[15:46:55][root@168.mr1370_220926_1234.el9.ppc64le]# './test_progs -t kfree_skb' serial_test_kfree_skb:PASS:prog_load sched cls 0 nsec serial_test_kfree_skb:PASS:kfree_skb_skel 0 nsec serial_test_kfree_skb:PASS:attach_raw_tp 0 nsec libbpf: prog 'fentry_eth_type_trans': failed to attach: ERROR: strerror_r(-524)=22 serial_test_kfree_skb:FAIL:attach fentry unexpected error: -524 #68 kfree_skb:FAIL All error logs: #68 kfree_skb:FAIL serial_test_kfree_skb:PASS:prog_load sched cls 0 nsec serial_test_kfree_skb:PASS:kfree_skb_skel 0 nsec serial_test_kfree_skb:PASS:attach_raw_tp 0 nsec libbpf: prog 'fentry_eth_type_trans': failed to attach: ERROR: strerror_r(-524)=22 serial_test_kfree_skb:FAIL:attach fentry unexpected error: -524 Summary: 0/0 PASSED, 0 SKIPPED, 1 FAILED :: [ FAIL ] :: Command './test_progs -t kfree_skb' (Expected 0, got 1, score 21) [15:46:55][root@168.mr1370_220926_1234.el9.ppc64le]# './test_progs -vv -t kfree_skb' bpf_testmod.ko is already unloaded. Loading bpf_testmod.ko... Successfully loaded bpf_testmod.ko. libbpf: loading ./test_pkt_access.o libbpf: elf: section(1) .text, size 1256, link 0, flags 6, type=1 libbpf: sec '.text': found program 'test_pkt_access_subprog1' at insn offset 151 (1208 bytes), code size 3 insns (24 bytes) libbpf: sec '.text': found program 'test_pkt_access_subprog2' at insn offset 154 (1232 bytes), code size 3 insns (24 bytes) libbpf: sec '.text': found program 'get_skb_len' at insn offset 0 (0 bytes), code size 59 insns (472 bytes) libbpf: sec '.text': found program 'get_constant' at insn offset 59 (472 bytes), code size 3 insns (24 bytes) libbpf: sec '.text': found program 'test_pkt_access_subprog3' at insn offset 62 (496 bytes), code size 13 insns (104 bytes) libbpf: sec '.text': found program 'get_skb_ifindex' at insn offset 75 (600 bytes), code size 62 insns (496 bytes) libbpf: sec '.text': found program 'test_pkt_write_access_subprog' at insn offset 137 (1096 bytes), code size 14 insns (112 bytes) libbpf: elf: section(2) .rel.text, size 48, link 9, flags 40, type=9 libbpf: elf: section(3) tc, size 640, link 0, flags 6, type=1 libbpf: sec 'tc': found program 'test_pkt_access' at insn offset 0 (0 bytes), code size 80 insns (640 bytes) libbpf: elf: section(4) .reltc, size 64, link 9, flags 40, type=9 libbpf: elf: section(5) .BTF, size 3113, link 0, flags 0, type=1 libbpf: elf: section(6) .BTF.ext, size 1352, link 0, flags 0, type=1 libbpf: elf: section(9) .symtab, size 456, link 10, flags 0, type=2 libbpf: looking for externs among 19 symbols... libbpf: collected 0 externs total libbpf: sec '.rel.text': collecting relocation for section(1) '.text' libbpf: sec '.rel.text': relo #0: insn #65 against 'get_skb_len' libbpf: sec '.rel.text': relo #1: insn #68 against 'get_constant' libbpf: sec '.rel.text': relo #2: insn #72 against 'get_skb_ifindex' libbpf: sec '.reltc': collecting relocation for section(3) 'tc' libbpf: sec '.reltc': relo #0: insn #35 against '.text' libbpf: sec '.reltc': relo #1: insn #41 against '.text' libbpf: sec '.reltc': relo #2: insn #49 against 