Loading...
1// SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
2/* Copyright (C) 2018 Netronome Systems, Inc. */
3
4#ifndef _GNU_SOURCE
5#define _GNU_SOURCE
6#endif
7#include <stdarg.h>
8#include <stdio.h>
9#include <stdlib.h>
10#include <string.h>
11#include <sys/types.h>
12#include <bpf/libbpf.h>
13#include <bpf/libbpf_internal.h>
14
15#include "disasm.h"
16#include "json_writer.h"
17#include "main.h"
18#include "xlated_dumper.h"
19
20static int kernel_syms_cmp(const void *sym_a, const void *sym_b)
21{
22 return ((struct kernel_sym *)sym_a)->address -
23 ((struct kernel_sym *)sym_b)->address;
24}
25
26void kernel_syms_load(struct dump_data *dd)
27{
28 struct kernel_sym *sym;
29 char buff[256];
30 void *tmp, *address;
31 FILE *fp;
32
33 fp = fopen("/proc/kallsyms", "r");
34 if (!fp)
35 return;
36
37 while (fgets(buff, sizeof(buff), fp)) {
38 tmp = libbpf_reallocarray(dd->sym_mapping, dd->sym_count + 1,
39 sizeof(*dd->sym_mapping));
40 if (!tmp) {
41out:
42 free(dd->sym_mapping);
43 dd->sym_mapping = NULL;
44 fclose(fp);
45 return;
46 }
47 dd->sym_mapping = tmp;
48 sym = &dd->sym_mapping[dd->sym_count];
49
50 /* module is optional */
51 sym->module[0] = '\0';
52 /* trim the square brackets around the module name */
53 if (sscanf(buff, "%p %*c %s [%[^]]s", &address, sym->name, sym->module) < 2)
54 continue;
55 sym->address = (unsigned long)address;
56 if (!strcmp(sym->name, "__bpf_call_base")) {
57 dd->address_call_base = sym->address;
58 /* sysctl kernel.kptr_restrict was set */
59 if (!sym->address)
60 goto out;
61 }
62 if (sym->address)
63 dd->sym_count++;
64 }
65
66 fclose(fp);
67
68 qsort(dd->sym_mapping, dd->sym_count,
69 sizeof(*dd->sym_mapping), kernel_syms_cmp);
70}
71
72void kernel_syms_destroy(struct dump_data *dd)
73{
74 free(dd->sym_mapping);
75}
76
77struct kernel_sym *kernel_syms_search(struct dump_data *dd,
78 unsigned long key)
79{
80 struct kernel_sym sym = {
81 .address = key,
82 };
83
84 return dd->sym_mapping ?
85 bsearch(&sym, dd->sym_mapping, dd->sym_count,
86 sizeof(*dd->sym_mapping), kernel_syms_cmp) : NULL;
87}
88
89static void __printf(2, 3) print_insn(void *private_data, const char *fmt, ...)
90{
91 va_list args;
92
93 va_start(args, fmt);
94 vprintf(fmt, args);
95 va_end(args);
96}
97
98static void __printf(2, 3)
99print_insn_for_graph(void *private_data, const char *fmt, ...)
100{
101 char buf[64], *p;
102 va_list args;
103
104 va_start(args, fmt);
105 vsnprintf(buf, sizeof(buf), fmt, args);
106 va_end(args);
107
108 p = buf;
109 while (*p != '\0') {
110 if (*p == '\n') {
111 memmove(p + 3, p, strlen(buf) + 1 - (p - buf));
112 /* Align each instruction dump row left. */
113 *p++ = '\\';
114 *p++ = 'l';
115 /* Output multiline concatenation. */
116 *p++ = '\\';
117 } else if (*p == '<' || *p == '>' || *p == '|' || *p == '&') {
118 memmove(p + 1, p, strlen(buf) + 1 - (p - buf));
119 /* Escape special character. */
120 *p++ = '\\';
121 }
122
123 p++;
124 }
125
126 printf("%s", buf);
127}
128
129static void __printf(2, 3)
130print_insn_json(void *private_data, const char *fmt, ...)
131{
132 unsigned int l = strlen(fmt);
133 char chomped_fmt[l];
134 va_list args;
135
136 va_start(args, fmt);
137 if (l > 0) {
138 strncpy(chomped_fmt, fmt, l - 1);
139 chomped_fmt[l - 1] = '\0';
140 }
141 jsonw_vprintf_enquote(json_wtr, chomped_fmt, args);
142 va_end(args);
143}
144
145static const char *print_call_pcrel(struct dump_data *dd,
146 struct kernel_sym *sym,
147 unsigned long address,
148 const struct bpf_insn *insn)
149{
150 if (!dd->nr_jited_ksyms)
151 /* Do not show address for interpreted programs */
152 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
153 "%+d", insn->off);
154 else if (sym)
155 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
156 "%+d#%s", insn->off, sym->name);
157 else
158 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
159 "%+d#0x%lx", insn->off, address);
160 return dd->scratch_buff;
161}
162
163static const char *print_call_helper(struct dump_data *dd,
164 struct kernel_sym *sym,
165 unsigned long address)
166{
167 if (sym)
168 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
169 "%s", sym->name);
170 else
171 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
172 "0x%lx", address);
173 return dd->scratch_buff;
174}
175
176static const char *print_call(void *private_data,
177 const struct bpf_insn *insn)
178{
179 struct dump_data *dd = private_data;
180 unsigned long address = dd->address_call_base + insn->imm;
181 struct kernel_sym *sym;
182
183 if (insn->src_reg == BPF_PSEUDO_CALL &&
184 (__u32) insn->imm < dd->nr_jited_ksyms && dd->jited_ksyms)
185 address = dd->jited_ksyms[insn->imm];
186
187 sym = kernel_syms_search(dd, address);
188 if (insn->src_reg == BPF_PSEUDO_CALL)
189 return print_call_pcrel(dd, sym, address, insn);
190 else
191 return print_call_helper(dd, sym, address);
192}
193
194static const char *print_imm(void *private_data,
195 const struct bpf_insn *insn,
196 __u64 full_imm)
197{
198 struct dump_data *dd = private_data;
199
200 if (insn->src_reg == BPF_PSEUDO_MAP_FD)
201 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
202 "map[id:%u]", insn->imm);
203 else if (insn->src_reg == BPF_PSEUDO_MAP_VALUE)
204 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
205 "map[id:%u][0]+%u", insn->imm, (insn + 1)->imm);
206 else if (insn->src_reg == BPF_PSEUDO_MAP_IDX_VALUE)
207 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
208 "map[idx:%u]+%u", insn->imm, (insn + 1)->imm);
209 else if (insn->src_reg == BPF_PSEUDO_FUNC)
210 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
211 "subprog[%+d]", insn->imm);
212 else
213 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
214 "0x%llx", (unsigned long long)full_imm);
215 return dd->scratch_buff;
216}
217
218void dump_xlated_json(struct dump_data *dd, void *buf, unsigned int len,
219 bool opcodes, bool linum)
220{
221 const struct bpf_prog_linfo *prog_linfo = dd->prog_linfo;
222 const struct bpf_insn_cbs cbs = {
223 .cb_print = print_insn_json,
224 .cb_call = print_call,
225 .cb_imm = print_imm,
226 .private_data = dd,
227 };
228 struct bpf_func_info *record;
229 struct bpf_insn *insn = buf;
230 struct btf *btf = dd->btf;
231 bool double_insn = false;
232 unsigned int nr_skip = 0;
233 char func_sig[1024];
234 unsigned int i;
235
236 jsonw_start_array(json_wtr);
237 record = dd->func_info;
238 for (i = 0; i < len / sizeof(*insn); i++) {
239 if (double_insn) {
240 double_insn = false;
241 continue;
242 }
243 double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);
244
245 jsonw_start_object(json_wtr);
246
247 if (btf && record) {
248 if (record->insn_off == i) {
249 btf_dumper_type_only(btf, record->type_id,
250 func_sig,
251 sizeof(func_sig));
252 if (func_sig[0] != '\0') {
253 jsonw_name(json_wtr, "proto");
254 jsonw_string(json_wtr, func_sig);
255 }
256 record = (void *)record + dd->finfo_rec_size;
257 }
258 }
259
260 if (prog_linfo) {
261 const struct bpf_line_info *linfo;
262
263 linfo = bpf_prog_linfo__lfind(prog_linfo, i, nr_skip);
264 if (linfo) {
265 btf_dump_linfo_json(btf, linfo, linum);
266 nr_skip++;
267 }
268 }
269
270 jsonw_name(json_wtr, "disasm");
271 print_bpf_insn(&cbs, insn + i, true);
272
273 if (opcodes) {
274 jsonw_name(json_wtr, "opcodes");
275 jsonw_start_object(json_wtr);
276
277 jsonw_name(json_wtr, "code");
278 jsonw_printf(json_wtr, "\"0x%02hhx\"", insn[i].code);
279
280 jsonw_name(json_wtr, "src_reg");
281 jsonw_printf(json_wtr, "\"0x%hhx\"", insn[i].src_reg);
282
283 jsonw_name(json_wtr, "dst_reg");
284 jsonw_printf(json_wtr, "\"0x%hhx\"", insn[i].dst_reg);
285
286 jsonw_name(json_wtr, "off");
287 print_hex_data_json((uint8_t *)(&insn[i].off), 2);
288
289 jsonw_name(json_wtr, "imm");
290 if (double_insn && i < len - 1)
291 print_hex_data_json((uint8_t *)(&insn[i].imm),
292 12);
293 else
294 print_hex_data_json((uint8_t *)(&insn[i].imm),
295 4);
296 jsonw_end_object(json_wtr);
297 }
298 jsonw_end_object(json_wtr);
299 }
300 jsonw_end_array(json_wtr);
301}
302
303void dump_xlated_plain(struct dump_data *dd, void *buf, unsigned int len,
304 bool opcodes, bool linum)
305{
306 const struct bpf_prog_linfo *prog_linfo = dd->prog_linfo;
307 const struct bpf_insn_cbs cbs = {
308 .cb_print = print_insn,
309 .cb_call = print_call,
310 .cb_imm = print_imm,
311 .private_data = dd,
312 };
313 struct bpf_func_info *record;
314 struct bpf_insn *insn = buf;
315 struct btf *btf = dd->btf;
316 unsigned int nr_skip = 0;
317 bool double_insn = false;
318 char func_sig[1024];
319 unsigned int i;
320
321 record = dd->func_info;
322 for (i = 0; i < len / sizeof(*insn); i++) {
323 if (double_insn) {
324 double_insn = false;
325 continue;
326 }
327
328 if (btf && record) {
329 if (record->insn_off == i) {
330 btf_dumper_type_only(btf, record->type_id,
331 func_sig,
332 sizeof(func_sig));
333 if (func_sig[0] != '\0')
334 printf("%s:\n", func_sig);
335 record = (void *)record + dd->finfo_rec_size;
336 }
337 }
338
339 if (prog_linfo) {
340 const struct bpf_line_info *linfo;
341
342 linfo = bpf_prog_linfo__lfind(prog_linfo, i, nr_skip);
343 if (linfo) {
344 btf_dump_linfo_plain(btf, linfo, "; ",
345 linum);
346 nr_skip++;
347 }
348 }
349
350 double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);
351
352 printf("%4u: ", i);
353 print_bpf_insn(&cbs, insn + i, true);
354
355 if (opcodes) {
356 printf(" ");
357 fprint_hex(stdout, insn + i, 8, " ");
358 if (double_insn && i < len - 1) {
359 printf(" ");
360 fprint_hex(stdout, insn + i + 1, 8, " ");
361 }
362 printf("\n");
363 }
364 }
365}
366
367void dump_xlated_for_graph(struct dump_data *dd, void *buf_start, void *buf_end,
368 unsigned int start_idx,
369 bool opcodes, bool linum)
370{
371 const struct bpf_insn_cbs cbs = {
372 .cb_print = print_insn_for_graph,
373 .cb_call = print_call,
374 .cb_imm = print_imm,
375 .private_data = dd,
376 };
377 const struct bpf_prog_linfo *prog_linfo = dd->prog_linfo;
378 const struct bpf_line_info *last_linfo = NULL;
379 struct bpf_func_info *record = dd->func_info;
380 struct bpf_insn *insn_start = buf_start;
381 struct bpf_insn *insn_end = buf_end;
382 struct bpf_insn *cur = insn_start;
383 struct btf *btf = dd->btf;
384 bool double_insn = false;
385 char func_sig[1024];
386
387 for (; cur <= insn_end; cur++) {
388 unsigned int insn_off;
389
390 if (double_insn) {
391 double_insn = false;
392 continue;
393 }
394 double_insn = cur->code == (BPF_LD | BPF_IMM | BPF_DW);
395
396 insn_off = (unsigned int)(cur - insn_start + start_idx);
397 if (btf && record) {
398 if (record->insn_off == insn_off) {
399 btf_dumper_type_only(btf, record->type_id,
400 func_sig,
401 sizeof(func_sig));
402 if (func_sig[0] != '\0')
403 printf("; %s:\\l\\\n", func_sig);
404 record = (void *)record + dd->finfo_rec_size;
405 }
406 }
407
408 if (prog_linfo) {
409 const struct bpf_line_info *linfo;
410
411 linfo = bpf_prog_linfo__lfind(prog_linfo, insn_off, 0);
412 if (linfo && linfo != last_linfo) {
413 btf_dump_linfo_dotlabel(btf, linfo, linum);
414 last_linfo = linfo;
415 }
416 }
417
418 printf("%u: ", insn_off);
419 print_bpf_insn(&cbs, cur, true);
420
421 if (opcodes) {
422 printf("\\ \\ \\ \\ ");
423 fprint_hex(stdout, cur, 8, " ");
424 if (double_insn && cur <= insn_end - 1) {
425 printf(" ");
426 fprint_hex(stdout, cur + 1, 8, " ");
427 }
428 printf("\\l\\\n");
429 }
430
431 if (cur != insn_end)
432 printf("| ");
433 }
434}
1// SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
2/* Copyright (C) 2018 Netronome Systems, Inc. */
3
4#ifndef _GNU_SOURCE
5#define _GNU_SOURCE
6#endif
7#include <stdarg.h>
8#include <stdio.h>
9#include <stdlib.h>
10#include <string.h>
11#include <sys/types.h>
12#include <bpf/libbpf.h>
13#include <bpf/libbpf_internal.h>
14
15#include "disasm.h"
16#include "json_writer.h"
17#include "main.h"
18#include "xlated_dumper.h"
19
20static int kernel_syms_cmp(const void *sym_a, const void *sym_b)
21{
22 return ((struct kernel_sym *)sym_a)->address -
23 ((struct kernel_sym *)sym_b)->address;
24}
25
26void kernel_syms_load(struct dump_data *dd)
27{
28 struct kernel_sym *sym;
29 char buff[256];
30 void *tmp, *address;
31 FILE *fp;
32
33 fp = fopen("/proc/kallsyms", "r");
34 if (!fp)
35 return;
36
37 while (fgets(buff, sizeof(buff), fp)) {
38 tmp = libbpf_reallocarray(dd->sym_mapping, dd->sym_count + 1,
39 sizeof(*dd->sym_mapping));
40 if (!tmp) {
41out:
42 free(dd->sym_mapping);
43 dd->sym_mapping = NULL;
44 fclose(fp);
45 return;
46 }
47 dd->sym_mapping = tmp;
48 sym = &dd->sym_mapping[dd->sym_count];
49 if (sscanf(buff, "%p %*c %s", &address, sym->name) != 2)
50 continue;
51 sym->address = (unsigned long)address;
52 if (!strcmp(sym->name, "__bpf_call_base")) {
53 dd->address_call_base = sym->address;
54 /* sysctl kernel.kptr_restrict was set */
55 if (!sym->address)
56 goto out;
57 }
58 if (sym->address)
59 dd->sym_count++;
60 }
61
62 fclose(fp);
63
64 qsort(dd->sym_mapping, dd->sym_count,
65 sizeof(*dd->sym_mapping), kernel_syms_cmp);
66}
67
68void kernel_syms_destroy(struct dump_data *dd)
69{
70 free(dd->sym_mapping);
71}
72
73struct kernel_sym *kernel_syms_search(struct dump_data *dd,
74 unsigned long key)
75{
76 struct kernel_sym sym = {
77 .address = key,
78 };
79
80 return dd->sym_mapping ?
81 bsearch(&sym, dd->sym_mapping, dd->sym_count,
82 sizeof(*dd->sym_mapping), kernel_syms_cmp) : NULL;
83}
84
85static void __printf(2, 3) print_insn(void *private_data, const char *fmt, ...)
86{
87 va_list args;
88
89 va_start(args, fmt);
90 vprintf(fmt, args);
91 va_end(args);
92}
93
94static void __printf(2, 3)
95print_insn_for_graph(void *private_data, const char *fmt, ...)
96{
97 char buf[64], *p;
98 va_list args;
99
100 va_start(args, fmt);
101 vsnprintf(buf, sizeof(buf), fmt, args);
102 va_end(args);
103
104 p = buf;
105 while (*p != '\0') {
106 if (*p == '\n') {
107 memmove(p + 3, p, strlen(buf) + 1 - (p - buf));
108 /* Align each instruction dump row left. */
109 *p++ = '\\';
110 *p++ = 'l';
111 /* Output multiline concatenation. */
112 *p++ = '\\';
113 } else if (*p == '<' || *p == '>' || *p == '|' || *p == '&') {
114 memmove(p + 1, p, strlen(buf) + 1 - (p - buf));
115 /* Escape special character. */
116 *p++ = '\\';
117 }
118
119 p++;
120 }
121
122 printf("%s", buf);
123}
124
125static void __printf(2, 3)
126print_insn_json(void *private_data, const char *fmt, ...)
127{
128 unsigned int l = strlen(fmt);
129 char chomped_fmt[l];
130 va_list args;
131
132 va_start(args, fmt);
133 if (l > 0) {
134 strncpy(chomped_fmt, fmt, l - 1);
135 chomped_fmt[l - 1] = '\0';
136 }
137 jsonw_vprintf_enquote(json_wtr, chomped_fmt, args);
138 va_end(args);
139}
140
141static const char *print_call_pcrel(struct dump_data *dd,
142 struct kernel_sym *sym,
143 unsigned long address,
144 const struct bpf_insn *insn)
145{
146 if (!dd->nr_jited_ksyms)
147 /* Do not show address for interpreted programs */
148 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
149 "%+d", insn->off);
150 else if (sym)
151 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
152 "%+d#%s", insn->off, sym->name);
153 else
154 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
155 "%+d#0x%lx", insn->off, address);
156 return dd->scratch_buff;
157}
158
159static const char *print_call_helper(struct dump_data *dd,
160 struct kernel_sym *sym,
161 unsigned long address)
162{
163 if (sym)
164 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
165 "%s", sym->name);
166 else
167 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
168 "0x%lx", address);
169 return dd->scratch_buff;
170}
171
172static const char *print_call(void *private_data,
173 const struct bpf_insn *insn)
174{
175 struct dump_data *dd = private_data;
176 unsigned long address = dd->address_call_base + insn->imm;
177 struct kernel_sym *sym;
178
179 if (insn->src_reg == BPF_PSEUDO_CALL &&
180 (__u32) insn->imm < dd->nr_jited_ksyms && dd->jited_ksyms)
181 address = dd->jited_ksyms[insn->imm];
182
183 sym = kernel_syms_search(dd, address);
184 if (insn->src_reg == BPF_PSEUDO_CALL)
185 return print_call_pcrel(dd, sym, address, insn);
186 else
187 return print_call_helper(dd, sym, address);
188}
189
190static const char *print_imm(void *private_data,
191 const struct bpf_insn *insn,
192 __u64 full_imm)
193{
194 struct dump_data *dd = private_data;
195
196 if (insn->src_reg == BPF_PSEUDO_MAP_FD)
197 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
198 "map[id:%u]", insn->imm);
199 else if (insn->src_reg == BPF_PSEUDO_MAP_VALUE)
200 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
201 "map[id:%u][0]+%u", insn->imm, (insn + 1)->imm);
202 else if (insn->src_reg == BPF_PSEUDO_MAP_IDX_VALUE)
203 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
204 "map[idx:%u]+%u", insn->imm, (insn + 1)->imm);
205 else if (insn->src_reg == BPF_PSEUDO_FUNC)
206 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
207 "subprog[%+d]", insn->imm);
208 else
209 snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
210 "0x%llx", (unsigned long long)full_imm);
211 return dd->scratch_buff;
212}
213
214void dump_xlated_json(struct dump_data *dd, void *buf, unsigned int len,
215 bool opcodes, bool linum)
216{
217 const struct bpf_prog_linfo *prog_linfo = dd->prog_linfo;
218 const struct bpf_insn_cbs cbs = {
219 .cb_print = print_insn_json,
220 .cb_call = print_call,
221 .cb_imm = print_imm,
222 .private_data = dd,
223 };
224 struct bpf_func_info *record;
225 struct bpf_insn *insn = buf;
226 struct btf *btf = dd->btf;
227 bool double_insn = false;
228 unsigned int nr_skip = 0;
229 char func_sig[1024];
230 unsigned int i;
231
232 jsonw_start_array(json_wtr);
233 record = dd->func_info;
234 for (i = 0; i < len / sizeof(*insn); i++) {
235 if (double_insn) {
236 double_insn = false;
237 continue;
238 }
239 double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);
240
241 jsonw_start_object(json_wtr);
242
243 if (btf && record) {
