[<prev] [next>] [<thread-prev] [thread-next>] [day] [month] [year] [list]
Message-ID: <55A688A0.7070507@linux.vnet.ibm.com>
Date: Wed, 15 Jul 2015 21:51:52 +0530
From: Aravinda Prasad <aravinda@...ux.vnet.ibm.com>
To: Peter Zijlstra <peterz@...radead.org>
CC: linux-kernel@...r.kernel.org, rostedt@...dmis.org,
mingo@...hat.com, paulus@...ba.org, acme@...nel.org,
hbathini@...ux.vnet.ibm.com, ananth@...ibm.com
Subject: Re: [RFC PATCH] perf: Container-aware tracing support
On Wednesday 15 July 2015 06:17 PM, Peter Zijlstra wrote:
> On Wed, Jul 15, 2015 at 02:38:36PM +0530, Aravinda Prasad wrote:
>> Current tracing infrastructure such as perf and ftrace reports system
>> wide data when invoked inside a container. It is required to restrict
>> events specific to a container context when such tools are invoked
>> inside a container.
>>
>> This RFC patch supports filtering container specific events, without
>> any change in the user interface, when invoked within a container for
>> the perf utility; such support needs to be extended to ftrace. This
>> patch assumes that the debugfs is available within the container and
>> all the processes running inside a container are grouped into a single
>> perf_event subsystem of cgroups. This patch piggybacks on the existing
>> support available for tracing with cgroups [1] by setting the cgrp
>> member of the event structure to the cgroup of the context perf tool
>> is invoked from.
>>
>> However, this patch is not complete and requires more work to fully
>> support tracing inside a container. This patch is intended to initiate
>> the discussion on having container-aware tracing support. A detailed
>> explanation on what is supported and pending issues are mentioned
>> below.
>
> tracing is outside the scope of perf; I suspect you want tracefs to be
> sensitive to filesystem namespaces and all that that entails.
Yes, tracefs needs to be sensitive to filesystem namespace. I wanted to
put together points required for supporting perf/trace inside containers.
>
>> Cc: Hari Bathini <hbathini@...ux.vnet.ibm.com>
>> Signed-off-by: Aravinda Prasad <aravinda@...ux.vnet.ibm.com>
>> ---
>> kernel/events/core.c | 49 +++++++++++++++++++++++++++++++++++--------------
>> 1 file changed, 35 insertions(+), 14 deletions(-)
>>
>> diff --git a/kernel/events/core.c b/kernel/events/core.c
>> index 81aa3a4..f6a1f89 100644
>> --- a/kernel/events/core.c
>> +++ b/kernel/events/core.c
>> @@ -589,17 +589,38 @@ static inline int perf_cgroup_connect(int fd, struct perf_event *event,
>> {
>> struct perf_cgroup *cgrp;
>> struct cgroup_subsys_state *css;
>> - struct fd f = fdget(fd);
>> + struct fd f;
>> int ret = 0;
>>
>> - if (!f.file)
>> - return -EBADF;
>> + if (fd != -1) {
>> + f = fdget(fd);
>> + if (!f.file)
>> + return -EBADF;
>>
>> - css = css_tryget_online_from_dir(f.file->f_path.dentry,
>> + css = css_tryget_online_from_dir(f.file->f_path.dentry,
>> &perf_event_cgrp_subsys);
>> - if (IS_ERR(css)) {
>> - ret = PTR_ERR(css);
>> - goto out;
>> + if (IS_ERR(css)) {
>> + ret = PTR_ERR(css);
>> + fdput(f);
>> + return ret;
>> + }
>> + } else if (event->attach_state == PERF_ATTACH_TASK) {
>> + /* Tracing on a PID. No need to set event->cgrp */
>> + return ret;
>> + } else if (task_active_pid_ns(current) != &init_pid_ns) {
>
> Why the pid namespace?
This comes from my understanding of container -- having at least a
separate PID namespace with processes inside a container grouped into a
single perf_event cgroups subsystem.
I know there are other ways to define a container, however, I thought I
start with the above one.
>
>> + /* Don't set event->cgrp if task belongs to root cgroup */
>> + if (task_css_is_root(current, perf_event_cgrp_id))
>> + return ret;
>
> So if you have the root perf_cgroup inside your container you can
> escape?
If we have root perf_cgroup inside the container then even if we set
event->cgrp we will be including all processes in the system.
Regards,
Aravinda
>
>> +
>> + css = task_css(current, perf_event_cgrp_id);
>> + if (!css || !css_tryget_online(css))
>> + return -ENOENT;
>> + } else {
>> + /*
>> + * perf invoked from global context and hence don't set
>> + * event->cgrp as all the events should be included
>> + */
>> + return ret;
>> }
>>
>> cgrp = container_of(css, struct perf_cgroup, css);
>
--
Regards,
Aravinda
--
To unsubscribe from this list: send the line "unsubscribe linux-kernel" in
the body of a message to majordomo@...r.kernel.org
More majordomo info at http://vger.kernel.org/majordomo-info.html
Please read the FAQ at http://www.tux.org/lkml/
Powered by blists - more mailing lists