1 // SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
2 /* Copyright (C) 2019 Facebook */
11 #include <linux/err.h>
17 #include <bpf/libbpf.h>
18 #include <bpf/libbpf_internal.h>
19 #include <sys/types.h>
24 #include "json_writer.h"
27 #define MAX_OBJ_NAME_LEN 64
29 static void sanitize_identifier(char *name)
33 for (i = 0; name[i]; i++)
34 if (!isalnum(name[i]) && name[i] != '_')
38 static bool str_has_prefix(const char *str, const char *prefix)
40 return strncmp(str, prefix, strlen(prefix)) == 0;
43 static bool str_has_suffix(const char *str, const char *suffix)
45 size_t i, n1 = strlen(str), n2 = strlen(suffix);
50 for (i = 0; i < n2; i++) {
51 if (str[n1 - i - 1] != suffix[n2 - i - 1])
58 static const struct btf_type *
59 resolve_func_ptr(const struct btf *btf, __u32 id, __u32 *res_id)
61 const struct btf_type *t;
63 t = skip_mods_and_typedefs(btf, id, NULL);
67 t = skip_mods_and_typedefs(btf, t->type, res_id);
69 return btf_is_func_proto(t) ? t : NULL;
72 static void get_obj_name(char *name, const char *file)
74 char file_copy[PATH_MAX];
76 /* Using basename() POSIX version to be more portable. */
77 strncpy(file_copy, file, PATH_MAX - 1)[PATH_MAX - 1] = '\0';
78 strncpy(name, basename(file_copy), MAX_OBJ_NAME_LEN - 1)[MAX_OBJ_NAME_LEN - 1] = '\0';
79 if (str_has_suffix(name, ".o"))
80 name[strlen(name) - 2] = '\0';
81 sanitize_identifier(name);
84 static void get_header_guard(char *guard, const char *obj_name, const char *suffix)
88 sprintf(guard, "__%s_%s__", obj_name, suffix);
89 for (i = 0; guard[i]; i++)
90 guard[i] = toupper(guard[i]);
93 static bool get_map_ident(const struct bpf_map *map, char *buf, size_t buf_sz)
95 static const char *sfxs[] = { ".data", ".rodata", ".bss", ".kconfig" };
96 const char *name = bpf_map__name(map);
99 if (!bpf_map__is_internal(map)) {
100 snprintf(buf, buf_sz, "%s", name);
104 for (i = 0, n = ARRAY_SIZE(sfxs); i < n; i++) {
105 const char *sfx = sfxs[i], *p;
107 p = strstr(name, sfx);
109 snprintf(buf, buf_sz, "%s", p + 1);
110 sanitize_identifier(buf);
118 static bool get_datasec_ident(const char *sec_name, char *buf, size_t buf_sz)
120 static const char *pfxs[] = { ".data", ".rodata", ".bss", ".kconfig" };
123 for (i = 0, n = ARRAY_SIZE(pfxs); i < n; i++) {
124 const char *pfx = pfxs[i];
126 if (str_has_prefix(sec_name, pfx)) {
127 snprintf(buf, buf_sz, "%s", sec_name + 1);
128 sanitize_identifier(buf);
136 static void codegen_btf_dump_printf(void *ctx, const char *fmt, va_list args)
141 static int codegen_datasec_def(struct bpf_object *obj,
144 const struct btf_type *sec,
145 const char *obj_name)
147 const char *sec_name = btf__name_by_offset(btf, sec->name_off);
148 const struct btf_var_secinfo *sec_var = btf_var_secinfos(sec);
149 int i, err, off = 0, pad_cnt = 0, vlen = btf_vlen(sec);
150 char var_ident[256], sec_ident[256];
151 bool strip_mods = false;
153 if (!get_datasec_ident(sec_name, sec_ident, sizeof(sec_ident)))
156 if (strcmp(sec_name, ".kconfig") != 0)
159 printf(" struct %s__%s {\n", obj_name, sec_ident);
160 for (i = 0; i < vlen; i++, sec_var++) {
161 const struct btf_type *var = btf__type_by_id(btf, sec_var->type);
162 const char *var_name = btf__name_by_offset(btf, var->name_off);
163 DECLARE_LIBBPF_OPTS(btf_dump_emit_type_decl_opts, opts,
164 .field_name = var_ident,
166 .strip_mods = strip_mods,
168 int need_off = sec_var->offset, align_off, align;
169 __u32 var_type_id = var->type;
171 /* static variables are not exposed through BPF skeleton */
172 if (btf_var(var)->linkage == BTF_VAR_STATIC)
175 if (off > need_off) {
176 p_err("Something is wrong for %s's variable #%d: need offset %d, already at %d.\n",
177 sec_name, i, need_off, off);
181 align = btf__align_of(btf, var->type);
183 p_err("Failed to determine alignment of variable '%s': %d",
187 /* Assume 32-bit architectures when generating data section
188 * struct memory layout. Given bpftool can't know which target
189 * host architecture it's emitting skeleton for, we need to be
190 * conservative and assume 32-bit one to ensure enough padding
191 * bytes are generated for pointer and long types. This will
192 * still work correctly for 64-bit architectures, because in
193 * the worst case we'll generate unnecessary padding field,
194 * which on 64-bit architectures is not strictly necessary and
195 * would be handled by natural 8-byte alignment. But it still
196 * will be a correct memory layout, based on recorded offsets
202 align_off = (off + align - 1) / align * align;
203 if (align_off != need_off) {
204 printf("\t\tchar __pad%d[%d];\n",
205 pad_cnt, need_off - off);
209 /* sanitize variable name, e.g., for static vars inside
210 * a function, it's name is '<function name>.<variable name>',
211 * which we'll turn into a '<function name>_<variable name>'
214 strncat(var_ident, var_name, sizeof(var_ident) - 1);
215 sanitize_identifier(var_ident);
218 err = btf_dump__emit_type_decl(d, var_type_id, &opts);
223 off = sec_var->offset + sec_var->size;
225 printf(" } *%s;\n", sec_ident);
229 static const struct btf_type *find_type_for_map(struct btf *btf, const char *map_ident)
231 int n = btf__type_cnt(btf), i;
234 for (i = 1; i < n; i++) {
235 const struct btf_type *t = btf__type_by_id(btf, i);
238 if (!btf_is_datasec(t))
241 name = btf__str_by_offset(btf, t->name_off);
242 if (!get_datasec_ident(name, sec_ident, sizeof(sec_ident)))
245 if (strcmp(sec_ident, map_ident) == 0)
251 static bool is_mmapable_map(const struct bpf_map *map, char *buf, size_t sz)
253 if (!bpf_map__is_internal(map) || !(bpf_map__map_flags(map) & BPF_F_MMAPABLE))
256 if (!get_map_ident(map, buf, sz))
262 static int codegen_datasecs(struct bpf_object *obj, const char *obj_name)
264 struct btf *btf = bpf_object__btf(obj);
267 const struct btf_type *sec;
271 d = btf_dump__new(btf, codegen_btf_dump_printf, NULL, NULL);
275 bpf_object__for_each_map(map, obj) {
276 /* only generate definitions for memory-mapped internal maps */
277 if (!is_mmapable_map(map, map_ident, sizeof(map_ident)))
280 sec = find_type_for_map(btf, map_ident);
282 /* In some cases (e.g., sections like .rodata.cst16 containing
283 * compiler allocated string constants only) there will be
284 * special internal maps with no corresponding DATASEC BTF
285 * type. In such case, generate empty structs for each such
286 * map. It will still be memory-mapped and its contents
287 * accessible from user-space through BPF skeleton.
290 printf(" struct %s__%s {\n", obj_name, map_ident);
291 printf(" } *%s;\n", map_ident);
293 err = codegen_datasec_def(obj, btf, d, sec, obj_name);
305 static bool btf_is_ptr_to_func_proto(const struct btf *btf,
306 const struct btf_type *v)
308 return btf_is_ptr(v) && btf_is_func_proto(btf__type_by_id(btf, v->type));
311 static int codegen_subskel_datasecs(struct bpf_object *obj, const char *obj_name)
313 struct btf *btf = bpf_object__btf(obj);
316 const struct btf_type *sec, *var;
317 const struct btf_var_secinfo *sec_var;
318 int i, err = 0, vlen;
319 char map_ident[256], sec_ident[256];
320 bool strip_mods = false, needs_typeof = false;
321 const char *sec_name, *var_name;
324 d = btf_dump__new(btf, codegen_btf_dump_printf, NULL, NULL);
328 bpf_object__for_each_map(map, obj) {
329 /* only generate definitions for memory-mapped internal maps */
330 if (!is_mmapable_map(map, map_ident, sizeof(map_ident)))
333 sec = find_type_for_map(btf, map_ident);
337 sec_name = btf__name_by_offset(btf, sec->name_off);
338 if (!get_datasec_ident(sec_name, sec_ident, sizeof(sec_ident)))
341 strip_mods = strcmp(sec_name, ".kconfig") != 0;
342 printf(" struct %s__%s {\n", obj_name, sec_ident);
344 sec_var = btf_var_secinfos(sec);
345 vlen = btf_vlen(sec);
346 for (i = 0; i < vlen; i++, sec_var++) {
347 DECLARE_LIBBPF_OPTS(btf_dump_emit_type_decl_opts, opts,
349 .strip_mods = strip_mods,
350 /* we'll print the name separately */
354 var = btf__type_by_id(btf, sec_var->type);
355 var_name = btf__name_by_offset(btf, var->name_off);
356 var_type_id = var->type;
358 /* static variables are not exposed through BPF skeleton */
359 if (btf_var(var)->linkage == BTF_VAR_STATIC)
362 /* The datasec member has KIND_VAR but we want the
363 * underlying type of the variable (e.g. KIND_INT).
365 var = skip_mods_and_typedefs(btf, var->type, NULL);
368 /* Func and array members require special handling.
369 * Instead of producing `typename *var`, they produce
370 * `typeof(typename) *var`. This allows us to keep a
371 * similar syntax where the identifier is just prefixed
372 * by *, allowing us to ignore C declaration minutiae.
374 needs_typeof = btf_is_array(var) || btf_is_ptr_to_func_proto(btf, var);
378 err = btf_dump__emit_type_decl(d, var_type_id, &opts);
385 printf(" *%s;\n", var_name);
387 printf(" } %s;\n", sec_ident);
395 static void codegen(const char *template, ...)
397 const char *src, *end;
398 int skip_tabs = 0, n;
403 n = strlen(template);
410 /* find out "baseline" indentation to skip */
411 while ((c = *src++)) {
414 } else if (c == '\n') {
417 p_err("unrecognized character at pos %td in template '%s': '%c'",
418 src - template - 1, template, c);
425 /* skip baseline indentation tabs */
426 for (n = skip_tabs; n > 0; n--, src++) {
428 p_err("not enough tabs at pos %td in template '%s'",
429 src - template - 1, template);
434 /* trim trailing whitespace */
435 end = strchrnul(src, '\n');
436 for (n = end - src; n > 0 && isspace(src[n - 1]); n--)
442 src = *end ? end + 1 : end;
446 /* print out using adjusted template */
447 va_start(args, template);
448 n = vprintf(s, args);
454 static void print_hex(const char *data, int data_sz)
458 for (i = 0, len = 0; i < data_sz; i++) {
459 int w = data[i] ? 4 : 2;
469 printf("\\x%02x", (unsigned char)data[i]);
473 static size_t bpf_map_mmap_sz(const struct bpf_map *map)
475 long page_sz = sysconf(_SC_PAGE_SIZE);
478 map_sz = (size_t)roundup(bpf_map__value_size(map), 8) * bpf_map__max_entries(map);
479 map_sz = roundup(map_sz, page_sz);
483 /* Emit type size asserts for all top-level fields in memory-mapped internal maps. */
484 static void codegen_asserts(struct bpf_object *obj, const char *obj_name)
486 struct btf *btf = bpf_object__btf(obj);
488 struct btf_var_secinfo *sec_var;
490 const struct btf_type *sec;
491 char map_ident[256], var_ident[256];
498 __attribute__((unused)) static void \n\
499 %1$s__assert(struct %1$s *s __attribute__((unused))) \n\
501 #ifdef __cplusplus \n\
502 #define _Static_assert static_assert \n\
506 bpf_object__for_each_map(map, obj) {
507 if (!is_mmapable_map(map, map_ident, sizeof(map_ident)))
510 sec = find_type_for_map(btf, map_ident);
512 /* best effort, couldn't find the type for this map */
516 sec_var = btf_var_secinfos(sec);
517 vlen = btf_vlen(sec);
519 for (i = 0; i < vlen; i++, sec_var++) {
520 const struct btf_type *var = btf__type_by_id(btf, sec_var->type);
521 const char *var_name = btf__name_by_offset(btf, var->name_off);
524 /* static variables are not exposed through BPF skeleton */
525 if (btf_var(var)->linkage == BTF_VAR_STATIC)
528 var_size = btf__resolve_size(btf, var->type);
533 strncat(var_ident, var_name, sizeof(var_ident) - 1);
534 sanitize_identifier(var_ident);
536 printf("\t_Static_assert(sizeof(s->%s->%s) == %ld, \"unexpected size of '%s'\");\n",
537 map_ident, var_ident, var_size, var_ident);
542 #ifdef __cplusplus \n\
543 #undef _Static_assert \n\
549 static void codegen_attach_detach(struct bpf_object *obj, const char *obj_name)
551 struct bpf_program *prog;
553 bpf_object__for_each_program(prog, obj) {
559 static inline int \n\
560 %1$s__%2$s__attach(struct %1$s *skel) \n\
562 int prog_fd = skel->progs.%2$s.prog_fd; \n\
563 ", obj_name, bpf_program__name(prog));
565 switch (bpf_program__type(prog)) {
566 case BPF_PROG_TYPE_RAW_TRACEPOINT:
567 tp_name = strchr(bpf_program__section_name(prog), '/') + 1;
568 printf("\tint fd = skel_raw_tracepoint_open(\"%s\", prog_fd);\n", tp_name);
570 case BPF_PROG_TYPE_TRACING:
571 case BPF_PROG_TYPE_LSM:
572 if (bpf_program__expected_attach_type(prog) == BPF_TRACE_ITER)
573 printf("\tint fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER);\n");
575 printf("\tint fd = skel_raw_tracepoint_open(NULL, prog_fd);\n");
578 printf("\tint fd = ((void)prog_fd, 0); /* auto-attach not supported */\n");
585 skel->links.%1$s_fd = fd; \n\
588 ", bpf_program__name(prog));
594 static inline int \n\
595 %1$s__attach(struct %1$s *skel) \n\
601 bpf_object__for_each_program(prog, obj) {
604 ret = ret < 0 ? ret : %1$s__%2$s__attach(skel); \n\
605 ", obj_name, bpf_program__name(prog));
610 return ret < 0 ? ret : 0; \n\
613 static inline void \n\
614 %1$s__detach(struct %1$s *skel) \n\
618 bpf_object__for_each_program(prog, obj) {
621 skel_closenz(skel->links.%1$s_fd); \n\
622 ", bpf_program__name(prog));
631 static void codegen_destroy(struct bpf_object *obj, const char *obj_name)
633 struct bpf_program *prog;
640 %1$s__destroy(struct %1$s *skel) \n\
644 %1$s__detach(skel); \n\
648 bpf_object__for_each_program(prog, obj) {
651 skel_closenz(skel->progs.%1$s.prog_fd); \n\
652 ", bpf_program__name(prog));
655 bpf_object__for_each_map(map, obj) {
656 if (!get_map_ident(map, ident, sizeof(ident)))
658 if (bpf_map__is_internal(map) &&
659 (bpf_map__map_flags(map) & BPF_F_MMAPABLE))
660 printf("\tskel_free_map_data(skel->%1$s, skel->maps.%1$s.initial_value, %2$zd);\n",
661 ident, bpf_map_mmap_sz(map));
664 skel_closenz(skel->maps.%1$s.map_fd); \n\
675 static int gen_trace(struct bpf_object *obj, const char *obj_name, const char *header_guard)
677 DECLARE_LIBBPF_OPTS(gen_loader_opts, opts);
682 err = bpf_object__gen_loader(obj, &opts);
686 err = bpf_object__load(obj);
688 p_err("failed to load object file");
691 /* If there was no error during load then gen_loader_opts
692 * are populated with the loader program.
