Created
September 28, 2022 20:44
-
-
Save hfingler/dc96af45d87004d0dc412e35be31709c to your computer and use it in GitHub Desktop.
output of bpf kfunc_call_test1
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
libbpf: loading object 'hello_bpf' from buffer | |
libbpf: elf: section(3) classifier, size 112, link 0, flags 6, type=1 | |
libbpf: sec 'classifier': found program 'kfunc_call_test1' at insn offset 0 (0 bytes), code size 14 insns (112 bytes) | |
libbpf: elf: section(4) .relclassifier, size 32, link 13, flags 40, type=9 | |
libbpf: elf: section(5) .bss, size 4, link 0, flags 3, type=8 | |
libbpf: elf: section(6) .rodata, size 28, link 0, flags 2, type=1 | |
libbpf: elf: section(7) license, size 4, link 0, flags 3, type=1 | |
libbpf: license of hello_bpf is GPL | |
libbpf: elf: section(8) .BTF, size 89875, link 0, flags 0, type=1 | |
libbpf: elf: section(10) .BTF.ext, size 112, link 0, flags 0, type=1 | |
libbpf: elf: section(13) .symtab, size 192, link 1, flags 0, type=2 | |
libbpf: looking for externs among 8 symbols... | |
libbpf: collected 1 externs total | |
libbpf: extern (ksym) #0: symbol 5, name bpf_kfunc_call_test1 | |
libbpf: map 'hello_bp.bss' (global data): at sec_idx 5, offset 0, flags 400. | |
libbpf: map 0 is "hello_bp.bss" | |
libbpf: map 'hello_bp.rodata' (global data): at sec_idx 6, offset 0, flags 480. | |
libbpf: map 1 is "hello_bp.rodata" | |
libbpf: sec '.relclassifier': collecting relocation for section(3) 'classifier' | |
libbpf: sec '.relclassifier': relo #0: insn #5 against 'bpf_kfunc_call_test1' | |
libbpf: prog 'kfunc_call_test1': found extern #0 'bpf_kfunc_call_test1' (sym 5) for insn #5 | |
libbpf: sec '.relclassifier': relo #1: insn #7 against '.rodata' | |
libbpf: prog 'kfunc_call_test1': found data map 1 (hello_bp.rodata, sec 6, off 0) for insn 7 | |
libbpf: loading kernel BTF '/sys/kernel/btf/vmlinux': 0 | |
libbpf: extern (func ksym) 'bpf_kfunc_call_test1': resolved to kernel [104983] | |
libbpf: map 'hello_bp.bss': created successfully, fd=4 | |
libbpf: map 'hello_bp.rodata': created successfully, fd=5 | |
libbpf: prog 'kfunc_call_test1': BPF program load failed: Invalid argument | |
libbpf: prog 'kfunc_call_test1': -- BEGIN PROG LOAD LOG -- | |
; a = bpf_kfunc_call_test1(sk, 1, 2, 3, 4); | |
0: (b7) r1 = 0 | |
1: (b7) r2 = 1 | |
2: (b7) r3 = 2 | |
3: (b7) r4 = 3 | |
4: (b7) r5 = 4 | |
5: (85) call bpf_kfunc_call_test1#104983 | |
kernel function bpf_kfunc_call_test1 args#0 expected pointer to STRUCT sock but R1 is not a pointer to btf_id | |
processed 6 insns (limit 1000000) max_states_per_insn 0 total_states 0 peak_states 0 mark_read 0 | |
-- END PROG LOAD LOG -- | |
libbpf: prog 'kfunc_call_test1': failed to load: -22 | |
libbpf: failed to load object 'hello_bpf' | |
libbpf: failed to load BPF skeleton 'hello_bpf': -22 | |
Failed to load and verify BPF skeleton |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment