162306a36Sopenharmony_ci// SPDX-License-Identifier: GPL-2.0
262306a36Sopenharmony_ci#define _GNU_SOURCE
362306a36Sopenharmony_ci#include <sched.h>
462306a36Sopenharmony_ci#include <sys/mount.h>
562306a36Sopenharmony_ci#include <sys/stat.h>
662306a36Sopenharmony_ci#include <sys/types.h>
762306a36Sopenharmony_ci#include <linux/limits.h>
862306a36Sopenharmony_ci#include <stdio.h>
962306a36Sopenharmony_ci#include <stdlib.h>
1062306a36Sopenharmony_ci#include <linux/sched.h>
1162306a36Sopenharmony_ci#include <fcntl.h>
1262306a36Sopenharmony_ci#include <unistd.h>
1362306a36Sopenharmony_ci#include <ftw.h>
1462306a36Sopenharmony_ci
1562306a36Sopenharmony_ci#include "cgroup_helpers.h"
1662306a36Sopenharmony_ci#include "bpf_util.h"
1762306a36Sopenharmony_ci
1862306a36Sopenharmony_ci/*
1962306a36Sopenharmony_ci * To avoid relying on the system setup, when setup_cgroup_env is called
2062306a36Sopenharmony_ci * we create a new mount namespace, and cgroup namespace. The cgroupv2
2162306a36Sopenharmony_ci * root is mounted at CGROUP_MOUNT_PATH. Unfortunately, most people don't
2262306a36Sopenharmony_ci * have cgroupv2 enabled at this point in time. It's easier to create our
2362306a36Sopenharmony_ci * own mount namespace and manage it ourselves. We assume /mnt exists.
2462306a36Sopenharmony_ci *
2562306a36Sopenharmony_ci * Related cgroupv1 helpers are named *classid*(), since we only use the
2662306a36Sopenharmony_ci * net_cls controller for tagging net_cls.classid. We assume the default
2762306a36Sopenharmony_ci * mount under /sys/fs/cgroup/net_cls, which should be the case for the
2862306a36Sopenharmony_ci * vast majority of users.
2962306a36Sopenharmony_ci */
3062306a36Sopenharmony_ci
3162306a36Sopenharmony_ci#define WALK_FD_LIMIT			16
3262306a36Sopenharmony_ci
3362306a36Sopenharmony_ci#define CGROUP_MOUNT_PATH		"/mnt"
3462306a36Sopenharmony_ci#define CGROUP_MOUNT_DFLT		"/sys/fs/cgroup"
3562306a36Sopenharmony_ci#define NETCLS_MOUNT_PATH		CGROUP_MOUNT_DFLT "/net_cls"
3662306a36Sopenharmony_ci#define CGROUP_WORK_DIR			"/cgroup-test-work-dir"
3762306a36Sopenharmony_ci
3862306a36Sopenharmony_ci#define format_cgroup_path_pid(buf, path, pid) \
3962306a36Sopenharmony_ci	snprintf(buf, sizeof(buf), "%s%s%d%s", CGROUP_MOUNT_PATH, \
4062306a36Sopenharmony_ci	CGROUP_WORK_DIR, pid, path)
4162306a36Sopenharmony_ci
4262306a36Sopenharmony_ci#define format_cgroup_path(buf, path) \
4362306a36Sopenharmony_ci	format_cgroup_path_pid(buf, path, getpid())
4462306a36Sopenharmony_ci
4562306a36Sopenharmony_ci#define format_parent_cgroup_path(buf, path) \
4662306a36Sopenharmony_ci	format_cgroup_path_pid(buf, path, getppid())
4762306a36Sopenharmony_ci
4862306a36Sopenharmony_ci#define format_classid_path(buf)				\
4962306a36Sopenharmony_ci	snprintf(buf, sizeof(buf), "%s%s", NETCLS_MOUNT_PATH,	\
5062306a36Sopenharmony_ci		 CGROUP_WORK_DIR)
5162306a36Sopenharmony_ci
5262306a36Sopenharmony_cistatic int __enable_controllers(const char *cgroup_path, const char *controllers)
5362306a36Sopenharmony_ci{
5462306a36Sopenharmony_ci	char path[PATH_MAX + 1];
5562306a36Sopenharmony_ci	char enable[PATH_MAX + 1];
5662306a36Sopenharmony_ci	char *c, *c2;
5762306a36Sopenharmony_ci	int fd, cfd;
5862306a36Sopenharmony_ci	ssize_t len;
5962306a36Sopenharmony_ci
6062306a36Sopenharmony_ci	/* If not controllers are passed, enable all available controllers */
6162306a36Sopenharmony_ci	if (!controllers) {
6262306a36Sopenharmony_ci		snprintf(path, sizeof(path), "%s/cgroup.controllers",
6362306a36Sopenharmony_ci			 cgroup_path);
6462306a36Sopenharmony_ci		fd = open(path, O_RDONLY);
6562306a36Sopenharmony_ci		if (fd < 0) {
6662306a36Sopenharmony_ci			log_err("Opening cgroup.controllers: %s", path);
6762306a36Sopenharmony_ci			return 1;
6862306a36Sopenharmony_ci		}
6962306a36Sopenharmony_ci		len = read(fd, enable, sizeof(enable) - 1);
7062306a36Sopenharmony_ci		if (len < 0) {
7162306a36Sopenharmony_ci			close(fd);