695 /* finish generating 'struct skel' */
702 codegen_attach_detach(obj, obj_name);
704 codegen_destroy(obj, obj_name);
708 static inline struct %1$s * \n\
711 struct %1$s *skel; \n\
713 skel = skel_alloc(sizeof(*skel)); \n\
716 skel->ctx.sz = (void *)&skel->links - (void *)skel; \n\
718 obj_name, opts.data_sz);
719 bpf_object__for_each_map(map, obj) {
720 const void *mmap_data = NULL;
721 size_t mmap_size = 0;
723 if (!is_mmapable_map(map, ident, sizeof(ident)))
729 static const char data[] __attribute__((__aligned__(8))) = \"\\\n\
731 mmap_data = bpf_map__initial_value(map, &mmap_size);
732 print_hex(mmap_data, mmap_size);
737 skel->%1$s = skel_prep_map_data((void *)data, %2$zd,\n\
738 sizeof(data) - 1);\n\
741 skel->maps.%1$s.initial_value = (__u64) (long) skel->%1$s;\n\
743 ", ident, bpf_map_mmap_sz(map));
749 %1$s__destroy(skel); \n\
753 static inline int \n\
754 %1$s__load(struct %1$s *skel) \n\
756 struct bpf_load_and_run_opts opts = {}; \n\
758 static const char opts_data[] __attribute__((__aligned__(8))) = \"\\\n\
761 print_hex(opts.data, opts.data_sz);
765 static const char opts_insn[] __attribute__((__aligned__(8))) = \"\\\n\
767 print_hex(opts.insns, opts.insns_sz);
772 opts.ctx = (struct bpf_loader_ctx *)skel; \n\
773 opts.data_sz = sizeof(opts_data) - 1; \n\
774 opts.data = (void *)opts_data; \n\
775 opts.insns_sz = sizeof(opts_insn) - 1; \n\
776 opts.insns = (void *)opts_insn; \n\
778 err = bpf_load_and_run(&opts); \n\
782 bpf_object__for_each_map(map, obj) {
783 const char *mmap_flags;
785 if (!is_mmapable_map(map, ident, sizeof(ident)))
788 if (bpf_map__map_flags(map) & BPF_F_RDONLY_PROG)
789 mmap_flags = "PROT_READ";
791 mmap_flags = "PROT_READ | PROT_WRITE";
795 skel->%1$s = skel_finalize_map_data(&skel->maps.%1$s.initial_value, \n\
796 %2$zd, %3$s, skel->maps.%1$s.map_fd);\n\
800 ident, bpf_map_mmap_sz(map), mmap_flags);
807 static inline struct %1$s * \n\
808 %1$s__open_and_load(void) \n\
810 struct %1$s *skel; \n\
812 skel = %1$s__open(); \n\
815 if (%1$s__load(skel)) { \n\
816 %1$s__destroy(skel); \n\
824 codegen_asserts(obj, obj_name);
838 codegen_maps_skeleton(struct bpf_object *obj, size_t map_cnt, bool mmaped)
851 s->map_cnt = %zu; \n\
852 s->map_skel_sz = sizeof(*s->maps); \n\
853 s->maps = (struct bpf_map_skeleton *)calloc(s->map_cnt, s->map_skel_sz);\n\
862 bpf_object__for_each_map(map, obj) {
863 if (!get_map_ident(map, ident, sizeof(ident)))
869 s->maps[%zu].name = \"%s\"; \n\
870 s->maps[%zu].map = &obj->maps.%s; \n\
872 i, bpf_map__name(map), i, ident);
873 /* memory-mapped internal maps */
874 if (mmaped && is_mmapable_map(map, ident, sizeof(ident))) {
875 printf("\ts->maps[%zu].mmaped = (void **)&obj->%s;\n",
883 codegen_progs_skeleton(struct bpf_object *obj, size_t prog_cnt, bool populate_links)
885 struct bpf_program *prog;
895 s->prog_cnt = %zu; \n\
896 s->prog_skel_sz = sizeof(*s->progs); \n\
897 s->progs = (struct bpf_prog_skeleton *)calloc(s->prog_cnt, s->prog_skel_sz);\n\
906 bpf_object__for_each_program(prog, obj) {
910 s->progs[%1$zu].name = \"%2$s\"; \n\
911 s->progs[%1$zu].prog = &obj->progs.%2$s;\n\
913 i, bpf_program__name(prog));
915 if (populate_links) {
918 s->progs[%1$zu].link = &obj->links.%2$s;\n\
920 i, bpf_program__name(prog));
926 static int walk_st_ops_shadow_vars(struct btf *btf, const char *ident,
927 const struct btf_type *map_type, __u32 map_type_id)
929 LIBBPF_OPTS(btf_dump_emit_type_decl_opts, opts, .indent_level = 3);
930 const struct btf_type *member_type;
931 __u32 offset, next_offset = 0;
932 const struct btf_member *m;
933 struct btf_dump *d = NULL;
934 const char *member_name;
935 __u32 member_type_id;
939 d = btf_dump__new(btf, codegen_btf_dump_printf, NULL, NULL);
943 n = btf_vlen(map_type);
944 for (i = 0, m = btf_members(map_type); i < n; i++, m++) {
945 member_type = skip_mods_and_typedefs(btf, m->type, &member_type_id);
946 member_name = btf__name_by_offset(btf, m->name_off);
948 offset = m->offset / 8;
949 if (next_offset < offset)
950 printf("\t\t\tchar __padding_%d[%d];\n", i, offset - next_offset);
952 switch (btf_kind(member_type)) {
956 case BTF_KIND_ENUM64:
959 opts.field_name = member_name;
960 err = btf_dump__emit_type_decl(d, member_type_id, &opts);
962 p_err("Failed to emit type declaration for %s: %d", member_name, err);
967 size = btf__resolve_size(btf, member_type_id);
969 p_err("Failed to resolve size of %s: %d\n", member_name, size);
974 next_offset = offset + size;
978 if (resolve_func_ptr(btf, m->type, NULL)) {
979 /* Function pointer */
980 printf("\t\t\tstruct bpf_program *%s;\n", member_name);
982 next_offset = offset + sizeof(void *);
985 /* All pointer types are unsupported except for
993 * Types other than scalar types and function
994 * pointers are currently not supported in order to
995 * prevent conflicts in the generated code caused
996 * by multiple definitions. For instance, if the
997 * struct type FOO is used in a struct_ops map,
998 * bpftool has to generate definitions for FOO,
999 * which may result in conflicts if FOO is defined
1000 * in different skeleton files.
