From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on aws-us-west-2-korg-lkml-1.web.codeaurora.org X-Spam-Level: X-Spam-Status: No, score=-9.1 required=3.0 tests=DKIM_SIGNED,DKIM_VALID, DKIM_VALID_AU,FREEMAIL_FORGED_FROMDOMAIN,FREEMAIL_FROM, HEADER_FROM_DIFFERENT_DOMAINS,INCLUDES_PATCH,MAILING_LIST_MULTI,SIGNED_OFF_BY, SPF_PASS,USER_AGENT_GIT autolearn=ham autolearn_force=no version=3.4.0 Received: from mail.kernel.org (mail.kernel.org [198.145.29.99]) by smtp.lore.kernel.org (Postfix) with ESMTP id 0EF23C2F3A0 for ; Mon, 21 Jan 2019 13:06:55 +0000 (UTC) Received: from vger.kernel.org (vger.kernel.org [209.132.180.67]) by mail.kernel.org (Postfix) with ESMTP id C7B5A2084C for ; Mon, 21 Jan 2019 13:06:54 +0000 (UTC) Authentication-Results: mail.kernel.org; dkim=pass (2048-bit key) header.d=gmail.com header.i=@gmail.com header.b="Sx+vYB0h" Received: (majordomo@vger.kernel.org) by vger.kernel.org via listexpand id S1728773AbfAUNGx (ORCPT ); Mon, 21 Jan 2019 08:06:53 -0500 Received: from mail-pl1-f196.google.com ([209.85.214.196]:34053 "EHLO mail-pl1-f196.google.com" rhost-flags-OK-OK-OK-OK) by vger.kernel.org with ESMTP id S1727449AbfAUNGw (ORCPT ); Mon, 21 Jan 2019 08:06:52 -0500 Received: by mail-pl1-f196.google.com with SMTP id w4so9839332plz.1 for ; Mon, 21 Jan 2019 05:06:52 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=20161025; h=from:to:cc:subject:date:message-id; bh=/dp0f7OuTzooyos3tbiP2FvD97JIURAdjnv3H/065Kw=; b=Sx+vYB0hDnwu77PO3hAjqp+S8jBnpD4t/t6u6OvX9GbkSEgVOFqk6GaCz4mWjBAcKJ 6X6/jpmidJscMXRPnQ5H2lnwNV6A2NhPfh2ogdpKS1A2DItDBLfc9kP2eGJS7Dy4S9ei eEWs0RSh4iC1/NuqBe5F2381d0AXjqi/7rs7MQ1lpOcfr6CXIcjSOtYgm5JOF0a2YnR5 r4tLg+vKVgqEa2CeFB52KescR2fh95iSfdaczd9i5KUS42pSNWnNmrhCI/B1YwnmiF0Q JHwg79KvbgaXktiTpC/BCWjtjF38ZOliS5HmSsgei/bAW3mvkr4lxuHmHgxTZ+MdLjM/ N+NA== X-Google-DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=1e100.net; s=20161025; h=x-gm-message-state:from:to:cc:subject:date:message-id; bh=/dp0f7OuTzooyos3tbiP2FvD97JIURAdjnv3H/065Kw=; b=j9jJXJmXQlI4DdyUCCKSSIelw3024uFfPPjAuBaqcEMlwhCSoiGYpKTaMnr9OMqbUT ZWAOkXIVteEwInLJKEciKRsOMQ2LMayZynUKxOofno1Dv3501UZKN8PD/Rb2AU9t9A9R /CvGx2ENxzBsXWqdNZbUW1iqp1yE3Iciis0awfYG5jh0rK/X/MNvWcP2knTn0ST3h7fz IpsF+JWaGpTXkSqXYOd+P+DIT/prSNYZHGBFdSUZiln3hYGUNRtDwsGu6Dn3HEWQ86Dk 9yiqLRg92D58DxKvk0HtIELskLuA5YV+fQW3PtVaBPfSXek34mlnPTmDP6wyWan9svJm Kxpw== X-Gm-Message-State: AJcUukfO/FGrWOLaA01Lq8nWgZbWqLRo3O9RUPpZf+cUf7Ja4D+5Q4qx /U/u8H6hhuTaQv9D1BAZIuc= X-Google-Smtp-Source: ALg8bN5KYaz0+stziOon5IjjkAbxy2e7xwYsmZS+fVIoI55IvIm012LBLXFgFuxBNsXsuUqSpiFJ/Q== X-Received: by 2002:a17:902:1102:: with SMTP id d2mr30221862pla.138.1548076011623; Mon, 21 Jan 2019 05:06:51 -0800 (PST) Received: from localhost.localdomain ([211.196.191.92]) by smtp.gmail.com with ESMTPSA id t12sm20590751pfi.45.2019.01.21.05.06.48 (version=TLS1_2 