← Back to team overview

canonical-ubuntu-qa team mailing list archive

[Bug 2044363] Re: 13 failures reported in test_verifier from ubuntu_bpf with Mantic 6.5 AMD64

 

This issue can be found on ARM64 as well, title and content updated
accordingly.

** Summary changed:

- 13 failures reported in test_verifier from ubuntu_bpf with Mantic 6.5 AMD64
+ 13 failures reported in test_verifier from ubuntu_bpf with Mantic 6.5 AMD64/ARM64

** Description changed:

- Issue found with Mantic 6.5 AMD64
+ Issue found with Mantic 6.5 AMD64/ARM64
  
  This is not a regression, it's just that we don't have a bug report for
  this.
  
- 
  There are 13 failures reported in this test_verifier test:
  #118/p calls: invalid kfunc call: ptr_to_mem to struct with non-scalar FAIL
  Unexpected verifier log!
  EXP: arg#0 pointer type STRUCT prog_test_fail1 must point to scalar
  RES:
  FAIL
  Unexpected error message!
-     EXP: arg#0 pointer type STRUCT prog_test_fail1 must point to scalar
-     RES: R0 !read_ok
+     EXP: arg#0 pointer type STRUCT prog_test_fail1 must point to scalar
+     RES: R0 !read_ok
  verification time 26 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  R0 !read_ok
  verification time 26 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  #119/p calls: invalid kfunc call: ptr_to_mem to struct with nesting depth > 4 FAIL
  Unexpected verifier log!
  EXP: max struct nesting depth exceeded
  arg#0 pointer type STRUCT prog_test_fail2
  RES:
  FAIL
  Unexpected error message!
-     EXP: max struct nesting depth exceeded
+     EXP: max struct nesting depth exceeded
  arg#0 pointer type STRUCT prog_test_fail2
-     RES: R0 !read_ok
+     RES: R0 !read_ok
  verification time 18 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  R0 !read_ok
  verification time 18 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  #120/p calls: invalid kfunc call: ptr_to_mem to struct with FAM FAIL
  Unexpected verifier log!
  EXP: arg#0 pointer type STRUCT prog_test_fail3 must point to scalar
  RES:
  FAIL
  Unexpected error message!
-     EXP: arg#0 pointer type STRUCT prog_test_fail3 must point to scalar
-     RES: R0 !read_ok
+     EXP: arg#0 pointer type STRUCT prog_test_fail3 must point to scalar
+     RES: R0 !read_ok
  verification time 18 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  R0 !read_ok
  verification time 18 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  #121/p calls: invalid kfunc call: reg->type != PTR_TO_CTX FAIL
  Unexpected verifier log!
  EXP: R1 must have zero offset when passed to release func or trusted arg to kfunc
  RES:
  FAIL
  Unexpected error message!
-     EXP: R1 must have zero offset when passed to release func or trusted arg to kfunc
-     RES: R0 !read_ok
+     EXP: R1 must have zero offset when passed to release func or trusted arg to kfunc
+     RES: R0 !read_ok
  verification time 13 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  R0 !read_ok
  verification time 13 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  #122/p calls: invalid kfunc call: void * not allowed in func proto without mem size arg FAIL
  Unexpected verifier log!
  EXP: arg#0 pointer type UNKNOWN  must point to scalar
  RES:
  FAIL
  Unexpected error message!
-     EXP: arg#0 pointer type UNKNOWN  must point to scalar
-     RES: R0 !read_ok
+     EXP: arg#0 pointer type UNKNOWN  must point to scalar
+     RES: R0 !read_ok
  verification time 12 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  R0 !read_ok
  verification time 12 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  #123/p calls: trigger reg2btf_ids[reg->type] for reg->type > __BPF_REG_TYPE_MAX FAIL
  Unexpected verifier log!
  EXP: Possibly NULL pointer passed to trusted arg0
  RES:
  FAIL
  Unexpected error message!
-     EXP: Possibly NULL pointer passed to trusted arg0
-     RES: R0 !read_ok
+     EXP: Possibly NULL pointer passed to trusted arg0
+     RES: R0 !read_ok
  verification time 51 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  R0 !read_ok
  verification time 51 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  #124/p calls: invalid kfunc call: reg->off must be zero when passed to release kfunc FAIL
  Unexpected verifier log!
  EXP: R1 must have zero offset when passed to release func
  RES:
  FAIL
  Unexpected error message!
-     EXP: R1 must have zero offset when passed to release func
-     RES: R0 !read_ok
+     EXP: R1 must have zero offset when passed to release func
+     RES: R0 !read_ok
  verification time 44 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  R0 !read_ok
  verification time 44 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  #125/p calls: invalid kfunc call: don't match first member type when passed to release kfunc FAIL
  Unexpected verifier log!
  EXP: kernel function bpf_kfunc_call_memb1_release args#0 expected pointer
  RES:
  FAIL
  Unexpected error message!
-     EXP: kernel function bpf_kfunc_call_memb1_release args#0 expected pointer
-     RES: invalid kernel function call not eliminated in verifier pass
+     EXP: kernel function bpf_kfunc_call_memb1_release args#0 expected pointer
+     RES: invalid kernel function call not eliminated in verifier pass
  verification time 52 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  invalid kernel function call not eliminated in verifier pass
  verification time 52 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  #126/p calls: invalid kfunc call: PTR_TO_BTF_ID with negative offset FAIL
  Unexpected verifier log!
  EXP: ptr R1 off=-4 disallowed
  RES:
  FAIL
  Unexpected error message!
-     EXP: ptr R1 off=-4 disallowed
-     RES: R0 !read_ok
+     EXP: ptr R1 off=-4 disallowed
+     RES: R0 !read_ok
  verification time 37 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  R0 !read_ok
  verification time 37 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  #127/p calls: invalid kfunc call: PTR_TO_BTF_ID with variable offset FAIL
  Unexpected verifier log!
  EXP: variable ptr_ access var_off=(0x0; 0x7) disallowed
  RES:
  FAIL
  Unexpected error message!
-     EXP: variable ptr_ access var_off=(0x0; 0x7) disallowed
-     RES: R0 !read_ok
+     EXP: variable ptr_ access var_off=(0x0; 0x7) disallowed
+     RES: R0 !read_ok
  verification time 49 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  R0 !read_ok
  verification time 49 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  #128/p calls: invalid kfunc call: referenced arg needs refcounted PTR_TO_BTF_ID FAIL
  Unexpected verifier log!
  EXP: R1 must be
  RES:
  FAIL
  Unexpected error message!
-     EXP: R1 must be
-     RES: R0 !read_ok
+     EXP: R1 must be
+     RES: R0 !read_ok
  verification time 28 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  R0 !read_ok
  verification time 28 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  #129/p calls: valid kfunc call: referenced arg needs refcounted PTR_TO_BTF_ID FAIL
  Failed to load prog 'Permission denied'!
  R0 !read_ok
  verification time 44 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
  
  #485/p map_kptr: ref: reference state created and released on xchg FAIL
  Unexpected verifier log!
  EXP: Unreleased reference id=5 alloc_insn=20
  RES:
  FAIL
  Unexpected error message!
-     EXP: Unreleased reference id=5 alloc_insn=20
-     RES: R2 type=map_value expected=ptr_, trusted_ptr_, rcu_ptr_
+     EXP: Unreleased reference id=5 alloc_insn=20
+     RES: R2 type=map_value expected=ptr_, trusted_ptr_, rcu_ptr_
  verification time 31 usec
  stack depth 8
  processed 19 insns (limit 1000000) max_states_per_insn 0 total_states 1 peak_states 1 mark_read 1
  
  R2 type=map_value expected=ptr_, trusted_ptr_, rcu_ptr_
  verification time 31 usec
  stack depth 8
  processed 19 insns (limit 1000000) max_states_per_insn 0 total_states 1 peak_states 1 mark_read 1
  
  Summary: 777 PASSED, 0 SKIPPED, 13 FAILED

-- 
You received this bug notification because you are a member of Canonical
Platform QA Team, which is subscribed to ubuntu-kernel-tests.
https://bugs.launchpad.net/bugs/2044363

Title:
  13 failures reported in test_verifier from ubuntu_bpf with Mantic 6.5
  AMD64/ARM64/s390x

Status in ubuntu-kernel-tests:
  New

Bug description:
  Issue found with Mantic 6.5 AMD64/ARM64/s390x

  This is not a regression, it's just that we don't have a bug report
  for this.