1002 size = btf__resolve_size(btf, member_type_id);
1004 p_err("Failed to resolve size of %s: %d\n", member_name, size);
1008 printf("\t\t\tchar __unsupported_%d[%d];\n", i, size);
1010 next_offset = offset + size;
1015 /* Cannot fail since it must be a struct type */
1016 size = btf__resolve_size(btf, map_type_id);
1017 if (next_offset < (__u32)size)
1018 printf("\t\t\tchar __padding_end[%d];\n", size - next_offset);
1026 /* Generate the pointer of the shadow type for a struct_ops map.
1028 * This function adds a pointer of the shadow type for a struct_ops map.
1029 * The members of a struct_ops map can be exported through a pointer to a
1030 * shadow type. The user can access these members through the pointer.
1032 * A shadow type includes not all members, only members of some types.
1033 * They are scalar types and function pointers. The function pointers are
1034 * translated to the pointer of the struct bpf_program. The scalar types
1035 * are translated to the original type without any modifiers.
1037 * Unsupported types will be translated to a char array to occupy the same
1038 * space as the original field, being renamed as __unsupported_*. The user
1039 * should treat these fields as opaque data.
1041 static int gen_st_ops_shadow_type(const char *obj_name, struct btf *btf, const char *ident,
1042 const struct bpf_map *map)
1044 const struct btf_type *map_type;
1045 const char *type_name;
1049 map_type_id = bpf_map__btf_value_type_id(map);
1050 if (map_type_id == 0)
1052 map_type = btf__type_by_id(btf, map_type_id);
1056 type_name = btf__name_by_offset(btf, map_type->name_off);
1058 printf("\t\tstruct %s__%s__%s {\n", obj_name, ident, type_name);
1060 err = walk_st_ops_shadow_vars(btf, ident, map_type, map_type_id);
1064 printf("\t\t} *%s;\n", ident);
1069 static int gen_st_ops_shadow(const char *obj_name, struct btf *btf, struct bpf_object *obj)
1071 int err, st_ops_cnt = 0;
1072 struct bpf_map *map;
1078 /* Generate the pointers to shadow types of
1081 bpf_object__for_each_map(map, obj) {
1082 if (bpf_map__type(map) != BPF_MAP_TYPE_STRUCT_OPS)
1084 if (!get_map_ident(map, ident, sizeof(ident)))
1087 if (st_ops_cnt == 0) /* first struct_ops map */
1088 printf("\tstruct {\n");
1091 err = gen_st_ops_shadow_type(obj_name, btf, ident, map);
1097 printf("\t} struct_ops;\n");
1102 /* Generate the code to initialize the pointers of shadow types. */
1103 static void gen_st_ops_shadow_init(struct btf *btf, struct bpf_object *obj)
1105 struct bpf_map *map;
1111 /* Initialize the pointers to_ops shadow types of
1114 bpf_object__for_each_map(map, obj) {
1115 if (bpf_map__type(map) != BPF_MAP_TYPE_STRUCT_OPS)
1117 if (!get_map_ident(map, ident, sizeof(ident)))
1121 obj->struct_ops.%1$s = bpf_map__initial_value(obj->maps.%1$s, NULL);\n\
1127 static int do_skeleton(int argc, char **argv)
1129 char header_guard[MAX_OBJ_NAME_LEN + sizeof("__SKEL_H__")];
1130 size_t map_cnt = 0, prog_cnt = 0, file_sz, mmap_sz;
1131 DECLARE_LIBBPF_OPTS(bpf_object_open_opts, opts);
1132 char obj_name[MAX_OBJ_NAME_LEN] = "", *obj_data;
1133 struct bpf_object *obj = NULL;
1136 struct bpf_program *prog;
1138 struct bpf_map *map;
1152 if (is_prefix(*argv, "name")) {
1155 if (obj_name[0] != '\0') {
1156 p_err("object name already specified");
1160 strncpy(obj_name, *argv, MAX_OBJ_NAME_LEN - 1);
1161 obj_name[MAX_OBJ_NAME_LEN - 1] = '\0';
1163 p_err("unknown arg %s", *argv);
1171 p_err("extra unknown arguments");
1175 if (stat(file, &st)) {
1176 p_err("failed to stat() %s: %s", file, strerror(errno));
1179 file_sz = st.st_size;
1180 mmap_sz = roundup(file_sz, sysconf(_SC_PAGE_SIZE));
1181 fd = open(file, O_RDONLY);
1183 p_err("failed to open() %s: %s", file, strerror(errno));
1186 obj_data = mmap(NULL, mmap_sz, PROT_READ, MAP_PRIVATE, fd, 0);
1187 if (obj_data == MAP_FAILED) {
1189 p_err("failed to mmap() %s: %s", file, strerror(errno));
1192 if (obj_name[0] == '\0')
1193 get_obj_name(obj_name, file);
1194 opts.object_name = obj_name;
1196 /* log_level1 + log_level2 + stats, but not stable UAPI */
1197 opts.kernel_log_level = 1 + 2 + 4;
1198 obj = bpf_object__open_mem(obj_data, file_sz, &opts);
1203 libbpf_strerror(err, err_buf, sizeof(err_buf));
1204 p_err("failed to open BPF object file: %s", err_buf);
1208 bpf_object__for_each_map(map, obj) {
1209 if (!get_map_ident(map, ident, sizeof(ident))) {
1210 p_err("ignoring unrecognized internal map '%s'...",
1211 bpf_map__name(map));
1216 bpf_object__for_each_program(prog, obj) {
1220 get_header_guard(header_guard, obj_name, "SKEL_H");
1224 /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */ \n\
1225 /* THIS FILE IS AUTOGENERATED BY BPFTOOL! */ \n\
1229 #include <bpf/skel_internal.h> \n\
1232 struct bpf_loader_ctx ctx; \n\
1234 obj_name, header_guard
1239 /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */ \n\
1241 /* THIS FILE IS AUTOGENERATED BY BPFTOOL! */ \n\
1245 #include <errno.h> \n\
1246 #include <stdlib.h> \n\
1247 #include <bpf/libbpf.h> \n\
1250 struct bpf_object_skeleton *skeleton; \n\
1251 struct bpf_object *obj; \n\
1253 obj_name, header_guard
1258 printf("\tstruct {\n");
1259 bpf_object__for_each_map(map, obj) {
1260 if (!get_map_ident(map, ident, sizeof(ident)))
1263 printf("\t\tstruct bpf_map_desc %s;\n", ident);
1265 printf("\t\tstruct bpf_map *%s;\n", ident);
1267 printf("\t} maps;\n");
1270 btf = bpf_object__btf(obj);
1271 err = gen_st_ops_shadow(obj_name, btf, obj);
1276 printf("\tstruct {\n");
1277 bpf_object__for_each_program(prog, obj) {
1279 printf("\t\tstruct bpf_prog_desc %s;\n",
1280 bpf_program__name(prog));
1282 printf("\t\tstruct bpf_program *%s;\n",
1283 bpf_program__name(prog));
1285 printf("\t} progs;\n");
1286 printf("\tstruct {\n");
1287 bpf_object__for_each_program(prog, obj) {
1289 printf("\t\tint %s_fd;\n",
1290 bpf_program__name(prog));
1292 printf("\t\tstruct bpf_link *%s;\n",
1293 bpf_program__name(prog));
1295 printf("\t} links;\n");
