All of lore.kernel.org
 help / color / mirror / Atom feed
From: Stephen Hemminger <stephen@networkplumber.org>
To: Alexei Starovoitov <ast@kernel.org>,
	Daniel Borkmann <daniel@iogearbox.net>,
	Martin KaFai Lau <kafai@fb.com>, Song Liu <songliubraving@fb.com>,
	Yonghong Song <yhs@fb.com>
Cc: bpf@vger.kernel.org
Subject: Fw: [Bug 205469] New: x86_32: bpf: multiple test_bpf failures using eBPF JIT
Date: Fri, 8 Nov 2019 07:57:11 -0800	[thread overview]
Message-ID: <20191108075711.115a5f94@hermes.lan> (raw)



Begin forwarded message:

Date: Fri, 08 Nov 2019 07:35:59 +0000
From: bugzilla-daemon@bugzilla.kernel.org
To: stephen@networkplumber.org
Subject: [Bug 205469] New: x86_32: bpf: multiple test_bpf failures using eBPF JIT


https://bugzilla.kernel.org/show_bug.cgi?id=205469

            Bug ID: 205469
           Summary: x86_32: bpf: multiple test_bpf failures using eBPF JIT
           Product: Networking
           Version: 2.5
    Kernel Version: 4.19.81 LTS
          Hardware: i386
                OS: Linux
              Tree: Mainline
            Status: NEW
          Severity: normal
          Priority: P1
         Component: Other
          Assignee: stephen@networkplumber.org
          Reporter: itugrok@yahoo.com
                CC: itugrok@yahoo.com
        Regression: No

Created attachment 285829
  --> https://bugzilla.kernel.org/attachment.cgi?id=285829&action=edit  
test_bpf failures: kernel 4.19.81/x86_32 (OpenWrt)

Summary:
========

Running the 4.19.81 LTS kernel on QEMU/x86_32, the standard test_bpf.ko
testsuite generates multiple errors with the eBPF JIT enabled:

  ...
  test_bpf: #32 JSET jited:1 40 ret 0 != 20 46 FAIL
  test_bpf: #321 LD_IND word positive offset jited:1 ret 0 != -291897430 FAIL
  test_bpf: #322 LD_IND word negative offset jited:1 ret 0 != -1437222042 FAIL
  test_bpf: #323 LD_IND word unaligned (addr & 3 == 2) jited:1 ret 0 !=
-1150890889 FAIL
  test_bpf: #326 LD_IND word positive offset, all ff jited:1 ret 0 != -1 FAIL
  ...
  test_bpf: Summary: 373 PASSED, 5 FAILED, [344/366 JIT'ed]

However, with eBPF JIT disabled (net.core.bpf_jit_enable=0) all tests pass.


Steps to Reproduce:
===================

  # sysctl net.core.bpf_jit_enable=1
  # modprobe test_bpf
  <Kernel log with failures and test summary>


Affected Systems Tested:
========================

  OpenWrt master on QEMU/pc-q35(x86_32) [LTS kernel 4.19.81]


Kernel Logs:
============

Boot log with test results is attached.

-- 
You are receiving this mail because:
You are the assignee for the bug.

             reply	other threads:[~2019-11-08 15:57 UTC|newest]

Thread overview: 7+ messages / expand[flat|nested]  mbox.gz  Atom feed  top
2019-11-08 15:57 Stephen Hemminger [this message]
2019-11-08 23:37 ` Fw: [Bug 205469] New: x86_32: bpf: multiple test_bpf failures using eBPF JIT Daniel Borkmann
2019-11-09 18:36   ` Wang YanQing
2019-11-11 12:56     ` Daniel Borkmann
2019-11-21 20:37       ` Greg KH
2019-11-21 20:42         ` Daniel Borkmann
2019-11-21 20:47           ` Greg KH

Reply instructions:

You may reply publicly to this message via plain-text email
using any one of the following methods:

* Save the following mbox file, import it into your mail client,
  and reply-to-all from there: mbox

  Avoid top-posting and favor interleaved quoting:
  https://en.wikipedia.org/wiki/Posting_style#Interleaved_style

* Reply using the --to, --cc, and --in-reply-to
  switches of git-send-email(1):

  git send-email \
    --in-reply-to=20191108075711.115a5f94@hermes.lan \
    --to=stephen@networkplumber.org \
    --cc=ast@kernel.org \
    --cc=bpf@vger.kernel.org \
    --cc=daniel@iogearbox.net \
    --cc=kafai@fb.com \
    --cc=songliubraving@fb.com \
    --cc=yhs@fb.com \
    /path/to/YOUR_REPLY

  https://kernel.org/pub/software/scm/git/docs/git-send-email.html

* If your mail client supports setting the In-Reply-To header
  via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line before the message body.
This is an external index of several public inboxes,
see mirroring instructions on how to clone and mirror
all data and code used by this external index.