Received: by 2002:a05:6358:4e97:b0:b3:742d:4702 with SMTP id ce23csp4199569rwb; Tue, 16 Aug 2022 16:56:00 -0700 (PDT) X-Google-Smtp-Source: AA6agR7fvFh1HSD9mO1M+Rv3Yk7KknFraBVl3SPNMpU5+jgjf2EYitZRM15/MrP3bGlzFiNSWEtq X-Received: by 2002:a05:6402:1cc4:b0:440:5af8:41c9 with SMTP id ds4-20020a0564021cc400b004405af841c9mr21177948edb.339.1660694160038; Tue, 16 Aug 2022 16:56:00 -0700 (PDT) ARC-Seal: i=1; a=rsa-sha256; t=1660694160; cv=none; d=google.com; s=arc-20160816; b=B4IGaf0V08fl+SCznftZHFQpyEUSpzA+G5SBEHrsyYsmjq4VvexEUU7bYkVI5PGSrf NOS5sPL1+FccRVIbqtXkp9hQfWhC5h3wYq5kUI++7fFRvgzTfppHmPWKRln4d1vx1b+i JN4pq9FFGcVaUpB89V9Zo2GjXCRKE+PvaUERHDp8ac4j4DLz4vyuoLSR/jUhR7E16sre XGwKS2ELiyRsUwbcYKQeQjkiR/yRwI53orsACHVbfhpzm+3bo+jxoh0cFORc0grb5fzk 3sBoTtdnJ5KMjQnmFLhtY9t6DQNbjtwsx3rQgGMg41MqYP9FQjobhr5yvqFEf2zVcpwT 7zFg== ARC-Message-Signature: i=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=arc-20160816; h=list-id:precedence:cc:to:from:subject:mime-version:message-id:date :dkim-signature; bh=UNi3nY4e74LKnS5YZ6ZQXRLBLNXdoKR2Gl4hi8aAWbs=; b=J/koMsgQdOBCuXqTQXfiguJX+RS9U/e8L5O13tYQS5r4JQ+9qmhIfZt9NMwdleRRUg XpenEQIpD2ABC0GznWbm6fSVEwCwPltB/stUcyGWt9R9NxM21Uhnswdxi0HfIiOYdJGH /JfjH8wpxryqM3O0r69avd2vcqd7f/8zmdFhZ2XkqhoxS7AaNngjK4usBRq9eNSxTk7P aHPdlUlVs2byiS+Sf5pKeqPiIKnDJPIhjw1xO0itS72A8YxkEwD4BjAqrrS6Q42pYLdQ /rBFwPeXr8pOVl+lGi+6kaVXke+ffU0yZ3kgJVdDV011GjInbnjPMtnn2Be0mCoSAt+Q CgOw== ARC-Authentication-Results: i=1; mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=Xmee1qyO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Return-Path: Received: from out1.vger.email (out1.vger.email. [2620:137:e000::1:20]) by mx.google.com with ESMTP id l13-20020a170906794d00b007309621c10fsi13664521ejo.699.2022.08.16.16.55.31; Tue, 16 Aug 2022 16:56:00 -0700 (PDT) Received-SPF: pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) client-ip=2620:137:e000::1:20; Authentication-Results: mx.google.com; dkim=pass header.i=@google.com header.s=20210112 header.b=Xmee1qyO; spf=pass (google.com: domain of linux-kernel-owner@vger.kernel.org designates 2620:137:e000::1:20 as permitted sender) smtp.mailfrom=linux-kernel-owner@vger.kernel.org; dmarc=pass (p=REJECT sp=REJECT dis=NONE) header.from=google.com Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S237290AbiHPXkS (ORCPT + 99 others); Tue, 16 Aug 2022 19:40:18 -0400 Received: from lindbergh.monkeyblade.net ([23.128.96.19]:38606 "EHLO lindbergh.monkeyblade.net" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S229472AbiHPXkR (ORCPT ); Tue, 16 Aug 2022 19:40:17 -0400 Received: from mail-yw1-x114a.google.com (mail-yw1-x114a.google.com [IPv6:2607:f8b0:4864:20::114a]) by lindbergh.monkeyblade.net (Postfix) with ESMTPS id 6024975CDD for ; Tue, 16 Aug 2022 16:40:16 -0700 (PDT) Received: by mail-yw1-x114a.google.com with SMTP id 00721157ae682-3328a211611so76795917b3.5 for ; Tue, 16 Aug 2022 16:40:16 -0700 (PDT) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=google.com; s=20210112; h=cc:to:from:subject:mime-version:message-id:date:from:to:cc; bh=UNi3nY4e74LKnS5YZ6ZQXRLBLNXdoKR2Gl4hi8aAWbs=; b=Xmee1qyOOONHqAhhrJGYFvgUBhm3gCjCEV5vgj3L9ZM1NyG4ELIV/0YWtfNoQzJc3k nzNypeYlgJGUpxYl2Q1stqtMwxIcN3nPj7v3JW2cDRnTceyzza8Dc+yR+jO4KkeXIF6V WW/PSazQCY8bbJFqkbz0KS4Sg2sL25EuTtyPvwXEyVneM1LNiQSPoxgmJLVu7l7BzQeg RARedZ7NT8BDlr54gOToUf0PPTCSqAmELKUlN2kX6NcpgOjpjZh1fHH5Ho9FzS9VEHTs HVkUYOlO2zrgg6y69bWlOhXswdGeYdm6wR1CJL/+gG//5JqiIJKrnBTiqkaIK46Uc5Oz AhHw== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20210112; h=cc:to:from:subject:mime-version:message-id:date:x-gm-message-state :from:to:cc; bh=UNi3nY4e74LKnS5YZ6ZQXRLBLNXdoKR2Gl4hi8aAWbs=; b=3cxukzbeyFOTM4SxlMoX+JgubXTUIKT8a/SeO50b6vFmBf9I1LxL0eXOrpIbRgXq9M bheCO2CJXo+4u3j5T2Tne3aN+byp9UaRu0MsOEq0DAQWzGGZmTnVy747TjFlBIOsUAoj /bH6qYnMy/M6AtvJ9SqRlrROxRCan9DuhSFa33UeXxWUeFU0jQW2XAULEjm8TUCME8/U aP9iFQZOBnmDg3fvMz6aMrpjsHAtFlg3tdciZZIlCbK0kx1W++oVWcSTVJxMeNgwA4tt fedIKgVsO8K/OIkpwlVDhXSQVEQ7Zp2FPbuK8t7I/wDgkF2CUljbtRynFbtXOllMwQ9I uzeA== X-Gm-Message-State: ACgBeo0CV6dF1nr3l7dbC4mvocn3q6krtWuvEY78NtNqWeRh2vb7gzc9 Zfk+OziO1OYTUInZuVDHrkEU6X70dpbnyhJJD5P4hWQ5pL82lVEFJcqx0aaQu2mX3uesTN6OgA8 9jQPUy9E8EXrRFqE9wmtf3NjMP3Ei42XHcSH+H8TpTYYhjTywxfO0joDc5cubJbjG+HUSGg== X-Received: from haoluo.svl.corp.google.com ([2620:15c:2d4:203:7e6e:c287:3dc6:d4d8]) (user=haoluo job=sendgmr) by 2002:a25:404c:0:b0:68f:d76a:4a59 with SMTP id n73-20020a25404c000000b0068fd76a4a59mr1256750yba.410.1660693215606; Tue, 16 Aug 2022 16:40:15 -0700 (PDT) Date: Tue, 16 Aug 2022 16:40:11 -0700 Message-Id: <20220816234012.910255-1-haoluo@google.com> Mime-Version: 1.0 X-Mailer: git-send-email 2.37.1.595.g718a3a8f04-goog Subject: [PATCH bpf-next v2 1/2] libbpf: Allows disabling auto attach From: Hao Luo To: linux-kernel@vger.kernel.org, bpf@vger.kernel.org Cc: Alexei Starovoitov , Andrii Nakryiko , Daniel Borkmann , Martin KaFai Lau , Song Liu , Yonghong Song , Jiri Olsa , KP Singh , John Fastabend , Stanislav Fomichev , Yosry Ahmed , Hao Luo Content-Type: text/plain; charset="UTF-8" X-Spam-Status: No, score=-9.6 required=5.0 tests=BAYES_00,DKIMWL_WL_MED, DKIM_SIGNED,DKIM_VALID,DKIM_VALID_AU,DKIM_VALID_EF,RCVD_IN_DNSWL_NONE, SPF_HELO_NONE,SPF_PASS,T_SCC_BODY_TEXT_LINE,USER_IN_DEF_DKIM_WL autolearn=ham autolearn_force=no version=3.4.6 X-Spam-Checker-Version: SpamAssassin 3.4.6 (2021-04-09) on lindbergh.monkeyblade.net Precedence: bulk List-ID: X-Mailing-List: linux-kernel@vger.kernel.org Adds libbpf APIs for disabling auto-attach for individual functions. This is motivated by the use case of cgroup iter [1]. Some iter types require their parameters to be non-zero, therefore applying auto-attach