-
-
Save oluceps/c9b51315fc438607c415f78c7c0d5add to your computer and use it in GitHub Desktop.
riscv test of eunomia-bpf (errors) - comp - Wed 22 Feb
This file contains hidden or bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
ls ../testfail/fentry-link/fentry-link.h && ../../compiler/workspace/bin/ecc ../testfail/fentry-link/fentry-link.bpf.c ../testfail/fentry-link/fentry-link.h \ | |
|| ../../compiler/workspace/bin/ecc ../testfail/fentry-link/fentry-link.bpf.c | |
ls: cannot access '../testfail/fentry-link/fentry-link.h': No such file or directory | |
Compiling bpf object... | |
Packing ebpf object and config into ../testfail/fentry-link/package.json... | |
sudo timeout --preserve-status -s 2 2 ./ecli run ../testfail/fentry-link/package.json | |
arg: ../testfail/fentry-link/package.json | |
libbpf: prog 'do_unlinkat': failed to attach: ERROR: strerror_r(-524)=22 | |
libbpf: prog 'do_unlinkat': failed to auto-attach: -524 | |
failed to attach skeleton | |
Error: BpfError("load and attach ebpf program failed") | |
make: *** [Makefile:27: fentry-link] Error 1 | |
riro@ubuntu:~/eunomia-bpf/examples/tests$ make test | |
ls ../testfail/bootstrap/bootstrap.h && ../../compiler/workspace/bin/ecc ../testfail/bootstrap/bootstrap.bpf.c ../testfail/bootstrap/bootstrap.h \ | |
|| ../../compiler/workspace/bin/ecc ../testfail/bootstrap/bootstrap.bpf.c | |
../testfail/bootstrap/bootstrap.h | |
Compiling bpf object... | |
Generating export types... | |
Packing ebpf object and config into ../testfail/bootstrap/package.json... | |
sudo timeout --preserve-status -s 2 2 ./ecli run ../testfail/bootstrap/package.json | |
arg: ../testfail/bootstrap/package.json | |
libbpf: prog 'handle_exec': BPF program load failed: Invalid argument | |
libbpf: prog 'handle_exec': -- BEGIN PROG LOAD LOG -- | |
R1 type=ctx expected=fp | |
0: R1=ctx(off=0,imm=0) R10=fp0 | |
; int handle_exec(struct trace_event_raw_sched_process_exec *ctx) | |
0: (bf) r6 = r1 ; R1=ctx(off=0,imm=0) R6_w=ctx(off=0,imm=0) | |
; pid = bpf_get_current_pid_tgid() >> 32; | |
1: (85) call bpf_get_current_pid_tgid#14 ; R0_w=scalar() | |
; pid = bpf_get_current_pid_tgid() >> 32; | |
2: (77) r0 >>= 32 ; R0_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff)) | |
; pid = bpf_get_current_pid_tgid() >> 32; | |
3: (63) *(u32 *)(r10 -4) = r0 ; R0_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff)) R10=fp0 fp-8=mmmm???? | |
; ts = bpf_ktime_get_ns(); | |
4: (85) call bpf_ktime_get_ns#5 ; R0_w=scalar() | |
; ts = bpf_ktime_get_ns(); | |
5: (7b) *(u64 *)(r10 -16) = r0 ; R0_w=scalar() R10=fp0 fp-16_w=mmmmmmmm | |
6: (bf) r2 = r10 ; R2_w=fp0 R10=fp0 | |
; | |
7: (07) r2 += -4 ; R2_w=fp-4 | |
8: (bf) r3 = r10 ; R3_w=fp0 R10=fp0 | |
9: (07) r3 += -16 ; R3_w=fp-16 | |
; bpf_map_update_elem(&exec_start, &pid, &ts, BPF_ANY); | |
10: (18) r1 = 0xffffaf8094076c00 ; R1_w=map_ptr(off=0,ks=4,vs=8,imm=0) | |
12: (b7) r4 = 0 ; R4_w=0 | |
13: (85) call bpf_map_update_elem#2 ; R0=scalar() | |
; if (min_duration_ns) | |
14: (18) r1 = 0xffff8f80006bc000 ; R1_w=map_value(off=0,ks=4,vs=8,imm=0) | |
16: (79) r1 = *(u64 *)(r1 +0) ; R1_w=0 | |
; if (min_duration_ns) | |
17: (55) if r1 != 0x0 goto pc+43 ; R1_w=P0 | |
18: (b7) r8 = 0 ; R8_w=0 | |
; e = bpf_ringbuf_reserve(&rb, sizeof(*e), 0); | |
19: (18) r1 = 0xffffaf809b1a9600 ; R1_w=map_ptr(off=0,ks=0,vs=0,imm=0) | |
21: (b7) r2 = 168 ; R2_w=168 | |
22: (b7) r3 = 0 ; R3_w=0 | |
23: (85) call bpf_ringbuf_reserve#131 ; R0=alloc_mem_or_null(id=2,ref_obj_id=2,off=0,imm=0) refs=2 | |
24: (bf) r7 = r0 ; R0=alloc_mem_or_null(id=2,ref_obj_id=2,off=0,imm=0) R7_w=alloc_mem_or_null(id=2,ref_obj_id=2,off=0,imm=0) refs=2 | |
; if (!e) | |
