From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-8.5 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_HELO_NONE,SPF_PASS,URIBL_BLOCKED,USER_AGENT_MUTT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 69611C28CC3 for ; Fri, 31 May 2019 21:28:39 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id 3D0E423A58 for ; Fri, 31 May 2019 21:28:39 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=fomichev-me.20150623.gappssmtp.com header.i=@fomichev-me.20150623.gappssmtp.com header.b="rgpTT97g" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1726653AbfEaV2i (ORCPT ); Fri, 31 May 2019 17:28:38 -0400 Received: from mail-pg1-f193.google.com ([209.85.215.193]:45668 "EHLO mail-pg1-f193.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1725913AbfEaV2i (ORCPT ); Fri, 31 May 2019 17:28:38 -0400 Received: by mail-pg1-f193.google.com with SMTP id w34so4692763pga.12 for ; Fri, 31 May 2019 14:28:37 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fomichev-me.20150623.gappssmtp.com; s=20150623; h=date:from:to:cc:subject:message-id:references:mime-version :content-disposition:in-reply-to:user-agent; bh=PgY4dum0Kc23B2lFwK263HhPD3WhYG3TTGOqUl+JYIk=; b=rgpTT97gtJRPaqWxUB5G/m9UC0il70BQBWRrORjjYWuBW9dlTYfNOZuZrOrrhZCIi7 mXSBn5yP/Hv2Fwld+Qa8hOAqZqt4a8IRgp0J8vgynzmEhU5LIU8q0KdJgBcAeZWHvkED 1KrfytfTg+ys4U4goCoa/ULVZGQMJ4Z5C1G46vI2DKjvknpwaEmgGWGrdlERkDeaR/xl cmrClUnADd5QoildeYE0m/gwCJ2nOEpLFFNqf1sWzsx723pQfTnc4R5vTCyyeMeixPqr 3EMe5E15DQbZOOAXSfG/LIOMhg3P9eG05vgs/IionOmRpVszc1OvhHIzYchapQ2sMMMB hEMQ== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:references :mime-version:content-disposition:in-reply-to:user-agent; bh=PgY4dum0Kc23B2lFwK263HhPD3WhYG3TTGOqUl+JYIk=; b=HkwGtc2Idr0bmjZ/cg/ZW1yySxIiTxNo3E0AF6GWlOMEhCzbrzq5CPBA2CTCwMlnXc nT8OCN/dbgvK0eQ7I/fDlW4CbhFhZxOKylcBE2Ve1D62ZxsC6F4jitO3zavgeSb3Ez20 Oc/VF0npuOi6SVbA9VRXCA9HdEHNFTHfUBoD003tM6BTwpPkPZ2Xevy/vK8jP0J0E1JC qkVQMQ+4bDMP2M7ghvLuGEqEekIA8fMCy9vuqJk5UsnZOQpx/+jLGw3KSxoMRiG5MWCj krAutdLsT/1O5D5JYEh877FBITZ5i8DZ55nARC9RRGZk1bMjd6gj9aEJ5O4nHHL0kR6Y r5/Q== X-Gm-Message-State: APjAAAV63T2TqTOl3wGjvkIBvhFhZvwvEM3yf7tYxZChr3GeVyOf3vw5 7P+w1wGVPAV/eq/blT1tBditEw== X-Google-Smtp-Source: APXvYqw7PPPQ1mGOExc2mU9XPA9IK3kMriHsbbvZFlNqYtgW6daQPRJAr2QXSNy/07T3tZlTVChzRw== X-Received: by 2002:a63:f509:: with SMTP id w9mr11919304pgh.134.1559338117220; Fri, 31 May 2019 14:28:37 -0700 (PDT) Received: from localhost ([2601:646:8f00:18d9:d0fa:7a4b:764f:de48]) by smtp.gmail.com with ESMTPSA id d5sm7841232pfn.25.2019.05.31.14.28.36 (version=TLS1_2 cipher=ECDHE-RSA-CHACHA20-POLY1305 bits=256/256); Fri, 31 May 2019 14:28:36 -0700 (PDT) Date: Fri, 31 May 2019 14:28:35 -0700 From: Stanislav Fomichev To: Andrii Nakryiko Cc: andrii.nakryiko@gmail.com, netdev@vger.kernel.org, bpf@vger.kernel.org, ast@fb.com, daniel@iogearbox.net, kernel-team@fb.com Subject: Re: [RFC PATCH bpf-next 6/8] libbpf: allow specifying map definitions using BTF Message-ID: <20190531212835.GA31612@mini-arch> References: <20190531202132.379386-1-andriin@fb.com> <20190531202132.379386-7-andriin@fb.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20190531202132.379386-7-andriin@fb.com> User-Agent: Mutt/1.11.4 (2019-03-13) Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org On 05/31, Andrii Nakryiko wrote: > This patch adds support for a new way to define BPF maps. It relies on > BTF to describe mandatory and optional attributes of a map, as well as > captures type information of key and value naturally. This eliminates > the need for BPF_ANNOTATE_KV_PAIR hack and ensures key/value sizes are > always in sync with the key/value type. My 2c: this is too magical