Received: by 2002:ac0:a581:0:0:0:0:0 with SMTP id m1-v6csp1212501imm; Wed, 20 Jun 2018 13:40:55 -0700 (PDT) X-Google-Smtp-Source: ADUXVKJ2lZy4HFlupzH03aZO7O+aC9cKLksIuRF6KlusvM6ghS4w3gxpqyzLnW+2aIiOyOQBMs3B X-Received: by 2002:a63:6441:: with SMTP id y62-v6mr208398pgb.240.1529527255728; Wed, 20 Jun 2018 13:40:55 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1529527255; cv=none; d=google.com; s=arc-20160816; b=qxeecTfcjFDvvL7anAkqNWN3gGjAo4nUPrypt/QirhyKQv/J/tXd7NjwET6AcF2nrp cAcs2t0SpL+ytDkRFSI3KXeez9UE5aYeJFyThBADLHSbTaoaI/wFmYe64CrdQCqFhxiJ TxJOvSARvaFMc3GjsMqSrfK75Z11+ZGAF4aN7ndBW2euZCu97rXjmfwLxSifP26cjOpg 044hKT/dJhpUNURpeyGGDOj7uyVKYTbh//5zBZif/LFujBI76uTfIQ6aTF6i7tMFnKe/ MkKKN9gfbSmCWf1oK0Y7XQrfFnu45aGj/Ya9uTHgebOPlHLXVVkZsfPhAHvLYuP/yshh xBoA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:sender:content-disposition:mime-version :references:subject:smtp-origin-cluster:cc:to:smtp-origin-hostname :from:smtp-origin-hostprefix:date:user-agent:message-id :dkim-signature:arc-authentication-results; bh=jCMnufH2flFWcBL7hXIKstrvWGXRUUCFP0LVd/TwFcA=; b=yj6KeYt5j7OMWdCdtsATTKmNwzCXQ5xgxvsYqzGJNkjf8dHByZgleEmCXduaM5MjIY ++3mGjL61QHzmvF/rOf/9f5BBE9/ifz0fzVWKvsiw2aY/isBxUQuAw7YFt7WqoMSAUCu DNYlK7OusWTFghHguoMWmEHZFNWgqjbV7BdTLDjnEhYDp98nD25utJJjMzLJh+J401zr qzyYkg7nvtVU3isCj63EQLS0SuDpmVMkkKYYMMMRL18dKNQTLT3pYXNAHvBvxQSvAB9q y3VPxuTM/suZV7Qmbm54qWXQA6OAxvC8pGhOf2bgpSUgzhyEFf4HqzW9fJlcSmyLW0II jWxg== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@fb.com header.s=facebook header.b=XsWe83nG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=fb.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [209.132.180.67]) by mx.google.com with ESMTP id g61-v6si3064481plb.169.2018.06.20.13.40.41; Wed, 20 Jun 2018 13:40:55 -0700 (PDT) Received-SPF: pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) client-ip=209.132.180.67; Authentication-Results: mx.google.com; dkim=pass header.i=@fb.com header.s=facebook header.b=XsWe83nG; spf=pass (google.com: best guess record for domain of linux-kernel-owner@vger.kernel.org designates 209.132.180.67 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=fb.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S933425AbeFTUjo (ORCPT + 99 others); Wed, 20 Jun 2018 16:39:44 -0400 Received: from mx0b-00082601.pphosted.com ([67.231.153.30]:41858 "EHLO mx0a-00082601.pphosted.com" rhost-flags-OK-OK-OK-FAIL) by vger.kernel.org with ESMTP id S933275AbeFTUjj (ORCPT ); Wed, 20 Jun 2018 16:39:39 -0400 Received: from pps.filterd (m0001255.ppops.net [127.0.0.1]) by mx0b-00082601.pphosted.com (8.16.0.22/8.16.0.22) with SMTP id w5KKbajD027443 for ; Wed, 20 Jun 2018 13:39:38 -0700 DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=fb.com; h=message-id : date : from : to : cc : subject : references : mime-version : content-type; s=facebook; bh=jCMnufH2flFWcBL7hXIKstrvWGXRUUCFP0LVd/TwFcA=; b=XsWe83nGiS4lVBMkyjBtJfypIMdB20emetWwCPrB2k9Z3sFa4b0863c7RNwkUL1B2V4k u4jhmrymODKQwBu4I9fxK81MIRFyGC8DkAKPzvEm2PyJBQ9W8XuN/0GWKs8/no4U4NUw kwwU4P8xDtex6iRlee2JdpRp6R6ZdbfNmfs= Received: from mail.thefacebook.com ([199.201.64.23]) by mx0b-00082601.pphosted.com with ESMTP id 2jqt1d0vk8-1 (version=TLSv1 cipher=ECDHE-RSA-AES256-SHA bits=256 verify=NOT) for ; Wed, 20 Jun 2018 13:39:38 -0700 Received: from mx-out.facebook.com (192.168.52.123) by mail.thefacebook.com (192.168.16.22) with Microsoft SMTP Server (TLS) id 14.3.319.2; Wed, 20 Jun 2018 13:39:37 -0700 Received: by dev026.lla1.facebook.com (Postfix, from userid 152872) id 3FC9A8A2453; Wed, 20 Jun 2018 13:37:03 -0700 (PDT) Message-ID: <20180620203703.208599277@fb.com> User-Agent: quilt/0.63-1 Date: Wed, 20 Jun 2018 13:30:54 -0700 Smtp-Origin-Hostprefix: dev From: Okash Khawaja Smtp-Origin-Hostname: dev026.lla1.facebook.com To: Daniel Borkmann , Martin KaFai Lau , Alexei Starovoitov , Yonghong Song , Quentin Monnet , Jakub Kicinski , "David S. Miller" CC: , , Smtp-Origin-Cluster: lla1c22 Subject: [PATCH bpf-next 3/3] bpf: btf: json print map dump with btf info References: <20180620203051.223156973@fb.com> MIME-Version: 1.0 Content-Type: text/plain; charset="UTF-8" Content-Disposition: inline; filename="03-json-print-btf-info-for-map" X-FB-Internal: Safe X-Proofpoint-Virus-Version: vendor=fsecure engine=2.50.10434:,, definitions=2018-06-20_09:,, signatures=0 X-Proofpoint-Spam-Reason: safe X-FB-Internal: Safe Sender: linux-kernel-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org This patch modifies `bpftool map dump [-j|-p] id ` to json- print and pretty-json-print map dump. It calls btf_dumper introduced in previous patch to accomplish this. The patch only prints debug info when -j or -p flags are supplied. Then too, if the map has associated btf data loaded. Otherwise the usual debug-less output is printed. Signed-off-by: Okash Khawaja Acked-by: Martin KaFai Lau --- tools/bpf/bpftool/map.c | 94 ++++++++++++++++++++++++++++++++++++++++++++++-- 1 file changed, 91 insertions(+), 3 deletions(-) --- a/tools/bpf/bpftool/map.c +++ b/tools/bpf/bpftool/map.c @@ -43,9 +43,13 @@ #include #include #include +#include #include +#include "json_writer.h" +#include "btf.h" +#include "btf_dumper.h" #include "main.h" static const char * const map_type_name[] = { @@ -508,6 +512,83 @@ static int do_show(int argc, char **argv return errno == ENOENT ? 0 : -1; } + +static int do_dump_btf(struct btf *btf, struct bpf_map_info *map_info, + void *key, void *value) +{ + int ret; + + jsonw_start_object(json_wtr); + jsonw_name(json_wtr, "key"); + + ret = btf_dumper_type(btf, json_wtr, map_info->btf_key_type_id, key); + if (ret) + goto out; + + jsonw_end_object(json_wtr); + + jsonw_start_object(json_wtr); + jsonw_name(json_wtr, "value"); + + ret = btf_dumper_type(btf, json_wtr, map_info->btf_value_type_id, + value); + +out: + /* end of root object */ + jsonw_end_object(json_wtr); + + return ret; +} + +static struct btf *get_btf(struct bpf_map_info *map_info) +{ + int btf_fd = bpf_btf_get_fd_by_id(map_info->btf_id); + struct bpf_btf_info btf_info = { 0 }; + __u32 len = sizeof(btf_info); + uint32_t last_size; + int err; + struct btf *btf = NULL; + void *ptr = NULL, *temp_ptr; + + if (btf_fd < 0) + return NULL; + + btf_info.btf_size = 4096; + do { + last_size = btf_info.btf_size; + temp_ptr = realloc(ptr, last_size); + if (!temp_ptr) { + p_err("unable allocate memory for debug info."); + goto exit_free; + } + + ptr = temp_ptr; + bzero(ptr, last_size); + btf_info.btf = ptr_to_u64(ptr); + err = bpf_obj_get_info_by_fd(btf_fd, &btf_info, &len); + } while (!err && btf_info.btf_size > last_size && last_size == 4096); + + if (err || btf_info.btf_size > last_size) { + p_info("can't get btf info. debug info won't be displayed. error: %s", + err ? strerror(errno) : "exceeds size retry"); + goto exit_free; + } + + btf = btf__new((uint8_t *) btf_info.btf, + btf_info.btf_size, NULL); + if (IS_ERR(btf)) { + printf("error when initialising btf: %s\n", + strerror(PTR_ERR(btf))); + btf = NULL; + } + +exit_free: + close(btf_fd); + free(ptr); + + return btf; +} + static int do_dump(int argc, char **argv) { void *key, *value, *prev_key; @@ -516,6 +597,7 @@ static int do_dump(int argc, char **argv __u32 len = sizeof(info); int err; int fd; + struct btf *btf = NULL; if (argc != 2) usage(); @@ -538,6 +620,8 @@ static int do_dump(int argc, char **argv goto exit_free; } + btf = get_btf(&info); + prev_key = NULL; if (json_output) jsonw_start_array(json_wtr); @@ -550,9 +634,12 @@ static int do_dump(int argc, char **argv } if (!bpf_map_lookup_elem(fd, key, value)) { - if (json_output) - print_entry_json(&info, key, value); - else + if (json_output) { + if (btf) + do_dump_btf(btf, &info, key, value); + else + print_entry_json(&info, key, value); + } else print_entry_plain(&info, key, value); } else { if (json_output) { @@ -584,6 +671,7 @@ exit_free: free(key); free(value); close(fd); + btf__free(btf); return err; }