xref: /OK3568_Linux_fs/kernel/tools/bpf/bpftool/cgroup.c (revision 4882a59341e53eb6f0b4789bf948001014eff981)
1*4882a593Smuzhiyun // SPDX-License-Identifier: (GPL-2.0-only OR BSD-2-Clause)
2*4882a593Smuzhiyun // Copyright (C) 2017 Facebook
3*4882a593Smuzhiyun // Author: Roman Gushchin <guro@fb.com>
4*4882a593Smuzhiyun 
5*4882a593Smuzhiyun #define _XOPEN_SOURCE 500
6*4882a593Smuzhiyun #include <errno.h>
7*4882a593Smuzhiyun #include <fcntl.h>
8*4882a593Smuzhiyun #include <ftw.h>
9*4882a593Smuzhiyun #include <mntent.h>
10*4882a593Smuzhiyun #include <stdio.h>
11*4882a593Smuzhiyun #include <stdlib.h>
12*4882a593Smuzhiyun #include <string.h>
13*4882a593Smuzhiyun #include <sys/stat.h>
14*4882a593Smuzhiyun #include <sys/types.h>
15*4882a593Smuzhiyun #include <unistd.h>
16*4882a593Smuzhiyun 
17*4882a593Smuzhiyun #include <bpf/bpf.h>
18*4882a593Smuzhiyun 
19*4882a593Smuzhiyun #include "main.h"
20*4882a593Smuzhiyun 
21*4882a593Smuzhiyun #define HELP_SPEC_ATTACH_FLAGS						\
22*4882a593Smuzhiyun 	"ATTACH_FLAGS := { multi | override }"
23*4882a593Smuzhiyun 
24*4882a593Smuzhiyun #define HELP_SPEC_ATTACH_TYPES						       \
25*4882a593Smuzhiyun 	"       ATTACH_TYPE := { ingress | egress | sock_create |\n"	       \
26*4882a593Smuzhiyun 	"                        sock_ops | device | bind4 | bind6 |\n"	       \
27*4882a593Smuzhiyun 	"                        post_bind4 | post_bind6 | connect4 |\n"       \
28*4882a593Smuzhiyun 	"                        connect6 | getpeername4 | getpeername6 |\n"   \
29*4882a593Smuzhiyun 	"                        getsockname4 | getsockname6 | sendmsg4 |\n"   \
30*4882a593Smuzhiyun 	"                        sendmsg6 | recvmsg4 | recvmsg6 |\n"           \
31*4882a593Smuzhiyun 	"                        sysctl | getsockopt | setsockopt |\n"	       \
32*4882a593Smuzhiyun 	"                        sock_release }"
33*4882a593Smuzhiyun 
34*4882a593Smuzhiyun static unsigned int query_flags;
35*4882a593Smuzhiyun 
parse_attach_type(const char * str)36*4882a593Smuzhiyun static enum bpf_attach_type parse_attach_type(const char *str)
37*4882a593Smuzhiyun {
38*4882a593Smuzhiyun 	enum bpf_attach_type type;
39*4882a593Smuzhiyun 
40*4882a593Smuzhiyun 	for (type = 0; type < __MAX_BPF_ATTACH_TYPE; type++) {
41*4882a593Smuzhiyun 		if (attach_type_name[type] &&
42*4882a593Smuzhiyun 		    is_prefix(str, attach_type_name[type]))
43*4882a593Smuzhiyun 			return type;
44*4882a593Smuzhiyun 	}
45*4882a593Smuzhiyun 
46*4882a593Smuzhiyun 	return __MAX_BPF_ATTACH_TYPE;
47*4882a593Smuzhiyun }
48*4882a593Smuzhiyun 
show_bpf_prog(int id,enum bpf_attach_type attach_type,const char * attach_flags_str,int level)49*4882a593Smuzhiyun static int show_bpf_prog(int id, enum bpf_attach_type attach_type,
50*4882a593Smuzhiyun 			 const char *attach_flags_str,
51*4882a593Smuzhiyun 			 int level)
52*4882a593Smuzhiyun {
53*4882a593Smuzhiyun 	struct bpf_prog_info info = {};
54*4882a593Smuzhiyun 	__u32 info_len = sizeof(info);
55*4882a593Smuzhiyun 	int prog_fd;
56*4882a593Smuzhiyun 
57*4882a593Smuzhiyun 	prog_fd = bpf_prog_get_fd_by_id(id);
58*4882a593Smuzhiyun 	if (prog_fd < 0)
59*4882a593Smuzhiyun 		return -1;
60*4882a593Smuzhiyun 
61*4882a593Smuzhiyun 	if (bpf_obj_get_info_by_fd(prog_fd, &info, &info_len)) {
62*4882a593Smuzhiyun 		close(prog_fd);
63*4882a593Smuzhiyun 		return -1;
64*4882a593Smuzhiyun 	}
65*4882a593Smuzhiyun 
66*4882a593Smuzhiyun 	if (json_output) {
67*4882a593Smuzhiyun 		jsonw_start_object(json_wtr);
68*4882a593Smuzhiyun 		jsonw_uint_field(json_wtr, "id", info.id);
69*4882a593Smuzhiyun 		if (attach_type < ARRAY_SIZE(attach_type_name))
70*4882a593Smuzhiyun 			jsonw_string_field(json_wtr, "attach_type",
71*4882a593Smuzhiyun 					   attach_type_name[attach_type]);
72*4882a593Smuzhiyun 		else
73*4882a593Smuzhiyun 			jsonw_uint_field(json_wtr, "attach_type", attach_type);
74*4882a593Smuzhiyun 		jsonw_string_field(json_wtr, "attach_flags",
75*4882a593Smuzhiyun 				   attach_flags_str);
76*4882a593Smuzhiyun 		jsonw_string_field(json_wtr, "name", info.name);
77*4882a593Smuzhiyun 		jsonw_end_object(json_wtr);
78*4882a593Smuzhiyun 	} else {
79*4882a593Smuzhiyun 		printf("%s%-8u ", level ? "    " : "", info.id);
80*4882a593Smuzhiyun 		if (attach_type < ARRAY_SIZE(attach_type_name))
81*4882a593Smuzhiyun 			printf("%-15s", attach_type_name[attach_type]);
82*4882a593Smuzhiyun 		else
83*4882a593Smuzhiyun 			printf("type %-10u", attach_type);
84*4882a593Smuzhiyun 		printf(" %-15s %-15s\n", attach_flags_str, info.name);
85*4882a593Smuzhiyun 	}
86*4882a593Smuzhiyun 
87*4882a593Smuzhiyun 	close(prog_fd);
88*4882a593Smuzhiyun 	return 0;
89*4882a593Smuzhiyun }
90*4882a593Smuzhiyun 
count_attached_bpf_progs(int cgroup_fd,enum bpf_attach_type type)91*4882a593Smuzhiyun static int count_attached_bpf_progs(int cgroup_fd, enum bpf_attach_type type)
92*4882a593Smuzhiyun {
93*4882a593Smuzhiyun 	__u32 prog_cnt = 0;
94*4882a593Smuzhiyun 	int ret;
95*4882a593Smuzhiyun 
96*4882a593Smuzhiyun 	ret = bpf_prog_query(cgroup_fd, type, query_flags, NULL,
97*4882a593Smuzhiyun 			     NULL, &prog_cnt);
98*4882a593Smuzhiyun 	if (ret)
99*4882a593Smuzhiyun 		return -1;
100*4882a593Smuzhiyun 
101*4882a593Smuzhiyun 	return prog_cnt;
102*4882a593Smuzhiyun }
103*4882a593Smuzhiyun 
cgroup_has_attached_progs(int cgroup_fd)104*4882a593Smuzhiyun static int cgroup_has_attached_progs(int cgroup_fd)
105*4882a593Smuzhiyun {
106*4882a593Smuzhiyun 	enum bpf_attach_type type;
107*4882a593Smuzhiyun 	bool no_prog = true;
108*4882a593Smuzhiyun 
109*4882a593Smuzhiyun 	for (type = 0; type < __MAX_BPF_ATTACH_TYPE; type++) {
110*4882a593Smuzhiyun 		int count = count_attached_bpf_progs(cgroup_fd, type);
