Loading...
1// SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
2/* Copyright (C) 2018 Netronome Systems, Inc. */
3
4#ifndef _GNU_SOURCE
5#define _GNU_SOURCE
6#endif
7#include <stdarg.h>
8#include <stdio.h>
9#include <stdlib.h>
10#include <string.h>
11#include <sys/types.h>
12#include <bpf/libbpf.h>
13#include <bpf/libbpf_internal.h>
14
15#include "disasm.h"
16#include "json_writer.h"
17#include "main.h"
18#include "xlated_dumper.h"
19
20static int kernel_syms_cmp(const void *sym_a, const void *sym_b)
21{
22 return ((struct kernel_sym *)sym_a)->address -
23 ((struct kernel_sym *)sym_b)->address;
24}
25
26void kernel_syms_load(struct dump_data *dd)
27{
28 struct kernel_sym *sym;
29 char buff[256];
30 void *tmp, *address;
31 FILE *fp;
32
33 fp = fopen("/proc/kallsyms", "r");
34 if (!fp)
35 return;
36
37 while (fgets(buff, sizeof(buff), fp)) {
38 tmp = libbpf_reallocarray(dd->sym_mapping, dd->sym_count + 1,
39 sizeof(*dd->sym_mapping));
40 if (!tmp) {
41out:
42 free(dd->sym_mapping);
43 dd->sym_mapping = NULL;
44 fclose(fp);
45 return;
46 }
47 dd->sym_mapping = tmp;
48 sym = &dd->sym_mapping[dd->sym_count];
49
50 /* module is optional */
51 sym->module[0] = '\0';
52 /* trim the square brackets around the module name */
53 if (sscanf(buff, "%p %*c %s [%[^]]s", &address, sym->name, sym->module) < 2)
54 continue;
55 sym->address = (unsigned long)address;
56 if (!strcmp(sym->name, "__bpf_call_base")) {
57 dd->address_call_base = sym->address;
58 /* sysctl kernel.kptr_restrict was set */
59 if (!sym->address)
60 goto out;
61 }
62 if (sym->address)
63 dd->sym_count++;
64 }
65
66 fclose(fp);
67
68 qsort(dd->sym_mapping, dd->sym_count,
69 sizeof(*dd->sym_mapping), kernel_syms_cmp);
70}
71
72void kernel_syms_destroy(struct dump_data *dd)
73{
74 free(dd->sym_mapping);
75}
76
77struct kernel_sym *kernel_syms_search(struct dump_data *dd,
78 unsigned long key)
79{
80 struct kernel_sym sym = {
81 .address = key,
82 };
83
84 return dd->sym_mapping ?
85 bsearch(&sym, dd->sym_mapping, dd->sym_count,
86 sizeof(*dd->sym_mapping), kernel_syms_cmp) : NULL;
87}
88
89static void __printf(2, 3) print_insn(void *private_data, const char *fmt, ...)
90{
91 va_list args;
92
93 va_start(args, fmt);
94 vprintf(fmt, args);
95 va_end(args);
96}
97
98static void __printf(2, 3)
99print_insn_for_graph(void *private_data, const char *fmt, ...)
100{
101 char buf[64], *p;
102 va_list args;
103
104 va_start(args, fmt);
105 vsnprintf(buf, sizeof(buf), fmt, args);
106 va_end(args);
107
108 p = buf;
109 while (*p != '\0') {
110 if (*p == '\n') {
111 memmove(p + 3, p, strlen(buf) + 1 - (p - buf));
112 /* Align each instruction dump row left. */
113 *p++ = '\\';
114 *p++ = 'l';
115 /* Output multiline concatenation. */
116 *p++ = '\\';
117 } else if (*p == '<' || *p == '>' || *p == '|' || *p == '&') {
118 memmove(p + 1, p, strlen(buf) + 1 - (p - buf));
119 /* Escape special character. */
120 *p++ = '\\';
121 }
122
123 p++;
124 }
125
126 printf("%s", buf);
127}
128
129static void __printf(2, 3)
130print_insn_json(void *private_data, const char *fmt, ...)