and relies on me knowing the expected fields. (also, the compiler won't be able to help with the misspellings). I don't know how others feel about it, but I'd be much more comfortable with a simpler TLV-like approach. Have a new section where the format is |4-byte size|struct bpf_map_def_extendable|. That would essentially allow us to extend it the way we do with a syscall args. Also, (un)related: we don't currently use BTF internally, so if you convert all tests, we'd be unable to run them :-( > Relying on BTF, this approach allows for both forward and backward > compatibility w.r.t. extending supported map definition features. Old > libbpf implementation will ignore fields it doesn't recognize, while new > implementations will parse and recognize new optional attributes. I also don't know how to feel about old libbpf ignoring some attributes. In the kernel we require that the unknown fields are zeroed. We probably need to do something like that here? What do you think would be a good example of an optional attribute? > The outline of the new map definition (short, BTF-defined maps) is as follows: > 1. All the maps should be defined in .maps ELF section. It's possible to > have both "legacy" map definitions in `maps` sections and BTF-defined > maps in .maps sections. Everything will still work transparently. > 2. The map declaration and initialization is done through > a global/static variable of a struct type with few mandatory and > extra optional fields: > - type field is mandatory and specified type of BPF map; > - key/value fields are mandatory and capture key/value type/size information; > - max_entries attribute is optional; if max_entries is not specified or > initialized, it has to be provided in runtime through libbpf API > before loading bpf_object; > - map_flags is optional and if not defined, will be assumed to be 0. > 3. Key/value fields should be **a pointer** to a type describing > key/value. The pointee type is assumed (and will be recorded as such > and used for size determination) to be a type describing key/value of > the map. This is done to save excessive amounts of space allocated in > corresponding ELF sections for key/value of big size. > 4. As some maps disallow having BTF type ID associated with key/value, > it's possible to specify key/value size explicitly without > associating BTF type ID with it. Use key_size and value_size fields > to do that (see example below). > > Here's an example of simple ARRAY map defintion: > > struct my_value { int x, y, z; }; > > struct { > int type; > int max_entries; > int *key; > struct my_value *value; > } btf_map SEC(".maps") = { > .type = BPF_MAP_TYPE_ARRAY, > .max_entries = 16, > }; > > This will define BPF ARRAY map 'btf_map' with 16 elements. The key will > be of type int and thus key size will be 4 bytes. The value is struct > my_value of size 12 bytes. This map can be used from C code exactly the > same as with existing maps defined through struct bpf_map_def. > > Here's an example of STACKMAP definition (which currently disallows BTF type > IDs for key/value): > > struct { > __u32 type; > __u32 max_entries; > __u32 map_flags; > __u32 key_size; > __u32 value_size; > } stackmap SEC(".maps") = { > .type = BPF_MAP_TYPE_STACK_TRACE, > .max_entries = 128, > .map_flags = BPF_F_STACK_BUILD_ID, > .key_size = sizeof(__u32), > .value_size = PERF_MAX_STACK_DEPTH * sizeof(struct bpf_stack_build_id), > }; > > This approach is naturally extended to support map-in-map, by making a value > field to be another struct that describes inner map. This feature is not > implemented yet. It's also possible to incrementally