1299 err = codegen_datasecs(obj, obj_name);
1304 err = gen_trace(obj, obj_name, header_guard);
1311 #ifdef __cplusplus \n\
1312 static inline struct %1$s *open(const struct bpf_object_open_opts *opts = nullptr);\n\
1313 static inline struct %1$s *open_and_load(); \n\
1314 static inline int load(struct %1$s *skel); \n\
1315 static inline int attach(struct %1$s *skel); \n\
1316 static inline void detach(struct %1$s *skel); \n\
1317 static inline void destroy(struct %1$s *skel); \n\
1318 static inline const void *elf_bytes(size_t *sz); \n\
1319 #endif /* __cplusplus */ \n\
1323 %1$s__destroy(struct %1$s *obj) \n\
1327 if (obj->skeleton) \n\
1328 bpf_object__destroy_skeleton(obj->skeleton);\n\
1332 static inline int \n\
1333 %1$s__create_skeleton(struct %1$s *obj); \n\
1335 static inline struct %1$s * \n\
1336 %1$s__open_opts(const struct bpf_object_open_opts *opts) \n\
1338 struct %1$s *obj; \n\
1341 obj = (struct %1$s *)calloc(1, sizeof(*obj)); \n\
1347 err = %1$s__create_skeleton(obj); \n\
1351 err = bpf_object__open_skeleton(obj->skeleton, opts);\n\
1357 gen_st_ops_shadow_init(btf, obj);
1363 %1$s__destroy(obj); \n\
1368 static inline struct %1$s * \n\
1369 %1$s__open(void) \n\
1371 return %1$s__open_opts(NULL); \n\
1374 static inline int \n\
1375 %1$s__load(struct %1$s *obj) \n\
1377 return bpf_object__load_skeleton(obj->skeleton); \n\
1380 static inline struct %1$s * \n\
1381 %1$s__open_and_load(void) \n\
1383 struct %1$s *obj; \n\
1386 obj = %1$s__open(); \n\
1389 err = %1$s__load(obj); \n\
1391 %1$s__destroy(obj); \n\
1398 static inline int \n\
1399 %1$s__attach(struct %1$s *obj) \n\
1401 return bpf_object__attach_skeleton(obj->skeleton); \n\
1404 static inline void \n\
1405 %1$s__detach(struct %1$s *obj) \n\
1407 bpf_object__detach_skeleton(obj->skeleton); \n\
1416 static inline const void *%1$s__elf_bytes(size_t *sz); \n\
1418 static inline int \n\
1419 %1$s__create_skeleton(struct %1$s *obj) \n\
1421 struct bpf_object_skeleton *s; \n\
1424 s = (struct bpf_object_skeleton *)calloc(1, sizeof(*s));\n\
1430 s->sz = sizeof(*s); \n\
1431 s->name = \"%1$s\"; \n\
1432 s->obj = &obj->obj; \n\
1437 codegen_maps_skeleton(obj, map_cnt, true /*mmaped*/);
1438 codegen_progs_skeleton(obj, prog_cnt, true /*populate_links*/);
1443 s->data = %1$s__elf_bytes(&s->data_sz); \n\
1445 obj->skeleton = s; \n\
1448 bpf_object__destroy_skeleton(s); \n\
1452 static inline const void *%1$s__elf_bytes(size_t *sz) \n\
1454 static const char data[] __attribute__((__aligned__(8))) = \"\\\n\
1459 /* embed contents of BPF object file */
1460 print_hex(obj_data, file_sz);
1466 *sz = sizeof(data) - 1; \n\
1467 return (const void *)data; \n\
1470 #ifdef __cplusplus \n\
1471 struct %1$s *%1$s::open(const struct bpf_object_open_opts *opts) { return %1$s__open_opts(opts); }\n\
1472 struct %1$s *%1$s::open_and_load() { return %1$s__open_and_load(); } \n\
1473 int %1$s::load(struct %1$s *skel) { return %1$s__load(skel); } \n\
1474 int %1$s::attach(struct %1$s *skel) { return %1$s__attach(skel); } \n\
1475 void %1$s::detach(struct %1$s *skel) { %1$s__detach(skel); } \n\
1476 void %1$s::destroy(struct %1$s *skel) { %1$s__destroy(skel); } \n\
1477 const void *%1$s::elf_bytes(size_t *sz) { return %1$s__elf_bytes(sz); } \n\
1478 #endif /* __cplusplus */ \n\
1483 codegen_asserts(obj, obj_name);
1488 #endif /* %1$s */ \n\
1493 bpf_object__close(obj);
1495 munmap(obj_data, mmap_sz);
1500 /* Subskeletons are like skeletons, except they don't own the bpf_object,
1501 * associated maps, links, etc. Instead, they know about the existence of
1502 * variables, maps, programs and are able to find their locations
1503 * _at runtime_ from an already loaded bpf_object.
1505 * This allows for library-like BPF objects to have userspace counterparts
1506 * with access to their own items without having to know anything about the
1507 * final BPF object that the library was linked into.
1509 static int do_subskeleton(int argc, char **argv)
1511 char header_guard[MAX_OBJ_NAME_LEN + sizeof("__SUBSKEL_H__")];
1512 size_t i, len, file_sz, map_cnt = 0, prog_cnt = 0, mmap_sz, var_cnt = 0, var_idx = 0;
1513 DECLARE_LIBBPF_OPTS(bpf_object_open_opts, opts);
1514 char obj_name[MAX_OBJ_NAME_LEN] = "", *obj_data;
1515 struct bpf_object *obj = NULL;
1516 const char *file, *var_name;
1518 int fd, err = -1, map_type_id;
1519 const struct bpf_map *map;
1520 struct bpf_program *prog;
1522 const struct btf_type *map_type, *var_type;
1523 const struct btf_var_secinfo *var;
1536 if (is_prefix(*argv, "name")) {
1539 if (obj_name[0] != '\0') {
1540 p_err("object name already specified");
1544 strncpy(obj_name, *argv, MAX_OBJ_NAME_LEN - 1);
1545 obj_name[MAX_OBJ_NAME_LEN - 1] = '\0';
1547 p_err("unknown arg %s", *argv);
1555 p_err("extra unknown arguments");
1560 p_err("cannot use loader for subskeletons");
1564 if (stat(file, &st)) {
1565 p_err("failed to stat() %s: %s", file, strerror(errno));
1568 file_sz = st.st_size;
1569 mmap_sz = roundup(file_sz, sysconf(_SC_PAGE_SIZE));
1570 fd = open(file, O_RDONLY);
1572 p_err("failed to open() %s: %s", file, strerror(errno));
1575 obj_data = mmap(NULL, mmap_sz, PROT_READ, MAP_PRIVATE, fd, 0);
1576 if (obj_data == MAP_FAILED) {
1578 p_err("failed to mmap() %s: %s", file, strerror(errno));
1581 if (obj_name[0] == '\0')
1582 get_obj_name(obj_name, file);
1584 /* The empty object name allows us to use bpf_map__name and produce
1585 * ELF section names out of it. (".data" instead of "obj.data")
1587 opts.object_name = "";
1588 obj = bpf_object__open_mem(obj_data, file_sz, &opts);
1592 libbpf_strerror(errno, err_buf, sizeof(err_buf));
1593 p_err("failed to open BPF object file: %s", err_buf);
1598 btf = bpf_object__btf(obj);
1601 p_err("need btf type information for %s", obj_name);
1605 bpf_object__for_each_program(prog, obj) {
1609 /* First, count how many variables we have to find.
1610 * We need this in advance so the subskel can allocate the right
1611 * amount of storage.
