linux-stable/tools/testing/selftests/bpf
Linus Torvalds 7475e51b87 Including fixes from BPF and netfilter.
Current release - regressions:
 
  - core: fix undefined behavior in netdev name allocation
 
  - bpf: do not allocate percpu memory at init stage
 
  - netfilter: nf_tables: split async and sync catchall in two functions
 
  - mptcp: fix possible NULL pointer dereference on close
 
 Current release - new code bugs:
 
  - eth: ice: dpll: fix initial lock status of dpll
 
 Previous releases - regressions:
 
  - bpf: fix precision backtracking instruction iteration
 
  - af_unix: fix use-after-free in unix_stream_read_actor()
 
  - tipc: fix kernel-infoleak due to uninitialized TLV value
 
  - eth: bonding: stop the device in bond_setup_by_slave()
 
  - eth: mlx5:
    - fix double free of encap_header
    - avoid referencing skb after free-ing in drop path
 
  - eth: hns3: fix VF reset
 
  - eth: mvneta: fix calls to page_pool_get_stats
 
 Previous releases - always broken:
 
  - core: set SOCK_RCU_FREE before inserting socket into hashtable
 
  - bpf: fix control-flow graph checking in privileged mode
 
  - eth: ppp: limit MRU to 64K
 
  - eth: stmmac: avoid rx queue overrun
 
  - eth: icssg-prueth: fix error cleanup on failing initialization
 
  - eth: hns3: fix out-of-bounds access may occur when coalesce info is
  	      read via debugfs
 
  - eth: cortina: handle large frames
 
 Misc:
 
  - selftests: gso: support CONFIG_MAX_SKB_FRAGS up to 45
 
 Signed-off-by: Paolo Abeni <pabeni@redhat.com>
 -----BEGIN PGP SIGNATURE-----
 
 iQJGBAABCAAwFiEEg1AjqC77wbdLX2LbKSR5jcyPE6QFAmVV9akSHHBhYmVuaUBy
 ZWRoYXQuY29tAAoJECkkeY3MjxOkICMP/1+QHUaD4JG1mW9oYc2zINPfQl3dqQt3
 2CGSE2yrtbQvyQl39BDa0WFzV5X6So6/U50twhTNM+UAJsCaOvxCUDvUP9eY9Dcm
 z2H4oITZimyP4CEb3l7JpL2PImvfImL7D/fCPPMUZVzNY6dkEFznaQrnawbJz4gg
 mZXDnjwIXq7OchoJy3dHzyOn4ZQj2Df5VcfBzkVMdMcwV55Sd5JezbhwJ6NOmnKA
 uoXlq4pFYj3ahAhEQfLWUwXmF3e6esHs/WUCMe5FR9YkanJlu4oHUmY3RLzfcdQA
 PPIPDRxOzthcXyymqvqs7gnZ3ruMUll4B7tGTVFpJch8ts+DwGdUyBIIoDd/1BUT
 gmjipP5HPia3Qdtk3Jc4vMkcf5AwoGo0hXku7YYJ1K7+4+t8ep3/hDbQc0PLWX6J
 afiQgqpnNXHSTqBO5zl91vSwhGr/AAtAkDlPnsQL/RDAxY4teIwxHuoMvwPWaHZJ
 sMo5ZcHXvNnBbGhpozFtmrnbf1nduUrQmW5LkJViCLf25Sj6pDYbo8WnhMuOKSnZ
 7an2YqniCgBtrX4MEVn2jsWgavI+SxndVIQR04u0uwqmP+dn8s9LUfjKKDtPWHsK
 +zMFtk+Op03TW5ur9w3+dgrGH0cLogPO3BJkho7xXKBfZ6/tN/pOef3/nV9xY6g8
 JjnBUdpZRTWI
 =VjWw
 -----END PGP SIGNATURE-----

Merge tag 'net-6.7-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net

Pull networking fixes from Paolo Abeni:
 "Including fixes from BPF and netfilter.

