[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <8c6d3655-f9c7-d0b0-b10f-00f679c44c1e@fb.com>
Date: Thu, 22 Apr 2021 19:36:15 -0700
From: Yonghong Song <yhs@...com>
To: Andrii Nakryiko <andrii.nakryiko@...il.com>
CC: Andrii Nakryiko <andrii@...nel.org>, bpf <bpf@...r.kernel.org>,
Networking <netdev@...r.kernel.org>,
Alexei Starovoitov <ast@...com>,
Daniel Borkmann <daniel@...earbox.net>,
Kernel Team <kernel-team@...com>
Subject: Re: [PATCH v2 bpf-next 11/17] libbpf: add linker extern resolution
support for functions and global variables
On 4/22/21 4:57 PM, Yonghong Song wrote:
>
>
> On 4/22/21 3:12 PM, Andrii Nakryiko wrote:
>> On Thu, Apr 22, 2021 at 2:27 PM Yonghong Song <yhs@...com> wrote:
>>>
>>>
>>>
>>> On 4/16/21 1:23 PM, Andrii Nakryiko wrote:
>>>> Add BPF static linker logic to resolve extern variables and
>>>> functions across
>>>> multiple linked together BPF object files.
>>>>
>>>> For that, linker maintains a separate list of struct glob_sym
>>>> structures,
>>>> which keeps track of few pieces of metadata (is it extern or
>>>> resolved global,
>>>> is it a weak symbol, which ELF section it belongs to, etc) and ties
>>>> together
>>>> BTF type info and ELF symbol information and keeps them in sync.
>>>>
>>>> With adding support for extern variables/funcs, it's now possible
>>>> for some
>>>> sections to contain both extern and non-extern definitions. This
>>>> means that
>>>> some sections may start out as ephemeral (if only externs are
>>>> present and thus
>>>> there is not corresponding ELF section), but will be "upgraded" to
>>>> actual ELF
>>>> section as symbols are resolved or new non-extern definitions are
>>>> appended.
>>>>
>>>> Additional care is taken to not duplicate extern entries in sections
>>>> like
>>>> .kconfig and .ksyms.
>>>>
>>>> Given libbpf requires BTF type to always be present for .kconfig/.ksym
>>>> externs, linker extends this requirement to all the externs, even
>>>> those that
>>>> are supposed to be resolved during static linking and which won't be
>>>> visible
>>>> to libbpf. With BTF information always present, static linker will
>>>> check not
>>>> just ELF symbol matches, but entire BTF type signature match as
>>>> well. That
>>>> logic is stricter that BPF CO-RE checks. It probably should be
>>>> re-used by
>>>> .ksym resolution logic in libbpf as well, but that's left for follow up
>>>> patches.
>>>>
>>>> To make it unnecessary to rewrite ELF symbols and minimize BTF type
>>>> rewriting/removal, ELF symbols that correspond to externs initially
>>>> will be
>>>> updated in place once they are resolved. Similarly for BTF type
>>>> info, VAR/FUNC
>>>> and var_secinfo's (sec_vars in struct bpf_linker) are staying
>>>> stable, but
>>>> types they point to might get replaced when extern is resolved. This
>>>> might
>>>> leave some left-over types (even though we try to minimize this for
>>>> common
>>>> cases of having extern funcs with not argument names vs concrete
>>>> function with
>>>> names properly specified). That can be addresses later with a
>>>> generic BTF
>>>> garbage collection. That's left for a follow up as well.
>>>>
>>>> Given BTF type appending phase is separate from ELF symbol
>>>> appending/resolution, special struct glob_sym->underlying_btf_id
>>>> variable is
>>>> used to communicate resolution and rewrite decisions. 0 means
>>>> underlying_btf_id needs to be appended (it's not yet in final
>>>> linker->btf), <0
>>>> values are used for temporary storage of source BTF type ID (not yet
>>>> rewritten), so -glob_sym->underlying_btf_id is BTF type id in
>>>> obj-btf. But by
>>>> the end of linker_append_btf() phase, that underlying_btf_id will be
>>>> remapped
>>>> and will always be > 0. This is the uglies part of the whole
>>>> process, but
>>>> keeps the other parts much simpler due to stability of sec_var and
>>>> VAR/FUNC
>>>> types, as well as ELF symbol, so please keep that in mind while
>>>> reviewing.
>>>
>>> This is indeed complicated. I has some comments below. Please check
>>> whether my understanding is correct or not.
>>>
>>>>
>>>> BTF-defined maps require some extra custom logic and is addressed
>>>> separate in
>>>> the next patch, so that to keep this one smaller and easier to review.
>>>>
>>>> Signed-off-by: Andrii Nakryiko <andrii@...nel.org>
>>>> ---
>>>> tools/lib/bpf/linker.c | 844
>>>> ++++++++++++++++++++++++++++++++++++++---
>>>> 1 file changed, 785 insertions(+), 59 deletions(-)
>>>>
[...]
>>>
>>>> + src_sec = &obj->secs[sym->st_shndx];
>>>> + if (src_sec->skipped)
>>>> + return 0;
>>>> + dst_sec = &linker->secs[src_sec->dst_id];
>>>> +
>>>> + /* allow only one STT_SECTION symbol per section */
>>>> + if (sym_type == STT_SECTION && dst_sec->sec_sym_idx) {
>>>> + obj->sym_map[src_sym_idx] = dst_sec->sec_sym_idx;
>>>> + return 0;
>>>> + }
>>>> + }
>>>> +
>>>> + if (sym_bind == STB_LOCAL)
>>>> + goto add_sym;
>>>> +
>>>> + /* find matching BTF info */
>>>> + err = find_glob_sym_btf(obj, sym, sym_name, &btf_sec_id,
>>>> &btf_id);
>>>> + if (err)
>>>> + return err;
>>>> +
>>>> + if (sym_is_extern && btf_sec_id) {
>>>> + const char *sec_name = NULL;
>>>> + const struct btf_type *t;
>>>> +
>>>> + t = btf__type_by_id(obj->btf, btf_sec_id);
>>>> + sec_name = btf__str_by_offset(obj->btf, t->name_off);
>>>> +
>>>> + /* Clang puts unannotated extern vars into
>>>> + * '.extern' BTF DATASEC. Treat them the same
>>>> + * as unannotated extern funcs (which are
>>>> + * currently not put into any DATASECs).
>>>> + * Those don't have associated src_sec/dst_sec.
>>>> + */
>>>> + if (strcmp(sec_name, BTF_EXTERN_SEC) != 0) {
>>>> + src_sec = find_src_sec_by_name(obj, sec_name);
>>>> + if (!src_sec) {
>>>> + pr_warn("failed to find matching ELF
>>>> sec '%s'\n", sec_name);
>>>> + return -ENOENT;
>>>> + }
>>>> + dst_sec = &linker->secs[src_sec->dst_id];
>>>> + }
>>>> + }
>>>> +
>>>> + glob_sym = find_glob_sym(linker, sym_name);
>>>> + if (glob_sym) {
>>>> + /* Preventively resolve to existing symbol. This is
>>>> + * needed for further relocation symbol remapping in
>>>> + * the next step of linking.
>>>> + */
>>>> + obj->sym_map[src_sym_idx] = glob_sym->sym_idx;
>>>> +
>>>> + /* If both symbols are non-externs, at least one of
>>>> + * them has to be STB_WEAK, otherwise they are in
>>>> + * a conflict with each other.
>>>> + */
>>>> + if (!sym_is_extern && !glob_sym->is_extern
>>>> + && !glob_sym->is_weak && sym_bind != STB_WEAK) {
>>>> + pr_warn("conflicting non-weak symbol #%d (%s)
>>>> definition in '%s'\n",
>>>> + src_sym_idx, sym_name, obj->filename);
>>>> + return -EINVAL;
>>>> }
>>>>
>>>> + if (!glob_syms_match(sym_name, linker, glob_sym, obj,
>>>> sym, src_sym_idx, btf_id))
>>>> + return -EINVAL;
>>>> +
>>>> + dst_sym = get_sym_by_idx(linker, glob_sym->sym_idx);
>>>> +
>>>> + /* If new symbol is strong, then force dst_sym to be
>>>> strong as
>>>> + * well; this way a mix of weak and non-weak extern
>>>> + * definitions will end up being strong.
>>>> + */
>>>> + if (sym_bind == STB_GLOBAL) {
>>>> + /* We still need to preserve type (NOTYPE or
>>>> + * OBJECT/FUNC, depending on whether the
>>>> symbol is
>>>> + * extern or not)
>>>> + */
>>>> + sym_update_bind(dst_sym, STB_GLOBAL);
>>>> + glob_sym->is_weak = false;
>>>> + }
>>>> +
>>>> + /* Non-default visibility is "contaminating", with
>>>> stricter
>>>> + * visibility overwriting more permissive ones, even
>>>> if more
>>>> + * permissive visibility comes from just an extern
>>>> definition
>>>> + */
>>>> + if (sym_vis > ELF64_ST_VISIBILITY(dst_sym->st_other))
>>>> + sym_update_visibility(dst_sym, sym_vis);
>>>
>>> For visibility, maybe we can just handle DEFAULT and HIDDEN, and others
>>> are not supported? DEFAULT + DEFAULT/HIDDEN => DEFAULT, HIDDEN + HIDDEN
>>> => HIDDEN?
Looking at your selftest. Your current approach, DEFAULT + DEFAULT ->
DEFAULT, HIDDEN + HIDDEN/DEFAULT -> HIDDEN should work fine. This is
also align with ELF principal to accommodate the least permissive
visibility.
>>>
>>
>> Sure, we can restrict this to STV_DEFAULT and STV_HIDDEN for now. >>
[...]
Powered by blists - more mailing lists