Loading...
1// SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
2/* Copyright (C) 2018 Netronome Systems, Inc. */
3
4#define _GNU_SOURCE
5#include <stdarg.h>
6#include <stdio.h>
7#include <stdlib.h>
8#include <string.h>
9#include <sys/types.h>
10#include <bpf/libbpf.h>
11
12#include "disasm.h"
13#include "json_writer.h"
14#include "main.h"
15#include "xlated_dumper.h"
16
17static int kernel_syms_cmp(const void *sym_a, const void *sym_b)
18{
19 return ((struct kernel_sym *)sym_a)->address -
20 ((struct kernel_sym *)sym_b)->address;
21}
22
23void kernel_syms_load(struct dump_data *dd)
24{
25 struct kernel_sym *sym;
26 char buff[256];
27 void *tmp, *address;
28 FILE *fp;
29
30 fp = fopen("/proc/kallsyms", "r");
31 if (!fp)
32 return;
33
34 while (fgets(buff, sizeof(buff), fp)) {
35 tmp = reallocarray(dd->sym_mapping, dd->sym_count + 1,
36 sizeof(*dd->sym_mapping));
37 if (!tmp) {
38out:
39 free(dd->sym_mapping);
40 dd->sym_mapping = NULL;
41 fclose(fp);
42 return;
43 }
44 dd->sym_mapping = tmp;
45 sym = &dd->sym_mapping[dd->sym_count];
46 if (sscanf(buff, "%p %*c %s", &address, sym->name) != 2)
47 continue;
48 sym->address = (unsigned long)address;
49 if (!strcmp(sym->name, "__bpf_call_base")) {
50 dd->address_call_base = sym->address;
51 /* sysctl kernel.kptr_restrict was set */
52 if (!sym->address)
53 goto out;
54 }
55 if (sym->address)
56 dd->sym_count++;
57 }
58
59 fclose(fp);
60
61 qsort(dd->sym_mapping, dd->sym_count,
62 sizeof(*dd->sym_mapping), kernel_syms_cmp);
63}
64
65void kernel_syms_destroy(struct dump_data *dd)
66{
67 free(dd->sym_mapping);
68}
69
70struct kernel_sym *kernel_syms_search(struct dump_data *dd,
71 unsigned long key)
72{
73 struct kernel_sym sym = {
74 .address = key,
75 };
76
77 return dd->sym_mapping ?
78 bsearch(&sym, dd->sym_mapping, dd->sym_count,
79 sizeof(*dd->sym_mapping), kernel_syms_cmp) : NULL;
80}
81
82static void __printf(2, 3) print_insn(void *private_data, const char *fmt, ...)
83{
84 va_list args;
85
86 va_start(args, fmt);
87 vprintf(fmt, args);
88 va_end(args);
89}
90
91static void __printf(2, 3)
92print_insn_for_graph(void *private_data, const char *fmt, ...)
93{
94 char buf[64], *p;
95 va_list args;
96
97 va_start(args, fmt);
98 vsnprintf(buf, sizeof(buf), fmt, args);
99 va_end(args);
100
101 p = buf;
102 while (*p != '\0') {
103 if (*p == '\n') {
104 memmove(p + 3, p, strlen(buf) + 1 - (p - buf));
105 /* Align each instruction dump row left. */
106 *p++ = '\\';
107 *p++ = 'l';
108 /* Output multiline concatenation. */
109 *p++ = '\\';
110 } else if (*p == '<' || *p == '>' || *p == '|' || *p == '&') {
111 memmove(p + 1, p, strlen(buf) + 1 - (p - buf));
112 /* Escape special character. */
113 *p++ = '\\';
114 }
115
116 p++;
117 }
118
119 printf("%s", buf);
120}
121
122static void __printf(2, 3)
123print_insn_json(void *private_data, const char *fmt, ...)
124{
125 unsigned int l = strlen(fmt);
126 char chomped_fmt[l];
127 va_list args;
128
129 va_start(args, fmt);
130 if (l > 0) {
131 strncpy(chomped_fmt, fmt, l - 1);
132 chomped_fmt[l - 1] = '\0';
133 }
134 jsonw_vprintf_enquote(json_wtr, chomped_fmt, args);
135 va_end(args);
136}
137
138static const char *print_call_pcrel(struct dump_data *dd,
139 struct kernel_sym *sym,
140 unsigned long address,
141 const struct bpf_insn *insn)
142{
143 if (!dd->nr_jited_ksyms)
144 /* Do not show address for interpreted programs */
145 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
146 "%+d", insn->off);
147 else if (sym)
148 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
149 "%+d#%s", insn->off, sym->name);
150 else
151 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
152 "%+d#0x%lx", insn->off, address);
153 return dd->scratch_buff;
154}
155
156static const char *print_call_helper(struct dump_data *dd,
157 struct kernel_sym *sym,
158 unsigned long address)
159{
160 if (sym)
161 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
162 "%s", sym->name);
163 else
164 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
165 "0x%lx", address);
166 return dd->scratch_buff;
167}
168
169static const char *print_call(void *private_data,
170 const struct bpf_insn *insn)
171{
172 struct dump_data *dd = private_data;
173 unsigned long address = dd->address_call_base + insn->imm;
174 struct kernel_sym *sym;
175
176 if (insn->src_reg == BPF_PSEUDO_CALL &&
177 (__u32) insn->imm < dd->nr_jited_ksyms && dd->jited_ksyms)
178 address = dd->jited_ksyms[insn->imm];
179
180 sym = kernel_syms_search(dd, address);
181 if (insn->src_reg == BPF_PSEUDO_CALL)
182 return print_call_pcrel(dd, sym, address, insn);
183 else
184 return print_call_helper(dd, sym, address);
185}
186
187static const char *print_imm(void *private_data,
188 const struct bpf_insn *insn,
189 __u64 full_imm)
190{
191 struct dump_data *dd = private_data;
192
193 if (insn->src_reg == BPF_PSEUDO_MAP_FD)
194 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
195 "map[id:%u]", insn->imm);
196 else if (insn->src_reg == BPF_PSEUDO_MAP_VALUE)
197 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
198 "map[id:%u][0]+%u", insn->imm, (insn + 1)->imm);
199 else if (insn->src_reg == BPF_PSEUDO_MAP_IDX_VALUE)
200 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
201 "map[idx:%u]+%u", insn->imm, (insn + 1)->imm);
202 else if (insn->src_reg == BPF_PSEUDO_FUNC)
203 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
204 "subprog[%+d]", insn->imm);
205 else
206 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
207 "0x%llx", (unsigned long long)full_imm);
208 return dd->scratch_buff;
209}
210
211void dump_xlated_json(struct dump_data *dd, void *buf, unsigned int len,
212 bool opcodes, bool linum)
213{
214 const struct bpf_prog_linfo *prog_linfo = dd->prog_linfo;
215 const struct bpf_insn_cbs cbs = {
216 .cb_print = print_insn_json,
217 .cb_call = print_call,
218 .cb_imm = print_imm,
219 .private_data = dd,
220 };
221 struct bpf_func_info *record;
222 struct bpf_insn *insn = buf;
223 struct btf *btf = dd->btf;
224 bool double_insn = false;
225 unsigned int nr_skip = 0;
226 char func_sig[1024];
227 unsigned int i;
228
229 jsonw_start_array(json_wtr);
230 record = dd->func_info;
231 for (i = 0; i < len / sizeof(*insn); i++) {
232 if (double_insn) {
233 double_insn = false;
234 continue;
235 }
236 double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);
237
238 jsonw_start_object(json_wtr);
239
240 if (btf && record) {
241 if (record->insn_off == i) {
242 btf_dumper_type_only(btf, record->type_id,
243 func_sig,
244 sizeof(func_sig));
245 if (func_sig[0] != '\0') {
246 jsonw_name(json_wtr, "proto");
247 jsonw_string(json_wtr, func_sig);
248 }
249 record = (void *)record + dd->finfo_rec_size;
250 }
251 }
252
253 if (prog_linfo) {
254 const struct bpf_line_info *linfo;
255
256 linfo = bpf_prog_linfo__lfind(prog_linfo, i, nr_skip);
257 if (linfo) {
258 btf_dump_linfo_json(btf, linfo, linum);
259 nr_skip++;
260 }
261 }
262
263 jsonw_name(json_wtr, "disasm");
264 print_bpf_insn(&cbs, insn + i, true);
265
266 if (opcodes) {
267 jsonw_name(json_wtr, "opcodes");
268 jsonw_start_object(json_wtr);
269
270 jsonw_name(json_wtr, "code");
271 jsonw_printf(json_wtr, "\"0x%02hhx\"", insn[i].code);
272
273 jsonw_name(json_wtr, "src_reg");
274 jsonw_printf(json_wtr, "\"0x%hhx\"", insn[i].src_reg);
275
276 jsonw_name(json_wtr, "dst_reg");
277 jsonw_printf(json_wtr, "\"0x%hhx\"", insn[i].dst_reg);
278
279 jsonw_name(json_wtr, "off");
280 print_hex_data_json((uint8_t *)(&insn[i].off), 2);
281
282 jsonw_name(json_wtr, "imm");
283 if (double_insn && i < len - 1)
284 print_hex_data_json((uint8_t *)(&insn[i].imm),
285 12);
286 else
287 print_hex_data_json((uint8_t *)(&insn[i].imm),
288 4);
289 jsonw_end_object(json_wtr);
290 }
291 jsonw_end_object(json_wtr);
292 }
293 jsonw_end_array(json_wtr);
294}
295
296void dump_xlated_plain(struct dump_data *dd, void *buf, unsigned int len,
297 bool opcodes, bool linum)
298{
299 const struct bpf_prog_linfo *prog_linfo = dd->prog_linfo;
300 const struct bpf_insn_cbs cbs = {
301 .cb_print = print_insn,
302 .cb_call = print_call,
303 .cb_imm = print_imm,
304 .private_data = dd,
305 };
306 struct bpf_func_info *record;
307 struct bpf_insn *insn = buf;
308 struct btf *btf = dd->btf;
309 unsigned int nr_skip = 0;
310 bool double_insn = false;
311 char func_sig[1024];
312 unsigned int i;
313
314 record = dd->func_info;
315 for (i = 0; i < len / sizeof(*insn); i++) {
316 if (double_insn) {
317 double_insn = false;
318 continue;
319 }
320
321 if (btf && record) {
322 if (record->insn_off == i) {
323 btf_dumper_type_only(btf, record->type_id,
324 func_sig,
325 sizeof(func_sig));
326 if (func_sig[0] != '\0')
327 printf("%s:\n", func_sig);
328 record = (void *)record + dd->finfo_rec_size;
329 }
330 }
331
332 if (prog_linfo) {
333 const struct bpf_line_info *linfo;
334
335 linfo = bpf_prog_linfo__lfind(prog_linfo, i, nr_skip);
336 if (linfo) {
337 btf_dump_linfo_plain(btf, linfo, "; ",
338 linum);
339 nr_skip++;
340 }
341 }
342
343 double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);
344
345 printf("% 4d: ", i);
346 print_bpf_insn(&cbs, insn + i, true);
347
348 if (opcodes) {
349 printf(" ");
350 fprint_hex(stdout, insn + i, 8, " ");
351 if (double_insn && i < len - 1) {
352 printf(" ");
353 fprint_hex(stdout, insn + i + 1, 8, " ");
354 }
355 printf("\n");
356 }
357 }
358}
359
360void dump_xlated_for_graph(struct dump_data *dd, void *buf_start, void *buf_end,
361 unsigned int start_idx)
362{
363 const struct bpf_insn_cbs cbs = {
364 .cb_print = print_insn_for_graph,
365 .cb_call = print_call,
366 .cb_imm = print_imm,
367 .private_data = dd,
368 };
369 struct bpf_insn *insn_start = buf_start;
370 struct bpf_insn *insn_end = buf_end;
371 struct bpf_insn *cur = insn_start;
372
373 for (; cur <= insn_end; cur++) {
374 printf("% 4d: ", (int)(cur - insn_start + start_idx));
375 print_bpf_insn(&cbs, cur, true);
376 if (cur != insn_end)
377 printf(" | ");
378 }
379}
1// SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
2/* Copyright (C) 2018 Netronome Systems, Inc. */
3
4#ifndef _GNU_SOURCE
5#define _GNU_SOURCE
6#endif
7#include <stdarg.h>
8#include <stdio.h>
9#include <stdlib.h>
10#include <string.h>
11#include <sys/types.h>
12#include <bpf/libbpf.h>
13#include <bpf/libbpf_internal.h>
14
15#include "disasm.h"
16#include "json_writer.h"
17#include "main.h"
18#include "xlated_dumper.h"
19
20static int kernel_syms_cmp(const void *sym_a, const void *sym_b)
21{
22 return ((struct kernel_sym *)sym_a)->address -
23 ((struct kernel_sym *)sym_b)->address;
24}
25
26void kernel_syms_load(struct dump_data *dd)
27{
28 struct kernel_sym *sym;
29 char buff[256];
30 void *tmp, *address;
31 FILE *fp;
32
33 fp = fopen("/proc/kallsyms", "r");
34 if (!fp)
35 return;
36
37 while (fgets(buff, sizeof(buff), fp)) {
38 tmp = libbpf_reallocarray(dd->sym_mapping, dd->sym_count + 1,
39 sizeof(*dd->sym_mapping));
40 if (!tmp) {
41out:
42 free(dd->sym_mapping);
43 dd->sym_mapping = NULL;
44 fclose(fp);
45 return;
46 }
47 dd->sym_mapping = tmp;
48 sym = &dd->sym_mapping[dd->sym_count];
49
50 /* module is optional */
51 sym->module[0] = '\0';
52 /* trim the square brackets around the module name */
53 if (sscanf(buff, "%p %*c %s [%[^]]s", &address, sym->name, sym->module) < 2)
54 continue;
55 sym->address = (unsigned long)address;
56 if (!strcmp(sym->name, "__bpf_call_base")) {
57 dd->address_call_base = sym->address;
58 /* sysctl kernel.kptr_restrict was set */
59 if (!sym->address)
60 goto out;
61 }
62 if (sym->address)
63 dd->sym_count++;
64 }
65
66 fclose(fp);
67
68 qsort(dd->sym_mapping, dd->sym_count,
69 sizeof(*dd->sym_mapping), kernel_syms_cmp);
70}
71
72void kernel_syms_destroy(struct dump_data *dd)
73{
74 free(dd->sym_mapping);
75}
76
77struct kernel_sym *kernel_syms_search(struct dump_data *dd,
78 unsigned long key)
79{
80 struct kernel_sym sym = {
81 .address = key,
82 };
83
84 return dd->sym_mapping ?
85 bsearch(&sym, dd->sym_mapping, dd->sym_count,
86 sizeof(*dd->sym_mapping), kernel_syms_cmp) : NULL;
87}
88
89static void __printf(2, 3) print_insn(void *private_data, const char *fmt, ...)
90{
91 va_list args;
92
93 va_start(args, fmt);
94 vprintf(fmt, args);
95 va_end(args);
96}
97
98static void __printf(2, 3)
99print_insn_for_graph(void *private_data, const char *fmt, ...)
100{
101 char buf[64], *p;
102 va_list args;
103
104 va_start(args, fmt);
105 vsnprintf(buf, sizeof(buf), fmt, args);
106 va_end(args);
107
108 p = buf;
109 while (*p != '\0') {
110 if (*p == '\n') {
111 memmove(p + 3, p, strlen(buf) + 1 - (p - buf));
112 /* Align each instruction dump row left. */
113 *p++ = '\\';
114 *p++ = 'l';
115 /* Output multiline concatenation. */
116 *p++ = '\\';
117 } else if (*p == '<' || *p == '>' || *p == '|' || *p == '&') {
118 memmove(p + 1, p, strlen(buf) + 1 - (p - buf));
119 /* Escape special character. */
120 *p++ = '\\';
121 }
122
123 p++;
124 }
125
126 printf("%s", buf);
127}
128
129static void __printf(2, 3)
130print_insn_json(void *private_data, const char *fmt, ...)
131{
132 unsigned int l = strlen(fmt);
133 char chomped_fmt[l];
134 va_list args;
135
136 va_start(args, fmt);
137 if (l > 0) {
138 strncpy(chomped_fmt, fmt, l - 1);
139 chomped_fmt[l - 1] = '\0';
140 }
141 jsonw_vprintf_enquote(json_wtr, chomped_fmt, args);
142 va_end(args);
143}
144
145static const char *print_call_pcrel(struct dump_data *dd,
146 struct kernel_sym *sym,
147 unsigned long address,
148 const struct bpf_insn *insn)
149{
150 if (!dd->nr_jited_ksyms)
151 /* Do not show address for interpreted programs */
152 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
153 "%+d", insn->off);
154 else if (sym)
155 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
156 "%+d#%s", insn->off, sym->name);
157 else
158 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
159 "%+d#0x%lx", insn->off, address);
160 return dd->scratch_buff;
161}
162
163static const char *print_call_helper(struct dump_data *dd,
164 struct kernel_sym *sym,
165 unsigned long address)
166{
167 if (sym)
168 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
169 "%s", sym->name);
170 else
171 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
172 "0x%lx", address);
173 return dd->scratch_buff;
174}
175
176static const char *print_call(void *private_data,
177 const struct bpf_insn *insn)
178{
179 struct dump_data *dd = private_data;
180 unsigned long address = dd->address_call_base + insn->imm;
181 struct kernel_sym *sym;
182
183 if (insn->src_reg == BPF_PSEUDO_CALL &&
184 (__u32) insn->imm < dd->nr_jited_ksyms && dd->jited_ksyms)
185 address = dd->jited_ksyms[insn->imm];
186
187 sym = kernel_syms_search(dd, address);
188 if (insn->src_reg == BPF_PSEUDO_CALL)
189 return print_call_pcrel(dd, sym, address, insn);
190 else
191 return print_call_helper(dd, sym, address);
192}
193
194static const char *print_imm(void *private_data,
195 const struct bpf_insn *insn,
196 __u64 full_imm)
197{
198 struct dump_data *dd = private_data;
199
200 if (insn->src_reg == BPF_PSEUDO_MAP_FD)
201 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
202 "map[id:%u]", insn->imm);
203 else if (insn->src_reg == BPF_PSEUDO_MAP_VALUE)
204 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
205 "map[id:%u][0]+%u", insn->imm, (insn + 1)->imm);
206 else if (insn->src_reg == BPF_PSEUDO_MAP_IDX_VALUE)
207 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
208 "map[idx:%u]+%u", insn->imm, (insn + 1)->imm);
209 else if (insn->src_reg == BPF_PSEUDO_FUNC)
210 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
211 "subprog[%+d]", insn->imm);
212 else
213 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
214 "0x%llx", (unsigned long long)full_imm);
215 return dd->scratch_buff;
216}
217
218void dump_xlated_json(struct dump_data *dd, void *buf, unsigned int len,
219 bool opcodes, bool linum)
220{
221 const struct bpf_prog_linfo *prog_linfo = dd->prog_linfo;
222 const struct bpf_insn_cbs cbs = {
223 .cb_print = print_insn_json,
224 .cb_call = print_call,
225 .cb_imm = print_imm,
226 .private_data = dd,
227 };
228 struct bpf_func_info *record;
229 struct bpf_insn *insn = buf;
230 struct btf *btf = dd->btf;
231 bool double_insn = false;
232 unsigned int nr_skip = 0;
233 char func_sig[1024];
234 unsigned int i;
235
236 jsonw_start_array(json_wtr);
237 record = dd->func_info;
238 for (i = 0; i < len / sizeof(*insn); i++) {
239 if (double_insn) {
240 double_insn = false;
241 continue;
242 }
243 double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);
244
245 jsonw_start_object(json_wtr);
246
247 if (btf && record) {
248 if (record->insn_off == i) {
249 btf_dumper_type_only(btf, record->type_id,
250 func_sig,
251 sizeof(func_sig));
252 if (func_sig[0] != '\0') {
253 jsonw_name(json_wtr, "proto");
254 jsonw_string(json_wtr, func_sig);
255 }
256 record = (void *)record + dd->finfo_rec_size;
257 }
258 }
259
260 if (prog_linfo) {
261 const struct bpf_line_info *linfo;
262
263 linfo = bpf_prog_linfo__lfind(prog_linfo, i, nr_skip);
264 if (linfo) {
265 btf_dump_linfo_json(btf, linfo, linum);
266 nr_skip++;
267 }
268 }
269
270 jsonw_name(json_wtr, "disasm");
271 print_bpf_insn(&cbs, insn + i, true);
272
273 if (opcodes) {
274 jsonw_name(json_wtr, "opcodes");
275 jsonw_start_object(json_wtr);
276
277 jsonw_name(json_wtr, "code");
278 jsonw_printf(json_wtr, "\"0x%02hhx\"", insn[i].code);
279
280 jsonw_name(json_wtr, "src_reg");
281 jsonw_printf(json_wtr, "\"0x%hhx\"", insn[i].src_reg);
282
283 jsonw_name(json_wtr, "dst_reg");
284 jsonw_printf(json_wtr, "\"0x%hhx\"", insn[i].dst_reg);
285
286 jsonw_name(json_wtr, "off");
287 print_hex_data_json((uint8_t *)(&insn[i].off), 2);
288