111*4882a593Smuzhiyun 
112*4882a593Smuzhiyun 		if (count < 0 && errno != EINVAL)
113*4882a593Smuzhiyun 			return -1;
114*4882a593Smuzhiyun 
115*4882a593Smuzhiyun 		if (count > 0) {
116*4882a593Smuzhiyun 			no_prog = false;
117*4882a593Smuzhiyun 			break;
118*4882a593Smuzhiyun 		}
119*4882a593Smuzhiyun 	}
120*4882a593Smuzhiyun 
121*4882a593Smuzhiyun 	return no_prog ? 0 : 1;
122*4882a593Smuzhiyun }
show_attached_bpf_progs(int cgroup_fd,enum bpf_attach_type type,int level)123*4882a593Smuzhiyun static int show_attached_bpf_progs(int cgroup_fd, enum bpf_attach_type type,
124*4882a593Smuzhiyun 				   int level)
125*4882a593Smuzhiyun {
126*4882a593Smuzhiyun 	const char *attach_flags_str;
127*4882a593Smuzhiyun 	__u32 prog_ids[1024] = {0};
128*4882a593Smuzhiyun 	__u32 prog_cnt, iter;
129*4882a593Smuzhiyun 	__u32 attach_flags;
130*4882a593Smuzhiyun 	char buf[32];
131*4882a593Smuzhiyun 	int ret;
132*4882a593Smuzhiyun 
133*4882a593Smuzhiyun 	prog_cnt = ARRAY_SIZE(prog_ids);
134*4882a593Smuzhiyun 	ret = bpf_prog_query(cgroup_fd, type, query_flags, &attach_flags,
135*4882a593Smuzhiyun 			     prog_ids, &prog_cnt);
136*4882a593Smuzhiyun 	if (ret)
137*4882a593Smuzhiyun 		return ret;
138*4882a593Smuzhiyun 
139*4882a593Smuzhiyun 	if (prog_cnt == 0)
140*4882a593Smuzhiyun 		return 0;
141*4882a593Smuzhiyun 
142*4882a593Smuzhiyun 	switch (attach_flags) {
143*4882a593Smuzhiyun 	case BPF_F_ALLOW_MULTI:
144*4882a593Smuzhiyun 		attach_flags_str = "multi";
145*4882a593Smuzhiyun 		break;
146*4882a593Smuzhiyun 	case BPF_F_ALLOW_OVERRIDE:
147*4882a593Smuzhiyun 		attach_flags_str = "override";
148*4882a593Smuzhiyun 		break;
149*4882a593Smuzhiyun 	case 0:
150*4882a593Smuzhiyun 		attach_flags_str = "";
151*4882a593Smuzhiyun 		break;
152*4882a593Smuzhiyun 	default:
153*4882a593Smuzhiyun 		snprintf(buf, sizeof(buf), "unknown(%x)", attach_flags);
154*4882a593Smuzhiyun 		attach_flags_str = buf;
155*4882a593Smuzhiyun 	}
156*4882a593Smuzhiyun 
157*4882a593Smuzhiyun 	for (iter = 0; iter < prog_cnt; iter++)
158*4882a593Smuzhiyun 		show_bpf_prog(prog_ids[iter], type,
159*4882a593Smuzhiyun 			      attach_flags_str, level);
160*4882a593Smuzhiyun 
161*4882a593Smuzhiyun 	return 0;
162*4882a593Smuzhiyun }
163*4882a593Smuzhiyun 
do_show(int argc,char ** argv)164*4882a593Smuzhiyun static int do_show(int argc, char **argv)
165*4882a593Smuzhiyun {
166*4882a593Smuzhiyun 	enum bpf_attach_type type;
167*4882a593Smuzhiyun 	int has_attached_progs;
168*4882a593Smuzhiyun 	const char *path;
169*4882a593Smuzhiyun 	int cgroup_fd;
170*4882a593Smuzhiyun 	int ret = -1;
171*4882a593Smuzhiyun 
172*4882a593Smuzhiyun 	query_flags = 0;
173*4882a593Smuzhiyun 
174*4882a593Smuzhiyun 	if (!REQ_ARGS(1))
175*4882a593Smuzhiyun 		return -1;
176*4882a593Smuzhiyun 	path = GET_ARG();
177*4882a593Smuzhiyun 
178*4882a593Smuzhiyun 	while (argc) {
179*4882a593Smuzhiyun 		if (is_prefix(*argv, "effective")) {
180*4882a593Smuzhiyun 			if (query_flags & BPF_F_QUERY_EFFECTIVE) {
181*4882a593Smuzhiyun 				p_err("duplicated argument: %s", *argv);
182*4882a593Smuzhiyun 				return -1;
183*4882a593Smuzhiyun 			}
184*4882a593Smuzhiyun 			query_flags |= BPF_F_QUERY_EFFECTIVE;
185*4882a593Smuzhiyun 			NEXT_ARG();
186*4882a593Smuzhiyun 		} else {
187*4882a593Smuzhiyun 			p_err("expected no more arguments, 'effective', got: '%s'?",
188*4882a593Smuzhiyun 			      *argv);
189*4882a593Smuzhiyun 			return -1;
190*4882a593Smuzhiyun 		}
191*4882a593Smuzhiyun 	}
192*4882a593Smuzhiyun 
193*4882a593Smuzhiyun 	cgroup_fd = open(path, O_RDONLY);
194*4882a593Smuzhiyun 	if (cgroup_fd < 0) {
195*4882a593Smuzhiyun 		p_err("can't open cgroup %s", path);
196*4882a593Smuzhiyun 		goto exit;
197*4882a593Smuzhiyun 	}
198*4882a593Smuzhiyun 
199*4882a593Smuzhiyun 	has_attached_progs = cgroup_has_attached_progs(cgroup_fd);
200*4882a593Smuzhiyun 	if (has_attached_progs < 0) {
201*4882a593Smuzhiyun 		p_err("can't query bpf programs attached to %s: %s",
202*4882a593Smuzhiyun 		      path, strerror(errno));
203*4882a593Smuzhiyun 		goto exit_cgroup;
204*4882a593Smuzhiyun 	} else if (!has_attached_progs) {
205*4882a593Smuzhiyun 		ret = 0;
206*4882a593Smuzhiyun 		goto exit_cgroup;
207*4882a593Smuzhiyun 	}
208*4882a593Smuzhiyun 
209*4882a593Smuzhiyun 	if (json_output)
210*4882a593Smuzhiyun 		jsonw_start_array(json_wtr);
211*4882a593Smuzhiyun 	else
212*4882a593Smuzhiyun 		printf("%-8s %-15s %-15s %-15s\n", "ID", "AttachType",
213*4882a593Smuzhiyun 		       "AttachFlags", "Name");
214*4882a593Smuzhiyun 
215*4882a593Smuzhiyun 	for (type = 0; type < __MAX_BPF_ATTACH_TYPE; type++) {
216*4882a593Smuzhiyun 		/*
217*4882a593Smuzhiyun 		 * Not all attach types may be supported, so it's expected,
218*4882a593Smuzhiyun 		 * that some requests will fail.
219*4882a593Smuzhiyun 		 * If we were able to get the show for at least one
220*4882a593Smuzhiyun 		 * attach type, let's return 0.
221*4882a593Smuzhiyun 		 */
222*4882a593Smuzhiyun 		if (show_attached_bpf_progs(cgroup_fd, type, 0) == 0)
223*4882a593Smuzhiyun 			ret = 0;
224*4882a593Smuzhiyun 	}
225*4882a593Smuzhiyun 
226*4882a593Smuzhiyun 	if (json_output)
227*4882a593Smuzhiyun 		jsonw_end_array(json_wtr);
228*4882a593Smuzhiyun 
229*4882a593Smuzhiyun exit_cgroup:
230*4882a593Smuzhiyun 	close(cgroup_fd);
231*4882a593Smuzhiyun exit:
232*4882a593Smuzhiyun 	return ret;
233*4882a593Smuzhiyun }
234*4882a593Smuzhiyun 
235*4882a593Smuzhiyun /*
236*4882a593Smuzhiyun  * To distinguish nftw() errors and do_show_tree_fn() errors
237*4882a593Smuzhiyun  * and avoid duplicating error messages, let's return -2
238*4882a593Smuzhiyun  * from do_show_tree_fn() in case of error.
