From: Alexei Starovoitov <alexei.starovoitov@gmail.com>
To: Alan Maguire <alan.maguire@oracle.com>
Cc: ast@kernel.org, daniel@iogearbox.net, andrii@kernel.org,
acme@kernel.org, martin.lau@linux.dev, song@kernel.org,
yhs@fb.com, john.fastabend@gmail.com, kpsingh@kernel.org,
sdf@google.com, haoluo@google.com, jolsa@kernel.org,
quentin@isovalent.com, mykolal@fb.com, bpf@vger.kernel.org
Subject: Re: [RFC bpf-next 1/8] btf: add kind metadata encoding to UAPI
Date: Wed, 31 May 2023 20:53:54 -0700 [thread overview]
Message-ID: <20230601035354.5u56fwuundu6m7v2@MacBook-Pro-8.local> (raw)
In-Reply-To: <20230531201936.1992188-2-alan.maguire@oracle.com>
On Wed, May 31, 2023 at 09:19:28PM +0100, Alan Maguire wrote:
> BTF kind metadata provides information to parse BTF kinds.
> By separating parsing BTF from using all the information
> it provides, we allow BTF to encode new features even if
> they cannot be used. This is helpful in particular for
> cases where newer tools for BTF generation run on an
> older kernel; BTF kinds may be present that the kernel
> cannot yet use, but at least it can parse the BTF
> provided. Meanwhile userspace tools with newer libbpf
> may be able to use the newer information.
>
> The intent is to support encoding of kind metadata
> optionally so that tools like pahole can add this
> information. So for each kind we record
>
> - a kind name string
> - kind-related flags
> - length of singular element following struct btf_type
> - length of each of the btf_vlen() elements following
>
> In addition we make space in the metadata for
> CRC32s computed over the BTF along with a CRC for
> the base BTF; this allows split BTF to identify
> a mismatch explicitly. Finally we provide an
> offset for an optional description string.
>
> The ideas here were discussed at [1] hence
>
> Suggested-by: Andrii Nakryiko <andrii@kernel.org>
> Signed-off-by: Alan Maguire <alan.maguire@oracle.com>
>
> [1] https://lore.kernel.org/bpf/CAEf4BzYjWHRdNNw4B=eOXOs_ONrDwrgX4bn=Nuc1g8JPFC34MA@mail.gmail.com/
> ---
> include/uapi/linux/btf.h | 29 +++++++++++++++++++++++++++++
> tools/include/uapi/linux/btf.h | 29 +++++++++++++++++++++++++++++
> 2 files changed, 58 insertions(+)
>
> diff --git a/include/uapi/linux/btf.h b/include/uapi/linux/btf.h
> index ec1798b6d3ff..94c1f4518249 100644
> --- a/include/uapi/linux/btf.h
> +++ b/include/uapi/linux/btf.h
> @@ -8,6 +8,34 @@
> #define BTF_MAGIC 0xeB9F
> #define BTF_VERSION 1
>
> +/* is this information required? If so it cannot be sanitized safely. */
> +#define BTF_KIND_META_OPTIONAL (1 << 0)
> +
> +struct btf_kind_meta {
> + __u32 name_off; /* kind name string offset */
> + __u16 flags; /* see BTF_KIND_META_* values above */
> + __u8 info_sz; /* size of singular element after btf_type */
> + __u8 elem_sz; /* size of each of btf_vlen(t) elements */
> +};
> +
> +/* for CRCs for BTF, base BTF to be considered usable, flags must be set. */
> +#define BTF_META_CRC_SET (1 << 0)
> +#define BTF_META_BASE_CRC_SET (1 << 1)
> +
> +struct btf_metadata {
> + __u8 kind_meta_cnt; /* number of struct btf_kind_meta */
> + __u32 flags;
> + __u32 description_off; /* optional description string */
> + __u32 crc; /* crc32 of BTF */
> + __u32 base_crc; /* crc32 of base BTF */
> + struct btf_kind_meta kind_meta[];
> +};
> +
> +struct btf_meta_header {
> + __u32 meta_off; /* offset of metadata section */
> + __u32 meta_len; /* length of metadata section */
> +};
> +
> struct btf_header {
> __u16 magic;
> __u8 version;
> @@ -19,6 +47,7 @@ struct btf_header {
> __u32 type_len; /* length of type section */
> __u32 str_off; /* offset of string section */
> __u32 str_len; /* length of string section */
> + struct btf_meta_header meta_header;
> };
>
> /* Max # of type identifier */
> diff --git a/tools/include/uapi/linux/btf.h b/tools/include/uapi/linux/btf.h
> index ec1798b6d3ff..94c1f4518249 100644
> --- a/tools/include/uapi/linux/btf.h
> +++ b/tools/include/uapi/linux/btf.h
> @@ -8,6 +8,34 @@
> #define BTF_MAGIC 0xeB9F
> #define BTF_VERSION 1
>
> +/* is this information required? If so it cannot be sanitized safely. */
> +#define BTF_KIND_META_OPTIONAL (1 << 0)
> +
> +struct btf_kind_meta {
> + __u32 name_off; /* kind name string offset */
> + __u16 flags; /* see BTF_KIND_META_* values above */
> + __u8 info_sz; /* size of singular element after btf_type */
> + __u8 elem_sz; /* size of each of btf_vlen(t) elements */
> +};
> +
> +/* for CRCs for BTF, base BTF to be considered usable, flags must be set. */
> +#define BTF_META_CRC_SET (1 << 0)
> +#define BTF_META_BASE_CRC_SET (1 << 1)
> +
> +struct btf_metadata {
> + __u8 kind_meta_cnt; /* number of struct btf_kind_meta */
Overall, looks great.
Few small nits:
I'd make kind_meta_cnt u32, since padding we won't be able to reuse anyway
and would bump the BTF_VERSION to 2 to make it a 'milestone'.
v2 -> self described.
> + __u32 flags;
> + __u32 description_off; /* optional description string */
> + __u32 crc; /* crc32 of BTF */
> + __u32 base_crc; /* crc32 of base BTF */
Hard coded CRC also gives me a pause.
Should it be an optional KIND like btf tags?
next prev parent reply other threads:[~2023-06-01 3:54 UTC|newest]
Thread overview: 35+ messages / expand[flat|nested] mbox.gz Atom feed top
2023-05-31 20:19 [RFC bpf-next 0/8] bpf: support BTF kind metadata to separate Alan Maguire
2023-05-31 20:19 ` [RFC bpf-next 1/8] btf: add kind metadata encoding to UAPI Alan Maguire
2023-06-01 3:53 ` Alexei Starovoitov [this message]
2023-06-01 10:36 ` Alan Maguire
2023-06-01 16:53 ` Alexei Starovoitov
2023-06-02 16:32 ` Andrii Nakryiko
2023-06-02 16:34 ` Andrii Nakryiko
2023-06-02 18:11 ` Alexei Starovoitov
2023-06-02 20:33 ` Andrii Nakryiko
2023-06-05 16:14 ` Alexei Starovoitov
2023-06-05 22:38 ` Andrii Nakryiko
2023-06-06 2:46 ` Alexei Starovoitov
2023-06-06 11:30 ` Toke Høiland-Jørgensen
2023-06-07 11:55 ` Eduard Zingerman
2023-06-07 15:29 ` Yonghong Song
2023-06-07 16:14 ` Eduard Zingerman
2023-06-07 21:47 ` Andrii Nakryiko
2023-06-07 22:05 ` Eduard Zingerman
2023-06-07 22:34 ` Andrii Nakryiko
2023-06-06 16:50 ` Andrii Nakryiko
2023-06-07 1:16 ` Alexei Starovoitov
2023-06-07 21:43 ` Andrii Nakryiko
2023-05-31 20:19 ` [RFC bpf-next 2/8] libbpf: support handling of metadata section in BTF Alan Maguire
2023-06-05 11:01 ` Jiri Olsa
2023-06-05 21:40 ` Andrii Nakryiko
2023-05-31 20:19 ` [RFC bpf-next 3/8] libbpf: use metadata to compute an unknown kind size Alan Maguire
2023-05-31 20:19 ` [RFC bpf-next 4/8] btf: support kernel parsing of BTF with metadata, use it to parse BTF with unknown kinds Alan Maguire
2023-06-07 19:51 ` Eduard Zingerman
2023-05-31 20:19 ` [RFC bpf-next 5/8] libbpf: add metadata encoding support Alan Maguire
2023-05-31 20:19 ` [RFC bpf-next 6/8] btf: generate metadata for vmlinux/module BTF Alan Maguire
2023-05-31 20:19 ` [RFC bpf-next 7/8] bpftool: add BTF dump "format meta" to dump header/metadata Alan Maguire
2023-06-01 16:33 ` Quentin Monnet
2023-06-02 16:57 ` Andrii Nakryiko
2023-05-31 20:19 ` [RFC bpf-next 8/8] selftests/bpf: test kind encoding/decoding Alan Maguire
2023-05-31 20:19 ` [RFC dwarves] dwarves: encode BTF metadata if --btf_gen_meta is set Alan Maguire
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=20230601035354.5u56fwuundu6m7v2@MacBook-Pro-8.local \
--to=alexei.starovoitov@gmail.com \
--cc=acme@kernel.org \
--cc=alan.maguire@oracle.com \
--cc=andrii@kernel.org \
--cc=ast@kernel.org \
--cc=bpf@vger.kernel.org \
--cc=daniel@iogearbox.net \
--cc=haoluo@google.com \
--cc=john.fastabend@gmail.com \
--cc=jolsa@kernel.org \
--cc=kpsingh@kernel.org \
--cc=martin.lau@linux.dev \
--cc=mykolal@fb.com \
--cc=quentin@isovalent.com \
--cc=sdf@google.com \
--cc=song@kernel.org \
--cc=yhs@fb.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox;
as well as URLs for NNTP newsgroup(s).