xref: /openbmc/linux/tools/bpf/bpftool/link.c (revision 1a931707ad4a46e79d4ecfee56d8f6e8cc8d4f28)
1c5481f9aSAndrii Nakryiko // SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
2c5481f9aSAndrii Nakryiko /* Copyright (C) 2020 Facebook */
3c5481f9aSAndrii Nakryiko 
4c5481f9aSAndrii Nakryiko #include <errno.h>
5622a5b58SMauricio Vásquez #include <linux/err.h>
6c5481f9aSAndrii Nakryiko #include <linux/netfilter.h>
7c5481f9aSAndrii Nakryiko #include <linux/netfilter_arp.h>
8c5481f9aSAndrii Nakryiko #include <linux/perf_event.h>
9c5481f9aSAndrii Nakryiko #include <net/if.h>
10c5481f9aSAndrii Nakryiko #include <stdio.h>
118f184732SQuentin Monnet #include <unistd.h>
12c5481f9aSAndrii Nakryiko 
13c5481f9aSAndrii Nakryiko #include <bpf/bpf.h>
14c5481f9aSAndrii Nakryiko #include <bpf/hashmap.h>
15c5481f9aSAndrii Nakryiko 
168f184732SQuentin Monnet #include "json_writer.h"
1746241271SQuentin Monnet #include "main.h"
18c5481f9aSAndrii Nakryiko #include "xlated_dumper.h"
19c5481f9aSAndrii Nakryiko 
200e8c7c07SAndrii Nakryiko #define PERF_HW_CACHE_LEN 128
210e8c7c07SAndrii Nakryiko 
22c5481f9aSAndrii Nakryiko static struct hashmap *link_table;
23c5481f9aSAndrii Nakryiko static struct dump_data dd;
24c5481f9aSAndrii Nakryiko 
25c5481f9aSAndrii Nakryiko static const char *perf_type_name[PERF_TYPE_MAX] = {
26c5481f9aSAndrii Nakryiko 	[PERF_TYPE_HARDWARE]			= "hardware",
27c5481f9aSAndrii Nakryiko 	[PERF_TYPE_SOFTWARE]			= "software",
28c5481f9aSAndrii Nakryiko 	[PERF_TYPE_TRACEPOINT]			= "tracepoint",
29c5481f9aSAndrii Nakryiko 	[PERF_TYPE_HW_CACHE]			= "hw-cache",
30c5481f9aSAndrii Nakryiko 	[PERF_TYPE_RAW]				= "raw",
31c5481f9aSAndrii Nakryiko 	[PERF_TYPE_BREAKPOINT]			= "breakpoint",
32c5481f9aSAndrii Nakryiko };
33c5481f9aSAndrii Nakryiko 
34c5481f9aSAndrii Nakryiko const char *event_symbols_hw[PERF_COUNT_HW_MAX] = {
350e8c7c07SAndrii Nakryiko 	[PERF_COUNT_HW_CPU_CYCLES]		= "cpu-cycles",
360e8c7c07SAndrii Nakryiko 	[PERF_COUNT_HW_INSTRUCTIONS]		= "instructions",
370e8c7c07SAndrii Nakryiko 	[PERF_COUNT_HW_CACHE_REFERENCES]	= "cache-references",
380e8c7c07SAndrii Nakryiko 	[PERF_COUNT_HW_CACHE_MISSES]		= "cache-misses",
39c5481f9aSAndrii Nakryiko 	[PERF_COUNT_HW_BRANCH_INSTRUCTIONS]	= "branch-instructions",
40c5481f9aSAndrii Nakryiko 	[PERF_COUNT_HW_BRANCH_MISSES]		= "branch-misses",
41c5481f9aSAndrii Nakryiko 	[PERF_COUNT_HW_BUS_CYCLES]		= "bus-cycles",
42c5481f9aSAndrii Nakryiko 	[PERF_COUNT_HW_STALLED_CYCLES_FRONTEND]	= "stalled-cycles-frontend",
43c5481f9aSAndrii Nakryiko 	[PERF_COUNT_HW_STALLED_CYCLES_BACKEND]	= "stalled-cycles-backend",
44c5481f9aSAndrii Nakryiko 	[PERF_COUNT_HW_REF_CPU_CYCLES]		= "ref-cycles",
45c5481f9aSAndrii Nakryiko };
46c5481f9aSAndrii Nakryiko 
47c5481f9aSAndrii Nakryiko const char *event_symbols_sw[PERF_COUNT_SW_MAX] = {
48c5481f9aSAndrii Nakryiko 	[PERF_COUNT_SW_CPU_CLOCK]		= "cpu-clock",
49c5481f9aSAndrii Nakryiko 	[PERF_COUNT_SW_TASK_CLOCK]		= "task-clock",
50c5481f9aSAndrii Nakryiko 	[PERF_COUNT_SW_PAGE_FAULTS]		= "page-faults",
51c5481f9aSAndrii Nakryiko 	[PERF_COUNT_SW_CONTEXT_SWITCHES]	= "context-switches",
52c5481f9aSAndrii Nakryiko 	[PERF_COUNT_SW_CPU_MIGRATIONS]		= "cpu-migrations",
53c5481f9aSAndrii Nakryiko 	[PERF_COUNT_SW_PAGE_FAULTS_MIN]		= "minor-faults",
54c5481f9aSAndrii Nakryiko 	[PERF_COUNT_SW_PAGE_FAULTS_MAJ]		= "major-faults",
55c5481f9aSAndrii Nakryiko 	[PERF_COUNT_SW_ALIGNMENT_FAULTS]	= "alignment-faults",
56c5481f9aSAndrii Nakryiko 	[PERF_COUNT_SW_EMULATION_FAULTS]	= "emulation-faults",
57c7e7e279SDaniel Müller 	[PERF_COUNT_SW_DUMMY]			= "dummy",
58c7e7e279SDaniel Müller 	[PERF_COUNT_SW_BPF_OUTPUT]		= "bpf-output",
59c5481f9aSAndrii Nakryiko 	[PERF_COUNT_SW_CGROUP_SWITCHES]		= "cgroup-switches",
60c7e7e279SDaniel Müller };
61c7e7e279SDaniel Müller 
62c7e7e279SDaniel Müller const char *evsel__hw_cache[PERF_COUNT_HW_CACHE_MAX] = {
63c5481f9aSAndrii Nakryiko 	[PERF_COUNT_HW_CACHE_L1D]		= "L1-dcache",
64c5481f9aSAndrii Nakryiko 	[PERF_COUNT_HW_CACHE_L1I]		= "L1-icache",
65c5481f9aSAndrii Nakryiko 	[PERF_COUNT_HW_CACHE_LL]		= "LLC",
66c5481f9aSAndrii Nakryiko 	[PERF_COUNT_HW_CACHE_DTLB]		= "dTLB",
67c5481f9aSAndrii Nakryiko 	[PERF_COUNT_HW_CACHE_ITLB]		= "iTLB",
68c5481f9aSAndrii Nakryiko 	[PERF_COUNT_HW_CACHE_BPU]		= "branch",
69be6e1981SJakub Sitnicki 	[PERF_COUNT_HW_CACHE_NODE]		= "node",
70be6e1981SJakub Sitnicki };
711ba5ad36SDaniel Müller 
721ba5ad36SDaniel Müller const char *evsel__hw_cache_op[PERF_COUNT_HW_CACHE_OP_MAX] = {
731ba5ad36SDaniel Müller 	[PERF_COUNT_HW_CACHE_OP_READ]		= "load",
741ba5ad36SDaniel Müller 	[PERF_COUNT_HW_CACHE_OP_WRITE]		= "store",
751ba5ad36SDaniel Müller 	[PERF_COUNT_HW_CACHE_OP_PREFETCH]	= "prefetch",
76be6e1981SJakub Sitnicki };
77be6e1981SJakub Sitnicki 
78be6e1981SJakub Sitnicki const char *evsel__hw_cache_result[PERF_COUNT_HW_CACHE_RESULT_MAX] = {
79be6e1981SJakub Sitnicki 	[PERF_COUNT_HW_CACHE_RESULT_ACCESS]	= "refs",
80e60495eaSYonghong Song 	[PERF_COUNT_HW_CACHE_RESULT_MISS]	= "misses",
81e60495eaSYonghong Song };
82e60495eaSYonghong Song 
83e60495eaSYonghong Song #define perf_event_name(array, id) ({			\
84e60495eaSYonghong Song 	const char *event_str = NULL;			\
85e60495eaSYonghong Song 							\
866f95de6dSHao Luo 	if ((id) < ARRAY_SIZE(array))			\
876f95de6dSHao Luo 		event_str = array[id];			\
886f95de6dSHao Luo 	event_str;					\
896f95de6dSHao Luo })
906f95de6dSHao Luo 
link_parse_fd(int * argc,char *** argv)916f95de6dSHao Luo static int link_parse_fd(int *argc, char ***argv)
926f95de6dSHao Luo {
936f95de6dSHao Luo 	int fd;
946f95de6dSHao Luo 
956f95de6dSHao Luo 	if (is_prefix(**argv, "id")) {
966f95de6dSHao Luo 		unsigned int id;
976f95de6dSHao Luo 		char *endptr;
986f95de6dSHao Luo 
996f95de6dSHao Luo 		NEXT_ARGP();
1006f95de6dSHao Luo 
1016f95de6dSHao Luo 		id = strtoul(**argv, &endptr, 0);
1026f95de6dSHao Luo 		if (*endptr) {
1036f95de6dSHao Luo 			p_err("can't parse %s as ID", **argv);
1046f95de6dSHao Luo 			return -1;
1056f95de6dSHao Luo 		}
1066f95de6dSHao Luo 		NEXT_ARGP();
1076f95de6dSHao Luo 
1086f95de6dSHao Luo 		fd = bpf_link_get_fd_by_id(id);
1096bdb6d6bSKui-Feng Lee 		if (fd < 0)
1106bdb6d6bSKui-Feng Lee 			p_err("failed to get link with ID %d: %s", id, strerror(errno));
1116bdb6d6bSKui-Feng Lee 		return fd;
1126bdb6d6bSKui-Feng Lee 	} else if (is_prefix(**argv, "pinned")) {
1136bdb6d6bSKui-Feng Lee 		char *path;
1146bdb6d6bSKui-Feng Lee 
1156bdb6d6bSKui-Feng Lee 		NEXT_ARGP();
116e60495eaSYonghong Song 
117e60495eaSYonghong Song 		path = **argv;
118e60495eaSYonghong Song 		NEXT_ARGP();
119e60495eaSYonghong Song 
120e60495eaSYonghong Song 		return open_obj_pinned_any(path, BPF_OBJ_LINK);
121e60495eaSYonghong Song 	}
122e60495eaSYonghong Song 
123e60495eaSYonghong Song 	p_err("expected 'id' or 'pinned', got: '%s'?", **argv);
1246bdb6d6bSKui-Feng Lee 	return -1;
1256bdb6d6bSKui-Feng Lee }
1266bdb6d6bSKui-Feng Lee 
1276bdb6d6bSKui-Feng Lee static void
show_link_header_json(struct bpf_link_info * info,json_writer_t * wtr)1286bdb6d6bSKui-Feng Lee show_link_header_json(struct bpf_link_info *info, json_writer_t *wtr)
1296bdb6d6bSKui-Feng Lee {
1306f95de6dSHao Luo 	const char *link_type_str;
1316f95de6dSHao Luo 
1326f95de6dSHao Luo 	jsonw_uint_field(wtr, "id", info->id);
1336f95de6dSHao Luo 	link_type_str = libbpf_bpf_link_type_str(info->type);
1346f95de6dSHao Luo 	if (link_type_str)
1356f95de6dSHao Luo 		jsonw_string_field(wtr, "type", link_type_str);
136e60495eaSYonghong Song 	else
137e60495eaSYonghong Song 		jsonw_uint_field(wtr, "type", info->type);
138c5481f9aSAndrii Nakryiko 
139c5481f9aSAndrii Nakryiko 	jsonw_uint_field(json_wtr, "prog_id", info->prog_id);
140c5481f9aSAndrii Nakryiko }
141c5481f9aSAndrii Nakryiko 
show_link_attach_type_json(__u32 attach_type,json_writer_t * wtr)142c5481f9aSAndrii Nakryiko static void show_link_attach_type_json(__u32 attach_type, json_writer_t *wtr)
143c5481f9aSAndrii Nakryiko {
144c5481f9aSAndrii Nakryiko 	const char *attach_type_str;
145c5481f9aSAndrii Nakryiko 
146c5481f9aSAndrii Nakryiko 	attach_type_str = libbpf_bpf_attach_type_str(attach_type);
147c5481f9aSAndrii Nakryiko 	if (attach_type_str)
148c5481f9aSAndrii Nakryiko 		jsonw_string_field(wtr, "attach_type", attach_type_str);
149c5481f9aSAndrii Nakryiko 	else
150c5481f9aSAndrii Nakryiko 		jsonw_uint_field(wtr, "attach_type", attach_type);
151c5481f9aSAndrii Nakryiko }
152c5481f9aSAndrii Nakryiko 
show_link_ifindex_json(__u32 ifindex,json_writer_t * wtr)153c5481f9aSAndrii Nakryiko static void show_link_ifindex_json(__u32 ifindex, json_writer_t *wtr)
154c5481f9aSAndrii Nakryiko {
155c5481f9aSAndrii Nakryiko 	char devname[IF_NAMESIZE] = "(unknown)";
156c5481f9aSAndrii Nakryiko 
157c5481f9aSAndrii Nakryiko 	if (ifindex)
158b700eeb4SDaniel Müller 		if_indextoname(ifindex, devname);
159c5481f9aSAndrii Nakryiko 	else
160c5481f9aSAndrii Nakryiko 		snprintf(devname, sizeof(devname), "(detached)");
161c5481f9aSAndrii Nakryiko 	jsonw_string_field(wtr, "devname", devname);
162c5481f9aSAndrii Nakryiko 	jsonw_uint_field(wtr, "ifindex", ifindex);
163c5481f9aSAndrii Nakryiko }
164c5481f9aSAndrii Nakryiko 
is_iter_map_target(const char * target_name)165c5481f9aSAndrii Nakryiko static bool is_iter_map_target(const char *target_name)
166c5481f9aSAndrii Nakryiko {
167c5481f9aSAndrii Nakryiko 	return strcmp(target_name, "bpf_map_elem") == 0 ||
16809f44b75SAndrii Nakryiko 	       strcmp(target_name, "bpf_sk_storage_map") == 0;
169c5481f9aSAndrii Nakryiko }
170c5481f9aSAndrii Nakryiko 
is_iter_cgroup_target(const char * target_name)171c5481f9aSAndrii Nakryiko static bool is_iter_cgroup_target(const char *target_name)
172c5481f9aSAndrii Nakryiko {
173c5481f9aSAndrii Nakryiko 	return strcmp(target_name, "cgroup") == 0;
174c5481f9aSAndrii Nakryiko }
175b700eeb4SDaniel Müller 
cgroup_order_string(__u32 order)176b700eeb4SDaniel Müller static const char *cgroup_order_string(__u32 order)
177b700eeb4SDaniel Müller {
178b700eeb4SDaniel Müller 	switch (order) {
179c5481f9aSAndrii Nakryiko 	case BPF_CGROUP_ITER_ORDER_UNSPEC:
180b700eeb4SDaniel Müller 		return "order_unspec";
181c5481f9aSAndrii Nakryiko 	case BPF_CGROUP_ITER_SELF_ONLY:
182be6e1981SJakub Sitnicki 		return "self_only";
183be6e1981SJakub Sitnicki 	case BPF_CGROUP_ITER_DESCENDANTS_PRE:
184c5481f9aSAndrii Nakryiko 		return "descendants_pre";
185c5481f9aSAndrii Nakryiko 	case BPF_CGROUP_ITER_DESCENDANTS_POST:
186c5481f9aSAndrii Nakryiko 		return "descendants_post";
187c5481f9aSAndrii Nakryiko 	case BPF_CGROUP_ITER_ANCESTORS_UP:
188be6e1981SJakub Sitnicki 		return "ancestors_up";
189c5481f9aSAndrii Nakryiko 	default: /* won't happen */
190e60495eaSYonghong Song 		return "unknown";
191e60495eaSYonghong Song 	}
192e60495eaSYonghong Song }
193e948947aSJakub Sitnicki 
is_iter_task_target(const char * target_name)194e948947aSJakub Sitnicki static bool is_iter_task_target(const char *target_name)
195e948947aSJakub Sitnicki {
196e948947aSJakub Sitnicki 	return strcmp(target_name, "task") == 0 ||
197e948947aSJakub Sitnicki 		strcmp(target_name, "task_file") == 0 ||
198c5481f9aSAndrii Nakryiko 		strcmp(target_name, "task_vma") == 0;
