* libbpf: failed to load program 'vxlan_get_tunnel_src'
@ 2022-05-19 15:25 Vincent Li
2022-05-20 23:57 ` Andrii Nakryiko
2022-05-23 8:11 ` Shung-Hsi Yu
0 siblings, 2 replies; 5+ messages in thread
From: Vincent Li @ 2022-05-19 15:25 UTC (permalink / raw)
To: bpf
Hi,
Here is my step to run bpf selftest on Ubuntu 20.04.2 LTS
git clone https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git
cd bpf-next; cp /boot/config-5.10.0-051000-generic .config; yes "" |
make oldconfig; make bzImage; make modules; cd
tools/testing/selftests/bpf/; make
then below, am I missing something in kernel config to cause "libbpf:
failed to load program 'vxlan_get_tunnel_src'"
./test_progs -a tunnel
Failed to load bpf_testmod.ko into the kernel: -8
WARNING! Selftests relying on bpf_testmod.ko will be skipped.
serial_test_tunnel:PASS:pthread_create 0 nsec
config_device:PASS:ip netns add at_ns0 0 nsec
config_device:PASS:ip link add veth0 type veth peer name veth1 0 nsec
config_device:PASS:ip link set veth0 netns at_ns0 0 nsec
config_device:PASS:ip addr add 172.16.1.200/24 dev veth1 0 nsec
config_device:PASS:ip addr add 172.16.1.20/24 dev veth1 0 nsec
config_device:PASS:ip link set dev veth1 up mtu 1500 0 nsec
config_device:PASS:ip netns exec at_ns0 ip addr add 172.16.1.100/24
dev veth0 0 nsec
config_device:PASS:ip netns exec at_ns0 ip link set dev veth0 up mtu 1500 0 nsec
add_vxlan_tunnel:PASS:ip netns exec at_ns0 ip link add dev vxlan00
type vxlan external gbp dstport 4789 0 nsec
add_vxlan_tunnel:PASS:ip netns exec at_ns0 ip link set dev vxlan00
address 52:54:00:d9:01:00 up 0 nsec
add_vxlan_tunnel:PASS:ip netns exec at_ns0 ip addr add dev vxlan00
10.1.1.100/24 0 nsec
add_vxlan_tunnel:PASS:ip netns exec at_ns0 ip neigh add 10.1.1.200
lladdr 52:54:00:d9:02:00 dev vxlan00 0 nsec
add_vxlan_tunnel:PASS:ip link add dev vxlan11 type vxlan external gbp
dstport 4789 0 nsec
add_vxlan_tunnel:PASS:ip link set dev vxlan11 address
52:54:00:d9:02:00 up 0 nsec
add_vxlan_tunnel:PASS:ip addr add dev vxlan11 10.1.1.200/24 0 nsec
add_vxlan_tunnel:PASS:ip neigh add 10.1.1.100 lladdr 52:54:00:d9:01:00
dev vxlan11 0 nsec
test_vxlan_tunnel:PASS:add vxlan tunnel 0 nsec
libbpf: prog 'vxlan_get_tunnel_src': BPF program load failed: Invalid argument
libbpf: prog 'vxlan_get_tunnel_src': -- BEGIN PROG LOAD LOG --
; int vxlan_get_tunnel_src(struct __sk_buff *skb)
0: (bf) r7 = r1
1: (b4) w1 = 0
; __u32 index = 0;
2: (63) *(u32 *)(r10 -60) = r1
last_idx 2 first_idx 0
regs=2 stack=0 before 1: (b4) w1 = 0
3: (bf) r2 = r10
;
4: (07) r2 += -60
; local_ip = bpf_map_lookup_elem(&local_ip_map, &index);
5: (18) r1 = 0xffff8ec4dfed6400
7: (85) call bpf_map_lookup_elem#1
8: (bf) r6 = r0
; if (!local_ip) {
9: (55) if r6 != 0x0 goto pc+5
from 9 to 15: R0_w=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R6_w=map_value(id=0,off=0,ks=4,vs=4,imm=0) R7_w=ctx(id=0,off=0,imm=0)
R10=fp0 fp-64=mmmm????
; log_err(ret);
15: (bf) r2 = r10
; ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key), 0);
16: (07) r2 += -48
17: (bf) r1 = r7
18: (b4) w3 = 44
19: (b7) r4 = 0
20: (85) call bpf_skb_get_tunnel_key#20
last_idx 20 first_idx 0
regs=8 stack=0 before 19: (b7) r4 = 0
regs=8 stack=0 before 18: (b4) w3 = 44
; if (ret < 0) {
21: (66) if w0 s> 0xffffffff goto pc+6
from 21 to 28: R0=inv(id=0,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647)
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0) R7=ctx(id=0,off=0,imm=0)
R10=fp0 fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-64=mmmm????
; log_err(ret);
28: (bf) r2 = r10
; ret = bpf_skb_get_tunnel_opt(skb, &md, sizeof(md));
29: (07) r2 += -56
30: (bf) r1 = r7
31: (b4) w3 = 4
32: (85) call bpf_skb_get_tunnel_opt#29
last_idx 32 first_idx 21
regs=8 stack=0 before 31: (b4) w3 = 4
33: (bf) r7 = r0
; if (ret < 0) {
34: (66) if w7 s> 0xffffffff goto pc+5
from 34 to 40: R0_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647)
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R7_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647) R10=fp0
fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=????mmmm fp-64=mmmm????
; log_err(ret);
40: (61) r1 = *(u32 *)(r10 -56)
; if (key.local_ipv4 != *local_ip || md.gbp != 0x800FF) {
41: (61) r3 = *(u32 *)(r6 +0)
R0_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647)
R1_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R7_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647) R10=fp0
fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=????mmmm fp-64=mmmm????
; if (key.local_ipv4 != *local_ip || md.gbp != 0x800FF) {
42: (61) r2 = *(u32 *)(r10 -20)
; if (key.local_ipv4 != *local_ip || md.gbp != 0x800FF) {
43: (5e) if w2 != w3 goto pc+2
R0_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647)
R1_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R2_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R3_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R7_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647) R10=fp0
fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=????mmmm fp-64=mmmm????
44: (b4) w0 = 0
45: (16) if w1 == 0x800ff goto pc+25
R0=inv0 R1=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R2=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R3=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R7=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647) R10=fp0
fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=????mmmm fp-64=mmmm????
; bpf_printk("vxlan key %d local ip 0x%x remote ip 0x%x gbp 0x%x\n",
46: (7b) *(u64 *)(r10 -88) = r2
47: (7b) *(u64 *)(r10 -72) = r1
48: (61) r1 = *(u32 *)(r10 -48)
49: (7b) *(u64 *)(r10 -96) = r1
50: (61) r1 = *(u32 *)(r10 -44)
51: (7b) *(u64 *)(r10 -80) = r1
52: (bf) r3 = r10
53: (07) r3 += -96
54: (18) r1 = 0xffffabaec02c82af
56: (b4) w2 = 52
57: (b4) w4 = 32
58: (85) call unknown#177
invalid func unknown#177
processed 64 insns (limit 1000000) max_states_per_insn 1 total_states
5 peak_states 5 mark_read 2
-- END PROG LOAD LOG --
libbpf: failed to load program 'vxlan_get_tunnel_src'
libbpf: failed to load object 'test_tunnel_kern'
libbpf: failed to load BPF skeleton 'test_tunnel_kern': -22
test_vxlan_tunnel:FAIL:test_tunnel_kern__open_and_load unexpected error: -22
#198/1 tunnel/vxlan_tunnel:FAIL
add_ip6vxlan_tunnel:PASS:ip netns exec at_ns0 ip -6 addr add ::11/96
dev veth0 0 nsec
add_ip6vxlan_tunnel:PASS:ip netns exec at_ns0 ip link set dev veth0 up 0 nsec
add_ip6vxlan_tunnel:PASS:ip -6 addr add ::22/96 dev veth1 0 nsec
add_ip6vxlan_tunnel:PASS:ip -6 addr add ::bb/96 dev veth1 0 nsec
add_ip6vxlan_tunnel:PASS:ip link set dev veth1 up 0 nsec
add_ip6vxlan_tunnel:PASS:ip netns exec at_ns0 ip link add dev
ip6vxlan00 type vxlan external dstport 4789 0 nsec
add_ip6vxlan_tunnel:PASS:ip netns exec at_ns0 ip addr add dev
ip6vxlan00 10.1.1.100/24 0 nsec
add_ip6vxlan_tunnel:PASS:ip netns exec at_ns0 ip link set dev
ip6vxlan00 address 52:54:00:d9:01:00 up 0 nsec
add_ip6vxlan_tunnel:PASS:ip link add dev ip6vxlan11 type vxlan
external dstport 4789 0 nsec
add_ip6vxlan_tunnel:PASS:ip addr add dev ip6vxlan11 10.1.1.200/24 0 nsec
add_ip6vxlan_tunnel:PASS:ip link set dev ip6vxlan11 address
52:54:00:d9:02:00 up 0 nsec
test_ip6vxlan_tunnel:PASS:add_ip6vxlan_tunnel 0 nsec
libbpf: prog 'vxlan_get_tunnel_src': BPF program load failed: Invalid argument
libbpf: prog 'vxlan_get_tunnel_src': -- BEGIN PROG LOAD LOG --
; int vxlan_get_tunnel_src(struct __sk_buff *skb)
0: (bf) r7 = r1
1: (b4) w1 = 0
; __u32 index = 0;
2: (63) *(u32 *)(r10 -60) = r1
last_idx 2 first_idx 0
regs=2 stack=0 before 1: (b4) w1 = 0
3: (bf) r2 = r10
;
4: (07) r2 += -60
; local_ip = bpf_map_lookup_elem(&local_ip_map, &index);
5: (18) r1 = 0xffff8ec4de898600
7: (85) call bpf_map_lookup_elem#1
8: (bf) r6 = r0
; if (!local_ip) {
9: (55) if r6 != 0x0 goto pc+5
from 9 to 15: R0_w=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R6_w=map_value(id=0,off=0,ks=4,vs=4,imm=0) R7_w=ctx(id=0,off=0,imm=0)
R10=fp0 fp-64=mmmm????
; log_err(ret);
15: (bf) r2 = r10
; ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key), 0);
16: (07) r2 += -48
17: (bf) r1 = r7
18: (b4) w3 = 44
19: (b7) r4 = 0
20: (85) call bpf_skb_get_tunnel_key#20
last_idx 20 first_idx 0
regs=8 stack=0 before 19: (b7) r4 = 0
regs=8 stack=0 before 18: (b4) w3 = 44
; if (ret < 0) {
21: (66) if w0 s> 0xffffffff goto pc+6
from 21 to 28: R0=inv(id=0,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647)
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0) R7=ctx(id=0,off=0,imm=0)
R10=fp0 fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-64=mmmm????
; log_err(ret);
28: (bf) r2 = r10
; ret = bpf_skb_get_tunnel_opt(skb, &md, sizeof(md));
29: (07) r2 += -56
30: (bf) r1 = r7
31: (b4) w3 = 4
32: (85) call bpf_skb_get_tunnel_opt#29
last_idx 32 first_idx 21
regs=8 stack=0 before 31: (b4) w3 = 4
33: (bf) r7 = r0
; if (ret < 0) {
34: (66) if w7 s> 0xffffffff goto pc+5
from 34 to 40: R0_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647)
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R7_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647) R10=fp0
fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=????mmmm fp-64=mmmm????
; log_err(ret);
40: (61) r1 = *(u32 *)(r10 -56)
; if (key.local_ipv4 != *local_ip || md.gbp != 0x800FF) {
41: (61) r3 = *(u32 *)(r6 +0)
R0_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647)
R1_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R7_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647) R10=fp0
fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=????mmmm fp-64=mmmm????
; if (key.local_ipv4 != *local_ip || md.gbp != 0x800FF) {
42: (61) r2 = *(u32 *)(r10 -20)
; if (key.local_ipv4 != *local_ip || md.gbp != 0x800FF) {
43: (5e) if w2 != w3 goto pc+2
R0_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647)
R1_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R2_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R3_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R7_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647) R10=fp0
fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=????mmmm fp-64=mmmm????
44: (b4) w0 = 0
45: (16) if w1 == 0x800ff goto pc+25
R0=inv0 R1=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R2=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R3=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R7=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647) R10=fp0
fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=????mmmm fp-64=mmmm????
; bpf_printk("vxlan key %d local ip 0x%x remote ip 0x%x gbp 0x%x\n",
46: (7b) *(u64 *)(r10 -88) = r2
47: (7b) *(u64 *)(r10 -72) = r1
48: (61) r1 = *(u32 *)(r10 -48)
49: (7b) *(u64 *)(r10 -96) = r1
50: (61) r1 = *(u32 *)(r10 -44)
51: (7b) *(u64 *)(r10 -80) = r1
52: (bf) r3 = r10
53: (07) r3 += -96
54: (18) r1 = 0xffffabaec02c82af
56: (b4) w2 = 52
57: (b4) w4 = 32
58: (85) call unknown#177
invalid func unknown#177
processed 64 insns (limit 1000000) max_states_per_insn 1 total_states
5 peak_states 5 mark_read 2
-- END PROG LOAD LOG --
libbpf: failed to load program 'vxlan_get_tunnel_src'
libbpf: failed to load object 'test_tunnel_kern'
libbpf: failed to load BPF skeleton 'test_tunnel_kern': -22
test_ip6vxlan_tunnel:FAIL:test_tunnel_kern__open_and_load unexpected error: -22
serial_test_tunnel:PASS:pthread_join 0 nsec
#198/2 tunnel/ip6vxlan_tunnel:FAIL
#198 tunnel:FAIL
All error logs:
serial_test_tunnel:PASS:pthread_create 0 nsec
config_device:PASS:ip netns add at_ns0 0 nsec
config_device:PASS:ip link add veth0 type veth peer name veth1 0 nsec
config_device:PASS:ip link set veth0 netns at_ns0 0 nsec
config_device:PASS:ip addr add 172.16.1.200/24 dev veth1 0 nsec
config_device:PASS:ip addr add 172.16.1.20/24 dev veth1 0 nsec
config_device:PASS:ip link set dev veth1 up mtu 1500 0 nsec
config_device:PASS:ip netns exec at_ns0 ip addr add 172.16.1.100/24
dev veth0 0 nsec
config_device:PASS:ip netns exec at_ns0 ip link set dev veth0 up mtu 1500 0 nsec
add_vxlan_tunnel:PASS:ip netns exec at_ns0 ip link add dev vxlan00
type vxlan external gbp dstport 4789 0 nsec
add_vxlan_tunnel:PASS:ip netns exec at_ns0 ip link set dev vxlan00
address 52:54:00:d9:01:00 up 0 nsec
add_vxlan_tunnel:PASS:ip netns exec at_ns0 ip addr add dev vxlan00
10.1.1.100/24 0 nsec
add_vxlan_tunnel:PASS:ip netns exec at_ns0 ip neigh add 10.1.1.200
lladdr 52:54:00:d9:02:00 dev vxlan00 0 nsec
add_vxlan_tunnel:PASS:ip link add dev vxlan11 type vxlan external gbp
dstport 4789 0 nsec
add_vxlan_tunnel:PASS:ip link set dev vxlan11 address
52:54:00:d9:02:00 up 0 nsec
add_vxlan_tunnel:PASS:ip addr add dev vxlan11 10.1.1.200/24 0 nsec
add_vxlan_tunnel:PASS:ip neigh add 10.1.1.100 lladdr 52:54:00:d9:01:00
dev vxlan11 0 nsec
test_vxlan_tunnel:PASS:add vxlan tunnel 0 nsec
libbpf: prog 'vxlan_get_tunnel_src': BPF program load failed: Invalid argument
libbpf: prog 'vxlan_get_tunnel_src': -- BEGIN PROG LOAD LOG --
; int vxlan_get_tunnel_src(struct __sk_buff *skb)
0: (bf) r7 = r1
1: (b4) w1 = 0
; __u32 index = 0;
2: (63) *(u32 *)(r10 -60) = r1
last_idx 2 first_idx 0
regs=2 stack=0 before 1: (b4) w1 = 0
3: (bf) r2 = r10
;
4: (07) r2 += -60
; local_ip = bpf_map_lookup_elem(&local_ip_map, &index);
5: (18) r1 = 0xffff8ec4dfed6400
7: (85) call bpf_map_lookup_elem#1
8: (bf) r6 = r0
; if (!local_ip) {
9: (55) if r6 != 0x0 goto pc+5
from 9 to 15: R0_w=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R6_w=map_value(id=0,off=0,ks=4,vs=4,imm=0) R7_w=ctx(id=0,off=0,imm=0)
R10=fp0 fp-64=mmmm????
; log_err(ret);
15: (bf) r2 = r10
; ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key), 0);
16: (07) r2 += -48
17: (bf) r1 = r7
18: (b4) w3 = 44
19: (b7) r4 = 0
20: (85) call bpf_skb_get_tunnel_key#20
last_idx 20 first_idx 0
regs=8 stack=0 before 19: (b7) r4 = 0
regs=8 stack=0 before 18: (b4) w3 = 44
; if (ret < 0) {
21: (66) if w0 s> 0xffffffff goto pc+6
from 21 to 28: R0=inv(id=0,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647)
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0) R7=ctx(id=0,off=0,imm=0)
R10=fp0 fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-64=mmmm????
; log_err(ret);
28: (bf) r2 = r10
; ret = bpf_skb_get_tunnel_opt(skb, &md, sizeof(md));
29: (07) r2 += -56
30: (bf) r1 = r7
31: (b4) w3 = 4
32: (85) call bpf_skb_get_tunnel_opt#29
last_idx 32 first_idx 21
regs=8 stack=0 before 31: (b4) w3 = 4
33: (bf) r7 = r0
; if (ret < 0) {
34: (66) if w7 s> 0xffffffff goto pc+5
from 34 to 40: R0_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647)
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R7_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647) R10=fp0
fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=????mmmm fp-64=mmmm????
; log_err(ret);
40: (61) r1 = *(u32 *)(r10 -56)
; if (key.local_ipv4 != *local_ip || md.gbp != 0x800FF) {
41: (61) r3 = *(u32 *)(r6 +0)
R0_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647)
R1_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R7_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647) R10=fp0
fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=????mmmm fp-64=mmmm????
; if (key.local_ipv4 != *local_ip || md.gbp != 0x800FF) {
42: (61) r2 = *(u32 *)(r10 -20)
; if (key.local_ipv4 != *local_ip || md.gbp != 0x800FF) {
43: (5e) if w2 != w3 goto pc+2
R0_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647)
R1_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R2_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R3_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R7_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647) R10=fp0
fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=????mmmm fp-64=mmmm????
44: (b4) w0 = 0
45: (16) if w1 == 0x800ff goto pc+25
R0=inv0 R1=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R2=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R3=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R7=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647) R10=fp0
fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=????mmmm fp-64=mmmm????
; bpf_printk("vxlan key %d local ip 0x%x remote ip 0x%x gbp 0x%x\n",
46: (7b) *(u64 *)(r10 -88) = r2
47: (7b) *(u64 *)(r10 -72) = r1
48: (61) r1 = *(u32 *)(r10 -48)
49: (7b) *(u64 *)(r10 -96) = r1
50: (61) r1 = *(u32 *)(r10 -44)
51: (7b) *(u64 *)(r10 -80) = r1
52: (bf) r3 = r10
53: (07) r3 += -96
54: (18) r1 = 0xffffabaec02c82af
56: (b4) w2 = 52
57: (b4) w4 = 32
58: (85) call unknown#177
invalid func unknown#177
processed 64 insns (limit 1000000) max_states_per_insn 1 total_states
5 peak_states 5 mark_read 2
-- END PROG LOAD LOG --
libbpf: failed to load program 'vxlan_get_tunnel_src'
libbpf: failed to load object 'test_tunnel_kern'
libbpf: failed to load BPF skeleton 'test_tunnel_kern': -22
test_vxlan_tunnel:FAIL:test_tunnel_kern__open_and_load unexpected error: -22
#198/1 tunnel/vxlan_tunnel:FAIL
add_ip6vxlan_tunnel:PASS:ip netns exec at_ns0 ip -6 addr add ::11/96
dev veth0 0 nsec
add_ip6vxlan_tunnel:PASS:ip netns exec at_ns0 ip link set dev veth0 up 0 nsec
add_ip6vxlan_tunnel:PASS:ip -6 addr add ::22/96 dev veth1 0 nsec
add_ip6vxlan_tunnel:PASS:ip -6 addr add ::bb/96 dev veth1 0 nsec
add_ip6vxlan_tunnel:PASS:ip link set dev veth1 up 0 nsec
add_ip6vxlan_tunnel:PASS:ip netns exec at_ns0 ip link add dev
ip6vxlan00 type vxlan external dstport 4789 0 nsec
add_ip6vxlan_tunnel:PASS:ip netns exec at_ns0 ip addr add dev
