On Thu, Jul 07, 2022 at 12:10:30PM -0700, Andrii Nakryiko wrote: SNIP > > Maybe we should do the other way around ? > > cat /proc/kallsyms |grep sys_bpf > > > > and figure out the prefix from there? > > Then we won't need to do giant > > #if defined(__x86_64__) > > ... > > > > Unfortunately this won't work well due to compat and 32-bit APIs (and > bpf() syscall is particularly bad with also bpf_sys_bpf): > > $ sudo cat /proc/kallsyms| rg '_sys_bpf$' > ffffffff811cb100 t __sys_bpf > ffffffff811cd380 T bpf_sys_bpf > ffffffff811cd520 T __x64_sys_bpf > ffffffff811cd540 T __ia32_sys_bpf > ffffffff8256fce0 r __ksymtab_bpf_sys_bpf > ffffffff8259b5a2 r __kstrtabns_bpf_sys_bpf > ffffffff8259bab9 r __kstrtab_bpf_sys_bpf > ffffffff83abc400 t _eil_addr___ia32_sys_bpf > ffffffff83abc410 t _eil_addr___x64_sys_bpf > > $ sudo cat /proc/kallsyms| rg '_sys_mmap$' > ffffffff81024480 T __x64_sys_mmap > ffffffff810244c0 T __ia32_sys_mmap > ffffffff83abae30 t _eil_addr___ia32_sys_mmap > ffffffff83abae40 t _eil_addr___x64_sys_mmap > > We have similar arch-specific switches in few other places (USDT and > lib path detection, for example), so it's not a new precedent (for > better or worse). > > > > /proc/kallsyms has world read permissions: > > proc_create("kallsyms", 0444, NULL, &kallsyms_proc_ops); > > unlike available_filter_functions. > > > > Also tracefs might be mounted in a different dir than > > /sys/kernel/tracing/ > > like > > /sys/kernel/debug/tracing/ > > Yeah, good point, was trying to avoid parsing more expensive kallsyms, > but given it's done once, it might not be a big deal. we could get that also from BTF? jirka