2 * SPDX-License-Identifier: BSD-2-Clause-FreeBSD
4 * Copyright (c) 2011 The FreeBSD Foundation
7 * This software was developed by Edward Tomasz Napierala under sponsorship
8 * from the FreeBSD Foundation.
10 * Redistribution and use in source and binary forms, with or without
11 * modification, are permitted provided that the following conditions
13 * 1. Redistributions of source code must retain the above copyright
14 * notice, this list of conditions and the following disclaimer.
15 * 2. Redistributions in binary form must reproduce the above copyright
16 * notice, this list of conditions and the following disclaimer in the
17 * documentation and/or other materials provided with the distribution.
19 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
20 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
21 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
22 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
23 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
24 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
25 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
26 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
27 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
28 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
35 * Processes may set login class name using setloginclass(2). This
36 * is usually done through call to setusercontext(3), by programs
37 * such as login(1), based on information from master.passwd(5). Kernel
38 * uses this information to enforce per-class resource limits. Current
39 * login class can be determined using id(1). Login class is inherited
40 * from the parent process during fork(2). If not set, it defaults
43 * Code in this file implements setloginclass(2) and getloginclass(2)
44 * system calls, and maintains class name storage and retrieval.
47 #include <sys/cdefs.h>
48 __FBSDID("$FreeBSD$");
50 #include <sys/param.h>
51 #include <sys/eventhandler.h>
52 #include <sys/kernel.h>
54 #include <sys/loginclass.h>
55 #include <sys/malloc.h>
56 #include <sys/types.h>
59 #include <sys/queue.h>
60 #include <sys/racct.h>
62 #include <sys/refcount.h>
63 #include <sys/rwlock.h>
64 #include <sys/sysproto.h>
65 #include <sys/systm.h>
67 static MALLOC_DEFINE(M_LOGINCLASS, "loginclass", "loginclass structures");
69 LIST_HEAD(, loginclass) loginclasses;
72 * Lock protecting loginclasses list.
74 static struct rwlock loginclasses_lock;
75 RW_SYSINIT(loginclasses_init, &loginclasses_lock, "loginclasses lock");
78 loginclass_hold(struct loginclass *lc)
81 refcount_acquire(&lc->lc_refcount);
85 loginclass_free(struct loginclass *lc)
89 old = lc->lc_refcount;
90 if (old > 1 && atomic_cmpset_int(&lc->lc_refcount, old, old - 1))
93 rw_wlock(&loginclasses_lock);
94 if (!refcount_release(&lc->lc_refcount)) {
95 rw_wunlock(&loginclasses_lock);
99 racct_destroy(&lc->lc_racct);
100 LIST_REMOVE(lc, lc_next);
101 rw_wunlock(&loginclasses_lock);
103 free(lc, M_LOGINCLASS);
107 * Look up a loginclass struct for the parameter name.
108 * loginclasses_lock must be locked.
109 * Increase refcount on loginclass struct returned.
111 static struct loginclass *
112 loginclass_lookup(const char *name)
114 struct loginclass *lc;
116 rw_assert(&loginclasses_lock, RA_LOCKED);
117 LIST_FOREACH(lc, &loginclasses, lc_next)
118 if (strcmp(name, lc->lc_name) == 0) {
127 * Return loginclass structure with a corresponding name. Not
128 * performance critical, as it's used mainly by setloginclass(2),
129 * which happens once per login session. Caller has to use
130 * loginclass_free() on the returned value when it's no longer
134 loginclass_find(const char *name)
136 struct loginclass *lc, *new_lc;
138 if (name[0] == '\0' || strlen(name) >= MAXLOGNAME)
141 lc = curthread->td_ucred->cr_loginclass;
142 if (strcmp(name, lc->lc_name) == 0) {
147 rw_rlock(&loginclasses_lock);
148 lc = loginclass_lookup(name);
149 rw_runlock(&loginclasses_lock);
153 new_lc = malloc(sizeof(*new_lc), M_LOGINCLASS, M_ZERO | M_WAITOK);
154 racct_create(&new_lc->lc_racct);
155 refcount_init(&new_lc->lc_refcount, 1);
156 strcpy(new_lc->lc_name, name);
158 rw_wlock(&loginclasses_lock);
160 * There's a chance someone created our loginclass while we
161 * were in malloc and not holding the lock, so we have to
162 * make sure we don't insert a duplicate loginclass.
164 if ((lc = loginclass_lookup(name)) == NULL) {
165 LIST_INSERT_HEAD(&loginclasses, new_lc, lc_next);
166 rw_wunlock(&loginclasses_lock);
169 rw_wunlock(&loginclasses_lock);
170 racct_destroy(&new_lc->lc_racct);
171 free(new_lc, M_LOGINCLASS);
178 * Get login class name.
180 #ifndef _SYS_SYSPROTO_H_
181 struct getloginclass_args {
188 sys_getloginclass(struct thread *td, struct getloginclass_args *uap)
190 struct loginclass *lc;
193 lc = td->td_ucred->cr_loginclass;
194 lcnamelen = strlen(lc->lc_name) + 1;
195 if (lcnamelen > uap->namelen)
197 return (copyout(lc->lc_name, uap->namebuf, lcnamelen));
201 * Set login class name.
203 #ifndef _SYS_SYSPROTO_H_
204 struct setloginclass_args {
210 sys_setloginclass(struct thread *td, struct setloginclass_args *uap)
212 struct proc *p = td->td_proc;
214 char lcname[MAXLOGNAME];
215 struct loginclass *newlc;
216 struct ucred *newcred, *oldcred;
218 error = priv_check(td, PRIV_PROC_SETLOGINCLASS);
221 error = copyinstr(uap->namebuf, lcname, sizeof(lcname), NULL);
225 newlc = loginclass_find(lcname);
231 oldcred = crcopysafe(p, newcred);
232 newcred->cr_loginclass = newlc;
233 proc_set_cred(p, newcred);
235 racct_proc_ucred_changed(p, oldcred, newcred);
240 rctl_proc_ucred_changed(p, newcred);
243 loginclass_free(oldcred->cr_loginclass);
250 loginclass_racct_foreach(void (*callback)(struct racct *racct,
251 void *arg2, void *arg3), void (*pre)(void), void (*post)(void),
252 void *arg2, void *arg3)
254 struct loginclass *lc;
256 rw_rlock(&loginclasses_lock);
259 LIST_FOREACH(lc, &loginclasses, lc_next)
260 (callback)(lc->lc_racct, arg2, arg3);
263 rw_runlock(&loginclasses_lock);