25: (15) if r7 == 0x0 goto pc+35 ; R7_w=alloc_mem(ref_obj_id=2,off=0,imm=0) refs=2 | |
; task = (struct task_struct *)bpf_get_current_task(); | |
26: (85) call bpf_get_current_task#35 ; R0_w=scalar() refs=2 | |
; e->exit_event = false; | |
27: (73) *(u8 *)(r7 +167) = r8 ; R7_w=alloc_mem(ref_obj_id=2,off=0,imm=0) R8=0 refs=2 | |
; e->pid = pid; | |
28: (61) r1 = *(u32 *)(r10 -4) ; R1_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff)) R10=fp0 refs=2 | |
; e->pid = pid; | |
29: (63) *(u32 *)(r7 +0) = r1 ; R1_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff)) R7_w=alloc_mem(ref_obj_id=2,off=0,imm=0) refs=2 | |
30: (b7) r1 = 1432 ; R1_w=1432 refs=2 | |
31: (0f) r0 += r1 ; R0_w=scalar() R1_w=1432 refs=2 | |
32: (bf) r1 = r10 ; R1_w=fp0 R10=fp0 refs=2 | |
; task = (struct task_struct *)bpf_get_current_task(); | |
33: (07) r1 += -32 ; R1_w=fp-32 refs=2 | |
; e->ppid = BPF_CORE_READ(task, real_parent, tgid); | |
34: (b7) r2 = 8 ; R2_w=8 refs=2 | |
35: (bf) r3 = r0 ; R0_w=scalar(id=3) R3_w=scalar(id=3) refs=2 | |
36: (85) call bpf_probe_read_kernel#113 ; R0=scalar() fp-32=mmmmmmmm refs=2 | |
37: (b7) r1 = 1420 ; R1_w=1420 refs=2 | |
38: (79) r3 = *(u64 *)(r10 -32) ; R3_w=scalar() R10=fp0 refs=2 | |
39: (0f) r3 += r1 ; R1_w=1420 R3_w=scalar() refs=2 | |
40: (bf) r1 = r10 ; R1_w=fp0 R10=fp0 refs=2 | |
; task = (struct task_struct *)bpf_get_current_task(); | |
41: (07) r1 += -20 ; R1_w=fp-20 refs=2 | |
; e->ppid = BPF_CORE_READ(task, real_parent, tgid); | |
42: (b7) r2 = 4 ; R2_w=4 refs=2 | |
43: (85) call bpf_probe_read_kernel#113 ; R0_w=scalar() fp-24=mmmm???? refs=2 | |
; e->ppid = BPF_CORE_READ(task, real_parent, tgid); | |
44: (61) r1 = *(u32 *)(r10 -20) ; R1_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff)) R10=fp0 refs=2 | |
; e->ppid = BPF_CORE_READ(task, real_parent, tgid); | |
45: (63) *(u32 *)(r7 +4) = r1 ; R1_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff)) R7=alloc_mem(ref_obj_id=2,off=0,imm=0) refs=2 | |
; bpf_get_current_comm(&e->comm, sizeof(e->comm)); | |
46: (bf) r1 = r7 ; R1_w=alloc_mem(ref_obj_id=2,off=0,imm=0) R7=alloc_mem(ref_obj_id=2,off=0,imm=0) refs=2 | |
47: (07) r1 += 24 ; R1_w=alloc_mem(ref_obj_id=2,off=24,imm=0) refs=2 | |
; bpf_get_current_comm(&e->comm, sizeof(e->comm)); | |
48: (b7) r2 = 16 ; R2_w=16 refs=2 | |
49: (85) call bpf_get_current_comm#16 ; R0=scalar() refs=2 | |
; fname_off = ctx->__data_loc_filename & 0xFFFF; | |
50: (61) r1 = *(u32 *)(r6 +8) ; R1_w=scalar(umax=4294967295,var_off=(0x0; 0xffffffff)) R6=ctx(off=0,imm=0) refs=2 | |
; bpf_probe_read_str(&e->filename, sizeof(e->filename), (void *)ctx + fname_off); | |
51: (57) r1 &= 65535 ; R1_w=scalar(umax=65535,var_off=(0x0; 0xffff)) refs=2 | |
52: (0f) r6 += r1 ; R1_w=Pscalar(umax=65535,var_off=(0x0; 0xffff)) R6_w=ctx(off=0,umax=65535,var_off=(0x0; 0xffff)) refs=2 | |
; bpf_probe_read_str(&e->filename, sizeof(e->filename), (void *)ctx + fname_off); | |
53: (bf) r1 = r7 ; R1_w=alloc_mem(ref_obj_id=2,off=0,imm=0) R7=alloc_mem(ref_obj_id=2,off=0,imm=0) refs=2 | |
54: (07) r1 += 40 ; R1_w=alloc_mem(ref_obj_id=2,off=40,imm=0) refs=2 | |
; bpf_probe_read_str(&e->filename, sizeof(e->filename), (void *)ctx + fname_off); | |
55: (b7) r2 = 127 ; R2_w=127 refs=2 | |
56: (bf) r3 = r6 ; R3_w=ctx(off=0,umax=65535,var_off=(0x0; 0xffff)) R6_w=ctx(off=0,umax=65535,var_off=(0x0; 0xffff)) refs=2 | |
57: (85) call bpf_probe_read_str#45 | |
unknown func bpf_probe_read_str#45 | |
processed 55 insns (limit 1000000) max_states_per_insn 0 total_states 4 peak_states 4 mark_read 4 | |
-- END PROG LOAD LOG -- | |
libbpf: prog 'handle_exec': failed to load: -22 | |
libbpf: failed to load object 'bootstrap_bpf' | |
libbpf: failed to load BPF skeleton 'bootstrap_bpf': -22 | |
