From: Tony Ambardar <tony.ambardar@gmail.com>
To: "Alexis Lothoré" <alexis.lothore@bootlin.com>
Cc: Arnaldo Carvalho de Melo <acme@kernel.org>,
Alan Maguire <alan.maguire@oracle.com>,
bpf@vger.kernel.org, dwarves@vger.kernel.org
Subject: Re: Pahole/BTF issue with __int128
Date: Wed, 7 May 2025 13:39:23 -0700 [thread overview]
Message-ID: <aBvE++cyskZTfAo5@kodidev-ubuntu> (raw)
In-Reply-To: <D9Q73OTLEOU4.LNAO9K4POETM@bootlin.com>
On Wed, May 07, 2025 at 10:02:51PM +0200, Alexis Lothoré wrote:
> Hello,
>
> I am working on some ebpf feature for ARM64 (improving trampolines to
> attach tracing programs to functions with more arguments than the current
> limit), and I am facing an issue with the generated BTF information when
> playing with large int types like __int128 (I need to use those large types
> to properly test some architecture-specific alignment expectations). I
> suspect the issue to be in pahole, but I would like to get some opinions on
> my observations, and maybe some guidance on where to look at to go further.
>
> I would like to attach some fentry/fexit programs to the following kind of
> function, which is currently defined in a kernel module (bpf_testmod.ko in
> bpf selftests):
>
> struct bpf_testmod_struct_arg_7 {
> _int128 a;
> };
>
> noinline int bpf_testmod_test_struct_arg_11(
> struct bpf_testmod_struct_arg_7 a,
> struct bpf_testmod_struct_arg_7 b,
> struct bpf_testmod_struct_arg_7 c,
> struct bpf_testmod_struct_arg_7 d,
> short e,
> struct bpf_testmod_struct_arg_7 f)
> {
> [...]
> }
>
> This one works well (let's call it case 1), I am able to attach
> fentry/fexit programs to such function through libbpf.
>
> However, if, in a case 2, I change the bpf_testmod_test_struct_arg_11
> prototype to use __in128 arguments instead of struct arguments, like the
> following one:
>
> noinline int bpf_testmod_test_struct_arg_11(
> __int128 a,
> __int128 b,
> __int128 c,
> __int128 d,
> short e,
> __int128 f)
> {
> [...]
> }
>
> and rebuild the module/run my test, this does not work anymore, and libbpf
> complains with the following error:
> libbpf: prog 'test_struct_many_args_9': failed to find kernel BTF type ID
> of 'bpf_testmod_test_struct_arg_11': -ESRCH
>
> Inspecting the generated BTF information in bpf_testmod.ko file with bpftool, I
> indeed find some BTF info related to my target func in case 1 but not in
> case 2:
>
> [...]
> [118] STRUCT 'bpf_testmod_struct_arg_7' size=16 vlen=1
> 'a' type_id=10 bits_offset=0
> [...]
> [371] FUNC_PROTO '(anon)' ret_type_id=6 vlen=6
> 'a' type_id=118
> 'b' type_id=118
> 'c' type_id=118
> 'd' type_id=118
> 'e' type_id=5
> 'f' type_id=118
> [372] FUNC 'bpf_testmod_test_struct_arg_11' type_id=371 linkage=static
> [...]
>
> I checked the command executed by the kernel build system to generate BTF
> info for the module, and got the following one:
> pahole -J -j\
> --btf_features=encode_force,var,float,enum64,decl_tag,type_tag,optimized_func,consistent_func,decl_tag_kfuncs\
> --btf_features=attributes --lang_exclude=rust\
> --btf_features=distilled_base --btf_base vmlinux\
> tools/testing/selftests/bpf/bpf_testmod.ko
>
> I ran the same command before/after switching the struct arguments to
> __int128, and made the same observation (I am running pahole 1.30). I then
> took a look at available DWARF info available in bpf_testmod.ko for pahole
> to generate BTF info, and AFAICT, it looks ok (to be confirmed ?) in both
> cases (I am using an aarch64-linux-gcc toolchain, v13.2.0 from
> https://toolchains.bootlin.com/)
>
> Case 1:
>
> [...]
> <1><262>: Abbrev Number: 106 (DW_TAG_base_type)
> <263> DW_AT_byte_size : 16
> <264> DW_AT_encoding : 5 (signed)
> <265> DW_AT_name : (indirect string, offset: 0x193bc): __int128
> [...]