  Current release - regressions:

   - core: fix undefined behavior in netdev name allocation

   - bpf: do not allocate percpu memory at init stage

   - netfilter: nf_tables: split async and sync catchall in two
     functions

   - mptcp: fix possible NULL pointer dereference on close

  Current release - new code bugs:

   - eth: ice: dpll: fix initial lock status of dpll

  Previous releases - regressions:

   - bpf: fix precision backtracking instruction iteration

   - af_unix: fix use-after-free in unix_stream_read_actor()

   - tipc: fix kernel-infoleak due to uninitialized TLV value

   - eth: bonding: stop the device in bond_setup_by_slave()

   - eth: mlx5:
      - fix double free of encap_header
      - avoid referencing skb after free-ing in drop path

   - eth: hns3: fix VF reset

   - eth: mvneta: fix calls to page_pool_get_stats

  Previous releases - always broken:

   - core: set SOCK_RCU_FREE before inserting socket into hashtable

   - bpf: fix control-flow graph checking in privileged mode

   - eth: ppp: limit MRU to 64K

   - eth: stmmac: avoid rx queue overrun

   - eth: icssg-prueth: fix error cleanup on failing initialization

   - eth: hns3: fix out-of-bounds access may occur when coalesce info is
     read via debugfs

   - eth: cortina: handle large frames

  Misc:

   - selftests: gso: support CONFIG_MAX_SKB_FRAGS up to 45"