'test_pkt_access_subprog3' libbpf: sec '.reltc': relo #3: insn #61 against 'test_pkt_write_access_subprog' libbpf: prog 'test_pkt_access': added 3 insns from sub-prog 'test_pkt_access_subprog1' libbpf: prog 'test_pkt_access': insn #35 relocated, imm 44 points to subprog 'test_pkt_access_subprog1' (now at 80 offset) libbpf: prog 'test_pkt_access': added 3 insns from sub-prog 'test_pkt_access_subprog2' libbpf: prog 'test_pkt_access': insn #41 relocated, imm 41 points to subprog 'test_pkt_access_subprog2' (now at 83 offset) libbpf: prog 'test_pkt_access': added 13 insns from sub-prog 'test_pkt_access_subprog3' libbpf: prog 'test_pkt_access': added 59 insns from sub-prog 'get_skb_len' libbpf: prog 'test_pkt_access_subprog3': insn #3 relocated, imm 9 points to subprog 'get_skb_len' (now at 99 offset) libbpf: prog 'test_pkt_access': added 3 insns from sub-prog 'get_constant' libbpf: prog 'test_pkt_access_subprog3': insn #6 relocated, imm 65 points to subprog 'get_constant' (now at 158 offset) libbpf: prog 'test_pkt_access': added 62 insns from sub-prog 'get_skb_ifindex' libbpf: prog 'test_pkt_access_subprog3': insn #10 relocated, imm 64 points to subprog 'get_skb_ifindex' (now at 161 offset) libbpf: prog 'test_pkt_access': insn #49 relocated, imm 36 points to subprog 'test_pkt_access_subprog3' (now at 86 offset) libbpf: prog 'test_pkt_access': added 14 insns from sub-prog 'test_pkt_write_access_subprog' libbpf: prog 'test_pkt_access': insn #61 relocated, imm 161 points to subprog 'test_pkt_write_access_subprog' (now at 223 offset) libbpf: prog 'test_pkt_access': -- BEGIN PROG LOAD LOG -- processed 356 insns (limit 1000000) max_states_per_insn 2 total_states 25 peak_states 25 mark_read 5 -- END PROG LOAD LOG -- serial_test_kfree_skb:PASS:prog_load sched cls 0 nsec libbpf: loading object 'kfree_skb' from buffer libbpf: elf: section(2) .symtab, size 480, link 1, flags 0, type=2 libbpf: elf: section(3) tp_btf/kfree_skb, size 696, link 0, flags 6, type=1 libbpf: sec 'tp_btf/kfree_skb': found program 'trace_kfree_skb' at insn offset 0 (0 bytes), code size 87 insns (696 bytes) libbpf: elf: section(4) fentry/eth_type_trans, size 96, link 0, flags 6, type=1 libbpf: sec 'fentry/eth_type_trans': found program 'fentry_eth_type_trans' at insn offset 0 (0 bytes), code size 12 insns (96 bytes) libbpf: elf: section(5) fexit/eth_type_trans, size 120, link 0, flags 6, type=1 libbpf: sec 'fexit/eth_type_trans': found program 'fexit_eth_type_trans' at insn offset 0 (0 bytes), code size 15 insns (120 bytes) libbpf: elf: section(6) license, size 4, link 0, flags 3, type=1 libbpf: license of kfree_skb is GPL libbpf: elf: section(7) .bss, size 2, link 0, flags 3, type=8 libbpf: elf: section(8) .maps, size 24, link 0, flags 3, type=1 libbpf: elf: section(9) .rodata, size 145, link 0, flags 2, type=1 libbpf: elf: section(10) .reltp_btf/kfree_skb, size 96, link 2, flags 40, type=9 libbpf: elf: section(11) .relfentry/eth_type_trans, size 16, link 2, flags 40, type=9 libbpf: elf: section(12) .relfexit/eth_type_trans, size 16, link 2, flags 40, type=9 libbpf: elf: section(13) .BTF, size 3350, link 0, flags 0, type=1 libbpf: elf: section(14) .BTF.ext, size 1036, link 0, flags 0, type=1 libbpf: looking for externs among 20 symbols... libbpf: collected 0 externs total libbpf: map 'perf_buf_map': at sec_idx 8, offset 0. libbpf: map 'perf_buf_map': found type = 4. libbpf: map 'perf_buf_map': found key [2], sz = 4. libbpf: map 'perf_buf_map': found value [2], sz = 4. libbpf: map 'kfree_sk.bss' (global data): at sec_idx 7, offset 0, flags 400. libbpf: map 1 is "kfree_sk.bss" libbpf: map 'kfree_sk.rodata' (global data): at sec_idx 9, offset 0, flags 480. libbpf: map 2 is "kfree_sk.rodata" libbpf: sec '.reltp_btf/kfree_skb': collecting relocation for section(3) 'tp_btf/kfree_skb' libbpf: sec '.reltp_btf/kfree_skb': relo #0: insn #38 against '.rodata' libbpf: prog 'trace_kfree_skb': found data map 2 (kfree_sk.rodata, sec 9, off 0) for insn 38 libbpf: sec '.reltp_btf/kfree_skb': relo #1: insn #48 against '.rodata' libbpf: prog 'trace_kfree_skb': found data map 2 (kfree_sk.rodata, sec 9, off 0) for insn 48 libbpf: sec '.reltp_btf/kfree_skb': relo #2: insn #55 against '.rodata' libbpf: prog 'trace_kfree_skb': found data map 2 (kfree_sk.rodata, sec 9, off 0) for insn 55 libbpf: sec '.reltp_btf/kfree_skb': relo #3: insn #60 against '.rodata' libbpf: prog 'trace_kfree_skb': found data map 2 (kfree_sk.rodata, sec 9, off 0) for insn 60 libbpf: sec '.reltp_btf/kfree_skb': relo #4: insn #66 against '.rodata' libbpf: prog 'trace_kfree_skb': found data map 2 (kfree_sk.rodata, sec 9, off 0) for insn 66 libbpf: sec '.reltp_btf/kfree_skb': relo #5: insn #79 against 'perf_buf_map' libbpf: prog 'trace_kfree_skb': found map 0 (perf_buf_map, sec 8, off 0) for insn #79 libbpf: sec '.relfentry/eth_type_trans': collecting relocation for section(4) 'fentry/eth_type_trans' libbpf: sec '.relfentry/eth_type_trans': relo #0: insn #6 against 'result' libbpf: prog 'fentry_eth_type_trans': found data map 1 (kfree_sk.bss, sec 7, off 0) for insn 6 libbpf: sec '.relfexit/eth_type_trans': collecting relocation for section(5) 'fexit/eth_type_trans' libbpf: sec '.relfexit/eth_type_trans': relo #0: insn #9 against 'result' libbpf: prog 'fexit_eth_type_trans': found data map 1 (kfree_sk.bss, sec 7, off 0) for insn 9 libbpf: loading kernel BTF '/sys/kernel/btf/vmlinux': 0 libbpf: map 'perf_buf_map': setting size to 8 libbpf: map 'perf_buf_map': created successfully, fd=7 libbpf: map 'kfree_sk.bss': created successfully, fd=8 libbpf: map 'kfree_sk.rodata': created successfully, fd=9 libbpf: sec 'tp_btf/kfree_skb': found 11 CO-RE relocations libbpf: CO-RE relocating [12] struct sk_buff: found target candidate [2353] struct sk_buff in [vmlinux] libbpf: prog 'trace_kfree_skb': relo #0: kind (0), spec is [12] struct sk_buff.dev (0:5 @ offset 16) libbpf: prog 'trace_kfree_skb': relo #0: matching candidate #0 [2353] struct sk_buff.dev (0:0:0:2:0 @ offset 16) libbpf: prog 'trace_kfree_skb': relo #0: patched insn #3 (LDX/ST/STX) off 16 -> 16 libbpf: CO-RE relocating [26] struct net_device: found target candidate [2937] struct