]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/basic/cgroup-util.h
man/run0: Describe environment variables set (#32622)
[thirdparty/systemd.git] / src / basic / cgroup-util.h
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
c2f1db8f 2#pragma once
8c6db833 3
35d2e7ec 4#include <dirent.h>
a5edf95e 5#include <fcntl.h>
11c3a366
TA
6#include <stdbool.h>
7#include <stdint.h>
71d35b6b 8#include <stdio.h>
f0bef277 9#include <sys/statfs.h>
71d35b6b 10#include <sys/types.h>
c6c18be3 11
28db6fbf 12#include "constants.h"
12c7d27b 13#include "pidref.h"
93cc7779 14#include "set.h"
8c6db833 15
68ac0d05
LP
16#define SYSTEMD_CGROUP_CONTROLLER_LEGACY "name=systemd"
17#define SYSTEMD_CGROUP_CONTROLLER_HYBRID "name=unified"
18#define SYSTEMD_CGROUP_CONTROLLER "_systemd"
19
efdb0237
LP
20/* An enum of well known cgroup controllers */
21typedef enum CGroupController {
17f14955 22 /* Original cgroup controllers */
efdb0237 23 CGROUP_CONTROLLER_CPU,
00b4a247 24 CGROUP_CONTROLLER_CPUACCT, /* v1 only */
047f5d63 25 CGROUP_CONTROLLER_CPUSET, /* v2 only */
00b4a247
LP
26 CGROUP_CONTROLLER_IO, /* v2 only */
27 CGROUP_CONTROLLER_BLKIO, /* v1 only */
efdb0237 28 CGROUP_CONTROLLER_MEMORY,
00b4a247 29 CGROUP_CONTROLLER_DEVICES, /* v1 only */
03a7b521 30 CGROUP_CONTROLLER_PIDS,
17f14955
RG
31
32 /* BPF-based pseudo-controllers, v2 only */
33 CGROUP_CONTROLLER_BPF_FIREWALL,
084c7007 34 CGROUP_CONTROLLER_BPF_DEVICES,
506ea51b 35 CGROUP_CONTROLLER_BPF_FOREIGN,
a8e5eb17 36 CGROUP_CONTROLLER_BPF_SOCKET_BIND,
6f50d4f7 37 CGROUP_CONTROLLER_BPF_RESTRICT_NETWORK_INTERFACES,
b1994387 38 /* The BPF hook implementing RestrictFileSystems= is not defined here.
bb5232b6 39 * It's applied as late as possible in exec_invoke() so we don't block
b1994387 40 * our own unit setup code. */
17f14955 41
efdb0237 42 _CGROUP_CONTROLLER_MAX,
2d93c20e 43 _CGROUP_CONTROLLER_INVALID = -EINVAL,
efdb0237
LP
44} CGroupController;
45
46f84f95 46#define CGROUP_CONTROLLER_TO_MASK(c) (1U << (c))
efdb0237 47
4ad49000 48/* A bit mask of well known cgroup controllers */
efdb0237
LP
49typedef enum CGroupMask {
50 CGROUP_MASK_CPU = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_CPU),
51 CGROUP_MASK_CPUACCT = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_CPUACCT),
047f5d63 52 CGROUP_MASK_CPUSET = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_CPUSET),
13c31542 53 CGROUP_MASK_IO = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_IO),
efdb0237
LP
54 CGROUP_MASK_BLKIO = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BLKIO),
55 CGROUP_MASK_MEMORY = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_MEMORY),
3905f127 56 CGROUP_MASK_DEVICES = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_DEVICES),
03a7b521 57 CGROUP_MASK_PIDS = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_PIDS),
17f14955 58 CGROUP_MASK_BPF_FIREWALL = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_FIREWALL),
084c7007 59 CGROUP_MASK_BPF_DEVICES = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_DEVICES),
506ea51b 60 CGROUP_MASK_BPF_FOREIGN = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_FOREIGN),
a8e5eb17 61 CGROUP_MASK_BPF_SOCKET_BIND = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_SOCKET_BIND),
6f50d4f7 62 CGROUP_MASK_BPF_RESTRICT_NETWORK_INTERFACES = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_RESTRICT_NETWORK_INTERFACES),
4edd65e4 63
4e1dfa45 64 /* All real cgroup v1 controllers */
4edd65e4
LP
65 CGROUP_MASK_V1 = CGROUP_MASK_CPU|CGROUP_MASK_CPUACCT|CGROUP_MASK_BLKIO|CGROUP_MASK_MEMORY|CGROUP_MASK_DEVICES|CGROUP_MASK_PIDS,
66
4e1dfa45 67 /* All real cgroup v2 controllers */
047f5d63 68 CGROUP_MASK_V2 = CGROUP_MASK_CPU|CGROUP_MASK_CPUSET|CGROUP_MASK_IO|CGROUP_MASK_MEMORY|CGROUP_MASK_PIDS,
4edd65e4 69
d282d55d 70 /* All controllers we want to delegate in case of Delegate=yes. Which are pretty much the v2 controllers only, as delegation on v1 is not safe, and bpf stuff isn't a real controller */
677e6c14
LP
71 CGROUP_MASK_DELEGATE = CGROUP_MASK_V2,
72
4e1dfa45 73 /* All cgroup v2 BPF pseudo-controllers */
6f50d4f7 74 CGROUP_MASK_BPF = CGROUP_MASK_BPF_FIREWALL|CGROUP_MASK_BPF_DEVICES|CGROUP_MASK_BPF_FOREIGN|CGROUP_MASK_BPF_SOCKET_BIND|CGROUP_MASK_BPF_RESTRICT_NETWORK_INTERFACES,
4edd65e4 75
677e6c14 76 _CGROUP_MASK_ALL = CGROUP_CONTROLLER_TO_MASK(_CGROUP_CONTROLLER_MAX) - 1,
efdb0237 77} CGroupMask;
4ad49000 78
c01ef321
LP
79static inline CGroupMask CGROUP_MASK_EXTEND_JOINED(CGroupMask mask) {
80 /* We always mount "cpu" and "cpuacct" in the same hierarchy. Hence, when one bit is set also set the other */
81
82 if (mask & (CGROUP_MASK_CPU|CGROUP_MASK_CPUACCT))
83 mask |= (CGROUP_MASK_CPU|CGROUP_MASK_CPUACCT);
84
85 return mask;
86}
87
f98c2585
CD
88CGroupMask get_cpu_accounting_mask(void);
89bool cpu_accounting_is_cheap(void);
90
13c31542 91/* Special values for all weight knobs on unified hierarchy */
fd4e991d 92#define CGROUP_WEIGHT_INVALID UINT64_MAX
c8340822 93#define CGROUP_WEIGHT_IDLE UINT64_C(0)
13c31542
TH
94#define CGROUP_WEIGHT_MIN UINT64_C(1)
95#define CGROUP_WEIGHT_MAX UINT64_C(10000)
96#define CGROUP_WEIGHT_DEFAULT UINT64_C(100)
97
98#define CGROUP_LIMIT_MIN UINT64_C(0)
fd4e991d 99#define CGROUP_LIMIT_MAX UINT64_MAX
13c31542
TH
100
101static inline bool CGROUP_WEIGHT_IS_OK(uint64_t x) {
102 return
103 x == CGROUP_WEIGHT_INVALID ||
104 (x >= CGROUP_WEIGHT_MIN && x <= CGROUP_WEIGHT_MAX);
105}
106
9be57249
TH
107/* IO limits on unified hierarchy */
108typedef enum CGroupIOLimitType {
109 CGROUP_IO_RBPS_MAX,
110 CGROUP_IO_WBPS_MAX,
ac06a0cf
TH
111 CGROUP_IO_RIOPS_MAX,
112 CGROUP_IO_WIOPS_MAX,
9be57249
TH
113
114 _CGROUP_IO_LIMIT_TYPE_MAX,
2d93c20e 115 _CGROUP_IO_LIMIT_TYPE_INVALID = -EINVAL,
9be57249
TH
116} CGroupIOLimitType;
117
118extern const uint64_t cgroup_io_limit_defaults[_CGROUP_IO_LIMIT_TYPE_MAX];
119
120const char* cgroup_io_limit_type_to_string(CGroupIOLimitType t) _const_;
121CGroupIOLimitType cgroup_io_limit_type_from_string(const char *s) _pure_;
122
d53d9474 123/* Special values for the cpu.shares attribute */
fd4e991d 124#define CGROUP_CPU_SHARES_INVALID UINT64_MAX
d53d9474
LP
125#define CGROUP_CPU_SHARES_MIN UINT64_C(2)
126#define CGROUP_CPU_SHARES_MAX UINT64_C(262144)
127#define CGROUP_CPU_SHARES_DEFAULT UINT64_C(1024)
128
129static inline bool CGROUP_CPU_SHARES_IS_OK(uint64_t x) {
130 return
131 x == CGROUP_CPU_SHARES_INVALID ||
132 (x >= CGROUP_CPU_SHARES_MIN && x <= CGROUP_CPU_SHARES_MAX);
133}
134
d2bd0bfa
MK
135/* Special values for the special {blkio,io}.bfq.weight attribute */
136#define CGROUP_BFQ_WEIGHT_INVALID UINT64_MAX
137#define CGROUP_BFQ_WEIGHT_MIN UINT64_C(1)
138#define CGROUP_BFQ_WEIGHT_MAX UINT64_C(1000)
139#define CGROUP_BFQ_WEIGHT_DEFAULT UINT64_C(100)
140
141/* Convert the normal io.weight value to io.bfq.weight */
142static inline uint64_t BFQ_WEIGHT(uint64_t io_weight) {
143 return
144 io_weight <= CGROUP_WEIGHT_DEFAULT ?
145 CGROUP_BFQ_WEIGHT_DEFAULT - (CGROUP_WEIGHT_DEFAULT - io_weight) * (CGROUP_BFQ_WEIGHT_DEFAULT - CGROUP_BFQ_WEIGHT_MIN) / (CGROUP_WEIGHT_DEFAULT - CGROUP_WEIGHT_MIN) :
146 CGROUP_BFQ_WEIGHT_DEFAULT + (io_weight - CGROUP_WEIGHT_DEFAULT) * (CGROUP_BFQ_WEIGHT_MAX - CGROUP_BFQ_WEIGHT_DEFAULT) / (CGROUP_WEIGHT_MAX - CGROUP_WEIGHT_DEFAULT);
147}
148
d53d9474 149/* Special values for the blkio.weight attribute */
fd4e991d 150#define CGROUP_BLKIO_WEIGHT_INVALID UINT64_MAX
d53d9474
LP
151#define CGROUP_BLKIO_WEIGHT_MIN UINT64_C(10)
152#define CGROUP_BLKIO_WEIGHT_MAX UINT64_C(1000)
153#define CGROUP_BLKIO_WEIGHT_DEFAULT UINT64_C(500)
154
155static inline bool CGROUP_BLKIO_WEIGHT_IS_OK(uint64_t x) {
156 return
157 x == CGROUP_BLKIO_WEIGHT_INVALID ||
158 (x >= CGROUP_BLKIO_WEIGHT_MIN && x <= CGROUP_BLKIO_WEIGHT_MAX);
159}
160
5da38d07
TH
161typedef enum CGroupUnified {
162 CGROUP_UNIFIED_UNKNOWN = -1,
163 CGROUP_UNIFIED_NONE = 0, /* Both systemd and controllers on legacy */
164 CGROUP_UNIFIED_SYSTEMD = 1, /* Only systemd on unified */
165 CGROUP_UNIFIED_ALL = 2, /* Both systemd and controllers on unified */
166} CGroupUnified;
167
5954c074
LP
168/*
169 * General rules:
170 *
171 * We accept named hierarchies in the syntax "foo" and "name=foo".
172 *
173 * We expect that named hierarchies do not conflict in name with a
174 * kernel hierarchy, modulo the "name=" prefix.
175 *
176 * We always generate "normalized" controller names, i.e. without the
177 * "name=" prefix.
178 *
179 * We require absolute cgroup paths. When returning, we will always
180 * generate paths with multiple adjacent / removed.
181 */
182
3b287495
LP
183int cg_path_open(const char *controller, const char *path);
184int cg_cgroupid_open(int fsfd, uint64_t id);
185
aef43552
LP
186int cg_enumerate_processes(const char *controller, const char *path, FILE **ret);
187int cg_read_pid(FILE *f, pid_t *ret);
12c7d27b 188int cg_read_pidref(FILE *f, PidRef *ret);
aef43552 189int cg_read_event(const char *controller, const char *path, const char *event, char **ret);
c6c18be3 190
aef43552
LP
191int cg_enumerate_subgroups(const char *controller, const char *path, DIR **ret);
192int cg_read_subgroup(DIR *d, char **ret);
35d2e7ec 193
1d98fef1 194typedef enum CGroupFlags {
be0b7a1a
LP
195 CGROUP_SIGCONT = 1 << 0,
196 CGROUP_IGNORE_SELF = 1 << 1,
197 CGROUP_REMOVE = 1 << 2,
1d98fef1 198} CGroupFlags;
8c6db833 199
4d1b2df1 200typedef int (*cg_kill_log_func_t)(const PidRef *pid, int sig, void *userdata);
1d98fef1 201
bd1791b5
LP
202int cg_kill(const char *path, int sig, CGroupFlags flags, Set *s, cg_kill_log_func_t kill_log, void *userdata);
203int cg_kill_kernel_sigkill(const char *path);
204int cg_kill_recursive(const char *path, int sig, CGroupFlags flags, Set *s, cg_kill_log_func_t kill_log, void *userdata);
1d98fef1 205
2a8020fe 206int cg_split_spec(const char *spec, char **ret_controller, char **ret_path);
820fe745 207int cg_mangle_path(const char *path, char **ret);
8c6db833 208
820fe745
LP
209int cg_get_path(const char *controller, const char *path, const char *suffix, char **ret);
210int cg_get_path_and_check(const char *controller, const char *path, const char *suffix, char **ret);
7027ff61 211
820fe745 212int cg_pid_get_path(const char *controller, pid_t pid, char **ret);
f2a2e60b 213int cg_pidref_get_path(const char *controller, const PidRef *pidref, char **ret);
8c6db833 214
4ad49000 215int cg_rmdir(const char *controller, const char *path);
8c6db833 216
bd1791b5 217int cg_is_threaded(const char *path);
084e7706 218
b426b4ee 219int cg_is_delegated(const char *path);
6414203c 220int cg_is_delegated_fd(int fd);
b426b4ee 221
6cf96ab4
NR
222int cg_has_coredump_receive(const char *path);
223
07e8c305 224typedef enum {
25a1f04c
MS
225 CG_KEY_MODE_GRACEFUL = 1 << 0,
226} CGroupKeyMode;
227
4ad49000 228int cg_set_attribute(const char *controller, const char *path, const char *attribute, const char *value);
934277fe 229int cg_get_attribute(const char *controller, const char *path, const char *attribute, char **ret);
25a1f04c
MS
230int cg_get_keyed_attribute_full(const char *controller, const char *path, const char *attribute, char **keys, char **values, CGroupKeyMode mode);
231
232static inline int cg_get_keyed_attribute(
233 const char *controller,
234 const char *path,
235 const char *attribute,
236 char **keys,
237 char **ret_values) {
238 return cg_get_keyed_attribute_full(controller, path, attribute, keys, ret_values, 0);
239}
240
241static inline int cg_get_keyed_attribute_graceful(
242 const char *controller,
243 const char *path,
244 const char *attribute,
245 char **keys,
246 char **ret_values) {
247 return cg_get_keyed_attribute_full(controller, path, attribute, keys, ret_values, CG_KEY_MODE_GRACEFUL);
248}
4ad49000 249
613328c3
AZ
250int cg_get_attribute_as_uint64(const char *controller, const char *path, const char *attribute, uint64_t *ret);
251
b41dcc51
AZ
252/* Does a parse_boolean() on the attribute contents and sets ret accordingly */
253int cg_get_attribute_as_bool(const char *controller, const char *path, const char *attribute, bool *ret);
254
bd1791b5 255int cg_get_owner(const char *path, uid_t *ret_uid);
8c6db833 256
bd1791b5
LP
257int cg_set_xattr(const char *path, const char *name, const void *value, size_t size, int flags);
258int cg_get_xattr(const char *path, const char *name, void *value, size_t size);
259int cg_get_xattr_malloc(const char *path, const char *name, char **ret);
59331b8e 260/* Returns negative on error, and 0 or 1 on success for the bool value */
bd1791b5
LP
261int cg_get_xattr_bool(const char *path, const char *name);
262int cg_remove_xattr(const char *path, const char *name);
4b58153d 263
8c6db833 264int cg_install_release_agent(const char *controller, const char *agent);
ad929bcc 265int cg_uninstall_release_agent(const char *controller);
8c6db833 266
6f883237
LP
267int cg_is_empty(const char *controller, const char *path);
268int cg_is_empty_recursive(const char *controller, const char *path);
8c6db833 269
7027ff61 270int cg_get_root_path(char **path);
6c03089c 271
535e3dd0 272int cg_path_get_cgroupid(const char *path, uint64_t *ret);
3b287495 273int cg_fd_get_cgroupid(int fd, uint64_t *ret);
820fe745
LP
274int cg_path_get_session(const char *path, char **ret_session);
275int cg_path_get_owner_uid(const char *path, uid_t *ret_uid);
276int cg_path_get_unit(const char *path, char **ret_unit);
277int cg_path_get_unit_path(const char *path, char **ret_unit);
278int cg_path_get_user_unit(const char *path, char **ret_unit);
279int cg_path_get_machine_name(const char *path, char **ret_machine);
280int cg_path_get_slice(const char *path, char **ret_slice);
281int cg_path_get_user_slice(const char *path, char **ret_slice);
282
283int cg_shift_path(const char *cgroup, const char *cached_root, const char **ret_shifted);
284int cg_pid_get_path_shifted(pid_t pid, const char *cached_root, char **ret_cgroup);
285
286int cg_pid_get_session(pid_t pid, char **ret_session);
287int cg_pid_get_owner_uid(pid_t pid, uid_t *ret_uid);
288int cg_pid_get_unit(pid_t pid, char **ret_unit);
2c302e89 289int cg_pidref_get_unit(const PidRef *pidref, char **ret);
820fe745
LP
290int cg_pid_get_user_unit(pid_t pid, char **ret_unit);
291int cg_pid_get_machine_name(pid_t pid, char **ret_machine);
292int cg_pid_get_slice(pid_t pid, char **ret_slice);
293int cg_pid_get_user_slice(pid_t pid, char **ret_slice);
294
295int cg_path_decode_unit(const char *cgroup, char **ret_unit);
96cde13a 296
1a56b0c0
LP
297bool cg_needs_escape(const char *p);
298int cg_escape(const char *p, char **ret);
44a6b1b6 299char *cg_unescape(const char *p) _pure_;
78edb35a 300
185a0874 301bool cg_controller_is_valid(const char *p);
a016b922
LP
302
303int cg_slice_to_path(const char *unit, char **ret);
4ad49000 304
efdb0237 305typedef const char* (*cg_migrate_callback_t)(CGroupMask mask, void *userdata);
03b90d4b 306
efdb0237 307int cg_mask_supported(CGroupMask *ret);
0fa7b500 308int cg_mask_supported_subtree(const char *root, CGroupMask *ret);
aae7e17f
FB
309int cg_mask_from_string(const char *s, CGroupMask *ret);
310int cg_mask_to_string(CGroupMask mask, char **ret);
b12afc8c 311
6925a0de 312int cg_kernel_controllers(Set **controllers);
efdb0237 313
3228995c 314bool cg_ns_supported(void);
d9e45bc3 315bool cg_freezer_supported(void);
8a513eee 316bool cg_kill_supported(void);
3228995c 317
b4cccbc1
LP
318int cg_all_unified(void);
319int cg_hybrid_unified(void);
c22800e4 320int cg_unified_controller(const char *controller);
d4d99bc6
ZJS
321int cg_unified_cached(bool flush);
322static inline int cg_unified(void) {
323 return cg_unified_cached(true);
324}
efdb0237
LP
325
326const char* cgroup_controller_to_string(CGroupController c) _const_;
327CGroupController cgroup_controller_from_string(const char *s) _pure_;
d53d9474 328
f0bef277
EV
329bool is_cgroup_fs(const struct statfs *s);
330bool fd_is_cgroup_fs(int fd);
4d824a4e
AZ
331
332typedef enum ManagedOOMMode {
333 MANAGED_OOM_AUTO,
334 MANAGED_OOM_KILL,
335 _MANAGED_OOM_MODE_MAX,
2d93c20e 336 _MANAGED_OOM_MODE_INVALID = -EINVAL,
4d824a4e
AZ
337} ManagedOOMMode;
338
339const char* managed_oom_mode_to_string(ManagedOOMMode m) _const_;
340ManagedOOMMode managed_oom_mode_from_string(const char *s) _pure_;
242d75bd
AZ
341
342typedef enum ManagedOOMPreference {
343 MANAGED_OOM_PREFERENCE_NONE = 0,
344 MANAGED_OOM_PREFERENCE_AVOID = 1,
345 MANAGED_OOM_PREFERENCE_OMIT = 2,
346 _MANAGED_OOM_PREFERENCE_MAX,
925484aa 347 _MANAGED_OOM_PREFERENCE_INVALID = -EINVAL,
242d75bd
AZ
348} ManagedOOMPreference;
349
350const char* managed_oom_preference_to_string(ManagedOOMPreference a) _const_;
351ManagedOOMPreference managed_oom_preference_from_string(const char *s) _pure_;
a5edf95e
LP
352
353/* The structure to pass to name_to_handle_at() on cgroupfs2 */
354typedef union {
355 struct file_handle file_handle;
356 uint8_t space[offsetof(struct file_handle, f_handle) + sizeof(uint64_t)];
357} cg_file_handle;
358
3b287495
LP
359#define CG_FILE_HANDLE_INIT \
360 (cg_file_handle) { \
361 .file_handle.handle_bytes = sizeof(uint64_t), \
362 .file_handle.handle_type = FILEID_KERNFS, \
363 }
364
a5edf95e 365#define CG_FILE_HANDLE_CGROUPID(fh) (*(uint64_t*) (fh).file_handle.f_handle)