1985ead41SAndrii Nakryiko // SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
2985ead41SAndrii Nakryiko /* Copyright (C) 2019 Facebook */
3985ead41SAndrii Nakryiko
4985ead41SAndrii Nakryiko #ifndef _GNU_SOURCE
5985ead41SAndrii Nakryiko #define _GNU_SOURCE
6985ead41SAndrii Nakryiko #endif
7985ead41SAndrii Nakryiko #include <ctype.h>
8985ead41SAndrii Nakryiko #include <errno.h>
9985ead41SAndrii Nakryiko #include <fcntl.h>
10985ead41SAndrii Nakryiko #include <linux/err.h>
11985ead41SAndrii Nakryiko #include <stdbool.h>
12985ead41SAndrii Nakryiko #include <stdio.h>
13985ead41SAndrii Nakryiko #include <string.h>
14985ead41SAndrii Nakryiko #include <unistd.h>
15229c3b47SToke Høiland-Jørgensen #include <bpf/bpf.h>
16229c3b47SToke Høiland-Jørgensen #include <bpf/libbpf.h>
17a9caaba3SMauricio Vásquez #include <bpf/libbpf_internal.h>
18985ead41SAndrii Nakryiko #include <sys/types.h>
19985ead41SAndrii Nakryiko #include <sys/stat.h>
205dc7a8b2SAndrii Nakryiko #include <sys/mman.h>
21229c3b47SToke Høiland-Jørgensen #include <bpf/btf.h>
22985ead41SAndrii Nakryiko
23985ead41SAndrii Nakryiko #include "json_writer.h"
24985ead41SAndrii Nakryiko #include "main.h"
25985ead41SAndrii Nakryiko
26985ead41SAndrii Nakryiko #define MAX_OBJ_NAME_LEN 64
27985ead41SAndrii Nakryiko
sanitize_identifier(char * name)28985ead41SAndrii Nakryiko static void sanitize_identifier(char *name)
29985ead41SAndrii Nakryiko {
30985ead41SAndrii Nakryiko int i;
31985ead41SAndrii Nakryiko
32985ead41SAndrii Nakryiko for (i = 0; name[i]; i++)
33985ead41SAndrii Nakryiko if (!isalnum(name[i]) && name[i] != '_')
34985ead41SAndrii Nakryiko name[i] = '_';
35985ead41SAndrii Nakryiko }
36985ead41SAndrii Nakryiko
str_has_prefix(const char * str,const char * prefix)378654b4d3SAndrii Nakryiko static bool str_has_prefix(const char *str, const char *prefix)
388654b4d3SAndrii Nakryiko {
398654b4d3SAndrii Nakryiko return strncmp(str, prefix, strlen(prefix)) == 0;
408654b4d3SAndrii Nakryiko }
418654b4d3SAndrii Nakryiko
str_has_suffix(const char * str,const char * suffix)42985ead41SAndrii Nakryiko static bool str_has_suffix(const char *str, const char *suffix)
43985ead41SAndrii Nakryiko {
44985ead41SAndrii Nakryiko size_t i, n1 = strlen(str), n2 = strlen(suffix);
45985ead41SAndrii Nakryiko
46985ead41SAndrii Nakryiko if (n1 < n2)
47985ead41SAndrii Nakryiko return false;
48985ead41SAndrii Nakryiko
49985ead41SAndrii Nakryiko for (i = 0; i < n2; i++) {
50985ead41SAndrii Nakryiko if (str[n1 - i - 1] != suffix[n2 - i - 1])
51985ead41SAndrii Nakryiko return false;
52985ead41SAndrii Nakryiko }
53985ead41SAndrii Nakryiko
54985ead41SAndrii Nakryiko return true;
55985ead41SAndrii Nakryiko }
56985ead41SAndrii Nakryiko
get_obj_name(char * name,const char * file)57985ead41SAndrii Nakryiko static void get_obj_name(char *name, const char *file)
58985ead41SAndrii Nakryiko {
59985ead41SAndrii Nakryiko /* Using basename() GNU version which doesn't modify arg. */
60985ead41SAndrii Nakryiko strncpy(name, basename(file), MAX_OBJ_NAME_LEN - 1);
61985ead41SAndrii Nakryiko name[MAX_OBJ_NAME_LEN - 1] = '\0';
62985ead41SAndrii Nakryiko if (str_has_suffix(name, ".o"))
63985ead41SAndrii Nakryiko name[strlen(name) - 2] = '\0';
64985ead41SAndrii Nakryiko sanitize_identifier(name);
65985ead41SAndrii Nakryiko }
66985ead41SAndrii Nakryiko
get_header_guard(char * guard,const char * obj_name,const char * suffix)6700389c58SDelyan Kratunov static void get_header_guard(char *guard, const char *obj_name, const char *suffix)
68985ead41SAndrii Nakryiko {
69985ead41SAndrii Nakryiko int i;
70985ead41SAndrii Nakryiko
7100389c58SDelyan Kratunov sprintf(guard, "__%s_%s__", obj_name, suffix);
72985ead41SAndrii Nakryiko for (i = 0; guard[i]; i++)
73985ead41SAndrii Nakryiko guard[i] = toupper(guard[i]);
74985ead41SAndrii Nakryiko }
75985ead41SAndrii Nakryiko
get_map_ident(const struct bpf_map * map,char * buf,size_t buf_sz)768654b4d3SAndrii Nakryiko static bool get_map_ident(const struct bpf_map *map, char *buf, size_t buf_sz)
77985ead41SAndrii Nakryiko {
788654b4d3SAndrii Nakryiko static const char *sfxs[] = { ".data", ".rodata", ".bss", ".kconfig" };
79985ead41SAndrii Nakryiko const char *name = bpf_map__name(map);
808654b4d3SAndrii Nakryiko int i, n;
81985ead41SAndrii Nakryiko
828654b4d3SAndrii Nakryiko if (!bpf_map__is_internal(map)) {
838654b4d3SAndrii Nakryiko snprintf(buf, buf_sz, "%s", name);
848654b4d3SAndrii Nakryiko return true;
858654b4d3SAndrii Nakryiko }
86985ead41SAndrii Nakryiko
878654b4d3SAndrii Nakryiko for (i = 0, n = ARRAY_SIZE(sfxs); i < n; i++) {
888654b4d3SAndrii Nakryiko const char *sfx = sfxs[i], *p;
898654b4d3SAndrii Nakryiko
908654b4d3SAndrii Nakryiko p = strstr(name, sfx);
918654b4d3SAndrii Nakryiko if (p) {
928654b4d3SAndrii Nakryiko snprintf(buf, buf_sz, "%s", p + 1);
938654b4d3SAndrii Nakryiko sanitize_identifier(buf);
948654b4d3SAndrii Nakryiko return true;
958654b4d3SAndrii Nakryiko }
968654b4d3SAndrii Nakryiko }
978654b4d3SAndrii Nakryiko
988654b4d3SAndrii Nakryiko return false;
998654b4d3SAndrii Nakryiko }
1008654b4d3SAndrii Nakryiko
get_datasec_ident(const char * sec_name,char * buf,size_t buf_sz)1018654b4d3SAndrii Nakryiko static bool get_datasec_ident(const char *sec_name, char *buf, size_t buf_sz)
1028654b4d3SAndrii Nakryiko {
1038654b4d3SAndrii Nakryiko static const char *pfxs[] = { ".data", ".rodata", ".bss", ".kconfig" };
1048654b4d3SAndrii Nakryiko int i, n;
1058654b4d3SAndrii Nakryiko
1068654b4d3SAndrii Nakryiko for (i = 0, n = ARRAY_SIZE(pfxs); i < n; i++) {
1078654b4d3SAndrii Nakryiko const char *pfx = pfxs[i];
1088654b4d3SAndrii Nakryiko
1098654b4d3SAndrii Nakryiko if (str_has_prefix(sec_name, pfx)) {
1108654b4d3SAndrii Nakryiko snprintf(buf, buf_sz, "%s", sec_name + 1);
1118654b4d3SAndrii Nakryiko sanitize_identifier(buf);
1128654b4d3SAndrii Nakryiko return true;
1138654b4d3SAndrii Nakryiko }
1148654b4d3SAndrii Nakryiko }
1158654b4d3SAndrii Nakryiko
1168654b4d3SAndrii Nakryiko return false;
117985ead41SAndrii Nakryiko }
118985ead41SAndrii Nakryiko
codegen_btf_dump_printf(void * ctx,const char * fmt,va_list args)1190b20933dSAndrii Nakryiko static void codegen_btf_dump_printf(void *ctx, const char *fmt, va_list args)
120985ead41SAndrii Nakryiko {
121985ead41SAndrii Nakryiko vprintf(fmt, args);
122985ead41SAndrii Nakryiko }
123985ead41SAndrii Nakryiko
codegen_datasec_def(struct bpf_object * obj,struct btf * btf,struct btf_dump * d,const struct btf_type * sec,const char * obj_name)124985ead41SAndrii Nakryiko static int codegen_datasec_def(struct bpf_object *obj,
125985ead41SAndrii Nakryiko struct btf *btf,
126985ead41SAndrii Nakryiko struct btf_dump *d,
127985ead41SAndrii Nakryiko const struct btf_type *sec,
128985ead41SAndrii Nakryiko const char *obj_name)
129985ead41SAndrii Nakryiko {
130985ead41SAndrii Nakryiko const char *sec_name = btf__name_by_offset(btf, sec->name_off);
131985ead41SAndrii Nakryiko const struct btf_var_secinfo *sec_var = btf_var_secinfos(sec);
132985ead41SAndrii Nakryiko int i, err, off = 0, pad_cnt = 0, vlen = btf_vlen(sec);
1338654b4d3SAndrii Nakryiko char var_ident[256], sec_ident[256];
1340b20933dSAndrii Nakryiko bool strip_mods = false;
135985ead41SAndrii Nakryiko
1368654b4d3SAndrii Nakryiko if (!get_datasec_ident(sec_name, sec_ident, sizeof(sec_ident)))
137985ead41SAndrii Nakryiko return 0;
1388654b4d3SAndrii Nakryiko
1398654b4d3SAndrii Nakryiko if (strcmp(sec_name, ".kconfig") != 0)
1408654b4d3SAndrii Nakryiko strip_mods = true;
141985ead41SAndrii Nakryiko
142985ead41SAndrii Nakryiko printf(" struct %s__%s {\n", obj_name, sec_ident);
143985ead41SAndrii Nakryiko for (i = 0; i < vlen; i++, sec_var++) {
144985ead41SAndrii Nakryiko const struct btf_type *var = btf__type_by_id(btf, sec_var->type);
145985ead41SAndrii Nakryiko const char *var_name = btf__name_by_offset(btf, var->name_off);
146985ead41SAndrii Nakryiko DECLARE_LIBBPF_OPTS(btf_dump_emit_type_decl_opts, opts,
147985ead41SAndrii Nakryiko .field_name = var_ident,
148985ead41SAndrii Nakryiko .indent_level = 2,
1490b20933dSAndrii Nakryiko .strip_mods = strip_mods,
150985ead41SAndrii Nakryiko );
151985ead41SAndrii Nakryiko int need_off = sec_var->offset, align_off, align;
152985ead41SAndrii Nakryiko __u32 var_type_id = var->type;
153985ead41SAndrii Nakryiko
15431332ccbSAndrii Nakryiko /* static variables are not exposed through BPF skeleton */
15531332ccbSAndrii Nakryiko if (btf_var(var)->linkage == BTF_VAR_STATIC)
15631332ccbSAndrii Nakryiko continue;
15731332ccbSAndrii Nakryiko
158985ead41SAndrii Nakryiko if (off > need_off) {
159985ead41SAndrii Nakryiko p_err("Something is wrong for %s's variable #%d: need offset %d, already at %d.\n",
160985ead41SAndrii Nakryiko sec_name, i, need_off, off);
161985ead41SAndrii Nakryiko return -EINVAL;
162985ead41SAndrii Nakryiko }
163985ead41SAndrii Nakryiko
164985ead41SAndrii Nakryiko align = btf__align_of(btf, var->type);
165985ead41SAndrii Nakryiko if (align <= 0) {
166985ead41SAndrii Nakryiko p_err("Failed to determine alignment of variable '%s': %d",
167985ead41SAndrii Nakryiko var_name, align);
168985ead41SAndrii Nakryiko return -EINVAL;
169985ead41SAndrii Nakryiko }
1700f993845SAndrii Nakryiko /* Assume 32-bit architectures when generating data section
1710f993845SAndrii Nakryiko * struct memory layout. Given bpftool can't know which target
1720f993845SAndrii Nakryiko * host architecture it's emitting skeleton for, we need to be
1730f993845SAndrii Nakryiko * conservative and assume 32-bit one to ensure enough padding
1740f993845SAndrii Nakryiko * bytes are generated for pointer and long types. This will
1750f993845SAndrii Nakryiko * still work correctly for 64-bit architectures, because in
1760f993845SAndrii Nakryiko * the worst case we'll generate unnecessary padding field,
1770f993845SAndrii Nakryiko * which on 64-bit architectures is not strictly necessary and
1780f993845SAndrii Nakryiko * would be handled by natural 8-byte alignment. But it still
1790f993845SAndrii Nakryiko * will be a correct memory layout, based on recorded offsets
1800f993845SAndrii Nakryiko * in BTF.
1810f993845SAndrii Nakryiko */
1820f993845SAndrii Nakryiko if (align > 4)
1830f993845SAndrii Nakryiko align = 4;
184985ead41SAndrii Nakryiko
185985ead41SAndrii Nakryiko align_off = (off + align - 1) / align * align;
186985ead41SAndrii Nakryiko if (align_off != need_off) {
187985ead41SAndrii Nakryiko printf("\t\tchar __pad%d[%d];\n",
188985ead41SAndrii Nakryiko pad_cnt, need_off - off);
189985ead41SAndrii Nakryiko pad_cnt++;
190985ead41SAndrii Nakryiko }
191985ead41SAndrii Nakryiko
192985ead41SAndrii Nakryiko /* sanitize variable name, e.g., for static vars inside
193985ead41SAndrii Nakryiko * a function, it's name is '<function name>.<variable name>',
194985ead41SAndrii Nakryiko * which we'll turn into a '<function name>_<variable name>'
195985ead41SAndrii Nakryiko */
196985ead41SAndrii Nakryiko var_ident[0] = '\0';
197985ead41SAndrii Nakryiko strncat(var_ident, var_name, sizeof(var_ident) - 1);
198985ead41SAndrii Nakryiko sanitize_identifier(var_ident);
199985ead41SAndrii Nakryiko
200985ead41SAndrii Nakryiko printf("\t\t");
201985ead41SAndrii Nakryiko err = btf_dump__emit_type_decl(d, var_type_id, &opts);
202985ead41SAndrii Nakryiko if (err)
203985ead41SAndrii Nakryiko return err;
204985ead41SAndrii Nakryiko printf(";\n");
205985ead41SAndrii Nakryiko
206985ead41SAndrii Nakryiko off = sec_var->offset + sec_var->size;
207985ead41SAndrii Nakryiko }
208985ead41SAndrii Nakryiko printf(" } *%s;\n", sec_ident);
209985ead41SAndrii Nakryiko return 0;
210985ead41SAndrii Nakryiko }
211985ead41SAndrii Nakryiko
find_type_for_map(struct btf * btf,const char * map_ident)21208d4dba6SDelyan Kratunov static const struct btf_type *find_type_for_map(struct btf *btf, const char *map_ident)
21308d4dba6SDelyan Kratunov {
21408d4dba6SDelyan Kratunov int n = btf__type_cnt(btf), i;
21508d4dba6SDelyan Kratunov char sec_ident[256];
21608d4dba6SDelyan Kratunov
21708d4dba6SDelyan Kratunov for (i = 1; i < n; i++) {
21808d4dba6SDelyan Kratunov const struct btf_type *t = btf__type_by_id(btf, i);
21908d4dba6SDelyan Kratunov const char *name;
22008d4dba6SDelyan Kratunov
22108d4dba6SDelyan Kratunov if (!btf_is_datasec(t))
22208d4dba6SDelyan Kratunov continue;
22308d4dba6SDelyan Kratunov
22408d4dba6SDelyan Kratunov name = btf__str_by_offset(btf, t->name_off);
22508d4dba6SDelyan Kratunov if (!get_datasec_ident(name, sec_ident, sizeof(sec_ident)))
22608d4dba6SDelyan Kratunov continue;
22708d4dba6SDelyan Kratunov
22808d4dba6SDelyan Kratunov if (strcmp(sec_ident, map_ident) == 0)
22908d4dba6SDelyan Kratunov return t;
23008d4dba6SDelyan Kratunov }
23108d4dba6SDelyan Kratunov return NULL;
23208d4dba6SDelyan Kratunov }
23308d4dba6SDelyan Kratunov
is_internal_mmapable_map(const struct bpf_map * map,char * buf,size_t sz)23400389c58SDelyan Kratunov static bool is_internal_mmapable_map(const struct bpf_map *map, char *buf, size_t sz)
23500389c58SDelyan Kratunov {
23600389c58SDelyan Kratunov if (!bpf_map__is_internal(map) || !(bpf_map__map_flags(map) & BPF_F_MMAPABLE))
23700389c58SDelyan Kratunov return false;
23800389c58SDelyan Kratunov
23900389c58SDelyan Kratunov if (!get_map_ident(map, buf, sz))
24000389c58SDelyan Kratunov return false;
24100389c58SDelyan Kratunov
24200389c58SDelyan Kratunov return true;
24300389c58SDelyan Kratunov }
24400389c58SDelyan Kratunov
codegen_datasecs(struct bpf_object * obj,const char * obj_name)245985ead41SAndrii Nakryiko static int codegen_datasecs(struct bpf_object *obj, const char *obj_name)
246985ead41SAndrii Nakryiko {
247985ead41SAndrii Nakryiko struct btf *btf = bpf_object__btf(obj);
248985ead41SAndrii Nakryiko struct btf_dump *d;
249ef9356d3SAndrii Nakryiko struct bpf_map *map;
250ef9356d3SAndrii Nakryiko const struct btf_type *sec;
25108d4dba6SDelyan Kratunov char map_ident[256];
25208d4dba6SDelyan Kratunov int err = 0;
253985ead41SAndrii Nakryiko
254164b04f2SAndrii Nakryiko d = btf_dump__new(btf, codegen_btf_dump_printf, NULL, NULL);
255d1313e01SSahid Orentino Ferdjaoui if (!d)
256d1313e01SSahid Orentino Ferdjaoui return -errno;
257985ead41SAndrii Nakryiko
258ef9356d3SAndrii Nakryiko bpf_object__for_each_map(map, obj) {
259ef9356d3SAndrii Nakryiko /* only generate definitions for memory-mapped internal maps */
26000389c58SDelyan Kratunov if (!is_internal_mmapable_map(map, map_ident, sizeof(map_ident)))
261ef9356d3SAndrii Nakryiko continue;
262ef9356d3SAndrii Nakryiko
26308d4dba6SDelyan Kratunov sec = find_type_for_map(btf, map_ident);
264ef9356d3SAndrii Nakryiko
265ef9356d3SAndrii Nakryiko /* In some cases (e.g., sections like .rodata.cst16 containing
266ef9356d3SAndrii Nakryiko * compiler allocated string constants only) there will be
267ef9356d3SAndrii Nakryiko * special internal maps with no corresponding DATASEC BTF
268ef9356d3SAndrii Nakryiko * type. In such case, generate empty structs for each such
269ef9356d3SAndrii Nakryiko * map. It will still be memory-mapped and its contents
270ef9356d3SAndrii Nakryiko * accessible from user-space through BPF skeleton.