7262306a36Sopenharmony_ci			log_err("Reading cgroup.controllers: %s", path);
7362306a36Sopenharmony_ci			return 1;
7462306a36Sopenharmony_ci		} else if (len == 0) { /* No controllers to enable */
7562306a36Sopenharmony_ci			close(fd);
7662306a36Sopenharmony_ci			return 0;
7762306a36Sopenharmony_ci		}
7862306a36Sopenharmony_ci		enable[len] = 0;
7962306a36Sopenharmony_ci		close(fd);
8062306a36Sopenharmony_ci	} else {
8162306a36Sopenharmony_ci		bpf_strlcpy(enable, controllers, sizeof(enable));
8262306a36Sopenharmony_ci	}
8362306a36Sopenharmony_ci
8462306a36Sopenharmony_ci	snprintf(path, sizeof(path), "%s/cgroup.subtree_control", cgroup_path);
8562306a36Sopenharmony_ci	cfd = open(path, O_RDWR);
8662306a36Sopenharmony_ci	if (cfd < 0) {
8762306a36Sopenharmony_ci		log_err("Opening cgroup.subtree_control: %s", path);
8862306a36Sopenharmony_ci		return 1;
8962306a36Sopenharmony_ci	}
9062306a36Sopenharmony_ci
9162306a36Sopenharmony_ci	for (c = strtok_r(enable, " ", &c2); c; c = strtok_r(NULL, " ", &c2)) {
9262306a36Sopenharmony_ci		if (dprintf(cfd, "+%s\n", c) <= 0) {
9362306a36Sopenharmony_ci			log_err("Enabling controller %s: %s", c, path);
9462306a36Sopenharmony_ci			close(cfd);
9562306a36Sopenharmony_ci			return 1;
9662306a36Sopenharmony_ci		}
9762306a36Sopenharmony_ci	}
9862306a36Sopenharmony_ci	close(cfd);
9962306a36Sopenharmony_ci	return 0;
10062306a36Sopenharmony_ci}
10162306a36Sopenharmony_ci
10262306a36Sopenharmony_ci/**
10362306a36Sopenharmony_ci * enable_controllers() - Enable cgroup v2 controllers
10462306a36Sopenharmony_ci * @relative_path: The cgroup path, relative to the workdir
10562306a36Sopenharmony_ci * @controllers: List of controllers to enable in cgroup.controllers format
10662306a36Sopenharmony_ci *
10762306a36Sopenharmony_ci *
10862306a36Sopenharmony_ci * Enable given cgroup v2 controllers, if @controllers is NULL, enable all
10962306a36Sopenharmony_ci * available controllers.
11062306a36Sopenharmony_ci *
11162306a36Sopenharmony_ci * If successful, 0 is returned.
11262306a36Sopenharmony_ci */
11362306a36Sopenharmony_ciint enable_controllers(const char *relative_path, const char *controllers)
11462306a36Sopenharmony_ci{
11562306a36Sopenharmony_ci	char cgroup_path[PATH_MAX + 1];
11662306a36Sopenharmony_ci
11762306a36Sopenharmony_ci	format_cgroup_path(cgroup_path, relative_path);
11862306a36Sopenharmony_ci	return __enable_controllers(cgroup_path, controllers);
11962306a36Sopenharmony_ci}
12062306a36Sopenharmony_ci
12162306a36Sopenharmony_cistatic int __write_cgroup_file(const char *cgroup_path, const char *file,
12262306a36Sopenharmony_ci			       const char *buf)
12362306a36Sopenharmony_ci{
12462306a36Sopenharmony_ci	char file_path[PATH_MAX + 1];
12562306a36Sopenharmony_ci	int fd;
12662306a36Sopenharmony_ci
12762306a36Sopenharmony_ci	snprintf(file_path, sizeof(file_path), "%s/%s", cgroup_path, file);
12862306a36Sopenharmony_ci	fd = open(file_path, O_RDWR);
12962306a36Sopenharmony_ci	if (fd < 0) {
13062306a36Sopenharmony_ci		log_err("Opening %s", file_path);
13162306a36Sopenharmony_ci		return 1;
13262306a36Sopenharmony_ci	}
13362306a36Sopenharmony_ci
13462306a36Sopenharmony_ci	if (dprintf(fd, "%s", buf) <= 0) {
13562306a36Sopenharmony_ci		log_err("Writing to %s", file_path);
13662306a36Sopenharmony_ci		close(fd);
13762306a36Sopenharmony_ci		return 1;
13862306a36Sopenharmony_ci	}
13962306a36Sopenharmony_ci	close(fd);
14062306a36Sopenharmony_ci	return 0;
14162306a36Sopenharmony_ci}
14262306a36Sopenharmony_ci
14362306a36Sopenharmony_ci/**
14462306a36Sopenharmony_ci * write_cgroup_file() - Write to a cgroup file
14562306a36Sopenharmony_ci * @relative_path: The cgroup path, relative to the workdir
14662306a36Sopenharmony_ci * @file: The name of the file in cgroupfs to write to
14762306a36Sopenharmony_ci * @buf: Buffer to write to the file
14862306a36Sopenharmony_ci *
14962306a36Sopenharmony_ci * Write to a file in the given cgroup's directory.
15062306a36Sopenharmony_ci *
15162306a36Sopenharmony_ci * If successful, 0 is returned.
15262306a36Sopenharmony_ci */
15362306a36Sopenharmony_ciint write_cgroup_file(const char *relative_path, const char *file,
15462306a36Sopenharmony_ci		      const char *buf)
15562306a36Sopenharmony_ci{
15662306a36Sopenharmony_ci	char cgroup_path[PATH_MAX - 24];
15762306a36Sopenharmony_ci
15862306a36Sopenharmony_ci	format_cgroup_path(cgroup_path, relative_path);
15962306a36Sopenharmony_ci	return __write_cgroup_file(cgroup_path, file, buf);
16062306a36Sopenharmony_ci}
16162306a36Sopenharmony_ci
16262306a36Sopenharmony_ci/**
16362306a36Sopenharmony_ci * write_cgroup_file_parent() - Write to a cgroup file in the parent process
16462306a36Sopenharmony_ci *                              workdir
16562306a36Sopenharmony_ci * @relative_path: The cgroup path, relative to the parent process workdir
16662306a36Sopenharmony_ci * @file: The name of the file in cgroupfs to write to
16762306a36Sopenharmony_ci * @buf: Buffer to write to the file
16862306a36Sopenharmony_ci *
16962306a36Sopenharmony_ci * Write to a file in the given cgroup's directory under the parent process
17062306a36Sopenharmony_ci * workdir.
17162306a36Sopenharmony_ci *
17262306a36Sopenharmony_ci * If successful, 0 is returned.
17362306a36Sopenharmony_ci */
17462306a36Sopenharmony_ciint write_cgroup_file_parent(const char *relative_path, const char *file,
17562306a36Sopenharmony_ci			     const char *buf)
17662306a36Sopenharmony_ci{
17762306a36Sopenharmony_ci	char cgroup_path[PATH_MAX - 24];
17862306a36Sopenharmony_ci
17962306a36Sopenharmony_ci	format_parent_cgroup_path(cgroup_path, relative_path);
18062306a36Sopenharmony_ci	return __write_cgroup_file(cgroup_path, file, buf);
18162306a36Sopenharmony_ci}
18262306a36Sopenharmony_ci
18362306a36Sopenharmony_ci/**
18462306a36Sopenharmony_ci * setup_cgroup_environment() - Setup the cgroup environment
18562306a36Sopenharmony_ci *
18662306a36Sopenharmony_ci * After calling this function, cleanup_cgroup_environment should be called
18762306a36Sopenharmony_ci * once testing is complete.
18862306a36Sopenharmony_ci *
18962306a36Sopenharmony_ci * This function will print an error to stderr and return 1 if it is unable
19062306a36Sopenharmony_ci * to setup the cgroup environment. If setup is successful, 0 is returned.
19162306a36Sopenharmony_ci */
19262306a36Sopenharmony_ciint setup_cgroup_environment(void)
19362306a36Sopenharmony_ci{
19462306a36Sopenharmony_ci	char cgroup_workdir[PATH_MAX - 24];
19562306a36Sopenharmony_ci
19662306a36Sopenharmony_ci	format_cgroup_path(cgroup_workdir, "");
19762306a36Sopenharmony_ci
19862306a36Sopenharmony_ci	if (unshare(CLONE_NEWNS)) {
19962306a36Sopenharmony_ci		log_err("unshare");
20062306a36Sopenharmony_ci		return 1;
20162306a36Sopenharmony_ci	}
20262306a36Sopenharmony_ci
20362306a36Sopenharmony_ci	if (mount("none", "/", NULL, MS_REC | MS_PRIVATE, NULL)) {
20462306a36Sopenharmony_ci		log_err("mount fakeroot");
20562306a36Sopenharmony_ci		return 1;
20662306a36Sopenharmony_ci	}
20762306a36Sopenharmony_ci
20862306a36Sopenharmony_ci	if (mount("none", CGROUP_MOUNT_PATH, "cgroup2", 0, NULL) && errno != EBUSY) {
20962306a36Sopenharmony_ci		log_err("mount cgroup2");
21062306a36Sopenharmony_ci		return 1;
21162306a36Sopenharmony_ci	}
21262306a36Sopenharmony_ci
21362306a36Sopenharmony_ci	/* Cleanup existing failed runs, now that the environment is setup */
21462306a36Sopenharmony_ci	cleanup_cgroup_environment();
21562306a36Sopenharmony_ci
21662306a36Sopenharmony_ci	if (mkdir(cgroup_workdir, 0777) && errno != EEXIST) {
21762306a36Sopenharmony_ci		log_err("mkdir cgroup work dir");
21862306a36Sopenharmony_ci		return 1;
21962306a36Sopenharmony_ci	}
22062306a36Sopenharmony_ci
22162306a36Sopenharmony_ci	/* Enable all available controllers to increase test coverage */
22262306a36Sopenharmony_ci	if (__enable_controllers(CGROUP_MOUNT_PATH, NULL) ||
22362306a36Sopenharmony_ci	    __enable_controllers(cgroup_workdir, NULL))
22462306a36Sopenharmony_ci		return 1;
22562306a36Sopenharmony_ci
22662306a36Sopenharmony_ci	return 0;
22762306a36Sopenharmony_ci}
22862306a36Sopenharmony_ci
22962306a36Sopenharmony_cistatic int nftwfunc(const char *filename, const struct stat *statptr,
23062306a36Sopenharmony_ci		    int fileflags, struct FTW *pfwt)
23162306a36Sopenharmony_ci{
23262306a36Sopenharmony_ci	if ((fileflags & FTW_D) && rmdir(filename))
23362306a36Sopenharmony_ci		log_err("Removing cgroup: %s", filename);
23462306a36Sopenharmony_ci	return 0;
23562306a36Sopenharmony_ci}
23662306a36Sopenharmony_ci
23762306a36Sopenharmony_cistatic int join_cgroup_from_top(const char *cgroup_path)
23862306a36Sopenharmony_ci{
23962306a36Sopenharmony_ci	char cgroup_procs_path[PATH_MAX + 1];
24062306a36Sopenharmony_ci	pid_t pid = getpid();
24162306a36Sopenharmony_ci	int fd, rc = 0;
24262306a36Sopenharmony_ci
24362306a36Sopenharmony_ci	snprintf(cgroup_procs_path, sizeof(cgroup_procs_path),
24462306a36Sopenharmony_ci		 "%s/cgroup.procs", cgroup_path);
24562306a36Sopenharmony_ci
24662306a36Sopenharmony_ci	fd = open(cgroup_procs_path, O_WRONLY);
24762306a36Sopenharmony_ci	if (fd < 0) {
24862306a36Sopenharmony_ci		log_err("Opening Cgroup Procs: %s", cgroup_procs_path);
24962306a36Sopenharmony_ci		return 1;
25062306a36Sopenharmony_ci	}
25162306a36Sopenharmony_ci
25262306a36Sopenharmony_ci	if (dprintf(fd, "%d\n", pid) < 0) {
25362306a36Sopenharmony_ci		log_err("Joining Cgroup");
25462306a36Sopenharmony_ci		rc = 1;
25562306a36Sopenharmony_ci	}
25662306a36Sopenharmony_ci
25762306a36Sopenharmony_ci	close(fd);
25862306a36Sopenharmony_ci	return rc;
25962306a36Sopenharmony_ci}
26062306a36Sopenharmony_ci
26162306a36Sopenharmony_ci/**
26262306a36Sopenharmony_ci * join_cgroup() - Join a cgroup
26362306a36Sopenharmony_ci * @relative_path: The cgroup path, relative to the workdir, to join
26462306a36Sopenharmony_ci *
26562306a36Sopenharmony_ci * This function expects a cgroup to already be created, relative to the cgroup
26662306a36Sopenharmony_ci * work dir, and it joins it. For example, passing "/my-cgroup" as the path
26762306a36Sopenharmony_ci * would actually put the calling process into the cgroup
26862306a36Sopenharmony_ci * "/cgroup-test-work-dir/my-cgroup"
26962306a36Sopenharmony_ci *
27062306a36Sopenharmony_ci * On success, it returns 0, otherwise on failure it returns 1.
27162306a36Sopenharmony_ci */
27262306a36Sopenharmony_ciint join_cgroup(const char *relative_path)
27362306a36Sopenharmony_ci{
27462306a36Sopenharmony_ci	char cgroup_path[PATH_MAX + 1];
27562306a36Sopenharmony_ci
27662306a36Sopenharmony_ci	format_cgroup_path(cgroup_path, relative_path);
27762306a36Sopenharmony_ci	return join_cgroup_from_top(cgroup_path);
27862306a36Sopenharmony_ci}
27962306a36Sopenharmony_ci
28062306a36Sopenharmony_ci/**
28162306a36Sopenharmony_ci * join_root_cgroup() - Join the root cgroup
28262306a36Sopenharmony_ci *
28362306a36Sopenharmony_ci * This function joins the root cgroup.
28462306a36Sopenharmony_ci *
28562306a36Sopenharmony_ci * On success, it returns 0, otherwise on failure it returns 1.
28662306a36Sopenharmony_ci */
28762306a36Sopenharmony_ciint join_root_cgroup(void)
28862306a36Sopenharmony_ci{
28962306a36Sopenharmony_ci	return join_cgroup_from_top(CGROUP_MOUNT_PATH);
29062306a36Sopenharmony_ci}
29162306a36Sopenharmony_ci
29262306a36Sopenharmony_ci/**
29362306a36Sopenharmony_ci * join_parent_cgroup() - Join a cgroup in the parent process workdir
29462306a36Sopenharmony_ci * @relative_path: The cgroup path, relative to parent process workdir, to join
29562306a36Sopenharmony_ci *
29662306a36Sopenharmony_ci * See join_cgroup().
29762306a36Sopenharmony_ci *
29862306a36Sopenharmony_ci * On success, it returns 0, otherwise on failure it returns 1.
29962306a36Sopenharmony_ci */
30062306a36Sopenharmony_ciint join_parent_cgroup(const char *relative_path)
30162306a36Sopenharmony_ci{
30262306a36Sopenharmony_ci	char cgroup_path[PATH_MAX + 1];
30362306a36Sopenharmony_ci
30462306a36Sopenharmony_ci	format_parent_cgroup_path(cgroup_path, relative_path);
30562306a36Sopenharmony_ci	return join_cgroup_from_top(cgroup_path);
30662306a36Sopenharmony_ci}
30762306a36Sopenharmony_ci
30862306a36Sopenharmony_ci/**
30962306a36Sopenharmony_ci * cleanup_cgroup_environment() - Cleanup Cgroup Testing Environment
31062306a36Sopenharmony_ci *
31162306a36Sopenharmony_ci * This is an idempotent function to delete all temporary cgroups that
31262306a36Sopenharmony_ci * have been created during the test, including the cgroup testing work
31362306a36Sopenharmony_ci * directory.
31462306a36Sopenharmony_ci *
31562306a36Sopenharmony_ci * At call time, it moves the calling process to the root cgroup, and then
31662306a36Sopenharmony_ci * runs the deletion process. It is idempotent, and should not fail, unless
31762306a36Sopenharmony_ci * a process is lingering.
31862306a36Sopenharmony_ci *
31962306a36Sopenharmony_ci * On failure, it will print an error to stderr, and try to continue.
32062306a36Sopenharmony_ci */
32162306a36Sopenharmony_civoid cleanup_cgroup_environment(void)
32262306a36Sopenharmony_ci{
32362306a36Sopenharmony_ci	char cgroup_workdir[PATH_MAX + 1];
32462306a36Sopenharmony_ci
32562306a36Sopenharmony_ci	format_cgroup_path(cgroup_workdir, "");
32662306a36Sopenharmony_ci	join_cgroup_from_top(CGROUP_MOUNT_PATH);
32762306a36Sopenharmony_ci	nftw(cgroup_workdir, nftwfunc, WALK_FD_LIMIT, FTW_DEPTH | FTW_MOUNT);
32862306a36Sopenharmony_ci}
32962306a36Sopenharmony_ci
33062306a36Sopenharmony_ci/**
33162306a36Sopenharmony_ci * get_root_cgroup() - Get the FD of the root cgroup
33262306a36Sopenharmony_ci *
33362306a36Sopenharmony_ci * On success, it returns the file descriptor. On failure, it returns -1.
33462306a36Sopenharmony_ci * If there is a failure, it prints the error to stderr.
33562306a36Sopenharmony_ci */
33662306a36Sopenharmony_ciint get_root_cgroup(void)
33762306a36Sopenharmony_ci{
33862306a36Sopenharmony_ci	int fd;
33962306a36Sopenharmony_ci
34062306a36Sopenharmony_ci	fd = open(CGROUP_MOUNT_PATH, O_RDONLY);
34162306a36Sopenharmony_ci	if (fd < 0) {
34262306a36Sopenharmony_ci		log_err("Opening root cgroup");
34362306a36Sopenharmony_ci		return -1;
34462306a36Sopenharmony_ci	}
34562306a36Sopenharmony_ci	return fd;
34662306a36Sopenharmony_ci}
34762306a36Sopenharmony_ci
34862306a36Sopenharmony_ci/*
34962306a36Sopenharmony_ci * remove_cgroup() - Remove a cgroup
35062306a36Sopenharmony_ci * @relative_path: The cgroup path, relative to the workdir, to remove
35162306a36Sopenharmony_ci *
35262306a36Sopenharmony_ci * This function expects a cgroup to already be created, relative to the cgroup
35362306a36Sopenharmony_ci * work dir. It also expects the cgroup doesn't have any children or live
35462306a36Sopenharmony_ci * processes and it removes the cgroup.
35562306a36Sopenharmony_ci *
35662306a36Sopenharmony_ci * On failure, it will print an error to stderr.
35762306a36Sopenharmony_ci */
35862306a36Sopenharmony_civoid remove_cgroup(const char *relative_path)
35962306a36Sopenharmony_ci{
36062306a36Sopenharmony_ci	char cgroup_path[PATH_MAX + 1];
36162306a36Sopenharmony_ci
36262306a36Sopenharmony_ci	format_cgroup_path(cgroup_path, relative_path);
36362306a36Sopenharmony_ci	if (rmdir(cgroup_path))
36462306a36Sopenharmony_ci		log_err("rmdiring cgroup %s .. %s", relative_path, cgroup_path);
36562306a36Sopenharmony_ci}
36662306a36Sopenharmony_ci
36762306a36Sopenharmony_ci/**
36862306a36Sopenharmony_ci * create_and_get_cgroup() - Create a cgroup, relative to workdir, and get the FD
36962306a36Sopenharmony_ci * @relative_path: The cgroup path, relative to the workdir, to join
37062306a36Sopenharmony_ci *
37162306a36Sopenharmony_ci * This function creates a cgroup under the top level workdir and returns the
37262306a36Sopenharmony_ci * file descriptor. It is idempotent.
37362306a36Sopenharmony_ci *
37462306a36Sopenharmony_ci * On success, it returns the file descriptor. On failure it returns -1.
37562306a36Sopenharmony_ci * If there is a failure, it prints the error to stderr.
37662306a36Sopenharmony_ci */
37762306a36Sopenharmony_ciint create_and_get_cgroup(const char *relative_path)
37862306a36Sopenharmony_ci{
37962306a36Sopenharmony_ci	char cgroup_path[PATH_MAX + 1];
38062306a36Sopenharmony_ci	int fd;
38162306a36Sopenharmony_ci
38262306a36Sopenharmony_ci	format_cgroup_path(cgroup_path, relative_path);
38362306a36Sopenharmony_ci	if (mkdir(cgroup_path, 0777) && errno != EEXIST) {
38462306a36Sopenharmony_ci		log_err("mkdiring cgroup %s .. %s", relative_path, cgroup_path);
38562306a36Sopenharmony_ci		return -1;
38662306a36Sopenharmony_ci	}
38762306a36Sopenharmony_ci
38862306a36Sopenharmony_ci	fd = open(cgroup_path, O_RDONLY);
38962306a36Sopenharmony_ci	if (fd < 0) {
39062306a36Sopenharmony_ci		log_err("Opening Cgroup");
39162306a36Sopenharmony_ci		return -1;
39262306a36Sopenharmony_ci	}
39362306a36Sopenharmony_ci
39462306a36Sopenharmony_ci	return fd;
39562306a36Sopenharmony_ci}
39662306a36Sopenharmony_ci
39762306a36Sopenharmony_ci/**
39862306a36Sopenharmony_ci * get_cgroup_id() - Get cgroup id for a particular cgroup path
39962306a36Sopenharmony_ci * @relative_path: The cgroup path, relative to the workdir, to join
40062306a36Sopenharmony_ci *
40162306a36Sopenharmony_ci * On success, it returns the cgroup id. On failure it returns 0,
40262306a36Sopenharmony_ci * which is an invalid cgroup id.
40362306a36Sopenharmony_ci * If there is a failure, it prints the error to stderr.
40462306a36Sopenharmony_ci */
40562306a36Sopenharmony_ciunsigned long long get_cgroup_id(const char *relative_path)
40662306a36Sopenharmony_ci{
40762306a36Sopenharmony_ci	int dirfd, err, flags, mount_id, fhsize;
40862306a36Sopenharmony_ci	union {
40962306a36Sopenharmony_ci		unsigned long long cgid;
41062306a36Sopenharmony_ci		unsigned char raw_bytes[8];
41162306a36Sopenharmony_ci	} id;
41262306a36Sopenharmony_ci	char cgroup_workdir[PATH_MAX + 1];
41362306a36Sopenharmony_ci	struct file_handle *fhp, *fhp2;
41462306a36Sopenharmony_ci	unsigned long long ret = 0;
41562306a36Sopenharmony_ci
41662306a36Sopenharmony_ci	format_cgroup_path(cgroup_workdir, relative_path);
41762306a36Sopenharmony_ci
41862306a36Sopenharmony_ci	dirfd = AT_FDCWD;
41962306a36Sopenharmony_ci	flags = 0;
42062306a36Sopenharmony_ci	fhsize = sizeof(*fhp);
42162306a36Sopenharmony_ci	fhp = calloc(1, fhsize);
42262306a36Sopenharmony_ci	if (!fhp) {
42362306a36Sopenharmony_ci		log_err("calloc");
42462306a36Sopenharmony_ci		return 0;
42562306a36Sopenharmony_ci	}
42662306a36Sopenharmony_ci	err = name_to_handle_at(dirfd, cgroup_workdir, fhp, &mount_id, flags);
42762306a36Sopenharmony_ci	if (err >= 0 || fhp->handle_bytes != 8) {
42862306a36Sopenharmony_ci		log_err("name_to_handle_at");
42962306a36Sopenharmony_ci		goto free_mem;
43062306a36Sopenharmony_ci	}
43162306a36Sopenharmony_ci
43262306a36Sopenharmony_ci	fhsize = sizeof(struct file_handle) + fhp->handle_bytes;
43362306a36Sopenharmony_ci	fhp2 = realloc(fhp, fhsize);
43462306a36Sopenharmony_ci	if (!fhp2) {
43562306a36Sopenharmony_ci		log_err("realloc");
43662306a36Sopenharmony_ci		goto free_mem;
43762306a36Sopenharmony_ci	}
43862306a36Sopenharmony_ci	err = name_to_handle_at(dirfd, cgroup_workdir, fhp2, &mount_id, flags);
43962306a36Sopenharmony_ci	fhp = fhp2;
44062306a36Sopenharmony_ci	if (err < 0) {
44162306a36Sopenharmony_ci		log_err("name_to_handle_at");
44262306a36Sopenharmony_ci		goto free_mem;
44362306a36Sopenharmony_ci	}
44462306a36Sopenharmony_ci
44562306a36Sopenharmony_ci	memcpy(id.raw_bytes, fhp->f_handle, 8);
44662306a36Sopenharmony_ci	ret = id.cgid;
44762306a36Sopenharmony_ci
44862306a36Sopenharmony_cifree_mem:
44962306a36Sopenharmony_ci	free(fhp);
45062306a36Sopenharmony_ci	return ret;
45162306a36Sopenharmony_ci}
45262306a36Sopenharmony_ci
45362306a36Sopenharmony_ciint cgroup_setup_and_join(const char *path) {
45462306a36Sopenharmony_ci	int cg_fd;
45562306a36Sopenharmony_ci
45662306a36Sopenharmony_ci	if (setup_cgroup_environment()) {
45762306a36Sopenharmony_ci		fprintf(stderr, "Failed to setup cgroup environment\n");
45862306a36Sopenharmony_ci		return -EINVAL;
45962306a36Sopenharmony_ci	}
46062306a36Sopenharmony_ci
46162306a36Sopenharmony_ci	cg_fd = create_and_get_cgroup(path);
46262306a36Sopenharmony_ci	if (cg_fd < 0) {
46362306a36Sopenharmony_ci		fprintf(stderr, "Failed to create test cgroup\n");
46462306a36Sopenharmony_ci		cleanup_cgroup_environment();
46562306a36Sopenharmony_ci		return cg_fd;
46662306a36Sopenharmony_ci	}
46762306a36Sopenharmony_ci
46862306a36Sopenharmony_ci	if (join_cgroup(path)) {
46962306a36Sopenharmony_ci		fprintf(stderr, "Failed to join cgroup\n");
47062306a36Sopenharmony_ci		cleanup_cgroup_environment();
47162306a36Sopenharmony_ci		return -EINVAL;
47262306a36Sopenharmony_ci	}
47362306a36Sopenharmony_ci	return cg_fd;
47462306a36Sopenharmony_ci}
47562306a36Sopenharmony_ci
47662306a36Sopenharmony_ci/**
47762306a36Sopenharmony_ci * setup_classid_environment() - Setup the cgroupv1 net_cls environment
47862306a36Sopenharmony_ci *
47962306a36Sopenharmony_ci * After calling this function, cleanup_classid_environment should be called
48062306a36Sopenharmony_ci * once testing is complete.
48162306a36Sopenharmony_ci *
48262306a36Sopenharmony_ci * This function will print an error to stderr and return 1 if it is unable
48362306a36Sopenharmony_ci * to setup the cgroup environment. If setup is successful, 0 is returned.
48462306a36Sopenharmony_ci */
48562306a36Sopenharmony_ciint setup_classid_environment(void)
48662306a36Sopenharmony_ci{
48762306a36Sopenharmony_ci	char cgroup_workdir[PATH_MAX + 1];
48862306a36Sopenharmony_ci
48962306a36Sopenharmony_ci	format_classid_path(cgroup_workdir);
49062306a36Sopenharmony_ci
49162306a36Sopenharmony_ci	if (mount("tmpfs", CGROUP_MOUNT_DFLT, "tmpfs", 0, NULL) &&
49262306a36Sopenharmony_ci	    errno != EBUSY) {
49362306a36Sopenharmony_ci		log_err("mount cgroup base");
49462306a36Sopenharmony_ci		return 1;
49562306a36Sopenharmony_ci	}
49662306a36Sopenharmony_ci
49762306a36Sopenharmony_ci	if (mkdir(NETCLS_MOUNT_PATH, 0777) && errno != EEXIST) {
49862306a36Sopenharmony_ci		log_err("mkdir cgroup net_cls");
49962306a36Sopenharmony_ci		return 1;
50062306a36Sopenharmony_ci	}
50162306a36Sopenharmony_ci
50262306a36Sopenharmony_ci	if (mount("net_cls", NETCLS_MOUNT_PATH, "cgroup", 0, "net_cls")) {
50362306a36Sopenharmony_ci		if (errno != EBUSY) {
50462306a36Sopenharmony_ci			log_err("mount cgroup net_cls");
50562306a36Sopenharmony_ci			return 1;
50662306a36Sopenharmony_ci		}
50762306a36Sopenharmony_ci
50862306a36Sopenharmony_ci		if (rmdir(NETCLS_MOUNT_PATH)) {
50962306a36Sopenharmony_ci			log_err("rmdir cgroup net_cls");
51062306a36Sopenharmony_ci			return 1;
51162306a36Sopenharmony_ci		}
51262306a36Sopenharmony_ci		if (umount(CGROUP_MOUNT_DFLT)) {
51362306a36Sopenharmony_ci			log_err("umount cgroup base");
51462306a36Sopenharmony_ci			return 1;
51562306a36Sopenharmony_ci		}
51662306a36Sopenharmony_ci	}
51762306a36Sopenharmony_ci
51862306a36Sopenharmony_ci	cleanup_classid_environment();
51962306a36Sopenharmony_ci
52062306a36Sopenharmony_ci	if (mkdir(cgroup_workdir, 0777) && errno != EEXIST) {
52162306a36Sopenharmony_ci		log_err("mkdir cgroup work dir");
52262306a36Sopenharmony_ci		return 1;
52362306a36Sopenharmony_ci	}
52462306a36Sopenharmony_ci
52562306a36Sopenharmony_ci	return 0;
52662306a36Sopenharmony_ci}
52762306a36Sopenharmony_ci
52862306a36Sopenharmony_ci/**
52962306a36Sopenharmony_ci * set_classid() - Set a cgroupv1 net_cls classid
53062306a36Sopenharmony_ci * @id: the numeric classid
53162306a36Sopenharmony_ci *
53262306a36Sopenharmony_ci * Writes the passed classid into the cgroup work dir's net_cls.classid
53362306a36Sopenharmony_ci * file in order to later on trigger socket tagging.
53462306a36Sopenharmony_ci *
53562306a36Sopenharmony_ci * On success, it returns 0, otherwise on failure it returns 1. If there
53662306a36Sopenharmony_ci * is a failure, it prints the error to stderr.
53762306a36Sopenharmony_ci */
53862306a36Sopenharmony_ciint set_classid(unsigned int id)
53962306a36Sopenharmony_ci{
54062306a36Sopenharmony_ci	char cgroup_workdir[PATH_MAX - 42];
54162306a36Sopenharmony_ci	char cgroup_classid_path[PATH_MAX + 1];
54262306a36Sopenharmony_ci	int fd, rc = 0;
54362306a36Sopenharmony_ci
54462306a36Sopenharmony_ci	format_classid_path(cgroup_workdir);
54562306a36Sopenharmony_ci	snprintf(cgroup_classid_path, sizeof(cgroup_classid_path),
54662306a36Sopenharmony_ci		 "%s/net_cls.classid", cgroup_workdir);
54762306a36Sopenharmony_ci
54862306a36Sopenharmony_ci	fd = open(cgroup_classid_path, O_WRONLY);
54962306a36Sopenharmony_ci	if (fd < 0) {
55062306a36Sopenharmony_ci		log_err("Opening cgroup classid: %s", cgroup_classid_path);
55162306a36Sopenharmony_ci		return 1;
55262306a36Sopenharmony_ci	}
55362306a36Sopenharmony_ci
55462306a36Sopenharmony_ci	if (dprintf(fd, "%u\n", id) < 0) {
55562306a36Sopenharmony_ci		log_err("Setting cgroup classid");
55662306a36Sopenharmony_ci		rc = 1;
55762306a36Sopenharmony_ci	}
55862306a36Sopenharmony_ci
55962306a36Sopenharmony_ci	close(fd);
56062306a36Sopenharmony_ci	return rc;
56162306a36Sopenharmony_ci}
56262306a36Sopenharmony_ci
56362306a36Sopenharmony_ci/**
56462306a36Sopenharmony_ci * join_classid() - Join a cgroupv1 net_cls classid
56562306a36Sopenharmony_ci *
56662306a36Sopenharmony_ci * This function expects the cgroup work dir to be already created, as we
56762306a36Sopenharmony_ci * join it here. This causes the process sockets to be tagged with the given
56862306a36Sopenharmony_ci * net_cls classid.
56962306a36Sopenharmony_ci *
57062306a36Sopenharmony_ci * On success, it returns 0, otherwise on failure it returns 1.
57162306a36Sopenharmony_ci */
57262306a36Sopenharmony_ciint join_classid(void)
57362306a36Sopenharmony_ci{
57462306a36Sopenharmony_ci	char cgroup_workdir[PATH_MAX + 1];
57562306a36Sopenharmony_ci
57662306a36Sopenharmony_ci	format_classid_path(cgroup_workdir);
57762306a36Sopenharmony_ci	return join_cgroup_from_top(cgroup_workdir);
57862306a36Sopenharmony_ci}
57962306a36Sopenharmony_ci
58062306a36Sopenharmony_ci/**
58162306a36Sopenharmony_ci * cleanup_classid_environment() - Cleanup the cgroupv1 net_cls environment
58262306a36Sopenharmony_ci *
58362306a36Sopenharmony_ci * At call time, it moves the calling process to the root cgroup, and then
58462306a36Sopenharmony_ci * runs the deletion process.
58562306a36Sopenharmony_ci *
58662306a36Sopenharmony_ci * On failure, it will print an error to stderr, and try to continue.
58762306a36Sopenharmony_ci */
58862306a36Sopenharmony_civoid cleanup_classid_environment(void)
58962306a36Sopenharmony_ci{
59062306a36Sopenharmony_ci	char cgroup_workdir[PATH_MAX + 1];
59162306a36Sopenharmony_ci
59262306a36Sopenharmony_ci	format_classid_path(cgroup_workdir);
59362306a36Sopenharmony_ci	join_cgroup_from_top(NETCLS_MOUNT_PATH);
59462306a36Sopenharmony_ci	nftw(cgroup_workdir, nftwfunc, WALK_FD_LIMIT, FTW_DEPTH | FTW_MOUNT);
59562306a36Sopenharmony_ci}
596