Re: pahole and gcc-14 issues

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 



On 25/04/2025 18:58, Andrii Nakryiko wrote:
> On Fri, Apr 25, 2025 at 10:50 AM Alan Maguire <alan.maguire@xxxxxxxxxx> wrote:
>>
>> On 25/04/2025 15:50, Alexei Starovoitov wrote:
>>> Hi All,
>>>
>>> Looks like pahole fails to deduplicate BTF when kernel and
>>> kernel module are built with gcc-14.
>>> I see this issue with various kernel .config-s on bpf and
>>> bpf-next trees.
>>> I tried pahole 1.28 and the latest master. Same issues.
>>>
>>> BTF in bpf_testmod.ko built with gcc-14 has 2849 types.
>>> When built with gcc-13 it has 454 types.
>>> So something is confusing dedup logic.
>>> Would be great if dedup experts can take a look,
>>> since this dedup issue is breaking a lot of selftests/bpf.
>>>
>>> Also vmlinux.h generated out of the kernel compiled with gcc-13
>>> and out of the kernel compiled with gcc-14 shows these differences:
>>>
>>> --- vmlinux13.h    2025-04-24 21:33:50.556884372 -0700
>>> +++ vmlinux14.h    2025-04-24 21:39:10.310488992 -0700
>>> @@ -148815,7 +148815,6 @@
>>>  extern int hid_bpf_input_report(struct hid_bpf_ctx *ctx, enum
>>> hid_report_type type, u8 *buf, const size_t buf__sz) __weak __ksym;
>>>  extern void hid_bpf_release_context(struct hid_bpf_ctx *ctx) __weak __ksym;
>>>  extern int hid_bpf_try_input_report(struct hid_bpf_ctx *ctx, enum
>>> hid_report_type type, u8 *buf, const size_t buf__sz) __weak __ksym;
>>> -extern bool scx_bpf_consume(u64 dsq_id) __weak __ksym;
>>>  extern int scx_bpf_cpu_node(s32 cpu) __weak __ksym;
>>>  extern struct rq *scx_bpf_cpu_rq(s32 cpu) __weak __ksym;
>>>  extern u32 scx_bpf_cpuperf_cap(s32 cpu) __weak __ksym;
>>> @@ -148825,12 +148824,8 @@
>>>  extern void scx_bpf_destroy_dsq(u64 dsq_id) __weak __ksym;
>>>  extern void scx_bpf_dispatch(struct task_struct *p, u64 dsq_id, u64
>>> slice, u64 enq_flags) __weak __ksym;
>>>  extern void scx_bpf_dispatch_cancel(void) __weak __ksym;
>>> -extern bool scx_bpf_dispatch_from_dsq(struct bpf_iter_scx_dsq
>>> *it__iter, struct task_struct *p, u64 dsq_id, u64 enq_flags) __weak
>>> __ksym;
>>> -extern void scx_bpf_dispatch_from_dsq_set_slice(struct
>>> bpf_iter_scx_dsq *it__iter, u64 slice) __weak __ksym;
>>>  extern void scx_bpf_dispatch_from_dsq_set_vtime(struct
>>> bpf_iter_scx_dsq *it__iter, u64 vtime) __weak __ksym;
>>>  extern u32 scx_bpf_dispatch_nr_slots(void) __weak __ksym;
>>> -extern void scx_bpf_dispatch_vtime(struct task_struct *p, u64 dsq_id,
>>> u64 slice, u64 vtime, u64 enq_flags) __weak __ksym;
>>> -extern bool scx_bpf_dispatch_vtime_from_dsq(struct bpf_iter_scx_dsq
>>> *it__iter, struct task_struct *p, u64 dsq_id, u64 enq_flags) __weak
>>> __ksym;
>>>  extern void scx_bpf_dsq_insert(struct task_struct *p, u64 dsq_id, u64
>>> slice, u64 enq_flags) __weak __ksym;
>>>  extern void scx_bpf_dsq_insert_vtime(struct task_struct *p, u64
>>> dsq_id, u64 slice, u64 vtime, u64 enq_flags) __weak __ksym;
>>>  extern bool scx_bpf_dsq_move(struct bpf_iter_scx_dsq *it__iter,
>>> struct task_struct *p, u64 dsq_id, u64 enq_flags) __weak __ksym;
>>>
>>> gcc-14's kernel is clearly wrong.
