lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [day] [month] [year] [list]
Message-ID: <34498517-0f1c-942a-1f0e-8cee555f5017@intel.com>
Date:   Fri, 19 Aug 2022 12:28:57 +0800
From:   kernel test robot <yujie.liu@...el.com>
To:     Youlin Li <liulin063@...il.com>
CC:     <lkp@...ts.01.org>, kernel test robot <lkp@...el.com>,
        LKML <linux-kernel@...r.kernel.org>, <bpf@...r.kernel.org>
Subject: [bpf] 2cb80ae521: kernel-selftests.bpf.test_verifier.fail

Greeting,

FYI, we noticed the following commit (built with gcc-11):

commit: 2cb80ae5216d26bca97c7068ff825e2a7f585843 ("bpf: Do more tight ALU bounds tracking")
url: https://github.com/intel-lab-lkp/linux/commits/UPDATE-20220730-064345/Kuee-K1r0a/bpf-Do-more-tight-ALU-bounds-tracking/20220729-113248

in testcase: kernel-selftests
version: kernel-selftests-x86_64-37f3cb9b-1_20220704
with following parameters:

	group: bpf
	ucode: 0xf0

test-description: The kernel contains a set of "self tests" under the tools/testing/selftests/ directory. These are intended to be small unit tests to exercise individual code paths in the kernel.
test-url: https://www.kernel.org/doc/Documentation/kselftest.txt


on test machine: 8 threads 1 sockets Intel(R) Core(TM) i7-7700 CPU @ 3.60GHz with 32G memory

caused below changes (please refer to attached dmesg/kmsg for entire log/backtrace):

# selftests: bpf: test_verifier
...
# #142/p bounds check after truncation of non-boundary-crossing range FAIL
# Failed to load prog 'Permission denied'!
# invalid access to map value, value_size=8 off=16777215 size=1
# R0 max value is outside of the allowed memory range
# verification time 139 usec
# stack depth 8
...
# Summary: 1349 PASSED, 635 SKIPPED, 1 FAILED
not ok 1 selftests: bpf: test_verifier # exit=1


=========================================================================================
tbox_group/testcase/rootfs/kconfig/compiler/group/ucode:
   lkp-kbl-d01/kernel-selftests/debian-12-x86_64-20220629.cgz/x86_64-rhel-8.3-kselftests/gcc-11/bpf/0xf0

commit:
   2cb80ae5216d2 bpf: Do more tight ALU bounds tracking
   f946964a9f79f net: marvell: prestera: fix missed deinit sequence

f946964a9f79f8dc 2cb80ae5216d26bca97c7068ff8
---------------- ---------------------------
        fail:runs  %reproduction    fail:runs
            |             |             |
            :11         109%          12:12    kernel-selftests.bpf.test_verifier.fail


not sure if bpf selftests also need to be updated to accommodate the change of this patch.


If you fix the issue, kindly add following tag
Reported-by: kernel test robot <yujie.liu@...el.com>


To reproduce:

         git clone https://github.com/intel/lkp-tests.git
         cd lkp-tests
         sudo bin/lkp install job.yaml           # job file is attached in this email
         bin/lkp split-job --compatible job.yaml # generate the yaml file for lkp run
         sudo bin/lkp run generated-yaml-file

         # if come across any failure that blocks the test,
         # please remove ~/.lkp and /lkp dir to run from a clean state.

-- 
0-DAY CI Kernel Test Service
https://01.org/lkp
View attachment "config-5.19.0-rc5-00228-g2cb80ae5216d" of type "text/plain" (175236 bytes)

View attachment "job-script" of type "text/plain" (7268 bytes)

Download attachment "dmesg.xz" of type "application/x-xz" (250124 bytes)

View attachment "job.yaml" of type "text/plain" (6207 bytes)

View attachment "reproduce" of type "text/plain" (353 bytes)

Powered by blists - more mailing lists

Powered by Openwall GNU/*/Linux Powered by OpenVZ