on them will fail. With these two new APIs, users who want to use auto-attach and these types of iters can disable auto-attach on the program and perform manual attach. [1] https://lore.kernel.org/bpf/CAEf4BzZ+a2uDo_t6kGBziqdz--m2gh2_EUwkGLDtMd65uwxUjA@mail.gmail.com/ Signed-off-by: Hao Luo --- tools/lib/bpf/libbpf.c | 15 ++++++++++++++- tools/lib/bpf/libbpf.h | 2 ++ tools/lib/bpf/libbpf.map | 2 ++ 3 files changed, 18 insertions(+), 1 deletion(-) diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c index aa05a99b913d..0159a43c7efd 100644 --- a/tools/lib/bpf/libbpf.c +++ b/tools/lib/bpf/libbpf.c @@ -417,6 +417,7 @@ struct bpf_program { int fd; bool autoload; + bool autoattach; bool mark_btf_static; enum bpf_prog_type type; enum bpf_attach_type expected_attach_type; @@ -755,6 +756,8 @@ bpf_object__init_prog(struct bpf_object *obj, struct bpf_program *prog, prog->autoload = true; } + prog->autoattach = true; + /* inherit object's log_level */ prog->log_level = obj->log_level; @@ -8314,6 +8317,16 @@ int bpf_program__set_autoload(struct bpf_program *prog, bool autoload) return 0; } +bool bpf_program__autoattach(const struct bpf_program *prog) +{ + return prog->autoattach; +} + +void bpf_program__set_autoattach(struct bpf_program *prog, bool autoattach) +{ + prog->autoattach = autoattach; +} + const struct bpf_insn *bpf_program__insns(const struct bpf_program *prog) { return prog->insns; @@ -12346,7 +12359,7 @@ int bpf_object__attach_skeleton(struct bpf_object_skeleton *s) struct bpf_program *prog = *s->progs[i].prog; struct bpf_link **link = s->progs[i].link; - if (!prog->autoload) + if (!prog->autoload || !prog->autoattach) continue; /* auto-attaching not supported for this program */ diff --git a/tools/lib/bpf/libbpf.h b/tools/lib/bpf/libbpf.h index 61493c4cddac..88a1ac34b12a 100644 --- a/tools/lib/bpf/libbpf.h +++ b/tools/lib/bpf/libbpf.h @@ -260,6 +260,8 @@ LIBBPF_API const char *bpf_program__name(const struct bpf_program *prog); LIBBPF_API const char *bpf_program__section_name(const struct bpf_program *prog); LIBBPF_API bool bpf_program__autoload(const struct bpf_program *prog); LIBBPF_API int bpf_program__set_autoload(struct bpf_program *prog, bool autoload); +LIBBPF_API bool bpf_program__autoattach(const struct bpf_program *prog); +LIBBPF_API void bpf_program__set_autoattach(struct bpf_program *prog, bool autoattach); struct bpf_insn; diff --git a/tools/lib/bpf/libbpf.map b/tools/lib/bpf/libbpf.map index 119e6e1ea7f1..2b928dc21af0 100644 --- a/tools/lib/bpf/libbpf.map +++ b/tools/lib/bpf/libbpf.map @@ -358,6 +358,8 @@ LIBBPF_1.0.0 { bpf_obj_get_opts; bpf_prog_query_opts; bpf_program__attach_ksyscall; + bpf_program__autoattach; + bpf_program__set_autoattach; btf__add_enum64; btf__add_enum64_value; libbpf_bpf_attach_type_str; -- 2.37.1.595.g718a3a8f04-goog