RHEL Engineering is moving the tracking of its product development work on RHEL 6 through RHEL 9 to Red Hat Jira (issues.redhat.com). If you're a Red Hat customer, please continue to file support cases via the Red Hat customer portal. If you're not, please head to the "RHEL project" in Red Hat Jira and file new tickets here. Individual Bugzilla bugs in the statuses "NEW", "ASSIGNED", and "POST" are being migrated throughout September 2023. Bugs of Red Hat partners with an assigned Engineering Partner Manager (EPM) are migrated in late September as per pre-agreed dates. Bugs against components "kernel", "kernel-rt", and "kpatch" are only migrated if still in "NEW" or "ASSIGNED". If you cannot log in to RH Jira, please consult article #7032570. That failing, please send an e-mail to the RH Jira admins at rh-issues@redhat.com to troubleshoot your issue as a user management inquiry. The email creates a ServiceNow ticket with Red Hat. Individual Bugzilla bugs that are migrated will be moved to status "CLOSED", resolution "MIGRATED", and set with "MigratedToJIRA" in "Keywords". The link to the successor Jira issue will be found under "Links", have a little "two-footprint" icon next to it, and direct you to the "RHEL project" in Red Hat Jira (issue links are of type "https://issues.redhat.com/browse/RHEL-XXXX", where "X" is a digit). This same link will be available in a blue banner at the top of the page informing you that that bug has been migrated.
Bug 2178933 - update libbpf to BPF version 6.3
Summary: update libbpf to BPF version 6.3
Keywords:
Status: CLOSED ERRATA
Alias: None
Product: Red Hat Enterprise Linux 9
Classification: Red Hat
Component: libbpf
Version: 9.2
Hardware: Unspecified
OS: Unspecified
unspecified
unspecified
Target Milestone: rc
: ---
Assignee: Viktor Malik
QA Contact: Jean-Tsung Hsiao
URL:
Whiteboard:
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2023-03-16 08:14 UTC by Viktor Malik
Modified: 2023-11-07 11:21 UTC (History)
1 user (show)

Fixed In Version: libbpf-1.2.0-1.el9
Doc Type: If docs needed, set a value
Doc Text:
Clone Of:
Environment:
Last Closed: 2023-11-07 08:52:13 UTC
Type: Bug
Target Upstream Version:
Embargoed:
pm-rhel: mirror+


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Issue Tracker RHELPLAN-152022 0 None None None 2023-03-16 08:17:10 UTC
Red Hat Product Errata RHBA-2023:6616 0 None None None 2023-11-07 08:52:16 UTC

Description Viktor Malik 2023-03-16 08:14:07 UTC
Update libbpf to the kernel version 6.3

Comment 3 Viktor Malik 2023-07-11 07:22:07 UTC
The build has now passed gating and is ready for pre-verification:

https://brewweb.engineering.redhat.com/brew/buildinfo?buildID=2577719

Comment 4 Jean-Tsung Hsiao 2023-07-13 17:42:39 UTC
Have verified libbpf-1.2.0-1.el9 by building xdp-tools:

[root@wsfd-advnetlab10 ~]# cd xdp-tools/
[root@wsfd-advnetlab10 xdp-tools]# ./configure 
Found clang binary 'clang' with version 16 (from 'clang version 16.0.1 (Red Hat 16.0.1-3.el9)')
using bpftool v7.2.0
libbpf support: system v1.2.0
  perf_buffer__consume support: yes
  btf__load_from_kernel_by_id support: yes
  btf__type_cnt support: yes
  bpf_object__next_map support: yes
  bpf_object__next_program support: yes
  bpf_program__insn_cnt support: yes
  bpf_program__type support: yes
  bpf_program__flags support: yes
  bpf_program__expected_attach_type support: yes
  bpf_map_create support: yes
  perf_buffer__new_raw support: yes
  bpf_xdp_attach support: yes
  bpf_map__set_autocreate support: yes
  bpf_prog_test_run_opts support: yes
  bpf_xdp_query support: yes
secure_getenv support: yes
cap-ng support: no
[root@wsfd-advnetlab10 xdp-tools]# make

lib

  libxdp
    CC       staticobjs/libxdp.o
    CC       staticobjs/xsk.o
    M4       xdp-dispatcher.c
    CLANG    xdp-dispatcher.o
    LLC      xdp-dispatcher.o
    GEN      xdp-dispatcher.embed.o
    CLANG    xsk_def_xdp_prog.o
    LLC      xsk_def_xdp_prog.o
    GEN      xsk_def_xdp_prog.embed.o
    CLANG    xsk_def_xdp_prog_5.3.o
    LLC      xsk_def_xdp_prog_5.3.o
    GEN      xsk_def_xdp_prog_5.3.embed.o
    LINK     libxdp.a
    CC       sharedobjs/libxdp.o
    CC       sharedobjs/xsk.o
    LINK     libxdp.so.1.4.0

