2017-11-18 17:09:20 +01:00
|
|
|
/* SPDX-License-Identifier: LGPL-2.1+ */
|
2013-06-27 04:14:27 +02:00
|
|
|
/***
|
|
|
|
This file is part of systemd.
|
|
|
|
|
|
|
|
Copyright 2013 Lennart Poettering
|
|
|
|
|
|
|
|
systemd is free software; you can redistribute it and/or modify it
|
|
|
|
under the terms of the GNU Lesser General Public License as published by
|
|
|
|
the Free Software Foundation; either version 2.1 of the License, or
|
|
|
|
(at your option) any later version.
|
|
|
|
|
|
|
|
systemd is distributed in the hope that it will be useful, but
|
|
|
|
WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
Lesser General Public License for more details.
|
|
|
|
|
|
|
|
You should have received a copy of the GNU Lesser General Public License
|
|
|
|
along with systemd; If not, see <http://www.gnu.org/licenses/>.
|
|
|
|
***/
|
|
|
|
|
2017-09-05 11:16:35 +02:00
|
|
|
#include <arpa/inet.h>
|
|
|
|
|
|
|
|
#include "af-list.h"
|
2015-10-27 03:01:06 +01:00
|
|
|
#include "alloc-util.h"
|
2017-09-06 17:56:15 +02:00
|
|
|
#include "bpf-firewall.h"
|
2013-11-19 21:12:59 +01:00
|
|
|
#include "bus-util.h"
|
|
|
|
#include "cgroup-util.h"
|
|
|
|
#include "cgroup.h"
|
2013-06-27 04:14:27 +02:00
|
|
|
#include "dbus-cgroup.h"
|
2015-10-25 13:14:12 +01:00
|
|
|
#include "fd-util.h"
|
2015-10-26 18:05:03 +01:00
|
|
|
#include "fileio.h"
|
2015-10-25 13:14:12 +01:00
|
|
|
#include "path-util.h"
|
2013-06-27 04:14:27 +02:00
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
static BUS_DEFINE_PROPERTY_GET_ENUM(property_get_cgroup_device_policy, cgroup_device_policy, CGroupDevicePolicy);
|
|
|
|
|
2017-11-09 15:29:34 +01:00
|
|
|
static int property_get_delegate_controllers(
|
|
|
|
sd_bus *bus,
|
|
|
|
const char *path,
|
|
|
|
const char *interface,
|
|
|
|
const char *property,
|
|
|
|
sd_bus_message *reply,
|
|
|
|
void *userdata,
|
|
|
|
sd_bus_error *error) {
|
|
|
|
|
|
|
|
CGroupContext *c = userdata;
|
|
|
|
CGroupController cc;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(bus);
|
|
|
|
assert(reply);
|
|
|
|
assert(c);
|
|
|
|
|
|
|
|
if (!c->delegate)
|
|
|
|
return sd_bus_message_append(reply, "as", 0);
|
|
|
|
|
|
|
|
r = sd_bus_message_open_container(reply, 'a', "s");
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
for (cc = 0; cc < _CGROUP_CONTROLLER_MAX; cc++) {
|
|
|
|
if ((c->delegate_controllers & CGROUP_CONTROLLER_TO_MASK(cc)) == 0)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
r = sd_bus_message_append(reply, "s", cgroup_controller_to_string(cc));
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
return sd_bus_message_close_container(reply);
|
|
|
|
}
|
|
|
|
|
2016-05-05 22:42:55 +02:00
|
|
|
static int property_get_io_device_weight(
|
|
|
|
sd_bus *bus,
|
|
|
|
const char *path,
|
|
|
|
const char *interface,
|
|
|
|
const char *property,
|
|
|
|
sd_bus_message *reply,
|
|
|
|
void *userdata,
|
|
|
|
sd_bus_error *error) {
|
|
|
|
|
|
|
|
CGroupContext *c = userdata;
|
|
|
|
CGroupIODeviceWeight *w;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(bus);
|
|
|
|
assert(reply);
|
|
|
|
assert(c);
|
|
|
|
|
|
|
|
r = sd_bus_message_open_container(reply, 'a', "(st)");
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
LIST_FOREACH(device_weights, w, c->io_device_weights) {
|
|
|
|
r = sd_bus_message_append(reply, "(st)", w->path, w->weight);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
return sd_bus_message_close_container(reply);
|
|
|
|
}
|
|
|
|
|
|
|
|
static int property_get_io_device_limits(
|
|
|
|
sd_bus *bus,
|
|
|
|
const char *path,
|
|
|
|
const char *interface,
|
|
|
|
const char *property,
|
|
|
|
sd_bus_message *reply,
|
|
|
|
void *userdata,
|
|
|
|
sd_bus_error *error) {
|
|
|
|
|
|
|
|
CGroupContext *c = userdata;
|
|
|
|
CGroupIODeviceLimit *l;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(bus);
|
|
|
|
assert(reply);
|
|
|
|
assert(c);
|
|
|
|
|
|
|
|
r = sd_bus_message_open_container(reply, 'a', "(st)");
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
LIST_FOREACH(device_limits, l, c->io_device_limits) {
|
2016-05-18 22:50:56 +02:00
|
|
|
CGroupIOLimitType type;
|
2016-05-05 22:42:55 +02:00
|
|
|
|
2016-05-18 22:50:56 +02:00
|
|
|
type = cgroup_io_limit_type_from_string(property);
|
|
|
|
if (type < 0 || l->limits[type] == cgroup_io_limit_defaults[type])
|
2016-05-05 22:42:55 +02:00
|
|
|
continue;
|
|
|
|
|
2016-05-18 22:50:56 +02:00
|
|
|
r = sd_bus_message_append(reply, "(st)", l->path, l->limits[type]);
|
2016-05-05 22:42:55 +02:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
return sd_bus_message_close_container(reply);
|
|
|
|
}
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
static int property_get_blockio_device_weight(
|
|
|
|
sd_bus *bus,
|
|
|
|
const char *path,
|
|
|
|
const char *interface,
|
|
|
|
const char *property,
|
|
|
|
sd_bus_message *reply,
|
2013-11-21 19:34:37 +01:00
|
|
|
void *userdata,
|
|
|
|
sd_bus_error *error) {
|
2013-06-27 04:14:27 +02:00
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
CGroupContext *c = userdata;
|
2013-06-27 04:14:27 +02:00
|
|
|
CGroupBlockIODeviceWeight *w;
|
2013-11-19 21:12:59 +01:00
|
|
|
int r;
|
2013-06-27 04:14:27 +02:00
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
assert(bus);
|
|
|
|
assert(reply);
|
2013-06-27 04:14:27 +02:00
|
|
|
assert(c);
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
r = sd_bus_message_open_container(reply, 'a', "(st)");
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-06-27 04:14:27 +02:00
|
|
|
|
|
|
|
LIST_FOREACH(device_weights, w, c->blockio_device_weights) {
|
2013-11-19 21:12:59 +01:00
|
|
|
r = sd_bus_message_append(reply, "(st)", w->path, w->weight);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-06-27 04:14:27 +02:00
|
|
|
}
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
return sd_bus_message_close_container(reply);
|
2013-06-27 04:14:27 +02:00
|
|
|
}
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
static int property_get_blockio_device_bandwidths(
|
|
|
|
sd_bus *bus,
|
|
|
|
const char *path,
|
|
|
|
const char *interface,
|
|
|
|
const char *property,
|
|
|
|
sd_bus_message *reply,
|
2013-11-21 19:34:37 +01:00
|
|
|
void *userdata,
|
|
|
|
sd_bus_error *error) {
|
2013-11-19 21:12:59 +01:00
|
|
|
|
|
|
|
CGroupContext *c = userdata;
|
2013-06-27 04:14:27 +02:00
|
|
|
CGroupBlockIODeviceBandwidth *b;
|
2013-11-19 21:12:59 +01:00
|
|
|
int r;
|
2013-06-27 04:14:27 +02:00
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
assert(bus);
|
|
|
|
assert(reply);
|
2013-06-27 04:14:27 +02:00
|
|
|
assert(c);
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
r = sd_bus_message_open_container(reply, 'a', "(st)");
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-06-27 04:14:27 +02:00
|
|
|
|
|
|
|
LIST_FOREACH(device_bandwidths, b, c->blockio_device_bandwidths) {
|
2016-05-18 22:51:46 +02:00
|
|
|
uint64_t v;
|
2013-06-27 04:14:27 +02:00
|
|
|
|
2016-05-18 22:51:46 +02:00
|
|
|
if (streq(property, "BlockIOReadBandwidth"))
|
|
|
|
v = b->rbps;
|
|
|
|
else
|
|
|
|
v = b->wbps;
|
|
|
|
|
|
|
|
if (v == CGROUP_LIMIT_MAX)
|
2013-06-27 04:14:27 +02:00
|
|
|
continue;
|
|
|
|
|
2016-05-18 22:51:46 +02:00
|
|
|
r = sd_bus_message_append(reply, "(st)", b->path, v);
|
2013-11-19 21:12:59 +01:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-06-27 04:14:27 +02:00
|
|
|
}
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
return sd_bus_message_close_container(reply);
|
2013-06-27 04:14:27 +02:00
|
|
|
}
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
static int property_get_device_allow(
|
|
|
|
sd_bus *bus,
|
|
|
|
const char *path,
|
|
|
|
const char *interface,
|
|
|
|
const char *property,
|
|
|
|
sd_bus_message *reply,
|
2013-11-21 19:34:37 +01:00
|
|
|
void *userdata,
|
|
|
|
sd_bus_error *error) {
|
2013-11-19 21:12:59 +01:00
|
|
|
|
|
|
|
CGroupContext *c = userdata;
|
2013-06-27 04:14:27 +02:00
|
|
|
CGroupDeviceAllow *a;
|
2013-11-19 21:12:59 +01:00
|
|
|
int r;
|
2013-06-27 04:14:27 +02:00
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
assert(bus);
|
|
|
|
assert(reply);
|
2013-06-27 04:14:27 +02:00
|
|
|
assert(c);
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
r = sd_bus_message_open_container(reply, 'a', "(ss)");
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-06-27 04:14:27 +02:00
|
|
|
|
|
|
|
LIST_FOREACH(device_allow, a, c->device_allow) {
|
|
|
|
unsigned k = 0;
|
2013-11-19 21:12:59 +01:00
|
|
|
char rwm[4];
|
2013-06-27 04:14:27 +02:00
|
|
|
|
|
|
|
if (a->r)
|
2013-11-19 21:12:59 +01:00
|
|
|
rwm[k++] = 'r';
|
2013-06-27 04:14:27 +02:00
|
|
|
if (a->w)
|
2013-11-19 21:12:59 +01:00
|
|
|
rwm[k++] = 'w';
|
2013-06-27 04:14:27 +02:00
|
|
|
if (a->m)
|
2013-11-19 21:12:59 +01:00
|
|
|
rwm[k++] = 'm';
|
2013-06-27 04:14:27 +02:00
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
rwm[k] = 0;
|
2013-06-27 04:14:27 +02:00
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
r = sd_bus_message_append(reply, "(ss)", a->path, rwm);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-06-27 04:14:27 +02:00
|
|
|
}
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
return sd_bus_message_close_container(reply);
|
2013-06-27 04:14:27 +02:00
|
|
|
}
|
|
|
|
|
2017-09-05 11:16:35 +02:00
|
|
|
static int property_get_ip_address_access(
|
|
|
|
sd_bus *bus,
|
|
|
|
const char *path,
|
|
|
|
const char *interface,
|
|
|
|
const char *property,
|
|
|
|
sd_bus_message *reply,
|
|
|
|
void *userdata,
|
|
|
|
sd_bus_error *error) {
|
|
|
|
|
|
|
|
IPAddressAccessItem** items = userdata, *i;
|
|
|
|
int r;
|
|
|
|
|
|
|
|
r = sd_bus_message_open_container(reply, 'a', "(iayu)");
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
LIST_FOREACH(items, i, *items) {
|
|
|
|
|
|
|
|
r = sd_bus_message_open_container(reply, 'r', "iayu");
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = sd_bus_message_append(reply, "i", i->family);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = sd_bus_message_append_array(reply, 'y', &i->address, FAMILY_ADDRESS_SIZE(i->family));
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = sd_bus_message_append(reply, "u", (uint32_t) i->prefixlen);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = sd_bus_message_close_container(reply);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
}
|
|
|
|
|
|
|
|
return sd_bus_message_close_container(reply);
|
|
|
|
}
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
const sd_bus_vtable bus_cgroup_vtable[] = {
|
|
|
|
SD_BUS_VTABLE_START(0),
|
2014-11-05 17:57:23 +01:00
|
|
|
SD_BUS_PROPERTY("Delegate", "b", bus_property_get_bool, offsetof(CGroupContext, delegate), 0),
|
2017-11-09 15:29:34 +01:00
|
|
|
SD_BUS_PROPERTY("DelegateControllers", "as", property_get_delegate_controllers, 0, 0),
|
2013-12-22 19:44:04 +01:00
|
|
|
SD_BUS_PROPERTY("CPUAccounting", "b", bus_property_get_bool, offsetof(CGroupContext, cpu_accounting), 0),
|
2016-08-07 15:45:39 +02:00
|
|
|
SD_BUS_PROPERTY("CPUWeight", "t", NULL, offsetof(CGroupContext, cpu_weight), 0),
|
|
|
|
SD_BUS_PROPERTY("StartupCPUWeight", "t", NULL, offsetof(CGroupContext, startup_cpu_weight), 0),
|
2015-09-11 16:48:24 +02:00
|
|
|
SD_BUS_PROPERTY("CPUShares", "t", NULL, offsetof(CGroupContext, cpu_shares), 0),
|
|
|
|
SD_BUS_PROPERTY("StartupCPUShares", "t", NULL, offsetof(CGroupContext, startup_cpu_shares), 0),
|
2014-09-29 05:42:33 +02:00
|
|
|
SD_BUS_PROPERTY("CPUQuotaPerSecUSec", "t", bus_property_get_usec, offsetof(CGroupContext, cpu_quota_per_sec_usec), 0),
|
2016-05-05 22:42:55 +02:00
|
|
|
SD_BUS_PROPERTY("IOAccounting", "b", bus_property_get_bool, offsetof(CGroupContext, io_accounting), 0),
|
|
|
|
SD_BUS_PROPERTY("IOWeight", "t", NULL, offsetof(CGroupContext, io_weight), 0),
|
|
|
|
SD_BUS_PROPERTY("StartupIOWeight", "t", NULL, offsetof(CGroupContext, startup_io_weight), 0),
|
|
|
|
SD_BUS_PROPERTY("IODeviceWeight", "a(st)", property_get_io_device_weight, 0, 0),
|
|
|
|
SD_BUS_PROPERTY("IOReadBandwidthMax", "a(st)", property_get_io_device_limits, 0, 0),
|
|
|
|
SD_BUS_PROPERTY("IOWriteBandwidthMax", "a(st)", property_get_io_device_limits, 0, 0),
|
2016-05-18 22:50:56 +02:00
|
|
|
SD_BUS_PROPERTY("IOReadIOPSMax", "a(st)", property_get_io_device_limits, 0, 0),
|
|
|
|
SD_BUS_PROPERTY("IOWriteIOPSMax", "a(st)", property_get_io_device_limits, 0, 0),
|
2013-12-22 19:44:04 +01:00
|
|
|
SD_BUS_PROPERTY("BlockIOAccounting", "b", bus_property_get_bool, offsetof(CGroupContext, blockio_accounting), 0),
|
2015-09-11 16:48:24 +02:00
|
|
|
SD_BUS_PROPERTY("BlockIOWeight", "t", NULL, offsetof(CGroupContext, blockio_weight), 0),
|
|
|
|
SD_BUS_PROPERTY("StartupBlockIOWeight", "t", NULL, offsetof(CGroupContext, startup_blockio_weight), 0),
|
2013-12-22 19:44:04 +01:00
|
|
|
SD_BUS_PROPERTY("BlockIODeviceWeight", "a(st)", property_get_blockio_device_weight, 0, 0),
|
|
|
|
SD_BUS_PROPERTY("BlockIOReadBandwidth", "a(st)", property_get_blockio_device_bandwidths, 0, 0),
|
|
|
|
SD_BUS_PROPERTY("BlockIOWriteBandwidth", "a(st)", property_get_blockio_device_bandwidths, 0, 0),
|
|
|
|
SD_BUS_PROPERTY("MemoryAccounting", "b", bus_property_get_bool, offsetof(CGroupContext, memory_accounting), 0),
|
2016-05-27 18:10:18 +02:00
|
|
|
SD_BUS_PROPERTY("MemoryLow", "t", NULL, offsetof(CGroupContext, memory_low), 0),
|
|
|
|
SD_BUS_PROPERTY("MemoryHigh", "t", NULL, offsetof(CGroupContext, memory_high), 0),
|
|
|
|
SD_BUS_PROPERTY("MemoryMax", "t", NULL, offsetof(CGroupContext, memory_max), 0),
|
2016-07-04 09:03:54 +02:00
|
|
|
SD_BUS_PROPERTY("MemorySwapMax", "t", NULL, offsetof(CGroupContext, memory_swap_max), 0),
|
2013-12-22 19:44:04 +01:00
|
|
|
SD_BUS_PROPERTY("MemoryLimit", "t", NULL, offsetof(CGroupContext, memory_limit), 0),
|
|
|
|
SD_BUS_PROPERTY("DevicePolicy", "s", property_get_cgroup_device_policy, offsetof(CGroupContext, device_policy), 0),
|
|
|
|
SD_BUS_PROPERTY("DeviceAllow", "a(ss)", property_get_device_allow, 0, 0),
|
2015-09-10 12:32:16 +02:00
|
|
|
SD_BUS_PROPERTY("TasksAccounting", "b", bus_property_get_bool, offsetof(CGroupContext, tasks_accounting), 0),
|
|
|
|
SD_BUS_PROPERTY("TasksMax", "t", NULL, offsetof(CGroupContext, tasks_max), 0),
|
2017-09-05 11:16:35 +02:00
|
|
|
SD_BUS_PROPERTY("IPAccounting", "b", bus_property_get_bool, offsetof(CGroupContext, ip_accounting), 0),
|
|
|
|
SD_BUS_PROPERTY("IPAddressAllow", "a(iayu)", property_get_ip_address_access, offsetof(CGroupContext, ip_address_allow), 0),
|
|
|
|