271ef9356d3SAndrii Nakryiko */
272ef9356d3SAndrii Nakryiko if (!sec) {
273ef9356d3SAndrii Nakryiko printf(" struct %s__%s {\n", obj_name, map_ident);
274ef9356d3SAndrii Nakryiko printf(" } *%s;\n", map_ident);
275ef9356d3SAndrii Nakryiko } else {
276ef9356d3SAndrii Nakryiko err = codegen_datasec_def(obj, btf, d, sec, obj_name);
277985ead41SAndrii Nakryiko if (err)
278985ead41SAndrii Nakryiko goto out;
279985ead41SAndrii Nakryiko }
280ef9356d3SAndrii Nakryiko }
281ef9356d3SAndrii Nakryiko
282ef9356d3SAndrii Nakryiko
283985ead41SAndrii Nakryiko out:
284985ead41SAndrii Nakryiko btf_dump__free(d);
285985ead41SAndrii Nakryiko return err;
286985ead41SAndrii Nakryiko }
287985ead41SAndrii Nakryiko
btf_is_ptr_to_func_proto(const struct btf * btf,const struct btf_type * v)28800389c58SDelyan Kratunov static bool btf_is_ptr_to_func_proto(const struct btf *btf,
28900389c58SDelyan Kratunov const struct btf_type *v)
29000389c58SDelyan Kratunov {
29100389c58SDelyan Kratunov return btf_is_ptr(v) && btf_is_func_proto(btf__type_by_id(btf, v->type));
29200389c58SDelyan Kratunov }
29300389c58SDelyan Kratunov
codegen_subskel_datasecs(struct bpf_object * obj,const char * obj_name)29400389c58SDelyan Kratunov static int codegen_subskel_datasecs(struct bpf_object *obj, const char *obj_name)
29500389c58SDelyan Kratunov {
29600389c58SDelyan Kratunov struct btf *btf = bpf_object__btf(obj);
29700389c58SDelyan Kratunov struct btf_dump *d;
29800389c58SDelyan Kratunov struct bpf_map *map;
29900389c58SDelyan Kratunov const struct btf_type *sec, *var;
30000389c58SDelyan Kratunov const struct btf_var_secinfo *sec_var;
30100389c58SDelyan Kratunov int i, err = 0, vlen;
30200389c58SDelyan Kratunov char map_ident[256], sec_ident[256];
30300389c58SDelyan Kratunov bool strip_mods = false, needs_typeof = false;
30400389c58SDelyan Kratunov const char *sec_name, *var_name;
30500389c58SDelyan Kratunov __u32 var_type_id;
30600389c58SDelyan Kratunov
30700389c58SDelyan Kratunov d = btf_dump__new(btf, codegen_btf_dump_printf, NULL, NULL);
30800389c58SDelyan Kratunov if (!d)
30900389c58SDelyan Kratunov return -errno;
31000389c58SDelyan Kratunov
31100389c58SDelyan Kratunov bpf_object__for_each_map(map, obj) {
31200389c58SDelyan Kratunov /* only generate definitions for memory-mapped internal maps */
31300389c58SDelyan Kratunov if (!is_internal_mmapable_map(map, map_ident, sizeof(map_ident)))
31400389c58SDelyan Kratunov continue;
31500389c58SDelyan Kratunov
31600389c58SDelyan Kratunov sec = find_type_for_map(btf, map_ident);
31700389c58SDelyan Kratunov if (!sec)
31800389c58SDelyan Kratunov continue;
31900389c58SDelyan Kratunov
32000389c58SDelyan Kratunov sec_name = btf__name_by_offset(btf, sec->name_off);
32100389c58SDelyan Kratunov if (!get_datasec_ident(sec_name, sec_ident, sizeof(sec_ident)))
32200389c58SDelyan Kratunov continue;
32300389c58SDelyan Kratunov
32400389c58SDelyan Kratunov strip_mods = strcmp(sec_name, ".kconfig") != 0;
32500389c58SDelyan Kratunov printf(" struct %s__%s {\n", obj_name, sec_ident);
32600389c58SDelyan Kratunov
32700389c58SDelyan Kratunov sec_var = btf_var_secinfos(sec);
32800389c58SDelyan Kratunov vlen = btf_vlen(sec);
32900389c58SDelyan Kratunov for (i = 0; i < vlen; i++, sec_var++) {
33000389c58SDelyan Kratunov DECLARE_LIBBPF_OPTS(btf_dump_emit_type_decl_opts, opts,
33100389c58SDelyan Kratunov .indent_level = 2,
33200389c58SDelyan Kratunov .strip_mods = strip_mods,
33300389c58SDelyan Kratunov /* we'll print the name separately */
33400389c58SDelyan Kratunov .field_name = "",
33500389c58SDelyan Kratunov );
33600389c58SDelyan Kratunov
33700389c58SDelyan Kratunov var = btf__type_by_id(btf, sec_var->type);
33800389c58SDelyan Kratunov var_name = btf__name_by_offset(btf, var->name_off);
33900389c58SDelyan Kratunov var_type_id = var->type;
34000389c58SDelyan Kratunov
34100389c58SDelyan Kratunov /* static variables are not exposed through BPF skeleton */
34200389c58SDelyan Kratunov if (btf_var(var)->linkage == BTF_VAR_STATIC)
34300389c58SDelyan Kratunov continue;
34400389c58SDelyan Kratunov
34500389c58SDelyan Kratunov /* The datasec member has KIND_VAR but we want the
34600389c58SDelyan Kratunov * underlying type of the variable (e.g. KIND_INT).
34700389c58SDelyan Kratunov */
34800389c58SDelyan Kratunov var = skip_mods_and_typedefs(btf, var->type, NULL);
34900389c58SDelyan Kratunov
35000389c58SDelyan Kratunov printf("\t\t");
35100389c58SDelyan Kratunov /* Func and array members require special handling.
35200389c58SDelyan Kratunov * Instead of producing `typename *var`, they produce
35300389c58SDelyan Kratunov * `typeof(typename) *var`. This allows us to keep a
35400389c58SDelyan Kratunov * similar syntax where the identifier is just prefixed
35500389c58SDelyan Kratunov * by *, allowing us to ignore C declaration minutiae.
35600389c58SDelyan Kratunov */
35700389c58SDelyan Kratunov needs_typeof = btf_is_array(var) || btf_is_ptr_to_func_proto(btf, var);
35800389c58SDelyan Kratunov if (needs_typeof)
35900389c58SDelyan Kratunov printf("typeof(");
36000389c58SDelyan Kratunov
36100389c58SDelyan Kratunov err = btf_dump__emit_type_decl(d, var_type_id, &opts);
36200389c58SDelyan Kratunov if (err)
36300389c58SDelyan Kratunov goto out;
36400389c58SDelyan Kratunov
36500389c58SDelyan Kratunov if (needs_typeof)
36600389c58SDelyan Kratunov printf(")");
36700389c58SDelyan Kratunov
36800389c58SDelyan Kratunov printf(" *%s;\n", var_name);
36900389c58SDelyan Kratunov }
37000389c58SDelyan Kratunov printf(" } %s;\n", sec_ident);
37100389c58SDelyan Kratunov }
37200389c58SDelyan Kratunov
37300389c58SDelyan Kratunov out:
37400389c58SDelyan Kratunov btf_dump__free(d);
37500389c58SDelyan Kratunov return err;
37600389c58SDelyan Kratunov }
37700389c58SDelyan Kratunov
codegen(const char * template,...)3782c4779efSTobias Klauser static void codegen(const char *template, ...)
379985ead41SAndrii Nakryiko {
380985ead41SAndrii Nakryiko const char *src, *end;
381985ead41SAndrii Nakryiko int skip_tabs = 0, n;
382985ead41SAndrii Nakryiko char *s, *dst;
383985ead41SAndrii Nakryiko va_list args;
384985ead41SAndrii Nakryiko char c;
385985ead41SAndrii Nakryiko
386985ead41SAndrii Nakryiko n = strlen(template);
387985ead41SAndrii Nakryiko s = malloc(n + 1);
388985ead41SAndrii Nakryiko if (!s)
3892c4779efSTobias Klauser exit(-1);
390985ead41SAndrii Nakryiko src = template;
391985ead41SAndrii Nakryiko dst = s;
392985ead41SAndrii Nakryiko
393985ead41SAndrii Nakryiko /* find out "baseline" indentation to skip */
394985ead41SAndrii Nakryiko while ((c = *src++)) {
395985ead41SAndrii Nakryiko if (c == '\t') {
396985ead41SAndrii Nakryiko skip_tabs++;
397985ead41SAndrii Nakryiko } else if (c == '\n') {
398985ead41SAndrii Nakryiko break;
399985ead41SAndrii Nakryiko } else {
400a6cc6b34SMatt Smith p_err("unrecognized character at pos %td in template '%s': '%c'",
401a6cc6b34SMatt Smith src - template - 1, template, c);
402d4060ac9STobias Klauser free(s);
4032c4779efSTobias Klauser exit(-1);
404985ead41SAndrii Nakryiko }
405985ead41SAndrii Nakryiko }
406985ead41SAndrii Nakryiko
407985ead41SAndrii Nakryiko while (*src) {
408985ead41SAndrii Nakryiko /* skip baseline indentation tabs */
409985ead41SAndrii Nakryiko for (n = skip_tabs; n > 0; n--, src++) {
410985ead41SAndrii Nakryiko if (*src != '\t') {
411985ead41SAndrii Nakryiko p_err("not enough tabs at pos %td in template '%s'",
412985ead41SAndrii Nakryiko src - template - 1, template);
413d4060ac9STobias Klauser free(s);
4142c4779efSTobias Klauser exit(-1);
415985ead41SAndrii Nakryiko }
416985ead41SAndrii Nakryiko }
417985ead41SAndrii Nakryiko /* trim trailing whitespace */
418985ead41SAndrii Nakryiko end = strchrnul(src, '\n');
419985ead41SAndrii Nakryiko for (n = end - src; n > 0 && isspace(src[n - 1]); n--)
420985ead41SAndrii Nakryiko ;
421985ead41SAndrii Nakryiko memcpy(dst, src, n);
422985ead41SAndrii Nakryiko dst += n;
423985ead41SAndrii Nakryiko if (*end)
424985ead41SAndrii Nakryiko *dst++ = '\n';
425985ead41SAndrii Nakryiko src = *end ? end + 1 : end;
426985ead41SAndrii Nakryiko }
427985ead41SAndrii Nakryiko *dst++ = '\0';
428985ead41SAndrii Nakryiko
429985ead41SAndrii Nakryiko /* print out using adjusted template */
430985ead41SAndrii Nakryiko va_start(args, template);
431985ead41SAndrii Nakryiko n = vprintf(s, args);
432985ead41SAndrii Nakryiko va_end(args);
433985ead41SAndrii Nakryiko
434985ead41SAndrii Nakryiko free(s);
435985ead41SAndrii Nakryiko }
436985ead41SAndrii Nakryiko
print_hex(const char * data,int data_sz)437d510296dSAlexei Starovoitov static void print_hex(const char *data, int data_sz)
438d510296dSAlexei Starovoitov {
439d510296dSAlexei Starovoitov int i, len;
440d510296dSAlexei Starovoitov
441d510296dSAlexei Starovoitov for (i = 0, len = 0; i < data_sz; i++) {
442d510296dSAlexei Starovoitov int w = data[i] ? 4 : 2;
443d510296dSAlexei Starovoitov
444d510296dSAlexei Starovoitov len += w;
445d510296dSAlexei Starovoitov if (len > 78) {
446d510296dSAlexei Starovoitov printf("\\\n");
447d510296dSAlexei Starovoitov len = w;
448d510296dSAlexei Starovoitov }
449d510296dSAlexei Starovoitov if (!data[i])
450d510296dSAlexei Starovoitov printf("\\0");
451d510296dSAlexei Starovoitov else
452d510296dSAlexei Starovoitov printf("\\x%02x", (unsigned char)data[i]);
453d510296dSAlexei Starovoitov }
454d510296dSAlexei Starovoitov }
455d510296dSAlexei Starovoitov
bpf_map_mmap_sz(const struct bpf_map * map)456d510296dSAlexei Starovoitov static size_t bpf_map_mmap_sz(const struct bpf_map *map)
457d510296dSAlexei Starovoitov {
458d510296dSAlexei Starovoitov long page_sz = sysconf(_SC_PAGE_SIZE);
459d510296dSAlexei Starovoitov size_t map_sz;
460d510296dSAlexei Starovoitov
461d510296dSAlexei Starovoitov map_sz = (size_t)roundup(bpf_map__value_size(map), 8) * bpf_map__max_entries(map);
462d510296dSAlexei Starovoitov map_sz = roundup(map_sz, page_sz);
463d510296dSAlexei Starovoitov return map_sz;
464d510296dSAlexei Starovoitov }
465d510296dSAlexei Starovoitov
46608d4dba6SDelyan Kratunov /* Emit type size asserts for all top-level fields in memory-mapped internal maps. */
codegen_asserts(struct bpf_object * obj,const char * obj_name)46708d4dba6SDelyan Kratunov static void codegen_asserts(struct bpf_object *obj, const char *obj_name)
46808d4dba6SDelyan Kratunov {
46908d4dba6SDelyan Kratunov struct btf *btf = bpf_object__btf(obj);
47008d4dba6SDelyan Kratunov struct bpf_map *map;
47108d4dba6SDelyan Kratunov struct btf_var_secinfo *sec_var;
47208d4dba6SDelyan Kratunov int i, vlen;
47308d4dba6SDelyan Kratunov const struct btf_type *sec;
47408d4dba6SDelyan Kratunov char map_ident[256], var_ident[256];
47508d4dba6SDelyan Kratunov
476de4b4b94SMichael Mullin if (!btf)
477de4b4b94SMichael Mullin return;
478de4b4b94SMichael Mullin
47908d4dba6SDelyan Kratunov codegen("\
48008d4dba6SDelyan Kratunov \n\
48108d4dba6SDelyan Kratunov __attribute__((unused)) static void \n\
482ef8a257bSJiri Olsa %1$s__assert(struct %1$s *s __attribute__((unused))) \n\
48308d4dba6SDelyan Kratunov { \n\
48408d4dba6SDelyan Kratunov #ifdef __cplusplus \n\
48508d4dba6SDelyan Kratunov #define _Static_assert static_assert \n\
48608d4dba6SDelyan Kratunov #endif \n\
48708d4dba6SDelyan Kratunov ", obj_name);
48808d4dba6SDelyan Kratunov
48908d4dba6SDelyan Kratunov bpf_object__for_each_map(map, obj) {
49000389c58SDelyan Kratunov if (!is_internal_mmapable_map(map, map_ident, sizeof(map_ident)))
49108d4dba6SDelyan Kratunov continue;
49208d4dba6SDelyan Kratunov
49308d4dba6SDelyan Kratunov sec = find_type_for_map(btf, map_ident);
49408d4dba6SDelyan Kratunov if (!sec) {
49508d4dba6SDelyan Kratunov /* best effort, couldn't find the type for this map */
49608d4dba6SDelyan Kratunov continue;
49708d4dba6SDelyan Kratunov }
49808d4dba6SDelyan Kratunov
49908d4dba6SDelyan Kratunov sec_var = btf_var_secinfos(sec);
50008d4dba6SDelyan Kratunov vlen = btf_vlen(sec);
50108d4dba6SDelyan Kratunov
50208d4dba6SDelyan Kratunov for (i = 0; i < vlen; i++, sec_var++) {
50308d4dba6SDelyan Kratunov const struct btf_type *var = btf__type_by_id(btf, sec_var->type);
50408d4dba6SDelyan Kratunov const char *var_name = btf__name_by_offset(btf, var->name_off);
50508d4dba6SDelyan Kratunov long var_size;
50608d4dba6SDelyan Kratunov
50708d4dba6SDelyan Kratunov /* static variables are not exposed through BPF skeleton */
50808d4dba6SDelyan Kratunov if (btf_var(var)->linkage == BTF_VAR_STATIC)
50908d4dba6SDelyan Kratunov continue;
51008d4dba6SDelyan Kratunov
51108d4dba6SDelyan Kratunov var_size = btf__resolve_size(btf, var->type);
51208d4dba6SDelyan Kratunov if (var_size < 0)
51308d4dba6SDelyan Kratunov continue;
51408d4dba6SDelyan Kratunov
51508d4dba6SDelyan Kratunov var_ident[0] = '\0';
51608d4dba6SDelyan Kratunov strncat(var_ident, var_name, sizeof(var_ident) - 1);
51708d4dba6SDelyan Kratunov sanitize_identifier(var_ident);
51808d4dba6SDelyan Kratunov
51908d4dba6SDelyan Kratunov printf("\t_Static_assert(sizeof(s->%s->%s) == %ld, \"unexpected size of '%s'\");\n",
52008d4dba6SDelyan Kratunov map_ident, var_ident, var_size, var_ident);
52108d4dba6SDelyan Kratunov }
52208d4dba6SDelyan Kratunov }
52308d4dba6SDelyan Kratunov codegen("\
52408d4dba6SDelyan Kratunov \n\
52508d4dba6SDelyan Kratunov #ifdef __cplusplus \n\
52608d4dba6SDelyan Kratunov #undef _Static_assert \n\
52708d4dba6SDelyan Kratunov #endif \n\
52808d4dba6SDelyan Kratunov } \n\
52908d4dba6SDelyan Kratunov ");
53008d4dba6SDelyan Kratunov }
53108d4dba6SDelyan Kratunov
codegen_attach_detach(struct bpf_object * obj,const char * obj_name)532d510296dSAlexei Starovoitov static void codegen_attach_detach(struct bpf_object *obj, const char *obj_name)
533d510296dSAlexei Starovoitov {
534d510296dSAlexei Starovoitov struct bpf_program *prog;
535d510296dSAlexei Starovoitov
536d510296dSAlexei Starovoitov bpf_object__for_each_program(prog, obj) {
537d510296dSAlexei Starovoitov const char *tp_name;
538d510296dSAlexei Starovoitov
539d510296dSAlexei Starovoitov codegen("\
540d510296dSAlexei Starovoitov \n\
541d510296dSAlexei Starovoitov \n\
542d510296dSAlexei Starovoitov static inline int \n\
543d510296dSAlexei Starovoitov %1$s__%2$s__attach(struct %1$s *skel) \n\
544d510296dSAlexei Starovoitov { \n\
545d510296dSAlexei Starovoitov int prog_fd = skel->progs.%2$s.prog_fd; \n\
546d510296dSAlexei Starovoitov ", obj_name, bpf_program__name(prog));
547d510296dSAlexei Starovoitov
54839748db1SAndrii Nakryiko switch (bpf_program__type(prog)) {
549d510296dSAlexei Starovoitov case BPF_PROG_TYPE_RAW_TRACEPOINT:
550d510296dSAlexei Starovoitov tp_name = strchr(bpf_program__section_name(prog), '/') + 1;
551c69f94a3SAlexei Starovoitov printf("\tint fd = skel_raw_tracepoint_open(\"%s\", prog_fd);\n", tp_name);
552d510296dSAlexei Starovoitov break;
553d510296dSAlexei Starovoitov case BPF_PROG_TYPE_TRACING:
554bd2331b3SKP Singh case BPF_PROG_TYPE_LSM:
55542d1d53fSAlexei Starovoitov if (bpf_program__expected_attach_type(prog) == BPF_TRACE_ITER)
556c69f94a3SAlexei Starovoitov printf("\tint fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER);\n");
55742d1d53fSAlexei Starovoitov else
558c69f94a3SAlexei Starovoitov printf("\tint fd = skel_raw_tracepoint_open(NULL, prog_fd);\n");
559d510296dSAlexei Starovoitov break;
560d510296dSAlexei Starovoitov default:
561d510296dSAlexei Starovoitov printf("\tint fd = ((void)prog_fd, 0); /* auto-attach not supported */\n");
562d510296dSAlexei Starovoitov break;
563d510296dSAlexei Starovoitov }
564d510296dSAlexei Starovoitov codegen("\
565d510296dSAlexei Starovoitov \n\
566d510296dSAlexei Starovoitov \n\
567d510296dSAlexei Starovoitov if (fd > 0) \n\
568d510296dSAlexei Starovoitov skel->links.%1$s_fd = fd; \n\
569d510296dSAlexei Starovoitov return fd; \n\
570d510296dSAlexei Starovoitov } \n\
571d510296dSAlexei Starovoitov ", bpf_program__name(prog));
572d510296dSAlexei Starovoitov }
573d510296dSAlexei Starovoitov
574d510296dSAlexei Starovoitov codegen("\
575d510296dSAlexei Starovoitov \n\
576d510296dSAlexei Starovoitov \n\
577d510296dSAlexei Starovoitov static inline int \n\
578d510296dSAlexei Starovoitov %1$s__attach(struct %1$s *skel) \n\
579d510296dSAlexei Starovoitov { \n\
580d510296dSAlexei Starovoitov int ret = 0; \n\
581d510296dSAlexei Starovoitov \n\
582d510296dSAlexei Starovoitov ", obj_name);
583d510296dSAlexei Starovoitov
584d510296dSAlexei Starovoitov bpf_object__for_each_program(prog, obj) {
585d510296dSAlexei Starovoitov codegen("\
586d510296dSAlexei Starovoitov \n\
587d510296dSAlexei Starovoitov ret = ret < 0 ? ret : %1$s__%2$s__attach(skel); \n\
588d510296dSAlexei Starovoitov ", obj_name, bpf_program__name(prog));
589d510296dSAlexei Starovoitov }
590d510296dSAlexei Starovoitov
591d510296dSAlexei Starovoitov codegen("\
592d510296dSAlexei Starovoitov \n\
593d510296dSAlexei Starovoitov return ret < 0 ? ret : 0; \n\
594d510296dSAlexei Starovoitov } \n\
595d510296dSAlexei Starovoitov \n\
596d510296dSAlexei Starovoitov static inline void \n\
597d510296dSAlexei Starovoitov %1$s__detach(struct %1$s *skel) \n\
598d510296dSAlexei Starovoitov { \n\
599d510296dSAlexei Starovoitov ", obj_name);
600d510296dSAlexei Starovoitov
601d510296dSAlexei Starovoitov bpf_object__for_each_program(prog, obj) {
602d510296dSAlexei Starovoitov codegen("\
603d510296dSAlexei Starovoitov \n\
604d510296dSAlexei Starovoitov skel_closenz(skel->links.%1$s_fd); \n\
605d510296dSAlexei Starovoitov ", bpf_program__name(prog));
606d510296dSAlexei Starovoitov }
607d510296dSAlexei Starovoitov
608d510296dSAlexei Starovoitov codegen("\
609d510296dSAlexei Starovoitov \n\
610d510296dSAlexei Starovoitov } \n\
611d510296dSAlexei Starovoitov ");
612d510296dSAlexei Starovoitov }
613d510296dSAlexei Starovoitov
codegen_destroy(struct bpf_object * obj,const char * obj_name)614d510296dSAlexei Starovoitov static void codegen_destroy(struct bpf_object *obj, const char *obj_name)
615d510296dSAlexei Starovoitov {
616d510296dSAlexei Starovoitov struct bpf_program *prog;
617d510296dSAlexei Starovoitov struct bpf_map *map;
6188654b4d3SAndrii Nakryiko char ident[256];
619d510296dSAlexei Starovoitov
620d510296dSAlexei Starovoitov codegen("\
621d510296dSAlexei Starovoitov \n\
622d510296dSAlexei Starovoitov static void \n\
623d510296dSAlexei Starovoitov %1$s__destroy(struct %1$s *skel) \n\
624d510296dSAlexei Starovoitov { \n\
625d510296dSAlexei Starovoitov if (!skel) \n\
626d510296dSAlexei Starovoitov return; \n\
627d510296dSAlexei Starovoitov %1$s__detach(skel); \n\
628d510296dSAlexei Starovoitov ",
629d510296dSAlexei Starovoitov obj_name);
630d510296dSAlexei Starovoitov
631d510296dSAlexei Starovoitov bpf_object__for_each_program(prog, obj) {
632d510296dSAlexei Starovoitov codegen("\
633d510296dSAlexei Starovoitov \n\
634d510296dSAlexei Starovoitov skel_closenz(skel->progs.%1$s.prog_fd); \n\
635d510296dSAlexei Starovoitov ", bpf_program__name(prog));
636d510296dSAlexei Starovoitov }
637d510296dSAlexei Starovoitov
638d510296dSAlexei Starovoitov bpf_object__for_each_map(map, obj) {
6398654b4d3SAndrii Nakryiko if (!get_map_ident(map, ident, sizeof(ident)))
640d510296dSAlexei Starovoitov continue;
641d510296dSAlexei Starovoitov if (bpf_map__is_internal(map) &&
6423c28919fSChristy Lee (bpf_map__map_flags(map) & BPF_F_MMAPABLE))
64328d743f6SAlexei Starovoitov printf("\tskel_free_map_data(skel->%1$s, skel->maps.%1$s.initial_value, %2$zd);\n",
644d510296dSAlexei Starovoitov ident, bpf_map_mmap_sz(map));
645d510296dSAlexei Starovoitov codegen("\
646d510296dSAlexei Starovoitov \n\
647d510296dSAlexei Starovoitov skel_closenz(skel->maps.%1$s.map_fd); \n\
648d510296dSAlexei Starovoitov ", ident);
649d510296dSAlexei Starovoitov }
650d510296dSAlexei Starovoitov codegen("\
651d510296dSAlexei Starovoitov \n\
65228d743f6SAlexei Starovoitov skel_free(skel); \n\
653d510296dSAlexei Starovoitov } \n\
654d510296dSAlexei Starovoitov ",
655d510296dSAlexei Starovoitov obj_name);
656d510296dSAlexei Starovoitov }
657d510296dSAlexei Starovoitov
gen_trace(struct bpf_object * obj,const char * obj_name,const char * header_guard)658d510296dSAlexei Starovoitov static int gen_trace(struct bpf_object *obj, const char *obj_name, const char *header_guard)
659d510296dSAlexei Starovoitov {
660d510296dSAlexei Starovoitov DECLARE_LIBBPF_OPTS(gen_loader_opts, opts);
661d510296dSAlexei Starovoitov struct bpf_map *map;
6628654b4d3SAndrii Nakryiko char ident[256];
663d510296dSAlexei Starovoitov int err = 0;
664d510296dSAlexei Starovoitov
665d510296dSAlexei Starovoitov err = bpf_object__gen_loader(obj, &opts);
666d510296dSAlexei Starovoitov if (err)
667d510296dSAlexei Starovoitov return err;
668d510296dSAlexei Starovoitov
669b59e4ce8SAndrii Nakryiko err = bpf_object__load(obj);
670d510296dSAlexei Starovoitov if (err) {
671d510296dSAlexei Starovoitov p_err("failed to load object file");
672d510296dSAlexei Starovoitov goto out;
673d510296dSAlexei Starovoitov }
674d510296dSAlexei Starovoitov /* If there was no error during load then gen_loader_opts
675d510296dSAlexei Starovoitov * are populated with the loader program.
676d510296dSAlexei Starovoitov */
677d510296dSAlexei Starovoitov
678d510296dSAlexei Starovoitov /* finish generating 'struct skel' */
679d510296dSAlexei Starovoitov codegen("\
680d510296dSAlexei Starovoitov \n\
681d510296dSAlexei Starovoitov }; \n\
682d510296dSAlexei Starovoitov ", obj_name);
683d510296dSAlexei Starovoitov
684d510296dSAlexei Starovoitov
685d510296dSAlexei Starovoitov codegen_attach_detach(obj, obj_name);
686d510296dSAlexei Starovoitov
687d510296dSAlexei Starovoitov codegen_destroy(obj, obj_name);
688d510296dSAlexei Starovoitov
689d510296dSAlexei Starovoitov codegen("\
690d510296dSAlexei Starovoitov \n\
691d510296dSAlexei Starovoitov static inline struct %1$s * \n\
692d510296dSAlexei Starovoitov %1$s__open(void) \n\
693d510296dSAlexei Starovoitov { \n\
694d510296dSAlexei Starovoitov struct %1$s *skel; \n\
695d510296dSAlexei Starovoitov \n\
69628d743f6SAlexei Starovoitov skel = skel_alloc(sizeof(*skel)); \n\
697d510296dSAlexei Starovoitov if (!skel) \n\
698d510296dSAlexei Starovoitov goto cleanup; \n\
699d510296dSAlexei Starovoitov skel->ctx.sz = (void *)&skel->links - (void *)skel; \n\
700d510296dSAlexei Starovoitov ",
701d510296dSAlexei Starovoitov obj_name, opts.data_sz);
702d510296dSAlexei Starovoitov bpf_object__for_each_map(map, obj) {
703d510296dSAlexei Starovoitov const void *mmap_data = NULL;
704d510296dSAlexei Starovoitov size_t mmap_size = 0;
705d510296dSAlexei Starovoitov
70600389c58SDelyan Kratunov if (!is_internal_mmapable_map(map, ident, sizeof(ident)))
707d510296dSAlexei Starovoitov continue;
708d510296dSAlexei Starovoitov
709d510296dSAlexei Starovoitov codegen("\
710d510296dSAlexei Starovoitov \n\
71128d743f6SAlexei Starovoitov skel->%1$s = skel_prep_map_data((void *)\"\\ \n\
71228d743f6SAlexei Starovoitov ", ident);
713d510296dSAlexei Starovoitov mmap_data = bpf_map__initial_value(map, &mmap_size);
714d510296dSAlexei Starovoitov print_hex(mmap_data, mmap_size);
71528d743f6SAlexei Starovoitov codegen("\
71628d743f6SAlexei Starovoitov \n\
71728d743f6SAlexei Starovoitov \", %1$zd, %2$zd); \n\
71828d743f6SAlexei Starovoitov if (!skel->%3$s) \n\
71928d743f6SAlexei Starovoitov goto cleanup; \n\
72028d743f6SAlexei Starovoitov skel->maps.%3$s.initial_value = (__u64) (long) skel->%3$s;\n\
72128d743f6SAlexei Starovoitov ", bpf_map_mmap_sz(map), mmap_size, ident);
722d510296dSAlexei Starovoitov }
723d510296dSAlexei Starovoitov codegen("\
724d510296dSAlexei Starovoitov \n\
725d510296dSAlexei Starovoitov return skel; \n\
726d510296dSAlexei Starovoitov cleanup: \n\
727d510296dSAlexei Starovoitov %1$s__destroy(skel); \n\
728d510296dSAlexei Starovoitov return NULL; \n\
729d510296dSAlexei Starovoitov } \n\
730d510296dSAlexei Starovoitov \n\
731d510296dSAlexei Starovoitov static inline int \n\
732d510296dSAlexei Starovoitov %1$s__load(struct %1$s *skel) \n\
733d510296dSAlexei Starovoitov { \n\
734d510296dSAlexei Starovoitov struct bpf_load_and_run_opts opts = {}; \n\
735d510296dSAlexei Starovoitov int err; \n\
736d510296dSAlexei Starovoitov \n\
737d510296dSAlexei Starovoitov opts.ctx = (struct bpf_loader_ctx *)skel; \n\
738d510296dSAlexei Starovoitov opts.data_sz = %2$d; \n\
739d510296dSAlexei Starovoitov opts.data = (void *)\"\\ \n\
740d510296dSAlexei Starovoitov ",
741d510296dSAlexei Starovoitov obj_name, opts.data_sz);
742d510296dSAlexei Starovoitov print_hex(opts.data, opts.data_sz);
743d510296dSAlexei Starovoitov codegen("\
744d510296dSAlexei Starovoitov \n\
745d510296dSAlexei Starovoitov \"; \n\
746d510296dSAlexei Starovoitov ");
747d510296dSAlexei Starovoitov
748d510296dSAlexei Starovoitov codegen("\
749d510296dSAlexei Starovoitov \n\
750d510296dSAlexei Starovoitov opts.insns_sz = %d; \n\
751d510296dSAlexei Starovoitov opts.insns = (void *)\"\\ \n\
752d510296dSAlexei Starovoitov ",
753d510296dSAlexei Starovoitov opts.insns_sz);
754d510296dSAlexei Starovoitov print_hex(opts.insns, opts.insns_sz);
755d510296dSAlexei Starovoitov codegen("\
756d510296dSAlexei Starovoitov \n\
757d510296dSAlexei Starovoitov \"; \n\
758d510296dSAlexei Starovoitov err = bpf_load_and_run(&opts); \n\
759d510296dSAlexei Starovoitov if (err < 0) \n\
760d510296dSAlexei Starovoitov return err; \n\
761d510296dSAlexei Starovoitov ", obj_name);
762d510296dSAlexei Starovoitov bpf_object__for_each_map(map, obj) {
7638654b4d3SAndrii Nakryiko const char *mmap_flags;
764d510296dSAlexei Starovoitov
76500389c58SDelyan Kratunov if (!is_internal_mmapable_map(map, ident, sizeof(ident)))
766d510296dSAlexei Starovoitov continue;
7678654b4d3SAndrii Nakryiko
7683c28919fSChristy Lee if (bpf_map__map_flags(map) & BPF_F_RDONLY_PROG)
769d510296dSAlexei Starovoitov mmap_flags = "PROT_READ";
770d510296dSAlexei Starovoitov else
771d510296dSAlexei Starovoitov mmap_flags = "PROT_READ | PROT_WRITE";
772d510296dSAlexei Starovoitov
77328d743f6SAlexei Starovoitov codegen("\
77428d743f6SAlexei Starovoitov \n\
77528d743f6SAlexei Starovoitov skel->%1$s = skel_finalize_map_data(&skel->maps.%1$s.initial_value, \n\
77628d743f6SAlexei Starovoitov %2$zd, %3$s, skel->maps.%1$s.map_fd);\n\
77728d743f6SAlexei Starovoitov if (!skel->%1$s) \n\
77828d743f6SAlexei Starovoitov return -ENOMEM; \n\
77928d743f6SAlexei Starovoitov ",
780d510296dSAlexei Starovoitov ident, bpf_map_mmap_sz(map), mmap_flags);
781d510296dSAlexei Starovoitov }
782d510296dSAlexei Starovoitov codegen("\
783d510296dSAlexei Starovoitov \n\
784d510296dSAlexei Starovoitov return 0; \n\
785d510296dSAlexei Starovoitov } \n\
786d510296dSAlexei Starovoitov \n\
787d510296dSAlexei Starovoitov static inline struct %1$s * \n\
788d510296dSAlexei Starovoitov %1$s__open_and_load(void) \n\
789d510296dSAlexei Starovoitov { \n\
790d510296dSAlexei Starovoitov struct %1$s *skel; \n\
791d510296dSAlexei Starovoitov \n\
792d510296dSAlexei Starovoitov skel = %1$s__open(); \n\
793d510296dSAlexei Starovoitov if (!skel) \n\
794d510296dSAlexei Starovoitov return NULL; \n\
795d510296dSAlexei Starovoitov if (%1$s__load(skel)) { \n\
796d510296dSAlexei Starovoitov %1$s__destroy(skel); \n\
797d510296dSAlexei Starovoitov return NULL; \n\
798d510296dSAlexei Starovoitov } \n\
799d510296dSAlexei Starovoitov return skel; \n\
800d510296dSAlexei Starovoitov } \n\
80108d4dba6SDelyan Kratunov \n\
802d510296dSAlexei Starovoitov ", obj_name);
803d510296dSAlexei Starovoitov
80408d4dba6SDelyan Kratunov codegen_asserts(obj, obj_name);
80508d4dba6SDelyan Kratunov
806d510296dSAlexei Starovoitov codegen("\
807d510296dSAlexei Starovoitov \n\
808d510296dSAlexei Starovoitov \n\
809d510296dSAlexei Starovoitov #endif /* %s */ \n\
810d510296dSAlexei Starovoitov ",
811d510296dSAlexei Starovoitov header_guard);
812d510296dSAlexei Starovoitov err = 0;
813d510296dSAlexei Starovoitov out:
814d510296dSAlexei Starovoitov return err;
815d510296dSAlexei Starovoitov }
816d510296dSAlexei Starovoitov
81700389c58SDelyan Kratunov static void
codegen_maps_skeleton(struct bpf_object * obj,size_t map_cnt,bool mmaped)81800389c58SDelyan Kratunov codegen_maps_skeleton(struct bpf_object *obj, size_t map_cnt, bool mmaped)
81900389c58SDelyan Kratunov {
82000389c58SDelyan Kratunov struct bpf_map *map;
82100389c58SDelyan Kratunov char ident[256];
82200389c58SDelyan Kratunov size_t i;
82300389c58SDelyan Kratunov
82400389c58SDelyan Kratunov if (!map_cnt)
82500389c58SDelyan Kratunov return;
82600389c58SDelyan Kratunov
82700389c58SDelyan Kratunov codegen("\
82800389c58SDelyan Kratunov \n\
82900389c58SDelyan Kratunov \n\
83000389c58SDelyan Kratunov /* maps */ \n\
83100389c58SDelyan Kratunov s->map_cnt = %zu; \n\
83200389c58SDelyan Kratunov s->map_skel_sz = sizeof(*s->maps); \n\
83300389c58SDelyan Kratunov s->maps = (struct bpf_map_skeleton *)calloc(s->map_cnt, s->map_skel_sz);\n\
834522574fdSDelyan Kratunov if (!s->maps) { \n\
835522574fdSDelyan Kratunov err = -ENOMEM; \n\
83600389c58SDelyan Kratunov goto err; \n\
837522574fdSDelyan Kratunov } \n\
83800389c58SDelyan Kratunov ",
83900389c58SDelyan Kratunov map_cnt
84000389c58SDelyan Kratunov );
84100389c58SDelyan Kratunov i = 0;
84200389c58SDelyan Kratunov bpf_object__for_each_map(map, obj) {
84300389c58SDelyan Kratunov if (!get_map_ident(map, ident, sizeof(ident)))
84400389c58SDelyan Kratunov continue;
84500389c58SDelyan Kratunov
84600389c58SDelyan Kratunov codegen("\
84700389c58SDelyan Kratunov \n\
84800389c58SDelyan Kratunov \n\
84900389c58SDelyan Kratunov s->maps[%zu].name = \"%s\"; \n\
85000389c58SDelyan Kratunov s->maps[%zu].map = &obj->maps.%s; \n\
85100389c58SDelyan Kratunov ",
85200389c58SDelyan Kratunov i, bpf_map__name(map), i, ident);
85300389c58SDelyan Kratunov /* memory-mapped internal maps */
85400389c58SDelyan Kratunov if (mmaped && is_internal_mmapable_map(map, ident, sizeof(ident))) {
85500389c58SDelyan Kratunov printf("\ts->maps[%zu].mmaped = (void **)&obj->%s;\n",
85600389c58SDelyan Kratunov i, ident);
85700389c58SDelyan Kratunov }
85800389c58SDelyan Kratunov i++;
85900389c58SDelyan Kratunov }
86000389c58SDelyan Kratunov }
86100389c58SDelyan Kratunov
86200389c58SDelyan Kratunov static void
codegen_progs_skeleton(struct bpf_object * obj,size_t prog_cnt,bool populate_links)86300389c58SDelyan Kratunov codegen_progs_skeleton(struct bpf_object *obj, size_t prog_cnt, bool populate_links)
86400389c58SDelyan Kratunov {
86500389c58SDelyan Kratunov struct bpf_program *prog;
86600389c58SDelyan Kratunov int i;
86700389c58SDelyan Kratunov
86800389c58SDelyan Kratunov if (!prog_cnt)
86900389c58SDelyan Kratunov return;
87000389c58SDelyan Kratunov
87100389c58SDelyan Kratunov codegen("\
87200389c58SDelyan Kratunov \n\
87300389c58SDelyan Kratunov \n\
87400389c58SDelyan Kratunov /* programs */ \n\
87500389c58SDelyan Kratunov s->prog_cnt = %zu; \n\
87600389c58SDelyan Kratunov s->prog_skel_sz = sizeof(*s->progs); \n\
87700389c58SDelyan Kratunov s->progs = (struct bpf_prog_skeleton *)calloc(s->prog_cnt, s->prog_skel_sz);\n\
878522574fdSDelyan Kratunov if (!s->progs) { \n\
879522574fdSDelyan Kratunov err = -ENOMEM; \n\
88000389c58SDelyan Kratunov goto err; \n\
881522574fdSDelyan Kratunov } \n\
88200389c58SDelyan Kratunov ",
88300389c58SDelyan Kratunov prog_cnt
88400389c58SDelyan Kratunov );
88500389c58SDelyan Kratunov i = 0;
88600389c58SDelyan Kratunov bpf_object__for_each_program(prog, obj) {
88700389c58SDelyan Kratunov codegen("\
88800389c58SDelyan Kratunov \n\
88900389c58SDelyan Kratunov \n\
89000389c58SDelyan Kratunov s->progs[%1$zu].name = \"%2$s\"; \n\
89100389c58SDelyan Kratunov s->progs[%1$zu].prog = &obj->progs.%2$s;\n\
89200389c58SDelyan Kratunov ",
89300389c58SDelyan Kratunov i, bpf_program__name(prog));
89400389c58SDelyan Kratunov
89500389c58SDelyan Kratunov if (populate_links) {
89600389c58SDelyan Kratunov codegen("\
89700389c58SDelyan Kratunov \n\
89800389c58SDelyan Kratunov s->progs[%1$zu].link = &obj->links.%2$s;\n\
89900389c58SDelyan Kratunov ",
90000389c58SDelyan Kratunov i, bpf_program__name(prog));
90100389c58SDelyan Kratunov }
90200389c58SDelyan Kratunov i++;
90300389c58SDelyan Kratunov }
90400389c58SDelyan Kratunov }
90500389c58SDelyan Kratunov
do_skeleton(int argc,char ** argv)906985ead41SAndrii Nakryiko static int do_skeleton(int argc, char **argv)
907985ead41SAndrii Nakryiko {
908985ead41SAndrii Nakryiko char header_guard[MAX_OBJ_NAME_LEN + sizeof("__SKEL_H__")];
90900389c58SDelyan Kratunov size_t map_cnt = 0, prog_cnt = 0, file_sz, mmap_sz;
9105dc7a8b2SAndrii Nakryiko DECLARE_LIBBPF_OPTS(bpf_object_open_opts, opts);
911c4122665SAndrii Nakryiko char obj_name[MAX_OBJ_NAME_LEN] = "", *obj_data;
9125dc7a8b2SAndrii Nakryiko struct bpf_object *obj = NULL;
9138654b4d3SAndrii Nakryiko const char *file;
9148654b4d3SAndrii Nakryiko char ident[256];
915985ead41SAndrii Nakryiko struct bpf_program *prog;
916d510296dSAlexei Starovoitov int fd, err = -1;
917985ead41SAndrii Nakryiko struct bpf_map *map;
918985ead41SAndrii Nakryiko struct btf *btf;
9195dc7a8b2SAndrii Nakryiko struct stat st;
920985ead41SAndrii Nakryiko
921985ead41SAndrii Nakryiko if (!REQ_ARGS(1)) {
922985ead41SAndrii Nakryiko usage();
923985ead41SAndrii Nakryiko return -1;
924985ead41SAndrii Nakryiko }
925985ead41SAndrii Nakryiko file = GET_ARG();
926985ead41SAndrii Nakryiko
927c4122665SAndrii Nakryiko while (argc) {
928c4122665SAndrii Nakryiko if (!REQ_ARGS(2))
929c4122665SAndrii Nakryiko return -1;
930c4122665SAndrii Nakryiko
931c4122665SAndrii Nakryiko if (is_prefix(*argv, "name")) {
932c4122665SAndrii Nakryiko NEXT_ARG();
933c4122665SAndrii Nakryiko
934c4122665SAndrii Nakryiko if (obj_name[0] != '\0') {
935c4122665SAndrii Nakryiko p_err("object name already specified");
936c4122665SAndrii Nakryiko return -1;
937c4122665SAndrii Nakryiko }
938c4122665SAndrii Nakryiko
939c4122665SAndrii Nakryiko strncpy(obj_name, *argv, MAX_OBJ_NAME_LEN - 1);
940c4122665SAndrii Nakryiko obj_name[MAX_OBJ_NAME_LEN - 1] = '\0';
941c4122665SAndrii Nakryiko } else {
942c4122665SAndrii Nakryiko p_err("unknown arg %s", *argv);
943c4122665SAndrii Nakryiko return -1;
944c4122665SAndrii Nakryiko }
945c4122665SAndrii Nakryiko
946c4122665SAndrii Nakryiko NEXT_ARG();
947c4122665SAndrii Nakryiko }
948c4122665SAndrii Nakryiko
949985ead41SAndrii Nakryiko if (argc) {
950985ead41SAndrii Nakryiko p_err("extra unknown arguments");
951985ead41SAndrii Nakryiko return -1;
952985ead41SAndrii Nakryiko }
953985ead41SAndrii Nakryiko
9545dc7a8b2SAndrii Nakryiko if (stat(file, &st)) {
9555dc7a8b2SAndrii Nakryiko p_err("failed to stat() %s: %s", file, strerror(errno));
956985ead41SAndrii Nakryiko return -1;
957985ead41SAndrii Nakryiko }
9585dc7a8b2SAndrii Nakryiko file_sz = st.st_size;
9595dc7a8b2SAndrii Nakryiko mmap_sz = roundup(file_sz, sysconf(_SC_PAGE_SIZE));
9605dc7a8b2SAndrii Nakryiko fd = open(file, O_RDONLY);
9615dc7a8b2SAndrii Nakryiko if (fd < 0) {
9625dc7a8b2SAndrii Nakryiko p_err("failed to open() %s: %s", file, strerror(errno));
9635dc7a8b2SAndrii Nakryiko return -1;
9645dc7a8b2SAndrii Nakryiko }
9655dc7a8b2SAndrii Nakryiko obj_data = mmap(NULL, mmap_sz, PROT_READ, MAP_PRIVATE, fd, 0);
9665dc7a8b2SAndrii Nakryiko if (obj_data == MAP_FAILED) {
9675dc7a8b2SAndrii Nakryiko obj_data = NULL;
9685dc7a8b2SAndrii Nakryiko p_err("failed to mmap() %s: %s", file, strerror(errno));
9695dc7a8b2SAndrii Nakryiko goto out;
9705dc7a8b2SAndrii Nakryiko }
971c4122665SAndrii Nakryiko if (obj_name[0] == '\0')
972985ead41SAndrii Nakryiko get_obj_name(obj_name, file);
9735dc7a8b2SAndrii Nakryiko opts.object_name = obj_name;
974b59e4ce8SAndrii Nakryiko if (verifier_logs)
975b59e4ce8SAndrii Nakryiko /* log_level1 + log_level2 + stats, but not stable UAPI */
976b59e4ce8SAndrii Nakryiko opts.kernel_log_level = 1 + 2 + 4;
9775dc7a8b2SAndrii Nakryiko obj = bpf_object__open_mem(obj_data, file_sz, &opts);
978d1313e01SSahid Orentino Ferdjaoui if (!obj) {
979956fcfcdSYueHaibing char err_buf[256];
980956fcfcdSYueHaibing
981d1313e01SSahid Orentino Ferdjaoui err = -errno;
982e5043894SHengqi Chen libbpf_strerror(err, err_buf, sizeof(err_buf));
983956fcfcdSYueHaibing p_err("failed to open BPF object file: %s", err_buf);
9845dc7a8b2SAndrii Nakryiko goto out;
9855dc7a8b2SAndrii Nakryiko }
986985ead41SAndrii Nakryiko
987985ead41SAndrii Nakryiko bpf_object__for_each_map(map, obj) {
9888654b4d3SAndrii Nakryiko if (!get_map_ident(map, ident, sizeof(ident))) {
989985ead41SAndrii Nakryiko p_err("ignoring unrecognized internal map '%s'...",
990985ead41SAndrii Nakryiko bpf_map__name(map));
991985ead41SAndrii Nakryiko continue;
992985ead41SAndrii Nakryiko }
993985ead41SAndrii Nakryiko map_cnt++;
994985ead41SAndrii Nakryiko }
995985ead41SAndrii Nakryiko bpf_object__for_each_program(prog, obj) {
996985ead41SAndrii Nakryiko prog_cnt++;
997985ead41SAndrii Nakryiko }
998985ead41SAndrii Nakryiko
99900389c58SDelyan Kratunov get_header_guard(header_guard, obj_name, "SKEL_H");
1000d510296dSAlexei Starovoitov if (use_loader) {
1001d510296dSAlexei Starovoitov codegen("\
1002d510296dSAlexei Starovoitov \n\
1003d510296dSAlexei Starovoitov /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */ \n\
100456c3e749SJason Wang /* THIS FILE IS AUTOGENERATED BY BPFTOOL! */ \n\
1005d510296dSAlexei Starovoitov #ifndef %2$s \n\
1006d510296dSAlexei Starovoitov #define %2$s \n\
1007d510296dSAlexei Starovoitov \n\
1008d510296dSAlexei Starovoitov #include <bpf/skel_internal.h> \n\
1009d510296dSAlexei Starovoitov \n\
1010d510296dSAlexei Starovoitov struct %1$s { \n\
1011d510296dSAlexei Starovoitov struct bpf_loader_ctx ctx; \n\
1012d510296dSAlexei Starovoitov ",
1013d510296dSAlexei Starovoitov obj_name, header_guard
1014d510296dSAlexei Starovoitov );
1015d510296dSAlexei Starovoitov } else {
1016985ead41SAndrii Nakryiko codegen("\
1017985ead41SAndrii Nakryiko \n\
10185dc7a8b2SAndrii Nakryiko /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */ \n\
10195dc7a8b2SAndrii Nakryiko \n\
102056c3e749SJason Wang /* THIS FILE IS AUTOGENERATED BY BPFTOOL! */ \n\
1021985ead41SAndrii Nakryiko #ifndef %2$s \n\
1022985ead41SAndrii Nakryiko #define %2$s \n\
1023985ead41SAndrii Nakryiko \n\
10249c6c0449SAndrii Nakryiko #include <errno.h> \n\
1025985ead41SAndrii Nakryiko #include <stdlib.h> \n\
1026229c3b47SToke Høiland-Jørgensen #include <bpf/libbpf.h> \n\
1027985ead41SAndrii Nakryiko \n\
1028985ead41SAndrii Nakryiko struct %1$s { \n\
1029985ead41SAndrii Nakryiko struct bpf_object_skeleton *skeleton; \n\
1030985ead41SAndrii Nakryiko struct bpf_object *obj; \n\
1031985ead41SAndrii Nakryiko ",
1032985ead41SAndrii Nakryiko obj_name, header_guard
1033985ead41SAndrii Nakryiko );
1034d510296dSAlexei Starovoitov }
1035985ead41SAndrii Nakryiko
1036985ead41SAndrii Nakryiko if (map_cnt) {
1037985ead41SAndrii Nakryiko printf("\tstruct {\n");
1038985ead41SAndrii Nakryiko bpf_object__for_each_map(map, obj) {
10398654b4d3SAndrii Nakryiko if (!get_map_ident(map, ident, sizeof(ident)))
1040985ead41SAndrii Nakryiko continue;
1041d510296dSAlexei Starovoitov if (use_loader)
1042d510296dSAlexei Starovoitov printf("\t\tstruct bpf_map_desc %s;\n", ident);
1043d510296dSAlexei Starovoitov else
1044985ead41SAndrii Nakryiko printf("\t\tstruct bpf_map *%s;\n", ident);
1045985ead41SAndrii Nakryiko }
1046985ead41SAndrii Nakryiko printf("\t} maps;\n");
1047985ead41SAndrii Nakryiko }
1048985ead41SAndrii Nakryiko
1049985ead41SAndrii Nakryiko if (prog_cnt) {
1050985ead41SAndrii Nakryiko printf("\tstruct {\n");
1051985ead41SAndrii Nakryiko bpf_object__for_each_program(prog, obj) {
1052d510296dSAlexei Starovoitov if (use_loader)
1053d510296dSAlexei Starovoitov printf("\t\tstruct bpf_prog_desc %s;\n",
1054d510296dSAlexei Starovoitov bpf_program__name(prog));
1055d510296dSAlexei Starovoitov else
1056985ead41SAndrii Nakryiko printf("\t\tstruct bpf_program *%s;\n",
1057985ead41SAndrii Nakryiko bpf_program__name(prog));
1058985ead41SAndrii Nakryiko }
1059985ead41SAndrii Nakryiko printf("\t} progs;\n");
1060985ead41SAndrii Nakryiko printf("\tstruct {\n");
1061985ead41SAndrii Nakryiko bpf_object__for_each_program(prog, obj) {
1062d510296dSAlexei Starovoitov if (use_loader)
1063d510296dSAlexei Starovoitov printf("\t\tint %s_fd;\n",
1064d510296dSAlexei Starovoitov bpf_program__name(prog));
1065d510296dSAlexei Starovoitov else
1066985ead41SAndrii Nakryiko printf("\t\tstruct bpf_link *%s;\n",
1067985ead41SAndrii Nakryiko bpf_program__name(prog));
1068985ead41SAndrii Nakryiko }
1069985ead41SAndrii Nakryiko printf("\t} links;\n");
1070985ead41SAndrii Nakryiko }
1071985ead41SAndrii Nakryiko
1072985ead41SAndrii Nakryiko btf = bpf_object__btf(obj);
1073985ead41SAndrii Nakryiko if (btf) {
1074985ead41SAndrii Nakryiko err = codegen_datasecs(obj, obj_name);
1075985ead41SAndrii Nakryiko if (err)
1076985ead41SAndrii Nakryiko goto out;
1077985ead41SAndrii Nakryiko }
1078d510296dSAlexei Starovoitov if (use_loader) {
1079d510296dSAlexei Starovoitov err = gen_trace(obj, obj_name, header_guard);
1080d510296dSAlexei Starovoitov goto out;
1081d510296dSAlexei Starovoitov }
1082985ead41SAndrii Nakryiko
1083985ead41SAndrii Nakryiko codegen("\
1084985ead41SAndrii Nakryiko \n\
1085bb8ffe61SAndrii Nakryiko \n\
1086bb8ffe61SAndrii Nakryiko #ifdef __cplusplus \n\
10879b6eb047SAndrii Nakryiko static inline struct %1$s *open(const struct bpf_object_open_opts *opts = nullptr);\n\
10889b6eb047SAndrii Nakryiko static inline struct %1$s *open_and_load(); \n\
10899b6eb047SAndrii Nakryiko static inline int load(struct %1$s *skel); \n\
10909b6eb047SAndrii Nakryiko static inline int attach(struct %1$s *skel); \n\
10919b6eb047SAndrii Nakryiko static inline void detach(struct %1$s *skel); \n\
10929b6eb047SAndrii Nakryiko static inline void destroy(struct %1$s *skel); \n\
10939b6eb047SAndrii Nakryiko static inline const void *elf_bytes(size_t *sz); \n\
1094bb8ffe61SAndrii Nakryiko #endif /* __cplusplus */ \n\
1095985ead41SAndrii Nakryiko }; \n\
1096985ead41SAndrii Nakryiko \n\
10975dc7a8b2SAndrii Nakryiko static void \n\
10985dc7a8b2SAndrii Nakryiko %1$s__destroy(struct %1$s *obj) \n\
10995dc7a8b2SAndrii Nakryiko { \n\
11005dc7a8b2SAndrii Nakryiko if (!obj) \n\
11015dc7a8b2SAndrii Nakryiko return; \n\
11025dc7a8b2SAndrii Nakryiko if (obj->skeleton) \n\
11035dc7a8b2SAndrii Nakryiko bpf_object__destroy_skeleton(obj->skeleton);\n\
11045dc7a8b2SAndrii Nakryiko free(obj); \n\
11055dc7a8b2SAndrii Nakryiko } \n\
11065dc7a8b2SAndrii Nakryiko \n\
11075dc7a8b2SAndrii Nakryiko static inline int \n\
11085dc7a8b2SAndrii Nakryiko %1$s__create_skeleton(struct %1$s *obj); \n\
11095dc7a8b2SAndrii Nakryiko \n\
11105dc7a8b2SAndrii Nakryiko static inline struct %1$s * \n\
11115dc7a8b2SAndrii Nakryiko %1$s__open_opts(const struct bpf_object_open_opts *opts) \n\
11125dc7a8b2SAndrii Nakryiko { \n\
11135dc7a8b2SAndrii Nakryiko struct %1$s *obj; \n\
11149c6c0449SAndrii Nakryiko int err; \n\
11155dc7a8b2SAndrii Nakryiko \n\
11168faf7fc5SAndrii Nakryiko obj = (struct %1$s *)calloc(1, sizeof(*obj)); \n\
11179c6c0449SAndrii Nakryiko if (!obj) { \n\
11189c6c0449SAndrii Nakryiko errno = ENOMEM; \n\
11195dc7a8b2SAndrii Nakryiko return NULL; \n\
11209c6c0449SAndrii Nakryiko } \n\
11219c6c0449SAndrii Nakryiko \n\
11229c6c0449SAndrii Nakryiko err = %1$s__create_skeleton(obj); \n\
112309710d82SYucong Sun if (err) \n\
112409710d82SYucong Sun goto err_out; \n\
112509710d82SYucong Sun \n\
112609710d82SYucong Sun err = bpf_object__open_skeleton(obj->skeleton, opts);\n\
11279c6c0449SAndrii Nakryiko if (err) \n\
11289c6c0449SAndrii Nakryiko goto err_out; \n\
11295dc7a8b2SAndrii Nakryiko \n\
11305dc7a8b2SAndrii Nakryiko return obj; \n\
11319c6c0449SAndrii Nakryiko err_out: \n\
11325dc7a8b2SAndrii Nakryiko %1$s__destroy(obj); \n\
11339c6c0449SAndrii Nakryiko errno = -err; \n\
11345dc7a8b2SAndrii Nakryiko return NULL; \n\
11355dc7a8b2SAndrii Nakryiko } \n\
11365dc7a8b2SAndrii Nakryiko \n\
11375dc7a8b2SAndrii Nakryiko static inline struct %1$s * \n\
11385dc7a8b2SAndrii Nakryiko %1$s__open(void) \n\
11395dc7a8b2SAndrii Nakryiko { \n\
11405dc7a8b2SAndrii Nakryiko return %1$s__open_opts(NULL); \n\
11415dc7a8b2SAndrii Nakryiko } \n\
11425dc7a8b2SAndrii Nakryiko \n\
11435dc7a8b2SAndrii Nakryiko static inline int \n\
11445dc7a8b2SAndrii Nakryiko %1$s__load(struct %1$s *obj) \n\
11455dc7a8b2SAndrii Nakryiko { \n\
11465dc7a8b2SAndrii Nakryiko return bpf_object__load_skeleton(obj->skeleton); \n\
11475dc7a8b2SAndrii Nakryiko } \n\
11485dc7a8b2SAndrii Nakryiko \n\
11495dc7a8b2SAndrii Nakryiko static inline struct %1$s * \n\
11505dc7a8b2SAndrii Nakryiko %1$s__open_and_load(void) \n\
11515dc7a8b2SAndrii Nakryiko { \n\
11525dc7a8b2SAndrii Nakryiko struct %1$s *obj; \n\
11539c6c0449SAndrii Nakryiko int err; \n\
11545dc7a8b2SAndrii Nakryiko \n\
11555dc7a8b2SAndrii Nakryiko obj = %1$s__open(); \n\
11565dc7a8b2SAndrii Nakryiko if (!obj) \n\
11575dc7a8b2SAndrii Nakryiko return NULL; \n\
11589c6c0449SAndrii Nakryiko err = %1$s__load(obj); \n\
11599c6c0449SAndrii Nakryiko if (err) { \n\
11605dc7a8b2SAndrii Nakryiko %1$s__destroy(obj); \n\
11619c6c0449SAndrii Nakryiko errno = -err; \n\
11625dc7a8b2SAndrii Nakryiko return NULL; \n\
11635dc7a8b2SAndrii Nakryiko } \n\
11645dc7a8b2SAndrii Nakryiko return obj; \n\
11655dc7a8b2SAndrii Nakryiko } \n\
11665dc7a8b2SAndrii Nakryiko \n\
11675dc7a8b2SAndrii Nakryiko static inline int \n\
11685dc7a8b2SAndrii Nakryiko %1$s__attach(struct %1$s *obj) \n\
11695dc7a8b2SAndrii Nakryiko { \n\
11705dc7a8b2SAndrii Nakryiko return bpf_object__attach_skeleton(obj->skeleton); \n\
11715dc7a8b2SAndrii Nakryiko } \n\
11725dc7a8b2SAndrii Nakryiko \n\
11735dc7a8b2SAndrii Nakryiko static inline void \n\
11745dc7a8b2SAndrii Nakryiko %1$s__detach(struct %1$s *obj) \n\
11755dc7a8b2SAndrii Nakryiko { \n\
1176a6df0674SJörn-Thorben Hinz bpf_object__detach_skeleton(obj->skeleton); \n\
11775dc7a8b2SAndrii Nakryiko } \n\
11785dc7a8b2SAndrii Nakryiko ",
11795dc7a8b2SAndrii Nakryiko obj_name
11805dc7a8b2SAndrii Nakryiko );
11815dc7a8b2SAndrii Nakryiko
11825dc7a8b2SAndrii Nakryiko codegen("\
11835dc7a8b2SAndrii Nakryiko \n\
11845dc7a8b2SAndrii Nakryiko \n\
