]> git.proxmox.com Git - mirror_lxc.git/blob - src/lxc/cgroups/cgfsng.c
cgfsng: mark ops with __cgfsng_ops__ attribute
[mirror_lxc.git] / src / lxc / cgroups / cgfsng.c
1 /*
2 * lxc: linux Container library
3 *
4 * Copyright © 2016 Canonical Ltd.
5 *
6 * Authors:
7 * Serge Hallyn <serge.hallyn@ubuntu.com>
8 * Christian Brauner <christian.brauner@ubuntu.com>
9 *
10 * This library is free software; you can redistribute it and/or
11 * modify it under the terms of the GNU Lesser General Public
12 * License as published by the Free Software Foundation; either
13 * version 2.1 of the License, or (at your option) any later version.
14 *
15 * This library is distributed in the hope that it will be useful,
16 * but WITHOUT ANY WARRANTY; without even the implied warranty of
17 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
18 * Lesser General Public License for more details.
19 *
20 * You should have received a copy of the GNU Lesser General Public
21 * License along with this library; if not, write to the Free Software
22 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
23 */
24
25 /*
26 * cgfs-ng.c: this is a new, simplified implementation of a filesystem
27 * cgroup backend. The original cgfs.c was designed to be as flexible
28 * as possible. It would try to find cgroup filesystems no matter where
29 * or how you had them mounted, and deduce the most usable mount for
30 * each controller.
31 *
32 * This new implementation assumes that cgroup filesystems are mounted
33 * under /sys/fs/cgroup/clist where clist is either the controller, or
34 * a comman-separated list of controllers.
35 */
36
37 #include "config.h"
38
39 #include <ctype.h>
40 #include <dirent.h>
41 #include <errno.h>
42 #include <grp.h>
43 #include <stdint.h>
44 #include <stdio.h>
45 #include <stdlib.h>
46 #include <string.h>
47 #include <unistd.h>
48 #include <linux/kdev_t.h>
49 #include <linux/types.h>
50 #include <sys/types.h>
51
52 #include "caps.h"
53 #include "cgroup.h"
54 #include "cgroup_utils.h"
55 #include "commands.h"
56 #include "conf.h"
57 #include "log.h"
58 #include "macro.h"
59 #include "storage/storage.h"
60 #include "utils.h"
61
62 #ifndef HAVE_STRLCPY
63 #include "include/strlcpy.h"
64 #endif
65
66 #ifndef HAVE_STRLCAT
67 #include "include/strlcat.h"
68 #endif
69
70 #define __cgfsng_ops__
71
72 lxc_log_define(cgfsng, cgroup);
73
74 static void free_string_list(char **clist)
75 {
76 int i;
77
78 if (!clist)
79 return;
80
81 for (i = 0; clist[i]; i++)
82 free(clist[i]);
83
84 free(clist);
85 }
86
87 /* Allocate a pointer, do not fail. */
88 static void *must_alloc(size_t sz)
89 {
90 return must_realloc(NULL, sz);
91 }
92
93 /* Given a pointer to a null-terminated array of pointers, realloc to add one
94 * entry, and point the new entry to NULL. Do not fail. Return the index to the
95 * second-to-last entry - that is, the one which is now available for use
96 * (keeping the list null-terminated).
97 */
98 static int append_null_to_list(void ***list)
99 {
100 int newentry = 0;
101
102 if (*list)
103 for (; (*list)[newentry]; newentry++)
104 ;
105
106 *list = must_realloc(*list, (newentry + 2) * sizeof(void **));
107 (*list)[newentry + 1] = NULL;
108 return newentry;
109 }
110
111 /* Given a null-terminated array of strings, check whether @entry is one of the
112 * strings.
113 */
114 static bool string_in_list(char **list, const char *entry)
115 {
116 int i;
117
118 if (!list)
119 return false;
120
121 for (i = 0; list[i]; i++)
122 if (strcmp(list[i], entry) == 0)
123 return true;
124
125 return false;
126 }
127
128 /* Return a copy of @entry prepending "name=", i.e. turn "systemd" into
129 * "name=systemd". Do not fail.
130 */
131 static char *cg_legacy_must_prefix_named(char *entry)
132 {
133 size_t len;
134 char *prefixed;
135
136 len = strlen(entry);
137 prefixed = must_alloc(len + 6);
138
139 memcpy(prefixed, "name=", sizeof("name=") - 1);
140 memcpy(prefixed + sizeof("name=") - 1, entry, len);
141 prefixed[len + 5] = '\0';
142 return prefixed;
143 }
144
145 /* Append an entry to the clist. Do not fail. @clist must be NULL the first time
146 * we are called.
147 *
148 * We also handle named subsystems here. Any controller which is not a kernel
149 * subsystem, we prefix "name=". Any which is both a kernel and named subsystem,
150 * we refuse to use because we're not sure which we have here.
151 * (TODO: We could work around this in some cases by just remounting to be
152 * unambiguous, or by comparing mountpoint contents with current cgroup.)
153 *
154 * The last entry will always be NULL.
155 */
156 static void must_append_controller(char **klist, char **nlist, char ***clist,
157 char *entry)
158 {
159 int newentry;
160 char *copy;
161
162 if (string_in_list(klist, entry) && string_in_list(nlist, entry)) {
163 ERROR("Refusing to use ambiguous controller \"%s\"", entry);
164 ERROR("It is both a named and kernel subsystem");
165 return;
166 }
167
168 newentry = append_null_to_list((void ***)clist);
169
170 if (strncmp(entry, "name=", 5) == 0)
171 copy = must_copy_string(entry);
172 else if (string_in_list(klist, entry))
173 copy = must_copy_string(entry);
174 else
175 copy = cg_legacy_must_prefix_named(entry);
176
177 (*clist)[newentry] = copy;
178 }
179
180 /* Given a handler's cgroup data, return the struct hierarchy for the controller
181 * @c, or NULL if there is none.
182 */
183 struct hierarchy *get_hierarchy(struct cgroup_ops *ops, const char *c)
184 {
185 int i;
186
187 if (!ops->hierarchies)
188 return NULL;
189
190 for (i = 0; ops->hierarchies[i]; i++) {
191 if (!c) {
192 /* This is the empty unified hierarchy. */
193 if (ops->hierarchies[i]->controllers &&
194 !ops->hierarchies[i]->controllers[0])
195 return ops->hierarchies[i];
196
197 continue;
198 }
199
200 if (string_in_list(ops->hierarchies[i]->controllers, c))
201 return ops->hierarchies[i];
202 }
203
204 return NULL;
205 }
206
207 #define BATCH_SIZE 50
208 static void batch_realloc(char **mem, size_t oldlen, size_t newlen)
209 {
210 int newbatches = (newlen / BATCH_SIZE) + 1;
211 int oldbatches = (oldlen / BATCH_SIZE) + 1;
212
213 if (!*mem || newbatches > oldbatches) {
214 *mem = must_realloc(*mem, newbatches * BATCH_SIZE);
215 }
216 }
217
218 static void append_line(char **dest, size_t oldlen, char *new, size_t newlen)
219 {
220 size_t full = oldlen + newlen;
221
222 batch_realloc(dest, oldlen, full + 1);
223
224 memcpy(*dest + oldlen, new, newlen + 1);
225 }
226
227 /* Slurp in a whole file */
228 static char *read_file(const char *fnam)
229 {
230 FILE *f;
231 char *line = NULL, *buf = NULL;
232 size_t len = 0, fulllen = 0;
233 int linelen;
234
235 f = fopen(fnam, "r");
236 if (!f)
237 return NULL;
238 while ((linelen = getline(&line, &len, f)) != -1) {
239 append_line(&buf, fulllen, line, linelen);
240 fulllen += linelen;
241 }
242 fclose(f);
243 free(line);
244 return buf;
245 }
246
247 /* Taken over modified from the kernel sources. */
248 #define NBITS 32 /* bits in uint32_t */
249 #define DIV_ROUND_UP(n, d) (((n) + (d)-1) / (d))
250 #define BITS_TO_LONGS(nr) DIV_ROUND_UP(nr, NBITS)
251
252 static void set_bit(unsigned bit, uint32_t *bitarr)
253 {
254 bitarr[bit / NBITS] |= (1 << (bit % NBITS));
255 }
256
257 static void clear_bit(unsigned bit, uint32_t *bitarr)
258 {
259 bitarr[bit / NBITS] &= ~(1 << (bit % NBITS));
260 }
261
262 static bool is_set(unsigned bit, uint32_t *bitarr)
263 {
264 return (bitarr[bit / NBITS] & (1 << (bit % NBITS))) != 0;
265 }
266
267 /* Create cpumask from cpulist aka turn:
268 *
269 * 0,2-3
270 *
271 * into bit array
272 *
273 * 1 0 1 1
274 */
275 static uint32_t *lxc_cpumask(char *buf, size_t nbits)
276 {
277 char *token;
278 size_t arrlen;
279 uint32_t *bitarr;
280
281 arrlen = BITS_TO_LONGS(nbits);
282 bitarr = calloc(arrlen, sizeof(uint32_t));
283 if (!bitarr)
284 return NULL;
285
286 lxc_iterate_parts(token, buf, ",") {
287 errno = 0;
288 unsigned end, start;
289 char *range;
290
291 start = strtoul(token, NULL, 0);
292 end = start;
293 range = strchr(token, '-');
294 if (range)
295 end = strtoul(range + 1, NULL, 0);
296
297 if (!(start <= end)) {
298 free(bitarr);
299 return NULL;
300 }
301
302 if (end >= nbits) {
303 free(bitarr);
304 return NULL;
305 }
306
307 while (start <= end)
308 set_bit(start++, bitarr);
309 }
310
311 return bitarr;
312 }
313
314 /* Turn cpumask into simple, comma-separated cpulist. */
315 static char *lxc_cpumask_to_cpulist(uint32_t *bitarr, size_t nbits)
316 {
317 int ret;
318 size_t i;
319 char **cpulist = NULL;
320 char numstr[INTTYPE_TO_STRLEN(size_t)] = {0};
321
322 for (i = 0; i <= nbits; i++) {
323 if (!is_set(i, bitarr))
324 continue;
325
326 ret = snprintf(numstr, sizeof(numstr), "%zu", i);
327 if (ret < 0 || (size_t)ret >= sizeof(numstr)) {
328 lxc_free_array((void **)cpulist, free);
329 return NULL;
330 }
331
332 ret = lxc_append_string(&cpulist, numstr);
333 if (ret < 0) {
334 lxc_free_array((void **)cpulist, free);
335 return NULL;
336 }
337 }
338
339 if (!cpulist)
340 return NULL;
341
342 return lxc_string_join(",", (const char **)cpulist, false);
343 }
344
345 static ssize_t get_max_cpus(char *cpulist)
346 {
347 char *c1, *c2;
348 char *maxcpus = cpulist;
349 size_t cpus = 0;
350
351 c1 = strrchr(maxcpus, ',');
352 if (c1)
353 c1++;
354
355 c2 = strrchr(maxcpus, '-');
356 if (c2)
357 c2++;
358
359 if (!c1 && !c2)
360 c1 = maxcpus;
361 else if (c1 > c2)
362 c2 = c1;
363 else if (c1 < c2)
364 c1 = c2;
365 else if (!c1 && c2)
366 c1 = c2;
367
368 errno = 0;
369 cpus = strtoul(c1, NULL, 0);
370 if (errno != 0)
371 return -1;
372
373 return cpus;
374 }
375
376 #define __ISOL_CPUS "/sys/devices/system/cpu/isolated"
377 static bool cg_legacy_filter_and_set_cpus(char *path, bool am_initialized)
378 {
379 int ret;
380 ssize_t i;
381 char *lastslash, *fpath, oldv;
382 ssize_t maxisol = 0, maxposs = 0;
383 char *cpulist = NULL, *isolcpus = NULL, *posscpus = NULL;
384 uint32_t *isolmask = NULL, *possmask = NULL;
385 bool bret = false, flipped_bit = false;
386
387 lastslash = strrchr(path, '/');
388 if (!lastslash) {
389 ERROR("Failed to detect \"/\" in \"%s\"", path);
390 return bret;
391 }
392 oldv = *lastslash;
393 *lastslash = '\0';
394 fpath = must_make_path(path, "cpuset.cpus", NULL);
395 posscpus = read_file(fpath);
396 if (!posscpus) {
397 SYSERROR("Failed to read file \"%s\"", fpath);
398 goto on_error;
399 }
400
401 /* Get maximum number of cpus found in possible cpuset. */
402 maxposs = get_max_cpus(posscpus);
403 if (maxposs < 0 || maxposs >= INT_MAX - 1)
404 goto on_error;
405
406 if (!file_exists(__ISOL_CPUS)) {
407 /* This system doesn't expose isolated cpus. */
408 DEBUG("The path \""__ISOL_CPUS"\" to read isolated cpus from does not exist");
409 cpulist = posscpus;
410 /* No isolated cpus but we weren't already initialized by
411 * someone. We should simply copy the parents cpuset.cpus
412 * values.
413 */
414 if (!am_initialized) {
415 DEBUG("Copying cpu settings of parent cgroup");
416 goto copy_parent;
417 }
418 /* No isolated cpus but we were already initialized by someone.
419 * Nothing more to do for us.
420 */
421 goto on_success;
422 }
423
424 isolcpus = read_file(__ISOL_CPUS);
425 if (!isolcpus) {
426 SYSERROR("Failed to read file \""__ISOL_CPUS"\"");
427 goto on_error;
428 }
429 if (!isdigit(isolcpus[0])) {
430 TRACE("No isolated cpus detected");
431 cpulist = posscpus;
432 /* No isolated cpus but we weren't already initialized by
433 * someone. We should simply copy the parents cpuset.cpus
434 * values.
435 */
436 if (!am_initialized) {
437 DEBUG("Copying cpu settings of parent cgroup");
438 goto copy_parent;
439 }
440 /* No isolated cpus but we were already initialized by someone.
441 * Nothing more to do for us.
442 */
443 goto on_success;
444 }
445
446 /* Get maximum number of cpus found in isolated cpuset. */
447 maxisol = get_max_cpus(isolcpus);
448 if (maxisol < 0 || maxisol >= INT_MAX - 1)
449 goto on_error;
450
451 if (maxposs < maxisol)
452 maxposs = maxisol;
453 maxposs++;
454
455 possmask = lxc_cpumask(posscpus, maxposs);
456 if (!possmask) {
457 ERROR("Failed to create cpumask for possible cpus");
458 goto on_error;
459 }
460
461 isolmask = lxc_cpumask(isolcpus, maxposs);
462 if (!isolmask) {
463 ERROR("Failed to create cpumask for isolated cpus");
464 goto on_error;
465 }
466
467 for (i = 0; i <= maxposs; i++) {
468 if (!is_set(i, isolmask) || !is_set(i, possmask))
469 continue;
470
471 flipped_bit = true;
472 clear_bit(i, possmask);
473 }
474
475 if (!flipped_bit) {
476 DEBUG("No isolated cpus present in cpuset");
477 goto on_success;
478 }
479 DEBUG("Removed isolated cpus from cpuset");
480
481 cpulist = lxc_cpumask_to_cpulist(possmask, maxposs);
482 if (!cpulist) {
483 ERROR("Failed to create cpu list");
484 goto on_error;
485 }
486
487 copy_parent:
488 *lastslash = oldv;
489 free(fpath);
490 fpath = must_make_path(path, "cpuset.cpus", NULL);
491 ret = lxc_write_to_file(fpath, cpulist, strlen(cpulist), false, 0666);
492 if (ret < 0) {
493 SYSERROR("Failed to write cpu list to \"%s\"", fpath);
494 goto on_error;
495 }
496
497 on_success:
498 bret = true;
499
500 on_error:
501 free(fpath);
502
503 free(isolcpus);
504 free(isolmask);
505
506 if (posscpus != cpulist)
507 free(posscpus);
508 free(possmask);
509
510 free(cpulist);
511 return bret;
512 }
513
514 /* Copy contents of parent(@path)/@file to @path/@file */
515 static bool copy_parent_file(char *path, char *file)
516 {
517 int ret;
518 char *fpath, *lastslash, oldv;
519 int len = 0;
520 char *value = NULL;
521
522 lastslash = strrchr(path, '/');
523 if (!lastslash) {
524 ERROR("Failed to detect \"/\" in \"%s\"", path);
525 return false;
526 }
527 oldv = *lastslash;
528 *lastslash = '\0';
529 fpath = must_make_path(path, file, NULL);
530 len = lxc_read_from_file(fpath, NULL, 0);
531 if (len <= 0)
532 goto on_error;
533
534 value = must_alloc(len + 1);
535 ret = lxc_read_from_file(fpath, value, len);
536 if (ret != len)
537 goto on_error;
538 free(fpath);
539
540 *lastslash = oldv;
541 fpath = must_make_path(path, file, NULL);
542 ret = lxc_write_to_file(fpath, value, len, false, 0666);
543 if (ret < 0)
544 SYSERROR("Failed to write \"%s\" to file \"%s\"", value, fpath);
545 free(fpath);
546 free(value);
547 return ret >= 0;
548
549 on_error:
550 SYSERROR("Failed to read file \"%s\"", fpath);
551 free(fpath);
552 free(value);
553 return false;
554 }
555
556 /* Initialize the cpuset hierarchy in first directory of @gname and set
557 * cgroup.clone_children so that children inherit settings. Since the
558 * h->base_path is populated by init or ourselves, we know it is already
559 * initialized.
560 */
561 static bool cg_legacy_handle_cpuset_hierarchy(struct hierarchy *h, char *cgname)
562 {
563 int ret;
564 char v;
565 char *cgpath, *clonechildrenpath, *slash;
566
567 if (!string_in_list(h->controllers, "cpuset"))
568 return true;
569
570 if (*cgname == '/')
571 cgname++;
572 slash = strchr(cgname, '/');
573 if (slash)
574 *slash = '\0';
575
576 cgpath = must_make_path(h->mountpoint, h->base_cgroup, cgname, NULL);
577 if (slash)
578 *slash = '/';
579
580 ret = mkdir(cgpath, 0755);
581 if (ret < 0) {
582 if (errno != EEXIST) {
583 SYSERROR("Failed to create directory \"%s\"", cgpath);
584 free(cgpath);
585 return false;
586 }
587 }
588
589 clonechildrenpath =
590 must_make_path(cgpath, "cgroup.clone_children", NULL);
591 /* unified hierarchy doesn't have clone_children */
592 if (!file_exists(clonechildrenpath)) {
593 free(clonechildrenpath);
594 free(cgpath);
595 return true;
596 }
597
598 ret = lxc_read_from_file(clonechildrenpath, &v, 1);
599 if (ret < 0) {
600 SYSERROR("Failed to read file \"%s\"", clonechildrenpath);
601 free(clonechildrenpath);
602 free(cgpath);
603 return false;
604 }
605
606 /* Make sure any isolated cpus are removed from cpuset.cpus. */
607 if (!cg_legacy_filter_and_set_cpus(cgpath, v == '1')) {
608 SYSERROR("Failed to remove isolated cpus");
609 free(clonechildrenpath);
610 free(cgpath);
611 return false;
612 }
613
614 /* Already set for us by someone else. */
615 if (v == '1') {
616 DEBUG("\"cgroup.clone_children\" was already set to \"1\"");
617 free(clonechildrenpath);
618 free(cgpath);
619 return true;
620 }
621
622 /* copy parent's settings */
623 if (!copy_parent_file(cgpath, "cpuset.mems")) {
624 SYSERROR("Failed to copy \"cpuset.mems\" settings");
625 free(cgpath);
626 free(clonechildrenpath);
627 return false;
628 }
629 free(cgpath);
630
631 ret = lxc_write_to_file(clonechildrenpath, "1", 1, false, 0666);
632 if (ret < 0) {
633 /* Set clone_children so children inherit our settings */
634 SYSERROR("Failed to write 1 to \"%s\"", clonechildrenpath);
635 free(clonechildrenpath);
636 return false;
637 }
638 free(clonechildrenpath);
639 return true;
640 }
641
642 /* Given two null-terminated lists of strings, return true if any string is in
643 * both.
644 */
645 static bool controller_lists_intersect(char **l1, char **l2)
646 {
647 int i;
648
649 if (!l1 || !l2)
650 return false;
651
652 for (i = 0; l1[i]; i++) {
653 if (string_in_list(l2, l1[i]))
654 return true;
655 }
656
657 return false;
658 }
659
660 /* For a null-terminated list of controllers @clist, return true if any of those
661 * controllers is already listed the null-terminated list of hierarchies @hlist.
662 * Realistically, if one is present, all must be present.
663 */
664 static bool controller_list_is_dup(struct hierarchy **hlist, char **clist)
665 {
666 int i;
667
668 if (!hlist)
669 return false;
670
671 for (i = 0; hlist[i]; i++)
672 if (controller_lists_intersect(hlist[i]->controllers, clist))
673 return true;
674
675 return false;
676 }
677
678 /* Return true if the controller @entry is found in the null-terminated list of
679 * hierarchies @hlist.
680 */
681 static bool controller_found(struct hierarchy **hlist, char *entry)
682 {
683 int i;
684
685 if (!hlist)
686 return false;
687
688 for (i = 0; hlist[i]; i++)
689 if (string_in_list(hlist[i]->controllers, entry))
690 return true;
691
692 return false;
693 }
694
695 /* Return true if all of the controllers which we require have been found. The
696 * required list is freezer and anything in lxc.cgroup.use.
697 */
698 static bool all_controllers_found(struct cgroup_ops *ops)
699 {
700 char **cur;
701 struct hierarchy **hlist = ops->hierarchies;
702
703 if (!controller_found(hlist, "freezer")) {
704 ERROR("No freezer controller mountpoint found");
705 return false;
706 }
707
708 if (!ops->cgroup_use)
709 return true;
710
711 for (cur = ops->cgroup_use; cur && *cur; cur++)
712 if (!controller_found(hlist, *cur)) {
713 ERROR("No %s controller mountpoint found", *cur);
714 return false;
715 }
716
717 return true;
718 }
719
720 /* Get the controllers from a mountinfo line There are other ways we could get
721 * this info. For lxcfs, field 3 is /cgroup/controller-list. For cgroupfs, we
722 * could parse the mount options. But we simply assume that the mountpoint must
723 * be /sys/fs/cgroup/controller-list
724 */
725 static char **cg_hybrid_get_controllers(char **klist, char **nlist, char *line,
726 int type)
727 {
728 /* The fourth field is /sys/fs/cgroup/comma-delimited-controller-list
729 * for legacy hierarchies.
730 */
731 int i;
732 char *dup, *p2, *tok;
733 char *p = line, *sep = ",";
734 char **aret = NULL;
735
736 for (i = 0; i < 4; i++) {
737 p = strchr(p, ' ');
738 if (!p)
739 return NULL;
740 p++;
741 }
742
743 /* Note, if we change how mountinfo works, then our caller will need to
744 * verify /sys/fs/cgroup/ in this field.
745 */
746 if (strncmp(p, "/sys/fs/cgroup/", 15) != 0) {
747 ERROR("Found hierarchy not under /sys/fs/cgroup: \"%s\"", p);
748 return NULL;
749 }
750
751 p += 15;
752 p2 = strchr(p, ' ');
753 if (!p2) {
754 ERROR("Corrupt mountinfo");
755 return NULL;
756 }
757 *p2 = '\0';
758
759 if (type == CGROUP_SUPER_MAGIC) {
760 /* strdup() here for v1 hierarchies. Otherwise
761 * lxc_iterate_parts() will destroy mountpoints such as
762 * "/sys/fs/cgroup/cpu,cpuacct".
763 */
764 dup = strdup(p);
765 if (!dup)
766 return NULL;
767
768 lxc_iterate_parts(tok, dup, sep) {
769 must_append_controller(klist, nlist, &aret, tok);
770 }
771
772 free(dup);
773 }
774 *p2 = ' ';
775
776 return aret;
777 }
778
779 static char **cg_unified_make_empty_controller(void)
780 {
781 int newentry;
782 char **aret = NULL;
783
784 newentry = append_null_to_list((void ***)&aret);
785 aret[newentry] = NULL;
786 return aret;
787 }
788
789 static char **cg_unified_get_controllers(const char *file)
790 {
791 char *buf, *tok;
792 char *sep = " \t\n";
793 char **aret = NULL;
794
795 buf = read_file(file);
796 if (!buf)
797 return NULL;
798
799 lxc_iterate_parts(tok, buf, sep) {
800 int newentry;
801 char *copy;
802
803 newentry = append_null_to_list((void ***)&aret);
804 copy = must_copy_string(tok);
805 aret[newentry] = copy;
806 }
807
808 free(buf);
809 return aret;
810 }
811
812 static struct hierarchy *add_hierarchy(struct hierarchy ***h, char **clist, char *mountpoint,
813 char *base_cgroup, int type)
814 {
815 struct hierarchy *new;
816 int newentry;
817
818 new = must_alloc(sizeof(*new));
819 new->controllers = clist;
820 new->mountpoint = mountpoint;
821 new->base_cgroup = base_cgroup;
822 new->fullcgpath = NULL;
823 new->version = type;
824
825 newentry = append_null_to_list((void ***)h);
826 (*h)[newentry] = new;
827 return new;
828 }
829
830 /* Get a copy of the mountpoint from @line, which is a line from
831 * /proc/self/mountinfo.
832 */
833 static char *cg_hybrid_get_mountpoint(char *line)
834 {
835 int i;
836 size_t len;
837 char *p2;
838 char *p = line, *sret = NULL;
839
840 for (i = 0; i < 4; i++) {
841 p = strchr(p, ' ');
842 if (!p)
843 return NULL;
844 p++;
845 }
846
847 if (strncmp(p, "/sys/fs/cgroup/", 15) != 0)
848 return NULL;
849
850 p2 = strchr(p + 15, ' ');
851 if (!p2)
852 return NULL;
853 *p2 = '\0';
854
855 len = strlen(p);
856 sret = must_alloc(len + 1);
857 memcpy(sret, p, len);
858 sret[len] = '\0';
859 return sret;
860 }
861
862 /* Given a multi-line string, return a null-terminated copy of the current line. */
863 static char *copy_to_eol(char *p)
864 {
865 char *p2 = strchr(p, '\n'), *sret;
866 size_t len;
867
868 if (!p2)
869 return NULL;
870
871 len = p2 - p;
872 sret = must_alloc(len + 1);
873 memcpy(sret, p, len);
874 sret[len] = '\0';
875 return sret;
876 }
877
878 /* cgline: pointer to character after the first ':' in a line in a \n-terminated
879 * /proc/self/cgroup file. Check whether controller c is present.
880 */
881 static bool controller_in_clist(char *cgline, char *c)
882 {
883 char *tok, *eol, *tmp;
884 size_t len;
885
886 eol = strchr(cgline, ':');
887 if (!eol)
888 return false;
889
890 len = eol - cgline;
891 tmp = alloca(len + 1);
892 memcpy(tmp, cgline, len);
893 tmp[len] = '\0';
894
895 lxc_iterate_parts(tok, tmp, ",") {
896 if (strcmp(tok, c) == 0)
897 return true;
898 }
899
900 return false;
901 }
902
903 /* @basecginfo is a copy of /proc/$$/cgroup. Return the current cgroup for
904 * @controller.
905 */
906 static char *cg_hybrid_get_current_cgroup(char *basecginfo, char *controller,
907 int type)
908 {
909 char *p = basecginfo;
910
911 for (;;) {
912 bool is_cgv2_base_cgroup = false;
913
914 /* cgroup v2 entry in "/proc/<pid>/cgroup": "0::/some/path" */
915 if ((type == CGROUP2_SUPER_MAGIC) && (*p == '0'))
916 is_cgv2_base_cgroup = true;
917
918 p = strchr(p, ':');
919 if (!p)
920 return NULL;
921 p++;
922
923 if (is_cgv2_base_cgroup || (controller && controller_in_clist(p, controller))) {
924 p = strchr(p, ':');
925 if (!p)
926 return NULL;
927 p++;
928 return copy_to_eol(p);
929 }
930
931 p = strchr(p, '\n');
932 if (!p)
933 return NULL;
934 p++;
935 }
936 }
937
938 static void must_append_string(char ***list, char *entry)
939 {
940 int newentry;
941 char *copy;
942
943 newentry = append_null_to_list((void ***)list);
944 copy = must_copy_string(entry);
945 (*list)[newentry] = copy;
946 }
947
948 static int get_existing_subsystems(char ***klist, char ***nlist)
949 {
950 FILE *f;
951 char *line = NULL;
952 size_t len = 0;
953
954 f = fopen("/proc/self/cgroup", "r");
955 if (!f)
956 return -1;
957
958 while (getline(&line, &len, f) != -1) {
959 char *p, *p2, *tok;
960 p = strchr(line, ':');
961 if (!p)
962 continue;
963 p++;
964 p2 = strchr(p, ':');
965 if (!p2)
966 continue;
967 *p2 = '\0';
968
969 /* If the kernel has cgroup v2 support, then /proc/self/cgroup
970 * contains an entry of the form:
971 *
972 * 0::/some/path
973 *
974 * In this case we use "cgroup2" as controller name.
975 */
976 if ((p2 - p) == 0) {
977 must_append_string(klist, "cgroup2");
978 continue;
979 }
980
981 lxc_iterate_parts(tok, p, ",") {
982 if (strncmp(tok, "name=", 5) == 0)
983 must_append_string(nlist, tok);
984 else
985 must_append_string(klist, tok);
986 }
987 }
988
989 free(line);
990 fclose(f);
991 return 0;
992 }
993
994 static void trim(char *s)
995 {
996 size_t len;
997
998 len = strlen(s);
999 while ((len > 1) && (s[len - 1] == '\n'))
1000 s[--len] = '\0';
1001 }
1002
1003 static void lxc_cgfsng_print_hierarchies(struct cgroup_ops *ops)
1004 {
1005 int i;
1006 struct hierarchy **it;
1007
1008 if (!ops->hierarchies) {
1009 TRACE(" No hierarchies found");
1010 return;
1011 }
1012
1013 TRACE(" Hierarchies:");
1014 for (i = 0, it = ops->hierarchies; it && *it; it++, i++) {
1015 int j;
1016 char **cit;
1017
1018 TRACE(" %d: base_cgroup: %s", i, (*it)->base_cgroup ? (*it)->base_cgroup : "(null)");
1019 TRACE(" mountpoint: %s", (*it)->mountpoint ? (*it)->mountpoint : "(null)");
1020 TRACE(" controllers:");
1021 for (j = 0, cit = (*it)->controllers; cit && *cit; cit++, j++)
1022 TRACE(" %d: %s", j, *cit);
1023 }
1024 }
1025
1026 static void lxc_cgfsng_print_basecg_debuginfo(char *basecginfo, char **klist,
1027 char **nlist)
1028 {
1029 int k;
1030 char **it;
1031
1032 TRACE("basecginfo is:");
1033 TRACE("%s", basecginfo);
1034
1035 for (k = 0, it = klist; it && *it; it++, k++)
1036 TRACE("kernel subsystem %d: %s", k, *it);
1037
1038 for (k = 0, it = nlist; it && *it; it++, k++)
1039 TRACE("named subsystem %d: %s", k, *it);
1040 }
1041
1042 static int cgroup_rmdir(struct hierarchy **hierarchies,
1043 const char *container_cgroup)
1044 {
1045 int i;
1046
1047 if (!container_cgroup || !hierarchies)
1048 return 0;
1049
1050 for (i = 0; hierarchies[i]; i++) {
1051 int ret;
1052 struct hierarchy *h = hierarchies[i];
1053
1054 if (!h->fullcgpath)
1055 continue;
1056
1057 ret = recursive_destroy(h->fullcgpath);
1058 if (ret < 0)
1059 WARN("Failed to destroy \"%s\"", h->fullcgpath);
1060
1061 free(h->fullcgpath);
1062 h->fullcgpath = NULL;
1063 }
1064
1065 return 0;
1066 }
1067
1068 struct generic_userns_exec_data {
1069 struct hierarchy **hierarchies;
1070 const char *container_cgroup;
1071 struct lxc_conf *conf;
1072 uid_t origuid; /* target uid in parent namespace */
1073 char *path;
1074 };
1075
1076 static int cgroup_rmdir_wrapper(void *data)
1077 {
1078 int ret;
1079 struct generic_userns_exec_data *arg = data;
1080 uid_t nsuid = (arg->conf->root_nsuid_map != NULL) ? 0 : arg->conf->init_uid;
1081 gid_t nsgid = (arg->conf->root_nsgid_map != NULL) ? 0 : arg->conf->init_gid;
1082
1083 ret = setresgid(nsgid, nsgid, nsgid);
1084 if (ret < 0) {
1085 SYSERROR("Failed to setresgid(%d, %d, %d)", (int)nsgid,
1086 (int)nsgid, (int)nsgid);
1087 return -1;
1088 }
1089
1090 ret = setresuid(nsuid, nsuid, nsuid);
1091 if (ret < 0) {
1092 SYSERROR("Failed to setresuid(%d, %d, %d)", (int)nsuid,
1093 (int)nsuid, (int)nsuid);
1094 return -1;
1095 }
1096
1097 ret = setgroups(0, NULL);
1098 if (ret < 0 && errno != EPERM) {
1099 SYSERROR("Failed to setgroups(0, NULL)");
1100 return -1;
1101 }
1102
1103 return cgroup_rmdir(arg->hierarchies, arg->container_cgroup);
1104 }
1105
1106 __cgfsng_ops__ static void cgfsng_destroy(struct cgroup_ops *ops, struct lxc_handler *handler)
1107 {
1108 int ret;
1109 struct generic_userns_exec_data wrap;
1110
1111 wrap.origuid = 0;
1112 wrap.container_cgroup = ops->container_cgroup;
1113 wrap.hierarchies = ops->hierarchies;
1114 wrap.conf = handler->conf;
1115
1116 if (handler->conf && !lxc_list_empty(&handler->conf->id_map))
1117 ret = userns_exec_1(handler->conf, cgroup_rmdir_wrapper, &wrap,
1118 "cgroup_rmdir_wrapper");
1119 else
1120 ret = cgroup_rmdir(ops->hierarchies, ops->container_cgroup);
1121 if (ret < 0) {
1122 WARN("Failed to destroy cgroups");
1123 return;
1124 }
1125 }
1126
1127 static bool cg_unified_create_cgroup(struct hierarchy *h, char *cgname)
1128 {
1129 size_t i, parts_len;
1130 char **it;
1131 size_t full_len = 0;
1132 char *add_controllers = NULL, *cgroup = NULL;
1133 char **parts = NULL;
1134 bool bret = false;
1135
1136 if (h->version != CGROUP2_SUPER_MAGIC)
1137 return true;
1138
1139 if (!h->controllers)
1140 return true;
1141
1142 /* For now we simply enable all controllers that we have detected by
1143 * creating a string like "+memory +pids +cpu +io".
1144 * TODO: In the near future we might want to support "-<controller>"
1145 * etc. but whether supporting semantics like this make sense will need
1146 * some thinking.
1147 */
1148 for (it = h->controllers; it && *it; it++) {
1149 full_len += strlen(*it) + 2;
1150 add_controllers = must_realloc(add_controllers, full_len + 1);
1151
1152 if (h->controllers[0] == *it)
1153 add_controllers[0] = '\0';
1154
1155 (void)strlcat(add_controllers, "+", full_len + 1);
1156 (void)strlcat(add_controllers, *it, full_len + 1);
1157
1158 if ((it + 1) && *(it + 1))
1159 (void)strlcat(add_controllers, " ", full_len + 1);
1160 }
1161
1162 parts = lxc_string_split(cgname, '/');
1163 if (!parts)
1164 goto on_error;
1165
1166 parts_len = lxc_array_len((void **)parts);
1167 if (parts_len > 0)
1168 parts_len--;
1169
1170 cgroup = must_make_path(h->mountpoint, h->base_cgroup, NULL);
1171 for (i = 0; i < parts_len; i++) {
1172 int ret;
1173 char *target;
1174
1175 cgroup = must_append_path(cgroup, parts[i], NULL);
1176 target = must_make_path(cgroup, "cgroup.subtree_control", NULL);
1177 ret = lxc_write_to_file(target, add_controllers, full_len, false, 0666);
1178 free(target);
1179 if (ret < 0) {
1180 SYSERROR("Could not enable \"%s\" controllers in the "
1181 "unified cgroup \"%s\"", add_controllers, cgroup);
1182 goto on_error;
1183 }
1184 }
1185
1186 bret = true;
1187
1188 on_error:
1189 lxc_free_array((void **)parts, free);
1190 free(add_controllers);
1191 free(cgroup);
1192 return bret;
1193 }
1194
1195 static bool create_path_for_hierarchy(struct hierarchy *h, char *cgname)
1196 {
1197 int ret;
1198
1199 h->fullcgpath = must_make_path(h->mountpoint, h->base_cgroup, cgname, NULL);
1200 if (dir_exists(h->fullcgpath)) {
1201 ERROR("The cgroup \"%s\" already existed", h->fullcgpath);
1202 return false;
1203 }
1204
1205 if (!cg_legacy_handle_cpuset_hierarchy(h, cgname)) {
1206 ERROR("Failed to handle legacy cpuset controller");
1207 return false;
1208 }
1209
1210 ret = mkdir_p(h->fullcgpath, 0755);
1211 if (ret < 0) {
1212 ERROR("Failed to create cgroup \"%s\"", h->fullcgpath);
1213 return false;
1214 }
1215
1216 return cg_unified_create_cgroup(h, cgname);
1217 }
1218
1219 static void remove_path_for_hierarchy(struct hierarchy *h, char *cgname)
1220 {
1221 int ret;
1222
1223 ret = rmdir(h->fullcgpath);
1224 if (ret < 0)
1225 SYSERROR("Failed to rmdir(\"%s\") from failed creation attempt", h->fullcgpath);
1226
1227 free(h->fullcgpath);
1228 h->fullcgpath = NULL;
1229 }
1230
1231 /* Try to create the same cgroup in all hierarchies. Start with cgroup_pattern;
1232 * next cgroup_pattern-1, -2, ..., -999.
1233 */
1234 __cgfsng_ops__ static inline bool cgfsng_create(struct cgroup_ops *ops,
1235 struct lxc_handler *handler)
1236 {
1237 int i;
1238 size_t len;
1239 char *container_cgroup, *offset, *tmp;
1240 int idx = 0;
1241 struct lxc_conf *conf = handler->conf;
1242
1243 if (ops->container_cgroup) {
1244 WARN("cgfsng_create called a second time: %s", ops->container_cgroup);
1245 return false;
1246 }
1247
1248 if (!conf)
1249 return false;
1250
1251 if (conf->cgroup_meta.dir)
1252 tmp = lxc_string_join("/", (const char *[]){conf->cgroup_meta.dir, handler->name, NULL}, false);
1253 else
1254 tmp = lxc_string_replace("%n", handler->name, ops->cgroup_pattern);
1255 if (!tmp) {
1256 ERROR("Failed expanding cgroup name pattern");
1257 return false;
1258 }
1259
1260 len = strlen(tmp) + 5; /* leave room for -NNN\0 */
1261 container_cgroup = must_alloc(len);
1262 (void)strlcpy(container_cgroup, tmp, len);
1263 free(tmp);
1264 offset = container_cgroup + len - 5;
1265
1266 again:
1267 if (idx == 1000) {
1268 ERROR("Too many conflicting cgroup names");
1269 goto out_free;
1270 }
1271
1272 if (idx) {
1273 int ret;
1274
1275 ret = snprintf(offset, 5, "-%d", idx);
1276 if (ret < 0 || (size_t)ret >= 5) {
1277 FILE *f = fopen("/dev/null", "w");
1278 if (f) {
1279 fprintf(f, "Workaround for GCC7 bug: "
1280 "https://gcc.gnu.org/bugzilla/"
1281 "show_bug.cgi?id=78969");
1282 fclose(f);
1283 }
1284 }
1285 }
1286
1287 for (i = 0; ops->hierarchies[i]; i++) {
1288 if (!create_path_for_hierarchy(ops->hierarchies[i], container_cgroup)) {
1289 int j;
1290 ERROR("Failed to create cgroup \"%s\"", ops->hierarchies[i]->fullcgpath);
1291 free(ops->hierarchies[i]->fullcgpath);
1292 ops->hierarchies[i]->fullcgpath = NULL;
1293 for (j = 0; j < i; j++)
1294 remove_path_for_hierarchy(ops->hierarchies[j], container_cgroup);
1295 idx++;
1296 goto again;
1297 }
1298 }
1299
1300 ops->container_cgroup = container_cgroup;
1301
1302 return true;
1303
1304 out_free:
1305 free(container_cgroup);
1306
1307 return false;
1308 }
1309
1310 __cgfsng_ops__ static bool cgfsng_enter(struct cgroup_ops *ops, pid_t pid)
1311 {
1312 int i, len;
1313 char pidstr[25];
1314
1315 len = snprintf(pidstr, 25, "%d", pid);
1316 if (len < 0 || len >= 25)
1317 return false;
1318
1319 for (i = 0; ops->hierarchies[i]; i++) {
1320 int ret;
1321 char *fullpath;
1322
1323 fullpath = must_make_path(ops->hierarchies[i]->fullcgpath,
1324 "cgroup.procs", NULL);
1325 ret = lxc_write_to_file(fullpath, pidstr, len, false, 0666);
1326 if (ret != 0) {
1327 SYSERROR("Failed to enter cgroup \"%s\"", fullpath);
1328 free(fullpath);
1329 return false;
1330 }
1331 free(fullpath);
1332 }
1333
1334 return true;
1335 }
1336
1337 static int chowmod(char *path, uid_t chown_uid, gid_t chown_gid,
1338 mode_t chmod_mode)
1339 {
1340 int ret;
1341
1342 ret = chown(path, chown_uid, chown_gid);
1343 if (ret < 0) {
1344 SYSWARN("Failed to chown(%s, %d, %d)", path, (int)chown_uid, (int)chown_gid);
1345 return -1;
1346 }
1347
1348 ret = chmod(path, chmod_mode);
1349 if (ret < 0) {
1350 SYSWARN("Failed to chmod(%s, %d)", path, (int)chmod_mode);
1351 return -1;
1352 }
1353
1354 return 0;
1355 }
1356
1357 /* chgrp the container cgroups to container group. We leave
1358 * the container owner as cgroup owner. So we must make the
1359 * directories 775 so that the container can create sub-cgroups.
1360 *
1361 * Also chown the tasks and cgroup.procs files. Those may not
1362 * exist depending on kernel version.
1363 */
1364 static int chown_cgroup_wrapper(void *data)
1365 {
1366 int i, ret;
1367 uid_t destuid;
1368 struct generic_userns_exec_data *arg = data;
1369 uid_t nsuid = (arg->conf->root_nsuid_map != NULL) ? 0 : arg->conf->init_uid;
1370 gid_t nsgid = (arg->conf->root_nsgid_map != NULL) ? 0 : arg->conf->init_gid;
1371
1372 ret = setresgid(nsgid, nsgid, nsgid);
1373 if (ret < 0) {
1374 SYSERROR("Failed to setresgid(%d, %d, %d)",
1375 (int)nsgid, (int)nsgid, (int)nsgid);
1376 return -1;
1377 }
1378
1379 ret = setresuid(nsuid, nsuid, nsuid);
1380 if (ret < 0) {
1381 SYSERROR("Failed to setresuid(%d, %d, %d)",
1382 (int)nsuid, (int)nsuid, (int)nsuid);
1383 return -1;
1384 }
1385
1386 ret = setgroups(0, NULL);
1387 if (ret < 0 && errno != EPERM) {
1388 SYSERROR("Failed to setgroups(0, NULL)");
1389 return -1;
1390 }
1391
1392 destuid = get_ns_uid(arg->origuid);
1393 if (destuid == LXC_INVALID_UID)
1394 destuid = 0;
1395
1396 for (i = 0; arg->hierarchies[i]; i++) {
1397 char *fullpath;
1398 char *path = arg->hierarchies[i]->fullcgpath;
1399
1400 ret = chowmod(path, destuid, nsgid, 0775);
1401 if (ret < 0)
1402 return -1;
1403
1404 /* Failures to chown() these are inconvenient but not
1405 * detrimental We leave these owned by the container launcher,
1406 * so that container root can write to the files to attach. We
1407 * chmod() them 664 so that container systemd can write to the
1408 * files (which systemd in wily insists on doing).
1409 */
1410
1411 if (arg->hierarchies[i]->version == CGROUP_SUPER_MAGIC) {
1412 fullpath = must_make_path(path, "tasks", NULL);
1413 (void)chowmod(fullpath, destuid, nsgid, 0664);
1414 free(fullpath);
1415 }
1416
1417 fullpath = must_make_path(path, "cgroup.procs", NULL);
1418 (void)chowmod(fullpath, destuid, nsgid, 0664);
1419 free(fullpath);
1420
1421 if (arg->hierarchies[i]->version != CGROUP2_SUPER_MAGIC)
1422 continue;
1423
1424 fullpath = must_make_path(path, "cgroup.subtree_control", NULL);
1425 (void)chowmod(fullpath, destuid, nsgid, 0664);
1426 free(fullpath);
1427
1428 fullpath = must_make_path(path, "cgroup.threads", NULL);
1429 (void)chowmod(fullpath, destuid, nsgid, 0664);
1430 free(fullpath);
1431 }
1432
1433 return 0;
1434 }
1435
1436 __cgfsng_ops__ static bool cgfsng_chown(struct cgroup_ops *ops,
1437 struct lxc_conf *conf)
1438 {
1439 struct generic_userns_exec_data wrap;
1440
1441 if (lxc_list_empty(&conf->id_map))
1442 return true;
1443
1444 wrap.origuid = geteuid();
1445 wrap.path = NULL;
1446 wrap.hierarchies = ops->hierarchies;
1447 wrap.conf = conf;
1448
1449 if (userns_exec_1(conf, chown_cgroup_wrapper, &wrap,
1450 "chown_cgroup_wrapper") < 0) {
1451 ERROR("Error requesting cgroup chown in new user namespace");
1452 return false;
1453 }
1454
1455 return true;
1456 }
1457
1458 /* cgroup-full:* is done, no need to create subdirs */
1459 static bool cg_mount_needs_subdirs(int type)
1460 {
1461 if (type >= LXC_AUTO_CGROUP_FULL_RO)
1462 return false;
1463
1464 return true;
1465 }
1466
1467 /* After $rootfs/sys/fs/container/controller/the/cg/path has been created,
1468 * remount controller ro if needed and bindmount the cgroupfs onto
1469 * controll/the/cg/path.
1470 */
1471 static int cg_legacy_mount_controllers(int type, struct hierarchy *h,
1472 char *controllerpath, char *cgpath,
1473 const char *container_cgroup)
1474 {
1475 int ret, remount_flags;
1476 char *sourcepath;
1477 int flags = MS_BIND;
1478
1479 if (type == LXC_AUTO_CGROUP_RO || type == LXC_AUTO_CGROUP_MIXED) {
1480 ret = mount(controllerpath, controllerpath, "cgroup", MS_BIND, NULL);
1481 if (ret < 0) {
1482 SYSERROR("Failed to bind mount \"%s\" onto \"%s\"",
1483 controllerpath, controllerpath);
1484 return -1;
1485 }
1486
1487 remount_flags = add_required_remount_flags(controllerpath,
1488 controllerpath,
1489 flags | MS_REMOUNT);
1490 ret = mount(controllerpath, controllerpath, "cgroup",
1491 remount_flags | MS_REMOUNT | MS_BIND | MS_RDONLY,
1492 NULL);
1493 if (ret < 0) {
1494 SYSERROR("Failed to remount \"%s\" ro", controllerpath);
1495 return -1;
1496 }
1497
1498 INFO("Remounted %s read-only", controllerpath);
1499 }
1500
1501 sourcepath = must_make_path(h->mountpoint, h->base_cgroup,
1502 container_cgroup, NULL);
1503 if (type == LXC_AUTO_CGROUP_RO)
1504 flags |= MS_RDONLY;
1505
1506 ret = mount(sourcepath, cgpath, "cgroup", flags, NULL);
1507 if (ret < 0) {
1508 SYSERROR("Failed to mount \"%s\" onto \"%s\"", h->controllers[0], cgpath);
1509 free(sourcepath);
1510 return -1;
1511 }
1512 INFO("Mounted \"%s\" onto \"%s\"", h->controllers[0], cgpath);
1513
1514 if (flags & MS_RDONLY) {
1515 remount_flags = add_required_remount_flags(sourcepath, cgpath,
1516 flags | MS_REMOUNT);
1517 ret = mount(sourcepath, cgpath, "cgroup", remount_flags, NULL);
1518 if (ret < 0) {
1519 SYSERROR("Failed to remount \"%s\" ro", cgpath);
1520 free(sourcepath);
1521 return -1;
1522 }
1523 INFO("Remounted %s read-only", cgpath);
1524 }
1525
1526 free(sourcepath);
1527 INFO("Completed second stage cgroup automounts for \"%s\"", cgpath);
1528 return 0;
1529 }
1530
1531 /* __cg_mount_direct
1532 *
1533 * Mount cgroup hierarchies directly without using bind-mounts. The main
1534 * uses-cases are mounting cgroup hierarchies in cgroup namespaces and mounting
1535 * cgroups for the LXC_AUTO_CGROUP_FULL option.
1536 */
1537 static int __cg_mount_direct(int type, struct hierarchy *h,
1538 const char *controllerpath)
1539 {
1540 int ret;
1541 char *controllers = NULL;
1542 char *fstype = "cgroup2";
1543 unsigned long flags = 0;
1544
1545 flags |= MS_NOSUID;
1546 flags |= MS_NOEXEC;
1547 flags |= MS_NODEV;
1548 flags |= MS_RELATIME;
1549
1550 if (type == LXC_AUTO_CGROUP_RO || type == LXC_AUTO_CGROUP_FULL_RO)
1551 flags |= MS_RDONLY;
1552
1553 if (h->version != CGROUP2_SUPER_MAGIC) {
1554 controllers = lxc_string_join(",", (const char **)h->controllers, false);
1555 if (!controllers)
1556 return -ENOMEM;
1557 fstype = "cgroup";
1558 }
1559
1560 ret = mount("cgroup", controllerpath, fstype, flags, controllers);
1561 free(controllers);
1562 if (ret < 0) {
1563 SYSERROR("Failed to mount \"%s\" with cgroup filesystem type %s", controllerpath, fstype);
1564 return -1;
1565 }
1566
1567 DEBUG("Mounted \"%s\" with cgroup filesystem type %s", controllerpath, fstype);
1568 return 0;
1569 }
1570
1571 static inline int cg_mount_in_cgroup_namespace(int type, struct hierarchy *h,
1572 const char *controllerpath)
1573 {
1574 return __cg_mount_direct(type, h, controllerpath);
1575 }
1576
1577 static inline int cg_mount_cgroup_full(int type, struct hierarchy *h,
1578 const char *controllerpath)
1579 {
1580 if (type < LXC_AUTO_CGROUP_FULL_RO || type > LXC_AUTO_CGROUP_FULL_MIXED)
1581 return 0;
1582
1583 return __cg_mount_direct(type, h, controllerpath);
1584 }
1585
1586 __cgfsng_ops__ static bool cgfsng_mount(struct cgroup_ops *ops,
1587 struct lxc_handler *handler,
1588 const char *root, int type)
1589 {
1590 int i, ret;
1591 char *tmpfspath = NULL;
1592 bool has_cgns = false, retval = false, wants_force_mount = false;
1593
1594 if ((type & LXC_AUTO_CGROUP_MASK) == 0)
1595 return true;
1596
1597 if (type & LXC_AUTO_CGROUP_FORCE) {
1598 type &= ~LXC_AUTO_CGROUP_FORCE;
1599 wants_force_mount = true;
1600 }
1601
1602 if (!wants_force_mount){
1603 if (!lxc_list_empty(&handler->conf->keepcaps))
1604 wants_force_mount = !in_caplist(CAP_SYS_ADMIN, &handler->conf->keepcaps);
1605 else
1606 wants_force_mount = in_caplist(CAP_SYS_ADMIN, &handler->conf->caps);
1607 }
1608
1609 has_cgns = cgns_supported();
1610 if (has_cgns && !wants_force_mount)
1611 return true;
1612
1613 if (type == LXC_AUTO_CGROUP_NOSPEC)
1614 type = LXC_AUTO_CGROUP_MIXED;
1615 else if (type == LXC_AUTO_CGROUP_FULL_NOSPEC)
1616 type = LXC_AUTO_CGROUP_FULL_MIXED;
1617
1618 /* Mount tmpfs */
1619 tmpfspath = must_make_path(root, "/sys/fs/cgroup", NULL);
1620 ret = safe_mount(NULL, tmpfspath, "tmpfs",
1621 MS_NOSUID | MS_NODEV | MS_NOEXEC | MS_RELATIME,
1622 "size=10240k,mode=755", root);
1623 if (ret < 0)
1624 goto on_error;
1625
1626 for (i = 0; ops->hierarchies[i]; i++) {
1627 char *controllerpath, *path2;
1628 struct hierarchy *h = ops->hierarchies[i];
1629 char *controller = strrchr(h->mountpoint, '/');
1630
1631 if (!controller)
1632 continue;
1633 controller++;
1634
1635 controllerpath = must_make_path(tmpfspath, controller, NULL);
1636 if (dir_exists(controllerpath)) {
1637 free(controllerpath);
1638 continue;
1639 }
1640
1641 ret = mkdir(controllerpath, 0755);
1642 if (ret < 0) {
1643 SYSERROR("Error creating cgroup path: %s", controllerpath);
1644 free(controllerpath);
1645 goto on_error;
1646 }
1647
1648 if (has_cgns && wants_force_mount) {
1649 /* If cgroup namespaces are supported but the container
1650 * will not have CAP_SYS_ADMIN after it has started we
1651 * need to mount the cgroups manually.
1652 */
1653 ret = cg_mount_in_cgroup_namespace(type, h, controllerpath);
1654 free(controllerpath);
1655 if (ret < 0)
1656 goto on_error;
1657
1658 continue;
1659 }
1660
1661 ret = cg_mount_cgroup_full(type, h, controllerpath);
1662 if (ret < 0) {
1663 free(controllerpath);
1664 goto on_error;
1665 }
1666
1667 if (!cg_mount_needs_subdirs(type)) {
1668 free(controllerpath);
1669 continue;
1670 }
1671
1672 path2 = must_make_path(controllerpath, h->base_cgroup,
1673 ops->container_cgroup, NULL);
1674 ret = mkdir_p(path2, 0755);
1675 if (ret < 0) {
1676 free(controllerpath);
1677 free(path2);
1678 goto on_error;
1679 }
1680
1681 ret = cg_legacy_mount_controllers(type, h, controllerpath,
1682 path2, ops->container_cgroup);
1683 free(controllerpath);
1684 free(path2);
1685 if (ret < 0)
1686 goto on_error;
1687 }
1688 retval = true;
1689
1690 on_error:
1691 free(tmpfspath);
1692 return retval;
1693 }
1694
1695 static int recursive_count_nrtasks(char *dirname)
1696 {
1697 struct dirent *direntp;
1698 DIR *dir;
1699 int count = 0, ret;
1700 char *path;
1701
1702 dir = opendir(dirname);
1703 if (!dir)
1704 return 0;
1705
1706 while ((direntp = readdir(dir))) {
1707 struct stat mystat;
1708
1709 if (!strcmp(direntp->d_name, ".") ||
1710 !strcmp(direntp->d_name, ".."))
1711 continue;
1712
1713 path = must_make_path(dirname, direntp->d_name, NULL);
1714
1715 if (lstat(path, &mystat))
1716 goto next;
1717
1718 if (!S_ISDIR(mystat.st_mode))
1719 goto next;
1720
1721 count += recursive_count_nrtasks(path);
1722 next:
1723 free(path);
1724 }
1725
1726 path = must_make_path(dirname, "cgroup.procs", NULL);
1727 ret = lxc_count_file_lines(path);
1728 if (ret != -1)
1729 count += ret;
1730 free(path);
1731
1732 (void)closedir(dir);
1733
1734 return count;
1735 }
1736
1737 __cgfsng_ops__ static int cgfsng_nrtasks(struct cgroup_ops *ops)
1738 {
1739 int count;
1740 char *path;
1741
1742 if (!ops->container_cgroup || !ops->hierarchies)
1743 return -1;
1744
1745 path = must_make_path(ops->hierarchies[0]->fullcgpath, NULL);
1746 count = recursive_count_nrtasks(path);
1747 free(path);
1748 return count;
1749 }
1750
1751 /* Only root needs to escape to the cgroup of its init. */
1752 __cgfsng_ops__ static bool cgfsng_escape(const struct cgroup_ops *ops,
1753 struct lxc_conf *conf)
1754 {
1755 int i;
1756
1757 if (conf->cgroup_meta.keep || geteuid())
1758 return true;
1759
1760 for (i = 0; ops->hierarchies[i]; i++) {
1761 int ret;
1762 char *fullpath;
1763
1764 fullpath = must_make_path(ops->hierarchies[i]->mountpoint,
1765 ops->hierarchies[i]->base_cgroup,
1766 "cgroup.procs", NULL);
1767 ret = lxc_write_to_file(fullpath, "0", 2, false, 0666);
1768 if (ret != 0) {
1769 SYSERROR("Failed to escape to cgroup \"%s\"", fullpath);
1770 free(fullpath);
1771 return false;
1772 }
1773 free(fullpath);
1774 }
1775
1776 return true;
1777 }
1778
1779 __cgfsng_ops__ static int cgfsng_num_hierarchies(struct cgroup_ops *ops)
1780 {
1781 int i;
1782
1783 for (i = 0; ops->hierarchies[i]; i++)
1784 ;
1785
1786 return i;
1787 }
1788
1789 __cgfsng_ops__ static bool cgfsng_get_hierarchies(struct cgroup_ops *ops, int n, char ***out)
1790 {
1791 int i;
1792
1793 /* sanity check n */
1794 for (i = 0; i < n; i++)
1795 if (!ops->hierarchies[i])
1796 return false;
1797
1798 *out = ops->hierarchies[i]->controllers;
1799
1800 return true;
1801 }
1802
1803 #define THAWED "THAWED"
1804 #define THAWED_LEN (strlen(THAWED))
1805
1806 /* TODO: If the unified cgroup hierarchy grows a freezer controller this needs
1807 * to be adapted.
1808 */
1809 __cgfsng_ops__ static bool cgfsng_unfreeze(struct cgroup_ops *ops)
1810 {
1811 int ret;
1812 char *fullpath;
1813 struct hierarchy *h;
1814
1815 h = get_hierarchy(ops, "freezer");
1816 if (!h)
1817 return false;
1818
1819 fullpath = must_make_path(h->fullcgpath, "freezer.state", NULL);
1820 ret = lxc_write_to_file(fullpath, THAWED, THAWED_LEN, false, 0666);
1821 free(fullpath);
1822 if (ret < 0)
1823 return false;
1824
1825 return true;
1826 }
1827
1828 __cgfsng_ops__ static const char *cgfsng_get_cgroup(struct cgroup_ops *ops,
1829 const char *controller)
1830 {
1831 struct hierarchy *h;
1832
1833 h = get_hierarchy(ops, controller);
1834 if (!h) {
1835 WARN("Failed to find hierarchy for controller \"%s\"",
1836 controller ? controller : "(null)");
1837 return NULL;
1838 }
1839
1840 return h->fullcgpath ? h->fullcgpath + strlen(h->mountpoint) : NULL;
1841 }
1842
1843 /* Given a cgroup path returned from lxc_cmd_get_cgroup_path, build a full path,
1844 * which must be freed by the caller.
1845 */
1846 static inline char *build_full_cgpath_from_monitorpath(struct hierarchy *h,
1847 const char *inpath,
1848 const char *filename)
1849 {
1850 return must_make_path(h->mountpoint, inpath, filename, NULL);
1851 }
1852
1853 /* Technically, we're always at a delegation boundary here (This is especially
1854 * true when cgroup namespaces are available.). The reasoning is that in order
1855 * for us to have been able to start a container in the first place the root
1856 * cgroup must have been a leaf node. Now, either the container's init system
1857 * has populated the cgroup and kept it as a leaf node or it has created
1858 * subtrees. In the former case we will simply attach to the leaf node we
1859 * created when we started the container in the latter case we create our own
1860 * cgroup for the attaching process.
1861 */
1862 static int __cg_unified_attach(const struct hierarchy *h, const char *name,
1863 const char *lxcpath, const char *pidstr,
1864 size_t pidstr_len, const char *controller)
1865 {
1866 int ret;
1867 size_t len;
1868 int fret = -1, idx = 0;
1869 char *base_path = NULL, *container_cgroup = NULL, *full_path = NULL;
1870
1871 container_cgroup = lxc_cmd_get_cgroup_path(name, lxcpath, controller);
1872 /* not running */
1873 if (!container_cgroup)
1874 return 0;
1875
1876 base_path = must_make_path(h->mountpoint, container_cgroup, NULL);
1877 full_path = must_make_path(base_path, "cgroup.procs", NULL);
1878 /* cgroup is populated */
1879 ret = lxc_write_to_file(full_path, pidstr, pidstr_len, false, 0666);
1880 if (ret < 0 && errno != EBUSY)
1881 goto on_error;
1882
1883 if (ret == 0)
1884 goto on_success;
1885
1886 free(full_path);
1887
1888 len = strlen(base_path) + sizeof("/lxc-1000") - 1 +
1889 sizeof("/cgroup-procs") - 1;
1890 full_path = must_alloc(len + 1);
1891 do {
1892 if (idx)
1893 ret = snprintf(full_path, len + 1, "%s/lxc-%d",
1894 base_path, idx);
1895 else
1896 ret = snprintf(full_path, len + 1, "%s/lxc", base_path);
1897 if (ret < 0 || (size_t)ret >= len + 1)
1898 goto on_error;
1899
1900 ret = mkdir_p(full_path, 0755);
1901 if (ret < 0 && errno != EEXIST)
1902 goto on_error;
1903
1904 (void)strlcat(full_path, "/cgroup.procs", len + 1);
1905 ret = lxc_write_to_file(full_path, pidstr, len, false, 0666);
1906 if (ret == 0)
1907 goto on_success;
1908
1909 /* this is a non-leaf node */
1910 if (errno != EBUSY)
1911 goto on_error;
1912
1913 } while (++idx > 0 && idx < 1000);
1914
1915 on_success:
1916 if (idx < 1000)
1917 fret = 0;
1918
1919 on_error:
1920 free(base_path);
1921 free(container_cgroup);
1922 free(full_path);
1923
1924 return fret;
1925 }
1926
1927 __cgfsng_ops__ static bool cgfsng_attach(struct cgroup_ops *ops, const char *name,
1928 const char *lxcpath, pid_t pid)
1929 {
1930 int i, len, ret;
1931 char pidstr[25];
1932
1933 len = snprintf(pidstr, 25, "%d", pid);
1934 if (len < 0 || len >= 25)
1935 return false;
1936
1937 for (i = 0; ops->hierarchies[i]; i++) {
1938 char *path;
1939 char *fullpath = NULL;
1940 struct hierarchy *h = ops->hierarchies[i];
1941
1942 if (h->version == CGROUP2_SUPER_MAGIC) {
1943 ret = __cg_unified_attach(h, name, lxcpath, pidstr, len,
1944 h->controllers[0]);
1945 if (ret < 0)
1946 return false;
1947
1948 continue;
1949 }
1950
1951 path = lxc_cmd_get_cgroup_path(name, lxcpath, h->controllers[0]);
1952 /* not running */
1953 if (!path)
1954 continue;
1955
1956 fullpath = build_full_cgpath_from_monitorpath(h, path, "cgroup.procs");
1957 free(path);
1958 ret = lxc_write_to_file(fullpath, pidstr, len, false, 0666);
1959 if (ret < 0) {
1960 SYSERROR("Failed to attach %d to %s", (int)pid, fullpath);
1961 free(fullpath);
1962 return false;
1963 }
1964 free(fullpath);
1965 }
1966
1967 return true;
1968 }
1969
1970 /* Called externally (i.e. from 'lxc-cgroup') to query cgroup limits. Here we
1971 * don't have a cgroup_data set up, so we ask the running container through the
1972 * commands API for the cgroup path.
1973 */
1974 __cgfsng_ops__ static int cgfsng_get(struct cgroup_ops *ops, const char *filename,
1975 char *value, size_t len, const char *name,
1976 const char *lxcpath)
1977 {
1978 int ret = -1;
1979 size_t controller_len;
1980 char *controller, *p, *path;
1981 struct hierarchy *h;
1982
1983 controller_len = strlen(filename);
1984 controller = alloca(controller_len + 1);
1985 (void)strlcpy(controller, filename, controller_len + 1);
1986
1987 p = strchr(controller, '.');
1988 if (p)
1989 *p = '\0';
1990
1991 path = lxc_cmd_get_cgroup_path(name, lxcpath, controller);
1992 /* not running */
1993 if (!path)
1994 return -1;
1995
1996 h = get_hierarchy(ops, controller);
1997 if (h) {
1998 char *fullpath;
1999
2000 fullpath = build_full_cgpath_from_monitorpath(h, path, filename);
2001 ret = lxc_read_from_file(fullpath, value, len);
2002 free(fullpath);
2003 }
2004 free(path);
2005
2006 return ret;
2007 }
2008
2009 /* Called externally (i.e. from 'lxc-cgroup') to set new cgroup limits. Here we
2010 * don't have a cgroup_data set up, so we ask the running container through the
2011 * commands API for the cgroup path.
2012 */
2013 __cgfsng_ops__ static int cgfsng_set(struct cgroup_ops *ops,
2014 const char *filename, const char *value,
2015 const char *name, const char *lxcpath)
2016 {
2017 int ret = -1;
2018 size_t controller_len;
2019 char *controller, *p, *path;
2020 struct hierarchy *h;
2021
2022 controller_len = strlen(filename);
2023 controller = alloca(controller_len + 1);
2024 (void)strlcpy(controller, filename, controller_len + 1);
2025
2026 p = strchr(controller, '.');
2027 if (p)
2028 *p = '\0';
2029
2030 path = lxc_cmd_get_cgroup_path(name, lxcpath, controller);
2031 /* not running */
2032 if (!path)
2033 return -1;
2034
2035 h = get_hierarchy(ops, controller);
2036 if (h) {
2037 char *fullpath;
2038
2039 fullpath = build_full_cgpath_from_monitorpath(h, path, filename);
2040 ret = lxc_write_to_file(fullpath, value, strlen(value), false, 0666);
2041 free(fullpath);
2042 }
2043 free(path);
2044
2045 return ret;
2046 }
2047
2048 /* take devices cgroup line
2049 * /dev/foo rwx
2050 * and convert it to a valid
2051 * type major:minor mode
2052 * line. Return <0 on error. Dest is a preallocated buffer long enough to hold
2053 * the output.
2054 */
2055 static int convert_devpath(const char *invalue, char *dest)
2056 {
2057 int n_parts;
2058 char *p, *path, type;
2059 unsigned long minor, major;
2060 struct stat sb;
2061 int ret = -EINVAL;
2062 char *mode = NULL;
2063
2064 path = must_copy_string(invalue);
2065
2066 /* Read path followed by mode. Ignore any trailing text.
2067 * A ' # comment' would be legal. Technically other text is not
2068 * legal, we could check for that if we cared to.
2069 */
2070 for (n_parts = 1, p = path; *p && n_parts < 3; p++) {
2071 if (*p != ' ')
2072 continue;
2073 *p = '\0';
2074
2075 if (n_parts != 1)
2076 break;
2077 p++;
2078 n_parts++;
2079
2080 while (*p == ' ')
2081 p++;
2082
2083 mode = p;
2084
2085 if (*p == '\0')
2086 goto out;
2087 }
2088
2089 if (n_parts == 1)
2090 goto out;
2091
2092 ret = stat(path, &sb);
2093 if (ret < 0)
2094 goto out;
2095
2096 mode_t m = sb.st_mode & S_IFMT;
2097 switch (m) {
2098 case S_IFBLK:
2099 type = 'b';
2100 break;
2101 case S_IFCHR:
2102 type = 'c';
2103 break;
2104 default:
2105 ERROR("Unsupported device type %i for \"%s\"", m, path);
2106 ret = -EINVAL;
2107 goto out;
2108 }
2109
2110 major = MAJOR(sb.st_rdev);
2111 minor = MINOR(sb.st_rdev);
2112 ret = snprintf(dest, 50, "%c %lu:%lu %s", type, major, minor, mode);
2113 if (ret < 0 || ret >= 50) {
2114 ERROR("Error on configuration value \"%c %lu:%lu %s\" (max 50 "
2115 "chars)", type, major, minor, mode);
2116 ret = -ENAMETOOLONG;
2117 goto out;
2118 }
2119 ret = 0;
2120
2121 out:
2122 free(path);
2123 return ret;
2124 }
2125
2126 /* Called from setup_limits - here we have the container's cgroup_data because
2127 * we created the cgroups.
2128 */
2129 static int cg_legacy_set_data(struct cgroup_ops *ops, const char *filename,
2130 const char *value)
2131 {
2132 size_t len;
2133 char *fullpath, *p;
2134 /* "b|c <2^64-1>:<2^64-1> r|w|m" = 47 chars max */
2135 char converted_value[50];
2136 struct hierarchy *h;
2137 int ret = 0;
2138 char *controller = NULL;
2139
2140 len = strlen(filename);
2141 controller = alloca(len + 1);
2142 (void)strlcpy(controller, filename, len + 1);
2143
2144 p = strchr(controller, '.');
2145 if (p)
2146 *p = '\0';
2147
2148 if (strcmp("devices.allow", filename) == 0 && value[0] == '/') {
2149 ret = convert_devpath(value, converted_value);
2150 if (ret < 0)
2151 return ret;
2152 value = converted_value;
2153 }
2154
2155 h = get_hierarchy(ops, controller);
2156 if (!h) {
2157 ERROR("Failed to setup limits for the \"%s\" controller. "
2158 "The controller seems to be unused by \"cgfsng\" cgroup "
2159 "driver or not enabled on the cgroup hierarchy",
2160 controller);
2161 errno = ENOENT;
2162 return -ENOENT;
2163 }
2164
2165 fullpath = must_make_path(h->fullcgpath, filename, NULL);
2166 ret = lxc_write_to_file(fullpath, value, strlen(value), false, 0666);
2167 free(fullpath);
2168 return ret;
2169 }
2170
2171 static bool __cg_legacy_setup_limits(struct cgroup_ops *ops,
2172 struct lxc_list *cgroup_settings,
2173 bool do_devices)
2174 {
2175 struct lxc_list *iterator, *next, *sorted_cgroup_settings;
2176 struct lxc_cgroup *cg;
2177 bool ret = false;
2178
2179 if (lxc_list_empty(cgroup_settings))
2180 return true;
2181
2182 sorted_cgroup_settings = sort_cgroup_settings(cgroup_settings);
2183 if (!sorted_cgroup_settings)
2184 return false;
2185
2186 lxc_list_for_each(iterator, sorted_cgroup_settings) {
2187 cg = iterator->elem;
2188
2189 if (do_devices == !strncmp("devices", cg->subsystem, 7)) {
2190 if (cg_legacy_set_data(ops, cg->subsystem, cg->value)) {
2191 if (do_devices && (errno == EACCES || errno == EPERM)) {
2192 WARN("Failed to set \"%s\" to \"%s\"",
2193 cg->subsystem, cg->value);
2194 continue;
2195 }
2196 WARN("Failed to set \"%s\" to \"%s\"",
2197 cg->subsystem, cg->value);
2198 goto out;
2199 }
2200 DEBUG("Set controller \"%s\" set to \"%s\"",
2201 cg->subsystem, cg->value);
2202 }
2203 }
2204
2205 ret = true;
2206 INFO("Limits for the legacy cgroup hierarchies have been setup");
2207 out:
2208 lxc_list_for_each_safe(iterator, sorted_cgroup_settings, next) {
2209 lxc_list_del(iterator);
2210 free(iterator);
2211 }
2212 free(sorted_cgroup_settings);
2213 return ret;
2214 }
2215
2216 static bool __cg_unified_setup_limits(struct cgroup_ops *ops,
2217 struct lxc_list *cgroup_settings)
2218 {
2219 struct lxc_list *iterator;
2220 struct hierarchy *h = ops->unified;
2221
2222 if (lxc_list_empty(cgroup_settings))
2223 return true;
2224
2225 if (!h)
2226 return false;
2227
2228 lxc_list_for_each(iterator, cgroup_settings) {
2229 int ret;
2230 char *fullpath;
2231 struct lxc_cgroup *cg = iterator->elem;
2232
2233 fullpath = must_make_path(h->fullcgpath, cg->subsystem, NULL);
2234 ret = lxc_write_to_file(fullpath, cg->value, strlen(cg->value), false, 0666);
2235 free(fullpath);
2236 if (ret < 0) {
2237 SYSERROR("Failed to set \"%s\" to \"%s\"",
2238 cg->subsystem, cg->value);
2239 return false;
2240 }
2241 TRACE("Set \"%s\" to \"%s\"", cg->subsystem, cg->value);
2242 }
2243
2244 INFO("Limits for the unified cgroup hierarchy have been setup");
2245 return true;
2246 }
2247
2248 __cgfsng_ops__ static bool cgfsng_setup_limits(struct cgroup_ops *ops,
2249 struct lxc_conf *conf,
2250 bool do_devices)
2251 {
2252 bool bret;
2253
2254 bret = __cg_legacy_setup_limits(ops, &conf->cgroup, do_devices);
2255 if (!bret)
2256 return false;
2257
2258 return __cg_unified_setup_limits(ops, &conf->cgroup2);
2259 }
2260
2261 static bool cgroup_use_wants_controllers(const struct cgroup_ops *ops,
2262 char **controllers)
2263 {
2264 char **cur_ctrl, **cur_use;
2265
2266 if (!ops->cgroup_use)
2267 return true;
2268
2269 for (cur_ctrl = controllers; cur_ctrl && *cur_ctrl; cur_ctrl++) {
2270 bool found = false;
2271
2272 for (cur_use = ops->cgroup_use; cur_use && *cur_use; cur_use++) {
2273 if (strcmp(*cur_use, *cur_ctrl) != 0)
2274 continue;
2275
2276 found = true;
2277 break;
2278 }
2279
2280 if (found)
2281 continue;
2282
2283 return false;
2284 }
2285
2286 return true;
2287 }
2288
2289 /* At startup, parse_hierarchies finds all the info we need about cgroup
2290 * mountpoints and current cgroups, and stores it in @d.
2291 */
2292 static bool cg_hybrid_init(struct cgroup_ops *ops, bool keep)
2293 {
2294 int ret;
2295 char *basecginfo;
2296 FILE *f;
2297 size_t len = 0;
2298 char *line = NULL;
2299 char **klist = NULL, **nlist = NULL;
2300
2301 /* Root spawned containers escape the current cgroup, so use init's
2302 * cgroups as our base in that case.
2303 */
2304 if (!keep && (geteuid() == 0))
2305 basecginfo = read_file("/proc/1/cgroup");
2306 else
2307 basecginfo = read_file("/proc/self/cgroup");
2308 if (!basecginfo)
2309 return false;
2310
2311 ret = get_existing_subsystems(&klist, &nlist);
2312 if (ret < 0) {
2313 ERROR("Failed to retrieve available legacy cgroup controllers");
2314 free(basecginfo);
2315 return false;
2316 }
2317
2318 f = fopen("/proc/self/mountinfo", "r");
2319 if (!f) {
2320 ERROR("Failed to open \"/proc/self/mountinfo\"");
2321 free(basecginfo);
2322 return false;
2323 }
2324
2325 lxc_cgfsng_print_basecg_debuginfo(basecginfo, klist, nlist);
2326
2327 while (getline(&line, &len, f) != -1) {
2328 int type;
2329 bool writeable;
2330 struct hierarchy *new;
2331 char *base_cgroup = NULL, *mountpoint = NULL;
2332 char **controller_list = NULL;
2333
2334 type = get_cgroup_version(line);
2335 if (type == 0)
2336 continue;
2337
2338 if (type == CGROUP2_SUPER_MAGIC && ops->unified)
2339 continue;
2340
2341 if (ops->cgroup_layout == CGROUP_LAYOUT_UNKNOWN) {
2342 if (type == CGROUP2_SUPER_MAGIC)
2343 ops->cgroup_layout = CGROUP_LAYOUT_UNIFIED;
2344 else if (type == CGROUP_SUPER_MAGIC)
2345 ops->cgroup_layout = CGROUP_LAYOUT_LEGACY;
2346 } else if (ops->cgroup_layout == CGROUP_LAYOUT_UNIFIED) {
2347 if (type == CGROUP_SUPER_MAGIC)
2348 ops->cgroup_layout = CGROUP_LAYOUT_HYBRID;
2349 } else if (ops->cgroup_layout == CGROUP_LAYOUT_LEGACY) {
2350 if (type == CGROUP2_SUPER_MAGIC)
2351 ops->cgroup_layout = CGROUP_LAYOUT_HYBRID;
2352 }
2353
2354 controller_list = cg_hybrid_get_controllers(klist, nlist, line, type);
2355 if (!controller_list && type == CGROUP_SUPER_MAGIC)
2356 continue;
2357
2358 if (type == CGROUP_SUPER_MAGIC)
2359 if (controller_list_is_dup(ops->hierarchies, controller_list))
2360 goto next;
2361
2362 mountpoint = cg_hybrid_get_mountpoint(line);
2363 if (!mountpoint) {
2364 ERROR("Failed parsing mountpoint from \"%s\"", line);
2365 goto next;
2366 }
2367
2368 if (type == CGROUP_SUPER_MAGIC)
2369 base_cgroup = cg_hybrid_get_current_cgroup(basecginfo, controller_list[0], CGROUP_SUPER_MAGIC);
2370 else
2371 base_cgroup = cg_hybrid_get_current_cgroup(basecginfo, NULL, CGROUP2_SUPER_MAGIC);
2372 if (!base_cgroup) {
2373 ERROR("Failed to find current cgroup");
2374 goto next;
2375 }
2376
2377 trim(base_cgroup);
2378 prune_init_scope(base_cgroup);
2379 if (type == CGROUP2_SUPER_MAGIC)
2380 writeable = test_writeable_v2(mountpoint, base_cgroup);
2381 else
2382 writeable = test_writeable_v1(mountpoint, base_cgroup);
2383 if (!writeable)
2384 goto next;
2385
2386 if (type == CGROUP2_SUPER_MAGIC) {
2387 char *cgv2_ctrl_path;
2388
2389 cgv2_ctrl_path = must_make_path(mountpoint, base_cgroup,
2390 "cgroup.controllers",
2391 NULL);
2392
2393 controller_list = cg_unified_get_controllers(cgv2_ctrl_path);
2394 free(cgv2_ctrl_path);
2395 if (!controller_list) {
2396 controller_list = cg_unified_make_empty_controller();
2397 TRACE("No controllers are enabled for "
2398 "delegation in the unified hierarchy");
2399 }
2400 }
2401
2402 /* Exclude all controllers that cgroup use does not want. */
2403 if (!cgroup_use_wants_controllers(ops, controller_list))
2404 goto next;
2405
2406 new = add_hierarchy(&ops->hierarchies, controller_list, mountpoint, base_cgroup, type);
2407 if (type == CGROUP2_SUPER_MAGIC && !ops->unified)
2408 ops->unified = new;
2409
2410 continue;
2411
2412 next:
2413 free_string_list(controller_list);
2414 free(mountpoint);
2415 free(base_cgroup);
2416 }
2417
2418 free_string_list(klist);
2419 free_string_list(nlist);
2420
2421 free(basecginfo);
2422
2423 fclose(f);
2424 free(line);
2425
2426 TRACE("Writable cgroup hierarchies:");
2427 lxc_cgfsng_print_hierarchies(ops);
2428
2429 /* verify that all controllers in cgroup.use and all crucial
2430 * controllers are accounted for
2431 */
2432 if (!all_controllers_found(ops))
2433 return false;
2434
2435 return true;
2436 }
2437
2438 static int cg_is_pure_unified(void)
2439 {
2440
2441 int ret;
2442 struct statfs fs;
2443
2444 ret = statfs("/sys/fs/cgroup", &fs);
2445 if (ret < 0)
2446 return -ENOMEDIUM;
2447
2448 if (is_fs_type(&fs, CGROUP2_SUPER_MAGIC))
2449 return CGROUP2_SUPER_MAGIC;
2450
2451 return 0;
2452 }
2453
2454 /* Get current cgroup from /proc/self/cgroup for the cgroupfs v2 hierarchy. */
2455 static char *cg_unified_get_current_cgroup(bool keep)
2456 {
2457 char *basecginfo, *base_cgroup;
2458 char *copy = NULL;
2459
2460 if (!keep && (geteuid() == 0))
2461 basecginfo = read_file("/proc/1/cgroup");
2462 else
2463 basecginfo = read_file("/proc/self/cgroup");
2464 if (!basecginfo)
2465 return NULL;
2466
2467 base_cgroup = strstr(basecginfo, "0::/");
2468 if (!base_cgroup)
2469 goto cleanup_on_err;
2470
2471 base_cgroup = base_cgroup + 3;
2472 copy = copy_to_eol(base_cgroup);
2473 if (!copy)
2474 goto cleanup_on_err;
2475
2476 cleanup_on_err:
2477 free(basecginfo);
2478 if (copy)
2479 trim(copy);
2480
2481 return copy;
2482 }
2483
2484 static int cg_unified_init(struct cgroup_ops *ops, bool keep)
2485 {
2486 int ret;
2487 char *mountpoint, *subtree_path;
2488 char **delegatable;
2489 char *base_cgroup = NULL;
2490
2491 ret = cg_is_pure_unified();
2492 if (ret == -ENOMEDIUM)
2493 return -ENOMEDIUM;
2494
2495 if (ret != CGROUP2_SUPER_MAGIC)
2496 return 0;
2497
2498 base_cgroup = cg_unified_get_current_cgroup(keep);
2499 if (!base_cgroup)
2500 return -EINVAL;
2501 prune_init_scope(base_cgroup);
2502
2503 /* We assume that we have already been given controllers to delegate
2504 * further down the hierarchy. If not it is up to the user to delegate
2505 * them to us.
2506 */
2507 mountpoint = must_copy_string("/sys/fs/cgroup");
2508 subtree_path = must_make_path(mountpoint, base_cgroup,
2509 "cgroup.subtree_control", NULL);
2510 delegatable = cg_unified_get_controllers(subtree_path);
2511 free(subtree_path);
2512 if (!delegatable)
2513 delegatable = cg_unified_make_empty_controller();
2514 if (!delegatable[0])
2515 TRACE("No controllers are enabled for delegation");
2516
2517 /* TODO: If the user requested specific controllers via lxc.cgroup.use
2518 * we should verify here. The reason I'm not doing it right is that I'm
2519 * not convinced that lxc.cgroup.use will be the future since it is a
2520 * global property. I much rather have an option that lets you request
2521 * controllers per container.
2522 */
2523
2524 add_hierarchy(&ops->hierarchies, delegatable, mountpoint, base_cgroup, CGROUP2_SUPER_MAGIC);
2525
2526 ops->cgroup_layout = CGROUP_LAYOUT_UNIFIED;
2527 return CGROUP2_SUPER_MAGIC;
2528 }
2529
2530 static bool cg_init(struct cgroup_ops *ops, struct lxc_conf *conf)
2531 {
2532 int ret;
2533 const char *tmp;
2534 bool keep = conf->cgroup_meta.keep;
2535
2536 tmp = lxc_global_config_value("lxc.cgroup.use");
2537 if (tmp) {
2538 char *chop, *cur, *pin;
2539
2540 pin = must_copy_string(tmp);
2541 chop = pin;
2542
2543 lxc_iterate_parts(cur, chop, ",") {
2544 must_append_string(&ops->cgroup_use, cur);
2545 }
2546
2547 free(pin);
2548 }
2549
2550 ret = cg_unified_init(ops, keep);
2551 if (ret < 0)
2552 return false;
2553
2554 if (ret == CGROUP2_SUPER_MAGIC)
2555 return true;
2556
2557 return cg_hybrid_init(ops, keep);
2558 }
2559
2560 __cgfsng_ops__ static bool cgfsng_data_init(struct cgroup_ops *ops)
2561 {
2562 const char *cgroup_pattern;
2563
2564 /* copy system-wide cgroup information */
2565 cgroup_pattern = lxc_global_config_value("lxc.cgroup.pattern");
2566 if (!cgroup_pattern) {
2567 /* lxc.cgroup.pattern is only NULL on error. */
2568 ERROR("Failed to retrieve cgroup pattern");
2569 return false;
2570 }
2571 ops->cgroup_pattern = must_copy_string(cgroup_pattern);
2572
2573 return true;
2574 }
2575
2576 struct cgroup_ops *cgfsng_ops_init(struct lxc_conf *conf)
2577 {
2578 struct cgroup_ops *cgfsng_ops;
2579
2580 cgfsng_ops = malloc(sizeof(struct cgroup_ops));
2581 if (!cgfsng_ops)
2582 return NULL;
2583
2584 memset(cgfsng_ops, 0, sizeof(struct cgroup_ops));
2585 cgfsng_ops->cgroup_layout = CGROUP_LAYOUT_UNKNOWN;
2586
2587 if (!cg_init(cgfsng_ops, conf)) {
2588 free(cgfsng_ops);
2589 return NULL;
2590 }
2591
2592 cgfsng_ops->data_init = cgfsng_data_init;
2593 cgfsng_ops->destroy = cgfsng_destroy;
2594 cgfsng_ops->create = cgfsng_create;
2595 cgfsng_ops->enter = cgfsng_enter;
2596 cgfsng_ops->escape = cgfsng_escape;
2597 cgfsng_ops->num_hierarchies = cgfsng_num_hierarchies;
2598 cgfsng_ops->get_hierarchies = cgfsng_get_hierarchies;
2599 cgfsng_ops->get_cgroup = cgfsng_get_cgroup;
2600 cgfsng_ops->get = cgfsng_get;
2601 cgfsng_ops->set = cgfsng_set;
2602 cgfsng_ops->unfreeze = cgfsng_unfreeze;
2603 cgfsng_ops->setup_limits = cgfsng_setup_limits;
2604 cgfsng_ops->driver = "cgfsng";
2605 cgfsng_ops->version = "1.0.0";
2606 cgfsng_ops->attach = cgfsng_attach;
2607 cgfsng_ops->chown = cgfsng_chown;
2608 cgfsng_ops->mount = cgfsng_mount;
2609 cgfsng_ops->nrtasks = cgfsng_nrtasks;
2610
2611 return cgfsng_ops;
2612 }