SD_BUS_PROPERTY("IPAddressDeny", "a(iayu)", property_get_ip_address_access, offsetof(CGroupContext, ip_address_deny), 0),
|
2013-11-19 21:12:59 +01:00
|
|
|
SD_BUS_VTABLE_END
|
2013-06-27 04:14:27 +02:00
|
|
|
};
|
2013-06-27 21:14:56 +02:00
|
|
|
|
2014-11-05 17:57:23 +01:00
|
|
|
static int bus_cgroup_set_transient_property(
|
|
|
|
Unit *u,
|
|
|
|
CGroupContext *c,
|
|
|
|
const char *name,
|
|
|
|
sd_bus_message *message,
|
2017-11-22 15:03:51 +01:00
|
|
|
UnitWriteFlags flags,
|
2014-11-05 17:57:23 +01:00
|
|
|
sd_bus_error *error) {
|
|
|
|
|
|
|
|
int r;
|
|
|
|
|
|
|
|
assert(u);
|
|
|
|
assert(c);
|
|
|
|
assert(name);
|
|
|
|
assert(message);
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
flags |= UNIT_PRIVATE;
|
|
|
|
|
2014-11-05 17:57:23 +01:00
|
|
|
if (streq(name, "Delegate")) {
|
|
|
|
int b;
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "b", &b);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2014-11-05 17:57:23 +01:00
|
|
|
c->delegate = b;
|
2017-11-09 15:29:34 +01:00
|
|
|
c->delegate_controllers = b ? _CGROUP_MASK_ALL : 0;
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "Delegate=%s", yes_no(b));
|
2014-11-05 17:57:23 +01:00
|
|
|
}
|
|
|
|
|
2017-11-09 15:29:34 +01:00
|
|
|
return 1;
|
|
|
|
|
|
|
|
} else if (streq(name, "DelegateControllers")) {
|
|
|
|
CGroupMask mask = 0;
|
|
|
|
|
|
|
|
r = sd_bus_message_enter_container(message, 'a', "s");
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
for (;;) {
|
|
|
|
CGroupController cc;
|
|
|
|
const char *t;
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "s", &t);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
if (r == 0)
|
|
|
|
break;
|
|
|
|
|
|
|
|
cc = cgroup_controller_from_string(t);
|
|
|
|
if (cc < 0)
|
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "Unknown cgroup contoller '%s'", t);
|
|
|
|
|
|
|
|
mask |= CGROUP_CONTROLLER_TO_MASK(cc);
|
|
|
|
}
|
|
|
|
|
|
|
|
r = sd_bus_message_exit_container(message);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2017-11-09 15:29:34 +01:00
|
|
|
_cleanup_free_ char *t = NULL;
|
|
|
|
|
|
|
|
r = cg_mask_to_string(mask, &t);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
c->delegate = true;
|
2017-11-17 10:04:25 +01:00
|
|
|
if (mask == 0)
|
|
|
|
c->delegate_controllers = 0;
|
|
|
|
else
|
|
|
|
c->delegate_controllers |= mask;
|
2017-11-09 15:29:34 +01:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "Delegate=%s", strempty(t));
|
2017-11-09 15:29:34 +01:00
|
|
|
}
|
|
|
|
|
2014-11-05 17:57:23 +01:00
|
|
|
return 1;
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2013-06-27 21:14:56 +02:00
|
|
|
int bus_cgroup_set_property(
|
|
|
|
Unit *u,
|
|
|
|
CGroupContext *c,
|
|
|
|
const char *name,
|
2013-11-19 21:12:59 +01:00
|
|
|
sd_bus_message *message,
|
2017-11-22 15:03:51 +01:00
|
|
|
UnitWriteFlags flags,
|
2013-11-19 21:12:59 +01:00
|
|
|
sd_bus_error *error) {
|
|
|
|
|
2016-05-18 22:50:56 +02:00
|
|
|
CGroupIOLimitType iol_type;
|
2013-11-19 21:12:59 +01:00
|
|
|
int r;
|
2013-06-27 21:14:56 +02:00
|
|
|
|
|
|
|
assert(u);
|
|
|
|
assert(c);
|
2013-11-19 21:12:59 +01:00
|
|
|
assert(name);
|
|
|
|
assert(message);
|
2013-06-27 21:14:56 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
flags |= UNIT_PRIVATE;
|
|
|
|
|
2013-06-27 21:14:56 +02:00
|
|
|
if (streq(name, "CPUAccounting")) {
|
2013-11-19 21:12:59 +01:00
|
|
|
int b;
|
2013-06-27 21:14:56 +02:00
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
r = sd_bus_message_read(message, "b", &b);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-06-27 21:14:56 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2013-06-27 21:14:56 +02:00
|
|
|
c->cpu_accounting = b;
|
2015-09-11 18:21:53 +02:00
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_CPUACCT|CGROUP_MASK_CPU);
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "CPUAccounting=%s", yes_no(b));
|
2013-06-27 21:50:35 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
2016-08-07 15:45:39 +02:00
|
|
|
} else if (streq(name, "CPUWeight")) {
|
|
|
|
uint64_t weight;
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "t", &weight);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
if (!CGROUP_WEIGHT_IS_OK(weight))
|
2017-11-22 15:03:51 +01:00
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "CPUWeight= value out of range");
|
2016-08-07 15:45:39 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2016-08-07 15:45:39 +02:00
|
|
|
c->cpu_weight = weight;
|
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_CPU);
|
|
|
|
|
|
|
|
if (weight == CGROUP_WEIGHT_INVALID)
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_setting(u, flags, name, "CPUWeight=");
|
2016-08-07 15:45:39 +02:00
|
|
|
else
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "CPUWeight=%" PRIu64, weight);
|
2016-08-07 15:45:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
} else if (streq(name, "StartupCPUWeight")) {
|
|
|
|
uint64_t weight;
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "t", &weight);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
if (!CGROUP_WEIGHT_IS_OK(weight))
|
2017-11-22 15:03:51 +01:00
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "StartupCPUWeight= value out of range");
|
2016-08-07 15:45:39 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2016-08-07 15:45:39 +02:00
|
|
|
c->startup_cpu_weight = weight;
|
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_CPU);
|
|
|
|
|
|
|
|
if (weight == CGROUP_CPU_SHARES_INVALID)
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_setting(u, flags, name, "StartupCPUWeight=");
|
2016-08-07 15:45:39 +02:00
|
|
|
else
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "StartupCPUWeight=%" PRIu64, weight);
|
2016-08-07 15:45:39 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
2013-06-27 21:50:35 +02:00
|
|
|
} else if (streq(name, "CPUShares")) {
|
2015-09-11 16:48:24 +02:00
|
|
|
uint64_t shares;
|
2013-06-27 21:50:35 +02:00
|
|
|
|
2015-09-11 16:48:24 +02:00
|
|
|
r = sd_bus_message_read(message, "t", &shares);
|
2013-11-19 21:12:59 +01:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-06-27 21:50:35 +02:00
|
|
|
|
2015-09-11 16:48:24 +02:00
|
|
|
if (!CGROUP_CPU_SHARES_IS_OK(shares))
|
2017-11-22 15:03:51 +01:00
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "CPUShares= value out of range");
|
2013-06-27 21:50:35 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2015-09-11 16:48:24 +02:00
|
|
|
c->cpu_shares = shares;
|
2015-09-11 18:21:53 +02:00
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_CPU);
|
2015-09-11 16:48:24 +02:00
|
|
|
|
|
|
|
if (shares == CGROUP_CPU_SHARES_INVALID)
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_setting(u, flags, name, "CPUShares=");
|
2015-09-11 16:48:24 +02:00
|
|
|
else
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "CPUShares=%" PRIu64, shares);
|
2013-06-27 21:14:56 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
2014-05-15 17:09:34 +02:00
|
|
|
} else if (streq(name, "StartupCPUShares")) {
|
2015-09-11 16:48:24 +02:00
|
|
|
uint64_t shares;
|
2014-05-15 17:09:34 +02:00
|
|
|
|
2015-09-11 16:48:24 +02:00
|
|
|
r = sd_bus_message_read(message, "t", &shares);
|