* tag 'net-6.7-rc2' of git://git.kernel.org/pub/scm/linux/kernel/git/netdev/net: (78 commits)
  macvlan: Don't propagate promisc change to lower dev in passthru
  net: sched: do not offload flows with a helper in act_ct
  net/mlx5e: Check return value of snprintf writing to fw_version buffer for representors
  net/mlx5e: Check return value of snprintf writing to fw_version buffer
  net/mlx5e: Reduce the size of icosq_str
  net/mlx5: Increase size of irq name buffer
  net/mlx5e: Update doorbell for port timestamping CQ before the software counter
  net/mlx5e: Track xmit submission to PTP WQ after populating metadata map
  net/mlx5e: Avoid referencing skb after free-ing in drop path of mlx5e_sq_xmit_wqe
  net/mlx5e: Don't modify the peer sent-to-vport rules for IPSec offload
  net/mlx5e: Fix pedit endianness
  net/mlx5e: fix double free of encap_header in update funcs
  net/mlx5e: fix double free of encap_header
  net/mlx5: Decouple PHC .adjtime and .adjphase implementations
  net/mlx5: DR, Allow old devices to use multi destination FTE
  net/mlx5: Free used cpus mask when an IRQ is released
  Revert "net/mlx5: DR, Supporting inline WQE when possible"
  bpf: Do not allocate percpu memory at init stage
  net: Fix undefined behavior in netdev name allocation
  dt-bindings: net: ethernet-controller: Fix formatting error
  ...
2023-11-16 07:51:26 -05:00
..
benchs selftests/bpf: Clean up fmod_ret in bench_rename test script 2023-08-14 18:43:04 +02:00
bpf_testmod bpf: Add __bpf_hook_{start,end} macros 2023-11-01 22:33:53 -07:00
gnu bpf: Replace deprecated -target with --target= for Clang 2023-06-29 15:46:17 +02:00
map_tests selftests/bpf: fix test_maps' use of bpf_map_create_opts 2023-11-01 22:42:38 -07:00
prog_tests selftests/bpf: precision tracking test for BPF_NEG and BPF_END 2023-11-01 22:54:28 -07:00
progs Including fixes from BPF and netfilter. 2023-11-16 07:51:26 -05:00
verifier bpf: fix control-flow graph checking in privileged mode 2023-11-09 22:57:24 -08:00
.gitignore selftests/bpf: add uprobe_multi test binary to .gitignore 2023-08-23 21:13:48 -07:00
autoconf_helper.h selftests/bpf: Unprivileged tests for test_loader.c 2023-03-25 17:02:02 -07:00
bench.c selftests/bpf: Add benchmark for bpf memory allocator 2023-07-05 18:36:19 -07:00
bench.h selftests/bpf: Move get_time_ns to testing_helpers.h 2023-08-21 15:51:26 -07:00
bpf_experimental.h bpf: Introduce css open-coded iterator kfuncs 2023-10-19 17:02:46 -07:00
bpf_kfuncs.h selftests/bpf: Add tests for cgroup unix socket address hooks 2023-10-11 17:27:55 -07:00
bpf_legacy.h selftests/bpf: Add GCC compatible builtins to bpf_legacy.h 2022-12-02 16:22:28 -08:00
bpf_rand.h
bpf_sockopt_helpers.h
bpf_tcp_helpers.h
bpf_util.h
btf_helpers.c
btf_helpers.h
cap_helpers.c
cap_helpers.h
cgroup_getset_retval_hooks.h
cgroup_helpers.c selftests/bpf: Make sure mount directory exists 2023-10-11 17:27:55 -07:00
cgroup_helpers.h selftests/bpf: Verify that the cgroup_skb filters receive expected packets. 2023-06-30 16:09:27 +02:00
cgroup_tcp_skb.h selftests/bpf: Verify that the cgroup_skb filters receive expected packets. 2023-06-30 16:09:27 +02:00
config selftests/bpf: Add selftests for netkit 2023-10-24 16:07:43 -07:00
config.aarch64 selftests/bpf: add vsock to vmtest.sh 2023-03-29 08:19:38 +01:00
config.s390x selftests/bpf: add vsock to vmtest.sh 2023-03-29 08:19:38 +01:00
config.x86_64 selftests/bpf: ensure all CI arches set CONFIG_BPF_KPROBE_OVERRIDE=y 2023-09-12 07:59:22 -07:00
DENYLIST
DENYLIST.aarch64 selftests/bpf: Add test for recursion counts of perf event link kprobe 2023-09-25 16:37:45 -07:00
DENYLIST.s390x selftests/bpf: Trim DENYLIST.s390x 2023-09-21 14:22:00 -07:00
disasm.c selftests/bpf: Disassembler tests for verifier.c:convert_ctx_access() 2023-03-03 21:41:46 -08:00
disasm.h selftests/bpf: Disassembler tests for verifier.c:convert_ctx_access() 2023-03-03 21:41:46 -08:00
flow_dissector_load.c
flow_dissector_load.h
generate_udp_fragments.py bpf: selftests: Add defrag selftests 2023-07-28 16:52:08 -07:00
get_cgroup_id_user.c selftests/bpf: use canonical ftrace path 2023-03-13 21:51:30 -07:00
ima_setup.sh
ip_check_defrag_frags.h bpf: selftests: Add defrag selftests 2023-07-28 16:52:08 -07:00
json_writer.c selftests/bpf: Add --json-summary option to test_progs 2023-03-17 16:00:33 -07:00
json_writer.h selftests/bpf: Add --json-summary option to test_progs 2023-03-17 16:00:33 -07:00
liburandom_read.map selftests/bpf: Add tests for symbol versioning for uprobe 2023-09-22 14:27:41 -07:00
Makefile selftests/bpf: Add netlink helper library 2023-10-24 16:07:39 -07:00
Makefile.docs
netcnt_common.h selftests/bpf: Increase SIZEOF_BPF_LOCAL_STORAGE_ELEM on s390x 2023-01-28 12:30:08 -08:00
netlink_helpers.c selftests/bpf: Add netlink helper library 2023-10-24 16:07:39 -07:00
netlink_helpers.h selftests/bpf: Add netlink helper library 2023-10-24 16:07:39 -07:00
network_helpers.c selftests/bpf: Add tests for cgroup unix socket address hooks 2023-10-11 17:27:55 -07:00
