From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-7.1 required=3.0 tests=BAYES_00,DKIMWL_WL_HIGH, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,MAILING_LIST_MULTI,SPF_HELO_NONE, SPF_PASS,URIBL_BLOCKED,USER_AGENT_GIT autolearn=no autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 7C396C4741F for ; Fri, 6 Nov 2020 23:05:26 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [23.128.96.18]) by mail.kernel.org (Postfix) with ESMTP id 2734220B1F for ; Fri, 6 Nov 2020 23:05:26 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=kernel.org; s=default; t=1604703926; bh=G/oLlxaTtzkA4elfXUBjZ1nKeQlWniTxA4/uGMSiUpA=; h=From:To:CC:Subject:Date:List-ID:From; b=PfyLm8GgHUf/k0iKfbciYLX5+WgxtgLd0g1LWjbpJlhL3n7oX2Zk/eqYh5z2D3Ffv bAATveUiORoYLU5vMav0I4naGYECKlADx2S7O28iILkMvu/oNpvpmRjxr8dwkvMj9o JinShh9AwLqo/ZtQYacMlvzAFgiUPwSJ94zPumOs= Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1729092AbgKFXFX convert rfc822-to-8bit (ORCPT ); Fri, 6 Nov 2020 18:05:23 -0500 Received: from mx0a-00082601.pphosted.com ([67.231.145.42]:1400 "EHLO mx0a-00082601.pphosted.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1729052AbgKFXFP (ORCPT ); Fri, 6 Nov 2020 18:05:15 -0500 Received: from pps.filterd (m0148461.ppops.net [127.0.0.1]) by mx0a-00082601.pphosted.com (8.16.0.42/8.16.0.42) with SMTP id 0A6N502X026489 for ; Fri, 6 Nov 2020 15:05:15 -0800 Received: from maileast.thefacebook.com ([163.114.130.16]) by mx0a-00082601.pphosted.com with ESMTP id 34mr9bex03-16 (version=TLSv1.2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128 verify=NOT) for ; Fri, 06 Nov 2020 15:05:15 -0800 Received: from intmgw003.08.frc2.facebook.com (2620:10d:c0a8:1b::d) by mail.thefacebook.com (2620:10d:c0a8:83::6) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.1979.3; Fri, 6 Nov 2020 15:05:09 -0800 Received: by devbig012.ftw2.facebook.com (Postfix, from userid 137359) id C89ED2EC8FA2; Fri, 6 Nov 2020 15:02:30 -0800 (PST) From: Andrii Nakryiko To: , , , CC: , , , , Andrii Nakryiko , Arnaldo Carvalho de Melo , Greg Kroah-Hartman Subject: [PATCH v2 bpf-next 0/5] Integrate kernel module BTF support Date: Fri, 6 Nov 2020 15:02:23 -0800 Message-ID: <20201106230228.2202-1-andrii@kernel.org> X-Mailer: git-send-email 2.24.1 X-FB-Internal: Safe Content-Type: text/plain Content-Transfer-Encoding: 8BIT X-Proofpoint-UnRewURL: 0 URL was un-rewritten MIME-Version: 1.0 X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:6.0.312,18.0.737 definitions=2020-11-06_06:2020-11-05,2020-11-06 signatures=0 X-Proofpoint-Spam-Details: rule=fb_default_notspam policy=fb_default score=0 malwarescore=0 phishscore=0 clxscore=1015 lowpriorityscore=0 mlxlogscore=999 suspectscore=0 mlxscore=0 priorityscore=1501 impostorscore=0 bulkscore=0 adultscore=0 spamscore=0 classifier=spam adjust=0 reason=mlx scancount=1 engine=8.12.0-2009150000 definitions=main-2011060154 X-FB-Internal: deliver Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch set adds BTF generation for kernel modules using a compact split BTF approach. Respective patches have all the details. Kernel module BTFs rely on pahole's split BTF support, which is added in [0] and will be available starting from v1.19. Support for it is detected automatically during kernel build time. This patch set implements in-kernel support for split BTF loading and validation. It also extends GET_OBJ_INFO API for BTFs to return BTF's module name and a flag whether BTF itself is in-kernel or user-provided. vmlinux BTF is also exposed to user-space through the same BTF object iteration APIs. Follow up patch set will utilize the fact that vmlinux and module BTFs now have associated ID to provide ability to attach BPF fentry/fexit/etc programs to functions defined in kernel modules. bpftool is also extended to show module/vmlinux BTF's name. [0] https://patchwork.kernel.org/project/netdevbpf/list/?series=378699&state=* v2->v1: - drop WARNs, add fewer pr_warn()'s instead (Greg); - properly initialize sysfs binary attribute structure (Greg); - add __maybe_unused to any_section_objs, used conditionally by module BTF; rfc->v1: - CONFIG_DEBUG_INFO_BTF_MODULES is derived automatically (Alexei); - vmlinux BTF now has explicit "vmlinux" name (Alexei); - added sysfs ABI documentation for /sys/kernel/btf/ (Greg). Cc: Arnaldo Carvalho de Melo Cc: Greg Kroah-Hartman Andrii Nakryiko (5): bpf: add in-kernel split BTF support bpf: assign ID to vmlinux BTF and return extra info for BTF in GET_OBJ_INFO kbuild: build kernel module BTFs if BTF is enabled and pahole supports it bpf: load and verify kernel module BTFs tools/bpftool: add support for in-kernel and named BTF in `btf show` Documentation/ABI/testing/sysfs-kernel-btf | 8 + include/linux/bpf.h | 2 + include/linux/module.h | 4 + include/uapi/linux/bpf.h | 3 + kernel/bpf/btf.c | 413 ++++++++++++++++++--- kernel/bpf/sysfs_btf.c | 2 +- kernel/module.c | 32 ++ lib/Kconfig.debug | 9 + scripts/Makefile.modfinal | 20 +- tools/bpf/bpftool/btf.c | 28 +- tools/include/uapi/linux/bpf.h | 3 + 11 files changed, 467 insertions(+), 57 deletions(-) -- 2.24.1