Received: by 2002:a05:6358:9144:b0:117:f937:c515 with SMTP id r4csp1506146rwr; Wed, 3 May 2023 16:50:14 -0700 (PDT) X-Google-Smtp-Source: ACHHUZ75rMVWndMn8o4PM901dzoUBTsc4lhGNwa17RDXk1cLUUvwX5hMDhV+97pANy4XQVEk5Z36 X-Received: by 2002:a05:6a20:a5aa:b0:f0:f96a:bf36 with SMTP id bc42-20020a056a20a5aa00b000f0f96abf36mr254020pzb.43.1683157814230; Wed, 03 May 2023 16:50:14 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1683157814; cv=none; d=google.com; s=arc-20160816; b=sisZpYgLLMpscskeEHDCgvdmI3etu0BOtcSlHJO8CdjRL/GX4t4dj+5YeJBJ+KgQNC YPKh9jZCppc4ucop13TnrPrzWxpCVXhdwxtF3+ezC683eIepgEwgDN1lGqT5h4a/tXz8 1fv/+2r11ddeane2easJxNgCAd/145XQdyK1Tl+b9yet6DT757vp9+914DJ7svNW3iM3 PDQ+BBXuq5JFJAW1JbFR0MhVR+QmenJNJTg4GKH0Ld5iKFsFn+3lYZrtmFeO7nVFL8kR Wwb0YvayVRnFHyUXAKY23emp3aRa+Py7oecgAwWVDjsY6ZiJPEJMqvsTgpRoXnJsPN7m 5D9A== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:cc:to:subject :message-id:date:from:in-reply-to:references:mime-version :dkim-signature; bh=liLgFGtLEu8niiT+POixuMWwPLgi8MonJlpUXOfniTs=; b=JpcPZj6NASlwKjR94ev0O40rx/5A6ufzKTMVYD16sLxetF2vSi0XxHRmbOhNOftwDS jl2wmV7m21UE4EAjZLAwmjkDkYtHKUZ2dXC0VaBOgHNvBm+a1aLYFtFxqz8TUlsIkXbu Sc/pKjMmv6HO0pOug60WBopHxS6pKsU5Hub/2fs1UGnP9Z5iZ99HukaXTTCvSnSfpD4E GDWOLU/+dTfq8oVKDnyv04lqnAz2gq56vQVzgl55IJHwTCDNsEySF1flaYWKvugbWbZq kshCEmIa+eroIRUGNiqNaeGtT6PrOLaY/C60GLCS0c3wJJ4FiFGq42j4BVCHJ2EabDcj y0xQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@isovalent.com header.s=google header.b=ZAWLGcEy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=isovalent.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id c200-20020a624ed1000000b0063b7b2669absi33635415pfb.130.2023.05.03.16.49.58; Wed, 03 May 2023 16:50:14 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@isovalent.com header.s=google header.b=ZAWLGcEy; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=isovalent.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S229441AbjECXoJ (ORCPT + 99 others); Wed, 3 May 2023 19:44:09 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:41562 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229522AbjECXoH (ORCPT ); Wed, 3 May 2023 19:44:07 -0400 Received: from mail-ej1-x62d.google.com (mail-ej1-x62d.google.com [IPv6:2a00:1450:4864:20::62d]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 839118693 for ; Wed, 3 May 2023 16:44:05 -0700 (PDT) Received: by mail-ej1-x62d.google.com with SMTP id a640c23a62f3a-959a3e2dc72so1135573966b.2 for ; Wed, 03 May 2023 16:44:05 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=isovalent.com; s=google; t=1683157443; x=1685749443; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:from:to:cc:subject:date :message-id:reply-to; bh=liLgFGtLEu8niiT+POixuMWwPLgi8MonJlpUXOfniTs=; b=ZAWLGcEy9y5Kfw5/6jTt740MtThFAWA31fidlUjLjH0t5mWUKkB78Dvy9nN/tq+7By CutUsF+qCPzN2ntXgWK8INya0iPJ1EQ4CcQG+YSTkaznRA6vqTSz/PfNzTRx3GL5pVRi H0g1x8Py2f6hpRu4/u345w0yjZ52TQqLwM1u1TDKc3CvzcLfqmFbNdJ0urh4uMCuZGOP qcvx3PMIfhVt+U6taKCaT9U3cuYXQZ0lsUQDQVKQJD0KH5XEgScG7mQEzVNcwiQYklvT S2Sm35cvGmUvDaO5gHX/zgYCaEHY+J3iIDSCjsJk9YtLQZWqPu4lOg3LzUkCgPwrnV5R GVKA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20221208; t=1683157443; x=1685749443; h=content-transfer-encoding:cc:to:subject:message-id:date:from :in-reply-to:references:mime-version:x-gm-message-state:from:to:cc :subject:date:message-id:reply-to; bh=liLgFGtLEu8niiT+POixuMWwPLgi8MonJlpUXOfniTs=; b=OD5xS9aC+1DotaWmCfZf9YkJCBU41Go8dDgv/GnS0lKjeuPVBV+SHS3dSzqRtp73Ea 3HWm2St+PuLqJwa7vVMrm427JUD/wDWGQqq7r9OZ+T6xTd9C1t/FAR/mG1V+DPibuJrk xn4DqLChZyum+z5o+g/CANEJjy8YivcMvZO8GHMa4tvLqvL+IK+ILFc8NvZx33ZUfTo7 VyC1M2Lv3lV0YGLJOChRWRmDnXH/xFB+Cla/ufdFOGyyx31LC7/nYu9UU14A2j6IvzU8 GZqMsriFmvph0lK7LQuBH/mBGF0lJGpY8ysMj4NZ5cRhFGhCCg1lsDLzsBSGhXtADO7t TxfQ== X-Gm-Message-State: AC+VfDzWmJjCjQZmfYlbpi58ofztaxQpLb8eOldFDekxdIk9lgcdJ8D1 uO1bCD8X7VhZvMpjAdgN0Lo/7o7aOellP1i2EgACfg== X-Received: by 2002:a17:907:948a:b0:8b1:3467:d71b with SMTP id dm10-20020a170907948a00b008b13467d71bmr4884871ejc.48.1683157443547; Wed, 03 May 2023 16:44:03 -0700 (PDT) MIME-Version: 1.0 References: <20220421003152.339542-1-alobakin@pm.me> <20220421003152.339542-3-alobakin@pm.me> <20230414095457.GG63923@kunlun.suse.cz> <9952dc32-f464-c85a-d812-946d6b0ac734@intel.com> <20230414162821.GK63923@kunlun.suse.cz> <20230421073904.GJ15906@kitsune.suse.cz> In-Reply-To: <20230421073904.GJ15906@kitsune.suse.cz> From: Quentin Monnet Date: Thu, 4 May 2023 00:43:52 +0100 Message-ID: Subject: Re: [PATCH v2 bpf 02/11] bpftool: define a local bpf_perf_link to fix accessing its fields To: =?UTF-8?Q?Michal_Such=C3=A1nek?= Cc: Andrii Nakryiko , Alexander Lobakin , Alexander Lobakin , Alexei Starovoitov , Shung-Hsi Yu , Daniel Borkmann , Andrii Nakryiko , Maciej Fijalkowski , Song Liu , Kumar Kartikeya Dwivedi , bpf@vger.kernel.org, netdev@vger.kernel.org, linux-kernel@vger.kernel.org Content-Type: text/plain; charset="UTF-8" Content-Transfer-Encoding: quoted-printable X-Spam-Status: No, score=-2.1 required=5.0 tests=BAYES_00,DKIM_SIGNED, DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,URIBL_BLOCKED autolearn=unavailable autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org On Fri, 21 Apr 2023 at 08:39, Michal Such=C3=A1nek wrot= e: > > On Thu, Apr 20, 2023 at 04:07:38PM -0700, Andrii Nakryiko wrote: > > On Fri, Apr 14, 2023 at 9:28=E2=80=AFAM Michal Such=C3=A1nek wrote: > > > > > > On Fri, Apr 14, 2023 at 05:18:27PM +0200, Alexander Lobakin wrote: > > > > From: Michal Such=C3=A1nek > > > > Date: Fri, 14 Apr 2023 11:54:57 +0200 > > > > > > > > > Hello, > > > > > > > > Hey-hey, > > > > > > > > > > > > > > On Thu, Apr 21, 2022 at 12:38:58AM +0000, Alexander Lobakin wrote= : > > > > >> When building bpftool with !CONFIG_PERF_EVENTS: > > > > >> > > > > >> skeleton/pid_iter.bpf.c:47:14: error: incomplete definition of t= ype 'struct bpf_perf_link' > > > > >> perf_link =3D container_of(link, struct bpf_perf_link, l= ink); > > > > >> ^~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~= ~~ > > > > >> tools/bpf/bpftool/bootstrap/libbpf/include/bpf/bpf_helpers.h:74:= 22: note: expanded from macro 'container_of' > > > > >> ((type *)(__mptr - offsetof(type, member))); = \ > > > > >> ^~~~~~~~~~~~~~~~~~~~~~ > > > > >> tools/bpf/bpftool/bootstrap/libbpf/include/bpf/bpf_helpers.h:68:= 60: note: expanded from macro 'offsetof' > > > > >> #define offsetof(TYPE, MEMBER) ((unsigned long)&((TYPE *)0)->M= EMBER) > > > > >> ~~~~~~~~~~~^ > > > > >> skeleton/pid_iter.bpf.c:44:9: note: forward declaration of 'stru= ct bpf_perf_link' > > > > >> struct bpf_perf_link *perf_link; > > > > >> ^ > > > > >> > > > > >> &bpf_perf_link is being defined and used only under the ifdef. > > > > >> Define struct bpf_perf_link___local with the `preserve_access_in= dex` > > > > >> attribute inside the pid_iter BPF prog to allow compiling on any > > > > >> configs. CO-RE will substitute it with the real struct bpf_perf_= link > > > > >> accesses later on. > > > > >> container_of() is not CO-REd, but it is a noop for > > > > >> bpf_perf_link <-> bpf_link and the local copy is a full mirror o= f > > > > >> the original structure. > > > > >> > > > > >> Fixes: cbdaf71f7e65 ("bpftool: Add bpf_cookie to link output") > > > > > > > > > > This does not solve the problem completely. Kernels that don't ha= ve > > > > > CONFIG_PERF_EVENTS in the first place are also missing the enum v= alue > > > > > BPF_LINK_TYPE_PERF_EVENT which is used as the condition for handl= ing the > > > > > cookie. > > > > > > > > Sorry, I haven't been working with my home/private stuff for more t= han a > > > > year already. I may get back to it some day when I'm tired of Lua (= curse > > > > words, sorry :D), but for now the series is "a bit" abandoned. > > > > > > This part still appllies and works for me with the caveat that > > > BPF_LINK_TYPE_PERF_EVENT also needs to be defined. > > > > > > > I think there was alternative solution proposed there, which promis= ed to > > > > be more flexible. But IIRC it also doesn't touch the enum (was it a= dded > > > > recently? Because it was building just fine a year ago on config wi= thout > > > > perf events). > > > > > > It was added in 5.15. Not sure there is a kernel.org LTS kernel usabl= e > > > for CO-RE that does not have it, technically 5.4 would work if it was > > > built monolithic, it does not have module BTF, only kernel IIRC. > > > > > > Nonetheless, the approach to handling features completely missing in = the > > > running kernel should be figured out one way or another. I would be > > > surprised if this was the last feature to be added that bpftool needs= to > > > know about. > > > > Are we talking about bpftool built from kernel sources or from Github? > > Kernel source version should have access to latest UAPI headers and so > > BPF_LINK_TYPE_PERF_EVENT should be available. Github version, if it > > doesn't do that already, can use UAPI headers distributed (and used > > for building) with libbpf through submodule. > > It does have a copy of the uapi headers but apparently does not use > them. Using them directly might cause conflict with vmlinux.h, though. Indeed, using the UAPI header here conflicts with vmlinux.h. Looking again at some code I started last year but never finalised, I used the following approach, redefining BPF_LINK_TYPE_PERF_EVENT with CO-RE: enum bpf_link_type___local { BPF_LINK_TYPE_PERF_EVENT___local =3D 7, }; Then guarding accordingly in iter(): [...] if (obj_type =3D=3D BPF_OBJ_LINK && bpf_core_enum_value_exists(enum bpf_link_type___local, BPF_LINK_TYPE_PERF_EVENT___local)) { struct bpf_link *link =3D (struct bpf_link *) file->private_data; if (link->type =3D=3D bpf_core_enum_value(enum bpf_link_type___loca= l, BPF_LINK_TYPE_PERF_EVENT___local)) { e.has_bpf_cookie =3D true; e.bpf_cookie =3D get_bpf_cookie(link); } } [...] Would that approach make sense? I had a VM around with kernel 5.8, and bpftool compiles there with that change. If I remember correctly, some older kernel versions required yet more CO-RE work in pid_iter.bpf.c, and at some point I was struggling, which is why I never submitted this set. If this approach looks correct to you Andrii, I can resubmit these patches with my addition so we can at least fix the build on 5.8 onwards. Thanks, Quentin