linux-stable/tools/testing/selftests/bpf
Jakub Kicinski 5f20e6ab1f for-netdev
-----BEGIN PGP SIGNATURE-----
 
 iQIzBAABCAAdFiEE+soXsSLHKoYyzcli6rmadz2vbToFAmXvm7IACgkQ6rmadz2v
 bTqdMA//VMHNHVLb4oROoXyQD9fw2mCmIUEKzP88RXfqcxsfEX7HF+k8B5ZTk0ro
 CHXTAnc79+Qqg0j24bkQKxup/fKBQVw9D+Ia4b3ytlm1I2MtyU/16xNEzVhAPU2D
 iKk6mVBsEdCbt/GjpWORy/VVnZlZpC7BOpZLxsbbxgXOndnCegyjXzSnLGJGxdvi
 zkrQTn2SrFzLi6aNpVLqrv6Nks6HJusfCKsIrtlbkQ85dulasHOtwK9s6GF60nte
 aaho+MPx3L+lWEgapsm8rR779pHaYIB/GbZUgEPxE/xUJ/V8BzDgFNLMzEiIBRMN
 a0zZam11BkBzCfcO9gkvDRByaei/dZz2jdqfU4GlHklFj1WFfz8Q7fRLEPINksvj
 WXLgJADGY5mtGbjG21FScThxzj+Ruqwx0a13ddlyI/W+P3y5yzSWsLwJG5F9p0oU
 6nlkJ4U8yg+9E1ie5ae0TibqvRJzXPjfOERZGwYDSVvfQGzv1z+DGSOPMmgNcWYM
 dIaO+A/+NS3zdbk8+1PP2SBbhHPk6kWyCUByWc7wMzCPTiwriFGY/DD2sN+Fsufo
 zorzfikUQOlTfzzD5jbmT49U8hUQUf6QIWsu7BijSiHaaC7am4S8QB2O6ibJMqdv
 yNiwvuX+ThgVIY3QKrLLqL0KPGeKMR5mtfq6rrwSpfp/b4g27FE=
 =eFgA
 -----END PGP SIGNATURE-----

Merge tag 'for-netdev' of https://git.kernel.org/pub/scm/linux/kernel/git/bpf/bpf-next

Alexei Starovoitov says:

====================
pull-request: bpf-next 2024-03-11

We've added 59 non-merge commits during the last 9 day(s) which contain
a total of 88 files changed, 4181 insertions(+), 590 deletions(-).

The main changes are:

1) Enforce VM_IOREMAP flag and range in ioremap_page_range and introduce
   VM_SPARSE kind and vm_area_[un]map_pages to be used in bpf_arena,
   from Alexei.

2) Introduce bpf_arena which is sparse shared memory region between bpf
   program and user space where structures inside the arena can have
   pointers to other areas of the arena, and pointers work seamlessly for
   both user-space programs and bpf programs, from Alexei and Andrii.

3) Introduce may_goto instruction that is a contract between the verifier
   and the program. The verifier allows the program to loop assuming it's
   behaving well, but reserves the right to terminate it, from Alexei.

4) Use IETF format for field definitions in the BPF standard
   document, from Dave.

5) Extend struct_ops libbpf APIs to allow specify version suffixes for
   stuct_ops map types, share the same BPF program between several map
   definitions, and other improvements, from Eduard.

6) Enable struct_ops support for more than one page in trampolines,
   from Kui-Feng.

7) Support kCFI + BPF on riscv64, from Puranjay.

8) Use bpf_prog_pack for arm64 bpf trampoline, from Puranjay.

9) Fix roundup_pow_of_two undefined behavior on 32-bit archs, from Toke.
====================

Link: https://lore.kernel.org/r/20240312003646.8692-1-alexei.starovoitov@gmail.com
Signed-off-by: Jakub Kicinski <kuba@kernel.org>
2024-03-11 18:06:04 -07:00
..
benchs selftests/bpf: Add kprobe multi triggering benchmarks 2024-03-11 16:06:48 -07:00
bpf_test_no_cfi selftests/bpf: Test case for lacking CFI stub functions. 2024-02-22 12:26:41 -08:00
bpf_testmod selftests/bpf: Bad_struct_ops test 2024-03-06 15:18:15 -08:00
gnu bpf: Replace deprecated -target with --target= for Clang 2023-06-29 15:46:17 +02:00
map_tests selftsets/bpf: Retry map update for non-preallocated per-cpu map 2023-11-09 18:58:40 -08:00
prog_tests for-netdev 2024-03-11 18:06:04 -07:00
progs for-netdev 2024-03-11 18:06:04 -07:00
verifier selftests/bpf: Skip callback tests if jit is disabled in test_verifier 2024-01-23 20:27:41 -08:00
.gitignore selftests/bpf: add uprobe_multi test binary to .gitignore 2023-08-23 21:13:48 -07:00
DENYLIST
DENYLIST.aarch64 selftests/bpf: Add bpf_arena_htab test. 2024-03-11 15:43:43 -07:00
DENYLIST.s390x selftests/bpf: Add bpf_arena_htab test. 2024-03-11 15:43:43 -07:00
Makefile selftests/bpf: Extend uprobe/uretprobe triggering benchmarks 2024-03-04 14:40:24 +01:00
Makefile.docs
README.rst selftests/bpf: Update LLVM Phabricator links 2024-01-23 14:40:22 -08:00
autoconf_helper.h selftests/bpf: Unprivileged tests for test_loader.c 2023-03-25 17:02:02 -07:00
bench.c selftests/bpf: Add kprobe multi triggering benchmarks 2024-03-11 16:06:48 -07:00
bench.h selftests/bpf: Move get_time_ns to testing_helpers.h 2023-08-21 15:51:26 -07:00
bpf_arena_alloc.h selftests/bpf: Add bpf_arena_list test. 2024-03-11 15:43:43 -07:00
bpf_arena_common.h selftests/bpf: Add unit tests for bpf_arena_alloc/free_pages 2024-03-11 15:43:43 -07:00
bpf_arena_htab.h selftests/bpf: Add bpf_arena_htab test. 2024-03-11 15:43:43 -07:00
bpf_arena_list.h selftests/bpf: Add bpf_arena_list test. 2024-03-11 15:43:43 -07:00
bpf_experimental.h bpf: Add helper macro bpf_addr_space_cast() 2024-03-11 15:43:42 -07:00
bpf_kfuncs.h selftests/bpf: mark dynptr kfuncs __weak to make them optional on old kernels 2024-02-05 20:02:38 -08:00
bpf_legacy.h
bpf_rand.h
bpf_sockopt_helpers.h
bpf_tcp_helpers.h
bpf_util.h
btf_helpers.c
btf_helpers.h
cap_helpers.c
cap_helpers.h
cgroup_getset_retval_hooks.h
cgroup_helpers.c selftests/bpf: Add a new cgroup helper open_classid() 2023-12-08 17:08:18 -08:00
cgroup_helpers.h selftests/bpf: Add a new cgroup helper open_classid() 2023-12-08 17:08:18 -08:00
cgroup_tcp_skb.h selftests/bpf: Verify that the cgroup_skb filters receive expected packets. 2023-06-30 16:09:27 +02:00
config selftest: bpf: Test bpf_sk_assign_tcp_reqsk(). 2024-01-23 14:40:24 -08:00
config.aarch64 bpfilter: remove bpfilter 2024-01-04 10:23:10 -08:00
config.s390x bpfilter: remove bpfilter 2024-01-04 10:23:10 -08:00
config.vm selftests/bpf: Consolidate VIRTIO/9P configs in config.vm file 2023-11-09 19:07:38 -08:00
config.x86_64 bpfilter: remove bpfilter 2024-01-04 10:23:10 -08:00
disasm.c selftests/bpf: Disassembler tests for verifier.c:convert_ctx_access() 2023-03-03 21:41:46 -08:00
disasm.h selftests/bpf: Disassembler tests for verifier.c:convert_ctx_access() 2023-03-03 21:41:46 -08:00
flow_dissector_load.c
flow_dissector_load.h
generate_udp_fragments.py bpf: selftests: Add defrag selftests 2023-07-28 16:52:08 -07:00
get_cgroup_id_user.c selftests/bpf: use canonical ftrace path 2023-03-13 21:51:30 -07:00
ima_setup.sh
ip_check_defrag_frags.h bpf: selftests: Add defrag selftests 2023-07-28 16:52:08 -07:00
json_writer.c selftests/bpf: Add --json-summary option to test_progs 2023-03-17 16:00:33 -07:00
json_writer.h selftests/bpf: Add --json-summary option to test_progs 2023-03-17 16:00:33 -07:00
liburandom_read.map selftests/bpf: Add tests for symbol versioning for uprobe 2023-09-22 14:27:41 -07:00
netcnt_common.h selftests/bpf: Increase SIZEOF_BPF_LOCAL_STORAGE_ELEM on s390x 2023-01-28 12:30:08 -08:00
netlink_helpers.c selftests/bpf: Add netlink helper library 2023-10-24 16:07:39 -07:00
netlink_helpers.h selftests/bpf: Add netlink helper library 2023-10-24 16:07:39 -07:00
network_helpers.c selftests/bpf: Add tests for cgroup unix socket address hooks 2023-10-11 17:27:55 -07:00
network_helpers.h selftests/bpf: Add csum helpers 2023-11-29 14:59:41 -08:00
sdt-config.h
sdt.h
settings
task_local_storage_helpers.h
test_bpftool.py
test_bpftool.sh
test_bpftool_build.sh
test_bpftool_metadata.sh
test_bpftool_synctypes.py bpf: Mark BPF_MAP_TYPE_PERCPU_CGROUP_STORAGE deprecated 2023-09-08 08:42:18 -07:00
test_btf.h
test_cgroup_storage.c
test_cpp.cpp Fix typos in selftest/bpf files 2023-02-16 16:56:17 -08:00
test_dev_cgroup.c
test_doc_build.sh
test_flow_dissector.c
test_flow_dissector.sh
test_ftrace.sh selftests/bpf: use canonical ftrace path 2023-03-13 21:51:30 -07:00
test_iptunnel_common.h
test_kmod.sh
test_lirc_mode2.sh
test_lirc_mode2_user.c
test_loader.c selftests/bpf: Add unit tests for bpf_arena_alloc/free_pages 2024-03-11 15:43:43 -07:00
test_lpm_map.c bpf: Replace bpf_lpm_trie_key 0-length array with flexible array 2024-02-29 22:52:43 +01:00
test_lru_map.c
test_lwt_ip_encap.sh
test_lwt_seg6local.sh
test_maps.c selftest/bpf: Add map_in_maps with BPF_MAP_TYPE_PERF_EVENT_ARRAY values 2024-01-23 14:43:12 -08:00
test_maps.h selftests/bpf: Export map_update_retriable() 2023-11-09 18:58:40 -08:00
test_offload.py selftests/bpf: update test_offload to use new orphaned property 2023-11-27 16:23:44 -08:00
test_progs.c selftests/bpf: Utility functions to capture libbpf log in test_progs 2024-03-06 15:18:15 -08:00
test_progs.h selftests/bpf: Utility functions to capture libbpf log in test_progs 2024-03-06 15:18:15 -08:00
test_select_reuseport_common.h
test_skb_cgroup_id.sh
test_skb_cgroup_id_user.c selftests/bpf: Use bpf_{btf,link,map,prog}_get_info_by_fd() 2023-02-16 15:32:46 -08:00
test_sock.c
test_sock_addr.c selftests/bpf: detect testing prog flags support 2024-01-23 14:40:22 -08:00
test_sock_addr.sh
test_sockmap.c
test_sysctl.c
test_tag.c
test_tc_edt.sh
test_tc_tunnel.sh
test_tcp_check_syncookie.sh
test_tcp_check_syncookie_user.c selftests/bpf: Use bpf_{btf,link,map,prog}_get_info_by_fd() 2023-02-16 15:32:46 -08:00
test_tcp_hdr_options.h selftests/bpf: tests for using dynptrs to parse skb and xdp buffers 2023-03-01 10:05:19 -08:00
test_tcpbpf.h
test_tcpnotify.h
test_tcpnotify_user.c
test_tunnel.sh bpf: selftests: Move xfrm tunnel test to test_progs 2023-12-14 17:12:49 -08:00
test_verifier.c selftests/bpf: Add missing line break in test_verifier 2024-01-26 11:09:32 -08:00
test_xdp_features.sh selftests/bpf: introduce XDP compliance test tool 2023-02-02 20:48:24 -08:00
test_xdp_meta.sh
test_xdp_redirect.sh
test_xdp_redirect_multi.sh
test_xdp_veth.sh
test_xdp_vlan.sh
test_xdp_vlan_mode_generic.sh
test_xdp_vlan_mode_native.sh
test_xdping.sh
test_xsk.sh selftests/xsk: display command line options with -h 2023-09-14 09:47:56 -07:00
testing_helpers.c selftests/bpf: Test case for lacking CFI stub functions. 2024-02-22 12:26:41 -08:00
testing_helpers.h selftests/bpf: Test case for lacking CFI stub functions. 2024-02-22 12:26:41 -08:00
trace_helpers.c selftests/bpf: trace_helpers.c: do not use poisoned type 2024-02-02 14:14:03 -08:00
trace_helpers.h selftests/bpf: trace_helpers.c: Optimize kallsyms cache 2023-09-08 16:22:41 -07:00
unpriv_helpers.c selftests/bpf: Fix selftests broken by mitigations=off 2023-10-26 15:42:03 +02:00
unpriv_helpers.h selftests/bpf: Unprivileged tests for test_loader.c 2023-03-25 17:02:02 -07:00
uprobe_multi.c selftests/bpf: Add uprobe_multi usdt test code 2023-08-21 15:51:27 -07:00
urandom_read.c selftests/bpf: Add tests for symbol versioning for uprobe 2023-09-22 14:27:41 -07:00
urandom_read_aux.c
urandom_read_lib1.c selftests/bpf: Add tests for symbol versioning for uprobe 2023-09-22 14:27:41 -07:00
urandom_read_lib2.c
verify_sig_setup.sh selftests/bpf: Add test that uses fsverity and xattr to sign a file 2023-12-01 16:21:03 -08:00
veristat.c selftests/bpf: fix compiler warnings in RELEASE=1 mode 2023-12-13 10:27:16 -08:00
veristat.cfg
vmtest.sh selftests/bpf: Consolidate VIRTIO/9P configs in config.vm file 2023-11-09 19:07:38 -08:00
with_addr.sh
with_tunnels.sh
xdp_features.c selftests/bpf: Fix compiler warnings reported in -O2 mode 2023-10-06 20:17:28 +02:00
xdp_features.h selftests/bpf: introduce XDP compliance test tool 2023-02-02 20:48:24 -08:00
xdp_hw_metadata.c selftests/bpf: xdp_hw_metadata reduce sleep interval 2024-03-04 15:01:59 +01:00
xdp_metadata.h selftests/bpf: Add flags and VLAN hint to xdp_hw_metadata 2023-12-13 16:16:41 -08:00
xdp_redirect_multi.c
xdp_synproxy.c selftests/bpf: Use bpf_{btf,link,map,prog}_get_info_by_fd() 2023-02-16 15:32:46 -08:00
xdping.c
xdping.h
xsk.c selftests/xsk: Support tx_metadata_len 2023-11-29 14:59:41 -08:00
xsk.h selftests/xsk: Support tx_metadata_len 2023-11-29 14:59:41 -08:00
xsk_prereqs.sh selftests/xsk: add option that lists all tests 2023-09-14 09:47:55 -07:00
xsk_xdp_common.h selftests/xsk: Add a test for shared umem feature 2023-10-04 15:26:02 +02:00
xskxceiver.c selftests/xsk: Fix for SEND_RECEIVE_UNALIGNED test 2023-12-14 16:11:13 +01:00
xskxceiver.h selftests/xsk: Add a test for shared umem feature 2023-10-04 15:26:02 +02:00

