This issue has been fixed in sru-20221114 * bionic/linux-aws/4.15.0-1147.159 * bionic/linux-aws-fips/4.15.0-2083.89 * bionic/linux-azure-4.15/4.15.0-1158.173 * bionic/linux-azure-fips/4.15.0-2067.73 * bionic/linux-gcp-4.15/4.15.0-1142.158 * bionic/linux-gcp-fips/4.15.0-2051.56 * bionic/linux-oracle/4.15.0-1109.120
And the test_verifier is now failing with bug 2015833. Closing this bug and remove hints. ** Changed in: ubuntu-kernel-tests Status: New => Fix Released ** Project changed: linux => linux (Ubuntu) ** Changed in: linux (Ubuntu) Status: New => Fix Released -- You received this bug notification because you are a member of Kernel Packages, which is subscribed to linux in Ubuntu. https://bugs.launchpad.net/bugs/1960640 Title: ubuntu_bpf XDP failures on v4.15 Status in ubuntu-kernel-tests: Fix Released Status in linux package in Ubuntu: Fix Released Bug description: 2022.01.31/bionic/linux-azure-4.15/4.15.0-1131.144 test: ubuntu_bpf Several XDP failures: ------------ 14563 02:11:05 DEBUG| [stdout] #470/p XDP pkt read, pkt_end > pkt_data', good access OK 14564 02:11:05 DEBUG| [stdout] #471/p XDP pkt read, pkt_end > pkt_data', bad access 1 FAIL 14565 02:11:05 DEBUG| [stdout] Unexpected success to load! 14566 02:11:05 DEBUG| [stdout] 0: (61) r2 = *(u32 *)(r1 +0) 14567 02:11:05 DEBUG| [stdout] 1: (61) r3 = *(u32 *)(r1 +4) 14568 02:11:05 DEBUG| [stdout] 2: (bf) r1 = r2 14569 02:11:05 DEBUG| [stdout] 3: (07) r1 += 8 14570 02:11:05 DEBUG| [stdout] 4: (2d) if r3 > r1 goto pc+1 14571 02:11:05 DEBUG| [stdout] R1=pkt(id=0,off=8,r=0,imm=0) R2=pkt(id=0,off=0,r=0,imm=0) R3=pkt_end(id=0,off=0,imm=0) R10=fp0 14572 02:11:05 DEBUG| [stdout] 5: (05) goto pc+1 14573 02:11:05 DEBUG| [stdout] 7: (b7) r0 = 0 14574 02:11:05 DEBUG| [stdout] 8: (95) exit 14575 02:11:05 DEBUG| [stdout] 14576 02:11:05 DEBUG| [stdout] from 4 to 6: R1=pkt(id=0,off=8,r=9,imm=0) R2=pkt(id=0,off=0,r=9,imm=0) R3=pkt_end(id=0,off=0,imm=0) R10=fp0 14577 02:11:05 DEBUG| [stdout] 6: (79) r0 = *(u64 *)(r1 -8) 14578 02:11:05 DEBUG| [stdout] 7: (b7) r0 = 0 14579 02:11:05 DEBUG| [stdout] 8: (95) exit 14580 02:11:05 DEBUG| [stdout] processed 11 insns, stack depth 0 14581 02:11:05 DEBUG| [stdout] #472/p XDP pkt read, pkt_end > pkt_data', bad access 2 OK 14582 02:11:05 DEBUG| [stdout] #473/p XDP pkt read, pkt_data' < pkt_end, good access OK 14583 02:11:05 DEBUG| [stdout] #474/p XDP pkt read, pkt_data' < pkt_end, bad access 1 FAIL 14584 02:11:05 DEBUG| [stdout] Unexpected success to load! 14585 02:11:05 DEBUG| [stdout] 0: (61) r2 = *(u32 *)(r1 +0) 14586 02:11:05 DEBUG| [stdout] 1: (61) r3 = *(u32 *)(r1 +4) 14587 02:11:05 DEBUG| [stdout] 2: (bf) r1 = r2 14588 02:11:05 