Skip to content

Instantly share code, notes, and snippets.

@oluceps
Last active February 23, 2023 04:17
Show Gist options
  • Save oluceps/c9b51315fc438607c415f78c7c0d5add to your computer and use it in GitHub Desktop.
Save oluceps/c9b51315fc438607c415f78c7c0d5add to your computer and use it in GitHub Desktop.
riscv test of eunomia-bpf (errors) - comp - Wed 22 Feb
ls ../testfail/fentry-link/fentry-link.h && ../../compiler/workspace/bin/ecc ../testfail/fentry-link/fentry-link.bpf.c ../testfail/fentry-link/fentry-link.h \
|| ../../compiler/workspace/bin/ecc ../testfail/fentry-link/fentry-link.bpf.c
ls: cannot access '../testfail/fentry-link/fentry-link.h': No such file or directory
Compiling bpf object...
Packing ebpf object and config into ../testfail/fentry-link/package.json...
sudo timeout --preserve-status -s 2 2 ./ecli run ../testfail/fentry-link/package.json
arg: ../testfail/fentry-link/package.json
libbpf: prog 'do_unlinkat': failed to attach: ERROR: strerror_r(-524)=22
libbpf: prog 'do_unlinkat': failed to auto-attach: -524
failed to attach skeleton
Error: BpfError("load and attach ebpf program failed")
make: *** [Makefile:27: fentry-link] Error 1
riro@ubuntu:~/eunomia-bpf/examples/tests$ make test
ls ../testfail/bootstrap/bootstrap.h && ../../compiler/workspace/bin/ecc ../testfail/bootstrap/bootstrap.bpf.c ../testfail/bootstrap/bootstrap.h \
|| ../../compiler/workspace/bin/ecc ../testfail/bootstrap/bootstrap.bpf.c
../testfail/bootstrap/bootstrap.h
Compiling bpf object...
Generating export types...
Packing ebpf object and config into ../testfail/bootstrap/package.json...
sudo timeout --preserve-status -s 2 2 ./ecli run ../testfail/bootstrap/package.json
arg: ../testfail/bootstrap/package.json
libbpf: prog 'handle_exec': BPF program load failed: Invalid argument
libbpf: prog 'handle_exec': -- BEGIN PROG LOAD LOG --
R1 type=ctx expected=fp
0: R1=ctx(off=0,imm=0) R10=fp0
; int handle_exec(struct trace_event_raw_sched_process_exec *ctx)
0: (bf) r6 = r1 ; R1=ctx(off=0,imm=0) R6_w=ctx(off=0,imm=0)
; pid = bpf_get_current_pid_tgid() >> 32;
1: (85) call bpf_get_current_pid_tgid#14 ; R0_w=scalar()
; pid = bpf_get_current_pid_tgid() >> 32;
2: (77) r0 >>= 32 ; R0_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff))
; pid = bpf_get_current_pid_tgid() >> 32;
3: (63) *(u32 *)(r10 -4) = r0 ; R0_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff)) R10=fp0 fp-8=mmmm????
; ts = bpf_ktime_get_ns();
4: (85) call bpf_ktime_get_ns#5 ; R0_w=scalar()
; ts = bpf_ktime_get_ns();
5: (7b) *(u64 *)(r10 -16) = r0 ; R0_w=scalar() R10=fp0 fp-16_w=mmmmmmmm
6: (bf) r2 = r10 ; R2_w=fp0 R10=fp0
;
7: (07) r2 += -4 ; R2_w=fp-4
8: (bf) r3 = r10 ; R3_w=fp0 R10=fp0
9: (07) r3 += -16 ; R3_w=fp-16
; bpf_map_update_elem(&exec_start, &pid, &ts, BPF_ANY);
10: (18) r1 = 0xffffaf8094076c00 ; R1_w=map_ptr(off=0,ks=4,vs=8,imm=0)
12: (b7) r4 = 0 ; R4_w=0
13: (85) call bpf_map_update_elem#2 ; R0=scalar()
; if (min_duration_ns)
14: (18) r1 = 0xffff8f80006bc000 ; R1_w=map_value(off=0,ks=4,vs=8,imm=0)
16: (79) r1 = *(u64 *)(r1 +0) ; R1_w=0
; if (min_duration_ns)
17: (55) if r1 != 0x0 goto pc+43 ; R1_w=P0
18: (b7) r8 = 0 ; R8_w=0
; e = bpf_ringbuf_reserve(&rb, sizeof(*e), 0);
19: (18) r1 = 0xffffaf809b1a9600 ; R1_w=map_ptr(off=0,ks=0,vs=0,imm=0)
21: (b7) r2 = 168 ; R2_w=168
22: (b7) r3 = 0 ; R3_w=0
23: (85) call bpf_ringbuf_reserve#131 ; R0=alloc_mem_or_null(id=2,ref_obj_id=2,off=0,imm=0) refs=2
24: (bf) r7 = r0 ; R0=alloc_mem_or_null(id=2,ref_obj_id=2,off=0,imm=0) R7_w=alloc_mem_or_null(id=2,ref_obj_id=2,off=0,imm=0) refs=2
; if (!e)
