test_verifier in ubuntu_bpf on D-s390x failed with Failed to load prog 'Success'!

Bug #1845646 reported by Po-Hsu Lin on 2019-09-27
12
This bug affects 1 person
Affects Status Importance Assigned to Milestone
ubuntu-kernel-tests
Undecided
Unassigned
linux (Ubuntu)
Undecided
Unassigned
Disco
Undecided
Unassigned

Bug Description

There are 37 failures reported in the test result:

7167. #212/p runtime/jit: pass > 32bit index to tail_call FAIL retval 2 != 42
7431. #402/u sanitation: alu with different scalars FAIL retval 1048619 != 1048576
7461. #402/p sanitation: alu with different scalars FAIL retval 1048619 != 1048576
7830. #635/p calls: basic sanity FAIL
7850. #636/p calls: not on unpriviledged FAIL
7869. #637/p calls: div by 0 in subprog FAIL
7909. #646/p calls: conditional call 2 FAIL
7936. #648/p calls: conditional call 4 FAIL
7965. #651/p calls: using r0 returned by callee FAIL
7984. #653/p calls: callee is using r1 FAIL
8003. #654/p calls: callee using args1 FAIL
8023. #656/p calls: callee using two args FAIL
8046. #658/p calls: two calls with args FAIL
8094. #659/p calls: calls with stack arith FAIL
8145. #676/p calls: two calls with stack read FAIL
8196. #677/p calls: two calls with stack write FAIL
8254. #680/p calls: stack depth check using three frames. test1 FAIL
8300. #681/p calls: stack depth check using three frames. test2 FAIL
8350. #686/p calls: write into caller stack frame FAIL
8374. #688/p calls: two calls with stack write and void return FAIL
8428. #690/p calls: two calls that return map_value FAIL
8507. #691/p calls: two calls that return map_value with bool condition FAIL
8610. #694/p calls: two calls that receive map_value via arg=ptr_stack_of_caller. test2 FAIL
8733. #696/p calls: two calls that receive map_value_ptr_or_null via arg. test1 FAIL
8856. #698/p calls: pkt_ptr spill into caller stack FAIL
8895. #700/p calls: pkt_ptr spill into caller stack 3 FAIL
8941. #701/p calls: pkt_ptr spill into caller stack 4 FAIL
8989. #705/p calls: pkt_ptr spill into caller stack 8 FAIL
9042. #707/p calls: caller stack init to zero or map_value_or_null FAIL
9093. #709/p calls: two calls returning different map pointers for lookup (hash, array) FAIL
9185. #734/p ld_abs: jump around ld_abs FAIL
13304. #752/p reference tracking in call: free reference in subprog FAIL
13378. #773/u masking, test in bounds 3 FAIL retval 0 != -2
13389. #773/p masking, test in bounds 3 FAIL retval 0 != -2
13412. #781/p reference tracking in call: alloc in subprog, release outside FAIL
13450. #783/p reference tracking in call: sk_ptr spill into caller stack FAIL
13524. #799/p calls: ctx read at start of subprog FAIL

Summary: 1142 PASSED, 0 SKIPPED, 37 FAILED

Most of them are failing with:
 #635/p calls: basic sanity FAIL
 Failed to load prog 'Success'!
 0: (85) call pc+2
 caller:
 R10=fp0,call_-1
 callee:
 frame1: R1=ctx(id=0,off=0,imm=0) R10=fp0,call_0
 3: (b7) r0 = 2
 4: (95) exit
 returning from callee:
 frame1: R0_w=inv2 R1=ctx(id=0,off=0,imm=0) R10=fp0,call_0
 to caller at 1:
 R0_w=inv2 R10=fp0,call_-1

 from 4 to 1: R0=inv2 R10=fp0,call_-1
 1: (b7) r0 = 1
 2: (95) exit
 processed 5 insns (limit 131072), stack depth 0+0
 JIT doesn't support bpf-to-bpf calls

Please find attachment for the detailed test report.

Po-Hsu Lin (cypressyew) wrote :
tags: added: ubuntu-bpf
tags: added: sru-20190902

This bug is missing log files that will aid in diagnosing the problem. While running an Ubuntu kernel (not a mainline or third-party kernel) please enter the following command in a terminal window:

apport-collect 1845646

and then change the status of the bug to 'Confirmed'.

If, due to the nature of the issue you have encountered, you are unable to run this command, please add a comment stating that fact and change the bug status to 'Confirmed'.

This change has been made by an automated script, maintained by the Ubuntu Kernel Team.

Changed in linux (Ubuntu):
status: New → Incomplete
Changed in linux (Ubuntu Disco):
status: New → Incomplete
Steve Langasek (vorlon) on 2020-07-02
Changed in linux (Ubuntu Disco):
status: Incomplete → Won't Fix
To post a comment you must log in.
This report contains Public information  Edit
Everyone can see this information.

Duplicates of this bug

Other bug subscribers