Loading...
1// SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
2/* Copyright (C) 2019 Facebook */
3
4#ifndef _GNU_SOURCE
5#define _GNU_SOURCE
6#endif
7#include <ctype.h>
8#include <errno.h>
9#include <fcntl.h>
10#include <libgen.h>
11#include <linux/err.h>
12#include <stdbool.h>
13#include <stdio.h>
14#include <string.h>
15#include <unistd.h>
16#include <bpf/bpf.h>
17#include <bpf/libbpf.h>
18#include <bpf/libbpf_internal.h>
19#include <sys/types.h>
20#include <sys/stat.h>
21#include <sys/mman.h>
22#include <bpf/btf.h>
23
24#include "json_writer.h"
25#include "main.h"
26
27#define MAX_OBJ_NAME_LEN 64
28
29static void sanitize_identifier(char *name)
30{
31 int i;
32
33 for (i = 0; name[i]; i++)
34 if (!isalnum(name[i]) && name[i] != '_')
35 name[i] = '_';
36}
37
38static bool str_has_prefix(const char *str, const char *prefix)
39{
40 return strncmp(str, prefix, strlen(prefix)) == 0;
41}
42
43static bool str_has_suffix(const char *str, const char *suffix)
44{
45 size_t i, n1 = strlen(str), n2 = strlen(suffix);
46
47 if (n1 < n2)
48 return false;
49
50 for (i = 0; i < n2; i++) {
51 if (str[n1 - i - 1] != suffix[n2 - i - 1])
52 return false;
53 }
54
55 return true;
56}
57
58static const struct btf_type *
59resolve_func_ptr(const struct btf *btf, __u32 id, __u32 *res_id)
60{
61 const struct btf_type *t;
62
63 t = skip_mods_and_typedefs(btf, id, NULL);
64 if (!btf_is_ptr(t))
65 return NULL;
66
67 t = skip_mods_and_typedefs(btf, t->type, res_id);
68
69 return btf_is_func_proto(t) ? t : NULL;
70}
71
72static void get_obj_name(char *name, const char *file)
73{
74 char file_copy[PATH_MAX];
75
76 /* Using basename() POSIX version to be more portable. */
77 strncpy(file_copy, file, PATH_MAX - 1)[PATH_MAX - 1] = '\0';
78 strncpy(name, basename(file_copy), MAX_OBJ_NAME_LEN - 1)[MAX_OBJ_NAME_LEN - 1] = '\0';
79 if (str_has_suffix(name, ".o"))
80 name[strlen(name) - 2] = '\0';
81 sanitize_identifier(name);
82}
83
84static void get_header_guard(char *guard, const char *obj_name, const char *suffix)
85{
86 int i;
87
88 sprintf(guard, "__%s_%s__", obj_name, suffix);
89 for (i = 0; guard[i]; i++)
90 guard[i] = toupper(guard[i]);
91}
92
93static bool get_map_ident(const struct bpf_map *map, char *buf, size_t buf_sz)
94{
95 static const char *sfxs[] = { ".data", ".rodata", ".bss", ".kconfig" };
96 const char *name = bpf_map__name(map);
97 int i, n;
98
99 if (!bpf_map__is_internal(map)) {
100 snprintf(buf, buf_sz, "%s", name);
101 return true;
102 }
103
104 for (i = 0, n = ARRAY_SIZE(sfxs); i < n; i++) {
105 const char *sfx = sfxs[i], *p;
106
107 p = strstr(name, sfx);
108 if (p) {
109 snprintf(buf, buf_sz, "%s", p + 1);
110 sanitize_identifier(buf);
111 return true;
112 }
113 }
114
115 return false;
116}
117
118static bool get_datasec_ident(const char *sec_name, char *buf, size_t buf_sz)
119{
120 static const char *pfxs[] = { ".data", ".rodata", ".bss", ".kconfig" };
121 int i, n;
122
123 /* recognize hard coded LLVM section name */
124 if (strcmp(sec_name, ".addr_space.1") == 0) {
125 /* this is the name to use in skeleton */
126 snprintf(buf, buf_sz, "arena");
127 return true;
128 }
129 for (i = 0, n = ARRAY_SIZE(pfxs); i < n; i++) {
130 const char *pfx = pfxs[i];
131
132 if (str_has_prefix(sec_name, pfx)) {
133 snprintf(buf, buf_sz, "%s", sec_name + 1);
134 sanitize_identifier(buf);
135 return true;
136 }
137 }
138
139 return false;
140}
141
142static void codegen_btf_dump_printf(void *ctx, const char *fmt, va_list args)
143{
144 vprintf(fmt, args);
145}
146
147static int codegen_datasec_def(struct bpf_object *obj,
148 struct btf *btf,
149 struct btf_dump *d,
150 const struct btf_type *sec,
151 const char *obj_name)
152{
153 const char *sec_name = btf__name_by_offset(btf, sec->name_off);
154 const struct btf_var_secinfo *sec_var = btf_var_secinfos(sec);
155 int i, err, off = 0, pad_cnt = 0, vlen = btf_vlen(sec);
156 char var_ident[256], sec_ident[256];
157 bool strip_mods = false;
158
159 if (!get_datasec_ident(sec_name, sec_ident, sizeof(sec_ident)))
160 return 0;
161
162 if (strcmp(sec_name, ".kconfig") != 0)
163 strip_mods = true;
164
165 printf(" struct %s__%s {\n", obj_name, sec_ident);
166 for (i = 0; i < vlen; i++, sec_var++) {
167 const struct btf_type *var = btf__type_by_id(btf, sec_var->type);
168 const char *var_name = btf__name_by_offset(btf, var->name_off);
169 DECLARE_LIBBPF_OPTS(btf_dump_emit_type_decl_opts, opts,
170 .field_name = var_ident,
171 .indent_level = 2,
172 .strip_mods = strip_mods,
173 );
174 int need_off = sec_var->offset, align_off, align;
175 __u32 var_type_id = var->type;
176
177 /* static variables are not exposed through BPF skeleton */
178 if (btf_var(var)->linkage == BTF_VAR_STATIC)
179 continue;
180
181 if (off > need_off) {
182 p_err("Something is wrong for %s's variable #%d: need offset %d, already at %d.\n",
183 sec_name, i, need_off, off);
184 return -EINVAL;
185 }
186
187 align = btf__align_of(btf, var->type);
188 if (align <= 0) {
189 p_err("Failed to determine alignment of variable '%s': %d",
190 var_name, align);
191 return -EINVAL;
192 }
193 /* Assume 32-bit architectures when generating data section
194 * struct memory layout. Given bpftool can't know which target
195 * host architecture it's emitting skeleton for, we need to be
196 * conservative and assume 32-bit one to ensure enough padding
197 * bytes are generated for pointer and long types. This will
198 * still work correctly for 64-bit architectures, because in
199 * the worst case we'll generate unnecessary padding field,
200 * which on 64-bit architectures is not strictly necessary and
201 * would be handled by natural 8-byte alignment. But it still
202 * will be a correct memory layout, based on recorded offsets
203 * in BTF.
204 */
205 if (align > 4)
206 align = 4;
207
208 align_off = (off + align - 1) / align * align;
209 if (align_off != need_off) {
210 printf("\t\tchar __pad%d[%d];\n",
211 pad_cnt, need_off - off);
212 pad_cnt++;
213 }
214
215 /* sanitize variable name, e.g., for static vars inside
216 * a function, it's name is '<function name>.<variable name>',
217 * which we'll turn into a '<function name>_<variable name>'
218 */
219 var_ident[0] = '\0';
220 strncat(var_ident, var_name, sizeof(var_ident) - 1);
221 sanitize_identifier(var_ident);
222
223 printf("\t\t");
224 err = btf_dump__emit_type_decl(d, var_type_id, &opts);
225 if (err)
226 return err;
227 printf(";\n");
228
229 off = sec_var->offset + sec_var->size;
230 }
231 printf(" } *%s;\n", sec_ident);
232 return 0;
233}
234
235static const struct btf_type *find_type_for_map(struct btf *btf, const char *map_ident)
236{
237 int n = btf__type_cnt(btf), i;
238 char sec_ident[256];
239
240 for (i = 1; i < n; i++) {
241 const struct btf_type *t = btf__type_by_id(btf, i);
242 const char *name;
243
244 if (!btf_is_datasec(t))
245 continue;
246
247 name = btf__str_by_offset(btf, t->name_off);
248 if (!get_datasec_ident(name, sec_ident, sizeof(sec_ident)))
249 continue;
250
251 if (strcmp(sec_ident, map_ident) == 0)
252 return t;
253 }
254 return NULL;
255}
256
257static bool is_mmapable_map(const struct bpf_map *map, char *buf, size_t sz)
258{
259 size_t tmp_sz;
260
261 if (bpf_map__type(map) == BPF_MAP_TYPE_ARENA && bpf_map__initial_value(map, &tmp_sz)) {
262 snprintf(buf, sz, "arena");
263 return true;
264 }
265
266 if (!bpf_map__is_internal(map) || !(bpf_map__map_flags(map) & BPF_F_MMAPABLE))
267 return false;
268
269 if (!get_map_ident(map, buf, sz))
270 return false;
271
272 return true;
273}
274
275static int codegen_datasecs(struct bpf_object *obj, const char *obj_name)
276{
277 struct btf *btf = bpf_object__btf(obj);
278 struct btf_dump *d;
279 struct bpf_map *map;
280 const struct btf_type *sec;
281 char map_ident[256];
282 int err = 0;
283
284 d = btf_dump__new(btf, codegen_btf_dump_printf, NULL, NULL);
285 if (!d)
286 return -errno;
287
288 bpf_object__for_each_map(map, obj) {
289 /* only generate definitions for memory-mapped internal maps */
290 if (!is_mmapable_map(map, map_ident, sizeof(map_ident)))
291 continue;
292
293 sec = find_type_for_map(btf, map_ident);
294
295 /* In some cases (e.g., sections like .rodata.cst16 containing
296 * compiler allocated string constants only) there will be
297 * special internal maps with no corresponding DATASEC BTF
298 * type. In such case, generate empty structs for each such
299 * map. It will still be memory-mapped and its contents
300 * accessible from user-space through BPF skeleton.
301 */
302 if (!sec) {
303 printf(" struct %s__%s {\n", obj_name, map_ident);
304 printf(" } *%s;\n", map_ident);
305 } else {
306 err = codegen_datasec_def(obj, btf, d, sec, obj_name);
307 if (err)
308 goto out;
309 }
310 }
311
312
313out:
314 btf_dump__free(d);
315 return err;
316}
317
318static bool btf_is_ptr_to_func_proto(const struct btf *btf,
319 const struct btf_type *v)
320{
321 return btf_is_ptr(v) && btf_is_func_proto(btf__type_by_id(btf, v->type));
322}
323
324static int codegen_subskel_datasecs(struct bpf_object *obj, const char *obj_name)
325{
326 struct btf *btf = bpf_object__btf(obj);
327 struct btf_dump *d;
328 struct bpf_map *map;
329 const struct btf_type *sec, *var;
330 const struct btf_var_secinfo *sec_var;
331 int i, err = 0, vlen;
332 char map_ident[256], sec_ident[256];
333 bool strip_mods = false, needs_typeof = false;
334 const char *sec_name, *var_name;
335 __u32 var_type_id;
336
337 d = btf_dump__new(btf, codegen_btf_dump_printf, NULL, NULL);
338 if (!d)
339 return -errno;
340
341 bpf_object__for_each_map(map, obj) {
342 /* only generate definitions for memory-mapped internal maps */
343 if (!is_mmapable_map(map, map_ident, sizeof(map_ident)))
344 continue;
345
346 sec = find_type_for_map(btf, map_ident);
347 if (!sec)
348 continue;
349
350 sec_name = btf__name_by_offset(btf, sec->name_off);
351 if (!get_datasec_ident(sec_name, sec_ident, sizeof(sec_ident)))
352 continue;
353
354 strip_mods = strcmp(sec_name, ".kconfig") != 0;
355 printf(" struct %s__%s {\n", obj_name, sec_ident);
356
357 sec_var = btf_var_secinfos(sec);
358 vlen = btf_vlen(sec);
359 for (i = 0; i < vlen; i++, sec_var++) {
360 DECLARE_LIBBPF_OPTS(btf_dump_emit_type_decl_opts, opts,
361 .indent_level = 2,
362 .strip_mods = strip_mods,
363 /* we'll print the name separately */
364 .field_name = "",
365 );
366
367 var = btf__type_by_id(btf, sec_var->type);
368 var_name = btf__name_by_offset(btf, var->name_off);
369 var_type_id = var->type;
370
371 /* static variables are not exposed through BPF skeleton */
372 if (btf_var(var)->linkage == BTF_VAR_STATIC)
373 continue;
374
375 /* The datasec member has KIND_VAR but we want the
376 * underlying type of the variable (e.g. KIND_INT).
377 */
378 var = skip_mods_and_typedefs(btf, var->type, NULL);
379
380 printf("\t\t");
381 /* Func and array members require special handling.
382 * Instead of producing `typename *var`, they produce
383 * `typeof(typename) *var`. This allows us to keep a
384 * similar syntax where the identifier is just prefixed
385 * by *, allowing us to ignore C declaration minutiae.
386 */
387 needs_typeof = btf_is_array(var) || btf_is_ptr_to_func_proto(btf, var);
388 if (needs_typeof)
389 printf("__typeof__(");
390
391 err = btf_dump__emit_type_decl(d, var_type_id, &opts);
392 if (err)
393 goto out;
394
395 if (needs_typeof)
396 printf(")");
397
398 printf(" *%s;\n", var_name);
399 }
400 printf(" } %s;\n", sec_ident);
401 }
402
403out:
404 btf_dump__free(d);
405 return err;
406}
407
408static void codegen(const char *template, ...)
409{
410 const char *src, *end;
411 int skip_tabs = 0, n;
412 char *s, *dst;
413 va_list args;
414 char c;
415
416 n = strlen(template);
417 s = malloc(n + 1);
418 if (!s)
419 exit(-1);
420 src = template;
421 dst = s;
422
423 /* find out "baseline" indentation to skip */
424 while ((c = *src++)) {
425 if (c == '\t') {
426 skip_tabs++;
427 } else if (c == '\n') {
428 break;
429 } else {
430 p_err("unrecognized character at pos %td in template '%s': '%c'",
431 src - template - 1, template, c);
432 free(s);
433 exit(-1);
434 }
435 }
436
437 while (*src) {
438 /* skip baseline indentation tabs */
439 for (n = skip_tabs; n > 0; n--, src++) {
440 if (*src != '\t') {
441 p_err("not enough tabs at pos %td in template '%s'",
442 src - template - 1, template);
443 free(s);
444 exit(-1);
445 }
446 }
447 /* trim trailing whitespace */
448 end = strchrnul(src, '\n');
449 for (n = end - src; n > 0 && isspace(src[n - 1]); n--)
450 ;
451 memcpy(dst, src, n);
452 dst += n;
453 if (*end)
454 *dst++ = '\n';
455 src = *end ? end + 1 : end;
456 }
457 *dst++ = '\0';
458
459 /* print out using adjusted template */
460 va_start(args, template);
461 n = vprintf(s, args);
462 va_end(args);
463
464 free(s);
465}
466
467static void print_hex(const char *data, int data_sz)
468{
469 int i, len;
470
471 for (i = 0, len = 0; i < data_sz; i++) {
472 int w = data[i] ? 4 : 2;
473
474 len += w;
475 if (len > 78) {
476 printf("\\\n");
477 len = w;
478 }
479 if (!data[i])
480 printf("\\0");
481 else
482 printf("\\x%02x", (unsigned char)data[i]);
483 }
484}
485
486static size_t bpf_map_mmap_sz(const struct bpf_map *map)
487{
488 long page_sz = sysconf(_SC_PAGE_SIZE);
489 size_t map_sz;
490
491 map_sz = (size_t)roundup(bpf_map__value_size(map), 8) * bpf_map__max_entries(map);
492 map_sz = roundup(map_sz, page_sz);
493 return map_sz;
494}
495
496/* Emit type size asserts for all top-level fields in memory-mapped internal maps. */
497static void codegen_asserts(struct bpf_object *obj, const char *obj_name)
498{
499 struct btf *btf = bpf_object__btf(obj);
500 struct bpf_map *map;
501 struct btf_var_secinfo *sec_var;
502 int i, vlen;
503 const struct btf_type *sec;
504 char map_ident[256], var_ident[256];
505
506 if (!btf)
507 return;
508
509 codegen("\
510 \n\
511 __attribute__((unused)) static void \n\
512 %1$s__assert(struct %1$s *s __attribute__((unused))) \n\
513 { \n\
514 #ifdef __cplusplus \n\
515 #define _Static_assert static_assert \n\
516 #endif \n\
517 ", obj_name);
518
519 bpf_object__for_each_map(map, obj) {
520 if (!is_mmapable_map(map, map_ident, sizeof(map_ident)))
521 continue;
522
523 sec = find_type_for_map(btf, map_ident);
524 if (!sec) {
525 /* best effort, couldn't find the type for this map */
526 continue;
527 }
528
529 sec_var = btf_var_secinfos(sec);
530 vlen = btf_vlen(sec);
531
532 for (i = 0; i < vlen; i++, sec_var++) {
533 const struct btf_type *var = btf__type_by_id(btf, sec_var->type);
534 const char *var_name = btf__name_by_offset(btf, var->name_off);
535 long var_size;
536
537 /* static variables are not exposed through BPF skeleton */
538 if (btf_var(var)->linkage == BTF_VAR_STATIC)
539 continue;
540
541 var_size = btf__resolve_size(btf, var->type);
542 if (var_size < 0)
543 continue;
544
545 var_ident[0] = '\0';
546 strncat(var_ident, var_name, sizeof(var_ident) - 1);
547 sanitize_identifier(var_ident);
548
549 printf("\t_Static_assert(sizeof(s->%s->%s) == %ld, \"unexpected size of '%s'\");\n",
550 map_ident, var_ident, var_size, var_ident);
551 }
552 }
553 codegen("\
554 \n\
555 #ifdef __cplusplus \n\
556 #undef _Static_assert \n\
557 #endif \n\
558 } \n\
559 ");
560}
561
562static void codegen_attach_detach(struct bpf_object *obj, const char *obj_name)
563{
564 struct bpf_program *prog;
565
566 bpf_object__for_each_program(prog, obj) {
567 const char *tp_name;
568
569 codegen("\
570 \n\
571 \n\
572 static inline int \n\
573 %1$s__%2$s__attach(struct %1$s *skel) \n\
574 { \n\
575 int prog_fd = skel->progs.%2$s.prog_fd; \n\
576 ", obj_name, bpf_program__name(prog));
577
578 switch (bpf_program__type(prog)) {
579 case BPF_PROG_TYPE_RAW_TRACEPOINT:
580 tp_name = strchr(bpf_program__section_name(prog), '/') + 1;
581 printf("\tint fd = skel_raw_tracepoint_open(\"%s\", prog_fd);\n", tp_name);
582 break;
583 case BPF_PROG_TYPE_TRACING:
584 case BPF_PROG_TYPE_LSM:
585 if (bpf_program__expected_attach_type(prog) == BPF_TRACE_ITER)
586 printf("\tint fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER);\n");
587 else
588 printf("\tint fd = skel_raw_tracepoint_open(NULL, prog_fd);\n");
589 break;
590 default:
591 printf("\tint fd = ((void)prog_fd, 0); /* auto-attach not supported */\n");
592 break;
593 }
594 codegen("\
595 \n\
596 \n\
597 if (fd > 0) \n\
598 skel->links.%1$s_fd = fd; \n\
599 return fd; \n\
600 } \n\
601 ", bpf_program__name(prog));
602 }
603
604 codegen("\
605 \n\
606 \n\
607 static inline int \n\
608 %1$s__attach(struct %1$s *skel) \n\
609 { \n\
610 int ret = 0; \n\
611 \n\
612 ", obj_name);
613
614 bpf_object__for_each_program(prog, obj) {
615 codegen("\
616 \n\
617 ret = ret < 0 ? ret : %1$s__%2$s__attach(skel); \n\
618 ", obj_name, bpf_program__name(prog));
619 }
620
621 codegen("\
622 \n\
623 return ret < 0 ? ret : 0; \n\
624 } \n\
625 \n\
626 static inline void \n\
627 %1$s__detach(struct %1$s *skel) \n\
628 { \n\
629 ", obj_name);
630
631 bpf_object__for_each_program(prog, obj) {
632 codegen("\
633 \n\
634 skel_closenz(skel->links.%1$s_fd); \n\
635 ", bpf_program__name(prog));
636 }
637
638 codegen("\
639 \n\
640 } \n\
641 ");
642}
643
644static void codegen_destroy(struct bpf_object *obj, const char *obj_name)
645{
646 struct bpf_program *prog;
647 struct bpf_map *map;
648 char ident[256];
649
650 codegen("\
651 \n\
652 static void \n\
653 %1$s__destroy(struct %1$s *skel) \n\
654 { \n\
655 if (!skel) \n\
656 return; \n\
657 %1$s__detach(skel); \n\
658 ",
659 obj_name);
660
661 bpf_object__for_each_program(prog, obj) {
662 codegen("\
663 \n\
664 skel_closenz(skel->progs.%1$s.prog_fd); \n\
665 ", bpf_program__name(prog));
666 }
667
668 bpf_object__for_each_map(map, obj) {
669 if (!get_map_ident(map, ident, sizeof(ident)))
670 continue;
671 if (bpf_map__is_internal(map) &&
672 (bpf_map__map_flags(map) & BPF_F_MMAPABLE))
673 printf("\tskel_free_map_data(skel->%1$s, skel->maps.%1$s.initial_value, %2$zd);\n",
674 ident, bpf_map_mmap_sz(map));
675 codegen("\
676 \n\
677 skel_closenz(skel->maps.%1$s.map_fd); \n\
678 ", ident);
679 }
680 codegen("\
681 \n\
682 skel_free(skel); \n\
683 } \n\
684 ",
685 obj_name);
686}
687
688static int gen_trace(struct bpf_object *obj, const char *obj_name, const char *header_guard)
689{
690 DECLARE_LIBBPF_OPTS(gen_loader_opts, opts);
691 struct bpf_map *map;
692 char ident[256];
693 int err = 0;
694
695 err = bpf_object__gen_loader(obj, &opts);
696 if (err)
697 return err;
698
699 err = bpf_object__load(obj);
700 if (err) {
701 p_err("failed to load object file");
702 goto out;
703 }
704 /* If there was no error during load then gen_loader_opts
705 * are populated with the loader program.
706 */
707
708 /* finish generating 'struct skel' */
709 codegen("\
710 \n\
711 }; \n\
712 ", obj_name);
713
714
715 codegen_attach_detach(obj, obj_name);
716
717 codegen_destroy(obj, obj_name);
718
719 codegen("\
720 \n\
721 static inline struct %1$s * \n\
722 %1$s__open(void) \n\
723 { \n\
724 struct %1$s *skel; \n\
725 \n\
726 skel = skel_alloc(sizeof(*skel)); \n\
727 if (!skel) \n\
728 goto cleanup; \n\
729 skel->ctx.sz = (void *)&skel->links - (void *)skel; \n\
730 ",
731 obj_name, opts.data_sz);
732 bpf_object__for_each_map(map, obj) {
733 const void *mmap_data = NULL;
734 size_t mmap_size = 0;
735
736 if (!is_mmapable_map(map, ident, sizeof(ident)))
737 continue;
738
739 codegen("\
740 \n\
741 { \n\
742 static const char data[] __attribute__((__aligned__(8))) = \"\\\n\
743 ");
744 mmap_data = bpf_map__initial_value(map, &mmap_size);
745 print_hex(mmap_data, mmap_size);
746 codegen("\
747 \n\
748 \"; \n\
749 \n\
750 skel->%1$s = skel_prep_map_data((void *)data, %2$zd,\n\
751 sizeof(data) - 1);\n\
752 if (!skel->%1$s) \n\
753 goto cleanup; \n\
754 skel->maps.%1$s.initial_value = (__u64) (long) skel->%1$s;\n\
755 } \n\
756 ", ident, bpf_map_mmap_sz(map));
757 }
758 codegen("\
759 \n\
760 return skel; \n\
761 cleanup: \n\
762 %1$s__destroy(skel); \n\
763 return NULL; \n\
764 } \n\
765 \n\
766 static inline int \n\
767 %1$s__load(struct %1$s *skel) \n\
768 { \n\
769 struct bpf_load_and_run_opts opts = {}; \n\
770 int err; \n\
771 static const char opts_data[] __attribute__((__aligned__(8))) = \"\\\n\
772 ",
773 obj_name);
774 print_hex(opts.data, opts.data_sz);
775 codegen("\
776 \n\
777 \"; \n\
778 static const char opts_insn[] __attribute__((__aligned__(8))) = \"\\\n\
779 ");
780 print_hex(opts.insns, opts.insns_sz);
781 codegen("\
782 \n\
783 \"; \n\
784 \n\
785 opts.ctx = (struct bpf_loader_ctx *)skel; \n\
786 opts.data_sz = sizeof(opts_data) - 1; \n\
787 opts.data = (void *)opts_data; \n\
788 opts.insns_sz = sizeof(opts_insn) - 1; \n\
789 opts.insns = (void *)opts_insn; \n\
790 \n\
791 err = bpf_load_and_run(&opts); \n\
792 if (err < 0) \n\
793 return err; \n\
794 ");
795 bpf_object__for_each_map(map, obj) {
796 const char *mmap_flags;
797
798 if (!is_mmapable_map(map, ident, sizeof(ident)))
799 continue;
800
801 if (bpf_map__map_flags(map) & BPF_F_RDONLY_PROG)
802 mmap_flags = "PROT_READ";
803 else
804 mmap_flags = "PROT_READ | PROT_WRITE";
805
806 codegen("\
807 \n\
808 skel->%1$s = skel_finalize_map_data(&skel->maps.%1$s.initial_value, \n\
809 %2$zd, %3$s, skel->maps.%1$s.map_fd);\n\
810 if (!skel->%1$s) \n\
811 return -ENOMEM; \n\
812 ",
813 ident, bpf_map_mmap_sz(map), mmap_flags);
814 }
815 codegen("\
816 \n\
817 return 0; \n\
818 } \n\
819 \n\
820 static inline struct %1$s * \n\
821 %1$s__open_and_load(void) \n\
822 { \n\
823 struct %1$s *skel; \n\
824 \n\
825 skel = %1$s__open(); \n\
826 if (!skel) \n\
827 return NULL; \n\
828 if (%1$s__load(skel)) { \n\
829 %1$s__destroy(skel); \n\
830 return NULL; \n\
831 } \n\
832 return skel; \n\
833 } \n\
834 \n\
835 ", obj_name);
836
837 codegen_asserts(obj, obj_name);
838
839 codegen("\
840 \n\
841 \n\
842 #endif /* %s */ \n\
843 ",
844 header_guard);
845 err = 0;
846out:
847 return err;
848}
849
850static void
851codegen_maps_skeleton(struct bpf_object *obj, size_t map_cnt, bool mmaped, bool populate_links)
852{
853 struct bpf_map *map;
854 char ident[256];
855 size_t i, map_sz;
856
857 if (!map_cnt)
858 return;
859
860 /* for backward compatibility with old libbpf versions that don't
861 * handle new BPF skeleton with new struct bpf_map_skeleton definition
862 * that includes link field, avoid specifying new increased size,
863 * unless we absolutely have to (i.e., if there are struct_ops maps
864 * present)
865 */
866 map_sz = offsetof(struct bpf_map_skeleton, link);
867 if (populate_links) {
868 bpf_object__for_each_map(map, obj) {
869 if (bpf_map__type(map) == BPF_MAP_TYPE_STRUCT_OPS) {
870 map_sz = sizeof(struct bpf_map_skeleton);
871 break;
872 }
873 }
874 }
875
876 codegen("\
877 \n\
878 \n\
879 /* maps */ \n\
880 s->map_cnt = %zu; \n\
881 s->map_skel_sz = %zu; \n\
882 s->maps = (struct bpf_map_skeleton *)calloc(s->map_cnt,\n\
883 sizeof(*s->maps) > %zu ? sizeof(*s->maps) : %zu);\n\
884 if (!s->maps) { \n\
885 err = -ENOMEM; \n\
886 goto err; \n\
887 } \n\
888 ",
889 map_cnt, map_sz, map_sz, map_sz
890 );
891 i = 0;
892 bpf_object__for_each_map(map, obj) {
893 if (!get_map_ident(map, ident, sizeof(ident)))
894 continue;
895
896 codegen("\
897 \n\
898 \n\
899 map = (struct bpf_map_skeleton *)((char *)s->maps + %zu * s->map_skel_sz);\n\
900 map->name = \"%s\"; \n\
901 map->map = &obj->maps.%s; \n\
902 ",
903 i, bpf_map__name(map), ident);
904 /* memory-mapped internal maps */
905 if (mmaped && is_mmapable_map(map, ident, sizeof(ident))) {
906 printf("\tmap->mmaped = (void **)&obj->%s;\n", ident);
907 }
908
909 if (populate_links && bpf_map__type(map) == BPF_MAP_TYPE_STRUCT_OPS) {
910 codegen("\
911 \n\
912 map->link = &obj->links.%s; \n\
913 ", ident);
914 }
915 i++;
916 }
917}
918
919static void
920codegen_progs_skeleton(struct bpf_object *obj, size_t prog_cnt, bool populate_links)
921{
922 struct bpf_program *prog;
923 int i;
924
925 if (!prog_cnt)
926 return;
927
928 codegen("\
929 \n\
930 \n\
931 /* programs */ \n\
932 s->prog_cnt = %zu; \n\
933 s->prog_skel_sz = sizeof(*s->progs); \n\
934 s->progs = (struct bpf_prog_skeleton *)calloc(s->prog_cnt, s->prog_skel_sz);\n\
935 if (!s->progs) { \n\
936 err = -ENOMEM; \n\
937 goto err; \n\
938 } \n\
939 ",
940 prog_cnt
941 );
942 i = 0;
943 bpf_object__for_each_program(prog, obj) {
944 codegen("\
945 \n\
946 \n\
947 s->progs[%1$zu].name = \"%2$s\"; \n\
948 s->progs[%1$zu].prog = &obj->progs.%2$s;\n\
949 ",
950 i, bpf_program__name(prog));
951
952 if (populate_links) {
953 codegen("\
954 \n\
955 s->progs[%1$zu].link = &obj->links.%2$s;\n\
956 ",
957 i, bpf_program__name(prog));
958 }
959 i++;
960 }
961}
962
963static int walk_st_ops_shadow_vars(struct btf *btf, const char *ident,
964 const struct btf_type *map_type, __u32 map_type_id)
965{
966 LIBBPF_OPTS(btf_dump_emit_type_decl_opts, opts, .indent_level = 3);
967 const struct btf_type *member_type;
968 __u32 offset, next_offset = 0;
969 const struct btf_member *m;
970 struct btf_dump *d = NULL;
971 const char *member_name;
972 __u32 member_type_id;
973 int i, err = 0, n;
974 int size;
975
976 d = btf_dump__new(btf, codegen_btf_dump_printf, NULL, NULL);
977 if (!d)
978 return -errno;
979
980 n = btf_vlen(map_type);
981 for (i = 0, m = btf_members(map_type); i < n; i++, m++) {
982 member_type = skip_mods_and_typedefs(btf, m->type, &member_type_id);
983 member_name = btf__name_by_offset(btf, m->name_off);
984
985 offset = m->offset / 8;
986 if (next_offset < offset)
987 printf("\t\t\tchar __padding_%d[%d];\n", i, offset - next_offset);
988
989 switch (btf_kind(member_type)) {
990 case BTF_KIND_INT:
991 case BTF_KIND_FLOAT:
992 case BTF_KIND_ENUM:
993 case BTF_KIND_ENUM64:
994 /* scalar type */
995 printf("\t\t\t");
996 opts.field_name = member_name;
997 err = btf_dump__emit_type_decl(d, member_type_id, &opts);
998 if (err) {
999 p_err("Failed to emit type declaration for %s: %d", member_name, err);
1000 goto out;
1001 }
1002 printf(";\n");
1003
1004 size = btf__resolve_size(btf, member_type_id);
1005 if (size < 0) {
1006 p_err("Failed to resolve size of %s: %d\n", member_name, size);
1007 err = size;
1008 goto out;
1009 }
1010
1011 next_offset = offset + size;
1012 break;
1013
1014 case BTF_KIND_PTR:
1015 if (resolve_func_ptr(btf, m->type, NULL)) {
1016 /* Function pointer */
1017 printf("\t\t\tstruct bpf_program *%s;\n", member_name);
1018
1019 next_offset = offset + sizeof(void *);
1020 break;
1021 }
1022 /* All pointer types are unsupported except for
1023 * function pointers.
1024 */
1025 fallthrough;
1026
1027 default:
1028 /* Unsupported types
1029 *
1030 * Types other than scalar types and function
1031 * pointers are currently not supported in order to
1032 * prevent conflicts in the generated code caused
1033 * by multiple definitions. For instance, if the
1034 * struct type FOO is used in a struct_ops map,
1035 * bpftool has to generate definitions for FOO,
1036 * which may result in conflicts if FOO is defined
1037 * in different skeleton files.
1038 */
1039 size = btf__resolve_size(btf, member_type_id);
1040 if (size < 0) {
1041 p_err("Failed to resolve size of %s: %d\n", member_name, size);
1042 err = size;
1043 goto out;
1044 }
1045 printf("\t\t\tchar __unsupported_%d[%d];\n", i, size);
1046
1047 next_offset = offset + size;
1048 break;
1049 }
1050 }
1051
1052 /* Cannot fail since it must be a struct type */
1053 size = btf__resolve_size(btf, map_type_id);
1054 if (next_offset < (__u32)size)
1055 printf("\t\t\tchar __padding_end[%d];\n", size - next_offset);
1056
1057out:
1058 btf_dump__free(d);
1059
1060 return err;
1061}
1062
1063/* Generate the pointer of the shadow type for a struct_ops map.
1064 *
1065 * This function adds a pointer of the shadow type for a struct_ops map.
1066 * The members of a struct_ops map can be exported through a pointer to a
1067 * shadow type. The user can access these members through the pointer.
1068 *
1069 * A shadow type includes not all members, only members of some types.
1070 * They are scalar types and function pointers. The function pointers are
1071 * translated to the pointer of the struct bpf_program. The scalar types
1072 * are translated to the original type without any modifiers.
1073 *
1074 * Unsupported types will be translated to a char array to occupy the same
1075 * space as the original field, being renamed as __unsupported_*. The user
1076 * should treat these fields as opaque data.
1077 */
1078static int gen_st_ops_shadow_type(const char *obj_name, struct btf *btf, const char *ident,
1079 const struct bpf_map *map)
1080{
1081 const struct btf_type *map_type;
1082 const char *type_name;
1083 __u32 map_type_id;
1084 int err;
1085
1086 map_type_id = bpf_map__btf_value_type_id(map);
1087 if (map_type_id == 0)
1088 return -EINVAL;
1089 map_type = btf__type_by_id(btf, map_type_id);
1090 if (!map_type)
1091 return -EINVAL;
1092
1093 type_name = btf__name_by_offset(btf, map_type->name_off);
1094
1095 printf("\t\tstruct %s__%s__%s {\n", obj_name, ident, type_name);
1096
1097 err = walk_st_ops_shadow_vars(btf, ident, map_type, map_type_id);
1098 if (err)
1099 return err;
1100
1101 printf("\t\t} *%s;\n", ident);
1102
1103 return 0;
1104}
1105
1106static int gen_st_ops_shadow(const char *obj_name, struct btf *btf, struct bpf_object *obj)
1107{
1108 int err, st_ops_cnt = 0;
1109 struct bpf_map *map;
1110 char ident[256];
1111
1112 if (!btf)
1113 return 0;
1114
1115 /* Generate the pointers to shadow types of
1116 * struct_ops maps.
1117 */
1118 bpf_object__for_each_map(map, obj) {
1119 if (bpf_map__type(map) != BPF_MAP_TYPE_STRUCT_OPS)
1120 continue;
1121 if (!get_map_ident(map, ident, sizeof(ident)))
1122 continue;
1123
1124 if (st_ops_cnt == 0) /* first struct_ops map */
1125 printf("\tstruct {\n");
1126 st_ops_cnt++;
1127
1128 err = gen_st_ops_shadow_type(obj_name, btf, ident, map);
1129 if (err)
1130 return err;
1131 }
1132
1133 if (st_ops_cnt)
1134 printf("\t} struct_ops;\n");
1135
1136 return 0;
1137}
1138
1139/* Generate the code to initialize the pointers of shadow types. */
1140static void gen_st_ops_shadow_init(struct btf *btf, struct bpf_object *obj)
1141{
1142 struct bpf_map *map;
1143 char ident[256];
1144
1145 if (!btf)
1146 return;
1147
1148 /* Initialize the pointers to_ops shadow types of
1149 * struct_ops maps.
1150 */
1151 bpf_object__for_each_map(map, obj) {
1152 if (bpf_map__type(map) != BPF_MAP_TYPE_STRUCT_OPS)
1153 continue;
1154 if (!get_map_ident(map, ident, sizeof(ident)))
1155 continue;
1156 codegen("\
1157 \n\
1158 obj->struct_ops.%1$s = (__typeof__(obj->struct_ops.%1$s))\n\
1159 bpf_map__initial_value(obj->maps.%1$s, NULL);\n\
1160 \n\
1161 ", ident);
1162 }
1163}
1164
1165static int do_skeleton(int argc, char **argv)
1166{
1167 char header_guard[MAX_OBJ_NAME_LEN + sizeof("__SKEL_H__")];
1168 size_t map_cnt = 0, prog_cnt = 0, attach_map_cnt = 0, file_sz, mmap_sz;
1169 DECLARE_LIBBPF_OPTS(bpf_object_open_opts, opts);
1170 char obj_name[MAX_OBJ_NAME_LEN] = "", *obj_data;
1171 struct bpf_object *obj = NULL;
1172 const char *file;
1173 char ident[256];
1174 struct bpf_program *prog;
1175 int fd, err = -1;
1176 struct bpf_map *map;
1177 struct btf *btf;
1178 struct stat st;
1179
1180 if (!REQ_ARGS(1)) {
1181 usage();
1182 return -1;
1183 }
1184 file = GET_ARG();
1185
1186 while (argc) {
1187 if (!REQ_ARGS(2))
1188 return -1;
1189
1190 if (is_prefix(*argv, "name")) {
1191 NEXT_ARG();
1192
1193 if (obj_name[0] != '\0') {
1194 p_err("object name already specified");
1195 return -1;
1196 }
1197
1198 strncpy(obj_name, *argv, MAX_OBJ_NAME_LEN - 1);
1199 obj_name[MAX_OBJ_NAME_LEN - 1] = '\0';
1200 } else {
1201 p_err("unknown arg %s", *argv);
1202 return -1;
1203 }
1204
1205 NEXT_ARG();
1206 }
1207
1208 if (argc) {
1209 p_err("extra unknown arguments");
1210 return -1;
1211 }
1212
1213 if (stat(file, &st)) {
1214 p_err("failed to stat() %s: %s", file, strerror(errno));
1215 return -1;
1216 }
1217 file_sz = st.st_size;
1218 mmap_sz = roundup(file_sz, sysconf(_SC_PAGE_SIZE));
1219 fd = open(file, O_RDONLY);
1220 if (fd < 0) {
1221 p_err("failed to open() %s: %s", file, strerror(errno));
1222 return -1;
1223 }
1224 obj_data = mmap(NULL, mmap_sz, PROT_READ, MAP_PRIVATE, fd, 0);
1225 if (obj_data == MAP_FAILED) {
1226 obj_data = NULL;
1227 p_err("failed to mmap() %s: %s", file, strerror(errno));
1228 goto out;
1229 }
1230 if (obj_name[0] == '\0')
1231 get_obj_name(obj_name, file);
1232 opts.object_name = obj_name;
1233 if (verifier_logs)
1234 /* log_level1 + log_level2 + stats, but not stable UAPI */
1235 opts.kernel_log_level = 1 + 2 + 4;
1236 obj = bpf_object__open_mem(obj_data, file_sz, &opts);
1237 if (!obj) {
1238 char err_buf[256];
1239
1240 err = -errno;
1241 libbpf_strerror(err, err_buf, sizeof(err_buf));
1242 p_err("failed to open BPF object file: %s", err_buf);
1243 goto out;
1244 }
1245
1246 bpf_object__for_each_map(map, obj) {
1247 if (!get_map_ident(map, ident, sizeof(ident))) {
1248 p_err("ignoring unrecognized internal map '%s'...",
1249 bpf_map__name(map));
1250 continue;
1251 }
1252
1253 if (bpf_map__type(map) == BPF_MAP_TYPE_STRUCT_OPS)
1254 attach_map_cnt++;
1255
1256 map_cnt++;
1257 }
1258 bpf_object__for_each_program(prog, obj) {
1259 prog_cnt++;
1260 }
1261
1262 get_header_guard(header_guard, obj_name, "SKEL_H");
1263 if (use_loader) {
1264 codegen("\
1265 \n\
1266 /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */ \n\
1267 /* THIS FILE IS AUTOGENERATED BY BPFTOOL! */ \n\
1268 #ifndef %2$s \n\
1269 #define %2$s \n\
1270 \n\
1271 #include <bpf/skel_internal.h> \n\
1272 \n\
1273 struct %1$s { \n\
1274 struct bpf_loader_ctx ctx; \n\
1275 ",
1276 obj_name, header_guard
1277 );
1278 } else {
1279 codegen("\
1280 \n\
1281 /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */ \n\
1282 \n\
1283 /* THIS FILE IS AUTOGENERATED BY BPFTOOL! */ \n\
1284 #ifndef %2$s \n\
1285 #define %2$s \n\
1286 \n\
1287 #include <errno.h> \n\
1288 #include <stdlib.h> \n\
1289 #include <bpf/libbpf.h> \n\
1290 \n\
1291 #define BPF_SKEL_SUPPORTS_MAP_AUTO_ATTACH 1 \n\
1292 \n\
1293 struct %1$s { \n\
1294 struct bpf_object_skeleton *skeleton; \n\
1295 struct bpf_object *obj; \n\
1296 ",
1297 obj_name, header_guard
1298 );
1299 }
1300
1301 if (map_cnt) {
1302 printf("\tstruct {\n");
1303 bpf_object__for_each_map(map, obj) {
1304 if (!get_map_ident(map, ident, sizeof(ident)))
1305 continue;
1306 if (use_loader)
1307 printf("\t\tstruct bpf_map_desc %s;\n", ident);
1308 else
1309 printf("\t\tstruct bpf_map *%s;\n", ident);
1310 }
1311 printf("\t} maps;\n");
1312 }
1313
1314 btf = bpf_object__btf(obj);
1315 err = gen_st_ops_shadow(obj_name, btf, obj);
1316 if (err)
1317 goto out;
1318
1319 if (prog_cnt) {
1320 printf("\tstruct {\n");
1321 bpf_object__for_each_program(prog, obj) {
1322 if (use_loader)
1323 printf("\t\tstruct bpf_prog_desc %s;\n",
1324 bpf_program__name(prog));
1325 else
1326 printf("\t\tstruct bpf_program *%s;\n",
1327 bpf_program__name(prog));
1328 }
1329 printf("\t} progs;\n");
1330 }
1331
1332 if (prog_cnt + attach_map_cnt) {
1333 printf("\tstruct {\n");
1334 bpf_object__for_each_program(prog, obj) {
1335 if (use_loader)
1336 printf("\t\tint %s_fd;\n",
1337 bpf_program__name(prog));
1338 else
1339 printf("\t\tstruct bpf_link *%s;\n",
1340 bpf_program__name(prog));
1341 }
1342
1343 bpf_object__for_each_map(map, obj) {
1344 if (!get_map_ident(map, ident, sizeof(ident)))
1345 continue;
1346 if (bpf_map__type(map) != BPF_MAP_TYPE_STRUCT_OPS)
1347 continue;
1348
1349 if (use_loader)
1350 printf("t\tint %s_fd;\n", ident);
1351 else
1352 printf("\t\tstruct bpf_link *%s;\n", ident);
1353 }
1354
1355 printf("\t} links;\n");
1356 }
1357
1358 if (btf) {
1359 err = codegen_datasecs(obj, obj_name);
1360 if (err)
1361 goto out;
1362 }
1363 if (use_loader) {
1364 err = gen_trace(obj, obj_name, header_guard);
1365 goto out;
1366 }
1367
1368 codegen("\
1369 \n\
1370 \n\
1371 #ifdef __cplusplus \n\
1372 static inline struct %1$s *open(const struct bpf_object_open_opts *opts = nullptr);\n\
1373 static inline struct %1$s *open_and_load(); \n\
1374 static inline int load(struct %1$s *skel); \n\
1375 static inline int attach(struct %1$s *skel); \n\
1376 static inline void detach(struct %1$s *skel); \n\
1377 static inline void destroy(struct %1$s *skel); \n\
1378 static inline const void *elf_bytes(size_t *sz); \n\
1379 #endif /* __cplusplus */ \n\
1380 }; \n\
1381 \n\
1382 static void \n\
1383 %1$s__destroy(struct %1$s *obj) \n\
1384 { \n\
1385 if (!obj) \n\
1386 return; \n\
1387 if (obj->skeleton) \n\
1388 bpf_object__destroy_skeleton(obj->skeleton);\n\
1389 free(obj); \n\
1390 } \n\
1391 \n\
1392 static inline int \n\
1393 %1$s__create_skeleton(struct %1$s *obj); \n\
1394 \n\
1395 static inline struct %1$s * \n\
1396 %1$s__open_opts(const struct bpf_object_open_opts *opts) \n\
1397 { \n\
1398 struct %1$s *obj; \n\
1399 int err; \n\
1400 \n\
1401 obj = (struct %1$s *)calloc(1, sizeof(*obj)); \n\
1402 if (!obj) { \n\
1403 errno = ENOMEM; \n\
1404 return NULL; \n\
1405 } \n\
1406 \n\
1407 err = %1$s__create_skeleton(obj); \n\
1408 if (err) \n\
1409 goto err_out; \n\
1410 \n\
1411 err = bpf_object__open_skeleton(obj->skeleton, opts);\n\
1412 if (err) \n\
1413 goto err_out; \n\
1414 \n\
1415 ", obj_name);
1416
1417 gen_st_ops_shadow_init(btf, obj);
1418
1419 codegen("\
1420 \n\
1421 return obj; \n\
1422 err_out: \n\
1423 %1$s__destroy(obj); \n\
1424 errno = -err; \n\
1425 return NULL; \n\
1426 } \n\
1427 \n\
1428 static inline struct %1$s * \n\
1429 %1$s__open(void) \n\
1430 { \n\
1431 return %1$s__open_opts(NULL); \n\
1432 } \n\
1433 \n\
1434 static inline int \n\
1435 %1$s__load(struct %1$s *obj) \n\
1436 { \n\
1437 return bpf_object__load_skeleton(obj->skeleton); \n\
1438 } \n\
