]> git.proxmox.com Git - mirror_lxc.git/blob - src/lxc/cgroups/cgfsng.c
tree-wide: remove unneeded log prefixes
[mirror_lxc.git] / src / lxc / cgroups / cgfsng.c
1 /*
2 * lxc: linux Container library
3 *
4 * Copyright © 2016 Canonical Ltd.
5 *
6 * Authors:
7 * Serge Hallyn <serge.hallyn@ubuntu.com>
8 * Christian Brauner <christian.brauner@ubuntu.com>
9 *
10 * This library is free software; you can redistribute it and/or
11 * modify it under the terms of the GNU Lesser General Public
12 * License as published by the Free Software Foundation; either
13 * version 2.1 of the License, or (at your option) any later version.
14 *
15 * This library is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
18 * Lesser General Public License for more details.
19 *
20 * You should have received a copy of the GNU Lesser General Public
21 * License along with this library; if not, write to the Free Software
22 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
23 */
24
25 /*
26 * cgfs-ng.c: this is a new, simplified implementation of a filesystem
27 * cgroup backend. The original cgfs.c was designed to be as flexible
28 * as possible. It would try to find cgroup filesystems no matter where
29 * or how you had them mounted, and deduce the most usable mount for
30 * each controller.
31 *
32 * This new implementation assumes that cgroup filesystems are mounted
33 * under /sys/fs/cgroup/clist where clist is either the controller, or
34 * a comman-separated list of controllers.
35 */
36
37 #include "config.h"
38
39 #include <ctype.h>
40 #include <dirent.h>
41 #include <errno.h>
42 #include <grp.h>
43 #include <stdint.h>
44 #include <stdio.h>
45 #include <stdlib.h>
46 #include <string.h>
47 #include <unistd.h>
48 #include <linux/kdev_t.h>
49 #include <linux/types.h>
50 #include <sys/types.h>
51
52 #include "caps.h"
53 #include "cgroup.h"
54 #include "cgroup_utils.h"
55 #include "commands.h"
56 #include "conf.h"
57 #include "log.h"
58 #include "storage/storage.h"
59 #include "utils.h"
60
61 #ifndef HAVE_STRLCPY
62 #include "include/strlcpy.h"
63 #endif
64
65 #ifndef HAVE_STRLCAT
66 #include "include/strlcat.h"
67 #endif
68
69 lxc_log_define(cgfsng, cgroup);
70
71 static void free_string_list(char **clist)
72 {
73 int i;
74
75 if (!clist)
76 return;
77
78 for (i = 0; clist[i]; i++)
79 free(clist[i]);
80
81 free(clist);
82 }
83
84 /* Allocate a pointer, do not fail. */
85 static void *must_alloc(size_t sz)
86 {
87 return must_realloc(NULL, sz);
88 }
89
90 /* Given a pointer to a null-terminated array of pointers, realloc to add one
91 * entry, and point the new entry to NULL. Do not fail. Return the index to the
92 * second-to-last entry - that is, the one which is now available for use
93 * (keeping the list null-terminated).
94 */
95 static int append_null_to_list(void ***list)
96 {
97 int newentry = 0;
98
99 if (*list)
100 for (; (*list)[newentry]; newentry++)
101 ;
102
103 *list = must_realloc(*list, (newentry + 2) * sizeof(void **));
104 (*list)[newentry + 1] = NULL;
105 return newentry;
106 }
107
108 /* Given a null-terminated array of strings, check whether @entry is one of the
109 * strings.
110 */
111 static bool string_in_list(char **list, const char *entry)
112 {
113 int i;
114
115 if (!list)
116 return false;
117
118 for (i = 0; list[i]; i++)
119 if (strcmp(list[i], entry) == 0)
120 return true;
121
122 return false;
123 }
124
125 /* Return a copy of @entry prepending "name=", i.e. turn "systemd" into
126 * "name=systemd". Do not fail.
127 */
128 static char *cg_legacy_must_prefix_named(char *entry)
129 {
130 size_t len;
131 char *prefixed;
132
133 len = strlen(entry);
134 prefixed = must_alloc(len + 6);
135
136 memcpy(prefixed, "name=", sizeof("name=") - 1);
137 memcpy(prefixed + sizeof("name=") - 1, entry, len);
138 prefixed[len + 5] = '\0';
139 return prefixed;
140 }
141
142 /* Append an entry to the clist. Do not fail. @clist must be NULL the first time
143 * we are called.
144 *
145 * We also handle named subsystems here. Any controller which is not a kernel
146 * subsystem, we prefix "name=". Any which is both a kernel and named subsystem,
147 * we refuse to use because we're not sure which we have here.
148 * (TODO: We could work around this in some cases by just remounting to be
149 * unambiguous, or by comparing mountpoint contents with current cgroup.)
150 *
151 * The last entry will always be NULL.
152 */
153 static void must_append_controller(char **klist, char **nlist, char ***clist,
154 char *entry)
155 {
156 int newentry;
157 char *copy;
158
159 if (string_in_list(klist, entry) && string_in_list(nlist, entry)) {
160 ERROR("Refusing to use ambiguous controller \"%s\"", entry);
161 ERROR("It is both a named and kernel subsystem");
162 return;
163 }
164
165 newentry = append_null_to_list((void ***)clist);
166
167 if (strncmp(entry, "name=", 5) == 0)
168 copy = must_copy_string(entry);
169 else if (string_in_list(klist, entry))
170 copy = must_copy_string(entry);
171 else
172 copy = cg_legacy_must_prefix_named(entry);
173
174 (*clist)[newentry] = copy;
175 }
176
177 /* Given a handler's cgroup data, return the struct hierarchy for the controller
178 * @c, or NULL if there is none.
179 */
180 struct hierarchy *get_hierarchy(struct cgroup_ops *ops, const char *c)
181 {
182 int i;
183
184 if (!ops->hierarchies)
185 return NULL;
186
187 for (i = 0; ops->hierarchies[i]; i++) {
188 if (!c) {
189 /* This is the empty unified hierarchy. */
190 if (ops->hierarchies[i]->controllers &&
191 !ops->hierarchies[i]->controllers[0])
192 return ops->hierarchies[i];
193
194 continue;
195 }
196
197 if (string_in_list(ops->hierarchies[i]->controllers, c))
198 return ops->hierarchies[i];
199 }
200
201 return NULL;
202 }
203
204 #define BATCH_SIZE 50
205 static void batch_realloc(char **mem, size_t oldlen, size_t newlen)
206 {
207 int newbatches = (newlen / BATCH_SIZE) + 1;
208 int oldbatches = (oldlen / BATCH_SIZE) + 1;
209
210 if (!*mem || newbatches > oldbatches) {
211 *mem = must_realloc(*mem, newbatches * BATCH_SIZE);
212 }
213 }
214
215 static void append_line(char **dest, size_t oldlen, char *new, size_t newlen)
216 {
217 size_t full = oldlen + newlen;
218
219 batch_realloc(dest, oldlen, full + 1);
220
221 memcpy(*dest + oldlen, new, newlen + 1);
222 }
223
224 /* Slurp in a whole file */
225 static char *read_file(const char *fnam)
226 {
227 FILE *f;
228 char *line = NULL, *buf = NULL;
229 size_t len = 0, fulllen = 0;
230 int linelen;
231
232 f = fopen(fnam, "r");
233 if (!f)
234 return NULL;
235 while ((linelen = getline(&line, &len, f)) != -1) {
236 append_line(&buf, fulllen, line, linelen);
237 fulllen += linelen;
238 }
239 fclose(f);
240 free(line);
241 return buf;
242 }
243
244 /* Taken over modified from the kernel sources. */
245 #define NBITS 32 /* bits in uint32_t */
246 #define DIV_ROUND_UP(n, d) (((n) + (d)-1) / (d))
247 #define BITS_TO_LONGS(nr) DIV_ROUND_UP(nr, NBITS)
248
249 static void set_bit(unsigned bit, uint32_t *bitarr)
250 {
251 bitarr[bit / NBITS] |= (1 << (bit % NBITS));
252 }
253
254 static void clear_bit(unsigned bit, uint32_t *bitarr)
255 {
256 bitarr[bit / NBITS] &= ~(1 << (bit % NBITS));
257 }
258
259 static bool is_set(unsigned bit, uint32_t *bitarr)
260 {
261 return (bitarr[bit / NBITS] & (1 << (bit % NBITS))) != 0;
262 }
263
264 /* Create cpumask from cpulist aka turn:
265 *
266 * 0,2-3
267 *
268 * into bit array
269 *
270 * 1 0 1 1
271 */
272 static uint32_t *lxc_cpumask(char *buf, size_t nbits)
273 {
274 char *token;
275 size_t arrlen;
276 uint32_t *bitarr;
277 char *saveptr = NULL;
278
279 arrlen = BITS_TO_LONGS(nbits);
280 bitarr = calloc(arrlen, sizeof(uint32_t));
281 if (!bitarr)
282 return NULL;
283
284 for (; (token = strtok_r(buf, ",", &saveptr)); buf = NULL) {
285 errno = 0;
286 unsigned end, start;
287 char *range;
288
289 start = strtoul(token, NULL, 0);
290 end = start;
291 range = strchr(token, '-');
292 if (range)
293 end = strtoul(range + 1, NULL, 0);
294
295 if (!(start <= end)) {
296 free(bitarr);
297 return NULL;
298 }
299
300 if (end >= nbits) {
301 free(bitarr);
302 return NULL;
303 }
304
305 while (start <= end)
306 set_bit(start++, bitarr);
307 }
308
309 return bitarr;
310 }
311
312 /* Turn cpumask into simple, comma-separated cpulist. */
313 static char *lxc_cpumask_to_cpulist(uint32_t *bitarr, size_t nbits)
314 {
315 int ret;
316 size_t i;
317 char **cpulist = NULL;
318 char numstr[LXC_NUMSTRLEN64] = {0};
319
320 for (i = 0; i <= nbits; i++) {
321 if (!is_set(i, bitarr))
322 continue;
323
324 ret = snprintf(numstr, LXC_NUMSTRLEN64, "%zu", i);
325 if (ret < 0 || (size_t)ret >= LXC_NUMSTRLEN64) {
326 lxc_free_array((void **)cpulist, free);
327 return NULL;
328 }
329
330 ret = lxc_append_string(&cpulist, numstr);
331 if (ret < 0) {
332 lxc_free_array((void **)cpulist, free);
333 return NULL;
334 }
335 }
336
337 if (!cpulist)
338 return NULL;
339
340 return lxc_string_join(",", (const char **)cpulist, false);
341 }
342
343 static ssize_t get_max_cpus(char *cpulist)
344 {
345 char *c1, *c2;
346 char *maxcpus = cpulist;
347 size_t cpus = 0;
348
349 c1 = strrchr(maxcpus, ',');
350 if (c1)
351 c1++;
352
353 c2 = strrchr(maxcpus, '-');
354 if (c2)
355 c2++;
356
357 if (!c1 && !c2)
358 c1 = maxcpus;
359 else if (c1 > c2)
360 c2 = c1;
361 else if (c1 < c2)
362 c1 = c2;
363 else if (!c1 && c2)
364 c1 = c2;
365
366 errno = 0;
367 cpus = strtoul(c1, NULL, 0);
368 if (errno != 0)
369 return -1;
370
371 return cpus;
372 }
373
374 #define __ISOL_CPUS "/sys/devices/system/cpu/isolated"
375 static bool cg_legacy_filter_and_set_cpus(char *path, bool am_initialized)
376 {
377 int ret;
378 ssize_t i;
379 char *lastslash, *fpath, oldv;
380 ssize_t maxisol = 0, maxposs = 0;
381 char *cpulist = NULL, *isolcpus = NULL, *posscpus = NULL;
382 uint32_t *isolmask = NULL, *possmask = NULL;
383 bool bret = false, flipped_bit = false;
384
385 lastslash = strrchr(path, '/');
386 if (!lastslash) {
387 ERROR("Failed to detect \"/\" in \"%s\"", path);
388 return bret;
389 }
390 oldv = *lastslash;
391 *lastslash = '\0';
392 fpath = must_make_path(path, "cpuset.cpus", NULL);
393 posscpus = read_file(fpath);
394 if (!posscpus) {
395 SYSERROR("Failed to read file \"%s\"", fpath);
396 goto on_error;
397 }
398
399 /* Get maximum number of cpus found in possible cpuset. */
400 maxposs = get_max_cpus(posscpus);
401 if (maxposs < 0)
402 goto on_error;
403
404 if (!file_exists(__ISOL_CPUS)) {
405 /* This system doesn't expose isolated cpus. */
406 DEBUG("The path \""__ISOL_CPUS"\" to read isolated cpus from does not exist");
407 cpulist = posscpus;
408 /* No isolated cpus but we weren't already initialized by
409 * someone. We should simply copy the parents cpuset.cpus
410 * values.
411 */
412 if (!am_initialized) {
413 DEBUG("Copying cpu settings of parent cgroup");
414 goto copy_parent;
415 }
416 /* No isolated cpus but we were already initialized by someone.
417 * Nothing more to do for us.
418 */
419 goto on_success;
420 }
421
422 isolcpus = read_file(__ISOL_CPUS);
423 if (!isolcpus) {
424 SYSERROR("Failed to read file \""__ISOL_CPUS"\"");
425 goto on_error;
426 }
427 if (!isdigit(isolcpus[0])) {
428 TRACE("No isolated cpus detected");
429 cpulist = posscpus;
430 /* No isolated cpus but we weren't already initialized by
431 * someone. We should simply copy the parents cpuset.cpus
432 * values.
433 */
434 if (!am_initialized) {
435 DEBUG("Copying cpu settings of parent cgroup");
436 goto copy_parent;
437 }
438 /* No isolated cpus but we were already initialized by someone.
439 * Nothing more to do for us.
440 */
441 goto on_success;
442 }
443
444 /* Get maximum number of cpus found in isolated cpuset. */
445 maxisol = get_max_cpus(isolcpus);
446 if (maxisol < 0)
447 goto on_error;
448
449 if (maxposs < maxisol)
450 maxposs = maxisol;
451 maxposs++;
452
453 possmask = lxc_cpumask(posscpus, maxposs);
454 if (!possmask) {
455 ERROR("Failed to create cpumask for possible cpus");
456 goto on_error;
457 }
458
459 isolmask = lxc_cpumask(isolcpus, maxposs);
460 if (!isolmask) {
461 ERROR("Failed to create cpumask for isolated cpus");
462 goto on_error;
463 }
464
465 for (i = 0; i <= maxposs; i++) {
466 if (!is_set(i, isolmask) || !is_set(i, possmask))
467 continue;
468
469 flipped_bit = true;
470 clear_bit(i, possmask);
471 }
472
473 if (!flipped_bit) {
474 DEBUG("No isolated cpus present in cpuset");
475 goto on_success;
476 }
477 DEBUG("Removed isolated cpus from cpuset");
478
479 cpulist = lxc_cpumask_to_cpulist(possmask, maxposs);
480 if (!cpulist) {
481 ERROR("Failed to create cpu list");
482 goto on_error;
483 }
484
485 copy_parent:
486 *lastslash = oldv;
487 free(fpath);
488 fpath = must_make_path(path, "cpuset.cpus", NULL);
489 ret = lxc_write_to_file(fpath, cpulist, strlen(cpulist), false, 0666);
490 if (ret < 0) {
491 SYSERROR("Failed to write cpu list to \"%s\"", fpath);
492 goto on_error;
493 }
494
495 on_success:
496 bret = true;
497
498 on_error:
499 free(fpath);
500
501 free(isolcpus);
502 free(isolmask);
503
504 if (posscpus != cpulist)
505 free(posscpus);
506 free(possmask);
507
508 free(cpulist);
509 return bret;
510 }
511
512 /* Copy contents of parent(@path)/@file to @path/@file */
513 static bool copy_parent_file(char *path, char *file)
514 {
515 int ret;
516 char *fpath, *lastslash, oldv;
517 int len = 0;
518 char *value = NULL;
519
520 lastslash = strrchr(path, '/');
521 if (!lastslash) {
522 ERROR("Failed to detect \"/\" in \"%s\"", path);
523 return false;
524 }
525 oldv = *lastslash;
526 *lastslash = '\0';
527 fpath = must_make_path(path, file, NULL);
528 len = lxc_read_from_file(fpath, NULL, 0);
529 if (len <= 0)
530 goto on_error;
531
532 value = must_alloc(len + 1);
533 ret = lxc_read_from_file(fpath, value, len);
534 if (ret != len)
535 goto on_error;
536 free(fpath);
537
538 *lastslash = oldv;
539 fpath = must_make_path(path, file, NULL);
540 ret = lxc_write_to_file(fpath, value, len, false, 0666);
541 if (ret < 0)
542 SYSERROR("Failed to write \"%s\" to file \"%s\"", value, fpath);
543 free(fpath);
544 free(value);
545 return ret >= 0;
546
547 on_error:
548 SYSERROR("Failed to read file \"%s\"", fpath);
549 free(fpath);
550 free(value);
551 return false;
552 }
553
554 /* Initialize the cpuset hierarchy in first directory of @gname and set
555 * cgroup.clone_children so that children inherit settings. Since the
556 * h->base_path is populated by init or ourselves, we know it is already
557 * initialized.
558 */
559 static bool cg_legacy_handle_cpuset_hierarchy(struct hierarchy *h, char *cgname)
560 {
561 int ret;
562 char v;
563 char *cgpath, *clonechildrenpath, *slash;
564
565 if (!string_in_list(h->controllers, "cpuset"))
566 return true;
567
568 if (*cgname == '/')
569 cgname++;
570 slash = strchr(cgname, '/');
571 if (slash)
572 *slash = '\0';
573
574 cgpath = must_make_path(h->mountpoint, h->base_cgroup, cgname, NULL);
575 if (slash)
576 *slash = '/';
577
578 ret = mkdir(cgpath, 0755);
579 if (ret < 0) {
580 if (errno != EEXIST) {
581 SYSERROR("Failed to create directory \"%s\"", cgpath);
582 free(cgpath);
583 return false;
584 }
585 }
586
587 clonechildrenpath =
588 must_make_path(cgpath, "cgroup.clone_children", NULL);
589 /* unified hierarchy doesn't have clone_children */
590 if (!file_exists(clonechildrenpath)) {
591 free(clonechildrenpath);
592 free(cgpath);
593 return true;
594 }
595
596 ret = lxc_read_from_file(clonechildrenpath, &v, 1);
597 if (ret < 0) {
598 SYSERROR("Failed to read file \"%s\"", clonechildrenpath);
599 free(clonechildrenpath);
600 free(cgpath);
601 return false;
602 }
603
604 /* Make sure any isolated cpus are removed from cpuset.cpus. */
605 if (!cg_legacy_filter_and_set_cpus(cgpath, v == '1')) {
606 SYSERROR("Failed to remove isolated cpus");
607 free(clonechildrenpath);
608 free(cgpath);
609 return false;
610 }
611
612 /* Already set for us by someone else. */
613 if (v == '1') {
614 DEBUG("\"cgroup.clone_children\" was already set to \"1\"");
615 free(clonechildrenpath);
616 free(cgpath);
617 return true;
618 }
619
620 /* copy parent's settings */
621 if (!copy_parent_file(cgpath, "cpuset.mems")) {
622 SYSERROR("Failed to copy \"cpuset.mems\" settings");
623 free(cgpath);
624 free(clonechildrenpath);
625 return false;
626 }
627 free(cgpath);
628
629 ret = lxc_write_to_file(clonechildrenpath, "1", 1, false, 0666);
630 if (ret < 0) {
631 /* Set clone_children so children inherit our settings */
632 SYSERROR("Failed to write 1 to \"%s\"", clonechildrenpath);
633 free(clonechildrenpath);
634 return false;
635 }
636 free(clonechildrenpath);
637 return true;
638 }
639
640 /* Given two null-terminated lists of strings, return true if any string is in
641 * both.
642 */
643 static bool controller_lists_intersect(char **l1, char **l2)
644 {
645 int i;
646
647 if (!l1 || !l2)
648 return false;
649
650 for (i = 0; l1[i]; i++) {
651 if (string_in_list(l2, l1[i]))
652 return true;
653 }
654
655 return false;
656 }
657
658 /* For a null-terminated list of controllers @clist, return true if any of those
659 * controllers is already listed the null-terminated list of hierarchies @hlist.
660 * Realistically, if one is present, all must be present.
661 */
662 static bool controller_list_is_dup(struct hierarchy **hlist, char **clist)
663 {
664 int i;
665
666 if (!hlist)
667 return false;
668
669 for (i = 0; hlist[i]; i++)
670 if (controller_lists_intersect(hlist[i]->controllers, clist))
671 return true;
672
673 return false;
674 }
675
676 /* Return true if the controller @entry is found in the null-terminated list of
677 * hierarchies @hlist.
678 */
679 static bool controller_found(struct hierarchy **hlist, char *entry)
680 {
681 int i;
682
683 if (!hlist)
684 return false;
685
686 for (i = 0; hlist[i]; i++)
687 if (string_in_list(hlist[i]->controllers, entry))
688 return true;
689
690 return false;
691 }
692
693 /* Return true if all of the controllers which we require have been found. The
694 * required list is freezer and anything in lxc.cgroup.use.
695 */
696 static bool all_controllers_found(struct cgroup_ops *ops)
697 {
698 char *p;
699 char *saveptr = NULL;
700 struct hierarchy **hlist = ops->hierarchies;
701
702 if (!controller_found(hlist, "freezer")) {
703 ERROR("No freezer controller mountpoint found");
704 return false;
705 }
706
707 if (!ops->cgroup_use)
708 return true;
709
710 for (; (p = strtok_r(ops->cgroup_use, ",", &saveptr)); ops->cgroup_use = NULL)
711 if (!controller_found(hlist, p)) {
712 ERROR("No %s controller mountpoint found", p);
713 return false;
714 }
715
716 return true;
717 }
718
719 /* Get the controllers from a mountinfo line There are other ways we could get
720 * this info. For lxcfs, field 3 is /cgroup/controller-list. For cgroupfs, we
721 * could parse the mount options. But we simply assume that the mountpoint must
722 * be /sys/fs/cgroup/controller-list
723 */
724 static char **cg_hybrid_get_controllers(char **klist, char **nlist, char *line,
725 int type)
726 {
727 /* The fourth field is /sys/fs/cgroup/comma-delimited-controller-list
728 * for legacy hierarchies.
729 */
730 int i;
731 char *dup, *p2, *tok;
732 char *p = line, *saveptr = NULL, *sep = ",";
733 char **aret = NULL;
734
735 for (i = 0; i < 4; i++) {
736 p = strchr(p, ' ');
737 if (!p)
738 return NULL;
739 p++;
740 }
741
742 /* Note, if we change how mountinfo works, then our caller will need to
743 * verify /sys/fs/cgroup/ in this field.
744 */
745 if (strncmp(p, "/sys/fs/cgroup/", 15) != 0) {
746 ERROR("Found hierarchy not under /sys/fs/cgroup: \"%s\"", p);
747 return NULL;
748 }
749
750 p += 15;
751 p2 = strchr(p, ' ');
752 if (!p2) {
753 ERROR("Corrupt mountinfo");
754 return NULL;
755 }
756 *p2 = '\0';
757
758 if (type == CGROUP_SUPER_MAGIC) {
759 /* strdup() here for v1 hierarchies. Otherwise strtok_r() will
760 * destroy mountpoints such as "/sys/fs/cgroup/cpu,cpuacct".
761 */
762 dup = strdup(p);
763 if (!dup)
764 return NULL;
765
766 for (tok = strtok_r(dup, sep, &saveptr); tok;
767 tok = strtok_r(NULL, sep, &saveptr))
768 must_append_controller(klist, nlist, &aret, tok);
769
770 free(dup);
771 }
772 *p2 = ' ';
773
774 return aret;
775 }
776
777 static char **cg_unified_make_empty_controller(void)
778 {
779 int newentry;
780 char **aret = NULL;
781
782 newentry = append_null_to_list((void ***)&aret);
783 aret[newentry] = NULL;
784 return aret;
785 }
786
787 static char **cg_unified_get_controllers(const char *file)
788 {
789 char *buf, *tok;
790 char *saveptr = NULL, *sep = " \t\n";
791 char **aret = NULL;
792
793 buf = read_file(file);
794 if (!buf)
795 return NULL;
796
797 for (tok = strtok_r(buf, sep, &saveptr); tok;
798 tok = strtok_r(NULL, sep, &saveptr)) {
799 int newentry;
800 char *copy;
801
802 newentry = append_null_to_list((void ***)&aret);
803 copy = must_copy_string(tok);
804 aret[newentry] = copy;
805 }
806
807 free(buf);
808 return aret;
809 }
810
811 static struct hierarchy *add_hierarchy(struct hierarchy ***h, char **clist, char *mountpoint,
812 char *base_cgroup, int type)
813 {
814 struct hierarchy *new;
815 int newentry;
816
817 new = must_alloc(sizeof(*new));
818 new->controllers = clist;
819 new->mountpoint = mountpoint;
820 new->base_cgroup = base_cgroup;
821 new->fullcgpath = NULL;
822 new->version = type;
823
824 newentry = append_null_to_list((void ***)h);
825 (*h)[newentry] = new;
826 return new;
827 }
828
829 /* Get a copy of the mountpoint from @line, which is a line from
830 * /proc/self/mountinfo.
831 */
832 static char *cg_hybrid_get_mountpoint(char *line)
833 {
834 int i;
835 size_t len;
836 char *p2;
837 char *p = line, *sret = NULL;
838
839 for (i = 0; i < 4; i++) {
840 p = strchr(p, ' ');
841 if (!p)
842 return NULL;
843 p++;
844 }
845
846 if (strncmp(p, "/sys/fs/cgroup/", 15) != 0)
847 return NULL;
848
849 p2 = strchr(p + 15, ' ');
850 if (!p2)
851 return NULL;
852 *p2 = '\0';
853
854 len = strlen(p);
855 sret = must_alloc(len + 1);
856 memcpy(sret, p, len);
857 sret[len] = '\0';
858 return sret;
859 }
860
861 /* Given a multi-line string, return a null-terminated copy of the current line. */
862 static char *copy_to_eol(char *p)
863 {
864 char *p2 = strchr(p, '\n'), *sret;
865 size_t len;
866
867 if (!p2)
868 return NULL;
869
870 len = p2 - p;
871 sret = must_alloc(len + 1);
872 memcpy(sret, p, len);
873 sret[len] = '\0';
874 return sret;
875 }
876
877 /* cgline: pointer to character after the first ':' in a line in a \n-terminated
878 * /proc/self/cgroup file. Check whether controller c is present.
879 */
880 static bool controller_in_clist(char *cgline, char *c)
881 {
882 char *tok, *saveptr = NULL, *eol, *tmp;
883 size_t len;
884
885 eol = strchr(cgline, ':');
886 if (!eol)
887 return false;
888
889 len = eol - cgline;
890 tmp = alloca(len + 1);
891 memcpy(tmp, cgline, len);
892 tmp[len] = '\0';
893
894 for (tok = strtok_r(tmp, ",", &saveptr); tok;
895 tok = strtok_r(NULL, ",", &saveptr)) {
896 if (strcmp(tok, c) == 0)
897 return true;
898 }
899
900 return false;
901 }
902
903 /* @basecginfo is a copy of /proc/$$/cgroup. Return the current cgroup for
904 * @controller.
905 */
906 static char *cg_hybrid_get_current_cgroup(char *basecginfo, char *controller,
907 int type)
908 {
909 char *p = basecginfo;
910
911 for (;;) {
912 bool is_cgv2_base_cgroup = false;
913
914 /* cgroup v2 entry in "/proc/<pid>/cgroup": "0::/some/path" */
915 if ((type == CGROUP2_SUPER_MAGIC) && (*p == '0'))
916 is_cgv2_base_cgroup = true;
917
918 p = strchr(p, ':');
919 if (!p)
920 return NULL;
921 p++;
922
923 if (is_cgv2_base_cgroup || (controller && controller_in_clist(p, controller))) {
924 p = strchr(p, ':');
925 if (!p)
926 return NULL;
927 p++;
928 return copy_to_eol(p);
929 }
930
931 p = strchr(p, '\n');
932 if (!p)
933 return NULL;
934 p++;
935 }
936 }
937
938 static void must_append_string(char ***list, char *entry)
939 {
940 int newentry;
941 char *copy;
942
943 newentry = append_null_to_list((void ***)list);
944 copy = must_copy_string(entry);
945 (*list)[newentry] = copy;
946 }
947
948 static int get_existing_subsystems(char ***klist, char ***nlist)
949 {
950 FILE *f;
951 char *line = NULL;
952 size_t len = 0;
953
954 f = fopen("/proc/self/cgroup", "r");
955 if (!f)
956 return -1;
957
958 while (getline(&line, &len, f) != -1) {
959 char *p, *p2, *tok, *saveptr = NULL;
960 p = strchr(line, ':');
961 if (!p)
962 continue;
963 p++;
964 p2 = strchr(p, ':');
965 if (!p2)
966 continue;
967 *p2 = '\0';
968
969 /* If the kernel has cgroup v2 support, then /proc/self/cgroup
970 * contains an entry of the form:
971 *
972 * 0::/some/path
973 *
974 * In this case we use "cgroup2" as controller name.
975 */
976 if ((p2 - p) == 0) {
977 must_append_string(klist, "cgroup2");
978 continue;
979 }
980
981 for (tok = strtok_r(p, ",", &saveptr); tok;
982 tok = strtok_r(NULL, ",", &saveptr)) {
983 if (strncmp(tok, "name=", 5) == 0)
984 must_append_string(nlist, tok);
985 else
986 must_append_string(klist, tok);
987 }
988 }
989
990 free(line);
991 fclose(f);
992 return 0;
993 }
994
995 static void trim(char *s)
996 {
997 size_t len;
998
999 len = strlen(s);
1000 while ((len > 1) && (s[len - 1] == '\n'))
1001 s[--len] = '\0';
1002 }
1003
1004 static void lxc_cgfsng_print_hierarchies(struct cgroup_ops *ops)
1005 {
1006 int i;
1007 struct hierarchy **it;
1008
1009 if (!ops->hierarchies) {
1010 TRACE(" No hierarchies found");
1011 return;
1012 }
1013
1014 TRACE(" Hierarchies:");
1015 for (i = 0, it = ops->hierarchies; it && *it; it++, i++) {
1016 int j;
1017 char **cit;
1018
1019 TRACE(" %d: base_cgroup: %s", i, (*it)->base_cgroup ? (*it)->base_cgroup : "(null)");
1020 TRACE(" mountpoint: %s", (*it)->mountpoint ? (*it)->mountpoint : "(null)");
1021 TRACE(" controllers:");
1022 for (j = 0, cit = (*it)->controllers; cit && *cit; cit++, j++)
1023 TRACE(" %d: %s", j, *cit);
1024 }
1025 }
1026
1027 static void lxc_cgfsng_print_basecg_debuginfo(char *basecginfo, char **klist,
1028 char **nlist)
1029 {
1030 int k;
1031 char **it;
1032
1033 TRACE("basecginfo is:");
1034 TRACE("%s", basecginfo);
1035
1036 for (k = 0, it = klist; it && *it; it++, k++)
1037 TRACE("kernel subsystem %d: %s", k, *it);
1038
1039 for (k = 0, it = nlist; it && *it; it++, k++)
1040 TRACE("named subsystem %d: %s", k, *it);
1041 }
1042
1043 static int cgroup_rmdir(struct hierarchy **hierarchies,
1044 const char *container_cgroup)
1045 {
1046 int i;
1047
1048 if (!container_cgroup || !hierarchies)
1049 return 0;
1050
1051 for (i = 0; hierarchies[i]; i++) {
1052 int ret;
1053 struct hierarchy *h = hierarchies[i];
1054
1055 if (!h->fullcgpath)
1056 continue;
1057
1058 ret = recursive_destroy(h->fullcgpath);
1059 if (ret < 0)
1060 WARN("Failed to destroy \"%s\"", h->fullcgpath);
1061
1062 free(h->fullcgpath);
1063 h->fullcgpath = NULL;
1064 }
1065
1066 return 0;
1067 }
1068
1069 struct generic_userns_exec_data {
1070 struct hierarchy **hierarchies;
1071 const char *container_cgroup;
1072 struct lxc_conf *conf;
1073 uid_t origuid; /* target uid in parent namespace */
1074 char *path;
1075 };
1076
1077 static int cgroup_rmdir_wrapper(void *data)
1078 {
1079 int ret;
1080 struct generic_userns_exec_data *arg = data;
1081 uid_t nsuid = (arg->conf->root_nsuid_map != NULL) ? 0 : arg->conf->init_uid;
1082 gid_t nsgid = (arg->conf->root_nsgid_map != NULL) ? 0 : arg->conf->init_gid;
1083
1084 ret = setresgid(nsgid, nsgid, nsgid);
1085 if (ret < 0) {
1086 SYSERROR("Failed to setresgid(%d, %d, %d)", (int)nsgid,
1087 (int)nsgid, (int)nsgid);
1088 return -1;
1089 }
1090
1091 ret = setresuid(nsuid, nsuid, nsuid);
1092 if (ret < 0) {
1093 SYSERROR("Failed to setresuid(%d, %d, %d)", (int)nsuid,
1094 (int)nsuid, (int)nsuid);
1095 return -1;
1096 }
1097
1098 ret = setgroups(0, NULL);
1099 if (ret < 0 && errno != EPERM) {
1100 SYSERROR("Failed to setgroups(0, NULL)");
1101 return -1;
1102 }
1103
1104 return cgroup_rmdir(arg->hierarchies, arg->container_cgroup);
1105 }
1106
1107 static void cgfsng_destroy(struct cgroup_ops *ops, struct lxc_handler *handler)
1108 {
1109 int ret;
1110 struct generic_userns_exec_data wrap;
1111
1112 wrap.origuid = 0;
1113 wrap.container_cgroup = ops->container_cgroup;
1114 wrap.hierarchies = ops->hierarchies;
1115 wrap.conf = handler->conf;
1116
1117 if (handler->conf && !lxc_list_empty(&handler->conf->id_map))
1118 ret = userns_exec_1(handler->conf, cgroup_rmdir_wrapper, &wrap,
1119 "cgroup_rmdir_wrapper");
1120 else
1121 ret = cgroup_rmdir(ops->hierarchies, ops->container_cgroup);
1122 if (ret < 0) {
1123 WARN("Failed to destroy cgroups");
1124 return;
1125 }
1126 }
1127
1128 static bool cg_unified_create_cgroup(struct hierarchy *h, char *cgname)
1129 {
1130 size_t i, parts_len;
1131 char **it;
1132 size_t full_len = 0;
1133 char *add_controllers = NULL, *cgroup = NULL;
1134 char **parts = NULL;
1135 bool bret = false;
1136
1137 if (h->version != CGROUP2_SUPER_MAGIC)
1138 return true;
1139
1140 if (!h->controllers)
1141 return true;
1142
1143 /* For now we simply enable all controllers that we have detected by
1144 * creating a string like "+memory +pids +cpu +io".
1145 * TODO: In the near future we might want to support "-<controller>"
1146 * etc. but whether supporting semantics like this make sense will need
1147 * some thinking.
1148 */
1149 for (it = h->controllers; it && *it; it++) {
1150 full_len += strlen(*it) + 2;
1151 add_controllers = must_realloc(add_controllers, full_len + 1);
1152
1153 if (h->controllers[0] == *it)
1154 add_controllers[0] = '\0';
1155
1156 (void)strlcat(add_controllers, "+", full_len + 1);
1157 (void)strlcat(add_controllers, *it, full_len + 1);
1158
1159 if ((it + 1) && *(it + 1))
1160 (void)strlcat(add_controllers, " ", full_len + 1);
1161 }
1162
1163 parts = lxc_string_split(cgname, '/');
1164 if (!parts)
1165 goto on_error;
1166
1167 parts_len = lxc_array_len((void **)parts);
1168 if (parts_len > 0)
1169 parts_len--;
1170
1171 cgroup = must_make_path(h->mountpoint, h->base_cgroup, NULL);
1172 for (i = 0; i < parts_len; i++) {
1173 int ret;
1174 char *target;
1175
1176 cgroup = must_append_path(cgroup, parts[i], NULL);
1177 target = must_make_path(cgroup, "cgroup.subtree_control", NULL);
1178 ret = lxc_write_to_file(target, add_controllers, full_len, false, 0666);
1179 free(target);
1180 if (ret < 0) {
1181 SYSERROR("Could not enable \"%s\" controllers in the "
1182 "unified cgroup \"%s\"", add_controllers, cgroup);
1183 goto on_error;
1184 }
1185 }
1186
1187 bret = true;
1188
1189 on_error:
1190 lxc_free_array((void **)parts, free);
1191 free(add_controllers);
1192 free(cgroup);
1193 return bret;
1194 }
1195
1196 static bool create_path_for_hierarchy(struct hierarchy *h, char *cgname)
1197 {
1198 int ret;
1199
1200 h->fullcgpath = must_make_path(h->mountpoint, h->base_cgroup, cgname, NULL);
1201 if (dir_exists(h->fullcgpath)) {
1202 ERROR("The cgroup \"%s\" already existed", h->fullcgpath);
1203 return false;
1204 }
1205
1206 if (!cg_legacy_handle_cpuset_hierarchy(h, cgname)) {
1207 ERROR("Failed to handle legacy cpuset controller");
1208 return false;
1209 }
1210
1211 ret = mkdir_p(h->fullcgpath, 0755);
1212 if (ret < 0) {
1213 ERROR("Failed to create cgroup \"%s\"", h->fullcgpath);
1214 return false;
1215 }
1216
1217 return cg_unified_create_cgroup(h, cgname);
1218 }
1219
1220 static void remove_path_for_hierarchy(struct hierarchy *h, char *cgname)
1221 {
1222 int ret;
1223
1224 ret = rmdir(h->fullcgpath);
1225 if (ret < 0)
1226 SYSERROR("Failed to rmdir(\"%s\") from failed creation attempt", h->fullcgpath);
1227
1228 free(h->fullcgpath);
1229 h->fullcgpath = NULL;
1230 }
1231
1232 /* Try to create the same cgroup in all hierarchies. Start with cgroup_pattern;
1233 * next cgroup_pattern-1, -2, ..., -999.
1234 */
1235 static inline bool cgfsng_create(struct cgroup_ops *ops,
1236 struct lxc_handler *handler)
1237 {
1238 int i;
1239 size_t len;
1240 char *container_cgroup, *offset, *tmp;
1241 int idx = 0;
1242 struct lxc_conf *conf = handler->conf;
1243
1244 if (ops->container_cgroup) {
1245 WARN("cgfsng_create called a second time: %s", ops->container_cgroup);
1246 return false;
1247 }
1248
1249 if (!conf)
1250 return false;
1251
1252 if (conf->cgroup_meta.dir)
1253 tmp = lxc_string_join("/", (const char *[]){conf->cgroup_meta.dir, handler->name, NULL}, false);
1254 else
1255 tmp = lxc_string_replace("%n", handler->name, ops->cgroup_pattern);
1256 if (!tmp) {
1257 ERROR("Failed expanding cgroup name pattern");
1258 return false;
1259 }
1260
1261 len = strlen(tmp) + 5; /* leave room for -NNN\0 */
1262 container_cgroup = must_alloc(len);
1263 (void)strlcpy(container_cgroup, tmp, len);
1264 free(tmp);
1265 offset = container_cgroup + len - 5;
1266
1267 again:
1268 if (idx == 1000) {
1269 ERROR("Too many conflicting cgroup names");
1270 goto out_free;
1271 }
1272
1273 if (idx) {
1274 int ret;
1275
1276 ret = snprintf(offset, 5, "-%d", idx);
1277 if (ret < 0 || (size_t)ret >= 5) {
1278 FILE *f = fopen("/dev/null", "w");
1279 if (f) {
1280 fprintf(f, "Workaround for GCC7 bug: "
1281 "https://gcc.gnu.org/bugzilla/"
1282 "show_bug.cgi?id=78969");
1283 fclose(f);
1284 }
1285 }
1286 }
1287
1288 for (i = 0; ops->hierarchies[i]; i++) {
1289 if (!create_path_for_hierarchy(ops->hierarchies[i], container_cgroup)) {
1290 int j;
1291 ERROR("Failed to create cgroup \"%s\"", ops->hierarchies[i]->fullcgpath);
1292 free(ops->hierarchies[i]->fullcgpath);
1293 ops->hierarchies[i]->fullcgpath = NULL;
1294 for (j = 0; j < i; j++)
1295 remove_path_for_hierarchy(ops->hierarchies[j], container_cgroup);
1296 idx++;
1297 goto again;
1298 }
1299 }
1300
1301 ops->container_cgroup = container_cgroup;
1302
1303 return true;
1304
1305 out_free:
1306 free(container_cgroup);
1307
1308 return false;
1309 }
1310
1311 static bool cgfsng_enter(struct cgroup_ops *ops, pid_t pid)
1312 {
1313 int i, len;
1314 char pidstr[25];
1315
1316 len = snprintf(pidstr, 25, "%d", pid);
1317 if (len < 0 || len >= 25)
1318 return false;
1319
1320 for (i = 0; ops->hierarchies[i]; i++) {
1321 int ret;
1322 char *fullpath;
1323
1324 fullpath = must_make_path(ops->hierarchies[i]->fullcgpath,
1325 "cgroup.procs", NULL);
1326 ret = lxc_write_to_file(fullpath, pidstr, len, false, 0666);
1327 if (ret != 0) {
1328 SYSERROR("Failed to enter cgroup \"%s\"", fullpath);
1329 free(fullpath);
1330 return false;
1331 }
1332 free(fullpath);
1333 }
1334
1335 return true;
1336 }
1337
1338 static int chowmod(char *path, uid_t chown_uid, gid_t chown_gid,
1339 mode_t chmod_mode)
1340 {
1341 int ret;
1342
1343 ret = chown(path, chown_uid, chown_gid);
1344 if (ret < 0) {
1345 SYSWARN("Failed to chown(%s, %d, %d)", path, (int)chown_uid, (int)chown_gid);
1346 return -1;
1347 }
1348
1349 ret = chmod(path, chmod_mode);
1350 if (ret < 0) {
1351 SYSWARN("Failed to chmod(%s, %d)", path, (int)chmod_mode);
1352 return -1;
1353 }
1354
1355 return 0;
1356 }
1357
1358 /* chgrp the container cgroups to container group. We leave
1359 * the container owner as cgroup owner. So we must make the
1360 * directories 775 so that the container can create sub-cgroups.
1361 *
1362 * Also chown the tasks and cgroup.procs files. Those may not
1363 * exist depending on kernel version.
1364 */
1365 static int chown_cgroup_wrapper(void *data)
1366 {
1367 int i, ret;
1368 uid_t destuid;
1369 struct generic_userns_exec_data *arg = data;
1370 uid_t nsuid = (arg->conf->root_nsuid_map != NULL) ? 0 : arg->conf->init_uid;
1371 gid_t nsgid = (arg->conf->root_nsgid_map != NULL) ? 0 : arg->conf->init_gid;
1372
1373 ret = setresgid(nsgid, nsgid, nsgid);
1374 if (ret < 0) {
1375 SYSERROR("Failed to setresgid(%d, %d, %d)",
1376 (int)nsgid, (int)nsgid, (int)nsgid);
1377 return -1;
1378 }
1379
1380 ret = setresuid(nsuid, nsuid, nsuid);
1381 if (ret < 0) {
1382 SYSERROR("Failed to setresuid(%d, %d, %d)",
1383 (int)nsuid, (int)nsuid, (int)nsuid);
1384 return -1;
1385 }
1386
1387 ret = setgroups(0, NULL);
1388 if (ret < 0 && errno != EPERM) {
1389 SYSERROR("Failed to setgroups(0, NULL)");
1390 return -1;
1391 }
1392
1393 destuid = get_ns_uid(arg->origuid);
1394
1395 for (i = 0; arg->hierarchies[i]; i++) {
1396 char *fullpath;
1397 char *path = arg->hierarchies[i]->fullcgpath;
1398
1399 ret = chowmod(path, destuid, nsgid, 0775);
1400 if (ret < 0)
1401 return -1;
1402
1403 /* Failures to chown() these are inconvenient but not
1404 * detrimental We leave these owned by the container launcher,
1405 * so that container root can write to the files to attach. We
1406 * chmod() them 664 so that container systemd can write to the
1407 * files (which systemd in wily insists on doing).
1408 */
1409
1410 if (arg->hierarchies[i]->version == CGROUP_SUPER_MAGIC) {
1411 fullpath = must_make_path(path, "tasks", NULL);
1412 (void)chowmod(fullpath, destuid, nsgid, 0664);
1413 free(fullpath);
1414 }
1415
1416 fullpath = must_make_path(path, "cgroup.procs", NULL);
1417 (void)chowmod(fullpath, destuid, nsgid, 0664);
1418 free(fullpath);
1419
1420 if (arg->hierarchies[i]->version != CGROUP2_SUPER_MAGIC)
1421 continue;
1422
1423 fullpath = must_make_path(path, "cgroup.subtree_control", NULL);
1424 (void)chowmod(fullpath, destuid, nsgid, 0664);
1425 free(fullpath);
1426
1427 fullpath = must_make_path(path, "cgroup.threads", NULL);
1428 (void)chowmod(fullpath, destuid, nsgid, 0664);
1429 free(fullpath);
1430 }
1431
1432 return 0;
1433 }
1434
1435 static bool cgfsng_chown(struct cgroup_ops *ops, struct lxc_conf *conf)
1436 {
1437 struct generic_userns_exec_data wrap;
1438
1439 if (lxc_list_empty(&conf->id_map))
1440 return true;
1441
1442 wrap.origuid = geteuid();
1443 wrap.path = NULL;
1444 wrap.hierarchies = ops->hierarchies;
1445 wrap.conf = conf;
1446
1447 if (userns_exec_1(conf, chown_cgroup_wrapper, &wrap,
1448 "chown_cgroup_wrapper") < 0) {
1449 ERROR("Error requesting cgroup chown in new user namespace");
1450 return false;
1451 }
1452
1453 return true;
1454 }
1455
1456 /* cgroup-full:* is done, no need to create subdirs */
1457 static bool cg_mount_needs_subdirs(int type)
1458 {
1459 if (type >= LXC_AUTO_CGROUP_FULL_RO)
1460 return false;
1461
1462 return true;
1463 }
1464
1465 /* After $rootfs/sys/fs/container/controller/the/cg/path has been created,
1466 * remount controller ro if needed and bindmount the cgroupfs onto
1467 * controll/the/cg/path.
1468 */
1469 static int cg_legacy_mount_controllers(int type, struct hierarchy *h,
1470 char *controllerpath, char *cgpath,
1471 const char *container_cgroup)
1472 {
1473 int ret, remount_flags;
1474 char *sourcepath;
1475 int flags = MS_BIND;
1476
1477 if (type == LXC_AUTO_CGROUP_RO || type == LXC_AUTO_CGROUP_MIXED) {
1478 ret = mount(controllerpath, controllerpath, "cgroup", MS_BIND, NULL);
1479 if (ret < 0) {
1480 SYSERROR("Failed to bind mount \"%s\" onto \"%s\"",
1481 controllerpath, controllerpath);
1482 return -1;
1483 }
1484
1485 remount_flags = add_required_remount_flags(controllerpath,
1486 controllerpath,
1487 flags | MS_REMOUNT);
1488 ret = mount(controllerpath, controllerpath, "cgroup",
1489 remount_flags | MS_REMOUNT | MS_BIND | MS_RDONLY,
1490 NULL);
1491 if (ret < 0) {
1492 SYSERROR("Failed to remount \"%s\" ro", controllerpath);
1493 return -1;
1494 }
1495
1496 INFO("Remounted %s read-only", controllerpath);
1497 }
1498
1499 sourcepath = must_make_path(h->mountpoint, h->base_cgroup,
1500 container_cgroup, NULL);
1501 if (type == LXC_AUTO_CGROUP_RO)
1502 flags |= MS_RDONLY;
1503
1504 ret = mount(sourcepath, cgpath, "cgroup", flags, NULL);
1505 if (ret < 0) {
1506 SYSERROR("Failed to mount \"%s\" onto \"%s\"", h->controllers[0], cgpath);
1507 free(sourcepath);
1508 return -1;
1509 }
1510 INFO("Mounted \"%s\" onto \"%s\"", h->controllers[0], cgpath);
1511
1512 if (flags & MS_RDONLY) {
1513 remount_flags = add_required_remount_flags(sourcepath, cgpath,
1514 flags | MS_REMOUNT);
1515 ret = mount(sourcepath, cgpath, "cgroup", remount_flags, NULL);
1516 if (ret < 0) {
1517 SYSERROR("Failed to remount \"%s\" ro", cgpath);
1518 free(sourcepath);
1519 return -1;
1520 }
1521 INFO("Remounted %s read-only", cgpath);
1522 }
1523
1524 free(sourcepath);
1525 INFO("Completed second stage cgroup automounts for \"%s\"", cgpath);
1526 return 0;
1527 }
1528
1529 /* __cg_mount_direct
1530 *
1531 * Mount cgroup hierarchies directly without using bind-mounts. The main
1532 * uses-cases are mounting cgroup hierarchies in cgroup namespaces and mounting
1533 * cgroups for the LXC_AUTO_CGROUP_FULL option.
1534 */
1535 static int __cg_mount_direct(int type, struct hierarchy *h,
1536 const char *controllerpath)
1537 {
1538 int ret;
1539 char *controllers = NULL;
1540 char *fstype = "cgroup2";
1541 unsigned long flags = 0;
1542
1543 flags |= MS_NOSUID;
1544 flags |= MS_NOEXEC;
1545 flags |= MS_NODEV;
1546 flags |= MS_RELATIME;
1547
1548 if (type == LXC_AUTO_CGROUP_RO || type == LXC_AUTO_CGROUP_FULL_RO)
1549 flags |= MS_RDONLY;
1550
1551 if (h->version != CGROUP2_SUPER_MAGIC) {
1552 controllers = lxc_string_join(",", (const char **)h->controllers, false);
1553 if (!controllers)
1554 return -ENOMEM;
1555 fstype = "cgroup";
1556 }
1557
1558 ret = mount("cgroup", controllerpath, fstype, flags, controllers);
1559 free(controllers);
1560 if (ret < 0) {
1561 SYSERROR("Failed to mount \"%s\" with cgroup filesystem type %s", controllerpath, fstype);
1562 return -1;
1563 }
1564
1565 DEBUG("Mounted \"%s\" with cgroup filesystem type %s", controllerpath, fstype);
1566 return 0;
1567 }
1568
1569 static inline int cg_mount_in_cgroup_namespace(int type, struct hierarchy *h,
1570 const char *controllerpath)
1571 {
1572 return __cg_mount_direct(type, h, controllerpath);
1573 }
1574
1575 static inline int cg_mount_cgroup_full(int type, struct hierarchy *h,
1576 const char *controllerpath)
1577 {
1578 if (type < LXC_AUTO_CGROUP_FULL_RO || type > LXC_AUTO_CGROUP_FULL_MIXED)
1579 return 0;
1580
1581 return __cg_mount_direct(type, h, controllerpath);
1582 }
1583
1584 static bool cgfsng_mount(struct cgroup_ops *ops, struct lxc_handler *handler,
1585 const char *root, int type)
1586 {
1587 int i, ret;
1588 char *tmpfspath = NULL;
1589 bool has_cgns = false, retval = false, wants_force_mount = false;
1590
1591 if ((type & LXC_AUTO_CGROUP_MASK) == 0)
1592 return true;
1593
1594 if (type & LXC_AUTO_CGROUP_FORCE) {
1595 type &= ~LXC_AUTO_CGROUP_FORCE;
1596 wants_force_mount = true;
1597 }
1598
1599 if (!wants_force_mount){
1600 if (!lxc_list_empty(&handler->conf->keepcaps))
1601 wants_force_mount = !in_caplist(CAP_SYS_ADMIN, &handler->conf->keepcaps);
1602 else
1603 wants_force_mount = in_caplist(CAP_SYS_ADMIN, &handler->conf->caps);
1604 }
1605
1606 has_cgns = cgns_supported();
1607 if (has_cgns && !wants_force_mount)
1608 return true;
1609
1610 if (type == LXC_AUTO_CGROUP_NOSPEC)
1611 type = LXC_AUTO_CGROUP_MIXED;
1612 else if (type == LXC_AUTO_CGROUP_FULL_NOSPEC)
1613 type = LXC_AUTO_CGROUP_FULL_MIXED;
1614
1615 /* Mount tmpfs */
1616 tmpfspath = must_make_path(root, "/sys/fs/cgroup", NULL);
1617 ret = safe_mount(NULL, tmpfspath, "tmpfs",
1618 MS_NOSUID | MS_NODEV | MS_NOEXEC | MS_RELATIME,
1619 "size=10240k,mode=755", root);
1620 if (ret < 0)
1621 goto on_error;
1622
1623 for (i = 0; ops->hierarchies[i]; i++) {
1624 char *controllerpath, *path2;
1625 struct hierarchy *h = ops->hierarchies[i];
1626 char *controller = strrchr(h->mountpoint, '/');
1627
1628 if (!controller)
1629 continue;
1630 controller++;
1631
1632 controllerpath = must_make_path(tmpfspath, controller, NULL);
1633 if (dir_exists(controllerpath)) {
1634 free(controllerpath);
1635 continue;
1636 }
1637
1638 ret = mkdir(controllerpath, 0755);
1639 if (ret < 0) {
1640 SYSERROR("Error creating cgroup path: %s", controllerpath);
1641 free(controllerpath);
1642 goto on_error;
1643 }
1644
1645 if (has_cgns && wants_force_mount) {
1646 /* If cgroup namespaces are supported but the container
1647 * will not have CAP_SYS_ADMIN after it has started we
1648 * need to mount the cgroups manually.
1649 */
1650 ret = cg_mount_in_cgroup_namespace(type, h, controllerpath);
1651 free(controllerpath);
1652 if (ret < 0)
1653 goto on_error;
1654
1655 continue;
1656 }
1657
1658 ret = cg_mount_cgroup_full(type, h, controllerpath);
1659 if (ret < 0) {
1660 free(controllerpath);
1661 goto on_error;
1662 }
1663
1664 if (!cg_mount_needs_subdirs(type)) {
1665 free(controllerpath);
1666 continue;
1667 }
1668
1669 path2 = must_make_path(controllerpath, h->base_cgroup,
1670 ops->container_cgroup, NULL);
1671 ret = mkdir_p(path2, 0755);
1672 if (ret < 0) {
1673 free(controllerpath);
1674 free(path2);
1675 goto on_error;
1676 }
1677
1678 ret = cg_legacy_mount_controllers(type, h, controllerpath,
1679 path2, ops->container_cgroup);
1680 free(controllerpath);
1681 free(path2);
1682 if (ret < 0)
1683 goto on_error;
1684 }
1685 retval = true;
1686
1687 on_error:
1688 free(tmpfspath);
1689 return retval;
1690 }
1691
1692 static int recursive_count_nrtasks(char *dirname)
1693 {
1694 struct dirent *direntp;
1695 DIR *dir;
1696 int count = 0, ret;
1697 char *path;
1698
1699 dir = opendir(dirname);
1700 if (!dir)
1701 return 0;
1702
1703 while ((direntp = readdir(dir))) {
1704 struct stat mystat;
1705
1706 if (!strcmp(direntp->d_name, ".") ||
1707 !strcmp(direntp->d_name, ".."))
1708 continue;
1709
1710 path = must_make_path(dirname, direntp->d_name, NULL);
1711
1712 if (lstat(path, &mystat))
1713 goto next;
1714
1715 if (!S_ISDIR(mystat.st_mode))
1716 goto next;
1717
1718 count += recursive_count_nrtasks(path);
1719 next:
1720 free(path);
1721 }
1722
1723 path = must_make_path(dirname, "cgroup.procs", NULL);
1724 ret = lxc_count_file_lines(path);
1725 if (ret != -1)
1726 count += ret;
1727 free(path);
1728
1729 (void)closedir(dir);
1730
1731 return count;
1732 }
1733
1734 static int cgfsng_nrtasks(struct cgroup_ops *ops)
1735 {
1736 int count;
1737 char *path;
1738
1739 if (!ops->container_cgroup || !ops->hierarchies)
1740 return -1;
1741
1742 path = must_make_path(ops->hierarchies[0]->fullcgpath, NULL);
1743 count = recursive_count_nrtasks(path);
1744 free(path);
1745 return count;
1746 }
1747
1748 /* Only root needs to escape to the cgroup of its init. */
1749 static bool cgfsng_escape(const struct cgroup_ops *ops)
1750 {
1751 int i;
1752
1753 if (geteuid())
1754 return true;
1755
1756 for (i = 0; ops->hierarchies[i]; i++) {
1757 int ret;
1758 char *fullpath;
1759
1760 fullpath = must_make_path(ops->hierarchies[i]->mountpoint,
1761 ops->hierarchies[i]->base_cgroup,
1762 "cgroup.procs", NULL);
1763 ret = lxc_write_to_file(fullpath, "0", 2, false, 0666);
1764 if (ret != 0) {
1765 SYSERROR("Failed to escape to cgroup \"%s\"", fullpath);
1766 free(fullpath);
1767 return false;
1768 }
1769 free(fullpath);
1770 }
1771
1772 return true;
1773 }
1774
1775 static int cgfsng_num_hierarchies(struct cgroup_ops *ops)
1776 {
1777 int i;
1778
1779 for (i = 0; ops->hierarchies[i]; i++)
1780 ;
1781
1782 return i;
1783 }
1784
1785 static bool cgfsng_get_hierarchies(struct cgroup_ops *ops, int n, char ***out)
1786 {
1787 int i;
1788
1789 /* sanity check n */
1790 for (i = 0; i < n; i++)
1791 if (!ops->hierarchies[i])
1792 return false;
1793
1794 *out = ops->hierarchies[i]->controllers;
1795
1796 return true;
1797 }
1798
1799 #define THAWED "THAWED"
1800 #define THAWED_LEN (strlen(THAWED))
1801
1802 /* TODO: If the unified cgroup hierarchy grows a freezer controller this needs
1803 * to be adapted.
1804 */
1805 static bool cgfsng_unfreeze(struct cgroup_ops *ops)
1806 {
1807 int ret;
1808 char *fullpath;
1809 struct hierarchy *h;
1810
1811 h = get_hierarchy(ops, "freezer");
1812 if (!h)
1813 return false;
1814
1815 fullpath = must_make_path(h->fullcgpath, "freezer.state", NULL);
1816 ret = lxc_write_to_file(fullpath, THAWED, THAWED_LEN, false, 0666);
1817 free(fullpath);
1818 if (ret < 0)
1819 return false;
1820
1821 return true;
1822 }
1823
1824 static const char *cgfsng_get_cgroup(struct cgroup_ops *ops,
1825 const char *controller)
1826 {
1827 struct hierarchy *h;
1828
1829 h = get_hierarchy(ops, controller);
1830 if (!h) {
1831 WARN("Failed to find hierarchy for controller \"%s\"",
1832 controller ? controller : "(null)");
1833 return NULL;
1834 }
1835
1836 return h->fullcgpath ? h->fullcgpath + strlen(h->mountpoint) : NULL;
1837 }
1838
1839 /* Given a cgroup path returned from lxc_cmd_get_cgroup_path, build a full path,
1840 * which must be freed by the caller.
1841 */
1842 static inline char *build_full_cgpath_from_monitorpath(struct hierarchy *h,
1843 const char *inpath,
1844 const char *filename)
1845 {
1846 return must_make_path(h->mountpoint, inpath, filename, NULL);
1847 }
1848
1849 /* Technically, we're always at a delegation boundary here (This is especially
1850 * true when cgroup namespaces are available.). The reasoning is that in order
1851 * for us to have been able to start a container in the first place the root
1852 * cgroup must have been a leaf node. Now, either the container's init system
1853 * has populated the cgroup and kept it as a leaf node or it has created
1854 * subtrees. In the former case we will simply attach to the leaf node we
1855 * created when we started the container in the latter case we create our own
1856 * cgroup for the attaching process.
1857 */
1858 static int __cg_unified_attach(const struct hierarchy *h, const char *name,
1859 const char *lxcpath, const char *pidstr,
1860 size_t pidstr_len, const char *controller)
1861 {
1862 int ret;
1863 size_t len;
1864 int fret = -1, idx = 0;
1865 char *base_path = NULL, *container_cgroup = NULL, *full_path = NULL;
1866
1867 container_cgroup = lxc_cmd_get_cgroup_path(name, lxcpath, controller);
1868 /* not running */
1869 if (!container_cgroup)
1870 return 0;
1871
1872 base_path = must_make_path(h->mountpoint, container_cgroup, NULL);
1873 full_path = must_make_path(base_path, "cgroup.procs", NULL);
1874 /* cgroup is populated */
1875 ret = lxc_write_to_file(full_path, pidstr, pidstr_len, false, 0666);
1876 if (ret < 0 && errno != EBUSY)
1877 goto on_error;
1878
1879 if (ret == 0)
1880 goto on_success;
1881
1882 free(full_path);
1883
1884 len = strlen(base_path) + sizeof("/lxc-1000") - 1 +
1885 sizeof("/cgroup-procs") - 1;
1886 full_path = must_alloc(len + 1);
1887 do {
1888 if (idx)
1889 ret = snprintf(full_path, len + 1, "%s/lxc-%d",
1890 base_path, idx);
1891 else
1892 ret = snprintf(full_path, len + 1, "%s/lxc", base_path);
1893 if (ret < 0 || (size_t)ret >= len + 1)
1894 goto on_error;
1895
1896 ret = mkdir_p(full_path, 0755);
1897 if (ret < 0 && errno != EEXIST)
1898 goto on_error;
1899
1900 (void)strlcat(full_path, "/cgroup.procs", len + 1);
1901 ret = lxc_write_to_file(full_path, pidstr, len, false, 0666);
1902 if (ret == 0)
1903 goto on_success;
1904
1905 /* this is a non-leaf node */
1906 if (errno != EBUSY)
1907 goto on_error;
1908
1909 } while (++idx > 0 && idx < 1000);
1910
1911 on_success:
1912 if (idx < 1000)
1913 fret = 0;
1914
1915 on_error:
1916 free(base_path);
1917 free(container_cgroup);
1918 free(full_path);
1919
1920 return fret;
1921 }
1922
1923 static bool cgfsng_attach(struct cgroup_ops *ops, const char *name,
1924 const char *lxcpath, pid_t pid)
1925 {
1926 int i, len, ret;
1927 char pidstr[25];
1928
1929 len = snprintf(pidstr, 25, "%d", pid);
1930 if (len < 0 || len >= 25)
1931 return false;
1932
1933 for (i = 0; ops->hierarchies[i]; i++) {
1934 char *path;
1935 char *fullpath = NULL;
1936 struct hierarchy *h = ops->hierarchies[i];
1937
1938 if (h->version == CGROUP2_SUPER_MAGIC) {
1939 ret = __cg_unified_attach(h, name, lxcpath, pidstr, len,
1940 h->controllers[0]);
1941 if (ret < 0)
1942 return false;
1943
1944 continue;
1945 }
1946
1947 path = lxc_cmd_get_cgroup_path(name, lxcpath, h->controllers[0]);
1948 /* not running */
1949 if (!path)
1950 continue;
1951
1952 fullpath = build_full_cgpath_from_monitorpath(h, path, "cgroup.procs");
1953 free(path);
1954 ret = lxc_write_to_file(fullpath, pidstr, len, false, 0666);
1955 if (ret < 0) {
1956 SYSERROR("Failed to attach %d to %s", (int)pid, fullpath);
1957 free(fullpath);
1958 return false;
1959 }
1960 free(fullpath);
1961 }
1962
1963 return true;
1964 }
1965
1966 /* Called externally (i.e. from 'lxc-cgroup') to query cgroup limits. Here we
1967 * don't have a cgroup_data set up, so we ask the running container through the
1968 * commands API for the cgroup path.
1969 */
1970 static int cgfsng_get(struct cgroup_ops *ops, const char *filename, char *value,
1971 size_t len, const char *name, const char *lxcpath)
1972 {
1973 int ret = -1;
1974 size_t controller_len;
1975 char *controller, *p, *path;
1976 struct hierarchy *h;
1977
1978 controller_len = strlen(filename);
1979 controller = alloca(controller_len + 1);
1980 (void)strlcpy(controller, filename, controller_len + 1);
1981
1982 p = strchr(controller, '.');
1983 if (p)
1984 *p = '\0';
1985
1986 path = lxc_cmd_get_cgroup_path(name, lxcpath, controller);
1987 /* not running */
1988 if (!path)
1989 return -1;
1990
1991 h = get_hierarchy(ops, controller);
1992 if (h) {
1993 char *fullpath;
1994
1995 fullpath = build_full_cgpath_from_monitorpath(h, path, filename);
1996 ret = lxc_read_from_file(fullpath, value, len);
1997 free(fullpath);
1998 }
1999 free(path);
2000
2001 return ret;
2002 }
2003
2004 /* Called externally (i.e. from 'lxc-cgroup') to set new cgroup limits. Here we
2005 * don't have a cgroup_data set up, so we ask the running container through the
2006 * commands API for the cgroup path.
2007 */
2008 static int cgfsng_set(struct cgroup_ops *ops, const char *filename,
2009 const char *value, const char *name, const char *lxcpath)
2010 {
2011 int ret = -1;
2012 size_t controller_len;
2013 char *controller, *p, *path;
2014 struct hierarchy *h;
2015
2016 controller_len = strlen(filename);
2017 controller = alloca(controller_len + 1);
2018 (void)strlcpy(controller, filename, controller_len + 1);
2019
2020 p = strchr(controller, '.');
2021 if (p)
2022 *p = '\0';
2023
2024 path = lxc_cmd_get_cgroup_path(name, lxcpath, controller);
2025 /* not running */
2026 if (!path)
2027 return -1;
2028
2029 h = get_hierarchy(ops, controller);
2030 if (h) {
2031 char *fullpath;
2032
2033 fullpath = build_full_cgpath_from_monitorpath(h, path, filename);
2034 ret = lxc_write_to_file(fullpath, value, strlen(value), false, 0666);
2035 free(fullpath);
2036 }
2037 free(path);
2038
2039 return ret;
2040 }
2041
2042 /* take devices cgroup line
2043 * /dev/foo rwx
2044 * and convert it to a valid
2045 * type major:minor mode
2046 * line. Return <0 on error. Dest is a preallocated buffer long enough to hold
2047 * the output.
2048 */
2049 static int convert_devpath(const char *invalue, char *dest)
2050 {
2051 int n_parts;
2052 char *p, *path, type;
2053 unsigned long minor, major;
2054 struct stat sb;
2055 int ret = -EINVAL;
2056 char *mode = NULL;
2057
2058 path = must_copy_string(invalue);
2059
2060 /* Read path followed by mode. Ignore any trailing text.
2061 * A ' # comment' would be legal. Technically other text is not
2062 * legal, we could check for that if we cared to.
2063 */
2064 for (n_parts = 1, p = path; *p && n_parts < 3; p++) {
2065 if (*p != ' ')
2066 continue;
2067 *p = '\0';
2068
2069 if (n_parts != 1)
2070 break;
2071 p++;
2072 n_parts++;
2073
2074 while (*p == ' ')
2075 p++;
2076
2077 mode = p;
2078
2079 if (*p == '\0')
2080 goto out;
2081 }
2082
2083 if (n_parts == 1)
2084 goto out;
2085
2086 ret = stat(path, &sb);
2087 if (ret < 0)
2088 goto out;
2089
2090 mode_t m = sb.st_mode & S_IFMT;
2091 switch (m) {
2092 case S_IFBLK:
2093 type = 'b';
2094 break;
2095 case S_IFCHR:
2096 type = 'c';
2097 break;
2098 default:
2099 ERROR("Unsupported device type %i for \"%s\"", m, path);
2100 ret = -EINVAL;
2101 goto out;
2102 }
2103
2104 major = MAJOR(sb.st_rdev);
2105 minor = MINOR(sb.st_rdev);
2106 ret = snprintf(dest, 50, "%c %lu:%lu %s", type, major, minor, mode);
2107 if (ret < 0 || ret >= 50) {
2108 ERROR("Error on configuration value \"%c %lu:%lu %s\" (max 50 "
2109 "chars)", type, major, minor, mode);
2110 ret = -ENAMETOOLONG;
2111 goto out;
2112 }
2113 ret = 0;
2114
2115 out:
2116 free(path);
2117 return ret;
2118 }
2119
2120 /* Called from setup_limits - here we have the container's cgroup_data because
2121 * we created the cgroups.
2122 */
2123 static int cg_legacy_set_data(struct cgroup_ops *ops, const char *filename,
2124 const char *value)
2125 {
2126 size_t len;
2127 char *fullpath, *p;
2128 /* "b|c <2^64-1>:<2^64-1> r|w|m" = 47 chars max */
2129 char converted_value[50];
2130 struct hierarchy *h;
2131 int ret = 0;
2132 char *controller = NULL;
2133
2134 len = strlen(filename);
2135 controller = alloca(len + 1);
2136 (void)strlcpy(controller, filename, len + 1);
2137
2138 p = strchr(controller, '.');
2139 if (p)
2140 *p = '\0';
2141
2142 if (strcmp("devices.allow", filename) == 0 && value[0] == '/') {
2143 ret = convert_devpath(value, converted_value);
2144 if (ret < 0)
2145 return ret;
2146 value = converted_value;
2147 }
2148
2149 h = get_hierarchy(ops, controller);
2150 if (!h) {
2151 ERROR("Failed to setup limits for the \"%s\" controller. "
2152 "The controller seems to be unused by \"cgfsng\" cgroup "
2153 "driver or not enabled on the cgroup hierarchy",
2154 controller);
2155 errno = ENOENT;
2156 return -ENOENT;
2157 }
2158
2159 fullpath = must_make_path(h->fullcgpath, filename, NULL);
2160 ret = lxc_write_to_file(fullpath, value, strlen(value), false, 0666);
2161 free(fullpath);
2162 return ret;
2163 }
2164
2165 static bool __cg_legacy_setup_limits(struct cgroup_ops *ops,
2166 struct lxc_list *cgroup_settings,
2167 bool do_devices)
2168 {
2169 struct lxc_list *iterator, *next, *sorted_cgroup_settings;
2170 struct lxc_cgroup *cg;
2171 bool ret = false;
2172
2173 if (lxc_list_empty(cgroup_settings))
2174 return true;
2175
2176 sorted_cgroup_settings = sort_cgroup_settings(cgroup_settings);
2177 if (!sorted_cgroup_settings)
2178 return false;
2179
2180 lxc_list_for_each(iterator, sorted_cgroup_settings) {
2181 cg = iterator->elem;
2182
2183 if (do_devices == !strncmp("devices", cg->subsystem, 7)) {
2184 if (cg_legacy_set_data(ops, cg->subsystem, cg->value)) {
2185 if (do_devices && (errno == EACCES || errno == EPERM)) {
2186 WARN("Failed to set \"%s\" to \"%s\"",
2187 cg->subsystem, cg->value);
2188 continue;
2189 }
2190 WARN("Failed to set \"%s\" to \"%s\"",
2191 cg->subsystem, cg->value);
2192 goto out;
2193 }
2194 DEBUG("Set controller \"%s\" set to \"%s\"",
2195 cg->subsystem, cg->value);
2196 }
2197 }
2198
2199 ret = true;
2200 INFO("Limits for the legacy cgroup hierarchies have been setup");
2201 out:
2202 lxc_list_for_each_safe(iterator, sorted_cgroup_settings, next) {
2203 lxc_list_del(iterator);
2204 free(iterator);
2205 }
2206 free(sorted_cgroup_settings);
2207 return ret;
2208 }
2209
2210 static bool __cg_unified_setup_limits(struct cgroup_ops *ops,
2211 struct lxc_list *cgroup_settings)
2212 {
2213 struct lxc_list *iterator;
2214 struct hierarchy *h = ops->unified;
2215
2216 if (lxc_list_empty(cgroup_settings))
2217 return true;
2218
2219 if (!h)
2220 return false;
2221
2222 lxc_list_for_each(iterator, cgroup_settings) {
2223 int ret;
2224 char *fullpath;
2225 struct lxc_cgroup *cg = iterator->elem;
2226
2227 fullpath = must_make_path(h->fullcgpath, cg->subsystem, NULL);
2228 ret = lxc_write_to_file(fullpath, cg->value, strlen(cg->value), false, 0666);
2229 free(fullpath);
2230 if (ret < 0) {
2231 SYSERROR("Failed to set \"%s\" to \"%s\"",
2232 cg->subsystem, cg->value);
2233 return false;
2234 }
2235 TRACE("Set \"%s\" to \"%s\"", cg->subsystem, cg->value);
2236 }
2237
2238 INFO("Limits for the unified cgroup hierarchy have been setup");
2239 return true;
2240 }
2241
2242 static bool cgfsng_setup_limits(struct cgroup_ops *ops, struct lxc_conf *conf,
2243 bool do_devices)
2244 {
2245 bool bret;
2246
2247 bret = __cg_legacy_setup_limits(ops, &conf->cgroup, do_devices);
2248 if (!bret)
2249 return false;
2250
2251 return __cg_unified_setup_limits(ops, &conf->cgroup2);
2252 }
2253
2254 /* At startup, parse_hierarchies finds all the info we need about cgroup
2255 * mountpoints and current cgroups, and stores it in @d.
2256 */
2257 static bool cg_hybrid_init(struct cgroup_ops *ops)
2258 {
2259 int ret;
2260 char *basecginfo;
2261 bool will_escape;
2262 FILE *f;
2263 size_t len = 0;
2264 char *line = NULL;
2265 char **klist = NULL, **nlist = NULL;
2266
2267 /* Root spawned containers escape the current cgroup, so use init's
2268 * cgroups as our base in that case.
2269 */
2270 will_escape = (geteuid() == 0);
2271 if (will_escape)
2272 basecginfo = read_file("/proc/1/cgroup");
2273 else
2274 basecginfo = read_file("/proc/self/cgroup");
2275 if (!basecginfo)
2276 return false;
2277
2278 ret = get_existing_subsystems(&klist, &nlist);
2279 if (ret < 0) {
2280 ERROR("Failed to retrieve available legacy cgroup controllers");
2281 free(basecginfo);
2282 return false;
2283 }
2284
2285 f = fopen("/proc/self/mountinfo", "r");
2286 if (!f) {
2287 ERROR("Failed to open \"/proc/self/mountinfo\"");
2288 free(basecginfo);
2289 return false;
2290 }
2291
2292 lxc_cgfsng_print_basecg_debuginfo(basecginfo, klist, nlist);
2293
2294 while (getline(&line, &len, f) != -1) {
2295 int type;
2296 bool writeable;
2297 struct hierarchy *new;
2298 char *base_cgroup = NULL, *mountpoint = NULL;
2299 char **controller_list = NULL;
2300
2301 type = get_cgroup_version(line);
2302 if (type == 0)
2303 continue;
2304
2305 if (type == CGROUP2_SUPER_MAGIC && ops->unified)
2306 continue;
2307
2308 if (ops->cgroup_layout == CGROUP_LAYOUT_UNKNOWN) {
2309 if (type == CGROUP2_SUPER_MAGIC)
2310 ops->cgroup_layout = CGROUP_LAYOUT_UNIFIED;
2311 else if (type == CGROUP_SUPER_MAGIC)
2312 ops->cgroup_layout = CGROUP_LAYOUT_LEGACY;
2313 } else if (ops->cgroup_layout == CGROUP_LAYOUT_UNIFIED) {
2314 if (type == CGROUP_SUPER_MAGIC)
2315 ops->cgroup_layout = CGROUP_LAYOUT_HYBRID;
2316 } else if (ops->cgroup_layout == CGROUP_LAYOUT_LEGACY) {
2317 if (type == CGROUP2_SUPER_MAGIC)
2318 ops->cgroup_layout = CGROUP_LAYOUT_HYBRID;
2319 }
2320
2321 controller_list = cg_hybrid_get_controllers(klist, nlist, line, type);
2322 if (!controller_list && type == CGROUP_SUPER_MAGIC)
2323 continue;
2324
2325 if (type == CGROUP_SUPER_MAGIC)
2326 if (controller_list_is_dup(ops->hierarchies, controller_list))
2327 goto next;
2328
2329 mountpoint = cg_hybrid_get_mountpoint(line);
2330 if (!mountpoint) {
2331 ERROR("Failed parsing mountpoint from \"%s\"", line);
2332 goto next;
2333 }
2334
2335 if (type == CGROUP_SUPER_MAGIC)
2336 base_cgroup = cg_hybrid_get_current_cgroup(basecginfo, controller_list[0], CGROUP_SUPER_MAGIC);
2337 else
2338 base_cgroup = cg_hybrid_get_current_cgroup(basecginfo, NULL, CGROUP2_SUPER_MAGIC);
2339 if (!base_cgroup) {
2340 ERROR("Failed to find current cgroup");
2341 goto next;
2342 }
2343
2344 trim(base_cgroup);
2345 prune_init_scope(base_cgroup);
2346 if (type == CGROUP2_SUPER_MAGIC)
2347 writeable = test_writeable_v2(mountpoint, base_cgroup);
2348 else
2349 writeable = test_writeable_v1(mountpoint, base_cgroup);
2350 if (!writeable)
2351 goto next;
2352
2353 if (type == CGROUP2_SUPER_MAGIC) {
2354 char *cgv2_ctrl_path;
2355
2356 cgv2_ctrl_path = must_make_path(mountpoint, base_cgroup,
2357 "cgroup.controllers",
2358 NULL);
2359
2360 controller_list = cg_unified_get_controllers(cgv2_ctrl_path);
2361 free(cgv2_ctrl_path);
2362 if (!controller_list) {
2363 controller_list = cg_unified_make_empty_controller();
2364 TRACE("No controllers are enabled for "
2365 "delegation in the unified hierarchy");
2366 }
2367 }
2368
2369 new = add_hierarchy(&ops->hierarchies, controller_list, mountpoint, base_cgroup, type);
2370 if (type == CGROUP2_SUPER_MAGIC && !ops->unified)
2371 ops->unified = new;
2372
2373 continue;
2374
2375 next:
2376 free_string_list(controller_list);
2377 free(mountpoint);
2378 free(base_cgroup);
2379 }
2380
2381 free_string_list(klist);
2382 free_string_list(nlist);
2383
2384 free(basecginfo);
2385
2386 fclose(f);
2387 free(line);
2388
2389 TRACE("Writable cgroup hierarchies:");
2390 lxc_cgfsng_print_hierarchies(ops);
2391
2392 /* verify that all controllers in cgroup.use and all crucial
2393 * controllers are accounted for
2394 */
2395 if (!all_controllers_found(ops))
2396 return false;
2397
2398 return true;
2399 }
2400
2401 static int cg_is_pure_unified(void)
2402 {
2403
2404 int ret;
2405 struct statfs fs;
2406
2407 ret = statfs("/sys/fs/cgroup", &fs);
2408 if (ret < 0)
2409 return -ENOMEDIUM;
2410
2411 if (is_fs_type(&fs, CGROUP2_SUPER_MAGIC))
2412 return CGROUP2_SUPER_MAGIC;
2413
2414 return 0;
2415 }
2416
2417 /* Get current cgroup from /proc/self/cgroup for the cgroupfs v2 hierarchy. */
2418 static char *cg_unified_get_current_cgroup(void)
2419 {
2420 char *basecginfo, *base_cgroup;
2421 bool will_escape;
2422 char *copy = NULL;
2423
2424 will_escape = (geteuid() == 0);
2425 if (will_escape)
2426 basecginfo = read_file("/proc/1/cgroup");
2427 else
2428 basecginfo = read_file("/proc/self/cgroup");
2429 if (!basecginfo)
2430 return NULL;
2431
2432 base_cgroup = strstr(basecginfo, "0::/");
2433 if (!base_cgroup)
2434 goto cleanup_on_err;
2435
2436 base_cgroup = base_cgroup + 3;
2437 copy = copy_to_eol(base_cgroup);
2438 if (!copy)
2439 goto cleanup_on_err;
2440
2441 cleanup_on_err:
2442 free(basecginfo);
2443 if (copy)
2444 trim(copy);
2445
2446 return copy;
2447 }
2448
2449 static int cg_unified_init(struct cgroup_ops *ops)
2450 {
2451 int ret;
2452 char *mountpoint, *subtree_path;
2453 char **delegatable;
2454 char *base_cgroup = NULL;
2455
2456 ret = cg_is_pure_unified();
2457 if (ret == -ENOMEDIUM)
2458 return -ENOMEDIUM;
2459
2460 if (ret != CGROUP2_SUPER_MAGIC)
2461 return 0;
2462
2463 base_cgroup = cg_unified_get_current_cgroup();
2464 if (!base_cgroup)
2465 return -EINVAL;
2466 prune_init_scope(base_cgroup);
2467
2468 /* We assume that we have already been given controllers to delegate
2469 * further down the hierarchy. If not it is up to the user to delegate
2470 * them to us.
2471 */
2472 mountpoint = must_copy_string("/sys/fs/cgroup");
2473 subtree_path = must_make_path(mountpoint, base_cgroup,
2474 "cgroup.subtree_control", NULL);
2475 delegatable = cg_unified_get_controllers(subtree_path);
2476 free(subtree_path);
2477 if (!delegatable)
2478 delegatable = cg_unified_make_empty_controller();
2479 if (!delegatable[0])
2480 TRACE("No controllers are enabled for delegation");
2481
2482 /* TODO: If the user requested specific controllers via lxc.cgroup.use
2483 * we should verify here. The reason I'm not doing it right is that I'm
2484 * not convinced that lxc.cgroup.use will be the future since it is a
2485 * global property. I much rather have an option that lets you request
2486 * controllers per container.
2487 */
2488
2489 add_hierarchy(&ops->hierarchies, delegatable, mountpoint, base_cgroup, CGROUP2_SUPER_MAGIC);
2490
2491 ops->cgroup_layout = CGROUP_LAYOUT_UNIFIED;
2492 return CGROUP2_SUPER_MAGIC;
2493 }
2494
2495 static bool cg_init(struct cgroup_ops *ops)
2496 {
2497 int ret;
2498 const char *tmp;
2499
2500 tmp = lxc_global_config_value("lxc.cgroup.use");
2501 if (tmp)
2502 ops->cgroup_use = must_copy_string(tmp);
2503
2504 ret = cg_unified_init(ops);
2505 if (ret < 0)
2506 return false;
2507
2508 if (ret == CGROUP2_SUPER_MAGIC)
2509 return true;
2510
2511 return cg_hybrid_init(ops);
2512 }
2513
2514 static bool cgfsng_data_init(struct cgroup_ops *ops)
2515 {
2516 const char *cgroup_pattern;
2517
2518 /* copy system-wide cgroup information */
2519 cgroup_pattern = lxc_global_config_value("lxc.cgroup.pattern");
2520 if (!cgroup_pattern) {
2521 /* lxc.cgroup.pattern is only NULL on error. */
2522 ERROR("Failed to retrieve cgroup pattern");
2523 return false;
2524 }
2525 ops->cgroup_pattern = must_copy_string(cgroup_pattern);
2526
2527 return true;
2528 }
2529
2530 struct cgroup_ops *cgfsng_ops_init(void)
2531 {
2532 struct cgroup_ops *cgfsng_ops;
2533
2534 cgfsng_ops = malloc(sizeof(struct cgroup_ops));
2535 if (!cgfsng_ops)
2536 return NULL;
2537
2538 memset(cgfsng_ops, 0, sizeof(struct cgroup_ops));
2539 cgfsng_ops->cgroup_layout = CGROUP_LAYOUT_UNKNOWN;
2540
2541 if (!cg_init(cgfsng_ops)) {
2542 free(cgfsng_ops);
2543 return NULL;
2544 }
2545
2546 cgfsng_ops->data_init = cgfsng_data_init;
2547 cgfsng_ops->destroy = cgfsng_destroy;
2548 cgfsng_ops->create = cgfsng_create;
2549 cgfsng_ops->enter = cgfsng_enter;
2550 cgfsng_ops->escape = cgfsng_escape;
2551 cgfsng_ops->num_hierarchies = cgfsng_num_hierarchies;
2552 cgfsng_ops->get_hierarchies = cgfsng_get_hierarchies;
2553 cgfsng_ops->get_cgroup = cgfsng_get_cgroup;
2554 cgfsng_ops->get = cgfsng_get;
2555 cgfsng_ops->set = cgfsng_set;
2556 cgfsng_ops->unfreeze = cgfsng_unfreeze;
2557 cgfsng_ops->setup_limits = cgfsng_setup_limits;
2558 cgfsng_ops->driver = "cgfsng";
2559 cgfsng_ops->version = "1.0.0";
2560 cgfsng_ops->attach = cgfsng_attach;
2561 cgfsng_ops->chown = cgfsng_chown;
2562 cgfsng_ops->mount = cgfsng_mount;
2563 cgfsng_ops->nrtasks = cgfsng_nrtasks;
2564
2565 return cgfsng_ops;
2566 }