Public bug reported: There are 37 failures reported in the test result:
7167. #212/p runtime/jit: pass > 32bit index to tail_call FAIL retval 2 != 42 7431. #402/u sanitation: alu with different scalars FAIL retval 1048619 != 1048576 7461. #402/p sanitation: alu with different scalars FAIL retval 1048619 != 1048576 7830. #635/p calls: basic sanity FAIL 7850. #636/p calls: not on unpriviledged FAIL 7869. #637/p calls: div by 0 in subprog FAIL 7909. #646/p calls: conditional call 2 FAIL 7936. #648/p calls: conditional call 4 FAIL 7965. #651/p calls: using r0 returned by callee FAIL 7984. #653/p calls: callee is using r1 FAIL 8003. #654/p calls: callee using args1 FAIL 8023. #656/p calls: callee using two args FAIL 8046. #658/p calls: two calls with args FAIL 8094. #659/p calls: calls with stack arith FAIL 8145. #676/p calls: two calls with stack read FAIL 8196. #677/p calls: two calls with stack write FAIL 8254. #680/p calls: stack depth check using three frames. test1 FAIL 8300. #681/p calls: stack depth check using three frames. test2 FAIL 8350. #686/p calls: write into caller stack frame FAIL 8374. #688/p calls: two calls with stack write and void return FAIL 8428. #690/p calls: two calls that return map_value FAIL 8507. #691/p calls: two calls that return map_value with bool condition FAIL 8610. #694/p calls: two calls that receive map_value via arg=ptr_stack_of_caller. test2 FAIL 8733. #696/p calls: two calls that receive map_value_ptr_or_null via arg. test1 FAIL 8856. #698/p calls: pkt_ptr spill into caller stack FAIL 8895. #700/p calls: pkt_ptr spill into caller stack 3 FAIL 8941. #701/p calls: pkt_ptr spill into caller stack 4 FAIL 8989. #705/p calls: pkt_ptr spill into caller stack 8 FAIL 9042. #707/p calls: caller stack init to zero or map_value_or_null FAIL 9093. #709/p calls: two calls returning different map pointers for lookup (hash, array) FAIL 9185. #734/p ld_abs: jump around ld_abs FAIL 13304. #752/p reference tracking in call: free reference in subprog FAIL 13378. #773/u masking, test in bounds 3 FAIL retval 0 != -2 13389. #773/p masking, test in bounds 3 FAIL retval 0 != -2 13412. #781/p reference tracking in call: alloc in subprog, release outside FAIL 13450. #783/p reference tracking in call: sk_ptr spill into caller stack FAIL 13524. #799/p calls: ctx read at start of subprog FAIL Summary: 1142 PASSED, 0 SKIPPED, 37 FAILED Most of them are failing with: #635/p calls: basic sanity FAIL Failed to load prog 'Success'! 0: (85) call pc+2 caller: R10=fp0,call_-1 callee: frame1: R1=ctx(id=0,off=0,imm=0) R10=fp0,call_0 3: (b7) r0 = 2 4: (95) exit returning from callee: frame1: R0_w=inv2 R1=ctx(id=0,off=0,imm=0) R10=fp0,call_0 to caller at 1: R0_w=inv2 R10=fp0,call_-1 from 4 to 1: R0=inv2 R10=fp0,call_-1 1: (b7) r0 = 1 2: (95) exit processed 5 insns (limit 131072), stack depth 0+0 JIT doesn't support bpf-to-bpf calls Please find attachment for the detailed test report. ** Affects: ubuntu-kernel-tests Importance: Undecided Status: New ** Affects: linux (Ubuntu) Importance: Undecided Status: Incomplete ** Affects: linux (Ubuntu Disco) Importance: Undecided Status: Incomplete ** Tags: disco s390x sru-20190902 ubuntu-bpf ** Attachment added: "test_verifier.log" https://bugs.launchpad.net/bugs/1845646/+attachment/5291766/+files/test_verifier.log ** Also affects: linux (Ubuntu Disco) Importance: Undecided Status: New ** Also affects: ubuntu-kernel-tests Importance: Undecided Status: New ** Tags added: ubuntu-bpf ** Tags added: sru-20190902 -- You received this bug notification because you are a member of Ubuntu Bugs, which is subscribed to Ubuntu. https://bugs.launchpad.net/bugs/1845646 Title: test_verifier in ubuntu_bpf on D-s390x failed with Failed to load prog 'Success'! To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1845646/+subscriptions -- ubuntu-bugs mailing list ubuntu-bugs@lists.ubuntu.com https://lists.ubuntu.com/mailman/listinfo/ubuntu-bugs