lists.openwall.net   lists  /  announce  owl-users  owl-dev  john-users  john-dev  passwdqc-users  yescrypt  popa3d-users  /  oss-security  kernel-hardening  musl  sabotage  tlsify  passwords  /  crypt-dev  xvendor  /  Bugtraq  Full-Disclosure  linux-kernel  linux-netdev  linux-ext4  linux-hardening  linux-cve-announce  PHC 
Open Source and information security mailing list archives
 
Hash Suite: Windows password security audit tool. GUI, reports in PDF.
[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Date:   Wed, 25 May 2022 14:25:54 -0700
From:   sdf@...gle.com
To:     Martin KaFai Lau <kafai@...com>
Cc:     Andrii Nakryiko <andrii.nakryiko@...il.com>,
        Networking <netdev@...r.kernel.org>, bpf <bpf@...r.kernel.org>,
        Alexei Starovoitov <ast@...nel.org>,
        Daniel Borkmann <daniel@...earbox.net>,
        Andrii Nakryiko <andrii@...nel.org>
Subject: Re: [PATCH bpf-next v7 05/11] bpf: implement BPF_PROG_QUERY for BPF_LSM_CGROUP

On 05/25, Martin KaFai Lau wrote:
> On Wed, May 25, 2022 at 10:02:07AM -0700, Stanislav Fomichev wrote:
> > On Wed, May 25, 2022 at 9:01 AM Stanislav Fomichev <sdf@...gle.com>  
> wrote:
> > >
> > > On Tue, May 24, 2022 at 9:39 PM Andrii Nakryiko
> > > <andrii.nakryiko@...il.com> wrote:
> > > >
> > > > On Tue, May 24, 2022 at 9:03 PM Stanislav Fomichev <sdf@...gle.com>  
> wrote:
> > > > >
> > > > > On Tue, May 24, 2022 at 4:45 PM Andrii Nakryiko
> > > > > <andrii.nakryiko@...il.com> wrote:
> > > > > >
> > > > > > On Tue, May 24, 2022 at 10:50 AM Martin KaFai Lau  
> <kafai@...com> wrote:
> > > > > > >
> > > > > > > On Tue, May 24, 2022 at 08:55:04AM -0700, Stanislav Fomichev  
> wrote:
> > > > > > > > On Mon, May 23, 2022 at 8:49 PM Martin KaFai Lau  
> <kafai@...com> wrote:
> > > > > > > > >
> > > > > > > > > On Wed, May 18, 2022 at 03:55:25PM -0700, Stanislav  
> Fomichev wrote:
> > > > > > > > > > We have two options:
> > > > > > > > > > 1. Treat all BPF_LSM_CGROUP the same, regardless of  
> attach_btf_id
> > > > > > > > > > 2. Treat BPF_LSM_CGROUP+attach_btf_id as a separate  
> hook point
> > > > > > > > > >
> > > > > > > > > > I was doing (2) in the original patch, but switching to  
> (1) here:
> > > > > > > > > >
> > > > > > > > > > * bpf_prog_query returns all attached BPF_LSM_CGROUP  
> programs
> > > > > > > > > > regardless of attach_btf_id
> > > > > > > > > > * attach_btf_id is exported via bpf_prog_info
> > > > > > > > > >
> > > > > > > > > > Signed-off-by: Stanislav Fomichev <sdf@...gle.com>
> > > > > > > > > > ---
> > > > > > > > > >  include/uapi/linux/bpf.h |   5 ++
> > > > > > > > > >  kernel/bpf/cgroup.c      | 103  
> +++++++++++++++++++++++++++------------
> > > > > > > > > >  kernel/bpf/syscall.c     |   4 +-
> > > > > > > > > >  3 files changed, 81 insertions(+), 31 deletions(-)
> > > > > > > > > >
> > > > > > > > > > diff --git a/include/uapi/linux/bpf.h  
> b/include/uapi/linux/bpf.h
> > > > > > > > > > index b9d2d6de63a7..432fc5f49567 100644
> > > > > > > > > > --- a/include/uapi/linux/bpf.h
> > > > > > > > > > +++ b/include/uapi/linux/bpf.h
> > > > > > > > > > @@ -1432,6 +1432,7 @@ union bpf_attr {
> > > > > > > > > >               __u32           attach_flags;
> > > > > > > > > >               __aligned_u64   prog_ids;
> > > > > > > > > >               __u32           prog_cnt;
> > > > > > > > > > +             __aligned_u64   prog_attach_flags; /*  
> output: per-program attach_flags */
> > > > > > > > > >       } query;
> > > > > > > > > >
> > > > > > > > > >       struct { /* anonymous struct used by  
> BPF_RAW_TRACEPOINT_OPEN command */
> > > > > > > > > > @@ -5911,6 +5912,10 @@ struct bpf_prog_info {
> > > > > > > > > >       __u64 run_cnt;
> > > > > > > > > >       __u64 recursion_misses;
> > > > > > > > > >       __u32 verified_insns;
> > > > > > > > > > +     /* BTF ID of the function to attach to within BTF  
> object identified
> > > > > > > > > > +      * by btf_id.
> > > > > > > > > > +      */
> > > > > > > > > > +     __u32 attach_btf_func_id;
> > > > > > > > > >  } __attribute__((aligned(8)));
> > > > > > > > > >
> > > > > > > > > >  struct bpf_map_info {
> > > > > > > > > > diff --git a/kernel/bpf/cgroup.c b/kernel/bpf/cgroup.c
> > > > > > > > > > index a959cdd22870..08a1015ee09e 100644
> > > > > > > > > > --- a/kernel/bpf/cgroup.c
> > > > > > > > > > +++ b/kernel/bpf/cgroup.c
> > > > > > > > > > @@ -1074,6 +1074,7 @@ static int  
> cgroup_bpf_detach(struct cgroup *cgrp, struct bpf_prog *prog,
> > > > > > > > > >  static int __cgroup_bpf_query(struct cgroup *cgrp,  
> const union bpf_attr *attr,
> > > > > > > > > >                             union bpf_attr __user  
> *uattr)
> > > > > > > > > >  {
> > > > > > > > > > +     __u32 __user *prog_attach_flags =  
> u64_to_user_ptr(attr->query.prog_attach_flags);
> > > > > > > > > >       __u32 __user *prog_ids =  
> u64_to_user_ptr(attr->query.prog_ids);
> > > > > > > > > >       enum bpf_attach_type type =  
> attr->query.attach_type;
> > > > > > > > > >       enum cgroup_bpf_attach_type atype;
> > > > > > > > > > @@ -1081,50 +1082,92 @@ static int  
> __cgroup_bpf_query(struct cgroup *cgrp, const union bpf_attr *attr,
> > > > > > > > > >       struct hlist_head *progs;
> > > > > > > > > >       struct bpf_prog *prog;
> > > > > > > > > >       int cnt, ret = 0, i;
> > > > > > > > > > +     int total_cnt = 0;
> > > > > > > > > >       u32 flags;
> > > > > > > > > >
> > > > > > > > > > -     atype = to_cgroup_bpf_attach_type(type);
> > > > > > > > > > -     if (atype < 0)
> > > > > > > > > > -             return -EINVAL;
> > > > > > > > > > +     enum cgroup_bpf_attach_type from_atype, to_atype;
> > > > > > > > > >
> > > > > > > > > > -     progs = &cgrp->bpf.progs[atype];
> > > > > > > > > > -     flags = cgrp->bpf.flags[atype];
> > > > > > > > > > +     if (type == BPF_LSM_CGROUP) {
> > > > > > > > > > +             from_atype = CGROUP_LSM_START;
> > > > > > > > > > +             to_atype = CGROUP_LSM_END;
> > > > > > > > > > +     } else {
> > > > > > > > > > +             from_atype =  
> to_cgroup_bpf_attach_type(type);
> > > > > > > > > > +             if (from_atype < 0)
> > > > > > > > > > +                     return -EINVAL;
> > > > > > > > > > +             to_atype = from_atype;
> > > > > > > > > > +     }
> > > > > > > > > >
> > > > > > > > > > -     effective =  
> rcu_dereference_protected(cgrp->bpf.effective[atype],
> > > > > > > > > > -                                            
> lockdep_is_held(&cgroup_mutex));
> > > > > > > > > > +     for (atype = from_atype; atype <= to_atype;  
> atype++) {
> > > > > > > > > > +             progs = &cgrp->bpf.progs[atype];
> > > > > > > > > > +             flags = cgrp->bpf.flags[atype];
> > > > > > > > > >
> > > > > > > > > > -     if (attr->query.query_flags &  
> BPF_F_QUERY_EFFECTIVE)
> > > > > > > > > > -             cnt = bpf_prog_array_length(effective);
> > > > > > > > > > -     else
> > > > > > > > > > -             cnt = prog_list_length(progs);
> > > > > > > > > > +             effective =  
> rcu_dereference_protected(cgrp->bpf.effective[atype],
> > > > > > > > > > +                                                    
> lockdep_is_held(&cgroup_mutex));
> > > > > > > > > >
> > > > > > > > > > -     if (copy_to_user(&uattr->query.attach_flags,  
> &flags, sizeof(flags)))
> > > > > > > > > > -             return -EFAULT;
> > > > > > > > > > -     if (copy_to_user(&uattr->query.prog_cnt, &cnt,  
> sizeof(cnt)))
> > > > > > > > > > +             if (attr->query.query_flags &  
> BPF_F_QUERY_EFFECTIVE)
> > > > > > > > > > +                     total_cnt +=  
> bpf_prog_array_length(effective);
> > > > > > > > > > +             else
> > > > > > > > > > +                     total_cnt +=  
> prog_list_length(progs);
> > > > > > > > > > +     }
> > > > > > > > > > +
> > > > > > > > > > +     if (type != BPF_LSM_CGROUP)
> > > > > > > > > > +             if  
> (copy_to_user(&uattr->query.attach_flags, &flags, sizeof(flags)))
> > > > > > > > > > +                     return -EFAULT;
> > > > > > > > > > +     if (copy_to_user(&uattr->query.prog_cnt,  
> &total_cnt, sizeof(total_cnt)))
> > > > > > > > > >               return -EFAULT;
> > > > > > > > > > -     if (attr->query.prog_cnt == 0 || !prog_ids | 
> | !cnt)
> > > > > > > > > > +     if (attr->query.prog_cnt == 0 || !prog_ids | 
> | !total_cnt)
> > > > > > > > > >               /* return early if user requested only  
> program count + flags */
> > > > > > > > > >               return 0;
> > > > > > > > > > -     if (attr->query.prog_cnt < cnt) {
> > > > > > > > > > -             cnt = attr->query.prog_cnt;
> > > > > > > > > > +
> > > > > > > > > > +     if (attr->query.prog_cnt < total_cnt) {
> > > > > > > > > > +             total_cnt = attr->query.prog_cnt;
> > > > > > > > > >               ret = -ENOSPC;
> > > > > > > > > >       }
> > > > > > > > > >
> > > > > > > > > > -     if (attr->query.query_flags &  
> BPF_F_QUERY_EFFECTIVE) {
> > > > > > > > > > -             return  
> bpf_prog_array_copy_to_user(effective, prog_ids, cnt);
> > > > > > > > > > -     } else {
> > > > > > > > > > -             struct bpf_prog_list *pl;
> > > > > > > > > > -             u32 id;
> > > > > > > > > > +     for (atype = from_atype; atype <= to_atype;  
> atype++) {
> > > > > > > > > > +             if (total_cnt <= 0)
> > > > > > > > > > +                     break;
> > > > > > > > > >
> > > > > > > > > > -             i = 0;
> > > > > > > > > > -             hlist_for_each_entry(pl, progs, node) {
> > > > > > > > > > -                     prog = prog_list_prog(pl);
> > > > > > > > > > -                     id = prog->aux->id;
> > > > > > > > > > -                     if (copy_to_user(prog_ids + i,  
> &id, sizeof(id)))
> > > > > > > > > > -                             return -EFAULT;
> > > > > > > > > > -                     if (++i == cnt)
> > > > > > > > > > -                             break;
> > > > > > > > > > +             progs = &cgrp->bpf.progs[atype];
> > > > > > > > > > +             flags = cgrp->bpf.flags[atype];
> > > > > > > > > > +
> > > > > > > > > > +             effective =  
> rcu_dereference_protected(cgrp->bpf.effective[atype],
> > > > > > > > > > +                                                    
> lockdep_is_held(&cgroup_mutex));
> > > > > > > > > > +
> > > > > > > > > > +             if (attr->query.query_flags &  
> BPF_F_QUERY_EFFECTIVE)
> > > > > > > > > > +                     cnt =  
> bpf_prog_array_length(effective);
> > > > > > > > > > +             else
> > > > > > > > > > +                     cnt = prog_list_length(progs);
> > > > > > > > > > +
> > > > > > > > > > +             if (cnt >= total_cnt)
> > > > > > > > > > +                     cnt = total_cnt;
> > > > > > > > > > +
> > > > > > > > > > +             if (attr->query.query_flags &  
> BPF_F_QUERY_EFFECTIVE) {
> > > > > > > > > > +                     ret =  
> bpf_prog_array_copy_to_user(effective, prog_ids, cnt);
> > > > > > > > > > +             } else {
> > > > > > > > > > +                     struct bpf_prog_list *pl;
> > > > > > > > > > +                     u32 id;
> > > > > > > > > > +
> > > > > > > > > > +                     i = 0;
> > > > > > > > > > +                     hlist_for_each_entry(pl, progs,  
> node) {
> > > > > > > > > > +                             prog = prog_list_prog(pl);
> > > > > > > > > > +                             id = prog->aux->id;
> > > > > > > > > > +                             if (copy_to_user(prog_ids  
> + i, &id, sizeof(id)))
> > > > > > > > > > +                                     return -EFAULT;
> > > > > > > > > > +                             if (++i == cnt)
> > > > > > > > > > +                                     break;
> > > > > > > > > > +                     }
> > > > > > > > > >               }
> > > > > > > > > > +
> > > > > > > > > > +             if (prog_attach_flags)
> > > > > > > > > > +                     for (i = 0; i < cnt; i++)
> > > > > > > > > > +                             if  
> (copy_to_user(prog_attach_flags + i, &flags, sizeof(flags)))
> > > > > > > > > > +                                     return -EFAULT;
> > > > > > > > > > +
> > > > > > > > > > +             prog_ids += cnt;
> > > > > > > > > > +             total_cnt -= cnt;
> > > > > > > > > > +             if (prog_attach_flags)
> > > > > > > > > > +                     prog_attach_flags += cnt;
> > > > > > > > > >       }
> > > > > > > > > >       return ret;
> > > > > > > > > >  }
> > > > > > > > > > diff --git a/kernel/bpf/syscall.c b/kernel/bpf/syscall.c
> > > > > > > > > > index 5ed2093e51cc..4137583c04a2 100644
> > > > > > > > > > --- a/kernel/bpf/syscall.c
> > > > > > > > > > +++ b/kernel/bpf/syscall.c
> > > > > > > > > > @@ -3520,7 +3520,7 @@ static int bpf_prog_detach(const  
> union bpf_attr *attr)
> > > > > > > > > >       }
> > > > > > > > > >  }
> > > > > > > > > >
> > > > > > > > > > -#define BPF_PROG_QUERY_LAST_FIELD query.prog_cnt
> > > > > > > > > > +#define BPF_PROG_QUERY_LAST_FIELD  
> query.prog_attach_flags
> > > > > > > > > >
> > > > > > > > > >  static int bpf_prog_query(const union bpf_attr *attr,
> > > > > > > > > >                         union bpf_attr __user *uattr)
> > > > > > > > > > @@ -3556,6 +3556,7 @@ static int bpf_prog_query(const  
> union bpf_attr *attr,
> > > > > > > > > >       case BPF_CGROUP_SYSCTL:
> > > > > > > > > >       case BPF_CGROUP_GETSOCKOPT:
> > > > > > > > > >       case BPF_CGROUP_SETSOCKOPT:
> > > > > > > > > > +     case BPF_LSM_CGROUP:
> > > > > > > > > >               return cgroup_bpf_prog_query(attr, uattr);
> > > > > > > > > >       case BPF_LIRC_MODE2:
> > > > > > > > > >               return lirc_prog_query(attr, uattr);
> > > > > > > > > > @@ -4066,6 +4067,7 @@ static int  
> bpf_prog_get_info_by_fd(struct file *file,
> > > > > > > > > >
> > > > > > > > > >       if (prog->aux->btf)
> > > > > > > > > >               info.btf_id = btf_obj_id(prog->aux->btf);
> > > > > > > > > > +     info.attach_btf_func_id =  
> prog->aux->attach_btf_id;
> > > > > > > > > Note that exposing prog->aux->attach_btf_id only may not  
> be enough
> > > > > > > > > unless it can assume info.attach_btf_id is always  
> referring to btf_vmlinux
> > > > > > > > > for all bpf prog types.
> > > > > > > >
> > > > > > > > We also export btf_id two lines above, right? Btw, I left a  
> comment in
> > > > > > > > the bpftool about those btf_ids, I'm not sure how resolve  
> them and
> > > > > > > > always assume vmlinux for now.
> > > > > > > yeah, that btf_id above is the cgroup-lsm prog's btf_id which  
> has its
> > > > > > > func info, line info...etc.   It is not the one the  
> attach_btf_id correspond
> > > > > > > to.  attach_btf_id refers to either aux->attach_btf or  
> aux->dst_prog's btf (or
> > > > > > > target btf id here).
> > > > > > >
> > > > > > > It needs a consensus on where this attach_btf_id, target btf  
> id, and
> > > > > > > prog_attach_flags should be.  If I read the patch 7 thread  
> correctly,
> > > > > > > I think Andrii is suggesting to expose them to userspace  
> through link, so
> > > > > > > potentially putting them in bpf_link_info.  The  
> bpf_prog_query will
> > > > > > > output a list of link ids.  The same probably applies to
> > > > > >
> > > > > > Yep and I think it makes sense because link is representing one
> > > > > > specific attachment (and I presume flags can be stored inside  
> the link
> > > > > > itself as well, right?).
> > > > > >
> > > > > > But if legacy non-link BPF_PROG_ATTACH is supported then using
> > > > > > bpf_link_info won't cover legacy prog-only attachments.
> > > > >
> > > > > I don't have any attachment to the legacy apis, I'm supporting  
> them
> > > > > only because it takes two lines of code; we can go link-only if  
> there
> > > > > is an agreement that it's inherently better.
> > > > >
> > > > > How about I keep sys_bpf(BPF_PROG_QUERY) as is and I do a loop in  
> the
> > > > > userspace (for BPF_LSM_CGROUP only) over all links
> > > > > (BPF_LINK_GET_NEXT_ID) and will find the the ones with matching  
> prog
> > > > > ids (BPF_LINK_GET_FD_BY_ID+BPF_OBJ_GET_INFO_BY_FD)?
> > > > >
> > > > > That way we keep new fields in bpf_link_info, but we don't have to
> > > > > extend sys_bpf(BPF_PROG_QUERY) because there doesn't seem to be a  
> good
> > > > > way to do it. Exporting links via new link_fds would mean we'd  
> have to
> > > > > support BPF_F_QUERY_EFFECTIVE, but getting an effective array of  
> links
> > > > > seems to be messy. If, in the future, we figure out a better way  
> to
> I don't see a clean way to get effective array from one individual
> link[_info] through link iteration.  effective array is the progs that
> will be run at a cgroup and in such order.  The prog running at a
> cgroup doesn't necessarily linked to that cgroup.

Yeah, that's the problem with exposing links via prog_info; getting an
effective list is painful.

> If staying with BPF_PROG_QUERY+BPF_F_QUERY_EFFECTIVE to get effective  
> array
> and if it is decided the addition should be done in bpf_link_info,
> then a list of link ids needs to be output instead of the current list of
> prog ids.  The old attach type will still have to stay with the list of
> prog ids though :/

> It will be sad not to be able to get effective only for BPF_LSM_CGROUP.
> I found it more useful to show what will be run at a cgroup and in such
> order instead of what is linked to a cgroup.

See my hacky proof-of-concept below (on top of this series).

I think if we keep prog_info as is (don't export anything new, don't
export the list of links), iterating through all links on the host should  
work,
right? We get prog_ids list (effective or not, doesn't matter), then we
go through all the links and find the ones with with the same
prog_id (we can ignore cgroup, it shouldn't matter). Then we can export
attach_type/attach_btf_id/etc. If it happens to be slow in the future,
we can improve with some tbd interface to get the list of links for cgroup
(and then we'd have to care about effective list).

But the problem with going link-only is that I'd have to teach bpftool
to use links for BPF_LSM_CGROUP and it brings a bunch of problems:
* I'd have to pin those links somewhere to make them stick around
* Those pin paths essentially become an API now because "detach" now
   depends on them?
* (right now it automatically works with the legacy apis without any  
changes)

diff --git a/include/uapi/linux/bpf.h b/include/uapi/linux/bpf.h
index 269ad43b68c1..f34b64b9ba97 100644
--- a/include/uapi/linux/bpf.h
+++ b/include/uapi/linux/bpf.h
@@ -6049,6 +6049,9 @@ struct bpf_link_info {
  		struct {
  			__u64 cgroup_id;
  			__u32 attach_type;
+			__u32 attach_flags;
+			__u32 attach_btf_id;
+			__u32 attach_btf_obj_id;
  		} cgroup;
  		struct {
  			__aligned_u64 target_name; /* in/out: target_name buffer ptr */
diff --git a/kernel/bpf/cgroup.c b/kernel/bpf/cgroup.c
index e05f7a11b45a..b5159e7f64f5 100644
--- a/kernel/bpf/cgroup.c
+++ b/kernel/bpf/cgroup.c
@@ -1211,6 +1211,20 @@ static int bpf_cgroup_link_fill_link_info(const  
struct bpf_link *link,

  	info->cgroup.cgroup_id = cg_id;
  	info->cgroup.attach_type = cg_link->type;
+
+	info->cgroup.attach_btf_id = cg_link->link.prog->aux->attach_btf_id;
+	if (cg_link->link.prog->aux->attach_btf)
+		info->cgroup.attach_btf_obj_id =  
btf_obj_id(cg_link->link.prog->aux->attach_btf);
+
+	if (cg_link->cgroup) {
+		int atype;
+
+		mutex_lock(&cgroup_mutex);
+		atype = bpf_cgroup_atype_find(cg_link->type,  
cg_link->link.prog->aux->attach_btf_id);
+		info->cgroup.attach_flags = cg_link->cgroup->bpf.flags[atype];
+		mutex_unlock(&cgroup_mutex);
+	}
+
  	return 0;
  }

