Author | Tokens | Token Proportion | Commits | Commit Proportion |
---|---|---|---|---|
Sargun Dhillon | 789 | 34.27% | 2 | 6.06% |
Yosry Ahmed | 328 | 14.25% | 1 | 3.03% |
Yafang Shao | 301 | 13.08% | 5 | 15.15% |
Roman Gushchin | 251 | 10.90% | 1 | 3.03% |
Yonghong Song | 249 | 10.82% | 1 | 3.03% |
Daniel Borkmann | 158 | 6.86% | 1 | 3.03% |
John Fastabend | 65 | 2.82% | 4 | 12.12% |
Ilya Leoshkevich | 49 | 2.13% | 1 | 3.03% |
Hou Tao | 36 | 1.56% | 1 | 3.03% |
Alexei Starovoitov | 15 | 0.65% | 1 | 3.03% |
Kui-Feng Lee | 14 | 0.61% | 1 | 3.03% |
Daan De Meyer | 12 | 0.52% | 1 | 3.03% |
Andrey Ignatov | 11 | 0.48% | 2 | 6.06% |
Sowmini Varadhan | 4 | 0.17% | 1 | 3.03% |
Rong Tao | 4 | 0.17% | 1 | 3.03% |
Prashant Bhole | 4 | 0.17% | 1 | 3.03% |
Stanislav Fomichev | 4 | 0.17% | 1 | 3.03% |
Ivan Khoronzhuk | 3 | 0.13% | 2 | 6.06% |
Dan Carpenter | 1 | 0.04% | 1 | 3.03% |
Greg Kroah-Hartman | 1 | 0.04% | 1 | 3.03% |
Jason Xing | 1 | 0.04% | 1 | 3.03% |
Viktor Malik | 1 | 0.04% | 1 | 3.03% |
Lawrence Brakmo | 1 | 0.04% | 1 | 3.03% |
Total | 2302 | 33 |
// SPDX-License-Identifier: GPL-2.0 #define _GNU_SOURCE #include <sched.h> #include <sys/mount.h> #include <sys/stat.h> #include <sys/types.h> #include <linux/limits.h> #include <stdio.h> #include <stdlib.h> #include <linux/sched.h> #include <fcntl.h> #include <unistd.h> #include <ftw.h> #include "cgroup_helpers.h" #include "bpf_util.h" /* * To avoid relying on the system setup, when setup_cgroup_env is called * we create a new mount namespace, and cgroup namespace. The cgroupv2 * root is mounted at CGROUP_MOUNT_PATH. Unfortunately, most people don't * have cgroupv2 enabled at this point in time. It's easier to create our * own mount namespace and manage it ourselves. We assume /mnt exists. * * Related cgroupv1 helpers are named *classid*(), since we only use the * net_cls controller for tagging net_cls.classid. We assume the default * mount under /sys/fs/cgroup/net_cls, which should be the case for the * vast majority of users. */ #define WALK_FD_LIMIT 16 #define CGROUP_MOUNT_PATH "/mnt" #define CGROUP_MOUNT_DFLT "/sys/fs/cgroup" #define NETCLS_MOUNT_PATH CGROUP_MOUNT_DFLT "/net_cls" #define CGROUP_WORK_DIR "/cgroup-test-work-dir" #define format_cgroup_path_pid(buf, path, pid) \ snprintf(buf, sizeof(buf), "%s%s%d%s", CGROUP_MOUNT_PATH, \ CGROUP_WORK_DIR, pid, path) #define format_cgroup_path(buf, path) \ format_cgroup_path_pid(buf, path, getpid()) #define format_parent_cgroup_path(buf, path) \ format_cgroup_path_pid(buf, path, getppid()) #define format_classid_path_pid(buf, pid) \ snprintf(buf, sizeof(buf), "%s%s%d", NETCLS_MOUNT_PATH, \ CGROUP_WORK_DIR, pid) #define format_classid_path(buf) \ format_classid_path_pid(buf, getpid()) static __thread bool cgroup_workdir_mounted; static void __cleanup_cgroup_environment(void); static int __enable_controllers(const char *cgroup_path, const char *controllers) { char path[PATH_MAX + 1]; char enable[PATH_MAX + 1]; char *c, *c2; int fd, cfd; ssize_t len; /* If not controllers are passed, enable all available controllers */ if (!controllers) { snprintf(path, sizeof(path), "%s/cgroup.controllers", cgroup_path); fd = open(path, O_RDONLY); if (fd < 0) { log_err("Opening cgroup.controllers: %s", path); return 1; } len = read(fd, enable, sizeof(enable) - 1); if (len < 0) { close(fd); log_err("Reading cgroup.controllers: %s", path); return 1; } else if (len == 0) { /* No controllers to enable */ close(fd); return 0; } enable[len] = 0; close(fd); } else { bpf_strlcpy(enable, controllers, sizeof(enable)); } snprintf(path, sizeof(path), "%s/cgroup.subtree_control", cgroup_path); cfd = open(path, O_RDWR); if (cfd < 0) { log_err("Opening cgroup.subtree_control: %s", path); return 1; } for (c = strtok_r(enable, " ", &c2); c; c = strtok_r(NULL, " ", &c2)) { if (dprintf(cfd, "+%s\n", c) <= 0) { log_err("Enabling controller %s: %s", c, path); close(cfd); return 1; } } close(cfd); return 0; } /** * enable_controllers() - Enable cgroup v2 controllers * @relative_path: The cgroup path, relative to the workdir * @controllers: List of controllers to enable in cgroup.controllers format * * * Enable given cgroup v2 controllers, if @controllers is NULL, enable all * available controllers. * * If successful, 0 is returned. */ int enable_controllers(const char *relative_path, const char *controllers) { char cgroup_path[PATH_MAX + 1]; format_cgroup_path(cgroup_path, relative_path); return __enable_controllers(cgroup_path, controllers); } static int __write_cgroup_file(const char *cgroup_path, const char *file, const char *buf) { char file_path[PATH_MAX + 1]; int fd; snprintf(file_path, sizeof(file_path), "%s/%s", cgroup_path, file); fd = open(file_path, O_RDWR); if (fd < 0) { log_err("Opening %s", file_path); return 1; } if (dprintf(fd, "%s", buf) <= 0) { log_err("Writing to %s", file_path); close(fd); return 1; } close(fd); return 0; } /** * write_cgroup_file() - Write to a cgroup file * @relative_path: The cgroup path, relative to the workdir * @file: The name of the file in cgroupfs to write to * @buf: Buffer to write to the file * * Write to a file in the given cgroup's directory. * * If successful, 0 is returned. */ int write_cgroup_file(const char *relative_path, const char *file, const char *buf) { char cgroup_path[PATH_MAX - 24]; format_cgroup_path(cgroup_path, relative_path); return __write_cgroup_file(cgroup_path, file, buf); } /** * write_cgroup_file_parent() - Write to a cgroup file in the parent process * workdir * @relative_path: The cgroup path, relative to the parent process workdir * @file: The name of the file in cgroupfs to write to * @buf: Buffer to write to the file * * Write to a file in the given cgroup's directory under the parent process * workdir. * * If successful, 0 is returned. */ int write_cgroup_file_parent(const char *relative_path, const char *file, const char *buf) { char cgroup_path[PATH_MAX - 24]; format_parent_cgroup_path(cgroup_path, relative_path); return __write_cgroup_file(cgroup_path, file, buf); } /** * setup_cgroup_environment() - Setup the cgroup environment * * After calling this function, cleanup_cgroup_environment should be called * once testing is complete. * * This function will print an error to stderr and return 1 if it is unable * to setup the cgroup environment. If setup is successful, 0 is returned. */ int setup_cgroup_environment(void) { char cgroup_workdir[PATH_MAX - 24]; format_cgroup_path(cgroup_workdir, ""); if (mkdir(CGROUP_MOUNT_PATH, 0777) && errno != EEXIST) { log_err("mkdir mount"); return 1; } if (unshare(CLONE_NEWNS)) { log_err("unshare"); return 1; } if (mount("none", "/", NULL, MS_REC | MS_PRIVATE, NULL)) { log_err("mount fakeroot"); return 1; } if (mount("none", CGROUP_MOUNT_PATH, "cgroup2", 0, NULL) && errno != EBUSY) { log_err("mount cgroup2"); return 1; } cgroup_workdir_mounted = true; /* Cleanup existing failed runs, now that the environment is setup */ __cleanup_cgroup_environment(); if (mkdir(cgroup_workdir, 0777) && errno != EEXIST) { log_err("mkdir cgroup work dir"); return 1; } /* Enable all available controllers to increase test coverage */ if (__enable_controllers(CGROUP_MOUNT_PATH, NULL) || __enable_controllers(cgroup_workdir, NULL)) return 1; return 0; } static int nftwfunc(const char *filename, const struct stat *statptr, int fileflags, struct FTW *pfwt) { if ((fileflags & FTW_D) && rmdir(filename)) log_err("Removing cgroup: %s", filename); return 0; } static int join_cgroup_from_top(const