net_device in [vmlinux] libbpf: prog 'trace_kfree_skb': relo #1: kind (0), spec is [26] struct net_device.ifalias (0:1 @ offset 8) libbpf: prog 'trace_kfree_skb': relo #1: matching candidate #0 [2937] struct net_device.ifalias (0:2 @ offset 24) libbpf: prog 'trace_kfree_skb': relo #1: patched insn #4 (LDX/ST/STX) off 8 -> 24 libbpf: prog 'trace_kfree_skb': relo #2: kind (0), spec is [12] struct sk_buff.cb (0:9 @ offset 40) libbpf: prog 'trace_kfree_skb': relo #2: matching candidate #0 [2353] struct sk_buff.cb (0:3 @ offset 40) libbpf: prog 'trace_kfree_skb': relo #2: patched insn #5 (ALU/ALU64) imm 40 -> 40 libbpf: prog 'trace_kfree_skb': relo #3: kind (0), spec is [12] struct sk_buff.users.refs.counter (0:6:0:0 @ offset 24) libbpf: prog 'trace_kfree_skb': relo #3: matching candidate #0 [2353] struct sk_buff.users.refs.counter (0:77:0:0 @ offset 212) libbpf: prog 'trace_kfree_skb': relo #3: patched insn #6 (LDX/ST/STX) off 24 -> 212 libbpf: prog 'trace_kfree_skb': relo #4: kind (0), spec is [12] struct sk_buff.data (0:7 @ offset 32) libbpf: prog 'trace_kfree_skb': relo #4: matching candidate #0 [2353] struct sk_buff.data (0:75 @ offset 200) libbpf: prog 'trace_kfree_skb': relo #4: patched insn #8 (LDX/ST/STX) off 32 -> 200 libbpf: CO-RE relocating [28] struct dev_ifalias: found target candidate [3237] struct dev_ifalias in [vmlinux] libbpf: prog 'trace_kfree_skb': relo #5: kind (0), spec is [28] struct dev_ifalias.rcuhead.next (0:0:0 @ offset 0) libbpf: prog 'trace_kfree_skb': relo #5: matching candidate #0 [3237] struct dev_ifalias.rcuhead.next (0:0:0 @ offset 0) libbpf: prog 'trace_kfree_skb': relo #5: patched insn #11 (LDX/ST/STX) off 0 -> 0 libbpf: CO-RE relocating [29] struct callback_head: found target candidate [92] struct callback_head in [vmlinux] libbpf: prog 'trace_kfree_skb': relo #6: kind (0), spec is [29] struct callback_head.func (0:1 @ offset 8) libbpf: prog 'trace_kfree_skb': relo #6: matching candidate #0 [92] struct callback_head.func (0:1 @ offset 8) libbpf: prog 'trace_kfree_skb': relo #6: patched insn #12 (LDX/ST/STX) off 8 -> 8 libbpf: prog 'trace_kfree_skb': relo #7: kind (0), spec is [26] struct net_device.ifindex (0:0 @ offset 0) libbpf: prog 'trace_kfree_skb': relo #7: matching candidate #0 [2937] struct net_device.ifindex (0:17 @ offset 208) libbpf: prog 'trace_kfree_skb': relo #7: patched insn #14 (LDX/ST/STX) off 0 -> 208 libbpf: prog 'trace_kfree_skb': relo #8: kind (0), spec is [12] struct sk_buff.__pkt_type_offset (0:8 @ offset 40) libbpf: prog 'trace_kfree_skb': relo #8: matching candidate #0 [2353] struct sk_buff.__pkt_type_offset (0:21 @ offset 128) libbpf: prog 'trace_kfree_skb': relo #8: patched insn #22 (ALU/ALU64) imm 40 -> 128 libbpf: prog 'trace_kfree_skb': relo #9: kind (0), spec is [12] struct sk_buff.len (0:0 @ offset 0) libbpf: prog 'trace_kfree_skb': relo #9: matching candidate #0 [2353] struct sk_buff.len (0:6 @ offset 112) libbpf: prog 'trace_kfree_skb': relo #9: patched insn #44 (LDX/ST/STX) off 0 -> 112 libbpf: prog 'trace_kfree_skb': relo #10: kind (0), spec is [12] struct sk_buff.queue_mapping (0:4 @ offset 12) libbpf: prog 'trace_kfree_skb': relo #10: matching candidate #0 [2353] struct sk_buff.queue_mapping (0:10 @ offset 124) libbpf: prog 'trace_kfree_skb': relo #10: patched insn #54 (LDX/ST/STX) off 12 -> 124 libbpf: sec 'fentry/eth_type_trans': found 2 CO-RE relocations libbpf: prog 'fentry_eth_type_trans': relo #0: kind (0), spec is [26] struct net_device.ifindex (0:0 @ offset 0) libbpf: prog 'fentry_eth_type_trans': relo #0: matching candidate #0 [2937] struct net_device.ifindex (0:17 @ offset 208) libbpf: prog 'fentry_eth_type_trans': relo #0: patched insn #2 (LDX/ST/STX) off 0 -> 208 libbpf: prog 'fentry_eth_type_trans': relo #1: kind (0), spec is [12] struct sk_buff.len (0:0 @ offset 0) libbpf: prog 'fentry_eth_type_trans': relo #1: matching candidate #0 [2353] struct sk_buff.len (0:6 @ offset 112) libbpf: prog 'fentry_eth_type_trans': relo #1: patched insn #3 (LDX/ST/STX) off 0 -> 112 libbpf: sec 'fexit/eth_type_trans': found 2 CO-RE relocations libbpf: prog 'fexit_eth_type_trans': relo #0: kind (0), spec is [26] struct net_device.ifindex (0:0 @ offset 0) libbpf: prog 'fexit_eth_type_trans': relo #0: matching candidate #0 [2937] struct net_device.ifindex (0:17 @ offset 208) libbpf: prog 'fexit_eth_type_trans': relo #0: patched insn #2 (LDX/ST/STX) off 0 -> 208 libbpf: prog 'fexit_eth_type_trans': relo #1: kind (0), spec is [12] struct sk_buff.len (0:0 @ offset 0) libbpf: prog 'fexit_eth_type_trans': relo #1: matching candidate #0 [2353] struct sk_buff.len (0:6 @ offset 112) libbpf: prog 'fexit_eth_type_trans': relo #1: patched insn #3 (LDX/ST/STX) off 0 -> 112 serial_test_kfree_skb:PASS:kfree_skb_skel 0 nsec serial_test_kfree_skb:PASS:attach_raw_tp 0 nsec libbpf: prog 'fentry_eth_type_trans': failed to attach: ERROR: strerror_r(-524)=22 serial_test_kfree_skb:FAIL:attach fentry unexpected error: -524 #68 kfree_skb:FAIL All error logs: #68 kfree_skb:FAIL Summary: 0/0 PASSED, 0 SKIPPED, 1 FAILED Successfully unloaded bpf_testmod.ko. :: [ FAIL ] :: Command './test_progs -vv -t kfree_skb' (Expected 0, got 1, score 21) [15:46:56][root@168.mr1370_220926_1234.el9.ppc64le]# './test_progs-no_alu32 -t kfree_skb' serial_test_kfree_skb:PASS:prog_load sched cls 0 nsec serial_test_kfree_skb:PASS:kfree_skb_skel 0 nsec serial_test_kfree_skb:PASS:attach_raw_tp 0 nsec libbpf: prog 'fentry_eth_type_trans': failed to attach: ERROR: strerror_r(-524)=22 serial_test_kfree_skb:FAIL:attach fentry unexpected error: -524 #68 kfree_skb:FAIL All error logs: #68 kfree_skb:FAIL serial_test_kfree_skb:PASS:prog_load sched cls 0 nsec serial_test_kfree_skb:PASS:kfree_skb_skel 0 nsec serial_test_kfree_skb:PASS:attach_raw_tp 0 nsec libbpf: prog 'fentry_eth_type_trans': failed to attach: ERROR: strerror_r(-524)=22 serial_test_kfree_skb:FAIL:attach fentry unexpected error: -524 Summary: 0/0 PASSED, 0 SKIPPED, 1 FAILED :: [ FAIL ] :: Command './test_progs-no_alu32 -t kfree_skb' (Expected 0, got 1, score 21) === Dmesg result === :: [ FAIL ] :: Test '68..224 selftests: bpf_test_progs:kfree_skb [FAIL]'