[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <6t5bei3t2gwhuycu6ewftrgfuuyfhs26euymkysefqyfabgupa@3od5pe6ajybo>
Date: Mon, 8 Jan 2024 10:52:49 -0700
From: Daniel Xu <dxu@...uu.xyz>
To: Lorenz Bauer <lorenz.bauer@...valent.com>
Cc: linux-input@...r.kernel.org, coreteam@...filter.org,
linux-arm-kernel@...ts.infradead.org, linux-kernel@...r.kernel.org, netfilter-devel@...r.kernel.org,
linux-kselftest@...r.kernel.org, linux-trace-kernel@...r.kernel.org, fsverity@...ts.linux.dev,
bpf@...r.kernel.org, netdev@...r.kernel.org, linux-stm32@...md-mailman.stormreply.com,
cgroups@...r.kernel.org, alexei.starovoitov@...il.com, olsajiri@...il.com,
quentin@...valent.com, alan.maguire@...cle.com, memxor@...il.com
Subject: Re: [PATCH bpf-next v3 0/3] Annotate kfuncs in .BTF_ids section
Hi Lorenz,
On Mon, Jan 08, 2024 at 10:15:45AM +0100, Lorenz Bauer wrote:
> On Sat, Jan 6, 2024 at 7:25 PM Daniel Xu <dxu@...uu.xyz> wrote:
> >
> > === Description ===
> >
> > This is a bpf-treewide change that annotates all kfuncs as such inside
> > .BTF_ids. This annotation eventually allows us to automatically generate
> > kfunc prototypes from bpftool.
> >
> > We store this metadata inside a yet-unused flags field inside struct
> > btf_id_set8 (thanks Kumar!). pahole will be taught where to look.
>
> This is great, thanks for tackling this. With yout patches we can
> figure out the full set of kfuncs. Is there a way to extend it so that
> we can tell which program context a kfunc can be called from?
I think a potential approach would be to extend BTF_ID_FLAGS() with some
more flags if we want to continue with .BTF_ids parsing technique. But
it has some issues with program-type-less helpers that are associated with
attachpoints as well as struct_ops helpers.
Since it looks like we're in rather early stages of program-type-less
world, maybe it'd be good to defer solving this problem until more use
cases are established and we can find a good cut point to design around.
Even with uapi helpers there was no way before.
Thanks,
Daniel
Powered by blists - more mailing lists