1439 \n\
1440 static inline struct %1$s * \n\
1441 %1$s__open_and_load(void) \n\
1442 { \n\
1443 struct %1$s *obj; \n\
1444 int err; \n\
1445 \n\
1446 obj = %1$s__open(); \n\
1447 if (!obj) \n\
1448 return NULL; \n\
1449 err = %1$s__load(obj); \n\
1450 if (err) { \n\
1451 %1$s__destroy(obj); \n\
1452 errno = -err; \n\
1453 return NULL; \n\
1454 } \n\
1455 return obj; \n\
1456 } \n\
1457 \n\
1458 static inline int \n\
1459 %1$s__attach(struct %1$s *obj) \n\
1460 { \n\
1461 return bpf_object__attach_skeleton(obj->skeleton); \n\
1462 } \n\
1463 \n\
1464 static inline void \n\
1465 %1$s__detach(struct %1$s *obj) \n\
1466 { \n\
1467 bpf_object__detach_skeleton(obj->skeleton); \n\
1468 } \n\
1469 ",
1470 obj_name
1471 );
1472
1473 codegen("\
1474 \n\
1475 \n\
1476 static inline const void *%1$s__elf_bytes(size_t *sz); \n\
1477 \n\
1478 static inline int \n\
1479 %1$s__create_skeleton(struct %1$s *obj) \n\
1480 { \n\
1481 struct bpf_object_skeleton *s; \n\
1482 struct bpf_map_skeleton *map __attribute__((unused));\n\
1483 int err; \n\
1484 \n\
1485 s = (struct bpf_object_skeleton *)calloc(1, sizeof(*s));\n\
1486 if (!s) { \n\
1487 err = -ENOMEM; \n\
1488 goto err; \n\
1489 } \n\
1490 \n\
1491 s->sz = sizeof(*s); \n\
1492 s->name = \"%1$s\"; \n\
1493 s->obj = &obj->obj; \n\
1494 ",
1495 obj_name
1496 );
1497
1498 codegen_maps_skeleton(obj, map_cnt, true /*mmaped*/, true /*links*/);
1499 codegen_progs_skeleton(obj, prog_cnt, true /*populate_links*/);
1500
1501 codegen("\
1502 \n\
1503 \n\
1504 s->data = %1$s__elf_bytes(&s->data_sz); \n\
1505 \n\
1506 obj->skeleton = s; \n\
1507 return 0; \n\
1508 err: \n\
1509 bpf_object__destroy_skeleton(s); \n\
1510 return err; \n\
1511 } \n\
1512 \n\
1513 static inline const void *%1$s__elf_bytes(size_t *sz) \n\
1514 { \n\
1515 static const char data[] __attribute__((__aligned__(8))) = \"\\\n\
1516 ",
1517 obj_name
1518 );
1519
1520 /* embed contents of BPF object file */
1521 print_hex(obj_data, file_sz);
1522
1523 codegen("\
1524 \n\
1525 \"; \n\
1526 \n\
1527 *sz = sizeof(data) - 1; \n\
1528 return (const void *)data; \n\
1529 } \n\
1530 \n\
1531 #ifdef __cplusplus \n\
1532 struct %1$s *%1$s::open(const struct bpf_object_open_opts *opts) { return %1$s__open_opts(opts); }\n\
1533 struct %1$s *%1$s::open_and_load() { return %1$s__open_and_load(); } \n\
1534 int %1$s::load(struct %1$s *skel) { return %1$s__load(skel); } \n\
1535 int %1$s::attach(struct %1$s *skel) { return %1$s__attach(skel); } \n\
1536 void %1$s::detach(struct %1$s *skel) { %1$s__detach(skel); } \n\
1537 void %1$s::destroy(struct %1$s *skel) { %1$s__destroy(skel); } \n\
1538 const void *%1$s::elf_bytes(size_t *sz) { return %1$s__elf_bytes(sz); } \n\
1539 #endif /* __cplusplus */ \n\
1540 \n\
1541 ",
1542 obj_name);
1543
1544 codegen_asserts(obj, obj_name);
1545
1546 codegen("\
1547 \n\
1548 \n\
1549 #endif /* %1$s */ \n\
1550 ",
1551 header_guard);
1552 err = 0;
1553out:
1554 bpf_object__close(obj);
1555 if (obj_data)
1556 munmap(obj_data, mmap_sz);
1557 close(fd);
1558 return err;
1559}
1560
1561/* Subskeletons are like skeletons, except they don't own the bpf_object,
1562 * associated maps, links, etc. Instead, they know about the existence of
1563 * variables, maps, programs and are able to find their locations
1564 * _at runtime_ from an already loaded bpf_object.
1565 *
1566 * This allows for library-like BPF objects to have userspace counterparts
1567 * with access to their own items without having to know anything about the
1568 * final BPF object that the library was linked into.
1569 */
1570static int do_subskeleton(int argc, char **argv)
1571{
1572 char header_guard[MAX_OBJ_NAME_LEN + sizeof("__SUBSKEL_H__")];
1573 size_t i, len, file_sz, map_cnt = 0, prog_cnt = 0, mmap_sz, var_cnt = 0, var_idx = 0;
1574 DECLARE_LIBBPF_OPTS(bpf_object_open_opts, opts);
1575 char obj_name[MAX_OBJ_NAME_LEN] = "", *obj_data;
1576 struct bpf_object *obj = NULL;
1577 const char *file, *var_name;
1578 char ident[256];
1579 int fd, err = -1, map_type_id;
1580 const struct bpf_map *map;
1581 struct bpf_program *prog;
1582 struct btf *btf;
1583 const struct btf_type *map_type, *var_type;
1584 const struct btf_var_secinfo *var;
1585 struct stat st;
1586
1587 if (!REQ_ARGS(1)) {
1588 usage();
1589 return -1;
1590 }
1591 file = GET_ARG();
1592
1593 while (argc) {
1594 if (!REQ_ARGS(2))
1595 return -1;
1596
1597 if (is_prefix(*argv, "name")) {
1598 NEXT_ARG();
1599
1600 if (obj_name[0] != '\0') {
1601 p_err("object name already specified");
1602 return -1;
1603 }
1604
1605 strncpy(obj_name, *argv, MAX_OBJ_NAME_LEN - 1);
1606 obj_name[MAX_OBJ_NAME_LEN - 1] = '\0';
1607 } else {
1608 p_err("unknown arg %s", *argv);
1609 return -1;
1610 }
1611
1612 NEXT_ARG();
1613 }
1614
1615 if (argc) {
1616 p_err("extra unknown arguments");
1617 return -1;
1618 }
1619
1620 if (use_loader) {
1621 p_err("cannot use loader for subskeletons");
1622 return -1;
1623 }
1624
1625 if (stat(file, &st)) {
1626 p_err("failed to stat() %s: %s", file, strerror(errno));
1627 return -1;
1628 }
1629 file_sz = st.st_size;
1630 mmap_sz = roundup(file_sz, sysconf(_SC_PAGE_SIZE));
1631 fd = open(file, O_RDONLY);
1632 if (fd < 0) {
1633 p_err("failed to open() %s: %s", file, strerror(errno));
1634 return -1;
1635 }
1636 obj_data = mmap(NULL, mmap_sz, PROT_READ, MAP_PRIVATE, fd, 0);
1637 if (obj_data == MAP_FAILED) {
1638 obj_data = NULL;
1639 p_err("failed to mmap() %s: %s", file, strerror(errno));
1640 goto out;
1641 }
1642 if (obj_name[0] == '\0')
1643 get_obj_name(obj_name, file);
1644
1645 /* The empty object name allows us to use bpf_map__name and produce
1646 * ELF section names out of it. (".data" instead of "obj.data")
1647 */
1648 opts.object_name = "";
1649 obj = bpf_object__open_mem(obj_data, file_sz, &opts);
1650 if (!obj) {
1651 char err_buf[256];
1652
1653 libbpf_strerror(errno, err_buf, sizeof(err_buf));
1654 p_err("failed to open BPF object file: %s", err_buf);
1655 obj = NULL;
1656 goto out;
1657 }
1658
1659 btf = bpf_object__btf(obj);
1660 if (!btf) {
1661 err = -1;
1662 p_err("need btf type information for %s", obj_name);
1663 goto out;
1664 }
1665
1666 bpf_object__for_each_program(prog, obj) {
1667 prog_cnt++;
1668 }
1669
1670 /* First, count how many variables we have to find.
1671 * We need this in advance so the subskel can allocate the right
1672 * amount of storage.
1673 */
1674 bpf_object__for_each_map(map, obj) {
1675 if (!get_map_ident(map, ident, sizeof(ident)))
1676 continue;
1677
1678 /* Also count all maps that have a name */
1679 map_cnt++;
1680
1681 if (!is_mmapable_map(map, ident, sizeof(ident)))
1682 continue;
1683
1684 map_type_id = bpf_map__btf_value_type_id(map);
1685 if (map_type_id <= 0) {
1686 err = map_type_id;
1687 goto out;
1688 }
1689 map_type = btf__type_by_id(btf, map_type_id);
1690
1691 var = btf_var_secinfos(map_type);
1692 len = btf_vlen(map_type);
1693 for (i = 0; i < len; i++, var++) {
1694 var_type = btf__type_by_id(btf, var->type);
1695
1696 if (btf_var(var_type)->linkage == BTF_VAR_STATIC)
1697 continue;
1698
1699 var_cnt++;
1700 }
1701 }
1702
1703 get_header_guard(header_guard, obj_name, "SUBSKEL_H");
1704 codegen("\
1705 \n\
1706 /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */ \n\
1707 \n\
1708 /* THIS FILE IS AUTOGENERATED! */ \n\
1709 #ifndef %2$s \n\
1710 #define %2$s \n\
1711 \n\
1712 #include <errno.h> \n\
1713 #include <stdlib.h> \n\
1714 #include <bpf/libbpf.h> \n\
1715 \n\
1716 struct %1$s { \n\
1717 struct bpf_object *obj; \n\
1718 struct bpf_object_subskeleton *subskel; \n\
1719 ", obj_name, header_guard);
1720
1721 if (map_cnt) {
1722 printf("\tstruct {\n");
1723 bpf_object__for_each_map(map, obj) {
1724 if (!get_map_ident(map, ident, sizeof(ident)))
1725 continue;
1726 printf("\t\tstruct bpf_map *%s;\n", ident);
1727 }
1728 printf("\t} maps;\n");
1729 }
1730
1731 err = gen_st_ops_shadow(obj_name, btf, obj);
1732 if (err)
1733 goto out;
1734
1735 if (prog_cnt) {
1736 printf("\tstruct {\n");
1737 bpf_object__for_each_program(prog, obj) {
1738 printf("\t\tstruct bpf_program *%s;\n",
1739 bpf_program__name(prog));
1740 }
1741 printf("\t} progs;\n");
1742 }
1743
1744 err = codegen_subskel_datasecs(obj, obj_name);
1745 if (err)
1746 goto out;
1747
1748 /* emit code that will allocate enough storage for all symbols */
1749 codegen("\
1750 \n\
1751 \n\
1752 #ifdef __cplusplus \n\
1753 static inline struct %1$s *open(const struct bpf_object *src);\n\
1754 static inline void destroy(struct %1$s *skel); \n\
1755 #endif /* __cplusplus */ \n\
1756 }; \n\
1757 \n\
1758 static inline void \n\
1759 %1$s__destroy(struct %1$s *skel) \n\
1760 { \n\
1761 if (!skel) \n\
1762 return; \n\
1763 if (skel->subskel) \n\
1764 bpf_object__destroy_subskeleton(skel->subskel);\n\
1765 free(skel); \n\
1766 } \n\
1767 \n\
1768 static inline struct %1$s * \n\
1769 %1$s__open(const struct bpf_object *src) \n\
1770 { \n\
1771 struct %1$s *obj; \n\
1772 struct bpf_object_subskeleton *s; \n\
1773 struct bpf_map_skeleton *map __attribute__((unused));\n\
1774 int err; \n\
1775 \n\
1776 obj = (struct %1$s *)calloc(1, sizeof(*obj)); \n\
1777 if (!obj) { \n\
1778 err = -ENOMEM; \n\
1779 goto err; \n\
1780 } \n\
1781 s = (struct bpf_object_subskeleton *)calloc(1, sizeof(*s));\n\
1782 if (!s) { \n\
1783 err = -ENOMEM; \n\
1784 goto err; \n\
1785 } \n\
1786 s->sz = sizeof(*s); \n\
1787 s->obj = src; \n\
1788 s->var_skel_sz = sizeof(*s->vars); \n\
1789 obj->subskel = s; \n\
1790 \n\
1791 /* vars */ \n\
1792 s->var_cnt = %2$d; \n\
1793 s->vars = (struct bpf_var_skeleton *)calloc(%2$d, sizeof(*s->vars));\n\
1794 if (!s->vars) { \n\
1795 err = -ENOMEM; \n\
1796 goto err; \n\
1797 } \n\
1798 ",
1799 obj_name, var_cnt
1800 );
1801
1802 /* walk through each symbol and emit the runtime representation */
1803 bpf_object__for_each_map(map, obj) {
1804 if (!is_mmapable_map(map, ident, sizeof(ident)))
1805 continue;
1806
1807 map_type_id = bpf_map__btf_value_type_id(map);
1808 if (map_type_id <= 0)
1809 /* skip over internal maps with no type*/
1810 continue;
1811
1812 map_type = btf__type_by_id(btf, map_type_id);
1813 var = btf_var_secinfos(map_type);
1814 len = btf_vlen(map_type);
1815 for (i = 0; i < len; i++, var++) {
1816 var_type = btf__type_by_id(btf, var->type);
1817 var_name = btf__name_by_offset(btf, var_type->name_off);
1818
1819 if (btf_var(var_type)->linkage == BTF_VAR_STATIC)
1820 continue;
1821
1822 /* Note that we use the dot prefix in .data as the
1823 * field access operator i.e. maps%s becomes maps.data
1824 */
1825 codegen("\
1826 \n\
1827 \n\
1828 s->vars[%3$d].name = \"%1$s\"; \n\
1829 s->vars[%3$d].map = &obj->maps.%2$s; \n\
1830 s->vars[%3$d].addr = (void **) &obj->%2$s.%1$s;\n\
1831 ", var_name, ident, var_idx);
1832
1833 var_idx++;
1834 }
1835 }
1836
1837 codegen_maps_skeleton(obj, map_cnt, false /*mmaped*/, false /*links*/);
1838 codegen_progs_skeleton(obj, prog_cnt, false /*links*/);
1839
1840 codegen("\
1841 \n\
1842 \n\
1843 err = bpf_object__open_subskeleton(s); \n\
1844 if (err) \n\
1845 goto err; \n\
1846 \n\
1847 ");
1848
1849 gen_st_ops_shadow_init(btf, obj);
1850
1851 codegen("\
1852 \n\
1853 return obj; \n\
1854 err: \n\
1855 %1$s__destroy(obj); \n\
1856 errno = -err; \n\
1857 return NULL; \n\
1858 } \n\
1859 \n\
1860 #ifdef __cplusplus \n\
1861 struct %1$s *%1$s::open(const struct bpf_object *src) { return %1$s__open(src); }\n\
1862 void %1$s::destroy(struct %1$s *skel) { %1$s__destroy(skel); }\n\
1863 #endif /* __cplusplus */ \n\
1864 \n\
1865 #endif /* %2$s */ \n\
1866 ",
1867 obj_name, header_guard);
1868 err = 0;
1869out:
1870 bpf_object__close(obj);
1871 if (obj_data)
1872 munmap(obj_data, mmap_sz);
1873 close(fd);
1874 return err;
1875}
1876
1877static int do_object(int argc, char **argv)
1878{
1879 struct bpf_linker *linker;
1880 const char *output_file, *file;
1881 int err = 0;
1882
1883 if (!REQ_ARGS(2)) {
1884 usage();
1885 return -1;
1886 }
1887
1888 output_file = GET_ARG();
1889
1890 linker = bpf_linker__new(output_file, NULL);
1891 if (!linker) {
1892 p_err("failed to create BPF linker instance");
1893 return -1;
1894 }
1895
1896 while (argc) {
1897 file = GET_ARG();
1898
1899 err = bpf_linker__add_file(linker, file, NULL);
1900 if (err) {
1901 p_err("failed to link '%s': %s (%d)", file, strerror(errno), errno);
1902 goto out;
1903 }
1904 }
1905
1906 err = bpf_linker__finalize(linker);
1907 if (err) {
1908 p_err("failed to finalize ELF file: %s (%d)", strerror(errno), errno);
1909 goto out;
1910 }
1911
1912 err = 0;
1913out:
1914 bpf_linker__free(linker);
1915 return err;
1916}
1917
1918static int do_help(int argc, char **argv)
1919{
1920 if (json_output) {
1921 jsonw_null(json_wtr);
1922 return 0;
1923 }
1924
1925 fprintf(stderr,
1926 "Usage: %1$s %2$s object OUTPUT_FILE INPUT_FILE [INPUT_FILE...]\n"
1927 " %1$s %2$s skeleton FILE [name OBJECT_NAME]\n"
1928 " %1$s %2$s subskeleton FILE [name OBJECT_NAME]\n"
1929 " %1$s %2$s min_core_btf INPUT OUTPUT OBJECT [OBJECT...]\n"
1930 " %1$s %2$s help\n"
1931 "\n"
1932 " " HELP_SPEC_OPTIONS " |\n"
1933 " {-L|--use-loader} }\n"
1934 "",
1935 bin_name, "gen");
1936
1937 return 0;
1938}
1939
1940static int btf_save_raw(const struct btf *btf, const char *path)
1941{
1942 const void *data;
1943 FILE *f = NULL;
1944 __u32 data_sz;
1945 int err = 0;
1946
1947 data = btf__raw_data(btf, &data_sz);
1948 if (!data)
1949 return -ENOMEM;
1950
1951 f = fopen(path, "wb");
1952 if (!f)
1953 return -errno;
1954
1955 if (fwrite(data, 1, data_sz, f) != data_sz)
1956 err = -errno;
1957
1958 fclose(f);
1959 return err;
1960}
1961
1962struct btfgen_info {
1963 struct btf *src_btf;
1964 struct btf *marked_btf; /* btf structure used to mark used types */
1965};
1966
1967static size_t btfgen_hash_fn(long key, void *ctx)
1968{
1969 return key;
1970}
1971
1972static bool btfgen_equal_fn(long k1, long k2, void *ctx)
1973{
1974 return k1 == k2;
1975}
1976
1977static void btfgen_free_info(struct btfgen_info *info)
1978{
1979 if (!info)
1980 return;
1981
1982 btf__free(info->src_btf);
1983 btf__free(info->marked_btf);
1984
1985 free(info);
1986}
1987
1988static struct btfgen_info *
1989btfgen_new_info(const char *targ_btf_path)
1990{
1991 struct btfgen_info *info;
1992 int err;
1993
1994 info = calloc(1, sizeof(*info));
1995 if (!info)
1996 return NULL;
1997
1998 info->src_btf = btf__parse(targ_btf_path, NULL);
1999 if (!info->src_btf) {
2000 err = -errno;
2001 p_err("failed parsing '%s' BTF file: %s", targ_btf_path, strerror(errno));
2002 goto err_out;
2003 }
2004
2005 info->marked_btf = btf__parse(targ_btf_path, NULL);
2006 if (!info->marked_btf) {
2007 err = -errno;
2008 p_err("failed parsing '%s' BTF file: %s", targ_btf_path, strerror(errno));
2009 goto err_out;
2010 }
2011
2012 return info;
2013
2014err_out:
2015 btfgen_free_info(info);
2016 errno = -err;
2017 return NULL;
2018}
2019
2020#define MARKED UINT32_MAX
2021
2022static void btfgen_mark_member(struct btfgen_info *info, int type_id, int idx)
2023{
2024 const struct btf_type *t = btf__type_by_id(info->marked_btf, type_id);
2025 struct btf_member *m = btf_members(t) + idx;
2026
2027 m->name_off = MARKED;
2028}
2029
2030static int
2031btfgen_mark_type(struct btfgen_info *info, unsigned int type_id, bool follow_pointers)
2032{
2033 const struct btf_type *btf_type = btf__type_by_id(info->src_btf, type_id);
2034 struct btf_type *cloned_type;
2035 struct btf_param *param;
2036 struct btf_array *array;
2037 int err, i;
2038
2039 if (type_id == 0)
2040 return 0;
2041
2042 /* mark type on cloned BTF as used */
2043 cloned_type = (struct btf_type *) btf__type_by_id(info->marked_btf, type_id);
2044 cloned_type->name_off = MARKED;
2045
2046 /* recursively mark other types needed by it */
2047 switch (btf_kind(btf_type)) {
2048 case BTF_KIND_UNKN:
2049 case BTF_KIND_INT:
2050 case BTF_KIND_FLOAT:
2051 case BTF_KIND_ENUM:
2052 case BTF_KIND_ENUM64:
2053 case BTF_KIND_STRUCT:
2054 case BTF_KIND_UNION:
2055 break;
2056 case BTF_KIND_PTR:
2057 if (follow_pointers) {
2058 err = btfgen_mark_type(info, btf_type->type, follow_pointers);
2059 if (err)
2060 return err;
2061 }
2062 break;
2063 case BTF_KIND_CONST:
2064 case BTF_KIND_RESTRICT:
2065 case BTF_KIND_VOLATILE:
2066 case BTF_KIND_TYPEDEF:
2067 err = btfgen_mark_type(info, btf_type->type, follow_pointers);
2068 if (err)
2069 return err;
2070 break;
2071 case BTF_KIND_ARRAY:
2072 array = btf_array(btf_type);
2073
2074 /* mark array type */
2075 err = btfgen_mark_type(info, array->type, follow_pointers);
2076 /* mark array's index type */
2077 err = err ? : btfgen_mark_type(info, array->index_type, follow_pointers);
2078 if (err)
2079 return err;
2080 break;
2081 case BTF_KIND_FUNC_PROTO:
2082 /* mark ret type */
2083 err = btfgen_mark_type(info, btf_type->type, follow_pointers);
2084 if (err)
2085 return err;
2086
2087 /* mark parameters types */
2088 param = btf_params(btf_type);
2089 for (i = 0; i < btf_vlen(btf_type); i++) {
2090 err = btfgen_mark_type(info, param->type, follow_pointers);
2091 if (err)
2092 return err;
2093 param++;
2094 }
2095 break;
2096 /* tells if some other type needs to be handled */
2097 default:
2098 p_err("unsupported kind: %s (%d)", btf_kind_str(btf_type), type_id);
2099 return -EINVAL;
2100 }
2101
2102 return 0;
2103}
2104
2105static int btfgen_record_field_relo(struct btfgen_info *info, struct bpf_core_spec *targ_spec)
2106{
2107 struct btf *btf = info->src_btf;
2108 const struct btf_type *btf_type;
2109 struct btf_member *btf_member;
2110 struct btf_array *array;
2111 unsigned int type_id = targ_spec->root_type_id;
2112 int idx, err;
2113
2114 /* mark root type */
2115 btf_type = btf__type_by_id(btf, type_id);
2116 err = btfgen_mark_type(info, type_id, false);
2117 if (err)
2118 return err;
2119
2120 /* mark types for complex types (arrays, unions, structures) */
2121 for (int i = 1; i < targ_spec->raw_len; i++) {
2122 /* skip typedefs and mods */
2123 while (btf_is_mod(btf_type) || btf_is_typedef(btf_type)) {
2124 type_id = btf_type->type;
2125 btf_type = btf__type_by_id(btf, type_id);
2126 }
2127
2128 switch (btf_kind(btf_type)) {
2129 case BTF_KIND_STRUCT:
2130 case BTF_KIND_UNION:
2131 idx = targ_spec->raw_spec[i];
2132 btf_member = btf_members(btf_type) + idx;
2133
2134 /* mark member */
2135 btfgen_mark_member(info, type_id, idx);
2136
2137 /* mark member's type */
2138 type_id = btf_member->type;
2139 btf_type = btf__type_by_id(btf, type_id);
2140 err = btfgen_mark_type(info, type_id, false);
2141 if (err)
2142 return err;
2143 break;
2144 case BTF_KIND_ARRAY:
2145 array = btf_array(btf_type);
2146 type_id = array->type;
2147 btf_type = btf__type_by_id(btf, type_id);
2148 break;
2149 default:
2150 p_err("unsupported kind: %s (%d)",
2151 btf_kind_str(btf_type), btf_type->type);
2152 return -EINVAL;
2153 }
2154 }
2155
2156 return 0;
2157}
2158
2159/* Mark types, members, and member types. Compared to btfgen_record_field_relo,
2160 * this function does not rely on the target spec for inferring members, but
2161 * uses the associated BTF.