2014-05-15 17:09:34 +02:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2015-09-11 16:48:24 +02:00
|
|
|
if (!CGROUP_CPU_SHARES_IS_OK(shares))
|
2017-11-22 15:03:51 +01:00
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "StartupCPUShares= value out of range");
|
2014-05-15 17:09:34 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2015-09-11 16:48:24 +02:00
|
|
|
c->startup_cpu_shares = shares;
|
2015-09-11 18:21:53 +02:00
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_CPU);
|
2015-09-11 16:48:24 +02:00
|
|
|
|
|
|
|
if (shares == CGROUP_CPU_SHARES_INVALID)
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_setting(u, flags, name, "StartupCPUShares=");
|
2015-09-11 16:48:24 +02:00
|
|
|
else
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "StartupCPUShares=%" PRIu64, shares);
|
2014-05-15 17:09:34 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
2014-04-25 13:27:25 +02:00
|
|
|
} else if (streq(name, "CPUQuotaPerSecUSec")) {
|
|
|
|
uint64_t u64;
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "t", &u64);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
if (u64 <= 0)
|
2017-11-22 15:03:51 +01:00
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "CPUQuotaPerSecUSec= value out of range");
|
2014-04-25 13:27:25 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2014-04-25 13:27:25 +02:00
|
|
|
c->cpu_quota_per_sec_usec = u64;
|
2015-09-11 18:21:53 +02:00
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_CPU);
|
2017-11-22 15:03:51 +01:00
|
|
|
|
2017-06-18 11:18:41 +02:00
|
|
|
if (c->cpu_quota_per_sec_usec == USEC_INFINITY)
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_setting(u, flags, "CPUQuota", "CPUQuota=");
|
2017-06-18 11:18:41 +02:00
|
|
|
else
|
2017-11-22 15:03:51 +01:00
|
|
|
/* config_parse_cpu_quota() requires an integer, so truncating division is used on
|
|
|
|
* purpose here. */
|
|
|
|
unit_write_settingf(u, flags, "CPUQuota",
|
|
|
|
"CPUQuota=%0.f%%",
|
|
|
|
(double) (c->cpu_quota_per_sec_usec / 10000));
|
2014-04-25 13:27:25 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
2016-05-05 22:42:55 +02:00
|
|
|
} else if (streq(name, "IOAccounting")) {
|
|
|
|
int b;
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "b", &b);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2016-05-05 22:42:55 +02:00
|
|
|
c->io_accounting = b;
|
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_IO);
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "IOAccounting=%s", yes_no(b));
|
2016-05-05 22:42:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
} else if (streq(name, "IOWeight")) {
|
|
|
|
uint64_t weight;
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "t", &weight);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
if (!CGROUP_WEIGHT_IS_OK(weight))
|
2017-11-22 15:03:51 +01:00
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "IOWeight= value out of range");
|
2016-05-05 22:42:55 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2016-05-05 22:42:55 +02:00
|
|
|
c->io_weight = weight;
|
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_IO);
|
|
|
|
|
|
|
|
if (weight == CGROUP_WEIGHT_INVALID)
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_setting(u, flags, name, "IOWeight=");
|
2016-05-05 22:42:55 +02:00
|
|
|
else
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "IOWeight=%" PRIu64, weight);
|
2016-05-05 22:42:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
} else if (streq(name, "StartupIOWeight")) {
|
|
|
|
uint64_t weight;
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "t", &weight);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
if (CGROUP_WEIGHT_IS_OK(weight))
|
2017-11-22 15:03:51 +01:00
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "StartupIOWeight= value out of range");
|
2016-05-05 22:42:55 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2016-05-05 22:42:55 +02:00
|
|
|
c->startup_io_weight = weight;
|
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_IO);
|
|
|
|
|
|
|
|
if (weight == CGROUP_WEIGHT_INVALID)
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_setting(u, flags, name, "StartupIOWeight=");
|
2016-05-05 22:42:55 +02:00
|
|
|
else
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "StartupIOWeight=%" PRIu64, weight);
|
2016-05-05 22:42:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
2016-05-18 22:50:56 +02:00
|
|
|
} else if ((iol_type = cgroup_io_limit_type_from_string(name)) >= 0) {
|
2016-05-05 22:42:55 +02:00
|
|
|
const char *path;
|
|
|
|
unsigned n = 0;
|
|
|
|
uint64_t u64;
|
|
|
|
|
|
|
|
r = sd_bus_message_enter_container(message, 'a', "(st)");
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
while ((r = sd_bus_message_read(message, "(st)", &path, &u64)) > 0) {
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2016-05-05 22:42:55 +02:00
|
|
|
CGroupIODeviceLimit *a = NULL, *b;
|
|
|
|
|
|
|
|
LIST_FOREACH(device_limits, b, c->io_device_limits) {
|
|
|
|
if (path_equal(path, b->path)) {
|
|
|
|
a = b;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!a) {
|
2016-05-18 22:50:56 +02:00
|
|
|
CGroupIOLimitType type;
|
|
|
|
|
2016-05-05 22:42:55 +02:00
|
|
|
a = new0(CGroupIODeviceLimit, 1);
|
|
|
|
if (!a)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
a->path = strdup(path);
|
|
|
|
if (!a->path) {
|
|
|
|
free(a);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
|
2016-05-18 22:50:56 +02:00
|
|
|
for (type = 0; type < _CGROUP_IO_LIMIT_TYPE_MAX; type++)
|
|
|
|
a->limits[type] = cgroup_io_limit_defaults[type];
|
2016-05-05 22:42:55 +02:00
|
|
|
|
|
|
|
LIST_PREPEND(device_limits, c->io_device_limits, a);
|
|
|
|
}
|
|
|
|
|
2016-05-18 22:50:56 +02:00
|
|
|
a->limits[iol_type] = u64;
|
2016-05-05 22:42:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
n++;
|
|
|
|
}
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
r = sd_bus_message_exit_container(message);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2016-05-05 22:42:55 +02:00
|
|
|
CGroupIODeviceLimit *a;
|
|
|
|
_cleanup_free_ char *buf = NULL;
|
|
|
|
_cleanup_fclose_ FILE *f = NULL;
|
|
|
|
size_t size = 0;
|
|
|
|
|
|
|
|
if (n == 0) {
|
|
|
|
LIST_FOREACH(device_limits, a, c->io_device_limits)
|
2016-05-18 22:50:56 +02:00
|
|
|
a->limits[iol_type] = cgroup_io_limit_defaults[iol_type];
|
2016-05-05 22:42:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_IO);
|
|
|
|
|
|
|
|
f = open_memstream(&buf, &size);
|
|
|
|
if (!f)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2016-05-18 22:50:56 +02:00
|
|
|
fprintf(f, "%s=\n", name);
|
|
|
|
LIST_FOREACH(device_limits, a, c->io_device_limits)
|
|
|
|
if (a->limits[iol_type] != cgroup_io_limit_defaults[iol_type])
|
|
|
|
fprintf(f, "%s=%s %" PRIu64 "\n", name, a->path, a->limits[iol_type]);
|
2016-05-05 22:42:55 +02:00
|
|
|
|
|
|
|
r = fflush_and_check(f);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_setting(u, flags, name, buf);
|
2016-05-05 22:42:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
} else if (streq(name, "IODeviceWeight")) {
|
|
|
|
const char *path;
|
|
|
|
uint64_t weight;
|
|
|
|
unsigned n = 0;
|
|
|
|
|
|
|
|
r = sd_bus_message_enter_container(message, 'a', "(st)");
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
while ((r = sd_bus_message_read(message, "(st)", &path, &weight)) > 0) {
|
|
|
|
|
|
|
|
if (!CGROUP_WEIGHT_IS_OK(weight) || weight == CGROUP_WEIGHT_INVALID)
|
2017-11-22 15:03:51 +01:00
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "IODeviceWeight= value out of range");
|
2016-05-05 22:42:55 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2016-05-05 22:42:55 +02:00
|
|
|
CGroupIODeviceWeight *a = NULL, *b;
|
|
|
|
|
|
|
|
LIST_FOREACH(device_weights, b, c->io_device_weights) {
|
|
|
|
if (path_equal(b->path, path)) {
|
|
|
|
a = b;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!a) {
|
|
|
|
a = new0(CGroupIODeviceWeight, 1);
|
|
|
|
if (!a)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
a->path = strdup(path);
|
|
|
|
if (!a->path) {
|
|
|
|
free(a);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
|
|
|
LIST_PREPEND(device_weights,c->io_device_weights, a);
|
|
|
|
}
|
|
|
|
|
|
|
|
a->weight = weight;
|
|
|
|
}
|
|
|
|
|
|
|
|
n++;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = sd_bus_message_exit_container(message);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2016-05-05 22:42:55 +02:00
|
|
|
_cleanup_free_ char *buf = NULL;
|
|
|
|
_cleanup_fclose_ FILE *f = NULL;
|
|
|
|
CGroupIODeviceWeight *a;
|
|
|
|
size_t size = 0;
|
|
|
|
|
|
|
|
if (n == 0) {
|
|
|
|
while (c->io_device_weights)
|
|
|
|
cgroup_context_free_io_device_weight(c, c->io_device_weights);
|
|
|
|
}
|
|
|
|
|
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_IO);
|
|
|
|
|
|
|
|
f = open_memstream(&buf, &size);
|
|
|
|
if (!f)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2017-07-21 10:35:45 +02:00
|
|
|
fputs_unlocked("IODeviceWeight=\n", f);
|
2016-05-05 22:42:55 +02:00
|
|
|
LIST_FOREACH(device_weights, a, c->io_device_weights)
|
|
|
|
fprintf(f, "IODeviceWeight=%s %" PRIu64 "\n", a->path, a->weight);
|
|
|
|
|
|
|
|
r = fflush_and_check(f);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_setting(u, flags, name, buf);
|
2016-05-05 22:42:55 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
2013-06-27 21:14:56 +02:00
|
|
|
} else if (streq(name, "BlockIOAccounting")) {
|
2013-11-19 21:12:59 +01:00
|
|
|
int b;
|
2013-06-27 21:14:56 +02:00
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
r = sd_bus_message_read(message, "b", &b);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-06-27 21:14:56 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2013-06-27 21:14:56 +02:00
|
|
|
c->blockio_accounting = b;
|
2015-09-11 18:21:53 +02:00
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_BLKIO);
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "BlockIOAccounting=%s", yes_no(b));
|
2013-06-27 21:14:56 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
2013-06-27 21:50:35 +02:00
|
|
|
|
|
|
|
} else if (streq(name, "BlockIOWeight")) {
|
2015-09-11 16:48:24 +02:00
|
|
|
uint64_t weight;
|
2013-06-27 21:50:35 +02:00
|
|
|
|
2015-09-11 16:48:24 +02:00
|
|
|
r = sd_bus_message_read(message, "t", &weight);
|
2013-11-19 21:12:59 +01:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-06-27 21:50:35 +02:00
|
|
|
|
2015-09-11 16:48:24 +02:00
|
|
|
if (!CGROUP_BLKIO_WEIGHT_IS_OK(weight))
|
2017-11-22 15:03:51 +01:00
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "BlockIOWeight= value out of range");
|
2013-06-27 21:50:35 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2015-09-11 16:48:24 +02:00
|
|
|
c->blockio_weight = weight;
|
2015-09-11 18:21:53 +02:00
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_BLKIO);
|
2015-09-11 16:48:24 +02:00
|
|
|
|
|
|
|
if (weight == CGROUP_BLKIO_WEIGHT_INVALID)
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_setting(u, flags, name, "BlockIOWeight=");
|
2015-09-11 16:48:24 +02:00
|
|
|
else
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "BlockIOWeight=%" PRIu64, weight);
|
2013-06-27 21:50:35 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
2014-05-15 17:09:34 +02:00
|
|
|
|
|
|
|
} else if (streq(name, "StartupBlockIOWeight")) {
|
2015-09-11 16:48:24 +02:00
|
|
|
uint64_t weight;
|
2014-05-15 17:09:34 +02:00
|
|
|
|
2015-09-11 16:48:24 +02:00
|
|
|
r = sd_bus_message_read(message, "t", &weight);
|
2014-05-15 17:09:34 +02:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2016-05-23 22:48:46 +02:00
|
|
|
if (!CGROUP_BLKIO_WEIGHT_IS_OK(weight))
|
2017-11-22 15:03:51 +01:00
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "StartupBlockIOWeight= value out of range");
|
2014-05-15 17:09:34 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2015-09-11 16:48:24 +02:00
|
|
|
c->startup_blockio_weight = weight;
|
2015-09-11 18:21:53 +02:00
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_BLKIO);
|
2015-09-11 16:48:24 +02:00
|
|
|
|
|
|
|
if (weight == CGROUP_BLKIO_WEIGHT_INVALID)
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_setting(u, flags, name, "StartupBlockIOWeight=");
|
2015-09-11 16:48:24 +02:00
|
|
|
else
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "StartupBlockIOWeight=%" PRIu64, weight);
|
2014-05-15 17:09:34 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
2013-06-27 21:50:35 +02:00
|
|
|
|
2016-06-08 20:04:22 +02:00
|
|
|
} else if (STR_IN_SET(name, "BlockIOReadBandwidth", "BlockIOWriteBandwidth")) {
|
2013-11-19 21:12:59 +01:00
|
|
|
const char *path;
|
2013-09-10 17:23:07 +02:00
|
|
|
bool read = true;
|
2013-11-19 21:12:59 +01:00
|
|
|
unsigned n = 0;
|
|
|
|
uint64_t u64;
|
2013-09-10 17:23:07 +02:00
|
|
|
|
|
|
|
if (streq(name, "BlockIOWriteBandwidth"))
|
|
|
|
read = false;
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
r = sd_bus_message_enter_container(message, 'a', "(st)");
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-09-10 17:23:07 +02:00
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
while ((r = sd_bus_message_read(message, "(st)", &path, &u64)) > 0) {
|
2013-09-10 17:23:07 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2013-11-19 21:12:59 +01:00
|
|
|
CGroupBlockIODeviceBandwidth *a = NULL, *b;
|
2013-09-10 17:23:07 +02:00
|
|
|
|
|
|
|
LIST_FOREACH(device_bandwidths, b, c->blockio_device_bandwidths) {
|
2016-05-18 22:51:46 +02:00
|
|
|
if (path_equal(path, b->path)) {
|
2013-09-10 17:23:07 +02:00
|
|
|
a = b;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
if (!a) {
|
2013-09-10 17:23:07 +02:00
|
|
|
a = new0(CGroupBlockIODeviceBandwidth, 1);
|
|
|
|
if (!a)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2016-05-18 22:51:46 +02:00
|
|
|
a->rbps = CGROUP_LIMIT_MAX;
|
|
|
|
a->wbps = CGROUP_LIMIT_MAX;
|
2013-09-10 17:23:07 +02:00
|
|
|
a->path = strdup(path);
|
|
|
|
if (!a->path) {
|
|
|
|
free(a);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
2013-11-19 21:12:59 +01:00
|
|
|
|
|
|
|
LIST_PREPEND(device_bandwidths, c->blockio_device_bandwidths, a);
|
2013-09-10 17:23:07 +02:00
|
|
|
}
|
|
|
|
|
2016-05-18 22:51:46 +02:00
|
|
|
if (read)
|
|
|
|
a->rbps = u64;
|
|
|
|
else
|
|
|
|
a->wbps = u64;
|
2013-09-10 17:23:07 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
n++;
|
|
|
|
}
|
2013-11-19 21:12:59 +01:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-09-10 17:23:07 +02:00
|
|
|
|
2014-02-24 02:59:57 +01:00
|
|
|
r = sd_bus_message_exit_container(message);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2016-05-18 22:51:46 +02:00
