mirror of
				https://github.com/torvalds/linux.git
				synced 2025-11-04 02:30:34 +02:00 
			
		
		
		
	bpftool: Query only cgroup-related attach types
When CONFIG_NETKIT=y, bpftool-cgroup shows error even if the cgroup's path is correct: $ bpftool cgroup tree /sys/fs/cgroup CgroupPath ID AttachType AttachFlags Name Error: can't query bpf programs attached to /sys/fs/cgroup: No such device or address >From strace and kernel tracing, I found netkit returned ENXIO and this command failed. I think this AttachType(BPF_NETKIT_PRIMARY) is not relevant to cgroup. bpftool-cgroup should query just only cgroup-related attach types. v2->v3: - removed an unnecessary check v1->v2: - used an array of cgroup attach types Signed-off-by: Kenta Tada <tadakentaso@gmail.com> Reviewed-by: Quentin Monnet <qmo@kernel.org> Link: https://lore.kernel.org/r/20240607111704.6716-1-tadakentaso@gmail.com Signed-off-by: Alexei Starovoitov <ast@kernel.org>
This commit is contained in:
		
							parent
							
								
									bb678f0180
								
							
						
					
					
						commit
						98b303c9bf
					
				
					 1 changed files with 36 additions and 4 deletions
				
			
		| 
						 | 
					@ -19,6 +19,38 @@
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#include "main.h"
 | 
					#include "main.h"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
 | 
					static const int cgroup_attach_types[] = {
 | 
				
			||||||
 | 
						BPF_CGROUP_INET_INGRESS,
 | 
				
			||||||
 | 
						BPF_CGROUP_INET_EGRESS,
 | 
				
			||||||
 | 
						BPF_CGROUP_INET_SOCK_CREATE,
 | 
				
			||||||
 | 
						BPF_CGROUP_INET_SOCK_RELEASE,
 | 
				
			||||||
 | 
						BPF_CGROUP_INET4_BIND,
 | 
				
			||||||
 | 
						BPF_CGROUP_INET6_BIND,
 | 
				
			||||||
 | 
						BPF_CGROUP_INET4_POST_BIND,
 | 
				
			||||||
 | 
						BPF_CGROUP_INET6_POST_BIND,
 | 
				
			||||||
 | 
						BPF_CGROUP_INET4_CONNECT,
 | 
				
			||||||
 | 
						BPF_CGROUP_INET6_CONNECT,
 | 
				
			||||||
 | 
						BPF_CGROUP_UNIX_CONNECT,
 | 
				
			||||||
 | 
						BPF_CGROUP_INET4_GETPEERNAME,
 | 
				
			||||||
 | 
						BPF_CGROUP_INET6_GETPEERNAME,
 | 
				
			||||||
 | 
						BPF_CGROUP_UNIX_GETPEERNAME,
 | 
				
			||||||
 | 
						BPF_CGROUP_INET4_GETSOCKNAME,
 | 
				
			||||||
 | 
						BPF_CGROUP_INET6_GETSOCKNAME,
 | 
				
			||||||
 | 
						BPF_CGROUP_UNIX_GETSOCKNAME,
 | 
				
			||||||
 | 
						BPF_CGROUP_UDP4_SENDMSG,
 | 
				
			||||||
 | 
						BPF_CGROUP_UDP6_SENDMSG,
 | 
				
			||||||
 | 
						BPF_CGROUP_UNIX_SENDMSG,
 | 
				
			||||||
 | 
						BPF_CGROUP_UDP4_RECVMSG,
 | 
				
			||||||
 | 
						BPF_CGROUP_UDP6_RECVMSG,
 | 
				
			||||||
 | 
						BPF_CGROUP_UNIX_RECVMSG,
 | 
				
			||||||
 | 
						BPF_CGROUP_SOCK_OPS,
 | 
				
			||||||
 | 
						BPF_CGROUP_DEVICE,
 | 
				
			||||||
 | 
						BPF_CGROUP_SYSCTL,
 | 
				
			||||||
 | 
						BPF_CGROUP_GETSOCKOPT,
 | 
				
			||||||
 | 
						BPF_CGROUP_SETSOCKOPT,
 | 
				
			||||||
 | 
						BPF_LSM_CGROUP
 | 
				
			||||||
 | 
					};
 | 
				
			||||||
 | 
					
 | 
				
			||||||
#define HELP_SPEC_ATTACH_FLAGS						\
 | 
					#define HELP_SPEC_ATTACH_FLAGS						\
 | 
				
			||||||
	"ATTACH_FLAGS := { multi | override }"
 | 
						"ATTACH_FLAGS := { multi | override }"
 | 
				
			||||||
 | 
					
 | 
				
			||||||
| 
						 | 
					@ -183,13 +215,13 @@ static int count_attached_bpf_progs(int cgroup_fd, enum bpf_attach_type type)
 | 
				
			||||||
 | 
					
 | 
				
			||||||
static int cgroup_has_attached_progs(int cgroup_fd)
 | 
					static int cgroup_has_attached_progs(int cgroup_fd)
 | 
				
			||||||
{
 | 
					{
 | 
				
			||||||
	enum bpf_attach_type type;
 | 
						unsigned int i = 0;
 | 
				
			||||||
	bool no_prog = true;
 | 
						bool no_prog = true;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
	for (type = 0; type < __MAX_BPF_ATTACH_TYPE; type++) {
 | 
						for (i = 0; i < ARRAY_SIZE(cgroup_attach_types); i++) {
 | 
				
			||||||
		int count = count_attached_bpf_progs(cgroup_fd, type);
 | 
							int count = count_attached_bpf_progs(cgroup_fd, cgroup_attach_types[i]);
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (count < 0 && errno != EINVAL)
 | 
							if (count < 0)
 | 
				
			||||||
			return -1;
 | 
								return -1;
 | 
				
			||||||
 | 
					
 | 
				
			||||||
		if (count > 0) {
 | 
							if (count > 0) {
 | 
				
			||||||
| 
						 | 
					
 | 
				
			||||||
		Loading…
	
		Reference in a new issue