2023-01-04 10:52:57 |
Po-Hsu Lin |
bug |
|
|
added bug |
2023-01-04 11:03:02 |
Po-Hsu Lin |
attachment added |
|
bpf-failed.log https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/2001618/+attachment/5639130/+files/bpf-failed.log |
|
2023-01-04 11:03:13 |
Po-Hsu Lin |
ubuntu-kernel-tests: assignee |
|
Po-Hsu Lin (cypressyew) |
|
2023-01-04 11:03:16 |
Po-Hsu Lin |
ubuntu-kernel-tests: status |
New |
In Progress |
|
2023-01-04 11:19:55 |
Po-Hsu Lin |
description |
[Impact]
The BPF_AND, BPF_OR, BPF_XOR, BPF_FETCH, BPF_XCHG and BPF_CMPXCHG related tests will fail in net:test_bpf test from ubuntu_kernel_selftests as they are not supported.
test_bpf: #361 BPF_ATOMIC | BPF_W, BPF_AND: Test: 0x12 & 0xab = 0x02
eBPF filter atomic op code c3 (@3) unsupported
FAIL to select_runtime err=-524
...
test_bpf: #365 BPF_ATOMIC | BPF_W, BPF_AND | BPF_FETCH: Test: 0x12 & 0xab = 0x02
eBPF filter atomic op code c3 (@3) unsupported
FAIL to select_runtime err=-524
...
test_bpf: #377 BPF_ATOMIC | BPF_W, BPF_OR: Test: 0x12 | 0xab = 0xbb FAIL to select_runtime err=-524
...
test_bpf: #393 BPF_ATOMIC | BPF_W, BPF_XOR: Test: 0x12 ^ 0xab = 0xb9 FAIL to select_runtime err=-524
...
test_bpf: #409 BPF_ATOMIC | BPF_W, BPF_XCHG: Test: 0x12 xchg 0xab = 0xab
eBPF filter atomic op code c3 (@3) unsupported
FAIL to select_runtime err=-524
...
test_bpf: #417 BPF_ATOMIC | BPF_W, BPF_CMPXCHG: Test successful return
eBPF filter atomic op code c3 (@3) unsupported
FAIL to select_runtime err=-524
...
test_bpf: Summary: 894 PASSED, 132 FAILED, [882/882 JIT'ed]
Please find attachment for the complete test log.
[Fix]
* 6511270911 powerpc/bpf/64: add support for BPF_ATOMIC bitwise operations
* dbe6e2456f powerpc/bpf/64: add support for atomic fetch operations
* 1e82dfaa78 powerpc/bpf/64: Add instructions for atomic_[cmp]xchg
These patches can be cherry-picked into Kinetic kernel.
[Test]
Test kernel can be found here:
[Where problems could occur] |
[Impact]
The BPF_AND, BPF_OR, BPF_XOR, BPF_FETCH, BPF_XCHG and BPF_CMPXCHG related tests will fail in net:test_bpf test from ubuntu_kernel_selftests as they are not supported.
test_bpf: #361 BPF_ATOMIC | BPF_W, BPF_AND: Test: 0x12 & 0xab = 0x02
eBPF filter atomic op code c3 (@3) unsupported
FAIL to select_runtime err=-524
...
test_bpf: #365 BPF_ATOMIC | BPF_W, BPF_AND | BPF_FETCH: Test: 0x12 & 0xab = 0x02
eBPF filter atomic op code c3 (@3) unsupported
FAIL to select_runtime err=-524
...
test_bpf: #377 BPF_ATOMIC | BPF_W, BPF_OR: Test: 0x12 | 0xab = 0xbb FAIL to select_runtime err=-524
...
test_bpf: #393 BPF_ATOMIC | BPF_W, BPF_XOR: Test: 0x12 ^ 0xab = 0xb9 FAIL to select_runtime err=-524
...
test_bpf: #409 BPF_ATOMIC | BPF_W, BPF_XCHG: Test: 0x12 xchg 0xab = 0xab
eBPF filter atomic op code c3 (@3) unsupported
FAIL to select_runtime err=-524
...
test_bpf: #417 BPF_ATOMIC | BPF_W, BPF_CMPXCHG: Test successful return
eBPF filter atomic op code c3 (@3) unsupported
FAIL to select_runtime err=-524
...
test_bpf: Summary: 894 PASSED, 132 FAILED, [882/882 JIT'ed]
Please find attachment for the complete test log.
[Fix]
* 6511270911 powerpc/bpf/64: add support for BPF_ATOMIC bitwise operations
* dbe6e2456f powerpc/bpf/64: add support for atomic fetch operations
* 1e82dfaa78 powerpc/bpf/64: Add instructions for atomic_[cmp]xchg
These patches can be cherry-picked into Kinetic kernel.