network_helpers.h selftests/bpf: Add tests for cgroup unix socket address hooks 2023-10-11 17:27:55 -07:00
README.rst
sdt-config.h
sdt.h
settings
task_local_storage_helpers.h
test_bpftool.py
test_bpftool.sh
test_bpftool_build.sh
test_bpftool_metadata.sh
test_bpftool_synctypes.py bpf: Mark BPF_MAP_TYPE_PERCPU_CGROUP_STORAGE deprecated 2023-09-08 08:42:18 -07:00
test_btf.h
test_cgroup_storage.c
test_cpp.cpp Fix typos in selftest/bpf files 2023-02-16 16:56:17 -08:00
test_dev_cgroup.c
test_doc_build.sh
test_flow_dissector.c
test_flow_dissector.sh
test_ftrace.sh selftests/bpf: use canonical ftrace path 2023-03-13 21:51:30 -07:00
test_iptunnel_common.h
test_kmod.sh
test_lirc_mode2.sh
test_lirc_mode2_user.c
test_loader.c selftests/bpf: Fix compiler warnings reported in -O2 mode 2023-10-06 20:17:28 +02:00
test_lpm_map.c
test_lru_map.c
test_lwt_ip_encap.sh
test_lwt_seg6local.sh
test_maps.c selftests/bpf: Use bpf_{btf,link,map,prog}_get_info_by_fd() 2023-02-16 15:32:46 -08:00
test_maps.h
test_offload.py selftests/bpf: Update expected test_offload.py messages 2023-01-23 09:38:10 -08:00
test_progs.c selftests/bpf: Don't truncate #test/subtest field 2023-10-06 20:17:28 +02:00
test_progs.h selftests/bpf: Define SYS_NANOSLEEP_KPROBE_NAME for riscv 2023-10-04 13:19:44 -07:00
test_select_reuseport_common.h
test_skb_cgroup_id.sh
test_skb_cgroup_id_user.c selftests/bpf: Use bpf_{btf,link,map,prog}_get_info_by_fd() 2023-02-16 15:32:46 -08:00
test_sock.c
test_sock_addr.c
test_sock_addr.sh
test_sockmap.c selftests/bpf: Add ingress tests for txmsg with apply_bytes 2022-12-01 01:07:41 +01:00
test_sysctl.c
test_tag.c
test_tc_edt.sh
test_tc_tunnel.sh selftests/bpf: add ipip6 and ip6ip decap to test_tc_tunnel 2023-01-15 12:56:17 -08:00
test_tcp_check_syncookie.sh
test_tcp_check_syncookie_user.c selftests/bpf: Use bpf_{btf,link,map,prog}_get_info_by_fd() 2023-02-16 15:32:46 -08:00
test_tcp_hdr_options.h selftests/bpf: tests for using dynptrs to parse skb and xdp buffers 2023-03-01 10:05:19 -08:00
test_tcpbpf.h
test_tcpnotify.h
test_tcpnotify_user.c
test_tunnel.sh selftests/bpf: use canonical ftrace path 2023-03-13 21:51:30 -07:00
test_verifier.c selftests/bpf: fix unpriv_disabled check in test_verifier 2023-09-12 13:17:56 -07:00
test_xdp_features.sh selftests/bpf: introduce XDP compliance test tool 2023-02-02 20:48:24 -08:00
test_xdp_meta.sh
test_xdp_redirect.sh
test_xdp_redirect_multi.sh
test_xdp_veth.sh
test_xdp_vlan.sh
test_xdp_vlan_mode_generic.sh
test_xdp_vlan_mode_native.sh
test_xdping.sh
test_xsk.sh selftests/xsk: display command line options with -h 2023-09-14 09:47:56 -07:00
testing_helpers.c selftests/bpf: Use un/load_bpf_testmod functions in tests 2023-05-16 22:09:23 -07:00
testing_helpers.h selftests/bpf: Move get_time_ns to testing_helpers.h 2023-08-21 15:51:26 -07:00
trace_helpers.c selftests/bpf: trace_helpers.c: Add a global ksyms initialization mutex 2023-09-08 16:22:41 -07:00
trace_helpers.h selftests/bpf: trace_helpers.c: Optimize kallsyms cache 2023-09-08 16:22:41 -07:00
unpriv_helpers.c selftests/bpf: Fix selftests broken by mitigations=off 2023-10-26 15:42:03 +02:00
unpriv_helpers.h selftests/bpf: Unprivileged tests for test_loader.c 2023-03-25 17:02:02 -07:00
uprobe_multi.c selftests/bpf: Add uprobe_multi usdt test code 2023-08-21 15:51:27 -07:00
urandom_read.c selftests/bpf: Add tests for symbol versioning for uprobe 2023-09-22 14:27:41 -07:00
urandom_read_aux.c
urandom_read_lib1.c selftests/bpf: Add tests for symbol versioning for uprobe 2023-09-22 14:27:41 -07:00
urandom_read_lib2.c
verify_sig_setup.sh
veristat.c veristat: add -t flag for adding BPF_F_TEST_STATE_FREQ program flag 2023-05-04 22:35:34 -07:00
veristat.cfg
vmtest.sh selftests/bpf: Fix s390x vmlinux path 2023-01-29 19:16:29 -08:00
with_addr.sh
with_tunnels.sh
xdp_features.c selftests/bpf: Fix compiler warnings reported in -O2 mode 2023-10-06 20:17:28 +02:00
xdp_features.h selftests/bpf: introduce XDP compliance test tool 2023-02-02 20:48:24 -08:00
xdp_hw_metadata.c selftests/bpf: Fix broken build where char is unsigned 2023-11-02 07:57:21 -07:00
xdp_metadata.h selftests/bpf: xdp_hw_metadata track more timestamps 2023-04-27 18:42:30 +02:00
xdp_redirect_multi.c
xdp_synproxy.c selftests/bpf: Use bpf_{btf,link,map,prog}_get_info_by_fd() 2023-02-16 15:32:46 -08:00
xdping.c
xdping.h
xsk.c selftests/xsk: Modify xsk_update_xskmap() to accept the index as an argument 2023-10-04 15:26:02 +02:00
xsk.h selftests/xsk: Modify xsk_update_xskmap() to accept the index as an argument 2023-10-04 15:26:02 +02:00
xsk_prereqs.sh selftests/xsk: add option that lists all tests 2023-09-14 09:47:55 -07:00
xsk_xdp_common.h selftests/xsk: Add a test for shared umem feature 2023-10-04 15:26:02 +02:00
xskxceiver.c selftests: bpf: xskxceiver: ksft_print_msg: fix format type error 2023-11-09 19:18:12 -08:00
xskxceiver.h selftests/xsk: Add a test for shared umem feature 2023-10-04 15:26:02 +02:00

==================
BPF Selftest Notes
==================
General instructions on running selftests can be found in
`Documentation/bpf/bpf_devel_QA.rst`__.

__ /Documentation/bpf/bpf_devel_QA.rst#q-how-to-run-bpf-selftests

=============
BPF CI System
=============

BPF employs a continuous integration (CI) system to check patch submission in an
automated fashion. The system runs selftests for each patch in a series. Results
are propagated to patchwork, where failures are highlighted similar to
violations of other checks (such as additional warnings being emitted or a
``scripts/checkpatch.pl`` reported deficiency):

  https://patchwork.kernel.org/project/netdevbpf/list/?delegate=121173

The CI system executes tests on multiple architectures. It uses a kernel
configuration derived from both the generic and architecture specific config
file fragments below ``tools/testing/selftests/bpf/`` (e.g., ``config`` and
``config.x86_64``).

Denylisting Tests
=================

It is possible for some architectures to not have support for all BPF features.
In such a case tests in CI may fail. An example of such a shortcoming is BPF
trampoline support on IBM's s390x architecture. For cases like this, an in-tree
deny list file, located at ``tools/testing/selftests/bpf/DENYLIST.<arch>``, can
be used to prevent the test from running on such an architecture.

In addition to that, the generic ``tools/testing/selftests/bpf/DENYLIST`` is
honored on every architecture running tests.

These files are organized in three columns. The first column lists the test in
question. This can be the name of a test suite or of an individual test. The
remaining two columns provide additional meta data that helps identify and
classify the entry: column two is a copy and paste of the error being reported
when running the test in the setting in question. The third column, if
available, summarizes the underlying problem. A value of ``trampoline``, for
example, indicates that lack of trampoline support is causing the test to fail.
This last entry helps identify tests that can be re-enabled once such support is
added.

=========================
Running Selftests in a VM
=========================

It's now possible to run the selftests using ``tools/testing/selftests/bpf/vmtest.sh``.
The script tries to ensure that the tests are run with the same environment as they
would be run post-submit in the CI used by the Maintainers, with the exception
that deny lists are not automatically honored.

This script uses the in-tree kernel configuration and downloads a VM userspace
image from the system used by the CI. It builds the kernel (without overwriting
your existing Kconfig), recompiles the bpf selftests, runs them (by default
``tools/testing/selftests/bpf/test_progs``) and saves the resulting output (by
default in ``~/.bpf_selftests``).

Script dependencies:
- clang (preferably built from sources, https://github.com/llvm/llvm-project);
- pahole (preferably built from sources, https://git.kernel.org/pub/scm/devel/pahole/pahole.git/);
- qemu;
- docutils (for ``rst2man``);
- libcap-devel.

