]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/cgroup.c
sd-journal: implement a number of non-implemented calls from the API for now
[thirdparty/systemd.git] / src / cgroup.c
CommitLineData
d6c9574f 1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
8e274523
LP
2
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
22#include <errno.h>
23#include <assert.h>
24#include <unistd.h>
25#include <sys/types.h>
26#include <signal.h>
27#include <sys/mount.h>
c6c18be3 28#include <fcntl.h>
8c6db833 29
8e274523 30#include "cgroup.h"
8c6db833 31#include "cgroup-util.h"
8e274523
LP
32#include "log.h"
33
8e274523
LP
34int cgroup_bonding_realize(CGroupBonding *b) {
35 int r;
36
37 assert(b);
38 assert(b->path);
39 assert(b->controller);
40
ab1f0633
LP
41 r = cg_create(b->controller, b->path);
42 if (r < 0) {
43 log_warning("Failed to create cgroup %s:%s: %s", b->controller, b->path, strerror(-r));
8c6db833 44 return r;
ab1f0633 45 }
8e274523 46
8c6db833 47 b->realized = true;
8e274523 48
8e274523 49 return 0;
8e274523
LP
50}
51
52int cgroup_bonding_realize_list(CGroupBonding *first) {
53 CGroupBonding *b;
8c6db833 54 int r;
8e274523 55
8c6db833 56 LIST_FOREACH(by_unit, b, first)
d686d8a9 57 if ((r = cgroup_bonding_realize(b)) < 0 && b->essential)
8e274523 58 return r;
8e274523
LP
59
60 return 0;
61}
62
38c52d46 63void cgroup_bonding_free(CGroupBonding *b, bool remove_or_trim) {
8e274523
LP
64 assert(b);
65
66 if (b->unit) {
67 CGroupBonding *f;
68
69 LIST_REMOVE(CGroupBonding, by_unit, b->unit->meta.cgroup_bondings, b);
70
d686d8a9
LP
71 if (streq(b->controller, SYSTEMD_CGROUP_CONTROLLER)) {
72 assert_se(f = hashmap_get(b->unit->meta.manager->cgroup_bondings, b->path));
73 LIST_REMOVE(CGroupBonding, by_path, f, b);
8e274523 74
d686d8a9
LP
75 if (f)
76 hashmap_replace(b->unit->meta.manager->cgroup_bondings, b->path, f);
77 else
78 hashmap_remove(b->unit->meta.manager->cgroup_bondings, b->path);
79 }
8e274523
LP
80 }
81
38c52d46 82 if (b->realized && b->ours && remove_or_trim) {
8e274523 83
8c6db833
LP
84 if (cgroup_bonding_is_empty(b) > 0)
85 cg_delete(b->controller, b->path);
86 else
87 cg_trim(b->controller, b->path, false);
8e274523
LP
88 }
89
c9106f61
LP
90 free(b->controller);
91 free(b->path);
8e274523
LP
92 free(b);
93}
94
38c52d46 95void cgroup_bonding_free_list(CGroupBonding *first, bool remove_or_trim) {
8e274523
LP
96 CGroupBonding *b, *n;
97
98 LIST_FOREACH_SAFE(by_unit, b, n, first)
38c52d46 99 cgroup_bonding_free(b, remove_or_trim);
8e274523
LP
100}
101
fb385181
LP
102void cgroup_bonding_trim(CGroupBonding *b, bool delete_root) {
103 assert(b);
104
d686d8a9 105 if (b->realized && b->ours)
fb385181
LP
106 cg_trim(b->controller, b->path, delete_root);
107}
108
109void cgroup_bonding_trim_list(CGroupBonding *first, bool delete_root) {
110 CGroupBonding *b;
111
112 LIST_FOREACH(by_unit, b, first)
113 cgroup_bonding_trim(b, delete_root);
114}
115
8e274523
LP
116int cgroup_bonding_install(CGroupBonding *b, pid_t pid) {
117 int r;
118
119 assert(b);
120 assert(pid >= 0);
121
8c6db833
LP
122 if ((r = cg_create_and_attach(b->controller, b->path, pid)) < 0)
123 return r;
8e274523 124
8c6db833 125 b->realized = true;
8e274523
LP
126 return 0;
127}
128
129int cgroup_bonding_install_list(CGroupBonding *first, pid_t pid) {
130 CGroupBonding *b;
8c6db833 131 int r;
8e274523 132
8c6db833 133 LIST_FOREACH(by_unit, b, first)
d686d8a9 134 if ((r = cgroup_bonding_install(b, pid)) < 0 && b->essential)
