From: Steve Grubb <sgrubb@redhat.com>
To: linux-audit@redhat.com
Cc: Richard Guy Briggs <rgb@redhat.com>
Subject: Re: Linux audit performance impact
Date: Mon, 16 Feb 2015 07:59:27 -0500 [thread overview]
Message-ID: <2039734.h1hbe1jZF6@x2> (raw)
In-Reply-To: <9DBA79E0CE64AA42B07DEDAAD0F7DB914FA921C0@G9W0755.americas.hpqcorp.net>
On Monday, February 16, 2015 11:25:57 AM Viswanath, Logeswari P wrote:
> I configured the system to audit open system call alone instead of all the
> system calls (our loader program executes) and hence I saw the massive
> improvement in performance. My fix is not causing any change in the
> performance. I wrongly communicated that the fix is causing performance
> improvement. Sorry for that.
>
> As per the perf data, the format_decode is the function where most of the
> time is spent i.e. formatting the record in the buffer before delivering
> the data to user space. We need to eliminate formatting records to increase
> the performance. Any idea why we need to format the record and whether can
> we add an option (RAW) to deliver the record without formatting to user
> space?
Introducing any changes to the format of the record can cause all analytical
programs, both open source and proprietary, to stop working correctly. This
cannot be changed.
I think there is room for improvement however. There are times when strings
are being glued together and a stpcpy works just fine. There are times when a
numeric hex conversion is being done and %x is very slow. Same with %d.
The other issue is that the audit system's philosophy has not been to optimize
the formatting of the event, because events _should_ be rare. Meaning that if
you are getting hundred of events per second, something is seriously wrong
with the rules.
It has been optimized to provide as little impact as possible when _not_
generating events. Meaning that we want it as fast as possible in letting the
system operate normally.
Again, there is room for improvement in both cases of triggering and not
triggering events. But the format of events can't really change without a lot
of coordination. I have a test suite here:
http://people.redhat.com/sgrubb/audit/ausearch-test-0.5.tar.gz
That can check that events are searchable by the main audit utility. If
changes cause that to fail, then its a sign you'll break the whole world.
-Steve
> -----Original Message-----
> From: Richard Guy Briggs [mailto:rgb@redhat.com]
> Sent: Thursday, February 12, 2015 11:55 PM
> To: Viswanath, Logeswari P (MCOU OSTL)
> Cc: Richard Guy Briggs; linux-audit@redhat.com
> Subject: Re: Linux audit performance impact
>
> On 15/02/12, Viswanath, Logeswari P (MCOU OSTL) wrote:
> > Hi all,
> >
> > We did profiling of the kernel (using perf tool) during our performance
> > test and below were the top 4 functions for the overhead.
> >
> > 11.33% loader1 [kernel.kallsyms] [k] format_decode
> >
> > 10.40% loader1 [kernel.kallsyms] [k] memcpy
> >
> > 7.46% loader1 [kernel.kallsyms] [k] number.isra.1
> > 6.99% loader1 [kernel.kallsyms] [k] vsnprintf
> >
> > I was unable to attach the entire profiling data of the kernel because it
> > exceeds the limit of 80KB.>
> > >From the perf data, we believed the overhead is because of invoking
> > >audit_log_format function multiple times.>
> > We changed the code to reduce the number of times this function is called.
> > With this change the performance degradation is 20% now compared to the
> > performance without auditing. Without this change the performance
> > degradation is 200% compared to the performance without auditing.
> Those numbers are not insignificant! I am a bit surprised you were able to
> get that much of an improvement with just this class of change.
> > We can publish the code change done tomorrow.
>
> I'd certainly be interested to see the code.
>
> > Please let me know your feedback on this idea.
> >
> > Regards,
> > Logeswari.
> >
> > -----Original Message-----
> > From: Richard Guy Briggs [mailto:rgb@redhat.com]
> > Sent: Wednesday, February 11, 2015 10:21 PM
> > To: Viswanath, Logeswari P (MCOU OSTL)
> > Cc: linux-audit@redhat.com
> > Subject: Re: Linux audit performance impact
> >
> > On 15/02/06, Viswanath, Logeswari P (MCOU OSTL) wrote:
> > > Hi all,
> > >
> > > Please find the below the details of the performance test we ran.
> > > It would be great if we get help to identify the reason behind the
> > > degradation and the ways of improving it.
> > >
> > > Kernel Version:
> > > root > uname -r
> > > 3.13.0-36-generic
> > >
> > > OS Version:
> > > Ubuntu 14.04.1
> > >
> > > No. of CPUs:
> > > root > nproc
> > > 24
> > >
> > > Audit Status:
> > > root > auditctl -s
> > > AUDIT_STATUS: enabled=1 flag=1 pid=0 rate_limit=0 backlog_limit=320
> > > lost=57190353 backlog=0
> > >
> > > Rules Configured:
> > > root > auditctl -l
> > > LIST_RULES: exit,always arch=3221225534 (0xc000003e) syscall=all
> > >
> > > Attached is the program used to load the system.
> > >
> > > Results:
> > >
> > > Without enabling audit 12.29
> > > With auditing enabled and no rules configured 12.31
> > > With auditing enabled, 1 rule configured but auditd not running -
> > > kauditd logs audit records to syslog via printk 41.02>
> > This would be more meaningful if you hacked the kernel to drain the queue
> > figuratively to /dev/nul to eliminate the effect of auditd draining it,
> > or syslog covering for a missing auditd. This stat doesn't tell us that
> > much since the I/O act can vary significantly per installation. That one
> > rule you chose is pretty unnaturally abusive and needs to be carefully
> > thought out to avoid self-measurement.>
> > > The degradation is around 200%
> > >
> > > Regards,
> > > Logeswari.
> > >
> > > -----Original Message-----
> > > From: Richard Guy Briggs [mailto:rgb@redhat.com]
> > > Sent: Wednesday, February 04, 2015 9:46 PM
> > > To: Viswanath, Logeswari P (MCOU OSTL)
> > > Cc: Satish Chandra Kilaru; Steve Grubb; linux-audit@redhat.com
> > > Subject: Re: Linux audit performance impact
> > >
> > > On 15/02/04, Viswanath, Logeswari P (MCOU OSTL) wrote:
> > > > The intent is to calculate the performance impact by the auditing
> > > > components such as
> > > >
> > > > 1) impact because of kauditd without auditd - but kauditd writes to
> > > > syslog, so we are unable to determine the impact just because of
> > > > kauditd - It is fine even if the audit record is dropped by kauditd.
> > > > Is there any way to do this?> >
> > > Not yet. That is a mode that has not been useful to anyone yet. You
> > > are welcome to hack a custom kernel to disable klog for doing testing
> > > instrumentation.> >
> > > > 2) impact because of running auditd - log format NOLOG
> > > > 3) impact because of running audispd - small plugin is written which
> > > > will just read the audit records and doesn't processes it.
> > > >
> > > > -----Original Message-----
> > > > From: Richard Guy Briggs [mailto:rgb@redhat.com]
> > > > Sent: Tuesday, February 03, 2015 10:33 PM
> > > > To: Satish Chandra Kilaru
> > > > Cc: Viswanath, Logeswari P (MCOU OSTL); Steve Grubb;
> > > > linux-audit@redhat.com
> > > > Subject: Re: Linux audit performance impact
> > > >
> > > > On 15/02/03, Satish Chandra Kilaru wrote:
> > > > > Thanks for The info. But my question was rhetorical... I meant
> > > > > to say that it would not be much... She is trying to bombard the
> > > > > system with open calls ... So lots and lots of events will be
> > > > > generated and kernel has to write down the events some where or
> > > > > discard them...> > >
> > > > Exactly. It is of little practical use. You have to do I/O at some
> > > > point, either to the same disk or another, or to a network interface
> > > > or serial port, otherwise, just chuck it out. You could do a
> > > > performance measurement on a short burst, then drain the queue, but
> > > > what will that actually tell us?> > >
> > > > > On Tuesday, February 3, 2015, Richard Guy Briggs <rgb@redhat.com>
wrote:
> > > > > > On 15/02/03, Satish Chandra Kilaru wrote:
> > > > > > > How many events can kernel accumulate without I/o ?
> > > > > >
> > > > > > The kernel default is 64 *buffers*, but I think Fedora and
> > > > > > RHEL set it to 320. It is now possible to set it to "0" which
> > > > > > means limited only by system resources. See "man auditctl", "-b"
> > > > > > option. An event can be made up of several buffers.
> > > > > >
> > > > > > Of course, how long a system lasts before the queue blows up
> > > > > > depends on your rule set...
> > > > > >
> > > > > > However, at the moment, it will still write out to klog if
> > > > > > auditd isn't running.
> > > > > >
> > > > > > > On Tuesday, February 3, 2015, Viswanath, Logeswari P (MCOU
> > > > > > >
> > > > > > > OSTL) < logeswari.pv@hp.com <javascript:;>> wrote:
> > > > > > > > I don't want to disable auditing (i.e. disable audit
> > > > > > > > record
> > > > > >
> > > > > > collection),
> > > > > >
> > > > > > > > but just do not want the records to delivered to user
> > > > > > > > space since I
> > > > > >
> > > > > > want to
> > > > > >
> > > > > > > > remove the I/O overhead while running the performance test.
> > > > > > > > Is there any option for this?
