Public bug reported:

There are 37 failures reported in the test result:

7167.   #212/p runtime/jit: pass > 32bit index to tail_call FAIL retval 2 != 42
7431.   #402/u sanitation: alu with different scalars FAIL retval 1048619 != 
1048576
7461.   #402/p sanitation: alu with different scalars FAIL retval 1048619 != 
1048576
7830.   #635/p calls: basic sanity FAIL
7850.   #636/p calls: not on unpriviledged FAIL
7869.   #637/p calls: div by 0 in subprog FAIL
7909.   #646/p calls: conditional call 2 FAIL
7936.   #648/p calls: conditional call 4 FAIL
7965.   #651/p calls: using r0 returned by callee FAIL
7984.   #653/p calls: callee is using r1 FAIL
8003.   #654/p calls: callee using args1 FAIL
8023.   #656/p calls: callee using two args FAIL
8046.   #658/p calls: two calls with args FAIL
8094.   #659/p calls: calls with stack arith FAIL
8145.   #676/p calls: two calls with stack read FAIL
8196.   #677/p calls: two calls with stack write FAIL
8254.   #680/p calls: stack depth check using three frames. test1 FAIL
8300.   #681/p calls: stack depth check using three frames. test2 FAIL
8350.   #686/p calls: write into caller stack frame FAIL
8374.   #688/p calls: two calls with stack write and void return FAIL
8428.   #690/p calls: two calls that return map_value FAIL
8507.   #691/p calls: two calls that return map_value with bool condition FAIL
8610.   #694/p calls: two calls that receive map_value via 
arg=ptr_stack_of_caller. test2 FAIL
8733.   #696/p calls: two calls that receive map_value_ptr_or_null via arg. 
test1 FAIL
8856.   #698/p calls: pkt_ptr spill into caller stack FAIL
8895.   #700/p calls: pkt_ptr spill into caller stack 3 FAIL
8941.   #701/p calls: pkt_ptr spill into caller stack 4 FAIL
8989.   #705/p calls: pkt_ptr spill into caller stack 8 FAIL
9042.   #707/p calls: caller stack init to zero or map_value_or_null FAIL
9093.   #709/p calls: two calls returning different map pointers for lookup 
(hash, array) FAIL
9185.   #734/p ld_abs: jump around ld_abs FAIL
13304.  #752/p reference tracking in call: free reference in subprog FAIL
13378.  #773/u masking, test in bounds 3 FAIL retval 0 != -2
13389.  #773/p masking, test in bounds 3 FAIL retval 0 != -2
13412.  #781/p reference tracking in call: alloc in subprog, release outside 
FAIL
13450.  #783/p reference tracking in call: sk_ptr spill into caller stack FAIL
13524.  #799/p calls: ctx read at start of subprog FAIL

Summary: 1142 PASSED, 0 SKIPPED, 37 FAILED

Most of them are failing with:
 #635/p calls: basic sanity FAIL
 Failed to load prog 'Success'!
 0: (85) call pc+2
 caller:
 R10=fp0,call_-1
 callee:
 frame1: R1=ctx(id=0,off=0,imm=0) R10=fp0,call_0
 3: (b7) r0 = 2
 4: (95) exit
 returning from callee:
 frame1: R0_w=inv2 R1=ctx(id=0,off=0,imm=0) R10=fp0,call_0
 to caller at 1:
 R0_w=inv2 R10=fp0,call_-1

 from 4 to 1: R0=inv2 R10=fp0,call_-1
 1: (b7) r0 = 1
 2: (95) exit
 processed 5 insns (limit 131072), stack depth 0+0
 JIT doesn't support bpf-to-bpf calls


Please find attachment for the detailed test report.

** Affects: ubuntu-kernel-tests
     Importance: Undecided
         Status: New

** Affects: linux (Ubuntu)
     Importance: Undecided
         Status: Incomplete

** Affects: linux (Ubuntu Disco)
     Importance: Undecided
         Status: Incomplete


** Tags: disco s390x sru-20190902 ubuntu-bpf

** Attachment added: "test_verifier.log"
   
https://bugs.launchpad.net/bugs/1845646/+attachment/5291766/+files/test_verifier.log

** Also affects: linux (Ubuntu Disco)
   Importance: Undecided
       Status: New

** Also affects: ubuntu-kernel-tests
   Importance: Undecided
       Status: New

** Tags added: ubuntu-bpf

** Tags added: sru-20190902

-- 
You received this bug notification because you are a member of Ubuntu
Bugs, which is subscribed to Ubuntu.
https://bugs.launchpad.net/bugs/1845646

Title:
  test_verifier in ubuntu_bpf on D-s390x failed with Failed to load prog
  'Success'!

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1845646/+subscriptions

-- 
ubuntu-bugs mailing list
ubuntu-bugs@lists.ubuntu.com
https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs

Reply via email to