cipher=ECDHE-RSA-AES128-GCM-SHA256 bits=128/128); Mon, 21 Jan 2019 05:06:50 -0800 (PST) From: Taeung Song To: Daniel Borkmann , Alexei Starovoitov Cc: netdev@vger.kernel.org, Quentin Monnet , Jakub Kicinski , Andrey Ignatov Subject: [PATCH bpf-next v4] libbpf: Show supported ELF section names on when failed to guess a prog/attach type Date: Mon, 21 Jan 2019 22:06:38 +0900 Message-Id: <20190121130638.7554-1-treeze.taeung@gmail.com> X-Mailer: git-send-email 2.17.1 Sender: netdev-owner@vger.kernel.org Precedence: bulk List-ID: X-Mailing-List: netdev@vger.kernel.org We need to let users check their wrong ELF section name with proper ELF section names when failed to get a prog/attach type from it. Because users can't realize libbpf guess prog/attach types from given ELF section names. For example, when a 'cgroup' section name of a BPF program is used, show available ELF section names(types). Before: $ bpftool prog load bpf-prog.o /sys/fs/bpf/prog1 Error: failed to guess program type based on ELF section name cgroup After: libbpf: failed to guess program type based on ELF section name 'cgroup' libbpf: supported section(type) names are: socket kprobe/ kretprobe/ classifier action tracepoint/ raw_tracepoint/ xdp perf_event lwt_in lwt_out lwt_xmit lwt_seg6local cgroup_skb/ingress cgroup_skb/egress cgroup/skb cgroup/sock cgroup/post_bind4 cgroup/post_bind6 cgroup/dev sockops sk_skb/stream_parser sk_skb/stream_verdict sk_skb sk_msg lirc_mode2 flow_dissector cgroup/bind4 cgroup/bind6 cgroup/connect4 cgroup/connect6 cgroup/sendmsg4 cgroup/sendmsg6 Cc: Quentin Monnet Cc: Jakub Kicinski Cc: Andrey Ignatov Signed-off-by: Taeung Song --- tools/bpf/bpftool/prog.c | 10 ++-- tools/lib/bpf/libbpf.c | 46 ++++++++++++++++++- .../selftests/bpf/test_socket_cookie.c | 4 +- 3 files changed, 48 insertions(+), 12 deletions(-) diff --git a/tools/bpf/bpftool/prog.c b/tools/bpf/bpftool/prog.c index 2d1bb7d6ff51..0640e9bc0ada 100644 --- a/tools/bpf/bpftool/prog.c +++ b/tools/bpf/bpftool/prog.c @@ -930,10 +930,9 @@ static int load_with_options(int argc, char **argv, bool first_prog_only) err = libbpf_prog_type_by_name(type, &attr.prog_type, &expected_attach_type); free(type); - if (err < 0) { - p_err("unknown program type '%s'", *argv); + if (err < 0) goto err_free_reuse_maps; - } + NEXT_ARG(); } else if (is_prefix(*argv, "map")) { void *new_map_replace; @@ -1028,11 +1027,8 @@ static int load_with_options(int argc, char **argv, bool first_prog_only) err = libbpf_prog_type_by_name(sec_name, &prog_type, &expected_attach_type); - if (err < 0) { - p_err("failed to guess program type based on section name %s\n", - sec_name); + if (err < 0) goto err_close_obj; - } } bpf_program__set_ifindex(pos, ifindex); diff --git a/tools/lib/bpf/libbpf.c b/tools/lib/bpf/libbpf.c index 169e347c76f6..2ccde17957e6 100644 --- a/tools/lib/bpf/libbpf.c +++ b/tools/lib/bpf/libbpf.c @@ -2667,9 +2667,38 @@ static const struct { #undef BPF_EAPROG_SEC #undef BPF_APROG_COMPAT +#define MAX_TYPE_NAME_SIZE 32 + +static char *libbpf_get_type_names(bool attach_type) +{ + int i, len = ARRAY_SIZE(section_names) * MAX_TYPE_NAME_SIZE; + char *buf; + + buf = malloc(len); + if (!buf) + return NULL; + + buf[0] = '\0'; + /* Forge string buf with all available names */ + for (i = 0; i < ARRAY_SIZE(section_names); i++) { + if (attach_type && !section_names[i].is_attachable) + continue; + + if (strlen(buf) + strlen(section_names[i].sec) + 2 > len) { + free(buf); + return NULL; + } + strcat(buf, " "); + strcat(buf, section_names[i].sec); + } + + return buf; +} + int libbpf_prog_type_by_name(const char *name, enum bpf_prog_type *prog_type, enum bpf_attach_type *expected_attach_type) { + char *type_names; int i; if (!name) @@ -2682,12 +2711,20 @@ int libbpf_prog_type_by_name(const char *name, enum bpf_prog_type *prog_type, *expected_attach_type = section_names[i].expected_attach_type; return 0; } + pr_warning("failed to guess program type based on ELF section name '%s'\n", name); + type_names = libbpf_get_type_names(false); + if (type_names != NULL) { + pr_info("supported section(type) names are:%s\n", type_names); + free(type_names); + } + return -EINVAL; } int libbpf_attach_type_by_name(const char *name, enum bpf_attach_type *attach_type) { + char *type_names; int i; if (!name) @@ -2701,6 +2738,13 @@ int libbpf_attach_type_by_name(const char *name, *attach_type = section_names[i].attach_type; return 0; } + pr_warning("failed to guess attach type based on ELF section name '%s'\n", name); + type_names = libbpf_get_type_names(true); + if (type_names != NULL) { + pr_info("attachable section(type) names are:%s\n", type_names); + free(type_names); + } + return -EINVAL; } @@ -2907,8 +2951,6 @@ int bpf_prog_load_xattr(const struct bpf_prog_load_attr *attr, err = bpf_program__identify_section(prog, &prog_type, &expected_attach_type); if (err < 0) { - pr_warning("failed to guess program type based on section name %s\n", - prog->section_name); bpf_object__close(obj); return -EINVAL; } diff --git a/tools/testing/selftests/bpf/test_socket_cookie.c b/tools/testing/selftests/bpf/test_socket_cookie.c index fc7832ee566b..e51d63786ff8 100644 --- a/tools/testing/selftests/bpf/test_socket_cookie.c +++ b/tools/testing/selftests/bpf/test_socket_cookie.c @@ -158,10 +158,8 @@ static int run_test(int cgfd) bpf_object__for_each_program(prog, pobj) { prog_name = bpf_program__title(prog, /*needs_copy*/ false); - if (libbpf_attach_type_by_name(prog_name, &attach_type)) { - log_err("Unexpected prog: %s", prog_name); + if (libbpf_attach_type_by_name(prog_name, &attach_type)) goto err; - } err = bpf_prog_attach(bpf_program__fd(prog), cgfd, attach_type, BPF_F_ALLOW_OVERRIDE); -- 2.17.1