Received: by 2002:a05:6a10:1d13:0:0:0:0 with SMTP id pp19csp333127pxb; Mon, 16 Aug 2021 06:32:00 -0700 (PDT) X-Google-Smtp-Source: ABdhPJzXxH5qDWhmdlZ8p/FXkLY/mia9Vf0dyGBqggEnb4YyLTSaGi87DEyIbwXDgP6cGhiKNiMi X-Received: by 2002:a17:906:199b:: with SMTP id g27mr16191080ejd.517.1629120720371; Mon, 16 Aug 2021 06:32:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1629120720; cv=none; d=google.com; s=arc-20160816; b=OzHwjzobSPf0+W7dSZ+U/OorR0dUhF48IUTyN6Fs/MoycnDubbkRsjlhMYQuVPcCaq nXL8ElpSxlB4fPAuKhxWnBxeWSPPUGBx5MOBf5DvIXqgtqGybk+3pKwFq6sKHh0Lfsha Ba0bW8kG4roTNdgZ7iIor0V6876jQrEgUbGrQQ7D4ZgzAwnjwPRa0bMI+iau8gEC9uTQ l6VrvME/z5hcVw4vn16KhcVBU8xZ0sPteepAwhKNx9PymcYb1lBTFW13oz4UPnNjONI4 BFtlNJqVPRNMjV79fv9VGXxi/45KgQIgJgFxXYqOHyW6k0CiNrym7CDs+24m87Y4lMs1 Lr1w== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:content-transfer-encoding:mime-version :user-agent:references:in-reply-to:message-id:date:subject:cc:to :from:dkim-signature; bh=1yQLFI2rP7o9aEuRrsyO2YxtPR43YKBrN/er3UklXvo=; b=b31UfmjZ/f5+o5Vc50s2Hpr+R2eYGRcsBB0aRYatkx0kjP5YLYvjaLXOEaVs2SJ7IA wZUSK0rpZkSXx5FicxGpZHeRWA++Ge/6BBEv6h33lm5imh2OVl3N678PZE5VWxIbxdTR 6jYlGRP8BjGc7+wHRUTpINRURD7nIHSwim8ZwibwBR9UcF15yDSE6B49X3EwuXdUGfA/ ySKz5rAyzvZSSv06YlCjv7QeQwKnQa8J6Pg+Xt25aPwjp5xqL7W3OfJ3ijJVQB609eUA L6mKWHW/gpTS1RAYzZ8c0grKPnZSHNRwIUvzbxxhlgjSI2yyxdzzMLDTJMB2n0+Uh6sd 0TuQ== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Uq1iMFAI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Return-Path: Received: from vger.kernel.org (vger.kernel.org. [23.128.96.18]) by mx.google.com with ESMTP id br21si9938737ejb.258.2021.08.16.06.31.37; Mon, 16 Aug 2021 06:32:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) client-ip=23.128.96.18; Authentication-Results: mx.google.com; dkim=pass header.i=@linuxfoundation.org header.s=korg header.b=Uq1iMFAI; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 23.128.96.18 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=NONE sp=NONE dis=NONE) header.from=linuxfoundation.org Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S241385AbhHPN1X (ORCPT + 99 others); Mon, 16 Aug 2021 09:27:23 -0400 Received: from mail.kernel.org ([198.145.29.99]:39410 "EHLO mail.kernel.org" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S240064AbhHPNQp (ORCPT ); Mon, 16 Aug 2021 09:16:45 -0400 Received: by mail.kernel.org (Postfix) with ESMTPSA id 90669632EA; Mon, 16 Aug 2021 13:13:36 +0000 (UTC) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/simple; d=linuxfoundation.org; s=korg; t=1629119617; bh=OzHKg4XQQx2eDs/B6xuKl4iDNgcJ+RPtAHzgsKZuWQQ=; h=From:To:Cc:Subject:Date:In-Reply-To:References:From; b=Uq1iMFAINx9nWhwFqqYF2dzQsxj/1hE9hGr3+RcdLFxlhoGfnqjgkvTeXyoMsJvn7 RO7elg7140Kt2MGRYEOUR5w+3SoByLdTN6vfZw5Z3jjKGDJGihwtidFj5ZfO77Ubnf Q44BxDgOGfr4VXoupj7uT5GKO0bpTAjCKuViEwEU= From: Greg Kroah-Hartman To: linux-kernel@vger.kernel.org Cc: Greg Kroah-Hartman , stable@vger.kernel.org, =?UTF-8?q?Robin=20G=C3=B6gge?= , Andrii Nakryiko , Daniel Borkmann , Quentin Monnet , Sasha Levin Subject: [PATCH 5.13 062/151] libbpf: Fix probe for BPF_PROG_TYPE_CGROUP_SOCKOPT Date: Mon, 16 Aug 2021 15:01:32 +0200 Message-Id: <20210816125446.103028913@linuxfoundation.org> X-Mailer: git-send-email 2.32.0 In-Reply-To: <20210816125444.082226187@linuxfoundation.org> References: <20210816125444.082226187@linuxfoundation.org> User-Agent: quilt/0.66 MIME-Version: 1.0 Content-Type: text/plain; charset=UTF-8 Content-Transfer-Encoding: 8bit Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org From: Robin Gögge [ Upstream commit 78d14bda861dd2729f15bb438fe355b48514bfe0 ] This patch fixes the probe for BPF_PROG_TYPE_CGROUP_SOCKOPT, so the probe reports accurate results when used by e.g. bpftool. Fixes: 4cdbfb59c44a ("libbpf: support sockopt hooks") Signed-off-by: Robin Gögge Signed-off-by: Andrii Nakryiko Signed-off-by: Daniel Borkmann Reviewed-by: Quentin Monnet Link: https://lore.kernel.org/bpf/20210728225825.2357586-1-r.goegge@gmail.com Signed-off-by: Sasha Levin --- tools/lib/bpf/libbpf_probes.c | 4 +++- 1 file changed, 3 insertions(+), 1 deletion(-) diff --git a/tools/lib/bpf/libbpf_probes.c b/tools/lib/bpf/libbpf_probes.c index ecaae2927ab8..cd8c703dde71 100644 --- a/tools/lib/bpf/libbpf_probes.c +++ b/tools/lib/bpf/libbpf_probes.c @@ -75,6 +75,9 @@ probe_load(enum bpf_prog_type prog_type, const struct bpf_insn *insns, case BPF_PROG_TYPE_CGROUP_SOCK_ADDR: xattr.expected_attach_type = BPF_CGROUP_INET4_CONNECT; break; + case BPF_PROG_TYPE_CGROUP_SOCKOPT: + xattr.expected_attach_type = BPF_CGROUP_GETSOCKOPT; + break; case BPF_PROG_TYPE_SK_LOOKUP: xattr.expected_attach_type = BPF_SK_LOOKUP; break; @@ -104,7 +107,6 @@ probe_load(enum bpf_prog_type prog_type, const struct bpf_insn *insns, case BPF_PROG_TYPE_SK_REUSEPORT: case BPF_PROG_TYPE_FLOW_DISSECTOR: case BPF_PROG_TYPE_CGROUP_SYSCTL: - case BPF_PROG_TYPE_CGROUP_SOCKOPT: case BPF_PROG_TYPE_TRACING: case BPF_PROG_TYPE_STRUCT_OPS: case BPF_PROG_TYPE_EXT: -- 2.30.2