failed to load skeleton | |
Error: BpfError("load and attach ebpf program failed") | |
make: *** [Makefile:27: bootstrap] Error 1 | |
<warnings>... | |
/tmp/eunomia.plvGF7/include/vmlinux/riscv/vmlinux.h:5:46: warning: unknown attribute 'preserve_access_index' ignored [-Wunknown-attributes] | |
/tmp/eunomia.plvGF7/include/vmlinux/riscv/vmlinux.h:110551:9: note: when applied to this declaration | |
/home/riro/eunomia-bpf/examples/testfail/mdflush/core_fixes.h:18:18: warning: unknown attribute 'preserve_access_index' ignored [-Wunknown-attributes] | |
/home/riro/eunomia-bpf/examples/testfail/mdflush/core_fixes.h:22:18: warning: unknown attribute 'preserve_access_index' ignored [-Wunknown-attributes] | |
/home/riro/eunomia-bpf/examples/testfail/mdflush/core_fixes.h:28:6: error: use of unknown builtin '__builtin_preserve_field_info' [-Wimplicit-function-declaration] | |
Generating export types... | |
Packing ebpf object and config into ../testfail/mdflush/package.json... | |
sudo timeout --preserve-status -s 2 2 ./ecli run ../testfail/mdflush/package.json | |
arg: ../testfail/mdflush/package.json | |
libbpf: prog 'md_flush_request': failed to attach: ERROR: strerror_r(-524)=22 | |
libbpf: prog 'md_flush_request': failed to auto-attach: -524 | |
failed to attach skeleton | |
Error: BpfError("load and attach ebpf program failed") | |
make: *** [Makefile:27: mdflush] Error 1 | |
ls ../testfail/lsm-connect/lsm-connect.h && ../../compiler/workspace/bin/ecc ../testfail/lsm-connect/lsm-connect.bpf.c ../testfail/lsm-connect/lsm-connect.h \ | |
|| ../../compiler/workspace/bin/ecc ../testfail/lsm-connect/lsm-connect.bpf.c | |
ls: cannot access '../testfail/lsm-connect/lsm-connect.h': No such file or directory | |
Compiling bpf object... | |
Packing ebpf object and config into ../testfail/lsm-connect/package.json... | |
sudo timeout --preserve-status -s 2 2 ./ecli run ../testfail/lsm-connect/package.json | |
arg: ../testfail/lsm-connect/package.json | |
unknown type: __u32 | |
libbpf: prog 'restrict_connect': failed to attach: ERROR: strerror_r(-524)=22 | |
libbpf: prog 'restrict_connect': failed to auto-attach: -524 | |
failed to attach skeleton | |
Error: BpfError("load and attach ebpf program failed") | |
make: *** [Makefile:27: lsm-connect] Error 1 | |
ls ../bpftools/opensnoop/opensnoop.h && ../../compiler/workspace/bin/ecc ../bpftools/opensnoop/opensnoop.bpf.c ../bpftools/opensnoop/opensnoop.h \ | |
|| ../../compiler/workspace/bin/ecc ../bpftools/opensnoop/opensnoop.bpf.c | |
../bpftools/opensnoop/opensnoop.h | |
Compiling bpf object... | |
warning: text is not json: Process ID to trace use it as a string | |
warning: text is not json: Thread ID to trace use it as a string | |
warning: text is not json: User ID to trace use it as a string | |
warning: text is not json: trace only failed events use it as a string | |
warning: text is not json: Trace open family syscalls. use it as a string | |
Generating export types... | |
Packing ebpf object and config into ../bpftools/opensnoop/package.json... | |
sudo timeout --preserve-status -s 2 2 ./ecli run ../bpftools/opensnoop/package.json | |
arg: ../bpftools/opensnoop/package.json | |
libbpf: failed to determine tracepoint 'syscalls/sys_enter_open' perf event ID: No such file or directory | |
libbpf: prog 'tracepoint__syscalls__sys_enter_open': failed to create tracepoint 'syscalls/sys_enter_open' perf event: No such file or directory | |
libbpf: prog 'tracepoint__syscalls__sys_enter_open': failed to auto-attach: -2 | |
failed to attach skeleton | |
Error: BpfError("load and attach ebpf program failed") | |
make: *** [Makefile:27: opensnoop] Error 1 |
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment