Merge branch 'bpf-print-insns-api'
Jiri Olsa says: ==================== This patchset removes struct bpf_verifier_env argument from print_bpf_insn function (patch 1) and changes user space bpftool user to use it that way (patch 2). ==================== Reviewed-by: Quentin Monnet <quentin.monnet@netronome.com> Signed-off-by: Daniel Borkmann <daniel@iogearbox.net>
This commit is contained in:
commit
639a53da7c
|
@ -113,16 +113,16 @@ static const char *const bpf_jmp_string[16] = {
|
||||||
};
|
};
|
||||||
|
|
||||||
static void print_bpf_end_insn(bpf_insn_print_t verbose,
|
static void print_bpf_end_insn(bpf_insn_print_t verbose,
|
||||||
struct bpf_verifier_env *env,
|
void *private_data,
|
||||||
const struct bpf_insn *insn)
|
const struct bpf_insn *insn)
|
||||||
{
|
{
|
||||||
verbose(env, "(%02x) r%d = %s%d r%d\n", insn->code, insn->dst_reg,
|
verbose(private_data, "(%02x) r%d = %s%d r%d\n",
|
||||||
|
insn->code, insn->dst_reg,
|
||||||
BPF_SRC(insn->code) == BPF_TO_BE ? "be" : "le",
|
BPF_SRC(insn->code) == BPF_TO_BE ? "be" : "le",
|
||||||
insn->imm, insn->dst_reg);
|
insn->imm, insn->dst_reg);
|
||||||
}
|
}
|
||||||
|
|
||||||
void print_bpf_insn(const struct bpf_insn_cbs *cbs,
|
void print_bpf_insn(const struct bpf_insn_cbs *cbs,
|
||||||
struct bpf_verifier_env *env,
|
|
||||||
const struct bpf_insn *insn,
|
const struct bpf_insn *insn,
|
||||||
bool allow_ptr_leaks)
|
bool allow_ptr_leaks)
|
||||||
{
|
{
|
||||||
|
@ -132,23 +132,23 @@ void print_bpf_insn(const struct bpf_insn_cbs *cbs,
|
||||||
if (class == BPF_ALU || class == BPF_ALU64) {
|
if (class == BPF_ALU || class == BPF_ALU64) {
|
||||||
if (BPF_OP(insn->code) == BPF_END) {
|
if (BPF_OP(insn->code) == BPF_END) {
|
||||||
if (class == BPF_ALU64)
|
if (class == BPF_ALU64)
|
||||||
verbose(env, "BUG_alu64_%02x\n", insn->code);
|
verbose(cbs->private_data, "BUG_alu64_%02x\n", insn->code);
|
||||||
else
|
else
|
||||||
print_bpf_end_insn(verbose, env, insn);
|
print_bpf_end_insn(verbose, cbs->private_data, insn);
|
||||||
} else if (BPF_OP(insn->code) == BPF_NEG) {
|
} else if (BPF_OP(insn->code) == BPF_NEG) {
|
||||||
verbose(env, "(%02x) r%d = %s-r%d\n",
|
verbose(cbs->private_data, "(%02x) r%d = %s-r%d\n",
|
||||||
insn->code, insn->dst_reg,
|
insn->code, insn->dst_reg,
|
||||||
class == BPF_ALU ? "(u32) " : "",
|
class == BPF_ALU ? "(u32) " : "",
|
||||||
insn->dst_reg);
|
insn->dst_reg);
|
||||||
} else if (BPF_SRC(insn->code) == BPF_X) {
|
} else if (BPF_SRC(insn->code) == BPF_X) {
|
||||||
verbose(env, "(%02x) %sr%d %s %sr%d\n",
|
verbose(cbs->private_data, "(%02x) %sr%d %s %sr%d\n",
|
||||||
insn->code, class == BPF_ALU ? "(u32) " : "",
|
insn->code, class == BPF_ALU ? "(u32) " : "",
|
||||||
insn->dst_reg,
|
insn->dst_reg,
|
||||||
bpf_alu_string[BPF_OP(insn->code) >> 4],
|
bpf_alu_string[BPF_OP(insn->code) >> 4],
|
||||||