131{
132 unsigned int l = strlen(fmt);
133 char chomped_fmt[l];
134 va_list args;
135
136 va_start(args, fmt);
137 if (l > 0) {
138 strncpy(chomped_fmt, fmt, l - 1);
139 chomped_fmt[l - 1] = '\0';
140 }
141 jsonw_vprintf_enquote(json_wtr, chomped_fmt, args);
142 va_end(args);
143}
144
145static const char *print_call_pcrel(struct dump_data *dd,
146 struct kernel_sym *sym,
147 unsigned long address,
148 const struct bpf_insn *insn)
149{
150 if (!dd->nr_jited_ksyms)
151 /* Do not show address for interpreted programs */
152 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
153 "%+d", insn->off);
154 else if (sym)
155 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
156 "%+d#%s", insn->off, sym->name);
157 else
158 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
159 "%+d#0x%lx", insn->off, address);
160 return dd->scratch_buff;
161}
162
163static const char *print_call_helper(struct dump_data *dd,
164 struct kernel_sym *sym,
165 unsigned long address)
166{
167 if (sym)
168 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
169 "%s", sym->name);
170 else
171 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
172 "0x%lx", address);
173 return dd->scratch_buff;
174}
175
176static const char *print_call(void *private_data,
177 const struct bpf_insn *insn)
178{
179 struct dump_data *dd = private_data;
180 unsigned long address = dd->address_call_base + insn->imm;
181 struct kernel_sym *sym;
182
183 if (insn->src_reg == BPF_PSEUDO_CALL &&
184 (__u32) insn->imm < dd->nr_jited_ksyms && dd->jited_ksyms)
185 address = dd->jited_ksyms[insn->imm];
186
187 sym = kernel_syms_search(dd, address);
188 if (insn->src_reg == BPF_PSEUDO_CALL)
189 return print_call_pcrel(dd, sym, address, insn);
190 else
191 return print_call_helper(dd, sym, address);
192}
193
194static const char *print_imm(void *private_data,
195 const struct bpf_insn *insn,
196 __u64 full_imm)
197{
198 struct dump_data *dd = private_data;
199
200 if (insn->src_reg == BPF_PSEUDO_MAP_FD)
201 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
202 "map[id:%u]", insn->imm);
203 else if (insn->src_reg == BPF_PSEUDO_MAP_VALUE)
204 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
205 "map[id:%u][0]+%u", insn->imm, (insn + 1)->imm);
206 else if (insn->src_reg == BPF_PSEUDO_MAP_IDX_VALUE)
207 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
208 "map[idx:%u]+%u", insn->imm, (insn + 1)->imm);
209 else if (insn->src_reg == BPF_PSEUDO_FUNC)
210 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
211 "subprog[%+d]", insn->imm);
212 else
213 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
214 "0x%llx", (unsigned long long)full_imm);
215 return dd->scratch_buff;
216}
217
218void dump_xlated_json(struct dump_data *dd, void *buf, unsigned int len,
219 bool opcodes, bool linum)
220{
221 const struct bpf_prog_linfo *prog_linfo = dd->prog_linfo;
222 const struct bpf_insn_cbs cbs = {
223 .cb_print = print_insn_json,
224 .cb_call = print_call,
225 .cb_imm = print_imm,
226 .private_data = dd,
227 };
228 struct bpf_func_info *record;
229 struct bpf_insn *insn = buf;
230 struct btf *btf = dd->btf;
231 bool double_insn = false;
232 unsigned int nr_skip = 0;
233 char func_sig[1024];
234 unsigned int i;
235
236 jsonw_start_array(json_wtr);
237 record = dd->func_info;
238 for (i = 0; i < len / sizeof(*insn); i++) {
239 if (double_insn) {
240 double_insn = false;
241 continue;
242 }
243 double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);
244
245 jsonw_start_object(json_wtr);
246
247 if (btf && record) {
248 if (record->insn_off == i) {
249 btf_dumper_type_only(btf, record->type_id,
250 func_sig,
251 sizeof(func_sig));
252 if (func_sig[0] != '\0') {
253 jsonw_name(json_wtr, "proto");
254 jsonw_string(json_wtr, func_sig);
255 }
256 record = (void *)record + dd->finfo_rec_size;
257 }
258 }
259
260 if (prog_linfo) {
261 const struct bpf_line_info *linfo;
262
263 linfo = bpf_prog_linfo__lfind(prog_linfo, i, nr_skip);
264 if (linfo) {
265 btf_dump_linfo_json(btf, linfo, linum);
266 nr_skip++;
267 }
268 }
269
270 jsonw_name(json_wtr, "disasm");
271 print_bpf_insn(&cbs, insn + i, true);
272
273 if (opcodes) {
274 jsonw_name(json_wtr, "opcodes");
275 jsonw_start_object(json_wtr);
276
277 jsonw_name(json_wtr, "code");
278 jsonw_printf(json_wtr, "\"0x%02hhx\"", insn[i].code);
279
280 jsonw_name(json_wtr, "src_reg");
281 jsonw_printf(json_wtr, "\"0x%hhx\"", insn[i].src_reg);
282
283 jsonw_name(json_wtr, "dst_reg");
284 jsonw_printf(json_wtr, "\"0x%hhx\"", insn[i].dst_reg);
285
286 jsonw_name(json_wtr, "off");
287 print_hex_data_json((uint8_t *)(&insn[i].off), 2);
288
289 jsonw_name(json_wtr, "imm");
290 if (double_insn && i < len - 1)
291 print_hex_data_json((uint8_t *)(&insn[i].imm),
292 12);
293 else
294 print_hex_data_json((uint8_t *)(&insn[i].imm),
295 4);
296 jsonw_end_object(json_wtr);
297 }
298 jsonw_end_object(json_wtr);
299 }
300 jsonw_end_array(json_wtr);
301}
302
303void dump_xlated_plain(struct dump_data *dd, void *buf, unsigned int len,
304 bool opcodes, bool linum)
305{
306 const struct bpf_prog_linfo *prog_linfo = dd->prog_linfo;
307 const struct bpf_insn_cbs cbs = {
308 .cb_print = print_insn,
309 .cb_call = print_call,
310 .cb_imm = print_imm,
311 .private_data = dd,
312 };
313 struct bpf_func_info *record;
314 struct bpf_insn *insn = buf;
315 struct btf *btf = dd->btf;
316 unsigned int nr_skip = 0;
317 bool double_insn = false;
318 char func_sig[1024];
319 unsigned int i;
320
321 record = dd->func_info;
322 for (i = 0; i < len / sizeof(*insn); i++) {
323 if (double_insn) {
324 double_insn = false;
325 continue;
326 }
327
328 if (btf && record) {
329 if (record->insn_off == i) {
330 btf_dumper_type_only(btf, record->type_id,
331 func_sig,
332 sizeof(func_sig));
333 if (func_sig[0] != '\0')
334 printf("%s:\n", func_sig);
335 record = (void *)record + dd->finfo_rec_size;
336 }
337 }
338
339 if (prog_linfo) {
340 const struct bpf_line_info *linfo;
341
342 linfo = bpf_prog_linfo__lfind(prog_linfo, i, nr_skip);
343 if (linfo) {
344 btf_dump_linfo_plain(btf, linfo, "; ",
345 linum);
346 nr_skip++;
347 }
348 }
349
350 double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);
351
352 printf("%4u: ", i);
353 print_bpf_insn(&cbs, insn + i, true);
354
355 if (opcodes) {
356 printf(" ");
357 fprint_hex(stdout, insn + i, 8, " ");
358 if (double_insn && i < len - 1) {
359 printf(" ");
360 fprint_hex(stdout, insn + i + 1, 8, " ");
361 }
362 printf("\n");
363 }
364 }
365}
366
367void dump_xlated_for_graph(struct dump_data *dd, void *buf_start, void *buf_end,
368 unsigned int start_idx,
369 bool opcodes, bool linum)
370{
371 const struct bpf_insn_cbs cbs = {
372 .cb_print = print_insn_for_graph,
373 .cb_call = print_call,
374 .cb_imm = print_imm,
375 .private_data = dd,
376 };
377 const struct bpf_prog_linfo *prog_linfo = dd->prog_linfo;
378 const struct bpf_line_info *last_linfo = NULL;
379 struct bpf_func_info *record = dd->func_info;
380 struct bpf_insn *insn_start = buf_start;
381 struct bpf_insn *insn_end = buf_end;
382 struct bpf_insn *cur = insn_start;
383 struct btf *btf = dd->btf;
384 bool double_insn = false;
385 char func_sig[1024];
386
387 for (; cur <= insn_end; cur++) {
388 unsigned int insn_off;
389
390 if (double_insn) {
391 double_insn = false;
392 continue;
393 }
394 double_insn = cur->code == (BPF_LD | BPF_IMM | BPF_DW);
395
396 insn_off = (unsigned int)(cur - insn_start + start_idx);
397 if (btf && record) {
398 if (record->insn_off == insn_off) {
399 btf_dumper_type_only(btf, record->type_id,
400 func_sig,
401 sizeof(func_sig));
402 if (func_sig[0] != '\0')
403 printf("; %s:\\l\\\n", func_sig);
404 record = (void *)record + dd->finfo_rec_size;
405 }
406 }
407
408 if (prog_linfo) {
409 const struct bpf_line_info *linfo;
410
411 linfo = bpf_prog_linfo__lfind(prog_linfo, insn_off, 0);
412 if (linfo && linfo != last_linfo) {
413 btf_dump_linfo_dotlabel(btf, linfo, linum);
414 last_linfo = linfo;
415 }
416 }
417
418 printf("%u: ", insn_off);
419 print_bpf_insn(&cbs, cur, true);
420
421 if (opcodes) {
422 printf("\\ \\ \\ \\ ");
423 fprint_hex(stdout, cur, 8, " ");
424 if (double_insn && cur <= insn_end - 1) {
425 printf(" ");
426 fprint_hex(stdout, cur + 1, 8, " ");
427 }
428 printf("\\l\\\n");
429 }
430
431 if (cur != insn_end)
432 printf("| ");
433 }
434}
1// SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
2/* Copyright (C) 2018 Netronome Systems, Inc. */
3
4#define _GNU_SOURCE
5#include <stdarg.h>
6#include <stdio.h>
7#include <stdlib.h>
8#include <string.h>
9#include <sys/types.h>
10#include <bpf/libbpf.h>
11
12#include "disasm.h"
13#include "json_writer.h"
14#include "main.h"
15#include "xlated_dumper.h"
16
17static int kernel_syms_cmp(const void *sym_a, const void *sym_b)
18{
19 return ((struct kernel_sym *)sym_a)->address -
20 ((struct kernel_sym *)sym_b)->address;
21}
22
23void kernel_syms_load(struct dump_data *dd)
24{
25 struct kernel_sym *sym;
26 char buff[256];
27 void *tmp, *address;
28 FILE *fp;
29
30 fp = fopen("/proc/kallsyms", "r");
31 if (!fp)
32 return;
33
34 while (fgets(buff, sizeof(buff), fp)) {
35 tmp = reallocarray(dd->sym_mapping, dd->sym_count + 1,
36 sizeof(*dd->sym_mapping));
37 if (!tmp) {
38out:
39 free(dd->sym_mapping);
40 dd->sym_mapping = NULL;
41 fclose(fp);
42 return;
43 }
44 dd->sym_mapping = tmp;
45 sym = &dd->sym_mapping[dd->sym_count];
46 if (sscanf(buff, "%p %*c %s", &address, sym->name) != 2)
47 continue;
48 sym->address = (unsigned long)address;
49 if (!strcmp(sym->name, "__bpf_call_base")) {
50 dd->address_call_base = sym->address;
51 /* sysctl kernel.kptr_restrict was set */
52 if (!sym->address)
53 goto out;
54 }
55 if (sym->address)
56 dd->sym_count++;
57 }
58
59 fclose(fp);
60
61 qsort(dd->sym_mapping, dd->sym_count,
62 sizeof(*dd->sym_mapping), kernel_syms_cmp);
63}
64
65void kernel_syms_destroy(struct dump_data *dd)
66{
67 free(dd->sym_mapping);
68}
69
70struct kernel_sym *kernel_syms_search(struct dump_data *dd,
71 unsigned long key)
72{
73 struct kernel_sym sym = {
74 .address = key,
75 };
76
77 return dd->sym_mapping ?
78 bsearch(&sym, dd->sym_mapping, dd->sym_count,
79 sizeof(*dd->sym_mapping), kernel_syms_cmp) : NULL;
80}
81
82static void __printf(2, 3) print_insn(void *private_data, const char *fmt, ...)
83{
84 va_list args;
85
86 va_start(args, fmt);
87 vprintf(fmt, args);
88 va_end(args);
89}
90
91static void __printf(2, 3)
92print_insn_for_graph(void *private_data, const char *fmt, ...)
93{
94 char buf[64], *p;
95 va_list args;
96
97 va_start(args, fmt);
98 vsnprintf(buf, sizeof(buf), fmt, args);
99 va_end(args);
100
101 p = buf;
102 while (*p != '\0') {
103 if (*p == '\n') {
104 memmove(p + 3, p, strlen(buf) + 1 - (p - buf));
105 /* Align each instruction dump row left. */
106 *p++ = '\\';
107 *p++ = 'l';
108 /* Output multiline concatenation. */
109 *p++ = '\\';
110 } else if (*p == '<' || *p == '>' || *p == '|' || *p == '&') {
111 memmove(p + 1, p, strlen(buf) + 1 - (p - buf));
112 /* Escape special character. */
113 *p++ = '\\';
114 }
115
116 p++;
117 }
118
119 printf("%s", buf);
120}
121
122static void __printf(2, 3)
123print_insn_json(void *private_data, const char *fmt, ...)
124{
125 unsigned int l = strlen(fmt);
126 char chomped_fmt[l];
127 va_list args;
128
129 va_start(args, fmt);
130 if (l > 0) {
131 strncpy(chomped_fmt, fmt, l - 1);
132 chomped_fmt[l - 1] = '\0';
133 }
134 jsonw_vprintf_enquote(json_wtr, chomped_fmt, args);
135 va_end(args);
136}
137
138static const char *print_call_pcrel(struct dump_data *dd,
139 struct kernel_sym *sym,
140 unsigned long address,
141 const struct bpf_insn *insn)
142{
143 if (!dd->nr_jited_ksyms)
144 /* Do not show address for interpreted programs */
145 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
146 "%+d", insn->off);
147 else if (sym)
148 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
149 "%+d#%s", insn->off, sym->name);
150 else
151 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
152 "%+d#0x%lx", insn->off, address);
153 return dd->scratch_buff;
154}
155
156static const char *print_call_helper(struct dump_data *dd,
157 struct kernel_sym *sym,
158 unsigned long address)
159{
160 if (sym)
161 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
162 "%s", sym->name);
163 else
164 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
165 "0x%lx", address);
166 return dd->scratch_buff;
167}
168
169static const char *print_call(void *private_data,
170 const struct bpf_insn *insn)
171{
172 struct dump_data *dd = private_data;
173 unsigned long address = dd->address_call_base + insn->imm;
174 struct kernel_sym *sym;
175
176 if (insn->src_reg == BPF_PSEUDO_CALL &&
177 (__u32) insn->imm < dd->nr_jited_ksyms && dd->jited_ksyms)
178 address = dd->jited_ksyms[insn->imm];
179
180 sym = kernel_syms_search(dd, address);
181 if (insn->src_reg == BPF_PSEUDO_CALL)
182 return print_call_pcrel(dd, sym, address, insn);
183 else
184 return print_call_helper(dd, sym, address);
185}
186
187static const char *print_imm(void *private_data,
188 const struct bpf_insn *insn,
189 __u64 full_imm)
190{
191 struct dump_data *dd = private_data;
192
193 if (insn->src_reg == BPF_PSEUDO_MAP_FD)
194 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
195 "map[id:%u]", insn->imm);
196 else if (insn->src_reg == BPF_PSEUDO_MAP_VALUE)
197 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
198 "map[id:%u][0]+%u", insn->imm, (insn + 1)->imm);
199 else
200 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
201 "0x%llx", (unsigned long long)full_imm);
202 return dd->scratch_buff;
203}
204
205void dump_xlated_json(struct dump_data *dd, void *buf, unsigned int len,
206 bool opcodes, bool linum)
207{
208 const struct bpf_prog_linfo *prog_linfo = dd->prog_linfo;
209 const struct bpf_insn_cbs cbs = {
210 .cb_print = print_insn_json,
211 .cb_call = print_call,
212 .cb_imm = print_imm,
213 .private_data = dd,
214 };
215 struct bpf_func_info *record;
216 struct bpf_insn *insn = buf;
217 struct btf *btf = dd->btf;
218 bool double_insn = false;
219 unsigned int nr_skip = 0;
220 char func_sig[1024];
221 unsigned int i;
222
223 jsonw_start_array(json_wtr);
224 record = dd->func_info;
225 for (i = 0; i < len / sizeof(*insn); i++) {
