canonical-ubuntu-qa team mailing list archive
-
canonical-ubuntu-qa team
-
Mailing list archive
-
Message #01938
[Bug 2044363] [NEW] 13 failures reported in test_verifier from ubuntu_bpf with Mantic 6.5 AMD64/ARM64
Public bug reported:
Issue found with Mantic 6.5 AMD64/ARM64
This is not a regression, it's just that we don't have a bug report for
this.
There are 13 failures reported in this test_verifier test:
#118/p calls: invalid kfunc call: ptr_to_mem to struct with non-scalar FAIL
Unexpected verifier log!
EXP: arg#0 pointer type STRUCT prog_test_fail1 must point to scalar
RES:
FAIL
Unexpected error message!
EXP: arg#0 pointer type STRUCT prog_test_fail1 must point to scalar
RES: R0 !read_ok
verification time 26 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 26 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#119/p calls: invalid kfunc call: ptr_to_mem to struct with nesting depth > 4 FAIL
Unexpected verifier log!
EXP: max struct nesting depth exceeded
arg#0 pointer type STRUCT prog_test_fail2
RES:
FAIL
Unexpected error message!
EXP: max struct nesting depth exceeded
arg#0 pointer type STRUCT prog_test_fail2
RES: R0 !read_ok
verification time 18 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 18 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#120/p calls: invalid kfunc call: ptr_to_mem to struct with FAM FAIL
Unexpected verifier log!
EXP: arg#0 pointer type STRUCT prog_test_fail3 must point to scalar
RES:
FAIL
Unexpected error message!
EXP: arg#0 pointer type STRUCT prog_test_fail3 must point to scalar
RES: R0 !read_ok
verification time 18 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 18 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#121/p calls: invalid kfunc call: reg->type != PTR_TO_CTX FAIL
Unexpected verifier log!
EXP: R1 must have zero offset when passed to release func or trusted arg to kfunc
RES:
FAIL
Unexpected error message!
EXP: R1 must have zero offset when passed to release func or trusted arg to kfunc
RES: R0 !read_ok
verification time 13 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 13 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#122/p calls: invalid kfunc call: void * not allowed in func proto without mem size arg FAIL
Unexpected verifier log!
EXP: arg#0 pointer type UNKNOWN must point to scalar
RES:
FAIL
Unexpected error message!
EXP: arg#0 pointer type UNKNOWN must point to scalar
RES: R0 !read_ok
verification time 12 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 12 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#123/p calls: trigger reg2btf_ids[reg->type] for reg->type > __BPF_REG_TYPE_MAX FAIL
Unexpected verifier log!
EXP: Possibly NULL pointer passed to trusted arg0
RES:
FAIL
Unexpected error message!
EXP: Possibly NULL pointer passed to trusted arg0
RES: R0 !read_ok
verification time 51 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 51 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#124/p calls: invalid kfunc call: reg->off must be zero when passed to release kfunc FAIL
Unexpected verifier log!
EXP: R1 must have zero offset when passed to release func
RES:
FAIL
Unexpected error message!
EXP: R1 must have zero offset when passed to release func
RES: R0 !read_ok
verification time 44 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 44 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#125/p calls: invalid kfunc call: don't match first member type when passed to release kfunc FAIL
Unexpected verifier log!
EXP: kernel function bpf_kfunc_call_memb1_release args#0 expected pointer
RES:
FAIL
Unexpected error message!
EXP: kernel function bpf_kfunc_call_memb1_release args#0 expected pointer
RES: invalid kernel function call not eliminated in verifier pass
verification time 52 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
invalid kernel function call not eliminated in verifier pass
verification time 52 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#126/p calls: invalid kfunc call: PTR_TO_BTF_ID with negative offset FAIL
Unexpected verifier log!
EXP: ptr R1 off=-4 disallowed
RES:
FAIL
Unexpected error message!