1185a6cc6b34SMatt Smith static inline const void *%1$s__elf_bytes(size_t *sz); \n\
1186a6cc6b34SMatt Smith \n\
11875dc7a8b2SAndrii Nakryiko static inline int \n\
11885dc7a8b2SAndrii Nakryiko %1$s__create_skeleton(struct %1$s *obj) \n\
1189985ead41SAndrii Nakryiko { \n\
1190985ead41SAndrii Nakryiko struct bpf_object_skeleton *s; \n\
1191522574fdSDelyan Kratunov int err; \n\
1192985ead41SAndrii Nakryiko \n\
11938faf7fc5SAndrii Nakryiko s = (struct bpf_object_skeleton *)calloc(1, sizeof(*s));\n\
1194522574fdSDelyan Kratunov if (!s) { \n\
1195522574fdSDelyan Kratunov err = -ENOMEM; \n\
11969c6c0449SAndrii Nakryiko goto err; \n\
1197522574fdSDelyan Kratunov } \n\
1198985ead41SAndrii Nakryiko \n\
1199985ead41SAndrii Nakryiko s->sz = sizeof(*s); \n\
1200985ead41SAndrii Nakryiko s->name = \"%1$s\"; \n\
1201985ead41SAndrii Nakryiko s->obj = &obj->obj; \n\
1202985ead41SAndrii Nakryiko ",
1203985ead41SAndrii Nakryiko obj_name
1204985ead41SAndrii Nakryiko );
1205985ead41SAndrii Nakryiko
120600389c58SDelyan Kratunov codegen_maps_skeleton(obj, map_cnt, true /*mmaped*/);
120700389c58SDelyan Kratunov codegen_progs_skeleton(obj, prog_cnt, true /*populate_links*/);
120800389c58SDelyan Kratunov
1209985ead41SAndrii Nakryiko codegen("\
1210985ead41SAndrii Nakryiko \n\
1211985ead41SAndrii Nakryiko \n\
1212*3f1800caSIan Rogers s->data = %1$s__elf_bytes(&s->data_sz); \n\
1213a6cc6b34SMatt Smith \n\
12140991f6a3SWei Fu obj->skeleton = s; \n\
1215a6cc6b34SMatt Smith return 0; \n\
1216a6cc6b34SMatt Smith err: \n\
1217a6cc6b34SMatt Smith bpf_object__destroy_skeleton(s); \n\
1218522574fdSDelyan Kratunov return err; \n\
1219a6cc6b34SMatt Smith } \n\
1220a6cc6b34SMatt Smith \n\
1221*3f1800caSIan Rogers static inline const void *%1$s__elf_bytes(size_t *sz) \n\
1222a6cc6b34SMatt Smith { \n\
1223*3f1800caSIan Rogers static const char data[] __attribute__((__aligned__(8))) = \"\\\n\
1224*3f1800caSIan Rogers ",
1225*3f1800caSIan Rogers obj_name
1226*3f1800caSIan Rogers );
12275dc7a8b2SAndrii Nakryiko
12285dc7a8b2SAndrii Nakryiko /* embed contents of BPF object file */
1229d510296dSAlexei Starovoitov print_hex(obj_data, file_sz);
12305dc7a8b2SAndrii Nakryiko
12315dc7a8b2SAndrii Nakryiko codegen("\
12325dc7a8b2SAndrii Nakryiko \n\
12335dc7a8b2SAndrii Nakryiko \"; \n\
1234*3f1800caSIan Rogers \n\
1235*3f1800caSIan Rogers *sz = sizeof(data) - 1; \n\
1236*3f1800caSIan Rogers return (const void *)data; \n\
1237985ead41SAndrii Nakryiko } \n\
1238985ead41SAndrii Nakryiko \n\
1239bb8ffe61SAndrii Nakryiko #ifdef __cplusplus \n\
1240bb8ffe61SAndrii Nakryiko struct %1$s *%1$s::open(const struct bpf_object_open_opts *opts) { return %1$s__open_opts(opts); }\n\
1241bb8ffe61SAndrii Nakryiko struct %1$s *%1$s::open_and_load() { return %1$s__open_and_load(); } \n\
1242bb8ffe61SAndrii Nakryiko int %1$s::load(struct %1$s *skel) { return %1$s__load(skel); } \n\
1243bb8ffe61SAndrii Nakryiko int %1$s::attach(struct %1$s *skel) { return %1$s__attach(skel); } \n\
1244bb8ffe61SAndrii Nakryiko void %1$s::detach(struct %1$s *skel) { %1$s__detach(skel); } \n\
1245bb8ffe61SAndrii Nakryiko void %1$s::destroy(struct %1$s *skel) { %1$s__destroy(skel); } \n\
1246bb8ffe61SAndrii Nakryiko const void *%1$s::elf_bytes(size_t *sz) { return %1$s__elf_bytes(sz); } \n\
1247bb8ffe61SAndrii Nakryiko #endif /* __cplusplus */ \n\
1248bb8ffe61SAndrii Nakryiko \n\
1249985ead41SAndrii Nakryiko ",
125008d4dba6SDelyan Kratunov obj_name);
125108d4dba6SDelyan Kratunov
125208d4dba6SDelyan Kratunov codegen_asserts(obj, obj_name);
125308d4dba6SDelyan Kratunov
125408d4dba6SDelyan Kratunov codegen("\
125508d4dba6SDelyan Kratunov \n\
125608d4dba6SDelyan Kratunov \n\
125708d4dba6SDelyan Kratunov #endif /* %1$s */ \n\
125808d4dba6SDelyan Kratunov ",
125908d4dba6SDelyan Kratunov header_guard);
1260985ead41SAndrii Nakryiko err = 0;
1261985ead41SAndrii Nakryiko out:
1262985ead41SAndrii Nakryiko bpf_object__close(obj);
12635dc7a8b2SAndrii Nakryiko if (obj_data)
12645dc7a8b2SAndrii Nakryiko munmap(obj_data, mmap_sz);
12655dc7a8b2SAndrii Nakryiko close(fd);
1266985ead41SAndrii Nakryiko return err;
1267985ead41SAndrii Nakryiko }
1268985ead41SAndrii Nakryiko
126900389c58SDelyan Kratunov /* Subskeletons are like skeletons, except they don't own the bpf_object,
127000389c58SDelyan Kratunov * associated maps, links, etc. Instead, they know about the existence of
127100389c58SDelyan Kratunov * variables, maps, programs and are able to find their locations
127200389c58SDelyan Kratunov * _at runtime_ from an already loaded bpf_object.
127300389c58SDelyan Kratunov *
127400389c58SDelyan Kratunov * This allows for library-like BPF objects to have userspace counterparts
127500389c58SDelyan Kratunov * with access to their own items without having to know anything about the
127600389c58SDelyan Kratunov * final BPF object that the library was linked into.
127700389c58SDelyan Kratunov */
do_subskeleton(int argc,char ** argv)127800389c58SDelyan Kratunov static int do_subskeleton(int argc, char **argv)
127900389c58SDelyan Kratunov {
128000389c58SDelyan Kratunov char header_guard[MAX_OBJ_NAME_LEN + sizeof("__SUBSKEL_H__")];
128100389c58SDelyan Kratunov size_t i, len, file_sz, map_cnt = 0, prog_cnt = 0, mmap_sz, var_cnt = 0, var_idx = 0;
128200389c58SDelyan Kratunov DECLARE_LIBBPF_OPTS(bpf_object_open_opts, opts);
128300389c58SDelyan Kratunov char obj_name[MAX_OBJ_NAME_LEN] = "", *obj_data;
128400389c58SDelyan Kratunov struct bpf_object *obj = NULL;
128500389c58SDelyan Kratunov const char *file, *var_name;
128600389c58SDelyan Kratunov char ident[256];
128700389c58SDelyan Kratunov int fd, err = -1, map_type_id;
128800389c58SDelyan Kratunov const struct bpf_map *map;
128900389c58SDelyan Kratunov struct bpf_program *prog;
129000389c58SDelyan Kratunov struct btf *btf;
129100389c58SDelyan Kratunov const struct btf_type *map_type, *var_type;
129200389c58SDelyan Kratunov const struct btf_var_secinfo *var;
129300389c58SDelyan Kratunov struct stat st;
129400389c58SDelyan Kratunov
129500389c58SDelyan Kratunov if (!REQ_ARGS(1)) {
129600389c58SDelyan Kratunov usage();
129700389c58SDelyan Kratunov return -1;
129800389c58SDelyan Kratunov }
129900389c58SDelyan Kratunov file = GET_ARG();
130000389c58SDelyan Kratunov
130100389c58SDelyan Kratunov while (argc) {
130200389c58SDelyan Kratunov if (!REQ_ARGS(2))
130300389c58SDelyan Kratunov return -1;
130400389c58SDelyan Kratunov
130500389c58SDelyan Kratunov if (is_prefix(*argv, "name")) {
130600389c58SDelyan Kratunov NEXT_ARG();
130700389c58SDelyan Kratunov
130800389c58SDelyan Kratunov if (obj_name[0] != '\0') {
130900389c58SDelyan Kratunov p_err("object name already specified");
131000389c58SDelyan Kratunov return -1;
131100389c58SDelyan Kratunov }
131200389c58SDelyan Kratunov
131300389c58SDelyan Kratunov strncpy(obj_name, *argv, MAX_OBJ_NAME_LEN - 1);
131400389c58SDelyan Kratunov obj_name[MAX_OBJ_NAME_LEN - 1] = '\0';
131500389c58SDelyan Kratunov } else {
131600389c58SDelyan Kratunov p_err("unknown arg %s", *argv);
131700389c58SDelyan Kratunov return -1;
131800389c58SDelyan Kratunov }
131900389c58SDelyan Kratunov
132000389c58SDelyan Kratunov NEXT_ARG();
132100389c58SDelyan Kratunov }
132200389c58SDelyan Kratunov
132300389c58SDelyan Kratunov if (argc) {
132400389c58SDelyan Kratunov p_err("extra unknown arguments");
132500389c58SDelyan Kratunov return -1;
132600389c58SDelyan Kratunov }
132700389c58SDelyan Kratunov
132800389c58SDelyan Kratunov if (use_loader) {
132900389c58SDelyan Kratunov p_err("cannot use loader for subskeletons");
133000389c58SDelyan Kratunov return -1;
133100389c58SDelyan Kratunov }
133200389c58SDelyan Kratunov
133300389c58SDelyan Kratunov if (stat(file, &st)) {
133400389c58SDelyan Kratunov p_err("failed to stat() %s: %s", file, strerror(errno));
133500389c58SDelyan Kratunov return -1;
133600389c58SDelyan Kratunov }
133700389c58SDelyan Kratunov file_sz = st.st_size;
133800389c58SDelyan Kratunov mmap_sz = roundup(file_sz, sysconf(_SC_PAGE_SIZE));
133900389c58SDelyan Kratunov fd = open(file, O_RDONLY);
134000389c58SDelyan Kratunov if (fd < 0) {
134100389c58SDelyan Kratunov p_err("failed to open() %s: %s", file, strerror(errno));
134200389c58SDelyan Kratunov return -1;
134300389c58SDelyan Kratunov }
134400389c58SDelyan Kratunov obj_data = mmap(NULL, mmap_sz, PROT_READ, MAP_PRIVATE, fd, 0);
134500389c58SDelyan Kratunov if (obj_data == MAP_FAILED) {
134600389c58SDelyan Kratunov obj_data = NULL;
134700389c58SDelyan Kratunov p_err("failed to mmap() %s: %s", file, strerror(errno));
134800389c58SDelyan Kratunov goto out;
134900389c58SDelyan Kratunov }
135000389c58SDelyan Kratunov if (obj_name[0] == '\0')
135100389c58SDelyan Kratunov get_obj_name(obj_name, file);
135200389c58SDelyan Kratunov
135300389c58SDelyan Kratunov /* The empty object name allows us to use bpf_map__name and produce
135400389c58SDelyan Kratunov * ELF section names out of it. (".data" instead of "obj.data")
135500389c58SDelyan Kratunov */
135600389c58SDelyan Kratunov opts.object_name = "";
135700389c58SDelyan Kratunov obj = bpf_object__open_mem(obj_data, file_sz, &opts);
135800389c58SDelyan Kratunov if (!obj) {
135900389c58SDelyan Kratunov char err_buf[256];
136000389c58SDelyan Kratunov
136100389c58SDelyan Kratunov libbpf_strerror(errno, err_buf, sizeof(err_buf));
136200389c58SDelyan Kratunov p_err("failed to open BPF object file: %s", err_buf);
136300389c58SDelyan Kratunov obj = NULL;
136400389c58SDelyan Kratunov goto out;
136500389c58SDelyan Kratunov }
136600389c58SDelyan Kratunov
136700389c58SDelyan Kratunov btf = bpf_object__btf(obj);
136800389c58SDelyan Kratunov if (!btf) {
136900389c58SDelyan Kratunov err = -1;
137000389c58SDelyan Kratunov p_err("need btf type information for %s", obj_name);
137100389c58SDelyan Kratunov goto out;
137200389c58SDelyan Kratunov }
137300389c58SDelyan Kratunov
137400389c58SDelyan Kratunov bpf_object__for_each_program(prog, obj) {
137500389c58SDelyan Kratunov prog_cnt++;
137600389c58SDelyan Kratunov }
137700389c58SDelyan Kratunov
137800389c58SDelyan Kratunov /* First, count how many variables we have to find.
137900389c58SDelyan Kratunov * We need this in advance so the subskel can allocate the right
138000389c58SDelyan Kratunov * amount of storage.
138100389c58SDelyan Kratunov */
138200389c58SDelyan Kratunov bpf_object__for_each_map(map, obj) {
138300389c58SDelyan Kratunov if (!get_map_ident(map, ident, sizeof(ident)))
138400389c58SDelyan Kratunov continue;
138500389c58SDelyan Kratunov
138600389c58SDelyan Kratunov /* Also count all maps that have a name */
138700389c58SDelyan Kratunov map_cnt++;
138800389c58SDelyan Kratunov
138900389c58SDelyan Kratunov if (!is_internal_mmapable_map(map, ident, sizeof(ident)))
139000389c58SDelyan Kratunov continue;
139100389c58SDelyan Kratunov
139200389c58SDelyan Kratunov map_type_id = bpf_map__btf_value_type_id(map);
139300389c58SDelyan Kratunov if (map_type_id <= 0) {
139400389c58SDelyan Kratunov err = map_type_id;
139500389c58SDelyan Kratunov goto out;
139600389c58SDelyan Kratunov }
139700389c58SDelyan Kratunov map_type = btf__type_by_id(btf, map_type_id);
139800389c58SDelyan Kratunov
139900389c58SDelyan Kratunov var = btf_var_secinfos(map_type);
140000389c58SDelyan Kratunov len = btf_vlen(map_type);
140100389c58SDelyan Kratunov for (i = 0; i < len; i++, var++) {
140200389c58SDelyan Kratunov var_type = btf__type_by_id(btf, var->type);
140300389c58SDelyan Kratunov
140400389c58SDelyan Kratunov if (btf_var(var_type)->linkage == BTF_VAR_STATIC)
140500389c58SDelyan Kratunov continue;
140600389c58SDelyan Kratunov
140700389c58SDelyan Kratunov var_cnt++;
140800389c58SDelyan Kratunov }
140900389c58SDelyan Kratunov }
141000389c58SDelyan Kratunov
141100389c58SDelyan Kratunov get_header_guard(header_guard, obj_name, "SUBSKEL_H");
141200389c58SDelyan Kratunov codegen("\
141300389c58SDelyan Kratunov \n\
141400389c58SDelyan Kratunov /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */ \n\
141500389c58SDelyan Kratunov \n\
141600389c58SDelyan Kratunov /* THIS FILE IS AUTOGENERATED! */ \n\
141700389c58SDelyan Kratunov #ifndef %2$s \n\
141800389c58SDelyan Kratunov #define %2$s \n\
141900389c58SDelyan Kratunov \n\
142000389c58SDelyan Kratunov #include <errno.h> \n\
142100389c58SDelyan Kratunov #include <stdlib.h> \n\
142200389c58SDelyan Kratunov #include <bpf/libbpf.h> \n\
142300389c58SDelyan Kratunov \n\
142400389c58SDelyan Kratunov struct %1$s { \n\
142500389c58SDelyan Kratunov struct bpf_object *obj; \n\
142600389c58SDelyan Kratunov struct bpf_object_subskeleton *subskel; \n\
142700389c58SDelyan Kratunov ", obj_name, header_guard);
142800389c58SDelyan Kratunov
142900389c58SDelyan Kratunov if (map_cnt) {
143000389c58SDelyan Kratunov printf("\tstruct {\n");
143100389c58SDelyan Kratunov bpf_object__for_each_map(map, obj) {
143200389c58SDelyan Kratunov if (!get_map_ident(map, ident, sizeof(ident)))
143300389c58SDelyan Kratunov continue;
143400389c58SDelyan Kratunov printf("\t\tstruct bpf_map *%s;\n", ident);
143500389c58SDelyan Kratunov }
143600389c58SDelyan Kratunov printf("\t} maps;\n");
143700389c58SDelyan Kratunov }
143800389c58SDelyan Kratunov
143900389c58SDelyan Kratunov if (prog_cnt) {
144000389c58SDelyan Kratunov printf("\tstruct {\n");
144100389c58SDelyan Kratunov bpf_object__for_each_program(prog, obj) {
144200389c58SDelyan Kratunov printf("\t\tstruct bpf_program *%s;\n",
144300389c58SDelyan Kratunov bpf_program__name(prog));
144400389c58SDelyan Kratunov }
144500389c58SDelyan Kratunov printf("\t} progs;\n");
144600389c58SDelyan Kratunov }
144700389c58SDelyan Kratunov
144800389c58SDelyan Kratunov err = codegen_subskel_datasecs(obj, obj_name);
144900389c58SDelyan Kratunov if (err)
145000389c58SDelyan Kratunov goto out;
145100389c58SDelyan Kratunov
145200389c58SDelyan Kratunov /* emit code that will allocate enough storage for all symbols */
145300389c58SDelyan Kratunov codegen("\
145400389c58SDelyan Kratunov \n\
145500389c58SDelyan Kratunov \n\
145600389c58SDelyan Kratunov #ifdef __cplusplus \n\
145700389c58SDelyan Kratunov static inline struct %1$s *open(const struct bpf_object *src);\n\
145800389c58SDelyan Kratunov static inline void destroy(struct %1$s *skel); \n\
145900389c58SDelyan Kratunov #endif /* __cplusplus */ \n\
146000389c58SDelyan Kratunov }; \n\
146100389c58SDelyan Kratunov \n\
146200389c58SDelyan Kratunov static inline void \n\
146300389c58SDelyan Kratunov %1$s__destroy(struct %1$s *skel) \n\
146400389c58SDelyan Kratunov { \n\
146500389c58SDelyan Kratunov if (!skel) \n\
146600389c58SDelyan Kratunov return; \n\
146700389c58SDelyan Kratunov if (skel->subskel) \n\
146800389c58SDelyan Kratunov bpf_object__destroy_subskeleton(skel->subskel);\n\
146900389c58SDelyan Kratunov free(skel); \n\
147000389c58SDelyan Kratunov } \n\
147100389c58SDelyan Kratunov \n\
147200389c58SDelyan Kratunov static inline struct %1$s * \n\
147300389c58SDelyan Kratunov %1$s__open(const struct bpf_object *src) \n\
147400389c58SDelyan Kratunov { \n\
147500389c58SDelyan Kratunov struct %1$s *obj; \n\
147600389c58SDelyan Kratunov struct bpf_object_subskeleton *s; \n\
147700389c58SDelyan Kratunov int err; \n\
147800389c58SDelyan Kratunov \n\
147900389c58SDelyan Kratunov obj = (struct %1$s *)calloc(1, sizeof(*obj)); \n\
148000389c58SDelyan Kratunov if (!obj) { \n\
1481522574fdSDelyan Kratunov err = -ENOMEM; \n\
148200389c58SDelyan Kratunov goto err; \n\
148300389c58SDelyan Kratunov } \n\
148400389c58SDelyan Kratunov s = (struct bpf_object_subskeleton *)calloc(1, sizeof(*s));\n\
148500389c58SDelyan Kratunov if (!s) { \n\
1486522574fdSDelyan Kratunov err = -ENOMEM; \n\
148700389c58SDelyan Kratunov goto err; \n\
148800389c58SDelyan Kratunov } \n\
148900389c58SDelyan Kratunov s->sz = sizeof(*s); \n\
149000389c58SDelyan Kratunov s->obj = src; \n\
149100389c58SDelyan Kratunov s->var_skel_sz = sizeof(*s->vars); \n\
149200389c58SDelyan Kratunov obj->subskel = s; \n\
149300389c58SDelyan Kratunov \n\
149400389c58SDelyan Kratunov /* vars */ \n\
149500389c58SDelyan Kratunov s->var_cnt = %2$d; \n\
149600389c58SDelyan Kratunov s->vars = (struct bpf_var_skeleton *)calloc(%2$d, sizeof(*s->vars));\n\
149700389c58SDelyan Kratunov if (!s->vars) { \n\
1498522574fdSDelyan Kratunov err = -ENOMEM; \n\
149900389c58SDelyan Kratunov goto err; \n\
150000389c58SDelyan Kratunov } \n\
150100389c58SDelyan Kratunov ",
150200389c58SDelyan Kratunov obj_name, var_cnt
150300389c58SDelyan Kratunov );
150400389c58SDelyan Kratunov
150500389c58SDelyan Kratunov /* walk through each symbol and emit the runtime representation */
150600389c58SDelyan Kratunov bpf_object__for_each_map(map, obj) {
150700389c58SDelyan Kratunov if (!is_internal_mmapable_map(map, ident, sizeof(ident)))
150800389c58SDelyan Kratunov continue;
150900389c58SDelyan Kratunov
151000389c58SDelyan Kratunov map_type_id = bpf_map__btf_value_type_id(map);
151100389c58SDelyan Kratunov if (map_type_id <= 0)
151200389c58SDelyan Kratunov /* skip over internal maps with no type*/
151300389c58SDelyan Kratunov continue;
151400389c58SDelyan Kratunov
151500389c58SDelyan Kratunov map_type = btf__type_by_id(btf, map_type_id);
151600389c58SDelyan Kratunov var = btf_var_secinfos(map_type);
151700389c58SDelyan Kratunov len = btf_vlen(map_type);
151800389c58SDelyan Kratunov for (i = 0; i < len; i++, var++) {
151900389c58SDelyan Kratunov var_type = btf__type_by_id(btf, var->type);
152000389c58SDelyan Kratunov var_name = btf__name_by_offset(btf, var_type->name_off);
152100389c58SDelyan Kratunov
152200389c58SDelyan Kratunov if (btf_var(var_type)->linkage == BTF_VAR_STATIC)
152300389c58SDelyan Kratunov continue;
152400389c58SDelyan Kratunov
152500389c58SDelyan Kratunov /* Note that we use the dot prefix in .data as the
152600389c58SDelyan Kratunov * field access operator i.e. maps%s becomes maps.data
152700389c58SDelyan Kratunov */
152800389c58SDelyan Kratunov codegen("\
152900389c58SDelyan Kratunov \n\
153000389c58SDelyan Kratunov \n\
153100389c58SDelyan Kratunov s->vars[%3$d].name = \"%1$s\"; \n\
153200389c58SDelyan Kratunov s->vars[%3$d].map = &obj->maps.%2$s; \n\
153300389c58SDelyan Kratunov s->vars[%3$d].addr = (void **) &obj->%2$s.%1$s;\n\
153400389c58SDelyan Kratunov ", var_name, ident, var_idx);
153500389c58SDelyan Kratunov
153600389c58SDelyan Kratunov var_idx++;
153700389c58SDelyan Kratunov }
153800389c58SDelyan Kratunov }
153900389c58SDelyan Kratunov
154000389c58SDelyan Kratunov codegen_maps_skeleton(obj, map_cnt, false /*mmaped*/);
154100389c58SDelyan Kratunov codegen_progs_skeleton(obj, prog_cnt, false /*links*/);
154200389c58SDelyan Kratunov
154300389c58SDelyan Kratunov codegen("\
154400389c58SDelyan Kratunov \n\
154500389c58SDelyan Kratunov \n\
154600389c58SDelyan Kratunov err = bpf_object__open_subskeleton(s); \n\
154700389c58SDelyan Kratunov if (err) \n\
154800389c58SDelyan Kratunov goto err; \n\
154900389c58SDelyan Kratunov \n\
155000389c58SDelyan Kratunov return obj; \n\
155100389c58SDelyan Kratunov err: \n\
155200389c58SDelyan Kratunov %1$s__destroy(obj); \n\
1553522574fdSDelyan Kratunov errno = -err; \n\
155400389c58SDelyan Kratunov return NULL; \n\
155500389c58SDelyan Kratunov } \n\
155600389c58SDelyan Kratunov \n\
155700389c58SDelyan Kratunov #ifdef __cplusplus \n\
155800389c58SDelyan Kratunov struct %1$s *%1$s::open(const struct bpf_object *src) { return %1$s__open(src); }\n\
155900389c58SDelyan Kratunov void %1$s::destroy(struct %1$s *skel) { %1$s__destroy(skel); }\n\
156000389c58SDelyan Kratunov #endif /* __cplusplus */ \n\
156100389c58SDelyan Kratunov \n\
156200389c58SDelyan Kratunov #endif /* %2$s */ \n\
156300389c58SDelyan Kratunov ",
156400389c58SDelyan Kratunov obj_name, header_guard);
156500389c58SDelyan Kratunov err = 0;
156600389c58SDelyan Kratunov out:
156700389c58SDelyan Kratunov bpf_object__close(obj);
156800389c58SDelyan Kratunov if (obj_data)
156900389c58SDelyan Kratunov munmap(obj_data, mmap_sz);
157000389c58SDelyan Kratunov close(fd);
157100389c58SDelyan Kratunov return err;
157200389c58SDelyan Kratunov }
157300389c58SDelyan Kratunov
do_object(int argc,char ** argv)1574d80b2fcbSAndrii Nakryiko static int do_object(int argc, char **argv)
1575d80b2fcbSAndrii Nakryiko {
1576d80b2fcbSAndrii Nakryiko struct bpf_linker *linker;
1577d80b2fcbSAndrii Nakryiko const char *output_file, *file;
1578d80b2fcbSAndrii Nakryiko int err = 0;
1579d80b2fcbSAndrii Nakryiko
1580d80b2fcbSAndrii Nakryiko if (!REQ_ARGS(2)) {
1581d80b2fcbSAndrii Nakryiko usage();
1582d80b2fcbSAndrii Nakryiko return -1;
1583d80b2fcbSAndrii Nakryiko }
1584d80b2fcbSAndrii Nakryiko
1585d80b2fcbSAndrii Nakryiko output_file = GET_ARG();
1586d80b2fcbSAndrii Nakryiko
1587d80b2fcbSAndrii Nakryiko linker = bpf_linker__new(output_file, NULL);
1588d80b2fcbSAndrii Nakryiko if (!linker) {
1589d80b2fcbSAndrii Nakryiko p_err("failed to create BPF linker instance");
1590d80b2fcbSAndrii Nakryiko return -1;
1591d80b2fcbSAndrii Nakryiko }
1592d80b2fcbSAndrii Nakryiko
1593d80b2fcbSAndrii Nakryiko while (argc) {
1594d80b2fcbSAndrii Nakryiko file = GET_ARG();
1595d80b2fcbSAndrii Nakryiko
1596fdbf5ddeSAndrii Nakryiko err = bpf_linker__add_file(linker, file, NULL);
1597d80b2fcbSAndrii Nakryiko if (err) {
15983ca2fb49STianyi Liu p_err("failed to link '%s': %s (%d)", file, strerror(errno), errno);
1599d80b2fcbSAndrii Nakryiko goto out;
1600d80b2fcbSAndrii Nakryiko }
1601d80b2fcbSAndrii Nakryiko }
1602d80b2fcbSAndrii Nakryiko
1603d80b2fcbSAndrii Nakryiko err = bpf_linker__finalize(linker);
1604d80b2fcbSAndrii Nakryiko if (err) {
16053ca2fb49STianyi Liu p_err("failed to finalize ELF file: %s (%d)", strerror(errno), errno);
1606d80b2fcbSAndrii Nakryiko goto out;
1607d80b2fcbSAndrii Nakryiko }
1608d80b2fcbSAndrii Nakryiko
1609d80b2fcbSAndrii Nakryiko err = 0;
1610d80b2fcbSAndrii Nakryiko out:
1611d80b2fcbSAndrii Nakryiko bpf_linker__free(linker);
1612d80b2fcbSAndrii Nakryiko return err;
1613d80b2fcbSAndrii Nakryiko }
1614d80b2fcbSAndrii Nakryiko
do_help(int argc,char ** argv)1615985ead41SAndrii Nakryiko static int do_help(int argc, char **argv)
1616985ead41SAndrii Nakryiko {
1617985ead41SAndrii Nakryiko if (json_output) {
1618985ead41SAndrii Nakryiko jsonw_null(json_wtr);
1619985ead41SAndrii Nakryiko return 0;
1620985ead41SAndrii Nakryiko }
1621985ead41SAndrii Nakryiko
1622985ead41SAndrii Nakryiko fprintf(stderr,
1623d80b2fcbSAndrii Nakryiko "Usage: %1$s %2$s object OUTPUT_FILE INPUT_FILE [INPUT_FILE...]\n"
1624d80b2fcbSAndrii Nakryiko " %1$s %2$s skeleton FILE [name OBJECT_NAME]\n"
162500389c58SDelyan Kratunov " %1$s %2$s subskeleton FILE [name OBJECT_NAME]\n"
16260a9f4a20SMauricio Vásquez " %1$s %2$s min_core_btf INPUT OUTPUT OBJECT [OBJECT...]\n"
162790040351SQuentin Monnet " %1$s %2$s help\n"
1628985ead41SAndrii Nakryiko "\n"
16298cc8c635SQuentin Monnet " " HELP_SPEC_OPTIONS " |\n"
16308cc8c635SQuentin Monnet " {-L|--use-loader} }\n"
1631985ead41SAndrii Nakryiko "",
163290040351SQuentin Monnet bin_name, "gen");
1633985ead41SAndrii Nakryiko
1634985ead41SAndrii Nakryiko return 0;
1635985ead41SAndrii Nakryiko }
1636985ead41SAndrii Nakryiko
btf_save_raw(const struct btf * btf,const char * path)1637a9caaba3SMauricio Vásquez static int btf_save_raw(const struct btf *btf, const char *path)
1638a9caaba3SMauricio Vásquez {
1639a9caaba3SMauricio Vásquez const void *data;
1640a9caaba3SMauricio Vásquez FILE *f = NULL;
1641a9caaba3SMauricio Vásquez __u32 data_sz;
1642a9caaba3SMauricio Vásquez int err = 0;
1643a9caaba3SMauricio Vásquez
1644a9caaba3SMauricio Vásquez data = btf__raw_data(btf, &data_sz);
1645a9caaba3SMauricio Vásquez if (!data)
1646a9caaba3SMauricio Vásquez return -ENOMEM;
1647a9caaba3SMauricio Vásquez
1648a9caaba3SMauricio Vásquez f = fopen(path, "wb");
1649a9caaba3SMauricio Vásquez if (!f)
1650a9caaba3SMauricio Vásquez return -errno;
1651a9caaba3SMauricio Vásquez
1652a9caaba3SMauricio Vásquez if (fwrite(data, 1, data_sz, f) != data_sz)
1653a9caaba3SMauricio Vásquez err = -errno;
1654a9caaba3SMauricio Vásquez
1655a9caaba3SMauricio Vásquez fclose(f);
1656a9caaba3SMauricio Vásquez return err;
1657a9caaba3SMauricio Vásquez }
1658a9caaba3SMauricio Vásquez
1659a9caaba3SMauricio Vásquez struct btfgen_info {
1660a9caaba3SMauricio Vásquez struct btf *src_btf;
1661a9caaba3SMauricio Vásquez struct btf *marked_btf; /* btf structure used to mark used types */
1662a9caaba3SMauricio Vásquez };
1663a9caaba3SMauricio Vásquez
btfgen_hash_fn(long key,void * ctx)1664c302378bSEduard Zingerman static size_t btfgen_hash_fn(long key, void *ctx)
1665a9caaba3SMauricio Vásquez {
1666c302378bSEduard Zingerman return key;
1667a9caaba3SMauricio Vásquez }
1668a9caaba3SMauricio Vásquez
btfgen_equal_fn(long k1,long k2,void * ctx)1669c302378bSEduard Zingerman static bool btfgen_equal_fn(long k1, long k2, void *ctx)
1670a9caaba3SMauricio Vásquez {
1671a9caaba3SMauricio Vásquez return k1 == k2;
1672a9caaba3SMauricio Vásquez }
1673a9caaba3SMauricio Vásquez
btfgen_free_info(struct btfgen_info * info)1674a9caaba3SMauricio Vásquez static void btfgen_free_info(struct btfgen_info *info)
1675a9caaba3SMauricio Vásquez {
1676a9caaba3SMauricio Vásquez if (!info)
1677a9caaba3SMauricio Vásquez return;
1678a9caaba3SMauricio Vásquez
1679a9caaba3SMauricio Vásquez btf__free(info->src_btf);
1680a9caaba3SMauricio Vásquez btf__free(info->marked_btf);
1681a9caaba3SMauricio Vásquez
1682a9caaba3SMauricio Vásquez free(info);
1683a9caaba3SMauricio Vásquez }
1684a9caaba3SMauricio Vásquez
1685a9caaba3SMauricio Vásquez static struct btfgen_info *
btfgen_new_info(const char * targ_btf_path)1686a9caaba3SMauricio Vásquez btfgen_new_info(const char *targ_btf_path)
1687a9caaba3SMauricio Vásquez {
1688a9caaba3SMauricio Vásquez struct btfgen_info *info;
1689a9caaba3SMauricio Vásquez int err;
1690a9caaba3SMauricio Vásquez
1691a9caaba3SMauricio Vásquez info = calloc(1, sizeof(*info));
1692a9caaba3SMauricio Vásquez if (!info)
1693a9caaba3SMauricio Vásquez return NULL;
1694a9caaba3SMauricio Vásquez
1695a9caaba3SMauricio Vásquez info->src_btf = btf__parse(targ_btf_path, NULL);
1696a9caaba3SMauricio Vásquez if (!info->src_btf) {
1697a9caaba3SMauricio Vásquez err = -errno;
1698a9caaba3SMauricio Vásquez p_err("failed parsing '%s' BTF file: %s", targ_btf_path, strerror(errno));
1699a9caaba3SMauricio Vásquez goto err_out;
1700a9caaba3SMauricio Vásquez }
1701a9caaba3SMauricio Vásquez
1702a9caaba3SMauricio Vásquez info->marked_btf = btf__parse(targ_btf_path, NULL);
1703a9caaba3SMauricio Vásquez if (!info->marked_btf) {
1704a9caaba3SMauricio Vásquez err = -errno;
1705a9caaba3SMauricio Vásquez p_err("failed parsing '%s' BTF file: %s", targ_btf_path, strerror(errno));
1706a9caaba3SMauricio Vásquez goto err_out;
1707a9caaba3SMauricio Vásquez }
1708a9caaba3SMauricio Vásquez
1709a9caaba3SMauricio Vásquez return info;
1710a9caaba3SMauricio Vásquez
1711a9caaba3SMauricio Vásquez err_out:
1712a9caaba3SMauricio Vásquez btfgen_free_info(info);
1713a9caaba3SMauricio Vásquez errno = -err;
1714a9caaba3SMauricio Vásquez return NULL;
1715a9caaba3SMauricio Vásquez }
1716a9caaba3SMauricio Vásquez
1717a9caaba3SMauricio Vásquez #define MARKED UINT32_MAX
1718a9caaba3SMauricio Vásquez
btfgen_mark_member(struct btfgen_info * info,int type_id,int idx)1719a9caaba3SMauricio Vásquez static void btfgen_mark_member(struct btfgen_info *info, int type_id, int idx)
1720a9caaba3SMauricio Vásquez {
1721a9caaba3SMauricio Vásquez const struct btf_type *t = btf__type_by_id(info->marked_btf, type_id);
1722a9caaba3SMauricio Vásquez struct btf_member *m = btf_members(t) + idx;
1723a9caaba3SMauricio Vásquez
1724a9caaba3SMauricio Vásquez m->name_off = MARKED;
1725a9caaba3SMauricio Vásquez }
1726a9caaba3SMauricio Vásquez
1727a9caaba3SMauricio Vásquez static int
btfgen_mark_type(struct btfgen_info * info,unsigned int type_id,bool follow_pointers)1728a9caaba3SMauricio Vásquez btfgen_mark_type(struct btfgen_info *info, unsigned int type_id, bool follow_pointers)
1729a9caaba3SMauricio Vásquez {
1730a9caaba3SMauricio Vásquez const struct btf_type *btf_type = btf__type_by_id(info->src_btf, type_id);
1731a9caaba3SMauricio Vásquez struct btf_type *cloned_type;
1732a9caaba3SMauricio Vásquez struct btf_param *param;
1733a9caaba3SMauricio Vásquez struct btf_array *array;
1734a9caaba3SMauricio Vásquez int err, i;
1735a9caaba3SMauricio Vásquez
1736a9caaba3SMauricio Vásquez if (type_id == 0)
1737a9caaba3SMauricio Vásquez return 0;
1738a9caaba3SMauricio Vásquez
1739a9caaba3SMauricio Vásquez /* mark type on cloned BTF as used */
1740a9caaba3SMauricio Vásquez cloned_type = (struct btf_type *) btf__type_by_id(info->marked_btf, type_id);
1741a9caaba3SMauricio Vásquez cloned_type->name_off = MARKED;
1742a9caaba3SMauricio Vásquez
1743a9caaba3SMauricio Vásquez /* recursively mark other types needed by it */
1744a9caaba3SMauricio Vásquez switch (btf_kind(btf_type)) {
1745a9caaba3SMauricio Vásquez case BTF_KIND_UNKN:
1746a9caaba3SMauricio Vásquez case BTF_KIND_INT:
1747a9caaba3SMauricio Vásquez case BTF_KIND_FLOAT:
1748a9caaba3SMauricio Vásquez case BTF_KIND_ENUM:
174958a53978SYonghong Song case BTF_KIND_ENUM64:
1750a9caaba3SMauricio Vásquez case BTF_KIND_STRUCT:
1751a9caaba3SMauricio Vásquez case BTF_KIND_UNION:
1752a9caaba3SMauricio Vásquez break;
1753a9caaba3SMauricio Vásquez case BTF_KIND_PTR:
1754a9caaba3SMauricio Vásquez if (follow_pointers) {
1755a9caaba3SMauricio Vásquez err = btfgen_mark_type(info, btf_type->type, follow_pointers);
1756a9caaba3SMauricio Vásquez if (err)
1757a9caaba3SMauricio Vásquez return err;
1758a9caaba3SMauricio Vásquez }
1759a9caaba3SMauricio Vásquez break;
1760a9caaba3SMauricio Vásquez case BTF_KIND_CONST:
1761aad53f17SDaniel Müller case BTF_KIND_RESTRICT:
1762a9caaba3SMauricio Vásquez case BTF_KIND_VOLATILE:
1763a9caaba3SMauricio Vásquez case BTF_KIND_TYPEDEF:
1764a9caaba3SMauricio Vásquez err = btfgen_mark_type(info, btf_type->type, follow_pointers);
1765a9caaba3SMauricio Vásquez if (err)
1766a9caaba3SMauricio Vásquez return err;
1767a9caaba3SMauricio Vásquez break;
1768a9caaba3SMauricio Vásquez case BTF_KIND_ARRAY:
1769a9caaba3SMauricio Vásquez array = btf_array(btf_type);
1770a9caaba3SMauricio Vásquez
1771a9caaba3SMauricio Vásquez /* mark array type */
1772a9caaba3SMauricio Vásquez err = btfgen_mark_type(info, array->type, follow_pointers);
1773a9caaba3SMauricio Vásquez /* mark array's index type */
1774a9caaba3SMauricio Vásquez err = err ? : btfgen_mark_type(info, array->index_type, follow_pointers);
1775a9caaba3SMauricio Vásquez if (err)
1776a9caaba3SMauricio Vásquez return err;
1777a9caaba3SMauricio Vásquez break;
1778a9caaba3SMauricio Vásquez case BTF_KIND_FUNC_PROTO:
1779a9caaba3SMauricio Vásquez /* mark ret type */
1780a9caaba3SMauricio Vásquez err = btfgen_mark_type(info, btf_type->type, follow_pointers);
1781a9caaba3SMauricio Vásquez if (err)
1782a9caaba3SMauricio Vásquez return err;
1783a9caaba3SMauricio Vásquez
1784a9caaba3SMauricio Vásquez /* mark parameters types */
1785a9caaba3SMauricio Vásquez param = btf_params(btf_type);
1786a9caaba3SMauricio Vásquez for (i = 0; i < btf_vlen(btf_type); i++) {
1787a9caaba3SMauricio Vásquez err = btfgen_mark_type(info, param->type, follow_pointers);
1788a9caaba3SMauricio Vásquez if (err)
1789a9caaba3SMauricio Vásquez return err;
1790a9caaba3SMauricio Vásquez param++;
1791a9caaba3SMauricio Vásquez }
1792a9caaba3SMauricio Vásquez break;
1793a9caaba3SMauricio Vásquez /* tells if some other type needs to be handled */
1794a9caaba3SMauricio Vásquez default:
1795a9caaba3SMauricio Vásquez p_err("unsupported kind: %s (%d)", btf_kind_str(btf_type), type_id);
1796a9caaba3SMauricio Vásquez return -EINVAL;
1797a9caaba3SMauricio Vásquez }
1798a9caaba3SMauricio Vásquez
1799a9caaba3SMauricio Vásquez return 0;
1800a9caaba3SMauricio Vásquez }
1801a9caaba3SMauricio Vásquez
btfgen_record_field_relo(struct btfgen_info * info,struct bpf_core_spec * targ_spec)1802a9caaba3SMauricio Vásquez static int btfgen_record_field_relo(struct btfgen_info *info, struct bpf_core_spec *targ_spec)
1803a9caaba3SMauricio Vásquez {
1804a9caaba3SMauricio Vásquez struct btf *btf = info->src_btf;
1805a9caaba3SMauricio Vásquez const struct btf_type *btf_type;
1806a9caaba3SMauricio Vásquez struct btf_member *btf_member;
1807a9caaba3SMauricio Vásquez struct btf_array *array;
1808a9caaba3SMauricio Vásquez unsigned int type_id = targ_spec->root_type_id;
1809a9caaba3SMauricio Vásquez int idx, err;
1810a9caaba3SMauricio Vásquez
1811a9caaba3SMauricio Vásquez /* mark root type */
1812a9caaba3SMauricio Vásquez btf_type = btf__type_by_id(btf, type_id);
1813a9caaba3SMauricio Vásquez err = btfgen_mark_type(info, type_id, false);
1814a9caaba3SMauricio Vásquez if (err)
1815a9caaba3SMauricio Vásquez return err;
1816a9caaba3SMauricio Vásquez
1817a9caaba3SMauricio Vásquez /* mark types for complex types (arrays, unions, structures) */
1818a9caaba3SMauricio Vásquez for (int i = 1; i < targ_spec->raw_len; i++) {
1819a9caaba3SMauricio Vásquez /* skip typedefs and mods */
1820a9caaba3SMauricio Vásquez while (btf_is_mod(btf_type) || btf_is_typedef(btf_type)) {
1821a9caaba3SMauricio Vásquez type_id = btf_type->type;
1822a9caaba3SMauricio Vásquez btf_type = btf__type_by_id(btf, type_id);
1823a9caaba3SMauricio Vásquez }
1824a9caaba3SMauricio Vásquez
1825a9caaba3SMauricio Vásquez switch (btf_kind(btf_type)) {
1826a9caaba3SMauricio Vásquez case BTF_KIND_STRUCT:
1827a9caaba3SMauricio Vásquez case BTF_KIND_UNION:
1828a9caaba3SMauricio Vásquez idx = targ_spec->raw_spec[i];
1829a9caaba3SMauricio Vásquez btf_member = btf_members(btf_type) + idx;
1830a9caaba3SMauricio Vásquez
1831a9caaba3SMauricio Vásquez /* mark member */
1832a9caaba3SMauricio Vásquez btfgen_mark_member(info, type_id, idx);
1833a9caaba3SMauricio Vásquez
1834a9caaba3SMauricio Vásquez /* mark member's type */
1835a9caaba3SMauricio Vásquez type_id = btf_member->type;
1836a9caaba3SMauricio Vásquez btf_type = btf__type_by_id(btf, type_id);
1837a9caaba3SMauricio Vásquez err = btfgen_mark_type(info, type_id, false);
1838a9caaba3SMauricio Vásquez if (err)
1839a9caaba3SMauricio Vásquez return err;
1840a9caaba3SMauricio Vásquez break;
1841a9caaba3SMauricio Vásquez case BTF_KIND_ARRAY:
1842a9caaba3SMauricio Vásquez array = btf_array(btf_type);
1843a9caaba3SMauricio Vásquez type_id = array->type;
1844a9caaba3SMauricio Vásquez btf_type = btf__type_by_id(btf, type_id);
1845a9caaba3SMauricio Vásquez break;
1846a9caaba3SMauricio Vásquez default:
1847a9caaba3SMauricio Vásquez p_err("unsupported kind: %s (%d)",
1848a9caaba3SMauricio Vásquez btf_kind_str(btf_type), btf_type->type);
1849a9caaba3SMauricio Vásquez return -EINVAL;
1850a9caaba3SMauricio Vásquez }
1851a9caaba3SMauricio Vásquez }
1852a9caaba3SMauricio Vásquez
1853a9caaba3SMauricio Vásquez return 0;
1854a9caaba3SMauricio Vásquez }
1855a9caaba3SMauricio Vásquez
1856633e7cebSDaniel Müller /* Mark types, members, and member types. Compared to btfgen_record_field_relo,
1857633e7cebSDaniel Müller * this function does not rely on the target spec for inferring members, but
1858633e7cebSDaniel Müller * uses the associated BTF.
1859633e7cebSDaniel Müller *
1860633e7cebSDaniel Müller * The `behind_ptr` argument is used to stop marking of composite types reached
1861633e7cebSDaniel Müller * through a pointer. This way, we can keep BTF size in check while providing
1862633e7cebSDaniel Müller * reasonable match semantics.
1863633e7cebSDaniel Müller */
btfgen_mark_type_match(struct btfgen_info * info,__u32 type_id,bool behind_ptr)1864633e7cebSDaniel Müller static int btfgen_mark_type_match(struct btfgen_info *info, __u32 type_id, bool behind_ptr)
1865633e7cebSDaniel Müller {
1866633e7cebSDaniel Müller const struct btf_type *btf_type;
1867633e7cebSDaniel Müller struct btf *btf = info->src_btf;
1868633e7cebSDaniel Müller struct btf_type *cloned_type;
1869633e7cebSDaniel Müller int i, err;
1870633e7cebSDaniel Müller
1871633e7cebSDaniel Müller if (type_id == 0)
1872633e7cebSDaniel Müller return 0;
1873633e7cebSDaniel Müller
1874633e7cebSDaniel Müller btf_type = btf__type_by_id(btf, type_id);
1875633e7cebSDaniel Müller /* mark type on cloned BTF as used */
1876633e7cebSDaniel Müller cloned_type = (struct btf_type *)btf__type_by_id(info->marked_btf, type_id);
1877633e7cebSDaniel Müller cloned_type->name_off = MARKED;
1878633e7cebSDaniel Müller
1879633e7cebSDaniel Müller switch (btf_kind(btf_type)) {
1880633e7cebSDaniel Müller case BTF_KIND_UNKN:
1881633e7cebSDaniel Müller case BTF_KIND_INT:
1882633e7cebSDaniel Müller case BTF_KIND_FLOAT:
1883633e7cebSDaniel Müller case BTF_KIND_ENUM:
1884633e7cebSDaniel Müller case BTF_KIND_ENUM64:
1885633e7cebSDaniel Müller break;
1886633e7cebSDaniel Müller case BTF_KIND_STRUCT:
1887633e7cebSDaniel Müller case BTF_KIND_UNION: {
1888633e7cebSDaniel Müller struct btf_member *m = btf_members(btf_type);
1889633e7cebSDaniel Müller __u16 vlen = btf_vlen(btf_type);
1890633e7cebSDaniel Müller
1891633e7cebSDaniel Müller if (behind_ptr)
1892633e7cebSDaniel Müller break;
1893633e7cebSDaniel Müller
1894633e7cebSDaniel Müller for (i = 0; i < vlen; i++, m++) {
1895633e7cebSDaniel Müller /* mark member */
1896633e7cebSDaniel Müller btfgen_mark_member(info, type_id, i);
1897633e7cebSDaniel Müller
1898633e7cebSDaniel Müller /* mark member's type */
1899633e7cebSDaniel Müller err = btfgen_mark_type_match(info, m->type, false);
1900633e7cebSDaniel Müller if (err)
1901633e7cebSDaniel Müller return err;
1902633e7cebSDaniel Müller }
1903633e7cebSDaniel Müller break;
1904633e7cebSDaniel Müller }
1905633e7cebSDaniel Müller case BTF_KIND_CONST:
1906633e7cebSDaniel Müller case BTF_KIND_FWD:
1907633e7cebSDaniel Müller case BTF_KIND_RESTRICT:
1908633e7cebSDaniel Müller case BTF_KIND_TYPEDEF:
1909633e7cebSDaniel Müller case BTF_KIND_VOLATILE:
1910633e7cebSDaniel Müller return btfgen_mark_type_match(info, btf_type->type, behind_ptr);
1911633e7cebSDaniel Müller case BTF_KIND_PTR:
1912633e7cebSDaniel Müller return btfgen_mark_type_match(info, btf_type->type, true);
1913633e7cebSDaniel Müller case BTF_KIND_ARRAY: {
1914633e7cebSDaniel Müller struct btf_array *array;
1915633e7cebSDaniel Müller
1916633e7cebSDaniel Müller array = btf_array(btf_type);
1917633e7cebSDaniel Müller /* mark array type */
1918633e7cebSDaniel Müller err = btfgen_mark_type_match(info, array->type, false);
1919633e7cebSDaniel Müller /* mark array's index type */
1920633e7cebSDaniel Müller err = err ? : btfgen_mark_type_match(info, array->index_type, false);
1921633e7cebSDaniel Müller if (err)
1922633e7cebSDaniel Müller return err;
1923633e7cebSDaniel Müller break;
1924633e7cebSDaniel Müller }
1925633e7cebSDaniel Müller case BTF_KIND_FUNC_PROTO: {
1926633e7cebSDaniel Müller __u16 vlen = btf_vlen(btf_type);
1927633e7cebSDaniel Müller struct btf_param *param;
1928633e7cebSDaniel Müller
1929633e7cebSDaniel Müller /* mark ret type */
1930633e7cebSDaniel Müller err = btfgen_mark_type_match(info, btf_type->type, false);
1931633e7cebSDaniel Müller if (err)
1932633e7cebSDaniel Müller return err;
1933633e7cebSDaniel Müller
1934633e7cebSDaniel Müller /* mark parameters types */
1935633e7cebSDaniel Müller param = btf_params(btf_type);
1936633e7cebSDaniel Müller for (i = 0; i < vlen; i++) {
1937633e7cebSDaniel Müller err = btfgen_mark_type_match(info, param->type, false);
1938633e7cebSDaniel Müller if (err)
1939633e7cebSDaniel Müller return err;
1940633e7cebSDaniel Müller param++;
1941633e7cebSDaniel Müller }
1942633e7cebSDaniel Müller break;
1943633e7cebSDaniel Müller }
1944633e7cebSDaniel Müller /* tells if some other type needs to be handled */
1945633e7cebSDaniel Müller default:
1946633e7cebSDaniel Müller p_err("unsupported kind: %s (%d)", btf_kind_str(btf_type), type_id);
1947633e7cebSDaniel Müller return -EINVAL;
1948633e7cebSDaniel Müller }
1949633e7cebSDaniel Müller
1950633e7cebSDaniel Müller return 0;
1951633e7cebSDaniel Müller }
1952633e7cebSDaniel Müller
1953633e7cebSDaniel Müller /* Mark types, members, and member types. Compared to btfgen_record_field_relo,
1954633e7cebSDaniel Müller * this function does not rely on the target spec for inferring members, but
1955633e7cebSDaniel Müller * uses the associated BTF.
1956633e7cebSDaniel Müller */
btfgen_record_type_match_relo(struct btfgen_info * info,struct bpf_core_spec * targ_spec)1957633e7cebSDaniel Müller static int btfgen_record_type_match_relo(struct btfgen_info *info, struct bpf_core_spec *targ_spec)
1958633e7cebSDaniel Müller {
1959633e7cebSDaniel Müller return btfgen_mark_type_match(info, targ_spec->root_type_id, false);
1960633e7cebSDaniel Müller }
1961633e7cebSDaniel Müller
btfgen_record_type_relo(struct btfgen_info * info,struct bpf_core_spec * targ_spec)1962a9caaba3SMauricio Vásquez static int btfgen_record_type_relo(struct btfgen_info *info, struct bpf_core_spec *targ_spec)
1963a9caaba3SMauricio Vásquez {
1964a9caaba3SMauricio Vásquez return btfgen_mark_type(info, targ_spec->root_type_id, true);
1965a9caaba3SMauricio Vásquez }
1966a9caaba3SMauricio Vásquez
btfgen_record_enumval_relo(struct btfgen_info * info,struct bpf_core_spec * targ_spec)1967a9caaba3SMauricio Vásquez static int btfgen_record_enumval_relo(struct btfgen_info *info, struct bpf_core_spec *targ_spec)
1968a9caaba3SMauricio Vásquez {
1969a9caaba3SMauricio Vásquez return btfgen_mark_type(info, targ_spec->root_type_id, false);
1970a9caaba3SMauricio Vásquez }
1971a9caaba3SMauricio Vásquez
btfgen_record_reloc(struct btfgen_info * info,struct bpf_core_spec * res)1972a9caaba3SMauricio Vásquez static int btfgen_record_reloc(struct btfgen_info *info, struct bpf_core_spec *res)
1973a9caaba3SMauricio Vásquez {
1974a9caaba3SMauricio Vásquez switch (res->relo_kind) {
1975a9caaba3SMauricio Vásquez case BPF_CORE_FIELD_BYTE_OFFSET:
1976a9caaba3SMauricio Vásquez case BPF_CORE_FIELD_BYTE_SIZE:
1977a9caaba3SMauricio Vásquez case BPF_CORE_FIELD_EXISTS:
1978a9caaba3SMauricio Vásquez case BPF_CORE_FIELD_SIGNED:
1979a9caaba3SMauricio Vásquez case BPF_CORE_FIELD_LSHIFT_U64:
1980a9caaba3SMauricio Vásquez case BPF_CORE_FIELD_RSHIFT_U64:
1981a9caaba3SMauricio Vásquez return btfgen_record_field_relo(info, res);
1982a9caaba3SMauricio Vásquez case BPF_CORE_TYPE_ID_LOCAL: /* BPF_CORE_TYPE_ID_LOCAL doesn't require kernel BTF */
1983a9caaba3SMauricio Vásquez return 0;
1984a9caaba3SMauricio Vásquez case BPF_CORE_TYPE_ID_TARGET:
1985a9caaba3SMauricio Vásquez case BPF_CORE_TYPE_EXISTS:
1986a9caaba3SMauricio Vásquez case BPF_CORE_TYPE_SIZE:
1987a9caaba3SMauricio Vásquez return btfgen_record_type_relo(info, res);
1988633e7cebSDaniel Müller case BPF_CORE_TYPE_MATCHES:
1989633e7cebSDaniel Müller return btfgen_record_type_match_relo(info, res);
1990a9caaba3SMauricio Vásquez case BPF_CORE_ENUMVAL_EXISTS:
1991a9caaba3SMauricio Vásquez case BPF_CORE_ENUMVAL_VALUE:
1992a9caaba3SMauricio Vásquez return btfgen_record_enumval_relo(info, res);
1993a9caaba3SMauricio Vásquez default:
1994a9caaba3SMauricio Vásquez return -EINVAL;
1995a9caaba3SMauricio Vásquez }
1996a9caaba3SMauricio Vásquez }
1997a9caaba3SMauricio Vásquez
1998a9caaba3SMauricio Vásquez static struct bpf_core_cand_list *
btfgen_find_cands(const struct btf * local_btf,const struct btf * targ_btf,__u32 local_id)1999a9caaba3SMauricio Vásquez btfgen_find_cands(const struct btf *local_btf, const struct btf *targ_btf, __u32 local_id)
2000a9caaba3SMauricio Vásquez {
2001a9caaba3SMauricio Vásquez const struct btf_type *local_type;
2002a9caaba3SMauricio Vásquez struct bpf_core_cand_list *cands = NULL;
2003a9caaba3SMauricio Vásquez struct bpf_core_cand local_cand = {};
2004a9caaba3SMauricio Vásquez size_t local_essent_len;
2005a9caaba3SMauricio Vásquez const char *local_name;
2006a9caaba3SMauricio Vásquez int err;
2007a9caaba3SMauricio Vásquez
2008a9caaba3SMauricio Vásquez local_cand.btf = local_btf;
2009a9caaba3SMauricio Vásquez local_cand.id = local_id;
2010a9caaba3SMauricio Vásquez
2011a9caaba3SMauricio Vásquez local_type = btf__type_by_id(local_btf, local_id);
2012a9caaba3SMauricio Vásquez if (!local_type) {
2013a9caaba3SMauricio Vásquez err = -EINVAL;
2014a9caaba3SMauricio Vásquez goto err_out;
2015a9caaba3SMauricio Vásquez }
2016a9caaba3SMauricio Vásquez
2017a9caaba3SMauricio Vásquez local_name = btf__name_by_offset(local_btf, local_type->name_off);
2018a9caaba3SMauricio Vásquez if (!local_name) {
2019a9caaba3SMauricio Vásquez err = -EINVAL;
2020a9caaba3SMauricio Vásquez goto err_out;
2021a9caaba3SMauricio Vásquez }
2022a9caaba3SMauricio Vásquez local_essent_len = bpf_core_essential_name_len(local_name);
2023a9caaba3SMauricio Vásquez
2024a9caaba3SMauricio Vásquez cands = calloc(1, sizeof(*cands));
2025a9caaba3SMauricio Vásquez if (!cands)
2026a9caaba3SMauricio Vásquez return NULL;
2027a9caaba3SMauricio Vásquez
2028a9caaba3SMauricio Vásquez err = bpf_core_add_cands(&local_cand, local_essent_len, targ_btf, "vmlinux", 1, cands);
2029a9caaba3SMauricio Vásquez if (err)
2030a9caaba3SMauricio Vásquez goto err_out;
2031a9caaba3SMauricio Vásquez
2032a9caaba3SMauricio Vásquez return cands;
2033a9caaba3SMauricio Vásquez
2034a9caaba3SMauricio Vásquez err_out:
2035a9caaba3SMauricio Vásquez bpf_core_free_cands(cands);
2036a9caaba3SMauricio Vásquez errno = -err;
2037a9caaba3SMauricio Vásquez return NULL;
2038a9caaba3SMauricio Vásquez }
2039a9caaba3SMauricio Vásquez
2040a9caaba3SMauricio Vásquez /* Record relocation information for a single BPF object */
btfgen_record_obj(struct btfgen_info * info,const char * obj_path)2041a9caaba3SMauricio Vásquez static int btfgen_record_obj(struct btfgen_info *info, const char *obj_path)
2042a9caaba3SMauricio Vásquez {
2043a9caaba3SMauricio Vásquez const struct btf_ext_info_sec *sec;
2044a9caaba3SMauricio Vásquez const struct bpf_core_relo *relo;
2045a9caaba3SMauricio Vásquez const struct btf_ext_info *seg;
2046a9caaba3SMauricio Vásquez struct hashmap_entry *entry;
2047a9caaba3SMauricio Vásquez struct hashmap *cand_cache = NULL;
2048a9caaba3SMauricio Vásquez struct btf_ext *btf_ext = NULL;
2049a9caaba3SMauricio Vásquez unsigned int relo_idx;
