1 /* Copyright (c) 2016 Sargun Dhillon <sargun@sargun.me>
3 * This program is free software; you can redistribute it and/or
4 * modify it under the terms of version 2 of the GNU General Public
5 * License as published by the Free Software Foundation.
10 #include <linux/bpf.h>
17 #include <linux/bpf.h>
19 #include <sys/mount.h>
21 #include <sys/types.h>
22 #include <linux/limits.h>
24 #define CGROUP_MOUNT_PATH "/mnt"
25 #define CGROUP_PATH "/mnt/my-cgroup"
27 #define clean_errno() (errno == 0 ? "None" : strerror(errno))
28 #define log_err(MSG, ...) fprintf(stderr, "(%s:%d: errno: %s) " MSG "\n", \
29 __FILE__, __LINE__, clean_errno(), ##__VA_ARGS__)
31 static int join_cgroup(char *path
)
35 char cgroup_path
[PATH_MAX
+ 1];
37 snprintf(cgroup_path
, sizeof(cgroup_path
), "%s/cgroup.procs", path
);
39 fd
= open(cgroup_path
, O_WRONLY
);
41 log_err("Opening Cgroup");
45 if (dprintf(fd
, "%d\n", pid
) < 0) {
46 log_err("Joining Cgroup");
53 int main(int argc
, char **argv
)
57 pid_t remote_pid
, local_pid
= getpid();
59 snprintf(filename
, sizeof(filename
), "%s_kern.o", argv
[0]);
60 if (load_bpf_file(filename
)) {
61 printf("%s", bpf_log_buf
);
66 * This is to avoid interfering with existing cgroups. Unfortunately,
67 * most people don't have cgroupv2 enabled at this point in time.
68 * It's easier to create our own mount namespace and manage it
71 if (unshare(CLONE_NEWNS
)) {
76 if (mount("none", "/", NULL
, MS_REC
| MS_PRIVATE
, NULL
)) {
77 log_err("mount fakeroot");
81 if (mount("none", CGROUP_MOUNT_PATH
, "cgroup2", 0, NULL
)) {
82 log_err("mount cgroup2");
86 if (mkdir(CGROUP_PATH
, 0777) && errno
!= EEXIST
) {
87 log_err("mkdir cgroup");
91 cg2
= open(CGROUP_PATH
, O_RDONLY
);
93 log_err("opening target cgroup");
94 goto cleanup_cgroup_err
;
97 if (bpf_update_elem(map_fd
[0], &idx
, &cg2
, BPF_ANY
)) {
98 log_err("Adding target cgroup to map");
99 goto cleanup_cgroup_err
;
101 if (join_cgroup("/mnt/my-cgroup")) {
102 log_err("Leaving target cgroup");
103 goto cleanup_cgroup_err
;
107 * The installed helper program catched the sync call, and should
108 * write it to the map.
112 bpf_lookup_elem(map_fd
[1], &idx
, &remote_pid
);
114 if (local_pid
!= remote_pid
) {
116 "BPF Helper didn't write correct PID to map, but: %d\n",
118 goto leave_cgroup_err
;
121 /* Verify the negative scenario; leave the cgroup */
122 if (join_cgroup(CGROUP_MOUNT_PATH
))
123 goto leave_cgroup_err
;
126 bpf_update_elem(map_fd
[1], &idx
, &remote_pid
, BPF_ANY
);
129 bpf_lookup_elem(map_fd
[1], &idx
, &remote_pid
);
131 if (local_pid
== remote_pid
) {
132 fprintf(stderr
, "BPF cgroup negative test did not work\n");
133 goto cleanup_cgroup_err
;
139 /* Error condition, cleanup */
141 join_cgroup(CGROUP_MOUNT_PATH
);