EXP: ptr R1 off=-4 disallowed
RES: R0 !read_ok
verification time 37 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 37 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#127/p calls: invalid kfunc call: PTR_TO_BTF_ID with variable offset FAIL
Unexpected verifier log!
EXP: variable ptr_ access var_off=(0x0; 0x7) disallowed
RES:
FAIL
Unexpected error message!
EXP: variable ptr_ access var_off=(0x0; 0x7) disallowed
RES: R0 !read_ok
verification time 49 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 49 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#128/p calls: invalid kfunc call: referenced arg needs refcounted PTR_TO_BTF_ID FAIL
Unexpected verifier log!
EXP: R1 must be
RES:
FAIL
Unexpected error message!
EXP: R1 must be
RES: R0 !read_ok
verification time 28 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 28 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#129/p calls: valid kfunc call: referenced arg needs refcounted PTR_TO_BTF_ID FAIL
Failed to load prog 'Permission denied'!
R0 !read_ok
verification time 44 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#485/p map_kptr: ref: reference state created and released on xchg FAIL
Unexpected verifier log!
EXP: Unreleased reference id=5 alloc_insn=20
RES:
FAIL
Unexpected error message!
EXP: Unreleased reference id=5 alloc_insn=20
RES: R2 type=map_value expected=ptr_, trusted_ptr_, rcu_ptr_
verification time 31 usec
stack depth 8
processed 19 insns (limit 1000000) max_states_per_insn 0 total_states 1 peak_states 1 mark_read 1
R2 type=map_value expected=ptr_, trusted_ptr_, rcu_ptr_
verification time 31 usec
stack depth 8
processed 19 insns (limit 1000000) max_states_per_insn 0 total_states 1 peak_states 1 mark_read 1
Summary: 777 PASSED, 0 SKIPPED, 13 FAILED
** Affects: ubuntu-kernel-tests
Importance: Undecided
Status: New
** Tags: 6.5 amd64 aws oracle ubuntu-bpf
** Tags added: amd64
--
You received this bug notification because you are a member of Canonical
Platform QA Team, which is subscribed to ubuntu-kernel-tests.
https://bugs.launchpad.net/bugs/2044363
Title:
13 failures reported in test_verifier from ubuntu_bpf with Mantic 6.5
AMD64/ARM64
Status in ubuntu-kernel-tests:
New
Bug description:
Issue found with Mantic 6.5 AMD64/ARM64
This is not a regression, it's just that we don't have a bug report
for this.
There are 13 failures reported in this test_verifier test:
#118/p calls: invalid kfunc call: ptr_to_mem to struct with non-scalar FAIL
Unexpected verifier log!
EXP: arg#0 pointer type STRUCT prog_test_fail1 must point to scalar
RES:
FAIL
Unexpected error message!
EXP: arg#0 pointer type STRUCT prog_test_fail1 must point to scalar
RES: R0 !read_ok
verification time 26 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 26 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#119/p calls: invalid kfunc call: ptr_to_mem to struct with nesting depth > 4 FAIL
Unexpected verifier log!
EXP: max struct nesting depth exceeded
arg#0 pointer type STRUCT prog_test_fail2
RES:
FAIL
Unexpected error message!
EXP: max struct nesting depth exceeded
arg#0 pointer type STRUCT prog_test_fail2
RES: R0 !read_ok
verification time 18 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 18 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#120/p calls: invalid kfunc call: ptr_to_mem to struct with FAM FAIL
Unexpected verifier log!
EXP: arg#0 pointer type STRUCT prog_test_fail3 must point to scalar
RES:
FAIL
Unexpected error message!
EXP: arg#0 pointer type STRUCT prog_test_fail3 must point to scalar
RES: R0 !read_ok
verification time 18 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 18 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#121/p calls: invalid kfunc call: reg->type != PTR_TO_CTX FAIL
Unexpected verifier log!
EXP: R1 must have zero offset when passed to release func or trusted arg to kfunc
RES:
FAIL
Unexpected error message!
