test_verifier in ubuntu_bpf on D-s390x failed with Failed to load prog 'Success'!
Affects | Status | Importance | Assigned to | Milestone | |
---|---|---|---|---|---|
ubuntu-kernel-tests |
Won't Fix
|
Undecided
|
Unassigned | ||
linux (Ubuntu) |
Invalid
|
Undecided
|
Unassigned | ||
Disco |
Won't Fix
|
Undecided
|
Unassigned |
Bug Description
There are 37 failures reported in the test result:
7167. #212/p runtime/jit: pass > 32bit index to tail_call FAIL retval 2 != 42
7431. #402/u sanitation: alu with different scalars FAIL retval 1048619 != 1048576
7461. #402/p sanitation: alu with different scalars FAIL retval 1048619 != 1048576
7830. #635/p calls: basic sanity FAIL
7850. #636/p calls: not on unpriviledged FAIL
7869. #637/p calls: div by 0 in subprog FAIL
7909. #646/p calls: conditional call 2 FAIL
7936. #648/p calls: conditional call 4 FAIL
7965. #651/p calls: using r0 returned by callee FAIL
7984. #653/p calls: callee is using r1 FAIL
8003. #654/p calls: callee using args1 FAIL
8023. #656/p calls: callee using two args FAIL
8046. #658/p calls: two calls with args FAIL
8094. #659/p calls: calls with stack arith FAIL
8145. #676/p calls: two calls with stack read FAIL
8196. #677/p calls: two calls with stack write FAIL
8254. #680/p calls: stack depth check using three frames. test1 FAIL
8300. #681/p calls: stack depth check using three frames. test2 FAIL
8350. #686/p calls: write into caller stack frame FAIL
8374. #688/p calls: two calls with stack write and void return FAIL
8428. #690/p calls: two calls that return map_value FAIL
8507. #691/p calls: two calls that return map_value with bool condition FAIL
8610. #694/p calls: two calls that receive map_value via arg=ptr_
8733. #696/p calls: two calls that receive map_value_
8856. #698/p calls: pkt_ptr spill into caller stack FAIL
8895. #700/p calls: pkt_ptr spill into caller stack 3 FAIL
8941. #701/p calls: pkt_ptr spill into caller stack 4 FAIL
8989. #705/p calls: pkt_ptr spill into caller stack 8 FAIL
9042. #707/p calls: caller stack init to zero or map_value_or_null FAIL
9093. #709/p calls: two calls returning different map pointers for lookup (hash, array) FAIL
9185. #734/p ld_abs: jump around ld_abs FAIL
13304. #752/p reference tracking in call: free reference in subprog FAIL
13378. #773/u masking, test in bounds 3 FAIL retval 0 != -2
13389. #773/p masking, test in bounds 3 FAIL retval 0 != -2
13412. #781/p reference tracking in call: alloc in subprog, release outside FAIL
13450. #783/p reference tracking in call: sk_ptr spill into caller stack FAIL
13524. #799/p calls: ctx read at start of subprog FAIL
Summary: 1142 PASSED, 0 SKIPPED, 37 FAILED
Most of them are failing with:
#635/p calls: basic sanity FAIL
Failed to load prog 'Success'!
0: (85) call pc+2
caller:
R10=fp0,call_-1
callee:
frame1: R1=ctx(
3: (b7) r0 = 2
4: (95) exit
returning from callee:
frame1: R0_w=inv2 R1=ctx(
to caller at 1:
R0_w=inv2 R10=fp0,call_-1
from 4 to 1: R0=inv2 R10=fp0,call_-1
1: (b7) r0 = 1
2: (95) exit
processed 5 insns (limit 131072), stack depth 0+0
JIT doesn't support bpf-to-bpf calls
Please find attachment for the detailed test report.
Changed in linux (Ubuntu Disco): | |
status: | Incomplete → Won't Fix |
This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window:
apport-collect 1845646
and then change the status of the bug to 'Confirmed'.
If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.
This change has been made by an automated script, maintained by the Ubuntu Kernel Team.