> <1><23429>: Abbrev Number: 11 (DW_TAG_structure_type)
> <2342a> DW_AT_name : (indirect string, offset: 0xe98d): bpf_testmod_struct_arg_7
> <2342e> DW_AT_byte_size : 16
> <2342f> DW_AT_decl_file : 1
> <23430> DW_AT_decl_line : 70
> <23431> DW_AT_decl_column : 8
> <23432> DW_AT_sibling : <0x23442>
> <2><23436>: Abbrev Number: 12 (DW_TAG_member)
> <23437> DW_AT_name : a
> <23439> DW_AT_decl_file : 1
> <2343a> DW_AT_decl_line : 71
> <2343b> DW_AT_decl_column : 11
> <2343c> DW_AT_type : <0x262>
> <23440> DW_AT_data_member_location: 0
> [...]
> <1><295c1>: Abbrev Number: 99 (DW_TAG_subprogram)
> <295c2> DW_AT_external : 1
> <295c2> DW_AT_name : (indirect string, offset: 0x5e20): bpf_testmod_test_struct_arg_11
> <295c6> DW_AT_decl_file : 1
> <295c7> DW_AT_decl_line : 152
> <295c8> DW_AT_decl_column : 14
> <295c9> DW_AT_prototyped : 1
> <295c9> DW_AT_type : <0xdd>
> <295cd> DW_AT_low_pc : 0x1380
> <295d5> DW_AT_high_pc : 0x34
> <295dd> DW_AT_frame_base : 1 byte block: 9c (DW_OP_call_frame_cfa)
> <295df> DW_AT_GNU_all_call_sites: 1
> <295df> DW_AT_sibling : <0x2964a>
> <2><295e3>: Abbrev Number: 45 (DW_TAG_formal_parameter)
> <295e4> DW_AT_name : a
> <295e6> DW_AT_decl_file : 1
> <295e7> DW_AT_decl_line : 152
> <295e8> DW_AT_decl_column : 77
> <295e9> DW_AT_type : <0x23429>
> <295ed> DW_AT_location : 0x6196 (location list)
> <295f1> DW_AT_GNU_locviews: 0x6194
> [...]
>
> Case 2:
>
> [...]
> <1><262>: Abbrev Number: 106 (DW_TAG_base_type)
> <263> DW_AT_byte_size : 16
> <264> DW_AT_encoding : 5 (signed)
> <265> DW_AT_name : (indirect string, offset: 0x1935d): __int128
> [...]
> <1><29552>: Abbrev Number: 98 (DW_TAG_subprogram)
> <29553> DW_AT_external : 1
> <29553> DW_AT_name : (indirect string, offset: 0x5e20): bpf_testmod_test_struct_arg_11
> <29557> DW_AT_decl_file : 1
> <29558> DW_AT_decl_line : 148
> <29559> DW_AT_decl_column : 14
> <2955a> DW_AT_prototyped : 1
> <2955a> DW_AT_type : <0xdd>
> <2955e> DW_AT_low_pc : 0x1380
> <29566> DW_AT_high_pc : 0x34
> <2956e> DW_AT_frame_base : 1 byte block: 9c (DW_OP_call_frame_cfa)
> <29570> DW_AT_GNU_all_call_sites: 1
> <29570> DW_AT_sibling : <0x295d6>
> <2><29574>: Abbrev Number: 46 (DW_TAG_formal_parameter)
> <29575> DW_AT_name : a
> <29577> DW_AT_decl_file : 1
> <29578> DW_AT_decl_line : 148
> <29579> DW_AT_decl_column : 54
> <2957a> DW_AT_type : <0x262>
> <2957e> DW_AT_location : 0x6158 (location list)
> <29582> DW_AT_GNU_locviews: 0x6154
> [...]
>
Hi Alexis,
> Am I missing some constraint or limitation that would prevent the case 2
> function from being described with BTF info ? If not, any advice about how
> to debug this further ?
>
I suspect this might be related to an issue I ran into where pahole may
mis-encode types larger than register-size [1]. Out of curiosity, could
you try rebuilding and using a pahole with my latest patch [2]?
1: https://lore.kernel.org/dwarves/20250410083359.198724-1-tony.ambardar@gmail.com/
2: https://lore.kernel.org/dwarves/20250502070318.1561924-1-tony.ambardar@gmail.com/
Cheers,
Tony
> Thanks,
>
> Alexis
>
> --
> Alexis Lothoré, Bootlin
> Embedded Linux and Kernel engineering
> https://bootlin.com
next prev parent reply other threads:[~2025-05-07 20:39 UTC|newest]
Thread overview: 3+ messages / expand[flat|nested] mbox.gz Atom feed top
2025-05-07 20:02 Pahole/BTF issue with __int128 Alexis Lothoré
2025-05-07 20:39 ` Tony Ambardar [this message]
2025-05-07 22:20 ` Alexis Lothoré
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=aBvE++cyskZTfAo5@kodidev-ubuntu \
--to=tony.ambardar@gmail.com \
--cc=acme@kernel.org \
--cc=alan.maguire@oracle.com \
--cc=alexis.lothore@bootlin.com \
--cc=bpf@vger.kernel.org \
--cc=dwarves@vger.kernel.org \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox