xref: /linux/tools/testing/selftests/bpf/cgroup_helpers.c (revision 07fdad3a93756b872da7b53647715c48d0f4a2d0)
1 // SPDX-License-Identifier: GPL-2.0
2 #define _GNU_SOURCE
3 #include <sched.h>
4 #include <sys/mount.h>
5 #include <sys/stat.h>
6 #include <sys/types.h>
7 #include <sys/xattr.h>
8 #include <linux/limits.h>
9 #include <stdio.h>
10 #include <stdlib.h>
11 #include <linux/sched.h>
12 #include <fcntl.h>
13 #include <unistd.h>
14 #include <ftw.h>
15 
16 #include "cgroup_helpers.h"
17 #include "bpf_util.h"
18 
19 /*
20  * To avoid relying on the system setup, when setup_cgroup_env is called
21  * we create a new mount namespace, and cgroup namespace. The cgroupv2
22  * root is mounted at CGROUP_MOUNT_PATH. Unfortunately, most people don't
23  * have cgroupv2 enabled at this point in time. It's easier to create our
24  * own mount namespace and manage it ourselves. We assume /mnt exists.
25  *
26  * Related cgroupv1 helpers are named *classid*(), since we only use the
27  * net_cls controller for tagging net_cls.classid. We assume the default
28  * mount under /sys/fs/cgroup/net_cls, which should be the case for the
29  * vast majority of users.
30  */
31 
32 #define WALK_FD_LIMIT			16
33 
34 #define CGROUP_MOUNT_PATH		"/mnt"
35 #define CGROUP_MOUNT_DFLT		"/sys/fs/cgroup"
36 #define NETCLS_MOUNT_PATH		CGROUP_MOUNT_DFLT "/net_cls"
37 #define CGROUP_WORK_DIR			"/cgroup-test-work-dir"
38 
39 #define format_cgroup_path_pid(buf, path, pid) \
40 	snprintf(buf, sizeof(buf), "%s%s%d%s", CGROUP_MOUNT_PATH, \
41 	CGROUP_WORK_DIR, pid, path)
42 
43 #define format_cgroup_path(buf, path) \
44 	format_cgroup_path_pid(buf, path, getpid())
45 
46 #define format_parent_cgroup_path(buf, path) \
47 	format_cgroup_path_pid(buf, path, getppid())
48 
49 #define format_classid_path_pid(buf, pid)				\
50 	snprintf(buf, sizeof(buf), "%s%s%d", NETCLS_MOUNT_PATH,	\
51 		 CGROUP_WORK_DIR, pid)
52 
53 #define format_classid_path(buf)	\
54 	format_classid_path_pid(buf, getpid())
55 
56 static __thread bool cgroup_workdir_mounted;
57 
58 static void __cleanup_cgroup_environment(void);
59 
60 static int __enable_controllers(const char *cgroup_path, const char *controllers)
61 {
62 	char path[PATH_MAX + 1];
63 	char enable[PATH_MAX + 1];
64 	char *c, *c2;
65 	int fd, cfd;
66 	ssize_t len;
67 
68 	/* If not controllers are passed, enable all available controllers */
69 	if (!controllers) {
70 		snprintf(path, sizeof(path), "%s/cgroup.controllers",
71 			 cgroup_path);
72 		fd = open(path, O_RDONLY);
73 		if (fd < 0) {
74 			log_err("Opening cgroup.controllers: %s", path);
75 			return 1;
76 		}
77 		len = read(fd, enable, sizeof(enable) - 1);
78 		if (len < 0) {
79 			close(fd);
80 			log_err("Reading cgroup.controllers: %s", path);
81 			return 1;
82 		} else if (len == 0) { /* No controllers to enable */
83 			close(fd);
84 			return 0;
85 		}
86 		enable[len] = 0;
87 		close(fd);
88 	} else {
89 		bpf_strlcpy(enable, controllers, sizeof(enable));
90 	}
91 
92 	snprintf(path, sizeof(path), "%s/cgroup.subtree_control", cgroup_path);
93 	cfd = open(path, O_RDWR);
94 	if (cfd < 0) {
95 		log_err("Opening cgroup.subtree_control: %s", path);
96 		return 1;
97 	}
98 
99 	for (c = strtok_r(enable, " ", &c2); c; c = strtok_r(NULL, " ", &c2)) {
100 		if (dprintf(cfd, "+%s\n", c) <= 0) {
101 			log_err("Enabling controller %s: %s", c, path);
102 			close(cfd);
103 			return 1;
104 		}
105 	}
106 	close(cfd);
107 	return 0;
108 }
109 
110 /**
111  * enable_controllers() - Enable cgroup v2 controllers
112  * @relative_path: The cgroup path, relative to the workdir
113  * @controllers: List of controllers to enable in cgroup.controllers format
114  *
115  *
116  * Enable given cgroup v2 controllers, if @controllers is NULL, enable all
117  * available controllers.
118  *
119  * If successful, 0 is returned.
120  */
121 int enable_controllers(const char *relative_path, const char *controllers)
122 {
123 	char cgroup_path[PATH_MAX + 1];
124 
125 	format_cgroup_path(cgroup_path, relative_path);
126 	return __enable_controllers(cgroup_path, controllers);
127 }
128 
129 static int __write_cgroup_file(const char *cgroup_path, const char *file,
130 			       const char *buf)
131 {
132 	char file_path[PATH_MAX + 1];
133 	int fd;
134 
135 	snprintf(file_path, sizeof(file_path), "%s/%s", cgroup_path, file);
136 	fd = open(file_path, O_RDWR);
137 	if (fd < 0) {
138 		log_err("Opening %s", file_path);
139 		return 1;
140 	}
141 
142 	if (dprintf(fd, "%s", buf) <= 0) {
143 		log_err("Writing to %s", file_path);
144 		close(fd);
145 		return 1;
146 	}
147 	close(fd);
148 	return 0;
149 }
150 
151 /**
152  * write_cgroup_file() - Write to a cgroup file
153  * @relative_path: The cgroup path, relative to the workdir
154  * @file: The name of the file in cgroupfs to write to
155  * @buf: Buffer to write to the file
156  *
157  * Write to a file in the given cgroup's directory.
158  *
159  * If successful, 0 is returned.
160  */
161 int write_cgroup_file(const char *relative_path, const char *file,
162 		      const char *buf)
163 {
164 	char cgroup_path[PATH_MAX - 24];
165 
166 	format_cgroup_path(cgroup_path, relative_path);
167 	return __write_cgroup_file(cgroup_path, file, buf);
168 }
169 
170 /**
171  * write_cgroup_file_parent() - Write to a cgroup file in the parent process
172  *                              workdir
173  * @relative_path: The cgroup path, relative to the parent process workdir
174  * @file: The name of the file in cgroupfs to write to
175  * @buf: Buffer to write to the file
176  *
177  * Write to a file in the given cgroup's directory under the parent process
178  * workdir.
179  *
180  * If successful, 0 is returned.
181  */
182 int write_cgroup_file_parent(const char *relative_path, const char *file,
183 			     const char *buf)
184 {
185 	char cgroup_path[PATH_MAX - 24];
186 
187 	format_parent_cgroup_path(cgroup_path, relative_path);
188 	return __write_cgroup_file(cgroup_path, file, buf);
189 }
190 
191 /**
192  * setup_cgroup_environment() - Setup the cgroup environment
193  *
194  * After calling this function, cleanup_cgroup_environment should be called
195  * once testing is complete.
196  *
197  * This function will print an error to stderr and return 1 if it is unable
198  * to setup the cgroup environment. If setup is successful, 0 is returned.
199  */
200 int setup_cgroup_environment(void)
201 {
202 	char cgroup_workdir[PATH_MAX - 24];
203 
204 	format_cgroup_path(cgroup_workdir, "");
205 
206 	if (mkdir(CGROUP_MOUNT_PATH, 0777) && errno != EEXIST) {
207 		log_err("mkdir mount");
208 		return 1;
209 	}
210 
211 	if (unshare(CLONE_NEWNS)) {
212 		log_err("unshare");
213 		return 1;
214 	}
215 
216 	if (mount("none", "/", NULL, MS_REC | MS_PRIVATE, NULL)) {
217 		log_err("mount fakeroot");
218 		return 1;
219 	}
220 
221 	if (mount("none", CGROUP_MOUNT_PATH, "cgroup2", 0, NULL) && errno != EBUSY) {
222 		log_err("mount cgroup2");
223 		return 1;
224 	}
225 	cgroup_workdir_mounted = true;
226 
227 	/* Cleanup existing failed runs, now that the environment is setup */
228 	__cleanup_cgroup_environment();
229 
230 	if (mkdir(cgroup_workdir, 0777) && errno != EEXIST) {
231 		log_err("mkdir cgroup work dir");
232 		return 1;
233 	}
234 
235 	/* Enable all available controllers to increase test coverage */
236 	if (__enable_controllers(CGROUP_MOUNT_PATH, NULL) ||
237 	    __enable_controllers(cgroup_workdir, NULL))
238 		return 1;
239 
240 	return 0;
241 }
242 
243 static int nftwfunc(const char *filename, const struct stat *statptr,
244 		    int fileflags, struct FTW *pfwt)
245 {
246 	if ((fileflags & FTW_D) && rmdir(filename))
247 		log_err("Removing cgroup: %s", filename);
248 	return 0;
249 }
250 
251 static int join_cgroup_from_top(const char *cgroup_path)
252 {
253 	char cgroup_procs_path[PATH_MAX + 1];
254 	pid_t pid = getpid();
255 	int fd, rc = 0;
256 
257 	snprintf(cgroup_procs_path, sizeof(cgroup_procs_path),
258 		 "%s/cgroup.procs", cgroup_path);
259 
260 	fd = open(cgroup_procs_path, O_WRONLY);
261 	if (fd < 0) {
262 		log_err("Opening Cgroup Procs: %s", cgroup_procs_path);
263 		return 1;
264 	}
265 
266 	if (dprintf(fd, "%d\n", pid) < 0) {
267 		log_err("Joining Cgroup");
268 		rc = 1;
269 	}
270 
271 	close(fd);
272 	return rc;
273 }
274 
275 /**
276  * join_cgroup() - Join a cgroup
277  * @relative_path: The cgroup path, relative to the workdir, to join
278  *
279  * This function expects a cgroup to already be created, relative to the cgroup
280  * work dir, and it joins it. For example, passing "/my-cgroup" as the path
281  * would actually put the calling process into the cgroup
282  * "/cgroup-test-work-dir/my-cgroup"
283  *
284  * On success, it returns 0, otherwise on failure it returns 1.
285  */
286 int join_cgroup(const char *relative_path)
287 {
288 	char cgroup_path[PATH_MAX + 1];
289 
290 	format_cgroup_path(cgroup_path, relative_path);
291 	return join_cgroup_from_top(cgroup_path);
292 }
293 
294 /**
295  * join_root_cgroup() - Join the root cgroup
296  *
297  * This function joins the root cgroup.
298  *
299  * On success, it returns 0, otherwise on failure it returns 1.
300  */
301 int join_root_cgroup(void)
302 {
303 	return join_cgroup_from_top(CGROUP_MOUNT_PATH);
304 }
305 
306 /**
307  * join_parent_cgroup() - Join a cgroup in the parent process workdir
308  * @relative_path: The cgroup path, relative to parent process workdir, to join
309  *
310  * See join_cgroup().
311  *
312  * On success, it returns 0, otherwise on failure it returns 1.