diff --git a/tools/bpf/bpftool/cgroup.c b/tools/bpf/bpftool/cgroup.c
index f40d4745711c..3cece48ebaa9 100644
--- a/tools/bpf/bpftool/cgroup.c
+++ b/tools/bpf/bpftool/cgroup.c
@@ -49,15 +49,34 @@ static enum bpf_attach_type parse_attach_type(const  
char *str)
  }

  static int show_bpf_prog(int id, enum bpf_attach_type attach_type,
-			 const char *attach_flags_str,
+			 __u32 attach_flags,
+			 __u32 attach_btf_id,
+			 __u32 attach_btf_obj_id,
  			 int level)
  {
  	char prog_name[MAX_PROG_FULL_NAME];
  	const char *attach_btf_name = NULL;
  	struct bpf_prog_info info = {};
  	__u32 info_len = sizeof(info);
+	const char *attach_flags_str;
+	char buf[32];
  	int prog_fd;

+	switch (attach_flags) {
+	case BPF_F_ALLOW_MULTI:
+		attach_flags_str = "multi";
+		break;
+	case BPF_F_ALLOW_OVERRIDE:
+		attach_flags_str = "override";
+		break;
+	case 0:
+		attach_flags_str = "";
+		break;
+	default:
+		snprintf(buf, sizeof(buf), "unknown(%x)", attach_flags);
+		attach_flags_str = buf;
+	}
+
  	prog_fd = bpf_prog_get_fd_by_id(id);
  	if (prog_fd < 0)
  		return -1;
@@ -68,13 +87,13 @@ static int show_bpf_prog(int id, enum bpf_attach_type  
attach_type,
  	}

  	if (btf_vmlinux &&
-	    info.attach_btf_id < btf__type_cnt(btf_vmlinux)) {
-		/* Note, we ignore info.btf_id for now. There
+	    attach_btf_id < btf__type_cnt(btf_vmlinux)) {
+		/* Note, we ignore attach_btf_obj_id for now. There
  		 * is no good way to resolve btf_id to vmlinux
  		 * or module btf.
  		 */
  		const struct btf_type *t = btf__type_by_id(btf_vmlinux,
-							   info.attach_btf_id);
+							   attach_btf_id);
  		attach_btf_name = btf__name_by_offset(btf_vmlinux,
  						      t->name_off);
  	}
@@ -93,8 +112,8 @@ static int show_bpf_prog(int id, enum bpf_attach_type  
attach_type,
  		jsonw_string_field(json_wtr, "name", prog_name);
  		if (attach_btf_name)
  			jsonw_string_field(json_wtr, "attach_btf_name", attach_btf_name);
-		jsonw_uint_field(json_wtr, "btf_id", info.btf_id);
-		jsonw_uint_field(json_wtr, "attach_btf_id", info.attach_btf_id);
+		jsonw_uint_field(json_wtr, "btf_id", attach_btf_obj_id);
+		jsonw_uint_field(json_wtr, "attach_btf_id", attach_btf_id);
  		jsonw_end_object(json_wtr);
  	} else {
  		printf("%s%-8u ", level ? "    " : "", info.id);
@@ -105,8 +124,8 @@ static int show_bpf_prog(int id, enum bpf_attach_type  
attach_type,
  		printf(" %-15s %-15s", attach_flags_str, prog_name);
  		if (attach_btf_name)
  			printf(" %-15s", attach_btf_name);
-		else if (info.attach_btf_id)
-			printf(" btf_id=%d attach_btf_id=%d", info.btf_id, info.attach_btf_id);
+		else if (attach_btf_id)
+			printf(" btf_id=%d attach_btf_id=%d", attach_btf_obj_id, attach_btf_id);
  		printf("\n");
  	}

@@ -150,10 +169,10 @@ static int show_attached_bpf_progs(int cgroup_fd,  
enum bpf_attach_type type,
  				   int level)
  {
  	LIBBPF_OPTS(bpf_prog_query_opts, p);
-	const char *attach_flags_str;
  	__u32 prog_ids[1024] = {0};
  	__u32 attach_prog_flags[1024] = {0};
-	char buf[32];
+	__u32 attach_btf_id[1024] = {0};
+	__u32 attach_btf_obj_id[1024] = {0};
  	__u32 iter;
  	int ret;

@@ -168,29 +187,58 @@ static int show_attached_bpf_progs(int cgroup_fd,  
enum bpf_attach_type type,
  	if (p.prog_cnt == 0)
  		return 0;

-	for (iter = 0; iter < p.prog_cnt; iter++) {
-		__u32 attach_flags;
+	if (type == BPF_LSM_CGROUP) {
+		/* Match prog_id to the link to find out link info. */
+		struct bpf_link_info link_info;
+		__u32 id = 0;
+		__u32 link_len;
+		int err;
+		int fd;
+
+		while (1) {
+			err = bpf_link_get_next_id(id, &id);
+			if (err) {
+				if (errno == ENOENT)
+					break;
+				continue;
+			}

-		attach_flags = attach_prog_flags[iter] ?: p.attach_flags;
+			fd = bpf_link_get_fd_by_id(id);
+			if (fd < 0)
+				continue;

-		switch (attach_flags) {
-		case BPF_F_ALLOW_MULTI:
-			attach_flags_str = "multi";
-			break;
-		case BPF_F_ALLOW_OVERRIDE:
-			attach_flags_str = "override";
-			break;
-		case 0:
-			attach_flags_str = "";
-			break;
-		default:
-			snprintf(buf, sizeof(buf), "unknown(%x)", attach_flags);
-			attach_flags_str = buf;
+			link_len = sizeof(struct bpf_link_info);
+			memset(&link_info, 0, link_len);
+			err = bpf_obj_get_info_by_fd(fd, &link_info, &link_len);
+			if (err) {
+				close(fd);
+				continue;
+			}
+
+			if (link_info.type != BPF_LINK_TYPE_CGROUP) {
+				close(fd);
+				continue;
+			}
+
+			for (iter = 0; iter < p.prog_cnt; iter++) {
+				if (prog_ids[iter] != link_info.prog_id)
+					continue;
+
+				fprintf(stderr, "\nprog_fd=%d btf_id=%d\n", link_info.prog_id,  
link_info.cgroup.attach_btf_id);
+
+				attach_prog_flags[iter] = link_info.cgroup.attach_flags;
+				attach_btf_id[iter] = link_info.cgroup.attach_btf_id;
+				attach_btf_obj_id[iter] = link_info.cgroup.attach_btf_obj_id;
+			}
  		}
+	}

+	for (iter = 0; iter < p.prog_cnt; iter++)
  		show_bpf_prog(prog_ids[iter], type,
-			      attach_flags_str, level);
-	}
+			      attach_prog_flags[iter] ?: p.attach_flags,
+			      attach_btf_id[iter],
+			      attach_btf_obj_id[iter],
+			      level);

  	return 0;
  }
diff --git a/tools/include/uapi/linux/bpf.h b/tools/include/uapi/linux/bpf.h
index 269ad43b68c1..f34b64b9ba97 100644
--- a/tools/include/uapi/linux/bpf.h
+++ b/tools/include/uapi/linux/bpf.h
@@ -6049,6 +6049,9 @@ struct bpf_link_info {
  		struct {
  			__u64 cgroup_id;
  			__u32 attach_type;
+			__u32 attach_flags;
+			__u32 attach_btf_id;
+			__u32 attach_btf_obj_id;
  		} cgroup;
  		struct {
  			__aligned_u64 target_name; /* in/out: target_name buffer ptr */

Powered by blists - more mailing lists