xref: /openbmc/linux/tools/bpf/bpftool/prog.c (revision 522622104ebabbc3372d2fad706b4d30cee13319)
171bb428fSJakub Kicinski /*
271bb428fSJakub Kicinski  * Copyright (C) 2017 Netronome Systems, Inc.
371bb428fSJakub Kicinski  *
471bb428fSJakub Kicinski  * This software is dual licensed under the GNU General License Version 2,
571bb428fSJakub Kicinski  * June 1991 as shown in the file COPYING in the top-level directory of this
671bb428fSJakub Kicinski  * source tree or the BSD 2-Clause License provided below.  You have the
771bb428fSJakub Kicinski  * option to license this software under the complete terms of either license.
871bb428fSJakub Kicinski  *
971bb428fSJakub Kicinski  * The BSD 2-Clause License:
1071bb428fSJakub Kicinski  *
1171bb428fSJakub Kicinski  *     Redistribution and use in source and binary forms, with or
1271bb428fSJakub Kicinski  *     without modification, are permitted provided that the following
1371bb428fSJakub Kicinski  *     conditions are met:
1471bb428fSJakub Kicinski  *
1571bb428fSJakub Kicinski  *      1. Redistributions of source code must retain the above
1671bb428fSJakub Kicinski  *         copyright notice, this list of conditions and the following
1771bb428fSJakub Kicinski  *         disclaimer.
1871bb428fSJakub Kicinski  *
1971bb428fSJakub Kicinski  *      2. Redistributions in binary form must reproduce the above
2071bb428fSJakub Kicinski  *         copyright notice, this list of conditions and the following
2171bb428fSJakub Kicinski  *         disclaimer in the documentation and/or other materials
2271bb428fSJakub Kicinski  *         provided with the distribution.
2371bb428fSJakub Kicinski  *
2471bb428fSJakub Kicinski  * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND,
2571bb428fSJakub Kicinski  * EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF
2671bb428fSJakub Kicinski  * MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND
2771bb428fSJakub Kicinski  * NONINFRINGEMENT. IN NO EVENT SHALL THE AUTHORS OR COPYRIGHT HOLDERS
2871bb428fSJakub Kicinski  * BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER LIABILITY, WHETHER IN AN
2971bb428fSJakub Kicinski  * ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, OUT OF OR IN
3071bb428fSJakub Kicinski  * CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN THE
3171bb428fSJakub Kicinski  * SOFTWARE.
3271bb428fSJakub Kicinski  */
3371bb428fSJakub Kicinski 
3471bb428fSJakub Kicinski /* Author: Jakub Kicinski <kubakici@wp.pl> */
3571bb428fSJakub Kicinski 
3671bb428fSJakub Kicinski #include <errno.h>
3771bb428fSJakub Kicinski #include <fcntl.h>
38c9c35995SJakub Kicinski #include <stdarg.h>
3971bb428fSJakub Kicinski #include <stdio.h>
4071bb428fSJakub Kicinski #include <stdlib.h>
4171bb428fSJakub Kicinski #include <string.h>
4271bb428fSJakub Kicinski #include <time.h>
4371bb428fSJakub Kicinski #include <unistd.h>
4471bb428fSJakub Kicinski #include <sys/types.h>
4571bb428fSJakub Kicinski #include <sys/stat.h>
4671bb428fSJakub Kicinski 
4771bb428fSJakub Kicinski #include <bpf.h>
4849a086c2SRoman Gushchin #include <libbpf.h>
4971bb428fSJakub Kicinski 
5071bb428fSJakub Kicinski #include "main.h"
51c9c35995SJakub Kicinski #include "disasm.h"
5271bb428fSJakub Kicinski 
5371bb428fSJakub Kicinski static const char * const prog_type_name[] = {
5471bb428fSJakub Kicinski 	[BPF_PROG_TYPE_UNSPEC]		= "unspec",
5571bb428fSJakub Kicinski 	[BPF_PROG_TYPE_SOCKET_FILTER]	= "socket_filter",
5671bb428fSJakub Kicinski 	[BPF_PROG_TYPE_KPROBE]		= "kprobe",
5771bb428fSJakub Kicinski 	[BPF_PROG_TYPE_SCHED_CLS]	= "sched_cls",
5871bb428fSJakub Kicinski 	[BPF_PROG_TYPE_SCHED_ACT]	= "sched_act",
5971bb428fSJakub Kicinski 	[BPF_PROG_TYPE_TRACEPOINT]	= "tracepoint",
6071bb428fSJakub Kicinski 	[BPF_PROG_TYPE_XDP]		= "xdp",
6171bb428fSJakub Kicinski 	[BPF_PROG_TYPE_PERF_EVENT]	= "perf_event",
6271bb428fSJakub Kicinski 	[BPF_PROG_TYPE_CGROUP_SKB]	= "cgroup_skb",
6371bb428fSJakub Kicinski 	[BPF_PROG_TYPE_CGROUP_SOCK]	= "cgroup_sock",
6471bb428fSJakub Kicinski 	[BPF_PROG_TYPE_LWT_IN]		= "lwt_in",
6571bb428fSJakub Kicinski 	[BPF_PROG_TYPE_LWT_OUT]		= "lwt_out",
6671bb428fSJakub Kicinski 	[BPF_PROG_TYPE_LWT_XMIT]	= "lwt_xmit",
6771bb428fSJakub Kicinski 	[BPF_PROG_TYPE_SOCK_OPS]	= "sock_ops",
6871bb428fSJakub Kicinski 	[BPF_PROG_TYPE_SK_SKB]		= "sk_skb",
6971bb428fSJakub Kicinski };
7071bb428fSJakub Kicinski 
7171bb428fSJakub Kicinski static void print_boot_time(__u64 nsecs, char *buf, unsigned int size)
7271bb428fSJakub Kicinski {
7371bb428fSJakub Kicinski 	struct timespec real_time_ts, boot_time_ts;
7471bb428fSJakub Kicinski 	time_t wallclock_secs;
7571bb428fSJakub Kicinski 	struct tm load_tm;
7671bb428fSJakub Kicinski 
7771bb428fSJakub Kicinski 	buf[--size] = '\0';
7871bb428fSJakub Kicinski 
7971bb428fSJakub Kicinski 	if (clock_gettime(CLOCK_REALTIME, &real_time_ts) ||
8071bb428fSJakub Kicinski 	    clock_gettime(CLOCK_BOOTTIME, &boot_time_ts)) {
8171bb428fSJakub Kicinski 		perror("Can't read clocks");
8271bb428fSJakub Kicinski 		snprintf(buf, size, "%llu", nsecs / 1000000000);
8371bb428fSJakub Kicinski 		return;
8471bb428fSJakub Kicinski 	}
8571bb428fSJakub Kicinski 
8671bb428fSJakub Kicinski 	wallclock_secs = (real_time_ts.tv_sec - boot_time_ts.tv_sec) +
8771bb428fSJakub Kicinski 		nsecs / 1000000000;
8871bb428fSJakub Kicinski 
8971bb428fSJakub Kicinski 	if (!localtime_r(&wallclock_secs, &load_tm)) {
9071bb428fSJakub Kicinski 		snprintf(buf, size, "%llu", nsecs / 1000000000);
9171bb428fSJakub Kicinski 		return;
9271bb428fSJakub Kicinski 	}
9371bb428fSJakub Kicinski 
9471bb428fSJakub Kicinski 	strftime(buf, size, "%b %d/%H:%M", &load_tm);
9571bb428fSJakub Kicinski }
9671bb428fSJakub Kicinski 
9771bb428fSJakub Kicinski static int prog_fd_by_tag(unsigned char *tag)
9871bb428fSJakub Kicinski {
9971bb428fSJakub Kicinski 	struct bpf_prog_info info = {};
10071bb428fSJakub Kicinski 	__u32 len = sizeof(info);
10171bb428fSJakub Kicinski 	unsigned int id = 0;
10271bb428fSJakub Kicinski 	int err;
10371bb428fSJakub Kicinski 	int fd;
10471bb428fSJakub Kicinski 
10571bb428fSJakub Kicinski 	while (true) {
10671bb428fSJakub Kicinski 		err = bpf_prog_get_next_id(id, &id);
10771bb428fSJakub Kicinski 		if (err) {
1089a5ab8bfSQuentin Monnet 			p_err("%s", strerror(errno));
10971bb428fSJakub Kicinski 			return -1;
11071bb428fSJakub Kicinski 		}
11171bb428fSJakub Kicinski 
11271bb428fSJakub Kicinski 		fd = bpf_prog_get_fd_by_id(id);
11371bb428fSJakub Kicinski 		if (fd < 0) {
1149a5ab8bfSQuentin Monnet 			p_err("can't get prog by id (%u): %s",
11571bb428fSJakub Kicinski 			      id, strerror(errno));
11671bb428fSJakub Kicinski 			return -1;
11771bb428fSJakub Kicinski 		}
11871bb428fSJakub Kicinski 
11971bb428fSJakub Kicinski 		err = bpf_obj_get_info_by_fd(fd, &info, &len);
12071bb428fSJakub Kicinski 		if (err) {
1219a5ab8bfSQuentin Monnet 			p_err("can't get prog info (%u): %s",
12271bb428fSJakub Kicinski 			      id, strerror(errno));
12371bb428fSJakub Kicinski 			close(fd);
12471bb428fSJakub Kicinski 			return -1;
12571bb428fSJakub Kicinski 		}
12671bb428fSJakub Kicinski 
12771bb428fSJakub Kicinski 		if (!memcmp(tag, info.tag, BPF_TAG_SIZE))
12871bb428fSJakub Kicinski 			return fd;
12971bb428fSJakub Kicinski 
13071bb428fSJakub Kicinski 		close(fd);
13171bb428fSJakub Kicinski 	}
13271bb428fSJakub Kicinski }
13371bb428fSJakub Kicinski 
13471bb428fSJakub Kicinski int prog_parse_fd(int *argc, char ***argv)
13571bb428fSJakub Kicinski {
13671bb428fSJakub Kicinski 	int fd;
13771bb428fSJakub Kicinski 
13871bb428fSJakub Kicinski 	if (is_prefix(**argv, "id")) {
13971bb428fSJakub Kicinski 		unsigned int id;
14071bb428fSJakub Kicinski 		char *endptr;
14171bb428fSJakub Kicinski 
14271bb428fSJakub Kicinski 		NEXT_ARGP();
14371bb428fSJakub Kicinski 
14471bb428fSJakub Kicinski 		id = strtoul(**argv, &endptr, 0);
14571bb428fSJakub Kicinski 		if (*endptr) {
1469a5ab8bfSQuentin Monnet 			p_err("can't parse %s as ID", **argv);
14771bb428fSJakub Kicinski 			return -1;
14871bb428fSJakub Kicinski 		}
14971bb428fSJakub Kicinski 		NEXT_ARGP();
15071bb428fSJakub Kicinski 
15171bb428fSJakub Kicinski 		fd = bpf_prog_get_fd_by_id(id);
15271bb428fSJakub Kicinski 		if (fd < 0)
1539a5ab8bfSQuentin Monnet 			p_err("get by id (%u): %s", id, strerror(errno));
15471bb428fSJakub Kicinski 		return fd;
15571bb428fSJakub Kicinski 	} else if (is_prefix(**argv, "tag")) {
15671bb428fSJakub Kicinski 		unsigned char tag[BPF_TAG_SIZE];
15771bb428fSJakub Kicinski 
15871bb428fSJakub Kicinski 		NEXT_ARGP();
15971bb428fSJakub Kicinski 
16071bb428fSJakub Kicinski 		if (sscanf(**argv, BPF_TAG_FMT, tag, tag + 1, tag + 2,
16171bb428fSJakub Kicinski 			   tag + 3, tag + 4, tag + 5, tag + 6, tag + 7)
16271bb428fSJakub Kicinski 		    != BPF_TAG_SIZE) {
1639a5ab8bfSQuentin Monnet 			p_err("can't parse tag");
16471bb428fSJakub Kicinski 			return -1;
16571bb428fSJakub Kicinski 		}
16671bb428fSJakub Kicinski 		NEXT_ARGP();
16771bb428fSJakub Kicinski 
16871bb428fSJakub Kicinski 		return prog_fd_by_tag(tag);
16971bb428fSJakub Kicinski 	} else if (is_prefix(**argv, "pinned")) {
17071bb428fSJakub Kicinski 		char *path;
17171bb428fSJakub Kicinski 
17271bb428fSJakub Kicinski 		NEXT_ARGP();
17371bb428fSJakub Kicinski 
17471bb428fSJakub Kicinski 		path = **argv;
17571bb428fSJakub Kicinski 		NEXT_ARGP();
17671bb428fSJakub Kicinski 
17771bb428fSJakub Kicinski 		return open_obj_pinned_any(path, BPF_OBJ_PROG);
17871bb428fSJakub Kicinski 	}
17971bb428fSJakub Kicinski 
1809a5ab8bfSQuentin Monnet 	p_err("expected 'id', 'tag' or 'pinned', got: '%s'?", **argv);
18171bb428fSJakub Kicinski 	return -1;
18271bb428fSJakub Kicinski }
18371bb428fSJakub Kicinski 
18471bb428fSJakub Kicinski static void show_prog_maps(int fd, u32 num_maps)
18571bb428fSJakub Kicinski {
18671bb428fSJakub Kicinski 	struct bpf_prog_info info = {};
18771bb428fSJakub Kicinski 	__u32 len = sizeof(info);
18871bb428fSJakub Kicinski 	__u32 map_ids[num_maps];
18971bb428fSJakub Kicinski 	unsigned int i;
19071bb428fSJakub Kicinski 	int err;
19171bb428fSJakub Kicinski 
19271bb428fSJakub Kicinski 	info.nr_map_ids = num_maps;
19371bb428fSJakub Kicinski 	info.map_ids = ptr_to_u64(map_ids);
19471bb428fSJakub Kicinski 
19571bb428fSJakub Kicinski 	err = bpf_obj_get_info_by_fd(fd, &info, &len);
19671bb428fSJakub Kicinski 	if (err || !info.nr_map_ids)
19771bb428fSJakub Kicinski 		return;
19871bb428fSJakub Kicinski 
199743cc665SQuentin Monnet 	if (json_output) {
200743cc665SQuentin Monnet 		jsonw_name(json_wtr, "map_ids");
201743cc665SQuentin Monnet 		jsonw_start_array(json_wtr);
202743cc665SQuentin Monnet 		for (i = 0; i < info.nr_map_ids; i++)
203743cc665SQuentin Monnet 			jsonw_uint(json_wtr, map_ids[i]);
204743cc665SQuentin Monnet 		jsonw_end_array(json_wtr);
205743cc665SQuentin Monnet 	} else {
20671bb428fSJakub Kicinski 		printf("  map_ids ");
20771bb428fSJakub Kicinski 		for (i = 0; i < info.nr_map_ids; i++)
20871bb428fSJakub Kicinski 			printf("%u%s", map_ids[i],
20971bb428fSJakub Kicinski 			       i == info.nr_map_ids - 1 ? "" : ",");
21071bb428fSJakub Kicinski 	}
21171bb428fSJakub Kicinski }
21271bb428fSJakub Kicinski 
213743cc665SQuentin Monnet static void print_prog_json(struct bpf_prog_info *info, int fd)
214743cc665SQuentin Monnet {
215743cc665SQuentin Monnet 	char *memlock;
216743cc665SQuentin Monnet 
217743cc665SQuentin Monnet 	jsonw_start_object(json_wtr);
218743cc665SQuentin Monnet 	jsonw_uint_field(json_wtr, "id", info->id);
219743cc665SQuentin Monnet 	if (info->type < ARRAY_SIZE(prog_type_name))
220743cc665SQuentin Monnet 		jsonw_string_field(json_wtr, "type",
221743cc665SQuentin Monnet 				   prog_type_name[info->type]);
22271bb428fSJakub Kicinski 	else
223743cc665SQuentin Monnet 		jsonw_uint_field(json_wtr, "type", info->type);
22471bb428fSJakub Kicinski 
225743cc665SQuentin Monnet 	if (*info->name)
226743cc665SQuentin Monnet 		jsonw_string_field(json_wtr, "name", info->name);
22771bb428fSJakub Kicinski 
228743cc665SQuentin Monnet 	jsonw_name(json_wtr, "tag");
229743cc665SQuentin Monnet 	jsonw_printf(json_wtr, "\"" BPF_TAG_FMT "\"",
230743cc665SQuentin Monnet 		     info->tag[0], info->tag[1], info->tag[2], info->tag[3],
231743cc665SQuentin Monnet 		     info->tag[4], info->tag[5], info->tag[6], info->tag[7]);
23271bb428fSJakub Kicinski 
233*52262210SJakub Kicinski 	print_dev_json(info->ifindex, info->netns_dev, info->netns_ino);
234*52262210SJakub Kicinski 
235743cc665SQuentin Monnet 	if (info->load_time) {
23671bb428fSJakub Kicinski 		char buf[32];
23771bb428fSJakub Kicinski 
238743cc665SQuentin Monnet 		print_boot_time(info->load_time, buf, sizeof(buf));
23971bb428fSJakub Kicinski 
24071bb428fSJakub Kicinski 		/* Piggy back on load_time, since 0 uid is a valid one */
241743cc665SQuentin Monnet 		jsonw_string_field(json_wtr, "loaded_at", buf);
242743cc665SQuentin Monnet 		jsonw_uint_field(json_wtr, "uid", info->created_by_uid);
24371bb428fSJakub Kicinski 	}
24471bb428fSJakub Kicinski 
245743cc665SQuentin Monnet 	jsonw_uint_field(json_wtr, "bytes_xlated", info->xlated_prog_len);
24671bb428fSJakub Kicinski 
247743cc665SQuentin Monnet 	if (info->jited_prog_len) {
248743cc665SQuentin Monnet 		jsonw_bool_field(json_wtr, "jited", true);
249743cc665SQuentin Monnet 		jsonw_uint_field(json_wtr, "bytes_jited", info->jited_prog_len);
250743cc665SQuentin Monnet 	} else {
251743cc665SQuentin Monnet 		jsonw_bool_field(json_wtr, "jited", false);
252743cc665SQuentin Monnet 	}
253743cc665SQuentin Monnet 
254743cc665SQuentin Monnet 	memlock = get_fdinfo(fd, "memlock");
255743cc665SQuentin Monnet 	if (memlock)
256743cc665SQuentin Monnet 		jsonw_int_field(json_wtr, "bytes_memlock", atoi(memlock));
257743cc665SQuentin Monnet 	free(memlock);
258743cc665SQuentin Monnet 
259743cc665SQuentin Monnet 	if (info->nr_map_ids)
260743cc665SQuentin Monnet 		show_prog_maps(fd, info->nr_map_ids);
261743cc665SQuentin Monnet 
2624990f1f4SPrashant Bhole 	if (!hash_empty(prog_table.table)) {
2634990f1f4SPrashant Bhole 		struct pinned_obj *obj;
2644990f1f4SPrashant Bhole 
2654990f1f4SPrashant Bhole 		jsonw_name(json_wtr, "pinned");
2664990f1f4SPrashant Bhole 		jsonw_start_array(json_wtr);
2674990f1f4SPrashant Bhole 		hash_for_each_possible(prog_table.table, obj, hash, info->id) {
2684990f1f4SPrashant Bhole 			if (obj->id == info->id)
2694990f1f4SPrashant Bhole 				jsonw_string(json_wtr, obj->path);
2704990f1f4SPrashant Bhole 		}
2714990f1f4SPrashant Bhole 		jsonw_end_array(json_wtr);
2724990f1f4SPrashant Bhole 	}
2734990f1f4SPrashant Bhole 
274743cc665SQuentin Monnet 	jsonw_end_object(json_wtr);
275743cc665SQuentin Monnet }
276743cc665SQuentin Monnet 
277743cc665SQuentin Monnet static void print_prog_plain(struct bpf_prog_info *info, int fd)
278743cc665SQuentin Monnet {
279743cc665SQuentin Monnet 	char *memlock;
280743cc665SQuentin Monnet 
281743cc665SQuentin Monnet 	printf("%u: ", info->id);
282743cc665SQuentin Monnet 	if (info->type < ARRAY_SIZE(prog_type_name))
283743cc665SQuentin Monnet 		printf("%s  ", prog_type_name[info->type]);
284743cc665SQuentin Monnet 	else
285743cc665SQuentin Monnet 		printf("type %u  ", info->type);
286743cc665SQuentin Monnet 
287743cc665SQuentin Monnet 	if (*info->name)
288743cc665SQuentin Monnet 		printf("name %s  ", info->name);
289743cc665SQuentin Monnet 
290743cc665SQuentin Monnet 	printf("tag ");
291743cc665SQuentin Monnet 	fprint_hex(stdout, info->tag, BPF_TAG_SIZE, "");
292*52262210SJakub Kicinski 	print_dev_plain(info->ifindex, info->netns_dev, info->netns_ino);
293743cc665SQuentin Monnet 	printf("\n");
294743cc665SQuentin Monnet 
295743cc665SQuentin Monnet 	if (info->load_time) {
296743cc665SQuentin Monnet 		char buf[32];
297743cc665SQuentin Monnet 
298743cc665SQuentin Monnet 		print_boot_time(info->load_time, buf, sizeof(buf));
299743cc665SQuentin Monnet 
300743cc665SQuentin Monnet 		/* Piggy back on load_time, since 0 uid is a valid one */
301743cc665SQuentin Monnet 		printf("\tloaded_at %s  uid %u\n", buf, info->created_by_uid);
302743cc665SQuentin Monnet 	}
303743cc665SQuentin Monnet 
304743cc665SQuentin Monnet 	printf("\txlated %uB", info->xlated_prog_len);
305743cc665SQuentin Monnet 
306743cc665SQuentin Monnet 	if (info->jited_prog_len)
307743cc665SQuentin Monnet 		printf("  jited %uB", info->jited_prog_len);
30871bb428fSJakub Kicinski 	else
30971bb428fSJakub Kicinski 		printf("  not jited");
31071bb428fSJakub Kicinski 
31171bb428fSJakub Kicinski 	memlock = get_fdinfo(fd, "memlock");
31271bb428fSJakub Kicinski 	if (memlock)
31371bb428fSJakub Kicinski 		printf("  memlock %sB", memlock);
31471bb428fSJakub Kicinski 	free(memlock);
31571bb428fSJakub Kicinski 
316743cc665SQuentin Monnet 	if (info->nr_map_ids)
317743cc665SQuentin Monnet 		show_prog_maps(fd, info->nr_map_ids);
31871bb428fSJakub Kicinski 
3194990f1f4SPrashant Bhole 	if (!hash_empty(prog_table.table)) {
3204990f1f4SPrashant Bhole 		struct pinned_obj *obj;
3214990f1f4SPrashant Bhole 
3224990f1f4SPrashant Bhole 		printf("\n");
3234990f1f4SPrashant Bhole 		hash_for_each_possible(prog_table.table, obj, hash, info->id) {
3244990f1f4SPrashant Bhole 			if (obj->id == info->id)
3254990f1f4SPrashant Bhole 				printf("\tpinned %s\n", obj->path);
3264990f1f4SPrashant Bhole 		}
3274990f1f4SPrashant Bhole 	}
3284990f1f4SPrashant Bhole 
32971bb428fSJakub Kicinski 	printf("\n");
330743cc665SQuentin Monnet }
331743cc665SQuentin Monnet 
332743cc665SQuentin Monnet static int show_prog(int fd)
333743cc665SQuentin Monnet {
334743cc665SQuentin Monnet 	struct bpf_prog_info info = {};
335743cc665SQuentin Monnet 	__u32 len = sizeof(info);
336743cc665SQuentin Monnet 	int err;
337743cc665SQuentin Monnet 
338743cc665SQuentin Monnet 	err = bpf_obj_get_info_by_fd(fd, &info, &len);
339743cc665SQuentin Monnet 	if (err) {
3409a5ab8bfSQuentin Monnet 		p_err("can't get prog info: %s", strerror(errno));
341743cc665SQuentin Monnet 		return -1;
342743cc665SQuentin Monnet 	}
343743cc665SQuentin Monnet 
344743cc665SQuentin Monnet 	if (json_output)
345743cc665SQuentin Monnet 		print_prog_json(&info, fd);
346743cc665SQuentin Monnet 	else
347743cc665SQuentin Monnet 		print_prog_plain(&info, fd);
34871bb428fSJakub Kicinski 
34971bb428fSJakub Kicinski 	return 0;
35071bb428fSJakub Kicinski }
35171bb428fSJakub Kicinski 
35271bb428fSJakub Kicinski static int do_show(int argc, char **argv)
353743cc665SQuentin Monnet {
354743cc665SQuentin Monnet 	__u32 id = 0;
35571bb428fSJakub Kicinski 	int err;
35671bb428fSJakub Kicinski 	int fd;
35771bb428fSJakub Kicinski 
358c541b734SPrashant Bhole 	if (show_pinned)
3594990f1f4SPrashant Bhole 		build_pinned_obj_table(&prog_table, BPF_OBJ_PROG);
3604990f1f4SPrashant Bhole 
36171bb428fSJakub Kicinski 	if (argc == 2) {
36271bb428fSJakub Kicinski 		fd = prog_parse_fd(&argc, &argv);
36371bb428fSJakub Kicinski 		if (fd < 0)
36471bb428fSJakub Kicinski 			return -1;
36571bb428fSJakub Kicinski 
36671bb428fSJakub Kicinski 		return show_prog(fd);
36771bb428fSJakub Kicinski 	}
36871bb428fSJakub Kicinski 
36971bb428fSJakub Kicinski 	if (argc)
37071bb428fSJakub Kicinski 		return BAD_ARG();
37171bb428fSJakub Kicinski 
372743cc665SQuentin Monnet 	if (json_output)
373743cc665SQuentin Monnet 		jsonw_start_array(json_wtr);
37471bb428fSJakub Kicinski 	while (true) {
37571bb428fSJakub Kicinski 		err = bpf_prog_get_next_id(id, &id);
37671bb428fSJakub Kicinski 		if (err) {
3771739c26dSQuentin Monnet 			if (errno == ENOENT) {
3781739c26dSQuentin Monnet 				err = 0;
37971bb428fSJakub Kicinski 				break;
3801739c26dSQuentin Monnet 			}
3819a5ab8bfSQuentin Monnet 			p_err("can't get next program: %s%s", strerror(errno),
3829a5ab8bfSQuentin Monnet 			      errno == EINVAL ? " -- kernel too old?" : "");
383743cc665SQuentin Monnet 			err = -1;
384743cc665SQuentin Monnet 			break;
38571bb428fSJakub Kicinski 		}
38671bb428fSJakub Kicinski 
38771bb428fSJakub Kicinski 		fd = bpf_prog_get_fd_by_id(id);
38871bb428fSJakub Kicinski 		if (fd < 0) {
3898207c6ddSJakub Kicinski 			if (errno == ENOENT)
3908207c6ddSJakub Kicinski 				continue;
3919a5ab8bfSQuentin Monnet 			p_err("can't get prog by id (%u): %s",
39271bb428fSJakub Kicinski 			      id, strerror(errno));
393743cc665SQuentin Monnet 			err = -1;
394743cc665SQuentin Monnet 			break;
39571bb428fSJakub Kicinski 		}
39671bb428fSJakub Kicinski 
39771bb428fSJakub Kicinski 		err = show_prog(fd);
39871bb428fSJakub Kicinski 		close(fd);
39971bb428fSJakub Kicinski 		if (err)
400743cc665SQuentin Monnet 			break;
40171bb428fSJakub Kicinski 	}
40271bb428fSJakub Kicinski 
403743cc665SQuentin Monnet 	if (json_output)
404743cc665SQuentin Monnet 		jsonw_end_array(json_wtr);
405743cc665SQuentin Monnet 
406743cc665SQuentin Monnet 	return err;
40771bb428fSJakub Kicinski }
40871bb428fSJakub Kicinski 
4097105e828SDaniel Borkmann #define SYM_MAX_NAME	256
4107105e828SDaniel Borkmann 
4117105e828SDaniel Borkmann struct kernel_sym {
4127105e828SDaniel Borkmann 	unsigned long address;
4137105e828SDaniel Borkmann 	char name[SYM_MAX_NAME];
4147105e828SDaniel Borkmann };
4157105e828SDaniel Borkmann 
4167105e828SDaniel Borkmann struct dump_data {
4177105e828SDaniel Borkmann 	unsigned long address_call_base;
4187105e828SDaniel Borkmann 	struct kernel_sym *sym_mapping;
4197105e828SDaniel Borkmann 	__u32 sym_count;
4207105e828SDaniel Borkmann 	char scratch_buff[SYM_MAX_NAME];
4217105e828SDaniel Borkmann };
4227105e828SDaniel Borkmann 
4237105e828SDaniel Borkmann static int kernel_syms_cmp(const void *sym_a, const void *sym_b)
4247105e828SDaniel Borkmann {
4257105e828SDaniel Borkmann 	return ((struct kernel_sym *)sym_a)->address -
4267105e828SDaniel Borkmann 	       ((struct kernel_sym *)sym_b)->address;
4277105e828SDaniel Borkmann }
4287105e828SDaniel Borkmann 
4297105e828SDaniel Borkmann static void kernel_syms_load(struct dump_data *dd)
4307105e828SDaniel Borkmann {
4317105e828SDaniel Borkmann 	struct kernel_sym *sym;
4327105e828SDaniel Borkmann 	char buff[256];
4337105e828SDaniel Borkmann 	void *tmp, *address;
4347105e828SDaniel Borkmann 	FILE *fp;
4357105e828SDaniel Borkmann 
4367105e828SDaniel Borkmann 	fp = fopen("/proc/kallsyms", "r");
4377105e828SDaniel Borkmann 	if (!fp)
4387105e828SDaniel Borkmann 		return;
4397105e828SDaniel Borkmann 
4407105e828SDaniel Borkmann 	while (!feof(fp)) {
4417105e828SDaniel Borkmann 		if (!fgets(buff, sizeof(buff), fp))
4427105e828SDaniel Borkmann 			break;
4437105e828SDaniel Borkmann 		tmp = realloc(dd->sym_mapping,
4447105e828SDaniel Borkmann 			      (dd->sym_count + 1) *
4457105e828SDaniel Borkmann 			      sizeof(*dd->sym_mapping));
4467105e828SDaniel Borkmann 		if (!tmp) {
4477105e828SDaniel Borkmann out:
4487105e828SDaniel Borkmann 			free(dd->sym_mapping);
4497105e828SDaniel Borkmann 			dd->sym_mapping = NULL;
4507105e828SDaniel Borkmann 			fclose(fp);
4517105e828SDaniel Borkmann 			return;
4527105e828SDaniel Borkmann 		}
4537105e828SDaniel Borkmann 		dd->sym_mapping = tmp;
4547105e828SDaniel Borkmann 		sym = &dd->sym_mapping[dd->sym_count];
4557105e828SDaniel Borkmann 		if (sscanf(buff, "%p %*c %s", &address, sym->name) != 2)
4567105e828SDaniel Borkmann 			continue;
4577105e828SDaniel Borkmann 		sym->address = (unsigned long)address;
4587105e828SDaniel Borkmann 		if (!strcmp(sym->name, "__bpf_call_base")) {
4597105e828SDaniel Borkmann 			dd->address_call_base = sym->address;
4607105e828SDaniel Borkmann 			/* sysctl kernel.kptr_restrict was set */
4617105e828SDaniel Borkmann 			if (!sym->address)
4627105e828SDaniel Borkmann 				goto out;
4637105e828SDaniel Borkmann 		}
4647105e828SDaniel Borkmann 		if (sym->address)
4657105e828SDaniel Borkmann 			dd->sym_count++;
4667105e828SDaniel Borkmann 	}
4677105e828SDaniel Borkmann 
4687105e828SDaniel Borkmann 	fclose(fp);
4697105e828SDaniel Borkmann 
4707105e828SDaniel Borkmann 	qsort(dd->sym_mapping, dd->sym_count,
4717105e828SDaniel Borkmann 	      sizeof(*dd->sym_mapping), kernel_syms_cmp);
4727105e828SDaniel Borkmann }
4737105e828SDaniel Borkmann 
4747105e828SDaniel Borkmann static void kernel_syms_destroy(struct dump_data *dd)
4757105e828SDaniel Borkmann {
4767105e828SDaniel Borkmann 	free(dd->sym_mapping);
4777105e828SDaniel Borkmann }
4787105e828SDaniel Borkmann 
4797105e828SDaniel Borkmann static struct kernel_sym *kernel_syms_search(struct dump_data *dd,
4807105e828SDaniel Borkmann 					     unsigned long key)
4817105e828SDaniel Borkmann {
4827105e828SDaniel Borkmann 	struct kernel_sym sym = {
4837105e828SDaniel Borkmann 		.address = key,
4847105e828SDaniel Borkmann 	};
4857105e828SDaniel Borkmann 
4867105e828SDaniel Borkmann 	return dd->sym_mapping ?
4877105e828SDaniel Borkmann 	       bsearch(&sym, dd->sym_mapping, dd->sym_count,
4887105e828SDaniel Borkmann 		       sizeof(*dd->sym_mapping), kernel_syms_cmp) : NULL;
4897105e828SDaniel Borkmann }
4907105e828SDaniel Borkmann 
491c9c35995SJakub Kicinski static void print_insn(struct bpf_verifier_env *env, const char *fmt, ...)
492c9c35995SJakub Kicinski {
493c9c35995SJakub Kicinski 	va_list args;
494c9c35995SJakub Kicinski 
495c9c35995SJakub Kicinski 	va_start(args, fmt);
496c9c35995SJakub Kicinski 	vprintf(fmt, args);
497c9c35995SJakub Kicinski 	va_end(args);
498c9c35995SJakub Kicinski }
499c9c35995SJakub Kicinski 
5007105e828SDaniel Borkmann static const char *print_call_pcrel(struct dump_data *dd,
5017105e828SDaniel Borkmann 				    struct kernel_sym *sym,
5027105e828SDaniel Borkmann 				    unsigned long address,
5037105e828SDaniel Borkmann 				    const struct bpf_insn *insn)
504c9c35995SJakub Kicinski {
5057105e828SDaniel Borkmann 	if (sym)
5067105e828SDaniel Borkmann 		snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
5077105e828SDaniel Borkmann 			 "%+d#%s", insn->off, sym->name);
5087105e828SDaniel Borkmann 	else
5097105e828SDaniel Borkmann 		snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
5107105e828SDaniel Borkmann 			 "%+d#0x%lx", insn->off, address);
5117105e828SDaniel Borkmann 	return dd->scratch_buff;
5127105e828SDaniel Borkmann }
5137105e828SDaniel Borkmann 
5147105e828SDaniel Borkmann static const char *print_call_helper(struct dump_data *dd,
5157105e828SDaniel Borkmann 				     struct kernel_sym *sym,
5167105e828SDaniel Borkmann 				     unsigned long address)
5177105e828SDaniel Borkmann {
5187105e828SDaniel Borkmann 	if (sym)
5197105e828SDaniel Borkmann 		snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
5207105e828SDaniel Borkmann 			 "%s", sym->name);
5217105e828SDaniel Borkmann 	else
5227105e828SDaniel Borkmann 		snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
5237105e828SDaniel Borkmann 			 "0x%lx", address);
5247105e828SDaniel Borkmann 	return dd->scratch_buff;
5257105e828SDaniel Borkmann }
5267105e828SDaniel Borkmann 
5277105e828SDaniel Borkmann static const char *print_call(void *private_data,
5287105e828SDaniel Borkmann 			      const struct bpf_insn *insn)
5297105e828SDaniel Borkmann {
5307105e828SDaniel Borkmann 	struct dump_data *dd = private_data;
5317105e828SDaniel Borkmann 	unsigned long address = dd->address_call_base + insn->imm;
5327105e828SDaniel Borkmann 	struct kernel_sym *sym;
5337105e828SDaniel Borkmann 
5347105e828SDaniel Borkmann 	sym = kernel_syms_search(dd, address);
5357105e828SDaniel Borkmann 	if (insn->src_reg == BPF_PSEUDO_CALL)
5367105e828SDaniel Borkmann 		return print_call_pcrel(dd, sym, address, insn);
5377105e828SDaniel Borkmann 	else
5387105e828SDaniel Borkmann 		return print_call_helper(dd, sym, address);
5397105e828SDaniel Borkmann }
5407105e828SDaniel Borkmann 
5417105e828SDaniel Borkmann static const char *print_imm(void *private_data,
5427105e828SDaniel Borkmann 			     const struct bpf_insn *insn,
5437105e828SDaniel Borkmann 			     __u64 full_imm)
5447105e828SDaniel Borkmann {
5457105e828SDaniel Borkmann 	struct dump_data *dd = private_data;
5467105e828SDaniel Borkmann 
5477105e828SDaniel Borkmann 	if (insn->src_reg == BPF_PSEUDO_MAP_FD)
5487105e828SDaniel Borkmann 		snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
5497105e828SDaniel Borkmann 			 "map[id:%u]", insn->imm);
5507105e828SDaniel Borkmann 	else
5517105e828SDaniel Borkmann 		snprintf(dd->scratch_buff, sizeof(dd->scratch_buff),
5527105e828SDaniel Borkmann 			 "0x%llx", (unsigned long long)full_imm);
5537105e828SDaniel Borkmann 	return dd->scratch_buff;
5547105e828SDaniel Borkmann }
5557105e828SDaniel Borkmann 
5567105e828SDaniel Borkmann static void dump_xlated_plain(struct dump_data *dd, void *buf,
5577105e828SDaniel Borkmann 			      unsigned int len, bool opcodes)
5587105e828SDaniel Borkmann {
5597105e828SDaniel Borkmann 	const struct bpf_insn_cbs cbs = {
5607105e828SDaniel Borkmann 		.cb_print	= print_insn,
5617105e828SDaniel Borkmann 		.cb_call	= print_call,
5627105e828SDaniel Borkmann 		.cb_imm		= print_imm,
5637105e828SDaniel Borkmann 		.private_data	= dd,
5647105e828SDaniel Borkmann 	};
565c9c35995SJakub Kicinski 	struct bpf_insn *insn = buf;
5669e2308c1SQuentin Monnet 	bool double_insn = false;
567c9c35995SJakub Kicinski 	unsigned int i;
568c9c35995SJakub Kicinski 
569c9c35995SJakub Kicinski 	for (i = 0; i < len / sizeof(*insn); i++) {
5709e2308c1SQuentin Monnet 		if (double_insn) {
5719e2308c1SQuentin Monnet 			double_insn = false;
5729e2308c1SQuentin Monnet 			continue;
5739e2308c1SQuentin Monnet 		}
5749e2308c1SQuentin Monnet 
5759e2308c1SQuentin Monnet 		double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);
5769e2308c1SQuentin Monnet 
577c9c35995SJakub Kicinski 		printf("% 4d: ", i);
5787105e828SDaniel Borkmann 		print_bpf_insn(&cbs, NULL, insn + i, true);
579c9c35995SJakub Kicinski 
580c9c35995SJakub Kicinski 		if (opcodes) {
581c9c35995SJakub Kicinski 			printf("       ");
5829cbe1f58SQuentin Monnet 			fprint_hex(stdout, insn + i, 8, " ");
5839e2308c1SQuentin Monnet 			if (double_insn && i < len - 1) {
5849e2308c1SQuentin Monnet 				printf(" ");
5859e2308c1SQuentin Monnet 				fprint_hex(stdout, insn + i + 1, 8, " ");
5869e2308c1SQuentin Monnet 			}
587c9c35995SJakub Kicinski 			printf("\n");
588c9c35995SJakub Kicinski 		}
589c9c35995SJakub Kicinski 	}
590c9c35995SJakub Kicinski }
591c9c35995SJakub Kicinski 
592f05e2c32SQuentin Monnet static void print_insn_json(struct bpf_verifier_env *env, const char *fmt, ...)
593f05e2c32SQuentin Monnet {
594f05e2c32SQuentin Monnet 	unsigned int l = strlen(fmt);
595f05e2c32SQuentin Monnet 	char chomped_fmt[l];
596f05e2c32SQuentin Monnet 	va_list args;
597f05e2c32SQuentin Monnet 
598f05e2c32SQuentin Monnet 	va_start(args, fmt);
599f05e2c32SQuentin Monnet 	if (l > 0) {
600f05e2c32SQuentin Monnet 		strncpy(chomped_fmt, fmt, l - 1);
601f05e2c32SQuentin Monnet 		chomped_fmt[l - 1] = '\0';
602f05e2c32SQuentin Monnet 	}
603f05e2c32SQuentin Monnet 	jsonw_vprintf_enquote(json_wtr, chomped_fmt, args);
604f05e2c32SQuentin Monnet 	va_end(args);
605f05e2c32SQuentin Monnet }
606f05e2c32SQuentin Monnet 
6077105e828SDaniel Borkmann static void dump_xlated_json(struct dump_data *dd, void *buf,
6087105e828SDaniel Borkmann 			     unsigned int len, bool opcodes)
609f05e2c32SQuentin Monnet {
6107105e828SDaniel Borkmann 	const struct bpf_insn_cbs cbs = {
6117105e828SDaniel Borkmann 		.cb_print	= print_insn_json,
6127105e828SDaniel Borkmann 		.cb_call	= print_call,
6137105e828SDaniel Borkmann 		.cb_imm		= print_imm,
6147105e828SDaniel Borkmann 		.private_data	= dd,
6157105e828SDaniel Borkmann 	};
616f05e2c32SQuentin Monnet 	struct bpf_insn *insn = buf;
617f05e2c32SQuentin Monnet 	bool double_insn = false;
618f05e2c32SQuentin Monnet 	unsigned int i;
619f05e2c32SQuentin Monnet 
620f05e2c32SQuentin Monnet 	jsonw_start_array(json_wtr);
621f05e2c32SQuentin Monnet 	for (i = 0; i < len / sizeof(*insn); i++) {
622f05e2c32SQuentin Monnet 		if (double_insn) {
623f05e2c32SQuentin Monnet 			double_insn = false;
624f05e2c32SQuentin Monnet 			continue;
625f05e2c32SQuentin Monnet 		}
626f05e2c32SQuentin Monnet 		double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);
627f05e2c32SQuentin Monnet 
628f05e2c32SQuentin Monnet 		jsonw_start_object(json_wtr);
629f05e2c32SQuentin Monnet 		jsonw_name(json_wtr, "disasm");
6307105e828SDaniel Borkmann 		print_bpf_insn(&cbs, NULL, insn + i, true);
631f05e2c32SQuentin Monnet 
632f05e2c32SQuentin Monnet 		if (opcodes) {
633f05e2c32SQuentin Monnet 			jsonw_name(json_wtr, "opcodes");
634f05e2c32SQuentin Monnet 			jsonw_start_object(json_wtr);
635f05e2c32SQuentin Monnet 
636f05e2c32SQuentin Monnet 			jsonw_name(json_wtr, "code");
637f05e2c32SQuentin Monnet 			jsonw_printf(json_wtr, "\"0x%02hhx\"", insn[i].code);
638f05e2c32SQuentin Monnet 
639f05e2c32SQuentin Monnet 			jsonw_name(json_wtr, "src_reg");
640f05e2c32SQuentin Monnet 			jsonw_printf(json_wtr, "\"0x%hhx\"", insn[i].src_reg);
641f05e2c32SQuentin Monnet 
642f05e2c32SQuentin Monnet 			jsonw_name(json_wtr, "dst_reg");
643f05e2c32SQuentin Monnet 			jsonw_printf(json_wtr, "\"0x%hhx\"", insn[i].dst_reg);
644f05e2c32SQuentin Monnet 
645f05e2c32SQuentin Monnet 			jsonw_name(json_wtr, "off");
646f05e2c32SQuentin Monnet 			print_hex_data_json((uint8_t *)(&insn[i].off), 2);
647f05e2c32SQuentin Monnet 
648f05e2c32SQuentin Monnet 			jsonw_name(json_wtr, "imm");
649f05e2c32SQuentin Monnet 			if (double_insn && i < len - 1)
650f05e2c32SQuentin Monnet 				print_hex_data_json((uint8_t *)(&insn[i].imm),
651f05e2c32SQuentin Monnet 						    12);
652f05e2c32SQuentin Monnet 			else
653f05e2c32SQuentin Monnet 				print_hex_data_json((uint8_t *)(&insn[i].imm),
654f05e2c32SQuentin Monnet 						    4);
655f05e2c32SQuentin Monnet 			jsonw_end_object(json_wtr);
656f05e2c32SQuentin Monnet 		}
657f05e2c32SQuentin Monnet 		jsonw_end_object(json_wtr);
658f05e2c32SQuentin Monnet 	}
659f05e2c32SQuentin Monnet 	jsonw_end_array(json_wtr);
660f05e2c32SQuentin Monnet }
661f05e2c32SQuentin Monnet 
66271bb428fSJakub Kicinski static int do_dump(int argc, char **argv)
66371bb428fSJakub Kicinski {
66471bb428fSJakub Kicinski 	struct bpf_prog_info info = {};
6657105e828SDaniel Borkmann 	struct dump_data dd = {};
66671bb428fSJakub Kicinski 	__u32 len = sizeof(info);
66771bb428fSJakub Kicinski 	unsigned int buf_size;
66871bb428fSJakub Kicinski 	char *filepath = NULL;
66971bb428fSJakub Kicinski 	bool opcodes = false;
67071bb428fSJakub Kicinski 	unsigned char *buf;
67171bb428fSJakub Kicinski 	__u32 *member_len;
67271bb428fSJakub Kicinski 	__u64 *member_ptr;
67371bb428fSJakub Kicinski 	ssize_t n;
67471bb428fSJakub Kicinski 	int err;
67571bb428fSJakub Kicinski 	int fd;
67671bb428fSJakub Kicinski 
67771bb428fSJakub Kicinski 	if (is_prefix(*argv, "jited")) {
67871bb428fSJakub Kicinski 		member_len = &info.jited_prog_len;
67971bb428fSJakub Kicinski 		member_ptr = &info.jited_prog_insns;
68071bb428fSJakub Kicinski 	} else if (is_prefix(*argv, "xlated")) {
68171bb428fSJakub Kicinski 		member_len = &info.xlated_prog_len;
68271bb428fSJakub Kicinski 		member_ptr = &info.xlated_prog_insns;
68371bb428fSJakub Kicinski 	} else {
6849a5ab8bfSQuentin Monnet 		p_err("expected 'xlated' or 'jited', got: %s", *argv);
68571bb428fSJakub Kicinski 		return -1;
68671bb428fSJakub Kicinski 	}
68771bb428fSJakub Kicinski 	NEXT_ARG();
68871bb428fSJakub Kicinski 
68971bb428fSJakub Kicinski 	if (argc < 2)
69071bb428fSJakub Kicinski 		usage();
69171bb428fSJakub Kicinski 
69271bb428fSJakub Kicinski 	fd = prog_parse_fd(&argc, &argv);
69371bb428fSJakub Kicinski 	if (fd < 0)
69471bb428fSJakub Kicinski 		return -1;
69571bb428fSJakub Kicinski 
69671bb428fSJakub Kicinski 	if (is_prefix(*argv, "file")) {
69771bb428fSJakub Kicinski 		NEXT_ARG();
69871bb428fSJakub Kicinski 		if (!argc) {
6999a5ab8bfSQuentin Monnet 			p_err("expected file path");
70071bb428fSJakub Kicinski 			return -1;
70171bb428fSJakub Kicinski 		}
70271bb428fSJakub Kicinski 
70371bb428fSJakub Kicinski 		filepath = *argv;
70471bb428fSJakub Kicinski 		NEXT_ARG();
70571bb428fSJakub Kicinski 	} else if (is_prefix(*argv, "opcodes")) {
70671bb428fSJakub Kicinski 		opcodes = true;
70771bb428fSJakub Kicinski 		NEXT_ARG();
70871bb428fSJakub Kicinski 	}
70971bb428fSJakub Kicinski 
71071bb428fSJakub Kicinski 	if (argc) {
71171bb428fSJakub Kicinski 		usage();
71271bb428fSJakub Kicinski 		return -1;
71371bb428fSJakub Kicinski 	}
71471bb428fSJakub Kicinski 
71571bb428fSJakub Kicinski 	err = bpf_obj_get_info_by_fd(fd, &info, &len);
71671bb428fSJakub Kicinski 	if (err) {
7179a5ab8bfSQuentin Monnet 		p_err("can't get prog info: %s", strerror(errno));
71871bb428fSJakub Kicinski 		return -1;
71971bb428fSJakub Kicinski 	}
72071bb428fSJakub Kicinski 
72171bb428fSJakub Kicinski 	if (!*member_len) {
7229a5ab8bfSQuentin Monnet 		p_info("no instructions returned");
72371bb428fSJakub Kicinski 		close(fd);
72471bb428fSJakub Kicinski 		return 0;
72571bb428fSJakub Kicinski 	}
72671bb428fSJakub Kicinski 
72771bb428fSJakub Kicinski 	buf_size = *member_len;
72871bb428fSJakub Kicinski 
72971bb428fSJakub Kicinski 	buf = malloc(buf_size);
73071bb428fSJakub Kicinski 	if (!buf) {
7319a5ab8bfSQuentin Monnet 		p_err("mem alloc failed");
73271bb428fSJakub Kicinski 		close(fd);
73371bb428fSJakub Kicinski 		return -1;
73471bb428fSJakub Kicinski 	}
73571bb428fSJakub Kicinski 
73671bb428fSJakub Kicinski 	memset(&info, 0, sizeof(info));
73771bb428fSJakub Kicinski 
73871bb428fSJakub Kicinski 	*member_ptr = ptr_to_u64(buf);
73971bb428fSJakub Kicinski 	*member_len = buf_size;
74071bb428fSJakub Kicinski 
74171bb428fSJakub Kicinski 	err = bpf_obj_get_info_by_fd(fd, &info, &len);
74271bb428fSJakub Kicinski 	close(fd);
74371bb428fSJakub Kicinski 	if (err) {
7449a5ab8bfSQuentin Monnet 		p_err("can't get prog info: %s", strerror(errno));
74571bb428fSJakub Kicinski 		goto err_free;
74671bb428fSJakub Kicinski 	}
74771bb428fSJakub Kicinski 
74871bb428fSJakub Kicinski 	if (*member_len > buf_size) {
7499a5ab8bfSQuentin Monnet 		p_err("too many instructions returned");
75071bb428fSJakub Kicinski 		goto err_free;
75171bb428fSJakub Kicinski 	}
75271bb428fSJakub Kicinski 
7537105e828SDaniel Borkmann 	if ((member_len == &info.jited_prog_len &&
7547105e828SDaniel Borkmann 	     info.jited_prog_insns == 0) ||