239*4882a593Smuzhiyun  */
240*4882a593Smuzhiyun #define NFTW_ERR		-1
241*4882a593Smuzhiyun #define SHOW_TREE_FN_ERR	-2
do_show_tree_fn(const char * fpath,const struct stat * sb,int typeflag,struct FTW * ftw)242*4882a593Smuzhiyun static int do_show_tree_fn(const char *fpath, const struct stat *sb,
243*4882a593Smuzhiyun 			   int typeflag, struct FTW *ftw)
244*4882a593Smuzhiyun {
245*4882a593Smuzhiyun 	enum bpf_attach_type type;
246*4882a593Smuzhiyun 	int has_attached_progs;
247*4882a593Smuzhiyun 	int cgroup_fd;
248*4882a593Smuzhiyun 
249*4882a593Smuzhiyun 	if (typeflag != FTW_D)
250*4882a593Smuzhiyun 		return 0;
251*4882a593Smuzhiyun 
252*4882a593Smuzhiyun 	cgroup_fd = open(fpath, O_RDONLY);
253*4882a593Smuzhiyun 	if (cgroup_fd < 0) {
254*4882a593Smuzhiyun 		p_err("can't open cgroup %s: %s", fpath, strerror(errno));
255*4882a593Smuzhiyun 		return SHOW_TREE_FN_ERR;
256*4882a593Smuzhiyun 	}
257*4882a593Smuzhiyun 
258*4882a593Smuzhiyun 	has_attached_progs = cgroup_has_attached_progs(cgroup_fd);
259*4882a593Smuzhiyun 	if (has_attached_progs < 0) {
260*4882a593Smuzhiyun 		p_err("can't query bpf programs attached to %s: %s",
261*4882a593Smuzhiyun 		      fpath, strerror(errno));
262*4882a593Smuzhiyun 		close(cgroup_fd);
263*4882a593Smuzhiyun 		return SHOW_TREE_FN_ERR;
264*4882a593Smuzhiyun 	} else if (!has_attached_progs) {
265*4882a593Smuzhiyun 		close(cgroup_fd);
266*4882a593Smuzhiyun 		return 0;
267*4882a593Smuzhiyun 	}
268*4882a593Smuzhiyun 
269*4882a593Smuzhiyun 	if (json_output) {
270*4882a593Smuzhiyun 		jsonw_start_object(json_wtr);
271*4882a593Smuzhiyun 		jsonw_string_field(json_wtr, "cgroup", fpath);
272*4882a593Smuzhiyun 		jsonw_name(json_wtr, "programs");
273*4882a593Smuzhiyun 		jsonw_start_array(json_wtr);
274*4882a593Smuzhiyun 	} else {
275*4882a593Smuzhiyun 		printf("%s\n", fpath);
276*4882a593Smuzhiyun 	}
277*4882a593Smuzhiyun 
278*4882a593Smuzhiyun 	for (type = 0; type < __MAX_BPF_ATTACH_TYPE; type++)
279*4882a593Smuzhiyun 		show_attached_bpf_progs(cgroup_fd, type, ftw->level);
280*4882a593Smuzhiyun 
281*4882a593Smuzhiyun 	if (errno == EINVAL)
282*4882a593Smuzhiyun 		/* Last attach type does not support query.
283*4882a593Smuzhiyun 		 * Do not report an error for this, especially because batch
284*4882a593Smuzhiyun 		 * mode would stop processing commands.
285*4882a593Smuzhiyun 		 */
286*4882a593Smuzhiyun 		errno = 0;
287*4882a593Smuzhiyun 
288*4882a593Smuzhiyun 	if (json_output) {
289*4882a593Smuzhiyun 		jsonw_end_array(json_wtr);
290*4882a593Smuzhiyun 		jsonw_end_object(json_wtr);
291*4882a593Smuzhiyun 	}
292*4882a593Smuzhiyun 
293*4882a593Smuzhiyun 	close(cgroup_fd);
294*4882a593Smuzhiyun 
295*4882a593Smuzhiyun 	return 0;
296*4882a593Smuzhiyun }
297*4882a593Smuzhiyun 
find_cgroup_root(void)298*4882a593Smuzhiyun static char *find_cgroup_root(void)
299*4882a593Smuzhiyun {
300*4882a593Smuzhiyun 	struct mntent *mnt;
301*4882a593Smuzhiyun 	FILE *f;
302*4882a593Smuzhiyun 
303*4882a593Smuzhiyun 	f = fopen("/proc/mounts", "r");
304*4882a593Smuzhiyun 	if (f == NULL)
305*4882a593Smuzhiyun 		return NULL;