>>> These 5 kfuncs still exist in the kernel.
>>> I manually checked there is no if __GNUC__ > 13 in the code.
>>> Also:
>>> nm bld/vmlinux|grep -w scx_bpf_consume
>>> ffffffff8159d4b0 T scx_bpf_consume
>>> ffffffff8120ea81 t scx_bpf_consume.cold
>>>
>>> I suspect the second issue is not related to the dedup problem.
>>> All 5 missing kfuncs have ".cold" optimized bodies.
>>> But ".cold" maybe a red herring, since
>>> nm bld/vmlinux|grep -w scx_bpf_dispatch
>>> ffffffff8159d020 T scx_bpf_dispatch
>>> ffffffff8120ea0f t scx_bpf_dispatch.cold
>>> but this kfunc is present in vmlinux14.h
>>>
>>> If it makes a difference I have these configs:
>>> # CONFIG_DEBUG_INFO_DWARF4 is not set
>>> # CONFIG_DEBUG_INFO_DWARF5 is not set
>>> # CONFIG_DEBUG_INFO_REDUCED is not set
>>> CONFIG_DEBUG_INFO_COMPRESSED_NONE=y
>>> # CONFIG_DEBUG_INFO_COMPRESSED_ZLIB is not set
>>> # CONFIG_DEBUG_INFO_SPLIT is not set
>>> CONFIG_DEBUG_INFO_BTF=y
>>> CONFIG_PAHOLE_HAS_SPLIT_BTF=y
>>> CONFIG_DEBUG_INFO_BTF_MODULES=y
>>
>> thanks for the report! I've just reproduced this now with gcc 14; my
>> initial theory was it might be DWARF5-related, but dedup issues occur
>> for modules with CONFIG_DEBUG_INFO_DWARF4=y also. I'm seeing task_struct
>> duplicates in module BTF among other things, so I will try and dig
>> further and report back when I find something. Like you I suspect the
> 
> This is a bizarre case. I have a custom small tool that recursively
> traverses two parallel subgraphs of BTF types and prints anything that
> differs between them ([0]). (I had to disable distilled BTF to make
> use of this, the issue is present both with distilled BTF and
> without).
> 
> I see that struct sock both in vmlinux and bpf_testmod.ko are
> *IDENTICAL*. There is no difference I could detect. So very weird. I'm
> thinking of bisecting, as this didn't happen before with exactly the
> same compiler and pahole, so this must be a kernel-side change.
> 
>   [0] https://github.com/anakryiko/libbpf-bootstrap/tree/btfdiff-hack
> 

thanks for the pointer to this! My initial suspicion was that we had
some sort of dups of slightly-differently-defined primitive types that
bubbled up through multiple structs in the module case since the level
of duplication is so high; a colleague ran across something like this
recently and indeed if I dump vmlinux BTF in C format I see:

typedef unsigned char u8___2;

...along with the original u8 definition:

typedef unsigned char __u8;
typedef __u8 u8;

However on checking I didn't find any references to the "wrong" u8, so I
don't think it is the cause (the definition comes from
crypto/jitterentropy.c so as a .c redefinition it's less likely to cause
chaos across multiple CUs).

Perhaps we should be thinking of cases where "#ifdef MODULE" leads to
different structure content, maybe something changed that results in
that leaking into core kernel structures like task_struct. Haven't had
any luck finding a common culprit across duplicated structures yet..

Alan




[Index of Archives]     [Linux USB Devel]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]

  Powered by Linux