]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/cgroup.c
PATCH: add missing header include
[thirdparty/systemd.git] / src / cgroup.c
CommitLineData
d6c9574f 1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
8e274523
LP
2
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
22#include <errno.h>
23#include <assert.h>
24#include <unistd.h>
25#include <sys/types.h>
26#include <signal.h>
27#include <sys/mount.h>
c6c18be3 28#include <fcntl.h>
8c6db833 29
8e274523 30#include "cgroup.h"
8c6db833 31#include "cgroup-util.h"
8e274523
LP
32#include "log.h"
33
8e274523
LP
34int cgroup_bonding_realize(CGroupBonding *b) {
35 int r;
36
37 assert(b);
38 assert(b->path);
39 assert(b->controller);
40
8c6db833 41 if (b->realized)
8e274523
LP
42 return 0;
43
8c6db833
LP
44 if ((r = cg_create(b->controller, b->path)) < 0)
45 return r;
8e274523 46
8c6db833 47 b->realized = true;
8e274523 48
8e274523 49 return 0;
8e274523
LP
50}
51
52int cgroup_bonding_realize_list(CGroupBonding *first) {
53 CGroupBonding *b;
8c6db833 54 int r;
8e274523 55
8c6db833 56 LIST_FOREACH(by_unit, b, first)
d686d8a9 57 if ((r = cgroup_bonding_realize(b)) < 0 && b->essential)
8e274523 58 return r;
8e274523
LP
59
60 return 0;
61}
62
38c52d46 63void cgroup_bonding_free(CGroupBonding *b, bool remove_or_trim) {
8e274523
LP
64 assert(b);
65
66 if (b->unit) {
67 CGroupBonding *f;
68
69 LIST_REMOVE(CGroupBonding, by_unit, b->unit->meta.cgroup_bondings, b);
70
d686d8a9
LP
71 if (streq(b->controller, SYSTEMD_CGROUP_CONTROLLER)) {
72 assert_se(f = hashmap_get(b->unit->meta.manager->cgroup_bondings, b->path));
73 LIST_REMOVE(CGroupBonding, by_path, f, b);
8e274523 74
d686d8a9
LP
75 if (f)
76 hashmap_replace(b->unit->meta.manager->cgroup_bondings, b->path, f);
77 else
78 hashmap_remove(b->unit->meta.manager->cgroup_bondings, b->path);
79 }
8e274523
LP
80 }
81
38c52d46 82 if (b->realized && b->ours && remove_or_trim) {
8e274523 83
8c6db833
LP
84 if (cgroup_bonding_is_empty(b) > 0)
85 cg_delete(b->controller, b->path);
86 else
87 cg_trim(b->controller, b->path, false);
8e274523
LP
88 }
89
c9106f61
LP
90 free(b->controller);
91 free(b->path);
8e274523
LP
92 free(b);
93}
94
38c52d46 95void cgroup_bonding_free_list(CGroupBonding *first, bool remove_or_trim) {
8e274523
LP
96 CGroupBonding *b, *n;
97
98 LIST_FOREACH_SAFE(by_unit, b, n, first)
38c52d46 99 cgroup_bonding_free(b, remove_or_trim);
8e274523
LP
100}
101
fb385181
LP
102void cgroup_bonding_trim(CGroupBonding *b, bool delete_root) {
103 assert(b);
104
d686d8a9 105 if (b->realized && b->ours)
fb385181
LP
106 cg_trim(b->controller, b->path, delete_root);
107}
108
109void cgroup_bonding_trim_list(CGroupBonding *first, bool delete_root) {
110 CGroupBonding *b;
111
112 LIST_FOREACH(by_unit, b, first)
113 cgroup_bonding_trim(b, delete_root);
114}
115
8e274523
LP
116int cgroup_bonding_install(CGroupBonding *b, pid_t pid) {
117 int r;
118
119 assert(b);
120 assert(pid >= 0);
121
8c6db833
LP
122 if ((r = cg_create_and_attach(b->controller, b->path, pid)) < 0)
123 return r;
8e274523 124
8c6db833 125 b->realized = true;
8e274523
LP
126 return 0;
127}
128
129int cgroup_bonding_install_list(CGroupBonding *first, pid_t pid) {
130 CGroupBonding *b;
8c6db833 131 int r;
8e274523 132
8c6db833 133 LIST_FOREACH(by_unit, b, first)
d686d8a9 134 if ((r = cgroup_bonding_install(b, pid)) < 0 && b->essential)