8e274523 135 return r;
8e274523
LP
136
137 return 0;
138}
139
64747e2d
LP
140int cgroup_bonding_set_group_access(CGroupBonding *b, mode_t mode, uid_t uid, gid_t gid) {
141 assert(b);
142
143 if (!b->realized)
144 return -EINVAL;
145
146 return cg_set_group_access(b->controller, b->path, mode, uid, gid);
147}
148
149int cgroup_bonding_set_group_access_list(CGroupBonding *first, mode_t mode, uid_t uid, gid_t gid) {
150 CGroupBonding *b;
151 int r;
152
153 LIST_FOREACH(by_unit, b, first) {
154 r = cgroup_bonding_set_group_access(b, mode, uid, gid);
155 if (r < 0)
156 return r;
157 }
158
159 return 0;
160}
161
162int cgroup_bonding_set_task_access(CGroupBonding *b, mode_t mode, uid_t uid, gid_t gid) {
163 assert(b);
164
165 if (!b->realized)
166 return -EINVAL;
167
168 return cg_set_task_access(b->controller, b->path, mode, uid, gid);
169}
170
171int cgroup_bonding_set_task_access_list(CGroupBonding *first, mode_t mode, uid_t uid, gid_t gid) {
172 CGroupBonding *b;
173 int r;
174
175 LIST_FOREACH(by_unit, b, first) {
176 r = cgroup_bonding_set_task_access(b, mode, uid, gid);
177 if (r < 0)
178 return r;
179 }
180
181 return 0;
182}
183
430c18ed 184int cgroup_bonding_kill(CGroupBonding *b, int sig, bool sigcont, Set *s) {
8e274523 185 assert(b);
8c6db833 186 assert(sig >= 0);
8e274523 187
d686d8a9 188 /* Don't kill cgroups that aren't ours */
31e54cc8 189 if (!b->ours)
d686d8a9 190 return 0;
8c6db833 191
430c18ed 192 return cg_kill_recursive(b->controller, b->path, sig, sigcont, true, false, s);
8e274523
LP
193}
194
430c18ed 195int cgroup_bonding_kill_list(CGroupBonding *first, int sig, bool sigcont, Set *s) {
8e274523 196 CGroupBonding *b;
ca949c9d
LP
197 Set *allocated_set = NULL;
198 int ret = -EAGAIN, r;
199
8f53a7b8
LP
200 if (!first)
201 return 0;
202
ca949c9d
LP
203 if (!s)
204 if (!(s = allocated_set = set_new(trivial_hash_func, trivial_compare_func)))
205 return -ENOMEM;
8e274523
LP
206
207 LIST_FOREACH(by_unit, b, first) {
430c18ed 208 if ((r = cgroup_bonding_kill(b, sig, sigcont, s)) < 0) {
8c6db833 209 if (r == -EAGAIN || r == -ESRCH)
50159e6a 210 continue;
8e274523 211
ca949c9d
LP
212 ret = r;
213 goto finish;
50159e6a
LP
214 }
215
ca949c9d
LP
216 if (ret < 0 || r > 0)
217 ret = r;
8e274523
LP
218 }
219
ca949c9d
LP
220finish:
221 if (allocated_set)
222 set_free(allocated_set);
223
224 return ret;
8e274523
LP
225}
226
227/* Returns 1 if the group is empty, 0 if it is not, -EAGAIN if we
228 * cannot know */
229int cgroup_bonding_is_empty(CGroupBonding *b) {
8e274523
LP
230 int r;
231
232 assert(b);
233
8c6db833
LP
234 if ((r = cg_is_empty_recursive(b->controller, b->path, true)) < 0)
235 return r;
8e274523 236
8c6db833
LP
237 /* If it is empty it is empty */
238 if (r > 0)
8e274523
LP
239 return 1;
240
8c6db833 241 /* It's not only us using this cgroup, so we just don't know */
d686d8a9 242 return b->ours ? 0 : -EAGAIN;
8e274523
LP
243}
244
245int cgroup_bonding_is_empty_list(CGroupBonding *first) {
246 CGroupBonding *b;
247
248 LIST_FOREACH(by_unit, b, first) {
249 int r;
250
251 if ((r = cgroup_bonding_is_empty(b)) < 0) {
252 /* If this returned -EAGAIN, then we don't know if the
253 * group is empty, so let's see if another group can
254 * tell us */
255
256 if (r != -EAGAIN)
257 return r;
258 } else
259 return r;
260 }
261
262 return -EAGAIN;
263}
264
8e274523 265int manager_setup_cgroup(Manager *m) {
c6c18be3 266 char *current = NULL, *path = NULL;
8e274523 267 int r;
7ccfb64a 268 char suffix[32];
8e274523
LP
269
270 assert(m);
271
e5a53dc7 272 /* 0. Be nice to Ingo Molnar #628004 */
0c85a4f3 273 if (path_is_mount_point("/sys/fs/cgroup/systemd", false) <= 0) {
e5a53dc7
LP
274 log_warning("No control group support available, not creating root group.");
275 return 0;
276 }
277
35d2e7ec 278 /* 1. Determine hierarchy */
12235040
LP
279 if ((r = cg_get_by_pid(SYSTEMD_CGROUP_CONTROLLER, 0, &current)) < 0) {
280 log_error("Cannot determine cgroup we are running in: %s", strerror(-r));
c6c18be3 281 goto finish;
12235040 282 }
8e274523 283
0baf24dd
LP
284 if (m->running_as == MANAGER_SYSTEM)
285 strcpy(suffix, "/system");
286 else {
287 snprintf(suffix, sizeof(suffix), "/systemd-%lu", (unsigned long) getpid());
288 char_array_0(suffix);
289 }
7ccfb64a 290
8e274523 291 free(m->cgroup_hierarchy);
c6c18be3 292 if (endswith(current, suffix)) {
7ccfb64a 293 /* We probably got reexecuted and can continue to use our root cgroup */
c6c18be3
LP
294 m->cgroup_hierarchy = current;
295 current = NULL;
7ccfb64a 296
c6c18be3
LP
297 } else {
298 /* We need a new root cgroup */
7ccfb64a 299 m->cgroup_hierarchy = NULL;
e364ad06 300 if (asprintf(&m->cgroup_hierarchy, "%s%s", streq(current, "/") ? "" : current, suffix) < 0) {
12235040 301 log_error("Out of memory");
c6c18be3
LP
302 r = -ENOMEM;
303 goto finish;
304 }
8e274523
LP
305 }
306
35d2e7ec 307 /* 2. Show data */
12235040
LP
308 if ((r = cg_get_path(SYSTEMD_CGROUP_CONTROLLER, m->cgroup_hierarchy, NULL, &path)) < 0) {
309 log_error("Cannot find cgroup mount point: %s", strerror(-r));
c6c18be3 310 goto finish;
12235040 311 }
8e274523 312
c6c18be3
LP
313 log_debug("Using cgroup controller " SYSTEMD_CGROUP_CONTROLLER ". File system hierarchy is at %s.", path);
314
35d2e7ec 315 /* 3. Install agent */
91901329 316 if ((r = cg_install_release_agent(SYSTEMD_CGROUP_CONTROLLER, SYSTEMD_CGROUP_AGENT_PATH)) < 0)
8e274523 317 log_warning("Failed to install release agent, ignoring: %s", strerror(-r));
c6c18be3
LP
318 else if (r > 0)
319 log_debug("Installed release agent.");
8e274523 320 else
c6c18be3 321 log_debug("Release agent already installed.");
8e274523 322
35d2e7ec 323 /* 4. Realize the group */
c6c18be3 324 if ((r = cg_create_and_attach(SYSTEMD_CGROUP_CONTROLLER, m->cgroup_hierarchy, 0)) < 0) {
8e274523 325 log_error("Failed to create root cgroup hierarchy: %s", strerror(-r));
c6c18be3
LP
326 goto finish;
327 }
328
35d2e7ec 329 /* 5. And pin it, so that it cannot be unmounted */
c6c18be3
LP
330 if (m->pin_cgroupfs_fd >= 0)
331 close_nointr_nofail(m->pin_cgroupfs_fd);
332
333 if ((m->pin_cgroupfs_fd = open(path, O_RDONLY|O_CLOEXEC|O_DIRECTORY|O_NOCTTY|O_NONBLOCK)) < 0) {
12235040 334 log_error("Failed to open pin file: %m");
c6c18be3
LP
335 r = -errno;
336 goto finish;
337 }
338
339 log_debug("Created root group.");
340
341finish:
342 free(current);
343 free(path);
8e274523
LP
344
345 return r;
346}
347
c6c18be3 348void manager_shutdown_cgroup(Manager *m, bool delete) {
8e274523
LP
349 assert(m);
350
c6c18be3
LP
351 if (delete && m->cgroup_hierarchy)
352 cg_delete(SYSTEMD_CGROUP_CONTROLLER, m->cgroup_hierarchy);
8e274523 353
c6c18be3
LP
354 if (m->pin_cgroupfs_fd >= 0) {
355 close_nointr_nofail(m->pin_cgroupfs_fd);
356 m->pin_cgroupfs_fd = -1;
357 }
358
359 free(m->cgroup_hierarchy);
360 m->cgroup_hierarchy = NULL;
8e274523
LP
361}
362
363int cgroup_notify_empty(Manager *m, const char *group) {
364 CGroupBonding *l, *b;
365