|
|
|
CGroupBlockIODeviceBandwidth *a;
|
2013-09-10 17:23:07 +02:00
|
|
|
_cleanup_free_ char *buf = NULL;
|
|
|
|
_cleanup_fclose_ FILE *f = NULL;
|
|
|
|
size_t size = 0;
|
|
|
|
|
|
|
|
if (n == 0) {
|
2016-05-18 22:51:46 +02:00
|
|
|
LIST_FOREACH(device_bandwidths, a, c->blockio_device_bandwidths) {
|
|
|
|
if (read)
|
|
|
|
a->rbps = CGROUP_LIMIT_MAX;
|
|
|
|
else
|
|
|
|
a->wbps = CGROUP_LIMIT_MAX;
|
|
|
|
}
|
2013-09-10 17:23:07 +02:00
|
|
|
}
|
|
|
|
|
2015-09-11 18:21:53 +02:00
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_BLKIO);
|
2014-04-25 13:26:37 +02:00
|
|
|
|
2013-09-10 17:23:07 +02:00
|
|
|
f = open_memstream(&buf, &size);
|
|
|
|
if (!f)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2015-08-06 00:31:09 +02:00
|
|
|
if (read) {
|
2017-07-21 10:35:45 +02:00
|
|
|
fputs_unlocked("BlockIOReadBandwidth=\n", f);
|
2015-08-06 00:31:09 +02:00
|
|
|
LIST_FOREACH(device_bandwidths, a, c->blockio_device_bandwidths)
|
2016-05-18 22:51:46 +02:00
|
|
|
if (a->rbps != CGROUP_LIMIT_MAX)
|
|
|
|
fprintf(f, "BlockIOReadBandwidth=%s %" PRIu64 "\n", a->path, a->rbps);
|
2013-09-10 17:23:07 +02:00
|
|
|
} else {
|
2017-07-21 10:35:45 +02:00
|
|
|
fputs_unlocked("BlockIOWriteBandwidth=\n", f);
|
2013-09-10 17:23:07 +02:00
|
|
|
LIST_FOREACH(device_bandwidths, a, c->blockio_device_bandwidths)
|
2016-05-18 22:51:46 +02:00
|
|
|
if (a->wbps != CGROUP_LIMIT_MAX)
|
|
|
|
fprintf(f, "BlockIOWriteBandwidth=%s %" PRIu64 "\n", a->path, a->wbps);
|
2013-09-10 17:23:07 +02:00
|
|
|
}
|
|
|
|
|
2015-10-21 18:17:12 +02:00
|
|
|
r = fflush_and_check(f);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2017-11-22 15:03:51 +01:00
|
|
|
|
|
|
|
unit_write_setting(u, flags, name, buf);
|
2013-08-27 07:36:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
} else if (streq(name, "BlockIODeviceWeight")) {
|
2013-11-19 21:12:59 +01:00
|
|
|
const char *path;
|
2015-09-11 16:48:24 +02:00
|
|
|
uint64_t weight;
|
2013-08-27 07:36:53 +02:00
|
|
|
unsigned n = 0;
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
r = sd_bus_message_enter_container(message, 'a', "(st)");
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-08-27 07:36:53 +02:00
|
|
|
|
2015-09-11 16:48:24 +02:00
|
|
|
while ((r = sd_bus_message_read(message, "(st)", &path, &weight)) > 0) {
|
2013-08-27 07:36:53 +02:00
|
|
|
|
2015-09-11 16:48:24 +02:00
|
|
|
if (!CGROUP_BLKIO_WEIGHT_IS_OK(weight) || weight == CGROUP_BLKIO_WEIGHT_INVALID)
|
2017-11-22 15:03:51 +01:00
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "BlockIODeviceWeight= out of range");
|
2013-08-27 07:36:53 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2013-11-19 21:12:59 +01:00
|
|
|
CGroupBlockIODeviceWeight *a = NULL, *b;
|
2013-08-27 07:36:53 +02:00
|
|
|
|
|
|
|
LIST_FOREACH(device_weights, b, c->blockio_device_weights) {
|
|
|
|
if (path_equal(b->path, path)) {
|
|
|
|
a = b;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
if (!a) {
|
2013-08-27 07:36:53 +02:00
|
|
|
a = new0(CGroupBlockIODeviceWeight, 1);
|
|
|
|
if (!a)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
a->path = strdup(path);
|
|
|
|
if (!a->path) {
|
|
|
|
free(a);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
2013-11-19 21:12:59 +01:00
|
|
|
LIST_PREPEND(device_weights,c->blockio_device_weights, a);
|
2013-08-27 07:36:53 +02:00
|
|
|
}
|
|
|
|
|
2015-09-11 16:48:24 +02:00
|
|
|
a->weight = weight;
|
2013-08-27 07:36:53 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
n++;
|
|
|
|
}
|
|
|
|
|
2014-02-24 02:59:57 +01:00
|
|
|
r = sd_bus_message_exit_container(message);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2013-08-27 07:36:53 +02:00
|
|
|
_cleanup_free_ char *buf = NULL;
|
|
|
|
_cleanup_fclose_ FILE *f = NULL;
|
|
|
|
CGroupBlockIODeviceWeight *a;
|
|
|
|
size_t size = 0;
|
|
|
|
|
|
|
|
if (n == 0) {
|
|
|
|
while (c->blockio_device_weights)
|
|
|
|
cgroup_context_free_blockio_device_weight(c, c->blockio_device_weights);
|
|
|
|
}
|
|
|
|
|
2015-09-11 18:21:53 +02:00
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_BLKIO);
|
2014-04-25 13:26:37 +02:00
|
|
|
|
2013-08-27 07:36:53 +02:00
|
|
|
f = open_memstream(&buf, &size);
|
|
|
|
if (!f)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2017-07-21 10:35:45 +02:00
|
|
|
fputs_unlocked("BlockIODeviceWeight=\n", f);
|
2013-08-27 07:36:53 +02:00
|
|
|
LIST_FOREACH(device_weights, a, c->blockio_device_weights)
|
2015-09-11 16:48:24 +02:00
|
|
|
fprintf(f, "BlockIODeviceWeight=%s %" PRIu64 "\n", a->path, a->weight);
|
2013-08-27 07:36:53 +02:00
|
|
|
|
2015-10-21 18:17:12 +02:00
|
|
|
r = fflush_and_check(f);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2017-11-22 15:03:51 +01:00
|
|
|
|
|
|
|
unit_write_setting(u, flags, name, buf);
|
2013-09-10 17:23:07 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
2013-06-27 21:14:56 +02:00
|
|
|
} else if (streq(name, "MemoryAccounting")) {
|
2013-11-19 21:12:59 +01:00
|
|
|
int b;
|
2013-06-27 21:14:56 +02:00
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
r = sd_bus_message_read(message, "b", &b);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-06-27 21:14:56 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2013-06-27 21:50:35 +02:00
|
|
|
c->memory_accounting = b;
|
2015-09-11 18:21:53 +02:00
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_MEMORY);
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "MemoryAccounting=%s", yes_no(b));
|
2013-06-27 21:14:56 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
2016-07-04 09:03:54 +02:00
|
|
|
} else if (STR_IN_SET(name, "MemoryLow", "MemoryHigh", "MemoryMax", "MemorySwapMax")) {
|
2016-05-27 18:10:18 +02:00
|
|
|
uint64_t v;
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "t", &v);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2016-06-08 20:04:22 +02:00
|
|
|
if (v <= 0)
|
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "%s= is too small", name);
|
2016-05-27 18:10:18 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2016-05-27 18:10:18 +02:00
|
|
|
if (streq(name, "MemoryLow"))
|
|
|
|
c->memory_low = v;
|
|
|
|
else if (streq(name, "MemoryHigh"))
|
|
|
|
c->memory_high = v;
|
2016-07-04 09:03:54 +02:00
|
|
|
else if (streq(name, "MemorySwapMax"))
|
|
|
|
c->memory_swap_max = v;
|
2016-05-27 18:10:18 +02:00
|
|
|
else
|
|
|
|
c->memory_max = v;
|
|
|
|
|
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_MEMORY);
|
|
|
|
|
|
|
|
if (v == CGROUP_LIMIT_MAX)
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "%s=infinity", name);
|
2016-05-27 18:10:18 +02:00
|
|
|
else
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "%s=%" PRIu64, name, v);
|
2016-05-27 18:10:18 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
2016-07-19 16:10:15 +02:00
|
|
|
} else if (STR_IN_SET(name, "MemoryLowScale", "MemoryHighScale", "MemoryMaxScale")) {
|
2016-06-08 20:52:06 +02:00
|
|
|
uint32_t raw;
|
|
|
|
uint64_t v;
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "u", &raw);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
v = physical_memory_scale(raw, UINT32_MAX);
|
|
|
|
if (v <= 0 || v == UINT64_MAX)
|
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "%s= is out of range", name);