For more information about using the script, run:

.. code-block:: console

  $ tools/testing/selftests/bpf/vmtest.sh -h

In case of linker errors when running selftests, try using static linking:

.. code-block:: console

  $ LDLIBS=-static vmtest.sh

.. note:: Some distros may not support static linking.

.. note:: The script uses pahole and clang based on host environment setting.
          If you want to change pahole and llvm, you can change `PATH` environment
          variable in the beginning of script.

.. note:: The script currently only supports x86_64 and s390x architectures.

Additional information about selftest failures are
documented here.

profiler[23] test failures with clang/llvm <12.0.0
==================================================

With clang/llvm <12.0.0, the profiler[23] test may fail.
The symptom looks like

.. code-block:: c

  // r9 is a pointer to map_value
  // r7 is a scalar
  17:       bf 96 00 00 00 00 00 00 r6 = r9
  18:       0f 76 00 00 00 00 00 00 r6 += r7
  math between map_value pointer and register with unbounded min value is not allowed

  // the instructions below will not be seen in the verifier log
  19:       a5 07 01 00 01 01 00 00 if r7 < 257 goto +1
  20:       bf 96 00 00 00 00 00 00 r6 = r9
  // r6 is used here

The verifier will reject such code with above error.
At insn 18 the r7 is indeed unbounded. The later insn 19 checks the bounds and
the insn 20 undoes map_value addition. It is currently impossible for the
verifier to understand such speculative pointer arithmetic.
Hence `this patch`__ addresses it on the compiler side. It was committed on llvm 12.

__ https://reviews.llvm.org/D85570

The corresponding C code

.. code-block:: c

  for (int i = 0; i < MAX_CGROUPS_PATH_DEPTH; i++) {
          filepart_length = bpf_probe_read_str(payload, ...);
          if (filepart_length <= MAX_PATH) {
                  barrier_var(filepart_length); // workaround
                  payload += filepart_length;
          }
  }

bpf_iter test failures with clang/llvm 10.0.0
=============================================

With clang/llvm 10.0.0, the following two bpf_iter tests failed:
  * ``bpf_iter/ipv6_route``
  * ``bpf_iter/netlink``

The symptom for ``bpf_iter/ipv6_route`` looks like

.. code-block:: c

  2: (79) r8 = *(u64 *)(r1 +8)
  ...
  14: (bf) r2 = r8
  15: (0f) r2 += r1
  ; BPF_SEQ_PRINTF(seq, "%pi6 %02x ", &rt->fib6_dst.addr, rt->fib6_dst.plen);
  16: (7b) *(u64 *)(r8 +64) = r2
  only read is supported

The symptom for ``bpf_iter/netlink`` looks like

.. code-block:: c

  ; struct netlink_sock *nlk = ctx->sk;
  2: (79) r7 = *(u64 *)(r1 +8)
  ...
  15: (bf) r2 = r7
  16: (0f) r2 += r1
  ; BPF_SEQ_PRINTF(seq, "%pK %-3d ", s, s->sk_protocol);
  17: (7b) *(u64 *)(r7 +0) = r2
  only read is supported

This is due to a llvm BPF backend bug. `The fix`__
has been pushed to llvm 10.x release branch and will be
available in 10.0.1. The patch is available in llvm 11.0.0 trunk.

__  https://reviews.llvm.org/D78466

bpf_verif_scale/loop6.bpf.o test failure with Clang 12
======================================================

With Clang 12, the following bpf_verif_scale test failed:
  * ``bpf_verif_scale/loop6.bpf.o``

The verifier output looks like

.. code-block:: c

  R1 type=ctx expected=fp
  The sequence of 8193 jumps is too complex.

The reason is compiler generating the following code

.. code-block:: c

  ;       for (i = 0; (i < VIRTIO_MAX_SGS) && (i < num); i++) {
      14:       16 05 40 00 00 00 00 00 if w5 == 0 goto +64 <LBB0_6>
      15:       bc 51 00 00 00 00 00 00 w1 = w5
      16:       04 01 00 00 ff ff ff ff w1 += -1
      17:       67 05 00 00 20 00 00 00 r5 <<= 32
      18:       77 05 00 00 20 00 00 00 r5 >>= 32
      19:       a6 01 01 00 05 00 00 00 if w1 < 5 goto +1 <LBB0_4>
      20:       b7 05 00 00 06 00 00 00 r5 = 6
  00000000000000a8 <LBB0_4>:
      21:       b7 02 00 00 00 00 00 00 r2 = 0
      22:       b7 01 00 00 00 00 00 00 r1 = 0
  ;       for (i = 0; (i < VIRTIO_MAX_SGS) && (i < num); i++) {
      23:       7b 1a e0 ff 00 00 00 00 *(u64 *)(r10 - 32) = r1
      24:       7b 5a c0 ff 00 00 00 00 *(u64 *)(r10 - 64) = r5

Note that insn #15 has w1 = w5 and w1 is refined later but
r5(w5) is eventually saved on stack at insn #24 for later use.
This cause later verifier failure. The bug has been `fixed`__ in
Clang 13.

__  https://reviews.llvm.org/D97479

BPF CO-RE-based tests and Clang version
=======================================

A set of selftests use BPF target-specific built-ins, which might require
bleeding-edge Clang versions (Clang 12 nightly at this time).

Few sub-tests of core_reloc test suit (part of test_progs test runner) require
the following built-ins, listed with corresponding Clang diffs introducing
them to Clang/LLVM. These sub-tests are going to be skipped if Clang is too
old to support them, they shouldn't cause build failures or runtime test
failures:

- __builtin_btf_type_id() [0_, 1_, 2_];
- __builtin_preserve_type_info(), __builtin_preserve_enum_value() [3_, 4_].

.. _0: https://reviews.llvm.org/D74572
.. _1: https://reviews.llvm.org/D74668
.. _2: https://reviews.llvm.org/D85174
.. _3: https://reviews.llvm.org/D83878
.. _4: https://reviews.llvm.org/D83242

Floating-point tests and Clang version
======================================

Certain selftests, e.g. core_reloc, require support for the floating-point
types, which was introduced in `Clang 13`__. The older Clang versions will
either crash when compiling these tests, or generate an incorrect BTF.

__  https://reviews.llvm.org/D83289

Kernel function call test and Clang version
===========================================

Some selftests (e.g. kfunc_call and bpf_tcp_ca) require a LLVM support
to generate extern function in BTF.  It was introduced in `Clang 13`__.

Without it, the error from compiling bpf selftests looks like:

.. code-block:: console

  libbpf: failed to find BTF for extern 'tcp_slow_start' [25] section: -2

__ https://reviews.llvm.org/D93563

btf_tag test and Clang version
==============================

The btf_tag selftest requires LLVM support to recognize the btf_decl_tag and
btf_type_tag attributes. They are introduced in `Clang 14` [0_, 1_].
The subtests ``btf_type_tag_user_{mod1, mod2, vmlinux}`` also requires
pahole version ``1.23``.

Without them, the btf_tag selftest will be skipped and you will observe:

.. code-block:: console

  #<test_num> btf_tag:SKIP

.. _0: https://reviews.llvm.org/D111588
.. _1: https://reviews.llvm.org/D111199

Clang dependencies for static linking tests
===========================================

linked_vars, linked_maps, and linked_funcs tests depend on `Clang fix`__ to
generate valid BTF information for weak variables. Please make sure you use
Clang that contains the fix.

__ https://reviews.llvm.org/D100362

Clang relocation changes
========================

Clang 13 patch `clang reloc patch`_  made some changes on relocations such
that existing relocation types are broken into more types and
each new type corresponds to only one way to resolve relocation.
See `kernel llvm reloc`_ for more explanation and some examples.
Using clang 13 to compile old libbpf which has static linker support,
there will be a compilation failure::

  libbpf: ELF relo #0 in section #6 has unexpected type 2 in .../bpf_tcp_nogpl.bpf.o

Here, ``type 2`` refers to new relocation type ``R_BPF_64_ABS64``.
To fix this issue, user newer libbpf.

.. Links
.. _clang reloc patch: https://reviews.llvm.org/D102712
.. _kernel llvm reloc: /Documentation/bpf/llvm_reloc.rst

Clang dependencies for the u32 spill test (xdpwall)
===================================================
The xdpwall selftest requires a change in `Clang 14`__.

Without it, the xdpwall selftest will fail and the error message
from running test_progs will look like:

.. code-block:: console

  test_xdpwall:FAIL:Does LLVM have https://reviews.llvm.org/D109073? unexpected error: -4007

__ https://reviews.llvm.org/D109073