Received: by 2002:a25:8b91:0:0:0:0:0 with SMTP id j17csp5718719ybl; Tue, 10 Dec 2019 10:20:57 -0800 (PST) X-Google-Smtp-Source: APXvYqxh0+1jaWwc3PqUr4sodJV0DsFGkpjQ7fWVuaUXu0amlLuLjyHtfYbIpg3rk+VbOYXslfSE X-Received: by 2002:a9d:7984:: with SMTP id h4mr22101219otm.297.1576002057160; Tue, 10 Dec 2019 10:20:57 -0800 (PST) ARC-Seal: i=1; a=rsa-sha256; t=1576002057; cv=none; d=google.com; s=arc-20160816; b=JcPj3jFPlWGqWVoZlJqjPxHmM2zuxzDqqQNTWCWWyQ85mt1SofHSWY+VaH0DA1bYNf FKWkX93BVXL/tPvhaW8xPT/YrbzSaOfRfvlLYvTCwRxea5esBdqHox6lKU4JUbs+c8Rs 5Ri5/Z/T9RUYl4BwLaTSTgvoS3heEWNAoZMVnkcA2aggQFfcWiogEN1jPn7npEsGs5H9 wk1ngW+jGTmyzvJ/BSTueQMxwybW9bNKuNEH4Bsk+kcKb2hJF9AFBLClYvVqISdU0a7a wIjvuY+uTb06QU43LssV/Egf2R396m77SziFSmWlVBAxUK2ng848k0TLZDxKEJ1/XkMt 6eng== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-transfer-encoding:mime-version :organization:references:in-reply-to:message-id:subject:cc:to:from :date:dkim-signature; bh=p250SP6LYYK/01N51GqevSzgn/NOjQ88ERfazogiGtc=; b=xGRVfYUZikqZ0gawXAs+g8D7hPXSHYPmN3fZ63zVEM7Oou3uq6ze9kn/THLGZdd8b/ c2yoiwUzn7mHTr1zYXiOQa76ZfMlGKGe00gm/adVHwsZ/gf7D1ZEjCtncZRy5cc7BlYC JH8sm3gvLaz5JFoWz5f0yDfW2tNHksgQv+sa7hiootkvaG9PbGPQDOcGZxrCwX8wFFXE 2F1MCcPHrMS/UsCXJCTNlzQJLPaiwlamVcUAwlBtK9vIwNiraRWqLAM0MTHNvMgesaZR UAqou4P1vzlQ/aGYnmY5tPIt2ykd9wnrdEbhtxZpSq8vgjCYHHwYAFoWeFkaEcursO3+ swUA== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@netronome-com.20150623.gappssmtp.com header.s=20150623 header.b=pAvWc+I5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g126si2328317oib.105.2019.12.10.10.20.44; Tue, 10 Dec 2019 10:20:57 -0800 (PST) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@netronome-com.20150623.gappssmtp.com header.s=20150623 header.b=pAvWc+I5; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1727654AbfLJSFm (ORCPT + 99 others); Tue, 10 Dec 2019 13:05:42 -0500 Received: from mail-pl1-f194.google.com ([209.85.214.194]:34637 "EHLO mail-pl1-f194.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727663AbfLJSFm (ORCPT ); Tue, 10 Dec 2019 13:05:42 -0500 Received: by mail-pl1-f194.google.com with SMTP id x17so182295pln.1 for ; Tue, 10 Dec 2019 10:05:41 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=netronome-com.20150623.gappssmtp.com; s=20150623; h=date:from:to:cc:subject:message-id:in-reply-to:references :organization:mime-version:content-transfer-encoding; bh=p250SP6LYYK/01N51GqevSzgn/NOjQ88ERfazogiGtc=; b=pAvWc+I5V+HG3QHjPEZN9FO75Z7VXMrY61CNOcY4yRGVAZrItKsNiFDBQ4rOLirN3q diGwW+ozhY2J6C4UNCFMhdy9bJTdOjP1NWkVtOiH7KdFQXiFGfyTIfVqloPAp9DPjOeV XJ4KbfTgHP0bv3QuIAFaNbkEzof9GzzB/EGrFNc7efRsoX3jVLwSREs5MIN3huRiUdkU Hdtnoj36J5m0V5Yi1wWcDRCu8RKqXJ5/R5AEOkVD0YR8/LPDJs5vkbvRyHy3frzmfSe7 dBl0HaKsG4ltLGxNdojP3Ag+pt6MWd4lPPWFLPwhgHsWUW19XRreetlB/lqEzGkjOh/i 1gEg== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:in-reply-to :references:organization:mime-version:content-transfer-encoding; bh=p250SP6LYYK/01N51GqevSzgn/NOjQ88ERfazogiGtc=; b=tw/hp8PLZPtjmvFAb2kfDuR/UOLuPku2ipVKBL8xSUNoyKHgmGg/vGimokhMeTCLj1 csJbHr/UkOr1pTc/v3slL6j3UZIMgk8Lc1sSx+WgEUzguqTXpo9EAWp2weOJQW893Nyf YgL3aPaHB144KEPx3SggnaW38COCxjnRULgcAIrwa55uRfhZ5DBPHYOZs2GOIxibmR5w Lh0XDDT72XtIfv6HptxQ5PZTDJxpJsWNGkIbUhB66FwLxdLAO/A7B7tPC9wiLBBJvBfc q7Psnwclr79ZPLOm6uiY9Y8CBbvqSiTh/avbWDoJ7OoyvA8F8m+fRt0TpuXTThDkyvIv mtfw== X-Gm-Message-State: APjAAAUvab3TEIqMVTtdjIIPaYbZpOOT6gxhkDakwG4kv6oNsImgEcJ5 B1zBkKIz6RBeBJZ3FJeDiv7hpg== X-Received: by 2002:a17:902:d696:: with SMTP id v22mr36021185ply.66.1576001141079; Tue, 10 Dec 2019 10:05:41 -0800 (PST) Received: from cakuba.netronome.com ([2601:646:8e00:e18::3]) by smtp.gmail.com with ESMTPSA id o184sm3982442pgo.62.2019.12.10.10.05.40 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Tue, 10 Dec 2019 10:05:40 -0800 (PST) Date: Tue, 10 Dec 2019 10:05:36 -0800 From: Jakub Kicinski To: Andrii Nakryiko Cc: Andrii Nakryiko , LKML , bpf , Networking , Alexei Starovoitov , Daniel Borkmann , Kernel Team Subject: Re: [PATCH bpf-next 11/15] bpftool: add skeleton codegen command Message-ID: <20191210100536.7a57d5e1@cakuba.netronome.com> In-Reply-To: References: <20191210011438.4182911-1-andriin@fb.com> <20191210011438.4182911-12-andriin@fb.com> <20191209175745.2d96a1f0@cakuba.netronome.com> Organization: Netronome Systems, Ltd. MIME-Version: 1.0 Content-Type: text/plain; charset=US-ASCII Content-Transfer-Encoding: 7bit Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Tue, 10 Dec 2019 09:11:31 -0800, Andrii Nakryiko wrote: > On Mon, Dec 9, 2019 at 5:57 PM Jakub Kicinski wrote: > > On Mon, 9 Dec 2019 17:14:34 -0800, Andrii Nakryiko wrote: > > > struct { > > > /* used by libbpf's skeleton API */ > > > struct bpf_object_skeleton *skeleton; > > > /* bpf_object for libbpf APIs */ > > > struct bpf_object *obj; > > > struct { > > > /* for every defined map in BPF object: */ > > > struct bpf_map *; > > > } maps; > > > struct { > > > /* for every program in BPF object: */ > > > struct bpf_program *; > > > } progs; > > > struct { > > > /* for every program in BPF object: */ > > > struct bpf_link *; > > > } links; > > > /* for every present global data section: */ > > > struct __ { > > > /* memory layout of corresponding data section, > > > * with every defined variable represented as a struct field > > > * with exactly the same type, but without const/volatile > > > * modifiers, e.g.: > > > */ > > > int *my_var_1; > > > ... > > > } *; > > > }; > > > > I think I understand how this is useful, but perhaps the problem here > > is that we're using C for everything, and simple programs for which > > loading the ELF is majority of the code would be better of being > > written in a dynamic language like python? Would it perhaps be a > > better idea to work on some high-level language bindings than spend > > time writing code gens and working around limitations of C? > > None of this work prevents Python bindings and other improvements, is > it? Patches, as always, are greatly appreciated ;) This "do it yourself" shit is not really funny :/ I'll stop providing feedback on BPF patches if you guy keep saying that :/ Maybe that's what you want. > This skeleton stuff is not just to save code, but in general to > simplify and streamline working with BPF program from userspace side. > Fortunately or not, but there are a lot of real-world applications > written in C and C++ that could benefit from this, so this is still > immensely useful. selftests/bpf themselves benefit a lot from this > work, see few of the last patches in this series. Maybe those applications are written in C and C++ _because_ there are no bindings for high level languages. I just wish BPF programming was less weird and adding some funky codegen is not getting us closer to that goal. In my experience code gen is nothing more than a hack to work around bad APIs, but experiences differ so that's not a solid argument. > > > This provides great usability improvements: > > > - no need to look up maps and programs by name, instead just > > > my_obj->maps.my_map or my_obj->progs.my_prog would give necessary > > > bpf_map/bpf_program pointers, which user can pass to existing libbpf APIs; > > > - pre-defined places for bpf_links, which will be automatically populated for > > > program types that libbpf knows how to attach automatically (currently > > > tracepoints, kprobe/kretprobe, raw tracepoint and tracing programs). On > > > tearing down skeleton, all active bpf_links will