class == BPF_ALU ? "(u32) " : "",
|
class == BPF_ALU ? "(u32) " : "",
|
||||||
insn->src_reg);
|
insn->src_reg);
|
||||||
} else {
|
} else {
|
||||||
verbose(env, "(%02x) %sr%d %s %s%d\n",
|
verbose(cbs->private_data, "(%02x) %sr%d %s %s%d\n",
|
||||||
insn->code, class == BPF_ALU ? "(u32) " : "",
|
insn->code, class == BPF_ALU ? "(u32) " : "",
|
||||||
insn->dst_reg,
|
insn->dst_reg,
|
||||||
bpf_alu_string[BPF_OP(insn->code) >> 4],
|
bpf_alu_string[BPF_OP(insn->code) >> 4],
|
||||||
|
@ -157,46 +157,46 @@ void print_bpf_insn(const struct bpf_insn_cbs *cbs,
|
||||||
}
|
}
|
||||||
} else if (class == BPF_STX) {
|
} else if (class == BPF_STX) {
|
||||||
if (BPF_MODE(insn->code) == BPF_MEM)
|
if (BPF_MODE(insn->code) == BPF_MEM)
|
||||||
verbose(env, "(%02x) *(%s *)(r%d %+d) = r%d\n",
|
verbose(cbs->private_data, "(%02x) *(%s *)(r%d %+d) = r%d\n",
|
||||||
insn->code,
|
insn->code,
|
||||||
bpf_ldst_string[BPF_SIZE(insn->code) >> 3],
|
bpf_ldst_string[BPF_SIZE(insn->code) >> 3],
|
||||||
insn->dst_reg,
|
insn->dst_reg,
|
||||||
insn->off, insn->src_reg);
|
insn->off, insn->src_reg);
|
||||||
else if (BPF_MODE(insn->code) == BPF_XADD)
|
else if (BPF_MODE(insn->code) == BPF_XADD)
|
||||||
verbose(env, "(%02x) lock *(%s *)(r%d %+d) += r%d\n",
|
verbose(cbs->private_data, "(%02x) lock *(%s *)(r%d %+d) += r%d\n",
|
||||||
insn->code,
|
insn->code,
|
||||||
bpf_ldst_string[BPF_SIZE(insn->code) >> 3],
|
bpf_ldst_string[BPF_SIZE(insn->code) >> 3],
|
||||||
insn->dst_reg, insn->off,
|
insn->dst_reg, insn->off,
|
||||||
insn->src_reg);
|
insn->src_reg);
|
||||||
else
|
else
|
||||||
verbose(env, "BUG_%02x\n", insn->code);
|
verbose(cbs->private_data, "BUG_%02x\n", insn->code);
|
||||||
} else if (class == BPF_ST) {
|
} else if (class == BPF_ST) {
|
||||||
if (BPF_MODE(insn->code) != BPF_MEM) {
|
if (BPF_MODE(insn->code) != BPF_MEM) {
|
||||||
verbose(env, "BUG_st_%02x\n", insn->code);
|
verbose(cbs->private_data, "BUG_st_%02x\n", insn->code);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
verbose(env, "(%02x) *(%s *)(r%d %+d) = %d\n",
|
verbose(cbs->private_data, "(%02x) *(%s *)(r%d %+d) = %d\n",
|
||||||
insn->code,
|
insn->code,
|
||||||
bpf_ldst_string[BPF_SIZE(insn->code) >> 3],
|
bpf_ldst_string[BPF_SIZE(insn->code) >> 3],
|
||||||
insn->dst_reg,
|
insn->dst_reg,
|
||||||
insn->off, insn->imm);
|
insn->off, insn->imm);
|
||||||
} else if (class == BPF_LDX) {
|
} else if (class == BPF_LDX) {
|
||||||
if (BPF_MODE(insn->code) != BPF_MEM) {
|
if (BPF_MODE(insn->code) != BPF_MEM) {
|
||||||
verbose(env, "BUG_ldx_%02x\n", insn->code);
|
verbose(cbs->private_data, "BUG_ldx_%02x\n", insn->code);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
verbose(env, "(%02x) r%d = *(%s *)(r%d %+d)\n",
|
verbose(cbs->private_data, "(%02x) r%d = *(%s *)(r%d %+d)\n",
|
||||||
insn->code, insn->dst_reg,
|
insn->code, insn->dst_reg,
|
||||||
bpf_ldst_string[BPF_SIZE(insn->code) >> 3],
|
bpf_ldst_string[BPF_SIZE(insn->code) >> 3],
|
||||||
insn->src_reg, insn->off);
|
insn->src_reg, insn->off);
|
||||||
} else if (class == BPF_LD) {
|
} else if (class == BPF_LD) {
|
||||||
if (BPF_MODE(insn->code) == BPF_ABS) {
|
if (BPF_MODE(insn->code) == BPF_ABS) {
|
||||||
verbose(env, "(%02x) r0 = *(%s *)skb[%d]\n",
|
verbose(cbs->private_data, "(%02x) r0 = *(%s *)skb[%d]\n",
|
||||||
insn->code,
|
insn->code,
|
||||||
bpf_ldst_string[BPF_SIZE(insn->code) >> 3],
|
bpf_ldst_string[BPF_SIZE(insn->code) >> 3],
|
||||||
insn->imm);
|
insn->imm);
|
||||||
} else if (BPF_MODE(insn->code) == BPF_IND) {
|
} else if (BPF_MODE(insn->code) == BPF_IND) {
|
||||||
verbose(env, "(%02x) r0 = *(%s *)skb[r%d + %d]\n",
|
verbose(cbs->private_data, "(%02x) r0 = *(%s *)skb[r%d + %d]\n",
|
||||||
insn->code,
|
insn->code,
|
||||||
bpf_ldst_string[BPF_SIZE(insn->code) >> 3],
|
bpf_ldst_string[BPF_SIZE(insn->code) >> 3],
|
||||||
insn->src_reg, insn->imm);
|
insn->src_reg, insn->imm);
|
||||||
|
@ -212,12 +212,12 @@ void print_bpf_insn(const struct bpf_insn_cbs *cbs,
|
||||||
if (map_ptr && !allow_ptr_leaks)
|
if (map_ptr && !allow_ptr_leaks)
|
||||||
imm = 0;
|
imm = 0;
|
||||||
|
|
||||||
verbose(env, "(%02x) r%d = %s\n",
|
verbose(cbs->private_data, "(%02x) r%d = %s\n",
|
||||||
insn->code, insn->dst_reg,
|
insn->code, insn->dst_reg,
|
||||||
__func_imm_name(cbs, insn, imm,
|
__func_imm_name(cbs, insn, imm,
|
||||||
tmp, sizeof(tmp)));
|
tmp, sizeof(tmp)));
|
||||||
} else {
|
} else {
|
||||||
verbose(env, "BUG_ld_%02x\n", insn->code);
|
verbose(cbs->private_data, "BUG_ld_%02x\n", insn->code);
|
||||||
return;
|
return;
|
||||||
}
|
}
|
||||||
} else if (class == BPF_JMP) {
|
} else if (class == BPF_JMP) {
|
||||||
|
@ -227,35 +227,35 @@ void print_bpf_insn(const struct bpf_insn_cbs *cbs,
|
||||||
char tmp[64];
|
char tmp[64];
|
||||||
|
|
||||||
if (insn->src_reg == BPF_PSEUDO_CALL) {
|
if (insn->src_reg == BPF_PSEUDO_CALL) {
|
||||||
verbose(env, "(%02x) call pc%s\n",
|
verbose(cbs->private_data, "(%02x) call pc%s\n",
|
||||||
insn->code,
|
insn->code,
|
||||||
__func_get_name(cbs, insn,
|
__func_get_name(cbs, insn,
|
||||||
tmp, sizeof(tmp)));
|
tmp, sizeof(tmp)));
|
||||||
} else {
|
} else {
|
||||||
strcpy(tmp, "unknown");
|
strcpy(tmp, "unknown");
|
||||||
verbose(env, "(%02x) call %s#%d\n", insn->code,
|
verbose(cbs->private_data, "(%02x) call %s#%d\n", insn->code,
|
||||||
__func_get_name(cbs, insn,
|
__func_get_name(cbs, insn,
|
||||||
tmp, sizeof(tmp)),
|
tmp, sizeof(tmp)),
|
||||||
insn->imm);
|
insn->imm);
|
||||||
}
|
}
|
||||||
} else if (insn->code == (BPF_JMP | BPF_JA)) {
|
} else if (insn->code == (BPF_JMP | BPF_JA)) {
|
||||||
verbose(env, "(%02x) goto pc%+d\n",
|
verbose(cbs->private_data, "(%02x) goto pc%+d\n",
|
||||||
insn->code, insn->off);
|
insn->code, insn->off);
|
||||||
} else if (insn->code == (BPF_JMP | BPF_EXIT)) {
|
} else if (insn->code == (BPF_JMP | BPF_EXIT)) {
|
||||||
verbose(env, "(%02x) exit\n", insn->code);
|
verbose(cbs->private_data, "(%02x) exit\n", insn->code);
|
||||||
} else if (BPF_SRC(insn->code) == BPF_X) {
|
} else if (BPF_SRC(insn->code) == BPF_X) {
|
||||||
verbose(env, "(%02x) if r%d %s r%d goto pc%+d\n",
|
verbose(cbs->private_data, "(%02x) if r%d %s r%d goto pc%+d\n",
|
||||||
insn->code, insn->dst_reg,
|
insn->code, insn->dst_reg,
|
||||||
bpf_jmp_string[BPF_OP(insn->code) >> 4],
|
bpf_jmp_string[BPF_OP(insn->code) >> 4],
|
||||||
insn->src_reg, insn->off);
|
insn->src_reg, insn->off);
|
||||||
} else {
|
} else {
|
||||||
verbose(env, "(%02x) if r%d %s 0x%x goto pc%+d\n",
|
verbose(cbs->private_data, "(%02x) if r%d %s 0x%x goto pc%+d\n",
|
||||||
insn->code, insn->dst_reg,
|
insn->code, insn->dst_reg,
|
||||||
bpf_jmp_string[BPF_OP(insn->code) >> 4],
|
bpf_jmp_string[BPF_OP(insn->code) >> 4],
|
||||||
insn->imm, insn->off);
|
insn->imm, insn->off);
|
||||||
}
|
}
|
||||||
} else {
|
} else {
|
||||||
verbose(env, "(%02x) %s\n",
|
verbose(cbs->private_data, "(%02x) %s\n",
|
||||||
insn->code, bpf_class_string[class]);
|
insn->code, bpf_class_string[class]);
|
||||||
}
|
}
|
||||||
}
|
}
|
||||||
|
|
|
@ -22,14 +22,12 @@
|
||||||
#include <string.h>
|
#include <string.h>
|
||||||
#endif
|
#endif
|
||||||
|
|
||||||
struct bpf_verifier_env;
|
|
||||||
|
|
||||||
extern const char *const bpf_alu_string[16];
|
extern const char *const bpf_alu_string[16];
|
||||||
extern const char *const bpf_class_string[8];
|
extern const char *const bpf_class_string[8];
|
||||||
|
|
||||||
const char *func_id_name(int id);
|
const char *func_id_name(int id);
|
||||||
|
|
||||||
typedef __printf(2, 3) void (*bpf_insn_print_t)(struct bpf_verifier_env *env,
|
typedef __printf(2, 3) void (*bpf_insn_print_t)(void *private_data,
|
||||||
const char *, ...);
|
const char *, ...);
|
||||||
typedef const char *(*bpf_insn_revmap_call_t)(void *private_data,
|
typedef const char *(*bpf_insn_revmap_call_t)(void *private_data,
|
||||||
const struct bpf_insn *insn);
|
const struct bpf_insn *insn);
|
||||||
|
@ -45,7 +43,6 @@ struct bpf_insn_cbs {
|
||||||
};
|
};
|
||||||
|
|
||||||
void print_bpf_insn(const struct bpf_insn_cbs *cbs,
|
void print_bpf_insn(const struct bpf_insn_cbs *cbs,
|
||||||
struct bpf_verifier_env *env,
|
|
||||||
const struct bpf_insn *insn,
|
const struct bpf_insn *insn,
|
||||||
bool allow_ptr_leaks);
|
bool allow_ptr_leaks);
|
||||||
#endif
|
#endif
|
||||||
|
|
|
@ -168,23 +168,16 @@ struct bpf_call_arg_meta {
|
||||||
|
|
||||||
static DEFINE_MUTEX(bpf_verifier_lock);
|
static DEFINE_MUTEX(bpf_verifier_lock);
|
||||||
|
|
||||||
/* log_level controls verbosity level of eBPF verifier.
|
static void log_write(struct bpf_verifier_env *env, const char *fmt,
|
||||||
* bpf_verifier_log_write() is used to dump the verification trace to the log,
|
va_list args)
|
||||||
* so the user can figure out what's wrong with the program
|
|
||||||
*/
|
|
||||||
__printf(2, 3) void bpf_verifier_log_write(struct bpf_verifier_env *env,
|
|
||||||
const char *fmt, ...)
|
|
||||||
{
|
{
|
||||||
struct bpf_verifer_log *log = &env->log;
|
struct bpf_verifer_log *log = &env->log;
|
||||||
unsigned int n;
|
unsigned int n;
|
||||||
va_list args;
|
|
||||||
|
|
||||||
if (!log->level || !log->ubuf || bpf_verifier_log_full(log))
|
if (!log->level || !log->ubuf || bpf_verifier_log_full(log))
|
||||||
return;
|
return;
|
||||||
|
|
||||||
va_start(args, fmt);
|
|
||||||
n = vscnprintf(log->kbuf, BPF_VERIFIER_TMP_LOG_SIZE, fmt, args);
|
n = vscnprintf(log->kbuf, BPF_VERIFIER_TMP_LOG_SIZE, fmt, args);
|
||||||
va_end(args);
|
|
||||||
|
|
||||||
WARN_ONCE(n >= BPF_VERIFIER_TMP_LOG_SIZE - 1,
|
WARN_ONCE(n >= BPF_VERIFIER_TMP_LOG_SIZE - 1,
|
||||||
"verifier log line truncated - local buffer too short\n");
|
"verifier log line truncated - local buffer too short\n");
|
||||||
|
@ -197,14 +190,30 @@ __printf(2, 3) void bpf_verifier_log_write(struct bpf_verifier_env *env,
|
||||||
else
|
else
|
||||||
log->ubuf = NULL;
|
log->ubuf = NULL;
|
||||||
}
|
}
|
||||||
EXPORT_SYMBOL_GPL(bpf_verifier_log_write);
|
|
||||||
/* Historically bpf_verifier_log_write was called verbose, but the name was too
|
/* log_level controls verbosity level of eBPF verifier.
|
||||||
* generic for symbol export. The function was renamed, but not the calls in
|
* bpf_verifier_log_write() is used to dump the verification trace to the log,
|
||||||
* the verifier to avoid complicating backports. Hence the alias below.
|
* so the user can figure out what's wrong with the program
|
||||||
*/
|
*/
|
||||||
static __printf(2, 3) void verbose(struct bpf_verifier_env *env,
|
__printf(2, 3) void bpf_verifier_log_write(struct bpf_verifier_env *env,
|
||||||
const char *fmt, ...)
|
const char *fmt, ...)
|
||||||
__attribute__((alias("bpf_verifier_log_write")));
|
{
|
||||||
|
va_list args;
|
||||||
|
|
||||||
|
va_start(args, fmt);
|
||||||
|
log_write(env, fmt, args);
|
||||||
|
va_end(args);
|
||||||
|
}
|
||||||
|
EXPORT_SYMBOL_GPL(bpf_verifier_log_write);
|
||||||
|
|
||||||
|
__printf(2, 3) static void verbose(void *private_data, const char *fmt, ...)
|
||||||
|
{
|
||||||
|
va_list args;
|
||||||
|
|
||||||
|
va_start(args, fmt);
|
||||||
|
log_write(private_data, fmt, args);
|
||||||
|
va_end(args);
|
||||||
|
}
|
||||||
|
|
||||||
static bool type_is_pkt_pointer(enum bpf_reg_type type)
|
static bool type_is_pkt_pointer(enum bpf_reg_type type)
|
||||||
{
|
{
|
||||||
|
@ -4600,10 +4609,11 @@ static int do_check(struct bpf_verifier_env *env)
|
||||||
if (env->log.level) {
|
if (env->log.level) {
|
||||||
const struct bpf_insn_cbs cbs = {
|
const struct bpf_insn_cbs cbs = {
|
||||||
.cb_print = verbose,
|
.cb_print = verbose,
|
||||||
|
.private_data = env,
|
||||||
};
|
};
|
||||||
|
|
||||||
verbose(env, "%d: ", insn_idx);
|
verbose(env, "%d: ", insn_idx);
|
||||||
print_bpf_insn(&cbs, env, insn, env->allow_ptr_leaks);
|
print_bpf_insn(&cbs, insn, env->allow_ptr_leaks);
|
||||||
}
|
}
|
||||||
|
|
||||||
if (bpf_prog_is_dev_bound(env->prog->aux)) {
|
if (bpf_prog_is_dev_bound(env->prog->aux)) {
|
||||||
|
|
|
@ -114,7 +114,7 @@ static struct kernel_sym *kernel_syms_search(struct dump_data *dd,
|
||||||
sizeof(*dd->sym_mapping), kernel_syms_cmp) : NULL;
|
sizeof(*dd->sym_mapping), kernel_syms_cmp) : NULL;
|
||||||
}
|
}
|
||||||
|
|
||||||
static void print_insn(struct bpf_verifier_env *env, const char *fmt, ...)
