← Back to team overview

canonical-ubuntu-qa team mailing list archive

[Bug 1845646] Re: test_verifier in ubuntu_bpf on D-s390x failed with Failed to load prog 'Success'!

 

Disco EOL, this bug is not being referenced in any hints, closing it.

** Changed in: ubuntu-kernel-tests
       Status: New => Won't Fix

** Changed in: linux (Ubuntu)
       Status: Incomplete => Invalid

-- 
You received this bug notification because you are a member of Canonical
Platform QA Team, which is subscribed to ubuntu-kernel-tests.
https://bugs.launchpad.net/bugs/1845646

Title:
  test_verifier in ubuntu_bpf on D-s390x failed with Failed to load prog
  'Success'!

Status in ubuntu-kernel-tests:
  Won't Fix
Status in linux package in Ubuntu:
  Invalid
Status in linux source package in Disco:
  Won't Fix

Bug description:
  There are 37 failures reported in the test result:

  7167.	#212/p runtime/jit: pass > 32bit index to tail_call FAIL retval 2 != 42
  7431.	#402/u sanitation: alu with different scalars FAIL retval 1048619 != 1048576
  7461.	#402/p sanitation: alu with different scalars FAIL retval 1048619 != 1048576
  7830.	#635/p calls: basic sanity FAIL
  7850.	#636/p calls: not on unpriviledged FAIL
  7869.	#637/p calls: div by 0 in subprog FAIL
  7909.	#646/p calls: conditional call 2 FAIL
  7936.	#648/p calls: conditional call 4 FAIL
  7965.	#651/p calls: using r0 returned by callee FAIL
  7984.	#653/p calls: callee is using r1 FAIL
  8003.	#654/p calls: callee using args1 FAIL
  8023.	#656/p calls: callee using two args FAIL
  8046.	#658/p calls: two calls with args FAIL
  8094.	#659/p calls: calls with stack arith FAIL
  8145.	#676/p calls: two calls with stack read FAIL
  8196.	#677/p calls: two calls with stack write FAIL
  8254.	#680/p calls: stack depth check using three frames. test1 FAIL
  8300.	#681/p calls: stack depth check using three frames. test2 FAIL
  8350.	#686/p calls: write into caller stack frame FAIL
  8374.	#688/p calls: two calls with stack write and void return FAIL
  8428.	#690/p calls: two calls that return map_value FAIL
  8507.	#691/p calls: two calls that return map_value with bool condition FAIL
  8610.	#694/p calls: two calls that receive map_value via arg=ptr_stack_of_caller. test2 FAIL
  8733.	#696/p calls: two calls that receive map_value_ptr_or_null via arg. test1 FAIL
  8856.	#698/p calls: pkt_ptr spill into caller stack FAIL
  8895.	#700/p calls: pkt_ptr spill into caller stack 3 FAIL
  8941.	#701/p calls: pkt_ptr spill into caller stack 4 FAIL
  8989.	#705/p calls: pkt_ptr spill into caller stack 8 FAIL
  9042.	#707/p calls: caller stack init to zero or map_value_or_null FAIL
  9093.	#709/p calls: two calls returning different map pointers for lookup (hash, array) FAIL
  9185.	#734/p ld_abs: jump around ld_abs FAIL
  13304.	#752/p reference tracking in call: free reference in subprog FAIL
  13378.	#773/u masking, test in bounds 3 FAIL retval 0 != -2
  13389.	#773/p masking, test in bounds 3 FAIL retval 0 != -2
  13412.	#781/p reference tracking in call: alloc in subprog, release outside FAIL
  13450.	#783/p reference tracking in call: sk_ptr spill into caller stack FAIL
  13524.	#799/p calls: ctx read at start of subprog FAIL

  Summary: 1142 PASSED, 0 SKIPPED, 37 FAILED

  Most of them are failing with:
   #635/p calls: basic sanity FAIL
   Failed to load prog 'Success'!
   0: (85) call pc+2
   caller:
   R10=fp0,call_-1
   callee:
   frame1: R1=ctx(id=0,off=0,imm=0) R10=fp0,call_0
   3: (b7) r0 = 2
   4: (95) exit
   returning from callee:
   frame1: R0_w=inv2 R1=ctx(id=0,off=0,imm=0) R10=fp0,call_0
   to caller at 1:
   R0_w=inv2 R10=fp0,call_-1

   from 4 to 1: R0=inv2 R10=fp0,call_-1
   1: (b7) r0 = 1
   2: (95) exit
   processed 5 insns (limit 131072), stack depth 0+0
   JIT doesn't support bpf-to-bpf calls

  
  Please find attachment for the detailed test report.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1845646/+subscriptions