@@ -34,6 +34,11 @@
#include <pthread.h>
#define BTF_ENCODER_MAX_PROTO 512
+#define BTF_IDS_SECTION ".BTF_ids"
+#define BTF_ID_FUNC_PFX "__BTF_ID__func__"
+#define BTF_ID_SET8_PFX "__BTF_ID__set8__"
+#define BTF_SET8_KFUNCS (1 << 0)
+#define BTF_KFUNC_TYPE_TAG "bpf_kfunc"
/* state used to do later encoding of saved functions */
struct btf_encoder_state {
@@ -79,6 +84,7 @@ struct btf_encoder {
gen_floats,
is_rel;
uint32_t array_index_id;
+ struct gobuffer btf_funcs;
struct {
struct var_info vars[MAX_PERCPU_VAR_CNT];
int var_cnt;
@@ -94,6 +100,11 @@ struct btf_encoder {
} functions;
};
+struct btf_func {
+ const char *name;
+ int type_id;
+};
+
static LIST_HEAD(encoders);
static pthread_mutex_t encoders__lock = PTHREAD_MUTEX_INITIALIZER;
@@ -1352,6 +1363,310 @@ out:
return err;
}
+/*
+ * If `sym` is a set8, returns the number of entries in the set8.
+ *
+ * Returns:
+ * 0 if `sym` does not point to a set8.
+ * Negative on error.
+ */
+static int get_kfunc_set_cnt(GElf_Sym *sym, const char *name, Elf_Data *idlist, size_t idlist_addr)
+{
+ int *ptr = idlist->d_buf;
+ bool is_kfunc, is_set8;
+ int idx, flags;
+
+ /* kfuncs are only found in BTF_SET8's */
+ is_set8 = !strncmp(name, BTF_ID_SET8_PFX, sizeof(BTF_ID_SET8_PFX) - 1);
+ if (!is_set8)
+ return 0;
+
+ idx = sym->st_value - idlist_addr;
+ if (idx >= idlist->d_size) {
+ fprintf(stderr, "%s: symbol '%s' out of bounds\n", __func__, name);
+ return -1;
+ }
+
+ /* Check the set8 flags to see if it was marked as kfunc */
+ idx = idx / sizeof(int);
+ flags = ptr[idx + 1];
+ is_kfunc = flags & BTF_SET8_KFUNCS;
+ if (!is_kfunc)
+ return 0;
+
+ return sym->st_size / sizeof(uint64_t) - 1;
+}
+
+/*
+ * Parse BTF_ID symbol and return the kfunc name.
+ *
+ * Returns:
+ * Caller-owned string containing kfunc name if successful.
+ * NULL if !kfunc or on error.
+ */
+static char *get_kfunc_name(const char *sym)
+{
+ char *kfunc, *end;
+
+ if (strncmp(sym, BTF_ID_FUNC_PFX, sizeof(BTF_ID_FUNC_PFX) - 1))
+ return NULL;
+
+ /* Strip prefix */
+ kfunc = strdup(sym + sizeof(BTF_ID_FUNC_PFX) - 1);
+
+ /* Strip suffix */
+ end = strrchr(kfunc, '_');
+ if (!end || *(end - 1) != '_') {
+ free(kfunc);
+ return NULL;
+ }
+ *(end - 1) = '\0';
+
+ return kfunc;
+}
+
+static int btf_func_cmp(const void *_a, const void *_b)
+{
+ const struct btf_func *a = _a;
+ const struct btf_func *b = _b;
+
+ return strcmp(a->name, b->name);
+}
+
+/*
+ * Collects all functions described in BTF.
+ * Returns non-zero on error.
