From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: Received: from mails.dpdk.org (mails.dpdk.org [217.70.189.124]) by inbox.dpdk.org (Postfix) with ESMTP id DD0C0A0C41; Wed, 15 Sep 2021 13:04:52 +0200 (CEST) Received: from [217.70.189.124] (localhost [127.0.0.1]) by mails.dpdk.org (Postfix) with ESMTP id 440B841141; Wed, 15 Sep 2021 13:04:50 +0200 (CEST) Received: from mga04.intel.com (mga04.intel.com [192.55.52.120]) by mails.dpdk.org (Postfix) with ESMTP id 894134003C for ; Wed, 15 Sep 2021 13:04:45 +0200 (CEST) X-IronPort-AV: E=McAfee;i="6200,9189,10107"; a="220411146" X-IronPort-AV: E=Sophos;i="5.85,295,1624345200"; d="scan'208";a="220411146" Received: from fmsmga005.fm.intel.com ([10.253.24.32]) by fmsmga104.fm.intel.com with ESMTP/TLS/ECDHE-RSA-AES256-GCM-SHA384; 15 Sep 2021 04:04:44 -0700 X-ExtLoop1: 1 X-IronPort-AV: E=Sophos;i="5.85,295,1624345200"; d="scan'208";a="700152484" Received: from fmsmsx606.amr.corp.intel.com ([10.18.126.86]) by fmsmga005.fm.intel.com with ESMTP; 15 Sep 2021 04:04:44 -0700 Received: from fmsmsx611.amr.corp.intel.com (10.18.126.91) by fmsmsx606.amr.corp.intel.com (10.18.126.86) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.12; Wed, 15 Sep 2021 04:04:43 -0700 Received: from fmsedg602.ED.cps.intel.com (10.1.192.136) by fmsmsx611.amr.corp.intel.com (10.18.126.91) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256) id 15.1.2242.12 via Frontend Transport; Wed, 15 Sep 2021 04:04:43 -0700 Received: from NAM11-DM6-obe.outbound.protection.outlook.com (104.47.57.174) by edgegateway.intel.com (192.55.55.71) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.1.2242.12; Wed, 15 Sep 2021 04:04:43 -0700 ARC-Seal: i=1; a=rsa-sha256; s=arcselector9901; d=microsoft.com; cv=none; b=a8ZqIVf/SWScxFm6/Du54PW/zehY4erb3Lzye8mc5irss72KzdlYyojQkdbFz6DTmW3HrH/28NqfQYtRTb/5ZOiPrAw5AVlRQF7R/P2a0L6NdX1hANc8uEgc6lTLq/Lv28zMPpyRPgtTDc9VuiiiX5jHVS9UzBsuoRcjnme5UOE7CA6wVAslUhEo6yTjVn1p87bb9YeILRnt+/RB4hJXeLmbTwVCQbPtaczqerKHtSRCNRoEeiFde51QnQffb/z/2MM42p+sTrzJHDKRNkjvXKgtu120vdyC4sB/76PCbKlwN1Qse8BSLok+9Qt+0zH1xpbmOWtH6dV1+udzOvCBYQ== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=microsoft.com; s=arcselector9901; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version; bh=1jHhGIeT0b2V00i6NhN85k6kbgnu09lztYDjfjO4DkM=; b=XJ9O1H0IRAzxIB3vEG5jnpYwSk9E0exdCqookatRoUnR4MKWoSSNwqGmYPmFaUsvLWiDSFotJONZJwD2hQdmJMgmiBWmNuN55FX7/xr8lQb3/XUJ0q9jkYzpU60nf7yLJ9XR1hDQ6UrxtWEyAEXHZmnyTeBuBeOtnsQP8SOHwjpvu/DnHsr3y2m8HmkoG1UO2WmAicFpY2ZxjpMn4trM5o1mFWaQONtKUrwEonhviCaGxp+bNORBiAEt//Nnff0WRVo/8gE2Qu1Y+ocPgxTzTS9FDJxTte9vWBVZmKb6h/KIIxspbZvxIEo+FVdzUX1xmZH/1dAF6YAFVmW+iUWZbg== ARC-Authentication-Results: i=1; mx.microsoft.com 1; spf=pass smtp.mailfrom=intel.com; dmarc=pass action=none header.from=intel.com; dkim=pass header.d=intel.com; arc=none DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=intel.onmicrosoft.com; s=selector2-intel-onmicrosoft-com; h=From:Date:Subject:Message-ID:Content-Type:MIME-Version:X-MS-Exchange-SenderADCheck; bh=1jHhGIeT0b2V00i6NhN85k6kbgnu09lztYDjfjO4DkM=; b=C2YE5r0/RAzPSUD54zMu03Dv159PA1fIwMAohXgUKpHagsa8l0v3rr37/QExL0UyMSL0GtjidV0VJ5HEiGDc5nTRVRLJ1gCQDGPkTaMy3FMo29BWJh4SUuGcChmMk5e6Jtd49uA3n6qvnfqmkNuug+GPEiKI8a0WjDUGWLeZHiA= Received: from DM6PR11MB4491.namprd11.prod.outlook.com (2603:10b6:5:204::19) by DM5PR1101MB2249.namprd11.prod.outlook.com (2603:10b6:4:5a::12) with Microsoft SMTP Server (version=TLS1_2, cipher=TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384) id 15.20.4500.17; Wed, 15 Sep 2021 11:04:42 +0000 Received: from DM6PR11MB4491.namprd11.prod.outlook.com ([fe80::740e:126e:c785:c8fd]) by DM6PR11MB4491.namprd11.prod.outlook.com ([fe80::740e:126e:c785:c8fd%4]) with mapi id 15.20.4523.014; Wed, 15 Sep 2021 11:04:41 +0000 From: "Ananyev, Konstantin" To: Stephen Hemminger , "dev@dpdk.org" Thread-Topic: [dpdk-dev] [PATCH v8 05/12] bpf: add function to dump eBPF instructions Thread-Index: AQHXqMtqnL9dQRsOIUCgwdxEkQ2TnKuk8SXQ Date: Wed, 15 Sep 2021 11:04:41 +0000 Message-ID: References: <20210903004732.109023-1-stephen@networkplumber.org> <20210913181510.46058-1-stephen@networkplumber.org> <20210913181510.46058-6-stephen@networkplumber.org> In-Reply-To: <20210913181510.46058-6-stephen@networkplumber.org> Accept-Language: en-GB, en-US Content-Language: en-US X-MS-Has-Attach: X-MS-TNEF-Correlator: dlp-product: dlpe-windows dlp-reaction: no-action dlp-version: 11.6.200.16 authentication-results: networkplumber.org; dkim=none (message not signed) header.d=none;networkplumber.org; dmarc=none action=none header.from=intel.com; x-ms-publictraffictype: Email x-ms-office365-filtering-correlation-id: 494edd00-72d3-4d71-9cf6-08d978389e56 x-ms-traffictypediagnostic: DM5PR1101MB2249: x-microsoft-antispam-prvs: x-ms-oob-tlc-oobclassifiers: OLM:64; x-ms-exchange-senderadcheck: 1 x-ms-exchange-antispam-relay: 0 x-microsoft-antispam: BCL:0; x-microsoft-antispam-message-info: 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 x-forefront-antispam-report: CIP:255.255.255.255; CTRY:; LANG:en; SCL:1; SRV:; IPV:NLI; SFV:NSPM; H:DM6PR11MB4491.namprd11.prod.outlook.com; PTR:; CAT:NONE; SFS:(4636009)(366004)(26005)(2906002)(33656002)(8936002)(122000001)(9686003)(110136005)(52536014)(508600001)(8676002)(5660300002)(66946007)(38070700005)(76116006)(55016002)(186003)(66446008)(66556008)(316002)(86362001)(64756008)(66476007)(6506007)(38100700002)(7696005)(55236004)(83380400001)(71200400001); DIR:OUT; SFP:1102; x-ms-exchange-antispam-messagedata-chunkcount: 1 x-ms-exchange-antispam-messagedata-0: =?us-ascii?Q?Aew5odOUXXv9bsRV8vQLeKeTorzsIbWcwujMxJtywnptwDdJaWpgEgoND87n?= =?us-ascii?Q?zsG5IAv0FpdQN6XEkoFyMFDdaLTdCgvIvXSQO14RUF9wtAYJMNeeDABUCE9J?= =?us-ascii?Q?TnYyVLvLKEqpUCD3YSUka64zt/8KC7CYDqxOnl6UMGAzrQmgGHRpc93C56It?= =?us-ascii?Q?tAmDOhs+igSkUbKQewGxYgErTF+Pcm8g9mPdYbtXyCFcWm8guDStZ4o4L3/a?= =?us-ascii?Q?CBFzH4btZuRBWjLiIA/L+RekurIVTqBaeklgKoAlDLwfg5Px9udcjNxBU6DD?= =?us-ascii?Q?hWODhpPTsoTHwnlJc//73Do6bbm1pyHImboS7oZWx8kZMAbS3BrrxwG0FvHG?= =?us-ascii?Q?7qTvgoLa5CMmNHRe5voIgoavZAM7ESA6yZrTqeQfw4VL4paTyQHRW2Nlw2dA?= =?us-ascii?Q?rjoTjcWocm4FKprvMz9SKRqL1njW+2/ZDvIa9eiyBsUClofAX3Zf94tMCbda?= =?us-ascii?Q?2HdByUSUC+Pud1cxq/YrD4X1RTFxF907siTuYh/9T8gwzAiMfbEL6oXvgRaV?= =?us-ascii?Q?jCB3to0EZq8E+miLsHD/JcItBg6J0919KfEJePxdwmmbkznDquU7CsU6cZMl?= =?us-ascii?Q?JzqJPx0pkxUAuqozSIHb5pBTbNFV/rzIoP8TrxScXwz3vIlOZ8BqQJStTpnU?= =?us-ascii?Q?+AlSK5oYdrTyDTC+IZpoqesXmDY5pRCxPcPZPOOhCdB+WoO/T70/oPEIhpri?= =?us-ascii?Q?h5xSGtJvh8qE+v05FTkh96bGNUDOU/L8S0yPdIiweUxaYJYKOs24dSBnpMxh?= =?us-ascii?Q?G28T2JoNEEGVnFdM3MPDWY7LK6NZU1VkzjzUjyw6BFQKv4XOkAGM1JjBQC9S?= =?us-ascii?Q?sgnds+sY0SmFm5HazU+NBvAmuO38BnHCr5ZMrXbH8CxgfX3IL3aZIfcgrzGJ?= =?us-ascii?Q?TlbsAbcLn4fmfra39GbKIFdeAqk83PHWmaeIFkLX5vHpEKUtjDmsFGNlYIwL?= =?us-ascii?Q?dJeZioq+HuAUZkg3biKiuKnDt/+uYKwR6UeYAwCnRdrzV6Euz+CRSav1C9Uz?= =?us-ascii?Q?HFqtxNWjE/SFaWIgp9N5RQse+BnSwa64wsCjn4Sj92joBgrBJlMyh4F0vUeo?= =?us-ascii?Q?dWeGYyltBaDJtu+UY3ql0tJ6VG5GGLVm+pHo32KAkgGlHM1l8nv3RoDbN/JX?= =?us-ascii?Q?FgR19nL/tZsGlbdKSJi9712LMj4WfHTWltRoeXp7cIs25V1PxkjOcRDOS0hz?= =?us-ascii?Q?xbfhulP90jrY4v4RRPITolkVvixuLvsU+W8+mzzLngN8unhRMztR8xQH+kDh?= =?us-ascii?Q?eZmmJw2pE5yNxuDJj19D/2RzgZ+KH6JF7OEQ/6kgb9gtVjL3M9DaMKAJTqYo?= =?us-ascii?Q?Fj7KrPVztWo6sWagxsdXxGQ1?= x-ms-exchange-transport-forked: True Content-Type: text/plain; charset="us-ascii" Content-Transfer-Encoding: quoted-printable MIME-Version: 1.0 X-MS-Exchange-CrossTenant-AuthAs: Internal X-MS-Exchange-CrossTenant-AuthSource: DM6PR11MB4491.namprd11.prod.outlook.com X-MS-Exchange-CrossTenant-Network-Message-Id: 494edd00-72d3-4d71-9cf6-08d978389e56 X-MS-Exchange-CrossTenant-originalarrivaltime: 15 Sep 2021 11:04:41.9034 (UTC) X-MS-Exchange-CrossTenant-fromentityheader: Hosted X-MS-Exchange-CrossTenant-id: 46c98d88-e344-4ed4-8496-4ed7712e255d X-MS-Exchange-CrossTenant-mailboxtype: HOSTED X-MS-Exchange-CrossTenant-userprincipalname: urmRhTOfiS3Xg0j0aBubfSLtJ0iEIM4Wl1BXd7V4nBoxVjyIujjCW0aDPfj2EanQbPhMHxftRQh79D19z0pFnqqr8rv3PyCKLHJaRkxm7Fo= X-MS-Exchange-Transport-CrossTenantHeadersStamped: DM5PR1101MB2249 X-OriginatorOrg: intel.com Subject: Re: [dpdk-dev] [PATCH v8 05/12] bpf: add function to dump eBPF instructions X-BeenThere: dev@dpdk.org X-Mailman-Version: 2.1.29 Precedence: list List-Id: DPDK patches and discussions List-Unsubscribe: , List-Archive: List-Post: List-Help: List-Subscribe: , Errors-To: dev-bounces@dpdk.org Sender: "dev" > When debugging converted (and other) programs it is useful > to see disassembled eBPF output. >=20 > Signed-off-by: Stephen Hemminger > --- > lib/bpf/bpf_convert.c | 7 ++- > lib/bpf/bpf_dump.c | 118 ++++++++++++++++++++++++++++++++++++++++++ > lib/bpf/meson.build | 1 + > lib/bpf/rte_bpf.h | 14 +++++ > lib/bpf/version.map | 1 + > 5 files changed, 140 insertions(+), 1 deletion(-) > create mode 100644 lib/bpf/bpf_dump.c >=20 > diff --git a/lib/bpf/bpf_convert.c b/lib/bpf/bpf_convert.c > index a46ffeb067dd..db84add7dcce 100644 > --- a/lib/bpf/bpf_convert.c > +++ b/lib/bpf/bpf_convert.c > @@ -331,7 +331,12 @@ static int bpf_convert_filter(const struct bpf_insn = *prog, size_t len, > case BPF_LD | BPF_IND | BPF_H: > case BPF_LD | BPF_IND | BPF_B: > /* All arithmetic insns map as-is. */ > - *insn =3D BPF_RAW_INSN(fp->code, BPF_REG_A, BPF_REG_X, 0, fp->k); > + insn->code =3D fp->code; > + insn->dst_reg =3D BPF_REG_A; > + bpf_src =3D BPF_SRC(fp->code); > + insn->src_reg =3D bpf_src =3D=3D BPF_X ? BPF_REG_X : 0; > + insn->off =3D 0; > + insn->imm =3D fp->k; > break; Should it be part of that patch? Looks like belongs to previous one, no? >=20 > /* Jump transformation cannot use BPF block macros > diff --git a/lib/bpf/bpf_dump.c b/lib/bpf/bpf_dump.c > new file mode 100644 > index 000000000000..a6a431e64903 > --- /dev/null > +++ b/lib/bpf/bpf_dump.c > @@ -0,0 +1,118 @@ > +/* SPDX-License-Identifier: BSD-3-Clause > + * Copyright (c) 2021 Stephen Hemminger > + * Based on filter2xdp > + * Copyright (C) 2017 Tobias Klauser > + */ > + > +#include > +#include > + > +#include "rte_bpf.h" > + > +#define BPF_OP_INDEX(x) (BPF_OP(x) >> 4) > +#define BPF_SIZE_INDEX(x) (BPF_SIZE(x) >> 3) > + > +static const char *const class_tbl[] =3D { > + [BPF_LD] =3D "ld", [BPF_LDX] =3D "ldx", [BPF_ST] =3D "st", > + [BPF_STX] =3D "stx", [BPF_ALU] =3D "alu", [BPF_JMP] =3D "jmp", > + [BPF_RET] =3D "ret", [BPF_MISC] =3D "alu64", > +}; > + > +static const char *const alu_op_tbl[16] =3D { > + [BPF_ADD >> 4] =3D "add", [BPF_SUB >> 4] =3D "sub", > + [BPF_MUL >> 4] =3D "mul", [BPF_DIV >> 4] =3D "div", > + [BPF_OR >> 4] =3D "or", [BPF_AND >> 4] =3D "and", > + [BPF_LSH >> 4] =3D "lsh", [BPF_RSH >> 4] =3D "rsh", > + [BPF_NEG >> 4] =3D "neg", [BPF_MOD >> 4] =3D "mod", > + [BPF_XOR >> 4] =3D "xor", [EBPF_MOV >> 4] =3D "mov", > + [EBPF_ARSH >> 4] =3D "arsh", [EBPF_END >> 4] =3D "endian", > +}; > + > +static const char *const size_tbl[] =3D { > + [BPF_W >> 3] =3D "w", > + [BPF_H >> 3] =3D "h", > + [BPF_B >> 3] =3D "b", > + [EBPF_DW >> 3] =3D "dw", > +}; > + > +static const char *const jump_tbl[16] =3D { > + [BPF_JA >> 4] =3D "ja", [BPF_JEQ >> 4] =3D "jeq", > + [BPF_JGT >> 4] =3D "jgt", [BPF_JGE >> 4] =3D "jge", > + [BPF_JSET >> 4] =3D "jset", [EBPF_JNE >> 4] =3D "jne", > + [EBPF_JSGT >> 4] =3D "jsgt", [EBPF_JSGE >> 4] =3D "jsge", > + [EBPF_CALL >> 4] =3D "call", [EBPF_EXIT >> 4] =3D "exit", > +}; > + > +static void ebpf_dump(FILE *f, const struct ebpf_insn insn, size_t n) > +{ > + const char *op, *postfix =3D ""; > + uint8_t cls =3D BPF_CLASS(insn.code); > + > + fprintf(f, " L%zu:\t", n); > + > + switch (cls) { > + default: > + fprintf(f, "unimp 0x%x // class: %s\n", insn.code, > + class_tbl[cls]); > + break; > + case BPF_ALU: > + postfix =3D "32"; > + /* fall through */ > + case EBPF_ALU64: > + op =3D alu_op_tbl[BPF_OP_INDEX(insn.code)]; > + if (BPF_SRC(insn.code) =3D=3D BPF_X) > + fprintf(f, "%s%s r%u, r%u\n", op, postfix, insn.dst_reg, > + insn.src_reg); > + else > + fprintf(f, "%s%s r%u, #0x%x\n", op, postfix, > + insn.dst_reg, insn.imm); > + break; > + case BPF_LD: > + op =3D "ld"; > + postfix =3D size_tbl[BPF_SIZE_INDEX(insn.code)]; > + if (BPF_MODE(insn.code) =3D=3D BPF_IMM) > + fprintf(f, "%s%s r%d, #0x%x\n", op, postfix, > + insn.dst_reg, insn.imm); > + else if (BPF_MODE(insn.code) =3D=3D BPF_ABS) > + fprintf(f, "%s%s r%d, [%d]\n", op, postfix, > + insn.dst_reg, insn.imm); > + else if (BPF_MODE(insn.code) =3D=3D BPF_IND) > + fprintf(f, "%s%s r%d, [r%u + %d]\n", op, postfix, > + insn.dst_reg, insn.src_reg, insn.imm); > + else > + fprintf(f, "// BUG: LD opcode 0x%02x in eBPF insns\n", > + insn.code); > + break; > + case BPF_LDX: > + op =3D "ldx"; > + postfix =3D size_tbl[BPF_SIZE_INDEX(insn.code)]; > + fprintf(f, "%s%s r%d, [r%u + %d]\n", op, postfix, insn.dst_reg, > + insn.src_reg, insn.off); > + break; > +#define L(pc, off) ((int)(pc) + 1 + (off)) > + case BPF_JMP: > + op =3D jump_tbl[BPF_OP_INDEX(insn.code)]; > + if (op =3D=3D NULL) > + fprintf(f, "invalid jump opcode: %#x\n", insn.code); > + else if (BPF_OP(insn.code) =3D=3D BPF_JA) > + fprintf(f, "%s L%d\n", op, L(n, insn.off)); > + else if (BPF_OP(insn.code) =3D=3D EBPF_EXIT) > + fprintf(f, "%s\n", op); > + else > + fprintf(f, "%s r%u, #0x%x, L%d\n", op, insn.dst_reg, > + insn.imm, L(n, insn.off)); > + break; > + case BPF_RET: > + fprintf(f, "// BUG: RET opcode 0x%02x in eBPF insns\n", > + insn.code); > + break; > + } > +} > + > +void rte_bpf_dump(FILE *f, const struct ebpf_insn *buf, uint32_t len) > +{ > + uint32_t i; > + > + for (i =3D 0; i < len; ++i) > + ebpf_dump(f, buf[i], i); > +} > diff --git a/lib/bpf/meson.build b/lib/bpf/meson.build > index 54f7610ae990..5b5585173aeb 100644 > --- a/lib/bpf/meson.build > +++ b/lib/bpf/meson.build > @@ -2,6 +2,7 @@ > # Copyright(c) 2018 Intel Corporation >=20 > sources =3D files('bpf.c', > + 'bpf_dump.c', > 'bpf_exec.c', > 'bpf_load.c', > 'bpf_pkt.c', > diff --git a/lib/bpf/rte_bpf.h b/lib/bpf/rte_bpf.h > index 2f23e272a376..0d0a84b130a0 100644 > --- a/lib/bpf/rte_bpf.h > +++ b/lib/bpf/rte_bpf.h > @@ -198,6 +198,20 @@ rte_bpf_exec_burst(const struct rte_bpf *bpf, void *= ctx[], uint64_t rc[], > int > rte_bpf_get_jit(const struct rte_bpf *bpf, struct rte_bpf_jit *jit); >=20 > +/** > + * Dump epf instructions to a file. > + * > + * @param f > + * A pointer to a file for output > + * @param buf > + * A pointer to BPF instructions > + * @param len > + * Number of BPF instructions to dump. > + */ > +__rte_experimental > +void > +rte_bpf_dump(FILE *f, const struct ebpf_insn *buf, uint32_t len); > + > #ifdef RTE_PORT_PCAP >=20 > struct bpf_program; > diff --git a/lib/bpf/version.map b/lib/bpf/version.map > index 47082d5003ef..3b953f2f4592 100644 > --- a/lib/bpf/version.map > +++ b/lib/bpf/version.map > @@ -19,4 +19,5 @@ EXPERIMENTAL { > global: >=20 > rte_bpf_convert; > + rte_bpf_dump; > }; > -- Acked-by: Konstantin Ananyev > 2.30.2