2162 *
2163 * The `behind_ptr` argument is used to stop marking of composite types reached
2164 * through a pointer. This way, we can keep BTF size in check while providing
2165 * reasonable match semantics.
2166 */
2167static int btfgen_mark_type_match(struct btfgen_info *info, __u32 type_id, bool behind_ptr)
2168{
2169 const struct btf_type *btf_type;
2170 struct btf *btf = info->src_btf;
2171 struct btf_type *cloned_type;
2172 int i, err;
2173
2174 if (type_id == 0)
2175 return 0;
2176
2177 btf_type = btf__type_by_id(btf, type_id);
2178 /* mark type on cloned BTF as used */
2179 cloned_type = (struct btf_type *)btf__type_by_id(info->marked_btf, type_id);
2180 cloned_type->name_off = MARKED;
2181
2182 switch (btf_kind(btf_type)) {
2183 case BTF_KIND_UNKN:
2184 case BTF_KIND_INT:
2185 case BTF_KIND_FLOAT:
2186 case BTF_KIND_ENUM:
2187 case BTF_KIND_ENUM64:
2188 break;
2189 case BTF_KIND_STRUCT:
2190 case BTF_KIND_UNION: {
2191 struct btf_member *m = btf_members(btf_type);
2192 __u16 vlen = btf_vlen(btf_type);
2193
2194 if (behind_ptr)
2195 break;
2196
2197 for (i = 0; i < vlen; i++, m++) {
2198 /* mark member */
2199 btfgen_mark_member(info, type_id, i);
2200
2201 /* mark member's type */
2202 err = btfgen_mark_type_match(info, m->type, false);
2203 if (err)
2204 return err;
2205 }
2206 break;
2207 }
2208 case BTF_KIND_CONST:
2209 case BTF_KIND_FWD:
2210 case BTF_KIND_RESTRICT:
2211 case BTF_KIND_TYPEDEF:
2212 case BTF_KIND_VOLATILE:
2213 return btfgen_mark_type_match(info, btf_type->type, behind_ptr);
2214 case BTF_KIND_PTR:
2215 return btfgen_mark_type_match(info, btf_type->type, true);
2216 case BTF_KIND_ARRAY: {
2217 struct btf_array *array;
2218
2219 array = btf_array(btf_type);
2220 /* mark array type */
2221 err = btfgen_mark_type_match(info, array->type, false);
2222 /* mark array's index type */
2223 err = err ? : btfgen_mark_type_match(info, array->index_type, false);
2224 if (err)
2225 return err;
2226 break;
2227 }
2228 case BTF_KIND_FUNC_PROTO: {
2229 __u16 vlen = btf_vlen(btf_type);
2230 struct btf_param *param;
2231
2232 /* mark ret type */
2233 err = btfgen_mark_type_match(info, btf_type->type, false);
2234 if (err)
2235 return err;
2236
2237 /* mark parameters types */
2238 param = btf_params(btf_type);
2239 for (i = 0; i < vlen; i++) {
2240 err = btfgen_mark_type_match(info, param->type, false);
2241 if (err)
2242 return err;
2243 param++;
2244 }
2245 break;
2246 }
2247 /* tells if some other type needs to be handled */
2248 default:
2249 p_err("unsupported kind: %s (%d)", btf_kind_str(btf_type), type_id);
2250 return -EINVAL;
2251 }
2252
2253 return 0;
2254}
2255
2256/* Mark types, members, and member types. Compared to btfgen_record_field_relo,
2257 * this function does not rely on the target spec for inferring members, but
2258 * uses the associated BTF.
2259 */
2260static int btfgen_record_type_match_relo(struct btfgen_info *info, struct bpf_core_spec *targ_spec)
2261{
2262 return btfgen_mark_type_match(info, targ_spec->root_type_id, false);
2263}
2264
2265static int btfgen_record_type_relo(struct btfgen_info *info, struct bpf_core_spec *targ_spec)
2266{
2267 return btfgen_mark_type(info, targ_spec->root_type_id, true);
2268}
2269
2270static int btfgen_record_enumval_relo(struct btfgen_info *info, struct bpf_core_spec *targ_spec)
2271{
2272 return btfgen_mark_type(info, targ_spec->root_type_id, false);
2273}
2274
2275static int btfgen_record_reloc(struct btfgen_info *info, struct bpf_core_spec *res)
2276{
2277 switch (res->relo_kind) {
2278 case BPF_CORE_FIELD_BYTE_OFFSET:
2279 case BPF_CORE_FIELD_BYTE_SIZE:
2280 case BPF_CORE_FIELD_EXISTS:
2281 case BPF_CORE_FIELD_SIGNED:
2282 case BPF_CORE_FIELD_LSHIFT_U64:
2283 case BPF_CORE_FIELD_RSHIFT_U64:
2284 return btfgen_record_field_relo(info, res);
2285 case BPF_CORE_TYPE_ID_LOCAL: /* BPF_CORE_TYPE_ID_LOCAL doesn't require kernel BTF */
2286 return 0;
2287 case BPF_CORE_TYPE_ID_TARGET:
2288 case BPF_CORE_TYPE_EXISTS:
2289 case BPF_CORE_TYPE_SIZE:
2290 return btfgen_record_type_relo(info, res);
2291 case BPF_CORE_TYPE_MATCHES:
2292 return btfgen_record_type_match_relo(info, res);
2293 case BPF_CORE_ENUMVAL_EXISTS:
2294 case BPF_CORE_ENUMVAL_VALUE:
2295 return btfgen_record_enumval_relo(info, res);
2296 default:
2297 return -EINVAL;
2298 }
2299}
2300
2301static struct bpf_core_cand_list *
2302btfgen_find_cands(const struct btf *local_btf, const struct btf *targ_btf, __u32 local_id)
2303{
2304 const struct btf_type *local_type;
2305 struct bpf_core_cand_list *cands = NULL;
2306 struct bpf_core_cand local_cand = {};
2307 size_t local_essent_len;
2308 const char *local_name;
2309 int err;
2310
2311 local_cand.btf = local_btf;
2312 local_cand.id = local_id;
2313
2314 local_type = btf__type_by_id(local_btf, local_id);
2315 if (!local_type) {
2316 err = -EINVAL;
2317 goto err_out;
2318 }
2319
2320 local_name = btf__name_by_offset(local_btf, local_type->name_off);
2321 if (!local_name) {
2322 err = -EINVAL;
2323 goto err_out;
2324 }
2325 local_essent_len = bpf_core_essential_name_len(local_name);
2326
2327 cands = calloc(1, sizeof(*cands));
2328 if (!cands)
2329 return NULL;
2330
2331 err = bpf_core_add_cands(&local_cand, local_essent_len, targ_btf, "vmlinux", 1, cands);
2332 if (err)
2333 goto err_out;
2334
2335 return cands;
2336
2337err_out:
2338 bpf_core_free_cands(cands);
2339 errno = -err;
2340 return NULL;
2341}
2342
2343/* Record relocation information for a single BPF object */
2344static int btfgen_record_obj(struct btfgen_info *info, const char *obj_path)
2345{
2346 const struct btf_ext_info_sec *sec;
2347 const struct bpf_core_relo *relo;
2348 const struct btf_ext_info *seg;
2349 struct hashmap_entry *entry;
2350 struct hashmap *cand_cache = NULL;
2351 struct btf_ext *btf_ext = NULL;
2352 unsigned int relo_idx;
2353 struct btf *btf = NULL;
2354 size_t i;
2355 int err;
2356
2357 btf = btf__parse(obj_path, &btf_ext);
2358 if (!btf) {
2359 err = -errno;
2360 p_err("failed to parse BPF object '%s': %s", obj_path, strerror(errno));
2361 return err;
2362 }
2363
2364 if (!btf_ext) {
2365 p_err("failed to parse BPF object '%s': section %s not found",
2366 obj_path, BTF_EXT_ELF_SEC);
2367 err = -EINVAL;
2368 goto out;
2369 }
2370
2371 if (btf_ext->core_relo_info.len == 0) {
2372 err = 0;
2373 goto out;
2374 }
2375
2376 cand_cache = hashmap__new(btfgen_hash_fn, btfgen_equal_fn, NULL);
2377 if (IS_ERR(cand_cache)) {
2378 err = PTR_ERR(cand_cache);
2379 goto out;
2380 }
2381
2382 seg = &btf_ext->core_relo_info;
2383 for_each_btf_ext_sec(seg, sec) {
2384 for_each_btf_ext_rec(seg, sec, relo_idx, relo) {
2385 struct bpf_core_spec specs_scratch[3] = {};
2386 struct bpf_core_relo_res targ_res = {};
2387 struct bpf_core_cand_list *cands = NULL;
2388 const char *sec_name = btf__name_by_offset(btf, sec->sec_name_off);
2389
2390 if (relo->kind != BPF_CORE_TYPE_ID_LOCAL &&
2391 !hashmap__find(cand_cache, relo->type_id, &cands)) {
2392 cands = btfgen_find_cands(btf, info->src_btf, relo->type_id);
2393 if (!cands) {
2394 err = -errno;
2395 goto out;
2396 }
2397
2398 err = hashmap__set(cand_cache, relo->type_id, cands,
2399 NULL, NULL);
2400 if (err)
2401 goto out;
2402 }
2403
2404 err = bpf_core_calc_relo_insn(sec_name, relo, relo_idx, btf, cands,
2405 specs_scratch, &targ_res);
2406 if (err)
2407 goto out;
2408
2409 /* specs_scratch[2] is the target spec */
2410 err = btfgen_record_reloc(info, &specs_scratch[2]);
2411 if (err)
2412 goto out;
2413 }
2414 }
2415
2416out:
2417 btf__free(btf);
2418 btf_ext__free(btf_ext);
2419
2420 if (!IS_ERR_OR_NULL(cand_cache)) {
2421 hashmap__for_each_entry(cand_cache, entry, i) {
2422 bpf_core_free_cands(entry->pvalue);
2423 }
2424 hashmap__free(cand_cache);
2425 }
2426
2427 return err;
2428}
2429
2430/* Generate BTF from relocation information previously recorded */
2431static struct btf *btfgen_get_btf(struct btfgen_info *info)
2432{
2433 struct btf *btf_new = NULL;
2434 unsigned int *ids = NULL;
2435 unsigned int i, n = btf__type_cnt(info->marked_btf);
2436 int err = 0;
2437
2438 btf_new = btf__new_empty();
2439 if (!btf_new) {
2440 err = -errno;
2441 goto err_out;
2442 }
2443
2444 ids = calloc(n, sizeof(*ids));
2445 if (!ids) {
2446 err = -errno;
2447 goto err_out;
2448 }
2449
2450 /* first pass: add all marked types to btf_new and add their new ids to the ids map */
2451 for (i = 1; i < n; i++) {
2452 const struct btf_type *cloned_type, *type;
2453 const char *name;
2454 int new_id;
2455
2456 cloned_type = btf__type_by_id(info->marked_btf, i);
2457
2458 if (cloned_type->name_off != MARKED)
2459 continue;
2460
2461 type = btf__type_by_id(info->src_btf, i);
2462
2463 /* add members for struct and union */
2464 if (btf_is_composite(type)) {
2465 struct btf_member *cloned_m, *m;
2466 unsigned short vlen;
2467 int idx_src;
2468
2469 name = btf__str_by_offset(info->src_btf, type->name_off);
2470
2471 if (btf_is_struct(type))
2472 err = btf__add_struct(btf_new, name, type->size);
2473 else
2474 err = btf__add_union(btf_new, name, type->size);
2475
2476 if (err < 0)
2477 goto err_out;
2478 new_id = err;
2479
2480 cloned_m = btf_members(cloned_type);
2481 m = btf_members(type);
2482 vlen = btf_vlen(cloned_type);
2483 for (idx_src = 0; idx_src < vlen; idx_src++, cloned_m++, m++) {
2484 /* add only members that are marked as used */
2485 if (cloned_m->name_off != MARKED)
2486 continue;
2487
2488 name = btf__str_by_offset(info->src_btf, m->name_off);
2489 err = btf__add_field(btf_new, name, m->type,
2490 btf_member_bit_offset(cloned_type, idx_src),
2491 btf_member_bitfield_size(cloned_type, idx_src));
2492 if (err < 0)
2493 goto err_out;
2494 }
2495 } else {
2496 err = btf__add_type(btf_new, info->src_btf, type);
2497 if (err < 0)
2498 goto err_out;
2499 new_id = err;
2500 }
2501
2502 /* add ID mapping */
2503 ids[i] = new_id;
2504 }
2505
2506 /* second pass: fix up type ids */
2507 for (i = 1; i < btf__type_cnt(btf_new); i++) {
2508 struct btf_type *btf_type = (struct btf_type *) btf__type_by_id(btf_new, i);
2509 struct btf_field_iter it;
2510 __u32 *type_id;
2511
2512 err = btf_field_iter_init(&it, btf_type, BTF_FIELD_ITER_IDS);
2513 if (err)
2514 goto err_out;
2515
2516 while ((type_id = btf_field_iter_next(&it)))
2517 *type_id = ids[*type_id];
2518 }
2519
2520 free(ids);
2521 return btf_new;
2522
2523err_out:
2524 btf__free(btf_new);
2525 free(ids);
2526 errno = -err;
2527 return NULL;
2528}
2529
2530/* Create minimized BTF file for a set of BPF objects.
2531 *
2532 * The BTFGen algorithm is divided in two main parts: (1) collect the
2533 * BTF types that are involved in relocations and (2) generate the BTF
2534 * object using the collected types.
2535 *
2536 * In order to collect the types involved in the relocations, we parse
2537 * the BTF and BTF.ext sections of the BPF objects and use
2538 * bpf_core_calc_relo_insn() to get the target specification, this
2539 * indicates how the types and fields are used in a relocation.
2540 *
2541 * Types are recorded in different ways according to the kind of the
2542 * relocation. For field-based relocations only the members that are
2543 * actually used are saved in order to reduce the size of the generated
2544 * BTF file. For type-based relocations empty struct / unions are
2545 * generated and for enum-based relocations the whole type is saved.
2546 *
2547 * The second part of the algorithm generates the BTF object. It creates
2548 * an empty BTF object and fills it with the types recorded in the
2549 * previous step. This function takes care of only adding the structure
2550 * and union members that were marked as used and it also fixes up the
2551 * type IDs on the generated BTF object.
