]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/cgroup.c
pam: duplicate cgroup tree in the cpu hierarchy by default, optionally more
[thirdparty/systemd.git] / src / cgroup.c
CommitLineData
d6c9574f 1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
8e274523
LP
2
3/***
4 This file is part of systemd.
5
6 Copyright 2010 Lennart Poettering
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU General Public License as published by
10 the Free Software Foundation; either version 2 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 General Public License for more details.
17
18 You should have received a copy of the GNU General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
22#include <errno.h>
23#include <assert.h>
24#include <unistd.h>
25#include <sys/types.h>
26#include <signal.h>
27#include <sys/mount.h>
c6c18be3 28#include <fcntl.h>
8c6db833 29
8e274523 30#include "cgroup.h"
8c6db833 31#include "cgroup-util.h"
8e274523
LP
32#include "log.h"
33
8e274523
LP
34int cgroup_bonding_realize(CGroupBonding *b) {
35 int r;
36
37 assert(b);
38 assert(b->path);
39 assert(b->controller);
40
8c6db833 41 if (b->realized)
8e274523
LP
42 return 0;
43
8c6db833
LP
44 if ((r = cg_create(b->controller, b->path)) < 0)
45 return r;
8e274523 46
8c6db833 47 b->realized = true;
8e274523 48
8c6db833
LP
49 if (b->only_us && b->clean_up)
50 cg_trim(b->controller, b->path, false);
8e274523
LP
51
52 return 0;
8e274523
LP
53}
54
55int cgroup_bonding_realize_list(CGroupBonding *first) {
56 CGroupBonding *b;
8c6db833 57 int r;
8e274523 58
8c6db833 59 LIST_FOREACH(by_unit, b, first)
8e274523
LP
60 if ((r = cgroup_bonding_realize(b)) < 0)
61 return r;
8e274523
LP
62
63 return 0;
64}
65
66void cgroup_bonding_free(CGroupBonding *b) {
67 assert(b);
68
69 if (b->unit) {
70 CGroupBonding *f;
71
72 LIST_REMOVE(CGroupBonding, by_unit, b->unit->meta.cgroup_bondings, b);
73
74 assert_se(f = hashmap_get(b->unit->meta.manager->cgroup_bondings, b->path));
75 LIST_REMOVE(CGroupBonding, by_path, f, b);
76
77 if (f)
78 hashmap_replace(b->unit->meta.manager->cgroup_bondings, b->path, f);
79 else
80 hashmap_remove(b->unit->meta.manager->cgroup_bondings, b->path);
81 }
82
8c6db833 83 if (b->realized && b->only_us && b->clean_up) {
8e274523 84
8c6db833
LP
85 if (cgroup_bonding_is_empty(b) > 0)
86 cg_delete(b->controller, b->path);
87 else
88 cg_trim(b->controller, b->path, false);
8e274523
LP
89 }
90
c9106f61
LP
91 free(b->controller);
92 free(b->path);
8e274523
LP
93 free(b);
94}
95
96void cgroup_bonding_free_list(CGroupBonding *first) {
97 CGroupBonding *b, *n;
98
99 LIST_FOREACH_SAFE(by_unit, b, n, first)
100 cgroup_bonding_free(b);
101}
102
fb385181
LP
103void cgroup_bonding_trim(CGroupBonding *b, bool delete_root) {
104 assert(b);
105
106 if (b->realized && b->only_us && b->clean_up)
107 cg_trim(b->controller, b->path, delete_root);
108}
109
110void cgroup_bonding_trim_list(CGroupBonding *first, bool delete_root) {
111 CGroupBonding *b;
112
113 LIST_FOREACH(by_unit, b, first)
114 cgroup_bonding_trim(b, delete_root);
115}
116
8e274523
LP
117int cgroup_bonding_install(CGroupBonding *b, pid_t pid) {
118 int r;
119
120 assert(b);
121 assert(pid >= 0);
122
8c6db833
LP
123 if ((r = cg_create_and_attach(b->controller, b->path, pid)) < 0)
124 return r;
8e274523 125
8c6db833 126 b->realized = true;
8e274523
LP
127 return 0;
128}
129
130int cgroup_bonding_install_list(CGroupBonding *first, pid_t pid) {
131 CGroupBonding *b;
8c6db833 132 int r;
8e274523 133
8c6db833 134 LIST_FOREACH(by_unit, b, first)
8e274523
LP
135 if ((r = cgroup_bonding_install(b, pid)) < 0)
136 return r;
8e274523
LP
137
138 return 0;
139}
140
ca949c9d 141int cgroup_bonding_kill(CGroupBonding *b, int sig, Set *s) {
8e274523 142 int r;
8e274523
LP
143
144 assert(b);
8c6db833 145 assert(sig >= 0);
8e274523 146
8c6db833 147 if ((r = cgroup_bonding_realize(b)) < 0)
50159e6a
LP
148 return r;
149
8c6db833
LP
150 assert(b->realized);
151
ca949c9d 152 return cg_kill_recursive(b->controller, b->path, sig, true, false, s);
8e274523
LP
153}
154
ca949c9d 155int cgroup_bonding_kill_list(CGroupBonding *first, int sig, Set *s) {
8e274523 156 CGroupBonding *b;
ca949c9d
LP
157 Set *allocated_set = NULL;
158 int ret = -EAGAIN, r;
159
160 if (!s)
161 if (!(s = allocated_set = set_new(trivial_hash_func, trivial_compare_func)))
162 return -ENOMEM;
8e274523
LP
163
164 LIST_FOREACH(by_unit, b, first) {
ca949c9d 165 if ((r = cgroup_bonding_kill(b, sig, s)) < 0) {
8c6db833 166 if (r == -EAGAIN || r == -ESRCH)
50159e6a 167 continue;
8e274523 168
ca949c9d
LP
169 ret = r;
170 goto finish;
50159e6a
LP
171 }
172
ca949c9d
LP
173 if (ret < 0 || r > 0)
174 ret = r;
8e274523
LP
175 }
176
ca949c9d
LP
177finish:
178 if (allocated_set)
179 set_free(allocated_set);
180
181 return ret;
8e274523
LP
182}
183
184/* Returns 1 if the group is empty, 0 if it is not, -EAGAIN if we
185 * cannot know */
186int cgroup_bonding_is_empty(CGroupBonding *b) {
8e274523
LP
187 int r;
188
189 assert(b);
190
8c6db833
LP
191 if ((r = cg_is_empty_recursive(b->controller, b->path, true)) < 0)
192 return r;
8e274523 193
8c6db833
LP
194 /* If it is empty it is empty */
195 if (r > 0)
8e274523
LP
196 return 1;
197
8c6db833
LP
198 /* It's not only us using this cgroup, so we just don't know */
199 return b->only_us ? 0 : -EAGAIN;
8e274523
LP
200}
201
202int cgroup_bonding_is_empty_list(CGroupBonding *first) {
203 CGroupBonding *b;
204
205 LIST_FOREACH(by_unit, b, first) {
206 int r;
207
208 if ((r = cgroup_bonding_is_empty(b)) < 0) {
209 /* If this returned -EAGAIN, then we don't know if the
210 * group is empty, so let's see if another group can
211 * tell us */
212
213 if (r != -EAGAIN)
214 return r;
215 } else
216 return r;
217 }
218
219 return -EAGAIN;
220}
221
8e274523 222int manager_setup_cgroup(Manager *m) {
c6c18be3 223 char *current = NULL, *path = NULL;
8e274523 224 int r;
7ccfb64a 225 char suffix[32];
8e274523
LP
226
227 assert(m);
228
35d2e7ec 229 /* 1. Determine hierarchy */
c6c18be3
LP
230 if ((r = cg_get_by_pid(SYSTEMD_CGROUP_CONTROLLER, 0, &current)) < 0)
231 goto finish;
8e274523 232
0baf24dd
LP
233 if (m->running_as == MANAGER_SYSTEM)
234 strcpy(suffix, "/system");
235 else {
236 snprintf(suffix, sizeof(suffix), "/systemd-%lu", (unsigned long) getpid());
237 char_array_0(suffix);
238 }
7ccfb64a 239
8e274523 240 free(m->cgroup_hierarchy);
c6c18be3 241 if (endswith(current, suffix)) {
7ccfb64a 242 /* We probably got reexecuted and can continue to use our root cgroup */
c6c18be3
LP
243 m->cgroup_hierarchy = current;
244 current = NULL;
7ccfb64a 245
c6c18be3
LP
246 } else {
247 /* We need a new root cgroup */
7ccfb64a 248 m->cgroup_hierarchy = NULL;
e364ad06 249 if (asprintf(&m->cgroup_hierarchy, "%s%s", streq(current, "/") ? "" : current, suffix) < 0) {
c6c18be3
LP
250 r = -ENOMEM;
251 goto finish;
252 }
8e274523
LP
253 }
254
35d2e7ec 255 /* 2. Show data */
c6c18be3
LP
256 if ((r = cg_get_path(SYSTEMD_CGROUP_CONTROLLER, m->cgroup_hierarchy, NULL, &path)) < 0)
257 goto finish;
8e274523 258
c6c18be3
LP
259 log_debug("Using cgroup controller " SYSTEMD_CGROUP_CONTROLLER ". File system hierarchy is at %s.", path);
260
35d2e7ec 261 /* 3. Install agent */
91901329 262 if ((r = cg_install_release_agent(SYSTEMD_CGROUP_CONTROLLER, SYSTEMD_CGROUP_AGENT_PATH)) < 0)
8e274523 263 log_warning("Failed to install release agent, ignoring: %s", strerror(-r));
c6c18be3
LP
264 else if (r > 0)
265 log_debug("Installed release agent.");
8e274523 266 else
c6c18be3 267 log_debug("Release agent already installed.");
8e274523 268
35d2e7ec 269 /* 4. Realize the group */
c6c18be3 270 if ((r = cg_create_and_attach(SYSTEMD_CGROUP_CONTROLLER, m->cgroup_hierarchy, 0)) < 0) {
8e274523 271 log_error("Failed to create root cgroup hierarchy: %s", strerror(-r));
c6c18be3
LP
272 goto finish;
273 }
274
35d2e7ec 275 /* 5. And pin it, so that it cannot be unmounted */
c6c18be3
LP
276 if (m->pin_cgroupfs_fd >= 0)
277 close_nointr_nofail(m->pin_cgroupfs_fd);
278
279 if ((m->pin_cgroupfs_fd = open(path, O_RDONLY|O_CLOEXEC|O_DIRECTORY|O_NOCTTY|O_NONBLOCK)) < 0) {
280 r = -errno;
281 goto finish;
282 }
283
284 log_debug("Created root group.");
285
286finish:
287 free(current);
288 free(path);
8e274523
LP
289
290 return r;
291}
292
c6c18be3 293void manager_shutdown_cgroup(Manager *m, bool delete) {
8e274523
LP
294 assert(m);
295
c6c18be3
LP
296 if (delete && m->cgroup_hierarchy)
297 cg_delete(SYSTEMD_CGROUP_CONTROLLER, m->cgroup_hierarchy);
8e274523 298
c6c18be3
LP
299 if (m->pin_cgroupfs_fd >= 0) {
300 close_nointr_nofail(m->pin_cgroupfs_fd);
301 m->pin_cgroupfs_fd = -1;
302 }
303
304 free(m->cgroup_hierarchy);
305 m->cgroup_hierarchy = NULL;
8e274523
LP
306}
307
308int cgroup_notify_empty(Manager *m, const char *group) {
309 CGroupBonding *l, *b;
310
311 assert(m);
312 assert(group);
313
314 if (!(l = hashmap_get(m->cgroup_bondings, group)))
315 return 0;
316
317 LIST_FOREACH(by_path, b, l) {
318 int t;
319
320 if (!b->unit)
321 continue;
322
323 if ((t = cgroup_bonding_is_empty_list(b)) < 0) {
324
325 /* If we don't know, we don't know */
326 if (t != -EAGAIN)
327 log_warning("Failed to check whether cgroup is empty: %s", strerror(errno));
328
329 continue;
330 }
331
332 if (t > 0)
333 if (UNIT_VTABLE(b->unit)->cgroup_notify_empty)
334 UNIT_VTABLE(b->unit)->cgroup_notify_empty(b->unit);
335 }
336
337 return 0;
338}
339
8c47c732
LP
340Unit* cgroup_unit_by_pid(Manager *m, pid_t pid) {
341 CGroupBonding *l, *b;
342 char *group = NULL;
8c47c732
LP
343
344 assert(m);
345
346 if (pid <= 1)
347 return NULL;
348
e364ad06 349 if (cg_get_by_pid(SYSTEMD_CGROUP_CONTROLLER, pid, &group) < 0)
8c47c732
LP
350 return NULL;
351
352 l = hashmap_get(m->cgroup_bondings, group);
4455bcd0
LP
353
354 if (!l) {
355 char *slash;
356
357 while ((slash = strrchr(group, '/'))) {
358 if (slash == group)
359 break;
360
361 *slash = 0;
362
363 if ((l = hashmap_get(m->cgroup_bondings, group)))
364 break;
365 }
366 }
367
8c47c732
LP
368 free(group);
369
8c47c732
LP
370 LIST_FOREACH(by_path, b, l) {
371
372 if (!b->unit)
373 continue;
374
375 if (b->only_us)
376 return b->unit;
377 }
378
379 return NULL;
380}
381
8e274523
LP
382CGroupBonding *cgroup_bonding_find_list(CGroupBonding *first, const char *controller) {
383 CGroupBonding *b;
384
385 assert(controller);
386
387 LIST_FOREACH(by_unit, b, first)
388 if (streq(b->controller, controller))
389 return b;
390
391 return NULL;
392}
6dde1f33
LP
393
394char *cgroup_bonding_to_string(CGroupBonding *b) {
395 char *r;
396
397 assert(b);
398
399 if (asprintf(&r, "%s:%s", b->controller, b->path) < 0)
400 return NULL;
401
402 return r;
403}
4fbf50b3
LP
404
405pid_t cgroup_bonding_search_main_pid(CGroupBonding *b) {
406 FILE *f;
407 pid_t pid = 0, npid;
408 int r;
409
410 assert(b);
411
412 if (!b->only_us)
413 return 0;
414
415 if ((r = cg_enumerate_processes(b->controller, b->path, &f)) < 0)
416 return 0;
417
418 while ((r = cg_read_pid(f, &npid)) > 0) {
419
420 if (npid == pid)
421 continue;
422
423 if (pid != 0) {
424 /* Dang, there's more than one PID in this
425 * group, so we don't know what process is the
426 * main process. */
427 pid = 0;
428 break;
429 }
430
431 pid = npid;
432 }
433
434 fclose(f);
435
436 return pid;
437}
438
439pid_t cgroup_bonding_search_main_pid_list(CGroupBonding *first) {
440 CGroupBonding *b;
441 pid_t pid;
442
443 /* Try to find a main pid from this cgroup, but checking if
444 * there's only one PID in the cgroup and returning it. Later
445 * on we might want to add additional, smarter heuristics
446 * here. */
447
448 LIST_FOREACH(by_unit, b, first)
449 if ((pid = cgroup_bonding_search_main_pid(b)) != 0)
450 return pid;
451
452 return 0;
453
454}