Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

epbf: Propagate PID namespace to kernel space #3008

Merged
merged 6 commits into from
Feb 21, 2024
Merged
Show file tree
Hide file tree
Changes from 3 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
89 changes: 42 additions & 47 deletions ebpf/bpf/pid.h
Original file line number Diff line number Diff line change
@@ -1,47 +1,42 @@

#if !defined(PYROSCOPE_PID)
#define PYROSCOPE_PID

// this should not be used in production, and always be disabled
// but is useful for running in a privileged context outside host pid namespace, for example wsl2
//#define PYROSCOPE_PID_NAMESPACED

#if defined(PYROSCOPE_PID_NAMESPACED)

#include "bpf_core_read.h"
// https://github.com/grafana/beyla/blob/6366275ce2d2c9bdefd47975b389fbcf39cbbea8/bpf/pid.h#L13
// Good resource on this: https://mozillazg.com/2022/05/ebpf-libbpfgo-get-process-info-en.html
// Using bpf_get_ns_current_pid_tgid is too restrictive for us
//static __always_inline void ns_pid_ppid(struct task_struct *task, u32 *pid , int *ppid, u32 *pid_ns_id) {
static __always_inline void current_pid(u32 *pid) {
struct task_struct *task = (struct task_struct *)bpf_get_current_task();
if (task == 0) {
return;
}
struct upid upid;

unsigned int level = BPF_CORE_READ(task, nsproxy, pid_ns_for_children, level);
struct pid *ns_pid = (struct pid *)BPF_CORE_READ(task, group_leader, thread_pid);
bpf_probe_read_kernel(&upid, sizeof(upid), &ns_pid->numbers[level]);

*pid = (u32)upid.nr;
// unsigned int p_level = BPF_CORE_READ(task, real_parent, nsproxy, pid_ns_for_children, level);
//
// struct pid *ns_ppid = (struct pid *)BPF_CORE_READ(task, real_parent, group_leader, thread_pid);
// bpf_probe_read_kernel(&upid, sizeof(upid), &ns_ppid->numbers[p_level]);
// *ppid = upid.nr;
//
// struct ns_common ns = BPF_CORE_READ(task, nsproxy, pid_ns_for_children, ns);
// *pid_ns_id = ns.inum;
}

#else // PYROSCOPE_PID_NAMESPACED

static __always_inline void current_pid(u32 *pid) {
u64 pid_tgid = bpf_get_current_pid_tgid();
*pid = (u32)(pid_tgid >> 32);
}
#endif // PYROSCOPE_PID_NAMESPACED


#endif // PYROSCOPE_PID
#if !defined(PYROSCOPE_PID)
#define PYROSCOPE_PID

#include "bpf_core_read.h"
#include "bpf_helpers.h"
#include "vmlinux.h"

#define PID_NESTED_NAMESPACES_MAX 4

static __always_inline void current_pid(uint64_t ns_pid_ino, uint32_t *pid) {
struct upid upid;
unsigned int inum;

// fallback to host pid, if no inode provided
if (ns_pid_ino == 0) {
uint64_t pid_tgid = bpf_get_current_pid_tgid();
*pid = (u32)(pid_tgid >> 32);
return;
}

struct task_struct *task = (struct task_struct *)bpf_get_current_task();

// retrieve level nested namespaces
unsigned int level = BPF_CORE_READ(task, nsproxy, pid_ns_for_children, level);

// match the level with pid ns inode
#pragma unroll
for (int i = 0; i < PID_NESTED_NAMESPACES_MAX; i++) {
if ((level - i) < 0) {
break;
}
upid = BPF_CORE_READ(task, thread_pid, numbers[level - i]);
inum = BPF_CORE_READ(upid.ns, ns.inum);

if (inum == ns_pid_ino) {
*pid = upid.nr;
simonswine marked this conversation as resolved.
Show resolved Hide resolved
break;
}
}
}

#endif // PYROSCOPE_PID
12 changes: 9 additions & 3 deletions ebpf/bpf/profile.bpf.c
Original file line number Diff line number Diff line change
Expand Up @@ -9,10 +9,16 @@

#define PF_KTHREAD 0x00200000

struct global_config_t {
uint64_t ns_pid_ino;
};

const volatile struct global_config_t global_config;

SEC("perf_event")
int do_perf_event(struct bpf_perf_event_data *ctx) {
u32 tgid = 0;
current_pid(&tgid);
current_pid(global_config.ns_pid_ino, &tgid);

struct sample_key key = {};
u32 *val, one = 1;
Expand Down Expand Up @@ -88,7 +94,7 @@ int BPF_KPROBE(disassociate_ctty, int on_exit) {
return 0;
}
u32 pid = 0;
current_pid(&pid);
current_pid(global_config.ns_pid_ino, &pid);
if (pid == 0) {
return 0;
}
Expand All @@ -104,7 +110,7 @@ int BPF_KPROBE(disassociate_ctty, int on_exit) {
SEC("kprobe/exec")
int BPF_KPROBE(exec, void *_) {
u32 pid = 0;
current_pid(&pid);
current_pid(global_config.ns_pid_ino, &pid);
if (pid == 0) {
return 0;
}
Expand Down
3 changes: 2 additions & 1 deletion ebpf/bpf/pyperf.bpf.c
Original file line number Diff line number Diff line change
Expand Up @@ -40,6 +40,7 @@ enum {
struct global_config_t {
uint8_t bpf_log_err;
uint8_t bpf_log_debug;
uint64_t ns_pid_ino;
};

const volatile struct global_config_t global_config;
Expand Down Expand Up @@ -278,7 +279,7 @@ static __always_inline int pyperf_collect_impl(struct bpf_perf_event_data* ctx,
SEC("perf_event")
int pyperf_collect(struct bpf_perf_event_data *ctx) {
u32 pid;
current_pid(&pid);
current_pid(global_config.ns_pid_ino, &pid);
if (pid == 0) {
return 0;
}
Expand Down
4 changes: 2 additions & 2 deletions ebpf/pyrobpf/gen.go
Original file line number Diff line number Diff line change
@@ -1,4 +1,4 @@
package pyrobpf

//go:generate go run github.com/cilium/ebpf/cmd/bpf2go -type pid_event -target amd64 -cc clang -cflags "-O2 -Wall -Werror -fpie -Wno-unused-variable -Wno-unused-function" Profile ../bpf/profile.bpf.c -- -I../bpf/libbpf -I../bpf/vmlinux/
//go:generate go run github.com/cilium/ebpf/cmd/bpf2go -type pid_event -target arm64 -cc clang -cflags "-O2 -Wall -Werror -fpie -Wno-unused-variable -Wno-unused-function" Profile ../bpf/profile.bpf.c -- -I../bpf/libbpf -I../bpf/vmlinux/
//go:generate go run github.com/cilium/ebpf/cmd/bpf2go -type global_config_t -type pid_event -target amd64 -cc clang -cflags "-O2 -Wall -Werror -fpie -Wno-unused-variable -Wno-unused-function" Profile ../bpf/profile.bpf.c -- -I../bpf/libbpf -I../bpf/vmlinux/
//go:generate go run github.com/cilium/ebpf/cmd/bpf2go -type global_config_t -type pid_event -target arm64 -cc clang -cflags "-O2 -Wall -Werror -fpie -Wno-unused-variable -Wno-unused-function" Profile ../bpf/profile.bpf.c -- -I../bpf/libbpf -I../bpf/vmlinux/
2 changes: 2 additions & 0 deletions ebpf/pyrobpf/profile_bpfel_arm64.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Binary file modified ebpf/pyrobpf/profile_bpfel_arm64.o
Binary file not shown.
2 changes: 2 additions & 0 deletions ebpf/pyrobpf/profile_bpfel_x86.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Binary file modified ebpf/pyrobpf/profile_bpfel_x86.o
Binary file not shown.
Binary file added ebpf/python/perf.data
simonswine marked this conversation as resolved.
Show resolved Hide resolved
Binary file not shown.
Binary file added ebpf/python/perf.data.old
Binary file not shown.
2 changes: 2 additions & 0 deletions ebpf/python/perf_bpfel_arm64.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Binary file modified ebpf/python/perf_bpfel_arm64.o
Binary file not shown.
2 changes: 2 additions & 0 deletions ebpf/python/perf_bpfel_x86.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

Binary file modified ebpf/python/perf_bpfel_x86.o
Binary file not shown.
32 changes: 31 additions & 1 deletion ebpf/session.go
Original file line number Diff line number Diff line change
Expand Up @@ -15,6 +15,7 @@ import (
"runtime"
"strings"
"sync"
"syscall"

"github.com/cilium/ebpf"
"github.com/cilium/ebpf/btf"
Expand Down Expand Up @@ -148,7 +149,25 @@ func (s *session) Start() error {
opts := &ebpf.CollectionOptions{
Programs: s.progOptions(),
}
if err := pyrobpf.LoadProfileObjects(&s.bpf, opts); err != nil {
spec, err := pyrobpf.LoadProfile()
if err != nil {
return fmt.Errorf("pyrobpf load %w", err)
}

_, nsIno, err := getPIDNamespace()
if err != nil {
return fmt.Errorf("unable to get pid namespace %w", err)
}
err = spec.RewriteConstants(map[string]interface{}{
"global_config": pyrobpf.ProfileGlobalConfigT{
NsPidIno: nsIno,
},
})
if err != nil {
return fmt.Errorf("pyrobpf rewrite constants %w", err)
}
err = spec.LoadAndAssign(&s.bpf, opts)
if err != nil {
s.logVerifierError(err)
s.stopLocked()
return fmt.Errorf("load bpf objects: %w", err)
Expand Down Expand Up @@ -905,3 +924,14 @@ func (s *stackBuilder) reset() {
func (s *stackBuilder) append(sym string) {
s.stack = append(s.stack, sym)
}

func getPIDNamespace() (dev uint64, ino uint64, err error) {
stat, err := os.Stat("/proc/self/ns/pid")
if err != nil {
return 0, 0, err
}
if st, ok := stat.Sys().(*syscall.Stat_t); ok {
return st.Dev, st.Ino, nil
}
return 0, 0, fmt.Errorf("could not determine pid namespace")
}
5 changes: 5 additions & 0 deletions ebpf/session_python.go
Original file line number Diff line number Diff line change
Expand Up @@ -120,10 +120,15 @@ func (s *session) loadPyPerf(cause *sd.Target) (*python.Perf, error) {
if err != nil {
return nil, fmt.Errorf("pyperf load %w", err)
}
_, nsIno, err := getPIDNamespace()
if err != nil {
return nil, fmt.Errorf("unable to get pid namespace %w", err)
}
err = spec.RewriteConstants(map[string]interface{}{
"global_config": python.PerfGlobalConfigT{
BpfLogErr: boolToU8(s.pythonBPFErrorLogEnabled(cause)),
BpfLogDebug: boolToU8(s.pythonBPFDebugLogEnabled(cause)),
NsPidIno: nsIno,
},
})
if err != nil {
Expand Down
Loading