2018-08-17 08:19:59 +00:00
|
|
|
/*
|
|
|
|
* vircgroupv1.c: methods for cgroups v1 backend
|
|
|
|
*
|
|
|
|
* Copyright (C) 2010-2015,2018 Red Hat, Inc.
|
|
|
|
* Copyright IBM Corp. 2008
|
|
|
|
*
|
|
|
|
* This library is free software; you can redistribute it and/or
|
|
|
|
* modify it under the terms of the GNU Lesser General Public
|
|
|
|
* License as published by the Free Software Foundation; either
|
|
|
|
* version 2.1 of the License, or (at your option) any later version.
|
|
|
|
*
|
|
|
|
* This library is distributed in the hope that it will be useful,
|
|
|
|
* but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
|
|
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
|
|
* Lesser General Public License for more details.
|
|
|
|
*
|
|
|
|
* You should have received a copy of the GNU Lesser General Public
|
|
|
|
* License along with this library. If not, see
|
|
|
|
* <http://www.gnu.org/licenses/>.
|
|
|
|
*/
|
|
|
|
#include <config.h>
|
|
|
|
|
2018-09-13 14:27:56 +00:00
|
|
|
#if defined HAVE_MNTENT_H && defined HAVE_GETMNTENT_R
|
|
|
|
# include <mntent.h>
|
|
|
|
#endif
|
2018-09-14 10:51:27 +00:00
|
|
|
#include <sys/stat.h>
|
2018-09-13 14:27:56 +00:00
|
|
|
|
2018-08-17 08:19:59 +00:00
|
|
|
#include "internal.h"
|
|
|
|
|
|
|
|
#define __VIR_CGROUP_ALLOW_INCLUDE_PRIV_H__
|
|
|
|
#include "vircgrouppriv.h"
|
|
|
|
#undef __VIR_CGROUP_ALLOW_INCLUDE_PRIV_H__
|
|
|
|
|
|
|
|
#include "vircgroup.h"
|
|
|
|
#include "vircgroupbackend.h"
|
|
|
|
#include "vircgroupv1.h"
|
2018-09-13 14:27:56 +00:00
|
|
|
#include "virfile.h"
|
2018-08-17 08:19:59 +00:00
|
|
|
#include "virlog.h"
|
2018-09-14 11:21:19 +00:00
|
|
|
#include "virstring.h"
|
|
|
|
#include "virsystemd.h"
|
2018-09-14 10:51:27 +00:00
|
|
|
#include "virerror.h"
|
2018-08-17 08:19:59 +00:00
|
|
|
|
|
|
|
VIR_LOG_INIT("util.cgroup");
|
|
|
|
|
|
|
|
#define VIR_FROM_THIS VIR_FROM_CGROUP
|
|
|
|
|
|
|
|
|
|
|
|
VIR_ENUM_DECL(virCgroupV1Controller);
|
|
|
|
VIR_ENUM_IMPL(virCgroupV1Controller, VIR_CGROUP_CONTROLLER_LAST,
|
|
|
|
"cpu", "cpuacct", "cpuset", "memory", "devices",
|
|
|
|
"freezer", "blkio", "net_cls", "perf_event",
|
|
|
|
"name=systemd");
|
|
|
|
|
|
|
|
|
2018-09-13 14:27:56 +00:00
|
|
|
/* We're looking for at least one 'cgroup' fs mount,
|
|
|
|
* which is *not* a named mount. */
|
|
|
|
static bool
|
|
|
|
virCgroupV1Available(void)
|
|
|
|
{
|
|
|
|
bool ret = false;
|
|
|
|
FILE *mounts = NULL;
|
|
|
|
struct mntent entry;
|
|
|
|
char buf[CGROUP_MAX_VAL];
|
|
|
|
|
|
|
|
if (!virFileExists("/proc/cgroups"))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (!(mounts = fopen("/proc/mounts", "r")))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
while (getmntent_r(mounts, &entry, buf, sizeof(buf)) != NULL) {
|
|
|
|
if (STREQ(entry.mnt_type, "cgroup") && !strstr(entry.mnt_opts, "name=")) {
|
|
|
|
ret = true;
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
VIR_FORCE_FCLOSE(mounts);
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-09-14 11:21:19 +00:00
|
|
|
static bool
|
|
|
|
virCgroupV1ValidateMachineGroup(virCgroupPtr group,
|
|
|
|
const char *name,
|
|
|
|
const char *drivername,
|
|
|
|
const char *machinename)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
VIR_AUTOFREE(char *) partname = NULL;
|
|
|
|
VIR_AUTOFREE(char *) scopename_old = NULL;
|
|
|
|
VIR_AUTOFREE(char *) scopename_new = NULL;
|
|
|
|
VIR_AUTOFREE(char *) partmachinename = NULL;
|
|
|
|
|
|
|
|
if (virAsprintf(&partname, "%s.libvirt-%s",
|
|
|
|
name, drivername) < 0)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (virCgroupPartitionEscape(&partname) < 0)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (virAsprintf(&partmachinename, "%s.libvirt-%s",
|
|
|
|
machinename, drivername) < 0 ||
|
|
|
|
virCgroupPartitionEscape(&partmachinename) < 0)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (!(scopename_old = virSystemdMakeScopeName(name, drivername, true)))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (!(scopename_new = virSystemdMakeScopeName(machinename,
|
|
|
|
drivername, false)))
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (virCgroupPartitionEscape(&scopename_old) < 0)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (virCgroupPartitionEscape(&scopename_new) < 0)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
for (i = 0; i < VIR_CGROUP_CONTROLLER_LAST; i++) {
|
|
|
|
char *tmp;
|
|
|
|
|
|
|
|
if (i == VIR_CGROUP_CONTROLLER_SYSTEMD)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (!group->controllers[i].placement)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
tmp = strrchr(group->controllers[i].placement, '/');
|
|
|
|
if (!tmp)
|
|
|
|
return false;
|
|
|
|
|
|
|
|
if (i == VIR_CGROUP_CONTROLLER_CPU ||
|
|
|
|
i == VIR_CGROUP_CONTROLLER_CPUACCT ||
|
|
|
|
i == VIR_CGROUP_CONTROLLER_CPUSET) {
|
|
|
|
if (STREQ(tmp, "/emulator"))
|
|
|
|
*tmp = '\0';
|
|
|
|
tmp = strrchr(group->controllers[i].placement, '/');
|
|
|
|
if (!tmp)
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
tmp++;
|
|
|
|
|
|
|
|
if (STRNEQ(tmp, name) &&
|
|
|
|
STRNEQ(tmp, machinename) &&
|
|
|
|
STRNEQ(tmp, partname) &&
|
|
|
|
STRNEQ(tmp, partmachinename) &&
|
|
|
|
STRNEQ(tmp, scopename_old) &&
|
|
|
|
STRNEQ(tmp, scopename_new)) {
|
|
|
|
VIR_DEBUG("Name '%s' for controller '%s' does not match "
|
|
|
|
"'%s', '%s', '%s', '%s' or '%s'",
|
|
|
|
tmp, virCgroupV1ControllerTypeToString(i),
|
|
|
|
name, machinename, partname,
|
|
|
|
scopename_old, scopename_new);
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-08-17 07:46:10 +00:00
|
|
|
static int
|
|
|
|
virCgroupV1CopyMounts(virCgroupPtr group,
|
|
|
|
virCgroupPtr parent)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
for (i = 0; i < VIR_CGROUP_CONTROLLER_LAST; i++) {
|
|
|
|
if (!parent->controllers[i].mountPoint)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (VIR_STRDUP(group->controllers[i].mountPoint,
|
|
|
|
parent->controllers[i].mountPoint) < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
if (VIR_STRDUP(group->controllers[i].linkPoint,
|
|
|
|
parent->controllers[i].linkPoint) < 0)
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-09-14 10:53:47 +00:00
|
|
|
static int
|
|
|
|
virCgroupV1CopyPlacement(virCgroupPtr group,
|
|
|
|
const char *path,
|
|
|
|
virCgroupPtr parent)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
