// Copyright 2021 The gVisor Authors. // // Licensed under the Apache License, Version 2.0 (the "License"); // you may not use this file except in compliance with the License. // You may obtain a copy of the License at // // http://www.apache.org/licenses/LICENSE-2.0 // // Unless required by applicable law or agreed to in writing, software // distributed under the License is distributed on an "AS IS" BASIS, // WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. // See the License for the specific language governing permissions and // limitations under the License. #include "test/util/cgroup_util.h" #include #include #include "absl/strings/str_cat.h" #include "absl/strings/str_split.h" #include "test/util/fs_util.h" #include "test/util/mount_util.h" namespace gvisor { namespace testing { Cgroup::Cgroup(absl::string_view path) : cgroup_path_(path) { id_ = ++Cgroup::next_id_; std::cerr << absl::StreamFormat("[cg#%d] <= %s", id_, cgroup_path_) << std::endl; } PosixErrorOr Cgroup::RecursivelyCreate(absl::string_view path) { RETURN_IF_ERRNO(RecursivelyCreateDir(path)); return Cgroup(path); } PosixErrorOr Cgroup::Create(absl::string_view path) { RETURN_IF_ERRNO(Mkdir(path)); return Cgroup(path); } PosixErrorOr Cgroup::CreateChild(absl::string_view name) const { return Cgroup::Create(JoinPath(Path(), name)); } PosixErrorOr Cgroup::ReadControlFile( absl::string_view name) const { std::string buf; RETURN_IF_ERRNO(GetContents(Relpath(name), &buf)); const std::string alias_path = absl::StrFormat("[cg#%d]/%s", id_, name); std::cerr << absl::StreamFormat("", alias_path) << std::endl; std::cerr << buf; std::cerr << absl::StreamFormat("", alias_path) << std::endl; return buf; } PosixErrorOr Cgroup::ReadIntegerControlFile( absl::string_view name) const { ASSIGN_OR_RETURN_ERRNO(const std::string buf, ReadControlFile(name)); ASSIGN_OR_RETURN_ERRNO(const int64_t val, Atoi(buf)); return val; } PosixError Cgroup::WriteControlFile(absl::string_view name, const std::string& value) const { ASSIGN_OR_RETURN_ERRNO(FileDescriptor fd, Open(Relpath(name), O_WRONLY)); RETURN_ERROR_IF_SYSCALL_FAIL(WriteFd(fd.get(), value.c_str(), value.size())); return NoError(); } PosixError Cgroup::WriteIntegerControlFile(absl::string_view name, int64_t value) const { return WriteControlFile(name, absl::StrCat(value)); } PosixErrorOr> Cgroup::Procs() const { ASSIGN_OR_RETURN_ERRNO(std::string buf, ReadControlFile("cgroup.procs")); return ParsePIDList(buf); } PosixErrorOr> Cgroup::Tasks() const { ASSIGN_OR_RETURN_ERRNO(std::string buf, ReadControlFile("tasks")); return ParsePIDList(buf); } PosixError Cgroup::ContainsCallingProcess() const { ASSIGN_OR_RETURN_ERRNO(const absl::flat_hash_set procs, Procs()); ASSIGN_OR_RETURN_ERRNO(const absl::flat_hash_set tasks, Tasks()); const pid_t pid = getpid(); const pid_t tid = syscall(SYS_gettid); if (!procs.contains(pid)) { return PosixError( ENOENT, absl::StrFormat("Cgroup doesn't contain process %d", pid)); } if (!tasks.contains(tid)) { return PosixError(ENOENT, absl::StrFormat("Cgroup doesn't contain task %d", tid)); } return NoError(); } PosixErrorOr> Cgroup::ParsePIDList( absl::string_view data) const { absl::flat_hash_set res; std::vector lines = absl::StrSplit(data, '\n'); for (const absl::string_view& line : lines) { if (line.empty()) { continue; } ASSIGN_OR_RETURN_ERRNO(const int32_t pid, Atoi(line)); res.insert(static_cast(pid)); } return res; } int64_t Cgroup::next_id_ = 0; PosixErrorOr