be destroyed (meaning BPF > > > programs will be detached, if they are attached). For cases in which libbpf > > > doesn't know how to auto-attach BPF program, user can manually create link > > > after loading skeleton and they will be auto-detached on skeleton > > > destruction: > > > > > > my_obj->links.my_fancy_prog = bpf_program__attach_cgroup_whatever( > > > my_obj->progs.my_fancy_prog, > > > > > - it's extremely easy and convenient to work with global data from userspace > > > now. Both for read-only and read/write variables, it's possible to > > > pre-initialize them before skeleton is loaded: > > > > > > skel = my_obj__open(raw_embed_data); > > > my_obj->rodata->my_var = 123; > > > my_obj__load(skel); /* 123 will be initialization value for my_var */ > > > > > > After load, if kernel supports mmap() for BPF arrays, user can still read > > > (and write for .bss and .data) variables values, but at that point it will > > > be directly mmap()-ed to BPF array, backing global variables. This allows to > > > seamlessly exchange data with BPF side. From userspace program's POV, all > > > the pointers and memory contents stay the same, but mapped kernel memory > > > changes to point to created map. > > > If kernel doesn't yet support mmap() for BPF arrays, it's still possible to > > > use those data section structs to pre-initialize .bss, .data, and .rodata, > > > but after load their pointers will be reset to NULL, allowing user code to > > > gracefully handle this condition, if necessary. > > > > > > Given a big surface area, skeleton is kept as an experimental non-public > > > API for now, until more feedback and real-world experience is collected. > > > > That makes no sense to me. bpftool has the same backward compat > > requirements as libbpf. You're just pushing the requirements from > > one component to the other. Feedback and real-world use cases have > > to be exercised before code is merged to any project with backward > > compatibility requirements :( > > To get this feedback we need to have this functionality adopted. To > have it adopted, we need it available in tool users already know, > have, and use. Well you claim you have users for it, just talk to them now. I don't understand how this is not obvious. It's like saying "we can't test this unless it's in the tree"..!? > If you feel that "experimental" disclaimer is not enough, I guess we > can add extra flag to bpftool itself to enable experimental > functionality, something like: > > bpftool --experimental gen skeleton Yeah, world doesn't really work like that. Users start depending on a feature, it will break people's scripts/Makefiles if it disappears. This codegen thing is made to be hard coded in Makefiles.. how do you expect people not to immediately become dependent on it. > > Also please run checkpatch on your patches, and fix reverse xmas tree. > > This is bpftool, not libbpf. Creating a separate tool for this codegen > > stuff is also an option IMHO. > > Sure, will fix few small things checkpatch detected. Running checkpatch should be part of your upstreaming routine, you're wasting people's time. So stop with the amused tone. > Will reverse christmas-ize all the variables, of course :) > > As for separate tool just for this, you are not serious, right? If > bpftool is not right tool for this, I don't know which one is. I am serious. There absolutely nothing this tool needs from BPF, no JSON needed, no bpffs etc. It can be a separate tool like libbpf-skel-gen or libbpf-c-skel or something, distributed with libbpf. That way you can actually soften the backward compat. In case people become dependent on it they can carry that little tool on their own.