Commit Graph

18 Commits

Author SHA1 Message Date
9fe28d5577 BTF-playgroundi: Drop printing BTF object ID in btf_module_read
As we have not found a way to get the BTF object ID via the
sysfs filesystem BTF files.

Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com>
2022-09-02 14:03:27 +02:00
d88d8ffe89 BTF-playground: btf_module_ids is only interested in kernel BTF
Skip BTF IDs that doesn't originate from the kernel as this
program are looking for kernel module BTF.

Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com>
2022-09-02 14:00:55 +02:00
203343c5ac BTF-playground: Mark functions that are privileged
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com>
2022-09-01 17:16:45 +02:00
fec451bb34 BTF-playground: Drop normal vmlinux open in btf_module_ids
This btf_module_ids.c example is about getting BTF info via
the object IDs.

Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com>
2022-09-01 15:28:58 +02:00
d77b378c28 BTF-playground: Add params --module and --symbol
For easier playing around with poking at different modules on cmdline.

Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com>
2022-08-31 18:37:41 +02:00
d33d264494 BTF-playground: Stop opening vmlinux as it was a dead end
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com>
2022-08-31 16:29:13 +02:00
e4616a809f BTF-playground: Extract the BTF data size from info call
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com>
2022-08-31 16:23:26 +02:00
a998181376 BTF-playground: Find BTF id by name compare walk
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com>
2022-08-31 14:37:02 +02:00
e00b6a66e6 BTF-playground: Extract BTF name while walking all IDs
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com>
2022-08-31 12:23:43 +02:00
55fcfcce87 BTF-playground: btf_module_ids.c try walking BTF IDs
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com>
2022-08-31 11:22:22 +02:00
9eeaf90eaf BTF-playground: Small steps in btf_module_ids.c
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com>
2022-08-31 10:58:02 +02:00
2d73471c2c BTF-playground: Boilerplate for btf_module_ids.c
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com>
2022-08-31 10:45:02 +02:00
f3de9c2e47 BTF-playground: New failed attempt at getting BTF obj ID
Manually opening the /sys/kernel/btf/ file and trying to get
info via bpf_obj_get_info_by_fd() doesn't give us anything.

Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com>
2022-08-31 10:37:54 +02:00
bd3e07587c BTF-playground: refactor code
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com>
2022-08-31 10:23:01 +02:00
f0755442ff BTF-playground: Cannot get kernel BTF obj ID this way
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com>
2022-08-31 09:59:16 +02:00
e307581009 BTF-playground: Handle error and free resources explicitly
Signed-off-by: Hengqi Chen <chenhengqi@outlook.com>
2022-03-09 09:04:38 +08:00
9d975cdf29 BTF-playground: Add btf_module_read.c example
This is based on kernel selftests/bpf:

 tools/testing/selftests/bpf/prog_tests/btf_module.c

Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2021-09-10 18:16:18 +02:00
851e0f35de BTF-playground: Add Makefile
Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com>
2021-09-10 18:15:37 +02:00