2050a9caaba3SMauricio Vásquez struct btf *btf = NULL;
2051a9caaba3SMauricio Vásquez size_t i;
2052a9caaba3SMauricio Vásquez int err;
2053a9caaba3SMauricio Vásquez
2054a9caaba3SMauricio Vásquez btf = btf__parse(obj_path, &btf_ext);
2055a9caaba3SMauricio Vásquez if (!btf) {
2056a9caaba3SMauricio Vásquez err = -errno;
2057a9caaba3SMauricio Vásquez p_err("failed to parse BPF object '%s': %s", obj_path, strerror(errno));
2058a9caaba3SMauricio Vásquez return err;
2059a9caaba3SMauricio Vásquez }
2060a9caaba3SMauricio Vásquez
2061a9caaba3SMauricio Vásquez if (!btf_ext) {
2062a9caaba3SMauricio Vásquez p_err("failed to parse BPF object '%s': section %s not found",
2063a9caaba3SMauricio Vásquez obj_path, BTF_EXT_ELF_SEC);
2064a9caaba3SMauricio Vásquez err = -EINVAL;
2065a9caaba3SMauricio Vásquez goto out;
2066a9caaba3SMauricio Vásquez }
2067a9caaba3SMauricio Vásquez
2068a9caaba3SMauricio Vásquez if (btf_ext->core_relo_info.len == 0) {
2069a9caaba3SMauricio Vásquez err = 0;
2070a9caaba3SMauricio Vásquez goto out;
2071a9caaba3SMauricio Vásquez }
2072a9caaba3SMauricio Vásquez
2073a9caaba3SMauricio Vásquez cand_cache = hashmap__new(btfgen_hash_fn, btfgen_equal_fn, NULL);
2074a9caaba3SMauricio Vásquez if (IS_ERR(cand_cache)) {
2075a9caaba3SMauricio Vásquez err = PTR_ERR(cand_cache);
2076a9caaba3SMauricio Vásquez goto out;
2077a9caaba3SMauricio Vásquez }
2078a9caaba3SMauricio Vásquez
2079a9caaba3SMauricio Vásquez seg = &btf_ext->core_relo_info;
2080a9caaba3SMauricio Vásquez for_each_btf_ext_sec(seg, sec) {
2081a9caaba3SMauricio Vásquez for_each_btf_ext_rec(seg, sec, relo_idx, relo) {
2082a9caaba3SMauricio Vásquez struct bpf_core_spec specs_scratch[3] = {};
2083a9caaba3SMauricio Vásquez struct bpf_core_relo_res targ_res = {};
2084a9caaba3SMauricio Vásquez struct bpf_core_cand_list *cands = NULL;
2085a9caaba3SMauricio Vásquez const char *sec_name = btf__name_by_offset(btf, sec->sec_name_off);
2086a9caaba3SMauricio Vásquez
2087a9caaba3SMauricio Vásquez if (relo->kind != BPF_CORE_TYPE_ID_LOCAL &&
2088c302378bSEduard Zingerman !hashmap__find(cand_cache, relo->type_id, &cands)) {
2089a9caaba3SMauricio Vásquez cands = btfgen_find_cands(btf, info->src_btf, relo->type_id);
2090a9caaba3SMauricio Vásquez if (!cands) {
2091a9caaba3SMauricio Vásquez err = -errno;
2092a9caaba3SMauricio Vásquez goto out;
2093a9caaba3SMauricio Vásquez }
2094a9caaba3SMauricio Vásquez
2095c302378bSEduard Zingerman err = hashmap__set(cand_cache, relo->type_id, cands,
2096c302378bSEduard Zingerman NULL, NULL);
2097a9caaba3SMauricio Vásquez if (err)
2098a9caaba3SMauricio Vásquez goto out;
2099a9caaba3SMauricio Vásquez }
2100a9caaba3SMauricio Vásquez
2101a9caaba3SMauricio Vásquez err = bpf_core_calc_relo_insn(sec_name, relo, relo_idx, btf, cands,
2102a9caaba3SMauricio Vásquez specs_scratch, &targ_res);
2103a9caaba3SMauricio Vásquez if (err)
2104a9caaba3SMauricio Vásquez goto out;
2105a9caaba3SMauricio Vásquez
2106a9caaba3SMauricio Vásquez /* specs_scratch[2] is the target spec */
2107a9caaba3SMauricio Vásquez err = btfgen_record_reloc(info, &specs_scratch[2]);
2108a9caaba3SMauricio Vásquez if (err)
2109a9caaba3SMauricio Vásquez goto out;
2110a9caaba3SMauricio Vásquez }
2111a9caaba3SMauricio Vásquez }
2112a9caaba3SMauricio Vásquez
2113a9caaba3SMauricio Vásquez out:
2114a9caaba3SMauricio Vásquez btf__free(btf);
2115a9caaba3SMauricio Vásquez btf_ext__free(btf_ext);
2116a9caaba3SMauricio Vásquez
2117a9caaba3SMauricio Vásquez if (!IS_ERR_OR_NULL(cand_cache)) {
2118a9caaba3SMauricio Vásquez hashmap__for_each_entry(cand_cache, entry, i) {
2119c302378bSEduard Zingerman bpf_core_free_cands(entry->pvalue);
2120a9caaba3SMauricio Vásquez }
2121a9caaba3SMauricio Vásquez hashmap__free(cand_cache);
2122a9caaba3SMauricio Vásquez }
2123a9caaba3SMauricio Vásquez
2124a9caaba3SMauricio Vásquez return err;
2125a9caaba3SMauricio Vásquez }
2126a9caaba3SMauricio Vásquez
btfgen_remap_id(__u32 * type_id,void * ctx)2127dc695516SMauricio Vásquez static int btfgen_remap_id(__u32 *type_id, void *ctx)
2128dc695516SMauricio Vásquez {
2129dc695516SMauricio Vásquez unsigned int *ids = ctx;
2130dc695516SMauricio Vásquez
2131dc695516SMauricio Vásquez *type_id = ids[*type_id];
2132dc695516SMauricio Vásquez
2133dc695516SMauricio Vásquez return 0;
2134dc695516SMauricio Vásquez }
2135dc695516SMauricio Vásquez
2136a9caaba3SMauricio Vásquez /* Generate BTF from relocation information previously recorded */
btfgen_get_btf(struct btfgen_info * info)2137a9caaba3SMauricio Vásquez static struct btf *btfgen_get_btf(struct btfgen_info *info)
2138a9caaba3SMauricio Vásquez {
2139dc695516SMauricio Vásquez struct btf *btf_new = NULL;
2140dc695516SMauricio Vásquez unsigned int *ids = NULL;
2141dc695516SMauricio Vásquez unsigned int i, n = btf__type_cnt(info->marked_btf);
2142dc695516SMauricio Vásquez int err = 0;
2143dc695516SMauricio Vásquez
2144dc695516SMauricio Vásquez btf_new = btf__new_empty();
2145dc695516SMauricio Vásquez if (!btf_new) {
2146dc695516SMauricio Vásquez err = -errno;
2147dc695516SMauricio Vásquez goto err_out;
2148dc695516SMauricio Vásquez }
2149dc695516SMauricio Vásquez
2150dc695516SMauricio Vásquez ids = calloc(n, sizeof(*ids));
2151dc695516SMauricio Vásquez if (!ids) {
2152dc695516SMauricio Vásquez err = -errno;
2153dc695516SMauricio Vásquez goto err_out;
2154dc695516SMauricio Vásquez }
2155dc695516SMauricio Vásquez
2156dc695516SMauricio Vásquez /* first pass: add all marked types to btf_new and add their new ids to the ids map */
2157dc695516SMauricio Vásquez for (i = 1; i < n; i++) {
2158dc695516SMauricio Vásquez const struct btf_type *cloned_type, *type;
2159dc695516SMauricio Vásquez const char *name;
2160dc695516SMauricio Vásquez int new_id;
2161dc695516SMauricio Vásquez
2162dc695516SMauricio Vásquez cloned_type = btf__type_by_id(info->marked_btf, i);
2163dc695516SMauricio Vásquez
2164dc695516SMauricio Vásquez if (cloned_type->name_off != MARKED)
2165dc695516SMauricio Vásquez continue;
2166dc695516SMauricio Vásquez
2167dc695516SMauricio Vásquez type = btf__type_by_id(info->src_btf, i);
2168dc695516SMauricio Vásquez
2169dc695516SMauricio Vásquez /* add members for struct and union */
2170dc695516SMauricio Vásquez if (btf_is_composite(type)) {
2171dc695516SMauricio Vásquez struct btf_member *cloned_m, *m;
2172dc695516SMauricio Vásquez unsigned short vlen;
2173dc695516SMauricio Vásquez int idx_src;
2174dc695516SMauricio Vásquez
2175dc695516SMauricio Vásquez name = btf__str_by_offset(info->src_btf, type->name_off);
2176dc695516SMauricio Vásquez
2177dc695516SMauricio Vásquez if (btf_is_struct(type))
2178dc695516SMauricio Vásquez err = btf__add_struct(btf_new, name, type->size);
2179dc695516SMauricio Vásquez else
2180dc695516SMauricio Vásquez err = btf__add_union(btf_new, name, type->size);
2181dc695516SMauricio Vásquez
2182dc695516SMauricio Vásquez if (err < 0)
2183dc695516SMauricio Vásquez goto err_out;
2184dc695516SMauricio Vásquez new_id = err;
2185dc695516SMauricio Vásquez
2186dc695516SMauricio Vásquez cloned_m = btf_members(cloned_type);
2187dc695516SMauricio Vásquez m = btf_members(type);
2188dc695516SMauricio Vásquez vlen = btf_vlen(cloned_type);
2189dc695516SMauricio Vásquez for (idx_src = 0; idx_src < vlen; idx_src++, cloned_m++, m++) {
2190dc695516SMauricio Vásquez /* add only members that are marked as used */
2191dc695516SMauricio Vásquez if (cloned_m->name_off != MARKED)
2192dc695516SMauricio Vásquez continue;
2193dc695516SMauricio Vásquez
2194dc695516SMauricio Vásquez name = btf__str_by_offset(info->src_btf, m->name_off);
2195dc695516SMauricio Vásquez err = btf__add_field(btf_new, name, m->type,
2196dc695516SMauricio Vásquez btf_member_bit_offset(cloned_type, idx_src),
2197dc695516SMauricio Vásquez btf_member_bitfield_size(cloned_type, idx_src));
2198dc695516SMauricio Vásquez if (err < 0)
2199dc695516SMauricio Vásquez goto err_out;
2200dc695516SMauricio Vásquez }
2201dc695516SMauricio Vásquez } else {
2202dc695516SMauricio Vásquez err = btf__add_type(btf_new, info->src_btf, type);
2203dc695516SMauricio Vásquez if (err < 0)
2204dc695516SMauricio Vásquez goto err_out;
2205dc695516SMauricio Vásquez new_id = err;
2206dc695516SMauricio Vásquez }
2207dc695516SMauricio Vásquez
2208dc695516SMauricio Vásquez /* add ID mapping */
2209dc695516SMauricio Vásquez ids[i] = new_id;
2210dc695516SMauricio Vásquez }
2211dc695516SMauricio Vásquez
2212dc695516SMauricio Vásquez /* second pass: fix up type ids */
2213dc695516SMauricio Vásquez for (i = 1; i < btf__type_cnt(btf_new); i++) {
2214dc695516SMauricio Vásquez struct btf_type *btf_type = (struct btf_type *) btf__type_by_id(btf_new, i);
2215dc695516SMauricio Vásquez
2216dc695516SMauricio Vásquez err = btf_type_visit_type_ids(btf_type, btfgen_remap_id, ids);
2217dc695516SMauricio Vásquez if (err)
2218dc695516SMauricio Vásquez goto err_out;
2219dc695516SMauricio Vásquez }
2220dc695516SMauricio Vásquez
2221dc695516SMauricio Vásquez free(ids);
2222dc695516SMauricio Vásquez return btf_new;
2223dc695516SMauricio Vásquez
2224dc695516SMauricio Vásquez err_out:
2225dc695516SMauricio Vásquez btf__free(btf_new);
2226dc695516SMauricio Vásquez free(ids);
2227dc695516SMauricio Vásquez errno = -err;
2228dc695516SMauricio Vásquez return NULL;
2229a9caaba3SMauricio Vásquez }
2230a9caaba3SMauricio Vásquez
2231a9caaba3SMauricio Vásquez /* Create minimized BTF file for a set of BPF objects.
2232a9caaba3SMauricio Vásquez *
2233a9caaba3SMauricio Vásquez * The BTFGen algorithm is divided in two main parts: (1) collect the
2234a9caaba3SMauricio Vásquez * BTF types that are involved in relocations and (2) generate the BTF
2235a9caaba3SMauricio Vásquez * object using the collected types.
2236a9caaba3SMauricio Vásquez *
2237a9caaba3SMauricio Vásquez * In order to collect the types involved in the relocations, we parse
2238a9caaba3SMauricio Vásquez * the BTF and BTF.ext sections of the BPF objects and use
2239a9caaba3SMauricio Vásquez * bpf_core_calc_relo_insn() to get the target specification, this
2240a9caaba3SMauricio Vásquez * indicates how the types and fields are used in a relocation.
2241a9caaba3SMauricio Vásquez *
2242a9caaba3SMauricio Vásquez * Types are recorded in different ways according to the kind of the
2243a9caaba3SMauricio Vásquez * relocation. For field-based relocations only the members that are
2244a9caaba3SMauricio Vásquez * actually used are saved in order to reduce the size of the generated
2245a9caaba3SMauricio Vásquez * BTF file. For type-based relocations empty struct / unions are
2246a9caaba3SMauricio Vásquez * generated and for enum-based relocations the whole type is saved.
2247a9caaba3SMauricio Vásquez *
2248a9caaba3SMauricio Vásquez * The second part of the algorithm generates the BTF object. It creates
2249a9caaba3SMauricio Vásquez * an empty BTF object and fills it with the types recorded in the
2250a9caaba3SMauricio Vásquez * previous step. This function takes care of only adding the structure
2251a9caaba3SMauricio Vásquez * and union members that were marked as used and it also fixes up the
2252a9caaba3SMauricio Vásquez * type IDs on the generated BTF object.
2253a9caaba3SMauricio Vásquez */
minimize_btf(const char * src_btf,const char * dst_btf,const char * objspaths[])22540a9f4a20SMauricio Vásquez static int minimize_btf(const char *src_btf, const char *dst_btf, const char *objspaths[])
22550a9f4a20SMauricio Vásquez {
2256a9caaba3SMauricio Vásquez struct btfgen_info *info;
2257a9caaba3SMauricio Vásquez struct btf *btf_new = NULL;
2258a9caaba3SMauricio Vásquez int err, i;
2259a9caaba3SMauricio Vásquez
2260a9caaba3SMauricio Vásquez info = btfgen_new_info(src_btf);
2261a9caaba3SMauricio Vásquez if (!info) {
2262a9caaba3SMauricio Vásquez err = -errno;
2263a9caaba3SMauricio Vásquez p_err("failed to allocate info structure: %s", strerror(errno));
2264a9caaba3SMauricio Vásquez goto out;
2265a9caaba3SMauricio Vásquez }
2266a9caaba3SMauricio Vásquez
2267a9caaba3SMauricio Vásquez for (i = 0; objspaths[i] != NULL; i++) {
2268a9caaba3SMauricio Vásquez err = btfgen_record_obj(info, objspaths[i]);
2269a9caaba3SMauricio Vásquez if (err) {
2270a9caaba3SMauricio Vásquez p_err("error recording relocations for %s: %s", objspaths[i],
2271a9caaba3SMauricio Vásquez strerror(errno));
2272a9caaba3SMauricio Vásquez goto out;
2273a9caaba3SMauricio Vásquez }
2274a9caaba3SMauricio Vásquez }
2275a9caaba3SMauricio Vásquez
2276a9caaba3SMauricio Vásquez btf_new = btfgen_get_btf(info);
2277a9caaba3SMauricio Vásquez if (!btf_new) {
2278a9caaba3SMauricio Vásquez err = -errno;
2279a9caaba3SMauricio Vásquez p_err("error generating BTF: %s", strerror(errno));
2280a9caaba3SMauricio Vásquez goto out;
2281a9caaba3SMauricio Vásquez }
2282a9caaba3SMauricio Vásquez
2283a9caaba3SMauricio Vásquez err = btf_save_raw(btf_new, dst_btf);
2284a9caaba3SMauricio Vásquez if (err) {
2285a9caaba3SMauricio Vásquez p_err("error saving btf file: %s", strerror(errno));
2286a9caaba3SMauricio Vásquez goto out;
2287a9caaba3SMauricio Vásquez }
2288a9caaba3SMauricio Vásquez
2289a9caaba3SMauricio Vásquez out:
2290a9caaba3SMauricio Vásquez btf__free(btf_new);
2291a9caaba3SMauricio Vásquez btfgen_free_info(info);
2292a9caaba3SMauricio Vásquez
2293a9caaba3SMauricio Vásquez return err;
22940a9f4a20SMauricio Vásquez }
22950a9f4a20SMauricio Vásquez
do_min_core_btf(int argc,char ** argv)22960a9f4a20SMauricio Vásquez static int do_min_core_btf(int argc, char **argv)
22970a9f4a20SMauricio Vásquez {
22980a9f4a20SMauricio Vásquez const char *input, *output, **objs;
22990a9f4a20SMauricio Vásquez int i, err;
23000a9f4a20SMauricio Vásquez
23010a9f4a20SMauricio Vásquez if (!REQ_ARGS(3)) {
23020a9f4a20SMauricio Vásquez usage();
23030a9f4a20SMauricio Vásquez return -1;
23040a9f4a20SMauricio Vásquez }
23050a9f4a20SMauricio Vásquez
23060a9f4a20SMauricio Vásquez input = GET_ARG();
23070a9f4a20SMauricio Vásquez output = GET_ARG();
23080a9f4a20SMauricio Vásquez
23090a9f4a20SMauricio Vásquez objs = (const char **) calloc(argc + 1, sizeof(*objs));
23100a9f4a20SMauricio Vásquez if (!objs) {
23110a9f4a20SMauricio Vásquez p_err("failed to allocate array for object names");
23120a9f4a20SMauricio Vásquez return -ENOMEM;
23130a9f4a20SMauricio Vásquez }
23140a9f4a20SMauricio Vásquez
23150a9f4a20SMauricio Vásquez i = 0;
23160a9f4a20SMauricio Vásquez while (argc)
23170a9f4a20SMauricio Vásquez objs[i++] = GET_ARG();
23180a9f4a20SMauricio Vásquez
23190a9f4a20SMauricio Vásquez err = minimize_btf(input, output, objs);
23200a9f4a20SMauricio Vásquez free(objs);
23210a9f4a20SMauricio Vásquez return err;
23220a9f4a20SMauricio Vásquez }
23230a9f4a20SMauricio Vásquez
2324985ead41SAndrii Nakryiko static const struct cmd cmds[] = {
2325d80b2fcbSAndrii Nakryiko { "object", do_object },
2326985ead41SAndrii Nakryiko { "skeleton", do_skeleton },
232700389c58SDelyan Kratunov { "subskeleton", do_subskeleton },
23280a9f4a20SMauricio Vásquez { "min_core_btf", do_min_core_btf},
2329985ead41SAndrii Nakryiko { "help", do_help },
2330985ead41SAndrii Nakryiko { 0 }
2331985ead41SAndrii Nakryiko };
2332985ead41SAndrii Nakryiko
do_gen(int argc,char ** argv)2333985ead41SAndrii Nakryiko int do_gen(int argc, char **argv)
2334985ead41SAndrii Nakryiko {
2335985ead41SAndrii Nakryiko return cmd_select(cmds, argc, argv, do_help);
2336985ead41SAndrii Nakryiko }
2337