199c5481f9aSAndrii Nakryiko }
200c5481f9aSAndrii Nakryiko 
show_iter_json(struct bpf_link_info * info,json_writer_t * wtr)201c5481f9aSAndrii Nakryiko static void show_iter_json(struct bpf_link_info *info, json_writer_t *wtr)
2028f184732SQuentin Monnet {
2038f184732SQuentin Monnet 	const char *target_name = u64_to_ptr(info->iter.target_name);
204c5481f9aSAndrii Nakryiko 
205c5481f9aSAndrii Nakryiko 	jsonw_string_field(wtr, "target_name", target_name);
206c5481f9aSAndrii Nakryiko 
207*c302378bSEduard Zingerman 	if (is_iter_map_target(target_name))
208*c302378bSEduard Zingerman 		jsonw_uint_field(wtr, "map_id", info->iter.map.map_id);
209c5481f9aSAndrii Nakryiko 	else if (is_iter_task_target(target_name)) {
210c5481f9aSAndrii Nakryiko 		if (info->iter.task.tid)
211d53dee3fSAndrii Nakryiko 			jsonw_uint_field(wtr, "tid", info->iter.task.tid);
212d6699f8eSQuentin Monnet 		else if (info->iter.task.pid)
213d53dee3fSAndrii Nakryiko 			jsonw_uint_field(wtr, "pid", info->iter.task.pid);
214c5481f9aSAndrii Nakryiko 	}
215c5481f9aSAndrii Nakryiko 
216c5481f9aSAndrii Nakryiko 	if (is_iter_cgroup_target(target_name)) {
217c5481f9aSAndrii Nakryiko 		jsonw_lluint_field(wtr, "cgroup_id", info->iter.cgroup.cgroup_id);
218c5481f9aSAndrii Nakryiko 		jsonw_string_field(wtr, "order",
219c5481f9aSAndrii Nakryiko 				   cgroup_order_string(info->iter.cgroup.order));
220c5481f9aSAndrii Nakryiko 	}
221c7e7e279SDaniel Müller }
222c7e7e279SDaniel Müller 
netfilter_dump_json(const struct bpf_link_info * info,json_writer_t * wtr)223c5481f9aSAndrii Nakryiko void netfilter_dump_json(const struct bpf_link_info *info, json_writer_t *wtr)
224c7e7e279SDaniel Müller {
225c7e7e279SDaniel Müller 	jsonw_uint_field(json_wtr, "pf",
226c7e7e279SDaniel Müller 			 info->netfilter.pf);
227c5481f9aSAndrii Nakryiko 	jsonw_uint_field(json_wtr, "hook",
228c5481f9aSAndrii Nakryiko 			 info->netfilter.hooknum);
229c5481f9aSAndrii Nakryiko 	jsonw_int_field(json_wtr, "prio",
230c5481f9aSAndrii Nakryiko 			 info->netfilter.priority);
231c5481f9aSAndrii Nakryiko 	jsonw_uint_field(json_wtr, "flags",
232c5481f9aSAndrii Nakryiko 			 info->netfilter.flags);
233be6e1981SJakub Sitnicki }
234be6e1981SJakub Sitnicki 
get_prog_info(int prog_id,struct bpf_prog_info * info)2351ba5ad36SDaniel Müller static int get_prog_info(int prog_id, struct bpf_prog_info *info)
2361ba5ad36SDaniel Müller {
2371ba5ad36SDaniel Müller 	__u32 len = sizeof(*info);
2381ba5ad36SDaniel Müller 	int err, prog_fd;
2391ba5ad36SDaniel Müller 
240be6e1981SJakub Sitnicki 	prog_fd = bpf_prog_get_fd_by_id(prog_id);
241be6e1981SJakub Sitnicki 	if (prog_fd < 0)
242be6e1981SJakub Sitnicki 		return prog_fd;
243be6e1981SJakub Sitnicki 
244e60495eaSYonghong Song 	memset(info, 0, sizeof(*info));
245e60495eaSYonghong Song 	err = bpf_prog_get_info_by_fd(prog_fd, info, &len);
246e60495eaSYonghong Song 	if (err)
247e60495eaSYonghong Song 		p_err("can't get prog info: %s", strerror(errno));
248e60495eaSYonghong Song 	close(prog_fd);
249e60495eaSYonghong Song 	return err;
250e60495eaSYonghong Song }
251e60495eaSYonghong Song 
cmp_u64(const void * A,const void * B)2526bdb6d6bSKui-Feng Lee static int cmp_u64(const void *A, const void *B)
2536bdb6d6bSKui-Feng Lee {
2546bdb6d6bSKui-Feng Lee 	const __u64 *a = A, *b = B;
2556bdb6d6bSKui-Feng Lee 
2566bdb6d6bSKui-Feng Lee 	return *a - *b;
2576bdb6d6bSKui-Feng Lee }
2586f95de6dSHao Luo 
2596f95de6dSHao Luo static void
show_kprobe_multi_json(struct bpf_link_info * info,json_writer_t * wtr)2606f95de6dSHao Luo show_kprobe_multi_json(struct bpf_link_info *info, json_writer_t *wtr)
2616f95de6dSHao Luo {
2626f95de6dSHao Luo 	__u32 i, j = 0;
2636f95de6dSHao Luo 	__u64 *addrs;
264e60495eaSYonghong Song 
265e60495eaSYonghong Song 	jsonw_bool_field(json_wtr, "retprobe",
266c5481f9aSAndrii Nakryiko 			 info->kprobe_multi.flags & BPF_F_KPROBE_MULTI_RETURN);
267c5481f9aSAndrii Nakryiko 	jsonw_uint_field(json_wtr, "func_cnt", info->kprobe_multi.count);
268c5481f9aSAndrii Nakryiko 	jsonw_name(json_wtr, "funcs");
269b700eeb4SDaniel Müller 	jsonw_start_array(json_wtr);
270c5481f9aSAndrii Nakryiko 	addrs = u64_to_ptr(info->kprobe_multi.addrs);
271c5481f9aSAndrii Nakryiko 	qsort(addrs, info->kprobe_multi.count, sizeof(addrs[0]), cmp_u64);
272c5481f9aSAndrii Nakryiko 
273c5481f9aSAndrii Nakryiko 	/* Load it once for all. */
274c5481f9aSAndrii Nakryiko 	if (!dd.sym_count)
275c5481f9aSAndrii Nakryiko 		kernel_syms_load(&dd);
276c5481f9aSAndrii Nakryiko 	for (i = 0; i < dd.sym_count; i++) {
27709f44b75SAndrii Nakryiko 		if (dd.sym_mapping[i].address != addrs[j])
278c5481f9aSAndrii Nakryiko 			continue;
279c5481f9aSAndrii Nakryiko 		jsonw_start_object(json_wtr);
280c5481f9aSAndrii Nakryiko 		jsonw_uint_field(json_wtr, "addr", dd.sym_mapping[i].address);
281c5481f9aSAndrii Nakryiko 		jsonw_string_field(json_wtr, "func", dd.sym_mapping[i].name);
282c5481f9aSAndrii Nakryiko 		/* Print null if it is vmlinux */
283c5481f9aSAndrii Nakryiko 		if (dd.sym_mapping[i].module[0] == '\0') {
284b700eeb4SDaniel Müller 			jsonw_name(json_wtr, "module");
285b700eeb4SDaniel Müller 			jsonw_null(json_wtr);
286b700eeb4SDaniel Müller 		} else {
287b700eeb4SDaniel Müller 			jsonw_string_field(json_wtr, "module", dd.sym_mapping[i].module);
288c5481f9aSAndrii Nakryiko 		}
289c5481f9aSAndrii Nakryiko 		jsonw_end_object(json_wtr);
290c5481f9aSAndrii Nakryiko 		if (j++ == info->kprobe_multi.count)
291be6e1981SJakub Sitnicki 			break;
292c5481f9aSAndrii Nakryiko 	}
293c5481f9aSAndrii Nakryiko 	jsonw_end_array(json_wtr);
294c5481f9aSAndrii Nakryiko }
295be6e1981SJakub Sitnicki 
296c5481f9aSAndrii Nakryiko static void
show_perf_event_kprobe_json(struct bpf_link_info * info,json_writer_t * wtr)297e60495eaSYonghong Song show_perf_event_kprobe_json(struct bpf_link_info *info, json_writer_t *wtr)
298e60495eaSYonghong Song {
299e60495eaSYonghong Song 	jsonw_bool_field(wtr, "retprobe", info->perf_event.type == BPF_PERF_EVENT_KRETPROBE);
300e948947aSJakub Sitnicki 	jsonw_uint_field(wtr, "addr", info->perf_event.kprobe.addr);
301e948947aSJakub Sitnicki 	jsonw_string_field(wtr, "func",
302e948947aSJakub Sitnicki 			   u64_to_ptr(info->perf_event.kprobe.func_name));
303e948947aSJakub Sitnicki 	jsonw_uint_field(wtr, "offset", info->perf_event.kprobe.offset);
304c5481f9aSAndrii Nakryiko }
305c5481f9aSAndrii Nakryiko 
306c5481f9aSAndrii Nakryiko static void
show_perf_event_uprobe_json(struct bpf_link_info * info,json_writer_t * wtr)307c5481f9aSAndrii Nakryiko show_perf_event_uprobe_json(struct bpf_link_info *info, json_writer_t *wtr)
3088f184732SQuentin Monnet {
3098f184732SQuentin Monnet 	jsonw_bool_field(wtr, "retprobe", info->perf_event.type == BPF_PERF_EVENT_URETPROBE);
310c5481f9aSAndrii Nakryiko 	jsonw_string_field(wtr, "file",
311*c302378bSEduard Zingerman 			   u64_to_ptr(info->perf_event.uprobe.file_name));
312*c302378bSEduard Zingerman 	jsonw_uint_field(wtr, "offset", info->perf_event.uprobe.offset);
313c5481f9aSAndrii Nakryiko }
314d6699f8eSQuentin Monnet 
315c5481f9aSAndrii Nakryiko static void
show_perf_event_tracepoint_json(struct bpf_link_info * info,json_writer_t * wtr)316c5481f9aSAndrii Nakryiko show_perf_event_tracepoint_json(struct bpf_link_info *info, json_writer_t *wtr)
317c5481f9aSAndrii Nakryiko {
318c5481f9aSAndrii Nakryiko 	jsonw_string_field(wtr, "tracepoint",
319c5481f9aSAndrii Nakryiko 			   u64_to_ptr(info->perf_event.tracepoint.tp_name));
320c5481f9aSAndrii Nakryiko }
321c5481f9aSAndrii Nakryiko 
perf_config_hw_cache_str(__u64 config)322c5481f9aSAndrii Nakryiko static char *perf_config_hw_cache_str(__u64 config)
323c5481f9aSAndrii Nakryiko {
324c5481f9aSAndrii Nakryiko 	const char *hw_cache, *result, *op;
325e60495eaSYonghong Song 	char *str = malloc(PERF_HW_CACHE_LEN);
326c5481f9aSAndrii Nakryiko 
327c5481f9aSAndrii Nakryiko 	if (!str) {
328c5481f9aSAndrii Nakryiko 		p_err("mem alloc failed");
329c5481f9aSAndrii Nakryiko 		return NULL;
330c5481f9aSAndrii Nakryiko 	}
331c5481f9aSAndrii Nakryiko 
332c5481f9aSAndrii Nakryiko 	hw_cache = perf_event_name(evsel__hw_cache, config & 0xff);
333c5481f9aSAndrii Nakryiko 	if (hw_cache)
334c5481f9aSAndrii Nakryiko 		snprintf(str, PERF_HW_CACHE_LEN, "%s-", hw_cache);
335c5481f9aSAndrii Nakryiko 	else
336c5481f9aSAndrii Nakryiko 		snprintf(str, PERF_HW_CACHE_LEN, "%lld-", config & 0xff);
337c5481f9aSAndrii Nakryiko 
338c5481f9aSAndrii Nakryiko 	op = perf_event_name(evsel__hw_cache_op, (config >> 8) & 0xff);
339e60495eaSYonghong Song 	if (op)
340e60495eaSYonghong Song 		snprintf(str + strlen(str), PERF_HW_CACHE_LEN - strlen(str),
341e60495eaSYonghong Song 			 "%s-", op);
342e60495eaSYonghong Song 	else
343e60495eaSYonghong Song 		snprintf(str + strlen(str), PERF_HW_CACHE_LEN - strlen(str),
344e60495eaSYonghong Song 			 "%lld-", (config >> 8) & 0xff);
345e60495eaSYonghong Song 
346e60495eaSYonghong Song 	result = perf_event_name(evsel__hw_cache_result, config >> 16);
347c5481f9aSAndrii Nakryiko 	if (result)
348c5481f9aSAndrii Nakryiko 		snprintf(str + strlen(str), PERF_HW_CACHE_LEN - strlen(str),
349c5481f9aSAndrii Nakryiko 			 "%s", result);
350c5481f9aSAndrii Nakryiko 	else
351c5481f9aSAndrii Nakryiko 		snprintf(str + strlen(str), PERF_HW_CACHE_LEN - strlen(str),
352c5481f9aSAndrii Nakryiko 			 "%lld", config >> 16);
353c5481f9aSAndrii Nakryiko 	return str;
354c5481f9aSAndrii Nakryiko }
355c5481f9aSAndrii Nakryiko 
perf_config_str(__u32 type,__u64 config)356c5481f9aSAndrii Nakryiko static const char *perf_config_str(__u32 type, __u64 config)
357c5481f9aSAndrii Nakryiko {
358c5481f9aSAndrii Nakryiko 	const char *perf_config;
359c5481f9aSAndrii Nakryiko 
360c5481f9aSAndrii Nakryiko 	switch (type) {
361c5481f9aSAndrii Nakryiko 	case PERF_TYPE_HARDWARE:
362c5481f9aSAndrii Nakryiko 		perf_config = perf_event_name(event_symbols_hw, config);
363c5481f9aSAndrii Nakryiko 		break;
36446241271SQuentin Monnet 	case PERF_TYPE_SOFTWARE:
3658f184732SQuentin Monnet 		perf_config = perf_event_name(event_symbols_sw, config);
3668f184732SQuentin Monnet 		break;
367622a5b58SMauricio Vásquez 	case PERF_TYPE_HW_CACHE:
3688f184732SQuentin Monnet 		perf_config = perf_config_hw_cache_str(config);
3698f184732SQuentin Monnet 		break;
3708f184732SQuentin Monnet 	default:
3718f184732SQuentin Monnet 		perf_config = NULL;
37246241271SQuentin Monnet 		break;
373d53dee3fSAndrii Nakryiko 	}
374c5481f9aSAndrii Nakryiko 	return perf_config;
375c5481f9aSAndrii Nakryiko }
376c5481f9aSAndrii Nakryiko 
377c5481f9aSAndrii Nakryiko static void
show_perf_event_event_json(struct bpf_link_info * info,json_writer_t * wtr)378c5481f9aSAndrii Nakryiko show_perf_event_event_json(struct bpf_link_info *info, json_writer_t *wtr)
379c5481f9aSAndrii Nakryiko {
380c5481f9aSAndrii Nakryiko 	__u64 config = info->perf_event.event.config;
381c5481f9aSAndrii Nakryiko 	__u32 type = info->perf_event.event.type;
382c5481f9aSAndrii Nakryiko 	const char *perf_type, *perf_config;
383c5481f9aSAndrii Nakryiko 
384c5481f9aSAndrii Nakryiko 	perf_type = perf_event_name(perf_type_name, type);
385c5481f9aSAndrii Nakryiko 	if (perf_type)
386c5481f9aSAndrii Nakryiko 		jsonw_string_field(wtr, "event_type", perf_type);
387c5481f9aSAndrii Nakryiko 	else
388c5481f9aSAndrii Nakryiko 		jsonw_uint_field(wtr, "event_type", type);
389c5481f9aSAndrii Nakryiko 
390c5481f9aSAndrii Nakryiko 	perf_config = perf_config_str(type, config);
391c5481f9aSAndrii Nakryiko 	if (perf_config)
392c5481f9aSAndrii Nakryiko 		jsonw_string_field(wtr, "event_config", perf_config);
393c5481f9aSAndrii Nakryiko 	else
394c5481f9aSAndrii Nakryiko 		jsonw_uint_field(wtr, "event_config", config);
395c5481f9aSAndrii Nakryiko 
396c5481f9aSAndrii Nakryiko 	if (type == PERF_TYPE_HW_CACHE && perf_config)
397c5481f9aSAndrii Nakryiko 		free((void *)perf_config);
398c5481f9aSAndrii Nakryiko }
399c5481f9aSAndrii Nakryiko 
show_link_close_json(int fd,struct bpf_link_info * info)400c5481f9aSAndrii Nakryiko static int show_link_close_json(int fd, struct bpf_link_info *info)
401c5481f9aSAndrii Nakryiko {
402c5481f9aSAndrii Nakryiko 	struct bpf_prog_info prog_info;
403c5481f9aSAndrii Nakryiko 	const char *prog_type_str;
404c5481f9aSAndrii Nakryiko 	int err;
405c5481f9aSAndrii Nakryiko 
406c5481f9aSAndrii Nakryiko 	jsonw_start_object(json_wtr);
407c5481f9aSAndrii Nakryiko 
408c5481f9aSAndrii Nakryiko 	show_link_header_json(info, json_wtr);
409c5481f9aSAndrii Nakryiko 
410c5481f9aSAndrii Nakryiko 	switch (info->type) {
411c5481f9aSAndrii Nakryiko 	case BPF_LINK_TYPE_RAW_TRACEPOINT:
412c5481f9aSAndrii Nakryiko 		jsonw_string_field(json_wtr, "tp_name",
413d6699f8eSQuentin Monnet 				   u64_to_ptr(info->raw_tracepoint.tp_name));
414d53dee3fSAndrii Nakryiko 		break;
41546241271SQuentin Monnet 	case BPF_LINK_TYPE_TRACING:
4168f184732SQuentin Monnet 		err = get_prog_info(info->prog_id, &prog_info);
41746241271SQuentin Monnet 		if (err)
418c5481f9aSAndrii Nakryiko 			return err;
419c5481f9aSAndrii Nakryiko 
420c5481f9aSAndrii Nakryiko 		prog_type_str = libbpf_bpf_prog_type_str(prog_info.type);
421c5481f9aSAndrii Nakryiko 		/* libbpf will return NULL for variants unknown to it. */
422c5481f9aSAndrii Nakryiko 		if (prog_type_str)
423c5481f9aSAndrii Nakryiko 			jsonw_string_field(json_wtr, "prog_type", prog_type_str);
424c5481f9aSAndrii Nakryiko 		else
425c5481f9aSAndrii Nakryiko 			jsonw_uint_field(json_wtr, "prog_type", prog_info.type);
426c5481f9aSAndrii Nakryiko 
427c5481f9aSAndrii Nakryiko 		show_link_attach_type_json(info->tracing.attach_type,
428c5481f9aSAndrii Nakryiko 					   json_wtr);
429c5481f9aSAndrii Nakryiko 		jsonw_uint_field(json_wtr, "target_obj_id", info->tracing.target_obj_id);
430c5481f9aSAndrii Nakryiko 		jsonw_uint_field(json_wtr, "target_btf_id", info->tracing.target_btf_id);
4310e8c7c07SAndrii Nakryiko 		break;
4320e8c7c07SAndrii Nakryiko 	case BPF_LINK_TYPE_CGROUP:
4330e8c7c07SAndrii Nakryiko 		jsonw_lluint_field(json_wtr, "cgroup_id",
4340e8c7c07SAndrii Nakryiko 				   info->cgroup.cgroup_id);
4350e8c7c07SAndrii Nakryiko 		show_link_attach_type_json(info->cgroup.attach_type, json_wtr);
4360e8c7c07SAndrii Nakryiko 		break;
4370e8c7c07SAndrii Nakryiko 	case BPF_LINK_TYPE_ITER:
4380e8c7c07SAndrii Nakryiko 		show_iter_json(info, json_wtr);
4390e8c7c07SAndrii Nakryiko 		break;
4400e8c7c07SAndrii Nakryiko 	case BPF_LINK_TYPE_NETNS:
4410e8c7c07SAndrii Nakryiko 		jsonw_uint_field(json_wtr, "netns_ino",
4420e8c7c07SAndrii Nakryiko 				 info->netns.netns_ino);
4430e8c7c07SAndrii Nakryiko 		show_link_attach_type_json(info->netns.attach_type, json_wtr);
4440e8c7c07SAndrii Nakryiko 		break;
4450e8c7c07SAndrii Nakryiko 	case BPF_LINK_TYPE_NETFILTER:
4460e8c7c07SAndrii Nakryiko 		netfilter_dump_json(info, json_wtr);
4470e8c7c07SAndrii Nakryiko 		break;
4480e8c7c07SAndrii Nakryiko 	case BPF_LINK_TYPE_TCX:
4490e8c7c07SAndrii Nakryiko 		show_link_ifindex_json(info->tcx.ifindex, json_wtr);
4500e8c7c07SAndrii Nakryiko 		show_link_attach_type_json(info->tcx.attach_type, json_wtr);
4510e8c7c07SAndrii Nakryiko 		break;
4520e8c7c07SAndrii Nakryiko 	case BPF_LINK_TYPE_XDP:
4530e8c7c07SAndrii Nakryiko 		show_link_ifindex_json(info->xdp.ifindex, json_wtr);
4540e8c7c07SAndrii Nakryiko 		break;
4550e8c7c07SAndrii Nakryiko 	case BPF_LINK_TYPE_STRUCT_OPS:
4560e8c7c07SAndrii Nakryiko 		jsonw_uint_field(json_wtr, "map_id",
4570e8c7c07SAndrii Nakryiko 				 info->struct_ops.map_id);
4580e8c7c07SAndrii Nakryiko 		break;
459c5481f9aSAndrii Nakryiko 	case BPF_LINK_TYPE_KPROBE_MULTI:
460c5481f9aSAndrii Nakryiko 		show_kprobe_multi_json(info, json_wtr);
461c5481f9aSAndrii Nakryiko 		break;
462c5481f9aSAndrii Nakryiko 	case BPF_LINK_TYPE_PERF_EVENT:
463c5481f9aSAndrii Nakryiko 		switch (info->perf_event.type) {
464c5481f9aSAndrii Nakryiko 		case BPF_PERF_EVENT_EVENT:
465c5481f9aSAndrii Nakryiko 			show_perf_event_event_json(info, json_wtr);
466c5481f9aSAndrii Nakryiko 			break;
467c5481f9aSAndrii Nakryiko 		case BPF_PERF_EVENT_TRACEPOINT:
468c5481f9aSAndrii Nakryiko 			show_perf_event_tracepoint_json(info, json_wtr);
4690e8c7c07SAndrii Nakryiko 			break;
470c5481f9aSAndrii Nakryiko 		case BPF_PERF_EVENT_KPROBE:
471c5481f9aSAndrii Nakryiko 		case BPF_PERF_EVENT_KRETPROBE:
472c5481f9aSAndrii Nakryiko 			show_perf_event_kprobe_json(info, json_wtr);
473c07ba629SQuentin Monnet 			break;
474c07ba629SQuentin Monnet 		case BPF_PERF_EVENT_UPROBE:
475c5481f9aSAndrii Nakryiko 		case BPF_PERF_EVENT_URETPROBE:
476c5481f9aSAndrii Nakryiko 			show_perf_event_uprobe_json(info, json_wtr);
477c5481f9aSAndrii Nakryiko 			break;
478c5481f9aSAndrii Nakryiko 		default:
479c5481f9aSAndrii Nakryiko 			break;
480c5481f9aSAndrii Nakryiko 		}
481c5481f9aSAndrii Nakryiko 		break;
482c5481f9aSAndrii Nakryiko 	default:
483c5481f9aSAndrii Nakryiko 		break;
484c5481f9aSAndrii Nakryiko 	}
485c5481f9aSAndrii Nakryiko 
4860e8c7c07SAndrii Nakryiko 	if (!hashmap__empty(link_table)) {
487c5481f9aSAndrii Nakryiko 		struct hashmap_entry *entry;
488c5481f9aSAndrii Nakryiko 
489c5481f9aSAndrii Nakryiko 		jsonw_name(json_wtr, "pinned");
490c5481f9aSAndrii Nakryiko 		jsonw_start_array(json_wtr);
491c5481f9aSAndrii Nakryiko 		hashmap__for_each_key_entry(link_table, entry, info->id)
492c5481f9aSAndrii Nakryiko 			jsonw_string(json_wtr, entry->pvalue);
493c5481f9aSAndrii Nakryiko 		jsonw_end_array(json_wtr);
494 	}
495 
496 	emit_obj_refs_json(refs_table, info->id, json_wtr);
497 
498 	jsonw_end_object(json_wtr);
499 
500 	return 0;
501 }
502 
show_link_header_plain(struct bpf_link_info * info)503 static void show_link_header_plain(struct bpf_link_info *info)
504 {
505 	const char *link_type_str;
506 
507 	printf("%u: ", info->id);
508 	link_type_str = libbpf_bpf_link_type_str(info->type);
509 	if (link_type_str)
510 		printf("%s  ", link_type_str);
511 	else
512 		printf("type %u  ", info->type);
513 
514 	if (info->type == BPF_LINK_TYPE_STRUCT_OPS)
515 		printf("map %u  ", info->struct_ops.map_id);
516 	else
517 		printf("prog %u  ", info->prog_id);
518 }
519 
show_link_attach_type_plain(__u32 attach_type)520 static void show_link_attach_type_plain(__u32 attach_type)
521 {
522 	const char *attach_type_str;
523 
524 	attach_type_str = libbpf_bpf_attach_type_str(attach_type);
525 	if (attach_type_str)
526 		printf("attach_type %s  ", attach_type_str);
527 	else
528 		printf("attach_type %u  ", attach_type);
529 }
530 
show_link_ifindex_plain(__u32 ifindex)531 static void show_link_ifindex_plain(__u32 ifindex)
532 {
533 	char devname[IF_NAMESIZE * 2] = "(unknown)";
534 	char tmpname[IF_NAMESIZE];
535 	char *ret = NULL;
536 
537 	if (ifindex)
538 		ret = if_indextoname(ifindex, tmpname);
539 	else
540 		snprintf(devname, sizeof(devname), "(detached)");
541 	if (ret)
542 		snprintf(devname, sizeof(devname), "%s(%d)",
543 			 tmpname, ifindex);
544 	printf("ifindex %s  ", devname);
545 }
546 
show_iter_plain(struct bpf_link_info * info)547 static void show_iter_plain(struct bpf_link_info *info)
548 {
549 	const char *target_name = u64_to_ptr(info->iter.target_name);
550 
551 	printf("target_name %s  ", target_name);
552 
553 	if (is_iter_map_target(target_name))
554 		printf("map_id %u  ", info->iter.map.map_id);
555 	else if (is_iter_task_target(target_name)) {
556 		if (info->iter.task.tid)
557 			printf("tid %u ", info->iter.task.tid);
558 		else if (info->iter.task.pid)
559 			printf("pid %u ", info->iter.task.pid);
560 	}
561 
562 	if (is_iter_cgroup_target(target_name)) {
563 		printf("cgroup_id %llu  ", info->iter.cgroup.cgroup_id);
564 		printf("order %s  ",
565 		       cgroup_order_string(info->iter.cgroup.order));
566 	}
567 }
568 
569 static const char * const pf2name[] = {
570 	[NFPROTO_INET] = "inet",
571 	[NFPROTO_IPV4] = "ip",
572 	[NFPROTO_ARP] = "arp",
573 	[NFPROTO_NETDEV] = "netdev",
574 	[NFPROTO_BRIDGE] = "bridge",
575 	[NFPROTO_IPV6] = "ip6",
576 };
577 
578 static const char * const inethook2name[] = {
579 	[NF_INET_PRE_ROUTING] = "prerouting",
580 	[NF_INET_LOCAL_IN] = "input",
581 	[NF_INET_FORWARD] = "forward",
582 	[NF_INET_LOCAL_OUT] = "output",
583 	[NF_INET_POST_ROUTING] = "postrouting",
584 };
585 
586 static const char * const arphook2name[] = {
587 	[NF_ARP_IN] = "input",
588 	[NF_ARP_OUT] = "output",
589 };
590 
netfilter_dump_plain(const struct bpf_link_info * info)591 void netfilter_dump_plain(const struct bpf_link_info *info)
592 {
593 	const char *hookname = NULL, *pfname = NULL;
594 	unsigned int hook = info->netfilter.hooknum;
595 	unsigned int pf = info->netfilter.pf;
596 
597 	if (pf < ARRAY_SIZE(pf2name))
598 		pfname = pf2name[pf];
599 
600 	switch (pf) {
601 	case NFPROTO_BRIDGE: /* bridge shares numbers with enum nf_inet_hooks */
602 	case NFPROTO_IPV4:
603 	case NFPROTO_IPV6:
604 	case NFPROTO_INET:
605 		if (hook < ARRAY_SIZE(inethook2name))
606 			hookname = inethook2name[hook];
607 		break;
608 	case NFPROTO_ARP:
609 		if (hook < ARRAY_SIZE(arphook2name))
610 			hookname = arphook2name[hook];
611 	default:
612 		break;
613 	}
614 
615 	if (pfname)
616 		printf("\n\t%s", pfname);
617 	else
618 		printf("\n\tpf: %d", pf);
619 
620 	if (hookname)
621 		printf(" %s", hookname);
622 	else
623 		printf(", hook %u,", hook);
624 
625 	printf(" prio %d", info->netfilter.priority);
626 
627 	if (info->netfilter.flags)
628 		printf(" flags 0x%x", info->netfilter.flags);
629 }
630 
show_kprobe_multi_plain(struct bpf_link_info * info)631 static void show_kprobe_multi_plain(struct bpf_link_info *info)
632 {
633 	__u32 i, j = 0;
634 	__u64 *addrs;
635 
636 	if (!info->kprobe_multi.count)
637 		return;
638 
639 	if (info->kprobe_multi.flags & BPF_F_KPROBE_MULTI_RETURN)
640 		printf("\n\tkretprobe.multi  ");
641 	else
642 		printf("\n\tkprobe.multi  ");
643 	printf("func_cnt %u  ", info->kprobe_multi.count);
644 	addrs = (__u64 *)u64_to_ptr(info->kprobe_multi.addrs);
645 	qsort(addrs, info->kprobe_multi.count, sizeof(__u64), cmp_u64);
646 
647 	/* Load it once for all. */
648 	if (!dd.sym_count)
649 		kernel_syms_load(&dd);
650 	if (!dd.sym_count)
651 		return;
652 
653 	printf("\n\t%-16s %s", "addr", "func [module]");
654 	for (i = 0; i < dd.sym_count; i++) {
655 		if (dd.sym_mapping[i].address != addrs[j])
656 			continue;
657 		printf("\n\t%016lx %s",
658 		       dd.sym_mapping[i].address, dd.sym_mapping[i].name);
659 		if (dd.sym_mapping[i].module[0] != '\0')
660 			printf(" [%s]  ", dd.sym_mapping[i].module);
661 		else
662 			printf("  ");
663 
664 		if (j++ == info->kprobe_multi.count)
665 			break;
666 	}
667 }
668 
show_perf_event_kprobe_plain(struct bpf_link_info * info)669 static void show_perf_event_kprobe_plain(struct bpf_link_info *info)
670 {
671 	const char *buf;
672 
673 	buf = u64_to_ptr(info->perf_event.kprobe.func_name);
674 	if (buf[0] == '\0' && !info->perf_event.kprobe.addr)
675 		return;
676 
677 	if (info->perf_event.type == BPF_PERF_EVENT_KRETPROBE)
678 		printf("\n\tkretprobe ");
679 	else
680 		printf("\n\tkprobe ");
681 	if (info->perf_event.kprobe.addr)
682 		printf("%llx ", info->perf_event.kprobe.addr);
683 	printf("%s", buf);
684 	if (info->perf_event.kprobe.offset)
685 		printf("+%#x", info->perf_event.kprobe.offset);
686 	printf("  ");
687 }
688 
show_perf_event_uprobe_plain(struct bpf_link_info * info)689 static void show_perf_event_uprobe_plain(struct bpf_link_info *info)
690 {
691 	const char *buf;
692 
693 	buf = u64_to_ptr(info->perf_event.uprobe.file_name);
694 	if (buf[0] == '\0')
695 		return;
696 
697 	if (info->perf_event.type == BPF_PERF_EVENT_URETPROBE)
698 		printf("\n\turetprobe ");
699 	else
700 		printf("\n\tuprobe ");
701 	printf("%s+%#x  ", buf, info->perf_event.uprobe.offset);
702 }
703 
show_perf_event_tracepoint_plain(struct bpf_link_info * info)704 static void show_perf_event_tracepoint_plain(struct bpf_link_info *info)
705 {
706 	const char *buf;
707 
708 	buf = u64_to_ptr(info->perf_event.tracepoint.tp_name);
709 	if (buf[0] == '\0')
710 		return;
711 
712 	printf("\n\ttracepoint %s  ", buf);
713 }
714 
show_perf_event_event_plain(struct bpf_link_info * info)715 static void show_perf_event_event_plain(struct bpf_link_info *info)
716 {
717 	__u64 config = info->perf_event.event.config;
718 	__u32 type = info->perf_event.event.type;
719 	const char *perf_type, *perf_config;
720 
721 	printf("\n\tevent ");
722 	perf_type = perf_event_name(perf_type_name, type);
723 	if (perf_type)
724 		printf("%s:", perf_type);
725 	else
726 		printf("%u :", type);
727 
728 	perf_config = perf_config_str(type, config);
729 	if (perf_config)
730 		printf("%s  ", perf_config);
731 	else
732 		printf("%llu  ", config);
733 
734 	if (type == PERF_TYPE_HW_CACHE && perf_config)
735 		free((void *)perf_config);
736 }
737 
show_link_close_plain(int fd,struct bpf_link_info * info)738 static int show_link_close_plain(int fd, struct bpf_link_info *info)
739 {
740 	struct bpf_prog_info prog_info;
741 	const char *prog_type_str;
742 	int err;
743 
744 	show_link_header_plain(info);
745 
746 	switch (info->type) {
747 	case BPF_LINK_TYPE_RAW_TRACEPOINT:
748 		printf("\n\ttp '%s'  ",
749 		       (const char *)u64_to_ptr(info->raw_tracepoint.tp_name));
750 		break;
751 	case BPF_LINK_TYPE_TRACING:
752 		err = get_prog_info(info->prog_id, &prog_info);
753 		if (err)
754 			return err;
755 
756 		prog_type_str = libbpf_bpf_prog_type_str(prog_info.type);
757 		/* libbpf will return NULL for variants unknown to it. */
758 		if (prog_type_str)
759 			printf("\n\tprog_type %s  ", prog_type_str);
760 		else
761 			printf("\n\tprog_type %u  ", prog_info.type);
762 
763 		show_link_attach_type_plain(info->tracing.attach_type);
764 		if (info->tracing.target_obj_id || info->tracing.target_btf_id)
765 			printf("\n\ttarget_obj_id %u  target_btf_id %u  ",
766 			       info->tracing.target_obj_id,
767 			       info->tracing.target_btf_id);
768 		break;
769 	case BPF_LINK_TYPE_CGROUP:
770 		printf("\n\tcgroup_id %zu  ", (size_t)info->cgroup.cgroup_id);
771 		show_link_attach_type_plain(info->cgroup.attach_type);
772 		break;
773 	case BPF_LINK_TYPE_ITER:
774 		show_iter_plain(info);
775 		break;
776 	case BPF_LINK_TYPE_NETNS:
777 		printf("\n\tnetns_ino %u  ", info->netns.netns_ino);
778 		show_link_attach_type_plain(info->netns.attach_type);
779 		break;
780 	case BPF_LINK_TYPE_NETFILTER:
781 		netfilter_dump_plain(info);
782 		break;
783 	case BPF_LINK_TYPE_TCX:
784 		printf("\n\t");
785 		show_link_ifindex_plain(info->tcx.ifindex);
786 		show_link_attach_type_plain(info->tcx.attach_type);
787 		break;
788 	case BPF_LINK_TYPE_XDP:
789 		printf("\n\t");
790 		show_link_ifindex_plain(info->xdp.ifindex);
791 		break;
792 	case BPF_LINK_TYPE_KPROBE_MULTI:
793 		show_kprobe_multi_plain(info);
794 		break;
795 	case BPF_LINK_TYPE_PERF_EVENT:
796 		switch (info->perf_event.type) {
797 		case BPF_PERF_EVENT_EVENT:
798 			show_perf_event_event_plain(info);
799 			break;
800 		case BPF_PERF_EVENT_TRACEPOINT:
801 			show_perf_event_tracepoint_plain(info);
802 			break;
803 		case BPF_PERF_EVENT_KPROBE:
804 		case BPF_PERF_EVENT_KRETPROBE:
805 			show_perf_event_kprobe_plain(info);
806 			break;
807 		case BPF_PERF_EVENT_UPROBE:
808 		case BPF_PERF_EVENT_URETPROBE:
809 			show_perf_event_uprobe_plain(info);
810 			break;
811 		default:
812 			break;
813 		}
814 		break;
815 	default:
816 		break;
817 	}
818 
819 	if (!hashmap__empty(link_table)) {
820 		struct hashmap_entry *entry;
821 
822 		hashmap__for_each_key_entry(link_table, entry, info->id)
823 			printf("\n\tpinned %s", (char *)entry->pvalue);
824 	}
825 	emit_obj_refs_plain(refs_table, info->id, "\n\tpids ");
826 
827 	printf("\n");
828 
829 	return 0;
830 }
831 
do_show_link(int fd)832 static int do_show_link(int fd)
833 {
834 	struct bpf_link_info info;
835 	__u32 len = sizeof(info);
836 	__u64 *addrs = NULL;
837 	char buf[PATH_MAX];
838 	int count;
839 	int err;
840 
841 	memset(&info, 0, sizeof(info));
842 	buf[0] = '\0';
843 again:
844 	err = bpf_link_get_info_by_fd(fd, &info, &len);
845 	if (err) {
846 		p_err("can't get link info: %s",
847 		      strerror(errno));
848 		close(fd);
849 		return err;
850 	}
851 	if (info.type == BPF_LINK_TYPE_RAW_TRACEPOINT &&
852 	    !info.raw_tracepoint.tp_name) {
853 		info.raw_tracepoint.tp_name = ptr_to_u64(&buf);
854 		info.raw_tracepoint.tp_name_len = sizeof(buf);
855 		goto again;
856 	}
857 	if (info.type == BPF_LINK_TYPE_ITER &&
858 	    !info.iter.target_name) {
859 		info.iter.target_name = ptr_to_u64(&buf);
860 		info.iter.target_name_len = sizeof(buf);
861 		goto again;
862 	}
863 	if (info.type == BPF_LINK_TYPE_KPROBE_MULTI &&
864 	    !info.kprobe_multi.addrs) {
865 		count = info.kprobe_multi.count;
866 		if (count) {
867 			addrs = calloc(count, sizeof(__u64));
868 			if (!addrs) {
869 				p_err("mem alloc failed");
870 				close(fd);
871 				return -ENOMEM;
872 			}
873 			info.kprobe_multi.addrs = ptr_to_u64(addrs);
874 			goto again;
875 		}
876 	}
877 	if (info.type == BPF_LINK_TYPE_PERF_EVENT) {
878 		switch (info.perf_event.type) {
879 		case BPF_PERF_EVENT_TRACEPOINT:
880 			if (!info.perf_event.tracepoint.tp_name) {
881 				info.perf_event.tracepoint.tp_name = ptr_to_u64(&buf);
882 				info.perf_event.tracepoint.name_len = sizeof(buf);
883 				goto again;
884 			}
885 			break;
886 		case BPF_PERF_EVENT_KPROBE:
887 		case BPF_PERF_EVENT_KRETPROBE:
888 			if (!info.perf_event.kprobe.func_name) {
889 				info.perf_event.kprobe.func_name = ptr_to_u64(&buf);
890 				info.perf_event.kprobe.name_len = sizeof(buf);
891 				goto again;
892 			}
893 			break;
894 		case BPF_PERF_EVENT_UPROBE:
895 		case BPF_PERF_EVENT_URETPROBE:
896 			if (!info.perf_event.uprobe.file_name) {
897 				info.perf_event.uprobe.file_name = ptr_to_u64(&buf);
898 				info.perf_event.uprobe.name_len = sizeof(buf);
899 				goto again;
900 			}
901 			break;
902 		default:
903 			break;
904 		}
905 	}
906 
907 	if (json_output)
908 		show_link_close_json(fd, &info);
909 	else
910 		show_link_close_plain(fd, &info);
911 
912 	if (addrs)
913 		free(addrs);
914 	close(fd);
915 	return 0;
916 }
917 
do_show(int argc,char ** argv)918 static int do_show(int argc, char **argv)
919 {
920 	__u32 id = 0;
921 	int err, fd;
922 
923 	if (show_pinned) {
924 		link_table = hashmap__new(hash_fn_for_key_as_id,
925 					  equal_fn_for_key_as_id, NULL);
926 		if (IS_ERR(link_table)) {
927 			p_err("failed to create hashmap for pinned paths");
928 			return -1;
929 		}
930 		build_pinned_obj_table(link_table, BPF_OBJ_LINK);
931 	}
932 	build_obj_refs_table(&refs_table, BPF_OBJ_LINK);
933 
934 	if (argc == 2) {
935 		fd = link_parse_fd(&argc, &argv);
936 		if (fd < 0)
937 			return fd;
938 		do_show_link(fd);
939 		goto out;
940 	}
941 
942 	if (argc)
943 		return BAD_ARG();
944 
945 	if (json_output)
946 		jsonw_start_array(json_wtr);
947 	while (true) {
948 		err = bpf_link_get_next_id(id, &id);
949 		if (err) {
950 			if (errno == ENOENT)
951 				break;
952 			p_err("can't get next link: %s%s", strerror(errno),
953 			      errno == EINVAL ? " -- kernel too old?" : "");
954 			break;
955 		}
956 
957 		fd = bpf_link_get_fd_by_id(id);
958 		if (fd < 0) {
959 			if (errno == ENOENT)
960 				continue;
961 			p_err("can't get link by id (%u): %s",
962 			      id, strerror(errno));
963 			break;
964 		}
965 
966 		err = do_show_link(fd);
967 		if (err)
968 			break;
969 	}
970 	if (json_output)
971 		jsonw_end_array(json_wtr);
972 
973 	delete_obj_refs_table(refs_table);
974 
975 	if (show_pinned)
976 		delete_pinned_obj_table(link_table);
977 
978 out:
979 	if (dd.sym_count)
980 		kernel_syms_destroy(&dd);
981 	return errno == ENOENT ? 0 : -1;
982 }
983 
do_pin(int argc,char ** argv)984 static int do_pin(int argc, char **argv)
985 {
986 	int err;
987 
988 	err = do_pin_any(argc, argv, link_parse_fd);
989 	if (!err && json_output)
990 		jsonw_null(json_wtr);
991 	return err;
992 }
993 
do_detach(int argc,char ** argv)994 static int do_detach(int argc, char **argv)
995 {
996 	int err, fd;
997 
998 	if (argc != 2) {
999 		p_err("link specifier is invalid or missing\n");
1000 		return 1;
1001 	}
1002 
1003 	fd = link_parse_fd(&argc, &argv);
1004 	if (fd < 0)
1005 		return 1;
1006 
1007 	err = bpf_link_detach(fd);
1008 	if (err)
1009 		err = -errno;
1010 	close(fd);
1011 	if (err) {
1012 		p_err("failed link detach: %s", strerror(-err));
1013 		return 1;
1014 	}
1015 
1016 	if (json_output)
1017 		jsonw_null(json_wtr);
1018 
1019 	return 0;
1020 }
1021 
do_help(int argc,char ** argv)1022 static int do_help(int argc, char **argv)
1023 {
1024 	if (json_output) {
1025 		jsonw_null(json_wtr);
1026 		return 0;
1027 	}
1028 
1029 	fprintf(stderr,
1030 		"Usage: %1$s %2$s { show | list }   [LINK]\n"
1031 		"       %1$s %2$s pin        LINK  FILE\n"
1032 		"       %1$s %2$s detach     LINK\n"
1033 		"       %1$s %2$s help\n"
1034 		"\n"
1035 		"       " HELP_SPEC_LINK "\n"
1036 		"       " HELP_SPEC_OPTIONS " |\n"
1037 		"                    {-f|--bpffs} | {-n|--nomount} }\n"
1038 		"",
1039 		bin_name, argv[-2]);
1040 
1041 	return 0;
1042 }
1043 
1044 static const struct cmd cmds[] = {
1045 	{ "show",	do_show },
1046 	{ "list",	do_show },
1047 	{ "help",	do_help },
1048 	{ "pin",	do_pin },
1049 	{ "detach",	do_detach },
1050 	{ 0 }
1051 };
1052 
do_link(int argc,char ** argv)1053 int do_link(int argc, char **argv)
1054 {
1055 	return cmd_select(cmds, argc, argv, do_help);
1056 }
1057