> > > > > > > >
> > > > > > > > -----Original Message-----
> > > > > > > > From: Richard Guy Briggs [mailto:rgb@redhat.com
> > > > > > > > <javascript:;>
> > > > > >
> > > > > > <javascript:;>]
> > > > > >
> > > > > > > > Sent: Thursday, January 29, 2015 10:23 PM
> > > > > > > > To: Viswanath, Logeswari P (MCOU OSTL)
> > > > > > > > Cc: Satish Chandra Kilaru; Steve Grubb;
> > > > > > > > linux-audit@redhat.com
> > > > > >
> > > > > > <javascript:;>
> > > > > >
> > > > > > > > <javascript:;>
> > > > > > > > Subject: Re: Linux audit performance impact
> > > > > > > >
> > > > > > > > On 15/01/29, Viswanath, Logeswari P (MCOU OSTL) wrote:
> > > > > > > > > Please read my question as “Is there any option to
> > > > > > > > > configure kaudit not to log audit records to syslog? when
> > > > > > > > > auditd not running.”> > > > > > >
> > > > > > > > Yeah, remove audit=1 from the kernel command line, or set
> > > > > > > > audit=0 in
> > > > > >
> > > > > > its
> > > > > >
> > > > > > > > place. This will stop all but AVCs and if auditd has ever
> > > > > > > > run since
> > > > > >
> > > > > > boot.
> > > > > >
> > > > > > > > If audit=0 is on the kernel boot line, it will be
> > > > > > > > impossible to run
> > > > > >
> > > > > > auditd.
> > > > > >
> > > > > > > > There is a feature request that is likely coming soon that
> > > > > > > > could be
> > > > > > > > useful:
> > > > > > > >
> > > > > > > > https://bugzilla.redhat.com/show_bug.cgi?id=1160046
> > > > > > > > "If no audit daemon is running, but an audit multicast
> > > > > > > > subscriber is around, then the kernel shouldn't forward audit
> > > > > > > > data to kmsg"
> > > > > > > >
> > > > > > > > > From: Viswanath, Logeswari P (MCOU OSTL)
> > > > > > > > > Sent: Thursday, January 29, 2015 11:49 AM
> > > > > > > > > To: 'Satish Chandra Kilaru'; Steve Grubb
> > > > > > > > > Cc: linux-audit@redhat.com <javascript:;> <javascript:;>
> > > > > > > > > Subject: RE: Linux audit performance impact
> > > > > > > > >
> > > > > > > > > Is there any option to configure kaudit not to log audit
> > > > > > > > > records to
> > > > > > > >
> > > > > > > > syslog when auditd is running?
> > > > > > > >
> > > > > > > > > This way we can assess the impact of enabling audit
> > > > > > > > > without involving
> > > > > > > >
> > > > > > > > disk I/o overhead.
> > > > > > > >
> > > > > > > > > From: Satish Chandra Kilaru [mailto:iam.kilaru@gmail.com
> > > > > >
> > > > > > <javascript:;> <javascript:;>]
> > > > > >
> > > > > > > > > Sent: Thursday, January 29, 2015 9:12 AM
> > > > > > > > > To: Steve Grubb
> > > > > >
> > > > > > > > > Cc: linux-audit@redhat.com <javascript:;>
<javascript:;><mailto:
> > > > > > linux-audit@redhat.com <javascript:;>
> > > > > >
> > > > > > > > <javascript:;>>; Viswanath,
> > > > > > > >
> > > > > > > > > Logeswari P (MCOU OSTL)
> > > > > > > > > Subject: Re: Linux audit performance impact
> > > > > > > > >
> > > > > > > > > I agree with you... but writing to disk can trigger
> > > > > > > > > further events
> > > > > > > >
> > > > > > > > leading spiralling of events...
> > > > > > > >
> > > > > > > > > I brought down my server few times with stupid rules...
> > > > > > > > >
> > > > > > > > > On Wed, Jan 28, 2015 at 10:39 PM, Steve Grubb
> > > > > > > > > <sgrubb@redhat.com
> > > > > >
> > > > > > <javascript:;>
> > > > > >
> > > > > > > > <javascript:;><mailto:sgrubb@redhat.com <javascript:;>
> > > > > >
> > > > > > <javascript:;>>> wrote:
> > > > > > > > > On Wednesday, January 28, 2015 10:18:47 AM Satish
> > > > > > > > > Chandra Kilaru
> > > > > >
> > > > > > wrote:
> > > > > > > > > > Write your own program to receive audit events
> > > > > > > > > > directly without using auditd...
> > > > > > > > > > That should be faster ....
> > > > > > > > > > Auditd will log the events to disk causing more I/o than u
> > > > > > > > > > need...
> > > > > > > > >
> > > > > > > > > But even that is configurable in many ways. You can
> > > > > > > > > decide if you
> > > > > >
> > > > > > want
> > > > > >
> > > > > > > > > logging to disk or not and what kind of assurance that
> > > > > > > > > it made it to disk and the priority of that audit daemon.
> > > > > > > > > Then you also have all
> > > > > >
> > > > > > the
> > > > > >
> > > > > > > > > normal tuning knobs for disk throughput that you would
> > > > > > > > > use for any disk performance critical system.
> > > > > > > > >
> > > > > > > > > -Steve
> > > > > > > > >
> > > > > > > > > > On Wednesday, January 28, 2015, Viswanath, Logeswari P
> > > > > > > > > > (MCOU
> > > > > > > > > > OSTL)
> > > > > >
> > > > > > <
> > > > > >
> > > > > > > > > > logeswari.pv@hp.com <javascript:;> <javascript:;><mailto:
> > > > > > logeswari.pv@hp.com <javascript:;>
> > > > > >
> > > > > > > > <javascript:;>>> wrote:
> > > > > > > > > > > Hi Steve,
> > > > > > > > > > >
> > > > > > > > > > > I am Logeswari working for HP.
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > > We want to know audit performance impact on RHEL and
> > > > > > > > > > > Suse linux
> > > > > >
> > > > > > to
> > > > > >
> > > > > > > > > > > help us evaluate linux audit as data source for our
> > > > > > > > > > > host based
> > > > > >
> > > > > > IDS.
> > > > > >
> > > > > > > > > > > When we ran our own performance test with a test
> > > > > > > > > > > audispd plugin, we found if a system can perform
> > > > > > > > > > > 200000 open/close system calls per second without
> > > > > > > > > > > auditing, system can perform only 3000 open/close
> > > > > > > > > > > system calls auditing is enabled for open/close
> > > > > > > > > > > system call which is a HUGE impact on the system
> > > > > > > > > > > performance.
> > > > > > > > > > > It would
> > > > > >
> > > > > > be
> > > > > >
> > > > > > > > > > > great if anyone can help us answering the following
> > > > > > > > > > > questions.
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > > 1) Is this performance impact expected? If yes,
> > > > > > > > > > > what is the
> > > > > > > >
> > > > > > > > reason
> > > > > > > >
> > > > > > > > > > > behind it and can we fix it?
> > > > > > > > > > >
> > > > > > > > > > > 2) Have anyone done any benchmarking for
> > > > > > > > > > > performance
> > > > > >
> > > > > > impact? If
> > > > > >
> > > > > > > > yes,
> > > > > > > >
> > > > > > > > > > > can you please share the numbers and also the
> > > > > > > > > > > steps/programs used the run the same.
> > > > > > > > > > >
> > > > > > > > > > > 3) Help us validating the performance test we have
> > > > > > > > > > > done in
> > > > > >
> > > > > > our
> > > > > >
> > > > > > > > test
> > > > > > > >
> > > > > > > > > > > setup using the steps mentioned along with the results
> > > > > > > > > > > attached.
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > > Attached test program (loader.c) to invoke open and
> > > > > > > > > > > close system
> > > > > > > >
> > > > > > > > calls.
> > > > > > > >
> > > > > > > > > > > Attached idskerndsp is the audispd plugin program.
> > > > > > > > > > >
> > > > > > > > > > > We used time command to determine how much time the
> > > > > > > > > > > system took
> > > > > >
> > > > > > to
> > > > > >
> > > > > > > > > > > complete 50000 open/close system calls without
> > > > > > > > > > > (results attached
> > > > > > > > > > > Without-auditing) and with auditing enabled on the
> > > > > > > > > > > system (With-auditing-NOLOG-audispd-plugin and
> > > > > > > > > > > With-auditing-RAW)
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > > System details:
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > > 1 CPU machine
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > > *OS Version*
> > > > > > > > > > >
> > > > > > > > > > > RHEL 6.5
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > > *Kernel Version*
> > > > > > > > > > >
> > > > > > > > > > > uname –r
> > > > > > > > > > >
> > > > > > > > > > > 2.6.32-431.el6.x86_64
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > > Note: auditd was occupying 35% of CPU and was
> > > > > > > > > > > sleeping for most
> > > > > >
> > > > > > of
> > > > > >
> > > > > > > > > > > the time whereas kauditd was occupying 20% of the CPU.
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > >
> > > > > > > > > > > Thanks & Regards,
> > > > > > > > > > >
> > > > > > > > > > > Logeswari.
> > > > > > > > >
> > > > > > > > > --
> > > > > > > > > Please Donate to
> > > > > > > > > www.wikipedia.org<http://www.wikipedia.org>
> > > > > > > > >
> > > > > > > > > --
> > > > > > > > > Linux-audit mailing list Linux-audit@redhat.com
> > > > > > > > > <javascript:;> <javascript:;>
> > > > > > > > > https://www.redhat.com/mailman/listinfo/linux-audit
> > > > > > > >
> > > > > > > > - RGB
> > > > > > > >
> > > > > > > > --
> > > > > > > > Richard Guy Briggs <rbriggs@redhat.com <javascript:;>
> > > > > > > > <javascript:;>> Senior Software Engineer, Kernel Security,
> > > > > > > > AMER ENG Base Operating Systems, Red Hat Remote, Ottawa,
> > > > > > > > Canada
> > > > > > > > Voice: +1.647.777.2635, Internal: (81) 32635, Alt:
> > > > > > > > +1.613.693.0684x3545
> > > > > > >
> > > > > > > --
> > > > > > > Please Donate to www.wikipedia.org
> > > > > >
> > > > > > - RGB
> > > > > >
> > > > > > --
> > > > > > Richard Guy Briggs <rbriggs@redhat.com <javascript:;>> Senior
> > > > > > Software Engineer, Kernel Security, AMER ENG Base Operating
> > > > > > Systems, Red Hat Remote, Ottawa, Canada
> > > > > > Voice: +1.647.777.2635, Internal: (81) 32635, Alt:
> > > > > > +1.613.693.0684x3545
> > > > >
> > > > > --
> > > > > Please Donate to www.wikipedia.org
> > > >
> > > > - RGB
> > > >
> > > > --
> > > > Richard Guy Briggs <rbriggs@redhat.com> Senior Software Engineer,
> > > > Kernel Security, AMER ENG Base Operating Systems, Red Hat Remote,
> > > > Ottawa, Canada
> > > > Voice: +1.647.777.2635, Internal: (81) 32635, Alt:
> > > > +1.613.693.0684x3545
> > >
> > > - RGB
> > >
> > > --
> > > Richard Guy Briggs <rbriggs@redhat.com> Senior Software Engineer,
> > > Kernel Security, AMER ENG Base Operating Systems, Red Hat Remote,
> > > Ottawa, Canada
> > > Voice: +1.647.777.2635, Internal: (81) 32635, Alt:
> > > +1.613.693.0684x3545
> > >
> > > #include <stdio.h>
> > > #include <stdlib.h>
> > > #include <sys/stat.h>
> > > #include <fcntl.h>
> > > #include <unistd.h>
> > > #include <errno.h>
> > >
> > > void create_load(int iters);
> > > void cleanup();
> > >
> > > int high_rate = 0;
> > > int num_iters = 100000;
> > > int fd1;
> > > char file1[50];
> > > char file2[50];
> > > char dir1[50];
> > > char symlink1[50];
> > >
> > > /* Purpose: To create system load by invoking system calls used by
> > > templates.> >
> > > *
> > > * Note: The unlink(2) of a file can be an expensive operation (i.e.,
> > > event
> > > * rate goes way down).
> > > */
> > >
> > > main(int argc, char **argv) {
> > >
> > > int num_children=1;
> > > int iters;
> > > int i;
> > > char c;
> > >
> > > while ((c = getopt(argc, argv, "hi:")) != -1) {
> > >
> > > switch (c) {
> > >
> > > case 'h':
> > > /*
> > >
> > > * Desire "high" event rate
> > > */
> > >
> > > high_rate = 1;
> > > argc--;
> > > break;
> > >
> > > case 'i':
> > > /*
> > >
> > > * Desire a specified number of iterations
> > > */
> > >
> > > num_iters = atoi(optarg);
> > > argc--;
> > > break;
> > >
> > > default:
> > > fprintf(stderr,"Unknown option: %c\n",optarg);
> > > exit(1);
> > >
> > > }
> > >
> > > }
> > >
> > >
> > > /*if(argv[optind] != NULL) {
> > >
> > > num_children = atoi(argv[optind]);
> > >
> > > } else {
> > >
> > > num_children = 0;
> > >
> > > }
> > > Register cleanup routine */
> > > fprintf(stderr,"Registering cleanup routine...\n");
> > > if (atexit(cleanup) == -1) {
> > >
> > > fprintf(stderr,"Error calling atexit(), errno=%d(%s)\n",
> > >
> > > errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > >
> > >
> > > /* fork child processes, if any requested */
> > > for(i=1; i < num_children; i++) {
> > >
> > > if(fork() == 0) {
> > >
> > > printf("child pid: %d\n",getpid());
> > >
> > > /* Setup file names based on child's pid */
> > > sprintf(file1,"./file1_%d",getpid());
> > > sprintf(file2,"./file2_%d",getpid());
> > > sprintf(dir1,"./dir1_%d",getpid());
> > > sprintf(symlink1,"./file1symlink_%d",getpid());
> > >
> > > /* each child creates load */
> > > iters=0;
> > > if (num_iters == -1) {
> > >
> > > while(1) {
> > >
> > > create_load(iters);
> > > iters++;
> > > if( (iters % 1000) == 0) {
