From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-2.3 required=3.0 tests=HEADER_FROM_DIFFERENT_DOMAINS, MAILING_LIST_MULTI,SPF_HELO_NONE,SPF_PASS,USER_AGENT_SANE_1 autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id D8073C43603 for ; Tue, 17 Dec 2019 13:59:27 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id AA31421739 for ; Tue, 17 Dec 2019 13:59:27 +0000 (UTC) Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728554AbfLQN71 (ORCPT ); Tue, 17 Dec 2019 08:59:27 -0500 Received: from www62.your-server.de ([213.133.104.62]:60250 "EHLO www62.your-server.de" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1728539AbfLQN71 (ORCPT ); Tue, 17 Dec 2019 08:59:27 -0500 Received: from sslproxy01.your-server.de ([88.198.220.130]) by www62.your-server.de with esmtpsa (TLSv1.2:DHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89_1) (envelope-from ) id 1ihDNj-0006QE-67; Tue, 17 Dec 2019 14:59:23 +0100 Received: from [178.197.249.31] (helo=pc-9.home) by sslproxy01.your-server.de with esmtpsa (TLSv1.2:ECDHE-RSA-AES256-GCM-SHA384:256) (Exim 4.89) (envelope-from ) id 1ihDNi-0005qq-Ot; Tue, 17 Dec 2019 14:59:22 +0100 Subject: Re: [PATCH bpf-next 11/15] bpftool: add skeleton codegen command To: Andrii Nakryiko Cc: Andrii Nakryiko , bpf , Networking , Alexei Starovoitov , Kernel Team References: <20191210011438.4182911-1-andriin@fb.com> <20191210011438.4182911-12-andriin@fb.com> <20191216141608.GE14887@linux.fritz.box> From: Daniel Borkmann Message-ID: <448ba7d2-40c7-5175-c295-8ac123c40a84@iogearbox.net> Date: Tue, 17 Dec 2019 14:59:21 +0100 User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:60.0) Gecko/20100101 Thunderbird/60.7.2 MIME-Version: 1.0 In-Reply-To: Content-Type: text/plain; charset=utf-8; format=flowed Content-Language: en-US Content-Transfer-Encoding: 7bit X-Authenticated-Sender: daniel@iogearbox.net X-Virus-Scanned: Clear (ClamAV 0.101.4/25666/Tue Dec 17 10:54:52 2019) Sender: bpf-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: bpf@vger.kernel.org On 12/16/19 7:53 PM, Andrii Nakryiko wrote: > On Mon, Dec 16, 2019 at 6:16 AM Daniel Borkmann wrote: >> On Mon, Dec 09, 2019 at 05:14:34PM -0800, Andrii Nakryiko wrote: >>> Add `bpftool gen skeleton` command, which takes in compiled BPF .o object file >>> and dumps a BPF skeleton struct and related code to work with that skeleton. >>> Skeleton itself is tailored to a specific structure of provided BPF object >>> file, containing accessors (just plain struct fields) for every map and >>> program, as well as dedicated space for bpf_links. If BPF program is using >>> global variables, corresponding structure definitions of compatible memory >>> layout are emitted as well, making it possible to initialize and subsequently >>> read/update global variables values using simple and clear C syntax for >>> accessing fields. This skeleton majorly improves usability of >>> opening/loading/attaching of BPF object, as well as interacting with it >>> throughout the lifetime of loaded BPF object. >>> >>> Generated skeleton struct has the following structure: >>> >>> struct { >>> /* used by libbpf's skeleton API */ >>> struct bpf_object_skeleton *skeleton; >>> /* bpf_object for libbpf APIs */ >>> struct bpf_object *obj; >>> struct { >>> /* for every defined map in BPF object: */ >>> struct bpf_map *; >>> } maps; >>> struct { >>> /* for every program in BPF object: */ >>> struct bpf_program *; >>> } progs; >>> struct { >>> /* for every program in BPF object: */ >>> struct bpf_link *; >>> } links; >>> /* for every present global data section: */ >>> struct __ { >>> /* memory layout of corresponding data section, >>> * with every defined variable represented as a struct field >>> * with exactly the same type, but without const/volatile >>> * modifiers, e.g.: >>> */ >>> int *my_var_1; >>> ... >>> } *; >>> }; >>> >>> This provides great usability improvements: >>> - no need to look up maps and programs by name, instead just >>> my_obj->maps.my_map or my_obj->progs.my_prog would give necessary >>> bpf_map/bpf_program pointers, which user can pass to existing libbpf APIs; >>> - pre-defined places for bpf_links, which will be automatically populated for >>> program types that libbpf knows how to attach automatically (currently >>> tracepoints, kprobe/kretprobe, raw tracepoint and tracing programs). On >>> tearing down skeleton, all active bpf_links will be destroyed (meaning BPF >>> programs will be detached, if they are attached). For cases in which libbpf >>> doesn't know how to auto-attach BPF program, user can manually create link >>> after loading skeleton and they will be auto-detached on skeleton >>> destruction: >>> >>> my_obj->links.my_fancy_prog = bpf_program__attach_cgroup_whatever( >>> my_obj->progs.my_fancy_prog, >> >>> - it's extremely easy and convenient to work with global data from userspace >>> now. Both for read-only and read/write variables, it's possible to >>> pre-initialize them before skeleton is loaded: >>> >>> skel = my_obj__open(raw_embed_data); >>> my_obj->rodata->my_var = 123; >>> my_obj__load(skel); /* 123 will be initialization value for my_var */ >>> >>> After load, if kernel supports mmap() for BPF arrays, user can still read >>> (and write for .bss and .data) variables values, but at that point it will >>> be directly mmap()-ed to BPF array, backing global variables. This allows to >>> seamlessly exchange data with BPF side. From userspace program's POV, all >>> the pointers and memory contents stay the same, but mapped kernel memory >>> changes to point to created map. >>> If kernel doesn't yet support mmap() for BPF arrays, it's still possible to >>> use those data section structs to pre-initialize .bss, .data, and .rodata, >>> but after load their pointers will be reset to NULL, allowing user code to >>> gracefully handle this condition, if necessary. >>> >>> Given a big surface area, skeleton is kept as an experimental non-public >>> API for now, until more feedback and real-world experience is collected. >> >> Can you elaborate on the plan here? This is until v5.6 is out and hence a new >> bpftool release implicitly where this becomes frozen / non-experimental? > > Yes, I've exposed all those interfaces as public, thus they are going > to stabilize with new release of libbpf/bpftool. I've received some > good usability feedback from Alexei after he tried it out locally, so > I'm going to adjust auto-generated part a bit. Libbpf APIs were > designed with extensibility built in, so we can extend them as any > other APIs, if need be. > >> There is also tools/bpf/bpftool/Documentation/bpftool-gen.rst missing. Given >> you aim to collect more feedback (?), it would be appropriate to document >> everything in there so users have a clue how to use it for getting started. > > sure, will add it Thanks! >> Also, I think at least some more clarification is needed in such document on >> the following topics: >> >> - libbpf and bpftool is both 'GPL-2.0-only' or 'BSD-2-Clause'. Given this >> is a code generator, what license is the `bpftool gen skeleton` result? >> In any case, should there also be a header comment emitted via do_skeleton()? > > Not a lawyer here, I assumed auto-generated code isn't copyrighted, > but how about I just emit SPDX header with the same license as libbpf > itself: > > SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) Given this is mere output of the program and not derivative work of bpftool itself, as in bpftool copying chunks of its own code into the generated one, this should not need any restriction, but then you'd still need linking against libbpf itself to make everything work. >> - Clear statement that this codegen is an alternative to regular libbpf >> API usage but that both are always kept feature-complete and hence not >> disadvantaged in one way or another (to rule out any uncertainties for >> users e.g. whether they now need to start rewriting their existing code >> etc); with purpose of the former (codgen) to simplify loader interaction. > > ok, will add that as well > >> >> Thanks, >> Daniel