[Test]
Test kernel can be found here:
https://people.canonical.com/~phlin/kernel/lp-2001618-ppcbpf/
Steps:
1. Reboot with the patched kernel
2. Run:
sudo dmesg -C
sudo modprobe test_bpf
sudo dmesg
Tested with Power9 node baltar, with the patched kernel there will be no failure reported by the test_bpf:
test_bpf: Summary: 1026 PASSED, 0 FAILED, [1014/1014 JIT'ed]
[Where problems could occur]
This patchset just broaden the BPF operations support on ppc64, we might see some new failures when using these instruction somewhere in the future. |
|
2023-01-04 11:22:56 |
Po-Hsu Lin |
bug task added |
|
linux (Ubuntu) |
|
2023-01-04 11:24:47 |
Po-Hsu Lin |
nominated for series |
|
Ubuntu Kinetic |
|
2023-01-04 11:24:47 |
Po-Hsu Lin |
bug task added |
|
linux (Ubuntu Kinetic) |
|
2023-01-04 11:24:52 |
Po-Hsu Lin |
linux (Ubuntu Kinetic): assignee |
|
Po-Hsu Lin (cypressyew) |
|
2023-01-04 11:24:55 |
Po-Hsu Lin |
linux (Ubuntu Kinetic): status |
New |
In Progress |
|
2023-01-05 03:43:23 |
Po-Hsu Lin |
linux (Ubuntu): status |
New |
Fix Released |
|
2023-01-05 04:06:07 |
Po-Hsu Lin |
description |
[Impact]
The BPF_AND, BPF_OR, BPF_XOR, BPF_FETCH, BPF_XCHG and BPF_CMPXCHG related tests will fail in net:test_bpf test from ubuntu_kernel_selftests as they are not supported.
test_bpf: #361 BPF_ATOMIC | BPF_W, BPF_AND: Test: 0x12 & 0xab = 0x02
eBPF filter atomic op code c3 (@3) unsupported
FAIL to select_runtime err=-524
...
test_bpf: #365 BPF_ATOMIC | BPF_W, BPF_AND | BPF_FETCH: Test: 0x12 & 0xab = 0x02
eBPF filter atomic op code c3 (@3) unsupported
FAIL to select_runtime err=-524
...
test_bpf: #377 BPF_ATOMIC | BPF_W, BPF_OR: Test: 0x12 | 0xab = 0xbb FAIL to select_runtime err=-524
...
test_bpf: #393 BPF_ATOMIC | BPF_W, BPF_XOR: Test: 0x12 ^ 0xab = 0xb9 FAIL to select_runtime err=-524
...
test_bpf: #409 BPF_ATOMIC | BPF_W, BPF_XCHG: Test: 0x12 xchg 0xab = 0xab
eBPF filter atomic op code c3 (@3) unsupported
FAIL to select_runtime err=-524
...
test_bpf: #417 BPF_ATOMIC | BPF_W, BPF_CMPXCHG: Test successful return
eBPF filter atomic op code c3 (@3) unsupported
FAIL to select_runtime err=-524
...
test_bpf: Summary: 894 PASSED, 132 FAILED, [882/882 JIT'ed]
Please find attachment for the complete test log.
[Fix]
* 6511270911 powerpc/bpf/64: add support for BPF_ATOMIC bitwise operations
* dbe6e2456f powerpc/bpf/64: add support for atomic fetch operations
* 1e82dfaa78 powerpc/bpf/64: Add instructions for atomic_[cmp]xchg
These patches can be cherry-picked into Kinetic kernel.
[Test]
Test kernel can be found here:
https://people.canonical.com/~phlin/kernel/lp-2001618-ppcbpf/
Steps:
1. Reboot with the patched kernel
2. Run:
sudo dmesg -C
sudo modprobe test_bpf
sudo dmesg
Tested with Power9 node baltar, with the patched kernel there will be no failure reported by the test_bpf:
test_bpf: Summary: 1026 PASSED, 0 FAILED, [1014/1014 JIT'ed]
[Where problems could occur]
This patchset just broaden the BPF operations support on ppc64, we might see some new failures when using these instruction somewhere in the future. |
[Impact]
The BPF_AND, BPF_OR, BPF_XOR, BPF_FETCH, BPF_XCHG and BPF_CMPXCHG related tests will fail in net:test_bpf test from ubuntu_kernel_selftests as they are not supported.
test_bpf: #361 BPF_ATOMIC | BPF_W, BPF_AND: Test: 0x12 & 0xab = 0x02
eBPF filter atomic op code c3 (@3) unsupported
FAIL to select_runtime err=-524
...
test_bpf: #365 BPF_ATOMIC | BPF_W, BPF_AND | BPF_FETCH: Test: 0x12 & 0xab = 0x02
eBPF filter atomic op code c3 (@3) unsupported
FAIL to select_runtime err=-524
...