README.rst

==================
BPF Selftest Notes
==================
General instructions on running selftests can be found in
`Documentation/bpf/bpf_devel_QA.rst`__.

__ /Documentation/bpf/bpf_devel_QA.rst#q-how-to-run-bpf-selftests

=============
BPF CI System
=============

BPF employs a continuous integration (CI) system to check patch submission in an
automated fashion. The system runs selftests for each patch in a series. Results
are propagated to patchwork, where failures are highlighted similar to
violations of other checks (such as additional warnings being emitted or a
``scripts/checkpatch.pl`` reported deficiency):

  https://patchwork.kernel.org/project/netdevbpf/list/?delegate=121173

The CI system executes tests on multiple architectures. It uses a kernel
configuration derived from both the generic and architecture specific config
file fragments below ``tools/testing/selftests/bpf/`` (e.g., ``config`` and
``config.x86_64``).

Denylisting Tests
=================

It is possible for some architectures to not have support for all BPF features.
In such a case tests in CI may fail. An example of such a shortcoming is BPF
trampoline support on IBM's s390x architecture. For cases like this, an in-tree
deny list file, located at ``tools/testing/selftests/bpf/DENYLIST.<arch>``, can
be used to prevent the test from running on such an architecture.

In addition to that, the generic ``tools/testing/selftests/bpf/DENYLIST`` is
honored on every architecture running tests.

These files are organized in three columns. The first column lists the test in
question. This can be the name of a test suite or of an individual test. The
remaining two columns provide additional meta data that helps identify and
classify the entry: column two is a copy and paste of the error being reported
when running the test in the setting in question. The third column, if
available, summarizes the underlying problem. A value of ``trampoline``, for
example, indicates that lack of trampoline support is causing the test to fail.
This last entry helps identify tests that can be re-enabled once such support is
added.

=========================
Running Selftests in a VM
=========================

It's now possible to run the selftests using ``tools/testing/selftests/bpf/vmtest.sh``.
The script tries to ensure that the tests are run with the same environment as they
would be run post-submit in the CI used by the Maintainers, with the exception
that deny lists are not automatically honored.

This script uses the in-tree kernel configuration and downloads a VM userspace
image from the system used by the CI. It builds the kernel (without overwriting
your existing Kconfig), recompiles the bpf selftests, runs them (by default
``tools/testing/selftests/bpf/test_progs``) and saves the resulting output (by
default in ``~/.bpf_selftests``).

Script dependencies:
- clang (preferably built from sources, https://github.com/llvm/llvm-project);
- pahole (preferably built from sources, https://git.kernel.org/pub/scm/devel/pahole/pahole.git/);
- qemu;
- docutils (for ``rst2man``);
- libcap-devel.

For more information about using the script, run:

.. code-block:: console

  $ tools/testing/selftests/bpf/vmtest.sh -h

In case of linker errors when running selftests, try using static linking:

.. code-block:: console

  $ LDLIBS=-static PKG_CONFIG='pkg-config --static' vmtest.sh

.. note:: Some distros may not support static linking.

.. note:: The script uses pahole and clang based on host environment setting.
          If you want to change pahole and llvm, you can change `PATH` environment
          variable in the beginning of script.

.. note:: The script currently only supports x86_64 and s390x architectures.

Additional information about selftest failures are
documented here.

profiler[23] test failures with clang/llvm <12.0.0
==================================================

With clang/llvm <12.0.0, the profiler[23] test may fail.
The symptom looks like

.. code-block:: c

  // r9 is a pointer to map_value
  // r7 is a scalar
  17:       bf 96 00 00 00 00 00 00 r6 = r9
  18:       0f 76 00 00 00 00 00 00 r6 += r7
  math between map_value pointer and register with unbounded min value is not allowed

  // the instructions below will not be seen in the verifier log
  19:       a5 07 01 00 01 01 00 00 if r7 < 257 goto +1
  20:       bf 96 00 00 00 00 00 00 r6 = r9
  // r6 is used here

The verifier will reject such code with above error.
At insn 18 the r7 is indeed unbounded. The later insn 19 checks the bounds and
the insn 20 undoes map_value addition. It is currently impossible for the
verifier to understand such speculative pointer arithmetic.
Hence `this patch`__ addresses it on the compiler side. It was committed on llvm 12.