add features like pinning > with full backwards and forward compatibility. > > Signed-off-by: Andrii Nakryiko > --- > tools/lib/bpf/btf.h | 1 + > tools/lib/bpf/libbpf.c | 333 +++++++++++++++++++++++++++++++++++++++-- > 2 files changed, 325 insertions(+), 9 deletions(-) > > diff --git a/tools/lib/bpf/btf.h b/tools/lib/bpf/btf.h > index ba4ffa831aa4..88a52ae56fc6 100644 > --- a/tools/lib/bpf/btf.h > +++ b/tools/lib/bpf/btf.h > @@ -17,6 +17,7 @@ extern "C" { > > #define BTF_ELF_SEC ".BTF" > #define BTF_EXT_ELF_SEC ".BTF.ext" > +#define MAPS_ELF_SEC ".maps" > > struct btf; > struct btf_ext; > diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c > index 79a8143240d7..5a8f1e82809b 100644 > --- a/tools/lib/bpf/libbpf.c > +++ b/tools/lib/bpf/libbpf.c > @@ -262,6 +262,7 @@ struct bpf_object { > } *reloc; > int nr_reloc; > int maps_shndx; > + int btf_maps_shndx; > int text_shndx; > int data_shndx; > int rodata_shndx; > @@ -514,6 +515,7 @@ static struct bpf_object *bpf_object__new(const char *path, > obj->efile.obj_buf = obj_buf; > obj->efile.obj_buf_sz = obj_buf_sz; > obj->efile.maps_shndx = -1; > + obj->efile.btf_maps_shndx = -1; > obj->efile.data_shndx = -1; > obj->efile.rodata_shndx = -1; > obj->efile.bss_shndx = -1; > @@ -1012,6 +1014,292 @@ static int bpf_object__init_user_maps(struct bpf_object *obj, bool strict) > return 0; > } > > +static const struct btf_type *skip_mods_and_typedefs(const struct btf *btf, > + __u32 id) > +{ > + const struct btf_type *t = btf__type_by_id(btf, id); > + > + while (true) { > + switch (BTF_INFO_KIND(t->info)) { > + case BTF_KIND_VOLATILE: > + case BTF_KIND_CONST: > + case BTF_KIND_RESTRICT: > + case BTF_KIND_TYPEDEF: > + t = btf__type_by_id(btf, t->type); > + break; > + default: > + return t; > + } > + } > +} > + > +static bool get_map_attr_int(const char *map_name, > + const struct btf *btf, > + const struct btf_type *def, > + const struct btf_member *m, > + const void *data, __u32 *res) { > + const struct btf_type *t = skip_mods_and_typedefs(btf, m->type); > + const char *name = btf__name_by_offset(btf, m->name_off); > + __u32 int_info = *(const __u32 *)(const void *)(t + 1); > + > + if (BTF_INFO_KIND(t->info) != BTF_KIND_INT) { > + pr_warning("map '%s': attr '%s': expected INT, got %u.\n", > + map_name, name, BTF_INFO_KIND(t->info)); > + return false; > + } > + if (t->size != 4 || BTF_INT_BITS(int_info) != 32 || > + BTF_INT_OFFSET(int_info)) { > + pr_warning("map '%s': attr '%s': expected 32-bit non-bitfield integer, " > + "got %u-byte (%d-bit) one with bit offset %d.\n", > + map_name, name, t->size, BTF_INT_BITS(int_info), > + BTF_INT_OFFSET(int_info)); > + return false; > + } > + if (BTF_INFO_KFLAG(def->info) && BTF_MEMBER_BITFIELD_SIZE(m->offset)) { > + pr_warning("map '%s': attr '%s': bitfield is not supported.\n", > + map_name, name); > + return false; > + } > + if (m->offset % 32) { > + pr_warning("map '%s': attr '%s': unaligned fields are not supported.\n", > + map_name, name); > + return false; > + } > + > + *res = *(const __u32 *)(data + m->offset / 8); > + return true; > +} > + > +static int bpf_object__init_user_btf_map(struct bpf_object *obj, > + const struct btf_type *sec, > + int var_idx, int sec_idx, > + const Elf_Data *data) > +{ > + const struct btf_type *var, *def, *t; > + const struct btf_var_secinfo *vi; > + const struct btf_var *var_extra; > + const struct btf_member *m; > + const void *def_data; > + const char *map_name; > + struct bpf_map *map; > + int vlen, i; > + > + vi = (const struct btf_var_secinfo *)(const void *)(sec + 1) + var_idx; > + var = btf__type_by_id(obj->btf, vi->type); > + var_extra = (const void *)(var + 1); > + map_name = btf__name_by_offset(obj->btf, var->name_off); > + vlen = BTF_INFO_VLEN(var->info); > + > + if (map_name == NULL || map_name[0] == '\0') { > + pr_warning("map #%d: empty name.