This is quick note on using the BPF_F_MMAPABLE
map flag that was added end of
2019 by Andrii Nakryiko, see kernel patch.
I noticed that there weren’t a lot of tutorials on that so I thought about
writing this, then I realized I should have looked at kernel selftest, because
it’s obviously tested there, but anyway.
Pre-requisites
This uses clang to compile the BPF progs, bpftool to generate the skeleton and libbpf to load them, I relied on the excellent libbpf-bootstrap repo. In short, for compiling the BPF progs you’ll need clang 11+, then you’ll need bpftool to generate the BPF skeletons, and finally you’ll also need a “recent” version of libbpf, which depends on libelf and zlib. See more details and instruction in libbpf-bootstrap deps.
Be aware that some commonly used distros ship an old version of libbpf, like Ubuntu 22.04 for example, that ships v0.5.0, see more details on libbpf distribution.
Write a BPF program
Let’s write a simple program that we will run on-demand via
BPF_PROG_TEST_RUN
. We’ll add an array map of size 16. Note that its actual
memory impact will be larger since, in order for the map to be mmapable, it
will need at least to use PAGE_SIZE
.
|
|
Compile this program using clang
clang -O2 -g -target bpf -Wall -Werror -c mmap.bpf.c -o mmap.bpf.o
Write a loader with libbpf
Next step is using bpftool for generating the libbpf skeleton. Note that you can now download static build of bpftool on the releases page if you are not happy with your distribution package (hehe).
bpftool gen skeleton mmap.bpf.o > mmap.skel.h
Now write the user space program that will:
- Load the BPF prog;
- Memory map the BPF map;
- Run the BPF prog;
- Print the content of the map from the memory mapping;
- Modify the content of the map from the memory mapping.
|
|
You can compile your loader with:
gcc mmap_laoder.c -lbpf -o mmap_loader
For “reasons”, in my situation I ended up recompiling the latest libbpf and
using the static build for my loader, it’s quite straighforward to do: you can
clone libbpf mirror from github.com/libbpf/libbpf
and then run make
from the src folder. Then you pass the libbpf.a
file to
your compiler with the -lelf
and -lz
lib args.
gcc mmap_loader.c ../libbpf/src/libbpf.a -lelf -lz -o mmap_loader
Running and be amazed that it works
First in another terminal, open the trace_pipe
to get the bpf_printk
from
the BPF prog:
sudo cat /sys/kernel/tracing/trace_pipe
And then run your loader:
sudo ./mmap_loader
On the pipe side you should see something similar to:
mmap_loader-14933 [003] ..... 8469.272544: bpf_trace_printk: buf: hello from bpf
mmap_loader-14933 [003] ..... 8469.272556: bpf_trace_printk: buf: hello from user
And from your loader, a bunch of libbpf output first from stderr:
libbpf: loading object 'mmap_bpf' from buffer
libbpf: elf: section(3) raw_tp/does-not-exist, size 408, link 0, flags 6, type=1
libbpf: sec 'raw_tp/does-not-exist': found program 'test_prog' at insn offset 0 (0 bytes), code size 51 insns (408 bytes)
libbpf: elf: section(4) .relraw_tp/does-not-exist, size 48, link 28, flags 40, type=9
libbpf: elf: section(5) license, size 13, link 0, flags 3, type=1
libbpf: license of mmap_bpf is Dual BSD/GPL
libbpf: elf: section(6) .maps, size 40, link 0, flags 3, type=1
libbpf: elf: section(7) .rodata, size 27, link 0, flags 2, type=1
libbpf: elf: section(8) .rodata.str1.1, size 15, link 0, flags 32, type=1
libbpf: elf: section(18) .BTF, size 1065, link 0, flags 0, type=1
libbpf: elf: section(20) .BTF.ext, size 240, link 0, flags 0, type=1
libbpf: elf: section(28) .symtab, size 432, link 1, flags 0, type=2
libbpf: looking for externs among 18 symbols...
libbpf: collected 0 externs total
libbpf: map 'buf_map': at sec_idx 6, offset 0.
libbpf: map 'buf_map': found type = 2.
libbpf: map 'buf_map': found key [8], sz = 4.
libbpf: map 'buf_map': found value [12], sz = 16.
libbpf: map 'buf_map': found max_entries = 1.
libbpf: map 'buf_map': found map_flags = 0x400.
libbpf: map 'mmap_bpf.rodata' (global data): at sec_idx 7, offset 0, flags 80.
libbpf: map 1 is "mmap_bpf.rodata"
libbpf: map '.rodata.str1.1' (global data): at sec_idx 8, offset 0, flags 80.
libbpf: map 2 is ".rodata.str1.1"
libbpf: sec '.relraw_tp/does-not-exist': collecting relocation for section(3) 'raw_tp/does-not-exist'
libbpf: sec '.relraw_tp/does-not-exist': relo #0: insn #4 against 'buf_map'
libbpf: prog 'test_prog': found map 0 (buf_map, sec 6, off 0) for insn #4
libbpf: sec '.relraw_tp/does-not-exist': relo #1: insn #8 against '.rodata'
libbpf: prog 'test_prog': found data map 1 (mmap_bpf.rodata, sec 7, off 0) for insn 8
libbpf: sec '.relraw_tp/does-not-exist': relo #2: insn #44 against '.rodata'
libbpf: prog 'test_prog': found data map 1 (mmap_bpf.rodata, sec 7, off 0) for insn 44
libbpf: object 'mmap_bpf': failed (-22) to create BPF token from '/sys/fs/bpf', skipping optional step...
libbpf: map 'buf_map': created successfully, fd=3
libbpf: map 'mmap_bpf.rodata': created successfully, fd=4
libbpf: map '.rodata.str1.1': created successfully, fd=5
And the stdout output:
00 00 00 00 00 00 00 00 00 00 00 00 00 00 00 00
68 65 6c 6c 6f 20 66 72 6f 6d 20 62 70 66 00 00 hello from bpf
68 65 6c 6c 6f 20 66 72 6f 6d 20 75 73 65 72 00 hello from user
Conclusion
Now you can combine that with vmsplice(2)
and potentially BPF arena to have
efficient zero-copy outputs from your BPF progs.