Skip to content

Instantly share code, notes, and snippets.

@hfingler
Created September 28, 2022 20:44
Show Gist options
  • Save hfingler/dc96af45d87004d0dc412e35be31709c to your computer and use it in GitHub Desktop.
Save hfingler/dc96af45d87004d0dc412e35be31709c to your computer and use it in GitHub Desktop.
output of bpf kfunc_call_test1
libbpf: loading object 'hello_bpf' from buffer
libbpf: elf: section(3) classifier, size 112, link 0, flags 6, type=1
libbpf: sec 'classifier': found program 'kfunc_call_test1' at insn offset 0 (0 bytes), code size 14 insns (112 bytes)
libbpf: elf: section(4) .relclassifier, size 32, link 13, flags 40, type=9
libbpf: elf: section(5) .bss, size 4, link 0, flags 3, type=8
libbpf: elf: section(6) .rodata, size 28, link 0, flags 2, type=1
libbpf: elf: section(7) license, size 4, link 0, flags 3, type=1
libbpf: license of hello_bpf is GPL
libbpf: elf: section(8) .BTF, size 89875, link 0, flags 0, type=1
libbpf: elf: section(10) .BTF.ext, size 112, link 0, flags 0, type=1
libbpf: elf: section(13) .symtab, size 192, link 1, flags 0, type=2
libbpf: looking for externs among 8 symbols...
libbpf: collected 1 externs total
libbpf: extern (ksym) #0: symbol 5, name bpf_kfunc_call_test1
libbpf: map 'hello_bp.bss' (global data): at sec_idx 5, offset 0, flags 400.
libbpf: map 0 is "hello_bp.bss"
libbpf: map 'hello_bp.rodata' (global data): at sec_idx 6, offset 0, flags 480.
libbpf: map 1 is "hello_bp.rodata"
libbpf: sec '.relclassifier': collecting relocation for section(3) 'classifier'
libbpf: sec '.relclassifier': relo #0: insn #5 against 'bpf_kfunc_call_test1'
libbpf: prog 'kfunc_call_test1': found extern #0 'bpf_kfunc_call_test1' (sym 5) for insn #5
libbpf: sec '.relclassifier': relo #1: insn #7 against '.rodata'
libbpf: prog 'kfunc_call_test1': found data map 1 (hello_bp.rodata, sec 6, off 0) for insn 7
libbpf: loading kernel BTF '/sys/kernel/btf/vmlinux': 0
libbpf: extern (func ksym) 'bpf_kfunc_call_test1': resolved to kernel [104983]
libbpf: map 'hello_bp.bss': created successfully, fd=4
libbpf: map 'hello_bp.rodata': created successfully, fd=5
libbpf: prog 'kfunc_call_test1': BPF program load failed: Invalid argument
libbpf: prog 'kfunc_call_test1': -- BEGIN PROG LOAD LOG --
; a = bpf_kfunc_call_test1(sk, 1, 2, 3, 4);
0: (b7) r1 = 0
1: (b7) r2 = 1
2: (b7) r3 = 2
3: (b7) r4 = 3
4: (b7) r5 = 4
5: (85) call bpf_kfunc_call_test1#104983
kernel function bpf_kfunc_call_test1 args#0 expected pointer to STRUCT sock but R1 is not a pointer to btf_id
processed 6 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0
-- END PROG LOAD LOG --
libbpf: prog 'kfunc_call_test1': failed to load: -22
libbpf: failed to load object 'hello_bpf'
libbpf: failed to load BPF skeleton 'hello_bpf': -22
Failed to load and verify BPF skeleton
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment