-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Sargun Dhillon says: ==================== Add test_current_task_under_cgroup bpf helper and test This patchset includes a helper and an example to determine whether the probe is currently executing in the context of a specific cgroup based on a cgroup bpf map / array. The helper checks the cgroupsv2 hierarchy based on the handle in the map and if the current cgroup is equal to it, or a descendant of it. The helper was tested with the example program, and it was verified that the correct behaviour occurs in the interrupt context. In an earlier version of this patchset I had added an "opensnoop"-like tool, and I realized I was basically reimplementing a lot of the code that already exists in the bcc repo. So, instead I decided to write a test that creates a new mount namespace, mounts up the cgroupv2 hierarchy, and does some basic tests. I used the sync syscall as a canary for these tests because it's a simple, 0-arg syscall. Once this patch is accepted, adding support to opensnoop will be easy. I also added a task_under_cgroup_hierarchy function in cgroups.h, as this pattern is used in a couple places. Converting those can be done in a later patchset. Thanks to Alexei, Tejun, and Daniel for providing review. v1->v2: Clean up v2->v3: Move around ifdefs out of *.c files, add an "integration" test v3->v4: De-genercize arraymap fetching function; rename helper from in_cgroup to under_cgroup (makes much more sense) Split adding cgroups task_under_cgroup_hierarchy function v4->v5: Fix formatting ==================== Signed-off-by: David S. Miller <davem@davemloft.net>
- Loading branch information
Showing
9 changed files
with
263 additions
and
2 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,43 @@ | ||
/* Copyright (c) 2016 Sargun Dhillon <sargun@sargun.me> | ||
* | ||
* This program is free software; you can redistribute it and/or | ||
* modify it under the terms of version 2 of the GNU General Public | ||
* License as published by the Free Software Foundation. | ||
*/ | ||
|
||
#include <linux/ptrace.h> | ||
#include <uapi/linux/bpf.h> | ||
#include <linux/version.h> | ||
#include "bpf_helpers.h" | ||
#include <uapi/linux/utsname.h> | ||
|
||
struct bpf_map_def SEC("maps") cgroup_map = { | ||
.type = BPF_MAP_TYPE_CGROUP_ARRAY, | ||
.key_size = sizeof(u32), | ||
.value_size = sizeof(u32), | ||
.max_entries = 1, | ||
}; | ||
|
||
struct bpf_map_def SEC("maps") perf_map = { | ||
.type = BPF_MAP_TYPE_ARRAY, | ||
.key_size = sizeof(u32), | ||
.value_size = sizeof(u64), | ||
.max_entries = 1, | ||
}; | ||
|
||
/* Writes the last PID that called sync to a map at index 0 */ | ||
SEC("kprobe/sys_sync") | ||
int bpf_prog1(struct pt_regs *ctx) | ||
{ | ||
u64 pid = bpf_get_current_pid_tgid(); | ||
int idx = 0; | ||
|
||
if (!bpf_current_task_under_cgroup(&cgroup_map, 0)) | ||
return 0; | ||
|
||
bpf_map_update_elem(&perf_map, &idx, &pid, BPF_ANY); | ||
return 0; | ||
} | ||
|
||
char _license[] SEC("license") = "GPL"; | ||
u32 _version SEC("version") = LINUX_VERSION_CODE; |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,145 @@ | ||
/* Copyright (c) 2016 Sargun Dhillon <sargun@sargun.me> | ||
* | ||
* This program is free software; you can redistribute it and/or | ||
* modify it under the terms of version 2 of the GNU General Public | ||
* License as published by the Free Software Foundation. | ||
*/ | ||
|
||
#define _GNU_SOURCE | ||
#include <stdio.h> | ||
#include <linux/bpf.h> | ||
#include <unistd.h> | ||
#include "libbpf.h" | ||
#include "bpf_load.h" | ||
#include <string.h> | ||
#include <fcntl.h> | ||
#include <errno.h> | ||
#include <linux/bpf.h> | ||
#include <sched.h> | ||
#include <sys/mount.h> | ||
#include <sys/stat.h> | ||
#include <sys/types.h> | ||
#include <linux/limits.h> | ||
|
||
#define CGROUP_MOUNT_PATH "/mnt" | ||
#define CGROUP_PATH "/mnt/my-cgroup" | ||
|
||
#define clean_errno() (errno == 0 ? "None" : strerror(errno)) | ||
#define log_err(MSG, ...) fprintf(stderr, "(%s:%d: errno: %s) " MSG "\n", \ | ||
__FILE__, __LINE__, clean_errno(), ##__VA_ARGS__) | ||
|
||
static int join_cgroup(char *path) | ||
{ | ||
int fd, rc = 0; | ||
pid_t pid = getpid(); | ||
char cgroup_path[PATH_MAX + 1]; | ||
|
||
snprintf(cgroup_path, sizeof(cgroup_path), "%s/cgroup.procs", path); | ||
|
||
fd = open(cgroup_path, O_WRONLY); | ||
if (fd < 0) { | ||
log_err("Opening Cgroup"); | ||
return 1; | ||
} | ||
|
||
if (dprintf(fd, "%d\n", pid) < 0) { | ||
log_err("Joining Cgroup"); | ||
rc = 1; | ||
} | ||
close(fd); | ||
return rc; | ||
} | ||
|
||
int main(int argc, char **argv) | ||
{ | ||
char filename[256]; | ||
int cg2, idx = 0; | ||
pid_t remote_pid, local_pid = getpid(); | ||
|
||
snprintf(filename, sizeof(filename), "%s_kern.o", argv[0]); | ||
if (load_bpf_file(filename)) { | ||
printf("%s", bpf_log_buf); | ||
return 1; | ||
} | ||
|
||
/* | ||
* This is to avoid interfering with existing cgroups. Unfortunately, | ||
* most people don't have cgroupv2 enabled at this point in time. | ||
* It's easier to create our own mount namespace and manage it | ||
* ourselves. | ||
*/ | ||
if (unshare(CLONE_NEWNS)) { | ||
log_err("unshare"); | ||
return 1; | ||
} | ||
|
||
if (mount("none", "/", NULL, MS_REC | MS_PRIVATE, NULL)) { | ||
log_err("mount fakeroot"); | ||
return 1; | ||
} | ||
|
||
if (mount("none", CGROUP_MOUNT_PATH, "cgroup2", 0, NULL)) { | ||
log_err("mount cgroup2"); | ||
return 1; | ||
} | ||
|
||
if (mkdir(CGROUP_PATH, 0777) && errno != EEXIST) { | ||
log_err("mkdir cgroup"); | ||
return 1; | ||
} | ||
|
||
cg2 = open(CGROUP_PATH, O_RDONLY); | ||
if (cg2 < 0) { | ||
log_err("opening target cgroup"); | ||
goto cleanup_cgroup_err; | ||
} | ||
|
||
if (bpf_update_elem(map_fd[0], &idx, &cg2, BPF_ANY)) { | ||
log_err("Adding target cgroup to map"); | ||
goto cleanup_cgroup_err; | ||
} | ||
if (join_cgroup("/mnt/my-cgroup")) { | ||
log_err("Leaving target cgroup"); | ||
goto cleanup_cgroup_err; | ||
} | ||
|
||
/* | ||
* The installed helper program catched the sync call, and should | ||
* write it to the map. | ||
*/ | ||
|
||
sync(); | ||
bpf_lookup_elem(map_fd[1], &idx, &remote_pid); | ||
|
||
if (local_pid != remote_pid) { | ||
fprintf(stderr, | ||
"BPF Helper didn't write correct PID to map, but: %d\n", | ||
remote_pid); | ||
goto leave_cgroup_err; | ||
} | ||
|
||
/* Verify the negative scenario; leave the cgroup */ | ||
if (join_cgroup(CGROUP_MOUNT_PATH)) | ||
goto leave_cgroup_err; | ||
|
||
remote_pid = 0; | ||
bpf_update_elem(map_fd[1], &idx, &remote_pid, BPF_ANY); | ||
|
||
sync(); | ||
bpf_lookup_elem(map_fd[1], &idx, &remote_pid); | ||
|
||
if (local_pid == remote_pid) { | ||
fprintf(stderr, "BPF cgroup negative test did not work\n"); | ||
goto cleanup_cgroup_err; | ||
} | ||
|
||
rmdir(CGROUP_PATH); | ||
return 0; | ||
|
||
/* Error condition, cleanup */ | ||
leave_cgroup_err: | ||
join_cgroup(CGROUP_MOUNT_PATH); | ||
cleanup_cgroup_err: | ||
rmdir(CGROUP_PATH); | ||
return 1; | ||
} |