From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.1 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 36B0BC55178 for ; Fri, 6 Nov 2020 23:05:31 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id F340A20B80 for ; Fri, 6 Nov 2020 23:05:30 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604703931; bh=G/oLlxaTtzkA4elfXUBjZ1nKeQlWniTxA4/uGMSiUpA=; h=From:To:CC:Subject:Date:List-ID:From; b=QQM4EYKt+d5eCKohq2JHnXkEE8hAzbYEkw6Oa5JZye5FErwsNaoU2t08NBjdD4FgB MniRiBfLEJeT8U8BNNszRBsy5EQuL4cM97U+4yENzVTNZR51aih3kZ5gz/ImSvgudi Lg1p6UiJrWI8wfeKwn2/lMFakW2UtClYgYpaw8Fs= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729101AbgKFXF2 convert rfc822-to-8bit (ORCPT ); Fri, 6 Nov 2020 18:05:28 -0500 Received: from mx0b-00082601.pphosted.com ([67.231.153.30]:30794 "EHLO mx0b-00082601.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729036AbgKFXFM (ORCPT ); Fri, 6 Nov 2020 18:05:12 -0500 Received: from pps.filterd (m0109331.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 0A6N4UvK010046 for ; Fri, 6 Nov 2020 15:05:11 -0800 Received: from maileast.thefacebook.com ([163.114.130.16]) by mx0a-00082601.pphosted.com with ESMTP id 34mw5bnbhe-2 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT) for ; Fri, 06 Nov 2020 15:05:11 -0800 Received: from intmgw003.08.frc2.facebook.com (2620:10d:c0a8:1b::d) by mail.thefacebook.com (2620:10d:c0a8:83::5) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1979.3; Fri, 6 Nov 2020 15:05:09 -0800 Received: by devbig012.ftw2.facebook.com (Postfix, from userid 137359) id C89ED2EC8FA2; Fri, 6 Nov 2020 15:02:30 -0800 (PST) From: Andrii Nakryiko To: , , , CC: , , , , Andrii Nakryiko , Arnaldo Carvalho de Melo , Greg Kroah-Hartman Subject: [PATCH v2 bpf-next 0/5] Integrate kernel module BTF support Date: Fri, 6 Nov 2020 15:02:23 -0800 Message-ID: <20201106230228.2202-1-andrii@kernel.org> X-Mailer: git-send-email 2.24.1 X-FB-Internal: Safe Content-Type: text/plain Content-Transfer-Encoding: 8BIT X-Proofpoint-UnRewURL: 0 URL was un-rewritten MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.312,18.0.737 definitions=2020-11-06_06:2020-11-05,2020-11-06 signatures=0 X-Proofpoint-Spam-Details: rule=fb_default_notspam policy=fb_default score=0 malwarescore=0 bulkscore=0 spamscore=0 impostorscore=0 lowpriorityscore=0 phishscore=0 suspectscore=0 adultscore=0 mlxlogscore=999 clxscore=1015 mlxscore=0 priorityscore=1501 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2011060154 X-FB-Internal: deliver Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org This patch set adds BTF generation for kernel modules using a compact split BTF approach. Respective patches have all the details. Kernel module BTFs rely on pahole's split BTF support, which is added in [0] and will be available starting from v1.19. Support for it is detected automatically during kernel build time. This patch set implements in-kernel support for split BTF loading and validation. It also extends GET_OBJ_INFO API for BTFs to return BTF's module name and a flag whether BTF itself is in-kernel or user-provided. vmlinux BTF is also exposed to user-space through the same BTF object iteration APIs. Follow up patch set will utilize the fact that vmlinux and module BTFs now have associated ID to provide ability to attach BPF fentry/fexit/etc programs to functions defined in kernel modules. bpftool is also extended to show module/vmlinux BTF's name. [0] https://patchwork.kernel.org/project/netdevbpf/list/?series=378699&state=* v2->v1: - drop WARNs, add fewer pr_warn()'s instead (Greg); - properly initialize sysfs binary attribute structure (Greg); - add __maybe_unused to any_section_objs, used conditionally by module BTF; rfc->v1: - CONFIG_DEBUG_INFO_BTF_MODULES is derived automatically (Alexei); - vmlinux BTF now has explicit "vmlinux" name (Alexei); - added sysfs ABI documentation for /sys/kernel/btf/ (Greg). Cc: Arnaldo Carvalho de Melo Cc: Greg Kroah-Hartman Andrii Nakryiko (5): bpf: add in-kernel split BTF support bpf: assign ID to vmlinux BTF and return extra info for BTF in GET_OBJ_INFO kbuild: build kernel module BTFs if BTF is enabled and pahole supports it bpf: load and verify kernel module BTFs tools/bpftool: add support for in-kernel and named BTF in `btf show` Documentation/ABI/testing/sysfs-kernel-btf | 8 + include/linux/bpf.h | 2 + include/linux/module.h | 4 + include/uapi/linux/bpf.h | 3 + kernel/bpf/btf.c | 413 ++++++++++++++++++--- kernel/bpf/sysfs_btf.c | 2 +- kernel/module.c | 32 ++ lib/Kconfig.debug | 9 + scripts/Makefile.modfinal | 20 +- tools/bpf/bpftool/btf.c | 28 +- tools/include/uapi/linux/bpf.h | 3 + 11 files changed, 467 insertions(+), 57 deletions(-) -- 2.24.1