DEBUG| [stdout] 3: (07) r1 += 8 14589 02:11:05 DEBUG| [stdout] 4: (ad) if r1 < r3 goto pc+1 14590 02:11:05 DEBUG| [stdout] R1=pkt(id=0,off=8,r=0,imm=0) R2=pkt(id=0,off=0,r=0,imm=0) R3=pkt_end(id=0,off=0,imm=0) R10=fp0 14591 02:11:05 DEBUG| [stdout] 5: (05) goto pc+1 14592 02:11:05 DEBUG| [stdout] 7: (b7) r0 = 0 14593 02:11:05 DEBUG| [stdout] 8: (95) exit 14594 02:11:05 DEBUG| [stdout] 14595 02:11:05 DEBUG| [stdout] from 4 to 6: R1=pkt(id=0,off=8,r=9,imm=0) R2=pkt(id=0,off=0,r=9,imm=0) R3=pkt_end(id=0,off=0,imm=0) R10=fp0 14596 02:11:05 DEBUG| [stdout] 6: (79) r0 = *(u64 *)(r1 -8) 14597 02:11:05 DEBUG| [stdout] 7: (b7) r0 = 0 14598 02:11:05 DEBUG| [stdout] 8: (95) exit 14599 02:11:05 DEBUG| [stdout] processed 11 insns, stack depth 0 14600 02:11:05 DEBUG| [stdout] #475/p XDP pkt read, pkt_data' < pkt_end, bad access 2 OK 14601 02:11:05 DEBUG| [stdout] #476/p XDP pkt read, pkt_end < pkt_data', good access OK 14602 02:11:05 DEBUG| [stdout] #477/p XDP pkt read, pkt_end < pkt_data', bad access 1 OK 14603 02:11:05 DEBUG| [stdout] #478/p XDP pkt read, pkt_end < pkt_data', bad access 2 OK 14604 02:11:05 DEBUG| [stdout] #479/p XDP pkt read, pkt_data' >= pkt_end, good access OK 14605 02:11:05 DEBUG| [stdout] #480/p XDP pkt read, pkt_data' >= pkt_end, bad access 1 FAIL 14606 02:11:05 DEBUG| [stdout] Unexpected success to load! 14607 02:11:05 DEBUG| [stdout] 0: (61) r2 = *(u32 *)(r1 +0) 14608 02:11:05 DEBUG| [stdout] 1: (61) r3 = *(u32 *)(r1 +4) 14609 02:11:05 DEBUG| [stdout] 2: (bf) r1 = r2 14610 02:11:05 DEBUG| [stdout] 3: (07) r1 += 8 14611 02:11:05 DEBUG| [stdout] 4: (3d) if r1 >= r3 goto pc+1 14612 02:11:05 DEBUG| [stdout] R1=pkt(id=0,off=8,r=9,imm=0) R2=pkt(id=0,off=0,r=9,imm=0) R3=pkt_end(id=0,off=0,imm=0) R10=fp0 14613 02:11:05 DEBUG| [stdout] 5: (79) r0 = *(u64 *)(r1 -8) 14614 02:11:05 DEBUG| [stdout] 6: (b7) r0 = 0 14615 02:11:05 DEBUG| [stdout] 7: (95) exit 14616 02:11:05 DEBUG| [stdout] 14617 02:11:05 DEBUG| [stdout] from 4 to 6: safe 14618 02:11:05 DEBUG| [stdout] processed 9 insns, stack depth 0 ------------ Possible cause: Insufficient/incorrect backport of commit 2fa7d94afc1a ("bpf: Fix the off-by-two error in range markings") to v4.15. Our v4.15 skips entirely test udpate because path does not match (because oif later commit 48729226238d ("selftests: bpf: break up the rest of test_verifier")). To manage notifications about this bug go to: https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/1960640/+subscriptions -- Mailing list: https://launchpad.net/~kernel-packages Post to : kernel-packages@lists.launchpad.net Unsubscribe : https://launchpad.net/~kernel-packages More help : https://help.launchpad.net/ListHelp