|
static void print_insn(void *private_data, const char *fmt, ...)
|
||||||
{
|
{
|
||||||
va_list args;
|
va_list args;
|
||||||
|
|
||||||
|
@ -124,7 +124,7 @@ static void print_insn(struct bpf_verifier_env *env, const char *fmt, ...)
|
||||||
}
|
}
|
||||||
|
|
||||||
static void
|
static void
|
||||||
print_insn_for_graph(struct bpf_verifier_env *env, const char *fmt, ...)
|
print_insn_for_graph(void *private_data, const char *fmt, ...)
|
||||||
{
|
{
|
||||||
char buf[64], *p;
|
char buf[64], *p;
|
||||||
va_list args;
|
va_list args;
|
||||||
|
@ -154,7 +154,7 @@ print_insn_for_graph(struct bpf_verifier_env *env, const char *fmt, ...)
|
||||||
printf("%s", buf);
|
printf("%s", buf);
|
||||||
}
|
}
|
||||||
|
|
||||||
static void print_insn_json(struct bpf_verifier_env *env, const char *fmt, ...)
|
static void print_insn_json(void *private_data, const char *fmt, ...)
|
||||||
{
|
{
|
||||||
unsigned int l = strlen(fmt);
|
unsigned int l = strlen(fmt);
|
||||||
char chomped_fmt[l];
|
char chomped_fmt[l];
|
||||||
|
@ -248,7 +248,7 @@ void dump_xlated_json(struct dump_data *dd, void *buf, unsigned int len,
|
||||||
|
|
||||||
jsonw_start_object(json_wtr);
|
jsonw_start_object(json_wtr);
|
||||||
jsonw_name(json_wtr, "disasm");
|
jsonw_name(json_wtr, "disasm");
|
||||||
print_bpf_insn(&cbs, NULL, insn + i, true);
|
print_bpf_insn(&cbs, insn + i, true);
|
||||||
|
|
||||||
if (opcodes) {
|
if (opcodes) {
|
||||||
jsonw_name(json_wtr, "opcodes");
|
jsonw_name(json_wtr, "opcodes");
|
||||||
|
@ -302,7 +302,7 @@ void dump_xlated_plain(struct dump_data *dd, void *buf, unsigned int len,
|
||||||
double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);
|
double_insn = insn[i].code == (BPF_LD | BPF_IMM | BPF_DW);
|
||||||
|
|
||||||
printf("% 4d: ", i);
|
printf("% 4d: ", i);
|
||||||
print_bpf_insn(&cbs, NULL, insn + i, true);
|
print_bpf_insn(&cbs, insn + i, true);
|
||||||
|
|
||||||
if (opcodes) {
|
if (opcodes) {
|
||||||
printf(" ");
|
printf(" ");
|
||||||
|
@ -331,7 +331,7 @@ void dump_xlated_for_graph(struct dump_data *dd, void *buf_start, void *buf_end,
|
||||||
|
|
||||||
for (; cur <= insn_end; cur++) {
|
for (; cur <= insn_end; cur++) {
|
||||||
printf("% 4d: ", (int)(cur - insn_start + start_idx));
|
printf("% 4d: ", (int)(cur - insn_start + start_idx));
|
||||||
print_bpf_insn(&cbs, NULL, cur, true);
|
print_bpf_insn(&cbs, cur, true);
|
||||||
if (cur != insn_end)
|
if (cur != insn_end)
|
||||||
printf(" | ");
|
printf(" | ");
|
||||||
}
|
}
|
||||||
|
|
Loading…
Reference in New Issue