306*4882a593Smuzhiyun 
307*4882a593Smuzhiyun 	while ((mnt = getmntent(f))) {
308*4882a593Smuzhiyun 		if (strcmp(mnt->mnt_type, "cgroup2") == 0) {
309*4882a593Smuzhiyun 			fclose(f);
310*4882a593Smuzhiyun 			return strdup(mnt->mnt_dir);
311*4882a593Smuzhiyun 		}
312*4882a593Smuzhiyun 	}
313*4882a593Smuzhiyun 
314*4882a593Smuzhiyun 	fclose(f);
315*4882a593Smuzhiyun 	return NULL;
316*4882a593Smuzhiyun }
317*4882a593Smuzhiyun 
do_show_tree(int argc,char ** argv)318*4882a593Smuzhiyun static int do_show_tree(int argc, char **argv)
319*4882a593Smuzhiyun {
320*4882a593Smuzhiyun 	char *cgroup_root, *cgroup_alloced = NULL;
321*4882a593Smuzhiyun 	int ret;
322*4882a593Smuzhiyun 
323*4882a593Smuzhiyun 	query_flags = 0;
324*4882a593Smuzhiyun 
325*4882a593Smuzhiyun 	if (!argc) {
326*4882a593Smuzhiyun 		cgroup_alloced = find_cgroup_root();
327*4882a593Smuzhiyun 		if (!cgroup_alloced) {
328*4882a593Smuzhiyun 			p_err("cgroup v2 isn't mounted");
329*4882a593Smuzhiyun 			return -1;
330*4882a593Smuzhiyun 		}
331*4882a593Smuzhiyun 		cgroup_root = cgroup_alloced;
332*4882a593Smuzhiyun 	} else {
333*4882a593Smuzhiyun 		cgroup_root = GET_ARG();
334*4882a593Smuzhiyun 
335*4882a593Smuzhiyun 		while (argc) {
336*4882a593Smuzhiyun 			if (is_prefix(*argv, "effective")) {
337*4882a593Smuzhiyun 				if (query_flags & BPF_F_QUERY_EFFECTIVE) {
338*4882a593Smuzhiyun 					p_err("duplicated argument: %s", *argv);
339*4882a593Smuzhiyun 					return -1;
340*4882a593Smuzhiyun 				}
341*4882a593Smuzhiyun 				query_flags |= BPF_F_QUERY_EFFECTIVE;
342*4882a593Smuzhiyun 				NEXT_ARG();
343*4882a593Smuzhiyun 			} else {
344*4882a593Smuzhiyun 				p_err("expected no more arguments, 'effective', got: '%s'?",
345*4882a593Smuzhiyun 				      *argv);
346*4882a593Smuzhiyun 				return -1;
347*4882a593Smuzhiyun 			}
348*4882a593Smuzhiyun 		}
349*4882a593Smuzhiyun 	}
350*4882a593Smuzhiyun 
351*4882a593Smuzhiyun 	if (json_output)
352*4882a593Smuzhiyun 		jsonw_start_array(json_wtr);
353*4882a593Smuzhiyun 	else
354*4882a593Smuzhiyun 		printf("%s\n"
355*4882a593Smuzhiyun 		       "%-8s %-15s %-15s %-15s\n",
356*4882a593Smuzhiyun 		       "CgroupPath",
357*4882a593Smuzhiyun 		       "ID", "AttachType", "AttachFlags", "Name");
358*4882a593Smuzhiyun 
359*4882a593Smuzhiyun 	switch (nftw(cgroup_root, do_show_tree_fn, 1024, FTW_MOUNT)) {
360*4882a593Smuzhiyun 	case NFTW_ERR:
361*4882a593Smuzhiyun 		p_err("can't iterate over %s: %s", cgroup_root,
362*4882a593Smuzhiyun 		      strerror(errno));
363*4882a593Smuzhiyun 		ret = -1;
364*4882a593Smuzhiyun 		break;
365*4882a593Smuzhiyun 	case SHOW_TREE_FN_ERR:
366*4882a593Smuzhiyun 		ret = -1;
367*4882a593Smuzhiyun 		break;
368*4882a593Smuzhiyun 	default:
369*4882a593Smuzhiyun 		ret = 0;
370*4882a593Smuzhiyun 	}
371*4882a593Smuzhiyun 
372*4882a593Smuzhiyun 	if (json_output)
373*4882a593Smuzhiyun 		jsonw_end_array(json_wtr);
374*4882a593Smuzhiyun 
375*4882a593Smuzhiyun 	free(cgroup_alloced);
376*4882a593Smuzhiyun 
377*4882a593Smuzhiyun 	return ret;
378*4882a593Smuzhiyun }
379*4882a593Smuzhiyun 
