xref: /linux/tools/bpf/bpftool/map.c (revision d9104cec3e8fe4b458b74709853231385779001f)
1 // SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
2 /* Copyright (C) 2017-2018 Netronome Systems, Inc. */
3 
4 #include <errno.h>
5 #include <fcntl.h>
6 #include <linux/err.h>
7 #include <linux/kernel.h>
8 #include <net/if.h>
9 #include <stdbool.h>
10 #include <stdio.h>
11 #include <stdlib.h>
12 #include <string.h>
13 #include <unistd.h>
14 #include <sys/types.h>
15 #include <sys/stat.h>
16 
17 #include <bpf/bpf.h>
18 #include <bpf/btf.h>
19 #include <bpf/hashmap.h>
20 
21 #include "json_writer.h"
22 #include "main.h"
23 
24 static struct hashmap *map_table;
25 
map_is_per_cpu(__u32 type)26 static bool map_is_per_cpu(__u32 type)
27 {
28 	return type == BPF_MAP_TYPE_PERCPU_HASH ||
29 	       type == BPF_MAP_TYPE_PERCPU_ARRAY ||
30 	       type == BPF_MAP_TYPE_LRU_PERCPU_HASH ||
31 	       type == BPF_MAP_TYPE_PERCPU_CGROUP_STORAGE;
32 }
33 
map_is_map_of_maps(__u32 type)34 static bool map_is_map_of_maps(__u32 type)
35 {
36 	return type == BPF_MAP_TYPE_ARRAY_OF_MAPS ||
37 	       type == BPF_MAP_TYPE_HASH_OF_MAPS;
38 }
39 
map_is_map_of_progs(__u32 type)40 static bool map_is_map_of_progs(__u32 type)
41 {
42 	return type == BPF_MAP_TYPE_PROG_ARRAY;
43 }
44 
map_type_from_str(const char * type)45 static int map_type_from_str(const char *type)
46 {
47 	const char *map_type_str;
48 	unsigned int i;
49 
50 	for (i = 0; ; i++) {
51 		map_type_str = libbpf_bpf_map_type_str(i);
52 		if (!map_type_str)
53 			break;
54 
55 		/* Don't allow prefixing in case of possible future shadowing */
56 		if (!strcmp(map_type_str, type))
57 			return i;
58 	}
59 	return -1;
60 }
61 
alloc_value(struct bpf_map_info * info)62 static void *alloc_value(struct bpf_map_info *info)
63 {
64 	if (map_is_per_cpu(info->type))
65 		return malloc(round_up(info->value_size, 8) *
66 			      get_possible_cpus());
67 	else
68 		return malloc(info->value_size);
69 }
70 
do_dump_btf(const struct btf_dumper * d,struct bpf_map_info * map_info,void * key,void * value)71 static int do_dump_btf(const struct btf_dumper *d,
72 		       struct bpf_map_info *map_info, void *key,
73 		       void *value)
74 {
75 	__u32 value_id;
76 	int ret = 0;
77 
78 	/* start of key-value pair */
79 	jsonw_start_object(d->jw);
80 
81 	if (map_info->btf_key_type_id) {
82 		jsonw_name(d->jw, "key");
83 
84 		ret = btf_dumper_type(d, map_info->btf_key_type_id, key);
85 		if (ret)
86 			goto err_end_obj;
87 	}
88 
89 	value_id = map_info->btf_vmlinux_value_type_id ?
90 		: map_info->btf_value_type_id;
91 
92 	if (!map_is_per_cpu(map_info->type)) {
93 		jsonw_name(d->jw, "value");
94 		ret = btf_dumper_type(d, value_id, value);
95 	} else {
96 		unsigned int i, n, step;
97 
98 		jsonw_name(d->jw, "values");
99 		jsonw_start_array(d->jw);
100 		n = get_possible_cpus();
101 		step = round_up(map_info->value_size, 8);
102 		for (i = 0; i < n; i++) {
103 			jsonw_start_object(d->jw);
104 			jsonw_int_field(d->jw, "cpu", i);
105 			jsonw_name(d->jw, "value");
106 			ret = btf_dumper_type(d, value_id, value + i * step);
107 			jsonw_end_object(d->jw);
108 			if (ret)
109 				break;
110 		}
111 		jsonw_end_array(d->jw);
112 	}
113 
114 err_end_obj:
115 	/* end of key-value pair */
116 	jsonw_end_object(d->jw);
117 
118 	return ret;
119 }
120 
get_btf_writer(void)121 static json_writer_t *get_btf_writer(void)
122 {
123 	json_writer_t *jw = jsonw_new(stdout);
124 
125 	if (!jw)
126 		return NULL;
127 	jsonw_pretty(jw, true);
128 
129 	return jw;
130 }
131 
print_entry_json(struct bpf_map_info * info,unsigned char * key,unsigned char * value,struct btf * btf)132 static void print_entry_json(struct bpf_map_info *info, unsigned char *key,
133 			     unsigned char *value, struct btf *btf)
134 {
135 	jsonw_start_object(json_wtr);
136 
137 	if (!map_is_per_cpu(info->type)) {
138 		jsonw_name(json_wtr, "key");
139 		print_hex_data_json(key, info->key_size);
140 		jsonw_name(json_wtr, "value");
141 		print_hex_data_json(value, info->value_size);
142 		if (map_is_map_of_maps(info->type))
143 			jsonw_uint_field(json_wtr, "inner_map_id",
144 					 *(unsigned int *)value);
145 		if (btf) {
146 			struct btf_dumper d = {
147 				.btf = btf,
148 				.jw = json_wtr,
149 				.is_plain_text = false,
150 			};
151 
152 			jsonw_name(json_wtr, "formatted");
153 			do_dump_btf(&d, info, key, value);
154 		}
155 	} else {
156 		unsigned int i, n, step;
157 
158 		n = get_possible_cpus();
159 		step = round_up(info->value_size, 8);
160 
161 		jsonw_name(json_wtr, "key");
162 		print_hex_data_json(key, info->key_size);
163 
164 		jsonw_name(json_wtr, "values");
165 		jsonw_start_array(json_wtr);
166 		for (i = 0; i < n; i++) {
167 			jsonw_start_object(json_wtr);
168 
169 			jsonw_int_field(json_wtr, "cpu", i);
170 
171 			jsonw_name(json_wtr, "value");
172 			print_hex_data_json(value + i * step,
173 					    info->value_size);
174 
175 			jsonw_end_object(json_wtr);
176 		}
177 		jsonw_end_array(json_wtr);
178 		if (btf) {
179 			struct btf_dumper d = {
180 				.btf = btf,
181 				.jw = json_wtr,
182 				.is_plain_text = false,
183 			};
184 
185 			jsonw_name(json_wtr, "formatted");
186 			do_dump_btf(&d, info, key, value);
187 		}
188 	}
189 
190 	jsonw_end_object(json_wtr);
191 }
192 
193 static void
print_entry_error_msg(struct bpf_map_info * info,unsigned char * key,const char * error_msg)194 print_entry_error_msg(struct bpf_map_info *info, unsigned char *key,
195 		      const char *error_msg)
196 {
197 	int msg_size = strlen(error_msg);
198 	bool single_line, break_names;
199 
200 	break_names = info->key_size > 16 || msg_size > 16;
201 	single_line = info->key_size + msg_size <= 24 && !break_names;
202 
203 	printf("key:%c", break_names ? '\n' : ' ');
204 	fprint_hex(stdout, key, info->key_size, " ");
205 
206 	printf(single_line ? "  " : "\n");
207 
208 	printf("value:%c%s", break_names ? '\n' : ' ', error_msg);
209 
210 	printf("\n");
211 }
212 
213 static void
print_entry_error(struct bpf_map_info * map_info,void * key,int lookup_errno)214 print_entry_error(struct bpf_map_info *map_info, void *key, int lookup_errno)
215 {
216 	/* For prog_array maps or arrays of maps, failure to lookup the value
217 	 * means there is no entry for that key. Do not print an error message
218 	 * in that case.
