prog.c 19.1 KB
Newer Older
J
Jakub Kicinski 已提交
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37
/*
 * Copyright (C) 2017 Netronome Systems, Inc.
 *
 * This software is dual licensed under the GNU General License Version 2,
 * June 1991 as shown in the file COPYING in the top-level directory of this
 * source tree or the BSD 2-Clause License provided below.  You have the
 * option to license this software under the complete terms of either license.
 *
 * The BSD 2-Clause License:
 *
 *     Redistribution and use in source and binary forms, with or
 *     without modification, are permitted provided that the following
 *     conditions are met:
 *
 *      1. Redistributions of source code must retain the above
 *         copyright notice, this list of conditions and the following
 *         disclaimer.
 *
 *      2. Redistributions in binary form must reproduce the above
 *         copyright notice, this list of conditions and the following
 *         disclaimer in the documentation and/or other materials
 *         provided with the distribution.
 *
 * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
 * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
 * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
 * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
 * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
 * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
 * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
 * SOFTWARE.
 */

/* Author: Jakub Kicinski <kubakici@wp.pl> */

#include <errno.h>
#include <fcntl.h>
38
#include <stdarg.h>
J
Jakub Kicinski 已提交
39 40 41 42 43 44 45 46 47
#include <stdio.h>
#include <stdlib.h>
#include <string.h>
#include <time.h>
#include <unistd.h>
#include <sys/types.h>
#include <sys/stat.h>

#include <bpf.h>
48
#include <libbpf.h>
J
Jakub Kicinski 已提交
49 50

#include "main.h"
51
#include "disasm.h"
J
Jakub Kicinski 已提交
52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107

static const char * const prog_type_name[] = {
	[BPF_PROG_TYPE_UNSPEC]		= "unspec",
	[BPF_PROG_TYPE_SOCKET_FILTER]	= "socket_filter",
	[BPF_PROG_TYPE_KPROBE]		= "kprobe",
	[BPF_PROG_TYPE_SCHED_CLS]	= "sched_cls",
	[BPF_PROG_TYPE_SCHED_ACT]	= "sched_act",
	[BPF_PROG_TYPE_TRACEPOINT]	= "tracepoint",
	[BPF_PROG_TYPE_XDP]		= "xdp",
	[BPF_PROG_TYPE_PERF_EVENT]	= "perf_event",
	[BPF_PROG_TYPE_CGROUP_SKB]	= "cgroup_skb",
	[BPF_PROG_TYPE_CGROUP_SOCK]	= "cgroup_sock",
	[BPF_PROG_TYPE_LWT_IN]		= "lwt_in",
	[BPF_PROG_TYPE_LWT_OUT]		= "lwt_out",
	[BPF_PROG_TYPE_LWT_XMIT]	= "lwt_xmit",
	[BPF_PROG_TYPE_SOCK_OPS]	= "sock_ops",
	[BPF_PROG_TYPE_SK_SKB]		= "sk_skb",
};

static void print_boot_time(__u64 nsecs, char *buf, unsigned int size)
{
	struct timespec real_time_ts, boot_time_ts;
	time_t wallclock_secs;
	struct tm load_tm;

	buf[--size] = '\0';

	if (clock_gettime(CLOCK_REALTIME, &real_time_ts) ||
	    clock_gettime(CLOCK_BOOTTIME, &boot_time_ts)) {
		perror("Can't read clocks");
		snprintf(buf, size, "%llu", nsecs / 1000000000);
		return;
	}

	wallclock_secs = (real_time_ts.tv_sec - boot_time_ts.tv_sec) +
		nsecs / 1000000000;

	if (!localtime_r(&wallclock_secs, &load_tm)) {
		snprintf(buf, size, "%llu", nsecs / 1000000000);
		return;
	}

	strftime(buf, size, "%b %d/%H:%M", &load_tm);
}

static int prog_fd_by_tag(unsigned char *tag)
{
	struct bpf_prog_info info = {};
	__u32 len = sizeof(info);
	unsigned int id = 0;
	int err;
	int fd;

	while (true) {
		err = bpf_prog_get_next_id(id, &id);
		if (err) {
108
			p_err("%s", strerror(errno));
J
Jakub Kicinski 已提交
109 110 111 112 113
			return -1;
		}

		fd = bpf_prog_get_fd_by_id(id);
		if (fd < 0) {
114 115
			p_err("can't get prog by id (%u): %s",
			      id, strerror(errno));
J
Jakub Kicinski 已提交
116 117 118 119 120
			return -1;
		}

		err = bpf_obj_get_info_by_fd(fd, &info, &len);
		if (err) {
121 122
			p_err("can't get prog info (%u): %s",
			      id, strerror(errno));
J
Jakub Kicinski 已提交
123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145
			close(fd);
			return -1;
		}

		if (!memcmp(tag, info.tag, BPF_TAG_SIZE))
			return fd;

		close(fd);
	}
}

int prog_parse_fd(int *argc, char ***argv)
{
	int fd;

	if (is_prefix(**argv, "id")) {
		unsigned int id;
		char *endptr;

		NEXT_ARGP();

		id = strtoul(**argv, &endptr, 0);
		if (*endptr) {
146
			p_err("can't parse %s as ID", **argv);
J
Jakub Kicinski 已提交
147 148 149 150 151 152
			return -1;
		}
		NEXT_ARGP();

		fd = bpf_prog_get_fd_by_id(id);
		if (fd < 0)
153
			p_err("get by id (%u): %s", id, strerror(errno));
J
Jakub Kicinski 已提交
154 155 156 157 158 159 160 161 162
		return fd;
	} else if (is_prefix(**argv, "tag")) {
		unsigned char tag[BPF_TAG_SIZE];

		NEXT_ARGP();

		if (sscanf(**argv, BPF_TAG_FMT, tag, tag + 1, tag + 2,
			   tag + 3, tag + 4, tag + 5, tag + 6, tag + 7)
		    != BPF_TAG_SIZE) {
163
			p_err("can't parse tag");
J
Jakub Kicinski 已提交
164 165 166 167 168 169 170 171 172 173 174 175 176 177 178 179
			return -1;
		}
		NEXT_ARGP();

		return prog_fd_by_tag(tag);
	} else if (is_prefix(**argv, "pinned")) {
		char *path;

		NEXT_ARGP();

		path = **argv;
		NEXT_ARGP();

		return open_obj_pinned_any(path, BPF_OBJ_PROG);
	}

180
	p_err("expected 'id', 'tag' or 'pinned', got: '%s'?", **argv);
J
Jakub Kicinski 已提交
181 182 183 184 185 186 187 188 189 190 191 192 193 194 195 196 197 198
	return -1;
}

static void show_prog_maps(int fd, u32 num_maps)
{
	struct bpf_prog_info info = {};
	__u32 len = sizeof(info);
	__u32 map_ids[num_maps];
	unsigned int i;
	int err;

	info.nr_map_ids = num_maps;
	info.map_ids = ptr_to_u64(map_ids);

	err = bpf_obj_get_info_by_fd(fd, &info, &len);
	if (err || !info.nr_map_ids)
		return;

199 200 201 202 203 204 205 206 207 208 209 210
	if (json_output) {
		jsonw_name(json_wtr, "map_ids");
		jsonw_start_array(json_wtr);
		for (i = 0; i < info.nr_map_ids; i++)
			jsonw_uint(json_wtr, map_ids[i]);
		jsonw_end_array(json_wtr);
	} else {
		printf("  map_ids ");
		for (i = 0; i < info.nr_map_ids; i++)
			printf("%u%s", map_ids[i],
			       i == info.nr_map_ids - 1 ? "" : ",");
	}
J
Jakub Kicinski 已提交
211 212
}

213
static void print_prog_json(struct bpf_prog_info *info, int fd)
J
Jakub Kicinski 已提交
214 215 216
{
	char *memlock;

217 218 219 220 221 222 223 224 225 226 227 228 229 230 231 232
	jsonw_start_object(json_wtr);
	jsonw_uint_field(json_wtr, "id", info->id);
	if (info->type < ARRAY_SIZE(prog_type_name))
		jsonw_string_field(json_wtr, "type",
				   prog_type_name[info->type]);
	else
		jsonw_uint_field(json_wtr, "type", info->type);

	if (*info->name)
		jsonw_string_field(json_wtr, "name", info->name);

	jsonw_name(json_wtr, "tag");
	jsonw_printf(json_wtr, "\"" BPF_TAG_FMT "\"",
		     info->tag[0], info->tag[1], info->tag[2], info->tag[3],
		     info->tag[4], info->tag[5], info->tag[6], info->tag[7]);

233 234
	print_dev_json(info->ifindex, info->netns_dev, info->netns_ino);

235 236 237 238 239 240 241 242 243 244 245 246 247 248 249 250 251
	if (info->load_time) {
		char buf[32];

		print_boot_time(info->load_time, buf, sizeof(buf));

		/* Piggy back on load_time, since 0 uid is a valid one */
		jsonw_string_field(json_wtr, "loaded_at", buf);
		jsonw_uint_field(json_wtr, "uid", info->created_by_uid);
	}

	jsonw_uint_field(json_wtr, "bytes_xlated", info->xlated_prog_len);

	if (info->jited_prog_len) {
		jsonw_bool_field(json_wtr, "jited", true);
		jsonw_uint_field(json_wtr, "bytes_jited", info->jited_prog_len);
	} else {
		jsonw_bool_field(json_wtr, "jited", false);
J
Jakub Kicinski 已提交
252 253
	}

254 255 256 257 258 259 260 261
	memlock = get_fdinfo(fd, "memlock");
	if (memlock)
		jsonw_int_field(json_wtr, "bytes_memlock", atoi(memlock));
	free(memlock);

	if (info->nr_map_ids)
		show_prog_maps(fd, info->nr_map_ids);

262 263 264 265 266 267 268 269 270 271 272 273
	if (!hash_empty(prog_table.table)) {
		struct pinned_obj *obj;

		jsonw_name(json_wtr, "pinned");
		jsonw_start_array(json_wtr);
		hash_for_each_possible(prog_table.table, obj, hash, info->id) {
			if (obj->id == info->id)
				jsonw_string(json_wtr, obj->path);
		}
		jsonw_end_array(json_wtr);
	}

274 275 276 277 278 279 280 281 282 283
	jsonw_end_object(json_wtr);
}

static void print_prog_plain(struct bpf_prog_info *info, int fd)
{
	char *memlock;

	printf("%u: ", info->id);
	if (info->type < ARRAY_SIZE(prog_type_name))
		printf("%s  ", prog_type_name[info->type]);
J
Jakub Kicinski 已提交
284
	else
285
		printf("type %u  ", info->type);
J
Jakub Kicinski 已提交
286

287 288
	if (*info->name)
		printf("name %s  ", info->name);
J
Jakub Kicinski 已提交
289 290

	printf("tag ");
291
	fprint_hex(stdout, info->tag, BPF_TAG_SIZE, "");
292
	print_dev_plain(info->ifindex, info->netns_dev, info->netns_ino);
J
Jakub Kicinski 已提交
293 294
	printf("\n");

295
	if (info->load_time) {
J
Jakub Kicinski 已提交
296 297
		char buf[32];

298
		print_boot_time(info->load_time, buf, sizeof(buf));
J
Jakub Kicinski 已提交
299 300

		/* Piggy back on load_time, since 0 uid is a valid one */
301
		printf("\tloaded_at %s  uid %u\n", buf, info->created_by_uid);
J
Jakub Kicinski 已提交
302 303
	}

304
	printf("\txlated %uB", info->xlated_prog_len);
J
Jakub Kicinski 已提交
305

306 307
	if (info->jited_prog_len)
		printf("  jited %uB", info->jited_prog_len);
J
Jakub Kicinski 已提交
308 309 310 311 312 313 314 315
	else
		printf("  not jited");

	memlock = get_fdinfo(fd, "memlock");
	if (memlock)
		printf("  memlock %sB", memlock);
	free(memlock);

316 317
	if (info->nr_map_ids)
		show_prog_maps(fd, info->nr_map_ids);
J
Jakub Kicinski 已提交
318

319 320 321 322 323 324 325 326 327 328
	if (!hash_empty(prog_table.table)) {
		struct pinned_obj *obj;

		printf("\n");
		hash_for_each_possible(prog_table.table, obj, hash, info->id) {
			if (obj->id == info->id)
				printf("\tpinned %s\n", obj->path);
		}
	}

J
Jakub Kicinski 已提交
329
	printf("\n");
330 331 332 333 334 335 336 337 338 339
}

static int show_prog(int fd)
{
	struct bpf_prog_info info = {};
	__u32 len = sizeof(info);
	int err;

	err = bpf_obj_get_info_by_fd(fd, &info, &len);
	if (err) {
340
		p_err("can't get prog info: %s", strerror(errno));
341 342 343 344 345 346 347
		return -1;
	}

	if (json_output)
		print_prog_json(&info, fd);
	else
		print_prog_plain(&info, fd);
J
Jakub Kicinski 已提交
348 349 350 351 352

	return 0;
}

static int do_show(int argc, char **argv)
353 354
{
	__u32 id = 0;
J
Jakub Kicinski 已提交
355 356 357
	int err;
	int fd;

358 359
	if (show_pinned)
		build_pinned_obj_table(&prog_table, BPF_OBJ_PROG);
360

J
Jakub Kicinski 已提交
361 362 363 364 365 366 367 368 369 370 371
	if (argc == 2) {
		fd = prog_parse_fd(&argc, &argv);
		if (fd < 0)
			return -1;

		return show_prog(fd);
	}

	if (argc)
		return BAD_ARG();

372 373
	if (json_output)
		jsonw_start_array(json_wtr);
J
Jakub Kicinski 已提交
374 375 376
	while (true) {
		err = bpf_prog_get_next_id(id, &id);
		if (err) {
377 378
			if (errno == ENOENT) {
				err = 0;
J
Jakub Kicinski 已提交
379
				break;
380
			}
381 382
			p_err("can't get next program: %s%s", strerror(errno),
			      errno == EINVAL ? " -- kernel too old?" : "");
383 384
			err = -1;
			break;
J
Jakub Kicinski 已提交
385 386 387 388
		}

		fd = bpf_prog_get_fd_by_id(id);
		if (fd < 0) {
389 390
			if (errno == ENOENT)
				continue;
391 392
			p_err("can't get prog by id (%u): %s",
			      id, strerror(errno));
393 394
			err = -1;
			break;
J
Jakub Kicinski 已提交
395 396 397 398 399
		}

		err = show_prog(fd);
		close(fd);
		if (err)
400
			break;
J
Jakub Kicinski 已提交
401 402
	}

403 404 405 406
	if (json_output)
		jsonw_end_array(json_wtr);

	return err;
J
Jakub Kicinski 已提交
407 408
}

409 410 411 412 413 414 415 416 417 418 419 420 421 422 423 424 425 426 427 428 429 430 431 432 433 434 435 436 437 438 439 440 441 442 443 444 445 446 447 448 449 450 451 452 453 454 455 456 457 458 459 460 461 462 463 464 465 466 467 468 469 470 471 472 473 474 475 476 477 478 479 480 481 482 483 484 485 486 487 488 489 490
#define SYM_MAX_NAME	256

struct kernel_sym {
	unsigned long address;
	char name[SYM_MAX_NAME];
};

struct dump_data {
	unsigned long address_call_base;
	struct kernel_sym *sym_mapping;
	__u32 sym_count;
	char scratch_buff[SYM_MAX_NAME];
};

static int kernel_syms_cmp(const void *sym_a, const void *sym_b)
{
	return ((struct kernel_sym *)sym_a)->address -
	       ((struct kernel_sym *)sym_b)->address;
}

static void kernel_syms_load(struct dump_data *dd)
{
	struct kernel_sym *sym;
	char buff[256];
	void *tmp, *address;
	FILE *fp;

	fp = fopen("/proc/kallsyms", "r");
	if (!fp)
		return;

	while (!feof(fp)) {
		if (!fgets(buff, sizeof(buff), fp))
			break;
		tmp = realloc(dd->sym_mapping,
			      (dd->sym_count + 1) *
			      sizeof(*dd->sym_mapping));
		if (!tmp) {
out:
			free(dd->sym_mapping);
			dd->sym_mapping = NULL;
			fclose(fp);
			return;
		}
		dd->sym_mapping = tmp;
		sym = &dd->sym_mapping[dd->sym_count];
		if (sscanf(buff, "%p %*c %s", &address, sym->name) != 2)
			continue;
		sym->address = (unsigned long)address;
		if (!strcmp(sym->name, "__bpf_call_base")) {
			dd->address_call_base = sym->address;
			/* sysctl kernel.kptr_restrict was set */
			if (!sym->address)
				goto out;
		}
		if (sym->address)
			dd->sym_count++;
	}

	fclose(fp);

	qsort(dd->sym_mapping, dd->sym_count,
	      sizeof(*dd->sym_mapping), kernel_syms_cmp);
}

static void kernel_syms_destroy(struct dump_data *dd)
{
	free(dd->sym_mapping);
}

static struct kernel_sym *kernel_syms_search(struct dump_data *dd,
					     unsigned long key)
{
	struct kernel_sym sym = {
		.address = key,
	};

	return dd->sym_mapping ?
	       bsearch(&sym, dd->sym_mapping, dd->sym_count,
		       sizeof(*dd->sym_mapping), kernel_syms_cmp) : NULL;
}

