** Changed in: ubuntu-kernel-tests
Status: New => Fix Released
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1934414
Title:
test_bpf.sh from ubuntu_kernel_selftests.net from linux ADT test
This bug was fixed in the package linux - 4.15.0-163.171
---
linux (4.15.0-163.171) bionic; urgency=medium
* bionic/linux: 4.15.0-163.171 -proposed tracker (LP: #1949874)
* Packaging resync (LP: #1786013)
- [Packaging] update Ubuntu.md
- debian/dkms-versions -- update
Confirmed test_bpf.sh is now successfully on i386 with bionic/linux
4.15.0-163.171:
https://autopkgtest.ubuntu.com/results/autopkgtest-
bionic/bionic/i386/l/linux/2027_200907_95566@/log.gz
18:27:04 INFO | START ubuntu_kernel_selftests.net:test_bpf.sh
This bug is awaiting verification that the linux/4.15.0-163.171 kernel
in -proposed solves the problem. Please test the kernel and update this
bug with the results. If the problem is solved, change the tag
'verification-needed-bionic' to 'verification-done-bionic'. If the
problem still exists,
** Changed in: linux (Ubuntu Bionic)
Status: In Progress => Fix Committed
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1934414
Title:
test_bpf.sh from ubuntu_kernel_selftests.net from linux
Backporting everything necessary would be up to many potential
regressions. That would include support for BPF calls and the change to
make unknown opcode handling more robust.
The former would be commit cc8b0b92a1699bc32f7fec71daa2bfc90de43a4d
"bpf: introduce function calls (function
As Thadeu mentioned, this happens because the test_bpf module doesn't go
through the verifier causing the failure when the code is not jitted.
Upstream fixed the testcase with 21ccaf21497b (bpf: add further test
cases around div/mod and others) by replacing "INT: DIV by zero" by
"INT: DIV by -1"
** Tags added: sru-20210719
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1934414
Title:
test_bpf.sh from ubuntu_kernel_selftests.net from linux ADT test
failure with linux/4.15.0-149.153 i386
** Summary changed:
- test_bpf.sh from ubuntu_kernel_selftests.net from linux ADT test failure with
linux/4.15.0-149.153
+ test_bpf.sh from ubuntu_kernel_selftests.net from linux ADT test failure with
linux/4.15.0-149.153 i386 (Segmentation fault)
--
You received this bug notification because
** Also affects: ubuntu-kernel-tests
Importance: Undecided
Status: New
** Tags added: 4.15 bionic i386 sru-20210621 ubuntu-kernel-selftests
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
So, test_bpf is not doing either conversion and any other use on the
kernel should either be using something like sk_attach*,
bpf_prog_create*, or just using a fd that was created from
BPF_PROG_LOAD. Any user that accepts BPF programs without those checks
are up to cause issues worse than a simple
This comes from the BPF changes done on 4.15.0-147.
i386 uses the interpreter, while other arches have JIT. The JIT cannot
be disabled on the arches that support it and have
CONFIG_BPF_JIT_ALWAYS_ON, which is our default.
The interpreter change that causes this has been identified. It doesn't
Dmesg error is:
[ 157.476410] test_bpf: #48 INT: ALU MIX jited:0 167 PASS
[ 157.482773] test_bpf: #49 INT: shifts by register jited:0 317 PASS
[ 157.488472] test_bpf: #50 INT: DIV + ABS jited:0 103 140 PASS
[ 157.495519] test_bpf: #51 INT: DIV by zero jited:0 74
[ 157.496424] divide error:
Also seeing this failure through regression testing on 4.15.0-149.153
i386 lowlatency and generic
--
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1934414
Title:
test_bpf.sh from
14 matches
Mail list logo