From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org Received: from bombadil.infradead.org (bombadil.infradead.org [198.137.202.133]) (using TLSv1.2 with cipher ECDHE-RSA-AES256-GCM-SHA384 (256/256 bits)) (No client certificate requested) by smtp.lore.kernel.org (Postfix) with ESMTPS id 913F5C4707B for ; Sat, 13 Jan 2024 14:00:59 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; q=dns/txt; c=relaxed/relaxed; d=lists.infradead.org; s=bombadil.20210309; h=Sender: Content-Transfer-Encoding:Content-Type:List-Subscribe:List-Help:List-Post: List-Archive:List-Unsubscribe:List-Id:In-Reply-To:MIME-Version:References: Message-ID:Subject:Cc:To:Date:From:Reply-To:Content-ID:Content-Description: Resent-Date:Resent-From:Resent-Sender:Resent-To:Resent-Cc:Resent-Message-ID: List-Owner; bh=rc5L5ooz2cr7TejCz/FbWv+gqeEqm2FaOlEfZglYoso=; b=eaeqetDMaGNMAB DCxSPbKt7uPePCc+dPHKy76YbG0FYf92fpgVt+XfowJtJw414tHKtYr4MsGiq2SqQqQ+96I9hVzIW IZe3O+WjNNZC8r49fQVkgJXvqofsCLHaQN+akPWqQaZEfTeZ+KJh8AZNwcbobk9APoEgahKotyoX9 EH/X4cDPbpJtG4tm69vMz3pMIxtiyIX3xkLXAGANrRc0rl7wSsPMjA+GBSJB65a26hU5+9V/Ugq3x DeuEDZ19jZWw1lbTQjsoDobaJ/u5Lb7V9hOxfgUnXUJyfWSirAFqUG9Bf/trUprT4GwUkrEVFqo8a 6fHglEVJRyVvYa8nfA0w==; Received: from localhost ([::1] helo=bombadil.infradead.org) by bombadil.infradead.org with esmtp (Exim 4.96 #2 (Red Hat Linux)) id 1rOeWG-005DK2-2b; Sat, 13 Jan 2024 13:57:52 +0000 Received: from mail-ej1-x630.google.com ([2a00:1450:4864:20::630]) by bombadil.infradead.org with esmtps (Exim 4.96 #2 (Red Hat Linux)) id 1rOeWD-005DJ8-21 for linux-arm-kernel@lists.infradead.org; Sat, 13 Jan 2024 13:57:51 +0000 Received: by mail-ej1-x630.google.com with SMTP id a640c23a62f3a-a26f73732c5so856400966b.3 for ; Sat, 13 Jan 2024 05:57:46 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20230601; t=1705154263; x=1705759063; darn=lists.infradead.org; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:date:from:from:to:cc:subject:date:message-id:reply-to; bh=PGE1HEJ5ixxTvOXVNxbbYY7sOdvQr1NpAqO6gUYLh08=; b=BHshBp7DUuOghRCrDmVVlGIqZcrFLgS91QNSA4CMiTNoDV553k9lWVNwlIuv+gDVy+ q++BIti+73hXTh+yEktSVk2UK/4sGZuWOs0aOaZKRlzRlQaBSAUujM1UGQ/uyTOvVwQK OvjB4GHAFbOOX812aH2aObBrDGJ+WrPtKfpoXIBwkWqXAJtWXJsSHSIeC09eNedgkaGH rt43M9voKMgVVCK3/jJjVkvW0uquPPTARtszsoOBDmOJeRCCgbhm6jqa8t8E0NW2LOCl R3cMyrsWbtZmt+PPqfHFyXaD/N3qteTrKJecuPWBs3g0KDsdNxIdorcWvxUStToIUAUi Vmlw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20230601; t=1705154263; x=1705759063; h=in-reply-to:content-disposition:mime-version:references:message-id :subject:cc:to:date:from:x-gm-message-state:from:to:cc:subject:date :message-id:reply-to; bh=PGE1HEJ5ixxTvOXVNxbbYY7sOdvQr1NpAqO6gUYLh08=; b=ZEP0BFLms3UMhJ7X8xzfZk7W7BbROoAELIHqT3oW1o6TPr8DbeqKhfuIfpwTbNTin4 ShjRYA/Lce3twSXvToFuR6FP+avKygqJ0MvHtT9e16oQG0texHo8IwavTR+9QSVXrJ5/ myZQcAn5K8wT+Dz7GXj2bXZhNQjUXcdPOHPA3JLfATKNSrfrL78h71xMqSrJjFdHsKLO W4I/DIs+kBjx7jnSoqQ3RKB6s7i7CkTS0yqgcr1Kdx9CcX2m/Cbxc1n2fYy6BFTXKzZc 1qbU7MS+eDZJfK/8AM42VXseeTox/y8dw6ecot97wjRRXGFKK/mkaeVDP/X7wIufiuU6 F6+Q== X-Gm-Message-State: AOJu0YwljMvHmcyso9aD75qegk0XTiv9gRvpuyp3abJxvrjQjDGc5OvJ /Hm14ifUi4BoLhRu7P00uyc= X-Google-Smtp-Source: AGHT+IFMOIYDYiCqRWjRhgVi6B2d5peHDNTF2jXuwvHB8FKts87L7ld0sC7DRk8qiddMgjxRgmPzDw== X-Received: by 2002:a17:906:15c3:b0:a2b:1a80:7b72 with SMTP id l3-20020a17090615c300b00a2b1a807b72mr1514786ejd.30.1705154262796; Sat, 13 Jan 2024 05:57:42 -0800 (PST) Received: from krava (ip-94-113-247-30.net.vodafone.cz. [94.113.247.30]) by smtp.gmail.com with ESMTPSA id b4-20020a170906150400b00a2a37f63216sm2950887ejd.171.2024.01.13.05.57.41 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 13 Jan 2024 05:57:42 -0800 (PST) From: Jiri Olsa X-Google-Original-From: Jiri Olsa Date: Sat, 13 Jan 2024 14:57:40 +0100 To: Daniel Xu Cc: Jiri Olsa , linux-input@vger.kernel.org, coreteam@netfilter.org, linux-arm-kernel@lists.infradead.org, linux-kernel@vger.kernel.org, netfilter-devel@vger.kernel.org, linux-kselftest@vger.kernel.org, linux-trace-kernel@vger.kernel.org, fsverity@lists.linux.dev, bpf@vger.kernel.org, netdev@vger.kernel.org, linux-stm32@st-md-mailman.stormreply.com, cgroups@vger.kernel.org, alexei.starovoitov@gmail.com, quentin@isovalent.com, alan.maguire@oracle.com, memxor@gmail.com Subject: Re: [PATCH bpf-next v3 0/3] Annotate kfuncs in .BTF_ids section Message-ID: References: <2dhmwvfnnqnlrui2qcr5fob54gdsuse5caievct42trvvia6qe@p24nymz3uttv> MIME-Version: 1.0 Content-Disposition: inline In-Reply-To: <2dhmwvfnnqnlrui2qcr5fob54gdsuse5caievct42trvvia6qe@p24nymz3uttv> X-CRM114-Version: 20100106-BlameMichelson ( TRE 0.8.0 (BSD) ) MR-646709E3 X-CRM114-CacheID: sfid-20240113_055749_670422_F6D6CC09 X-CRM114-Status: GOOD ( 18.22 ) X-BeenThere: linux-arm-kernel@lists.infradead.org X-Mailman-Version: 2.1.34 Precedence: list List-Id: List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: 7bit Sender: "linux-arm-kernel" Errors-To: linux-arm-kernel-bounces+linux-arm-kernel=archiver.kernel.org@lists.infradead.org On Fri, Jan 12, 2024 at 01:03:59PM -0700, Daniel Xu wrote: > On Fri, Jan 12, 2024 at 05:20:39PM +0100, Jiri Olsa wrote: > > On Sat, Jan 06, 2024 at 11:24:07AM -0700, Daniel Xu wrote: > > > === Description === > > > > > > This is a bpf-treewide change that annotates all kfuncs as such inside > > > .BTF_ids. This annotation eventually allows us to automatically generate > > > kfunc prototypes from bpftool. > > > > > > We store this metadata inside a yet-unused flags field inside struct > > > btf_id_set8 (thanks Kumar!). pahole will be taught where to look. > > > > > > More details about the full chain of events are available in commit 3's > > > description. > > > > > > The accompanying pahole changes (still needs some cleanup) can be viewed > > > here on this "frozen" branch [0]. > > > > so the plan is to have bpftool support to generate header file > > with detected kfuncs? > > Yep, that's the major use case. But I see other use cases as well like ok, any chance you could already include it in the patchset? would be a great way to test this.. maybe we could change selftests to use that thanks, jirka > precision probing of kfuncs. Rather than guess and check which progs can > load (in the event of backwards incompatible kfunc changes), programs > can look at kfunc type signature thru BTF. _______________________________________________ linux-arm-kernel mailing list linux-arm-kernel@lists.infradead.org http://lists.infradead.org/mailman/listinfo/linux-arm-kernel