9fe28d5577
BTF-playgroundi: Drop printing BTF object ID in btf_module_read
...
As we have not found a way to get the BTF object ID via the
sysfs filesystem BTF files.
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com >
2022-09-02 14:03:27 +02:00
d88d8ffe89
BTF-playground: btf_module_ids is only interested in kernel BTF
...
Skip BTF IDs that doesn't originate from the kernel as this
program are looking for kernel module BTF.
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com >
2022-09-02 14:00:55 +02:00
203343c5ac
BTF-playground: Mark functions that are privileged
...
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com >
2022-09-01 17:16:45 +02:00
fec451bb34
BTF-playground: Drop normal vmlinux open in btf_module_ids
...
This btf_module_ids.c example is about getting BTF info via
the object IDs.
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com >
2022-09-01 15:28:58 +02:00
d77b378c28
BTF-playground: Add params --module and --symbol
...
For easier playing around with poking at different modules on cmdline.
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com >
2022-08-31 18:37:41 +02:00
d33d264494
BTF-playground: Stop opening vmlinux as it was a dead end
...
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com >
2022-08-31 16:29:13 +02:00
e4616a809f
BTF-playground: Extract the BTF data size from info call
...
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com >
2022-08-31 16:23:26 +02:00
a998181376
BTF-playground: Find BTF id by name compare walk
...
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com >
2022-08-31 14:37:02 +02:00
e00b6a66e6
BTF-playground: Extract BTF name while walking all IDs
...
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com >
2022-08-31 12:23:43 +02:00
55fcfcce87
BTF-playground: btf_module_ids.c try walking BTF IDs
...
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com >
2022-08-31 11:22:22 +02:00
9eeaf90eaf
BTF-playground: Small steps in btf_module_ids.c
...
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com >
2022-08-31 10:58:02 +02:00
2d73471c2c
BTF-playground: Boilerplate for btf_module_ids.c
...
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com >
2022-08-31 10:45:02 +02:00
f3de9c2e47
BTF-playground: New failed attempt at getting BTF obj ID
...
Manually opening the /sys/kernel/btf/ file and trying to get
info via bpf_obj_get_info_by_fd() doesn't give us anything.
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com >
2022-08-31 10:37:54 +02:00
bd3e07587c
BTF-playground: refactor code
...
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com >
2022-08-31 10:23:01 +02:00
f0755442ff
BTF-playground: Cannot get kernel BTF obj ID this way
...
Signed-off-by: Jesper Dangaard Brouer <netoptimizer@brouer.com >
2022-08-31 09:59:16 +02:00
e307581009
BTF-playground: Handle error and free resources explicitly
...
Signed-off-by: Hengqi Chen <chenhengqi@outlook.com >
2022-03-09 09:04:38 +08:00
9d975cdf29
BTF-playground: Add btf_module_read.c example
...
This is based on kernel selftests/bpf:
tools/testing/selftests/bpf/prog_tests/btf_module.c
Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com >
2021-09-10 18:16:18 +02:00
851e0f35de
BTF-playground: Add Makefile
...
Signed-off-by: Jesper Dangaard Brouer <brouer@redhat.com >
2021-09-10 18:15:37 +02:00