test_bpf: #377 BPF_ATOMIC | BPF_W, BPF_OR: Test: 0x12 | 0xab = 0xbb FAIL to select_runtime err=-524
...
test_bpf: #393 BPF_ATOMIC | BPF_W, BPF_XOR: Test: 0x12 ^ 0xab = 0xb9 FAIL to select_runtime err=-524
...
test_bpf: #409 BPF_ATOMIC | BPF_W, BPF_XCHG: Test: 0x12 xchg 0xab = 0xab
eBPF filter atomic op code c3 (@3) unsupported
FAIL to select_runtime err=-524
...
test_bpf: #417 BPF_ATOMIC | BPF_W, BPF_CMPXCHG: Test successful return
eBPF filter atomic op code c3 (@3) unsupported
FAIL to select_runtime err=-524
...
test_bpf: Summary: 894 PASSED, 132 FAILED, [882/882 JIT'ed]
Please find attachment for the complete test log.
[Fix]
* 6511270911 powerpc/bpf/64: add support for BPF_ATOMIC bitwise operations
* dbe6e2456f powerpc/bpf/64: add support for atomic fetch operations
* 1e82dfaa78 powerpc/bpf/64: Add instructions for atomic_[cmp]xchg
These patches can be cherry-picked into Kinetic kernel.
[Test]
Test kernel can be found here:
https://people.canonical.com/~phlin/kernel/lp-2001618-ppcbpf/
Steps:
1. Reboot with the patched kernel
2. Run:
sudo dmesg -C
sudo modprobe test_bpf
sudo dmesg
Tested with Power9 node baltar, with the patched kernel there will be no failure reported by the test_bpf:
test_bpf: Summary: 1026 PASSED, 0 FAILED, [1014/1014 JIT'ed]
[Where problems could occur]
This patchset just broaden the BPF operations support on ppc64, we might see some new failures when using these instruction somewhere in the future.
Cascardo: The existing atomic operations may regress as well, since they now produce different code. |
|
2023-01-05 04:13:23 |
Luke Nowakowski-Krijger |
linux (Ubuntu Kinetic): status |
In Progress |
Fix Committed |
|
2023-01-09 18:21:39 |
Ubuntu Kernel Bot |
tags |
5.19 kinetic ppc64el sru-20221114 ubuntu-kernel-selftests |
5.19 kernel-spammed-kinetic-linux kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-needed-kinetic |
|
2023-01-18 02:50:30 |
Po-Hsu Lin |
tags |
5.19 kernel-spammed-kinetic-linux kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-needed-kinetic |
5.19 kernel-spammed-kinetic-linux kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-kinetic |
|
2023-01-18 02:50:36 |
Po-Hsu Lin |
ubuntu-kernel-tests: status |
In Progress |
Fix Released |
|
2023-02-08 17:40:18 |
Launchpad Janitor |
linux (Ubuntu Kinetic): status |
Fix Committed |
Fix Released |
|
2023-02-10 07:52:25 |
Ubuntu Kernel Bot |
tags |
5.19 kernel-spammed-kinetic-linux kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-kinetic |
5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-needed-kinetic |
|
2023-02-10 17:42:29 |
Ubuntu Kernel Bot |
tags |
5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-needed-kinetic |
5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-needed-jammy verification-needed-kinetic |
|
2023-02-13 01:40:02 |
Po-Hsu Lin |
tags |
5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-needed-jammy verification-needed-kinetic |
5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-needed-kinetic |
|
2023-02-13 01:40:12 |
Po-Hsu Lin |
tags |
5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-needed-kinetic |
5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-done-kinetic |
|
2023-02-13 15:12:06 |
Ubuntu Kernel Bot |
tags |
5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-done-kinetic |
5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-needed-kinetic |
|
2023-02-13 17:02:42 |
Ubuntu Kernel Bot |
tags |
5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-needed-kinetic |
5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-needed-kinetic |
|
2023-02-14 01:50:58 |
Po-Hsu Lin |
tags |
5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-needed-kinetic |
5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-done-kinetic |
|
2023-03-21 23:17:09 |
Ubuntu Kernel Bot |
tags |
5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-done-kinetic |
5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-jammy-linux-riscv-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-kinetic verification-needed-jammy |
|
2023-03-23 04:43:49 |
Po-Hsu Lin |
tags |
5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-jammy-linux-riscv-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-kinetic verification-needed-jammy |
5.19 kernel-spammed-jammy-linux-lowlatency-hwe-5.19 kernel-spammed-jammy-linux-riscv-5.19 kernel-spammed-kinetic-linux kernel-spammed-kinetic-linux-aws kernel-spammed-kinetic-linux-azure kernel-spammed-kinetic-linux-riscv kinetic ppc64el sru-20221114 ubuntu-kernel-selftests verification-done-jammy verification-done-kinetic |
|