EXP: R1 must have zero offset when passed to release func or trusted arg to kfunc
RES: R0 !read_ok
verification time 13 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 13 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#122/p calls: invalid kfunc call: void * not allowed in func proto without mem size arg FAIL
Unexpected verifier log!
EXP: arg#0 pointer type UNKNOWN must point to scalar
RES:
FAIL
Unexpected error message!
EXP: arg#0 pointer type UNKNOWN must point to scalar
RES: R0 !read_ok
verification time 12 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 12 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#123/p calls: trigger reg2btf_ids[reg->type] for reg->type > __BPF_REG_TYPE_MAX FAIL
Unexpected verifier log!
EXP: Possibly NULL pointer passed to trusted arg0
RES:
FAIL
Unexpected error message!
EXP: Possibly NULL pointer passed to trusted arg0
RES: R0 !read_ok
verification time 51 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 51 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#124/p calls: invalid kfunc call: reg->off must be zero when passed to release kfunc FAIL
Unexpected verifier log!
EXP: R1 must have zero offset when passed to release func
RES:
FAIL
Unexpected error message!
EXP: R1 must have zero offset when passed to release func
RES: R0 !read_ok
verification time 44 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 44 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#125/p calls: invalid kfunc call: don't match first member type when passed to release kfunc FAIL
Unexpected verifier log!
EXP: kernel function bpf_kfunc_call_memb1_release args#0 expected pointer
RES:
FAIL
Unexpected error message!
EXP: kernel function bpf_kfunc_call_memb1_release args#0 expected pointer
RES: invalid kernel function call not eliminated in verifier pass
verification time 52 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
invalid kernel function call not eliminated in verifier pass
verification time 52 usec
stack depth 0
processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#126/p calls: invalid kfunc call: PTR_TO_BTF_ID with negative offset FAIL
Unexpected verifier log!
EXP: ptr R1 off=-4 disallowed
RES:
FAIL
Unexpected error message!
EXP: ptr R1 off=-4 disallowed
RES: R0 !read_ok
verification time 37 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 37 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#127/p calls: invalid kfunc call: PTR_TO_BTF_ID with variable offset FAIL
Unexpected verifier log!
EXP: variable ptr_ access var_off=(0x0; 0x7) disallowed
RES:
FAIL
Unexpected error message!
EXP: variable ptr_ access var_off=(0x0; 0x7) disallowed
RES: R0 !read_ok
verification time 49 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 49 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#128/p calls: invalid kfunc call: referenced arg needs refcounted PTR_TO_BTF_ID FAIL
Unexpected verifier log!
EXP: R1 must be
RES:
FAIL
Unexpected error message!
EXP: R1 must be
RES: R0 !read_ok
verification time 28 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
R0 !read_ok
verification time 28 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#129/p calls: valid kfunc call: referenced arg needs refcounted PTR_TO_BTF_ID FAIL
Failed to load prog 'Permission denied'!
R0 !read_ok
verification time 44 usec
stack depth 8
processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
#485/p map_kptr: ref: reference state created and released on xchg FAIL
Unexpected verifier log!
EXP: Unreleased reference id=5 alloc_insn=20
RES:
FAIL
Unexpected error message!
EXP: Unreleased reference id=5 alloc_insn=20
RES: R2 type=map_value expected=ptr_, trusted_ptr_, rcu_ptr_
verification time 31 usec
stack depth 8
processed 19 insns (limit 1000000) max_states_per_insn 0 total_states 1 peak_states 1 mark_read 1
R2 type=map_value expected=ptr_, trusted_ptr_, rcu_ptr_
verification time 31 usec
stack depth 8
processed 19 insns (limit 1000000) max_states_per_insn 0 total_states 1 peak_states 1 mark_read 1
Summary: 777 PASSED, 0 SKIPPED, 13 FAILED
To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/2044363/+subscriptions
Follow ups