219 	 */
220 	if ((map_is_map_of_maps(map_info->type) ||
221 	     map_is_map_of_progs(map_info->type)) && lookup_errno == ENOENT)
222 		return;
223 
224 	if (json_output) {
225 		jsonw_start_object(json_wtr);	/* entry */
226 		jsonw_name(json_wtr, "key");
227 		print_hex_data_json(key, map_info->key_size);
228 		jsonw_name(json_wtr, "value");
229 		jsonw_start_object(json_wtr);	/* error */
230 		jsonw_string_field(json_wtr, "error", strerror(lookup_errno));
231 		jsonw_end_object(json_wtr);	/* error */
232 		jsonw_end_object(json_wtr);	/* entry */
233 	} else {
234 		const char *msg = NULL;
235 
236 		if (lookup_errno == ENOENT)
237 			msg = "<no entry>";
238 		else if (lookup_errno == ENOSPC &&
239 			 map_info->type == BPF_MAP_TYPE_REUSEPORT_SOCKARRAY)
240 			msg = "<cannot read>";
241 
242 		print_entry_error_msg(map_info, key,
243 				      msg ? : strerror(lookup_errno));
244 	}
245 }
246 
print_entry_plain(struct bpf_map_info * info,unsigned char * key,unsigned char * value)247 static void print_entry_plain(struct bpf_map_info *info, unsigned char *key,
248 			      unsigned char *value)
249 {
250 	if (!map_is_per_cpu(info->type)) {
251 		bool single_line, break_names;
252 
253 		break_names = info->key_size > 16 || info->value_size > 16;
254 		single_line = info->key_size + info->value_size <= 24 &&
255 			!break_names;
256 
257 		if (info->key_size) {
258 			printf("key:%c", break_names ? '\n' : ' ');
259 			fprint_hex(stdout, key, info->key_size, " ");
260 
261 			printf(single_line ? "  " : "\n");
262 		}
263 
264 		if (info->value_size) {
265 			if (map_is_map_of_maps(info->type)) {
266 				printf("inner_map_id:%c", break_names ? '\n' : ' ');
267 				printf("%u ", *(unsigned int *)value);
268 			} else {
269 				printf("value:%c", break_names ? '\n' : ' ');
270 				fprint_hex(stdout, value, info->value_size, " ");
271 			}
272 		}
273 
274 		printf("\n");
275 	} else {
276 		unsigned int i, n, step;
277 
278 		n = get_possible_cpus();
279 		step = round_up(info->value_size, 8);
280 
281 		if (info->key_size) {
282 			printf("key:\n");
283 			fprint_hex(stdout, key, info->key_size, " ");
284 			printf("\n");
285 		}
286 		if (info->value_size) {
287 			for (i = 0; i < n; i++) {
288 				printf("value (CPU %02u):%c",
289 				       i, info->value_size > 16 ? '\n' : ' ');
290 				fprint_hex(stdout, value + i * step,
291 					   info->value_size, " ");
292 				printf("\n");
293 			}
294 		}
295 	}
296 }
297 
parse_bytes(char ** argv,const char * name,unsigned char * val,unsigned int n)298 static char **parse_bytes(char **argv, const char *name, unsigned char *val,
299 			  unsigned int n)
300 {
301 	unsigned int i = 0, base = 0;
302 	char *endptr;
303 
304 	if (is_prefix(*argv, "hex")) {
305 		base = 16;
306 		argv++;
307 	}
308 
309 	while (i < n && argv[i]) {
310 		val[i] = strtoul(argv[i], &endptr, base);
311 		if (*endptr) {
312 			p_err("error parsing byte: %s", argv[i]);
313 			return NULL;
314 		}
315 		i++;
316 	}
317 
318 	if (i != n) {
319 		p_err("%s expected %u bytes got %u", name, n, i);
320 		return NULL;
321 	}
322 
323 	return argv + i;
324 }
325 
326 /* on per cpu maps we must copy the provided value on all value instances */
fill_per_cpu_value(struct bpf_map_info * info,void * value)327 static void fill_per_cpu_value(struct bpf_map_info *info, void *value)
328 {
329 	unsigned int i, n, step;
330 
331 	if (!map_is_per_cpu(info->type))
332 		return;
333 
334 	n = get_possible_cpus();
335 	step = round_up(info->value_size, 8);
336 	for (i = 1; i < n; i++)
337 		memcpy(value + i * step, value, info->value_size);
338 }
339 
parse_elem(char ** argv,struct bpf_map_info * info,void * key,void * value,__u32 key_size,__u32 value_size,__u32 * flags,__u32 ** value_fd,__u32 open_flags)340 static int parse_elem(char **argv, struct bpf_map_info *info, void *key,
341 		      void *value, __u32 key_size, __u32 value_size,
342 		      __u32 *flags, __u32 **value_fd, __u32 open_flags)
343 {
344 	if (!*argv) {
345 		if (!key && !value)
346 			return 0;
347 		p_err("did not find %s", key ? "key" : "value");
348 		return -1;
349 	}
350 
351 	if (is_prefix(*argv, "key")) {
352 		if (!key) {
353 			if (key_size)
354 				p_err("duplicate key");
355 			else
356 				p_err("unnecessary key");
357 			return -1;
358 		}
359 
360 		argv = parse_bytes(argv + 1, "key", key, key_size);
361 		if (!argv)
362 			return -1;
363 
364 		return parse_elem(argv, info, NULL, value, key_size, value_size,
365 				  flags, value_fd, open_flags);
366 	} else if (is_prefix(*argv, "value")) {
367 		int fd;
368 
369 		if (!value) {
370 			if (value_size)
371 				p_err("duplicate value");
372 			else
373 				p_err("unnecessary value");
374 			return -1;
375 		}
376 
377 		argv++;
378 
379 		if (map_is_map_of_maps(info->type)) {
380 			int argc = 2;
381 
382 			if (value_size != 4) {
383 				p_err("value smaller than 4B for map in map?");
384 				return -1;
385 			}
386 			if (!argv[0] || !argv[1]) {
387 				p_err("not enough value arguments for map in map");
388 				return -1;
389 			}
390 
391 			fd = map_parse_fd(&argc, &argv, open_flags);
392 			if (fd < 0)
393 				return -1;
394 
395 			*value_fd = value;
396 			**value_fd = fd;
397 		} else if (map_is_map_of_progs(info->type)) {
398 			int argc = 2;
399 
400 			if (value_size != 4) {
401 				p_err("value smaller than 4B for map of progs?");
402 				return -1;
403 			}
404 			if (!argv[0] || !argv[1]) {
405 				p_err("not enough value arguments for map of progs");
406 				return -1;
407 			}
408 			if (is_prefix(*argv, "id"))
409 				p_info("Warning: updating program array via MAP_ID, make sure this map is kept open\n"
410 				       "         by some process or pinned otherwise update will be lost");
411 
412 			fd = prog_parse_fd(&argc, &argv);
413 			if (fd < 0)
414 				return -1;
415 
416 			*value_fd = value;
417 			**value_fd = fd;
418 		} else {
419 			argv = parse_bytes(argv, "value", value, value_size);
420 			if (!argv)
421 				return -1;
422 
423 			fill_per_cpu_value(info, value);
424 		}
425 
426 		return parse_elem(argv, info, key, NULL, key_size, value_size,
427 				  flags, NULL, open_flags);
428 	} else if (is_prefix(*argv, "any") || is_prefix(*argv, "noexist") ||
429 		   is_prefix(*argv, "exist")) {
430 		if (!flags) {
431 			p_err("flags specified multiple times: %s", *argv);
432 			return -1;
433 		}
434 
435 		if (is_prefix(*argv, "any"))
436 			*flags = BPF_ANY;
437 		else if (is_prefix(*argv, "noexist"))
438 			*flags = BPF_NOEXIST;
439 		else if (is_prefix(*argv, "exist"))
440 			*flags = BPF_EXIST;
441 
442 		return parse_elem(argv + 1, info, key, value, key_size,
443 				  value_size, NULL, value_fd, open_flags);
444 	}
445 
446 	p_err("expected key or value, got: %s", *argv);
447 	return -1;
448 }
449 
show_map_header_json(struct bpf_map_info * info,json_writer_t * wtr)450 static void show_map_header_json(struct bpf_map_info *info, json_writer_t *wtr)
451 {
452 	const char *map_type_str;
453 
454 	jsonw_uint_field(wtr, "id", info->id);
455 	map_type_str = libbpf_bpf_map_type_str(info->type);
456 	if (map_type_str)
457 		jsonw_string_field(wtr, "type", map_type_str);
458 	else
459 		jsonw_uint_field(wtr, "type", info->type);
460 
461 	if (*info->name)
462 		jsonw_string_field(wtr, "name", info->name);
463 
464 	jsonw_name(wtr, "flags");
465 	jsonw_printf(wtr, "%u", info->map_flags);
466 }
467 
show_map_close_json(int fd,struct bpf_map_info * info)468 static int show_map_close_json(int fd, struct bpf_map_info *info)
469 {
470 	char *memlock, *frozen_str;
471 	int frozen = 0;
472 
473 	memlock = get_fdinfo(fd, "memlock");
474 	frozen_str = get_fdinfo(fd, "frozen");
475 
476 	jsonw_start_object(json_wtr);
477 
478 	show_map_header_json(info, json_wtr);
479 
480 	print_dev_json(info->ifindex, info->netns_dev, info->netns_ino);
481 
482 	jsonw_uint_field(json_wtr, "bytes_key", info->key_size);
483 	jsonw_uint_field(json_wtr, "bytes_value", info->value_size);
484 	jsonw_uint_field(json_wtr, "max_entries", info->max_entries);
485 
486 	if (memlock)
487 		jsonw_int_field(json_wtr, "bytes_memlock", atoll(memlock));
488 	free(memlock);
489 
490 	if (info->type == BPF_MAP_TYPE_PROG_ARRAY) {
491 		char *owner_prog_type = get_fdinfo(fd, "owner_prog_type");
492 		char *owner_jited = get_fdinfo(fd, "owner_jited");
493 
494 		if (owner_prog_type) {
495 			unsigned int prog_type = atoi(owner_prog_type);
496 			const char *prog_type_str;
497 
498 			prog_type_str = libbpf_bpf_prog_type_str(prog_type);
499 			if (prog_type_str)
500 				jsonw_string_field(json_wtr, "owner_prog_type",
501 						   prog_type_str);
502 			else
503 				jsonw_uint_field(json_wtr, "owner_prog_type",
504 						 prog_type);
505 		}
506 		if (owner_jited)
507 			jsonw_bool_field(json_wtr, "owner_jited",
508 					 !!atoi(owner_jited));
509 
510 		free(owner_prog_type);
511 		free(owner_jited);
512 	}
513 	close(fd);
514 
515 	if (frozen_str) {
516 		frozen = atoi(frozen_str);
517 		free(frozen_str);
518 	}
519 	jsonw_int_field(json_wtr, "frozen", frozen);
520 
521 	if (info->btf_id)
522 		jsonw_int_field(json_wtr, "btf_id", info->btf_id);
523 
524 	if (!hashmap__empty(map_table)) {
525 		struct hashmap_entry *entry;
526 
527 		jsonw_name(json_wtr, "pinned");
528 		jsonw_start_array(json_wtr);
529 		hashmap__for_each_key_entry(map_table, entry, info->id)
530 			jsonw_string(json_wtr, entry->pvalue);
531 		jsonw_end_array(json_wtr);
532 	}
533 
534 	emit_obj_refs_json(refs_table, info->id, json_wtr);
535 
536 	jsonw_end_object(json_wtr);
537 
538 	return 0;
539 }
540 
show_map_header_plain(struct bpf_map_info * info)541 static void show_map_header_plain(struct bpf_map_info *info)
542 {
543 	const char *map_type_str;
544 
545 	printf("%u: ", info->id);
546 
547 	map_type_str = libbpf_bpf_map_type_str(info->type);
548 	if (map_type_str)
549 		printf("%s  ", map_type_str);
550 	else
551 		printf("type %u  ", info->type);
552 
553 	if (*info->name)
554 		printf("name %s  ", info->name);
555 
556 	printf("flags 0x%x", info->map_flags);
557 	print_dev_plain(info->ifindex, info->netns_dev, info->netns_ino);
558 	printf("\n");
559 }
560 
show_map_close_plain(int fd,struct bpf_map_info * info)561 static int show_map_close_plain(int fd, struct bpf_map_info *info)
562 {
563 	char *memlock, *frozen_str;
564 	int frozen = 0;
565 
566 	memlock = get_fdinfo(fd, "memlock");
567 	frozen_str = get_fdinfo(fd, "frozen");
568 
569 	show_map_header_plain(info);
570 	printf("\tkey %uB  value %uB  max_entries %u",
571 	       info->key_size, info->value_size, info->max_entries);
572 
573 	if (memlock)
574 		printf("  memlock %sB", memlock);
575 	free(memlock);
576 
577 	if (info->type == BPF_MAP_TYPE_PROG_ARRAY) {
578 		char *owner_prog_type = get_fdinfo(fd, "owner_prog_type");
579 		char *owner_jited = get_fdinfo(fd, "owner_jited");
580 
581 		if (owner_prog_type || owner_jited)
582 			printf("\n\t");
583 		if (owner_prog_type) {
584 			unsigned int prog_type = atoi(owner_prog_type);
585 			const char *prog_type_str;
586 
587 			prog_type_str = libbpf_bpf_prog_type_str(prog_type);
588 			if (prog_type_str)
589 				printf("owner_prog_type %s  ", prog_type_str);
590 			else
591 				printf("owner_prog_type %u  ", prog_type);
592 		}
593 		if (owner_jited)
594 			printf("owner%s jited",
595 			       atoi(owner_jited) ? "" : " not");
596 
597 		free(owner_prog_type);
598 		free(owner_jited);
599 	}
600 	close(fd);
601 
602 	if (!hashmap__empty(map_table)) {
603 		struct hashmap_entry *entry;
604 
605 		hashmap__for_each_key_entry(map_table, entry, info->id)
606 			printf("\n\tpinned %s", (char *)entry->pvalue);
607 	}
608 
609 	if (frozen_str) {
610 		frozen = atoi(frozen_str);
611 		free(frozen_str);
612 	}
613 
614 	if (info->btf_id || frozen)
615 		printf("\n\t");
616 
617 	if (info->btf_id)
618 		printf("btf_id %u", info->btf_id);
619 
620 	if (frozen)
621 		printf("%sfrozen", info->btf_id ? "  " : "");
622 
623 	emit_obj_refs_plain(refs_table, info->id, "\n\tpids ");
624 
625 	printf("\n");
626 	return 0;
627 }
628 
do_show_subset(int argc,char ** argv)629 static int do_show_subset(int argc, char **argv)
630 {
631 	struct bpf_map_info info = {};
632 	__u32 len = sizeof(info);
633 	int *fds = NULL;
634 	int nb_fds, i;
635 	int err = -1;
636 
637 	fds = malloc(sizeof(int));
638 	if (!fds) {
639 		p_err("mem alloc failed");
640 		return -1;
641 	}
642 	nb_fds = map_parse_fds(&argc, &argv, &fds, BPF_F_RDONLY);
643 	if (nb_fds < 1)
644 		goto exit_free;
645 
646 	if (json_output && nb_fds > 1)
647 		jsonw_start_array(json_wtr);	/* root array */
648 	for (i = 0; i < nb_fds; i++) {
649 		err = bpf_map_get_info_by_fd(fds[i], &info, &len);
650 		if (err) {
651 			p_err("can't get map info: %s",
652 			      strerror(errno));
653 			for (; i < nb_fds; i++)
654 				close(fds[i]);
655 			break;
656 		}
657 
658 		if (json_output)
659 			show_map_close_json(fds[i], &info);
660 		else
661 			show_map_close_plain(fds[i], &info);
662 
663 		close(fds[i]);
664 	}
665 	if (json_output && nb_fds > 1)
666 		jsonw_end_array(json_wtr);	/* root array */
667 
668 exit_free:
669 	free(fds);
670 	return err;
671 }
672 
do_show(int argc,char ** argv)673 static int do_show(int argc, char **argv)
674 {
675 	LIBBPF_OPTS(bpf_get_fd_by_id_opts, opts);
676 	struct bpf_map_info info = {};
677 	__u32 len = sizeof(info);
678 	__u32 id = 0;
679 	int err;
680 	int fd;
681 
682 	opts.open_flags = BPF_F_RDONLY;
683 
684 	if (show_pinned) {
685 		map_table = hashmap__new(hash_fn_for_key_as_id,
686 					 equal_fn_for_key_as_id, NULL);
687 		if (IS_ERR(map_table)) {
688 			p_err("failed to create hashmap for pinned paths");
689 			return -1;
690 		}
691 		build_pinned_obj_table(map_table, BPF_OBJ_MAP);
692 	}
693 	build_obj_refs_table(&refs_table, BPF_OBJ_MAP);
694 
695 	if (argc == 2)
696 		return do_show_subset(argc, argv);
697 
698 	if (argc)
699 		return BAD_ARG();
700 
701 	if (json_output)
702 		jsonw_start_array(json_wtr);
703 	while (true) {
704 		err = bpf_map_get_next_id(id, &id);
705 		if (err) {
706 			if (errno == ENOENT)
707 				break;
708 			p_err("can't get next map: %s%s", strerror(errno),
709 			      errno == EINVAL ? " -- kernel too old?" : "");
710 			break;
711 		}
712 
713 		fd = bpf_map_get_fd_by_id_opts(id, &opts);
714 		if (fd < 0) {
715 			if (errno == ENOENT)
716 				continue;
717 			p_err("can't get map by id (%u): %s",
718 			      id, strerror(errno));
719 			break;
720 		}
721 
722 		err = bpf_map_get_info_by_fd(fd, &info, &len);
723 		if (err) {
724 			p_err("can't get map info: %s", strerror(errno));
725 			close(fd);
726 			break;
727 		}
728 
729 		if (json_output)
730 			show_map_close_json(fd, &info);
731 		else
732 			show_map_close_plain(fd, &info);
733 	}
734 	if (json_output)
735 		jsonw_end_array(json_wtr);
736 
737 	delete_obj_refs_table(refs_table);
738 
739 	if (show_pinned)
740 		delete_pinned_obj_table(map_table);
741 
742 	return errno == ENOENT ? 0 : -1;
743 }
744 
dump_map_elem(int fd,void * key,void * value,struct bpf_map_info * map_info,struct btf * btf,json_writer_t * btf_wtr)745 static int dump_map_elem(int fd, void *key, void *value,
746 			 struct bpf_map_info *map_info, struct btf *btf,
747 			 json_writer_t *btf_wtr)
748 {
749 	if (bpf_map_lookup_elem(fd, key, value)) {
750 		print_entry_error(map_info, key, errno);
751 		return -1;
752 	}
753 
754 	if (json_output) {
755 		print_entry_json(map_info, key, value, btf);
756 	} else if (btf) {
757 		struct btf_dumper d = {
758 			.btf = btf,
759 			.jw = btf_wtr,
760 			.is_plain_text = true,
761 		};
762 
763 		do_dump_btf(&d, map_info, key, value);
764 	} else {
765 		print_entry_plain(map_info, key, value);
766 	}
767 
768 	return 0;
769 }
770 
maps_have_btf(int * fds,int nb_fds)771 static int maps_have_btf(int *fds, int nb_fds)
772 {
773 	struct bpf_map_info info = {};
774 	__u32 len = sizeof(info);
775 	int err, i;
776 
777 	for (i = 0; i < nb_fds; i++) {
778 		err = bpf_map_get_info_by_fd(fds[i], &info, &len);
779 		if (err) {
780 			p_err("can't get map info: %s", strerror(errno));
781 			return -1;
782 		}
783 
784 		if (!info.btf_id)
785 			return 0;
786 	}
787 
788 	return 1;
789 }
790 
791 static struct btf *btf_vmlinux;
792 
get_map_kv_btf(const struct bpf_map_info * info,struct btf ** btf)793 static int get_map_kv_btf(const struct bpf_map_info *info, struct btf **btf)
794 {
795 	int err = 0;
796 
797 	if (info->btf_vmlinux_value_type_id) {
798 		if (!btf_vmlinux) {
799 			btf_vmlinux = libbpf_find_kernel_btf();
800 			if (!btf_vmlinux) {
801 				p_err("failed to get kernel btf");
802 				return -errno;
803 			}
804 		}
805 		*btf = btf_vmlinux;
806 	} else if (info->btf_value_type_id) {
807 		*btf = btf__load_from_kernel_by_id(info->btf_id);
808 		if (!*btf) {
809 			err = -errno;
810 			p_err("failed to get btf");
811 		}
812 	} else {
813 		*btf = NULL;
814 	}
815 
816 	return err;
817 }
818 
free_map_kv_btf(struct btf * btf)819 static void free_map_kv_btf(struct btf *btf)
820 {
821 	if (btf != btf_vmlinux)
822 		btf__free(btf);
823 }
824 
825 static int
map_dump(int fd,struct bpf_map_info * info,json_writer_t * wtr,bool show_header)826 map_dump(int fd, struct bpf_map_info *info, json_writer_t *wtr,
827 	 bool show_header)
828 {
829 	void *key, *value, *prev_key;
830 	unsigned int num_elems = 0;
831 	struct btf *btf = NULL;
832 	int err;
833 
834 	key = malloc(info->key_size);
835 	value = alloc_value(info);
836 	if (!key || !value) {
837 		p_err("mem alloc failed");
838 		err = -1;
839 		goto exit_free;
840 	}
841 
842 	prev_key = NULL;
843 
844 	if (wtr) {
845 		err = get_map_kv_btf(info, &btf);
846 		if (err) {
847 			goto exit_free;
848 		}
849 
850 		if (show_header) {
851 			jsonw_start_object(wtr);	/* map object */
852 			show_map_header_json(info, wtr);
853 			jsonw_name(wtr, "elements");
854 		}
855 		jsonw_start_array(wtr);		/* elements */
856 	} else if (show_header) {
857 		show_map_header_plain(info);
858 	}
859 
860 	if (info->type == BPF_MAP_TYPE_REUSEPORT_SOCKARRAY &&
861 	    info->value_size != 8) {
862 		const char *map_type_str;
863 
864 		map_type_str = libbpf_bpf_map_type_str(info->type);
865 		p_info("Warning: cannot read values from %s map with value_size != 8",
866 		       map_type_str);
867 	}
868 	while (true) {
869 		err = bpf_map_get_next_key(fd, prev_key, key);
870 		if (err) {
871 			if (errno == ENOENT)
872 				err = 0;
873 			break;
874 		}
875 		if (!dump_map_elem(fd, key, value, info, btf, wtr))
876 			num_elems++;
877 		prev_key = key;
878 	}
879 
880 	if (wtr) {
881 		jsonw_end_array(wtr);	/* elements */
882 		if (show_header)
883 			jsonw_end_object(wtr);	/* map object */
884 	} else {
885 		printf("Found %u element%s\n", num_elems,
886 		       num_elems != 1 ? "s" : "");
887 	}
888 
889 exit_free:
890 	free(key);
891 	free(value);
892 	close(fd);
893 	free_map_kv_btf(btf);
894 
895 	return err;
896 }
897 
do_dump(int argc,char ** argv)898 static int do_dump(int argc, char **argv)
899 {
900 	json_writer_t *wtr = NULL, *btf_wtr = NULL;
901 	struct bpf_map_info info = {};
902 	int nb_fds, i = 0;
903 	__u32 len = sizeof(info);
904 	int *fds = NULL;
905 	int err = -1;
906 
907 	if (argc != 2)
908 		usage();
909 
910 	fds = malloc(sizeof(int));
911 	if (!fds) {
912 		p_err("mem alloc failed");
913 		return -1;
914 	}
915 	nb_fds = map_parse_fds(&argc, &argv, &fds, BPF_F_RDONLY);
916 	if (nb_fds < 1)
917 		goto exit_free;
918 
919 	if (json_output) {
920 		wtr = json_wtr;
921 	} else {
922 		int do_plain_btf;
923 
924 		do_plain_btf = maps_have_btf(fds, nb_fds);
925 		if (do_plain_btf < 0)
926 			goto exit_close;
927 
928 		if (do_plain_btf) {
929 			btf_wtr = get_btf_writer();
930 			wtr = btf_wtr;
931 			if (!btf_wtr)
932 				p_info("failed to create json writer for btf. falling back to plain output");
933 		}
934 	}
935 
936 	if (wtr && nb_fds > 1)
937 		jsonw_start_array(wtr);	/* root array */
938 	for (i = 0; i < nb_fds; i++) {
939 		if (bpf_map_get_info_by_fd(fds[i], &info, &len)) {
940 			p_err("can't get map info: %s", strerror(errno));
941 			break;
942 		}
943 		err = map_dump(fds[i], &info, wtr, nb_fds > 1);
944 		if (!wtr && i != nb_fds - 1)
945 			printf("\n");
946 
947 		if (err)
948 			break;
949 		close(fds[i]);
950 	}
951 	if (wtr && nb_fds > 1)
952 		jsonw_end_array(wtr);	/* root array */
953 
954 	if (btf_wtr)
955 		jsonw_destroy(&btf_wtr);
956 exit_close:
957 	for (; i < nb_fds; i++)
958 		close(fds[i]);
959 exit_free:
960 	free(fds);
961 	btf__free(btf_vmlinux);
962 	return err;
963 }
964 
alloc_key_value(struct bpf_map_info * info,void ** key,void ** value)965 static int alloc_key_value(struct bpf_map_info *info, void **key, void **value)
966 {
967 	*key = NULL;
968 	*value = NULL;
969 
970 	if (info->key_size) {
971 		*key = malloc(info->key_size);
972 		if (!*key) {
973 			p_err("key mem alloc failed");
974 			return -1;
975 		}
976 	}
977 
978 	if (info->value_size) {
979 		*value = alloc_value(info);
980 		if (!*value) {
981 			p_err("value mem alloc failed");
982 			free(*key);
983 			*key = NULL;
984 			return -1;
985 		}
986 	}
987 
988 	return 0;
989 }
990 
do_update(int argc,char ** argv)991 static int do_update(int argc, char **argv)
992 {
993 	struct bpf_map_info info = {};
994 	__u32 len = sizeof(info);
995 	__u32 *value_fd = NULL;
996 	__u32 flags = BPF_ANY;
997 	void *key, *value;
998 	int fd, err;
999 
1000 	if (argc < 2)
1001 		usage();
1002 
1003 	fd = map_parse_fd_and_info(&argc, &argv, &info, &len, 0);
1004 	if (fd < 0)
1005 		return -1;
1006 
1007 	err = alloc_key_value(&info, &key, &value);
1008 	if (err)
1009 		goto exit_free;
1010 
1011 	err = parse_elem(argv, &info, key, value, info.key_size,
1012 			 info.value_size, &flags, &value_fd, 0);
1013 	if (err)
1014 		goto exit_free;
1015 
1016 	err = bpf_map_update_elem(fd, key, value, flags);
1017 	if (err) {
1018 		p_err("update failed: %s", strerror(errno));
1019 		goto exit_free;
1020 	}
1021 
1022 exit_free:
1023 	if (value_fd)
1024 		close(*value_fd);
1025 	free(key);
1026 	free(value);
1027 	close(fd);
1028 
1029 	if (!err && json_output)
1030 		jsonw_null(json_wtr);
1031 	return err;
1032 }
1033 
print_key_value(struct bpf_map_info * info,void * key,void * value)1034 static void print_key_value(struct bpf_map_info *info, void *key,
1035 			    void *value)
1036 {
1037 	json_writer_t *btf_wtr;
1038 	struct btf *btf;
1039 
1040 	if (get_map_kv_btf(info, &btf))
1041 		return;
1042 
1043 	if (json_output) {
1044 		print_entry_json(info, key, value, btf);
1045 	} else if (btf) {
1046 		/* if here json_wtr wouldn't have been initialised,
1047 		 * so let's create separate writer for btf
1048 		 */
1049 		btf_wtr = get_btf_writer();
1050 		if (!btf_wtr) {
1051 			p_info("failed to create json writer for btf. falling back to plain output");
1052 			btf__free(btf);
1053 			btf = NULL;
1054 			print_entry_plain(info, key, value);
1055 		} else {
1056 			struct btf_dumper d = {
1057 				.btf = btf,
1058 				.jw = btf_wtr,
1059 				.is_plain_text = true,
1060 			};
1061 
1062 			do_dump_btf(&d, info, key, value);
1063 			jsonw_destroy(&btf_wtr);
1064 		}
1065 	} else {
1066 		print_entry_plain(info, key, value);
1067 	}
1068 	btf__free(btf);
1069 }
1070 
do_lookup(int argc,char ** argv)1071 static int do_lookup(int argc, char **argv)
1072 {
1073 	struct bpf_map_info info = {};
1074 	__u32 len = sizeof(info);
1075 	void *key, *value;
1076 	int err;
1077 	int fd;
1078 
1079 	if (argc < 2)
1080 		usage();
1081 
1082 	fd = map_parse_fd_and_info(&argc, &argv, &info, &len, BPF_F_RDONLY);
1083 	if (fd < 0)
1084 		return -1;
1085 
1086 	err = alloc_key_value(&info, &key, &value);
1087 	if (err)
1088 		goto exit_free;
1089 
1090 	err = parse_elem(argv, &info, key, NULL, info.key_size, 0, NULL, NULL,
1091 			 BPF_F_RDONLY);
1092 	if (err)
1093 		goto exit_free;
1094 
1095 	err = bpf_map_lookup_elem(fd, key, value);
1096 	if (err) {
1097 		if (errno == ENOENT) {
1098 			if (json_output) {
1099 				jsonw_null(json_wtr);
1100 			} else {
1101 				printf("key:\n");
1102 				fprint_hex(stdout, key, info.key_size, " ");
1103 				printf("\n\nNot found\n");
1104 			}
1105 		} else {
1106 			p_err("lookup failed: %s", strerror(errno));
1107 		}
1108 
1109 		goto exit_free;
1110 	}
1111 
1112 	/* here means bpf_map_lookup_elem() succeeded */
1113 	print_key_value(&info, key, value);
1114 
1115 exit_free:
1116 	free(key);
1117 	free(value);
1118 	close(fd);
1119 
1120 	return err;
1121 }
1122 
do_getnext(int argc,char ** argv)1123 static int do_getnext(int argc, char **argv)
1124 {
1125 	struct bpf_map_info info = {};
1126 	__u32 len = sizeof(info);
1127 	void *key, *nextkey;
1128 	int err;
1129 	int fd;
1130 
1131 	if (argc < 2)
1132 		usage();
1133 
1134 	fd = map_parse_fd_and_info(&argc, &argv, &info, &len, BPF_F_RDONLY);
1135 	if (fd < 0)
1136 		return -1;
1137 
1138 	key = malloc(info.key_size);
1139 	nextkey = malloc(info.key_size);
1140 	if (!key || !nextkey) {
1141 		p_err("mem alloc failed");
1142 		err = -1;
1143 		goto exit_free;
1144 	}
1145 
1146 	if (argc) {
1147 		err = parse_elem(argv, &info, key, NULL, info.key_size, 0, NULL,
1148 				 NULL, BPF_F_RDONLY);
1149 		if (err)
1150 			goto exit_free;
1151 	} else {
1152 		free(key);
1153 		key = NULL;
1154 	}
1155 
1156 	err = bpf_map_get_next_key(fd, key, nextkey);
1157 	if (err) {
1158 		p_err("can't get next key: %s", strerror(errno));
1159 		goto exit_free;
1160 	}
1161 
1162 	if (json_output) {
1163 		jsonw_start_object(json_wtr);
1164 		if (key) {
1165 			jsonw_name(json_wtr, "key");
1166 			print_hex_data_json(key, info.key_size);
1167 		} else {
1168 			jsonw_null_field(json_wtr, "key");
1169 		}
1170 		jsonw_name(json_wtr, "next_key");
1171 		print_hex_data_json(nextkey, info.key_size);
1172 		jsonw_end_object(json_wtr);
1173 	} else {
1174 		if (key) {
1175 			printf("key:\n");
1176 			fprint_hex(stdout, key, info.key_size, " ");
1177 			printf("\n");
1178 		} else {
1179 			printf("key: None\n");
1180 		}
1181 		printf("next key:\n");
1182 		fprint_hex(stdout, nextkey, info.key_size, " ");
1183 		printf("\n");
1184 	}
1185 
1186 exit_free:
1187 	free(nextkey);
1188 	free(key);
1189 	close(fd);
1190 
1191 	return err;
1192 }
1193 
do_delete(int argc,char ** argv)1194 static int do_delete(int argc, char **argv)
1195 {
1196 	struct bpf_map_info info = {};
1197 	__u32 len = sizeof(info);
1198 	void *key;
1199 	int err;
1200 	int fd;
1201 
1202 	if (argc < 2)
1203 		usage();
1204 
1205 	fd = map_parse_fd_and_info(&argc, &argv, &info, &len, 0);
1206 	if (fd < 0)
1207 		return -1;
1208 
1209 	key = malloc(info.key_size);
1210 	if (!key) {
1211 		p_err("mem alloc failed");
1212 		err = -1;
1213 		goto exit_free;
1214 	}
1215 
1216 	err = parse_elem(argv, &info, key, NULL, info.key_size, 0, NULL, NULL,
1217 			 0);
1218 	if (err)
1219 		goto exit_free;
1220 
1221 	err = bpf_map_delete_elem(fd, key);
1222 	if (err)
1223 		p_err("delete failed: %s", strerror(errno));
1224 
1225 exit_free:
1226 	free(key);
1227 	close(fd);
1228 
1229 	if (!err && json_output)
1230 		jsonw_null(json_wtr);
1231 	return err;
1232 }
1233 
map_parse_read_only_fd(int * argc,char *** argv)1234 static int map_parse_read_only_fd(int *argc, char ***argv)
1235 {
1236 	return map_parse_fd(argc, argv, BPF_F_RDONLY);
1237 }
1238 
do_pin(int argc,char ** argv)1239 static int do_pin(int argc, char **argv)
1240 {
1241 	int err;
1242 
1243 	err = do_pin_any(argc, argv, map_parse_read_only_fd);
1244 	if (!err && json_output)
1245 		jsonw_null(json_wtr);
1246 	return err;
1247 }
1248 
do_create(int argc,char ** argv)1249 static int do_create(int argc, char **argv)
1250 {
1251 	LIBBPF_OPTS(bpf_map_create_opts, attr);
1252 	enum bpf_map_type map_type = BPF_MAP_TYPE_UNSPEC;
1253 	__u32 key_size = 0, value_size = 0, max_entries = 0;
1254 	const char *map_name = NULL;
1255 	const char *pinfile;
1256 	int err = -1, fd;
1257 
1258 	if (!REQ_ARGS(7))
1259 		return -1;
1260 	pinfile = GET_ARG();
1261 
1262 	while (argc) {
1263 		if (!REQ_ARGS(2))
1264 			return -1;
1265 
1266 		if (is_prefix(*argv, "type")) {
1267 			NEXT_ARG();
1268 
1269 			if (map_type) {
1270 				p_err("map type already specified");
1271 				goto exit;
1272 			}
1273 
1274 			map_type = map_type_from_str(*argv);
1275 			if ((int)map_type < 0) {
1276 				p_err("unrecognized map type: %s", *argv);
1277 				goto exit;
1278 			}
1279 			NEXT_ARG();
1280 		} else if (is_prefix(*argv, "name")) {
1281 			NEXT_ARG();
1282 			map_name = GET_ARG();
1283 			if (strlen(map_name) > BPF_OBJ_NAME_LEN - 1) {
1284 				p_info("Warning: map name is longer than %u characters, it will be truncated.",
1285 				      BPF_OBJ_NAME_LEN - 1);
1286 			}
1287 		} else if (is_prefix(*argv, "key")) {
1288 			if (parse_u32_arg(&argc, &argv, &key_size,
1289 					  "key size"))
1290 				goto exit;
1291 		} else if (is_prefix(*argv, "value")) {
1292 			if (parse_u32_arg(&argc, &argv, &value_size,
1293 					  "value size"))
1294 				goto exit;
1295 		} else if (is_prefix(*argv, "entries")) {
1296 			if (parse_u32_arg(&argc, &argv, &max_entries,
1297 					  "max entries"))
1298 				goto exit;
1299 		} else if (is_prefix(*argv, "flags")) {
1300 			if (parse_u32_arg(&argc, &argv, &attr.map_flags,
1301 					  "flags"))
1302 				goto exit;
1303 		} else if (is_prefix(*argv, "dev")) {
1304 			p_info("Warning: 'bpftool map create [...] dev <ifname>' syntax is deprecated.\n"
1305 			       "Going further, please use 'offload_dev <ifname>' to request hardware offload for the map.");
1306 			goto offload_dev;
1307 		} else if (is_prefix(*argv, "offload_dev")) {
1308 offload_dev:
1309 			NEXT_ARG();
1310 
1311 			if (attr.map_ifindex) {
1312 				p_err("offload device already specified");
1313 				goto exit;
1314 			}
1315 
1316 			attr.map_ifindex = if_nametoindex(*argv);
1317 			if (!attr.map_ifindex) {
1318 				p_err("unrecognized netdevice '%s': %s",
1319 				      *argv, strerror(errno));
1320 				goto exit;
1321 			}
1322 			NEXT_ARG();
1323 		} else if (is_prefix(*argv, "inner_map")) {
1324 			struct bpf_map_info info = {};
1325 			__u32 len = sizeof(info);
1326 			int inner_map_fd;
1327 
1328 			NEXT_ARG();
1329 			if (!REQ_ARGS(2))
1330 				usage();
1331 			inner_map_fd = map_parse_fd_and_info(&argc, &argv,
1332 							     &info, &len, BPF_F_RDONLY);
1333 			if (inner_map_fd < 0)
1334 				return -1;
1335 			attr.inner_map_fd = inner_map_fd;
1336 		} else {
1337 			p_err("unknown arg %s", *argv);
1338 			goto exit;
1339 		}
1340 	}
1341 
1342 	if (!map_name) {
1343 		p_err("map name not specified");
1344 		goto exit;
1345 	}
1346 
1347 	set_max_rlimit();
1348 
1349 	fd = bpf_map_create(map_type, map_name, key_size, value_size, max_entries, &attr);
1350 	if (fd < 0) {
1351 		p_err("map create failed: %s", strerror(errno));
1352 		goto exit;
1353 	}
1354 
1355 	err = do_pin_fd(fd, pinfile);
1356 	close(fd);
1357 	if (err)
1358 		goto exit;
1359 
1360 	if (json_output)
1361 		jsonw_null(json_wtr);
1362 
1363 exit:
1364 	if (attr.inner_map_fd > 0)
1365 		close(attr.inner_map_fd);
1366 
1367 	return err;
1368 }
1369 
do_pop_dequeue(int argc,char ** argv)1370 static int do_pop_dequeue(int argc, char **argv)
1371 {
1372 	struct bpf_map_info info = {};
1373 	__u32 len = sizeof(info);
1374 	void *key, *value;
1375 	int err;
1376 	int fd;
1377 
1378 	if (argc < 2)
1379 		usage();
1380 
1381 	fd = map_parse_fd_and_info(&argc, &argv, &info, &len, 0);
1382 	if (fd < 0)
1383 		return -1;
1384 
1385 	err = alloc_key_value(&info, &key, &value);
1386 	if (err)
1387 		goto exit_free;
1388 
1389 	err = bpf_map_lookup_and_delete_elem(fd, key, value);
1390 	if (err) {
1391 		if (errno == ENOENT) {
1392 			if (json_output)
1393 				jsonw_null(json_wtr);
1394 			else
1395 				printf("Error: empty map\n");
1396 		} else {
1397 			p_err("pop failed: %s", strerror(errno));
1398 		}
1399 
1400 		goto exit_free;
1401 	}
1402 
1403 	print_key_value(&info, key, value);
1404 
1405 exit_free:
1406 	free(key);
1407 	free(value);
1408 	close(fd);
1409 
1410 	return err;
1411 }
1412 
do_freeze(int argc,char ** argv)1413 static int do_freeze(int argc, char **argv)
1414 {
1415 	int err, fd;
1416 
1417 	if (!REQ_ARGS(2))
1418 		return -1;
1419 
1420 	fd = map_parse_fd(&argc, &argv, 0);
1421 	if (fd < 0)
1422 		return -1;
1423 
1424 	if (argc) {
1425 		close(fd);
1426 		return BAD_ARG();
1427 	}
1428 
1429 	err = bpf_map_freeze(fd);
1430 	close(fd);
1431 	if (err) {
1432 		p_err("failed to freeze map: %s", strerror(errno));
1433 		return err;
1434 	}
1435 
1436 	if (json_output)
1437 		jsonw_null(json_wtr);
1438 
1439 	return 0;
1440 }
1441 
do_help(int argc,char ** argv)1442 static int do_help(int argc, char **argv)
1443 {
1444 	if (json_output) {
1445 		jsonw_null(json_wtr);
1446 		return 0;
1447 	}
1448 
1449 	fprintf(stderr,
1450 		"Usage: %1$s %2$s { show | list }   [MAP]\n"
1451 		"       %1$s %2$s create     FILE type TYPE key KEY_SIZE value VALUE_SIZE \\\n"
1452 		"                                  entries MAX_ENTRIES name NAME [flags FLAGS] \\\n"
1453 		"                                  [inner_map MAP] [offload_dev NAME]\n"
1454 		"       %1$s %2$s dump       MAP\n"
1455 		"       %1$s %2$s update     MAP [key DATA] [value VALUE] [UPDATE_FLAGS]\n"
1456 		"       %1$s %2$s lookup     MAP [key DATA]\n"
1457 		"       %1$s %2$s getnext    MAP [key DATA]\n"
1458 		"       %1$s %2$s delete     MAP  key DATA\n"
1459 		"       %1$s %2$s pin        MAP  FILE\n"
1460 		"       %1$s %2$s event_pipe MAP [cpu N index M]\n"
1461 		"       %1$s %2$s peek       MAP\n"
1462 		"       %1$s %2$s push       MAP value VALUE\n"
1463 		"       %1$s %2$s pop        MAP\n"
1464 		"       %1$s %2$s enqueue    MAP value VALUE\n"
1465 		"       %1$s %2$s dequeue    MAP\n"
1466 		"       %1$s %2$s freeze     MAP\n"
1467 		"       %1$s %2$s help\n"
1468 		"\n"
1469 		"       " HELP_SPEC_MAP "\n"
1470 		"       DATA := { [hex] BYTES }\n"
1471 		"       " HELP_SPEC_PROGRAM "\n"
1472 		"       VALUE := { DATA | MAP | PROG }\n"
1473 		"       UPDATE_FLAGS := { any | exist | noexist }\n"
1474 		"       TYPE := { hash | array | prog_array | perf_event_array | percpu_hash |\n"
1475 		"                 percpu_array | stack_trace | cgroup_array | lru_hash |\n"
1476 		"                 lru_percpu_hash | lpm_trie | array_of_maps | hash_of_maps |\n"
1477 		"                 devmap | devmap_hash | sockmap | cpumap | xskmap | sockhash |\n"
1478 		"                 cgroup_storage | reuseport_sockarray | percpu_cgroup_storage |\n"
1479 		"                 queue | stack | sk_storage | struct_ops | ringbuf | inode_storage |\n"
1480 		"                 task_storage | bloom_filter | user_ringbuf | cgrp_storage | arena }\n"
1481 		"       " HELP_SPEC_OPTIONS " |\n"
1482 		"                    {-f|--bpffs} | {-n|--nomount} }\n"
1483 		"",
1484 		bin_name, argv[-2]);
1485 
1486 	return 0;
1487 }
1488 
1489 static const struct cmd cmds[] = {
1490 	{ "show",	do_show },
1491 	{ "list",	do_show },
1492 	{ "help",	do_help },
1493 	{ "dump",	do_dump },
1494 	{ "update",	do_update },
1495 	{ "lookup",	do_lookup },
1496 	{ "getnext",	do_getnext },
1497 	{ "delete",	do_delete },
1498 	{ "pin",	do_pin },
1499 	{ "event_pipe",	do_event_pipe },
1500 	{ "create",	do_create },
1501 	{ "peek",	do_lookup },
1502 	{ "push",	do_update },
1503 	{ "enqueue",	do_update },
1504 	{ "pop",	do_pop_dequeue },
1505 	{ "dequeue",	do_pop_dequeue },
1506 	{ "freeze",	do_freeze },
1507 	{ 0 }
1508 };
1509 
do_map(int argc,char ** argv)1510 int do_map(int argc, char **argv)
1511 {
1512 	return cmd_select(cmds, argc, argv, do_help);
1513 }
1514