Received: by 2002:a05:6a10:206:0:0:0:0 with SMTP id 6csp1460452pxj; Sat, 15 May 2021 15:57:43 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzBGXyLKMT6dJSLj5cvVHeKkMqhCZkL9B0Fe13LJcybHwT5o5qkDoHjCUY2/YiYLH8M4ozw X-Received: by 2002:a05:6402:4251:: with SMTP id g17mr61696197edb.205.1621119462983; Sat, 15 May 2021 15:57:42 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1621119462; cv=none; d=google.com; s=arc-20160816; b=Gowxi1JtBOG7R28xpMubTy66vfw7RnXkM8YPqOj8eKIxHfBrGSsBeWj6BKXubJH7oC waKW/zN53cpJW3fg0uuOccIsqEOKTeqPX/g8gN4UQpinCIuK62M/Gko4U6+SfZ5XW/Zo MPIKDF/x5VQg51CVlGkLY8luOVlm5N+tAQrD8/FOjL+SdMrIBPipS5Mr50W/SxgLfNAV Z5pYLl6GoWmVzTSBev4X+YVDGbA4QjAVbwtMbv8UFVtjgL/EPX/w1PHU0Drjh+A1Vzo+ HpbunoZC6wuxuj8uL5XdUD40UMw8D0AMoycQhfKlAoIUz4FMOwO6+g0cg0DFkek/OEKS JfGA== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:in-reply-to:content-disposition:mime-version :references:reply-to:message-id:subject:cc:to:from:date :dkim-signature; bh=on/6xZCIaJvpMROmrp4eRzeLAabPNhtVrx6dFCuT2lk=; b=lk96BZYHJxb7N6o9+9F/LwbjhMEK5wenxjDbTJtGmyZ9eSRv0CSj765JtTtxJZY7Le akLzPRjx680zYX0MHdPRMwWQSg7Ca1l7/BwSUMiV/3bYJhseRmuRuB2S2lNVmQ7MroV3 HoZvQ0BOP+RJU8pXqvKljDtrykAgm36FIMC/hF9sHrCCDKACVmtON5+RVAAI0dahiLYZ 7GRRKv6RiDKDZFOfgMKFaENXLRzGMf4tCDaC95rJQkh7JuarxVwzZ4BHAwFv1lQTo8De c0vZMgcU+MSPN0ZtkyNA6LUKBBlEoAiGVZx1BIfrle3nyUrwK1P0ffOvivZje3eqyO4+ oY1g== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="e8/vbb43"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id fi12si10211865ejb.474.2021.05.15.15.57.18; Sat, 15 May 2021 15:57:42 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@gmail.com header.s=20161025 header.b="e8/vbb43"; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=QUARANTINE dis=NONE) header.from=gmail.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S233904AbhEOQ7u (ORCPT + 99 others); Sat, 15 May 2021 12:59:50 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:34382 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S230040AbhEOQ7r (ORCPT ); Sat, 15 May 2021 12:59:47 -0400 Received: from mail-ej1-x629.google.com (mail-ej1-x629.google.com [IPv6:2a00:1450:4864:20::629]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id F071CC061573; Sat, 15 May 2021 09:58:32 -0700 (PDT) Received: by mail-ej1-x629.google.com with SMTP id k10so2982020ejj.8; Sat, 15 May 2021 09:58:32 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=date:from:to:cc:subject:message-id:reply-to:references:mime-version :content-disposition:in-reply-to; bh=on/6xZCIaJvpMROmrp4eRzeLAabPNhtVrx6dFCuT2lk=; b=e8/vbb43yCbzHOadD5bO8RpHIe1t+OA+zJrcpmlbbZwQ+wW5rLk1JJnTbIxHhCV6FG XSblTExamToYMXLT2kguSziT1YpaNO8U64M5cGNSehhZhzSHU5WhNaEsq1JYwPvNmDd5 Wc0Dhq9dLKw+bpRW8KAzSbNZLBd5HL1L6aOp18vkLEq2r/A8XAO4/m/HEBZwC7GpOlJb 874yMAA2ReY+htqQv2biA0IgTSfdNZvU4P+IDyqKDwtTiMEvYISfrk4LkRp+hgPVQVYy 82uSs1+jiiUfOgS4l+LH+pZE4w0k4j0NBxDFBzorgKT92MXPq3cg1eoPsM4nrAQ9vgot LOig== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:date:from:to:cc:subject:message-id:reply-to :references:mime-version:content-disposition:in-reply-to; bh=on/6xZCIaJvpMROmrp4eRzeLAabPNhtVrx6dFCuT2lk=; b=owZ2Seja/81SZhk1XryxHNnwxpZdCOvTS5qX9TnOhNomHkOqrtv/sQo3iOFCIFFmpe mCSnPbbTonVymvbPeaJTMrdaWKpW/Qt7IaItJdae9Wldnd5K2SFqAdfBDjA0GSyzVmKx pKF/XQgoedJMTZxFE83qMshEt21hxl9Q1d2rth2Idedk1Kvft+2ouFsrX4puHxe/mTSj G5POt6A8ioCOkncBWOTevJa4vWD37SHjdpI9JWkEBKwI/eTCEuAL/Epb6QjpHo4xrkzy Q7UGXzB58FkLr1HR7ACnTdyS96sYsmWxER9GN9wHCIeyesqqJzgD1gWqPBS2uQ3MAOTF VdiA== X-Gm-Message-State: AOAM532Uuh8d479iMrMYiHTWO8EM4BzWt97mWGp+K20TmBoL12l4lHUa REQ03vWJfJxTGkXqbw3oyQU= X-Received: by 2002:a17:906:64c3:: with SMTP id p3mr24496673ejn.351.1621097911671; Sat, 15 May 2021 09:58:31 -0700 (PDT) Received: from pevik ([62.201.25.198]) by smtp.gmail.com with ESMTPSA id i8sm7291715edu.64.2021.05.15.09.58.30 (version=TLS1_3 cipher=TLS_AES_256_GCM_SHA384 bits=256/256); Sat, 15 May 2021 09:58:30 -0700 (PDT) Date: Sat, 15 May 2021 18:58:28 +0200 From: Petr Vorel To: Heiko Thiery Cc: netdev@vger.kernel.org, dsahern@gmail.com, linux-kernel@vger.kernel.org, stephen@networkplumber.org, Dmitry Yakunin , Peter Korsgaard Subject: Re: [PATCH iproute2-next v3] lib/fs: fix issue when {name,open}_to_handle_at() is not implemented Message-ID: Reply-To: Petr Vorel References: <20210508064925.8045-1-heiko.thiery@gmail.com> MIME-Version: 1.0 Content-Type: text/plain; charset=us-ascii Content-Disposition: inline In-Reply-To: <20210508064925.8045-1-heiko.thiery@gmail.com> Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Hi, [ Cc Petr (Buildroot maintainer) ] > With commit d5e6ee0dac64 the usage of functions name_to_handle_at() and > open_by_handle_at() are introduced. But these function are not available > e.g. in uclibc-ng < 1.0.35. To have a backward compatibility check for the > availability in the configure script and in case of absence do a direct > syscall. > Fixes: d5e6ee0dac64 ("ss: introduce cgroup2 cache and helper functions") > Cc: Dmitry Yakunin > Cc: Petr Vorel > Signed-off-by: Heiko Thiery > --- > v3: > - use correct syscall number (thanks to Petr Vorel) > - add #include (thanks to Petr Vorel) > - remove bogus parameters (thanks to Petr Vorel) > - fix #ifdef (thanks to Petr Vorel) > - added Fixes tag (thanks to David Ahern) > - build test with buildroot 2020.08.3 using uclibc 1.0.34 I tested it to some extent. I was not able to test it on buildroot uclibc: $ ss -a --cgroup # I put debugging printf ss.c:3336 inet_show_sock(): tb[INET_DIAG_CGROUP_ID]: (nil), INET_DIAG_CGROUP_ID: 21 I tried mount both cgroup (with cgroupfs-mount) and cgroup2 (using mount). But it's hard to trigger this code also on regular linux distro with glibc: $ ss --cgroup -a >/dev/null Failed to open cgroup2 by ID Failed to open cgroup2 by ID Failed to open cgroup2 by ID Failed to open cgroup2 by ID Failed to open cgroup2 by ID Failed to open cgroup2 by ID Debugging when replacing glibc wrapper with these functions calling raw syscall it works the same (i.e. "Failed to open cgroup2 by ID") Thus: Tested-by: Petr Vorel (to my previous Reviewed-by: tag). Hope David Ahern send his patch for config.mk dependency to configure, as his fragment [1] LGTM. Kind regards, Petr [1] https://lore.kernel.org/netdev/82c9159f-0644-40af-fb4c-cc8507456719@gmail.com/