8e274523 135 return r;
8e274523
LP
136
137 return 0;
138}
139
64747e2d
LP
140int cgroup_bonding_set_group_access(CGroupBonding *b, mode_t mode, uid_t uid, gid_t gid) {
141 assert(b);
142
143 if (!b->realized)
144 return -EINVAL;
145
146 return cg_set_group_access(b->controller, b->path, mode, uid, gid);
147}
148
149int cgroup_bonding_set_group_access_list(CGroupBonding *first, mode_t mode, uid_t uid, gid_t gid) {
150 CGroupBonding *b;
151 int r;
152
153 LIST_FOREACH(by_unit, b, first) {
154 r = cgroup_bonding_set_group_access(b, mode, uid, gid);
155 if (r < 0)
156 return r;
157 }
158
159 return 0;
160}
161
162int cgroup_bonding_set_task_access(CGroupBonding *b, mode_t mode, uid_t uid, gid_t gid) {
163 assert(b);
164
165 if (!b->realized)
166 return -EINVAL;
167
168 return cg_set_task_access(b->controller, b->path, mode, uid, gid);
169}
170
171int cgroup_bonding_set_task_access_list(CGroupBonding *first, mode_t mode, uid_t uid, gid_t gid) {
172 CGroupBonding *b;
173 int r;
174
175 LIST_FOREACH(by_unit, b, first) {
176 r = cgroup_bonding_set_task_access(b, mode, uid, gid);
177 if (r < 0)
178 return r;
179 }
180
181 return 0;
182}
183
430c18ed 184int cgroup_bonding_kill(CGroupBonding *b, int sig, bool sigcont, Set *s) {
8e274523 185 assert(b);
8c6db833 186 assert(sig >= 0);
8e274523 187
d686d8a9 188 /* Don't kill cgroups that aren't ours */
31e54cc8 189 if (!b->ours)
d686d8a9 190 return 0;
8c6db833 191
430c18ed 192 return cg_kill_recursive(b->controller, b->path, sig, sigcont, true, false, s);
8e274523
LP
193}
194
430c18ed 195int cgroup_bonding_kill_list(CGroupBonding *first, int sig, bool sigcont, Set *s) {
8e274523 196 CGroupBonding *b;
ca949c9d
LP
197 Set *allocated_set = NULL;
198 int ret = -EAGAIN, r;
199
200 if (!s)
201 if (!(s = allocated_set = set_new(trivial_hash_func, trivial_compare_func)))
202 return -ENOMEM;
8e274523
LP
203
204 LIST_FOREACH(by_unit, b, first) {
430c18ed 205 if ((r = cgroup_bonding_kill(b, sig, sigcont, s)) < 0) {
8c6db833 206 if (r == -EAGAIN || r == -ESRCH)
50159e6a 207 continue;
8e274523 208
ca949c9d
LP
209 ret = r;
210 goto finish;
50159e6a
LP
211 }
212
ca949c9d
LP
213 if (ret < 0 || r > 0)
214 ret = r;
8e274523
LP
215 }
216
ca949c9d
LP
217finish:
218 if (allocated_set)
219 set_free(allocated_set);
220
221 return ret;
8e274523
LP
222}
223
224/* Returns 1 if the group is empty, 0 if it is not, -EAGAIN if we
225 * cannot know */
226int cgroup_bonding_is_empty(CGroupBonding *b) {
8e274523
LP
227 int r;
228
229 assert(b);
230
8c6db833
LP
231 if ((r = cg_is_empty_recursive(b->controller, b->path, true)) < 0)
232 return r;
8e274523 233
8c6db833
LP
234 /* If it is empty it is empty */
235 if (r > 0)
8e274523
LP
236 return 1;
237
8c6db833 238 /* It's not only us using this cgroup, so we just don't know */
d686d8a9 239 return b->ours ? 0 : -EAGAIN;
8e274523
LP
240}
241
242int cgroup_bonding_is_empty_list(CGroupBonding *first) {
243 CGroupBonding *b;
244
245 LIST_FOREACH(by_unit, b, first) {
246 int r;
247
248 if ((r = cgroup_bonding_is_empty(b)) < 0) {
249 /* If this returned -EAGAIN, then we don't know if the
250 * group is empty, so let's see if another group can
251 * tell us */
252
253 if (r != -EAGAIN)
254 return r;
255 } else
256 return r;
257 }
258
259 return -EAGAIN;
260}
261
8e274523 262int manager_setup_cgroup(Manager *m) {
c6c18be3 263 char *current = NULL, *path = NULL;
8e274523 264 int r;
7ccfb64a 265 char suffix[32];
8e274523
LP
266
267 assert(m);
268
e5a53dc7
LP
269 /* 0. Be nice to Ingo Molnar #628004 */
270 if (path_is_mount_point("/sys/fs/cgroup/systemd") <= 0) {
271 log_warning("No control group support available, not creating root group.");
272 return 0;
273 }
274
35d2e7ec 275 /* 1. Determine hierarchy */
12235040
LP
276 if ((r = cg_get_by_pid(SYSTEMD_CGROUP_CONTROLLER, 0, &current)) < 0) {
277 log_error("Cannot determine cgroup we are running in: %s", strerror(-r));
c6c18be3 278 goto finish;
12235040 279 }
8e274523 280
0baf24dd
LP
281 if (m->running_as == MANAGER_SYSTEM)
282 strcpy(suffix, "/system");
283 else {
284 snprintf(suffix, sizeof(suffix), "/systemd-%lu", (unsigned long) getpid());
285 char_array_0(suffix);
286 }
7ccfb64a 287
8e274523 288 free(m->cgroup_hierarchy);
c6c18be3 289 if (endswith(current, suffix)) {
7ccfb64a 290 /* We probably got reexecuted and can continue to use our root cgroup */
c6c18be3
LP
291 m->cgroup_hierarchy = current;
292 current = NULL;
7ccfb64a 293
c6c18be3
LP
294 } else {
295 /* We need a new root cgroup */
7ccfb64a 296 m->cgroup_hierarchy = NULL;
e364ad06 297 if (asprintf(&m->cgroup_hierarchy, "%s%s", streq(current, "/") ? "" : current, suffix) < 0) {
12235040 298 log_error("Out of memory");
c6c18be3
LP
299 r = -ENOMEM;
300 goto finish;
301 }
8e274523
LP
302 }
303
35d2e7ec 304 /* 2. Show data */
12235040
LP
305 if ((r = cg_get_path(SYSTEMD_CGROUP_CONTROLLER, m->cgroup_hierarchy, NULL, &path)) < 0) {
306 log_error("Cannot find cgroup mount point: %s", strerror(-r));
c6c18be3 307 goto finish;
12235040 308 }
8e274523 309
c6c18be3
LP
310 log_debug("Using cgroup controller " SYSTEMD_CGROUP_CONTROLLER ". File system hierarchy is at %s.", path);
311
35d2e7ec 312 /* 3. Install agent */
91901329 313 if ((r = cg_install_release_agent(SYSTEMD_CGROUP_CONTROLLER, SYSTEMD_CGROUP_AGENT_PATH)) < 0)
8e274523 314 log_warning("Failed to install release agent, ignoring: %s", strerror(-r));
c6c18be3
LP
315 else if (r > 0)
316 log_debug("Installed release agent.");
8e274523 317 else
c6c18be3 318 log_debug("Release agent already installed.");
8e274523 319
35d2e7ec 320 /* 4. Realize the group */
c6c18be3 321 if ((r = cg_create_and_attach(SYSTEMD_CGROUP_CONTROLLER, m->cgroup_hierarchy, 0)) < 0) {
8e274523 322 log_error("Failed to create root cgroup hierarchy: %s", strerror(-r));
c6c18be3
LP
323 goto finish;
324 }
325
35d2e7ec 326 /* 5. And pin it, so that it cannot be unmounted */
c6c18be3
LP
327 if (m->pin_cgroupfs_fd >= 0)
328 close_nointr_nofail(m->pin_cgroupfs_fd);
329
330 if ((m->pin_cgroupfs_fd = open(path, O_RDONLY|O_CLOEXEC|O_DIRECTORY|O_NOCTTY|O_NONBLOCK)) < 0) {
12235040 331 log_error("Failed to open pin file: %m");
c6c18be3
LP
332 r = -errno;
333 goto finish;
334 }
335
336 log_debug("Created root group.");
337
338finish:
339 free(current);
340 free(path);
8e274523
LP
341
342 return r;
343}
344
c6c18be3 345void manager_shutdown_cgroup(Manager *m, bool delete) {
8e274523
LP
346 assert(m);
347
c6c18be3
LP
348 if (delete && m->cgroup_hierarchy)
349 cg_delete(SYSTEMD_CGROUP_CONTROLLER, m->cgroup_hierarchy);
8e274523 350
c6c18be3
LP
351 if (m->pin_cgroupfs_fd >= 0) {
352 close_nointr_nofail(m->pin_cgroupfs_fd);
353 m->pin_cgroupfs_fd = -1;
354 }
355
356 free(m->cgroup_hierarchy);
357 m->cgroup_hierarchy = NULL;
8e274523
LP
358}
359
360int cgroup_notify_empty(Manager *m, const char *group) {
361 CGroupBonding *l, *b;
362
363 assert(m);
364 assert(group);
365
366 if (!(l = hashmap_get(m->cgroup_bondings, group)))
367 return 0;
368
369 LIST_FOREACH(by_path, b, l) {
370 int t;
371
372 if (!b->unit)
373 continue;
374
375 if ((t = cgroup_bonding_is_empty_list(b)) < 0) {
376
377 /* If we don't know, we don't know */
378 if (t != -EAGAIN)
379 log_warning("Failed to check whether cgroup is empty: %s", strerror(errno));
380
381 continue;
382 }
383
384 if (t > 0)
385 if (UNIT_VTABLE(b->unit)->cgroup_notify_empty)
386 UNIT_VTABLE(b->unit)->cgroup_notify_empty(b->unit);
387 }
388
389 return 0;
390}
391
8c47c732
LP
392Unit* cgroup_unit_by_pid(Manager *m, pid_t pid) {
393 CGroupBonding *l, *b;
394 char *group = NULL;
8c47c732
LP
395
396 assert(m);
397
398 if (pid <= 1)
399 return NULL;
400
e364ad06 401 if (cg_get_by_pid(SYSTEMD_CGROUP_CONTROLLER, pid, &group) < 0)
8c47c732
LP
402 return NULL;
403
404 l = hashmap_get(m->cgroup_bondings, group);
4455bcd0
LP
405
406 if (!l) {
407 char *slash;
408
409 while ((slash = strrchr(group, '/'))) {
410 if (slash == group)
411 break;
412
413 *slash = 0;
414
415 if ((l = hashmap_get(m->cgroup_bondings, group)))
416 break;
417 }
418 }
419
8c47c732
LP
420 free(group);
421
8c47c732
LP
422 LIST_FOREACH(by_path, b, l) {
423
424 if (!b->unit)
425 continue;
426
d686d8a9 427 if (b->ours)
8c47c732
LP
428 return b->unit;
429 }
430
431 return NULL;
432}
433
8e274523
LP
434CGroupBonding *cgroup_bonding_find_list(CGroupBonding *first, const char *controller) {
435 CGroupBonding *b;
436
437 assert(controller);
438
439 LIST_FOREACH(by_unit, b, first)
440 if (streq(b->controller, controller))
441 return b;
442
443 return NULL;
444}
6dde1f33
LP
445
446char *cgroup_bonding_to_string(CGroupBonding *b) {
447 char *r;
448
449 assert(b);
450
451 if (asprintf(&r, "%s:%s", b->controller, b->path) < 0)
452 return NULL;
453
454 return r;
455}
4fbf50b3
LP
456
457pid_t cgroup_bonding_search_main_pid(CGroupBonding *b) {
458 FILE *f;
2633eb83 459 pid_t pid = 0, npid, mypid;
4fbf50b3
LP
460
461 assert(b);
462
d686d8a9 463 if (!b->ours)
4fbf50b3
LP
464 return 0;
465
bd40a2d8 466 if (cg_enumerate_processes(b->controller, b->path, &f) < 0)
4fbf50b3
LP
467 return 0;
468
2633eb83
LP
469 mypid = getpid();
470
bd40a2d8 471 while (cg_read_pid(f, &npid) > 0) {
2633eb83 472 pid_t ppid;
4fbf50b3
LP
473
474 if (npid == pid)
475 continue;
476
2633eb83
LP
477 /* Ignore processes that aren't our kids */
478 if (get_parent_of_pid(npid, &ppid) >= 0 && ppid != mypid)
479 continue;
480
4fbf50b3 481 if (pid != 0) {
2633eb83
LP
482 /* Dang, there's more than one daemonized PID
483 in this group, so we don't know what process
484 is the main process. */
4fbf50b3
LP
485 pid = 0;
486 break;
487 }
488
489 pid = npid;
490 }
491
492 fclose(f);
493
494 return pid;
495}
496
497pid_t cgroup_bonding_search_main_pid_list(CGroupBonding *first) {
498 CGroupBonding *b;
499 pid_t pid;
500
501 /* Try to find a main pid from this cgroup, but checking if
502 * there's only one PID in the cgroup and returning it. Later
503 * on we might want to add additional, smarter heuristics
504 * here. */
505
506 LIST_FOREACH(by_unit, b, first)
507 if ((pid = cgroup_bonding_search_main_pid(b)) != 0)
508 return pid;
509
510 return 0;
511
512}