1613 bpf_object__for_each_map(map, obj) {
1614 if (!get_map_ident(map, ident, sizeof(ident)))
1617 /* Also count all maps that have a name */
1620 if (!is_mmapable_map(map, ident, sizeof(ident)))
1623 map_type_id = bpf_map__btf_value_type_id(map);
1624 if (map_type_id <= 0) {
1628 map_type = btf__type_by_id(btf, map_type_id);
1630 var = btf_var_secinfos(map_type);
1631 len = btf_vlen(map_type);
1632 for (i = 0; i < len; i++, var++) {
1633 var_type = btf__type_by_id(btf, var->type);
1635 if (btf_var(var_type)->linkage == BTF_VAR_STATIC)
1642 get_header_guard(header_guard, obj_name, "SUBSKEL_H");
1645 /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */ \n\
1647 /* THIS FILE IS AUTOGENERATED! */ \n\
1651 #include <errno.h> \n\
1652 #include <stdlib.h> \n\
1653 #include <bpf/libbpf.h> \n\
1656 struct bpf_object *obj; \n\
1657 struct bpf_object_subskeleton *subskel; \n\
1658 ", obj_name, header_guard);
1661 printf("\tstruct {\n");
1662 bpf_object__for_each_map(map, obj) {
1663 if (!get_map_ident(map, ident, sizeof(ident)))
1665 printf("\t\tstruct bpf_map *%s;\n", ident);
1667 printf("\t} maps;\n");
1670 err = gen_st_ops_shadow(obj_name, btf, obj);
1675 printf("\tstruct {\n");
1676 bpf_object__for_each_program(prog, obj) {
1677 printf("\t\tstruct bpf_program *%s;\n",
1678 bpf_program__name(prog));
1680 printf("\t} progs;\n");
1683 err = codegen_subskel_datasecs(obj, obj_name);
1687 /* emit code that will allocate enough storage for all symbols */
1691 #ifdef __cplusplus \n\
1692 static inline struct %1$s *open(const struct bpf_object *src);\n\
1693 static inline void destroy(struct %1$s *skel); \n\
1694 #endif /* __cplusplus */ \n\
1697 static inline void \n\
1698 %1$s__destroy(struct %1$s *skel) \n\
1702 if (skel->subskel) \n\
1703 bpf_object__destroy_subskeleton(skel->subskel);\n\
1707 static inline struct %1$s * \n\
1708 %1$s__open(const struct bpf_object *src) \n\
1710 struct %1$s *obj; \n\
1711 struct bpf_object_subskeleton *s; \n\
1714 obj = (struct %1$s *)calloc(1, sizeof(*obj)); \n\
1719 s = (struct bpf_object_subskeleton *)calloc(1, sizeof(*s));\n\
1724 s->sz = sizeof(*s); \n\
1726 s->var_skel_sz = sizeof(*s->vars); \n\
1727 obj->subskel = s; \n\
1730 s->var_cnt = %2$d; \n\
1731 s->vars = (struct bpf_var_skeleton *)calloc(%2$d, sizeof(*s->vars));\n\
1740 /* walk through each symbol and emit the runtime representation */
1741 bpf_object__for_each_map(map, obj) {
1742 if (!is_mmapable_map(map, ident, sizeof(ident)))
1745 map_type_id = bpf_map__btf_value_type_id(map);
1746 if (map_type_id <= 0)
1747 /* skip over internal maps with no type*/
1750 map_type = btf__type_by_id(btf, map_type_id);
1751 var = btf_var_secinfos(map_type);
1752 len = btf_vlen(map_type);
1753 for (i = 0; i < len; i++, var++) {
1754 var_type = btf__type_by_id(btf, var->type);
1755 var_name = btf__name_by_offset(btf, var_type->name_off);
1757 if (btf_var(var_type)->linkage == BTF_VAR_STATIC)
1760 /* Note that we use the dot prefix in .data as the
1761 * field access operator i.e. maps%s becomes maps.data
1766 s->vars[%3$d].name = \"%1$s\"; \n\
1767 s->vars[%3$d].map = &obj->maps.%2$s; \n\
1768 s->vars[%3$d].addr = (void **) &obj->%2$s.%1$s;\n\
1769 ", var_name, ident, var_idx);
1775 codegen_maps_skeleton(obj, map_cnt, false /*mmaped*/);
1776 codegen_progs_skeleton(obj, prog_cnt, false /*links*/);
1781 err = bpf_object__open_subskeleton(s); \n\
1787 gen_st_ops_shadow_init(btf, obj);
1793 %1$s__destroy(obj); \n\
1798 #ifdef __cplusplus \n\
1799 struct %1$s *%1$s::open(const struct bpf_object *src) { return %1$s__open(src); }\n\
1800 void %1$s::destroy(struct %1$s *skel) { %1$s__destroy(skel); }\n\
1801 #endif /* __cplusplus */ \n\
1803 #endif /* %2$s */ \n\
1805 obj_name, header_guard);
1808 bpf_object__close(obj);
1810 munmap(obj_data, mmap_sz);
1815 static int do_object(int argc, char **argv)
1817 struct bpf_linker *linker;
1818 const char *output_file, *file;
1826 output_file = GET_ARG();
1828 linker = bpf_linker__new(output_file, NULL);
1830 p_err("failed to create BPF linker instance");
1837 err = bpf_linker__add_file(linker, file, NULL);
1839 p_err("failed to link '%s': %s (%d)", file, strerror(errno), errno);
1844 err = bpf_linker__finalize(linker);
1846 p_err("failed to finalize ELF file: %s (%d)", strerror(errno), errno);
1852 bpf_linker__free(linker);
1856 static int do_help(int argc, char **argv)
1859 jsonw_null(json_wtr);
1864 "Usage: %1$s %2$s object OUTPUT_FILE INPUT_FILE [INPUT_FILE...]\n"
1865 " %1$s %2$s skeleton FILE [name OBJECT_NAME]\n"
1866 " %1$s %2$s subskeleton FILE [name OBJECT_NAME]\n"
1867 " %1$s %2$s min_core_btf INPUT OUTPUT OBJECT [OBJECT...]\n"
1870 " " HELP_SPEC_OPTIONS " |\n"
1871 " {-L|--use-loader} }\n"
1878 static int btf_save_raw(const struct btf *btf, const char *path)
1885 data = btf__raw_data(btf, &data_sz);
1889 f = fopen(path, "wb");
1893 if (fwrite(data, 1, data_sz, f) != data_sz)
1900 struct btfgen_info {
1901 struct btf *src_btf;
1902 struct btf *marked_btf; /* btf structure used to mark used types */
1905 static size_t btfgen_hash_fn(long key, void *ctx)
1910 static bool btfgen_equal_fn(long k1, long k2, void *ctx)
1915 static void btfgen_free_info(struct btfgen_info *info)
1920 btf__free(info->src_btf);
1921 btf__free(info->marked_btf);
1926 static struct btfgen_info *
1927 btfgen_new_info(const char *targ_btf_path)
1929 struct btfgen_info *info;
1932 info = calloc(1, sizeof(*info));
1936 info->src_btf = btf__parse(targ_btf_path, NULL);
1937 if (!info->src_btf) {
1939 p_err("failed parsing '%s' BTF file: %s", targ_btf_path, strerror(errno));
1943 info->marked_btf = btf__parse(targ_btf_path, NULL);
1944 if (!info->marked_btf) {