  util
    CLANG    xdp_sample.bpf.o
    LLC      xdp_sample.bpf.o
    GEN      xdp_sample.skel.h
    CLANG    xdp_load_bytes.bpf.o
    LLC      xdp_load_bytes.bpf.o
    GEN      xdp_load_bytes.skel.h
    CC       params.o
    CC       logging.o
    CC       util.o
    CC       stats.o
    CC       xpcapng.o
    CC       xdp_sample.o

  testing
    CLANG    test_long_func_name.o
    LLC      test_long_func_name.o
    CLANG    xdp_drop.o
    LLC      xdp_drop.o
    CLANG    xdp_pass.o
    LLC      xdp_pass.o
    CC       test-tool

xdp-filter
    CLANG    xdpfilt_dny_udp.o
    LLC      xdpfilt_dny_udp.o
    CLANG    xdpfilt_dny_tcp.o
    LLC      xdpfilt_dny_tcp.o
    CLANG    xdpfilt_dny_ip.o
    LLC      xdpfilt_dny_ip.o
    CLANG    xdpfilt_dny_eth.o
    LLC      xdpfilt_dny_eth.o
    CLANG    xdpfilt_dny_all.o
    LLC      xdpfilt_dny_all.o
    CLANG    xdpfilt_alw_udp.o
    LLC      xdpfilt_alw_udp.o
    CLANG    xdpfilt_alw_tcp.o
    LLC      xdpfilt_alw_tcp.o
    CLANG    xdpfilt_alw_ip.o
    LLC      xdpfilt_alw_ip.o
    CLANG    xdpfilt_alw_eth.o
    LLC      xdpfilt_alw_eth.o
    CLANG    xdpfilt_alw_all.o
    LLC      xdpfilt_alw_all.o
    CC       xdp-filter

xdp-loader
    CC       xdp-loader

xdp-dump
    CC       xdpdump
    CLANG    xdpdump_bpf.o
    LLC      xdpdump_bpf.o
    CLANG    xdpdump_xdp.o
    LLC      xdpdump_xdp.o

xdp-bench
    CLANG    xdp_redirect_basic.bpf.o
    LLC      xdp_redirect_basic.bpf.o
    GEN      xdp_redirect_basic.skel.h
    CLANG    xdp_redirect_cpumap.bpf.o
    LLC      xdp_redirect_cpumap.bpf.o
    GEN      xdp_redirect_cpumap.skel.h
    CLANG    xdp_redirect_devmap.bpf.o
    LLC      xdp_redirect_devmap.bpf.o
    GEN      xdp_redirect_devmap.skel.h
    CLANG    xdp_redirect_devmap_multi.bpf.o
    LLC      xdp_redirect_devmap_multi.bpf.o
    GEN      xdp_redirect_devmap_multi.skel.h
    CLANG    xdp_basic.bpf.o
    LLC      xdp_basic.bpf.o
    GEN      xdp_basic.skel.h
    CC       xdp-bench

xdp-monitor
    CLANG    xdp_monitor.bpf.o
    LLC      xdp_monitor.bpf.o
    GEN      xdp_monitor.skel.h
    CC       xdp-monitor

xdp-trafficgen
    CLANG    xdp_trafficgen.bpf.o
    LLC      xdp_trafficgen.bpf.o
    GEN      xdp_trafficgen.skel.h
    CC       xdp-trafficgen
[root@wsfd-advnetlab10 xdp-tools]# rpm -q libbpf
libbpf-1.2.0-1.el9.x86_64

[root@wsfd-advnetlab10 xdp-tools]# uname -r
5.14.0-337.el9.x86_64
[root@wsfd-advnetlab10 xdp-tools]#

Comment 8 Jean-Tsung Hsiao 2023-07-26 12:43:22 UTC
Per Comment 14 set the status to VERIFIED.

Comment 10 errata-xmlrpc 2023-11-07 08:52:13 UTC
Since the problem described in this bug report should be
resolved in a recent advisory, it has been closed with a
resolution of ERRATA.

For information on the advisory (libbpf bug fix and enhancement update), and where to find the updated
files, follow the link below.

If the solution does not work for you, open a new bug report.

https://access.redhat.com/errata/RHBA-2023:6616


Note You need to log in before you can comment on or make changes to this bug.