]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/test/test-cgroup-util.c
Merge pull request #14003 from keszybz/user-path-configurable
[thirdparty/systemd.git] / src / test / test-cgroup-util.c
1 /* SPDX-License-Identifier: LGPL-2.1+ */
2
3 #include "alloc-util.h"
4 #include "build.h"
5 #include "cgroup-util.h"
6 #include "dirent-util.h"
7 #include "fd-util.h"
8 #include "format-util.h"
9 #include "parse-util.h"
10 #include "proc-cmdline.h"
11 #include "process-util.h"
12 #include "special.h"
13 #include "stat-util.h"
14 #include "string-util.h"
15 #include "strv.h"
16 #include "tests.h"
17 #include "user-util.h"
18 #include "util.h"
19
20 static void check_p_d_u(const char *path, int code, const char *result) {
21 _cleanup_free_ char *unit = NULL;
22 int r;
23
24 r = cg_path_decode_unit(path, &unit);
25 printf("%s: %s → %s %d expected %s %d\n", __func__, path, unit, r, result, code);
26 assert_se(r == code);
27 assert_se(streq_ptr(unit, result));
28 }
29
30 static void test_path_decode_unit(void) {
31 check_p_d_u("getty@tty2.service", 0, "getty@tty2.service");
32 check_p_d_u("getty@tty2.service/", 0, "getty@tty2.service");
33 check_p_d_u("getty@tty2.service/xxx", 0, "getty@tty2.service");
34 check_p_d_u("getty@.service/", -ENXIO, NULL);
35 check_p_d_u("getty@.service", -ENXIO, NULL);
36 check_p_d_u("getty.service", 0, "getty.service");
37 check_p_d_u("getty", -ENXIO, NULL);
38 check_p_d_u("getty/waldo", -ENXIO, NULL);
39 check_p_d_u("_cpu.service", 0, "cpu.service");
40 }
41
42 static void check_p_g_u(const char *path, int code, const char *result) {
43 _cleanup_free_ char *unit = NULL;
44 int r;
45
46 r = cg_path_get_unit(path, &unit);
47 printf("%s: %s → %s %d expected %s %d\n", __func__, path, unit, r, result, code);
48 assert_se(r == code);
49 assert_se(streq_ptr(unit, result));
50 }
51
52 static void test_path_get_unit(void) {
53 check_p_g_u("/system.slice/foobar.service/sdfdsaf", 0, "foobar.service");
54 check_p_g_u("/system.slice/getty@tty5.service", 0, "getty@tty5.service");
55 check_p_g_u("/system.slice/getty@tty5.service/aaa/bbb", 0, "getty@tty5.service");
56 check_p_g_u("/system.slice/getty@tty5.service/", 0, "getty@tty5.service");
57 check_p_g_u("/system.slice/getty@tty6.service/tty5", 0, "getty@tty6.service");
58 check_p_g_u("sadfdsafsda", -ENXIO, NULL);
59 check_p_g_u("/system.slice/getty####@tty6.service/xxx", -ENXIO, NULL);
60 check_p_g_u("/system.slice/system-waldo.slice/foobar.service/sdfdsaf", 0, "foobar.service");
61 check_p_g_u("/system.slice/system-waldo.slice/_cpu.service/sdfdsaf", 0, "cpu.service");
62 check_p_g_u("/user.slice/user-1000.slice/user@1000.service/server.service", 0, "user@1000.service");
63 check_p_g_u("/user.slice/user-1000.slice/user@.service/server.service", -ENXIO, NULL);
64 }
65
66 static void check_p_g_u_u(const char *path, int code, const char *result) {
67 _cleanup_free_ char *unit = NULL;
68 int r;
69
70 r = cg_path_get_user_unit(path, &unit);
71 printf("%s: %s → %s %d expected %s %d\n", __func__, path, unit, r, result, code);
72 assert_se(r == code);
73 assert_se(streq_ptr(unit, result));
74 }
75
76 static void test_path_get_user_unit(void) {
77 check_p_g_u_u("/user.slice/user-1000.slice/session-2.scope/foobar.service", 0, "foobar.service");
78 check_p_g_u_u("/user.slice/user-1000.slice/session-2.scope/waldo.slice/foobar.service", 0, "foobar.service");
79 check_p_g_u_u("/user.slice/user-1002.slice/session-2.scope/foobar.service/waldo", 0, "foobar.service");
80 check_p_g_u_u("/user.slice/user-1000.slice/session-2.scope/foobar.service/waldo/uuuux", 0, "foobar.service");
81 check_p_g_u_u("/user.slice/user-1000.slice/session-2.scope/waldo/waldo/uuuux", -ENXIO, NULL);
82 check_p_g_u_u("/user.slice/user-1000.slice/session-2.scope/foobar@pie.service/pa/po", 0, "foobar@pie.service");
83 check_p_g_u_u("/session-2.scope/foobar@pie.service/pa/po", 0, "foobar@pie.service");
84 check_p_g_u_u("/xyz.slice/xyz-waldo.slice/session-77.scope/foobar@pie.service/pa/po", 0, "foobar@pie.service");
85 check_p_g_u_u("/meh.service", -ENXIO, NULL);
86 check_p_g_u_u("/session-3.scope/_cpu.service", 0, "cpu.service");
87 check_p_g_u_u("/user.slice/user-1000.slice/user@1000.service/server.service", 0, "server.service");
88 check_p_g_u_u("/user.slice/user-1000.slice/user@1000.service/foobar.slice/foobar@pie.service", 0, "foobar@pie.service");
89 check_p_g_u_u("/user.slice/user-1000.slice/user@.service/server.service", -ENXIO, NULL);
90 }
91
92 static void check_p_g_s(const char *path, int code, const char *result) {
93 _cleanup_free_ char *s = NULL;
94
95 assert_se(cg_path_get_session(path, &s) == code);
96 assert_se(streq_ptr(s, result));
97 }
98
99 static void test_path_get_session(void) {
100 check_p_g_s("/user.slice/user-1000.slice/session-2.scope/foobar.service", 0, "2");
101 check_p_g_s("/session-3.scope", 0, "3");
102 check_p_g_s("/session-.scope", -ENXIO, NULL);
103 check_p_g_s("", -ENXIO, NULL);
104 }
105
106 static void check_p_g_o_u(const char *path, int code, uid_t result) {
107 uid_t uid = 0;
108
109 assert_se(cg_path_get_owner_uid(path, &uid) == code);
110 assert_se(uid == result);
111 }
112
113 static void test_path_get_owner_uid(void) {
114 check_p_g_o_u("/user.slice/user-1000.slice/session-2.scope/foobar.service", 0, 1000);
115 check_p_g_o_u("/user.slice/user-1006.slice", 0, 1006);
116 check_p_g_o_u("", -ENXIO, 0);
117 }
118
119 static void check_p_g_slice(const char *path, int code, const char *result) {
120 _cleanup_free_ char *s = NULL;
121
122 assert_se(cg_path_get_slice(path, &s) == code);
123 assert_se(streq_ptr(s, result));
124 }
125
126 static void test_path_get_slice(void) {
127 check_p_g_slice("/user.slice", 0, "user.slice");
128 check_p_g_slice("/foobar", 0, SPECIAL_ROOT_SLICE);
129 check_p_g_slice("/user.slice/user-waldo.slice", 0, "user-waldo.slice");
130 check_p_g_slice("", 0, SPECIAL_ROOT_SLICE);
131 check_p_g_slice("foobar", 0, SPECIAL_ROOT_SLICE);
132 check_p_g_slice("foobar.slice", 0, "foobar.slice");
133 check_p_g_slice("foo.slice/foo-bar.slice/waldo.service", 0, "foo-bar.slice");
134 }
135
136 static void check_p_g_u_slice(const char *path, int code, const char *result) {
137 _cleanup_free_ char *s = NULL;
138
139 assert_se(cg_path_get_user_slice(path, &s) == code);
140 assert_se(streq_ptr(s, result));
141 }
142
143 static void test_path_get_user_slice(void) {
144 check_p_g_u_slice("/user.slice", -ENXIO, NULL);
145 check_p_g_u_slice("/foobar", -ENXIO, NULL);
146 check_p_g_u_slice("/user.slice/user-waldo.slice", -ENXIO, NULL);
147 check_p_g_u_slice("", -ENXIO, NULL);
148 check_p_g_u_slice("foobar", -ENXIO, NULL);
149 check_p_g_u_slice("foobar.slice", -ENXIO, NULL);
150 check_p_g_u_slice("foo.slice/foo-bar.slice/waldo.service", -ENXIO, NULL);
151
152 check_p_g_u_slice("foo.slice/foo-bar.slice/user@1000.service", 0, SPECIAL_ROOT_SLICE);
153 check_p_g_u_slice("foo.slice/foo-bar.slice/user@1000.service/", 0, SPECIAL_ROOT_SLICE);
154 check_p_g_u_slice("foo.slice/foo-bar.slice/user@1000.service///", 0, SPECIAL_ROOT_SLICE);
155 check_p_g_u_slice("foo.slice/foo-bar.slice/user@1000.service/waldo.service", 0, SPECIAL_ROOT_SLICE);
156 check_p_g_u_slice("foo.slice/foo-bar.slice/user@1000.service/piep.slice/foo.service", 0, "piep.slice");
157 check_p_g_u_slice("/foo.slice//foo-bar.slice/user@1000.service/piep.slice//piep-pap.slice//foo.service", 0, "piep-pap.slice");
158 }
159
160 static void test_get_paths(void) {
161 _cleanup_free_ char *a = NULL;
162
163 assert_se(cg_get_root_path(&a) >= 0);
164 log_info("Root = %s", a);
165 }
166
167 static void test_proc(void) {
168 _cleanup_closedir_ DIR *d = NULL;
169 struct dirent *de;
170 int r;
171
172 d = opendir("/proc");
173 assert_se(d);
174
175 FOREACH_DIRENT(de, d, break) {
176 _cleanup_free_ char *path = NULL, *path_shifted = NULL, *session = NULL, *unit = NULL, *user_unit = NULL, *machine = NULL, *slice = NULL;
177 pid_t pid;
178 uid_t uid = UID_INVALID;
179
180 if (!IN_SET(de->d_type, DT_DIR, DT_UNKNOWN))
181 continue;
182
183 r = parse_pid(de->d_name, &pid);
184 if (r < 0)
185 continue;
186
187 if (is_kernel_thread(pid))
188 continue;
189
190 cg_pid_get_path(SYSTEMD_CGROUP_CONTROLLER, pid, &path);
191 cg_pid_get_path_shifted(pid, NULL, &path_shifted);
192 cg_pid_get_owner_uid(pid, &uid);
193 cg_pid_get_session(pid, &session);
194 cg_pid_get_unit(pid, &unit);
195 cg_pid_get_user_unit(pid, &user_unit);
196 cg_pid_get_machine_name(pid, &machine);
197 cg_pid_get_slice(pid, &slice);
198
199 printf(PID_FMT"\t%s\t%s\t"UID_FMT"\t%s\t%s\t%s\t%s\t%s\n",
200 pid,
201 path,
202 path_shifted,
203 uid,
204 session,
205 unit,
206 user_unit,
207 machine,
208 slice);
209 }
210 }
211
212 static void test_escape_one(const char *s, const char *r) {
213 _cleanup_free_ char *b;
214
215 b = cg_escape(s);
216 assert_se(b);
217 assert_se(streq(b, r));
218
219 assert_se(streq(cg_unescape(b), s));
220 }
221
222 static void test_escape(void) {
223 test_escape_one("foobar", "foobar");
224 test_escape_one(".foobar", "_.foobar");
225 test_escape_one("foobar.service", "foobar.service");
226 test_escape_one("cgroup.service", "_cgroup.service");
227 test_escape_one("tasks", "_tasks");
228 if (access("/sys/fs/cgroup/cpu", F_OK) == 0)
229 test_escape_one("cpu.service", "_cpu.service");
230 test_escape_one("_foobar", "__foobar");
231 test_escape_one("", "_");
232 test_escape_one("_", "__");
233 test_escape_one(".", "_.");
234 }
235
236 static void test_controller_is_valid(void) {
237 assert_se(cg_controller_is_valid("foobar"));
238 assert_se(cg_controller_is_valid("foo_bar"));
239 assert_se(cg_controller_is_valid("name=foo"));
240 assert_se(!cg_controller_is_valid(""));
241 assert_se(!cg_controller_is_valid("name="));
242 assert_se(!cg_controller_is_valid("="));
243 assert_se(!cg_controller_is_valid("cpu,cpuacct"));
244 assert_se(!cg_controller_is_valid("_"));
245 assert_se(!cg_controller_is_valid("_foobar"));
246 assert_se(!cg_controller_is_valid("tatü"));
247 }
248
249 static void test_slice_to_path_one(const char *unit, const char *path, int error) {
250 _cleanup_free_ char *ret = NULL;
251 int r;
252
253 log_info("unit: %s", unit);
254
255 r = cg_slice_to_path(unit, &ret);
256 log_info("actual: %s / %d", strnull(ret), r);
257 log_info("expect: %s / %d", strnull(path), error);
258 assert_se(r == error);
259 assert_se(streq_ptr(ret, path));
260 }
261
262 static void test_slice_to_path(void) {
263 test_slice_to_path_one("foobar.slice", "foobar.slice", 0);
264 test_slice_to_path_one("foobar-waldo.slice", "foobar.slice/foobar-waldo.slice", 0);
265 test_slice_to_path_one("foobar-waldo.service", NULL, -EINVAL);
266 test_slice_to_path_one(SPECIAL_ROOT_SLICE, "", 0);
267 test_slice_to_path_one("--.slice", NULL, -EINVAL);
268 test_slice_to_path_one("-", NULL, -EINVAL);
269 test_slice_to_path_one("-foo-.slice", NULL, -EINVAL);
270 test_slice_to_path_one("-foo.slice", NULL, -EINVAL);
271 test_slice_to_path_one("foo-.slice", NULL, -EINVAL);
272 test_slice_to_path_one("foo--bar.slice", NULL, -EINVAL);
273 test_slice_to_path_one("foo.slice/foo--bar.slice", NULL, -EINVAL);
274 test_slice_to_path_one("a-b.slice", "a.slice/a-b.slice", 0);
275 test_slice_to_path_one("a-b-c-d-e.slice", "a.slice/a-b.slice/a-b-c.slice/a-b-c-d.slice/a-b-c-d-e.slice", 0);
276
277 test_slice_to_path_one("foobar@.slice", NULL, -EINVAL);
278 test_slice_to_path_one("foobar@waldo.slice", NULL, -EINVAL);
279 test_slice_to_path_one("foobar@waldo.service", NULL, -EINVAL);
280 test_slice_to_path_one("-foo@-.slice", NULL, -EINVAL);
281 test_slice_to_path_one("-foo@.slice", NULL, -EINVAL);
282 test_slice_to_path_one("foo@-.slice", NULL, -EINVAL);
283 test_slice_to_path_one("foo@@bar.slice", NULL, -EINVAL);
284 test_slice_to_path_one("foo.slice/foo@@bar.slice", NULL, -EINVAL);
285 }
286
287 static void test_shift_path_one(const char *raw, const char *root, const char *shifted) {
288 const char *s = NULL;
289
290 assert_se(cg_shift_path(raw, root, &s) >= 0);
291 assert_se(streq(s, shifted));
292 }
293
294 static void test_shift_path(void) {
295
296 test_shift_path_one("/foobar/waldo", "/", "/foobar/waldo");
297 test_shift_path_one("/foobar/waldo", "", "/foobar/waldo");
298 test_shift_path_one("/foobar/waldo", "/foobar", "/waldo");
299 test_shift_path_one("/foobar/waldo", "/hogehoge", "/foobar/waldo");
300 }
301
302 static void test_mask_supported(void) {
303
304 CGroupMask m;
305 CGroupController c;
306
307 assert_se(cg_mask_supported(&m) >= 0);
308
309 for (c = 0; c < _CGROUP_CONTROLLER_MAX; c++)
310 printf("'%s' is supported: %s\n", cgroup_controller_to_string(c), yes_no(m & CGROUP_CONTROLLER_TO_MASK(c)));
311 }
312
313 static void test_is_cgroup_fs(void) {
314 struct statfs sfs;
315 assert_se(statfs("/sys/fs/cgroup", &sfs) == 0);
316 if (is_temporary_fs(&sfs))
317 assert_se(statfs("/sys/fs/cgroup/systemd", &sfs) == 0);
318 assert_se(is_cgroup_fs(&sfs));
319 }
320
321 static void test_fd_is_cgroup_fs(void) {
322 int fd;
323
324 fd = open("/sys/fs/cgroup", O_RDONLY|O_DIRECTORY|O_CLOEXEC|O_NOFOLLOW);
325 assert_se(fd >= 0);
326 if (fd_is_temporary_fs(fd)) {
327 fd = safe_close(fd);
328 fd = open("/sys/fs/cgroup/systemd", O_RDONLY|O_DIRECTORY|O_CLOEXEC|O_NOFOLLOW);
329 assert_se(fd >= 0);
330 }
331 assert_se(fd_is_cgroup_fs(fd));
332 fd = safe_close(fd);
333 }
334
335 static void test_cg_tests(void) {
336 int all, hybrid, systemd, r;
337
338 r = cg_unified();
339 if (r == -ENOMEDIUM) {
340 log_notice_errno(r, "Skipping cg hierarchy tests: %m");
341 return;
342 }
343 assert_se(r >= 0);
344
345 all = cg_all_unified();
346 assert_se(IN_SET(all, 0, 1));
347
348 hybrid = cg_hybrid_unified();
349 assert_se(IN_SET(hybrid, 0, 1));
350
351 systemd = cg_unified_controller(SYSTEMD_CGROUP_CONTROLLER);
352 assert_se(IN_SET(systemd, 0, 1));
353
354 if (all) {
355 assert_se(systemd);
356 assert_se(!hybrid);
357
358 } else if (hybrid) {
359 assert_se(systemd);
360 assert_se(!all);
361
362 } else
363 assert_se(!systemd);
364 }
365
366 static void test_cg_get_keyed_attribute(void) {
367 _cleanup_free_ char *val = NULL;
368 char *vals3[3] = {}, *vals3a[3] = {};
369 int i, r;
370
371 r = cg_get_keyed_attribute("cpu", "/init.scope", "no_such_file", STRV_MAKE("no_such_attr"), &val);
372 if (r == -ENOMEDIUM) {
373 log_info_errno(r, "Skipping most of %s, /sys/fs/cgroup not accessible: %m", __func__);
374 return;
375 }
376
377 assert_se(r == -ENOENT);
378 assert_se(val == NULL);
379
380 if (access("/sys/fs/cgroup/init.scope/cpu.stat", R_OK) < 0) {
381 log_info_errno(errno, "Skipping most of %s, /init.scope/cpu.stat not accessible: %m", __func__);
382 return;
383 }
384
385 assert_se(cg_get_keyed_attribute("cpu", "/init.scope", "cpu.stat", STRV_MAKE("no_such_attr"), &val) == -ENXIO);
386 assert_se(val == NULL);
387
388 assert_se(cg_get_keyed_attribute("cpu", "/init.scope", "cpu.stat", STRV_MAKE("usage_usec"), &val) == 0);
389 log_info("cpu /init.scope cpu.stat [usage_usec] → \"%s\"", val);
390
391 assert_se(cg_get_keyed_attribute("cpu", "/init.scope", "cpu.stat", STRV_MAKE("usage_usec", "no_such_attr"), vals3) == -ENXIO);
392
393 assert_se(cg_get_keyed_attribute("cpu", "/init.scope", "cpu.stat", STRV_MAKE("usage_usec", "usage_usec"), vals3) == -ENXIO);
394
395 assert_se(cg_get_keyed_attribute("cpu", "/init.scope", "cpu.stat",
396 STRV_MAKE("usage_usec", "user_usec", "system_usec"), vals3) == 0);
397 log_info("cpu /init.scope cpu.stat [usage_usec user_usec system_usec] → \"%s\", \"%s\", \"%s\"",
398 vals3[0], vals3[1], vals3[2]);
399
400 assert_se(cg_get_keyed_attribute("cpu", "/init.scope", "cpu.stat",
401 STRV_MAKE("system_usec", "user_usec", "usage_usec"), vals3a) == 0);
402 log_info("cpu /init.scope cpu.stat [system_usec user_usec usage_usec] → \"%s\", \"%s\", \"%s\"",
403 vals3a[0], vals3a[1], vals3a[2]);
404
405 for (i = 0; i < 3; i++) {
406 free(vals3[i]);
407 free(vals3a[i]);
408 }
409 }
410
411 int main(void) {
412 test_setup_logging(LOG_DEBUG);
413
414 test_path_decode_unit();
415 test_path_get_unit();
416 test_path_get_user_unit();
417 test_path_get_session();
418 test_path_get_owner_uid();
419 test_path_get_slice();
420 test_path_get_user_slice();
421 TEST_REQ_RUNNING_SYSTEMD(test_get_paths());
422 test_proc();
423 TEST_REQ_RUNNING_SYSTEMD(test_escape());
424 test_controller_is_valid();
425 test_slice_to_path();
426 test_shift_path();
427 TEST_REQ_RUNNING_SYSTEMD(test_mask_supported());
428 TEST_REQ_RUNNING_SYSTEMD(test_is_cgroup_fs());
429 TEST_REQ_RUNNING_SYSTEMD(test_fd_is_cgroup_fs());
430 test_cg_tests();
431 test_cg_get_keyed_attribute();
432
433 return 0;
434 }