366 assert(m);
367 assert(group);
368
353fa6a2
LP
369 l = hashmap_get(m->cgroup_bondings, group);
370 if (!l)
8e274523
LP
371 return 0;
372
373 LIST_FOREACH(by_path, b, l) {
374 int t;
375
376 if (!b->unit)
377 continue;
378
353fa6a2
LP
379 t = cgroup_bonding_is_empty_list(b);
380 if (t < 0) {
8e274523
LP
381
382 /* If we don't know, we don't know */
383 if (t != -EAGAIN)
384 log_warning("Failed to check whether cgroup is empty: %s", strerror(errno));
385
386 continue;
387 }
388
353fa6a2
LP
389 if (t > 0) {
390 /* If it is empty, let's delete it */
391 cgroup_bonding_trim_list(b->unit->meta.cgroup_bondings, true);
392
8e274523
LP
393 if (UNIT_VTABLE(b->unit)->cgroup_notify_empty)
394 UNIT_VTABLE(b->unit)->cgroup_notify_empty(b->unit);
353fa6a2 395 }
8e274523
LP
396 }
397
398 return 0;
399}
400
8c47c732
LP
401Unit* cgroup_unit_by_pid(Manager *m, pid_t pid) {
402 CGroupBonding *l, *b;
403 char *group = NULL;
8c47c732
LP
404
405 assert(m);
406
407 if (pid <= 1)
408 return NULL;
409
e364ad06 410 if (cg_get_by_pid(SYSTEMD_CGROUP_CONTROLLER, pid, &group) < 0)
8c47c732
LP
411 return NULL;
412
413 l = hashmap_get(m->cgroup_bondings, group);
4455bcd0
LP
414
415 if (!l) {
416 char *slash;
417
418 while ((slash = strrchr(group, '/'))) {
419 if (slash == group)
420 break;
421
422 *slash = 0;
423
424 if ((l = hashmap_get(m->cgroup_bondings, group)))
425 break;
426 }
427 }
428
8c47c732
LP
429 free(group);
430
8c47c732
LP
431 LIST_FOREACH(by_path, b, l) {
432
433 if (!b->unit)
434 continue;
435
d686d8a9 436 if (b->ours)
8c47c732
LP
437 return b->unit;
438 }
439
440 return NULL;
441}
442
8e274523
LP
443CGroupBonding *cgroup_bonding_find_list(CGroupBonding *first, const char *controller) {
444 CGroupBonding *b;
445
446 assert(controller);
447
448 LIST_FOREACH(by_unit, b, first)
449 if (streq(b->controller, controller))
450 return b;
451
452 return NULL;
453}
6dde1f33
LP
454
455char *cgroup_bonding_to_string(CGroupBonding *b) {
456 char *r;
457
458 assert(b);
459
460 if (asprintf(&r, "%s:%s", b->controller, b->path) < 0)
461 return NULL;
462
463 return r;
464}
4fbf50b3
LP
465
466pid_t cgroup_bonding_search_main_pid(CGroupBonding *b) {
467 FILE *f;
2633eb83 468 pid_t pid = 0, npid, mypid;
4fbf50b3
LP
469
470 assert(b);
471
d686d8a9 472 if (!b->ours)
4fbf50b3
LP
473 return 0;
474
bd40a2d8 475 if (cg_enumerate_processes(b->controller, b->path, &f) < 0)
4fbf50b3
LP
476 return 0;
477
2633eb83
LP
478 mypid = getpid();
479
bd40a2d8 480 while (cg_read_pid(f, &npid) > 0) {
2633eb83 481 pid_t ppid;
4fbf50b3
LP
482
483 if (npid == pid)
484 continue;
485
2633eb83
LP
486 /* Ignore processes that aren't our kids */
487 if (get_parent_of_pid(npid, &ppid) >= 0 && ppid != mypid)
488 continue;
489
4fbf50b3 490 if (pid != 0) {
2633eb83
LP
491 /* Dang, there's more than one daemonized PID
492 in this group, so we don't know what process
493 is the main process. */
4fbf50b3
LP
494 pid = 0;
495 break;
496 }
497
498 pid = npid;
499 }
500
501 fclose(f);
502
503 return pid;
504}
505
506pid_t cgroup_bonding_search_main_pid_list(CGroupBonding *first) {
507 CGroupBonding *b;
508 pid_t pid;
509
510 /* Try to find a main pid from this cgroup, but checking if
511 * there's only one PID in the cgroup and returning it. Later
512 * on we might want to add additional, smarter heuristics
513 * here. */
514
515 LIST_FOREACH(by_unit, b, first)
516 if ((pid = cgroup_bonding_search_main_pid(b)) != 0)
517 return pid;
518
519 return 0;
520
521}