char *cgroup_path) { char cgroup_procs_path[PATH_MAX + 1]; pid_t pid = getpid(); int fd, rc = 0; snprintf(cgroup_procs_path, sizeof(cgroup_procs_path), "%s/cgroup.procs", cgroup_path); fd = open(cgroup_procs_path, O_WRONLY); if (fd < 0) { log_err("Opening Cgroup Procs: %s", cgroup_procs_path); return 1; } if (dprintf(fd, "%d\n", pid) < 0) { log_err("Joining Cgroup"); rc = 1; } close(fd); return rc; } /** * join_cgroup() - Join a cgroup * @relative_path: The cgroup path, relative to the workdir, to join * * This function expects a cgroup to already be created, relative to the cgroup * work dir, and it joins it. For example, passing "/my-cgroup" as the path * would actually put the calling process into the cgroup * "/cgroup-test-work-dir/my-cgroup" * * On success, it returns 0, otherwise on failure it returns 1. */ int join_cgroup(const char *relative_path) { char cgroup_path[PATH_MAX + 1]; format_cgroup_path(cgroup_path, relative_path); return join_cgroup_from_top(cgroup_path); } /** * join_root_cgroup() - Join the root cgroup * * This function joins the root cgroup. * * On success, it returns 0, otherwise on failure it returns 1. */ int join_root_cgroup(void) { return join_cgroup_from_top(CGROUP_MOUNT_PATH); } /** * join_parent_cgroup() - Join a cgroup in the parent process workdir * @relative_path: The cgroup path, relative to parent process workdir, to join * * See join_cgroup(). * * On success, it returns 0, otherwise on failure it returns 1. */ int join_parent_cgroup(const char *relative_path) { char cgroup_path[PATH_MAX + 1]; format_parent_cgroup_path(cgroup_path, relative_path); return join_cgroup_from_top(cgroup_path); } /** * __cleanup_cgroup_environment() - Delete temporary cgroups * * This is a helper for cleanup_cgroup_environment() that is responsible for * deletion of all temporary cgroups that have been created during the test. */ static void __cleanup_cgroup_environment(void) { char cgroup_workdir[PATH_MAX + 1]; format_cgroup_path(cgroup_workdir, ""); join_cgroup_from_top(CGROUP_MOUNT_PATH); nftw(cgroup_workdir, nftwfunc, WALK_FD_LIMIT, FTW_DEPTH | FTW_MOUNT); } /** * cleanup_cgroup_environment() - Cleanup Cgroup Testing Environment * * This is an idempotent function to delete all temporary cgroups that * have been created during the test and unmount the cgroup testing work * directory. * * At call time, it moves the calling process to the root cgroup, and then * runs the deletion process. It is idempotent, and should not fail, unless * a process is lingering. * * On failure, it will print an error to stderr, and try to continue. */ void cleanup_cgroup_environment(void) { __cleanup_cgroup_environment(); if (cgroup_workdir_mounted && umount(CGROUP_MOUNT_PATH)) log_err("umount cgroup2"); cgroup_workdir_mounted = false; } /** * get_root_cgroup() - Get the FD of the root cgroup * * On success, it returns the file descriptor. On failure, it returns -1. * If there is a failure, it prints the error to stderr. */ int get_root_cgroup(void) { int fd; fd = open(CGROUP_MOUNT_PATH, O_RDONLY); if (fd < 0) { log_err("Opening root cgroup"); return -1; } return fd; } /* * remove_cgroup() - Remove a cgroup * @relative_path: The cgroup path, relative to the workdir, to remove * * This function expects a cgroup to already be created, relative to the cgroup * work dir. It also expects the cgroup doesn't have any children or live * processes and it removes the cgroup. * * On failure, it will print an error to stderr. */ void remove_cgroup(const char *relative_path) { char cgroup_path[PATH_MAX + 1]; format_cgroup_path(cgroup_path, relative_path); if (rmdir(cgroup_path)) log_err("rmdiring cgroup %s .. %s", relative_path, cgroup_path); } /** * create_and_get_cgroup() - Create a cgroup, relative to workdir, and get the FD * @relative_path: The cgroup path, relative to the workdir, to join * * This function creates a cgroup under the top level workdir and returns the * file descriptor. It is idempotent. * * On success, it returns the file descriptor. On failure it returns -1. * If there is a failure, it prints the error to stderr. */ int create_and_get_cgroup(const char *relative_path) { char cgroup_path[PATH_MAX + 1]; int fd; format_cgroup_path(cgroup_path, relative_path); if (mkdir(cgroup_path, 0777) && errno != EEXIST) { log_err("mkdiring cgroup %s .. %s", relative_path, cgroup_path); return -1; } fd = open(cgroup_path, O_RDONLY); if (fd < 0) { log_err("Opening Cgroup"); return -1; } return fd; } /** * get_cgroup_id_from_path - Get cgroup id for a particular cgroup path * @cgroup_workdir: The absolute cgroup path * * On success, it returns the cgroup id. On failure it returns 0, * which is an invalid cgroup id. * If there is a failure, it prints the error to stderr. */ static unsigned long long get_cgroup_id_from_path(const char *cgroup_workdir) { int dirfd, err, flags, mount_id, fhsize; union { unsigned long long cgid; unsigned char raw_bytes[8]; } id; struct file_handle *fhp, *fhp2; unsigned long long ret = 0; dirfd = AT_FDCWD; flags = 0; fhsize = sizeof(*fhp); fhp = calloc(1, fhsize); if (!fhp) { log_err("calloc"); return 0; } err = name_to_handle_at(dirfd, cgroup_workdir, fhp, &mount_id, flags); if (err >= 0 || fhp->handle_bytes != 8) { log_err("name_to_handle_at"); goto free_mem; } fhsize = sizeof(struct file_handle) + fhp->handle_bytes; fhp2 = realloc(fhp, fhsize); if (!fhp2) { log_err("realloc"); goto free_mem; } err = name_to_handle_at(dirfd, cgroup_workdir, fhp2, &mount_id, flags); fhp = fhp2; if (err < 0) { log_err("name_to_handle_at"); goto free_mem; } memcpy(id.raw_bytes, fhp->f_handle, 8); ret = id.cgid; free_mem: free(fhp); return ret; } unsigned long long get_cgroup_id(const char *relative_path) { char cgroup_workdir[PATH_MAX + 1]; format_cgroup_path(cgroup_workdir, relative_path); return get_cgroup_id_from_path(cgroup_workdir); } int cgroup_setup_and_join(const char *path) { int cg_fd; if (setup_cgroup_environment()) { fprintf(stderr, "Failed to setup cgroup environment\n"); return -EINVAL; } cg_fd = create_and_get_cgroup(path); if (cg_fd < 0) { fprintf(stderr, "Failed to create test cgroup\n"); cleanup_cgroup_environment(); return cg_fd; } if (join_cgroup(path)) { fprintf(stderr, "Failed to join cgroup\n"); cleanup_cgroup_environment(); return -EINVAL; } return cg_fd; } /** * setup_classid_environment() - Setup the cgroupv1 net_cls environment * * This function should only be called in a custom mount namespace, e.g. * created by running setup_cgroup_environment. * * After calling this function, cleanup_classid_environment should be called * once testing is complete. * * This function will print an error to stderr and return 1 if it is unable * to setup the cgroup environment. If setup is successful, 0 is returned. */ int setup_classid_environment(void) { char cgroup_workdir[PATH_MAX + 1]; format_classid_path(cgroup_workdir); if (mount("tmpfs", CGROUP_MOUNT_DFLT, "tmpfs", 0, NULL) && errno != EBUSY) { log_err("mount cgroup base"); return 1; } if (mkdir(NETCLS_MOUNT_PATH, 0777) && errno != EEXIST) { log_err("mkdir cgroup net_cls"); return 1; } if (mount("net_cls", NETCLS_MOUNT_PATH, "cgroup", 0, "net_cls")) { if (errno != EBUSY) { log_err("mount cgroup net_cls"); return 1; } if (rmdir(NETCLS_MOUNT_PATH)) { log_err("rmdir cgroup net_cls"); return 1; } if (umount(CGROUP_MOUNT_DFLT)) { log_err("umount cgroup base"); return 1; } } cleanup_classid_environment(); if (mkdir(cgroup_workdir, 0777) && errno != EEXIST) { log_err("mkdir cgroup work dir"); return 1; } return 0; } /** * set_classid() - Set a cgroupv1 net_cls classid * * Writes the classid into the cgroup work dir's net_cls.classid * file in order to later on trigger socket tagging. * * We leverage the current pid as the classid, ensuring unique identification. * * On success, it returns 0, otherwise on failure it returns 1. If there * is a failure, it prints the error to stderr. */ int set_classid(void) { char cgroup_workdir[PATH_MAX - 42]; char cgroup_classid_path[PATH_MAX + 1]; int fd, rc = 0; format_classid_path(cgroup_workdir); snprintf(cgroup_classid_path, sizeof(cgroup_classid_path), "%s/net_cls.classid", cgroup_workdir); fd = open(cgroup_classid_path, O_WRONLY); if (fd < 0) { log_err("Opening cgroup classid: %s", cgroup_classid_path); return 1; } if (dprintf(fd, "%u\n", getpid()) < 0) { log_err("Setting cgroup classid"); rc = 1; } close(fd); return rc; } /** * join_classid() - Join a cgroupv1 net_cls classid * * This function expects the cgroup work dir to be already created, as we * join it here. This causes the process sockets to be tagged with the given * net_cls classid. * * On success, it returns 0, otherwise on failure it returns 1. */ int join_classid(void) { char cgroup_workdir[PATH_MAX + 1]; format_classid_path(cgroup_workdir); return join_cgroup_from_top(cgroup_workdir); } /** * cleanup_classid_environment() - Cleanup the cgroupv1 net_cls environment * * At call time, it moves the calling process to the root cgroup, and then * runs the deletion process. * * On failure, it will print an error to stderr, and try to continue. */ void cleanup_classid_environment(void) { char cgroup_workdir[PATH_MAX + 1]; format_classid_path(cgroup_workdir); join_cgroup_from_top(NETCLS_MOUNT_PATH); nftw(cgroup_workdir, nftwfunc, WALK_FD_LIMIT, FTW_DEPTH | FTW_MOUNT); } /** * get_classid_cgroup_id - Get the cgroup id of a net_cls cgroup */ unsigned long long get_classid_cgroup_id(void) { char cgroup_workdir[PATH_MAX + 1]; format_classid_path(cgroup_workdir); return get_cgroup_id_from_path(cgroup_workdir); } /** * get_cgroup1_hierarchy_id - Retrieves the ID of a cgroup1 hierarchy from the cgroup1 subsys name. * @subsys_name: The cgroup1 subsys name, which can be retrieved from /proc/self/cgroup. It can be * a named cgroup like "name=systemd", a controller name like "net_cls", or multi-contollers like * "net_cls,net_prio". */ int get_cgroup1_hierarchy_id(const char *subsys_name) { char *c, *c2, *c3, *c4; bool found = false; char line[1024]; FILE *file; int i, id; if (!subsys_name) return -1; file = fopen("/proc/self/cgroup", "r"); if (!file) { log_err("fopen /proc/self/cgroup"); return -1; } while (fgets(line, 1024, file)) { i = 0; for (c = strtok_r(line, ":", &c2); c && i < 2; c = strtok_r(NULL, ":", &c2)) { if (i == 0) { id = strtol(c, NULL, 10); } else if (i == 1) { if (!strcmp(c, subsys_name)) { found = true; break; } /* Multiple subsystems may share one single mount point */ for (c3 = strtok_r(c, ",", &c4); c3; c3 = strtok_r(NULL, ",", &c4)) { if (!strcmp(c, subsys_name)) { found = true; break; } } } i++; } if (found) break; } fclose(file); return found ? id : -1; } /** * open_classid() - Open a cgroupv1 net_cls classid * * This function expects the cgroup work dir to be already created, as we * open it here. * * On success, it returns the file descriptor. On failure it returns -1. */ int open_classid(void) { char cgroup_workdir[PATH_MAX + 1]; format_classid_path(cgroup_workdir); return open(cgroup_workdir, O_RDONLY); }
Information contained on this website is for historical information purposes only and does not indicate or represent copyright ownership.
Created with Cregit http://github.com/cregit/cregit
Version 2.0-RC1