ip6vxlan00 10.1.1.100/24 0 nsec
add_ip6vxlan_tunnel:PASS:ip netns exec at_ns0 ip link set dev
ip6vxlan00 address 52:54:00:d9:01:00 up 0 nsec
add_ip6vxlan_tunnel:PASS:ip link add dev ip6vxlan11 type vxlan
external dstport 4789 0 nsec
add_ip6vxlan_tunnel:PASS:ip addr add dev ip6vxlan11 10.1.1.200/24 0 nsec
add_ip6vxlan_tunnel:PASS:ip link set dev ip6vxlan11 address
52:54:00:d9:02:00 up 0 nsec
test_ip6vxlan_tunnel:PASS:add_ip6vxlan_tunnel 0 nsec
libbpf: prog 'vxlan_get_tunnel_src': BPF program load failed: Invalid argument
libbpf: prog 'vxlan_get_tunnel_src': -- BEGIN PROG LOAD LOG --
; int vxlan_get_tunnel_src(struct __sk_buff *skb)
0: (bf) r7 = r1
1: (b4) w1 = 0
; __u32 index = 0;
2: (63) *(u32 *)(r10 -60) = r1
last_idx 2 first_idx 0
regs=2 stack=0 before 1: (b4) w1 = 0
3: (bf) r2 = r10
;
4: (07) r2 += -60
; local_ip = bpf_map_lookup_elem(&local_ip_map, &index);
5: (18) r1 = 0xffff8ec4de898600
7: (85) call bpf_map_lookup_elem#1
8: (bf) r6 = r0
; if (!local_ip) {
9: (55) if r6 != 0x0 goto pc+5
from 9 to 15: R0_w=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R6_w=map_value(id=0,off=0,ks=4,vs=4,imm=0) R7_w=ctx(id=0,off=0,imm=0)
R10=fp0 fp-64=mmmm????
; log_err(ret);
15: (bf) r2 = r10
; ret = bpf_skb_get_tunnel_key(skb, &key, sizeof(key), 0);
16: (07) r2 += -48
17: (bf) r1 = r7
18: (b4) w3 = 44
19: (b7) r4 = 0
20: (85) call bpf_skb_get_tunnel_key#20
last_idx 20 first_idx 0
regs=8 stack=0 before 19: (b7) r4 = 0
regs=8 stack=0 before 18: (b4) w3 = 44
; if (ret < 0) {
21: (66) if w0 s> 0xffffffff goto pc+6
from 21 to 28: R0=inv(id=0,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647)
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0) R7=ctx(id=0,off=0,imm=0)
R10=fp0 fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-64=mmmm????
; log_err(ret);
28: (bf) r2 = r10
; ret = bpf_skb_get_tunnel_opt(skb, &md, sizeof(md));
29: (07) r2 += -56
30: (bf) r1 = r7
31: (b4) w3 = 4
32: (85) call bpf_skb_get_tunnel_opt#29
last_idx 32 first_idx 21
regs=8 stack=0 before 31: (b4) w3 = 4
33: (bf) r7 = r0
; if (ret < 0) {
34: (66) if w7 s> 0xffffffff goto pc+5
from 34 to 40: R0_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647)
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R7_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647) R10=fp0
fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=????mmmm fp-64=mmmm????
; log_err(ret);
40: (61) r1 = *(u32 *)(r10 -56)
; if (key.local_ipv4 != *local_ip || md.gbp != 0x800FF) {
41: (61) r3 = *(u32 *)(r6 +0)
R0_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647)
R1_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R7_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647) R10=fp0
fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=????mmmm fp-64=mmmm????
; if (key.local_ipv4 != *local_ip || md.gbp != 0x800FF) {
42: (61) r2 = *(u32 *)(r10 -20)
; if (key.local_ipv4 != *local_ip || md.gbp != 0x800FF) {
43: (5e) if w2 != w3 goto pc+2
R0_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647)
R1_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R2_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R3_w=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R7_w=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647) R10=fp0
fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=????mmmm fp-64=mmmm????
44: (b4) w0 = 0
45: (16) if w1 == 0x800ff goto pc+25
R0=inv0 R1=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R2=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R3=inv(id=0,umax_value=4294967295,var_off=(0x0; 0xffffffff))
R6=map_value(id=0,off=0,ks=4,vs=4,imm=0)
R7=inv(id=2,smax_value=9223372034707292159,umax_value=18446744071562067967,var_off=(0x0;
0xffffffff7fffffff),s32_min_value=0,u32_max_value=2147483647) R10=fp0
fp-8=????mmmm fp-16=mmmmmmmm fp-24=mmmmmmmm fp-32=mmmmmmmm
fp-40=mmmmmmmm fp-48=mmmmmmmm fp-56=????mmmm fp-64=mmmm????
