Public bug reported: Issue found with J-generic-5.15.0-88.98 on Openstack ppc64el instance.
After the ubuntu_bpf build issue (bug 2035181) fixed, test in ubuntu_bpf can be tested and reporting failures. There are 48 failures reported on this instance. The failures are identical to J-arm64k, which failed with 47 test cases. One extra failure in J-ppc64el is: #144/p bpf_get_task_stack return R0 range is refined FAIL Here is the complete 48 failed test cases: #21/u BPF_ATOMIC_AND without fetch FAIL #21/p BPF_ATOMIC_AND without fetch FAIL #22/u BPF_ATOMIC_AND with fetch FAIL #22/p BPF_ATOMIC_AND with fetch FAIL #23/u BPF_ATOMIC_AND with fetch 32bit FAIL #23/p BPF_ATOMIC_AND with fetch 32bit FAIL #24/u BPF_ATOMIC_AND with fetch - r0 as source reg FAIL #24/p BPF_ATOMIC_AND with fetch - r0 as source reg FAIL #25/p BPF_ATOMIC bounds propagation, mem->reg FAIL #26/u atomic compare-and-exchange smoketest - 64bit FAIL #26/p atomic compare-and-exchange smoketest - 64bit FAIL #27/u atomic compare-and-exchange smoketest - 32bit FAIL #27/p atomic compare-and-exchange smoketest - 32bit FAIL #30/u BPF_W cmpxchg should zero top 32 bits FAIL #30/p BPF_W cmpxchg should zero top 32 bits FAIL #31/p Dest pointer in r0 - succeed, check 2 FAIL #33/p Dest pointer in r0 - succeed, check 4 FAIL #35/u BPF_ATOMIC_FETCH_ADD smoketest - 64bit FAIL #35/p BPF_ATOMIC_FETCH_ADD smoketest - 64bit FAIL #36/u BPF_ATOMIC_FETCH_ADD smoketest - 32bit FAIL #36/p BPF_ATOMIC_FETCH_ADD smoketest - 32bit FAIL #41/u BPF_ATOMIC OR without fetch FAIL #41/p BPF_ATOMIC OR without fetch FAIL #42/u BPF_ATOMIC OR with fetch FAIL #42/p BPF_ATOMIC OR with fetch FAIL #43/u BPF_ATOMIC OR with fetch 32bit FAIL #43/p BPF_ATOMIC OR with fetch 32bit FAIL #44/u BPF_W atomic_fetch_or should zero top 32 bits FAIL #44/p BPF_W atomic_fetch_or should zero top 32 bits FAIL #45/u atomic exchange smoketest - 64bit FAIL #45/p atomic exchange smoketest - 64bit FAIL #46/u atomic exchange smoketest - 32bit FAIL #46/p atomic exchange smoketest - 32bit FAIL #47/u BPF_ATOMIC XOR without fetch FAIL #47/p BPF_ATOMIC XOR without fetch FAIL #48/u BPF_ATOMIC XOR with fetch FAIL #48/p BPF_ATOMIC XOR with fetch FAIL #49/u BPF_ATOMIC XOR with fetch 32bit FAIL #49/p BPF_ATOMIC XOR with fetch 32bit FAIL #144/p bpf_get_task_stack return R0 range is refined FAIL #150/p calls: trigger reg2btf_ids[reg->type] for reg->type > __BPF_REG_TYPE_MAX FAIL #797/p precise: ST insn causing spi > allocated_stack FAIL #867/u reference tracking: try to leak released ptr reg Failed to create hash map 'Invalid argument'! #867/p reference tracking: try to leak released ptr reg Failed to create hash map 'Invalid argument'! #944/u check valid spill/fill, ptr to mem Failed to create hash map 'Invalid argument'! #944/p check valid spill/fill, ptr to mem Failed to create hash map 'Invalid argument'! #945/u check with invalid reg offset 0 Failed to create hash map 'Invalid argument'! #945/p check with invalid reg offset 0 Failed to create hash map 'Invalid argument'! Please find attachment for the complete test report. ** Affects: ubuntu-kernel-tests Importance: Undecided Status: New ** Tags: 5.15 jammy ppc64el sru-20231002 ubuntu-bpf ** Attachment added: "j-ppc-bpf-test-verifier.log" https://bugs.launchpad.net/bugs/2041614/+attachment/5713749/+files/j-ppc-bpf-test-verifier.log ** Tags added: 5.15 jammy ppc64el sru-20231002 ubuntu-bpf ** Summary changed: - test_verifier in ubuntu_bpf failed with 48 test cases on J-5.15 ppc64el + test_verifier in ubuntu_bpf failed with 48 test cases on J-5.15 ppc64el openstack ** Summary changed: - test_verifier in ubuntu_bpf failed with 48 test cases on J-5.15 ppc64el openstack + test_verifier in ubuntu_bpf failed