do_attach(int argc,char ** argv)380*4882a593Smuzhiyun static int do_attach(int argc, char **argv)
381*4882a593Smuzhiyun {
382*4882a593Smuzhiyun 	enum bpf_attach_type attach_type;
383*4882a593Smuzhiyun 	int cgroup_fd, prog_fd;
384*4882a593Smuzhiyun 	int attach_flags = 0;
385*4882a593Smuzhiyun 	int ret = -1;
386*4882a593Smuzhiyun 	int i;
387*4882a593Smuzhiyun 
388*4882a593Smuzhiyun 	if (argc < 4) {
389*4882a593Smuzhiyun 		p_err("too few parameters for cgroup attach");
390*4882a593Smuzhiyun 		goto exit;
391*4882a593Smuzhiyun 	}
392*4882a593Smuzhiyun 
393*4882a593Smuzhiyun 	cgroup_fd = open(argv[0], O_RDONLY);
394*4882a593Smuzhiyun 	if (cgroup_fd < 0) {
395*4882a593Smuzhiyun 		p_err("can't open cgroup %s", argv[0]);
396*4882a593Smuzhiyun 		goto exit;
397*4882a593Smuzhiyun 	}
398*4882a593Smuzhiyun 
399*4882a593Smuzhiyun 	attach_type = parse_attach_type(argv[1]);
400*4882a593Smuzhiyun 	if (attach_type == __MAX_BPF_ATTACH_TYPE) {
401*4882a593Smuzhiyun 		p_err("invalid attach type");
402*4882a593Smuzhiyun 		goto exit_cgroup;
403*4882a593Smuzhiyun 	}
404*4882a593Smuzhiyun 
405*4882a593Smuzhiyun 	argc -= 2;
406*4882a593Smuzhiyun 	argv = &argv[2];
407*4882a593Smuzhiyun 	prog_fd = prog_parse_fd(&argc, &argv);
408*4882a593Smuzhiyun 	if (prog_fd < 0)
409*4882a593Smuzhiyun 		goto exit_cgroup;
410*4882a593Smuzhiyun 
411*4882a593Smuzhiyun 	for (i = 0; i < argc; i++) {
412*4882a593Smuzhiyun 		if (is_prefix(argv[i], "multi")) {
413*4882a593Smuzhiyun 			attach_flags |= BPF_F_ALLOW_MULTI;
414*4882a593Smuzhiyun 		} else if (is_prefix(argv[i], "override")) {
415*4882a593Smuzhiyun 			attach_flags |= BPF_F_ALLOW_OVERRIDE;
416*4882a593Smuzhiyun 		} else {
417*4882a593Smuzhiyun 			p_err("unknown option: %s", argv[i]);
418*4882a593Smuzhiyun 			goto exit_cgroup;
419*4882a593Smuzhiyun 		}
420*4882a593Smuzhiyun 	}
421*4882a593Smuzhiyun 
422*4882a593Smuzhiyun 	if (bpf_prog_attach(prog_fd, cgroup_fd, attach_type, attach_flags)) {
423*4882a593Smuzhiyun 		p_err("failed to attach program");
424*4882a593Smuzhiyun 		goto exit_prog;
425*4882a593Smuzhiyun 	}
426*4882a593Smuzhiyun 
427*4882a593Smuzhiyun 	if (json_output)
428*4882a593Smuzhiyun 		jsonw_null(json_wtr);
429*4882a593Smuzhiyun 
430*4882a593Smuzhiyun 	ret = 0;
431*4882a593Smuzhiyun 
432*4882a593Smuzhiyun exit_prog:
433*4882a593Smuzhiyun 	close(prog_fd);
434*4882a593Smuzhiyun exit_cgroup:
435*4882a593Smuzhiyun 	close(cgroup_fd);
436*4882a593Smuzhiyun exit:
437*4882a593Smuzhiyun 	return ret;
438*4882a593Smuzhiyun }
439*4882a593Smuzhiyun 
do_detach(int argc,char ** argv)440*4882a593Smuzhiyun static int do_detach(int argc, char **argv)
441*4882a593Smuzhiyun {
442*4882a593Smuzhiyun 	enum bpf_attach_type attach_type;
443*4882a593Smuzhiyun 	int prog_fd, cgroup_fd;
444*4882a593Smuzhiyun 	int ret = -1;
445*4882a593Smuzhiyun 
446*4882a593Smuzhiyun 	if (argc < 4) {
447*4882a593Smuzhiyun 		p_err("too few parameters for cgroup detach");
448*4882a593Smuzhiyun 		goto exit;
449*4882a593Smuzhiyun 	}
450*4882a593Smuzhiyun 
451*4882a593Smuzhiyun 	cgroup_fd = open(argv[0], O_RDONLY);
452*4882a593Smuzhiyun 	if (cgroup_fd < 0) {