Mounter::MountCgroupfs(std::string mopts) { ASSIGN_OR_RETURN_ERRNO(TempPath mountpoint, TempPath::CreateDirIn(root_.path())); ASSIGN_OR_RETURN_ERRNO( Cleanup mount, Mount("none", mountpoint.path(), "cgroup", 0, mopts, 0)); const std::string mountpath = mountpoint.path(); std::cerr << absl::StreamFormat( "Mount(\"none\", \"%s\", \"cgroup\", 0, \"%s\", 0) => OK", mountpath, mopts) << std::endl; Cgroup cg = Cgroup(mountpath); mountpoints_[cg.id()] = std::move(mountpoint); mounts_[cg.id()] = std::move(mount); return cg; } PosixError Mounter::Unmount(const Cgroup& c) { auto mount = mounts_.find(c.id()); auto mountpoint = mountpoints_.find(c.id()); if (mount == mounts_.end() || mountpoint == mountpoints_.end()) { return PosixError( ESRCH, absl::StrFormat("No mount found for cgroupfs containing cg#%d", c.id())); } std::cerr << absl::StreamFormat("Unmount([cg#%d])", c.id()) << std::endl; // Simply delete the entries, their destructors will unmount and delete the // mountpoint. Note the order is important to avoid errors: mount then // mountpoint. mounts_.erase(mount); mountpoints_.erase(mountpoint); return NoError(); } void Mounter::release(const Cgroup& c) { auto mp = mountpoints_.find(c.id()); if (mp != mountpoints_.end()) { mp->second.release(); mountpoints_.erase(mp); } auto m = mounts_.find(c.id()); if (m != mounts_.end()) { m->second.Release(); mounts_.erase(m); } } constexpr char kProcCgroupsHeader[] = "#subsys_name\thierarchy\tnum_cgroups\tenabled"; PosixErrorOr> ProcCgroupsEntries() { std::string content; RETURN_IF_ERRNO(GetContents("/proc/cgroups", &content)); bool found_header = false; absl::flat_hash_map entries; std::vector lines = absl::StrSplit(content, '\n'); std::cerr << "" << std::endl; for (const std::string& line : lines) { std::cerr << line << std::endl; if (!found_header) { EXPECT_EQ(line, kProcCgroupsHeader); found_header = true; continue; } if (line.empty()) { continue; } // Parse a single entry from /proc/cgroups. // // Example entries, fields are tab separated in the real file: // // #subsys_name hierarchy num_cgroups enabled // cpuset 12 35 1 // cpu 3 222 1 // ^ ^ ^ ^ // 0 1 2 3 CgroupsEntry entry; std::vector fields = StrSplit(line, absl::ByAnyChar(": \t"), absl::SkipEmpty()); entry.subsys_name = fields[0]; ASSIGN_OR_RETURN_ERRNO(entry.hierarchy, Atoi(fields[1])); ASSIGN_OR_RETURN_ERRNO(entry.num_cgroups, Atoi(fields[2])); ASSIGN_OR_RETURN_ERRNO(const int enabled, Atoi(fields[3])); entry.enabled = enabled != 0; entries[entry.subsys_name] = entry; } std::cerr << "" << std::endl; return entries; } PosixErrorOr> ProcPIDCgroupEntries(pid_t pid) { const std::string path = absl::StrFormat("/proc/%d/cgroup", pid); std::string content; RETURN_IF_ERRNO(GetContents(path, &content)); absl::flat_hash_map entries; std::vector lines = absl::StrSplit(content, '\n'); std::cerr << absl::StreamFormat("", path) << std::endl; for (const std::string& line : lines) { std::cerr << line << std::endl; if (line.empty()) { continue; } // Parse a single entry from /proc//cgroup. // // Example entries: // // 2:cpu:/path/to/cgroup // 1:memory:/ PIDCgroupEntry entry; std::vector fields = absl::StrSplit(line, absl::ByChar(':'), absl::SkipEmpty()); ASSIGN_OR_RETURN_ERRNO(entry.hierarchy, Atoi(fields[0])); entry.controllers = fields[1]; entry.path = fields[2]; entries[entry.controllers] = entry; } std::cerr << absl::StreamFormat("", path) << std::endl; return entries; } } // namespace testing } // namespace gvisor