; bpf_printk("vxlan key %d local ip 0x%x remote ip 0x%x gbp 0x%x\n",
46: (7b) *(u64 *)(r10 -88) = r2
47: (7b) *(u64 *)(r10 -72) = r1
48: (61) r1 = *(u32 *)(r10 -48)
49: (7b) *(u64 *)(r10 -96) = r1
50: (61) r1 = *(u32 *)(r10 -44)
51: (7b) *(u64 *)(r10 -80) = r1
52: (bf) r3 = r10
53: (07) r3 += -96
54: (18) r1 = 0xffffabaec02c82af
56: (b4) w2 = 52
57: (b4) w4 = 32
58: (85) call unknown#177
invalid func unknown#177
processed 64 insns (limit 1000000) max_states_per_insn 1 total_states
5 peak_states 5 mark_read 2
-- END PROG LOAD LOG --
libbpf: failed to load program 'vxlan_get_tunnel_src'
libbpf: failed to load object 'test_tunnel_kern'
libbpf: failed to load BPF skeleton 'test_tunnel_kern': -22
test_ip6vxlan_tunnel:FAIL:test_tunnel_kern__open_and_load unexpected error: -22
serial_test_tunnel:PASS:pthread_join 0 nsec
#198/2 tunnel/ip6vxlan_tunnel:FAIL
#198 tunnel:FAIL
Summary: 0/0 PASSED, 0 SKIPPED, 1 FAILED
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: libbpf: failed to load program 'vxlan_get_tunnel_src'
2022-05-19 15:25 libbpf: failed to load program 'vxlan_get_tunnel_src' Vincent Li
@ 2022-05-20 23:57 ` Andrii Nakryiko
2022-05-23 8:11 ` Shung-Hsi Yu
1 sibling, 0 replies; 5+ messages in thread
From: Andrii Nakryiko @ 2022-05-20 23:57 UTC (permalink / raw)
To: Vincent Li; +Cc: bpf
On Thu, May 19, 2022 at 11:14 AM Vincent Li <vincent.mc.li@gmail.com> wrote:
>
> Hi,
>
> Here is my step to run bpf selftest on Ubuntu 20.04.2 LTS
>
> git clone https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git
> cd bpf-next; cp /boot/config-5.10.0-051000-generic .config; yes "" |
> make oldconfig; make bzImage; make modules; cd
> tools/testing/selftests/bpf/; make
>
> then below, am I missing something in kernel config to cause "libbpf:
> failed to load program 'vxlan_get_tunnel_src'"
>
> ./test_progs -a tunnel
>
> invalid func unknown#177
Yes, you are missing bpf_trace_vprintk() (that's helper #177), which
is called through log_err() -> bpf_printk() -> bpf_trace_vprintk().
Either use recent enough kernel or remove log_err() statements.
[...]
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: libbpf: failed to load program 'vxlan_get_tunnel_src'
2022-05-19 15:25 libbpf: failed to load program 'vxlan_get_tunnel_src' Vincent Li
2022-05-20 23:57 ` Andrii Nakryiko
@ 2022-05-23 8:11 ` Shung-Hsi Yu
2022-05-23 8:18 ` Shung-Hsi Yu
1 sibling, 1 reply; 5+ messages in thread
From: Shung-Hsi Yu @ 2022-05-23 8:11 UTC (permalink / raw)
To: Vincent Li; +Cc: bpf
On Thu, May 19, 2022 at 08:25:00AM -0700, Vincent Li wrote:
> Hi,
>
> Here is my step to run bpf selftest on Ubuntu 20.04.2 LTS
>
> git clone https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git
> cd bpf-next; cp /boot/config-5.10.0-051000-generic .config; yes "" |
> make oldconfig; make bzImage; make modules; cd
> tools/testing/selftests/bpf/; make
[snip...]
> ; bpf_printk("vxlan key %d local ip 0x%x remote ip 0x%x gbp 0x%x\n",
>
> 46: (7b) *(u64 *)(r10 -88) = r2
>
> 47: (7b) *(u64 *)(r10 -72) = r1
>
> 48: (61) r1 = *(u32 *)(r10 -48)
>
> 49: (7b) *(u64 *)(r10 -96) = r1
>
> 50: (61) r1 = *(u32 *)(r10 -44)
>
> 51: (7b) *(u64 *)(r10 -80) = r1
>
> 52: (bf) r3 = r10
>
> 53: (07) r3 += -96
>
> 54: (18) r1 = 0xffffabaec02c82af
>
> 56: (b4) w2 = 52
>
> 57: (b4) w4 = 32
>
> 58: (85) call unknown#177
>
> invalid func unknown#177
This should be the reason that why vxlan_get_tunnel_src fails to load, the
kernel does not recognize the helper function that the program is trying to
call.
And that helper function is bpf_trace_vprintk (determined with v5.17.4
vmlinux).
$ bpftool btf dump file /sys/kernel/btf/vmlinux format c | grep -e 'BPF_FUNC_.* 177,'
BPF_FUNC_trace_vprintk = 177,
Based on your description you're using a v5.10-based kernel, which explains
why it doesn't have bpf_trace_vprintk(), since it was not added until commit
10aceb629e19 ("bpf: Add bpf_trace_vprintk helper") in v5.16.
The call to bpf_trace_vprintk() comes from the bpf_printk() call, which is
actually a macro that uses either bpf_trace_printk() or bpf_trace_vprintk()
depending on the number of arguments given[1].
