Bug#986905: systemd armhf: Attaching egress BPF program to cgroup failed, Re: Bug#986905: systemd armhf: Attaching egress BPF program to cgroup failed

Michael Biebl biebl at debian.org
Thu Apr 15 01:33:31 BST 2021


Am 15.04.21 um 02:27 schrieb Ryutaroh Matsumoto:
>> Can you attach the output of
>> grep BPF /boot/config-$(uname -r)
> 
> root at qemu-bullseye-armhf:~# uname -a
> Linux qemu-bullseye-armhf 5.10.0-5-armmp-lpae #1 SMP Debian 5.10.26-1 (2021-03-27) armv7l GNU/Linux
> root at qemu-bullseye-armhf:~# fgrep -nH BPF /boot/config-5.10.0-5-armmp-lpae
> /boot/config-5.10.0-5-armmp-lpae:161:CONFIG_CGROUP_BPF=y
> /boot/config-5.10.0-5-armmp-lpae:189:CONFIG_BPF=y
> /boot/config-5.10.0-5-armmp-lpae:216:CONFIG_BPF_LSM=y
> /boot/config-5.10.0-5-armmp-lpae:217:CONFIG_BPF_SYSCALL=y
> /boot/config-5.10.0-5-armmp-lpae:218:# CONFIG_BPF_JIT_ALWAYS_ON is not set
> /boot/config-5.10.0-5-armmp-lpae:219:# CONFIG_BPF_PRELOAD is not set
> /boot/config-5.10.0-5-armmp-lpae:1195:CONFIG_IPV6_SEG6_BPF=y
> /boot/config-5.10.0-5-armmp-lpae:1335:CONFIG_NETFILTER_XT_MATCH_BPF=m
> /boot/config-5.10.0-5-armmp-lpae:1554:# CONFIG_BPFILTER is not set
> /boot/config-5.10.0-5-armmp-lpae:1714:CONFIG_NET_CLS_BPF=m
> /boot/config-5.10.0-5-armmp-lpae:1741:CONFIG_NET_ACT_BPF=m
> /boot/config-5.10.0-5-armmp-lpae:1796:CONFIG_BPF_JIT=y
> /boot/config-5.10.0-5-armmp-lpae:1797:CONFIG_BPF_STREAM_PARSER=y
> /boot/config-5.10.0-5-armmp-lpae:2013:CONFIG_LWTUNNEL_BPF=y
> /boot/config-5.10.0-5-armmp-lpae:2021:CONFIG_HAVE_EBPF_JIT=y
> /boot/config-5.10.0-5-armmp-lpae:7784:# CONFIG_NBPFAXI_DMA is not set
> /boot/config-5.10.0-5-armmp-lpae:10100:CONFIG_BPF_EVENTS=y
> /boot/config-5.10.0-5-armmp-lpae:10173:CONFIG_TEST_BPF=m
> root at qemu-bullseye-armhf:~#
> 
> In addition, there is little difference between arm64 and armhf
> in linux kernel config as follows.
> Is it related with CONFIG_BPF_JIT_DEFAULT_ON???

Hm, I don't think so. The above looks ok.
Can you raise this upstream please (maybe with a reference to #7054).
I don't have an armhf setup to easily reproduce this myself.

I'd attach an strace log to the upstream bug report as well.

Regards,
Michael

-------------- next part --------------
A non-text attachment was scrubbed...
Name: OpenPGP_signature
Type: application/pgp-signature
Size: 840 bytes
Desc: OpenPGP digital signature
URL: <http://alioth-lists.debian.net/pipermail/pkg-systemd-maintainers/attachments/20210415/04bd9f24/attachment-0001.sig>


More information about the Pkg-systemd-maintainers mailing list