]> git.proxmox.com Git - mirror_lxcfs.git/blob - pam/pam_cgfs.c
a22d2f8e9dbdb42037621318cd8f08e1964b05fd
[mirror_lxcfs.git] / pam / pam_cgfs.c
1 /* pam-cgfs
2 *
3 * Copyright © 2016 Canonical, Inc
4 * Author: Serge Hallyn <serge.hallyn@ubuntu.com>
5 * Author: Christian Brauner <christian.brauner@ubuntu.com>
6 *
7 * When a user logs in, this pam module will create cgroups which the user may
8 * administer. It handles both pure cgroupfs v1 and pure cgroupfs v2, as well as
9 * mixed mounts, where some controllers are mounted in a standard cgroupfs v1
10 * hierarchy location (/sys/fs/cgroup/<controller>) and others are in the
11 * cgroupfs v2 hierarchy.
12 * Writeable cgroups are either created for all controllers or, if specified,
13 * for any controllers listed on the command line.
14 * The cgroup created will be "user/$user/0" for the first session,
15 * "user/$user/1" for the second, etc.
16 *
17 * Systems with a systemd init system are treated specially, both with respect
18 * to cgroupfs v1 and cgroupfs v2. For both, cgroupfs v1 and cgroupfs v2, We
19 * check whether systemd already placed us in a cgroup it created:
20 *
21 * user.slice/user-uid.slice/session-n.scope
22 *
23 * by checking whether uid == our uid. If it did, we simply chown the last
24 * part (session-n.scope). If it did not we create a cgroup as outlined above
25 * (user/$user/n) and chown it to our uid.
26 * The same holds for cgroupfs v2 where this assumptions becomes crucial:
27 * We __have to__ be placed in our under the cgroup systemd created for us on
28 * login, otherwise things like starting an xserver or similar will not work.
29 *
30 * All requested cgroups must be mounted under /sys/fs/cgroup/$controller,
31 * no messing around with finding mountpoints.
32 *
33 * See COPYING file for details.
34 */
35
36 #include <ctype.h>
37 #include <dirent.h>
38 #include <errno.h>
39 #include <fcntl.h>
40 #include <pwd.h>
41 #include <stdarg.h>
42 #include <stdbool.h>
43 #include <stdint.h>
44 #include <stdio.h>
45 #include <stdlib.h>
46 #include <string.h>
47 #include <syslog.h>
48 #include <unistd.h>
49 #include <linux/unistd.h>
50 #include <sys/mount.h>
51 #include <sys/param.h>
52 #include <sys/stat.h>
53 #include <sys/types.h>
54 #include <sys/vfs.h>
55
56 #define PAM_SM_SESSION
57 #include <security/_pam_macros.h>
58 #include <security/pam_modules.h>
59
60 #include "macro.h"
61
62 #ifndef CGROUP_SUPER_MAGIC
63 #define CGROUP_SUPER_MAGIC 0x27e0eb
64 #endif
65
66 #ifndef CGROUP2_SUPER_MAGIC
67 #define CGROUP2_SUPER_MAGIC 0x63677270
68 #endif
69
70 /* Taken over modified from the kernel sources. */
71 #define NBITS 32 /* bits in uint32_t */
72 #define DIV_ROUND_UP(n, d) (((n) + (d)-1) / (d))
73 #define BITS_TO_LONGS(nr) DIV_ROUND_UP(nr, NBITS)
74
75 static enum cg_mount_mode {
76 CGROUP_UNKNOWN = -1,
77 CGROUP_MIXED = 0,
78 CGROUP_PURE_V1 = 1,
79 CGROUP_PURE_V2 = 2,
80 CGROUP_UNINITIALIZED = 3,
81 } cg_mount_mode = CGROUP_UNINITIALIZED;
82
83 /* Common helper functions. Most of these have been taken from LXC. */
84 static void append_line(char **dest, size_t oldlen, char *new, size_t newlen);
85 static int append_null_to_list(void ***list);
86 static void batch_realloc(char **mem, size_t oldlen, size_t newlen);
87 static inline void clear_bit(unsigned bit, uint32_t *bitarr)
88 {
89 bitarr[bit / NBITS] &= ~(1 << (bit % NBITS));
90 }
91 static char *copy_to_eol(char *s);
92 static bool file_exists(const char *f);
93 static void free_string_list(char **list);
94 static char *get_mountpoint(char *line);
95 static bool get_uid_gid(const char *user, uid_t *uid, gid_t *gid);
96 static int handle_login(const char *user, uid_t uid, gid_t gid);
97 static inline bool is_set(unsigned bit, uint32_t *bitarr)
98 {
99 return (bitarr[bit / NBITS] & (1 << (bit % NBITS))) != 0;
100 }
101 /* __typeof__ should be safe to use with all compilers. */
102 typedef __typeof__(((struct statfs *)NULL)->f_type) fs_type_magic;
103 static bool has_fs_type(const struct statfs *fs, fs_type_magic magic_val);
104 static bool is_lxcfs(const char *line);
105 static bool is_cgv1(char *line);
106 static bool is_cgv2(char *line);
107 static bool mkdir_p(const char *root, char *path);
108 static void *must_alloc(size_t sz);
109 static void must_add_to_list(char ***clist, char *entry);
110 static void must_append_controller(char **klist, char **nlist, char ***clist,
111 char *entry);
112 static void must_append_string(char ***list, char *entry);
113 static char *must_copy_string(const char *entry);
114 static char *must_make_path(const char *first, ...) __attribute__((sentinel));
115 static void *must_realloc(void *orig, size_t sz);
116 static void mysyslog(int err, const char *format, ...) __attribute__((sentinel));
117 static char *read_file(char *fnam);
118 static int read_from_file(const char *filename, void* buf, size_t count);
119 static int recursive_rmdir(char *dirname);
120 static inline void set_bit(unsigned bit, uint32_t *bitarr)
121 {
122 bitarr[bit / NBITS] |= (1 << (bit % NBITS));
123 }
124 static bool string_in_list(char **list, const char *entry);
125 static char *string_join(const char *sep, const char **parts, bool use_as_prefix);
126 static void trim(char *s);
127 static bool write_int(char *path, int v);
128 static ssize_t write_nointr(int fd, const void* buf, size_t count);
129 static int write_to_file(const char *filename, const void *buf, size_t count,
130 bool add_newline);
131
132 /* cgroupfs prototypes. */
133 static bool cg_belongs_to_uid_gid(const char *path, uid_t uid, gid_t gid);
134 static uint32_t *cg_cpumask(char *buf, size_t nbits);
135 static bool cg_copy_parent_file(char *path, char *file);
136 static char *cg_cpumask_to_cpulist(uint32_t *bitarr, size_t nbits);
137 static bool cg_enter(const char *cgroup);
138 static void cg_escape(void);
139 static bool cg_filter_and_set_cpus(char *path, bool am_initialized);
140 static ssize_t cg_get_max_cpus(char *cpulist);
141 static int cg_get_version_of_mntpt(const char *path);
142 static bool cg_init(uid_t uid, gid_t gid);
143 static void cg_mark_to_make_rw(const char *cstring);
144 static void cg_prune_empty_cgroups(const char *user);
145 static bool cg_systemd_created_user_slice(const char *base_cgroup,
146 const char *init_cgroup,
147 const char *in, uid_t uid);
148 static bool cg_systemd_chown_existing_cgroup(const char *mountpoint,
149 const char *base_cgroup, uid_t uid,
150 gid_t gid,
151 bool systemd_user_slice);
152 static bool cg_systemd_under_user_slice_1(const char *in, uid_t uid);
153 static bool cg_systemd_under_user_slice_2(const char *base_cgroup,
154 const char *init_cgroup, uid_t uid);
155 static void cg_systemd_prune_init_scope(char *cg);
156 static bool is_lxcfs(const char *line);
157
158 /* cgroupfs v1 prototypes. */
159 struct cgv1_hierarchy {
160 char **controllers;
161 char *mountpoint;
162 char *base_cgroup;
163 char *fullcgpath;
164 char *init_cgroup;
165 bool create_rw_cgroup;
166 bool systemd_user_slice;
167 };
168
169 static struct cgv1_hierarchy **cgv1_hierarchies;
170
171 static void cgv1_add_controller(char **clist, char *mountpoint,
172 char *base_cgroup, char *init_cgroup);
173 static bool cgv1_controller_in_clist(char *cgline, char *c);
174 static bool cgv1_controller_lists_intersect(char **l1, char **l2);
175 static bool cgv1_controller_list_is_dup(struct cgv1_hierarchy **hlist,
176 char **clist);
177 static bool cgv1_create(const char *cgroup, uid_t uid, gid_t gid,
178 bool *existed);
179 static bool cgv1_create_one(struct cgv1_hierarchy *h, const char *cgroup,
180 uid_t uid, gid_t gid, bool *existed);
181 static bool cgv1_enter(const char *cgroup);
182 static void cgv1_escape(void);
183 static bool cgv1_get_controllers(char ***klist, char ***nlist);
184 static char *cgv1_get_current_cgroup(char *basecginfo, char *controller);
185 static char **cgv1_get_proc_mountinfo_controllers(char **klist, char **nlist,
186 char *line);
187 static bool cgv1_handle_cpuset_hierarchy(struct cgv1_hierarchy *h,
188 const char *cgroup);
189 static bool cgv1_handle_root_cpuset_hierarchy(struct cgv1_hierarchy *h);
190 static bool cgv1_init(uid_t uid, gid_t gid);
191 static void cgv1_mark_to_make_rw(char **clist);
192 static char *cgv1_must_prefix_named(char *entry);
193 static bool cgv1_prune_empty_cgroups(const char *user);
194 static bool cgv1_remove_one(struct cgv1_hierarchy *h, const char *cgroup);
195 static bool is_cgv1(char *line);
196
197 /* cgroupfs v2 prototypes. */
198 struct cgv2_hierarchy {
199 char **controllers;
200 char *mountpoint;
201 char *base_cgroup;
202 char *fullcgpath;
203 char *init_cgroup;
204 bool create_rw_cgroup;
205 bool systemd_user_slice;
206 };
207
208 /* Actually this should only be a single hierarchy. But for the sake of
209 * parallelism and because the layout of the cgroupfs v2 is still somewhat
210 * changing, we'll leave it as an array of structs.
211 */
212 static struct cgv2_hierarchy **cgv2_hierarchies;
213
214 static void cgv2_add_controller(char **clist, char *mountpoint,
215 char *base_cgroup, char *init_cgroup,
216 bool systemd_user_slice);
217 static bool cgv2_create(const char *cgroup, uid_t uid, gid_t gid,
218 bool *existed);
219 static bool cgv2_enter(const char *cgroup);
220 static void cgv2_escape(void);
221 static char *cgv2_get_current_cgroup(int pid);
222 static bool cgv2_init(uid_t uid, gid_t gid);
223 static void cgv2_mark_to_make_rw(char **clist);
224 static bool cgv2_prune_empty_cgroups(const char *user);
225 static bool cgv2_remove(const char *cgroup);
226 static bool is_cgv2(char *line);
227
228 /* Common helper functions. Most of these have been taken from LXC. */
229 static void mysyslog(int err, const char *format, ...)