25: (15) if r7 == 0x0 goto pc+35 ; R7_w=alloc_mem(ref_obj_id=2,off=0,imm=0) refs=2
; task = (struct task_struct *)bpf_get_current_task();
26: (85) call bpf_get_current_task#35 ; R0_w=scalar() refs=2
; e->exit_event = false;
27: (73) *(u8 *)(r7 +167) = r8 ; R7_w=alloc_mem(ref_obj_id=2,off=0,imm=0) R8=0 refs=2
; e->pid = pid;
28: (61) r1 = *(u32 *)(r10 -4) ; R1_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff)) R10=fp0 refs=2
; e->pid = pid;
29: (63) *(u32 *)(r7 +0) = r1 ; R1_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff)) R7_w=alloc_mem(ref_obj_id=2,off=0,imm=0) refs=2
30: (b7) r1 = 1432 ; R1_w=1432 refs=2
31: (0f) r0 += r1 ; R0_w=scalar() R1_w=1432 refs=2
32: (bf) r1 = r10 ; R1_w=fp0 R10=fp0 refs=2
; task = (struct task_struct *)bpf_get_current_task();
33: (07) r1 += -32 ; R1_w=fp-32 refs=2
; e->ppid = BPF_CORE_READ(task, real_parent, tgid);
34: (b7) r2 = 8 ; R2_w=8 refs=2
35: (bf) r3 = r0 ; R0_w=scalar(id=3) R3_w=scalar(id=3) refs=2
36: (85) call bpf_probe_read_kernel#113 ; R0=scalar() fp-32=mmmmmmmm refs=2
37: (b7) r1 = 1420 ; R1_w=1420 refs=2
38: (79) r3 = *(u64 *)(r10 -32) ; R3_w=scalar() R10=fp0 refs=2
39: (0f) r3 += r1 ; R1_w=1420 R3_w=scalar() refs=2
40: (bf) r1 = r10 ; R1_w=fp0 R10=fp0 refs=2
; task = (struct task_struct *)bpf_get_current_task();
41: (07) r1 += -20 ; R1_w=fp-20 refs=2
; e->ppid = BPF_CORE_READ(task, real_parent, tgid);
42: (b7) r2 = 4 ; R2_w=4 refs=2
43: (85) call bpf_probe_read_kernel#113 ; R0_w=scalar() fp-24=mmmm???? refs=2
; e->ppid = BPF_CORE_READ(task, real_parent, tgid);
44: (61) r1 = *(u32 *)(r10 -20) ; R1_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff)) R10=fp0 refs=2
; e->ppid = BPF_CORE_READ(task, real_parent, tgid);
45: (63) *(u32 *)(r7 +4) = r1 ; R1_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff)) R7=alloc_mem(ref_obj_id=2,off=0,imm=0) refs=2
; bpf_get_current_comm(&e->comm, sizeof(e->comm));
46: (bf) r1 = r7 ; R1_w=alloc_mem(ref_obj_id=2,off=0,imm=0) R7=alloc_mem(ref_obj_id=2,off=0,imm=0) refs=2
47: (07) r1 += 24 ; R1_w=alloc_mem(ref_obj_id=2,off=24,imm=0) refs=2
; bpf_get_current_comm(&e->comm, sizeof(e->comm));
48: (b7) r2 = 16 ; R2_w=16 refs=2
49: (85) call bpf_get_current_comm#16 ; R0=scalar() refs=2
; fname_off = ctx->__data_loc_filename & 0xFFFF;
50: (61) r1 = *(u32 *)(r6 +8) ; R1_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff)) R6=ctx(off=0,imm=0) refs=2
; bpf_probe_read_str(&e->filename, sizeof(e->filename), (void *)ctx + fname_off);
51: (57) r1 &= 65535 ; R1_w=scalar(umax=65535,var_off=(0x0; 0xffff)) refs=2
52: (0f) r6 += r1 ; R1_w=Pscalar(umax=65535,var_off=(0x0; 0xffff)) R6_w=ctx(off=0,umax=65535,var_off=(0x0; 0xffff)) refs=2
; bpf_probe_read_str(&e->filename, sizeof(e->filename), (void *)ctx + fname_off);
53: (bf) r1 = r7 ; R1_w=alloc_mem(ref_obj_id=2,off=0,imm=0) R7=alloc_mem(ref_obj_id=2,off=0,imm=0) refs=2
54: (07) r1 += 40 ; R1_w=alloc_mem(ref_obj_id=2,off=40,imm=0) refs=2
; bpf_probe_read_str(&e->filename, sizeof(e->filename), (void *)ctx + fname_off);
55: (b7) r2 = 127 ; R2_w=127 refs=2
56: (bf) r3 = r6 ; R3_w=ctx(off=0,umax=65535,var_off=(0x0; 0xffff)) R6_w=ctx(off=0,umax=65535,var_off=(0x0; 0xffff)) refs=2
57: (85) call bpf_probe_read_str#45
unknown func bpf_probe_read_str#45
processed 55 insns (limit 1000000) max_states_per_insn 0 total_states 4 peak_states 4 mark_read 4
-- END PROG LOAD LOG --
libbpf: prog 'handle_exec': failed to load: -22
libbpf: failed to load object 'bootstrap_bpf'
libbpf: failed to load BPF skeleton 'bootstrap_bpf': -22
failed to load skeleton
Error: BpfError("load and attach ebpf program failed")
make: *** [Makefile:27: bootstrap] Error 1
<warnings>...