In general I think it'd make more sense to run bpf-next selftests on a
bpf-next kernel, either compile and install on the machine that you're
testing on or use tools/testing/selftests/bpf/vmtest.sh which spins up a VM
with suitable environment (though I haven't tried vmtest.sh myself).
Shung-Hsi
1: https://github.com/libbpf/libbpf/blob/master/src/bpf_helpers.h
> processed 64 insns (limit 1000000) max_states_per_insn 1 total_states
> 5 peak_states 5 mark_read 2
>
> -- END PROG LOAD LOG --
>
> libbpf: failed to load program 'vxlan_get_tunnel_src'
>
> libbpf: failed to load object 'test_tunnel_kern'
>
> libbpf: failed to load BPF skeleton 'test_tunnel_kern': -22
>
> test_ip6vxlan_tunnel:FAIL:test_tunnel_kern__open_and_load unexpected error: -22
>
> serial_test_tunnel:PASS:pthread_join 0 nsec
>
> #198/2 tunnel/ip6vxlan_tunnel:FAIL
>
> #198 tunnel:FAIL
>
> Summary: 0/0 PASSED, 0 SKIPPED, 1 FAILED
>
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: libbpf: failed to load program 'vxlan_get_tunnel_src'
2022-05-23 8:11 ` Shung-Hsi Yu
@ 2022-05-23 8:18 ` Shung-Hsi Yu
2022-05-23 15:21 ` Vincent Li
0 siblings, 1 reply; 5+ messages in thread
From: Shung-Hsi Yu @ 2022-05-23 8:18 UTC (permalink / raw)
To: Vincent Li; +Cc: bpf
On Mon, May 23, 2022 at 04:11:27PM +0800, Shung-Hsi Yu wrote:
> On Thu, May 19, 2022 at 08:25:00AM -0700, Vincent Li wrote:
> > Hi,
> >
> > Here is my step to run bpf selftest on Ubuntu 20.04.2 LTS
> >
> > git clone https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git
> > cd bpf-next; cp /boot/config-5.10.0-051000-generic .config; yes "" |
> > make oldconfig; make bzImage; make modules; cd
> > tools/testing/selftests/bpf/; make
>
> [snip...]
>
> > ; bpf_printk("vxlan key %d local ip 0x%x remote ip 0x%x gbp 0x%x\n",
> >
> > 46: (7b) *(u64 *)(r10 -88) = r2
> >
> > 47: (7b) *(u64 *)(r10 -72) = r1
> >
> > 48: (61) r1 = *(u32 *)(r10 -48)
> >
> > 49: (7b) *(u64 *)(r10 -96) = r1
> >
> > 50: (61) r1 = *(u32 *)(r10 -44)
> >
> > 51: (7b) *(u64 *)(r10 -80) = r1
> >
> > 52: (bf) r3 = r10
> >
> > 53: (07) r3 += -96
> >
> > 54: (18) r1 = 0xffffabaec02c82af
> >
> > 56: (b4) w2 = 52
> >
> > 57: (b4) w4 = 32
> >
> > 58: (85) call unknown#177
> >
> > invalid func unknown#177
>
> This should be the reason that why vxlan_get_tunnel_src fails to load, the
> kernel does not recognize the helper function that the program is trying to
> call.
Just realized Andrii already pointed this out in an earlier email. Consider
this an expanded answer to his then :)
> And that helper function is bpf_trace_vprintk (determined with v5.17.4
> vmlinux).
>
> $ bpftool btf dump file /sys/kernel/btf/vmlinux format c | grep -e 'BPF_FUNC_.* 177,'
> BPF_FUNC_trace_vprintk = 177,
>
> Based on your description you're using a v5.10-based kernel, which explains
> why it doesn't have bpf_trace_vprintk(), since it was not added until commit
> 10aceb629e19 ("bpf: Add bpf_trace_vprintk helper") in v5.16.
>
> The call to bpf_trace_vprintk() comes from the bpf_printk() call, which is
> actually a macro that uses either bpf_trace_printk() or bpf_trace_vprintk()
> depending on the number of arguments given[1].
>
> In general I think it'd make more sense to run bpf-next selftests on a
> bpf-next kernel, either compile and install on the machine that you're
> testing on or use tools/testing/selftests/bpf/vmtest.sh which spins up a VM
> with suitable environment (though I haven't tried vmtest.sh myself).
>
>
> Shung-Hsi
>
> 1: https://github.com/libbpf/libbpf/blob/master/src/bpf_helpers.h
>
> > processed 64 insns (limit 1000000) max_states_per_insn 1 total_states
> > 5 peak_states 5 mark_read 2
> >
> > -- END PROG LOAD LOG --
> >
> > libbpf: failed to load program 'vxlan_get_tunnel_src'
> >
> > libbpf: failed to load object 'test_tunnel_kern'
> >
> > libbpf: failed to load BPF skeleton 'test_tunnel_kern': -22
> >
> > test_ip6vxlan_tunnel:FAIL:test_tunnel_kern__open_and_load unexpected error: -22
> >
> > serial_test_tunnel:PASS:pthread_join 0 nsec
> >
> > #198/2 tunnel/ip6vxlan_tunnel:FAIL
> >
> > #198 tunnel:FAIL
> >
> > Summary: 0/0 PASSED, 0 SKIPPED, 1 FAILED
> >
>
>
^ permalink raw reply [flat|nested] 5+ messages in thread
* Re: libbpf: failed to load program 'vxlan_get_tunnel_src'
2022-05-23 8:18 ` Shung-Hsi Yu
@ 2022-05-23 15:21 ` Vincent Li
0 siblings, 0 replies; 5+ messages in thread
From: Vincent Li @ 2022-05-23 15:21 UTC (permalink / raw)
To: Shung-Hsi Yu; +Cc: bpf
On Mon, May 23, 2022 at 1:18 AM Shung-Hsi Yu <shung-hsi.yu@suse.com> wrote:
>
> On Mon, May 23, 2022 at 04:11:27PM +0800, Shung-Hsi Yu wrote:
> > On Thu, May 19, 2022 at 08:25:00AM -0700, Vincent Li wrote:
> > > Hi,
> > >
> > > Here is my step to run bpf selftest on Ubuntu 20.04.2 LTS
> > >
> > > git clone https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next.git
> > > cd bpf-next; cp /boot/config-5.10.0-051000-generic .config; yes "" |
> > > make oldconfig; make bzImage; make modules; cd
> > > tools/testing/selftests/bpf/; make
> >
> > [snip...]
> >
> > > ; bpf_printk("vxlan key %d local ip 0x%x remote ip 0x%x gbp 0x%x\n",
> > >
> > > 46: (7b) *(u64 *)(r10 -88) = r2
> > >
> > > 47: (7b) *(u64 *)(r10 -72) = r1
> > >
> > > 48: (61) r1 = *(u32 *)(r10 -48)
> > >
> > > 49: (7b) *(u64 *)(r10 -96) = r1
> > >
> > > 50: (61) r1 = *(u32 *)(r10 -44)
> > >
> > > 51: (7b) *(u64 *)(r10 -80) = r1
> > >
> > > 52: (bf) r3 = r10
> > >
> > > 53: (07) r3 += -96
> > >
> > > 54: (18) r1 = 0xffffabaec02c82af
> > >
> > > 56: (b4) w2 = 52
> > >
> > > 57: (b4) w4 = 32
> > >
> > > 58: (85) call unknown#177
> > >
> > > invalid func unknown#177
> >
> > This should be the reason that why vxlan_get_tunnel_src fails to load, the
> > kernel does not recognize the helper function that the program is trying to
> > call.
>
> Just realized Andrii already pointed this out in an earlier email. Consider
> this an expanded answer to his then :)
>
Thank you both for the answer, I was wondering where the number #177
came from, you
answered it :)
> > And that helper function is bpf_trace_vprintk (determined with v5.17.4
> > vmlinux).
> >
> > $ bpftool btf dump file /sys/kernel/btf/vmlinux format c | grep -e 'BPF_FUNC_.* 177,'
> > BPF_FUNC_trace_vprintk = 177,
> >
> > Based on your description you're using a v5.10-based kernel, which explains
> > why it doesn't have bpf_trace_vprintk(), since it was not added until commit
> > 10aceb629e19 ("bpf: Add bpf_trace_vprintk helper") in v5.16.
> >
> > The call to bpf_trace_vprintk() comes from the bpf_printk() call, which is
> > actually a macro that uses either bpf_trace_printk() or bpf_trace_vprintk()
> > depending on the number of arguments given[1].
> >
> > In general I think it'd make more sense to run bpf-next selftests on a
> > bpf-next kernel, either compile and install on the machine that you're
> > testing on or use tools/testing/selftests/bpf/vmtest.sh which spins up a VM
> > with suitable environment (though I haven't tried vmtest.sh myself).
> >
> >
> > Shung-Hsi
> >
> > 1: https://github.com/libbpf/libbpf/blob/master/src/bpf_helpers.h
> >
> > > processed 64 insns (limit 1000000) max_states_per_insn 1 total_states
> > > 5 peak_states 5 mark_read 2
> > >
> > > -- END PROG LOAD LOG --
> > >
> > > libbpf: failed to load program 'vxlan_get_tunnel_src'
> > >
> > > libbpf: failed to load object 'test_tunnel_kern'
> > >
> > > libbpf: failed to load BPF skeleton 'test_tunnel_kern': -22
> > >
> > > test_ip6vxlan_tunnel:FAIL:test_tunnel_kern__open_and_load unexpected error: -22
> > >
> > > serial_test_tunnel:PASS:pthread_join 0 nsec
> > >
> > > #198/2 tunnel/ip6vxlan_tunnel:FAIL
> > >
> > > #198 tunnel:FAIL
> > >
> > > Summary: 0/0 PASSED, 0 SKIPPED, 1 FAILED
> > >
> >
> >
>
^ permalink raw reply [flat|nested] 5+ messages in thread
end of thread, other threads:[~2022-05-23 15:22 UTC | newest]
Thread overview: 5+ messages (download: mbox.gz / follow: Atom feed)
-- links below jump to the message on this page --
2022-05-19 15:25 libbpf: failed to load program 'vxlan_get_tunnel_src' Vincent Li
2022-05-20 23:57 ` Andrii Nakryiko
2022-05-23 8:11 ` Shung-Hsi Yu
2022-05-23 8:18 ` Shung-Hsi Yu
2022-05-23 15:21 ` Vincent Li
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).