  There are 13 failures reported in this test_verifier test:
  #118/p calls: invalid kfunc call: ptr_to_mem to struct with non-scalar FAIL
  Unexpected verifier log!
  EXP: arg#0 pointer type STRUCT prog_test_fail1 must point to scalar
  RES:
  FAIL
  Unexpected error message!
      EXP: arg#0 pointer type STRUCT prog_test_fail1 must point to scalar
      RES: R0 !read_ok
  verification time 26 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  R0 !read_ok
  verification time 26 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  #119/p calls: invalid kfunc call: ptr_to_mem to struct with nesting depth > 4 FAIL
  Unexpected verifier log!
  EXP: max struct nesting depth exceeded
  arg#0 pointer type STRUCT prog_test_fail2
  RES:
  FAIL
  Unexpected error message!
      EXP: max struct nesting depth exceeded
  arg#0 pointer type STRUCT prog_test_fail2
      RES: R0 !read_ok
  verification time 18 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  R0 !read_ok
  verification time 18 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  #120/p calls: invalid kfunc call: ptr_to_mem to struct with FAM FAIL
  Unexpected verifier log!
  EXP: arg#0 pointer type STRUCT prog_test_fail3 must point to scalar
  RES:
  FAIL
  Unexpected error message!
      EXP: arg#0 pointer type STRUCT prog_test_fail3 must point to scalar
      RES: R0 !read_ok
  verification time 18 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  R0 !read_ok
  verification time 18 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  #121/p calls: invalid kfunc call: reg->type != PTR_TO_CTX FAIL
  Unexpected verifier log!
  EXP: R1 must have zero offset when passed to release func or trusted arg to kfunc
  RES:
  FAIL
  Unexpected error message!
      EXP: R1 must have zero offset when passed to release func or trusted arg to kfunc
      RES: R0 !read_ok
  verification time 13 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  R0 !read_ok
  verification time 13 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  #122/p calls: invalid kfunc call: void * not allowed in func proto without mem size arg FAIL
  Unexpected verifier log!
  EXP: arg#0 pointer type UNKNOWN  must point to scalar
  RES:
  FAIL
  Unexpected error message!
      EXP: arg#0 pointer type UNKNOWN  must point to scalar
      RES: R0 !read_ok
  verification time 12 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  R0 !read_ok
  verification time 12 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  #123/p calls: trigger reg2btf_ids[reg->type] for reg->type > __BPF_REG_TYPE_MAX FAIL
  Unexpected verifier log!
  EXP: Possibly NULL pointer passed to trusted arg0
  RES:
  FAIL
  Unexpected error message!
      EXP: Possibly NULL pointer passed to trusted arg0
      RES: R0 !read_ok
  verification time 51 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  R0 !read_ok
  verification time 51 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  #124/p calls: invalid kfunc call: reg->off must be zero when passed to release kfunc FAIL
  Unexpected verifier log!
  EXP: R1 must have zero offset when passed to release func
  RES:
  FAIL
  Unexpected error message!
      EXP: R1 must have zero offset when passed to release func
      RES: R0 !read_ok
  verification time 44 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  R0 !read_ok
  verification time 44 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  #125/p calls: invalid kfunc call: don't match first member type when passed to release kfunc FAIL
  Unexpected verifier log!
  EXP: kernel function bpf_kfunc_call_memb1_release args#0 expected pointer
  RES:
  FAIL
  Unexpected error message!
      EXP: kernel function bpf_kfunc_call_memb1_release args#0 expected pointer
      RES: invalid kernel function call not eliminated in verifier pass
  verification time 52 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  invalid kernel function call not eliminated in verifier pass
  verification time 52 usec
  stack depth 0
  processed 4 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  #126/p calls: invalid kfunc call: PTR_TO_BTF_ID with negative offset FAIL
  Unexpected verifier log!
  EXP: ptr R1 off=-4 disallowed
  RES:
  FAIL
  Unexpected error message!
      EXP: ptr R1 off=-4 disallowed
      RES: R0 !read_ok
  verification time 37 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  R0 !read_ok
  verification time 37 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  #127/p calls: invalid kfunc call: PTR_TO_BTF_ID with variable offset FAIL
  Unexpected verifier log!
  EXP: variable ptr_ access var_off=(0x0; 0x7) disallowed
  RES:
  FAIL
  Unexpected error message!
      EXP: variable ptr_ access var_off=(0x0; 0x7) disallowed
      RES: R0 !read_ok
  verification time 49 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  R0 !read_ok
  verification time 49 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  #128/p calls: invalid kfunc call: referenced arg needs refcounted PTR_TO_BTF_ID FAIL
  Unexpected verifier log!
  EXP: R1 must be
  RES:
  FAIL
  Unexpected error message!
      EXP: R1 must be
      RES: R0 !read_ok
  verification time 28 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  R0 !read_ok
  verification time 28 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  #129/p calls: valid kfunc call: referenced arg needs refcounted PTR_TO_BTF_ID FAIL
  Failed to load prog 'Permission denied'!
  R0 !read_ok
  verification time 44 usec
  stack depth 8
  processed 5 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0

  #485/p map_kptr: ref: reference state created and released on xchg FAIL
  Unexpected verifier log!
  EXP: Unreleased reference id=5 alloc_insn=20
  RES:
  FAIL
  Unexpected error message!
      EXP: Unreleased reference id=5 alloc_insn=20
      RES: R2 type=map_value expected=ptr_, trusted_ptr_, rcu_ptr_
  verification time 31 usec
  stack depth 8
  processed 19 insns (limit 1000000) max_states_per_insn 0 total_states 1 peak_states 1 mark_read 1

  R2 type=map_value expected=ptr_, trusted_ptr_, rcu_ptr_
  verification time 31 usec
  stack depth 8
  processed 19 insns (limit 1000000) max_states_per_insn 0 total_states 1 peak_states 1 mark_read 1

  Summary: 777 PASSED, 0 SKIPPED, 13 FAILED

To manage notifications about this bug go to:
https://bugs.launchpad.net/ubuntu-kernel-tests/+bug/2044363/+subscriptions



References