230 {
231 va_list args;
232
233 va_start(args, format);
234 openlog("PAM-CGFS", LOG_CONS | LOG_PID, LOG_AUTH);
235 vsyslog(err, format, args);
236 va_end(args);
237 closelog();
238 }
239
240 /* realloc() pointer; do not fail. */
241 static void *must_realloc(void *orig, size_t sz)
242 {
243 void *ret;
244
245 do {
246 ret = realloc(orig, sz);
247 } while (!ret);
248
249 return ret;
250 }
251
252 /* realloc() pointer in batch sizes; do not fail. */
253 #define BATCH_SIZE 50
254 static void batch_realloc(char **mem, size_t oldlen, size_t newlen)
255 {
256 int newbatches = (newlen / BATCH_SIZE) + 1;
257 int oldbatches = (oldlen / BATCH_SIZE) + 1;
258
259 if (!*mem || newbatches > oldbatches)
260 *mem = must_realloc(*mem, newbatches * BATCH_SIZE);
261 }
262
263 /* Append lines as is to pointer; do not fail. */
264 static void append_line(char **dest, size_t oldlen, char *new, size_t newlen)
265 {
266 size_t full = oldlen + newlen;
267
268 batch_realloc(dest, oldlen, full + 1);
269
270 memcpy(*dest + oldlen, new, newlen + 1);
271 }
272
273 /* Read in whole file and return allocated pointer. */
274 static char *read_file(char *fnam)
275 {
276 FILE *f;
277 int linelen;
278 char *line = NULL, *buf = NULL;
279 size_t len = 0, fulllen = 0;
280
281 f = fopen(fnam, "r");
282 if (!f)
283 return NULL;
284
285 while ((linelen = getline(&line, &len, f)) != -1) {
286 append_line(&buf, fulllen, line, linelen);
287 fulllen += linelen;
288 }
289
290 fclose(f);
291 free(line);
292
293 return buf;
294 }
295
296 /* Given a pointer to a null-terminated array of pointers, realloc to add one
297 * entry, and point the new entry to NULL. Do not fail. Return the index to the
298 * second-to-last entry - that is, the one which is now available for use
299 * (keeping the list null-terminated).
300 */
301 static int append_null_to_list(void ***list)
302 {
303 int newentry = 0;
304
305 if (*list)
306 for (; (*list)[newentry]; newentry++) {
307 ;
308 }
309
310 *list = must_realloc(*list, (newentry + 2) * sizeof(void **));
311 (*list)[newentry + 1] = NULL;
312
313 return newentry;
314 }
315
316 /* Make allocated copy of string; do not fail. */
317 static char *must_copy_string(const char *entry)
318 {
319 char *ret;
320
321 if (!entry)
322 return NULL;
323
324 do {
325 ret = strdup(entry);
326 } while (!ret);
327
328 return ret;
329 }
330
331 /* Append new entry to null-terminated array of pointer; make sure that array of
332 * pointers will still be null-terminated.
333 */
334 static void must_append_string(char ***list, char *entry)
335 {
336 int newentry;
337 char *copy;
338
339 newentry = append_null_to_list((void ***)list);
340 copy = must_copy_string(entry);
341 (*list)[newentry] = copy;
342 }
343
344 /* Remove newlines from string. */
345 static void trim(char *s)
346 {
347 size_t len = strlen(s);
348
349 while (s[len - 1] == '\n')
350 s[--len] = '\0';
351 }
352
353 /* Allocate pointer; do not fail. */
354 static void *must_alloc(size_t sz)
355 {
356 return must_realloc(NULL, sz);
357 }
358
359 /* Make allocated copy of string. End of string is taken to be '\n'. */
360 static char *copy_to_eol(char *s)
361 {
362 char *newline, *sret;
363 size_t len;
364
365 newline = strchr(s, '\n');
366 if (!newline)
367 return NULL;
368
369 len = newline - s;
370 sret = must_alloc(len + 1);
371 memcpy(sret, s, len);
372 sret[len] = '\0';
373
374 return sret;
375 }
376
377 /* Check if given entry under /proc/<pid>/mountinfo is a fuse.lxcfs mount. */
378 static bool is_lxcfs(const char *line)
379 {
380 char *p = strstr(line, " - ");
381 if (!p)
382 return false;
383
384 return strncmp(p, " - fuse.lxcfs ", 14) == 0;
385 }
386
387 /* Check if given entry under /proc/<pid>/mountinfo is a cgroupfs v1 mount. */
388 static bool is_cgv1(char *line)
389 {
390 char *p = strstr(line, " - ");
391 if (!p)
392 return false;
393
394 return strncmp(p, " - cgroup ", 10) == 0;
395 }
396
397 /* Check if given entry under /proc/<pid>/mountinfo is a cgroupfs v2 mount. */
398 static bool is_cgv2(char *line)
399 {
400 char *p = strstr(line, " - ");
401 if (!p)
402 return false;
403
404 return strncmp(p, " - cgroup2 ", 11) == 0;
405 }
406
407 /* Given a null-terminated array of strings, check whether @entry is one of the
408 * strings
409 */
410 static bool string_in_list(char **list, const char *entry)
411 {
412 char **it;
413
414 for (it = list; it && *it; it++)
415 if (strcmp(*it, entry) == 0)
416 return true;
417
418 return false;
419 }
420
421 /* Free null-terminated array of strings. */
422 static void free_string_list(char **list)
423 {
424 char **it;
425
426 for (it = list; it && *it; it++)
427 free(*it);
428 free(list);
429 }
430
431 /* Concatenate all passed-in strings into one path. Do not fail. If any piece
432 * is not prefixed with '/', add a '/'. Does not remove duplicate '///' from the
433 * created path.
434 */
435 static char *must_make_path(const char *first, ...)
436 {
437 va_list args;
438 char *cur, *dest;
439 size_t full_len;
440
441 full_len = strlen(first);
442
443 dest = must_copy_string(first);
444
445 va_start(args, first);
446 while ((cur = va_arg(args, char *)) != NULL) {
447 full_len += strlen(cur);
448
449 if (cur[0] != '/')
450 full_len++;
451
452 dest = must_realloc(dest, full_len + 1);
453
454 if (cur[0] != '/')
455 strcat(dest, "/");
456
457 strcat(dest, cur);
458 }
459 va_end(args);
460
461 return dest;
462 }
463
464 /* Write single integer to file. */
465 static bool write_int(char *path, int v)
466 {
467 FILE *f;
468 bool ret = true;
469
470 f = fopen(path, "w");
471 if (!f)
472 return false;
473
474 if (fprintf(f, "%d\n", v) < 0)
475 ret = false;
476
477 if (fclose(f) != 0)
478 ret = false;
479
480 return ret;
481 }
482
483 /* Check if a given file exists. */
484 static bool file_exists(const char *f)
485 {
486 struct stat statbuf;
487
488 return stat(f, &statbuf) == 0;
489 }
490
491 /* Create directory and (if necessary) its parents. */
492 static bool mkdir_p(const char *root, char *path)
493 {
494 char *b, orig, *e;
495
496 if (strlen(path) < strlen(root))
497 return false;
498
499 if (strlen(path) == strlen(root))
500 return true;
501
502 b = path + strlen(root) + 1;
503 while (true) {
504 while (*b && (*b == '/'))
505 b++;
506 if (!*b)
507 return true;
508
509 e = b + 1;
510 while (*e && *e != '/')
511 e++;
512
513 orig = *e;
514 if (orig)
515 *e = '\0';
516
517 if (file_exists(path))
518 goto next;
519
520 if (mkdir(path, 0755) < 0) {
521 lxcfs_debug("Failed to create %s: %s.\n", path, strerror(errno));
522 return false;
523 }
524
525 next:
526 if (!orig)
527 return true;
528
529 *e = orig;
530 b = e + 1;
531 }
532
533 return false;
534 }
535
536 /* Recursively remove directory and its parents. */
537 static int recursive_rmdir(char *dirname)
538 {
539 struct dirent *direntp;
540 DIR *dir;
541 int r = 0;
542
543 dir = opendir(dirname);
544 if (!dir)
545 return -ENOENT;
546
547 while ((direntp = readdir(dir))) {
548 struct stat st;
549 char *pathname;
550
551 if (!direntp)
552 break;
553
554 if (!strcmp(direntp->d_name, ".") ||
555 !strcmp(direntp->d_name, ".."))
556 continue;
557
558 pathname = must_make_path(dirname, direntp->d_name, NULL);
559
560 if (lstat(pathname, &st)) {
561 if (!r)
562 lxcfs_debug("Failed to stat %s.\n", pathname);
563 r = -1;
564 goto next;
565 }
566
567 if (!S_ISDIR(st.st_mode))
568 goto next;
569
570 if (recursive_rmdir(pathname) < 0)
571 r = -1;
572 next:
573 free(pathname);
574 }
575
576 if (rmdir(dirname) < 0) {
577 if (!r)
578 lxcfs_debug("Failed to delete %s: %s.\n", dirname, strerror(errno));
579 r = -1;
580 }
581
582 if (closedir(dir) < 0) {
583 if (!r)
584 lxcfs_debug("Failed to delete %s: %s.\n", dirname, strerror(errno));
585 r = -1;
586 }
587
588 return r;
589 }
590
591 /* Add new entry to null-terminated array of pointers. Make sure array is still
592 * null-terminated.
593 */
594 static void must_add_to_list(char ***clist, char *entry)
595 {
596 int newentry;
597
598 newentry = append_null_to_list((void ***)clist);
599 (*clist)[newentry] = must_copy_string(entry);
600 }
601
602 /* Get mountpoint from a /proc/<pid>/mountinfo line. */
603 static char *get_mountpoint(char *line)
604 {
605 int i;
606 char *p, *sret, *p2;
607 size_t len;
608
609 p = line;
610
611 for (i = 0; i < 4; i++) {
612 p = strchr(p, ' ');
613 if (!p)
614 return NULL;
615 p++;
616 }
617
618 p2 = strchr(p, ' ');
619 if (p2)
620 *p2 = '\0';
621
622 len = strlen(p);
623 sret = must_alloc(len + 1);
624 memcpy(sret, p, len);
625 sret[len] = '\0';
626
627 return sret;
628 }
629
630 /* Create list of cgroupfs v1 controller found under /proc/self/cgroup. Skips
631 * the 0::/some/path cgroupfs v2 hierarchy listed. Splits controllers into
632 * kernel controllers (@klist) and named controllers (@nlist).
633 */
634 static bool cgv1_get_controllers(char ***klist, char ***nlist)
635 {
636 FILE *f;
637 char *line = NULL;
638 size_t len = 0;
639
640 f = fopen("/proc/self/cgroup", "r");
641 if (!f)
642 return false;
643
644 while (getline(&line, &len, f) != -1) {
645 char *p, *p2, *tok;
646 char *saveptr = NULL;
647
648 p = strchr(line, ':');
649 if (!p)
650 continue;
651 p++;
652
653 p2 = strchr(p, ':');
654 if (!p2)
655 continue;
656 *p2 = '\0';
657
658 /* Skip the v2 hierarchy. */
659 if ((p2 - p) == 0)
660 continue;
661
662 for (tok = strtok_r(p, ",", &saveptr); tok;
663 tok = strtok_r(NULL, ",", &saveptr)) {
664 if (strncmp(tok, "name=", 5) == 0)
665 must_append_string(nlist, tok);
666 else
667 must_append_string(klist, tok);
668 }
669 }
670
671 free(line);
672 fclose(f);
673
674 return true;
675 }
676
677 /* Get list of controllers for cgroupfs v2 hierarchy by looking at
678 * cgroup.controllers and/or cgroup.subtree_control of a given (parent) cgroup.
679 static bool cgv2_get_controllers(char ***klist)
680 {
681 return -ENOSYS;
682 }
683 */
684
685 /* Get current cgroup from /proc/self/cgroup for the cgroupfs v2 hierarchy. */
686 static char *cgv2_get_current_cgroup(int pid)
687 {
688 int ret;
689 char *cgroups_v2;
690 char *current_cgroup;
691 char *copy = NULL;
692 /* The largest integer that can fit into long int is 2^64. This is a
693 * 20-digit number. */
694 #define __PIDLEN /* /proc */ 5 + /* /pid-to-str */ 21 + /* /cgroup */ 7 + /* \0 */ 1
695 char path[__PIDLEN];
696
697 ret = snprintf(path, __PIDLEN, "/proc/%d/cgroup", pid);
698 if (ret < 0 || ret >= __PIDLEN)
699 return NULL;
700
701 cgroups_v2 = read_file(path);
702 if (!cgroups_v2)
703 return NULL;
704
705 current_cgroup = strstr(cgroups_v2, "0::/");
706 if (!current_cgroup)
707 goto cleanup_on_err;
708
709 current_cgroup = current_cgroup + 3;
710 copy = copy_to_eol(current_cgroup);
711 if (!copy)
712 goto cleanup_on_err;
713
714 cleanup_on_err:
715 free(cgroups_v2);
716 if (copy)
717 trim(copy);
718
719 return copy;
720 }
721
722 /* Given two null-terminated lists of strings, return true if any string is in
723 * both.
724 */
725 static bool cgv1_controller_lists_intersect(char **l1, char **l2)
726 {
727 char **it;
728
729 if (!l2)
730 return false;
731
732 for (it = l1; it && *it; it++)
733 if (string_in_list(l2, *it))
734 return true;
735
736 return false;
737 }
738
739 /* For a null-terminated list of controllers @clist, return true if any of those
740 * controllers is already listed the null-terminated list of hierarchies @hlist.
741 * Realistically, if one is present, all must be present.
742 */
743 static bool cgv1_controller_list_is_dup(struct cgv1_hierarchy **hlist, char **clist)
744 {
745 struct cgv1_hierarchy **it;
746
747 for (it = hlist; it && *it; it++)
748 if ((*it)->controllers)
749 if (cgv1_controller_lists_intersect((*it)->controllers, clist))
750 return true;
751 return false;
752
753 }
754
755 /* Set boolean to mark controllers under which we are supposed create a
756 * writeable cgroup.
757 */
758 static void cgv1_mark_to_make_rw(char **clist)
759 {
760 struct cgv1_hierarchy **it;
761
762 for (it = cgv1_hierarchies; it && *it; it++)
763 if ((*it)->controllers)
764 if (cgv1_controller_lists_intersect((*it)->controllers, clist))
765 (*it)->create_rw_cgroup = true;
766 }
767
768 /* Set boolean to mark whether we are supposed to create a writeable cgroup in
769 * the cgroupfs v2 hierarchy.
770 */
771 static void cgv2_mark_to_make_rw(char **clist)
772 {
773 if (string_in_list(clist, "unified"))
774 if (cgv2_hierarchies)
775 (*cgv2_hierarchies)->create_rw_cgroup = true;
776 }
777
778 /* Wrapper around cgv{1,2}_mark_to_make_rw(). */
779 static void cg_mark_to_make_rw(const char *cstring)
780 {
781 char *copy, *tok;
782 char *saveptr = NULL;
783 char **clist = NULL;
784
785 copy = must_copy_string(cstring);
786
787 for (tok = strtok_r(copy, ",", &saveptr); tok;
788 tok = strtok_r(NULL, ",", &saveptr))
789 must_add_to_list(&clist, tok);
790
791 free(copy);
792
793 cgv1_mark_to_make_rw(clist);
794 cgv2_mark_to_make_rw(clist);
795
796 free_string_list(clist);
797 }
798
799 /* Prefix any named controllers with "name=", e.g. "name=systemd". */
800 static char *cgv1_must_prefix_named(char *entry)
801 {
802 char *s;
803 int ret;
804 size_t len;
805
806 len = strlen(entry);
807 s = must_alloc(len + 6);
808
809 ret = snprintf(s, len + 6, "name=%s", entry);
810 if (ret < 0 || (size_t)ret >= (len + 6))
811 return NULL;
812
813 return s;
814 }
815
816 /* Append kernel controller in @klist or named controller in @nlist to @clist */
817 static void must_append_controller(char **klist, char **nlist, char ***clist, char *entry)
818 {
819 int newentry;
820 char *copy;
821
822 if (string_in_list(klist, entry) && string_in_list(nlist, entry))
823 return;
824
825 newentry = append_null_to_list((void ***)clist);
826
827 if (strncmp(entry, "name=", 5) == 0)
828 copy = must_copy_string(entry);
829 else if (string_in_list(klist, entry))
830 copy = must_copy_string(entry);
831 else
832 copy = cgv1_must_prefix_named(entry);
833
834 (*clist)[newentry] = copy;
835 }
836
837 /* Get the controllers from a mountinfo line. There are other ways we could get
838 * this info. For lxcfs, field 3 is /cgroup/controller-list. For cgroupfs, we
839 * could parse the mount options. But we simply assume that the mountpoint must
840 * be /sys/fs/cgroup/controller-list
841 */
842 static char **cgv1_get_proc_mountinfo_controllers(char **klist, char **nlist, char *line)
843 {
844 int i;
845 char *p, *p2, *tok;
846 char *saveptr = NULL;
847 char **aret = NULL;
848
849 p = line;
850
851 for (i = 0; i < 4; i++) {
852 p = strchr(p, ' ');
853 if (!p)
854 return NULL;
855 p++;
856 }
857 if (!p)
858 return NULL;
859
860 if (strncmp(p, "/sys/fs/cgroup/", 15) != 0)
861 return NULL;
862
863 p += 15;
864
865 p2 = strchr(p, ' ');
866 if (!p2)
867 return NULL;
868 *p2 = '\0';
869
870 for (tok = strtok_r(p, ",", &saveptr); tok;
871 tok = strtok_r(NULL, ",", &saveptr))
872 must_append_controller(klist, nlist, &aret, tok);
873
874 return aret;
875 }
876
877 /* Check if a cgroupfs v2 controller is present in the string @cgline. */
878 static bool cgv1_controller_in_clist(char *cgline, char *c)
879 {
880 size_t len;
881 char *tok, *eol, *tmp;
882 char *saveptr = NULL;
883
884 eol = strchr(cgline, ':');
885 if (!eol)
886 return false;
887
888 len = eol - cgline;
889 tmp = alloca(len + 1);
890 memcpy(tmp, cgline, len);
891 tmp[len] = '\0';
892
893 for (tok = strtok_r(tmp, ",", &saveptr); tok;
894 tok = strtok_r(NULL, ",", &saveptr)) {
895 if (strcmp(tok, c) == 0)
896 return true;
897 }
898 return false;
899 }
900
901 /* Get current cgroup from the /proc/<pid>/cgroup file passed in via @basecginfo
902 * of a given cgv1 controller passed in via @controller.
903 */
904 static char *cgv1_get_current_cgroup(char *basecginfo, char *controller)
905 {
906 char *p;
907
908 p = basecginfo;
909
910 while (true) {
911 p = strchr(p, ':');
912 if (!p)
913 return NULL;
914 p++;
915
916 if (cgv1_controller_in_clist(p, controller)) {
917 p = strchr(p, ':');
918 if (!p)
919 return NULL;
920 p++;
921
922 return copy_to_eol(p);
923 }
924
925 p = strchr(p, '\n');
926 if (!p)
927 return NULL;
928 p++;
929 }
930
931 return NULL;
932 }
933
934 /* Remove /init.scope from string @cg. This will mostly affect systemd-based
935 * systems.
936 */
937 #define INIT_SCOPE "/init.scope"
938 static void cg_systemd_prune_init_scope(char *cg)
939 {
940 char *point;
941
942 if (!cg)
943 return;
944
945 point = cg + strlen(cg) - strlen(INIT_SCOPE);
946 if (point < cg)
947 return;
948
949 if (strcmp(point, INIT_SCOPE) == 0) {
950 if (point == cg)
951 *(point + 1) = '\0';
952 else
953 *point = '\0';
954 }
955 }
956
957 /* Add new info about a mounted cgroupfs v1 hierarchy. Includes the controllers
958 * mounted into that hierarchy (e.g. cpu,cpuacct), the mountpoint of that
959 * hierarchy (/sys/fs/cgroup/<controller>, the base cgroup of the current
960 * process gathered from /proc/self/cgroup, and the init cgroup of PID1 gathered
961 * from /proc/1/cgroup.
962 */
963 static void cgv1_add_controller(char **clist, char *mountpoint, char *base_cgroup, char *init_cgroup)
964 {
965 struct cgv1_hierarchy *new;
966 int newentry;
967
968 new = must_alloc(sizeof(*new));
969 new->controllers = clist;
970 new->mountpoint = mountpoint;
971 new->base_cgroup = base_cgroup;
972 new->fullcgpath = NULL;
973 new->create_rw_cgroup = false;
974 new->init_cgroup = init_cgroup;
975 new->systemd_user_slice = false;
976
977 newentry = append_null_to_list((void ***)&cgv1_hierarchies);
978 cgv1_hierarchies[newentry] = new;
979 }
980
981 /* Add new info about the mounted cgroupfs v2 hierarchy. Can (but doesn't
982 * currently) include the controllers mounted into the hierarchy (e.g. memory,
983 * pids, blkio), the mountpoint of that hierarchy (Should usually be
984 * /sys/fs/cgroup but some init systems seems to think it might be a good idea
985 * to also mount empty cgroupfs v2 hierarchies at /sys/fs/cgroup/systemd.), the
986 * base cgroup of the current process gathered from /proc/self/cgroup, and the
987 * init cgroup of PID1 gathered from /proc/1/cgroup.
988 */
989 static void cgv2_add_controller(char **clist, char *mountpoint, char *base_cgroup, char *init_cgroup, bool systemd_user_slice)
990 {
991 struct cgv2_hierarchy *new;
992 int newentry;
993
994 new = must_alloc(sizeof(*new));
995 new->controllers = clist;
996 new->mountpoint = mountpoint;
997 new->base_cgroup = base_cgroup;
998 new->fullcgpath = NULL;
999 new->create_rw_cgroup = false;
1000 new->init_cgroup = init_cgroup;
1001 new->systemd_user_slice = systemd_user_slice;
1002
1003 newentry = append_null_to_list((void ***)&cgv2_hierarchies);
1004 cgv2_hierarchies[newentry] = new;
1005 }
1006
1007 /* In Ubuntu 14.04, the paths created for us were
1008 * '/user/$uid.user/$something.session' This can be merged better with
1009 * systemd_created_slice_for_us(), but keeping it separate makes it easier to
1010 * reason about the correctness.
1011 */
1012 static bool cg_systemd_under_user_slice_1(const char *in, uid_t uid)
1013 {
1014 char *p;
1015 size_t len;
1016 int id;
1017 char *copy = NULL;
1018 bool bret = false;
1019
1020 copy = must_copy_string(in);
1021 if (strlen(copy) < strlen("/user/1.user/1.session"))
1022 goto cleanup;
1023 p = copy + strlen(copy) - 1;
1024
1025 /* skip any trailing '/' (shouldn't be any, but be sure) */
1026 while (p >= copy && *p == '/')
1027 *(p--) = '\0';
1028 if (p < copy)
1029 goto cleanup;
1030
1031 /* Get last path element */
1032 while (p >= copy && *p != '/')
1033 p--;
1034 if (p < copy)
1035 goto cleanup;
1036 /* make sure it is something.session */
1037 len = strlen(p + 1);
1038 if (len < strlen("1.session") ||
1039 strncmp(p + 1 + len - 8, ".session", 8) != 0)
1040 goto cleanup;
1041
1042 /* ok last path piece checks out, now check the second to last */
1043 *(p + 1) = '\0';
1044 while (p >= copy && *(--p) != '/')
1045 ;
1046 if (sscanf(p + 1, "%d.user/", &id) != 1)
1047 goto cleanup;
1048
1049 if (id != (int)uid)
1050 goto cleanup;
1051
1052 bret = true;
1053
1054 cleanup:
1055 free(copy);
1056 return bret;
1057 }
1058
1059 /* So long as our path relative to init starts with /user.slice/user-$uid.slice,
1060 * assume it belongs to $uid and chown it
1061 */
1062 static bool cg_systemd_under_user_slice_2(const char *base_cgroup,
1063 const char *init_cgroup, uid_t uid)
1064 {
1065 int ret;
1066 char buf[100];
1067 size_t curlen, initlen;
1068
1069 curlen = strlen(base_cgroup);
1070 initlen = strlen(init_cgroup);
1071 if (curlen <= initlen)
1072 return false;
1073
1074 if (strncmp(base_cgroup, init_cgroup, initlen) != 0)
1075 return false;
1076
1077 ret = snprintf(buf, 100, "/user.slice/user-%d.slice/", (int)uid);
1078 if (ret < 0 || ret >= 100)
1079 return false;
1080
1081 if (initlen == 1)
1082 initlen = 0; // skip the '/'
1083
1084 return strncmp(base_cgroup + initlen, buf, strlen(buf)) == 0;
1085 }
1086
1087 /* The systemd-created path is: user-$uid.slice/session-c$session.scope. If that
1088 * is not the end of our systemd path, then we're not part of the PAM call that
1089 * created that path.
1090 *
1091 * The last piece is chowned to $uid, the user- part not.
1092 * Note: If the user creates paths that look like what we're looking for to
1093 * 'fool' us, either
1094 * - they fool us, we create new cgroups, and they get auto-logged-out.
1095 * - they fool a root sudo, systemd cgroup is not changed but chowned, and they
1096 * lose ownership of their cgroups
1097 */
1098 static bool cg_systemd_created_user_slice(const char *base_cgroup,
1099 const char *init_cgroup,
1100 const char *in, uid_t uid)
1101 {
1102 char *p;
1103 size_t len;
1104 int id;
1105 char *copy = NULL;
1106 bool bret = false;
1107
1108 copy = must_copy_string(in);
1109
1110 /* An old version of systemd has already created a cgroup for us. */
1111 if (cg_systemd_under_user_slice_1(in, uid))
1112 goto succeed;
1113
1114 /* A new version of systemd has already created a cgroup for us. */
1115 if (cg_systemd_under_user_slice_2(base_cgroup, init_cgroup, uid))
1116 goto succeed;
1117
1118 if (strlen(copy) < strlen("/user-0.slice/session-0.scope"))
1119 goto cleanup;
1120
1121 p = copy + strlen(copy) - 1;
1122 /* Skip any trailing '/' (shouldn't be any, but be sure). */
1123 while (p >= copy && *p == '/')
1124 *(p--) = '\0';
1125
1126 if (p < copy)
1127 goto cleanup;
1128
1129 /* Get last path element */
1130 while (p >= copy && *p != '/')
1131 p--;
1132
1133 if (p < copy)
1134 goto cleanup;
1135
1136 /* Make sure it is session-something.scope. */
1137 len = strlen(p + 1);
1138 if (strncmp(p + 1, "session-", strlen("session-")) != 0 ||
1139 strncmp(p + 1 + len - 6, ".scope", 6) != 0)
1140 goto cleanup;
1141
1142 /* Ok last path piece checks out, now check the second to last. */
1143 *(p + 1) = '\0';
1144 while (p >= copy && *(--p) != '/')
1145 ;
1146
1147 if (sscanf(p + 1, "user-%d.slice/", &id) != 1)
1148 goto cleanup;
1149
1150 if (id != (int)uid)
1151 goto cleanup;
1152
1153 succeed:
1154 bret = true;
1155 cleanup:
1156 free(copy);
1157 return bret;
1158 }
1159
1160 /* Chown existing cgroup that systemd has already created for us. */
1161 static bool cg_systemd_chown_existing_cgroup(const char *mountpoint,
1162 const char *base_cgroup, uid_t uid,
1163 gid_t gid, bool systemd_user_slice)
1164 {
1165 char *path;
1166
1167 if (!systemd_user_slice)
1168 return false;
1169
1170 path = must_make_path(mountpoint, base_cgroup, NULL);
1171
1172 /* A cgroup within name=systemd has already been created. So we only
1173 * need to chown it.
1174 */
1175 if (chown(path, uid, gid) < 0)
1176 mysyslog(LOG_WARNING, "Failed to chown %s to %d:%d: %s.\n",
1177 path, (int)uid, (int)gid, strerror(errno), NULL);
1178 lxcfs_debug("Chowned %s to %d:%d.\n", path, (int)uid, (int)gid);
1179
1180 free(path);
1181 return true;
1182 }
1183
1184 /* Detect and store information about cgroupfs v1 hierarchies. */
1185 static bool cgv1_init(uid_t uid, gid_t gid)
1186 {
1187 FILE *f;
1188 struct cgv1_hierarchy **it;
1189 char *basecginfo;
1190 char *line = NULL;
1191 char **klist = NULL, **nlist = NULL;
1192 size_t len = 0;
1193
1194 basecginfo = read_file("/proc/self/cgroup");
1195 if (!basecginfo)
1196 return false;
1197
1198 f = fopen("/proc/self/mountinfo", "r");
1199 if (!f) {
1200 free(basecginfo);
1201 return false;
1202 }
1203
1204 cgv1_get_controllers(&klist, &nlist);
1205
1206 while (getline(&line, &len, f) != -1) {
1207 char **controller_list = NULL;
1208 char *mountpoint, *base_cgroup;
1209
1210 if (is_lxcfs(line) || !is_cgv1(line))
1211 continue;
1212
1213 controller_list = cgv1_get_proc_mountinfo_controllers(klist, nlist, line);
1214 if (!controller_list)
1215 continue;
1216
1217 if (cgv1_controller_list_is_dup(cgv1_hierarchies,
1218 controller_list)) {
1219 free(controller_list);
1220 continue;
1221 }
1222
1223 mountpoint = get_mountpoint(line);
1224 if (!mountpoint) {
1225 free_string_list(controller_list);
1226 continue;
1227 }
1228
1229 base_cgroup = cgv1_get_current_cgroup(basecginfo, controller_list[0]);
1230 if (!base_cgroup) {
1231 free_string_list(controller_list);
1232 free(mountpoint);
1233 continue;
1234 }
1235 trim(base_cgroup);
1236 lxcfs_debug("Detected cgroupfs v1 controller \"%s\" with "
1237 "mountpoint \"%s\" and cgroup \"%s\".\n",
1238 controller_list[0], mountpoint, base_cgroup);
1239 cgv1_add_controller(controller_list, mountpoint, base_cgroup,
1240 NULL);
1241 }
1242 free_string_list(klist);
1243 free_string_list(nlist);
1244 free(basecginfo);
1245 fclose(f);
1246 free(line);
1247
1248 /* Retrieve init cgroup path for all controllers. */
1249 basecginfo = read_file("/proc/1/cgroup");
1250 if (!basecginfo)
1251 return false;
1252
1253 for (it = cgv1_hierarchies; it && *it; it++) {
1254 if ((*it)->controllers) {
1255 char *init_cgroup, *user_slice;
1256 /* We've already stored the controller and received its
1257 * current cgroup. If we now fail to retrieve its init
1258 * cgroup, we should probably fail.
1259 */
1260 init_cgroup = cgv1_get_current_cgroup(basecginfo, (*it)->controllers[0]);
1261 if (!init_cgroup) {
1262 free(basecginfo);
1263 return false;
1264 }
1265 cg_systemd_prune_init_scope(init_cgroup);
1266 (*it)->init_cgroup = init_cgroup;
1267 lxcfs_debug("cgroupfs v1 controller \"%s\" has init "
1268 "cgroup \"%s\".\n",
1269 (*(*it)->controllers), init_cgroup);
1270 /* Check whether systemd has already created a cgroup
1271 * for us.
1272 */
1273 user_slice = must_make_path((*it)->mountpoint, (*it)->base_cgroup, NULL);
1274 if (cg_systemd_created_user_slice((*it)->base_cgroup, (*it)->init_cgroup, user_slice, uid))
1275 (*it)->systemd_user_slice = true;
1276 }
1277 }
1278 free(basecginfo);
1279
1280 return true;
1281 }
1282
1283 /* __typeof__ should be safe to use with all compilers. */
1284 typedef __typeof__(((struct statfs *)NULL)->f_type) fs_type_magic;
1285 /* Check whether given mountpoint has mount type specified via @magic_val. */
1286 static bool has_fs_type(const struct statfs *fs, fs_type_magic magic_val)
1287 {
1288 return (fs->f_type == (fs_type_magic)magic_val);
1289 }
1290
1291 /* Check whether @path is a cgroupfs v1 or cgroupfs v2 mount. Returns -1 if
1292 * statfs fails. If @path is null /sys/fs/cgroup is checked.
1293 */
1294 static int cg_get_version_of_mntpt(const char *path)
1295 {
1296 int ret;
1297 struct statfs sb;
1298
1299 if (path)
1300 ret = statfs(path, &sb);
1301 else
1302 ret = statfs("/sys/fs/cgroup", &sb);
1303
1304 if (ret < 0)
1305 return -1;
1306
1307 if (has_fs_type(&sb, CGROUP_SUPER_MAGIC))
1308 return 1;
1309 else if (has_fs_type(&sb, CGROUP2_SUPER_MAGIC))
1310 return 2;
1311
1312 return 0;
1313 }
1314
1315 /* Detect and store information about the cgroupfs v2 hierarchy. Currently only
1316 * deals with the empty v2 hierachy as we do not retrieve enabled controllers.
1317 */
1318 static bool cgv2_init(uid_t uid, gid_t gid)
1319 {
1320 char *mountpoint;
1321 FILE *f = NULL;
1322 char *current_cgroup = NULL, *init_cgroup = NULL;
1323 char * line = NULL;
1324 size_t len = 0;
1325
1326 current_cgroup = cgv2_get_current_cgroup(getpid());
1327 if (!current_cgroup) {
1328 /* No v2 hierarchy present. We're done. */
1329 goto cleanup;
1330 }
1331
1332 init_cgroup = cgv2_get_current_cgroup(1);
1333 if (!init_cgroup) {
1334 /* If we're here and didn't fail already above, then something's
1335 * certainly wrong, so error this time.
1336 */
1337 goto cleanup;
1338 }
1339 cg_systemd_prune_init_scope(init_cgroup);
1340
1341 /* Check if the v2 hierarchy is mounted at its standard location.
1342 * If so we can skip the rest of the work here. Although the unified
1343 * hierarchy can be mounted multiple times, each of those mountpoints
1344 * will expose identical information.
1345 */
1346 if (cg_get_version_of_mntpt("/sys/fs/cgroup") == 2) {
1347 char *user_slice;
1348 bool has_user_slice = false;
1349
1350 mountpoint = must_copy_string("/sys/fs/cgroup");
1351 if (!mountpoint)
1352 goto cleanup;
1353
1354 user_slice = must_make_path(mountpoint, current_cgroup, NULL);
1355 if (cg_systemd_created_user_slice(current_cgroup, init_cgroup, user_slice, uid))
1356 has_user_slice = true;
1357 free(user_slice);
1358
1359 cgv2_add_controller(NULL, mountpoint, current_cgroup, init_cgroup, has_user_slice);
1360
1361 goto cleanup;
1362 }
1363
1364 f = fopen("/proc/self/mountinfo", "r");
1365 if (!f)
1366 return false;
1367
1368 /* we support simple cgroup mounts and lxcfs mounts */
1369 while (getline(&line, &len, f) != -1) {
1370 char *user_slice;
1371 bool has_user_slice = false;
1372 if (!is_cgv2(line))
1373 continue;
1374
1375 mountpoint = get_mountpoint(line);
1376 if (!mountpoint)
1377 continue;
1378
1379 user_slice = must_make_path(mountpoint, current_cgroup, NULL);
1380 if (cg_systemd_created_user_slice(current_cgroup, init_cgroup, user_slice, uid))
1381 has_user_slice = true;
1382 free(user_slice);
1383
1384 cgv2_add_controller(NULL, mountpoint, current_cgroup, init_cgroup, has_user_slice);
1385 /* Although the unified hierarchy can be mounted multiple times,
1386 * each of those mountpoints will expose identical information.
1387 * So let the first mountpoint we find, win.
1388 */
1389 break;
1390 }
1391
1392 lxcfs_debug("Detected cgroupfs v2 hierarchy at mountpoint \"%s\" with "
1393 "current cgroup \"%s\" and init cgroup \"%s\".\n",
1394 mountpoint, current_cgroup, init_cgroup);
1395
1396 cleanup:
1397 if (f)
1398 fclose(f);
1399 free(line);
1400
1401 return true;
1402 }
1403
1404 /* Detect and store information about mounted cgroupfs v1 hierarchies and the
1405 * cgroupfs v2 hierarchy.
1406 * Detect whether we are on a pure cgroupfs v1, cgroupfs v2, or mixed system,
1407 * where some controllers are mounted into their standard cgroupfs v1 locations
1408 * (/sys/fs/cgroup/<controller>) and others are mounted into the cgroupfs v2
1409 * hierarchy (/sys/fs/cgroup).
1410 */
1411 static bool cg_init(uid_t uid, gid_t gid)
1412 {
1413 if (!cgv1_init(uid, gid))
1414 return false;
1415
1416 if (!cgv2_init(uid, gid))
1417 return false;
1418
1419 if (cgv1_hierarchies && cgv2_hierarchies) {
1420 cg_mount_mode = CGROUP_MIXED;
1421 lxcfs_debug("%s\n", "Detected cgroupfs v1 and v2 hierarchies.");
1422 } else if (cgv1_hierarchies && !cgv2_hierarchies) {
1423 cg_mount_mode = CGROUP_PURE_V1;
1424 lxcfs_debug("%s\n", "Detected cgroupfs v1 hierarchies.");
1425 } else if (cgv2_hierarchies && !cgv1_hierarchies) {
1426 cg_mount_mode = CGROUP_PURE_V2;
1427 lxcfs_debug("%s\n", "Detected cgroupfs v2 hierarchies.");
1428 } else {
1429 cg_mount_mode = CGROUP_UNKNOWN;
1430 mysyslog(LOG_ERR, "Could not detect cgroupfs hierarchy.\n", NULL);
1431 }
1432
1433 if (cg_mount_mode == CGROUP_UNKNOWN)
1434 return false;
1435
1436 return true;
1437 }
1438
1439 /* Try to move/migrate us into @cgroup in a cgroupfs v1 hierarchy. */
1440 static bool cgv1_enter(const char *cgroup)
1441 {
1442 struct cgv1_hierarchy **it;
1443
1444 for (it = cgv1_hierarchies; it && *it; it++) {
1445 char **controller;
1446 bool entered = false;
1447
1448 if (!(*it)->controllers || !(*it)->mountpoint ||
1449 !(*it)->init_cgroup || !(*it)->create_rw_cgroup)
1450 continue;
1451
1452 for (controller = (*it)->controllers; controller && *controller;
1453 controller++) {
1454 char *path;
1455
1456 /* We've already been placed in a user slice, so we
1457 * don't need to enter the cgroup again.
1458 */
1459 if ((*it)->systemd_user_slice) {
1460 entered = true;
1461 break;
1462 }
1463
1464 path = must_make_path((*it)->mountpoint,
1465 (*it)->init_cgroup,
1466 cgroup,
1467 "/cgroup.procs",
1468 NULL);
1469 if (!file_exists(path)) {
1470 free(path);
1471 path = must_make_path((*it)->mountpoint,
1472 (*it)->init_cgroup,
1473 cgroup,
1474 "/tasks",
1475 NULL);
1476 }
1477 lxcfs_debug("Attempting to enter cgroupfs v1 hierarchy in \"%s\" cgroup.\n", path);
1478 entered = write_int(path, (int)getpid());
1479 if (entered) {
1480 free(path);
1481 break;
1482 }
1483 lxcfs_debug("Failed to enter cgroupfs v1 hierarchy in \"%s\" cgroup.\n", path);
1484 free(path);
1485 }
1486 if (!entered)
1487 return false;
1488 }
1489
1490 return true;
1491 }
1492
1493 /* Try to move/migrate us into @cgroup in the cgroupfs v2 hierarchy. */
1494 static bool cgv2_enter(const char *cgroup)
1495 {
1496 struct cgv2_hierarchy *v2;
1497 char *path;
1498 bool entered = false;
1499
1500 if (!cgv2_hierarchies)
1501 return true;
1502
1503 v2 = *cgv2_hierarchies;
1504
1505 if (!v2->mountpoint || !v2->base_cgroup)
1506 return false;
1507
1508 if (!v2->create_rw_cgroup || v2->systemd_user_slice)
1509 return true;
1510
1511 path = must_make_path(v2->mountpoint, v2->base_cgroup, cgroup,
1512 "/cgroup.procs", NULL);
1513 lxcfs_debug("Attempting to enter cgroupfs v2 hierarchy in cgroup \"%s\".\n", path);
1514 entered = write_int(path, (int)getpid());
1515 if (!entered) {
1516 lxcfs_debug("Failed to enter cgroupfs v2 hierarchy in cgroup \"%s\".\n", path);
1517 free(path);
1518 return false;
1519 }
1520
1521 free(path);
1522
1523 return true;
1524 }
1525
1526 /* Wrapper around cgv{1,2}_enter(). */
1527 static bool cg_enter(const char *cgroup)
1528 {
1529 if (!cgv1_enter(cgroup)) {
1530 mysyslog(LOG_WARNING, "cgroupfs v1: Failed to enter cgroups.\n", NULL);
1531 return false;
1532 }
1533
1534 if (!cgv2_enter(cgroup)) {
1535 mysyslog(LOG_WARNING, "cgroupfs v2: Failed to enter cgroups.\n", NULL);
1536 return false;
1537 }
1538
1539 return true;
1540 }
1541
1542 /* Escape to root cgroup in all detected cgroupfs v1 hierarchies. */
1543 static void cgv1_escape(void)
1544 {
1545 struct cgv1_hierarchy **it;
1546
1547 /* In case systemd hasn't already placed us in a user slice for the
1548 * cpuset v1 controller we will reside in the root cgroup. This means
1549 * that cgroup.clone_children will not have been initialized for us so
1550 * we need to do it.
1551 */
1552 for (it = cgv1_hierarchies; it && *it; it++)
1553 if (!cgv1_handle_root_cpuset_hierarchy(*it))
1554 mysyslog(LOG_WARNING, "cgroupfs v1: Failed to initialize cpuset.\n", NULL);
1555
1556 if (!cgv1_enter("/"))
1557 mysyslog(LOG_WARNING, "cgroupfs v1: Failed to escape to init's cgroup.\n", NULL);
1558 }
1559
1560 /* Escape to root cgroup in the cgroupfs v2 hierarchy. */
1561 static void cgv2_escape(void)
1562 {
1563 if (!cgv2_enter("/"))
1564 mysyslog(LOG_WARNING, "cgroupfs v2: Failed to escape to init's cgroup.\n", NULL);
1565 }
1566
1567 /* Wrapper around cgv{1,2}_escape(). */
1568 static void cg_escape(void)
1569 {
1570 cgv1_escape();
1571 cgv2_escape();
1572 }
1573
1574 /* Get uid and gid for @user. */
1575 static bool get_uid_gid(const char *user, uid_t *uid, gid_t *gid)
1576 {
1577 struct passwd *pwent;
1578
1579 pwent = getpwnam(user);
1580 if (!pwent)
1581 return false;
1582
1583 *uid = pwent->pw_uid;
1584 *gid = pwent->pw_gid;
1585
1586 return true;
1587 }
1588
1589 /* Check if cgroup belongs to our uid and gid. If so, reuse it. */
1590 static bool cg_belongs_to_uid_gid(const char *path, uid_t uid, gid_t gid)
1591 {
1592 struct stat statbuf;
1593
1594 if (stat(path, &statbuf) < 0)
1595 return false;
1596
1597 if (!(statbuf.st_uid == uid) || !(statbuf.st_gid == gid))
1598 return false;
1599
1600 return true;
1601 }
1602
1603 /* Create cpumask from cpulist aka turn:
1604 *
1605 * 0,2-3
1606 *
1607 * into bit array
1608 *
1609 * 1 0 1 1
1610 */
1611 static uint32_t *cg_cpumask(char *buf, size_t nbits)
1612 {
1613 char *token;
1614 char *saveptr = NULL;
1615 size_t arrlen = BITS_TO_LONGS(nbits);
1616 uint32_t *bitarr = calloc(arrlen, sizeof(uint32_t));
1617 if (!bitarr)
1618 return NULL;
1619
1620 for (; (token = strtok_r(buf, ",", &saveptr)); buf = NULL) {
1621 errno = 0;
1622 unsigned start = strtoul(token, NULL, 0);
1623 unsigned end = start;
1624
1625 char *range = strchr(token, '-');
1626 if (range)
1627 end = strtoul(range + 1, NULL, 0);
1628 if (!(start <= end)) {
1629 free(bitarr);
1630 return NULL;
1631 }
1632
1633 if (end >= nbits) {
1634 free(bitarr);
1635 return NULL;
1636 }
1637
1638 while (start <= end)
1639 set_bit(start++, bitarr);
1640 }
1641
1642 return bitarr;
1643 }
1644
1645 static char *string_join(const char *sep, const char **parts, bool use_as_prefix)
1646 {
1647 char *result;
1648 char **p;
1649 size_t sep_len = strlen(sep);
1650 size_t result_len = use_as_prefix * sep_len;
1651
1652 /* calculate new string length */
1653 for (p = (char **)parts; *p; p++)
1654 result_len += (p > (char **)parts) * sep_len + strlen(*p);
1655
1656 result = calloc(result_len + 1, 1);
1657 if (!result)
1658 return NULL;
1659
1660 if (use_as_prefix)
1661 strcpy(result, sep);
1662 for (p = (char **)parts; *p; p++) {
1663 if (p > (char **)parts)
1664 strcat(result, sep);
1665 strcat(result, *p);
1666 }
1667
1668 return result;
1669 }
1670
1671 /* The largest integer that can fit into long int is 2^64. This is a
1672 * 20-digit number.
1673 */
1674 #define __IN_TO_STR_LEN 21
1675 /* Turn cpumask into simple, comma-separated cpulist. */
1676 static char *cg_cpumask_to_cpulist(uint32_t *bitarr, size_t nbits)
1677 {
1678 size_t i;
1679 int ret;
1680 char numstr[__IN_TO_STR_LEN] = {0};
1681 char **cpulist = NULL;
1682
1683 for (i = 0; i <= nbits; i++) {
1684 if (is_set(i, bitarr)) {
1685 ret = snprintf(numstr, __IN_TO_STR_LEN, "%zu", i);
1686 if (ret < 0 || (size_t)ret >= __IN_TO_STR_LEN) {
1687 free_string_list(cpulist);
1688 return NULL;
1689 }
1690 must_append_string(&cpulist, numstr);
1691 }
1692 }
1693 return string_join(",", (const char **)cpulist, false);
1694 }
1695
1696 static ssize_t cg_get_max_cpus(char *cpulist)
1697 {
1698 char *c1, *c2;
1699 char *maxcpus = cpulist;
1700 size_t cpus = 0;
1701
1702 c1 = strrchr(maxcpus, ',');
1703 if (c1)
1704 c1++;
1705
1706 c2 = strrchr(maxcpus, '-');
1707 if (c2)
1708 c2++;
1709
1710 if (!c1 && !c2)
1711 c1 = maxcpus;
1712 else if (c1 < c2)
1713 c1 = c2;
1714
1715 /* If the above logic is correct, c1 should always hold a valid string
1716 * here.
1717 */
1718
1719 errno = 0;
1720 cpus = strtoul(c1, NULL, 0);
1721 if (errno != 0)
1722 return -1;
1723
1724 return cpus;
1725 }
1726
1727 static ssize_t write_nointr(int fd, const void* buf, size_t count)
1728 {
1729 ssize_t ret;
1730 again:
1731 ret = write(fd, buf, count);
1732 if (ret < 0 && errno == EINTR)
1733 goto again;
1734 return ret;
1735 }
1736
1737 static int write_to_file(const char *filename, const void* buf, size_t count, bool add_newline)
1738 {
1739 int fd, saved_errno;
1740 ssize_t ret;
1741
1742 fd = open(filename, O_WRONLY | O_TRUNC | O_CREAT | O_CLOEXEC, 0666);
1743 if (fd < 0)
1744 return -1;
1745 ret = write_nointr(fd, buf, count);
1746 if (ret < 0)
1747 goto out_error;
1748 if ((size_t)ret != count)
1749 goto out_error;
1750 if (add_newline) {
1751 ret = write_nointr(fd, "\n", 1);
1752 if (ret != 1)
1753 goto out_error;
1754 }
1755 close(fd);
1756 return 0;
1757
1758 out_error:
1759 saved_errno = errno;
1760 close(fd);
1761 errno = saved_errno;
1762 return -1;
1763 }
1764
1765 #define __ISOL_CPUS "/sys/devices/system/cpu/isolated"
1766 static bool cg_filter_and_set_cpus(char *path, bool am_initialized)
1767 {
1768 char *lastslash, *fpath, oldv;
1769 int ret;
1770 ssize_t i;
1771
1772 ssize_t maxposs = 0, maxisol = 0;
1773 char *cpulist = NULL, *posscpus = NULL, *isolcpus = NULL;
1774 uint32_t *possmask = NULL, *isolmask = NULL;
1775 bool bret = false, flipped_bit = false;
1776
1777 lastslash = strrchr(path, '/');
1778 if (!lastslash) { // bug... this shouldn't be possible
1779 lxcfs_debug("Invalid path: %s.\n", path);
1780 return bret;
1781 }
1782 oldv = *lastslash;
1783 *lastslash = '\0';
1784 fpath = must_make_path(path, "cpuset.cpus", NULL);
1785 posscpus = read_file(fpath);
1786 if (!posscpus) {
1787 lxcfs_debug("Could not read file: %s.\n", fpath);
1788 goto on_error;
1789 }
1790
1791 /* Get maximum number of cpus found in possible cpuset. */
1792 maxposs = cg_get_max_cpus(posscpus);
1793 if (maxposs < 0)
1794 goto on_error;
1795
1796 if (!file_exists(__ISOL_CPUS)) {
1797 /* This system doesn't expose isolated cpus. */
1798 lxcfs_debug("%s", "Path: "__ISOL_CPUS" to read isolated cpus from does not exist.\n");
1799 cpulist = posscpus;
1800 /* No isolated cpus but we weren't already initialized by
1801 * someone. We should simply copy the parents cpuset.cpus
1802 * values.
1803 */
1804 if (!am_initialized) {
1805 lxcfs_debug("%s", "Copying cpuset of parent cgroup.\n");
1806 goto copy_parent;
1807 }
1808 /* No isolated cpus but we were already initialized by someone.
1809 * Nothing more to do for us.
1810 */
1811 goto on_success;
1812 }
1813
1814 isolcpus = read_file(__ISOL_CPUS);
1815 if (!isolcpus) {
1816 lxcfs_debug("%s", "Could not read file "__ISOL_CPUS"\n");
1817 goto on_error;
1818 }
1819 if (!isdigit(isolcpus[0])) {
1820 lxcfs_debug("%s", "No isolated cpus detected.\n");
1821 cpulist = posscpus;
1822 /* No isolated cpus but we weren't already initialized by
1823 * someone. We should simply copy the parents cpuset.cpus
1824 * values.
1825 */
1826 if (!am_initialized) {
1827 lxcfs_debug("%s", "Copying cpuset of parent cgroup.\n");
1828 goto copy_parent;
1829 }
1830 /* No isolated cpus but we were already initialized by someone.
1831 * Nothing more to do for us.
1832 */
1833 goto on_success;
1834 }
1835
1836 /* Get maximum number of cpus found in isolated cpuset. */
1837 maxisol = cg_get_max_cpus(isolcpus);
1838 if (maxisol < 0)
1839 goto on_error;
1840
1841 if (maxposs < maxisol)
1842 maxposs = maxisol;
1843 maxposs++;
1844
1845 possmask = cg_cpumask(posscpus, maxposs);
1846 if (!possmask) {
1847 lxcfs_debug("%s", "Could not create cpumask for all possible cpus.\n");
1848 goto on_error;
1849 }
1850
1851 isolmask = cg_cpumask(isolcpus, maxposs);
1852 if (!isolmask) {
1853 lxcfs_debug("%s", "Could not create cpumask for all isolated cpus.\n");
1854 goto on_error;
1855 }
1856
1857 for (i = 0; i <= maxposs; i++) {
1858 if (is_set(i, isolmask) && is_set(i, possmask)) {
1859 flipped_bit = true;
1860 clear_bit(i, possmask);
1861 }
1862 }
1863
1864 if (!flipped_bit) {
1865 lxcfs_debug("%s", "No isolated cpus present in cpuset.\n");
1866 goto on_success;
1867 }
1868 lxcfs_debug("%s", "Removed isolated cpus from cpuset.\n");
1869
1870 cpulist = cg_cpumask_to_cpulist(possmask, maxposs);
1871 if (!cpulist) {
1872 lxcfs_debug("%s", "Could not create cpu list.\n");
1873 goto on_error;
1874 }
1875
1876 copy_parent:
1877 *lastslash = oldv;
1878 fpath = must_make_path(path, "cpuset.cpus", NULL);
1879 ret = write_to_file(fpath, cpulist, strlen(cpulist), false);
1880 if (ret < 0) {
1881 lxcfs_debug("Could not write cpu list to: %s.\n", fpath);
1882 goto on_error;
1883 }
1884
1885 on_success:
1886 bret = true;
1887
1888 on_error:
1889 free(fpath);
1890
1891 free(isolcpus);
1892 free(isolmask);
1893
1894 if (posscpus != cpulist)
1895 free(posscpus);
1896 free(possmask);
1897
1898 free(cpulist);
1899 return bret;
1900 }
1901
1902 int read_from_file(const char *filename, void* buf, size_t count)
1903 {
1904 int fd = -1, saved_errno;
1905 ssize_t ret;
1906
1907 fd = open(filename, O_RDONLY | O_CLOEXEC);
1908 if (fd < 0)
1909 return -1;
1910
1911 if (!buf || !count) {
1912 char buf2[100];
1913 size_t count2 = 0;
1914 while ((ret = read(fd, buf2, 100)) > 0)
1915 count2 += ret;
1916 if (ret >= 0)
1917 ret = count2;
1918 } else {
1919 memset(buf, 0, count);
1920 ret = read(fd, buf, count);
1921 }
1922
1923 if (ret < 0)
1924 lxcfs_debug("read %s: %s", filename, strerror(errno));
1925
1926 saved_errno = errno;
1927 close(fd);
1928 errno = saved_errno;
1929 return ret;
1930 }
1931
1932 /* Copy contents of parent(@path)/@file to @path/@file */
1933 static bool cg_copy_parent_file(char *path, char *file)
1934 {
1935 char *lastslash, *value = NULL, *fpath, oldv;
1936 int len = 0;
1937 int ret;
1938
1939 lastslash = strrchr(path, '/');
1940 if (!lastslash) { // bug... this shouldn't be possible
1941 lxcfs_debug("cgfsng:copy_parent_file: bad path %s", path);
1942 return false;
1943 }
1944 oldv = *lastslash;
1945 *lastslash = '\0';
1946 fpath = must_make_path(path, file, NULL);
1947 len = read_from_file(fpath, NULL, 0);
1948 if (len <= 0)
1949 goto bad;
1950 value = must_alloc(len + 1);
1951 if (read_from_file(fpath, value, len) != len)
1952 goto bad;
1953 free(fpath);
1954 *lastslash = oldv;
1955 fpath = must_make_path(path, file, NULL);
1956 ret = write_to_file(fpath, value, len, false);
1957 if (ret < 0)
1958 lxcfs_debug("Unable to write %s to %s", value, fpath);
1959 free(fpath);
1960 free(value);
1961 return ret >= 0;
1962
1963 bad:
1964 lxcfs_debug("Error reading '%s'", fpath);
1965 free(fpath);
1966 free(value);
1967 return false;
1968 }
1969
1970 /* In case systemd hasn't already placed us in a user slice for the cpuset v1
1971 * controller we will reside in the root cgroup. This means that
1972 * cgroup.clone_children will not have been initialized for us so we need to do
1973 * it.
1974 */
1975 static bool cgv1_handle_root_cpuset_hierarchy(struct cgv1_hierarchy *h)
1976 {
1977 char *clonechildrenpath, v;
1978
1979 if (!string_in_list(h->controllers, "cpuset"))
1980 return true;
1981
1982 clonechildrenpath = must_make_path(h->mountpoint, "cgroup.clone_children", NULL);
1983
1984 if (read_from_file(clonechildrenpath, &v, 1) < 0) {
1985 lxcfs_debug("Failed to read '%s'", clonechildrenpath);
1986 free(clonechildrenpath);
1987 return false;
1988 }
1989
1990 if (v == '1') { /* already set for us by someone else */
1991 free(clonechildrenpath);
1992 return true;
1993 }
1994
1995 if (write_to_file(clonechildrenpath, "1", 1, false) < 0) {
1996 /* Set clone_children so children inherit our settings */
1997 lxcfs_debug("Failed to write 1 to %s", clonechildrenpath);
1998 free(clonechildrenpath);
1999 return false;
2000 }
2001 free(clonechildrenpath);
2002 return true;
2003 }
2004
2005 /*
2006 * Initialize the cpuset hierarchy in first directory of @gname and
2007 * set cgroup.clone_children so that children inherit settings.
2008 * Since the h->base_path is populated by init or ourselves, we know
2009 * it is already initialized.
2010 */
2011 static bool cgv1_handle_cpuset_hierarchy(struct cgv1_hierarchy *h,
2012 const char *cgroup)
2013 {
2014 char *cgpath, *clonechildrenpath, v, *slash;
2015
2016 if (!string_in_list(h->controllers, "cpuset"))
2017 return true;
2018
2019 if (*cgroup == '/')
2020 cgroup++;
2021 slash = strchr(cgroup, '/');
2022 if (slash)
2023 *slash = '\0';
2024
2025 cgpath = must_make_path(h->mountpoint, h->base_cgroup, cgroup, NULL);
2026 if (slash)
2027 *slash = '/';
2028 if (mkdir(cgpath, 0755) < 0 && errno != EEXIST) {
2029 lxcfs_debug("Failed to create '%s'", cgpath);
2030 free(cgpath);
2031 return false;
2032 }
2033 clonechildrenpath = must_make_path(cgpath, "cgroup.clone_children", NULL);
2034 if (!file_exists(clonechildrenpath)) { /* unified hierarchy doesn't have clone_children */
2035 free(clonechildrenpath);
2036 free(cgpath);
2037 return true;
2038 }
2039 if (read_from_file(clonechildrenpath, &v, 1) < 0) {
2040 lxcfs_debug("Failed to read '%s'", clonechildrenpath);
2041 free(clonechildrenpath);
2042 free(cgpath);
2043 return false;
2044 }
2045
2046 /* Make sure any isolated cpus are removed from cpuset.cpus. */
2047 if (!cg_filter_and_set_cpus(cgpath, v == '1')) {
2048 lxcfs_debug("%s", "Failed to remove isolated cpus.\n");
2049 free(clonechildrenpath);
2050 free(cgpath);
2051 return false;
2052 }
2053
2054 if (v == '1') { /* already set for us by someone else */
2055 lxcfs_debug("%s", "\"cgroup.clone_children\" was already set to \"1\".\n");
2056 free(clonechildrenpath);
2057 free(cgpath);
2058 return true;
2059 }
2060
2061 /* copy parent's settings */
2062 if (!cg_copy_parent_file(cgpath, "cpuset.mems")) {
2063 lxcfs_debug("%s", "Failed to copy \"cpuset.mems\" settings.\n");
2064 free(cgpath);
2065 free(clonechildrenpath);
2066 return false;
2067 }
2068 free(cgpath);
2069
2070 if (write_to_file(clonechildrenpath, "1", 1, false) < 0) {
2071 /* Set clone_children so children inherit our settings */
2072 lxcfs_debug("Failed to write 1 to %s", clonechildrenpath);
2073 free(clonechildrenpath);
2074 return false;
2075 }
2076 free(clonechildrenpath);
2077 return true;
2078 }
2079
2080 /* Create and chown @cgroup for all given controllers in a cgroupfs v1 hierarchy
2081 * (For example, create @cgroup for the cpu and cpuacct controller mounted into
2082 * /sys/fs/cgroup/cpu,cpuacct). Check if the path already exists and report back
2083 * to the caller in @existed.
2084 */
2085 #define __PAM_CGFS_USER "/user/"
2086 #define __PAM_CGFS_USER_LEN 6
2087 static bool cgv1_create_one(struct cgv1_hierarchy *h, const char *cgroup, uid_t uid, gid_t gid, bool *existed)
2088 {
2089 char *clean_base_cgroup, *path;
2090 char **controller;
2091 struct cgv1_hierarchy *it;
2092 bool created = false;
2093
2094 *existed = false;
2095 it = h;
2096 for (controller = it->controllers; controller && *controller;
2097 controller++) {
2098 created = false;
2099
2100 if (!cgv1_handle_cpuset_hierarchy(it, cgroup))
2101 return false;
2102
2103 /* If systemd has already created a cgroup for us, keep using
2104 * it.
2105 */
2106 if (cg_systemd_chown_existing_cgroup(it->mountpoint,
2107 it->base_cgroup, uid, gid,
2108 it->systemd_user_slice)) {
2109 return true;
2110 }
2111
2112 /* We need to make sure that we do not create an endless chain
2113 * of sub-cgroups. So we check if we have already logged in
2114 * somehow (sudo -i, su, etc.) and have created a
2115 * /user/PAM_user/idx cgroup. If so, we skip that part. For most
2116 * cgroups this is unnecessary since we use the init_cgroup
2117 * anyway, but for controllers which have an existing systemd
2118 * cgroup that does not match the current uid, this is pretty
2119 * useful.
2120 */
2121 if (strncmp(it->base_cgroup, __PAM_CGFS_USER, __PAM_CGFS_USER_LEN) == 0) {
2122 free(it->base_cgroup);
2123 it->base_cgroup = must_copy_string("/");
2124 } else {
2125 clean_base_cgroup =
2126 strstr(it->base_cgroup, __PAM_CGFS_USER);
2127 if (clean_base_cgroup)
2128 *clean_base_cgroup = '\0';
2129 }
2130
2131 path = must_make_path(it->mountpoint, it->init_cgroup, cgroup, NULL);
2132 lxcfs_debug("Constructing path: %s.\n", path);
2133 if (file_exists(path)) {
2134 bool our_cg = cg_belongs_to_uid_gid(path, uid, gid);
2135 lxcfs_debug("%s existed and does %shave our uid: %d and gid: %d.\n", path, our_cg ? "" : "not ", uid, gid);
2136 free(path);
2137 if (our_cg)
2138 *existed = false;
2139 else
2140 *existed = true;
2141 return our_cg;
2142 }
2143 created = mkdir_p(it->mountpoint, path);
2144 if (!created) {
2145 free(path);
2146 continue;
2147 }
2148 if (chown(path, uid, gid) < 0)
2149 mysyslog(LOG_WARNING,
2150 "Failed to chown %s to %d:%d: %s.\n", path,
2151 (int)uid, (int)gid, strerror(errno), NULL);
2152 lxcfs_debug("Chowned %s to %d:%d.\n", path, (int)uid, (int)gid);
2153 free(path);
2154 break;
2155 }
2156
2157 return created;
2158 }
2159
2160 /* Try to remove @cgroup for all given controllers in a cgroupfs v1 hierarchy
2161 * (For example, try to remove @cgroup for the cpu and cpuacct controller
2162 * mounted into /sys/fs/cgroup/cpu,cpuacct). Ignores failures.
2163 */
2164 static bool cgv1_remove_one(struct cgv1_hierarchy *h, const char *cgroup)
2165 {
2166
2167 char *path;
2168
2169 /* Better safe than sorry. */
2170 if (!h->controllers)
2171 return true;
2172
2173 /* Cgroups created by systemd for us which we re-use won't be removed
2174 * here, since we're using init_cgroup + cgroup as path instead of
2175 * base_cgroup + cgroup.
2176 */
2177 path = must_make_path(h->mountpoint, h->init_cgroup, cgroup, NULL);
2178 (void)recursive_rmdir(path);
2179 free(path);
2180
2181 return true;
2182 }
2183
2184 /* Try to remove @cgroup the cgroupfs v2 hierarchy. */
2185 static bool cgv2_remove(const char *cgroup)
2186 {
2187 struct cgv2_hierarchy *v2;
2188 char *path;
2189
2190 if (!cgv2_hierarchies)
2191 return true;
2192
2193 v2 = *cgv2_hierarchies;
2194
2195 /* If we reused an already existing cgroup, don't bother trying to
2196 * remove (a potentially wrong)/the path.
2197 * Cgroups created by systemd for us which we re-use would be removed
2198 * here, since we're using base_cgroup + cgroup as path.
2199 */
2200 if (v2->systemd_user_slice)
2201 return true;
2202
2203 path = must_make_path(v2->mountpoint, v2->base_cgroup, cgroup, NULL);
2204 (void)recursive_rmdir(path);
2205 free(path);
2206
2207 return true;
2208 }
2209
2210 /* Create @cgroup in all detected cgroupfs v1 hierarchy. If the creation fails
2211 * for any cgroupfs v1 hierarchy, remove all we have created so far. Report
2212 * back, to the caller if the creation failed due to @cgroup already existing
2213 * via @existed.
2214 */
2215 static bool cgv1_create(const char *cgroup, uid_t uid, gid_t gid, bool *existed)
2216 {
2217 struct cgv1_hierarchy **it, **rev_it;
2218 bool all_created = true;
2219
2220 for (it = cgv1_hierarchies; it && *it; it++) {
2221 if (!(*it)->controllers || !(*it)->mountpoint ||
2222 !(*it)->init_cgroup || !(*it)->create_rw_cgroup)
2223 continue;
2224
2225 if (!cgv1_create_one(*it, cgroup, uid, gid, existed)) {
2226 all_created = false;
2227 break;
2228 }
2229 }
2230
2231 if (all_created)
2232 return true;
2233
2234 for (rev_it = cgv1_hierarchies; rev_it && *rev_it && (*rev_it != *it);
2235 rev_it++)
2236 cgv1_remove_one(*rev_it, cgroup);
2237
2238 return false;
2239 }
2240
2241 /* Create @cgroup in the cgroupfs v2 hierarchy. Report back, to the caller if
2242 * the creation failed due to @cgroup already existing via @existed.
2243 */
2244 static bool cgv2_create(const char *cgroup, uid_t uid, gid_t gid, bool *existed)
2245 {
2246 char *clean_base_cgroup;
2247 char *path;
2248 struct cgv2_hierarchy *v2;
2249 bool created = false;
2250
2251 *existed = false;
2252
2253 if (!cgv2_hierarchies || !(*cgv2_hierarchies)->create_rw_cgroup)
2254 return true;
2255
2256 v2 = *cgv2_hierarchies;
2257
2258 /* We can't be placed under init's cgroup for the v2 hierarchy. We need
2259 * to be placed under our current cgroup.
2260 */
2261 if (cg_systemd_chown_existing_cgroup(v2->mountpoint,
2262 v2->base_cgroup, uid, gid,
2263 v2->systemd_user_slice))
2264 return true;
2265
2266 /* We need to make sure that we do not create an endless chaing of
2267 * sub-cgroups. So we check if we have already logged in somehow (sudo
2268 * -i, su, etc.) and have created a /user/PAM_user/idx cgroup. If so, we
2269 * skip that part.
2270 */
2271 if (strncmp(v2->base_cgroup, __PAM_CGFS_USER, __PAM_CGFS_USER_LEN) == 0) {
2272 free(v2->base_cgroup);
2273 v2->base_cgroup = must_copy_string("/");
2274 } else {
2275 clean_base_cgroup = strstr(v2->base_cgroup, __PAM_CGFS_USER);
2276 if (clean_base_cgroup)
2277 *clean_base_cgroup = '\0';
2278 }
2279
2280 path = must_make_path(v2->mountpoint, v2->base_cgroup, cgroup, NULL);
2281 lxcfs_debug("Constructing path \"%s\".\n", path);
2282 if (file_exists(path)) {
2283 bool our_cg = cg_belongs_to_uid_gid(path, uid, gid);
2284 lxcfs_debug("%s existed and does %shave our uid: %d and gid: %d.\n", path, our_cg ? "" : "not ", uid, gid);
2285 free(path);
2286 if (our_cg)
2287 *existed = false;
2288 else
2289 *existed = true;
2290 return our_cg;
2291 }
2292
2293 created = mkdir_p(v2->mountpoint, path);
2294 if (!created) {
2295 free(path);
2296 return false;
2297 }
2298
2299 if (chown(path, uid, gid) < 0)
2300 mysyslog(LOG_WARNING, "Failed to chown %s to %d:%d: %s.\n",
2301 path, (int)uid, (int)gid, strerror(errno), NULL);
2302 lxcfs_debug("Chowned %s to %d:%d.\n", path, (int)uid, (int)gid);
2303 free(path);
2304
2305 return true;
2306 }
2307
2308 /* Create writeable cgroups for @user at login. Details can be found in the
2309 * preamble/license at the top of this file.
2310 */
2311 static int handle_login(const char *user, uid_t uid, gid_t gid)
2312 {
2313 int idx = 0, ret;
2314 bool existed;
2315 char cg[MAXPATHLEN];
2316
2317 cg_escape();
2318
2319 while (idx >= 0) {
2320 ret = snprintf(cg, MAXPATHLEN, "/user/%s/%d", user, idx);
2321 if (ret < 0 || ret >= MAXPATHLEN) {
2322 mysyslog(LOG_ERR, "Username too long.\n", NULL);
2323 return PAM_SESSION_ERR;
2324 }
2325
2326 existed = false;
2327 if (!cgv2_create(cg, uid, gid, &existed)) {
2328 if (existed) {
2329 cgv2_remove(cg);
2330 idx++;
2331 continue;
2332 }
2333 mysyslog(LOG_ERR, "Failed to create a cgroup for user %s.\n", user, NULL);
2334 return PAM_SESSION_ERR;
2335 }
2336
2337 existed = false;
2338 if (!cgv1_create(cg, uid, gid, &existed)) {
2339 if (existed) {
2340 cgv2_remove(cg);
2341 idx++;
2342 continue;
2343 }
2344 mysyslog(LOG_ERR, "Failed to create a cgroup for user %s.\n", user, NULL);
2345 return PAM_SESSION_ERR;
2346 }
2347
2348 if (!cg_enter(cg)) {
2349 mysyslog( LOG_ERR, "Failed to enter user cgroup %s for user %s.\n", cg, user, NULL);
2350 return PAM_SESSION_ERR;
2351 }
2352 break;
2353 }
2354
2355 return PAM_SUCCESS;
2356 }
2357
2358 /* Try to prune cgroups we created and that now are empty from all cgroupfs v1
2359 * hierarchies.
2360 */
2361 static bool cgv1_prune_empty_cgroups(const char *user)
2362 {
2363 bool controller_removed = true;
2364 bool all_removed = true;
2365 struct cgv1_hierarchy **it;
2366
2367 for (it = cgv1_hierarchies; it && *it; it++) {
2368 int ret;
2369 char *path_base, *path_init;
2370 char **controller;
2371
2372 if (!(*it)->controllers || !(*it)->mountpoint ||
2373 !(*it)->init_cgroup || !(*it)->create_rw_cgroup)
2374 continue;
2375
2376 for (controller = (*it)->controllers; controller && *controller;
2377 controller++) {
2378 bool path_base_rm, path_init_rm;
2379
2380 path_base = must_make_path((*it)->mountpoint, (*it)->base_cgroup, "/user", user, NULL);
2381 lxcfs_debug("cgroupfs v1: Trying to prune \"%s\".\n", path_base);
2382 ret = recursive_rmdir(path_base);
2383 if (ret == -ENOENT || ret >= 0)
2384 path_base_rm = true;
2385 else
2386 path_base_rm = false;
2387 free(path_base);
2388
2389 path_init = must_make_path((*it)->mountpoint, (*it)->init_cgroup, "/user", user, NULL);
2390 lxcfs_debug("cgroupfs v1: Trying to prune \"%s\".\n", path_init);
2391 ret = recursive_rmdir(path_init);
2392 if (ret == -ENOENT || ret >= 0)
2393 path_init_rm = true;
2394 else
2395 path_init_rm = false;
2396 free(path_init);
2397
2398 if (!path_base_rm && !path_init_rm) {
2399 controller_removed = false;
2400 continue;
2401 }
2402
2403 controller_removed = true;
2404 break;
2405 }
2406 if (!controller_removed)
2407 all_removed = false;
2408 }
2409
2410 return all_removed;
2411 }
2412
2413 /* Try to prune cgroup we created and that now is empty from the cgroupfs v2
2414 * hierarchy.
2415 */
2416 static bool cgv2_prune_empty_cgroups(const char *user)
2417 {
2418 int ret;
2419 struct cgv2_hierarchy *v2;
2420 char *path_base, *path_init;
2421 bool path_base_rm, path_init_rm;
2422
2423 if (!cgv2_hierarchies)
2424 return true;
2425
2426 v2 = *cgv2_hierarchies;
2427
2428 path_base = must_make_path(v2->mountpoint, v2->base_cgroup, "/user", user, NULL);
2429 lxcfs_debug("cgroupfs v2: Trying to prune \"%s\".\n", path_base);
2430 ret = recursive_rmdir(path_base);
2431 if (ret == -ENOENT || ret >= 0)
2432 path_base_rm = true;
2433 else
2434 path_base_rm = false;
2435 free(path_base);
2436
2437 path_init = must_make_path(v2->mountpoint, v2->init_cgroup, "/user", user, NULL);
2438 lxcfs_debug("cgroupfs v2: Trying to prune \"%s\".\n", path_init);
2439 ret = recursive_rmdir(path_init);
2440 if (ret == -ENOENT || ret >= 0)
2441 path_init_rm = true;
2442 else
2443 path_init_rm = false;
2444 free(path_init);
2445
2446 if (!path_base_rm && !path_init_rm)
2447 return false;
2448
2449 return true;
2450 }
2451
2452 /* Wrapper around cgv{1,2}_prune_empty_cgroups(). */
2453 static void cg_prune_empty_cgroups(const char *user)
2454 {
2455 (void)cgv1_prune_empty_cgroups(user);
2456 (void)cgv2_prune_empty_cgroups(user);
2457 }
2458
2459 /* Free allocated information for detected cgroupfs v1 hierarchies. */
2460 static void cgv1_free_hierarchies(void)
2461 {
2462 struct cgv1_hierarchy **it;
2463
2464 if (!cgv1_hierarchies)
2465 return;
2466
2467 for (it = cgv1_hierarchies; it && *it; it++) {
2468 if ((*it)->controllers) {
2469 char **tmp;
2470 for (tmp = (*it)->controllers; tmp && *tmp; tmp++)
2471 free(*tmp);
2472
2473 free((*it)->controllers);
2474 }
2475 free((*it)->mountpoint);
2476 free((*it)->base_cgroup);
2477 free((*it)->fullcgpath);
2478 free((*it)->init_cgroup);
2479 }
2480 free(cgv1_hierarchies);
2481 }
2482
2483 /* Free allocated information for the detected cgroupfs v2 hierarchy. */
2484 static void cgv2_free_hierarchies(void)
2485 {
2486 struct cgv2_hierarchy **it;
2487
2488 if (!cgv2_hierarchies)
2489 return;
2490
2491 for (it = cgv2_hierarchies; it && *it; it++) {
2492 if ((*it)->controllers) {
2493 char **tmp;
2494 for (tmp = (*it)->controllers; tmp && *tmp; tmp++)
2495 free(*tmp);
2496
2497 free((*it)->controllers);
2498 }
2499 free((*it)->mountpoint);
2500 free((*it)->base_cgroup);
2501 free((*it)->fullcgpath);
2502 free((*it)->init_cgroup);
2503 }
2504 free(cgv2_hierarchies);
2505 }
2506
2507 /* Wrapper around cgv{1,2}_free_hierarchies(). */
2508 static void cg_exit(void)
2509 {
2510 cgv1_free_hierarchies();
2511 cgv2_free_hierarchies();
2512 }
2513
2514 int pam_sm_open_session(pam_handle_t *pamh, int flags, int argc,
2515 const char **argv)
2516 {
2517 int ret;
2518 uid_t uid = 0;
2519 gid_t gid = 0;
2520 const char *PAM_user = NULL;
2521
2522 ret = pam_get_user(pamh, &PAM_user, NULL);
2523 if (ret != PAM_SUCCESS) {
2524 mysyslog(LOG_ERR, "PAM-CGFS: couldn't get user\n", NULL);
2525 return PAM_SESSION_ERR;
2526 }
2527
2528 if (!get_uid_gid(PAM_user, &uid, &gid)) {
2529 mysyslog(LOG_ERR, "Failed to get uid and gid for %s.\n", PAM_user, NULL);
2530 return PAM_SESSION_ERR;
2531 }
2532
2533 if (!cg_init(uid, gid)) {
2534 mysyslog(LOG_ERR, "Failed to get list of controllers\n", NULL);
2535 return PAM_SESSION_ERR;
2536 }
2537
2538 /* Try to prune cgroups, that are actually empty but were still marked
2539 * as busy by the kernel so we couldn't remove them on session close.
2540 */
2541 cg_prune_empty_cgroups(PAM_user);
2542
2543 if (cg_mount_mode == CGROUP_UNKNOWN)
2544 return PAM_SESSION_ERR;
2545
2546 if (argc > 1 && strcmp(argv[0], "-c") == 0)
2547 cg_mark_to_make_rw(argv[1]);
2548
2549 return handle_login(PAM_user, uid, gid);
2550 }
2551
2552 int pam_sm_close_session(pam_handle_t *pamh, int flags, int argc,
2553 const char **argv)
2554 {
2555 int ret;
2556 uid_t uid = 0;
2557 gid_t gid = 0;
2558 const char *PAM_user = NULL;
2559
2560 ret = pam_get_user(pamh, &PAM_user, NULL);
2561 if (ret != PAM_SUCCESS) {
2562 mysyslog(LOG_ERR, "PAM-CGFS: couldn't get user\n", NULL);
2563 return PAM_SESSION_ERR;
2564 }
2565
2566 if (!get_uid_gid(PAM_user, &uid, &gid)) {
2567 mysyslog(LOG_ERR, "Failed to get uid and gid for %s.\n", PAM_user, NULL);
2568 return PAM_SESSION_ERR;
2569 }
2570
2571 if (cg_mount_mode == CGROUP_UNINITIALIZED) {
2572 if (!cg_init(uid, gid))
2573 mysyslog(LOG_ERR, "Failed to get list of controllers\n", NULL);
2574
2575 if (argc > 1 && strcmp(argv[0], "-c") == 0)
2576 cg_mark_to_make_rw(argv[1]);
2577 }
2578
2579 cg_prune_empty_cgroups(PAM_user);
2580 cg_exit();
2581
2582 return PAM_SUCCESS;
2583 }