/tmp/eunomia.plvGF7/include/vmlinux/riscv/vmlinux.h:5:46: warning: unknown attribute 'preserve_access_index' ignored [-Wunknown-attributes]
/tmp/eunomia.plvGF7/include/vmlinux/riscv/vmlinux.h:110551:9: note: when applied to this declaration
/home/riro/eunomia-bpf/examples/testfail/mdflush/core_fixes.h:18:18: warning: unknown attribute 'preserve_access_index' ignored [-Wunknown-attributes]
/home/riro/eunomia-bpf/examples/testfail/mdflush/core_fixes.h:22:18: warning: unknown attribute 'preserve_access_index' ignored [-Wunknown-attributes]
/home/riro/eunomia-bpf/examples/testfail/mdflush/core_fixes.h:28:6: error: use of unknown builtin '__builtin_preserve_field_info' [-Wimplicit-function-declaration]
Generating export types...
Packing ebpf object and config into ../testfail/mdflush/package.json...
sudo timeout --preserve-status -s 2 2 ./ecli run ../testfail/mdflush/package.json
arg: ../testfail/mdflush/package.json
libbpf: prog 'md_flush_request': failed to attach: ERROR: strerror_r(-524)=22
libbpf: prog 'md_flush_request': failed to auto-attach: -524
failed to attach skeleton
Error: BpfError("load and attach ebpf program failed")
make: *** [Makefile:27: mdflush] Error 1
ls ../testfail/lsm-connect/lsm-connect.h && ../../compiler/workspace/bin/ecc ../testfail/lsm-connect/lsm-connect.bpf.c ../testfail/lsm-connect/lsm-connect.h \
|| ../../compiler/workspace/bin/ecc ../testfail/lsm-connect/lsm-connect.bpf.c
ls: cannot access '../testfail/lsm-connect/lsm-connect.h': No such file or directory
Compiling bpf object...
Packing ebpf object and config into ../testfail/lsm-connect/package.json...
sudo timeout --preserve-status -s 2 2 ./ecli run ../testfail/lsm-connect/package.json
arg: ../testfail/lsm-connect/package.json
unknown type: __u32
libbpf: prog 'restrict_connect': failed to attach: ERROR: strerror_r(-524)=22
libbpf: prog 'restrict_connect': failed to auto-attach: -524
failed to attach skeleton
Error: BpfError("load and attach ebpf program failed")
make: *** [Makefile:27: lsm-connect] Error 1
ls ../bpftools/opensnoop/opensnoop.h && ../../compiler/workspace/bin/ecc ../bpftools/opensnoop/opensnoop.bpf.c ../bpftools/opensnoop/opensnoop.h \
|| ../../compiler/workspace/bin/ecc ../bpftools/opensnoop/opensnoop.bpf.c
../bpftools/opensnoop/opensnoop.h
Compiling bpf object...
warning: text is not json: Process ID to trace use it as a string
warning: text is not json: Thread ID to trace use it as a string
warning: text is not json: User ID to trace use it as a string
warning: text is not json: trace only failed events use it as a string
warning: text is not json: Trace open family syscalls. use it as a string
Generating export types...
Packing ebpf object and config into ../bpftools/opensnoop/package.json...
sudo timeout --preserve-status -s 2 2 ./ecli run ../bpftools/opensnoop/package.json
arg: ../bpftools/opensnoop/package.json
libbpf: failed to determine tracepoint 'syscalls/sys_enter_open' perf event ID: No such file or directory
libbpf: prog 'tracepoint__syscalls__sys_enter_open': failed to create tracepoint 'syscalls/sys_enter_open' perf event: No such file or directory
libbpf: prog 'tracepoint__syscalls__sys_enter_open': failed to auto-attach: -2
failed to attach skeleton
Error: BpfError("load and attach ebpf program failed")
make: *** [Makefile:27: opensnoop] Error 1
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment