Re: [RESEND PATCH bpf-next v6 8/8] selftests/bpf: Add tests for open-coded task and css iter

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

 





在 2023/10/20 08:03, Alexei Starovoitov 写道:
On Tue, Oct 17, 2023 at 11:18 PM Chuyi Zhou <zhouchuyi@xxxxxxxxxxxxx> wrote:

+
+SEC("?fentry.s/" SYS_PREFIX "sys_getpgid")
+__failure __msg("css_task_iter is only allowed in bpf_lsm and bpf iter-s")
+int BPF_PROG(iter_css_task_for_each)
+{
+       u64 cg_id = bpf_get_current_cgroup_id();
+       struct cgroup *cgrp = bpf_cgroup_from_id(cg_id);
+       struct cgroup_subsys_state *css;
+       struct task_struct *task;
+
+       if (cgrp == NULL)
+               return 0;
+       css = &cgrp->self;
+
+       bpf_for_each(css_task, task, css, CSS_TASK_ITER_PROCS) {
+
+       }
+       bpf_cgroup_release(cgrp);
+       return 0;
+}

I think we should relax allowlist in patch 2 further.
Any sleepable is safe.
Allowlist is needed to avoid dead locking on css_set_lock.
Any lsm and any iter (even non-sleepable) and any sleepable
seems to be safe.

Yes, I just try to read the corresponding code. IIUC, the key point here is we should not hold the css_set_lock before we invoking a BPF Prog which may use css_task iters.

1. For lsm hooks and task_iters, it would be clearly know from the code that we would not try to hold that lock.

2. For cgroup_iters, we will hold the cgroup_muetx before we enter the Prog and it's OK.(see __cgroup_procs_write())

3. For any sleepable progs, bpf_check_attach_target() would only allow them to attach some sepecifc hooks, currently, these hooks are OK.


Thanks for the suggestion again! I would do it.





[Index of Archives]     [Linux Samsung SoC]     [Linux Rockchip SoC]     [Linux Actions SoC]     [Linux for Synopsys ARC Processors]     [Linux NFS]     [Linux NILFS]     [Linux USB Devel]     [Video for Linux]     [Linux Audio Users]     [Yosemite News]     [Linux Kernel]     [Linux SCSI]


  Powered by Linux