]> git.ipfire.org Git - thirdparty/systemd.git/commit - src/core/execute.h
core: introduce new Delegate=yes/no property controlling creation of cgroup subhierar...
authorLennart Poettering <lennart@poettering.net>
Wed, 5 Nov 2014 16:57:23 +0000 (17:57 +0100)
committerLennart Poettering <lennart@poettering.net>
Wed, 5 Nov 2014 17:49:14 +0000 (18:49 +0100)
commita931ad47a8623163a29d898224d8a8c1177ffdaf
tree34741242cc98bf038f3b57058e4b283b0d53b275
parentc962cb68d5754690cbe924a0d0b4251053217783
core: introduce new Delegate=yes/no property controlling creation of cgroup subhierarchies

For priviliged units this resource control property ensures that the
processes have all controllers systemd manages enabled.

For unpriviliged services (those with User= set) this ensures that
access rights to the service cgroup is granted to the user in question,
to create further subgroups. Note that this only applies to the
name=systemd hierarchy though, as access to other controllers is not
safe for unpriviliged processes.

Delegate=yes should be set for container scopes where a systemd instance
inside the container shall manage the hierarchies below its own cgroup
and have access to all controllers.

Delegate=yes should also be set for user@.service, so that systemd
--user can run, controlling its own cgroup tree.

This commit changes machined, systemd-nspawn@.service and user@.service
to set this boolean, in order to ensure that container management will
just work, and the user systemd instance can run fine.
15 files changed:
man/systemd.resource-control.xml
src/core/cgroup.c
src/core/cgroup.h
src/core/dbus-cgroup.c
src/core/execute.c
src/core/execute.h
src/core/load-fragment-gperf.gperf.m4
src/core/mount.c
src/core/service.c
src/core/socket.c
src/core/swap.c
src/machine/machined-dbus.c
src/shared/cgroup-util.h
units/systemd-nspawn@.service.in
units/user@.service.in