On Wed, Dec 20, 2023 at 10:07:34AM +0100, Jiri Olsa wrote: > On Tue, Dec 19, 2023 at 07:15:42PM -0800, Alexei Starovoitov wrote: > > On Tue, Dec 19, 2023 at 9:29 AM Daniel Xu <dxu@xxxxxxxxx> wrote: > > > > > > Hi, > > > > > > I was chatting w/ Quentin [0] about how bpftool could: > > > > > > 1. Support a "feature dump" of all supported kfuncs on running kernel > > > 2. Generate vmlinux.h with kfunc prototypes > > > > > > I had another idea this morning so I thought I'd bounce it around > > > on the list in case others had better ones. 3 vague ideas: > > > > > > 1. Add a BTF type tag annotation in __bpf_kfunc macro. This would > > > let bpftool parse BTF to do discovery. It would be fairly clean and > > > straightforward, except that I don't think GCC supports these type > > > tags. So only clang-built-linux would work. > > > > > > 2. Do the same thing as above, except rather than tagging src code, > > > teach pahole about the .BTF_ids section in vmlinux. pahole could then > > > construct BTF with the appropriate type tags. > > I thought it'd be nice to have this in BTF, but to generate the .BTF_ids > section we need the BTF data (for BTF IDs), so that might be tricky we could also move resolve_btfids logic into pahole and it could add the kfunc data to BTF directly > > > > > resolve_btfids knows about all of them already. > > The best is to teach bpftool about them as well. > > It can look for BTF_SET8_START and there it can find btf_ids > > with the access to vmlinux, bpftool could get the addresses of all > set8s, read all btf ids and generate the header and maybe we could also read kfunc data directly from /proc/kcore: # cat /proc/kallsyms | grep __BTF_ID__set8__generic_btf_ids ffffffff843be898 r __BTF_ID__set8__generic_btf_ids # objdump -s --start-address=0xffffffff843be898 --stop-address=0xffffffff843be8a8 /proc/kcore /proc/kcore: file format elf64-x86-64 Contents of section load1: ffffffff843be898 17000000 00000000 15750100 85000000 .........u...... I think having it in BTF would be easiest from user's POV, but seems like a lot of work.. reading it from kcore seems good enough jirka > > $ nm vmlinux | grep BTF_ID__set8 > ffffffff843bf044 r __BTF_ID__set8__bpf_kfunc_check_set_skb > ffffffff843bf064 r __BTF_ID__set8__bpf_kfunc_check_set_sock_addr > ffffffff843bf054 r __BTF_ID__set8__bpf_kfunc_check_set_xdp > ffffffff843be940 r __BTF_ID__set8__bpf_map_iter_kfunc_ids > ffffffff843bf22c r __BTF_ID__set8__bpf_mptcp_fmodret_ids > ffffffff843be604 r __BTF_ID__set8__bpf_rstat_kfunc_ids > ffffffff843bf074 r __BTF_ID__set8__bpf_sk_iter_kfunc_ids > ffffffff843bf1c4 r __BTF_ID__set8__bpf_tcp_ca_check_kfunc_ids > ffffffff843bf0bc r __BTF_ID__set8__bpf_test_modify_return_ids > ffffffff843be864 r __BTF_ID__set8__common_btf_ids > ffffffff843be9a8 r __BTF_ID__set8__cpumask_kfunc_btf_ids > ffffffff843bf174 r __BTF_ID__set8__fou_kfunc_set > ffffffff843be678 r __BTF_ID__set8__fs_kfunc_set_ids > ffffffff843be794 r __BTF_ID__set8__generic_btf_ids > ffffffff843be650 r __BTF_ID__set8__key_sig_kfunc_set > ffffffff843bf10c r __BTF_ID__set8__nf_ct_kfunc_set > ffffffff843bf164 r __BTF_ID__set8__nf_nat_kfunc_set > ffffffff843bf18c r __BTF_ID__set8__tcp_cubic_check_kfunc_ids > ffffffff843bf0dc r __BTF_ID__set8__test_sk_check_kfunc_ids > ffffffff843bf084 r __BTF_ID__set8__xdp_metadata_kfunc_ids > ffffffff843bf1f4 r __BTF_ID__set8__xfrm_ifc_kfunc_set > ffffffff843bf20c r __BTF_ID__set8__xfrm_state_kfunc_set > > jirka > > > of all kfuncs. > > From there it can generate them into vmlinux.h > > > > We wanted kfuncs to appear in vmlinux.h for quite some time, > > but no one had cycles to do it. > > Still an awesome feature to have. > >