]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/basic/cgroup-util.h
Merge pull request #23653 from aafeijoo-suse/ask-for-recovery-key
[thirdparty/systemd.git] / src / basic / cgroup-util.h
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
c2f1db8f 2#pragma once
8c6db833 3
35d2e7ec 4#include <dirent.h>
a5edf95e 5#include <fcntl.h>
11c3a366
TA
6#include <stdbool.h>
7#include <stdint.h>
71d35b6b 8#include <stdio.h>
f0bef277 9#include <sys/statfs.h>
71d35b6b 10#include <sys/types.h>
c6c18be3 11
f6a6225e 12#include "def.h"
93cc7779 13#include "set.h"
8c6db833 14
68ac0d05
LP
15#define SYSTEMD_CGROUP_CONTROLLER_LEGACY "name=systemd"
16#define SYSTEMD_CGROUP_CONTROLLER_HYBRID "name=unified"
17#define SYSTEMD_CGROUP_CONTROLLER "_systemd"
18
efdb0237
LP
19/* An enum of well known cgroup controllers */
20typedef enum CGroupController {
17f14955 21 /* Original cgroup controllers */
efdb0237 22 CGROUP_CONTROLLER_CPU,
00b4a247 23 CGROUP_CONTROLLER_CPUACCT, /* v1 only */
047f5d63 24 CGROUP_CONTROLLER_CPUSET, /* v2 only */
00b4a247
LP
25 CGROUP_CONTROLLER_IO, /* v2 only */
26 CGROUP_CONTROLLER_BLKIO, /* v1 only */
efdb0237 27 CGROUP_CONTROLLER_MEMORY,
00b4a247 28 CGROUP_CONTROLLER_DEVICES, /* v1 only */
03a7b521 29 CGROUP_CONTROLLER_PIDS,
17f14955
RG
30
31 /* BPF-based pseudo-controllers, v2 only */
32 CGROUP_CONTROLLER_BPF_FIREWALL,
084c7007 33 CGROUP_CONTROLLER_BPF_DEVICES,
506ea51b 34 CGROUP_CONTROLLER_BPF_FOREIGN,
a8e5eb17 35 CGROUP_CONTROLLER_BPF_SOCKET_BIND,
6f50d4f7 36 CGROUP_CONTROLLER_BPF_RESTRICT_NETWORK_INTERFACES,
b1994387
ILG
37 /* The BPF hook implementing RestrictFileSystems= is not defined here.
38 * It's applied as late as possible in exec_child() so we don't block
39 * our own unit setup code. */
17f14955 40
efdb0237 41 _CGROUP_CONTROLLER_MAX,
2d93c20e 42 _CGROUP_CONTROLLER_INVALID = -EINVAL,
efdb0237
LP
43} CGroupController;
44
46f84f95 45#define CGROUP_CONTROLLER_TO_MASK(c) (1U << (c))
efdb0237 46
4ad49000 47/* A bit mask of well known cgroup controllers */
efdb0237
LP
48typedef enum CGroupMask {
49 CGROUP_MASK_CPU = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_CPU),
50 CGROUP_MASK_CPUACCT = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_CPUACCT),
047f5d63 51 CGROUP_MASK_CPUSET = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_CPUSET),
13c31542 52 CGROUP_MASK_IO = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_IO),
efdb0237
LP
53 CGROUP_MASK_BLKIO = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BLKIO),
54 CGROUP_MASK_MEMORY = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_MEMORY),
3905f127 55 CGROUP_MASK_DEVICES = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_DEVICES),
03a7b521 56 CGROUP_MASK_PIDS = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_PIDS),
17f14955 57 CGROUP_MASK_BPF_FIREWALL = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_FIREWALL),
084c7007 58 CGROUP_MASK_BPF_DEVICES = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_DEVICES),
506ea51b 59 CGROUP_MASK_BPF_FOREIGN = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_FOREIGN),
a8e5eb17 60 CGROUP_MASK_BPF_SOCKET_BIND = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_SOCKET_BIND),
6f50d4f7 61 CGROUP_MASK_BPF_RESTRICT_NETWORK_INTERFACES = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_RESTRICT_NETWORK_INTERFACES),
4edd65e4 62
4e1dfa45 63 /* All real cgroup v1 controllers */
4edd65e4
LP
64 CGROUP_MASK_V1 = CGROUP_MASK_CPU|CGROUP_MASK_CPUACCT|CGROUP_MASK_BLKIO|CGROUP_MASK_MEMORY|CGROUP_MASK_DEVICES|CGROUP_MASK_PIDS,
65
4e1dfa45 66 /* All real cgroup v2 controllers */
047f5d63 67 CGROUP_MASK_V2 = CGROUP_MASK_CPU|CGROUP_MASK_CPUSET|CGROUP_MASK_IO|CGROUP_MASK_MEMORY|CGROUP_MASK_PIDS,
4edd65e4 68
4e1dfa45 69 /* All cgroup v2 BPF pseudo-controllers */
6f50d4f7 70 CGROUP_MASK_BPF = CGROUP_MASK_BPF_FIREWALL|CGROUP_MASK_BPF_DEVICES|CGROUP_MASK_BPF_FOREIGN|CGROUP_MASK_BPF_SOCKET_BIND|CGROUP_MASK_BPF_RESTRICT_NETWORK_INTERFACES,
4edd65e4 71
efdb0237
LP
72 _CGROUP_MASK_ALL = CGROUP_CONTROLLER_TO_MASK(_CGROUP_CONTROLLER_MAX) - 1
73} CGroupMask;
4ad49000 74
c01ef321
LP
75static inline CGroupMask CGROUP_MASK_EXTEND_JOINED(CGroupMask mask) {
76 /* We always mount "cpu" and "cpuacct" in the same hierarchy. Hence, when one bit is set also set the other */
77
78 if (mask & (CGROUP_MASK_CPU|CGROUP_MASK_CPUACCT))
79 mask |= (CGROUP_MASK_CPU|CGROUP_MASK_CPUACCT);
80
81 return mask;
82}
83
f98c2585
CD
84CGroupMask get_cpu_accounting_mask(void);
85bool cpu_accounting_is_cheap(void);
86
13c31542 87/* Special values for all weight knobs on unified hierarchy */
fd4e991d 88#define CGROUP_WEIGHT_INVALID UINT64_MAX
c8340822 89#define CGROUP_WEIGHT_IDLE UINT64_C(0)
13c31542
TH
90#define CGROUP_WEIGHT_MIN UINT64_C(1)
91#define CGROUP_WEIGHT_MAX UINT64_C(10000)
92#define CGROUP_WEIGHT_DEFAULT UINT64_C(100)
93
94#define CGROUP_LIMIT_MIN UINT64_C(0)
fd4e991d 95#define CGROUP_LIMIT_MAX UINT64_MAX
13c31542
TH
96
97static inline bool CGROUP_WEIGHT_IS_OK(uint64_t x) {
98 return
99 x == CGROUP_WEIGHT_INVALID ||
100 (x >= CGROUP_WEIGHT_MIN && x <= CGROUP_WEIGHT_MAX);
101}
102
9be57249
TH
103/* IO limits on unified hierarchy */
104typedef enum CGroupIOLimitType {
105 CGROUP_IO_RBPS_MAX,
106 CGROUP_IO_WBPS_MAX,
ac06a0cf
TH
107 CGROUP_IO_RIOPS_MAX,
108 CGROUP_IO_WIOPS_MAX,
9be57249
TH
109
110 _CGROUP_IO_LIMIT_TYPE_MAX,
2d93c20e 111 _CGROUP_IO_LIMIT_TYPE_INVALID = -EINVAL,
9be57249
TH
112} CGroupIOLimitType;
113
114extern const uint64_t cgroup_io_limit_defaults[_CGROUP_IO_LIMIT_TYPE_MAX];
115
116const char* cgroup_io_limit_type_to_string(CGroupIOLimitType t) _const_;
117CGroupIOLimitType cgroup_io_limit_type_from_string(const char *s) _pure_;
118
d53d9474 119/* Special values for the cpu.shares attribute */
fd4e991d 120#define CGROUP_CPU_SHARES_INVALID UINT64_MAX
d53d9474
LP
121#define CGROUP_CPU_SHARES_MIN UINT64_C(2)
122#define CGROUP_CPU_SHARES_MAX UINT64_C(262144)
123#define CGROUP_CPU_SHARES_DEFAULT UINT64_C(1024)
124
125static inline bool CGROUP_CPU_SHARES_IS_OK(uint64_t x) {
126 return
127 x == CGROUP_CPU_SHARES_INVALID ||
128 (x >= CGROUP_CPU_SHARES_MIN && x <= CGROUP_CPU_SHARES_MAX);
129}
130
d2bd0bfa
MK
131/* Special values for the special {blkio,io}.bfq.weight attribute */
132#define CGROUP_BFQ_WEIGHT_INVALID UINT64_MAX
133#define CGROUP_BFQ_WEIGHT_MIN UINT64_C(1)
134#define CGROUP_BFQ_WEIGHT_MAX UINT64_C(1000)
135#define CGROUP_BFQ_WEIGHT_DEFAULT UINT64_C(100)
136
137/* Convert the normal io.weight value to io.bfq.weight */
138static inline uint64_t BFQ_WEIGHT(uint64_t io_weight) {
139 return
140 io_weight <= CGROUP_WEIGHT_DEFAULT ?
141 CGROUP_BFQ_WEIGHT_DEFAULT - (CGROUP_WEIGHT_DEFAULT - io_weight) * (CGROUP_BFQ_WEIGHT_DEFAULT - CGROUP_BFQ_WEIGHT_MIN) / (CGROUP_WEIGHT_DEFAULT - CGROUP_WEIGHT_MIN) :
142 CGROUP_BFQ_WEIGHT_DEFAULT + (io_weight - CGROUP_WEIGHT_DEFAULT) * (CGROUP_BFQ_WEIGHT_MAX - CGROUP_BFQ_WEIGHT_DEFAULT) / (CGROUP_WEIGHT_MAX - CGROUP_WEIGHT_DEFAULT);
143}
144
d53d9474 145/* Special values for the blkio.weight attribute */
fd4e991d 146#define CGROUP_BLKIO_WEIGHT_INVALID UINT64_MAX
d53d9474
LP
147#define CGROUP_BLKIO_WEIGHT_MIN UINT64_C(10)
148#define CGROUP_BLKIO_WEIGHT_MAX UINT64_C(1000)
149#define CGROUP_BLKIO_WEIGHT_DEFAULT UINT64_C(500)
150
151static inline bool CGROUP_BLKIO_WEIGHT_IS_OK(uint64_t x) {
152 return
153 x == CGROUP_BLKIO_WEIGHT_INVALID ||
154 (x >= CGROUP_BLKIO_WEIGHT_MIN && x <= CGROUP_BLKIO_WEIGHT_MAX);
155}
156
5da38d07
TH
157typedef enum CGroupUnified {
158 CGROUP_UNIFIED_UNKNOWN = -1,
159 CGROUP_UNIFIED_NONE = 0, /* Both systemd and controllers on legacy */
160 CGROUP_UNIFIED_SYSTEMD = 1, /* Only systemd on unified */
161 CGROUP_UNIFIED_ALL = 2, /* Both systemd and controllers on unified */
162} CGroupUnified;
163
5954c074
LP
164/*
165 * General rules:
166 *
167 * We accept named hierarchies in the syntax "foo" and "name=foo".
168 *
169 * We expect that named hierarchies do not conflict in name with a
170 * kernel hierarchy, modulo the "name=" prefix.
171 *
172 * We always generate "normalized" controller names, i.e. without the
173 * "name=" prefix.
174 *
175 * We require absolute cgroup paths. When returning, we will always
176 * generate paths with multiple adjacent / removed.