2552 */
2553static int minimize_btf(const char *src_btf, const char *dst_btf, const char *objspaths[])
2554{
2555 struct btfgen_info *info;
2556 struct btf *btf_new = NULL;
2557 int err, i;
2558
2559 info = btfgen_new_info(src_btf);
2560 if (!info) {
2561 err = -errno;
2562 p_err("failed to allocate info structure: %s", strerror(errno));
2563 goto out;
2564 }
2565
2566 for (i = 0; objspaths[i] != NULL; i++) {
2567 err = btfgen_record_obj(info, objspaths[i]);
2568 if (err) {
2569 p_err("error recording relocations for %s: %s", objspaths[i],
2570 strerror(errno));
2571 goto out;
2572 }
2573 }
2574
2575 btf_new = btfgen_get_btf(info);
2576 if (!btf_new) {
2577 err = -errno;
2578 p_err("error generating BTF: %s", strerror(errno));
2579 goto out;
2580 }
2581
2582 err = btf_save_raw(btf_new, dst_btf);
2583 if (err) {
2584 p_err("error saving btf file: %s", strerror(errno));
2585 goto out;
2586 }
2587
2588out:
2589 btf__free(btf_new);
2590 btfgen_free_info(info);
2591
2592 return err;
2593}
2594
2595static int do_min_core_btf(int argc, char **argv)
2596{
2597 const char *input, *output, **objs;
2598 int i, err;
2599
2600 if (!REQ_ARGS(3)) {
2601 usage();
2602 return -1;
2603 }
2604
2605 input = GET_ARG();
2606 output = GET_ARG();
2607
2608 objs = (const char **) calloc(argc + 1, sizeof(*objs));
2609 if (!objs) {
2610 p_err("failed to allocate array for object names");
2611 return -ENOMEM;
2612 }
2613
2614 i = 0;
2615 while (argc)
2616 objs[i++] = GET_ARG();
2617
2618 err = minimize_btf(input, output, objs);
2619 free(objs);
2620 return err;
2621}
2622
2623static const struct cmd cmds[] = {
2624 { "object", do_object },
2625 { "skeleton", do_skeleton },
2626 { "subskeleton", do_subskeleton },
2627 { "min_core_btf", do_min_core_btf},
2628 { "help", do_help },
2629 { 0 }
2630};
2631
2632int do_gen(int argc, char **argv)
2633{
2634 return cmd_select(cmds, argc, argv, do_help);
2635}
1// SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
2/* Copyright (C) 2019 Facebook */
3
4#ifndef _GNU_SOURCE
5#define _GNU_SOURCE
6#endif
7#include <ctype.h>
8#include <errno.h>
9#include <fcntl.h>
10#include <libgen.h>
11#include <linux/err.h>
12#include <stdbool.h>
13#include <stdio.h>
14#include <string.h>
15#include <unistd.h>
16#include <bpf/bpf.h>
17#include <bpf/libbpf.h>
18#include <bpf/libbpf_internal.h>
19#include <sys/types.h>
20#include <sys/stat.h>
21#include <sys/mman.h>
22#include <bpf/btf.h>
23
24#include "json_writer.h"
25#include "main.h"
26
27#define MAX_OBJ_NAME_LEN 64
28
29static void sanitize_identifier(char *name)
30{
31 int i;
32
33 for (i = 0; name[i]; i++)
34 if (!isalnum(name[i]) && name[i] != '_')
35 name[i] = '_';
36}
37
38static bool str_has_prefix(const char *str, const char *prefix)
39{
40 return strncmp(str, prefix, strlen(prefix)) == 0;
41}
42
43static bool str_has_suffix(const char *str, const char *suffix)
44{
45 size_t i, n1 = strlen(str), n2 = strlen(suffix);
46
47 if (n1 < n2)
48 return false;
49
50 for (i = 0; i < n2; i++) {
51 if (str[n1 - i - 1] != suffix[n2 - i - 1])
52 return false;
53 }
54
55 return true;
56}
57
58static const struct btf_type *
59resolve_func_ptr(const struct btf *btf, __u32 id, __u32 *res_id)
60{
61 const struct btf_type *t;
62
63 t = skip_mods_and_typedefs(btf, id, NULL);
64 if (!btf_is_ptr(t))
65 return NULL;
66
67 t = skip_mods_and_typedefs(btf, t->type, res_id);
68
69 return btf_is_func_proto(t) ? t : NULL;
70}
71
72static void get_obj_name(char *name, const char *file)
73{
74 char file_copy[PATH_MAX];
75
76 /* Using basename() POSIX version to be more portable. */
77 strncpy(file_copy, file, PATH_MAX - 1)[PATH_MAX - 1] = '\0';
78 strncpy(name, basename(file_copy), MAX_OBJ_NAME_LEN - 1)[MAX_OBJ_NAME_LEN - 1] = '\0';
79 if (str_has_suffix(name, ".o"))
80 name[strlen(name) - 2] = '\0';
81 sanitize_identifier(name);
82}
83
84static void get_header_guard(char *guard, const char *obj_name, const char *suffix)
85{
86 int i;
87
88 sprintf(guard, "__%s_%s__", obj_name, suffix);
89 for (i = 0; guard[i]; i++)
90 guard[i] = toupper(guard[i]);
91}
92
93static bool get_map_ident(const struct bpf_map *map, char *buf, size_t buf_sz)
94{
95 static const char *sfxs[] = { ".data", ".rodata", ".bss", ".kconfig" };
96 const char *name = bpf_map__name(map);
97 int i, n;
98
99 if (!bpf_map__is_internal(map)) {
100 snprintf(buf, buf_sz, "%s", name);
101 return true;
102 }
103
104 for (i = 0, n = ARRAY_SIZE(sfxs); i < n; i++) {
105 const char *sfx = sfxs[i], *p;
106
107 p = strstr(name, sfx);
108 if (p) {
109 snprintf(buf, buf_sz, "%s", p + 1);
110 sanitize_identifier(buf);
111 return true;
112 }
113 }
114
115 return false;
116}
117
118static bool get_datasec_ident(const char *sec_name, char *buf, size_t buf_sz)
119{
120 static const char *pfxs[] = { ".data", ".rodata", ".bss", ".kconfig" };
121 int i, n;
122
123 /* recognize hard coded LLVM section name */
124 if (strcmp(sec_name, ".addr_space.1") == 0) {
125 /* this is the name to use in skeleton */
126 snprintf(buf, buf_sz, "arena");
127 return true;
128 }
129 for (i = 0, n = ARRAY_SIZE(pfxs); i < n; i++) {
130 const char *pfx = pfxs[i];
131
132 if (str_has_prefix(sec_name, pfx)) {
133 snprintf(buf, buf_sz, "%s", sec_name + 1);
134 sanitize_identifier(buf);
135 return true;
136 }
137 }
138
139 return false;
140}
141
142static void codegen_btf_dump_printf(void *ctx, const char *fmt, va_list args)
143{
144 vprintf(fmt, args);
145}
146
147static int codegen_datasec_def(struct bpf_object *obj,
148 struct btf *btf,
149 struct btf_dump *d,
150 const struct btf_type *sec,
151 const char *obj_name)
152{
153 const char *sec_name = btf__name_by_offset(btf, sec->name_off);
154 const struct btf_var_secinfo *sec_var = btf_var_secinfos(sec);
155 int i, err, off = 0, pad_cnt = 0, vlen = btf_vlen(sec);
156 char var_ident[256], sec_ident[256];
157 bool strip_mods = false;
158
159 if (!get_datasec_ident(sec_name, sec_ident, sizeof(sec_ident)))
160 return 0;
161
162 if (strcmp(sec_name, ".kconfig") != 0)
163 strip_mods = true;
164
165 printf(" struct %s__%s {\n", obj_name, sec_ident);
166 for (i = 0; i < vlen; i++, sec_var++) {
167 const struct btf_type *var = btf__type_by_id(btf, sec_var->type);
168 const char *var_name = btf__name_by_offset(btf, var->name_off);
169 DECLARE_LIBBPF_OPTS(btf_dump_emit_type_decl_opts, opts,
170 .field_name = var_ident,
171 .indent_level = 2,
172 .strip_mods = strip_mods,
173 );
174 int need_off = sec_var->offset, align_off, align;
175 __u32 var_type_id = var->type;
176
177 /* static variables are not exposed through BPF skeleton */
178 if (btf_var(var)->linkage == BTF_VAR_STATIC)
179 continue;
180
181 if (off > need_off) {
182 p_err("Something is wrong for %s's variable #%d: need offset %d, already at %d.\n",
183 sec_name, i, need_off, off);
184 return -EINVAL;
185 }
186
187 align = btf__align_of(btf, var->type);
188 if (align <= 0) {
189 p_err("Failed to determine alignment of variable '%s': %d",
190 var_name, align);
191 return -EINVAL;
192 }
193 /* Assume 32-bit architectures when generating data section
194 * struct memory layout. Given bpftool can't know which target
195 * host architecture it's emitting skeleton for, we need to be
196 * conservative and assume 32-bit one to ensure enough padding
197 * bytes are generated for pointer and long types. This will
198 * still work correctly for 64-bit architectures, because in
199 * the worst case we'll generate unnecessary padding field,
200 * which on 64-bit architectures is not strictly necessary and
201 * would be handled by natural 8-byte alignment. But it still
202 * will be a correct memory layout, based on recorded offsets
203 * in BTF.
204 */
205 if (align > 4)
206 align = 4;
207
208 align_off = (off + align - 1) / align * align;
209 if (align_off != need_off) {
210 printf("\t\tchar __pad%d[%d];\n",
211 pad_cnt, need_off - off);
212 pad_cnt++;
213 }
214
215 /* sanitize variable name, e.g., for static vars inside
216 * a function, it's name is '<function name>.<variable name>',
217 * which we'll turn into a '<function name>_<variable name>'
218 */
219 var_ident[0] = '\0';
220 strncat(var_ident, var_name, sizeof(var_ident) - 1);
221 sanitize_identifier(var_ident);
222
223 printf("\t\t");
224 err = btf_dump__emit_type_decl(d, var_type_id, &opts);
225 if (err)
226 return err;
227 printf(";\n");
228
229 off = sec_var->offset + sec_var->size;
230 }
231 printf(" } *%s;\n", sec_ident);
232 return 0;
233}
234
235static const struct btf_type *find_type_for_map(struct btf *btf, const char *map_ident)
236{
237 int n = btf__type_cnt(btf), i;
238 char sec_ident[256];
239
240 for (i = 1; i < n; i++) {
241 const struct btf_type *t = btf__type_by_id(btf, i);
242 const char *name;
243
244 if (!btf_is_datasec(t))
245 continue;
246
247 name = btf__str_by_offset(btf, t->name_off);
248 if (!get_datasec_ident(name, sec_ident, sizeof(sec_ident)))
249 continue;
250
251 if (strcmp(sec_ident, map_ident) == 0)
252 return t;
253 }
254 return NULL;
255}
256
257static bool is_mmapable_map(const struct bpf_map *map, char *buf, size_t sz)
258{
259 size_t tmp_sz;
260
261 if (bpf_map__type(map) == BPF_MAP_TYPE_ARENA && bpf_map__initial_value(map, &tmp_sz)) {
262 snprintf(buf, sz, "arena");
263 return true;
264 }
265
266 if (!bpf_map__is_internal(map) || !(bpf_map__map_flags(map) & BPF_F_MMAPABLE))
267 return false;
268
269 if (!get_map_ident(map, buf, sz))
270 return false;
271
272 return true;
273}
274
275static int codegen_datasecs(struct bpf_object *obj, const char *obj_name)
276{
277 struct btf *btf = bpf_object__btf(obj);
278 struct btf_dump *d;
279 struct bpf_map *map;
280 const struct btf_type *sec;
281 char map_ident[256];
282 int err = 0;
283
284 d = btf_dump__new(btf, codegen_btf_dump_printf, NULL, NULL);
285 if (!d)
286 return -errno;
287
288 bpf_object__for_each_map(map, obj) {
289 /* only generate definitions for memory-mapped internal maps */
290 if (!is_mmapable_map(map, map_ident, sizeof(map_ident)))
291 continue;
292
293 sec = find_type_for_map(btf, map_ident);
294
295 /* In some cases (e.g., sections like .rodata.cst16 containing
296 * compiler allocated string constants only) there will be
297 * special internal maps with no corresponding DATASEC BTF
298 * type. In such case, generate empty structs for each such
299 * map. It will still be memory-mapped and its contents
300 * accessible from user-space through BPF skeleton.
301 */
302 if (!sec) {
303 printf(" struct %s__%s {\n", obj_name, map_ident);
304 printf(" } *%s;\n", map_ident);
305 } else {
306 err = codegen_datasec_def(obj, btf, d, sec, obj_name);
307 if (err)
308 goto out;
309 }
310 }
311
312
313out:
314 btf_dump__free(d);
315 return err;
316}
317
318static bool btf_is_ptr_to_func_proto(const struct btf *btf,
319 const struct btf_type *v)
320{
321 return btf_is_ptr(v) && btf_is_func_proto(btf__type_by_id(btf, v->type));
322}
323
324static int codegen_subskel_datasecs(struct bpf_object *obj, const char *obj_name)
325{
326 struct btf *btf = bpf_object__btf(obj);
327 struct btf_dump *d;
328 struct bpf_map *map;
329 const struct btf_type *sec, *var;
330 const struct btf_var_secinfo *sec_var;
331 int i, err = 0, vlen;
332 char map_ident[256], sec_ident[256];
333 bool strip_mods = false, needs_typeof = false;
334 const char *sec_name, *var_name;
335 __u32 var_type_id;
336
337 d = btf_dump__new(btf, codegen_btf_dump_printf, NULL, NULL);
338 if (!d)
339 return -errno;
340
341 bpf_object__for_each_map(map, obj) {
342 /* only generate definitions for memory-mapped internal maps */
343 if (!is_mmapable_map(map, map_ident, sizeof(map_ident)))
344 continue;
345
346 sec = find_type_for_map(btf, map_ident);
347 if (!sec)
348 continue;
349
350 sec_name = btf__name_by_offset(btf, sec->name_off);
351 if (!get_datasec_ident(sec_name, sec_ident, sizeof(sec_ident)))
352 continue;
353
354 strip_mods = strcmp(sec_name, ".kconfig") != 0;
355 printf(" struct %s__%s {\n", obj_name, sec_ident);
356
357 sec_var = btf_var_secinfos(sec);
358 vlen = btf_vlen(sec);
359 for (i = 0; i < vlen; i++, sec_var++) {
360 DECLARE_LIBBPF_OPTS(btf_dump_emit_type_decl_opts, opts,
361 .indent_level = 2,
362 .strip_mods = strip_mods,
363 /* we'll print the name separately */
364 .field_name = "",
365 );
366
367 var = btf__type_by_id(btf, sec_var->type);
368 var_name = btf__name_by_offset(btf, var->name_off);
369 var_type_id = var->type;
370
371 /* static variables are not exposed through BPF skeleton */
372 if (btf_var(var)->linkage == BTF_VAR_STATIC)
373 continue;
374
375 /* The datasec member has KIND_VAR but we want the
376 * underlying type of the variable (e.g. KIND_INT).
377 */
378 var = skip_mods_and_typedefs(btf, var->type, NULL);
379
380 printf("\t\t");
381 /* Func and array members require special handling.
382 * Instead of producing `typename *var`, they produce
383 * `typeof(typename) *var`. This allows us to keep a
384 * similar syntax where the identifier is just prefixed
385 * by *, allowing us to ignore C declaration minutiae.
386 */
387 needs_typeof = btf_is_array(var) || btf_is_ptr_to_func_proto(btf, var);
388 if (needs_typeof)
389 printf("typeof(");
390
391 err = btf_dump__emit_type_decl(d, var_type_id, &opts);
392 if (err)
393 goto out;
394
395 if (needs_typeof)
396 printf(")");
397
398 printf(" *%s;\n", var_name);
399 }
400 printf(" } %s;\n", sec_ident);
401 }
402
403out:
404 btf_dump__free(d);
405 return err;
406}
407
408static void codegen(const char *template, ...)
409{
410 const char *src, *end;
411 int skip_tabs = 0, n;
412 char *s, *dst;
413 va_list args;
414 char c;
415
416 n = strlen(template);
417 s = malloc(n + 1);
418 if (!s)
419 exit(-1);
420 src = template;
421 dst = s;
422
423 /* find out "baseline" indentation to skip */
424 while ((c = *src++)) {
425 if (c == '\t') {
426 skip_tabs++;
427 } else if (c == '\n') {
428 break;
429 } else {
430 p_err("unrecognized character at pos %td in template '%s': '%c'",
431 src - template - 1, template, c);
432 free(s);
433 exit(-1);
434 }
435 }
436
437 while (*src) {
438 /* skip baseline indentation tabs */
439 for (n = skip_tabs; n > 0; n--, src++) {
440 if (*src != '\t') {
441 p_err("not enough tabs at pos %td in template '%s'",
442 src - template - 1, template);
443 free(s);
444 exit(-1);
445 }
446 }
447 /* trim trailing whitespace */
448 end = strchrnul(src, '\n');
449 for (n = end - src; n > 0 && isspace(src[n - 1]); n--)
450 ;
451 memcpy(dst, src, n);
452 dst += n;
453 if (*end)
454 *dst++ = '\n';
455 src = *end ? end + 1 : end;
456 }
457 *dst++ = '\0';
458
459 /* print out using adjusted template */
460 va_start(args, template);
461 n = vprintf(s, args);
462 va_end(args);
463
464 free(s);
465}
466
467static void print_hex(const char *data, int data_sz)
468{
469 int i, len;
470
471 for (i = 0, len = 0; i < data_sz; i++) {
472 int w = data[i] ? 4 : 2;
473
474 len += w;
475 if (len > 78) {
476 printf("\\\n");
477 len = w;
478 }
479 if (!data[i])
480 printf("\\0");
481 else
482 printf("\\x%02x", (unsigned char)data[i]);
483 }
484}
485
486static size_t bpf_map_mmap_sz(const struct bpf_map *map)
487{
488 long page_sz = sysconf(_SC_PAGE_SIZE);
489 size_t map_sz;
490
491 map_sz = (size_t)roundup(bpf_map__value_size(map), 8) * bpf_map__max_entries(map);
492 map_sz = roundup(map_sz, page_sz);
493 return map_sz;
494}
495
496/* Emit type size asserts for all top-level fields in memory-mapped internal maps. */
497static void codegen_asserts(struct bpf_object *obj, const char *obj_name)
498{
499 struct btf *btf = bpf_object__btf(obj);
500 struct bpf_map *map;
501 struct btf_var_secinfo *sec_var;
502 int i, vlen;
503 const struct btf_type *sec;
504 char map_ident[256], var_ident[256];
505
506 if (!btf)
507 return;
508
509 codegen("\
510 \n\
511 __attribute__((unused)) static void \n\
512 %1$s__assert(struct %1$s *s __attribute__((unused))) \n\
513 { \n\
514 #ifdef __cplusplus \n\
515 #define _Static_assert static_assert \n\
516 #endif \n\
517 ", obj_name);
518
519 bpf_object__for_each_map(map, obj) {
520 if (!is_mmapable_map(map, map_ident, sizeof(map_ident)))
521 continue;
522
523 sec = find_type_for_map(btf, map_ident);
524 if (!sec) {
525 /* best effort, couldn't find the type for this map */
526 continue;
527 }
528
529 sec_var = btf_var_secinfos(sec);
530 vlen = btf_vlen(sec);
531
532 for (i = 0; i < vlen; i++, sec_var++) {
533 const struct btf_type *var = btf__type_by_id(btf, sec_var->type);
534 const char *var_name = btf__name_by_offset(btf, var->name_off);
535 long var_size;
536
537 /* static variables are not exposed through BPF skeleton */
538 if (btf_var(var)->linkage == BTF_VAR_STATIC)
539 continue;
540
541 var_size = btf__resolve_size(btf, var->type);
542 if (var_size < 0)
543 continue;
544
545 var_ident[0] = '\0';
546 strncat(var_ident, var_name, sizeof(var_ident) - 1);
547 sanitize_identifier(var_ident);
548
549 printf("\t_Static_assert(sizeof(s->%s->%s) == %ld, \"unexpected size of '%s'\");\n",
550 map_ident, var_ident, var_size, var_ident);
551 }
552 }
553 codegen("\
554 \n\
555 #ifdef __cplusplus \n\
556 #undef _Static_assert \n\
557 #endif \n\
558 } \n\
559 ");
560}
561
562static void codegen_attach_detach(struct bpf_object *obj, const char *obj_name)
563{
564 struct bpf_program *prog;
565
566 bpf_object__for_each_program(prog, obj) {
567 const char *tp_name;
568
569 codegen("\
570 \n\
571 \n\
572 static inline int \n\
573 %1$s__%2$s__attach(struct %1$s *skel) \n\
574 { \n\
575 int prog_fd = skel->progs.%2$s.prog_fd; \n\
576 ", obj_name, bpf_program__name(prog));
577
578 switch (bpf_program__type(prog)) {
579 case BPF_PROG_TYPE_RAW_TRACEPOINT:
580 tp_name = strchr(bpf_program__section_name(prog), '/') + 1;
581 printf("\tint fd = skel_raw_tracepoint_open(\"%s\", prog_fd);\n", tp_name);
582 break;
583 case BPF_PROG_TYPE_TRACING:
584 case BPF_PROG_TYPE_LSM:
585 if (bpf_program__expected_attach_type(prog) == BPF_TRACE_ITER)
586 printf("\tint fd = skel_link_create(prog_fd, 0, BPF_TRACE_ITER);\n");
587 else
588 printf("\tint fd = skel_raw_tracepoint_open(NULL, prog_fd);\n");
589 break;
590 default:
591 printf("\tint fd = ((void)prog_fd, 0); /* auto-attach not supported */\n");
592 break;
593 }
594 codegen("\
595 \n\
596 \n\
597 if (fd > 0) \n\
598 skel->links.%1$s_fd = fd; \n\
599 return fd; \n\
600 } \n\
601 ", bpf_program__name(prog));
602 }
603
604 codegen("\
605 \n\
606 \n\
607 static inline int \n\
608 %1$s__attach(struct %1$s *skel) \n\
609 { \n\
610 int ret = 0; \n\
611 \n\
612 ", obj_name);
613
614 bpf_object__for_each_program(prog, obj) {
615 codegen("\
616 \n\
617 ret = ret < 0 ? ret : %1$s__%2$s__attach(skel); \n\
618 ", obj_name, bpf_program__name(prog));
619 }
620
621 codegen("\
622 \n\
623 return ret < 0 ? ret : 0; \n\
624 } \n\
625 \n\
626 static inline void \n\
627 %1$s__detach(struct %1$s *skel) \n\
628 { \n\
629 ", obj_name);
630
631 bpf_object__for_each_program(prog, obj) {
632 codegen("\
633 \n\
634 skel_closenz(skel->links.%1$s_fd); \n\
635 ", bpf_program__name(prog));
636 }
637
638 codegen("\
639 \n\
640 } \n\
641 ");
642}
643
644static void codegen_destroy(struct bpf_object *obj, const char *obj_name)
645{
646 struct bpf_program *prog;
647 struct bpf_map *map;
648 char ident[256];
649
650 codegen("\
651 \n\
652 static void \n\
653 %1$s__destroy(struct %1$s *skel) \n\
654 { \n\
655 if (!skel) \n\
656 return; \n\
657 %1$s__detach(skel); \n\
658 ",
659 obj_name);
660
661 bpf_object__for_each_program(prog, obj) {
662 codegen("\
663 \n\
664 skel_closenz(skel->progs.%1$s.prog_fd); \n\
665 ", bpf_program__name(prog));
666 }
667
668 bpf_object__for_each_map(map, obj) {
669 if (!get_map_ident(map, ident, sizeof(ident)))
670 continue;
671 if (bpf_map__is_internal(map) &&
672 (bpf_map__map_flags(map) & BPF_F_MMAPABLE))
673 printf("\tskel_free_map_data(skel->%1$s, skel->maps.%1$s.initial_value, %2$zd);\n",
674 ident, bpf_map_mmap_sz(map));
675 codegen("\
676 \n\
677 skel_closenz(skel->maps.%1$s.map_fd); \n\
678 ", ident);
679 }
680 codegen("\
681 \n\
682 skel_free(skel); \n\
683 } \n\
684 ",
685 obj_name);
686}
687
688static int gen_trace(struct bpf_object *obj, const char *obj_name, const char *header_guard)
689{
690 DECLARE_LIBBPF_OPTS(gen_loader_opts, opts);
691 struct bpf_map *map;
692 char ident[256];
693 int err = 0;
694
695 err = bpf_object__gen_loader(obj, &opts);
696 if (err)
697 return err;
698
699 err = bpf_object__load(obj);
700 if (err) {
701 p_err("failed to load object file");
702 goto out;
703 }
704 /* If there was no error during load then gen_loader_opts
705 * are populated with the loader program.