313  */
314 int join_parent_cgroup(const char *relative_path)
315 {
316 	char cgroup_path[PATH_MAX + 1];
317 
318 	format_parent_cgroup_path(cgroup_path, relative_path);
319 	return join_cgroup_from_top(cgroup_path);
320 }
321 
322 /**
323  * set_cgroup_xattr() - Set xattr on a cgroup dir
324  * @relative_path: The cgroup path, relative to the workdir, to set xattr
325  * @name: xattr name
326  * @value: xattr value
327  *
328  * This function set xattr on cgroup dir.
329  *
330  * On success, it returns 0, otherwise on failure it returns -1.
331  */
332 int set_cgroup_xattr(const char *relative_path,
333 		     const char *name,
334 		     const char *value)
335 {
336 	char cgroup_path[PATH_MAX + 1];
337 
338 	format_cgroup_path(cgroup_path, relative_path);
339 	return setxattr(cgroup_path, name, value, strlen(value) + 1, 0);
340 }
341 
342 /**
343  * __cleanup_cgroup_environment() - Delete temporary cgroups
344  *
345  * This is a helper for cleanup_cgroup_environment() that is responsible for
346  * deletion of all temporary cgroups that have been created during the test.
347  */
348 static void __cleanup_cgroup_environment(void)
349 {
350 	char cgroup_workdir[PATH_MAX + 1];
351 
352 	format_cgroup_path(cgroup_workdir, "");
353 	join_cgroup_from_top(CGROUP_MOUNT_PATH);
354 	nftw(cgroup_workdir, nftwfunc, WALK_FD_LIMIT, FTW_DEPTH | FTW_MOUNT);
355 }
356 
357 /**
358  * cleanup_cgroup_environment() - Cleanup Cgroup Testing Environment
359  *
360  * This is an idempotent function to delete all temporary cgroups that
361  * have been created during the test and unmount the cgroup testing work
362  * directory.
363  *
364  * At call time, it moves the calling process to the root cgroup, and then
365  * runs the deletion process. It is idempotent, and should not fail, unless
366  * a process is lingering.
367  *
368  * On failure, it will print an error to stderr, and try to continue.
369  */
370 void cleanup_cgroup_environment(void)
371 {
372 	__cleanup_cgroup_environment();
373 	if (cgroup_workdir_mounted && umount(CGROUP_MOUNT_PATH))
374 		log_err("umount cgroup2");
375 	cgroup_workdir_mounted = false;
376 }
377 
378 /**
379  * get_root_cgroup() - Get the FD of the root cgroup
380  *
381  * On success, it returns the file descriptor. On failure, it returns -1.
382  * If there is a failure, it prints the error to stderr.
383  */
384 int get_root_cgroup(void)
385 {
386 	int fd;
387 
388 	fd = open(CGROUP_MOUNT_PATH, O_RDONLY);
389 	if (fd < 0) {
390 		log_err("Opening root cgroup");
391 		return -1;
392 	}
393 	return fd;
394 }
395 
396 /*
397  * remove_cgroup() - Remove a cgroup
398  * @relative_path: The cgroup path, relative to the workdir, to remove
399  *
400  * This function expects a cgroup to already be created, relative to the cgroup
401  * work dir. It also expects the cgroup doesn't have any children or live
402  * processes and it removes the cgroup.
403  *
404  * On failure, it will print an error to stderr.
405  */
406 void remove_cgroup(const char *relative_path)
407 {
408 	char cgroup_path[PATH_MAX + 1];
409 
410 	format_cgroup_path(cgroup_path, relative_path);
411 	if (rmdir(cgroup_path))
412 		log_err("rmdiring cgroup %s .. %s", relative_path, cgroup_path);
413 }
414 
415 /*
416  * remove_cgroup_pid() - Remove a cgroup setup by process identified by PID
417  * @relative_path: The cgroup path, relative to the workdir, to remove
418  * @pid: PID to be used to find cgroup_path
419  *
420  * This function expects a cgroup to already be created, relative to the cgroup
421  * work dir. It also expects the cgroup doesn't have any children or live
422  * processes and it removes the cgroup.
423  *
424  * On failure, it will print an error to stderr.
425  */
426 void remove_cgroup_pid(const char *relative_path, int pid)
427 {
428 	char cgroup_path[PATH_MAX + 1];
429 
430 	format_cgroup_path_pid(cgroup_path, relative_path, pid);
431 	if (rmdir(cgroup_path))
432 		log_err("rmdiring cgroup %s .. %s", relative_path, cgroup_path);
433 }
434 
435 /**
436  * create_and_get_cgroup() - Create a cgroup, relative to workdir, and get the FD
437  * @relative_path: The cgroup path, relative to the workdir, to join
438  *
439  * This function creates a cgroup under the top level workdir and returns the
440  * file descriptor. It is idempotent.
441  *
442  * On success, it returns the file descriptor. On failure it returns -1.
443  * If there is a failure, it prints the error to stderr.
444  */
445 int create_and_get_cgroup(const char *relative_path)
446 {
447 	char cgroup_path[PATH_MAX + 1];
448 	int fd;
449 
450 	format_cgroup_path(cgroup_path, relative_path);
451 	if (mkdir(cgroup_path, 0777) && errno != EEXIST) {
452 		log_err("mkdiring cgroup %s .. %s", relative_path, cgroup_path);
453 		return -1;
454 	}
455 
456 	fd = open(cgroup_path, O_RDONLY);
457 	if (fd < 0) {
458 		log_err("Opening Cgroup");
459 		return -1;
460 	}
461 
462 	return fd;
463 }
464 
465 /**
466  * get_cgroup_id_from_path - Get cgroup id for a particular cgroup path
467  * @cgroup_workdir: The absolute cgroup path
468  *
469  * On success, it returns the cgroup id. On failure it returns 0,
470  * which is an invalid cgroup id.
471  * If there is a failure, it prints the error to stderr.
472  */
473 static unsigned long long get_cgroup_id_from_path(const char *cgroup_workdir)
474 {
475 	int dirfd, err, flags, mount_id, fhsize;
476 	union {
477 		unsigned long long cgid;
478 		unsigned char raw_bytes[8];
479 	} id;
480 	struct file_handle *fhp, *fhp2;
481 	unsigned long long ret = 0;
482 
483 	dirfd = AT_FDCWD;
484 	flags = 0;
485 	fhsize = sizeof(*fhp);
486 	fhp = calloc(1, fhsize);
487 	if (!fhp) {
488 		log_err("calloc");
489 		return 0;
490 	}
491 	err = name_to_handle_at(dirfd, cgroup_workdir, fhp, &mount_id, flags);
492 	if (err >= 0 || fhp->handle_bytes != 8) {
493 		log_err("name_to_handle_at");
494 		goto free_mem;
495 	}
496 
497 	fhsize = sizeof(struct file_handle) + fhp->handle_bytes;
498 	fhp2 = realloc(fhp, fhsize);
499 	if (!fhp2) {
500 		log_err("realloc");
501 		goto free_mem;
502 	}
503 	err = name_to_handle_at(dirfd, cgroup_workdir, fhp2, &mount_id, flags);
504 	fhp = fhp2;
505 	if (err < 0) {
506 		log_err("name_to_handle_at");
507 		goto free_mem;
508 	}
509 
510 	memcpy(id.raw_bytes, fhp->f_handle, 8);
511 	ret = id.cgid;
512 
513 free_mem:
514 	free(fhp);
515 	return ret;
516 }
517 
518 unsigned long long get_cgroup_id(const char *relative_path)
519 {
520 	char cgroup_workdir[PATH_MAX + 1];
521 
522 	format_cgroup_path(cgroup_workdir, relative_path);
523 	return get_cgroup_id_from_path(cgroup_workdir);
524 }
525 
526 int cgroup_setup_and_join(const char *path) {
527 	int cg_fd;
528 
529 	if (setup_cgroup_environment()) {
530 		fprintf(stderr, "Failed to setup cgroup environment\n");
531 		return -EINVAL;
532 	}
533 
534 	cg_fd = create_and_get_cgroup(path);
535 	if (cg_fd < 0) {
536 		fprintf(stderr, "Failed to create test cgroup\n");
537 		cleanup_cgroup_environment();
538 		return cg_fd;
539 	}
540 
541 	if (join_cgroup(path)) {
542 		fprintf(stderr, "Failed to join cgroup\n");
543 		cleanup_cgroup_environment();
544 		return -EINVAL;
545 	}
546 	return cg_fd;
547 }
548 
549 /**
550  * setup_classid_environment() - Setup the cgroupv1 net_cls environment
551  *
552  * This function should only be called in a custom mount namespace, e.g.