177 */
178
c6c18be3 179int cg_enumerate_processes(const char *controller, const char *path, FILE **_f);
c6c18be3 180int cg_read_pid(FILE *f, pid_t *_pid);
ab2c3861
TH
181int cg_read_event(const char *controller, const char *path, const char *event,
182 char **val);
c6c18be3 183
35d2e7ec
LP
184int cg_enumerate_subgroups(const char *controller, const char *path, DIR **_d);
185int cg_read_subgroup(DIR *d, char **fn);
186
1d98fef1 187typedef enum CGroupFlags {
be0b7a1a
LP
188 CGROUP_SIGCONT = 1 << 0,
189 CGROUP_IGNORE_SELF = 1 << 1,
190 CGROUP_REMOVE = 1 << 2,
1d98fef1 191} CGroupFlags;
8c6db833 192
c53d2d54 193typedef int (*cg_kill_log_func_t)(pid_t pid, int sig, void *userdata);
1d98fef1
LP
194
195int cg_kill(const char *controller, const char *path, int sig, CGroupFlags flags, Set *s, cg_kill_log_func_t kill_log, void *userdata);
8a513eee 196int cg_kill_kernel_sigkill(const char *controller, const char *path);
1d98fef1
LP
197int cg_kill_recursive(const char *controller, const char *path, int sig, CGroupFlags flags, Set *s, cg_kill_log_func_t kill_log, void *userdata);
198
2a8020fe 199int cg_split_spec(const char *spec, char **ret_controller, char **ret_path);
7027ff61 200int cg_mangle_path(const char *path, char **result);
8c6db833
LP
201
202int cg_get_path(const char *controller, const char *path, const char *suffix, char **fs);
3474ae3c 203int cg_get_path_and_check(const char *controller, const char *path, const char *suffix, char **fs);
7027ff61
LP
204
205int cg_pid_get_path(const char *controller, pid_t pid, char **path);
8c6db833 206
4ad49000 207int cg_rmdir(const char *controller, const char *path);
8c6db833 208
084e7706
YW
209int cg_is_threaded(const char *controller, const char *path);
210
25a1f04c
MS
211typedef enum {
212 CG_KEY_MODE_GRACEFUL = 1 << 0,
213} CGroupKeyMode;
214
4ad49000 215int cg_set_attribute(const char *controller, const char *path, const char *attribute, const char *value);
934277fe 216int cg_get_attribute(const char *controller, const char *path, const char *attribute, char **ret);
25a1f04c
MS
217int cg_get_keyed_attribute_full(const char *controller, const char *path, const char *attribute, char **keys, char **values, CGroupKeyMode mode);
218
219static inline int cg_get_keyed_attribute(
220 const char *controller,
221 const char *path,
222 const char *attribute,
223 char **keys,
224 char **ret_values) {
225 return cg_get_keyed_attribute_full(controller, path, attribute, keys, ret_values, 0);
226}
227
228static inline int cg_get_keyed_attribute_graceful(
229 const char *controller,
230 const char *path,
231 const char *attribute,
232 char **keys,
233 char **ret_values) {
234 return cg_get_keyed_attribute_full(controller, path, attribute, keys, ret_values, CG_KEY_MODE_GRACEFUL);
235}
4ad49000 236
613328c3
AZ
237int cg_get_attribute_as_uint64(const char *controller, const char *path, const char *attribute, uint64_t *ret);
238
b41dcc51
AZ
239/* Does a parse_boolean() on the attribute contents and sets ret accordingly */
240int cg_get_attribute_as_bool(const char *controller, const char *path, const char *attribute, bool *ret);
241
62b9bb26 242int cg_set_access(const char *controller, const char *path, uid_t uid, gid_t gid);
59331b8e 243int cg_get_owner(const char *controller, const char *path, uid_t *ret_uid);
8c6db833 244
4b58153d
LP
245int cg_set_xattr(const char *controller, const char *path, const char *name, const void *value, size_t size, int flags);
246int cg_get_xattr(const char *controller, const char *path, const char *name, void *value, size_t size);
baa358df 247int cg_get_xattr_malloc(const char *controller, const char *path, const char *name, char **ret);
59331b8e
AZ
248/* Returns negative on error, and 0 or 1 on success for the bool value */
249int cg_get_xattr_bool(const char *controller, const char *path, const char *name);
bf25f165 250int cg_remove_xattr(const char *controller, const char *path, const char *name);
4b58153d 251
8c6db833 252int cg_install_release_agent(const char *controller, const char *agent);
ad929bcc 253int cg_uninstall_release_agent(const char *controller);
8c6db833 254
6f883237
LP
255int cg_is_empty(const char *controller, const char *path);
256int cg_is_empty_recursive(const char *controller, const char *path);
8c6db833 257
7027ff61 258int cg_get_root_path(char **path);
6c03089c 259
535e3dd0 260int cg_path_get_cgroupid(const char *path, uint64_t *ret);
7027ff61 261int cg_path_get_session(const char *path, char **session);
ae018d9b 262int cg_path_get_owner_uid(const char *path, uid_t *uid);
6c03089c
LP
263int cg_path_get_unit(const char *path, char **unit);
264int cg_path_get_user_unit(const char *path, char **unit);
7027ff61 265int cg_path_get_machine_name(const char *path, char **machine);
1021b21b 266int cg_path_get_slice(const char *path, char **slice);
329ac4bc 267int cg_path_get_user_slice(const char *path, char **slice);
7027ff61 268
751bc6ac 269int cg_shift_path(const char *cgroup, const char *cached_root, const char **shifted);
e9174f29 270int cg_pid_get_path_shifted(pid_t pid, const char *cached_root, char **cgroup);
6c03089c 271
7027ff61 272int cg_pid_get_session(pid_t pid, char **session);
ae018d9b 273int cg_pid_get_owner_uid(pid_t pid, uid_t *uid);
ba1261bc 274int cg_pid_get_unit(pid_t pid, char **unit);
ef1673d1 275int cg_pid_get_user_unit(pid_t pid, char **unit);
7027ff61 276int cg_pid_get_machine_name(pid_t pid, char **machine);
1021b21b 277int cg_pid_get_slice(pid_t pid, char **slice);
329ac4bc 278int cg_pid_get_user_slice(pid_t pid, char **slice);
1f73f0f1 279
7027ff61 280int cg_path_decode_unit(const char *cgroup, char **unit);
96cde13a 281
ae018d9b 282char *cg_escape(const char *p);
44a6b1b6 283char *cg_unescape(const char *p) _pure_;
78edb35a 284
185a0874 285bool cg_controller_is_valid(const char *p);
a016b922
LP
286
287int cg_slice_to_path(const char *unit, char **ret);
4ad49000 288
efdb0237 289typedef const char* (*cg_migrate_callback_t)(CGroupMask mask, void *userdata);
03b90d4b 290
efdb0237 291int cg_mask_supported(CGroupMask *ret);
0fa7b500 292int cg_mask_supported_subtree(const char *root, CGroupMask *ret);
aae7e17f
FB
293int cg_mask_from_string(const char *s, CGroupMask *ret);
294int cg_mask_to_string(CGroupMask mask, char **ret);
b12afc8c 295
6925a0de 296int cg_kernel_controllers(Set **controllers);
efdb0237 297
3228995c 298bool cg_ns_supported(void);
d9e45bc3 299bool cg_freezer_supported(void);
8a513eee 300bool cg_kill_supported(void);
3228995c 301
b4cccbc1
LP
302int cg_all_unified(void);
303int cg_hybrid_unified(void);
c22800e4 304int cg_unified_controller(const char *controller);
d4d99bc6
ZJS
305int cg_unified_cached(bool flush);
306static inline int cg_unified(void) {
307 return cg_unified_cached(true);
308}
efdb0237
LP
309
310const char* cgroup_controller_to_string(CGroupController c) _const_;
311CGroupController cgroup_controller_from_string(const char *s) _pure_;
d53d9474 312
f0bef277
EV
313bool is_cgroup_fs(const struct statfs *s);
314bool fd_is_cgroup_fs(int fd);
4d824a4e
AZ
315
316typedef enum ManagedOOMMode {
317 MANAGED_OOM_AUTO,
318 MANAGED_OOM_KILL,
319 _MANAGED_OOM_MODE_MAX,
2d93c20e 320 _MANAGED_OOM_MODE_INVALID = -EINVAL,
4d824a4e
AZ
321} ManagedOOMMode;
322
323const char* managed_oom_mode_to_string(ManagedOOMMode m) _const_;
324ManagedOOMMode managed_oom_mode_from_string(const char *s) _pure_;
242d75bd
AZ
325
326typedef enum ManagedOOMPreference {
327 MANAGED_OOM_PREFERENCE_NONE = 0,
328 MANAGED_OOM_PREFERENCE_AVOID = 1,
329 MANAGED_OOM_PREFERENCE_OMIT = 2,
330 _MANAGED_OOM_PREFERENCE_MAX,
925484aa 331 _MANAGED_OOM_PREFERENCE_INVALID = -EINVAL,
242d75bd
AZ
332} ManagedOOMPreference;
333
334const char* managed_oom_preference_to_string(ManagedOOMPreference a) _const_;
335ManagedOOMPreference managed_oom_preference_from_string(const char *s) _pure_;
a5edf95e
LP
336
337/* The structure to pass to name_to_handle_at() on cgroupfs2 */
338typedef union {
339 struct file_handle file_handle;
340 uint8_t space[offsetof(struct file_handle, f_handle) + sizeof(uint64_t)];
341} cg_file_handle;
342
343#define CG_FILE_HANDLE_INIT { .file_handle.handle_bytes = sizeof(uint64_t) }
344#define CG_FILE_HANDLE_CGROUPID(fh) (*(uint64_t*) (fh).file_handle.f_handle)