> > >
> > > printf("pid %d iteration %d\n",getpid(),iters);
> > >
> > > }
> > >
> > > }
> > >
> > > } else {
> > >
> > > while(iters < num_iters) {
> > >
> > > create_load(iters);
> > > iters++;
> > > if( (iters % 1000) == 0) {
> > >
> > > printf("pid %d iteration %d\n",getpid(),iters);
> > >
> > > }
> > >
> > > }
> > >
> > > }
> > >
> > > }
> > >
> > > }
> > >
> > > /* Parent creates load also */
> > > printf("parent pid: %d\n",getpid());
> > >
> > > /* Setup file names based on parent's pid */
> > > sprintf(file1,"./file1_%d",getpid());
> > > sprintf(file2,"./file2_%d",getpid());
> > > sprintf(dir1,"./dir1_%d",getpid());
> > > sprintf(symlink1,"./file1symlink_%d",getpid());
> > >
> > > iters=0;
> > > if (num_iters == -1) {
> > >
> > > while(1) {
> > >
> > > create_load(iters);
> > > iters++;
> > > if( (iters % 1000) == 0) {
> > >
> > > printf("pid %d iteration %d\n",getpid(),iters);
> > >
> > > }
> > >
> > > }
> > >
> > > } else {
> > >
> > > while(iters < num_iters) {
> > >
> > > create_load(iters);
> > > iters++;
> > > if( (iters % 1000) == 0) {
> > >
> > > printf("pid %d iteration %d\n",getpid(),iters);
> > >
> > > }
> > >
> > > }
> > >
> > > }
> > >
> > > } /* main */
> > >
> > >
> > > void create_load(int iters) {
> > >
> > > int pid;
> > > char *args[2];
> > > struct stat stat_buf;
> > >
> > > fd1 = creat(file1,0x644);
> > > if (fd1 == -1) {
> > >
> > > fprintf(stderr,"pid %d: creat() returned error for file %s,
> > > errno=%d(%s)\n",> >
> > > getpid(),file1,errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > > if (close(fd1) == -1) {
> > >
> > > fprintf(stderr,"pid %d: close() returned error, errno=%d(%s)\n",
> > >
> > > getpid(),errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > > fd1 = open(file1, O_RDWR, 0777);
> > > if (fd1 == -1) {
> > >
> > > fprintf(stderr,"pid %d: open() returned error, errno=%d(%s)\n",
> > >
> > > getpid(),errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > >
> > > /* Chown this file to root instead of user ids so that we don't
> > > generate a
> > >
> > > * non-owned alert when the file is truncated when invoking creat()
> > > again
> > > * as root on an existing file owned by another user.
> > > */
> > >
> > > if (chown(file1,0,0) == -1) {
> > >
> > > fprintf(stderr,"pid %d: chown(%d,%d) returned error,
> > > errno=%d(%s)\n",
> > >
> > > getpid(),0,0,errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > >
> > > if (fchown(fd1,0,0) == -1) {
> > >
> > > fprintf(stderr,"pid %d: fchown(%d,%d) returned error,
> > > errno=%d(%s)\n",
> > >
> > > getpid(),0,0,errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > >
> > > if (chmod(file1, S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH) == -1) {
> > >
> > > fprintf(stderr,"pid %d: chmod(S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH)
> > > returned error, errno=%d(%s)\n",> >
> > > getpid(),errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > > if (fchmod(fd1, S_IXUSR|S_IXGRP|S_IXOTH) == -1) {
> > >
> > > fprintf(stderr,"pid %d: fchmod(S_IXUSR|S_IXGRP|S_IXOTH) returned
> > > error, errno=%d(%s)\n",> >
> > > getpid(),errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > >
> > >
> > > if (write(fd1,"Some stuff",strlen("Some stuff")) == -1) {
> > >
> > > fprintf(stderr,"pid %d: write() returned error, errno=%d(%s)\n",
> > >
> > > getpid(),errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > > if (ftruncate(fd1,7) == -1) {
> > >
> > > fprintf(stderr,"pid %d: ftruncate() returned error, errno=%d(%s)\n",
> > >
> > > getpid(),errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > > if (close(fd1) == -1) {
> > >
> > > fprintf(stderr,"pid %d: close() returned error, errno=%d(%s)\n",
> > >
> > > getpid(),errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > >
> > > if (truncate(file1,3) == -1) {
> > >
> > > fprintf(stderr,"pid %d: truncate() returned error, errno=%d(%s)\n",
> > >
> > > getpid(),errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > > if (rename(file1,file2) == -1) {
> > >
> > > fprintf(stderr,"pid %d: rename(%s,%s) returned error,
> > > errno=%d(%s)\n",
> > >
> > > getpid(),file1,file2,errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > > if (rename(file2,file1) == -1) {
> > >
> > > fprintf(stderr,"pid %d: rename(%s,%s) returned error,
> > > errno=%d(%s)\n",
> > >
> > > getpid(),file2,file1,errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > > if (link(file1,file2) == -1) {
> > >
> > > fprintf(stderr,"pid %d: link(%s,%s) returned error, errno=%d(%s)\n",
> > >
> > > getpid(),file1,file2,errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > > if (symlink(file1,symlink1) == -1) {
> > >
> > > fprintf(stderr,"pid %d: symlink(%s,%s) returned error,
> > > errno=%d(%s)\n",
> > >
> > > getpid(),file1,symlink1,errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > > if (lchown(symlink1,0,0) == -1) {
> > >
> > > fprintf(stderr,"pid %d: lchown(%s,%d,%d) returned error,
> > > errno=%d(%s)\n",
> > >
> > > getpid(),symlink1,0,0,errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > >
> > > if (lstat(symlink1,&stat_buf) == -1) {
> > >
> > > fprintf(stderr,"pid %d: lstat(%s) returned error, errno=%d(%s)\n",
> > >
> > > getpid(),symlink1,errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > > if (stat(file1,&stat_buf) == -1) {
> > >
> > > fprintf(stderr,"pid %d: stat(%s) returned error, errno=%d(%s)\n",
> > >
> > > getpid(),file1,errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > > if (unlink(file1) == -1) {
> > >
> > > fprintf(stderr,"pid %d: unlink(%s) returned error, errno=%d(%s)\n",
> > >
> > > getpid(),file1,errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > > if (unlink(file2) == -1) {
> > >
> > > fprintf(stderr,"pid %d: unlink(%s) returned error, errno=%d(%s)\n",
> > >
> > > getpid(),file2,errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > > if (unlink(symlink1) == -1) {
> > >
> > > fprintf(stderr,"pid %d: unlink(%s) returned error, errno=%d(%s)\n",
> > >
> > > getpid(),symlink1,errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > > if (mkdir(dir1,S_IRUSR|S_IWUSR|S_IXUSR|S_IRGRP|S_IXGRP) == -1) {
> > >
> > > fprintf(stderr,"pid %d: mkdir() returned error, errno=%d(%s)\n",
> > >
> > > getpid(),errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > > if (rmdir(dir1) == -1) {
> > >
> > > fprintf(stderr,"pid %d: rmdir() returned error, errno=%d(%s)\n",
> > >
> > > getpid(),errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > >
> > > /* Fork every 10000 iterations to not use up process resources too
> > > quickly */ if ( (iters % 10000) == 0) {
> > >
> > > pid = fork();
> > > if(pid == 0) {
> > >
> > > fprintf(stderr,"child pid %d: fork!\n",getpid());
> > > // child
> > > args[0] = "/bin/ls";
> > > args[1] = NULL;
> > > close(1);
> > > close(2);
> > > execve(args[0], args, NULL);
> > > fprintf(stderr,"pid %d: execve(%s) returned error,
> > > errno=%d(%s)\n",
> > >
> > > getpid(),args[0],errno,strerror(errno));
> > >
> > > _exit(1);
> > >
> > > } else if (pid < 0) {
> > >
> > > fprintf(stderr,"pid %d: fork() returned error, errno=%d(%s)\n",
> > >
> > > getpid(),errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > } else {
> > >
> > > fprintf(stderr,"parent pid %d, child pid: %d:
> > > fork!\n",getpid(),pid);
> > >
> > > }
> > >
> > > pid = vfork();
> > > if(pid == 0) {
> > >
> > > args[0] = "/bin/pwd";
> > > args[1] = NULL;
> > > close(1);
> > > close(2);
> > > execv(args[0], args);
> > > fprintf(stderr,"pid %d: execve(%s) returned error,
> > > errno=%d(%s)\n",
> > >
> > > getpid(),args[0],errno,strerror(errno));
> > >
> > > _exit(1);
> > >
> > > } else if (pid < 0) {
> > >
> > > fprintf(stderr,"pid %d: vfork() returned error, errno=%d(%s)\n",
> > >
> > > getpid(),errno,strerror(errno));
> > >
> > > exit(1);
> > >
> > > }
> > >
> > > }
> > >
> > > /* Make sure everything is cleaned up and deleted before returning */
> > > cleanup();
> > >
> > > } /* create_load() */
> > >
> > > void cleanup() {
> > >
> > > close(fd1);
> > > unlink(file1);
> > > unlink(file2);
> > > unlink(symlink1);
> > > unlink(dir1);
> > > return;
> > >
> > > }
> > >
> > > --
> > > Linux-audit mailing list
> > > Linux-audit@redhat.com
> > > https://www.redhat.com/mailman/listinfo/linux-audit
> >
> > - RGB
> >
> > --
> > Richard Guy Briggs <rbriggs@redhat.com> Senior Software Engineer,
> > Kernel Security, AMER ENG Base Operating Systems, Red Hat Remote,
> > Ottawa, Canada
> > Voice: +1.647.777.2635, Internal: (81) 32635, Alt:
> > +1.613.693.0684x3545
> >
> > --
> > Linux-audit mailing list
> > Linux-audit@redhat.com
> > https://www.redhat.com/mailman/listinfo/linux-audit
>
> - RGB
>
> --
> Richard Guy Briggs <rbriggs@redhat.com>
> Senior Software Engineer, Kernel Security, AMER ENG Base Operating Systems,
> Red Hat Remote, Ottawa, Canada Voice: +1.647.777.2635, Internal: (81)
> 32635, Alt: +1.613.693.0684x3545
>
> --
> Linux-audit mailing list
> Linux-audit@redhat.com
> https://www.redhat.com/mailman/listinfo/linux-audit
--
Linux-audit mailing list
Linux-audit@redhat.com
https://www.redhat.com/mailman/listinfo/linux-audit
next prev parent reply other threads:[~2015-02-16 12:59 UTC|newest]
Thread overview: 49+ messages / expand[flat|nested] mbox.gz Atom feed top
2015-02-12 16:09 Linux audit performance impact Viswanath, Logeswari P (MCOU OSTL)
2015-02-12 18:25 ` Richard Guy Briggs
2015-02-16 11:25 ` Viswanath, Logeswari P (MCOU OSTL)
2015-02-16 12:59 ` Steve Grubb [this message]
2015-02-17 13:10 ` Viswanath, Logeswari P (MCOU OSTL)
2015-02-17 13:25 ` Steve Grubb
2015-02-18 21:13 ` Richard Guy Briggs
2015-02-18 21:21 ` Satish Chandra Kilaru
2015-02-18 21:49 ` Paul Moore
2015-02-18 22:32 ` Richard Guy Briggs
2015-02-19 3:32 ` Paul Moore
2015-02-20 18:29 ` Casey Schaufler
2015-02-20 18:37 ` Ed Christiansen MS
2015-02-20 18:51 ` Casey Schaufler
2015-02-20 21:25 ` Paul Moore
2015-02-20 21:22 ` Paul Moore
2015-02-23 13:28 ` Viswanath, Logeswari P (MCOU OSTL)
2015-02-16 17:32 ` Paul Moore
-- strict thread matches above, loose matches on Subject: below --
2015-02-12 16:10 Viswanath, Logeswari P (MCOU OSTL)
2015-02-12 16:31 ` Paul Moore
2015-02-12 16:43 ` Viswanath, Logeswari P (MCOU OSTL)
2015-01-28 14:57 Viswanath, Logeswari P (MCOU OSTL)
2015-01-28 15:16 ` Steve Grubb
2015-01-28 15:52 ` Viswanath, Logeswari P (MCOU OSTL)
2015-01-29 2:59 ` Satish Chandra Kilaru
2015-01-29 13:29 ` Viswanath, Logeswari P (MCOU OSTL)
2015-01-28 15:18 ` Satish Chandra Kilaru
2015-01-28 15:53 ` Viswanath, Logeswari P (MCOU OSTL)
2015-01-29 3:39 ` Steve Grubb
2015-01-29 3:41 ` Satish Chandra Kilaru
2015-01-29 6:18 ` Viswanath, Logeswari P (MCOU OSTL)
2015-01-29 9:20 ` Viswanath, Logeswari P (MCOU OSTL)
2015-01-29 16:52 ` Richard Guy Briggs
2015-01-29 17:13 ` Satish Chandra Kilaru
2015-01-30 13:08 ` Viswanath, Logeswari P (MCOU OSTL)
2015-02-03 10:27 ` Viswanath, Logeswari P (MCOU OSTL)
2015-02-03 12:03 ` Satish Chandra Kilaru
2015-02-03 16:45 ` Richard Guy Briggs
2015-02-03 16:54 ` Satish Chandra Kilaru
2015-02-03 17:02 ` Richard Guy Briggs
2015-02-04 8:52 ` Viswanath, Logeswari P (MCOU OSTL)
2015-02-04 16:15 ` Richard Guy Briggs
2015-02-06 6:47 ` Viswanath, Logeswari P (MCOU OSTL)
2015-02-11 16:51 ` Richard Guy Briggs
2015-02-12 14:58 ` Viswanath, Logeswari P (MCOU OSTL)
2015-02-13 14:15 ` Satish Chandra Kilaru
2015-02-06 11:52 ` Viswanath, Logeswari P (MCOU OSTL)
2015-02-11 14:16 ` Viswanath, Logeswari P (MCOU OSTL)
2015-02-11 16:45 ` Richard Guy Briggs
Reply instructions:
You may reply publicly to this message via plain-text email
using any one of the following methods:
* Save the following mbox file, import it into your mail client,
and reply-to-all from there: mbox
Avoid top-posting and favor interleaved quoting:
https://en.wikipedia.org/wiki/Posting_style#Interleaved_style
* Reply using the --to, --cc, and --in-reply-to
switches of git-send-email(1):
git send-email \
--in-reply-to=2039734.h1hbe1jZF6@x2 \
--to=sgrubb@redhat.com \
--cc=linux-audit@redhat.com \
--cc=rgb@redhat.com \
/path/to/YOUR_REPLY
https://kernel.org/pub/software/scm/git/docs/git-send-email.html
* If your mail client supports setting the In-Reply-To header
via mailto: links, try the mailto: link
Be sure your reply has a Subject: header at the top and a blank line
before the message body.
This is a public inbox, see mirroring instructions
for how to clone and mirror all data and code used for this inbox