for (i = 0; i < VIR_CGROUP_CONTROLLER_LAST; i++) {
|
|
|
|
if (!group->controllers[i].mountPoint)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (i == VIR_CGROUP_CONTROLLER_SYSTEMD)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (path[0] == '/') {
|
|
|
|
if (VIR_STRDUP(group->controllers[i].placement, path) < 0)
|
|
|
|
return -1;
|
|
|
|
} else {
|
|
|
|
/*
|
|
|
|
* parent == "/" + path="" => "/"
|
|
|
|
* parent == "/libvirt.service" + path == "" => "/libvirt.service"
|
|
|
|
* parent == "/libvirt.service" + path == "foo" => "/libvirt.service/foo"
|
|
|
|
*/
|
|
|
|
if (virAsprintf(&group->controllers[i].placement,
|
|
|
|
"%s%s%s",
|
|
|
|
parent->controllers[i].placement,
|
|
|
|
(STREQ(parent->controllers[i].placement, "/") ||
|
|
|
|
STREQ(path, "") ? "" : "/"),
|
|
|
|
path) < 0)
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-09-14 10:51:27 +00:00
|
|
|
static int
|
|
|
|
virCgroupV1ResolveMountLink(const char *mntDir,
|
|
|
|
const char *typeStr,
|
|
|
|
virCgroupControllerPtr controller)
|
|
|
|
{
|
|
|
|
VIR_AUTOFREE(char *) linkSrc = NULL;
|
|
|
|
VIR_AUTOFREE(char *) tmp = NULL;
|
|
|
|
char *dirName;
|
|
|
|
struct stat sb;
|
|
|
|
|
|
|
|
if (VIR_STRDUP(tmp, mntDir) < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
dirName = strrchr(tmp, '/');
|
|
|
|
if (!dirName) {
|
|
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
|
|
_("Missing '/' separator in cgroup mount '%s'"), tmp);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (!strchr(dirName + 1, ','))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
*dirName = '\0';
|
|
|
|
if (virAsprintf(&linkSrc, "%s/%s", tmp, typeStr) < 0)
|
|
|
|
return -1;
|
|
|
|
*dirName = '/';
|
|
|
|
|
|
|
|
if (lstat(linkSrc, &sb) < 0) {
|
|
|
|
if (errno == ENOENT) {
|
|
|
|
VIR_WARN("Controller %s co-mounted at %s is missing symlink at %s",
|
|
|
|
typeStr, tmp, linkSrc);
|
|
|
|
} else {
|
|
|
|
virReportSystemError(errno, _("Cannot stat %s"), linkSrc);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
if (!S_ISLNK(sb.st_mode)) {
|
|
|
|
VIR_WARN("Expecting a symlink at %s for controller %s",
|
|
|
|
linkSrc, typeStr);
|
|
|
|
} else {
|
|
|
|
VIR_STEAL_PTR(controller->linkPoint, linkSrc);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static bool
|
|
|
|
virCgroupV1MountOptsMatchController(const char *mntOpts,
|
|
|
|
const char *typeStr)
|
|
|
|
{
|
|
|
|
const char *tmp = mntOpts;
|
|
|
|
int typeLen = strlen(typeStr);
|
|
|
|
|
|
|
|
while (tmp) {
|
|
|
|
const char *next = strchr(tmp, ',');
|
|
|
|
int len;
|
|
|
|
if (next) {
|
|
|
|
len = next - tmp;
|
|
|
|
next++;
|
|
|
|
} else {
|
|
|
|
len = strlen(tmp);
|
|
|
|
}
|
|
|
|
|
|
|
|
if (typeLen == len && STREQLEN(typeStr, tmp, len))
|
|
|
|
return true;
|
|
|
|
|
|
|
|
tmp = next;
|
|
|
|
}
|
|
|
|
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
virCgroupV1DetectMounts(virCgroupPtr group,
|
|
|
|
const char *mntType,
|
|
|
|
const char *mntOpts,
|
|
|
|
const char *mntDir)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
if (STRNEQ(mntType, "cgroup"))
|
|
|
|
return 0;
|
|
|
|
|
|
|
|
for (i = 0; i < VIR_CGROUP_CONTROLLER_LAST; i++) {
|
|
|
|
const char *typestr = virCgroupV1ControllerTypeToString(i);
|
|
|
|
|
|
|
|
if (virCgroupV1MountOptsMatchController(mntOpts, typestr)) {
|
|
|
|
/* Note that the lines in /proc/mounts have the same
|
|
|
|
* order than the mount operations, and that there may
|
|
|
|
* be duplicates due to bind mounts. This means
|
|
|
|
* that the same mount point may be processed more than
|
|
|
|
* once. We need to save the results of the last one,
|
|
|
|
* and we need to be careful to release the memory used
|
|
|
|
* by previous processing. */
|
|
|
|
virCgroupControllerPtr controller = &group->controllers[i];
|
|
|
|
|
|
|
|
VIR_FREE(controller->mountPoint);
|
|
|
|
VIR_FREE(controller->linkPoint);
|
|
|
|
if (VIR_STRDUP(controller->mountPoint, mntDir) < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
/* If it is a co-mount it has a filename like "cpu,cpuacct"
|
|
|
|
* and we must identify the symlink path */
|
|
|
|
if (virCgroupV1ResolveMountLink(mntDir, typestr, controller) < 0)
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static int
|
|
|
|
virCgroupV1DetectPlacement(virCgroupPtr group,
|
|
|
|
const char *path,
|
|
|
|
const char *controllers,
|
|
|
|
const char *selfpath)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
for (i = 0; i < VIR_CGROUP_CONTROLLER_LAST; i++) {
|
|
|
|
const char *typestr = virCgroupV1ControllerTypeToString(i);
|
|
|
|
|
|
|
|
if (virCgroupV1MountOptsMatchController(controllers, typestr) &&
|
|
|
|
group->controllers[i].mountPoint != NULL &&
|
|
|
|
group->controllers[i].placement == NULL) {
|
|
|
|
/*
|
|
|
|
* selfpath == "/" + path="" -> "/"
|
|
|
|
* selfpath == "/libvirt.service" + path == "" -> "/libvirt.service"
|
|
|
|
* selfpath == "/libvirt.service" + path == "foo" -> "/libvirt.service/foo"
|
|
|
|
*/
|
|
|
|
if (i == VIR_CGROUP_CONTROLLER_SYSTEMD) {
|
|
|
|
if (VIR_STRDUP(group->controllers[i].placement,
|
|
|
|
selfpath) < 0)
|
|
|
|
return -1;
|
|
|
|
} else {
|
|
|
|
if (virAsprintf(&group->controllers[i].placement,
|
|
|
|
"%s%s%s", selfpath,
|
|
|
|
(STREQ(selfpath, "/") ||
|
|
|
|
STREQ(path, "") ? "" : "/"),
|
|
|
|
path) < 0)
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-08-24 13:15:23 +00:00
|
|
|
static int
|
|
|
|
virCgroupV1ValidatePlacement(virCgroupPtr group,
|
|
|
|
pid_t pid)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
for (i = 0; i < VIR_CGROUP_CONTROLLER_LAST; i++) {
|
|
|
|
if (!group->controllers[i].mountPoint)
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (!group->controllers[i].placement) {
|
|
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
|
|
_("Could not find placement for v1 controller %s at %s"),
|
|
|
|
virCgroupV1ControllerTypeToString(i),
|
|
|
|
group->controllers[i].placement);
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
VIR_DEBUG("Detected mount/mapping %zu:%s at %s in %s for pid %lld",
|
|
|
|
i,
|
|
|
|
virCgroupV1ControllerTypeToString(i),
|
|
|
|
group->controllers[i].mountPoint,
|
|
|
|
group->controllers[i].placement,
|
|
|
|
(long long) pid);
|
|
|
|
}
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-08-17 10:00:29 +00:00
|
|
|
static char *
|
|
|
|
virCgroupV1StealPlacement(virCgroupPtr group)