491 492 493 494 495 496 497 498 499
static void print_insn(struct bpf_verifier_env *env, const char *fmt, ...)
{
	va_list args;

	va_start(args, fmt);
	vprintf(fmt, args);
	va_end(args);
}

500 501 502 503
static const char *print_call_pcrel(struct dump_data *dd,
				    struct kernel_sym *sym,
				    unsigned long address,
				    const struct bpf_insn *insn)
504
{
505 506 507 508 509 510 511 512 513 514 515 516 517 518 519 520 521 522 523 524 525 526 527 528 529 530 531 532 533 534 535 536 537 538 539 540 541 542 543 544 545 546 547 548 549 550 551 552 553 554 555 556 557 558 559 560 561 562 563 564
	if (sym)
		snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
			 "%+d#%s", insn->off, sym->name);
	else
		snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
			 "%+d#0x%lx", insn->off, address);
	return dd->scratch_buff;
}

static const char *print_call_helper(struct dump_data *dd,
				     struct kernel_sym *sym,
				     unsigned long address)
{
	if (sym)
		snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
			 "%s", sym->name);
	else
		snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
			 "0x%lx", address);
	return dd->scratch_buff;
}

static const char *print_call(void *private_data,
			      const struct bpf_insn *insn)
{
	struct dump_data *dd = private_data;
	unsigned long address = dd->address_call_base + insn->imm;
	struct kernel_sym *sym;

	sym = kernel_syms_search(dd, address);
	if (insn->src_reg == BPF_PSEUDO_CALL)
		return print_call_pcrel(dd, sym, address, insn);
	else
		return print_call_helper(dd, sym, address);
}

static const char *print_imm(void *private_data,
			     const struct bpf_insn *insn,
			     __u64 full_imm)
{
	struct dump_data *dd = private_data;

	if (insn->src_reg == BPF_PSEUDO_MAP_FD)
		snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
			 "map[id:%u]", insn->imm);
	else
		snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
			 "0x%llx", (unsigned long long)full_imm);
	return dd->scratch_buff;
}

static void dump_xlated_plain(struct dump_data *dd, void *buf,
			      unsigned int len, bool opcodes)
{
	const struct bpf_insn_cbs cbs = {
		.cb_print	= print_insn,
		.cb_call	= print_call,
		.cb_imm		= print_imm,
		.private_data	= dd,
	};
565
	struct bpf_insn *insn = buf;
566
	bool double_insn = false;
567 568 569
	unsigned int i;

	for (i = 0; i < len / sizeof(*insn); i++) {
570 571 572 573 574 575 576
		if (double_insn) {
			double_insn = false;
			continue;
		}

		double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);

577
		printf("% 4d: ", i);
578
		print_bpf_insn(&cbs, NULL, insn + i, true);
579 580 581

		if (opcodes) {
			printf("       ");
582
			fprint_hex(stdout, insn + i, 8, " ");
583 584 585 586
			if (double_insn && i < len - 1) {
				printf(" ");
				fprint_hex(stdout, insn + i + 1, 8, " ");
			}
587 588 589 590 591
			printf("\n");
		}
	}
}

592 593 594 595 596 597 598 599 600 601 602 603 604 605 606
static void print_insn_json(struct bpf_verifier_env *env, const char *fmt, ...)
{
	unsigned int l = strlen(fmt);
	char chomped_fmt[l];
	va_list args;

	va_start(args, fmt);
	if (l > 0) {
		strncpy(chomped_fmt, fmt, l - 1);
		chomped_fmt[l - 1] = '\0';
	}
	jsonw_vprintf_enquote(json_wtr, chomped_fmt, args);
	va_end(args);
}

