Test passed with Kinetic linux/5.19.0-30.31 on P9 node "baltar":
test_bpf: Summary: 1026 PASSED, 0 FAILED, [1014/1014 JIT'ed]
test_bpf: test_tail_calls: Summary: 10 PASSED, 0 FAILED, [10/10 JIT'ed]
test_bpf: test_skb_segment: Summary: 2 PASSED, 0 FAILED

** Tags removed: verification-needed-kinetic
** Tags added: verification-done-kinetic

** Changed in: ubuntu-kernel-tests
       Status: In Progress => Fix Released

-- 
You received this bug notification because you are a member of Kernel
Packages, which is subscribed to linux in Ubuntu.
https://bugs.launchpad.net/bugs/2001618

Title:
  BPF_[AND|OR|XOR|FETCH|XCHG|CMPXCHG] in net:test_bpf.sh from
  ubuntu_kernel_selftests failed on K-5.19 P9

Status in ubuntu-kernel-tests:
  Fix Released
Status in linux package in Ubuntu:
  Fix Released
Status in linux source package in Kinetic:
  Fix Committed

Bug description:
  [Impact]
  The BPF_AND, BPF_OR, BPF_XOR, BPF_FETCH, BPF_XCHG and BPF_CMPXCHG related 
tests will fail in net:test_bpf test from ubuntu_kernel_selftests as they are 
not supported.

   test_bpf: #361 BPF_ATOMIC | BPF_W, BPF_AND: Test: 0x12 & 0xab = 0x02
   eBPF filter atomic op code c3 (@3) unsupported
   FAIL to select_runtime err=-524
   ...
   test_bpf: #365 BPF_ATOMIC | BPF_W, BPF_AND | BPF_FETCH: Test: 0x12 & 0xab = 
0x02
   eBPF filter atomic op code c3 (@3) unsupported
   FAIL to select_runtime err=-524
   ...
   test_bpf: #377 BPF_ATOMIC | BPF_W, BPF_OR: Test: 0x12 | 0xab = 0xbb FAIL to 
select_runtime err=-524
   ...
   test_bpf: #393 BPF_ATOMIC | BPF_W, BPF_XOR: Test: 0x12 ^ 0xab = 0xb9 FAIL to 
select_runtime err=-524
   ...
   test_bpf: #409 BPF_ATOMIC | BPF_W, BPF_XCHG: Test: 0x12 xchg 0xab = 0xab
   eBPF filter atomic op code c3 (@3) unsupported
   FAIL to select_runtime err=-524
   ...
   test_bpf: #417 BPF_ATOMIC | BPF_W, BPF_CMPXCHG: Test successful return
   eBPF filter atomic op code c3 (@3) unsupported
   FAIL to select_runtime err=-524
   ...
   test_bpf: Summary: 894 PASSED, 132 FAILED, [882/882 JIT'ed]

  Please find attachment for the complete test log.

  [Fix]
  * 6511270911 powerpc/bpf/64: add support for BPF_ATOMIC bitwise operations
  * dbe6e2456f powerpc/bpf/64: add support for atomic fetch operations
  * 1e82dfaa78 powerpc/bpf/64: Add instructions for atomic_[cmp]xchg
  These patches can be cherry-picked into Kinetic kernel.

  [Test]
  Test kernel can be found here:
  https://people.canonical.com/~phlin/kernel/lp-2001618-ppcbpf/

  Steps:
  1. Reboot with the patched kernel
  2. Run:
    sudo dmesg -C
    sudo modprobe test_bpf
    sudo dmesg

  Tested with Power9 node baltar, with the patched kernel there will be no 
failure reported by the test_bpf:
    test_bpf: Summary: 1026 PASSED, 0 FAILED, [1014/1014 JIT'ed]

  [Where problems could occur]
  This patchset just broaden the BPF operations support on ppc64, we might see 
some new failures when using these instruction somewhere in the future.

  Cascardo: The existing atomic operations may regress as well, since
  they now produce different code.

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/2001618/+subscriptions


-- 
Mailing list: https://launchpad.net/~kernel-packages
Post to     : kernel-packages@lists.launchpad.net
Unsubscribe : https://launchpad.net/~kernel-packages
More help   : https://help.launchpad.net/ListHelp

Reply via email to