+ */
+static int btf_encoder__collect_btf_funcs(struct btf_encoder *encoder)
+{
+ struct gobuffer *funcs = &encoder->btf_funcs;
+ struct btf *btf = encoder->btf;
+ int nr_types, type_id;
+ int err = -1;
+
+ /* First collect all the func entries into an array */
+ nr_types = btf__type_cnt(btf);
+ for (type_id = 1; type_id < nr_types; type_id++) {
+ const struct btf_type *type;
+ struct btf_func func = {};
+ const char *name;
+
+ type = btf__type_by_id(btf, type_id);
+ if (!type) {
+ fprintf(stderr, "%s: malformed BTF, can't resolve type for ID %d\n",
+ __func__, type_id);
+ err = -EINVAL;
+ goto out;
+ }
+
+ if (!btf_is_func(type))
+ continue;
+
+ name = btf__name_by_offset(btf, type->name_off);
+ if (!name) {
+ fprintf(stderr, "%s: malformed BTF, can't resolve name for ID %d\n",
+ __func__, type_id);
+ err = -EINVAL;
+ goto out;
+ }
+
+ func.name = name;
+ func.type_id = type_id;
+ err = gobuffer__add(funcs, &func, sizeof(func));
+ if (err < 0)
+ goto out;
+ }
+
+ /* Now that we've collected funcs, sort them by name */
+ qsort((void *)gobuffer__entries(funcs), gobuffer__nr_entries(funcs),
+ sizeof(struct btf_func), btf_func_cmp);
+
+ err = 0;
+out:
+ return err;
+}
+
+static int btf_encoder__tag_kfunc(struct btf_encoder *encoder, const char *kfunc)
+{
+ struct btf_func key = { .name = kfunc };
+ struct btf *btf = encoder->btf;
+ struct btf_func *target;
+ const void *base;
+ unsigned int cnt;
+ int err = -1;
+
+ base = gobuffer__entries(&encoder->btf_funcs);
+ cnt = gobuffer__nr_entries(&encoder->btf_funcs);
+ target = bsearch(&key, base, cnt, sizeof(key), btf_func_cmp);
+ if (!target) {
+ fprintf(stderr, "%s: failed to find kfunc '%s' in BTF\n", __func__, kfunc);
+ goto out;
+ }
+
+ /* Note we are unconditionally adding the btf_decl_tag even
+ * though vmlinux may already contain btf_decl_tags for kfuncs.
+ * We are ok to do this b/c we will later btf__dedup() to remove
+ * any duplicates.
+ */
+ err = btf__add_decl_tag(btf, BTF_KFUNC_TYPE_TAG, target->type_id, -1);
+ if (err < 0) {
+ fprintf(stderr, "%s: failed to insert kfunc decl tag for '%s': %d\n",
+ __func__, kfunc, err);
+ goto out;
+ }
+
+ err = 0;
+out:
+ return err;
+}
+
+static int btf_encoder__tag_kfuncs(struct btf_encoder *encoder)
+{
+ const char *filename = encoder->filename;
+ Elf_Scn *symscn = NULL;
+ int symbols_shndx = -1;
+ int fd = -1, err = -1;
+ int idlist_shndx = -1;
+ Elf_Scn *scn = NULL;
+ size_t idlist_addr;
+ Elf_Data *symbols;
+ Elf_Data *idlist;
+ size_t strtabidx;
+ Elf *elf = NULL;
+ int set_cnt = 0;
+ GElf_Shdr shdr;
+ size_t strndx;
+ char *secname;
+ int nr_syms;
+ int i = 0;
+
+ fd = open(filename, O_RDONLY);
+ if (fd < 0) {
+ fprintf(stderr, "Cannot open %s\n", filename);
+ goto out;
+ }
+
+ if (elf_version(EV_CURRENT) == EV_NONE) {
+ elf_error("Cannot set libelf version");
+ goto out;
+ }
+
+ elf = elf_begin(fd, ELF_C_READ, NULL);
+ if (elf == NULL) {
+ elf_error("Cannot update ELF file");
+ goto out;
+ }
+
+ /* Location symbol table and .BTF_ids sections */
+ elf_getshdrstrndx(elf, &strndx);
+ while ((scn = elf_nextscn(elf, scn)) != NULL) {
+ Elf_Data *data;
+
+ i++;
+ if (!gelf_getshdr(scn, &shdr)) {
+ elf_error("Failed to get ELF section(%d) hdr", i);
+ goto out;
+ }
+
+ secname = elf_strptr(elf, strndx, shdr.sh_name);
+ if (!secname) {
+ elf_error("Failed to get ELF section(%d) hdr name", i);
+ goto out;
+ }
+
+ data = elf_getdata(scn, 0);
+ if (!data) {
+ elf_error("Failed to get ELF section(%d) data", i);
+ goto out;
+ }
+
+ if (shdr.sh_type == SHT_SYMTAB) {
+ symbols_shndx = i;
+ symscn = scn;
+ symbols = data;
+ strtabidx = shdr.sh_link;
+ } else if (!strcmp(secname, BTF_IDS_SECTION)) {
+ idlist_shndx = i;
+ idlist_addr = shdr.sh_addr;
+ idlist = data;
+ }
+ }
+
+ /* Cannot resolve symbol or .BTF_ids sections. Nothing to do. */
+ if (symbols_shndx == -1 || idlist_shndx == -1) {
+ err = 0;
+ goto out;
+ }
+
+ /*
+ * Look for __BTF_ID__func__ symbols in .BTF_ids section and
+ * inject BTF decl tags for each of them.
+ */
+ if (!gelf_getshdr(symscn, &shdr)) {
+ elf_error("Failed to get ELF symbol table header");
+ goto out;
+ }
+
+ err = btf_encoder__collect_btf_funcs(encoder);
+ if (err) {
+ fprintf(stderr, "%s: failed to collect BTF funcs\n", __func__);
+ goto out;
+ }
+
+ nr_syms = shdr.sh_size / shdr.sh_entsize;
+ for (i = 0; i < nr_syms; i++) {
+ char *kfunc, *name;
+ int new_set_cnt;
+ GElf_Sym sym;
+ int err;
+
+ if (!gelf_getsym(symbols, i, &sym)) {
+ elf_error("Failed to get ELF symbol(%d)", i);
+ goto out;
+ }
+
+ if (sym.st_shndx != idlist_shndx)
+ continue;
+
+ name = elf_strptr(elf, strtabidx, sym.st_name);
+ new_set_cnt = get_kfunc_set_cnt(&sym, name, idlist, idlist_addr);
+ if (new_set_cnt < 0) {
+ err = new_set_cnt;
+ goto out;
+ } else if (new_set_cnt) {
+ if (set_cnt)
+ fprintf(stderr, "%s: warning: overlapping set8 '%s'\n",
+ __func__, name);
+ set_cnt = new_set_cnt;
+ continue;
+ }
+
+ if (!set_cnt)
+ continue;
+ set_cnt--;
+
+ kfunc = get_kfunc_name(name);
+ if (!kfunc)
+ continue;
+
+ err = btf_encoder__tag_kfunc(encoder, kfunc);
+ if (err) {
+ fprintf(stderr, "%s: failed to tag kfunc '%s'\n", __func__, kfunc);
+ free(kfunc);
+ goto out;
+ }
+ free(kfunc);
+ }
+
+ err = 0;
+out:
+ if (elf)
+ elf_end(elf);
+ if (fd != -1)
+ close(fd);
+ return err;
+}
+
int btf_encoder__encode(struct btf_encoder *encoder)
{
int err;
@@ -1366,6 +1681,14 @@ int btf_encoder__encode(struct btf_encoder *encoder)
if (btf__type_cnt(encoder->btf) == 1)
return 0;
+ /* Note vmlinux may already contain btf_decl_tag's for kfuncs. So
+ * take care to call this before btf_dedup().
+ */
+ if (btf_encoder__tag_kfuncs(encoder)) {
+ fprintf(stderr, "%s: failed to tag kfuncs!\n", __func__);
+ return -1;
+ }
+
if (btf__dedup(encoder->btf, NULL)) {
fprintf(stderr, "%s: btf__dedup failed!\n", __func__);
return -1;
@@ -1712,6 +2035,7 @@ void btf_encoder__delete(struct btf_encoder *encoder)
btf_encoders__delete(encoder);
__gobuffer__delete(&encoder->percpu_secinfo);
+ __gobuffer__delete(&encoder->btf_funcs);
zfree(&encoder->filename);
btf__free(encoder->btf);
encoder->btf = NULL;
This commit teaches pahole to parse symbols in .BTF_ids section in vmlinux and discover exported kfuncs. Pahole then takes the list of kfuncs and injects a BTF_KIND_DECL_TAG for each kfunc. Example of encoding: $ bpftool btf dump file .tmp_vmlinux.btf | rg "DECL_TAG 'bpf_kfunc'" | wc -l 120 $ bpftool btf dump file .tmp_vmlinux.btf | rg 56337 [56337] FUNC 'bpf_ct_change_timeout' type_id=56336 linkage=static [127861] DECL_TAG 'bpf_kfunc' type_id=56337 component_idx=-1 This enables downstream users and tools to dynamically discover which kfuncs are available on a system by parsing vmlinux or module BTF, both available in /sys/kernel/btf. Signed-off-by: Daniel Xu <dxu@dxuuu.xyz> --- Changes from v1: * Fix resource leaks * Fix callee -> caller typo * Rename btf_decl_tag from kfunc -> bpf_kfunc * Only grab btf_id_set funcs tagged kfunc * Presort btf func list btf_encoder.c | 324 ++++++++++++++++++++++++++++++++++++++++++++++++++ 1 file changed, 324 insertions(+)