From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-3.1 required=3.0 tests=DKIMWL_WL_HIGH,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,HEADER_FROM_DIFFERENT_DOMAINS,MAILING_LIST_MULTI, SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id A3216C282CB for ; Tue, 5 Feb 2019 19:49:02 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 6DC952080F for ; Tue, 5 Feb 2019 19:49:02 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (1024-bit key) header.d=fb.com header.i=@fb.com header.b="FJ5TgJ/r" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729871AbfBETtB (ORCPT ); Tue, 5 Feb 2019 14:49:01 -0500 Received: from mx0a-00082601.pphosted.com ([67.231.145.42]:53340 "EHLO mx0a-00082601.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727138AbfBETtB (ORCPT ); Tue, 5 Feb 2019 14:49:01 -0500 Received: from pps.filterd (m0148461.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.16.0.27/8.16.0.27) with SMTP id x15JlfMc009658 for ; Tue, 5 Feb 2019 11:49:00 -0800 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fb.com; h=from : to : cc : subject : date : message-id : mime-version : content-type; s=facebook; bh=MfSDCubvGbYVDxCDXSSk6qZTzpaVrOLUkO8w+KzjZ7Y=; b=FJ5TgJ/rzngITG1HaacBgwqjqA4gt5Yj0Y/W+xl/wihCm+uXZXU7w3xN6dEjrxZNV2+u V3uVlfQ6LNq/Y7n5slTbbrCKDDstDFW1MYvY3rCqb4UZpdvCexygKPw0n3S/YzTh8dON 0hRhwfluIsY96d87fA88YNRbGoPD4mkmCdE= Received: from maileast.thefacebook.com ([199.201.65.23]) by mx0a-00082601.pphosted.com with ESMTP id 2qfg07886p-4 (version=TLSv1.2 cipher=ECDHE-RSA-AES256-SHA384 bits=256 verify=NOT) for ; Tue, 05 Feb 2019 11:49:00 -0800 Received: from mx-out.facebook.com (2620:10d:c0a1:3::13) by mail.thefacebook.com (2620:10d:c021:18::176) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_CBC_SHA) id 15.1.1531.3; Tue, 5 Feb 2019 11:48:58 -0800 Received: by devvm7221.prn2.facebook.com (Postfix, from userid 137359) id 419C0A00C1EE; Tue, 5 Feb 2019 11:48:57 -0800 (PST) Smtp-Origin-Hostprefix: devvm From: Andrii Nakryiko Smtp-Origin-Hostname: devvm7221.prn2.facebook.com To: , , , , , , CC: Andrii Nakryiko Smtp-Origin-Cluster: prn2c23 Subject: [PATCH bpf-next 0/2] tools/btf: extends libbpf APIs to work with btf w/o kernel Date: Tue, 5 Feb 2019 11:48:54 -0800 Message-ID: <20190205194856.967463-1-andriin@fb.com> X-Mailer: git-send-email 2.17.1 X-FB-Internal: Safe MIME-Version: 1.0 Content-Type: text/plain X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2019-02-05_08:,, signatures=0 X-Proofpoint-Spam-Reason: safe X-FB-Internal: Safe Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org This patchset changes existing btf__new() API call to only load and initialize struct btf, while exposing new btf__load() API to attempt to load and validate BTF in kernel. It also adds ability to copy raw BTF data out of struct btf for further processing by external applications. This makes utilizing libbpf's APIs that don't require kernel facilities (e.g., btf_dedup) simpler and more natural from external application. Andrii Nakryiko (2): btf: separate btf creation and loading btf: expose API to work with raw btf data tools/lib/bpf/btf.c | 63 +++++++++++++++++++++++++--------------- tools/lib/bpf/btf.h | 3 ++ tools/lib/bpf/libbpf.c | 2 +- tools/lib/bpf/libbpf.map | 3 ++ 4 files changed, 46 insertions(+), 25 deletions(-) -- 2.17.1