diff options
Diffstat (limited to 'test/syscalls/linux/cgroup.cc')
-rw-r--r-- | test/syscalls/linux/cgroup.cc | 591 |
1 files changed, 0 insertions, 591 deletions
diff --git a/test/syscalls/linux/cgroup.cc b/test/syscalls/linux/cgroup.cc deleted file mode 100644 index f29891571..000000000 --- a/test/syscalls/linux/cgroup.cc +++ /dev/null @@ -1,591 +0,0 @@ -// Copyright 2021 The gVisor Authors. -// -// Licensed under the Apache License, Version 2.0 (the "License"); -// you may not use this file except in compliance with the License. -// You may obtain a copy of the License at -// -// http://www.apache.org/licenses/LICENSE-2.0 -// -// Unless required by applicable law or agreed to in writing, software -// distributed under the License is distributed on an "AS IS" BASIS, -// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. -// See the License for the specific language governing permissions and -// limitations under the License. - -// All tests in this file rely on being about to mount and unmount cgroupfs, -// which isn't expected to work, or be safe on a general linux system. - -#include <limits.h> -#include <sys/mount.h> -#include <unistd.h> - -#include "gtest/gtest.h" -#include "absl/container/flat_hash_map.h" -#include "absl/container/flat_hash_set.h" -#include "absl/strings/str_split.h" -#include "test/util/capability_util.h" -#include "test/util/cgroup_util.h" -#include "test/util/cleanup.h" -#include "test/util/mount_util.h" -#include "test/util/temp_path.h" -#include "test/util/test_util.h" -#include "test/util/thread_util.h" - -namespace gvisor { -namespace testing { -namespace { - -using ::testing::_; -using ::testing::Contains; -using ::testing::Ge; -using ::testing::Gt; -using ::testing::Key; -using ::testing::Not; - -std::vector<std::string> known_controllers = { - "cpu", "cpuset", "cpuacct", "job", "memory", -}; - -bool CgroupsAvailable() { - return IsRunningOnGvisor() && !IsRunningWithVFS1() && - TEST_CHECK_NO_ERRNO_AND_VALUE(HaveCapability(CAP_SYS_ADMIN)); -} - -TEST(Cgroup, MountSucceeds) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup c = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("")); - EXPECT_NO_ERRNO(c.ContainsCallingProcess()); -} - -TEST(Cgroup, SeparateMounts) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - - for (const auto& ctl : known_controllers) { - Cgroup c = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs(ctl)); - EXPECT_NO_ERRNO(c.ContainsCallingProcess()); - } -} - -TEST(Cgroup, AllControllersImplicit) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup c = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("")); - - absl::flat_hash_map<std::string, CgroupsEntry> cgroups_entries = - ASSERT_NO_ERRNO_AND_VALUE(ProcCgroupsEntries()); - for (const auto& ctl : known_controllers) { - EXPECT_TRUE(cgroups_entries.contains(ctl)) - << absl::StreamFormat("ctl=%s", ctl); - } - EXPECT_EQ(cgroups_entries.size(), known_controllers.size()); -} - -TEST(Cgroup, AllControllersExplicit) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup c = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("all")); - - absl::flat_hash_map<std::string, CgroupsEntry> cgroups_entries = - ASSERT_NO_ERRNO_AND_VALUE(ProcCgroupsEntries()); - for (const auto& ctl : known_controllers) { - EXPECT_TRUE(cgroups_entries.contains(ctl)) - << absl::StreamFormat("ctl=%s", ctl); - } - EXPECT_EQ(cgroups_entries.size(), known_controllers.size()); -} - -TEST(Cgroup, ProcsAndTasks) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup c = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("")); - absl::flat_hash_set<pid_t> pids = ASSERT_NO_ERRNO_AND_VALUE(c.Procs()); - absl::flat_hash_set<pid_t> tids = ASSERT_NO_ERRNO_AND_VALUE(c.Tasks()); - - EXPECT_GE(tids.size(), pids.size()) << "Found more processes than threads"; - - // Pids should be a strict subset of tids. - for (auto it = pids.begin(); it != pids.end(); ++it) { - EXPECT_TRUE(tids.contains(*it)) - << absl::StreamFormat("Have pid %d, but no such tid", *it); - } -} - -TEST(Cgroup, ControllersMustBeInUniqueHierarchy) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - // Hierarchy #1: all controllers. - Cgroup all = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("")); - // Hierarchy #2: memory. - // - // This should conflict since memory is already in hierarchy #1, and the two - // hierarchies have different sets of controllers, so this mount can't be a - // view into hierarchy #1. - EXPECT_THAT(m.MountCgroupfs("memory"), PosixErrorIs(EBUSY, _)) - << "Memory controller mounted on two hierarchies"; - EXPECT_THAT(m.MountCgroupfs("cpu"), PosixErrorIs(EBUSY, _)) - << "CPU controller mounted on two hierarchies"; -} - -TEST(Cgroup, UnmountFreesControllers) { - SKIP_IF(!CgroupsAvailable()); - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup all = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("")); - // All controllers are now attached to all's hierarchy. Attempting new mount - // with any individual controller should fail. - EXPECT_THAT(m.MountCgroupfs("memory"), PosixErrorIs(EBUSY, _)) - << "Memory controller mounted on two hierarchies"; - - // Unmount the "all" hierarchy. This should enable any controller to be - // mounted on a new hierarchy again. - ASSERT_NO_ERRNO(m.Unmount(all)); - EXPECT_NO_ERRNO(m.MountCgroupfs("memory")); - EXPECT_NO_ERRNO(m.MountCgroupfs("cpu")); -} - -TEST(Cgroup, OnlyContainsControllerSpecificFiles) { - SKIP_IF(!CgroupsAvailable()); - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup mem = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("memory")); - EXPECT_THAT(Exists(mem.Relpath("memory.usage_in_bytes")), - IsPosixErrorOkAndHolds(true)); - // CPU files shouldn't exist in memory cgroups. - EXPECT_THAT(Exists(mem.Relpath("cpu.cfs_period_us")), - IsPosixErrorOkAndHolds(false)); - EXPECT_THAT(Exists(mem.Relpath("cpu.cfs_quota_us")), - IsPosixErrorOkAndHolds(false)); - EXPECT_THAT(Exists(mem.Relpath("cpu.shares")), IsPosixErrorOkAndHolds(false)); - - Cgroup cpu = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("cpu")); - EXPECT_THAT(Exists(cpu.Relpath("cpu.cfs_period_us")), - IsPosixErrorOkAndHolds(true)); - EXPECT_THAT(Exists(cpu.Relpath("cpu.cfs_quota_us")), - IsPosixErrorOkAndHolds(true)); - EXPECT_THAT(Exists(cpu.Relpath("cpu.shares")), IsPosixErrorOkAndHolds(true)); - // Memory files shouldn't exist in cpu cgroups. - EXPECT_THAT(Exists(cpu.Relpath("memory.usage_in_bytes")), - IsPosixErrorOkAndHolds(false)); -} - -TEST(Cgroup, InvalidController) { - SKIP_IF(!CgroupsAvailable()); - - TempPath mountpoint = ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir()); - std::string mopts = "this-controller-is-invalid"; - EXPECT_THAT( - mount("none", mountpoint.path().c_str(), "cgroup", 0, mopts.c_str()), - SyscallFailsWithErrno(EINVAL)); -} - -TEST(Cgroup, MoptAllMustBeExclusive) { - SKIP_IF(!CgroupsAvailable()); - - TempPath mountpoint = ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir()); - std::string mopts = "all,cpu"; - EXPECT_THAT( - mount("none", mountpoint.path().c_str(), "cgroup", 0, mopts.c_str()), - SyscallFailsWithErrno(EINVAL)); -} - -TEST(Cgroup, MountRace) { - SKIP_IF(!CgroupsAvailable()); - - TempPath mountpoint = ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir()); - - const DisableSave ds; // Too many syscalls. - - auto mount_thread = [&mountpoint]() { - for (int i = 0; i < 100; ++i) { - mount("none", mountpoint.path().c_str(), "cgroup", 0, 0); - } - }; - std::list<ScopedThread> threads; - for (int i = 0; i < 10; ++i) { - threads.emplace_back(mount_thread); - } - for (auto& t : threads) { - t.Join(); - } - - auto cleanup = Cleanup([&mountpoint] { - // We need 1 umount call per successful mount. If some of the mount calls - // were unsuccessful, their corresponding umount will silently fail. - for (int i = 0; i < (10 * 100) + 1; ++i) { - umount(mountpoint.path().c_str()); - } - }); - - Cgroup c = Cgroup(mountpoint.path()); - // c should be a valid cgroup. - EXPECT_NO_ERRNO(c.ContainsCallingProcess()); -} - -TEST(Cgroup, MountUnmountRace) { - SKIP_IF(!CgroupsAvailable()); - - TempPath mountpoint = ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir()); - - const DisableSave ds; // Too many syscalls. - - auto mount_thread = [&mountpoint]() { - for (int i = 0; i < 100; ++i) { - mount("none", mountpoint.path().c_str(), "cgroup", 0, 0); - } - }; - auto unmount_thread = [&mountpoint]() { - for (int i = 0; i < 100; ++i) { - umount(mountpoint.path().c_str()); - } - }; - std::list<ScopedThread> threads; - for (int i = 0; i < 10; ++i) { - threads.emplace_back(mount_thread); - } - for (int i = 0; i < 10; ++i) { - threads.emplace_back(unmount_thread); - } - for (auto& t : threads) { - t.Join(); - } - - // We don't know how many mount refs are remaining, since the count depends on - // the ordering of mount and umount calls. Keep calling unmount until it - // returns an error. - while (umount(mountpoint.path().c_str()) == 0) { - } -} - -TEST(Cgroup, UnmountRepeated) { - SKIP_IF(!CgroupsAvailable()); - - const DisableSave ds; // Too many syscalls. - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup c = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("")); - - // First unmount should succeed. - EXPECT_THAT(umount(c.Path().c_str()), SyscallSucceeds()); - - // We just manually unmounted, so release managed resources. - m.release(c); - - EXPECT_THAT(umount(c.Path().c_str()), SyscallFailsWithErrno(EINVAL)); -} - -TEST(MemoryCgroup, MemoryUsageInBytes) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup c = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("memory")); - EXPECT_THAT(c.ReadIntegerControlFile("memory.usage_in_bytes"), - IsPosixErrorOkAndHolds(Gt(0))); -} - -TEST(CPUCgroup, ControlFilesHaveDefaultValues) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup c = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("cpu")); - EXPECT_THAT(c.ReadIntegerControlFile("cpu.cfs_quota_us"), - IsPosixErrorOkAndHolds(-1)); - EXPECT_THAT(c.ReadIntegerControlFile("cpu.cfs_period_us"), - IsPosixErrorOkAndHolds(100000)); - EXPECT_THAT(c.ReadIntegerControlFile("cpu.shares"), - IsPosixErrorOkAndHolds(1024)); -} - -TEST(CPUAcctCgroup, CPUAcctUsage) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup c = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("cpuacct")); - - const int64_t usage = - ASSERT_NO_ERRNO_AND_VALUE(c.ReadIntegerControlFile("cpuacct.usage")); - const int64_t usage_user = - ASSERT_NO_ERRNO_AND_VALUE(c.ReadIntegerControlFile("cpuacct.usage_user")); - const int64_t usage_sys = - ASSERT_NO_ERRNO_AND_VALUE(c.ReadIntegerControlFile("cpuacct.usage_sys")); - - EXPECT_GE(usage, 0); - EXPECT_GE(usage_user, 0); - EXPECT_GE(usage_sys, 0); - - EXPECT_GE(usage_user + usage_sys, usage); -} - -TEST(CPUAcctCgroup, CPUAcctStat) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup c = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("cpuacct")); - - std::string stat = - ASSERT_NO_ERRNO_AND_VALUE(c.ReadControlFile("cpuacct.stat")); - - // We're expecting the contents of "cpuacct.stat" to look similar to this: - // - // user 377986 - // system 220662 - - std::vector<absl::string_view> lines = - absl::StrSplit(stat, '\n', absl::SkipEmpty()); - ASSERT_EQ(lines.size(), 2); - - std::vector<absl::string_view> user_tokens = - StrSplit(lines[0], absl::ByChar(' ')); - EXPECT_EQ(user_tokens[0], "user"); - EXPECT_THAT(Atoi<int64_t>(user_tokens[1]), IsPosixErrorOkAndHolds(Ge(0))); - - std::vector<absl::string_view> sys_tokens = - StrSplit(lines[1], absl::ByChar(' ')); - EXPECT_EQ(sys_tokens[0], "system"); - EXPECT_THAT(Atoi<int64_t>(sys_tokens[1]), IsPosixErrorOkAndHolds(Ge(0))); -} - -// WriteAndVerifyControlValue attempts to write val to a cgroup file at path, -// and verify the value by reading it afterwards. -PosixError WriteAndVerifyControlValue(const Cgroup& c, std::string_view path, - int64_t val) { - RETURN_IF_ERRNO(c.WriteIntegerControlFile(path, val)); - ASSIGN_OR_RETURN_ERRNO(int64_t newval, c.ReadIntegerControlFile(path)); - if (newval != val) { - return PosixError( - EINVAL, - absl::StrFormat( - "Unexpected value for control file '%s': expected %d, got %d", path, - val, newval)); - } - return NoError(); -} - -TEST(JobCgroup, ReadWriteRead) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup c = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("job")); - - EXPECT_THAT(c.ReadIntegerControlFile("job.id"), IsPosixErrorOkAndHolds(0)); - EXPECT_NO_ERRNO(WriteAndVerifyControlValue(c, "job.id", 1234)); - EXPECT_NO_ERRNO(WriteAndVerifyControlValue(c, "job.id", -1)); - EXPECT_NO_ERRNO(WriteAndVerifyControlValue(c, "job.id", LLONG_MIN)); - EXPECT_NO_ERRNO(WriteAndVerifyControlValue(c, "job.id", LLONG_MAX)); -} - -TEST(ProcCgroups, Empty) { - SKIP_IF(!CgroupsAvailable()); - - absl::flat_hash_map<std::string, CgroupsEntry> entries = - ASSERT_NO_ERRNO_AND_VALUE(ProcCgroupsEntries()); - // No cgroups mounted yet, we should have no entries. - EXPECT_TRUE(entries.empty()); -} - -TEST(ProcCgroups, ProcCgroupsEntries) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - - Cgroup mem = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("memory")); - absl::flat_hash_map<std::string, CgroupsEntry> entries = - ASSERT_NO_ERRNO_AND_VALUE(ProcCgroupsEntries()); - EXPECT_EQ(entries.size(), 1); - ASSERT_TRUE(entries.contains("memory")); - CgroupsEntry mem_e = entries["memory"]; - EXPECT_EQ(mem_e.subsys_name, "memory"); - EXPECT_GE(mem_e.hierarchy, 1); - // Expect a single root cgroup. - EXPECT_EQ(mem_e.num_cgroups, 1); - // Cgroups are currently always enabled when mounted. - EXPECT_TRUE(mem_e.enabled); - - // Add a second cgroup, and check for new entry. - - Cgroup cpu = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("cpu")); - entries = ASSERT_NO_ERRNO_AND_VALUE(ProcCgroupsEntries()); - EXPECT_EQ(entries.size(), 2); - EXPECT_TRUE(entries.contains("memory")); // Still have memory entry. - ASSERT_TRUE(entries.contains("cpu")); - CgroupsEntry cpu_e = entries["cpu"]; - EXPECT_EQ(cpu_e.subsys_name, "cpu"); - EXPECT_GE(cpu_e.hierarchy, 1); - EXPECT_EQ(cpu_e.num_cgroups, 1); - EXPECT_TRUE(cpu_e.enabled); - - // Separate hierarchies, since controllers were mounted separately. - EXPECT_NE(mem_e.hierarchy, cpu_e.hierarchy); -} - -TEST(ProcCgroups, UnmountRemovesEntries) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup cg = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("cpu,memory")); - absl::flat_hash_map<std::string, CgroupsEntry> entries = - ASSERT_NO_ERRNO_AND_VALUE(ProcCgroupsEntries()); - EXPECT_EQ(entries.size(), 2); - - ASSERT_NO_ERRNO(m.Unmount(cg)); - - entries = ASSERT_NO_ERRNO_AND_VALUE(ProcCgroupsEntries()); - EXPECT_TRUE(entries.empty()); -} - -TEST(ProcPIDCgroup, Empty) { - SKIP_IF(!CgroupsAvailable()); - - absl::flat_hash_map<std::string, PIDCgroupEntry> entries = - ASSERT_NO_ERRNO_AND_VALUE(ProcPIDCgroupEntries(getpid())); - EXPECT_TRUE(entries.empty()); -} - -TEST(ProcPIDCgroup, Entries) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup c = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("memory")); - - absl::flat_hash_map<std::string, PIDCgroupEntry> entries = - ASSERT_NO_ERRNO_AND_VALUE(ProcPIDCgroupEntries(getpid())); - EXPECT_EQ(entries.size(), 1); - PIDCgroupEntry mem_e = entries["memory"]; - EXPECT_GE(mem_e.hierarchy, 1); - EXPECT_EQ(mem_e.controllers, "memory"); - EXPECT_EQ(mem_e.path, "/"); - - Cgroup c1 = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("cpu")); - entries = ASSERT_NO_ERRNO_AND_VALUE(ProcPIDCgroupEntries(getpid())); - EXPECT_EQ(entries.size(), 2); - EXPECT_TRUE(entries.contains("memory")); // Still have memory entry. - PIDCgroupEntry cpu_e = entries["cpu"]; - EXPECT_GE(cpu_e.hierarchy, 1); - EXPECT_EQ(cpu_e.controllers, "cpu"); - EXPECT_EQ(cpu_e.path, "/"); - - // Separate hierarchies, since controllers were mounted separately. - EXPECT_NE(mem_e.hierarchy, cpu_e.hierarchy); -} - -TEST(ProcPIDCgroup, UnmountRemovesEntries) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup all = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("")); - - absl::flat_hash_map<std::string, PIDCgroupEntry> entries = - ASSERT_NO_ERRNO_AND_VALUE(ProcPIDCgroupEntries(getpid())); - EXPECT_GT(entries.size(), 0); - - ASSERT_NO_ERRNO(m.Unmount(all)); - - entries = ASSERT_NO_ERRNO_AND_VALUE(ProcPIDCgroupEntries(getpid())); - EXPECT_TRUE(entries.empty()); -} - -TEST(ProcCgroup, PIDCgroupMatchesCgroups) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup c = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("memory")); - Cgroup c1 = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("cpu")); - - absl::flat_hash_map<std::string, CgroupsEntry> cgroups_entries = - ASSERT_NO_ERRNO_AND_VALUE(ProcCgroupsEntries()); - absl::flat_hash_map<std::string, PIDCgroupEntry> pid_entries = - ASSERT_NO_ERRNO_AND_VALUE(ProcPIDCgroupEntries(getpid())); - - CgroupsEntry cgroup_mem = cgroups_entries["memory"]; - PIDCgroupEntry pid_mem = pid_entries["memory"]; - - EXPECT_EQ(cgroup_mem.hierarchy, pid_mem.hierarchy); - - CgroupsEntry cgroup_cpu = cgroups_entries["cpu"]; - PIDCgroupEntry pid_cpu = pid_entries["cpu"]; - - EXPECT_EQ(cgroup_cpu.hierarchy, pid_cpu.hierarchy); - EXPECT_NE(cgroup_mem.hierarchy, cgroup_cpu.hierarchy); - EXPECT_NE(pid_mem.hierarchy, pid_cpu.hierarchy); -} - -TEST(ProcCgroup, MultiControllerHierarchy) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - Cgroup c = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("memory,cpu")); - - absl::flat_hash_map<std::string, CgroupsEntry> cgroups_entries = - ASSERT_NO_ERRNO_AND_VALUE(ProcCgroupsEntries()); - - CgroupsEntry mem_e = cgroups_entries["memory"]; - CgroupsEntry cpu_e = cgroups_entries["cpu"]; - - // Both controllers should have the same hierarchy ID. - EXPECT_EQ(mem_e.hierarchy, cpu_e.hierarchy); - - absl::flat_hash_map<std::string, PIDCgroupEntry> pid_entries = - ASSERT_NO_ERRNO_AND_VALUE(ProcPIDCgroupEntries(getpid())); - - // Expecting an entry listing both controllers, that matches the previous - // hierarchy ID. Note that the controllers are listed in alphabetical order. - PIDCgroupEntry pid_e = pid_entries["cpu,memory"]; - EXPECT_EQ(pid_e.hierarchy, mem_e.hierarchy); -} - -TEST(ProcCgroup, ProcfsReportsCgroupfsMountOptions) { - SKIP_IF(!CgroupsAvailable()); - - Mounter m(ASSERT_NO_ERRNO_AND_VALUE(TempPath::CreateDir())); - // Hierarchy with multiple controllers. - Cgroup c1 = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("memory,cpu")); - // Hierarchy with a single controller. - Cgroup c2 = ASSERT_NO_ERRNO_AND_VALUE(m.MountCgroupfs("cpuacct")); - - const std::vector<ProcMountsEntry> mounts = - ASSERT_NO_ERRNO_AND_VALUE(ProcSelfMountsEntries()); - - for (auto const& e : mounts) { - if (e.mount_point == c1.Path()) { - auto mopts = ParseMountOptions(e.mount_opts); - EXPECT_THAT(mopts, Contains(Key("memory"))); - EXPECT_THAT(mopts, Contains(Key("cpu"))); - EXPECT_THAT(mopts, Not(Contains(Key("cpuacct")))); - } - - if (e.mount_point == c2.Path()) { - auto mopts = ParseMountOptions(e.mount_opts); - EXPECT_THAT(mopts, Contains(Key("cpuacct"))); - EXPECT_THAT(mopts, Not(Contains(Key("cpu")))); - EXPECT_THAT(mopts, Not(Contains(Key("memory")))); - } - } - - const std::vector<ProcMountInfoEntry> mountinfo = - ASSERT_NO_ERRNO_AND_VALUE(ProcSelfMountInfoEntries()); - - for (auto const& e : mountinfo) { - if (e.mount_point == c1.Path()) { - auto mopts = ParseMountOptions(e.super_opts); - EXPECT_THAT(mopts, Contains(Key("memory"))); - EXPECT_THAT(mopts, Contains(Key("cpu"))); - EXPECT_THAT(mopts, Not(Contains(Key("cpuacct")))); - } - - if (e.mount_point == c2.Path()) { - auto mopts = ParseMountOptions(e.super_opts); - EXPECT_THAT(mopts, Contains(Key("cpuacct"))); - EXPECT_THAT(mopts, Not(Contains(Key("cpu")))); - EXPECT_THAT(mopts, Not(Contains(Key("memory")))); - } - } -} - -} // namespace -} // namespace testing -} // namespace gvisor |