607 608
static void dump_xlated_json(struct dump_data *dd, void *buf,
			     unsigned int len, bool opcodes)
609
{
610 611 612 613 614 615
	const struct bpf_insn_cbs cbs = {
		.cb_print	= print_insn_json,
		.cb_call	= print_call,
		.cb_imm		= print_imm,
		.private_data	= dd,
	};
616 617 618 619 620 621 622 623 624 625 626 627 628 629
	struct bpf_insn *insn = buf;
	bool double_insn = false;
	unsigned int i;

	jsonw_start_array(json_wtr);
	for (i = 0; i < len / sizeof(*insn); i++) {
		if (double_insn) {
			double_insn = false;
			continue;
		}
		double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);

		jsonw_start_object(json_wtr);
		jsonw_name(json_wtr, "disasm");
630
		print_bpf_insn(&cbs, NULL, insn + i, true);
631 632 633 634 635 636 637 638 639 640 641 642 643 644 645 646 647 648 649 650 651 652 653 654 655 656 657 658 659 660 661

		if (opcodes) {
			jsonw_name(json_wtr, "opcodes");
			jsonw_start_object(json_wtr);

			jsonw_name(json_wtr, "code");
			jsonw_printf(json_wtr, "\"0x%02hhx\"", insn[i].code);

			jsonw_name(json_wtr, "src_reg");
			jsonw_printf(json_wtr, "\"0x%hhx\"", insn[i].src_reg);

			jsonw_name(json_wtr, "dst_reg");
			jsonw_printf(json_wtr, "\"0x%hhx\"", insn[i].dst_reg);

			jsonw_name(json_wtr, "off");
			print_hex_data_json((uint8_t *)(&insn[i].off), 2);

			jsonw_name(json_wtr, "imm");
			if (double_insn && i < len - 1)
				print_hex_data_json((uint8_t *)(&insn[i].imm),
						    12);
			else
				print_hex_data_json((uint8_t *)(&insn[i].imm),
						    4);
			jsonw_end_object(json_wtr);
		}
		jsonw_end_object(json_wtr);
	}
	jsonw_end_array(json_wtr);
}

J
Jakub Kicinski 已提交
662 663 664
static int do_dump(int argc, char **argv)
{
	struct bpf_prog_info info = {};
665
	struct dump_data dd = {};
J
Jakub Kicinski 已提交
666 667 668 669 670 671 672 673 674 675 676 677 678 679 680 681 682 683
	__u32 len = sizeof(info);
	unsigned int buf_size;
	char *filepath = NULL;
	bool opcodes = false;
	unsigned char *buf;
	__u32 *member_len;
	__u64 *member_ptr;
	ssize_t n;
	int err;
	int fd;

	if (is_prefix(*argv, "jited")) {
		member_len = &info.jited_prog_len;
		member_ptr = &info.jited_prog_insns;
	} else if (is_prefix(*argv, "xlated")) {
		member_len = &info.xlated_prog_len;
		member_ptr = &info.xlated_prog_insns;
	} else {
684
		p_err("expected 'xlated' or 'jited', got: %s", *argv);
J
Jakub Kicinski 已提交
685 686 687 688 689 690 691 692 693 694 695 696 697 698
		return -1;
	}
	NEXT_ARG();

	if (argc < 2)
		usage();

	fd = prog_parse_fd(&argc, &argv);
	if (fd < 0)
		return -1;

	if (is_prefix(*argv, "file")) {
		NEXT_ARG();
		if (!argc) {
699
			p_err("expected file path");
J
Jakub Kicinski 已提交
700 701 702 703 704 705 706 707 708 709 710 711 712 713 714 715 716
			return -1;
		}

		filepath = *argv;
		NEXT_ARG();
	} else if (is_prefix(*argv, "opcodes")) {
		opcodes = true;
		NEXT_ARG();
	}

	if (argc) {
		usage();
		return -1;
	}

	err = bpf_obj_get_info_by_fd(fd, &info, &len);
	if (err) {
717
		p_err("can't get prog info: %s", strerror(errno));
J
Jakub Kicinski 已提交
718 719 720 721
		return -1;
	}

	if (!*member_len) {
722
		p_info("no instructions returned");
J
Jakub Kicinski 已提交
723 724 725 726 727 728 729 730
		close(fd);
		return 0;
	}

	buf_size = *member_len;

	buf = malloc(buf_size);
	if (!buf) {
731
		p_err("mem alloc failed");
J
Jakub Kicinski 已提交
732 733 734 735 736 737 738 739 740 741 742 743
		close(fd);
		return -1;
	}

	memset(&info, 0, sizeof(info));

	*member_ptr = ptr_to_u64(buf);
	*member_len = buf_size;

	err = bpf_obj_get_info_by_fd(fd, &info, &len);
	close(fd);
	if (err) {
744
		p_err("can't get prog info: %s", strerror(errno));
J
Jakub Kicinski 已提交
745 746 747 748
		goto err_free;
	}

	if (*member_len > buf_size) {
749
		p_err("too many instructions returned");
J
Jakub Kicinski 已提交
750 751 752
		goto err_free;
	}