\n", var_idx); > + return -EINVAL; > + } > + if ((__u64)vi->offset + vi->size > data->d_size) { > + pr_warning("map '%s' BTF data is corrupted.\n", map_name); > + return -EINVAL; > + } > + if (BTF_INFO_KIND(var->info) != BTF_KIND_VAR) { > + pr_warning("map '%s': unexpected var kind %u.\n", > + map_name, BTF_INFO_KIND(var->info)); > + return -EINVAL; > + } > + if (var_extra->linkage != BTF_VAR_GLOBAL_ALLOCATED && > + var_extra->linkage != BTF_VAR_STATIC) { > + pr_warning("map '%s': unsupported var linkage %u.\n", > + map_name, var_extra->linkage); > + return -EOPNOTSUPP; > + } > + > + def = skip_mods_and_typedefs(obj->btf, var->type); > + if (BTF_INFO_KIND(def->info) != BTF_KIND_STRUCT) { > + pr_warning("map '%s': unexpected def kind %u.\n", > + map_name, BTF_INFO_KIND(var->info)); > + return -EINVAL; > + } > + if (def->size > vi->size) { > + pr_warning("map '%s': invalid def size.\n", map_name); > + return -EINVAL; > + } > + > + map = bpf_object__add_map(obj); > + if (IS_ERR(map)) > + return PTR_ERR(map); > + map->name = strdup(map_name); > + if (!map->name) { > + pr_warning("map '%s': failed to alloc map name.\n", map_name); > + return -ENOMEM; > + } > + map->libbpf_type = LIBBPF_MAP_UNSPEC; > + map->def.type = BPF_MAP_TYPE_UNSPEC; > + map->sec_idx = sec_idx; > + map->sec_offset = vi->offset; > + pr_debug("map '%s': at sec_idx %d, offset %zu.\n", > + map_name, map->sec_idx, map->sec_offset); > + > + def_data = data->d_buf + vi->offset; > + vlen = BTF_INFO_VLEN(def->info); > + m = (const void *)(def + 1); > + for (i = 0; i < vlen; i++, m++) { > + const char *name = btf__name_by_offset(obj->btf, m->name_off); > + > + if (strcmp(name, "type") == 0) { > + if (!get_map_attr_int(map_name, obj->btf, def, m, > + def_data, &map->def.type)) > + return -EINVAL; > + pr_debug("map '%s': found type = %u.\n", > + map_name, map->def.type); > + } else if (strcmp(name, "max_entries") == 0) { > + if (!get_map_attr_int(map_name, obj->btf, def, m, > + def_data, &map->def.max_entries)) > + return -EINVAL; > + pr_debug("map '%s': found max_entries = %u.\n", > + map_name, map->def.max_entries); > + } else if (strcmp(name, "map_flags") == 0) { > + if (!get_map_attr_int(map_name, obj->btf, def, m, > + def_data, &map->def.map_flags)) > + return -EINVAL; > + pr_debug("map '%s': found map_flags = %u.\n", > + map_name, map->def.map_flags); > + } else if (strcmp(name, "key_size") == 0) { > + __u32 sz; > + > + if (!get_map_attr_int(map_name, obj->btf, def, m, > + def_data, &sz)) > + return -EINVAL; > + pr_debug("map '%s': found key_size = %u.\n", > + map_name, sz); > + if (map->def.key_size && map->def.key_size != sz) { > + pr_warning("map '%s': conflictling key size %u != %u.\n", > + map_name, map->def.key_size, sz); > + return -EINVAL; > + } > + map->def.key_size = sz; > + } else if (strcmp(name, "key") == 0) { > + __s64 sz; > + > + t = btf__type_by_id(obj->btf, m->type); > + if (BTF_INFO_KIND(t->info) != BTF_KIND_PTR) { > + pr_warning("map '%s': key spec is not PTR: %u.\n", > + map_name, BTF_INFO_KIND(t->info)); > + return -EINVAL; > + } > + sz = btf__resolve_size(obj->btf, t->type); > + if (sz < 0) { > + pr_warning("map '%s': can't determine key size for type [%u]: %lld.\n", > + map_name, t->type, sz); > + return sz; > + } > + pr_debug("map '%s': found key [%u], sz = %lld.\n", > + map_name, t->type, sz); > + if (map->def.key_size && map->def.key_size != sz) { > + pr_warning("map '%s': conflictling key size %u != %lld.