1946 p_err("failed parsing '%s' BTF file: %s", targ_btf_path, strerror(errno));
1953 btfgen_free_info(info);
1958 #define MARKED UINT32_MAX
1960 static void btfgen_mark_member(struct btfgen_info *info, int type_id, int idx)
1962 const struct btf_type *t = btf__type_by_id(info->marked_btf, type_id);
1963 struct btf_member *m = btf_members(t) + idx;
1965 m->name_off = MARKED;
1969 btfgen_mark_type(struct btfgen_info *info, unsigned int type_id, bool follow_pointers)
1971 const struct btf_type *btf_type = btf__type_by_id(info->src_btf, type_id);
1972 struct btf_type *cloned_type;
1973 struct btf_param *param;
1974 struct btf_array *array;
1980 /* mark type on cloned BTF as used */
1981 cloned_type = (struct btf_type *) btf__type_by_id(info->marked_btf, type_id);
1982 cloned_type->name_off = MARKED;
1984 /* recursively mark other types needed by it */
1985 switch (btf_kind(btf_type)) {
1988 case BTF_KIND_FLOAT:
1990 case BTF_KIND_ENUM64:
1991 case BTF_KIND_STRUCT:
1992 case BTF_KIND_UNION:
1995 if (follow_pointers) {
1996 err = btfgen_mark_type(info, btf_type->type, follow_pointers);
2001 case BTF_KIND_CONST:
2002 case BTF_KIND_RESTRICT:
2003 case BTF_KIND_VOLATILE:
2004 case BTF_KIND_TYPEDEF:
2005 err = btfgen_mark_type(info, btf_type->type, follow_pointers);
2009 case BTF_KIND_ARRAY:
2010 array = btf_array(btf_type);
2012 /* mark array type */
2013 err = btfgen_mark_type(info, array->type, follow_pointers);
2014 /* mark array's index type */
2015 err = err ? : btfgen_mark_type(info, array->index_type, follow_pointers);
2019 case BTF_KIND_FUNC_PROTO:
2021 err = btfgen_mark_type(info, btf_type->type, follow_pointers);
2025 /* mark parameters types */
2026 param = btf_params(btf_type);
2027 for (i = 0; i < btf_vlen(btf_type); i++) {
2028 err = btfgen_mark_type(info, param->type, follow_pointers);
2034 /* tells if some other type needs to be handled */
2036 p_err("unsupported kind: %s (%d)", btf_kind_str(btf_type), type_id);
2043 static int btfgen_record_field_relo(struct btfgen_info *info, struct bpf_core_spec *targ_spec)
2045 struct btf *btf = info->src_btf;
2046 const struct btf_type *btf_type;
2047 struct btf_member *btf_member;
2048 struct btf_array *array;
2049 unsigned int type_id = targ_spec->root_type_id;
2052 /* mark root type */
2053 btf_type = btf__type_by_id(btf, type_id);
2054 err = btfgen_mark_type(info, type_id, false);
2058 /* mark types for complex types (arrays, unions, structures) */
2059 for (int i = 1; i < targ_spec->raw_len; i++) {
2060 /* skip typedefs and mods */
2061 while (btf_is_mod(btf_type) || btf_is_typedef(btf_type)) {
2062 type_id = btf_type->type;
2063 btf_type = btf__type_by_id(btf, type_id);
2066 switch (btf_kind(btf_type)) {
2067 case BTF_KIND_STRUCT:
2068 case BTF_KIND_UNION:
2069 idx = targ_spec->raw_spec[i];
2070 btf_member = btf_members(btf_type) + idx;
2073 btfgen_mark_member(info, type_id, idx);
2075 /* mark member's type */
2076 type_id = btf_member->type;
2077 btf_type = btf__type_by_id(btf, type_id);
2078 err = btfgen_mark_type(info, type_id, false);
2082 case BTF_KIND_ARRAY:
2083 array = btf_array(btf_type);
2084 type_id = array->type;
2085 btf_type = btf__type_by_id(btf, type_id);
2088 p_err("unsupported kind: %s (%d)",
2089 btf_kind_str(btf_type), btf_type->type);
2097 /* Mark types, members, and member types. Compared to btfgen_record_field_relo,
2098 * this function does not rely on the target spec for inferring members, but
2099 * uses the associated BTF.
2101 * The `behind_ptr` argument is used to stop marking of composite types reached
2102 * through a pointer. This way, we can keep BTF size in check while providing
2103 * reasonable match semantics.
2105 static int btfgen_mark_type_match(struct btfgen_info *info, __u32 type_id, bool behind_ptr)
2107 const struct btf_type *btf_type;
2108 struct btf *btf = info->src_btf;
2109 struct btf_type *cloned_type;
2115 btf_type = btf__type_by_id(btf, type_id);
2116 /* mark type on cloned BTF as used */
2117 cloned_type = (struct btf_type *)btf__type_by_id(info->marked_btf, type_id);
2118 cloned_type->name_off = MARKED;
2120 switch (btf_kind(btf_type)) {
2123 case BTF_KIND_FLOAT:
2125 case BTF_KIND_ENUM64:
2127 case BTF_KIND_STRUCT:
2128 case BTF_KIND_UNION: {
2129 struct btf_member *m = btf_members(btf_type);
2130 __u16 vlen = btf_vlen(btf_type);
2135 for (i = 0; i < vlen; i++, m++) {
2137 btfgen_mark_member(info, type_id, i);
2139 /* mark member's type */
2140 err = btfgen_mark_type_match(info, m->type, false);
2146 case BTF_KIND_CONST:
2148 case BTF_KIND_RESTRICT:
2149 case BTF_KIND_TYPEDEF:
2150 case BTF_KIND_VOLATILE:
2151 return btfgen_mark_type_match(info, btf_type->type, behind_ptr);
2153 return btfgen_mark_type_match(info, btf_type->type, true);
2154 case BTF_KIND_ARRAY: {
2155 struct btf_array *array;
2157 array = btf_array(btf_type);
2158 /* mark array type */
2159 err = btfgen_mark_type_match(info, array->type, false);
2160 /* mark array's index type */
2161 err = err ? : btfgen_mark_type_match(info, array->index_type, false);
2166 case BTF_KIND_FUNC_PROTO: {
2167 __u16 vlen = btf_vlen(btf_type);
2168 struct btf_param *param;
2171 err = btfgen_mark_type_match(info, btf_type->type, false);
2175 /* mark parameters types */
2176 param = btf_params(btf_type);
2177 for (i = 0; i < vlen; i++) {
2178 err = btfgen_mark_type_match(info, param->type, false);
2185 /* tells if some other type needs to be handled */
2187 p_err("unsupported kind: %s (%d)", btf_kind_str(btf_type), type_id);
2194 /* Mark types, members, and member types. Compared to btfgen_record_field_relo,
2195 * this function does not rely on the target spec for inferring members, but
2196 * uses the associated BTF.
