| // SPDX-License-Identifier: GPL-2.0 |
| /* Copyright (c) 2020 Carlos Neira cneirabustos@gmail.com */ |
| #define _GNU_SOURCE |
| #include <sys/stat.h> |
| #include <sys/types.h> |
| #include <unistd.h> |
| #include <sys/syscall.h> |
| #include <sched.h> |
| #include <sys/wait.h> |
| #include <sys/mount.h> |
| #include "test_progs.h" |
| |
| #define CHECK_NEWNS(condition, tag, format...) ({ \ |
| int __ret = !!(condition); \ |
| if (__ret) { \ |
| printf("%s:FAIL:%s ", __func__, tag); \ |
| printf(format); \ |
| } else { \ |
| printf("%s:PASS:%s\n", __func__, tag); \ |
| } \ |
| __ret; \ |
| }) |
| |
| struct bss { |
| __u64 dev; |
| __u64 ino; |
| __u64 pid_tgid; |
| __u64 user_pid_tgid; |
| }; |
| |
| int main(int argc, char **argv) |
| { |
| pid_t pid; |
| int exit_code = 1; |
| struct stat st; |
| |
| printf("Testing bpf_get_ns_current_pid_tgid helper in new ns\n"); |
| |
| if (stat("/proc/self/ns/pid", &st)) { |
| perror("stat failed on /proc/self/ns/pid ns\n"); |
| printf("%s:FAILED\n", argv[0]); |
| return exit_code; |
| } |
| |
| if (CHECK_NEWNS(unshare(CLONE_NEWPID | CLONE_NEWNS), |
| "unshare CLONE_NEWPID | CLONE_NEWNS", "error errno=%d\n", errno)) |
| return exit_code; |
| |
| pid = fork(); |
| if (pid == -1) { |
| perror("Fork() failed\n"); |
| printf("%s:FAILED\n", argv[0]); |
| return exit_code; |
| } |
| |
| if (pid > 0) { |
| int status; |
| |
| usleep(5); |
| waitpid(pid, &status, 0); |
| return 0; |
| } else { |
| |
| pid = fork(); |
| if (pid == -1) { |
| perror("Fork() failed\n"); |
| printf("%s:FAILED\n", argv[0]); |
| return exit_code; |
| } |
| |
| if (pid > 0) { |
| int status; |
| waitpid(pid, &status, 0); |
| return 0; |
| } else { |
| if (CHECK_NEWNS(mount("none", "/proc", NULL, MS_PRIVATE|MS_REC, NULL), |
| "Unmounting proc", "Cannot umount proc! errno=%d\n", errno)) |
| return exit_code; |
| |
| if (CHECK_NEWNS(mount("proc", "/proc", "proc", MS_NOSUID|MS_NOEXEC|MS_NODEV, NULL), |
| "Mounting proc", "Cannot mount proc! errno=%d\n", errno)) |
| return exit_code; |
| |
| const char *probe_name = "raw_tracepoint/sys_enter"; |
| const char *file = "test_ns_current_pid_tgid.o"; |
| struct bpf_link *link = NULL; |
| struct bpf_program *prog; |
| struct bpf_map *bss_map; |
| struct bpf_object *obj; |
| int exit_code = 1; |
| int err, key = 0; |
| struct bss bss; |
| struct stat st; |
| __u64 id; |
| |
| obj = bpf_object__open_file(file, NULL); |
| if (CHECK_NEWNS(IS_ERR(obj), "obj_open", "err %ld\n", PTR_ERR(obj))) |
| return exit_code; |
| |
| err = bpf_object__load(obj); |
| if (CHECK_NEWNS(err, "obj_load", "err %d errno %d\n", err, errno)) |
| goto cleanup; |
| |
| bss_map = bpf_object__find_map_by_name(obj, "test_ns_.bss"); |
| if (CHECK_NEWNS(!bss_map, "find_bss_map", "failed\n")) |
| goto cleanup; |
| |
| prog = bpf_object__find_program_by_title(obj, probe_name); |
| if (CHECK_NEWNS(!prog, "find_prog", "prog '%s' not found\n", |
| probe_name)) |
| goto cleanup; |
| |
| memset(&bss, 0, sizeof(bss)); |
| pid_t tid = syscall(SYS_gettid); |
| pid_t pid = getpid(); |
| |
| id = (__u64) tid << 32 | pid; |
| bss.user_pid_tgid = id; |
| |
| if (CHECK_NEWNS(stat("/proc/self/ns/pid", &st), |
| "stat new ns", "Failed to stat /proc/self/ns/pid errno=%d\n", errno)) |
| goto cleanup; |
| |
| bss.dev = st.st_dev; |
| bss.ino = st.st_ino; |
| |
| err = bpf_map_update_elem(bpf_map__fd(bss_map), &key, &bss, 0); |
| if (CHECK_NEWNS(err, "setting_bss", "failed to set bss : %d\n", err)) |
| goto cleanup; |
| |
| link = bpf_program__attach_raw_tracepoint(prog, "sys_enter"); |
| if (CHECK_NEWNS(IS_ERR(link), "attach_raw_tp", "err %ld\n", |
| PTR_ERR(link))) { |
| link = NULL; |
| goto cleanup; |
| } |
| |
| /* trigger some syscalls */ |
| usleep(1); |
| |
| err = bpf_map_lookup_elem(bpf_map__fd(bss_map), &key, &bss); |
| if (CHECK_NEWNS(err, "set_bss", "failed to get bss : %d\n", err)) |
| goto cleanup; |
| |
| if (CHECK_NEWNS(id != bss.pid_tgid, "Compare user pid/tgid vs. bpf pid/tgid", |
| "User pid/tgid %llu BPF pid/tgid %llu\n", id, bss.pid_tgid)) |
| goto cleanup; |
| |
| exit_code = 0; |
| printf("%s:PASS\n", argv[0]); |
| cleanup: |
| if (!link) { |
| bpf_link__destroy(link); |
| link = NULL; |
| } |
| bpf_object__close(obj); |
| } |
| } |
| return 0; |
| } |