244 if (record->insn_off == i) {
245 btf_dumper_type_only(btf, record->type_id,
246 func_sig,
247 sizeof(func_sig));
248 if (func_sig[0] != '\0') {
249 jsonw_name(json_wtr, "proto");
250 jsonw_string(json_wtr, func_sig);
251 }
252 record = (void *)record + dd->finfo_rec_size;
253 }
254 }
255
256 if (prog_linfo) {
257 const struct bpf_line_info *linfo;
258
259 linfo = bpf_prog_linfo__lfind(prog_linfo, i, nr_skip);
260 if (linfo) {
261 btf_dump_linfo_json(btf, linfo, linum);
262 nr_skip++;
263 }
264 }
265
266 jsonw_name(json_wtr, "disasm");
267 print_bpf_insn(&cbs, insn + i, true);
268
269 if (opcodes) {
270 jsonw_name(json_wtr, "opcodes");
271 jsonw_start_object(json_wtr);
272
273 jsonw_name(json_wtr, "code");
274 jsonw_printf(json_wtr, "\"0x%02hhx\"", insn[i].code);
275
276 jsonw_name(json_wtr, "src_reg");
277 jsonw_printf(json_wtr, "\"0x%hhx\"", insn[i].src_reg);
278
279 jsonw_name(json_wtr, "dst_reg");
280 jsonw_printf(json_wtr, "\"0x%hhx\"", insn[i].dst_reg);
281
282 jsonw_name(json_wtr, "off");
283 print_hex_data_json((uint8_t *)(&insn[i].off), 2);
284
285 jsonw_name(json_wtr, "imm");
286 if (double_insn && i < len - 1)
287 print_hex_data_json((uint8_t *)(&insn[i].imm),
288 12);
289 else
290 print_hex_data_json((uint8_t *)(&insn[i].imm),
291 4);
292 jsonw_end_object(json_wtr);
293 }
294 jsonw_end_object(json_wtr);
295 }
296 jsonw_end_array(json_wtr);
297}
298
299void dump_xlated_plain(struct dump_data *dd, void *buf, unsigned int len,
300 bool opcodes, bool linum)
301{
302 const struct bpf_prog_linfo *prog_linfo = dd->prog_linfo;
303 const struct bpf_insn_cbs cbs = {
304 .cb_print = print_insn,
305 .cb_call = print_call,
306 .cb_imm = print_imm,
307 .private_data = dd,
308 };
309 struct bpf_func_info *record;
310 struct bpf_insn *insn = buf;
311 struct btf *btf = dd->btf;
312 unsigned int nr_skip = 0;
313 bool double_insn = false;
314 char func_sig[1024];
315 unsigned int i;
316
317 record = dd->func_info;
318 for (i = 0; i < len / sizeof(*insn); i++) {
319 if (double_insn) {
320 double_insn = false;
321 continue;
322 }
323
324 if (btf && record) {
325 if (record->insn_off == i) {
326 btf_dumper_type_only(btf, record->type_id,
327 func_sig,
328 sizeof(func_sig));
329 if (func_sig[0] != '\0')
330 printf("%s:\n", func_sig);
331 record = (void *)record + dd->finfo_rec_size;
332 }
333 }
334
335 if (prog_linfo) {
336 const struct bpf_line_info *linfo;
337
338 linfo = bpf_prog_linfo__lfind(prog_linfo, i, nr_skip);
339 if (linfo) {
340 btf_dump_linfo_plain(btf, linfo, "; ",
341 linum);
342 nr_skip++;
343 }
344 }
345
346 double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);
347
348 printf("% 4d: ", i);
349 print_bpf_insn(&cbs, insn + i, true);
350
351 if (opcodes) {
352 printf(" ");
353 fprint_hex(stdout, insn + i, 8, " ");
354 if (double_insn && i < len - 1) {
355 printf(" ");
356 fprint_hex(stdout, insn + i + 1, 8, " ");
357 }
358 printf("\n");
359 }
360 }
361}
362
363void dump_xlated_for_graph(struct dump_data *dd, void *buf_start, void *buf_end,
364 unsigned int start_idx)
365{
366 const struct bpf_insn_cbs cbs = {
367 .cb_print = print_insn_for_graph,
368 .cb_call = print_call,
369 .cb_imm = print_imm,
370 .private_data = dd,
371 };
372 struct bpf_insn *insn_start = buf_start;
373 struct bpf_insn *insn_end = buf_end;
374 struct bpf_insn *cur = insn_start;
375
376 for (; cur <= insn_end; cur++) {
377 printf("% 4d: ", (int)(cur - insn_start + start_idx));
378 print_bpf_insn(&cbs, cur, true);
379 if (cur != insn_end)
380 printf(" | ");
381 }
382}