753 754 755 756 757 758 759 760
	if ((member_len == &info.jited_prog_len &&
	     info.jited_prog_insns == 0) ||
	    (member_len == &info.xlated_prog_len &&
	     info.xlated_prog_insns == 0)) {
		p_err("error retrieving insn dump: kernel.kptr_restrict set?");
		goto err_free;
	}

J
Jakub Kicinski 已提交
761 762 763
	if (filepath) {
		fd = open(filepath, O_WRONLY | O_CREAT | O_TRUNC, 0600);
		if (fd < 0) {
764 765
			p_err("can't open file %s: %s", filepath,
			      strerror(errno));
J
Jakub Kicinski 已提交
766 767 768 769 770 771
			goto err_free;
		}

		n = write(fd, buf, *member_len);
		close(fd);
		if (n != *member_len) {
772 773
			p_err("error writing output file: %s",
			      n < 0 ? strerror(errno) : "short write");
J
Jakub Kicinski 已提交
774 775 776
			goto err_free;
		}
	} else {
777
		if (member_len == &info.jited_prog_len) {
778
			disasm_print_insn(buf, *member_len, opcodes);
779 780
		} else {
			kernel_syms_load(&dd);
781
			if (json_output)
782
				dump_xlated_json(&dd, buf, *member_len, opcodes);
783
			else
784 785 786
				dump_xlated_plain(&dd, buf, *member_len, opcodes);
			kernel_syms_destroy(&dd);
		}
J
Jakub Kicinski 已提交
787 788 789 790 791 792 793 794 795 796 797 798
	}

	free(buf);
	return 0;

err_free:
	free(buf);
	return -1;
}

static int do_pin(int argc, char **argv)
{
799 800 801 802 803 804
	int err;

	err = do_pin_any(argc, argv, bpf_prog_get_fd_by_id);
	if (!err && json_output)
		jsonw_null(json_wtr);
	return err;
J
Jakub Kicinski 已提交
805 806
}

807 808 809 810 811 812 813 814 815 816 817 818 819 820 821 822 823 824 825 826 827 828 829 830
static int do_load(int argc, char **argv)
{
	struct bpf_object *obj;
	int prog_fd;

	if (argc != 2)
		usage();

	if (bpf_prog_load(argv[0], BPF_PROG_TYPE_UNSPEC, &obj, &prog_fd)) {
		p_err("failed to load program\n");
		return -1;
	}

	if (do_pin_fd(prog_fd, argv[1])) {
		p_err("failed to pin program\n");
		return -1;
	}

	if (json_output)
		jsonw_null(json_wtr);

	return 0;
}

J
Jakub Kicinski 已提交
831 832
static int do_help(int argc, char **argv)
{
833 834 835 836 837
	if (json_output) {
		jsonw_null(json_wtr);
		return 0;
	}

J
Jakub Kicinski 已提交
838 839
	fprintf(stderr,
		"Usage: %s %s show [PROG]\n"
840 841
		"       %s %s dump xlated PROG [{ file FILE | opcodes }]\n"
		"       %s %s dump jited  PROG [{ file FILE | opcodes }]\n"
J
Jakub Kicinski 已提交
842
		"       %s %s pin   PROG FILE\n"
843
		"       %s %s load  OBJ  FILE\n"
J
Jakub Kicinski 已提交
844 845 846
		"       %s %s help\n"
		"\n"
		"       " HELP_SPEC_PROGRAM "\n"
847
		"       " HELP_SPEC_OPTIONS "\n"
J
Jakub Kicinski 已提交
848 849
		"",
		bin_name, argv[-2], bin_name, argv[-2], bin_name, argv[-2],
850
		bin_name, argv[-2], bin_name, argv[-2], bin_name, argv[-2]);
J
Jakub Kicinski 已提交
851 852 853 854 855 856

	return 0;
}

static const struct cmd cmds[] = {
	{ "show",	do_show },
857
	{ "help",	do_help },
J
Jakub Kicinski 已提交
858 859
	{ "dump",	do_dump },
	{ "pin",	do_pin },
860
	{ "load",	do_load },
J
Jakub Kicinski 已提交
861 862 863 864 865 866 867
	{ 0 }
};

int do_prog(int argc, char **argv)
{
	return cmd_select(cmds, argc, argv, do_help);
}