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2016-06-08 20:52:06 +02:00
|
|
|
const char *e;
|
|
|
|
|
|
|
|
/* Chop off suffix */
|
2016-07-19 16:10:15 +02:00
|
|
|
assert_se(e = endswith(name, "Scale"));
|
2016-06-08 20:52:06 +02:00
|
|
|
name = strndupa(name, e - name);
|
|
|
|
|
|
|
|
if (streq(name, "MemoryLow"))
|
|
|
|
c->memory_low = v;
|
|
|
|
else if (streq(name, "MemoryHigh"))
|
|
|
|
c->memory_high = v;
|
|
|
|
else
|
|
|
|
c->memory_max = v;
|
|
|
|
|
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_MEMORY);
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "%s=%" PRIu32 "%%", name,
|
|
|
|
(uint32_t) (DIV_ROUND_UP((uint64_t) raw * 100U, (uint64_t) UINT32_MAX)));
|
2016-06-08 20:52:06 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
2013-09-17 21:58:00 +02:00
|
|
|
} else if (streq(name, "MemoryLimit")) {
|
2013-11-19 21:12:59 +01:00
|
|
|
uint64_t limit;
|
2013-06-27 21:50:35 +02:00
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
r = sd_bus_message_read(message, "t", &limit);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2016-06-08 20:04:22 +02:00
|
|
|
if (limit <= 0)
|
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "%s= is too small", name);
|
2013-06-27 21:50:35 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2013-09-17 21:58:00 +02:00
|
|
|
c->memory_limit = limit;
|
2015-09-11 18:21:53 +02:00
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_MEMORY);
|
2015-09-10 12:32:16 +02:00
|
|
|
|
|
|
|
if (limit == (uint64_t) -1)
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_setting(u, flags, name, "MemoryLimit=infinity");
|
2015-09-10 12:32:16 +02:00
|
|
|
else
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "MemoryLimit=%" PRIu64, limit);
|
2013-06-27 21:50:35 +02:00
|
|
|
}
|
|
|
|
|
2013-06-27 23:13:17 +02:00
|
|
|
return 1;
|
|
|
|
|
2016-07-19 16:10:15 +02:00
|
|
|
} else if (streq(name, "MemoryLimitScale")) {
|
2016-06-08 20:52:06 +02:00
|
|
|
uint64_t limit;
|
|
|
|
uint32_t raw;
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "u", &raw);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
limit = physical_memory_scale(raw, UINT32_MAX);
|
|
|
|
if (limit <= 0 || limit == UINT64_MAX)
|
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "%s= is out of range", name);
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2016-06-08 20:52:06 +02:00
|
|
|
c->memory_limit = limit;
|
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_MEMORY);
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, "MemoryLimit", "MemoryLimit=%" PRIu32 "%%",
|
2016-07-19 16:10:15 +02:00
|
|
|
(uint32_t) (DIV_ROUND_UP((uint64_t) raw * 100U, (uint64_t) UINT32_MAX)));
|
2016-06-08 20:52:06 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
2013-06-27 23:13:17 +02:00
|
|
|
} else if (streq(name, "DevicePolicy")) {
|
|
|
|
const char *policy;
|
|
|
|
CGroupDevicePolicy p;
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
r = sd_bus_message_read(message, "s", &policy);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-06-27 23:13:17 +02:00
|
|
|
|
|
|
|
p = cgroup_device_policy_from_string(policy);
|
|
|
|
if (p < 0)
|
|
|
|
return -EINVAL;
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2013-06-27 23:13:17 +02:00
|
|
|
c->device_policy = p;
|
2015-09-11 18:21:53 +02:00
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_DEVICES);
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "DevicePolicy=%s", policy);
|
2013-06-27 23:13:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
} else if (streq(name, "DeviceAllow")) {
|
2013-11-19 21:12:59 +01:00
|
|
|
const char *path, *rwm;
|
2013-06-27 23:13:17 +02:00
|
|
|
unsigned n = 0;
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
r = sd_bus_message_enter_container(message, 'a', "(ss)");
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-06-27 23:13:17 +02:00
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
while ((r = sd_bus_message_read(message, "(ss)", &path, &rwm)) > 0) {
|
2013-06-27 23:13:17 +02:00
|
|
|
|
2017-08-09 19:03:39 +02:00
|
|
|
if ((!path_startswith(path, "/dev/") &&
|
|
|
|
!path_startswith(path, "/run/systemd/inaccessible/") &&
|
2014-02-22 02:47:29 +01:00
|
|
|
!startswith(path, "block-") &&
|
|
|
|
!startswith(path, "char-")) ||
|
|
|
|
strpbrk(path, WHITESPACE))
|
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "DeviceAllow= requires device node");
|
2013-06-27 23:13:17 +02:00
|
|
|
|
|
|
|
if (isempty(rwm))
|
|
|
|
rwm = "rwm";
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
if (!in_charset(rwm, "rwm"))
|
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "DeviceAllow= requires combination of rwm flags");
|
2013-06-27 23:13:17 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2013-11-19 21:12:59 +01:00
|
|
|
CGroupDeviceAllow *a = NULL, *b;
|
2013-08-28 03:49:11 +02:00
|
|
|
|
|
|
|
LIST_FOREACH(device_allow, b, c->device_allow) {
|
2013-09-10 18:21:10 +02:00
|
|
|
if (path_equal(b->path, path)) {
|
2013-08-28 03:49:11 +02:00
|
|
|
a = b;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2013-11-19 21:12:59 +01:00
|
|
|
if (!a) {
|
2013-08-28 03:49:11 +02:00
|
|
|
a = new0(CGroupDeviceAllow, 1);
|
|
|
|
if (!a)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
a->path = strdup(path);
|
|
|
|
if (!a->path) {
|
|
|
|
free(a);
|
|
|
|
return -ENOMEM;
|
|
|
|
}
|
2013-11-19 21:12:59 +01:00
|
|
|
|
|
|
|
LIST_PREPEND(device_allow, c->device_allow, a);
|
2013-06-27 23:13:17 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
a->r = !!strchr(rwm, 'r');
|
|
|
|
a->w = !!strchr(rwm, 'w');
|
|
|
|
a->m = !!strchr(rwm, 'm');
|
|
|
|
}
|
|
|
|
|
2013-06-28 04:12:58 +02:00
|
|
|
n++;
|
2013-06-27 23:13:17 +02:00
|
|
|
}
|
2013-12-25 19:00:12 +01:00
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2013-06-27 23:13:17 +02:00
|
|
|
|
2014-02-24 02:59:57 +01:00
|
|
|
r = sd_bus_message_exit_container(message);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2013-06-27 23:13:17 +02:00
|
|
|
_cleanup_free_ char *buf = NULL;
|
|
|
|
_cleanup_fclose_ FILE *f = NULL;
|
|
|
|
CGroupDeviceAllow *a;
|
|
|
|
size_t size = 0;
|
|
|
|
|
|
|
|
if (n == 0) {
|
|
|
|
while (c->device_allow)
|
|
|
|
cgroup_context_free_device_allow(c, c->device_allow);
|
|
|
|
}
|
|
|
|
|
2015-09-11 18:21:53 +02:00
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_DEVICES);
|
2014-04-25 13:26:37 +02:00
|
|
|
|
2013-06-27 23:13:17 +02:00
|
|
|
f = open_memstream(&buf, &size);
|
|
|
|
if (!f)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
2017-07-21 10:35:45 +02:00
|
|
|
fputs_unlocked("DeviceAllow=\n", f);
|
2013-06-27 23:13:17 +02:00
|
|
|
LIST_FOREACH(device_allow, a, c->device_allow)
|
|
|
|
fprintf(f, "DeviceAllow=%s %s%s%s\n", a->path, a->r ? "r" : "", a->w ? "w" : "", a->m ? "m" : "");
|
|
|
|
|
2015-10-21 18:17:12 +02:00
|
|
|
r = fflush_and_check(f);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_setting(u, flags, name, buf);
|
2013-06-27 23:13:17 +02:00
|
|
|
}
|
|
|
|
|
2013-06-27 21:50:35 +02:00
|
|
|
return 1;
|
2014-11-05 17:57:23 +01:00
|
|
|
|
2015-09-10 12:32:16 +02:00
|
|
|
} else if (streq(name, "TasksAccounting")) {
|
|
|
|
int b;
