported  FAIL to select_runtime err=-524  ...  test_bpf: #417 BPF_ATOMIC | BPF_W, BPF_CMPXCHG: Test successful return  eBPF filter atomic op code c3 (@3) unsupported  FAIL to select_runtime err=-524  ...  test_bpf: Summary: 894 PASSED, 132 FAILED, [882/882 JIT'ed] Please find attachment for the complete test log. [Fix] * 6511270911 powerpc/bpf/64: add support for BPF_ATOMIC bitwise operations * dbe6e2456f powerpc/bpf/64: add support for atomic fetch operations * 1e82dfaa78 powerpc/bpf/64: Add instructions for atomic_[cmp]xchg These patches can be cherry-picked into Kinetic kernel. [Test] Test kernel can be found here: https://people.canonical.com/~phlin/kernel/lp-2001618-ppcbpf/ Steps: 1. Reboot with the patched kernel 2. Run:   sudo dmesg -C   sudo modprobe test_bpf   sudo dmesg Tested with Power9 node baltar, with the patched kernel there will be no failure reported by the test_bpf:   test_bpf: Summary: 1026 PASSED, 0 FAILED, [1014/1014 JIT'ed] [Where problems could occur] This patchset just broaden the BPF operations support on ppc64, we might see some new failures when using these instruction somewhere in the future. Cascardo: The existing atomic operations may regress as well, since they now produce different code.
2023-01-05 04:13:23 Luke Nowakowski-Krijger linux (Ubuntu Kinetic): status In Progress Fix Committed
2023-01-09 18:21:39 Ubuntu Kernel Bot tags 5.19 kinetic ppc64el sru-20221114 ubuntu-kernel-selftests 5.19 kernel-spammed-kinetic-linux kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-needed-kinetic
2023-01-18 02:50:30 Po-Hsu Lin tags 5.19 kernel-spammed-kinetic-linux kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-needed-kinetic 5.19 kernel-spammed-kinetic-linux kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-kinetic
2023-01-18 02:50:36 Po-Hsu Lin ubuntu-kernel-tests: status In Progress Fix Released
2023-02-08 17:40:18 Launchpad Janitor linux (Ubuntu Kinetic): status Fix Committed Fix Released
2023-02-10 07:52:25 Ubuntu Kernel Bot tags 5.19 kernel-spammed-kinetic-linux kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-kinetic 5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-needed-kinetic
2023-02-10 17:42:29 Ubuntu Kernel Bot tags 5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-needed-kinetic 5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-needed-jammy verification-needed-kinetic
2023-02-13 01:40:02 Po-Hsu Lin tags 5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-needed-jammy verification-needed-kinetic 5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-needed-kinetic
2023-02-13 01:40:12 Po-Hsu Lin tags 5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-needed-kinetic 5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-done-kinetic
2023-02-13 15:12:06 Ubuntu Kernel Bot tags 5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-done-kinetic 5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-needed-kinetic
2023-02-13 17:02:42 Ubuntu Kernel Bot tags 5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-needed-kinetic 5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-needed-kinetic
2023-02-14 01:50:58 Po-Hsu Lin tags 5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-needed-kinetic 5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-done-kinetic
2023-03-21 23:17:09 Ubuntu Kernel Bot tags 5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-done-kinetic 5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-jammy-linux-riscv-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-kinetic verification-needed-jammy
2023-03-23 04:43:49 Po-Hsu Lin tags 5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-jammy-linux-riscv-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-kinetic verification-needed-jammy 5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-jammy-linux-riscv-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-done-kinetic