xref: /linux/tools/bpf/bpftool/main.h (revision e9a36ca5f6f302675e7e36101ffa0ca7f9b8779b)
1 /* SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause) */
2 /* Copyright (C) 2017-2018 Netronome Systems, Inc. */
3 
4 #ifndef __BPF_TOOL_H
5 #define __BPF_TOOL_H
6 
7 /* BFD and kernel.h both define GCC_VERSION, differently */
8 #undef GCC_VERSION
9 #include <stdbool.h>
10 #include <stdio.h>
11 #include <linux/bpf.h>
12 #include <linux/compiler.h>
13 #include <linux/kernel.h>
14 #include <linux/hashtable.h>
15 #include <tools/libc_compat.h>
16 
17 #include <bpf/libbpf.h>
18 
19 #include "json_writer.h"
20 
21 /* Make sure we do not use kernel-only integer typedefs */
22 #pragma GCC poison u8 u16 u32 u64 s8 s16 s32 s64
23 
24 #define ptr_to_u64(ptr)	((__u64)(unsigned long)(ptr))
25 
26 #define NEXT_ARG()	({ argc--; argv++; if (argc < 0) usage(); })
27 #define NEXT_ARGP()	({ (*argc)--; (*argv)++; if (*argc < 0) usage(); })
28 #define BAD_ARG()	({ p_err("what is '%s'?", *argv); -1; })
29 #define GET_ARG()	({ argc--; *argv++; })
30 #define REQ_ARGS(cnt)							\
31 	({								\
32 		int _cnt = (cnt);					\
33 		bool _res;						\
34 									\
35 		if (argc < _cnt) {					\
36 			p_err("'%s' needs at least %d arguments, %d found", \
37 			      argv[-1], _cnt, argc);			\
38 			_res = false;					\
39 		} else {						\
40 			_res = true;					\
41 		}							\
42 		_res;							\
43 	})
44 
45 #define ERR_MAX_LEN	1024
46 
47 #define BPF_TAG_FMT	"%02hhx%02hhx%02hhx%02hhx%02hhx%02hhx%02hhx%02hhx"
48 
49 #define HELP_SPEC_PROGRAM						\
50 	"PROG := { id PROG_ID | pinned FILE | tag PROG_TAG | name PROG_NAME }"
51 #define HELP_SPEC_OPTIONS						\
52 	"OPTIONS := { {-j|--json} [{-p|--pretty}] | {-f|--bpffs} |\n"	\
53 	"\t            {-m|--mapcompat} | {-n|--nomount} }"
54 #define HELP_SPEC_MAP							\
55 	"MAP := { id MAP_ID | pinned FILE | name MAP_NAME }"
56 #define HELP_SPEC_LINK							\
57 	"LINK := { id LINK_ID | pinned FILE }"
58 
59 static const char * const prog_type_name[] = {
60 	[BPF_PROG_TYPE_UNSPEC]			= "unspec",
61 	[BPF_PROG_TYPE_SOCKET_FILTER]		= "socket_filter",
62 	[BPF_PROG_TYPE_KPROBE]			= "kprobe",
63 	[BPF_PROG_TYPE_SCHED_CLS]		= "sched_cls",
64 	[BPF_PROG_TYPE_SCHED_ACT]		= "sched_act",
65 	[BPF_PROG_TYPE_TRACEPOINT]		= "tracepoint",
66 	[BPF_PROG_TYPE_XDP]			= "xdp",
67 	[BPF_PROG_TYPE_PERF_EVENT]		= "perf_event",
68 	[BPF_PROG_TYPE_CGROUP_SKB]		= "cgroup_skb",
69 	[BPF_PROG_TYPE_CGROUP_SOCK]		= "cgroup_sock",
70 	[BPF_PROG_TYPE_LWT_IN]			= "lwt_in",
71 	[BPF_PROG_TYPE_LWT_OUT]			= "lwt_out",
72 	[BPF_PROG_TYPE_LWT_XMIT]		= "lwt_xmit",
73 	[BPF_PROG_TYPE_SOCK_OPS]		= "sock_ops",
74 	[BPF_PROG_TYPE_SK_SKB]			= "sk_skb",
75 	[BPF_PROG_TYPE_CGROUP_DEVICE]		= "cgroup_device",
76 	[BPF_PROG_TYPE_SK_MSG]			= "sk_msg",
77 	[BPF_PROG_TYPE_RAW_TRACEPOINT]		= "raw_tracepoint",
78 	[BPF_PROG_TYPE_CGROUP_SOCK_ADDR]	= "cgroup_sock_addr",
79 	[BPF_PROG_TYPE_LWT_SEG6LOCAL]		= "lwt_seg6local",
80 	[BPF_PROG_TYPE_LIRC_MODE2]		= "lirc_mode2",
81 	[BPF_PROG_TYPE_SK_REUSEPORT]		= "sk_reuseport",
82 	[BPF_PROG_TYPE_FLOW_DISSECTOR]		= "flow_dissector",
83 	[BPF_PROG_TYPE_CGROUP_SYSCTL]		= "cgroup_sysctl",
84 	[BPF_PROG_TYPE_RAW_TRACEPOINT_WRITABLE]	= "raw_tracepoint_writable",
85 	[BPF_PROG_TYPE_CGROUP_SOCKOPT]		= "cgroup_sockopt",
86 	[BPF_PROG_TYPE_TRACING]			= "tracing",
87 	[BPF_PROG_TYPE_STRUCT_OPS]		= "struct_ops",
88 	[BPF_PROG_TYPE_EXT]			= "ext",
89 };
90 
91 static const char * const attach_type_name[__MAX_BPF_ATTACH_TYPE] = {
92 	[BPF_CGROUP_INET_INGRESS] = "ingress",
93 	[BPF_CGROUP_INET_EGRESS] = "egress",
94 	[BPF_CGROUP_INET_SOCK_CREATE] = "sock_create",
95 	[BPF_CGROUP_SOCK_OPS] = "sock_ops",
96 	[BPF_CGROUP_DEVICE] = "device",
97 	[BPF_CGROUP_INET4_BIND] = "bind4",
98 	[BPF_CGROUP_INET6_BIND] = "bind6",
99 	[BPF_CGROUP_INET4_CONNECT] = "connect4",
100 	[BPF_CGROUP_INET6_CONNECT] = "connect6",
101 	[BPF_CGROUP_INET4_POST_BIND] = "post_bind4",
102 	[BPF_CGROUP_INET6_POST_BIND] = "post_bind6",
103 	[BPF_CGROUP_UDP4_SENDMSG] = "sendmsg4",
104 	[BPF_CGROUP_UDP6_SENDMSG] = "sendmsg6",
105 	[BPF_CGROUP_SYSCTL] = "sysctl",
106 	[BPF_CGROUP_UDP4_RECVMSG] = "recvmsg4",
107 	[BPF_CGROUP_UDP6_RECVMSG] = "recvmsg6",
108 	[BPF_CGROUP_GETSOCKOPT] = "getsockopt",
109 	[BPF_CGROUP_SETSOCKOPT] = "setsockopt",
110 
111 	[BPF_SK_SKB_STREAM_PARSER] = "sk_skb_stream_parser",
112 	[BPF_SK_SKB_STREAM_VERDICT] = "sk_skb_stream_verdict",
113 	[BPF_SK_MSG_VERDICT] = "sk_msg_verdict",
114 	[BPF_LIRC_MODE2] = "lirc_mode2",
115 	[BPF_FLOW_DISSECTOR] = "flow_dissector",
116 	[BPF_TRACE_RAW_TP] = "raw_tp",
117 	[BPF_TRACE_FENTRY] = "fentry",
118 	[BPF_TRACE_FEXIT] = "fexit",
119 	[BPF_MODIFY_RETURN] = "mod_ret",
120 	[BPF_LSM_MAC] = "lsm_mac",
121 };
122 
123 extern const char * const map_type_name[];
124 extern const size_t map_type_name_size;
125 
126 enum bpf_obj_type {
127 	BPF_OBJ_UNKNOWN,
128 	BPF_OBJ_PROG,
129 	BPF_OBJ_MAP,
130 	BPF_OBJ_LINK,
131 };
132 
133 extern const char *bin_name;
134 
135 extern json_writer_t *json_wtr;
136 extern bool json_output;
137 extern bool show_pinned;
138 extern bool block_mount;
139 extern bool verifier_logs;
140 extern bool relaxed_maps;
141 extern struct pinned_obj_table prog_table;
142 extern struct pinned_obj_table map_table;
143 extern struct pinned_obj_table link_table;
144 
145 void __printf(1, 2) p_err(const char *fmt, ...);
146 void __printf(1, 2) p_info(const char *fmt, ...);
147 
148 bool is_prefix(const char *pfx, const char *str);
149 int detect_common_prefix(const char *arg, ...);
150 void fprint_hex(FILE *f, void *arg, unsigned int n, const char *sep);
151 void usage(void) __noreturn;
152 
153 void set_max_rlimit(void);
154 
155 int mount_tracefs(const char *target);
156 
157 struct pinned_obj_table {
158 	DECLARE_HASHTABLE(table, 16);
159 };
160 
161 struct pinned_obj {
162 	__u32 id;
163 	char *path;
164 	struct hlist_node hash;
165 };
166 
167 struct btf;
168 struct bpf_line_info;
169 
170 int build_pinned_obj_table(struct pinned_obj_table *table,
171 			   enum bpf_obj_type type);
172 void delete_pinned_obj_table(struct pinned_obj_table *tab);
173 void print_dev_plain(__u32 ifindex, __u64 ns_dev, __u64 ns_inode);
174 void print_dev_json(__u32 ifindex, __u64 ns_dev, __u64 ns_inode);
175 
176 struct cmd {
177 	const char *cmd;
178 	int (*func)(int argc, char **argv);
179 };
180 
181 int cmd_select(const struct cmd *cmds, int argc, char **argv,
182 	       int (*help)(int argc, char **argv));
183 
184 int get_fd_type(int fd);
185 const char *get_fd_type_name(enum bpf_obj_type type);
186 char *get_fdinfo(int fd, const char *key);
187 int open_obj_pinned(char *path, bool quiet);
188 int open_obj_pinned_any(char *path, enum bpf_obj_type exp_type);
189 int mount_bpffs_for_pin(const char *name);
190 int do_pin_any(int argc, char **argv, int (*get_fd_by_id)(int *, char ***));
191 int do_pin_fd(int fd, const char *name);
192 
193 int do_prog(int argc, char **arg);
194 int do_map(int argc, char **arg);
195 int do_link(int argc, char **arg);
196 int do_event_pipe(int argc, char **argv);
197 int do_cgroup(int argc, char **arg);
198 int do_perf(int argc, char **arg);
199 int do_net(int argc, char **arg);
200 int do_tracelog(int argc, char **arg);
201 int do_feature(int argc, char **argv);
202 int do_btf(int argc, char **argv);
203 int do_gen(int argc, char **argv);
204 int do_struct_ops(int argc, char **argv);
205 int do_iter(int argc, char **argv);
206 
207 int parse_u32_arg(int *argc, char ***argv, __u32 *val, const char *what);
208 int prog_parse_fd(int *argc, char ***argv);
209 int map_parse_fd(int *argc, char ***argv);
210 int map_parse_fd_and_info(int *argc, char ***argv, void *info, __u32 *info_len);
211 
212 struct bpf_prog_linfo;
213 #ifdef HAVE_LIBBFD_SUPPORT
214 void disasm_print_insn(unsigned char *image, ssize_t len, int opcodes,
215 		       const char *arch, const char *disassembler_options,
216 		       const struct btf *btf,
217 		       const struct bpf_prog_linfo *prog_linfo,
218 		       __u64 func_ksym, unsigned int func_idx,
219 		       bool linum);
220 int disasm_init(void);
221 #else
222 static inline
223 void disasm_print_insn(unsigned char *image, ssize_t len, int opcodes,
224 		       const char *arch, const char *disassembler_options,
225 		       const struct btf *btf,
226 		       const struct bpf_prog_linfo *prog_linfo,
227 		       __u64 func_ksym, unsigned int func_idx,
228 		       bool linum)
229 {
230 }
231 static inline int disasm_init(void)
232 {
233 	p_err("No libbfd support");
234 	return -1;
235 }
236 #endif
237 void print_data_json(uint8_t *data, size_t len);
238 void print_hex_data_json(uint8_t *data, size_t len);
239 
240 unsigned int get_page_size(void);
241 unsigned int get_possible_cpus(void);
242 const char *
243 ifindex_to_bfd_params(__u32 ifindex, __u64 ns_dev, __u64 ns_ino,
244 		      const char **opt);
245 
246 struct btf_dumper {
247 	const struct btf *btf;
248 	json_writer_t *jw;
249 	bool is_plain_text;
250 	bool prog_id_as_func_ptr;
251 };
252 
253 /* btf_dumper_type - print data along with type information
254  * @d: an instance containing context for dumping types
255  * @type_id: index in btf->types array. this points to the type to be dumped
256  * @data: pointer the actual data, i.e. the values to be printed
257  *
258  * Returns zero on success and negative error code otherwise
259  */
260 int btf_dumper_type(const struct btf_dumper *d, __u32 type_id,
261 		    const void *data);
262 void btf_dumper_type_only(const struct btf *btf, __u32 func_type_id,
263 			  char *func_only, int size);
264 
265 void btf_dump_linfo_plain(const struct btf *btf,
266 			  const struct bpf_line_info *linfo,
267 			  const char *prefix, bool linum);
268 void btf_dump_linfo_json(const struct btf *btf,
269 			 const struct bpf_line_info *linfo, bool linum);
270 
271 struct nlattr;
272 struct ifinfomsg;
273 struct tcmsg;
274 int do_xdp_dump(struct ifinfomsg *ifinfo, struct nlattr **tb);
275 int do_filter_dump(struct tcmsg *ifinfo, struct nlattr **tb, const char *kind,
276 		   const char *devname, int ifindex);
277 
278 int print_all_levels(__maybe_unused enum libbpf_print_level level,
279 		     const char *format, va_list args);
280 #endif
281