__ https://github.com/llvm/llvm-project/commit/ddf1864ace484035e3cde5e83b3a31ac81e059c6

The corresponding C code

.. code-block:: c

  for (int i = 0; i < MAX_CGROUPS_PATH_DEPTH; i++) {
          filepart_length = bpf_probe_read_str(payload, ...);
          if (filepart_length <= MAX_PATH) {
                  barrier_var(filepart_length); // workaround
                  payload += filepart_length;
          }
  }

bpf_iter test failures with clang/llvm 10.0.0
=============================================

With clang/llvm 10.0.0, the following two bpf_iter tests failed:
  * ``bpf_iter/ipv6_route``
  * ``bpf_iter/netlink``

The symptom for ``bpf_iter/ipv6_route`` looks like

.. code-block:: c

  2: (79) r8 = *(u64 *)(r1 +8)
  ...
  14: (bf) r2 = r8
  15: (0f) r2 += r1
  ; BPF_SEQ_PRINTF(seq, "%pi6 %02x ", &rt->fib6_dst.addr, rt->fib6_dst.plen);
  16: (7b) *(u64 *)(r8 +64) = r2
  only read is supported

The symptom for ``bpf_iter/netlink`` looks like

.. code-block:: c

  ; struct netlink_sock *nlk = ctx->sk;
  2: (79) r7 = *(u64 *)(r1 +8)
  ...
  15: (bf) r2 = r7
  16: (0f) r2 += r1
  ; BPF_SEQ_PRINTF(seq, "%pK %-3d ", s, s->sk_protocol);
  17: (7b) *(u64 *)(r7 +0) = r2
  only read is supported

This is due to a llvm BPF backend bug. `The fix`__
has been pushed to llvm 10.x release branch and will be
available in 10.0.1. The patch is available in llvm 11.0.0 trunk.

__  https://github.com/llvm/llvm-project/commit/3cb7e7bf959dcd3b8080986c62e10a75c7af43f0

bpf_verif_scale/loop6.bpf.o test failure with Clang 12
======================================================

With Clang 12, the following bpf_verif_scale test failed:
  * ``bpf_verif_scale/loop6.bpf.o``

The verifier output looks like

.. code-block:: c

  R1 type=ctx expected=fp
  The sequence of 8193 jumps is too complex.

The reason is compiler generating the following code

.. code-block:: c

  ;       for (i = 0; (i < VIRTIO_MAX_SGS) && (i < num); i++) {
      14:       16 05 40 00 00 00 00 00 if w5 == 0 goto +64 <LBB0_6>
      15:       bc 51 00 00 00 00 00 00 w1 = w5
      16:       04 01 00 00 ff ff ff ff w1 += -1
      17:       67 05 00 00 20 00 00 00 r5 <<= 32
      18:       77 05 00 00 20 00 00 00 r5 >>= 32
      19:       a6 01 01 00 05 00 00 00 if w1 < 5 goto +1 <LBB0_4>
      20:       b7 05 00 00 06 00 00 00 r5 = 6
  00000000000000a8 <LBB0_4>:
      21:       b7 02 00 00 00 00 00 00 r2 = 0
      22:       b7 01 00 00 00 00 00 00 r1 = 0
  ;       for (i = 0; (i < VIRTIO_MAX_SGS) && (i < num); i++) {
      23:       7b 1a e0 ff 00 00 00 00 *(u64 *)(r10 - 32) = r1
      24:       7b 5a c0 ff 00 00 00 00 *(u64 *)(r10 - 64) = r5

Note that insn #15 has w1 = w5 and w1 is refined later but
r5(w5) is eventually saved on stack at insn #24 for later use.
This cause later verifier failure. The bug has been `fixed`__ in
Clang 13.

__  https://github.com/llvm/llvm-project/commit/1959ead525b8830cc8a345f45e1c3ef9902d3229

BPF CO-RE-based tests and Clang version
=======================================

A set of selftests use BPF target-specific built-ins, which might require
bleeding-edge Clang versions (Clang 12 nightly at this time).

Few sub-tests of core_reloc test suit (part of test_progs test runner) require
the following built-ins, listed with corresponding Clang diffs introducing
them to Clang/LLVM. These sub-tests are going to be skipped if Clang is too
old to support them, they shouldn't cause build failures or runtime test
failures:

- __builtin_btf_type_id() [0_, 1_, 2_];
- __builtin_preserve_type_info(), __builtin_preserve_enum_value() [3_, 4_].