706 */
707
708 /* finish generating 'struct skel' */
709 codegen("\
710 \n\
711 }; \n\
712 ", obj_name);
713
714
715 codegen_attach_detach(obj, obj_name);
716
717 codegen_destroy(obj, obj_name);
718
719 codegen("\
720 \n\
721 static inline struct %1$s * \n\
722 %1$s__open(void) \n\
723 { \n\
724 struct %1$s *skel; \n\
725 \n\
726 skel = skel_alloc(sizeof(*skel)); \n\
727 if (!skel) \n\
728 goto cleanup; \n\
729 skel->ctx.sz = (void *)&skel->links - (void *)skel; \n\
730 ",
731 obj_name, opts.data_sz);
732 bpf_object__for_each_map(map, obj) {
733 const void *mmap_data = NULL;
734 size_t mmap_size = 0;
735
736 if (!is_mmapable_map(map, ident, sizeof(ident)))
737 continue;
738
739 codegen("\
740 \n\
741 { \n\
742 static const char data[] __attribute__((__aligned__(8))) = \"\\\n\
743 ");
744 mmap_data = bpf_map__initial_value(map, &mmap_size);
745 print_hex(mmap_data, mmap_size);
746 codegen("\
747 \n\
748 \"; \n\
749 \n\
750 skel->%1$s = skel_prep_map_data((void *)data, %2$zd,\n\
751 sizeof(data) - 1);\n\
752 if (!skel->%1$s) \n\
753 goto cleanup; \n\
754 skel->maps.%1$s.initial_value = (__u64) (long) skel->%1$s;\n\
755 } \n\
756 ", ident, bpf_map_mmap_sz(map));
757 }
758 codegen("\
759 \n\
760 return skel; \n\
761 cleanup: \n\
762 %1$s__destroy(skel); \n\
763 return NULL; \n\
764 } \n\
765 \n\
766 static inline int \n\
767 %1$s__load(struct %1$s *skel) \n\
768 { \n\
769 struct bpf_load_and_run_opts opts = {}; \n\
770 int err; \n\
771 static const char opts_data[] __attribute__((__aligned__(8))) = \"\\\n\
772 ",
773 obj_name);
774 print_hex(opts.data, opts.data_sz);
775 codegen("\
776 \n\
777 \"; \n\
778 static const char opts_insn[] __attribute__((__aligned__(8))) = \"\\\n\
779 ");
780 print_hex(opts.insns, opts.insns_sz);
781 codegen("\
782 \n\
783 \"; \n\
784 \n\
785 opts.ctx = (struct bpf_loader_ctx *)skel; \n\
786 opts.data_sz = sizeof(opts_data) - 1; \n\
787 opts.data = (void *)opts_data; \n\
788 opts.insns_sz = sizeof(opts_insn) - 1; \n\
789 opts.insns = (void *)opts_insn; \n\
790 \n\
791 err = bpf_load_and_run(&opts); \n\
792 if (err < 0) \n\
793 return err; \n\
794 ");
795 bpf_object__for_each_map(map, obj) {
796 const char *mmap_flags;
797
798 if (!is_mmapable_map(map, ident, sizeof(ident)))
799 continue;
800
801 if (bpf_map__map_flags(map) & BPF_F_RDONLY_PROG)
802 mmap_flags = "PROT_READ";
803 else
804 mmap_flags = "PROT_READ | PROT_WRITE";
805
806 codegen("\
807 \n\
808 skel->%1$s = skel_finalize_map_data(&skel->maps.%1$s.initial_value, \n\
809 %2$zd, %3$s, skel->maps.%1$s.map_fd);\n\
810 if (!skel->%1$s) \n\
811 return -ENOMEM; \n\
812 ",
813 ident, bpf_map_mmap_sz(map), mmap_flags);
814 }
815 codegen("\
816 \n\
817 return 0; \n\
818 } \n\
819 \n\
820 static inline struct %1$s * \n\
821 %1$s__open_and_load(void) \n\
822 { \n\
823 struct %1$s *skel; \n\
824 \n\
825 skel = %1$s__open(); \n\
826 if (!skel) \n\
827 return NULL; \n\
828 if (%1$s__load(skel)) { \n\
829 %1$s__destroy(skel); \n\
830 return NULL; \n\
831 } \n\
832 return skel; \n\
833 } \n\
834 \n\
835 ", obj_name);
836
837 codegen_asserts(obj, obj_name);
838
839 codegen("\
840 \n\
841 \n\
842 #endif /* %s */ \n\
843 ",
844 header_guard);
845 err = 0;
846out:
847 return err;
848}
849
850static void
851codegen_maps_skeleton(struct bpf_object *obj, size_t map_cnt, bool mmaped)
852{
853 struct bpf_map *map;
854 char ident[256];
855 size_t i;
856
857 if (!map_cnt)
858 return;
859
860 codegen("\
861 \n\
862 \n\
863 /* maps */ \n\
864 s->map_cnt = %zu; \n\
865 s->map_skel_sz = sizeof(*s->maps); \n\
866 s->maps = (struct bpf_map_skeleton *)calloc(s->map_cnt, s->map_skel_sz);\n\
867 if (!s->maps) { \n\
868 err = -ENOMEM; \n\
869 goto err; \n\
870 } \n\
871 ",
872 map_cnt
873 );
874 i = 0;
875 bpf_object__for_each_map(map, obj) {
876 if (!get_map_ident(map, ident, sizeof(ident)))
877 continue;
878
879 codegen("\
880 \n\
881 \n\
882 s->maps[%zu].name = \"%s\"; \n\
883 s->maps[%zu].map = &obj->maps.%s; \n\
884 ",
885 i, bpf_map__name(map), i, ident);
886 /* memory-mapped internal maps */
887 if (mmaped && is_mmapable_map(map, ident, sizeof(ident))) {
888 printf("\ts->maps[%zu].mmaped = (void **)&obj->%s;\n",
889 i, ident);
890 }
891 i++;
892 }
893}
894
895static void
896codegen_progs_skeleton(struct bpf_object *obj, size_t prog_cnt, bool populate_links)
897{
898 struct bpf_program *prog;
899 int i;
900
901 if (!prog_cnt)
902 return;
903
904 codegen("\
905 \n\
906 \n\
907 /* programs */ \n\
908 s->prog_cnt = %zu; \n\
909 s->prog_skel_sz = sizeof(*s->progs); \n\
910 s->progs = (struct bpf_prog_skeleton *)calloc(s->prog_cnt, s->prog_skel_sz);\n\
911 if (!s->progs) { \n\
912 err = -ENOMEM; \n\
913 goto err; \n\
914 } \n\
915 ",
916 prog_cnt
917 );
918 i = 0;
919 bpf_object__for_each_program(prog, obj) {
920 codegen("\
921 \n\
922 \n\
923 s->progs[%1$zu].name = \"%2$s\"; \n\
924 s->progs[%1$zu].prog = &obj->progs.%2$s;\n\
925 ",
926 i, bpf_program__name(prog));
927
928 if (populate_links) {
929 codegen("\
930 \n\
931 s->progs[%1$zu].link = &obj->links.%2$s;\n\
932 ",
933 i, bpf_program__name(prog));
934 }
935 i++;
936 }
937}
938
939static int walk_st_ops_shadow_vars(struct btf *btf, const char *ident,
940 const struct btf_type *map_type, __u32 map_type_id)
941{
942 LIBBPF_OPTS(btf_dump_emit_type_decl_opts, opts, .indent_level = 3);
943 const struct btf_type *member_type;
944 __u32 offset, next_offset = 0;
945 const struct btf_member *m;
946 struct btf_dump *d = NULL;
947 const char *member_name;
948 __u32 member_type_id;
949 int i, err = 0, n;
950 int size;
951
952 d = btf_dump__new(btf, codegen_btf_dump_printf, NULL, NULL);
953 if (!d)
954 return -errno;
955
956 n = btf_vlen(map_type);
957 for (i = 0, m = btf_members(map_type); i < n; i++, m++) {
958 member_type = skip_mods_and_typedefs(btf, m->type, &member_type_id);
959 member_name = btf__name_by_offset(btf, m->name_off);
960
961 offset = m->offset / 8;
962 if (next_offset < offset)
963 printf("\t\t\tchar __padding_%d[%d];\n", i, offset - next_offset);
964
965 switch (btf_kind(member_type)) {
966 case BTF_KIND_INT:
967 case BTF_KIND_FLOAT:
968 case BTF_KIND_ENUM:
969 case BTF_KIND_ENUM64:
970 /* scalar type */
971 printf("\t\t\t");
972 opts.field_name = member_name;
973 err = btf_dump__emit_type_decl(d, member_type_id, &opts);
974 if (err) {
975 p_err("Failed to emit type declaration for %s: %d", member_name, err);
976 goto out;
977 }
978 printf(";\n");
979
980 size = btf__resolve_size(btf, member_type_id);
981 if (size < 0) {
982 p_err("Failed to resolve size of %s: %d\n", member_name, size);
983 err = size;
984 goto out;
985 }
986
987 next_offset = offset + size;
988 break;
989
990 case BTF_KIND_PTR:
991 if (resolve_func_ptr(btf, m->type, NULL)) {
992 /* Function pointer */
993 printf("\t\t\tstruct bpf_program *%s;\n", member_name);
994
995 next_offset = offset + sizeof(void *);
996 break;
997 }
998 /* All pointer types are unsupported except for
999 * function pointers.
1000 */
1001 fallthrough;
1002
1003 default:
1004 /* Unsupported types
1005 *
1006 * Types other than scalar types and function
1007 * pointers are currently not supported in order to
1008 * prevent conflicts in the generated code caused
1009 * by multiple definitions. For instance, if the
1010 * struct type FOO is used in a struct_ops map,
1011 * bpftool has to generate definitions for FOO,
1012 * which may result in conflicts if FOO is defined
1013 * in different skeleton files.
1014 */
1015 size = btf__resolve_size(btf, member_type_id);
1016 if (size < 0) {
1017 p_err("Failed to resolve size of %s: %d\n", member_name, size);
1018 err = size;
1019 goto out;
1020 }
1021 printf("\t\t\tchar __unsupported_%d[%d];\n", i, size);
1022
1023 next_offset = offset + size;
1024 break;
1025 }
1026 }
1027
1028 /* Cannot fail since it must be a struct type */
1029 size = btf__resolve_size(btf, map_type_id);
1030 if (next_offset < (__u32)size)
1031 printf("\t\t\tchar __padding_end[%d];\n", size - next_offset);
1032
1033out:
1034 btf_dump__free(d);
1035
1036 return err;
1037}
1038
1039/* Generate the pointer of the shadow type for a struct_ops map.
1040 *
1041 * This function adds a pointer of the shadow type for a struct_ops map.
1042 * The members of a struct_ops map can be exported through a pointer to a
1043 * shadow type. The user can access these members through the pointer.
1044 *
1045 * A shadow type includes not all members, only members of some types.
1046 * They are scalar types and function pointers. The function pointers are
1047 * translated to the pointer of the struct bpf_program. The scalar types
1048 * are translated to the original type without any modifiers.
1049 *
1050 * Unsupported types will be translated to a char array to occupy the same
1051 * space as the original field, being renamed as __unsupported_*. The user
1052 * should treat these fields as opaque data.
1053 */
1054static int gen_st_ops_shadow_type(const char *obj_name, struct btf *btf, const char *ident,
1055 const struct bpf_map *map)
1056{
1057 const struct btf_type *map_type;
1058 const char *type_name;
1059 __u32 map_type_id;
1060 int err;
1061
1062 map_type_id = bpf_map__btf_value_type_id(map);
1063 if (map_type_id == 0)
1064 return -EINVAL;
1065 map_type = btf__type_by_id(btf, map_type_id);
1066 if (!map_type)
1067 return -EINVAL;
1068
1069 type_name = btf__name_by_offset(btf, map_type->name_off);
1070
1071 printf("\t\tstruct %s__%s__%s {\n", obj_name, ident, type_name);
1072
1073 err = walk_st_ops_shadow_vars(btf, ident, map_type, map_type_id);
1074 if (err)
1075 return err;
1076
1077 printf("\t\t} *%s;\n", ident);
1078
1079 return 0;
1080}
1081
1082static int gen_st_ops_shadow(const char *obj_name, struct btf *btf, struct bpf_object *obj)
1083{
1084 int err, st_ops_cnt = 0;
1085 struct bpf_map *map;
1086 char ident[256];
1087
1088 if (!btf)
1089 return 0;
1090
1091 /* Generate the pointers to shadow types of
1092 * struct_ops maps.
1093 */
1094 bpf_object__for_each_map(map, obj) {
1095 if (bpf_map__type(map) != BPF_MAP_TYPE_STRUCT_OPS)
1096 continue;
1097 if (!get_map_ident(map, ident, sizeof(ident)))
1098 continue;
1099
1100 if (st_ops_cnt == 0) /* first struct_ops map */
1101 printf("\tstruct {\n");
1102 st_ops_cnt++;
1103
1104 err = gen_st_ops_shadow_type(obj_name, btf, ident, map);
1105 if (err)
1106 return err;
1107 }
1108
1109 if (st_ops_cnt)
1110 printf("\t} struct_ops;\n");
1111
1112 return 0;
1113}
1114
1115/* Generate the code to initialize the pointers of shadow types. */
1116static void gen_st_ops_shadow_init(struct btf *btf, struct bpf_object *obj)
1117{
1118 struct bpf_map *map;
1119 char ident[256];
1120
1121 if (!btf)
1122 return;
1123
1124 /* Initialize the pointers to_ops shadow types of
1125 * struct_ops maps.
1126 */
1127 bpf_object__for_each_map(map, obj) {
1128 if (bpf_map__type(map) != BPF_MAP_TYPE_STRUCT_OPS)
1129 continue;
1130 if (!get_map_ident(map, ident, sizeof(ident)))
1131 continue;
1132 codegen("\
1133 \n\
1134 obj->struct_ops.%1$s = bpf_map__initial_value(obj->maps.%1$s, NULL);\n\
1135 \n\
1136 ", ident);
1137 }
1138}
1139
1140static int do_skeleton(int argc, char **argv)
1141{
1142 char header_guard[MAX_OBJ_NAME_LEN + sizeof("__SKEL_H__")];
1143 size_t map_cnt = 0, prog_cnt = 0, file_sz, mmap_sz;
1144 DECLARE_LIBBPF_OPTS(bpf_object_open_opts, opts);
1145 char obj_name[MAX_OBJ_NAME_LEN] = "", *obj_data;
1146 struct bpf_object *obj = NULL;
1147 const char *file;
1148 char ident[256];
1149 struct bpf_program *prog;
1150 int fd, err = -1;
1151 struct bpf_map *map;
1152 struct btf *btf;
1153 struct stat st;
1154
1155 if (!REQ_ARGS(1)) {
1156 usage();
1157 return -1;
1158 }
1159 file = GET_ARG();
1160
1161 while (argc) {
1162 if (!REQ_ARGS(2))
1163 return -1;
1164
1165 if (is_prefix(*argv, "name")) {
1166 NEXT_ARG();
1167
1168 if (obj_name[0] != '\0') {
1169 p_err("object name already specified");
1170 return -1;
1171 }
1172
1173 strncpy(obj_name, *argv, MAX_OBJ_NAME_LEN - 1);
1174 obj_name[MAX_OBJ_NAME_LEN - 1] = '\0';
1175 } else {
1176 p_err("unknown arg %s", *argv);
1177 return -1;
1178 }
1179
1180 NEXT_ARG();
1181 }
1182
1183 if (argc) {
1184 p_err("extra unknown arguments");
1185 return -1;
1186 }
1187
1188 if (stat(file, &st)) {
1189 p_err("failed to stat() %s: %s", file, strerror(errno));
1190 return -1;
1191 }
1192 file_sz = st.st_size;
1193 mmap_sz = roundup(file_sz, sysconf(_SC_PAGE_SIZE));
1194 fd = open(file, O_RDONLY);
1195 if (fd < 0) {
1196 p_err("failed to open() %s: %s", file, strerror(errno));
1197 return -1;
1198 }
1199 obj_data = mmap(NULL, mmap_sz, PROT_READ, MAP_PRIVATE, fd, 0);
1200 if (obj_data == MAP_FAILED) {
1201 obj_data = NULL;
1202 p_err("failed to mmap() %s: %s", file, strerror(errno));
1203 goto out;
1204 }
1205 if (obj_name[0] == '\0')
1206 get_obj_name(obj_name, file);
1207 opts.object_name = obj_name;
1208 if (verifier_logs)
1209 /* log_level1 + log_level2 + stats, but not stable UAPI */
1210 opts.kernel_log_level = 1 + 2 + 4;
1211 obj = bpf_object__open_mem(obj_data, file_sz, &opts);
1212 if (!obj) {
1213 char err_buf[256];
1214
1215 err = -errno;
1216 libbpf_strerror(err, err_buf, sizeof(err_buf));
1217 p_err("failed to open BPF object file: %s", err_buf);
1218 goto out;
1219 }
1220
1221 bpf_object__for_each_map(map, obj) {
1222 if (!get_map_ident(map, ident, sizeof(ident))) {
1223 p_err("ignoring unrecognized internal map '%s'...",
1224 bpf_map__name(map));
1225 continue;
1226 }
1227 map_cnt++;
1228 }
1229 bpf_object__for_each_program(prog, obj) {
1230 prog_cnt++;
1231 }
1232
1233 get_header_guard(header_guard, obj_name, "SKEL_H");
1234 if (use_loader) {
1235 codegen("\
1236 \n\
1237 /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */ \n\
1238 /* THIS FILE IS AUTOGENERATED BY BPFTOOL! */ \n\
1239 #ifndef %2$s \n\
1240 #define %2$s \n\
1241 \n\
1242 #include <bpf/skel_internal.h> \n\
1243 \n\
1244 struct %1$s { \n\
1245 struct bpf_loader_ctx ctx; \n\
1246 ",
1247 obj_name, header_guard
1248 );
1249 } else {
1250 codegen("\
1251 \n\
1252 /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */ \n\
1253 \n\
1254 /* THIS FILE IS AUTOGENERATED BY BPFTOOL! */ \n\
1255 #ifndef %2$s \n\
1256 #define %2$s \n\
1257 \n\
1258 #include <errno.h> \n\
1259 #include <stdlib.h> \n\
1260 #include <bpf/libbpf.h> \n\
1261 \n\
1262 struct %1$s { \n\
1263 struct bpf_object_skeleton *skeleton; \n\
1264 struct bpf_object *obj; \n\
1265 ",
1266 obj_name, header_guard
1267 );
1268 }
1269
1270 if (map_cnt) {
1271 printf("\tstruct {\n");
1272 bpf_object__for_each_map(map, obj) {
1273 if (!get_map_ident(map, ident, sizeof(ident)))
1274 continue;
1275 if (use_loader)
1276 printf("\t\tstruct bpf_map_desc %s;\n", ident);
1277 else
1278 printf("\t\tstruct bpf_map *%s;\n", ident);
1279 }
1280 printf("\t} maps;\n");
1281 }
1282
1283 btf = bpf_object__btf(obj);
1284 err = gen_st_ops_shadow(obj_name, btf, obj);
1285 if (err)
1286 goto out;
1287
1288 if (prog_cnt) {
1289 printf("\tstruct {\n");
1290 bpf_object__for_each_program(prog, obj) {
1291 if (use_loader)
1292 printf("\t\tstruct bpf_prog_desc %s;\n",
1293 bpf_program__name(prog));
1294 else
1295 printf("\t\tstruct bpf_program *%s;\n",
1296 bpf_program__name(prog));
1297 }
1298 printf("\t} progs;\n");
1299 printf("\tstruct {\n");
1300 bpf_object__for_each_program(prog, obj) {
1301 if (use_loader)
1302 printf("\t\tint %s_fd;\n",
1303 bpf_program__name(prog));
1304 else
1305 printf("\t\tstruct bpf_link *%s;\n",
1306 bpf_program__name(prog));
1307 }
1308 printf("\t} links;\n");
1309 }
1310
1311 if (btf) {
1312 err = codegen_datasecs(obj, obj_name);
1313 if (err)
1314 goto out;
1315 }
1316 if (use_loader) {
1317 err = gen_trace(obj, obj_name, header_guard);
1318 goto out;
1319 }
1320
1321 codegen("\
1322 \n\
1323 \n\
1324 #ifdef __cplusplus \n\
1325 static inline struct %1$s *open(const struct bpf_object_open_opts *opts = nullptr);\n\
1326 static inline struct %1$s *open_and_load(); \n\
1327 static inline int load(struct %1$s *skel); \n\
1328 static inline int attach(struct %1$s *skel); \n\
1329 static inline void detach(struct %1$s *skel); \n\
1330 static inline void destroy(struct %1$s *skel); \n\
1331 static inline const void *elf_bytes(size_t *sz); \n\
1332 #endif /* __cplusplus */ \n\
1333 }; \n\
1334 \n\
1335 static void \n\
1336 %1$s__destroy(struct %1$s *obj) \n\
1337 { \n\
1338 if (!obj) \n\
1339 return; \n\
1340 if (obj->skeleton) \n\
1341 bpf_object__destroy_skeleton(obj->skeleton);\n\
1342 free(obj); \n\
1343 } \n\
1344 \n\
1345 static inline int \n\
1346 %1$s__create_skeleton(struct %1$s *obj); \n\
1347 \n\
1348 static inline struct %1$s * \n\
1349 %1$s__open_opts(const struct bpf_object_open_opts *opts) \n\
1350 { \n\
1351 struct %1$s *obj; \n\
1352 int err; \n\
1353 \n\
1354 obj = (struct %1$s *)calloc(1, sizeof(*obj)); \n\
1355 if (!obj) { \n\
1356 errno = ENOMEM; \n\
1357 return NULL; \n\
1358 } \n\
1359 \n\
1360 err = %1$s__create_skeleton(obj); \n\
1361 if (err) \n\
1362 goto err_out; \n\
1363 \n\
1364 err = bpf_object__open_skeleton(obj->skeleton, opts);\n\
1365 if (err) \n\
1366 goto err_out; \n\
1367 \n\
1368 ", obj_name);
1369
1370 gen_st_ops_shadow_init(btf, obj);
1371
1372 codegen("\
1373 \n\
1374 return obj; \n\
1375 err_out: \n\
1376 %1$s__destroy(obj); \n\
1377 errno = -err; \n\
1378 return NULL; \n\
1379 } \n\
1380 \n\
1381 static inline struct %1$s * \n\
1382 %1$s__open(void) \n\
1383 { \n\
1384 return %1$s__open_opts(NULL); \n\
1385 } \n\
1386 \n\
1387 static inline int \n\
1388 %1$s__load(struct %1$s *obj) \n\
1389 { \n\
1390 return bpf_object__load_skeleton(obj->skeleton); \n\
1391 } \n\
1392 \n\
1393 static inline struct %1$s * \n\
1394 %1$s__open_and_load(void) \n\
1395 { \n\
1396 struct %1$s *obj; \n\
1397 int err; \n\
1398 \n\
1399 obj = %1$s__open(); \n\
1400 if (!obj) \n\
1401 return NULL; \n\
1402 err = %1$s__load(obj); \n\
1403 if (err) { \n\
1404 %1$s__destroy(obj); \n\
1405 errno = -err; \n\
1406 return NULL; \n\
1407 } \n\
1408 return obj; \n\
1409 } \n\
1410 \n\
1411 static inline int \n\
1412 %1$s__attach(struct %1$s *obj) \n\
1413 { \n\
1414 return bpf_object__attach_skeleton(obj->skeleton); \n\
1415 } \n\
1416 \n\
1417 static inline void \n\
1418 %1$s__detach(struct %1$s *obj) \n\
1419 { \n\