7557105e828SDaniel Borkmann 	    (member_len == &info.xlated_prog_len &&
7567105e828SDaniel Borkmann 	     info.xlated_prog_insns == 0)) {
7577105e828SDaniel Borkmann 		p_err("error retrieving insn dump: kernel.kptr_restrict set?");
7587105e828SDaniel Borkmann 		goto err_free;
7597105e828SDaniel Borkmann 	}
7607105e828SDaniel Borkmann 
76171bb428fSJakub Kicinski 	if (filepath) {
76271bb428fSJakub Kicinski 		fd = open(filepath, O_WRONLY | O_CREAT | O_TRUNC, 0600);
76371bb428fSJakub Kicinski 		if (fd < 0) {
7649a5ab8bfSQuentin Monnet 			p_err("can't open file %s: %s", filepath,
76571bb428fSJakub Kicinski 			      strerror(errno));
76671bb428fSJakub Kicinski 			goto err_free;
76771bb428fSJakub Kicinski 		}
76871bb428fSJakub Kicinski 
76971bb428fSJakub Kicinski 		n = write(fd, buf, *member_len);
77071bb428fSJakub Kicinski 		close(fd);
77171bb428fSJakub Kicinski 		if (n != *member_len) {
7729a5ab8bfSQuentin Monnet 			p_err("error writing output file: %s",
77371bb428fSJakub Kicinski 			      n < 0 ? strerror(errno) : "short write");
77471bb428fSJakub Kicinski 			goto err_free;
77571bb428fSJakub Kicinski 		}
77671bb428fSJakub Kicinski 	} else {
7777105e828SDaniel Borkmann 		if (member_len == &info.jited_prog_len) {
77871bb428fSJakub Kicinski 			disasm_print_insn(buf, *member_len, opcodes);
7797105e828SDaniel Borkmann 		} else {
7807105e828SDaniel Borkmann 			kernel_syms_load(&dd);
781f05e2c32SQuentin Monnet 			if (json_output)
7827105e828SDaniel Borkmann 				dump_xlated_json(&dd, buf, *member_len, opcodes);
783f05e2c32SQuentin Monnet 			else
7847105e828SDaniel Borkmann 				dump_xlated_plain(&dd, buf, *member_len, opcodes);
7857105e828SDaniel Borkmann 			kernel_syms_destroy(&dd);
7867105e828SDaniel Borkmann 		}
78771bb428fSJakub Kicinski 	}
78871bb428fSJakub Kicinski 
78971bb428fSJakub Kicinski 	free(buf);
79071bb428fSJakub Kicinski 	return 0;
79171bb428fSJakub Kicinski 
79271bb428fSJakub Kicinski err_free:
79371bb428fSJakub Kicinski 	free(buf);
79471bb428fSJakub Kicinski 	return -1;
79571bb428fSJakub Kicinski }
79671bb428fSJakub Kicinski 
79771bb428fSJakub Kicinski static int do_pin(int argc, char **argv)
79871bb428fSJakub Kicinski {
799004b45c0SQuentin Monnet 	int err;
800004b45c0SQuentin Monnet 
801004b45c0SQuentin Monnet 	err = do_pin_any(argc, argv, bpf_prog_get_fd_by_id);
802004b45c0SQuentin Monnet 	if (!err && json_output)
803004b45c0SQuentin Monnet 		jsonw_null(json_wtr);
804004b45c0SQuentin Monnet 	return err;
80571bb428fSJakub Kicinski }
80671bb428fSJakub Kicinski 
80749a086c2SRoman Gushchin static int do_load(int argc, char **argv)
80849a086c2SRoman Gushchin {
80949a086c2SRoman Gushchin 	struct bpf_object *obj;
81049a086c2SRoman Gushchin 	int prog_fd;
81149a086c2SRoman Gushchin 
81249a086c2SRoman Gushchin 	if (argc != 2)
81349a086c2SRoman Gushchin 		usage();
81449a086c2SRoman Gushchin 
81549a086c2SRoman Gushchin 	if (bpf_prog_load(argv[0], BPF_PROG_TYPE_UNSPEC, &obj, &prog_fd)) {
81649a086c2SRoman Gushchin 		p_err("failed to load program\n");
81749a086c2SRoman Gushchin 		return -1;
81849a086c2SRoman Gushchin 	}
81949a086c2SRoman Gushchin 
82049a086c2SRoman Gushchin 	if (do_pin_fd(prog_fd, argv[1])) {
82149a086c2SRoman Gushchin 		p_err("failed to pin program\n");
82249a086c2SRoman Gushchin 		return -1;
82349a086c2SRoman Gushchin 	}
82449a086c2SRoman Gushchin 
82549a086c2SRoman Gushchin 	if (json_output)
82649a086c2SRoman Gushchin 		jsonw_null(json_wtr);
82749a086c2SRoman Gushchin 
82849a086c2SRoman Gushchin 	return 0;
82949a086c2SRoman Gushchin }
83049a086c2SRoman Gushchin 
83171bb428fSJakub Kicinski static int do_help(int argc, char **argv)
83271bb428fSJakub Kicinski {
833004b45c0SQuentin Monnet 	if (json_output) {
834004b45c0SQuentin Monnet 		jsonw_null(json_wtr);
835004b45c0SQuentin Monnet 		return 0;
836004b45c0SQuentin Monnet 	}
837004b45c0SQuentin Monnet 
83871bb428fSJakub Kicinski 	fprintf(stderr,
83971bb428fSJakub Kicinski 		"Usage: %s %s show [PROG]\n"
8408dfbc6d1SQuentin Monnet 		"       %s %s dump xlated PROG [{ file FILE | opcodes }]\n"
8418dfbc6d1SQuentin Monnet 		"       %s %s dump jited  PROG [{ file FILE | opcodes }]\n"
84271bb428fSJakub Kicinski 		"       %s %s pin   PROG FILE\n"
84349a086c2SRoman Gushchin 		"       %s %s load  OBJ  FILE\n"
84471bb428fSJakub Kicinski 		"       %s %s help\n"
84571bb428fSJakub Kicinski 		"\n"
84671bb428fSJakub Kicinski 		"       " HELP_SPEC_PROGRAM "\n"
8470641c3c8SQuentin Monnet 		"       " HELP_SPEC_OPTIONS "\n"
84871bb428fSJakub Kicinski 		"",
84971bb428fSJakub Kicinski 		bin_name, argv[-2], bin_name, argv[-2], bin_name, argv[-2],
85049a086c2SRoman Gushchin 		bin_name, argv[-2], bin_name, argv[-2], bin_name, argv[-2]);
85171bb428fSJakub Kicinski 
85271bb428fSJakub Kicinski 	return 0;
85371bb428fSJakub Kicinski }
85471bb428fSJakub Kicinski 
85571bb428fSJakub Kicinski static const struct cmd cmds[] = {
85671bb428fSJakub Kicinski 	{ "show",	do_show },
8579f606179SQuentin Monnet 	{ "help",	do_help },
85871bb428fSJakub Kicinski 	{ "dump",	do_dump },
85971bb428fSJakub Kicinski 	{ "pin",	do_pin },
86049a086c2SRoman Gushchin 	{ "load",	do_load },
86171bb428fSJakub Kicinski 	{ 0 }
86271bb428fSJakub Kicinski };
86371bb428fSJakub Kicinski 
86471bb428fSJakub Kicinski int do_prog(int argc, char **argv)
86571bb428fSJakub Kicinski {
86671bb428fSJakub Kicinski 	return cmd_select(cmds, argc, argv, do_help);
86771bb428fSJakub Kicinski }
868