553  * created by running setup_cgroup_environment.
554  *
555  * After calling this function, cleanup_classid_environment should be called
556  * once testing is complete.
557  *
558  * This function will print an error to stderr and return 1 if it is unable
559  * to setup the cgroup environment. If setup is successful, 0 is returned.
560  */
561 int setup_classid_environment(void)
562 {
563 	char cgroup_workdir[PATH_MAX + 1];
564 
565 	format_classid_path(cgroup_workdir);
566 
567 	if (mount("tmpfs", CGROUP_MOUNT_DFLT, "tmpfs", 0, NULL) &&
568 	    errno != EBUSY) {
569 		log_err("mount cgroup base");
570 		return 1;
571 	}
572 
573 	if (mkdir(NETCLS_MOUNT_PATH, 0777) && errno != EEXIST) {
574 		log_err("mkdir cgroup net_cls");
575 		return 1;
576 	}
577 
578 	if (mount("net_cls", NETCLS_MOUNT_PATH, "cgroup", 0, "net_cls")) {
579 		if (errno != EBUSY) {
580 			log_err("mount cgroup net_cls");
581 			return 1;
582 		}
583 
584 		if (rmdir(NETCLS_MOUNT_PATH)) {
585 			log_err("rmdir cgroup net_cls");
586 			return 1;
587 		}
588 		if (umount(CGROUP_MOUNT_DFLT)) {
589 			log_err("umount cgroup base");
590 			return 1;
591 		}
592 	}
593 
594 	cleanup_classid_environment();
595 
596 	if (mkdir(cgroup_workdir, 0777) && errno != EEXIST) {
597 		log_err("mkdir cgroup work dir");
598 		return 1;
599 	}
600 
601 	return 0;
602 }
603 
604 /**
605  * set_classid() - Set a cgroupv1 net_cls classid
606  *
607  * Writes the classid into the cgroup work dir's net_cls.classid
608  * file in order to later on trigger socket tagging.
609  *
610  * We leverage the current pid as the classid, ensuring unique identification.
611  *
612  * On success, it returns 0, otherwise on failure it returns 1. If there
613  * is a failure, it prints the error to stderr.
614  */
615 int set_classid(void)
616 {
617 	char cgroup_workdir[PATH_MAX - 42];
618 	char cgroup_classid_path[PATH_MAX + 1];
619 	int fd, rc = 0;
620 
621 	format_classid_path(cgroup_workdir);
622 	snprintf(cgroup_classid_path, sizeof(cgroup_classid_path),
623 		 "%s/net_cls.classid", cgroup_workdir);
624 
625 	fd = open(cgroup_classid_path, O_WRONLY);
626 	if (fd < 0) {
627 		log_err("Opening cgroup classid: %s", cgroup_classid_path);
628 		return 1;
629 	}
630 
631 	if (dprintf(fd, "%u\n", getpid()) < 0) {
632 		log_err("Setting cgroup classid");
633 		rc = 1;
634 	}
635 
636 	close(fd);
637 	return rc;
638 }
639 
640 /**
641  * join_classid() - Join a cgroupv1 net_cls classid
642  *
643  * This function expects the cgroup work dir to be already created, as we
644  * join it here. This causes the process sockets to be tagged with the given
645  * net_cls classid.
646  *
647  * On success, it returns 0, otherwise on failure it returns 1.
648  */
649 int join_classid(void)
650 {
651 	char cgroup_workdir[PATH_MAX + 1];
652 
653 	format_classid_path(cgroup_workdir);
654 	return join_cgroup_from_top(cgroup_workdir);
655 }
656 
657 /**
658  * cleanup_classid_environment() - Cleanup the cgroupv1 net_cls environment
659  *
660  * At call time, it moves the calling process to the root cgroup, and then
661  * runs the deletion process.
662  *
663  * On failure, it will print an error to stderr, and try to continue.
664  */
665 void cleanup_classid_environment(void)
666 {
667 	char cgroup_workdir[PATH_MAX + 1];
668 
669 	format_classid_path(cgroup_workdir);
670 	join_cgroup_from_top(NETCLS_MOUNT_PATH);
671 	nftw(cgroup_workdir, nftwfunc, WALK_FD_LIMIT, FTW_DEPTH | FTW_MOUNT);
672 }
673 
674 /**
675  * get_classid_cgroup_id - Get the cgroup id of a net_cls cgroup
676  */
677 unsigned long long get_classid_cgroup_id(void)
678 {
679 	char cgroup_workdir[PATH_MAX + 1];
680 
681 	format_classid_path(cgroup_workdir);
682 	return get_cgroup_id_from_path(cgroup_workdir);
683 }
684 
685 /**
686  * get_cgroup1_hierarchy_id - Retrieves the ID of a cgroup1 hierarchy from the cgroup1 subsys name.
687  * @subsys_name: The cgroup1 subsys name, which can be retrieved from /proc/self/cgroup. It can be
688  * a named cgroup like "name=systemd", a controller name like "net_cls", or multi-controllers like
689  * "net_cls,net_prio".
690  */
691 int get_cgroup1_hierarchy_id(const char *subsys_name)
692 {
693 	char *c, *c2, *c3, *c4;
694 	bool found = false;
695 	char line[1024];
696 	FILE *file;
697 	int i, id;
698 
699 	if (!subsys_name)
700 		return -1;
701 
702 	file = fopen("/proc/self/cgroup", "r");
703 	if (!file) {
704 		log_err("fopen /proc/self/cgroup");
705 		return -1;
706 	}
707 
708 	while (fgets(line, 1024, file)) {
709 		i = 0;
710 		for (c = strtok_r(line, ":", &c2); c && i < 2; c = strtok_r(NULL, ":", &c2)) {
711 			if (i == 0) {
712 				id = strtol(c, NULL, 10);
713 			} else if (i == 1) {
714 				if (!strcmp(c, subsys_name)) {
715 					found = true;
716 					break;
717 				}
718 
719 				/* Multiple subsystems may share one single mount point */
720 				for (c3 = strtok_r(c, ",", &c4); c3;
721 				     c3 = strtok_r(NULL, ",", &c4)) {
722 					if (!strcmp(c, subsys_name)) {
723 						found = true;
724 						break;
725 					}
726 				}
727 			}
728 			i++;
729 		}
730 		if (found)
731 			break;
732 	}
733 	fclose(file);
734 	return found ? id : -1;
735 }
736 
737 /**
738  * open_classid() - Open a cgroupv1 net_cls classid
739  *
740  * This function expects the cgroup work dir to be already created, as we
741  * open it here.
742  *
743  * On success, it returns the file descriptor. On failure it returns -1.
744  */
745 int open_classid(void)
746 {
747 	char cgroup_workdir[PATH_MAX + 1];
748 
749 	format_classid_path(cgroup_workdir);
750 	return open(cgroup_workdir, O_RDONLY);
751 }
752