1420 bpf_object__detach_skeleton(obj->skeleton); \n\
1421 } \n\
1422 ",
1423 obj_name
1424 );
1425
1426 codegen("\
1427 \n\
1428 \n\
1429 static inline const void *%1$s__elf_bytes(size_t *sz); \n\
1430 \n\
1431 static inline int \n\
1432 %1$s__create_skeleton(struct %1$s *obj) \n\
1433 { \n\
1434 struct bpf_object_skeleton *s; \n\
1435 int err; \n\
1436 \n\
1437 s = (struct bpf_object_skeleton *)calloc(1, sizeof(*s));\n\
1438 if (!s) { \n\
1439 err = -ENOMEM; \n\
1440 goto err; \n\
1441 } \n\
1442 \n\
1443 s->sz = sizeof(*s); \n\
1444 s->name = \"%1$s\"; \n\
1445 s->obj = &obj->obj; \n\
1446 ",
1447 obj_name
1448 );
1449
1450 codegen_maps_skeleton(obj, map_cnt, true /*mmaped*/);
1451 codegen_progs_skeleton(obj, prog_cnt, true /*populate_links*/);
1452
1453 codegen("\
1454 \n\
1455 \n\
1456 s->data = %1$s__elf_bytes(&s->data_sz); \n\
1457 \n\
1458 obj->skeleton = s; \n\
1459 return 0; \n\
1460 err: \n\
1461 bpf_object__destroy_skeleton(s); \n\
1462 return err; \n\
1463 } \n\
1464 \n\
1465 static inline const void *%1$s__elf_bytes(size_t *sz) \n\
1466 { \n\
1467 static const char data[] __attribute__((__aligned__(8))) = \"\\\n\
1468 ",
1469 obj_name
1470 );
1471
1472 /* embed contents of BPF object file */
1473 print_hex(obj_data, file_sz);
1474
1475 codegen("\
1476 \n\
1477 \"; \n\
1478 \n\
1479 *sz = sizeof(data) - 1; \n\
1480 return (const void *)data; \n\
1481 } \n\
1482 \n\
1483 #ifdef __cplusplus \n\
1484 struct %1$s *%1$s::open(const struct bpf_object_open_opts *opts) { return %1$s__open_opts(opts); }\n\
1485 struct %1$s *%1$s::open_and_load() { return %1$s__open_and_load(); } \n\
1486 int %1$s::load(struct %1$s *skel) { return %1$s__load(skel); } \n\
1487 int %1$s::attach(struct %1$s *skel) { return %1$s__attach(skel); } \n\
1488 void %1$s::detach(struct %1$s *skel) { %1$s__detach(skel); } \n\
1489 void %1$s::destroy(struct %1$s *skel) { %1$s__destroy(skel); } \n\
1490 const void *%1$s::elf_bytes(size_t *sz) { return %1$s__elf_bytes(sz); } \n\
1491 #endif /* __cplusplus */ \n\
1492 \n\
1493 ",
1494 obj_name);
1495
1496 codegen_asserts(obj, obj_name);
1497
1498 codegen("\
1499 \n\
1500 \n\
1501 #endif /* %1$s */ \n\
1502 ",
1503 header_guard);
1504 err = 0;
1505out:
1506 bpf_object__close(obj);
1507 if (obj_data)
1508 munmap(obj_data, mmap_sz);
1509 close(fd);
1510 return err;
1511}
1512
1513/* Subskeletons are like skeletons, except they don't own the bpf_object,
1514 * associated maps, links, etc. Instead, they know about the existence of
1515 * variables, maps, programs and are able to find their locations
1516 * _at runtime_ from an already loaded bpf_object.
1517 *
1518 * This allows for library-like BPF objects to have userspace counterparts
1519 * with access to their own items without having to know anything about the
1520 * final BPF object that the library was linked into.
1521 */
1522static int do_subskeleton(int argc, char **argv)
1523{
1524 char header_guard[MAX_OBJ_NAME_LEN + sizeof("__SUBSKEL_H__")];
1525 size_t i, len, file_sz, map_cnt = 0, prog_cnt = 0, mmap_sz, var_cnt = 0, var_idx = 0;
1526 DECLARE_LIBBPF_OPTS(bpf_object_open_opts, opts);
1527 char obj_name[MAX_OBJ_NAME_LEN] = "", *obj_data;
1528 struct bpf_object *obj = NULL;
1529 const char *file, *var_name;
1530 char ident[256];
1531 int fd, err = -1, map_type_id;
1532 const struct bpf_map *map;
1533 struct bpf_program *prog;
1534 struct btf *btf;
1535 const struct btf_type *map_type, *var_type;
1536 const struct btf_var_secinfo *var;
1537 struct stat st;
1538
1539 if (!REQ_ARGS(1)) {
1540 usage();
1541 return -1;
1542 }
1543 file = GET_ARG();
1544
1545 while (argc) {
1546 if (!REQ_ARGS(2))
1547 return -1;
1548
1549 if (is_prefix(*argv, "name")) {
1550 NEXT_ARG();
1551
1552 if (obj_name[0] != '\0') {
1553 p_err("object name already specified");
1554 return -1;
1555 }
1556
1557 strncpy(obj_name, *argv, MAX_OBJ_NAME_LEN - 1);
1558 obj_name[MAX_OBJ_NAME_LEN - 1] = '\0';
1559 } else {
1560 p_err("unknown arg %s", *argv);
1561 return -1;
1562 }
1563
1564 NEXT_ARG();
1565 }
1566
1567 if (argc) {
1568 p_err("extra unknown arguments");
1569 return -1;
1570 }
1571
1572 if (use_loader) {
1573 p_err("cannot use loader for subskeletons");
1574 return -1;
1575 }
1576
1577 if (stat(file, &st)) {
1578 p_err("failed to stat() %s: %s", file, strerror(errno));
1579 return -1;
1580 }
1581 file_sz = st.st_size;
1582 mmap_sz = roundup(file_sz, sysconf(_SC_PAGE_SIZE));
1583 fd = open(file, O_RDONLY);
1584 if (fd < 0) {
1585 p_err("failed to open() %s: %s", file, strerror(errno));
1586 return -1;
1587 }
1588 obj_data = mmap(NULL, mmap_sz, PROT_READ, MAP_PRIVATE, fd, 0);
1589 if (obj_data == MAP_FAILED) {
1590 obj_data = NULL;
1591 p_err("failed to mmap() %s: %s", file, strerror(errno));
1592 goto out;
1593 }
1594 if (obj_name[0] == '\0')
1595 get_obj_name(obj_name, file);
1596
1597 /* The empty object name allows us to use bpf_map__name and produce
1598 * ELF section names out of it. (".data" instead of "obj.data")
1599 */
1600 opts.object_name = "";
1601 obj = bpf_object__open_mem(obj_data, file_sz, &opts);
1602 if (!obj) {
1603 char err_buf[256];
1604
1605 libbpf_strerror(errno, err_buf, sizeof(err_buf));
1606 p_err("failed to open BPF object file: %s", err_buf);
1607 obj = NULL;
1608 goto out;
1609 }
1610
1611 btf = bpf_object__btf(obj);
1612 if (!btf) {
1613 err = -1;
1614 p_err("need btf type information for %s", obj_name);
1615 goto out;
1616 }
1617
1618 bpf_object__for_each_program(prog, obj) {
1619 prog_cnt++;
1620 }
1621
1622 /* First, count how many variables we have to find.
1623 * We need this in advance so the subskel can allocate the right
1624 * amount of storage.
1625 */
1626 bpf_object__for_each_map(map, obj) {
1627 if (!get_map_ident(map, ident, sizeof(ident)))
1628 continue;
1629
1630 /* Also count all maps that have a name */
1631 map_cnt++;
1632
1633 if (!is_mmapable_map(map, ident, sizeof(ident)))
1634 continue;
1635
1636 map_type_id = bpf_map__btf_value_type_id(map);
1637 if (map_type_id <= 0) {
1638 err = map_type_id;
1639 goto out;
1640 }
1641 map_type = btf__type_by_id(btf, map_type_id);
1642
1643 var = btf_var_secinfos(map_type);
1644 len = btf_vlen(map_type);
1645 for (i = 0; i < len; i++, var++) {
1646 var_type = btf__type_by_id(btf, var->type);
1647
1648 if (btf_var(var_type)->linkage == BTF_VAR_STATIC)
1649 continue;
1650
1651 var_cnt++;
1652 }
1653 }
1654
1655 get_header_guard(header_guard, obj_name, "SUBSKEL_H");
1656 codegen("\
1657 \n\
1658 /* SPDX-License-Identifier: (LGPL-2.1 OR BSD-2-Clause) */ \n\
1659 \n\
1660 /* THIS FILE IS AUTOGENERATED! */ \n\
1661 #ifndef %2$s \n\
1662 #define %2$s \n\
1663 \n\
1664 #include <errno.h> \n\
1665 #include <stdlib.h> \n\
1666 #include <bpf/libbpf.h> \n\
1667 \n\
1668 struct %1$s { \n\
1669 struct bpf_object *obj; \n\
1670 struct bpf_object_subskeleton *subskel; \n\
1671 ", obj_name, header_guard);
1672
1673 if (map_cnt) {
1674 printf("\tstruct {\n");
1675 bpf_object__for_each_map(map, obj) {
1676 if (!get_map_ident(map, ident, sizeof(ident)))
1677 continue;
1678 printf("\t\tstruct bpf_map *%s;\n", ident);
1679 }
1680 printf("\t} maps;\n");
1681 }
1682
1683 err = gen_st_ops_shadow(obj_name, btf, obj);
1684 if (err)
1685 goto out;
1686
1687 if (prog_cnt) {
1688 printf("\tstruct {\n");
1689 bpf_object__for_each_program(prog, obj) {
1690 printf("\t\tstruct bpf_program *%s;\n",
1691 bpf_program__name(prog));
1692 }
1693 printf("\t} progs;\n");
1694 }
1695
1696 err = codegen_subskel_datasecs(obj, obj_name);
1697 if (err)
1698 goto out;
1699
1700 /* emit code that will allocate enough storage for all symbols */
1701 codegen("\
1702 \n\
1703 \n\
1704 #ifdef __cplusplus \n\
1705 static inline struct %1$s *open(const struct bpf_object *src);\n\
1706 static inline void destroy(struct %1$s *skel); \n\
1707 #endif /* __cplusplus */ \n\
1708 }; \n\
1709 \n\
1710 static inline void \n\
1711 %1$s__destroy(struct %1$s *skel) \n\
1712 { \n\
1713 if (!skel) \n\
1714 return; \n\
1715 if (skel->subskel) \n\
1716 bpf_object__destroy_subskeleton(skel->subskel);\n\
1717 free(skel); \n\
1718 } \n\
1719 \n\
1720 static inline struct %1$s * \n\
1721 %1$s__open(const struct bpf_object *src) \n\
1722 { \n\
1723 struct %1$s *obj; \n\
1724 struct bpf_object_subskeleton *s; \n\
1725 int err; \n\
1726 \n\
1727 obj = (struct %1$s *)calloc(1, sizeof(*obj)); \n\
1728 if (!obj) { \n\
1729 err = -ENOMEM; \n\
1730 goto err; \n\
1731 } \n\
1732 s = (struct bpf_object_subskeleton *)calloc(1, sizeof(*s));\n\
1733 if (!s) { \n\
1734 err = -ENOMEM; \n\
1735 goto err; \n\
1736 } \n\
1737 s->sz = sizeof(*s); \n\
1738 s->obj = src; \n\
1739 s->var_skel_sz = sizeof(*s->vars); \n\
1740 obj->subskel = s; \n\
1741 \n\
1742 /* vars */ \n\
1743 s->var_cnt = %2$d; \n\
1744 s->vars = (struct bpf_var_skeleton *)calloc(%2$d, sizeof(*s->vars));\n\
1745 if (!s->vars) { \n\
1746 err = -ENOMEM; \n\
1747 goto err; \n\
1748 } \n\
1749 ",
1750 obj_name, var_cnt
1751 );
1752
1753 /* walk through each symbol and emit the runtime representation */
1754 bpf_object__for_each_map(map, obj) {
1755 if (!is_mmapable_map(map, ident, sizeof(ident)))
1756 continue;
1757
1758 map_type_id = bpf_map__btf_value_type_id(map);
1759 if (map_type_id <= 0)
1760 /* skip over internal maps with no type*/
1761 continue;
1762
1763 map_type = btf__type_by_id(btf, map_type_id);
1764 var = btf_var_secinfos(map_type);
1765 len = btf_vlen(map_type);
1766 for (i = 0; i < len; i++, var++) {
1767 var_type = btf__type_by_id(btf, var->type);
1768 var_name = btf__name_by_offset(btf, var_type->name_off);
1769
1770 if (btf_var(var_type)->linkage == BTF_VAR_STATIC)
1771 continue;
1772
1773 /* Note that we use the dot prefix in .data as the
1774 * field access operator i.e. maps%s becomes maps.data
1775 */
1776 codegen("\
1777 \n\
1778 \n\
1779 s->vars[%3$d].name = \"%1$s\"; \n\
1780 s->vars[%3$d].map = &obj->maps.%2$s; \n\
1781 s->vars[%3$d].addr = (void **) &obj->%2$s.%1$s;\n\
1782 ", var_name, ident, var_idx);
1783
1784 var_idx++;
1785 }
1786 }
1787
1788 codegen_maps_skeleton(obj, map_cnt, false /*mmaped*/);
1789 codegen_progs_skeleton(obj, prog_cnt, false /*links*/);
1790
1791 codegen("\
1792 \n\
1793 \n\
1794 err = bpf_object__open_subskeleton(s); \n\
1795 if (err) \n\
1796 goto err; \n\
1797 \n\
1798 ");
1799
1800 gen_st_ops_shadow_init(btf, obj);
1801
1802 codegen("\
1803 \n\
1804 return obj; \n\
1805 err: \n\
1806 %1$s__destroy(obj); \n\
1807 errno = -err; \n\
1808 return NULL; \n\
1809 } \n\
1810 \n\
1811 #ifdef __cplusplus \n\
1812 struct %1$s *%1$s::open(const struct bpf_object *src) { return %1$s__open(src); }\n\
1813 void %1$s::destroy(struct %1$s *skel) { %1$s__destroy(skel); }\n\
1814 #endif /* __cplusplus */ \n\
1815 \n\
1816 #endif /* %2$s */ \n\
1817 ",
1818 obj_name, header_guard);
1819 err = 0;
1820out:
1821 bpf_object__close(obj);
1822 if (obj_data)
1823 munmap(obj_data, mmap_sz);
1824 close(fd);
1825 return err;
1826}
1827
1828static int do_object(int argc, char **argv)
1829{
1830 struct bpf_linker *linker;
1831 const char *output_file, *file;
1832 int err = 0;
1833
1834 if (!REQ_ARGS(2)) {
1835 usage();
1836 return -1;
1837 }
1838
1839 output_file = GET_ARG();
1840
1841 linker = bpf_linker__new(output_file, NULL);
1842 if (!linker) {
1843 p_err("failed to create BPF linker instance");
1844 return -1;
1845 }
1846
1847 while (argc) {
1848 file = GET_ARG();
1849
1850 err = bpf_linker__add_file(linker, file, NULL);
1851 if (err) {
1852 p_err("failed to link '%s': %s (%d)", file, strerror(errno), errno);
1853 goto out;
1854 }
1855 }
1856
1857 err = bpf_linker__finalize(linker);
1858 if (err) {
1859 p_err("failed to finalize ELF file: %s (%d)", strerror(errno), errno);
1860 goto out;
1861 }
1862
1863 err = 0;
1864out:
1865 bpf_linker__free(linker);
1866 return err;
1867}
1868
1869static int do_help(int argc, char **argv)
1870{
1871 if (json_output) {
1872 jsonw_null(json_wtr);
1873 return 0;
1874 }
1875
1876 fprintf(stderr,
1877 "Usage: %1$s %2$s object OUTPUT_FILE INPUT_FILE [INPUT_FILE...]\n"
1878 " %1$s %2$s skeleton FILE [name OBJECT_NAME]\n"
1879 " %1$s %2$s subskeleton FILE [name OBJECT_NAME]\n"
1880 " %1$s %2$s min_core_btf INPUT OUTPUT OBJECT [OBJECT...]\n"
1881 " %1$s %2$s help\n"
1882 "\n"
1883 " " HELP_SPEC_OPTIONS " |\n"
1884 " {-L|--use-loader} }\n"
1885 "",
1886 bin_name, "gen");
1887
1888 return 0;
1889}
1890
1891static int btf_save_raw(const struct btf *btf, const char *path)
1892{
1893 const void *data;
1894 FILE *f = NULL;
1895 __u32 data_sz;
1896 int err = 0;
1897
1898 data = btf__raw_data(btf, &data_sz);
1899 if (!data)
1900 return -ENOMEM;
1901
1902 f = fopen(path, "wb");
1903 if (!f)
1904 return -errno;
1905
1906 if (fwrite(data, 1, data_sz, f) != data_sz)
1907 err = -errno;
1908
1909 fclose(f);
1910 return err;
1911}
1912
1913struct btfgen_info {
1914 struct btf *src_btf;
1915 struct btf *marked_btf; /* btf structure used to mark used types */
1916};
1917
1918static size_t btfgen_hash_fn(long key, void *ctx)
1919{
1920 return key;
1921}
1922
1923static bool btfgen_equal_fn(long k1, long k2, void *ctx)
1924{
1925 return k1 == k2;
1926}
1927
1928static void btfgen_free_info(struct btfgen_info *info)
1929{
1930 if (!info)
1931 return;
1932
1933 btf__free(info->src_btf);
1934 btf__free(info->marked_btf);
1935
1936 free(info);
1937}
1938
1939static struct btfgen_info *
1940btfgen_new_info(const char *targ_btf_path)
1941{
1942 struct btfgen_info *info;
1943 int err;
1944
1945 info = calloc(1, sizeof(*info));
1946 if (!info)
1947 return NULL;
1948
1949 info->src_btf = btf__parse(targ_btf_path, NULL);
1950 if (!info->src_btf) {
1951 err = -errno;
1952 p_err("failed parsing '%s' BTF file: %s", targ_btf_path, strerror(errno));
1953 goto err_out;
1954 }
1955
1956 info->marked_btf = btf__parse(targ_btf_path, NULL);
1957 if (!info->marked_btf) {
1958 err = -errno;
1959 p_err("failed parsing '%s' BTF file: %s", targ_btf_path, strerror(errno));
1960 goto err_out;
1961 }
1962
1963 return info;
1964
1965err_out:
1966 btfgen_free_info(info);
1967 errno = -err;
1968 return NULL;
1969}
1970
1971#define MARKED UINT32_MAX
1972
1973static void btfgen_mark_member(struct btfgen_info *info, int type_id, int idx)
1974{
1975 const struct btf_type *t = btf__type_by_id(info->marked_btf, type_id);
1976 struct btf_member *m = btf_members(t) + idx;
1977
1978 m->name_off = MARKED;
1979}
1980
1981static int
1982btfgen_mark_type(struct btfgen_info *info, unsigned int type_id, bool follow_pointers)
1983{
1984 const struct btf_type *btf_type = btf__type_by_id(info->src_btf, type_id);
1985 struct btf_type *cloned_type;
1986 struct btf_param *param;
1987 struct btf_array *array;
1988 int err, i;
1989
1990 if (type_id == 0)
1991 return 0;
1992
1993 /* mark type on cloned BTF as used */
1994 cloned_type = (struct btf_type *) btf__type_by_id(info->marked_btf, type_id);
1995 cloned_type->name_off = MARKED;
1996
1997 /* recursively mark other types needed by it */
1998 switch (btf_kind(btf_type)) {
1999 case BTF_KIND_UNKN:
2000 case BTF_KIND_INT:
2001 case BTF_KIND_FLOAT:
2002 case BTF_KIND_ENUM:
2003 case BTF_KIND_ENUM64:
2004 case BTF_KIND_STRUCT:
2005 case BTF_KIND_UNION:
2006 break;
2007 case BTF_KIND_PTR:
2008 if (follow_pointers) {
2009 err = btfgen_mark_type(info, btf_type->type, follow_pointers);
2010 if (err)
2011 return err;
2012 }
2013 break;
2014 case BTF_KIND_CONST:
2015 case BTF_KIND_RESTRICT:
2016 case BTF_KIND_VOLATILE:
2017 case BTF_KIND_TYPEDEF:
2018 err = btfgen_mark_type(info, btf_type->type, follow_pointers);
2019 if (err)
2020 return err;
2021 break;
2022 case BTF_KIND_ARRAY:
2023 array = btf_array(btf_type);
2024
2025 /* mark array type */
2026 err = btfgen_mark_type(info, array->type, follow_pointers);
2027 /* mark array's index type */
2028 err = err ? : btfgen_mark_type(info, array->index_type, follow_pointers);
2029 if (err)
2030 return err;
2031 break;
2032 case BTF_KIND_FUNC_PROTO:
2033 /* mark ret type */
2034 err = btfgen_mark_type(info, btf_type->type, follow_pointers);
2035 if (err)
2036 return err;
2037
2038 /* mark parameters types */
2039 param = btf_params(btf_type);
2040 for (i = 0; i < btf_vlen(btf_type); i++) {
2041 err = btfgen_mark_type(info, param->type, follow_pointers);
2042 if (err)
2043 return err;
2044 param++;
2045 }
2046 break;
2047 /* tells if some other type needs to be handled */
2048 default:
2049 p_err("unsupported kind: %s (%d)", btf_kind_str(btf_type), type_id);
2050 return -EINVAL;
2051 }
2052
2053 return 0;
2054}
2055
2056static int btfgen_record_field_relo(struct btfgen_info *info, struct bpf_core_spec *targ_spec)
2057{
2058 struct btf *btf = info->src_btf;
2059 const struct btf_type *btf_type;
2060 struct btf_member *btf_member;
2061 struct btf_array *array;
2062 unsigned int type_id = targ_spec->root_type_id;
2063 int idx, err;
2064
2065 /* mark root type */
2066 btf_type = btf__type_by_id(btf, type_id);
2067 err = btfgen_mark_type(info, type_id, false);
2068 if (err)
2069 return err;
2070
2071 /* mark types for complex types (arrays, unions, structures) */
2072 for (int i = 1; i < targ_spec->raw_len; i++) {
2073 /* skip typedefs and mods */
2074 while (btf_is_mod(btf_type) || btf_is_typedef(btf_type)) {
2075 type_id = btf_type->type;
2076 btf_type = btf__type_by_id(btf, type_id);
2077 }
2078
2079 switch (btf_kind(btf_type)) {
2080 case BTF_KIND_STRUCT:
2081 case BTF_KIND_UNION:
2082 idx = targ_spec->raw_spec[i];
2083 btf_member = btf_members(btf_type) + idx;
2084
2085 /* mark member */
2086 btfgen_mark_member(info, type_id, idx);
2087
2088 /* mark member's type */
2089 type_id = btf_member->type;
2090 btf_type = btf__type_by_id(btf, type_id);
2091 err = btfgen_mark_type(info, type_id, false);
2092 if (err)
2093 return err;
2094 break;
2095 case BTF_KIND_ARRAY:
2096 array = btf_array(btf_type);
2097 type_id = array->type;
2098 btf_type = btf__type_by_id(btf, type_id);
2099 break;
2100 default:
2101 p_err("unsupported kind: %s (%d)",
2102 btf_kind_str(btf_type), btf_type->type);
2103 return -EINVAL;
2104 }
2105 }
2106
2107 return 0;
2108}
2109
2110/* Mark types, members, and member types. Compared to btfgen_record_field_relo,
2111 * this function does not rely on the target spec for inferring members, but
2112 * uses the associated BTF.