\n", > + map_name, map->def.key_size, sz); > + return -EINVAL; > + } > + map->def.key_size = sz; > + map->btf_key_type_id = t->type; > + } else if (strcmp(name, "value_size") == 0) { > + __u32 sz; > + > + if (!get_map_attr_int(map_name, obj->btf, def, m, > + def_data, &sz)) > + return -EINVAL; > + pr_debug("map '%s': found value_size = %u.\n", > + map_name, sz); > + if (map->def.value_size && map->def.value_size != sz) { > + pr_warning("map '%s': conflictling value size %u != %u.\n", > + map_name, map->def.value_size, sz); > + return -EINVAL; > + } > + map->def.value_size = sz; > + } else if (strcmp(name, "value") == 0) { > + __s64 sz; > + > + t = btf__type_by_id(obj->btf, m->type); > + if (BTF_INFO_KIND(t->info) != BTF_KIND_PTR) { > + pr_warning("map '%s': value spec is not PTR: %u.\n", > + map_name, BTF_INFO_KIND(t->info)); > + return -EINVAL; > + } > + sz = btf__resolve_size(obj->btf, t->type); > + if (sz < 0) { > + pr_warning("map '%s': can't determine value size for type [%u]: %lld.\n", > + map_name, t->type, sz); > + return sz; > + } > + pr_debug("map '%s': found value [%u], sz = %lld.\n", > + map_name, t->type, sz); > + if (map->def.value_size && map->def.value_size != sz) { > + pr_warning("map '%s': conflictling value size %u != %lld.\n", > + map_name, map->def.value_size, sz); > + return -EINVAL; > + } > + map->def.value_size = sz; > + map->btf_value_type_id = t->type; > + } else { > + pr_debug("map '%s': ignoring unknown def field '%s'.\n", > + map_name, name); > + } > + } > + > + if (map->def.type == BPF_MAP_TYPE_UNSPEC) { > + pr_warning("map '%s': map type isn't specified.\n", map_name); > + return -EINVAL; > + } > + > + return 0; > +} > + > +static int bpf_object__init_user_btf_maps(struct bpf_object *obj) > +{ > + const struct btf_type *sec = NULL; > + int nr_types, i, vlen, err; > + const struct btf_type *t; > + const char *name; > + Elf_Data *data; > + Elf_Scn *scn; > + > + if (obj->efile.btf_maps_shndx < 0) > + return 0; > + > + scn = elf_getscn(obj->efile.elf, obj->efile.btf_maps_shndx); > + if (scn) > + data = elf_getdata(scn, NULL); > + if (!scn || !data) { > + pr_warning("failed to get Elf_Data from map section %d (%s)\n", > + obj->efile.maps_shndx, MAPS_ELF_SEC); > + return -EINVAL; > + } > + > + nr_types = btf__get_nr_types(obj->btf); > + for (i = 1; i <= nr_types; i++) { > + t = btf__type_by_id(obj->btf, i); > + if (BTF_INFO_KIND(t->info) != BTF_KIND_DATASEC) > + continue; > + name = btf__name_by_offset(obj->btf, t->name_off); > + if (strcmp(name, MAPS_ELF_SEC) == 0) { > + sec = t; > + break; > + } > + } > + > + if (!sec) { > + pr_warning("DATASEC '%s' not found.\n", MAPS_ELF_SEC); > + return -ENOENT; > + } > + > + vlen = BTF_INFO_VLEN(sec->info); > + for (i = 0; i < vlen; i++) { > + err = bpf_object__init_user_btf_map(obj, sec, i, > + obj->efile.btf_maps_shndx, > + data); > + if (err) > + return err; > + } > + > + return 0; > +} > + > static int bpf_object__init_maps(struct bpf_object *obj, int flags) > { > bool strict = !(flags & MAPS_RELAX_COMPAT); > @@ -1021,6 +1309,10 @@ static int bpf_object__init_maps(struct bpf_object *obj, int flags) > if (err) > return err; > > + err = bpf_object__init_user_btf_maps(obj); > + if (err) > + return err; > + > err = bpf_object__init_global_data_maps(obj); > if (err) > return err; > @@ -1118,10 +1410,16 @@ static void bpf_object__sanitize_btf_ext(struct bpf_object *obj) > } > } > > +static bool bpf_object__is_btf_mandatory(const struct bpf_object *obj) > +{ > + return obj->efile.btf_maps_shndx >= 0; > +} > + > static int bpf_object__init_btf(struct bpf_object *obj, > Elf_Data *btf_data, > Elf_Data *btf_ext_data) > { > + bool btf_required = bpf_object__is_btf_mandatory(obj); > int err = 0; > > if (btf_data) { > @@ -1155,10 +1453,18 @@ static int bpf_object__init_btf(struct bpf_object *obj, > } > out: > if (err || IS_ERR(obj->btf)) { > + if (btf_required) > + err = err ? : PTR_ERR(obj->btf); > + else > + err = 0; > if (!IS_ERR_OR_NULL(obj->btf)) > btf__free(obj->btf); > obj->btf = NULL; > } > + if (btf_required && !obj->btf) { > + pr_warning("BTF is required, but is missing or corrupted.