.. _0: https://github.com/llvm/llvm-project/commit/6b01b465388b204d543da3cf49efd6080db094a9
.. _1: https://github.com/llvm/llvm-project/commit/072cde03aaa13a2c57acf62d79876bf79aa1919f
.. _2: https://github.com/llvm/llvm-project/commit/00602ee7ef0bf6c68d690a2bd729c12b95c95c99
.. _3: https://github.com/llvm/llvm-project/commit/6d218b4adb093ff2e9764febbbc89f429412006c
.. _4: https://github.com/llvm/llvm-project/commit/6d6750696400e7ce988d66a1a00e1d0cb32815f8

Floating-point tests and Clang version
======================================

Certain selftests, e.g. core_reloc, require support for the floating-point
types, which was introduced in `Clang 13`__. The older Clang versions will
either crash when compiling these tests, or generate an incorrect BTF.

__  https://github.com/llvm/llvm-project/commit/a7137b238a07d9399d3ae96c0b461571bd5aa8b2

Kernel function call test and Clang version
===========================================

Some selftests (e.g. kfunc_call and bpf_tcp_ca) require a LLVM support
to generate extern function in BTF.  It was introduced in `Clang 13`__.

Without it, the error from compiling bpf selftests looks like:

.. code-block:: console

  libbpf: failed to find BTF for extern 'tcp_slow_start' [25] section: -2

__ https://github.com/llvm/llvm-project/commit/886f9ff53155075bd5f1e994f17b85d1e1b7470c

btf_tag test and Clang version
==============================

The btf_tag selftest requires LLVM support to recognize the btf_decl_tag and
btf_type_tag attributes. They are introduced in `Clang 14` [0_, 1_].
The subtests ``btf_type_tag_user_{mod1, mod2, vmlinux}`` also requires
pahole version ``1.23``.

Without them, the btf_tag selftest will be skipped and you will observe:

.. code-block:: console

  #<test_num> btf_tag:SKIP

.. _0: https://github.com/llvm/llvm-project/commit/a162b67c98066218d0d00aa13b99afb95d9bb5e6
.. _1: https://github.com/llvm/llvm-project/commit/3466e00716e12e32fdb100e3fcfca5c2b3e8d784

Clang dependencies for static linking tests
===========================================

linked_vars, linked_maps, and linked_funcs tests depend on `Clang fix`__ to
generate valid BTF information for weak variables. Please make sure you use
Clang that contains the fix.

__ https://github.com/llvm/llvm-project/commit/968292cb93198442138128d850fd54dc7edc0035

Clang relocation changes
========================

Clang 13 patch `clang reloc patch`_  made some changes on relocations such
that existing relocation types are broken into more types and
each new type corresponds to only one way to resolve relocation.
See `kernel llvm reloc`_ for more explanation and some examples.
Using clang 13 to compile old libbpf which has static linker support,
there will be a compilation failure::

  libbpf: ELF relo #0 in section #6 has unexpected type 2 in .../bpf_tcp_nogpl.bpf.o

Here, ``type 2`` refers to new relocation type ``R_BPF_64_ABS64``.
To fix this issue, user newer libbpf.

.. Links
.. _clang reloc patch: https://github.com/llvm/llvm-project/commit/6a2ea84600ba4bd3b2733bd8f08f5115eb32164b
.. _kernel llvm reloc: /Documentation/bpf/llvm_reloc.rst

Clang dependencies for the u32 spill test (xdpwall)
===================================================
The xdpwall selftest requires a change in `Clang 14`__.

Without it, the xdpwall selftest will fail and the error message
from running test_progs will look like:

.. code-block:: console

  test_xdpwall:FAIL:Does LLVM have https://github.com/llvm/llvm-project/commit/ea72b0319d7b0f0c2fcf41d121afa5d031b319d5? unexpected error: -4007

__ https://github.com/llvm/llvm-project/commit/ea72b0319d7b0f0c2fcf41d121afa5d031b319d5