2198 static int btfgen_record_type_match_relo(struct btfgen_info *info, struct bpf_core_spec *targ_spec)
2200 return btfgen_mark_type_match(info, targ_spec->root_type_id, false);
2203 static int btfgen_record_type_relo(struct btfgen_info *info, struct bpf_core_spec *targ_spec)
2205 return btfgen_mark_type(info, targ_spec->root_type_id, true);
2208 static int btfgen_record_enumval_relo(struct btfgen_info *info, struct bpf_core_spec *targ_spec)
2210 return btfgen_mark_type(info, targ_spec->root_type_id, false);
2213 static int btfgen_record_reloc(struct btfgen_info *info, struct bpf_core_spec *res)
2215 switch (res->relo_kind) {
2216 case BPF_CORE_FIELD_BYTE_OFFSET:
2217 case BPF_CORE_FIELD_BYTE_SIZE:
2218 case BPF_CORE_FIELD_EXISTS:
2219 case BPF_CORE_FIELD_SIGNED:
2220 case BPF_CORE_FIELD_LSHIFT_U64:
2221 case BPF_CORE_FIELD_RSHIFT_U64:
2222 return btfgen_record_field_relo(info, res);
2223 case BPF_CORE_TYPE_ID_LOCAL: /* BPF_CORE_TYPE_ID_LOCAL doesn't require kernel BTF */
2225 case BPF_CORE_TYPE_ID_TARGET:
2226 case BPF_CORE_TYPE_EXISTS:
2227 case BPF_CORE_TYPE_SIZE:
2228 return btfgen_record_type_relo(info, res);
2229 case BPF_CORE_TYPE_MATCHES:
2230 return btfgen_record_type_match_relo(info, res);
2231 case BPF_CORE_ENUMVAL_EXISTS:
2232 case BPF_CORE_ENUMVAL_VALUE:
2233 return btfgen_record_enumval_relo(info, res);
2239 static struct bpf_core_cand_list *
2240 btfgen_find_cands(const struct btf *local_btf, const struct btf *targ_btf, __u32 local_id)
2242 const struct btf_type *local_type;
2243 struct bpf_core_cand_list *cands = NULL;
2244 struct bpf_core_cand local_cand = {};
2245 size_t local_essent_len;
2246 const char *local_name;
2249 local_cand.btf = local_btf;
2250 local_cand.id = local_id;
2252 local_type = btf__type_by_id(local_btf, local_id);
2258 local_name = btf__name_by_offset(local_btf, local_type->name_off);
2263 local_essent_len = bpf_core_essential_name_len(local_name);
2265 cands = calloc(1, sizeof(*cands));
2269 err = bpf_core_add_cands(&local_cand, local_essent_len, targ_btf, "vmlinux", 1, cands);
2276 bpf_core_free_cands(cands);
2281 /* Record relocation information for a single BPF object */
2282 static int btfgen_record_obj(struct btfgen_info *info, const char *obj_path)
2284 const struct btf_ext_info_sec *sec;
2285 const struct bpf_core_relo *relo;
2286 const struct btf_ext_info *seg;
2287 struct hashmap_entry *entry;
2288 struct hashmap *cand_cache = NULL;
2289 struct btf_ext *btf_ext = NULL;
2290 unsigned int relo_idx;
2291 struct btf *btf = NULL;
2295 btf = btf__parse(obj_path, &btf_ext);
2298 p_err("failed to parse BPF object '%s': %s", obj_path, strerror(errno));
2303 p_err("failed to parse BPF object '%s': section %s not found",
2304 obj_path, BTF_EXT_ELF_SEC);
2309 if (btf_ext->core_relo_info.len == 0) {
2314 cand_cache = hashmap__new(btfgen_hash_fn, btfgen_equal_fn, NULL);
2315 if (IS_ERR(cand_cache)) {
2316 err = PTR_ERR(cand_cache);
2320 seg = &btf_ext->core_relo_info;
2321 for_each_btf_ext_sec(seg, sec) {
2322 for_each_btf_ext_rec(seg, sec, relo_idx, relo) {
2323 struct bpf_core_spec specs_scratch[3] = {};
2324 struct bpf_core_relo_res targ_res = {};
2325 struct bpf_core_cand_list *cands = NULL;
2326 const char *sec_name = btf__name_by_offset(btf, sec->sec_name_off);
2328 if (relo->kind != BPF_CORE_TYPE_ID_LOCAL &&
2329 !hashmap__find(cand_cache, relo->type_id, &cands)) {
2330 cands = btfgen_find_cands(btf, info->src_btf, relo->type_id);
2336 err = hashmap__set(cand_cache, relo->type_id, cands,
2342 err = bpf_core_calc_relo_insn(sec_name, relo, relo_idx, btf, cands,
2343 specs_scratch, &targ_res);
2347 /* specs_scratch[2] is the target spec */
2348 err = btfgen_record_reloc(info, &specs_scratch[2]);
2356 btf_ext__free(btf_ext);
2358 if (!IS_ERR_OR_NULL(cand_cache)) {
2359 hashmap__for_each_entry(cand_cache, entry, i) {
2360 bpf_core_free_cands(entry->pvalue);
2362 hashmap__free(cand_cache);
2368 static int btfgen_remap_id(__u32 *type_id, void *ctx)
2370 unsigned int *ids = ctx;
2372 *type_id = ids[*type_id];
2377 /* Generate BTF from relocation information previously recorded */
2378 static struct btf *btfgen_get_btf(struct btfgen_info *info)
2380 struct btf *btf_new = NULL;
2381 unsigned int *ids = NULL;
2382 unsigned int i, n = btf__type_cnt(info->marked_btf);
2385 btf_new = btf__new_empty();
2391 ids = calloc(n, sizeof(*ids));
2397 /* first pass: add all marked types to btf_new and add their new ids to the ids map */
2398 for (i = 1; i < n; i++) {
2399 const struct btf_type *cloned_type, *type;
2403 cloned_type = btf__type_by_id(info->marked_btf, i);
2405 if (cloned_type->name_off != MARKED)
2408 type = btf__type_by_id(info->src_btf, i);
2410 /* add members for struct and union */
2411 if (btf_is_composite(type)) {
2412 struct btf_member *cloned_m, *m;
2413 unsigned short vlen;
2416 name = btf__str_by_offset(info->src_btf, type->name_off);
2418 if (btf_is_struct(type))
2419 err = btf__add_struct(btf_new, name, type->size);
2421 err = btf__add_union(btf_new, name, type->size);
2427 cloned_m = btf_members(cloned_type);
2428 m = btf_members(type);
2429 vlen = btf_vlen(cloned_type);
2430 for (idx_src = 0; idx_src < vlen; idx_src++, cloned_m++, m++) {
2431 /* add only members that are marked as used */
2432 if (cloned_m->name_off != MARKED)
2435 name = btf__str_by_offset(info->src_btf, m->name_off);
2436 err = btf__add_field(btf_new, name, m->type,
2437 btf_member_bit_offset(cloned_type, idx_src),
2438 btf_member_bitfield_size(cloned_type, idx_src));
2443 err = btf__add_type(btf_new, info->src_btf, type);
2449 /* add ID mapping */
2453 /* second pass: fix up type ids */
2454 for (i = 1; i < btf__type_cnt(btf_new); i++) {
2455 struct btf_type *btf_type = (struct btf_type *) btf__type_by_id(btf_new, i);
2457 err = btf_type_visit_type_ids(btf_type, btfgen_remap_id, ids);
2472 /* Create minimized BTF file for a set of BPF objects.
2474 * The BTFGen algorithm is divided in two main parts: (1) collect the
2475 * BTF types that are involved in relocations and (2) generate the BTF
2476 * object using the collected types.
2478 * In order to collect the types involved in the relocations, we parse
2479 * the BTF and BTF.ext sections of the BPF objects and use
2480 * bpf_core_calc_relo_insn() to get the target specification, this
2481 * indicates how the types and fields are used in a relocation.
2483 * Types are recorded in different ways according to the kind of the
2484 * relocation. For field-based relocations only the members that are
2485 * actually used are saved in order to reduce the size of the generated
2486 * BTF file. For type-based relocations empty struct / unions are
2487 * generated and for enum-based relocations the whole type is saved.
2489 * The second part of the algorithm generates the BTF object. It creates
2490 * an empty BTF object and fills it with the types recorded in the
2491 * previous step. This function takes care of only adding the structure
2492 * and union members that were marked as used and it also fixes up the
2493 * type IDs on the generated BTF object.
2495 static int minimize_btf(const char *src_btf, const char *dst_btf, const char *objspaths[])
2497 struct btfgen_info *info;
2498 struct btf *btf_new = NULL;
2501 info = btfgen_new_info(src_btf);
2504 p_err("failed to allocate info structure: %s", strerror(errno));
2508 for (i = 0; objspaths[i] != NULL; i++) {
2509 err = btfgen_record_obj(info, objspaths[i]);
2511 p_err("error recording relocations for %s: %s", objspaths[i],
2517 btf_new = btfgen_get_btf(info);
2520 p_err("error generating BTF: %s", strerror(errno));
2524 err = btf_save_raw(btf_new, dst_btf);
2526 p_err("error saving btf file: %s", strerror(errno));
2532 btfgen_free_info(info);
2537 static int do_min_core_btf(int argc, char **argv)
2539 const char *input, *output, **objs;
2550 objs = (const char **) calloc(argc + 1, sizeof(*objs));
2552 p_err("failed to allocate array for object names");
2558 objs[i++] = GET_ARG();
2560 err = minimize_btf(input, output, objs);
2565 static const struct cmd cmds[] = {
2566 { "object", do_object },
2567 { "skeleton", do_skeleton },
2568 { "subskeleton", do_subskeleton },
2569 { "min_core_btf", do_min_core_btf},
2570 { "help", do_help },
2574 int do_gen(int argc, char **argv)
2576 return cmd_select(cmds, argc, argv, do_help);