453*4882a593Smuzhiyun 		p_err("can't open cgroup %s", argv[0]);
454*4882a593Smuzhiyun 		goto exit;
455*4882a593Smuzhiyun 	}
456*4882a593Smuzhiyun 
457*4882a593Smuzhiyun 	attach_type = parse_attach_type(argv[1]);
458*4882a593Smuzhiyun 	if (attach_type == __MAX_BPF_ATTACH_TYPE) {
459*4882a593Smuzhiyun 		p_err("invalid attach type");
460*4882a593Smuzhiyun 		goto exit_cgroup;
461*4882a593Smuzhiyun 	}
462*4882a593Smuzhiyun 
463*4882a593Smuzhiyun 	argc -= 2;
464*4882a593Smuzhiyun 	argv = &argv[2];
465*4882a593Smuzhiyun 	prog_fd = prog_parse_fd(&argc, &argv);
466*4882a593Smuzhiyun 	if (prog_fd < 0)
467*4882a593Smuzhiyun 		goto exit_cgroup;
468*4882a593Smuzhiyun 
469*4882a593Smuzhiyun 	if (bpf_prog_detach2(prog_fd, cgroup_fd, attach_type)) {
470*4882a593Smuzhiyun 		p_err("failed to detach program");
471*4882a593Smuzhiyun 		goto exit_prog;
472*4882a593Smuzhiyun 	}
473*4882a593Smuzhiyun 
474*4882a593Smuzhiyun 	if (json_output)
475*4882a593Smuzhiyun 		jsonw_null(json_wtr);
476*4882a593Smuzhiyun 
477*4882a593Smuzhiyun 	ret = 0;
478*4882a593Smuzhiyun 
479*4882a593Smuzhiyun exit_prog:
480*4882a593Smuzhiyun 	close(prog_fd);
481*4882a593Smuzhiyun exit_cgroup:
482*4882a593Smuzhiyun 	close(cgroup_fd);
483*4882a593Smuzhiyun exit:
484*4882a593Smuzhiyun 	return ret;
485*4882a593Smuzhiyun }
486*4882a593Smuzhiyun 
do_help(int argc,char ** argv)487*4882a593Smuzhiyun static int do_help(int argc, char **argv)
488*4882a593Smuzhiyun {
489*4882a593Smuzhiyun 	if (json_output) {
490*4882a593Smuzhiyun 		jsonw_null(json_wtr);
491*4882a593Smuzhiyun 		return 0;
492*4882a593Smuzhiyun 	}
493*4882a593Smuzhiyun 
494*4882a593Smuzhiyun 	fprintf(stderr,
495*4882a593Smuzhiyun 		"Usage: %1$s %2$s { show | list } CGROUP [**effective**]\n"
496*4882a593Smuzhiyun 		"       %1$s %2$s tree [CGROUP_ROOT] [**effective**]\n"
497*4882a593Smuzhiyun 		"       %1$s %2$s attach CGROUP ATTACH_TYPE PROG [ATTACH_FLAGS]\n"
498*4882a593Smuzhiyun 		"       %1$s %2$s detach CGROUP ATTACH_TYPE PROG\n"
499*4882a593Smuzhiyun 		"       %1$s %2$s help\n"
500*4882a593Smuzhiyun 		"\n"
501*4882a593Smuzhiyun 		HELP_SPEC_ATTACH_TYPES "\n"
502*4882a593Smuzhiyun 		"       " HELP_SPEC_ATTACH_FLAGS "\n"
503*4882a593Smuzhiyun 		"       " HELP_SPEC_PROGRAM "\n"
504*4882a593Smuzhiyun 		"       " HELP_SPEC_OPTIONS "\n"
505*4882a593Smuzhiyun 		"",
506*4882a593Smuzhiyun 		bin_name, argv[-2]);
507*4882a593Smuzhiyun 
508*4882a593Smuzhiyun 	return 0;
509*4882a593Smuzhiyun }
510*4882a593Smuzhiyun 
511*4882a593Smuzhiyun static const struct cmd cmds[] = {
512*4882a593Smuzhiyun 	{ "show",	do_show },
513*4882a593Smuzhiyun 	{ "list",	do_show },
514*4882a593Smuzhiyun 	{ "tree",       do_show_tree },
515*4882a593Smuzhiyun 	{ "attach",	do_attach },
516*4882a593Smuzhiyun 	{ "detach",	do_detach },
517*4882a593Smuzhiyun 	{ "help",	do_help },
518*4882a593Smuzhiyun 	{ 0 }
519*4882a593Smuzhiyun };
520*4882a593Smuzhiyun 
do_cgroup(int argc,char ** argv)521*4882a593Smuzhiyun int do_cgroup(int argc, char **argv)
522*4882a593Smuzhiyun {
523*4882a593Smuzhiyun 	return cmd_select(cmds, argc, argv, do_help);
524*4882a593Smuzhiyun }
525