with 48 test cases on J-5.15 openstack ppc64el -- You received this bug notification because you are a member of Canonical Platform QA Team, which is subscribed to ubuntu-kernel-tests. https://bugs.launchpad.net/bugs/2041614 Title: test_verifier in ubuntu_bpf failed with 48 test cases on J-5.15 openstack ppc64el Status in ubuntu-kernel-tests: New Bug description: Issue found with J-generic-5.15.0-88.98 on Openstack ppc64el instance. After the ubuntu_bpf build issue (bug 2035181) fixed, test in ubuntu_bpf can be tested and reporting failures. There are 48 failures reported on this instance. The failures are identical to J-arm64k, which failed with 47 test cases. One extra failure in J-ppc64el is: #144/p bpf_get_task_stack return R0 range is refined FAIL Here is the complete 48 failed test cases: #21/u BPF_ATOMIC_AND without fetch FAIL #21/p BPF_ATOMIC_AND without fetch FAIL #22/u BPF_ATOMIC_AND with fetch FAIL #22/p BPF_ATOMIC_AND with fetch FAIL #23/u BPF_ATOMIC_AND with fetch 32bit FAIL #23/p BPF_ATOMIC_AND with fetch 32bit FAIL #24/u BPF_ATOMIC_AND with fetch - r0 as source reg FAIL #24/p BPF_ATOMIC_AND with fetch - r0 as source reg FAIL #25/p BPF_ATOMIC bounds propagation, mem->reg FAIL #26/u atomic compare-and-exchange smoketest - 64bit FAIL #26/p atomic compare-and-exchange smoketest - 64bit FAIL #27/u atomic compare-and-exchange smoketest - 32bit FAIL #27/p atomic compare-and-exchange smoketest - 32bit FAIL #30/u BPF_W cmpxchg should zero top 32 bits FAIL #30/p BPF_W cmpxchg should zero top 32 bits FAIL #31/p Dest pointer in r0 - succeed, check 2 FAIL #33/p Dest pointer in r0 - succeed, check 4 FAIL #35/u BPF_ATOMIC_FETCH_ADD smoketest - 64bit FAIL #35/p BPF_ATOMIC_FETCH_ADD smoketest - 64bit FAIL #36/u BPF_ATOMIC_FETCH_ADD smoketest - 32bit FAIL #36/p BPF_ATOMIC_FETCH_ADD smoketest - 32bit FAIL #41/u BPF_ATOMIC OR without fetch FAIL #41/p BPF_ATOMIC OR without fetch FAIL #42/u BPF_ATOMIC OR with fetch FAIL #42/p BPF_ATOMIC OR with fetch FAIL #43/u BPF_ATOMIC OR with fetch 32bit FAIL #43/p BPF_ATOMIC OR with fetch 32bit FAIL #44/u BPF_W atomic_fetch_or should zero top 32 bits FAIL #44/p BPF_W atomic_fetch_or should zero top 32 bits FAIL #45/u atomic exchange smoketest - 64bit FAIL #45/p atomic exchange smoketest - 64bit FAIL #46/u atomic exchange smoketest - 32bit FAIL #46/p atomic exchange smoketest - 32bit FAIL #47/u BPF_ATOMIC XOR without fetch FAIL #47/p BPF_ATOMIC XOR without fetch FAIL #48/u BPF_ATOMIC XOR with fetch FAIL #48/p BPF_ATOMIC XOR with fetch FAIL #49/u BPF_ATOMIC XOR with fetch 32bit FAIL #49/p BPF_ATOMIC XOR with fetch 32bit FAIL #144/p bpf_get_task_stack return R0 range is refined FAIL #150/p calls: trigger reg2btf_ids[reg->type] for reg->type > __BPF_REG_TYPE_MAX FAIL #797/p precise: ST insn causing spi > allocated_stack FAIL #867/u reference tracking: try to leak released ptr reg Failed to create hash map 'Invalid argument'! #867/p reference tracking: try to leak released ptr reg Failed to create hash map 'Invalid argument'! #944/u check valid spill/fill, ptr to mem Failed to create hash map 'Invalid argument'! #944/p check valid spill/fill, ptr to mem Failed to create hash map 'Invalid argument'! #945/u check with invalid reg offset 0 Failed to create hash map 'Invalid argument'! #945/p check with invalid reg offset 0 Failed to create hash map 'Invalid argument'! Please find attachment for the complete test report. To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/2041614/+subscriptions -- Mailing list: https://launchpad.net/~canonical-ubuntu-qa Post to : canonical-ubuntu-qa@lists.launchpad.net Unsubscribe : https://launchpad.net/~canonical-ubuntu-qa More help : https://help.launchpad.net/ListHelp