Some SK_MSG related tests in ubuntu_bpf failed on i386 B-4.18

Bug #1805994 reported by Po-Hsu Lin
6
This bug affects 1 person
Affects Status Importance Assigned to Milestone
ubuntu-kernel-tests
Invalid
Undecided
Unassigned
linux-hwe (Ubuntu)
Invalid
Undecided
Unassigned

Bug Description

Summary: 894 PASSED, 0 SKIPPED, 4 FAILED

Test 124, 126, 127 and 128 failed:

  #124/p invalid read past end of SK_MSG FAIL
  Unexpected error message!
   EXP: R0 !read_ok
   RES: 0: (61) r2 = *(u32 *)(r1 +60)
  invalid bpf_context access off=60 size=4

  0: (61) r2 = *(u32 *)(r1 +60)
  invalid bpf_context access off=60 size=4
  #125/p invalid read offset in SK_MSG OK
  #126/p direct packet read for SK_MSG FAIL
  Failed to load prog 'Permission denied'!
  0: (79) r2 = *(u64 *)(r1 +0)
  1: (79) r3 = *(u64 *)(r1 +4)
  invalid bpf_context access off=4 size=8
  #127/p direct packet write for SK_MSG FAIL
  Failed to load prog 'Permission denied'!
  0: (79) r2 = *(u64 *)(r1 +0)
  1: (79) r3 = *(u64 *)(r1 +4)
  invalid bpf_context access off=4 size=8
  #128/p overlapping checks for direct packet access SK_MSG FAIL
  Failed to load prog 'Permission denied'!
  0: (79) r2 = *(u64 *)(r1 +0)
  1: (79) r3 = *(u64 *)(r1 +4)
  invalid bpf_context access off=4 size=8

This issue does not exist in B-4.18 AMD64, only spotted in i386

ProblemType: Bug
DistroRelease: Ubuntu 18.04
Package: linux-image-4.18.0-12-generic 4.18.0-12.13~18.04.2
ProcVersionSignature: User Name 4.18.0-12.13~18.04.2-generic 4.18.17
Uname: Linux 4.18.0-12-generic i686
ApportVersion: 2.20.9-0ubuntu7.5
Architecture: i386
Date: Fri Nov 30 08:25:49 2018
SourcePackage: linux-hwe
UpgradeStatus: No upgrade log present (probably fresh install)

Revision history for this message
Po-Hsu Lin (cypressyew) wrote :
Revision history for this message
Connor Kuehl (connork) wrote :

From looking at the logs, I don't think our linux-hwe (now 5.0) experiences this failure on i386.

Changed in linux-hwe (Ubuntu):
status: New → Invalid
Changed in ubuntu-kernel-tests:
status: New → Invalid
To post a comment you must log in.
This report contains Public information  
Everyone can see this information.

Other bug subscribers

Remote bug watches

Bug watches keep track of this bug in other bug trackers.