2113 *
2114 * The `behind_ptr` argument is used to stop marking of composite types reached
2115 * through a pointer. This way, we can keep BTF size in check while providing
2116 * reasonable match semantics.
2117 */
2118static int btfgen_mark_type_match(struct btfgen_info *info, __u32 type_id, bool behind_ptr)
2119{
2120 const struct btf_type *btf_type;
2121 struct btf *btf = info->src_btf;
2122 struct btf_type *cloned_type;
2123 int i, err;
2124
2125 if (type_id == 0)
2126 return 0;
2127
2128 btf_type = btf__type_by_id(btf, type_id);
2129 /* mark type on cloned BTF as used */
2130 cloned_type = (struct btf_type *)btf__type_by_id(info->marked_btf, type_id);
2131 cloned_type->name_off = MARKED;
2132
2133 switch (btf_kind(btf_type)) {
2134 case BTF_KIND_UNKN:
2135 case BTF_KIND_INT:
2136 case BTF_KIND_FLOAT:
2137 case BTF_KIND_ENUM:
2138 case BTF_KIND_ENUM64:
2139 break;
2140 case BTF_KIND_STRUCT:
2141 case BTF_KIND_UNION: {
2142 struct btf_member *m = btf_members(btf_type);
2143 __u16 vlen = btf_vlen(btf_type);
2144
2145 if (behind_ptr)
2146 break;
2147
2148 for (i = 0; i < vlen; i++, m++) {
2149 /* mark member */
2150 btfgen_mark_member(info, type_id, i);
2151
2152 /* mark member's type */
2153 err = btfgen_mark_type_match(info, m->type, false);
2154 if (err)
2155 return err;
2156 }
2157 break;
2158 }
2159 case BTF_KIND_CONST:
2160 case BTF_KIND_FWD:
2161 case BTF_KIND_RESTRICT:
2162 case BTF_KIND_TYPEDEF:
2163 case BTF_KIND_VOLATILE:
2164 return btfgen_mark_type_match(info, btf_type->type, behind_ptr);
2165 case BTF_KIND_PTR:
2166 return btfgen_mark_type_match(info, btf_type->type, true);
2167 case BTF_KIND_ARRAY: {
2168 struct btf_array *array;
2169
2170 array = btf_array(btf_type);
2171 /* mark array type */
2172 err = btfgen_mark_type_match(info, array->type, false);
2173 /* mark array's index type */
2174 err = err ? : btfgen_mark_type_match(info, array->index_type, false);
2175 if (err)
2176 return err;
2177 break;
2178 }
2179 case BTF_KIND_FUNC_PROTO: {
2180 __u16 vlen = btf_vlen(btf_type);
2181 struct btf_param *param;
2182
2183 /* mark ret type */
2184 err = btfgen_mark_type_match(info, btf_type->type, false);
2185 if (err)
2186 return err;
2187
2188 /* mark parameters types */
2189 param = btf_params(btf_type);
2190 for (i = 0; i < vlen; i++) {
2191 err = btfgen_mark_type_match(info, param->type, false);
2192 if (err)
2193 return err;
2194 param++;
2195 }
2196 break;
2197 }
2198 /* tells if some other type needs to be handled */
2199 default:
2200 p_err("unsupported kind: %s (%d)", btf_kind_str(btf_type), type_id);
2201 return -EINVAL;
2202 }
2203
2204 return 0;
2205}
2206
2207/* Mark types, members, and member types. Compared to btfgen_record_field_relo,
2208 * this function does not rely on the target spec for inferring members, but
2209 * uses the associated BTF.
2210 */
2211static int btfgen_record_type_match_relo(struct btfgen_info *info, struct bpf_core_spec *targ_spec)
2212{
2213 return btfgen_mark_type_match(info, targ_spec->root_type_id, false);
2214}
2215
2216static int btfgen_record_type_relo(struct btfgen_info *info, struct bpf_core_spec *targ_spec)
2217{
2218 return btfgen_mark_type(info, targ_spec->root_type_id, true);
2219}
2220
2221static int btfgen_record_enumval_relo(struct btfgen_info *info, struct bpf_core_spec *targ_spec)
2222{
2223 return btfgen_mark_type(info, targ_spec->root_type_id, false);
2224}
2225
2226static int btfgen_record_reloc(struct btfgen_info *info, struct bpf_core_spec *res)
2227{
2228 switch (res->relo_kind) {
2229 case BPF_CORE_FIELD_BYTE_OFFSET:
2230 case BPF_CORE_FIELD_BYTE_SIZE:
2231 case BPF_CORE_FIELD_EXISTS:
2232 case BPF_CORE_FIELD_SIGNED:
2233 case BPF_CORE_FIELD_LSHIFT_U64:
2234 case BPF_CORE_FIELD_RSHIFT_U64:
2235 return btfgen_record_field_relo(info, res);
2236 case BPF_CORE_TYPE_ID_LOCAL: /* BPF_CORE_TYPE_ID_LOCAL doesn't require kernel BTF */
2237 return 0;
2238 case BPF_CORE_TYPE_ID_TARGET:
2239 case BPF_CORE_TYPE_EXISTS:
2240 case BPF_CORE_TYPE_SIZE:
2241 return btfgen_record_type_relo(info, res);
2242 case BPF_CORE_TYPE_MATCHES:
2243 return btfgen_record_type_match_relo(info, res);
2244 case BPF_CORE_ENUMVAL_EXISTS:
2245 case BPF_CORE_ENUMVAL_VALUE:
2246 return btfgen_record_enumval_relo(info, res);
2247 default:
2248 return -EINVAL;
2249 }
2250}
2251
2252static struct bpf_core_cand_list *
2253btfgen_find_cands(const struct btf *local_btf, const struct btf *targ_btf, __u32 local_id)
2254{
2255 const struct btf_type *local_type;
2256 struct bpf_core_cand_list *cands = NULL;
2257 struct bpf_core_cand local_cand = {};
2258 size_t local_essent_len;
2259 const char *local_name;
2260 int err;
2261
2262 local_cand.btf = local_btf;
2263 local_cand.id = local_id;
2264
2265 local_type = btf__type_by_id(local_btf, local_id);
2266 if (!local_type) {
2267 err = -EINVAL;
2268 goto err_out;
2269 }
2270
2271 local_name = btf__name_by_offset(local_btf, local_type->name_off);
2272 if (!local_name) {
2273 err = -EINVAL;
2274 goto err_out;
2275 }
2276 local_essent_len = bpf_core_essential_name_len(local_name);
2277
2278 cands = calloc(1, sizeof(*cands));
2279 if (!cands)
2280 return NULL;
2281
2282 err = bpf_core_add_cands(&local_cand, local_essent_len, targ_btf, "vmlinux", 1, cands);
2283 if (err)
2284 goto err_out;
2285
2286 return cands;
2287
2288err_out:
2289 bpf_core_free_cands(cands);
2290 errno = -err;
2291 return NULL;
2292}
2293
2294/* Record relocation information for a single BPF object */
2295static int btfgen_record_obj(struct btfgen_info *info, const char *obj_path)
2296{
2297 const struct btf_ext_info_sec *sec;
2298 const struct bpf_core_relo *relo;
2299 const struct btf_ext_info *seg;
2300 struct hashmap_entry *entry;
2301 struct hashmap *cand_cache = NULL;
2302 struct btf_ext *btf_ext = NULL;
2303 unsigned int relo_idx;
2304 struct btf *btf = NULL;
2305 size_t i;
2306 int err;
2307
2308 btf = btf__parse(obj_path, &btf_ext);
2309 if (!btf) {
2310 err = -errno;
2311 p_err("failed to parse BPF object '%s': %s", obj_path, strerror(errno));
2312 return err;
2313 }
2314
2315 if (!btf_ext) {
2316 p_err("failed to parse BPF object '%s': section %s not found",
2317 obj_path, BTF_EXT_ELF_SEC);
2318 err = -EINVAL;
2319 goto out;
2320 }
2321
2322 if (btf_ext->core_relo_info.len == 0) {
2323 err = 0;
2324 goto out;
2325 }
2326
2327 cand_cache = hashmap__new(btfgen_hash_fn, btfgen_equal_fn, NULL);
2328 if (IS_ERR(cand_cache)) {
2329 err = PTR_ERR(cand_cache);
2330 goto out;
2331 }
2332
2333 seg = &btf_ext->core_relo_info;
2334 for_each_btf_ext_sec(seg, sec) {
2335 for_each_btf_ext_rec(seg, sec, relo_idx, relo) {
2336 struct bpf_core_spec specs_scratch[3] = {};
2337 struct bpf_core_relo_res targ_res = {};
2338 struct bpf_core_cand_list *cands = NULL;
2339 const char *sec_name = btf__name_by_offset(btf, sec->sec_name_off);
2340
2341 if (relo->kind != BPF_CORE_TYPE_ID_LOCAL &&
2342 !hashmap__find(cand_cache, relo->type_id, &cands)) {
2343 cands = btfgen_find_cands(btf, info->src_btf, relo->type_id);
2344 if (!cands) {
2345 err = -errno;
2346 goto out;
2347 }
2348
2349 err = hashmap__set(cand_cache, relo->type_id, cands,
2350 NULL, NULL);
2351 if (err)
2352 goto out;
2353 }
2354
2355 err = bpf_core_calc_relo_insn(sec_name, relo, relo_idx, btf, cands,
2356 specs_scratch, &targ_res);
2357 if (err)
2358 goto out;
2359
2360 /* specs_scratch[2] is the target spec */
2361 err = btfgen_record_reloc(info, &specs_scratch[2]);
2362 if (err)
2363 goto out;
2364 }
2365 }
2366
2367out:
2368 btf__free(btf);
2369 btf_ext__free(btf_ext);
2370
2371 if (!IS_ERR_OR_NULL(cand_cache)) {
2372 hashmap__for_each_entry(cand_cache, entry, i) {
2373 bpf_core_free_cands(entry->pvalue);
2374 }
2375 hashmap__free(cand_cache);
2376 }
2377
2378 return err;
2379}
2380
2381static int btfgen_remap_id(__u32 *type_id, void *ctx)
2382{
2383 unsigned int *ids = ctx;
2384
2385 *type_id = ids[*type_id];
2386
2387 return 0;
2388}
2389
2390/* Generate BTF from relocation information previously recorded */
2391static struct btf *btfgen_get_btf(struct btfgen_info *info)
2392{
2393 struct btf *btf_new = NULL;
2394 unsigned int *ids = NULL;
2395 unsigned int i, n = btf__type_cnt(info->marked_btf);
2396 int err = 0;
2397
2398 btf_new = btf__new_empty();
2399 if (!btf_new) {
2400 err = -errno;
2401 goto err_out;
2402 }
2403
2404 ids = calloc(n, sizeof(*ids));
2405 if (!ids) {
2406 err = -errno;
2407 goto err_out;
2408 }
2409
2410 /* first pass: add all marked types to btf_new and add their new ids to the ids map */
2411 for (i = 1; i < n; i++) {
2412 const struct btf_type *cloned_type, *type;
2413 const char *name;
2414 int new_id;
2415
2416 cloned_type = btf__type_by_id(info->marked_btf, i);
2417
2418 if (cloned_type->name_off != MARKED)
2419 continue;
2420
2421 type = btf__type_by_id(info->src_btf, i);
2422
2423 /* add members for struct and union */
2424 if (btf_is_composite(type)) {
2425 struct btf_member *cloned_m, *m;
2426 unsigned short vlen;
2427 int idx_src;
2428
2429 name = btf__str_by_offset(info->src_btf, type->name_off);
2430
2431 if (btf_is_struct(type))
2432 err = btf__add_struct(btf_new, name, type->size);
2433 else
2434 err = btf__add_union(btf_new, name, type->size);
2435
2436 if (err < 0)
2437 goto err_out;
2438 new_id = err;
2439
2440 cloned_m = btf_members(cloned_type);
2441 m = btf_members(type);
2442 vlen = btf_vlen(cloned_type);
2443 for (idx_src = 0; idx_src < vlen; idx_src++, cloned_m++, m++) {
2444 /* add only members that are marked as used */
2445 if (cloned_m->name_off != MARKED)
2446 continue;
2447
2448 name = btf__str_by_offset(info->src_btf, m->name_off);
2449 err = btf__add_field(btf_new, name, m->type,
2450 btf_member_bit_offset(cloned_type, idx_src),
2451 btf_member_bitfield_size(cloned_type, idx_src));
2452 if (err < 0)
2453 goto err_out;
2454 }
2455 } else {
2456 err = btf__add_type(btf_new, info->src_btf, type);
2457 if (err < 0)
2458 goto err_out;
2459 new_id = err;
2460 }
2461
2462 /* add ID mapping */
2463 ids[i] = new_id;
2464 }
2465
2466 /* second pass: fix up type ids */
2467 for (i = 1; i < btf__type_cnt(btf_new); i++) {
2468 struct btf_type *btf_type = (struct btf_type *) btf__type_by_id(btf_new, i);
2469
2470 err = btf_type_visit_type_ids(btf_type, btfgen_remap_id, ids);
2471 if (err)
2472 goto err_out;
2473 }
2474
2475 free(ids);
2476 return btf_new;
2477
2478err_out:
2479 btf__free(btf_new);
2480 free(ids);
2481 errno = -err;
2482 return NULL;
2483}
2484
2485/* Create minimized BTF file for a set of BPF objects.
2486 *
2487 * The BTFGen algorithm is divided in two main parts: (1) collect the
2488 * BTF types that are involved in relocations and (2) generate the BTF
2489 * object using the collected types.
2490 *
2491 * In order to collect the types involved in the relocations, we parse
2492 * the BTF and BTF.ext sections of the BPF objects and use
2493 * bpf_core_calc_relo_insn() to get the target specification, this
2494 * indicates how the types and fields are used in a relocation.
2495 *
2496 * Types are recorded in different ways according to the kind of the
2497 * relocation. For field-based relocations only the members that are
2498 * actually used are saved in order to reduce the size of the generated
2499 * BTF file. For type-based relocations empty struct / unions are
2500 * generated and for enum-based relocations the whole type is saved.
2501 *
2502 * The second part of the algorithm generates the BTF object. It creates
2503 * an empty BTF object and fills it with the types recorded in the
2504 * previous step. This function takes care of only adding the structure
2505 * and union members that were marked as used and it also fixes up the
2506 * type IDs on the generated BTF object.
2507 */
2508static int minimize_btf(const char *src_btf, const char *dst_btf, const char *objspaths[])
2509{
2510 struct btfgen_info *info;
2511 struct btf *btf_new = NULL;
2512 int err, i;
2513
2514 info = btfgen_new_info(src_btf);
2515 if (!info) {
2516 err = -errno;
2517 p_err("failed to allocate info structure: %s", strerror(errno));
2518 goto out;
2519 }
2520
2521 for (i = 0; objspaths[i] != NULL; i++) {
2522 err = btfgen_record_obj(info, objspaths[i]);
2523 if (err) {
2524 p_err("error recording relocations for %s: %s", objspaths[i],
2525 strerror(errno));
2526 goto out;
2527 }
2528 }
2529
2530 btf_new = btfgen_get_btf(info);
2531 if (!btf_new) {
2532 err = -errno;
2533 p_err("error generating BTF: %s", strerror(errno));
2534 goto out;
2535 }
2536
2537 err = btf_save_raw(btf_new, dst_btf);
2538 if (err) {
2539 p_err("error saving btf file: %s", strerror(errno));
2540 goto out;
2541 }
2542
2543out:
2544 btf__free(btf_new);
2545 btfgen_free_info(info);
2546
2547 return err;
2548}
2549
2550static int do_min_core_btf(int argc, char **argv)
2551{
2552 const char *input, *output, **objs;
2553 int i, err;
2554
2555 if (!REQ_ARGS(3)) {
2556 usage();
2557 return -1;
2558 }
2559
2560 input = GET_ARG();
2561 output = GET_ARG();
2562
2563 objs = (const char **) calloc(argc + 1, sizeof(*objs));
2564 if (!objs) {
2565 p_err("failed to allocate array for object names");
2566 return -ENOMEM;
2567 }
2568
2569 i = 0;
2570 while (argc)
2571 objs[i++] = GET_ARG();
2572
2573 err = minimize_btf(input, output, objs);
2574 free(objs);
2575 return err;
2576}
2577
2578static const struct cmd cmds[] = {
2579 { "object", do_object },
2580 { "skeleton", do_skeleton },
2581 { "subskeleton", do_subskeleton },
2582 { "min_core_btf", do_min_core_btf},
2583 { "help", do_help },
2584 { 0 }
2585};
2586
2587int do_gen(int argc, char **argv)
2588{
2589 return cmd_select(cmds, argc, argv, do_help);
2590}