1 // SPDX-License-Identifier: GPL-2.0
2 /* Copyright (c) 2020 Carlos Neira cneirabustos@gmail.com */
7 #include <sys/syscall.h>
10 #include <sys/mount.h>
11 #include "test_progs.h"
13 #define CHECK_NEWNS(condition, tag, format...) ({ \
14 int __ret = !!(condition); \
16 printf("%s:FAIL:%s ", __func__, tag); \
19 printf("%s:PASS:%s\n", __func__, tag); \
31 int main(int argc
, char **argv
)
37 printf("Testing bpf_get_ns_current_pid_tgid helper in new ns\n");
39 if (stat("/proc/self/ns/pid", &st
)) {
40 perror("stat failed on /proc/self/ns/pid ns\n");
41 printf("%s:FAILED\n", argv
[0]);
45 if (CHECK_NEWNS(unshare(CLONE_NEWPID
| CLONE_NEWNS
),
46 "unshare CLONE_NEWPID | CLONE_NEWNS", "error errno=%d\n", errno
))
51 perror("Fork() failed\n");
52 printf("%s:FAILED\n", argv
[0]);
60 waitpid(pid
, &status
, 0);
66 perror("Fork() failed\n");
67 printf("%s:FAILED\n", argv
[0]);
73 waitpid(pid
, &status
, 0);
76 if (CHECK_NEWNS(mount("none", "/proc", NULL
, MS_PRIVATE
|MS_REC
, NULL
),
77 "Unmounting proc", "Cannot umount proc! errno=%d\n", errno
))
80 if (CHECK_NEWNS(mount("proc", "/proc", "proc", MS_NOSUID
|MS_NOEXEC
|MS_NODEV
, NULL
),
81 "Mounting proc", "Cannot mount proc! errno=%d\n", errno
))
84 const char *probe_name
= "raw_tracepoint/sys_enter";
85 const char *file
= "test_ns_current_pid_tgid.o";
86 struct bpf_link
*link
= NULL
;
87 struct bpf_program
*prog
;
88 struct bpf_map
*bss_map
;
89 struct bpf_object
*obj
;
96 obj
= bpf_object__open_file(file
, NULL
);
97 if (CHECK_NEWNS(IS_ERR(obj
), "obj_open", "err %ld\n", PTR_ERR(obj
)))
100 err
= bpf_object__load(obj
);
101 if (CHECK_NEWNS(err
, "obj_load", "err %d errno %d\n", err
, errno
))
104 bss_map
= bpf_object__find_map_by_name(obj
, "test_ns_.bss");
105 if (CHECK_NEWNS(!bss_map
, "find_bss_map", "failed\n"))
108 prog
= bpf_object__find_program_by_title(obj
, probe_name
);
109 if (CHECK_NEWNS(!prog
, "find_prog", "prog '%s' not found\n",
113 memset(&bss
, 0, sizeof(bss
));
114 pid_t tid
= syscall(SYS_gettid
);
115 pid_t pid
= getpid();
117 id
= (__u64
) tid
<< 32 | pid
;
118 bss
.user_pid_tgid
= id
;
120 if (CHECK_NEWNS(stat("/proc/self/ns/pid", &st
),
121 "stat new ns", "Failed to stat /proc/self/ns/pid errno=%d\n", errno
))
127 err
= bpf_map_update_elem(bpf_map__fd(bss_map
), &key
, &bss
, 0);
128 if (CHECK_NEWNS(err
, "setting_bss", "failed to set bss : %d\n", err
))
131 link
= bpf_program__attach_raw_tracepoint(prog
, "sys_enter");
132 if (CHECK_NEWNS(IS_ERR(link
), "attach_raw_tp", "err %ld\n",
138 /* trigger some syscalls */
141 err
= bpf_map_lookup_elem(bpf_map__fd(bss_map
), &key
, &bss
);
142 if (CHECK_NEWNS(err
, "set_bss", "failed to get bss : %d\n", err
))
145 if (CHECK_NEWNS(id
!= bss
.pid_tgid
, "Compare user pid/tgid vs. bpf pid/tgid",
146 "User pid/tgid %llu BPF pid/tgid %llu\n", id
, bss
.pid_tgid
))
150 printf("%s:PASS\n", argv
[0]);
153 bpf_link__destroy(link
);
156 bpf_object__close(obj
);