289 jsonw_name(json_wtr, "imm");
290 if (double_insn && i < len - 1)
291 print_hex_data_json((uint8_t *)(&insn[i].imm),
292 12);
293 else
294 print_hex_data_json((uint8_t *)(&insn[i].imm),
295 4);
296 jsonw_end_object(json_wtr);
297 }
298 jsonw_end_object(json_wtr);
299 }
300 jsonw_end_array(json_wtr);
301}
302
303void dump_xlated_plain(struct dump_data *dd, void *buf, unsigned int len,
304 bool opcodes, bool linum)
305{
306 const struct bpf_prog_linfo *prog_linfo = dd->prog_linfo;
307 const struct bpf_insn_cbs cbs = {
308 .cb_print = print_insn,
309 .cb_call = print_call,
310 .cb_imm = print_imm,
311 .private_data = dd,
312 };
313 struct bpf_func_info *record;
314 struct bpf_insn *insn = buf;
315 struct btf *btf = dd->btf;
316 unsigned int nr_skip = 0;
317 bool double_insn = false;
318 char func_sig[1024];
319 unsigned int i;
320
321 record = dd->func_info;
322 for (i = 0; i < len / sizeof(*insn); i++) {
323 if (double_insn) {
324 double_insn = false;
325 continue;
326 }
327
328 if (btf && record) {
329 if (record->insn_off == i) {
330 btf_dumper_type_only(btf, record->type_id,
331 func_sig,
332 sizeof(func_sig));
333 if (func_sig[0] != '\0')
334 printf("%s:\n", func_sig);
335 record = (void *)record + dd->finfo_rec_size;
336 }
337 }
338
339 if (prog_linfo) {
340 const struct bpf_line_info *linfo;
341
342 linfo = bpf_prog_linfo__lfind(prog_linfo, i, nr_skip);
343 if (linfo) {
344 btf_dump_linfo_plain(btf, linfo, "; ",
345 linum);
346 nr_skip++;
347 }
348 }
349
350 double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);
351
352 printf("% 4d: ", i);
353 print_bpf_insn(&cbs, insn + i, true);
354
355 if (opcodes) {
356 printf(" ");
357 fprint_hex(stdout, insn + i, 8, " ");
358 if (double_insn && i < len - 1) {
359 printf(" ");
360 fprint_hex(stdout, insn + i + 1, 8, " ");
361 }
362 printf("\n");
363 }
364 }
365}
366
367void dump_xlated_for_graph(struct dump_data *dd, void *buf_start, void *buf_end,
368 unsigned int start_idx,
369 bool opcodes, bool linum)
370{
371 const struct bpf_insn_cbs cbs = {
372 .cb_print = print_insn_for_graph,
373 .cb_call = print_call,
374 .cb_imm = print_imm,
375 .private_data = dd,
376 };
377 const struct bpf_prog_linfo *prog_linfo = dd->prog_linfo;
378 const struct bpf_line_info *last_linfo = NULL;
379 struct bpf_func_info *record = dd->func_info;
380 struct bpf_insn *insn_start = buf_start;
381 struct bpf_insn *insn_end = buf_end;
382 struct bpf_insn *cur = insn_start;
383 struct btf *btf = dd->btf;
384 bool double_insn = false;
385 char func_sig[1024];
386
387 for (; cur <= insn_end; cur++) {
388 unsigned int insn_off;
389
390 if (double_insn) {
391 double_insn = false;
392 continue;
393 }
394 double_insn = cur->code == (BPF_LD | BPF_IMM | BPF_DW);
395
396 insn_off = (unsigned int)(cur - insn_start + start_idx);
397 if (btf && record) {
398 if (record->insn_off == insn_off) {
399 btf_dumper_type_only(btf, record->type_id,
400 func_sig,
401 sizeof(func_sig));
402 if (func_sig[0] != '\0')
403 printf("; %s:\\l\\\n", func_sig);
404 record = (void *)record + dd->finfo_rec_size;
405 }
406 }
407
408 if (prog_linfo) {
409 const struct bpf_line_info *linfo;
410
411 linfo = bpf_prog_linfo__lfind(prog_linfo, insn_off, 0);
412 if (linfo && linfo != last_linfo) {
413 btf_dump_linfo_dotlabel(btf, linfo, linum);
414 last_linfo = linfo;
415 }
416 }
417
418 printf("%d: ", insn_off);
419 print_bpf_insn(&cbs, cur, true);
420
421 if (opcodes) {
422 printf("\\ \\ \\ \\ ");
423 fprint_hex(stdout, cur, 8, " ");
424 if (double_insn && cur <= insn_end - 1) {
425 printf(" ");
426 fprint_hex(stdout, cur + 1, 8, " ");
427 }
428 printf("\\l\\\n");
429 }
430
431 if (cur != insn_end)
432 printf("| ");
433 }
434}