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "b", &b);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2015-09-10 12:32:16 +02:00
|
|
|
c->tasks_accounting = b;
|
2015-09-11 18:21:53 +02:00
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_PIDS);
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "TasksAccounting=%s", yes_no(b));
|
2015-09-10 12:32:16 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
} else if (streq(name, "TasksMax")) {
|
|
|
|
uint64_t limit;
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "t", &limit);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2016-07-19 15:58:49 +02:00
|
|
|
if (limit <= 0)
|
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "%s= is too small", name);
|
2015-09-10 12:32:16 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2015-09-10 12:32:16 +02:00
|
|
|
c->tasks_max = limit;
|
2015-09-11 18:21:53 +02:00
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_PIDS);
|
2015-09-10 12:32:16 +02:00
|
|
|
|
|
|
|
if (limit == (uint64_t) -1)
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_setting(u, flags, name, "TasksMax=infinity");
|
2015-09-10 12:32:16 +02:00
|
|
|
else
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "TasksMax=%" PRIu64, limit);
|
2015-09-10 12:32:16 +02:00
|
|
|
}
|
|
|
|
|
2016-07-19 15:58:49 +02:00
|
|
|
return 1;
|
2017-09-05 11:16:35 +02:00
|
|
|
|
2016-07-19 15:58:49 +02:00
|
|
|
} else if (streq(name, "TasksMaxScale")) {
|
|
|
|
uint64_t limit;
|
|
|
|
uint32_t raw;
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "u", &raw);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
limit = system_tasks_max_scale(raw, UINT32_MAX);
|
|
|
|
if (limit <= 0 || limit >= UINT64_MAX)
|
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "%s= is out of range", name);
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2016-07-19 15:58:49 +02:00
|
|
|
c->tasks_max = limit;
|
|
|
|
unit_invalidate_cgroup(u, CGROUP_MASK_PIDS);
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "TasksMax=%" PRIu32 "%%",
|
|
|
|
(uint32_t) (DIV_ROUND_UP((uint64_t) raw * 100U, (uint64_t) UINT32_MAX)));
|
2016-07-19 15:58:49 +02:00
|
|
|
}
|
|
|
|
|
2017-09-05 11:16:35 +02:00
|
|
|
return 1;
|
|
|
|
|
|
|
|
} else if (streq(name, "IPAccounting")) {
|
|
|
|
int b;
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "b", &b);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2017-09-05 11:16:35 +02:00
|
|
|
c->ip_accounting = b;
|
|
|
|
|
|
|
|
unit_invalidate_cgroup_bpf(u);
|
2017-11-22 15:03:51 +01:00
|
|
|
unit_write_settingf(u, flags, name, "IPAccounting=%s", yes_no(b));
|
2017-09-05 11:16:35 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
return 1;
|
|
|
|
|
|
|
|
} else if (STR_IN_SET(name, "IPAddressAllow", "IPAddressDeny")) {
|
|
|
|
IPAddressAccessItem **list;
|
|
|
|
size_t n = 0;
|
|
|
|
|
|
|
|
list = streq(name, "IPAddressAllow") ? &c->ip_address_allow : &c->ip_address_deny;
|
|
|
|
|
|
|
|
r = sd_bus_message_enter_container(message, 'a', "(iayu)");
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
for (;;) {
|
|
|
|
const void *ap;
|
|
|
|
int32_t family;
|
|
|
|
uint32_t prefixlen;
|
|
|
|
size_t an;
|
|
|
|
|
|
|
|
r = sd_bus_message_enter_container(message, 'r', "iayu");
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
if (r == 0)
|
|
|
|
break;
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "i", &family);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
if (!IN_SET(family, AF_INET, AF_INET6))
|
2017-09-26 16:18:50 +02:00
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "%s= expects IPv4 or IPv6 addresses only.", name);
|
2017-09-05 11:16:35 +02:00
|
|
|
|
|
|
|
r = sd_bus_message_read_array(message, 'y', &ap, &an);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
if (an != FAMILY_ADDRESS_SIZE(family))
|
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "IP address has wrong size for family (%s, expected %zu, got %zu)",
|
|
|
|
af_to_name(family), FAMILY_ADDRESS_SIZE(family), an);
|
|
|
|
|
|
|
|
r = sd_bus_message_read(message, "u", &prefixlen);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
if (prefixlen > FAMILY_ADDRESS_SIZE(family)*8)
|
2017-09-26 16:18:50 +02:00
|
|
|
return sd_bus_error_set_errnof(error, EINVAL, "Prefix length %" PRIu32 " too large for address family %s.", prefixlen, af_to_name(family));
|
2017-09-05 11:16:35 +02:00
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2017-09-05 11:16:35 +02:00
|
|
|
IPAddressAccessItem *item;
|
|
|
|
|
|
|
|
item = new0(IPAddressAccessItem, 1);
|
|
|
|
if (!item)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
item->family = family;
|
|
|
|
item->prefixlen = prefixlen;
|
|
|
|
memcpy(&item->address, ap, an);
|
|
|
|
|
|
|
|
LIST_PREPEND(items, *list, item);
|
|
|
|
}
|
|
|
|
|
|
|
|
r = sd_bus_message_exit_container(message);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
|
|
|
n++;
|
|
|
|
}
|
|
|
|
|
|
|
|
r = sd_bus_message_exit_container(message);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
|
|
|
|
2017-09-05 17:41:34 +02:00
|
|
|
*list = ip_address_access_reduce(*list);
|
|
|
|
|
2017-11-22 15:03:51 +01:00
|
|
|
if (!UNIT_WRITE_FLAGS_NOOP(flags)) {
|
2017-09-05 11:16:35 +02:00
|
|
|
_cleanup_free_ char *buf = NULL;
|
|
|
|
_cleanup_fclose_ FILE *f = NULL;
|
|
|
|
IPAddressAccessItem *item;
|
|
|
|
size_t size = 0;
|
|
|
|
|
|
|
|
if (n == 0)
|
|
|
|
*list = ip_address_access_free_all(*list);
|
|
|
|
|
|
|
|
unit_invalidate_cgroup_bpf(u);
|
|
|
|
f = open_memstream(&buf, &size);
|
|
|
|
if (!f)
|
|
|
|
return -ENOMEM;
|
|
|
|
|
|
|
|
fputs_unlocked(name, f);
|
|
|
|
fputs_unlocked("=\n", f);
|
|
|
|
|
|
|
|
LIST_FOREACH(items, item, *list) {
|
|
|
|
char buffer[CONST_MAX(INET_ADDRSTRLEN, INET6_ADDRSTRLEN)];
|
|
|
|
|
|
|
|
errno = 0;
|
|
|
|
if (!inet_ntop(item->family, &item->address, buffer, sizeof(buffer)))
|
|
|
|
return errno > 0 ? -errno : -EINVAL;
|
|
|
|
|
|
|
|
fprintf(f, "%s=%s/%u\n", name, buffer, item->prefixlen);
|
|
|
|
}
|
|
|
|
|
|
|
|
r = fflush_and_check(f);
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2017-11-22 15:03:51 +01:00
|
|
|
|
|
|
|
unit_write_setting(u, flags, name, buf);
|
2017-09-06 17:56:15 +02:00
|
|
|
|
|
|
|
if (*list) {
|
|
|
|
r = bpf_firewall_supported();
|
|
|
|
if (r < 0)
|
|
|
|
return r;
|
2017-11-13 22:02:51 +01:00
|
|
|
if (r == 0) {
|
|
|
|
static bool warned = false;
|
|
|
|
|
|
|
|
log_full(warned ? LOG_DEBUG : LOG_WARNING,
|
|
|
|
"Transient unit %s configures an IP firewall, but the local system does not support BPF/cgroup firewalling.\n"
|
|
|
|
"Proceeding WITHOUT firewalling in effect! (This warning is only shown for the first started transient unit using IP firewalling.)", u->id);
|
|
|
|
|
|
|
|
warned = true;
|
|
|
|
}
|
2017-09-06 17:56:15 +02:00
|
|
|
}
|
2017-09-05 11:16:35 +02:00
|
|
|
}
|
|
|
|
|
2015-09-10 12:32:16 +02:00
|
|
|
return 1;
|
2014-11-05 17:57:23 +01:00
|
|
|
}
|
|
|
|
|
|
|
|
if (u->transient && u->load_state == UNIT_STUB) {
|
2017-11-22 15:03:51 +01:00
|
|
|
r = bus_cgroup_set_transient_property(u, c, name, message, flags, error);
|
2014-11-05 17:57:23 +01:00
|
|
|
if (r != 0)
|
|
|
|
return r;
|
|
|
|
|
2013-06-27 21:50:35 +02:00
|
|
|
}
|
2013-06-27 21:14:56 +02:00
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|