226 if (double_insn) {
227 double_insn = false;
228 continue;
229 }
230 double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);
231
232 jsonw_start_object(json_wtr);
233
234 if (btf && record) {
235 if (record->insn_off == i) {
236 btf_dumper_type_only(btf, record->type_id,
237 func_sig,
238 sizeof(func_sig));
239 if (func_sig[0] != '\0') {
240 jsonw_name(json_wtr, "proto");
241 jsonw_string(json_wtr, func_sig);
242 }
243 record = (void *)record + dd->finfo_rec_size;
244 }
245 }
246
247 if (prog_linfo) {
248 const struct bpf_line_info *linfo;
249
250 linfo = bpf_prog_linfo__lfind(prog_linfo, i, nr_skip);
251 if (linfo) {
252 btf_dump_linfo_json(btf, linfo, linum);
253 nr_skip++;
254 }
255 }
256
257 jsonw_name(json_wtr, "disasm");
258 print_bpf_insn(&cbs, insn + i, true);
259
260 if (opcodes) {
261 jsonw_name(json_wtr, "opcodes");
262 jsonw_start_object(json_wtr);
263
264 jsonw_name(json_wtr, "code");
265 jsonw_printf(json_wtr, "\"0x%02hhx\"", insn[i].code);
266
267 jsonw_name(json_wtr, "src_reg");
268 jsonw_printf(json_wtr, "\"0x%hhx\"", insn[i].src_reg);
269
270 jsonw_name(json_wtr, "dst_reg");
271 jsonw_printf(json_wtr, "\"0x%hhx\"", insn[i].dst_reg);
272
273 jsonw_name(json_wtr, "off");
274 print_hex_data_json((uint8_t *)(&insn[i].off), 2);
275
276 jsonw_name(json_wtr, "imm");
277 if (double_insn && i < len - 1)
278 print_hex_data_json((uint8_t *)(&insn[i].imm),
279 12);
280 else
281 print_hex_data_json((uint8_t *)(&insn[i].imm),
282 4);
283 jsonw_end_object(json_wtr);
284 }
285 jsonw_end_object(json_wtr);
286 }
287 jsonw_end_array(json_wtr);
288}
289
290void dump_xlated_plain(struct dump_data *dd, void *buf, unsigned int len,
291 bool opcodes, bool linum)
292{
293 const struct bpf_prog_linfo *prog_linfo = dd->prog_linfo;
294 const struct bpf_insn_cbs cbs = {
295 .cb_print = print_insn,
296 .cb_call = print_call,
297 .cb_imm = print_imm,
298 .private_data = dd,
299 };
300 struct bpf_func_info *record;
301 struct bpf_insn *insn = buf;
302 struct btf *btf = dd->btf;
303 unsigned int nr_skip = 0;
304 bool double_insn = false;
305 char func_sig[1024];
306 unsigned int i;
307
308 record = dd->func_info;
309 for (i = 0; i < len / sizeof(*insn); i++) {
310 if (double_insn) {
311 double_insn = false;
312 continue;
313 }
314
315 if (btf && record) {
316 if (record->insn_off == i) {
317 btf_dumper_type_only(btf, record->type_id,
318 func_sig,
319 sizeof(func_sig));
320 if (func_sig[0] != '\0')
321 printf("%s:\n", func_sig);
322 record = (void *)record + dd->finfo_rec_size;
323 }
324 }
325
326 if (prog_linfo) {
327 const struct bpf_line_info *linfo;
328
329 linfo = bpf_prog_linfo__lfind(prog_linfo, i, nr_skip);
330 if (linfo) {
331 btf_dump_linfo_plain(btf, linfo, "; ",
332 linum);
333 nr_skip++;
334 }
335 }
336
337 double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);
338
339 printf("% 4d: ", i);
340 print_bpf_insn(&cbs, insn + i, true);
341
342 if (opcodes) {
343 printf(" ");
344 fprint_hex(stdout, insn + i, 8, " ");
345 if (double_insn && i < len - 1) {
346 printf(" ");
347 fprint_hex(stdout, insn + i + 1, 8, " ");
348 }
349 printf("\n");
350 }
351 }
352}
353
354void dump_xlated_for_graph(struct dump_data *dd, void *buf_start, void *buf_end,
355 unsigned int start_idx)
356{
357 const struct bpf_insn_cbs cbs = {
358 .cb_print = print_insn_for_graph,
359 .cb_call = print_call,
360 .cb_imm = print_imm,
361 .private_data = dd,
362 };
363 struct bpf_insn *insn_start = buf_start;
364 struct bpf_insn *insn_end = buf_end;
365 struct bpf_insn *cur = insn_start;
366
367 for (; cur <= insn_end; cur++) {
368 printf("% 4d: ", (int)(cur - insn_start + start_idx));
369 print_bpf_insn(&cbs, cur, true);
370 if (cur != insn_end)
371 printf(" | ");
372 }
373}