\n"); > + return err == 0 ? -ENOENT : err; > + } > return 0; > } > > @@ -1178,6 +1484,8 @@ static int bpf_object__sanitize_and_load_btf(struct bpf_object *obj) > BTF_ELF_SEC, err); > btf__free(obj->btf); > obj->btf = NULL; > + if (bpf_object__is_btf_mandatory(obj)) > + return err; > } > return 0; > } > @@ -1241,6 +1549,8 @@ static int bpf_object__elf_collect(struct bpf_object *obj, int flags) > return err; > } else if (strcmp(name, "maps") == 0) { > obj->efile.maps_shndx = idx; > + } else if (strcmp(name, MAPS_ELF_SEC) == 0) { > + obj->efile.btf_maps_shndx = idx; > } else if (strcmp(name, BTF_ELF_SEC) == 0) { > btf_data = data; > } else if (strcmp(name, BTF_EXT_ELF_SEC) == 0) { > @@ -1360,7 +1670,8 @@ static bool bpf_object__shndx_is_data(const struct bpf_object *obj, > static bool bpf_object__shndx_is_maps(const struct bpf_object *obj, > int shndx) > { > - return shndx == obj->efile.maps_shndx; > + return shndx == obj->efile.maps_shndx || > + shndx == obj->efile.btf_maps_shndx; > } > > static bool bpf_object__relo_in_known_section(const struct bpf_object *obj, > @@ -1404,14 +1715,14 @@ bpf_program__collect_reloc(struct bpf_program *prog, GElf_Shdr *shdr, > prog->nr_reloc = nrels; > > for (i = 0; i < nrels; i++) { > - GElf_Sym sym; > - GElf_Rel rel; > - unsigned int insn_idx; > - unsigned int shdr_idx; > struct bpf_insn *insns = prog->insns; > enum libbpf_map_type type; > + unsigned int insn_idx; > + unsigned int shdr_idx; > const char *name; > size_t map_idx; > + GElf_Sym sym; > + GElf_Rel rel; > > if (!gelf_getrel(data, i, &rel)) { > pr_warning("relocation: failed to get %d reloc\n", i); > @@ -1505,14 +1816,18 @@ bpf_program__collect_reloc(struct bpf_program *prog, GElf_Shdr *shdr, > return 0; > } > > -static int bpf_map_find_btf_info(struct bpf_map *map, const struct btf *btf) > +static int bpf_map_find_btf_info(struct bpf_object *obj, struct bpf_map *map) > { > struct bpf_map_def *def = &map->def; > __u32 key_type_id = 0, value_type_id = 0; > int ret; > > + /* if it's BTF-defined map, we don't need to search for type IDs */ > + if (map->sec_idx == obj->efile.btf_maps_shndx) > + return 0; > + > if (!bpf_map__is_internal(map)) { > - ret = btf__get_map_kv_tids(btf, map->name, def->key_size, > + ret = btf__get_map_kv_tids(obj->btf, map->name, def->key_size, > def->value_size, &key_type_id, > &value_type_id); > } else { > @@ -1520,7 +1835,7 @@ static int bpf_map_find_btf_info(struct bpf_map *map, const struct btf *btf) > * LLVM annotates global data differently in BTF, that is, > * only as '.data', '.bss' or '.rodata'. > */ > - ret = btf__find_by_name(btf, > + ret = btf__find_by_name(obj->btf, > libbpf_type_to_btf_name[map->libbpf_type]); > } > if (ret < 0) > @@ -1810,7 +2125,7 @@ bpf_object__create_maps(struct bpf_object *obj) > map->inner_map_fd >= 0) > create_attr.inner_map_fd = map->inner_map_fd; > > - if (obj->btf && !bpf_map_find_btf_info(map, obj->btf)) { > + if (obj->btf && !bpf_map_find_btf_info(obj, map)) { > create_attr.btf_fd = btf__fd(obj->btf); > create_attr.btf_key_type_id = map->btf_key_type_id; > create_attr.btf_value_type_id = map->btf_value_type_id; > -- > 2.17.1 >