|
|
|
|
{
|
|
|
|
char *ret = NULL;
|
|
|
|
|
|
|
|
VIR_STEAL_PTR(ret, group->controllers[VIR_CGROUP_CONTROLLER_SYSTEMD].placement);
|
|
|
|
|
|
|
|
return ret;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-09-24 23:12:22 +00:00
|
|
|
static int
|
|
|
|
virCgroupV1DetectControllers(virCgroupPtr group,
|
|
|
|
int controllers)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
size_t j;
|
|
|
|
|
|
|
|
if (controllers >= 0) {
|
|
|
|
VIR_DEBUG("Filtering controllers %d", controllers);
|
|
|
|
/* First mark requested but non-existing controllers to be ignored */
|
|
|
|
for (i = 0; i < VIR_CGROUP_CONTROLLER_LAST; i++) {
|
|
|
|
if (((1 << i) & controllers)) {
|
|
|
|
/* Remove non-existent controllers */
|
|
|
|
if (!group->controllers[i].mountPoint) {
|
|
|
|
VIR_DEBUG("Requested controller '%s' not mounted, ignoring",
|
|
|
|
virCgroupV1ControllerTypeToString(i));
|
|
|
|
controllers &= ~(1 << i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
for (i = 0; i < VIR_CGROUP_CONTROLLER_LAST; i++) {
|
|
|
|
VIR_DEBUG("Controller '%s' wanted=%s, mount='%s'",
|
|
|
|
virCgroupV1ControllerTypeToString(i),
|
|
|
|
(1 << i) & controllers ? "yes" : "no",
|
|
|
|
NULLSTR(group->controllers[i].mountPoint));
|
|
|
|
if (!((1 << i) & controllers) &&
|
|
|
|
group->controllers[i].mountPoint) {
|
|
|
|
/* Check whether a request to disable a controller
|
|
|
|
* clashes with co-mounting of controllers */
|
|
|
|
for (j = 0; j < VIR_CGROUP_CONTROLLER_LAST; j++) {
|
|
|
|
if (j == i)
|
|
|
|
continue;
|
|
|
|
if (!((1 << j) & controllers))
|
|
|
|
continue;
|
|
|
|
|
|
|
|
if (STREQ_NULLABLE(group->controllers[i].mountPoint,
|
|
|
|
group->controllers[j].mountPoint)) {
|
|
|
|
virReportSystemError(EINVAL,
|
|
|
|
_("V1 controller '%s' is not wanted, but '%s' is co-mounted"),
|
|
|
|
virCgroupV1ControllerTypeToString(i),
|
|
|
|
virCgroupV1ControllerTypeToString(j));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
VIR_FREE(group->controllers[i].mountPoint);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
VIR_DEBUG("Auto-detecting controllers");
|
|
|
|
controllers = 0;
|
|
|
|
for (i = 0; i < VIR_CGROUP_CONTROLLER_LAST; i++) {
|
|
|
|
VIR_DEBUG("Controller '%s' present=%s",
|
|
|
|
virCgroupV1ControllerTypeToString(i),
|
|
|
|
group->controllers[i].mountPoint ? "yes" : "no");
|
|
|
|
if (group->controllers[i].mountPoint == NULL)
|
|
|
|
continue;
|
|
|
|
controllers |= (1 << i);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return controllers;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-08-19 17:17:27 +00:00
|
|
|
static bool
|
|
|
|
virCgroupV1HasController(virCgroupPtr group,
|
|
|
|
int controller)
|
|
|
|
{
|
|
|
|
return group->controllers[controller].mountPoint != NULL;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-08-19 17:20:25 +00:00
|
|
|
static int
|
|
|
|
virCgroupV1GetAnyController(virCgroupPtr group)
|
|
|
|
{
|
|
|
|
size_t i;
|
|
|
|
|
|
|
|
for (i = 0; i < VIR_CGROUP_CONTROLLER_LAST; i++) {
|
|
|
|
/* Reject any controller with a placement
|
|
|
|
* of '/' to avoid doing bad stuff to the root
|
|
|
|
* cgroup
|
|
|
|
*/
|
|
|
|
if (group->controllers[i].mountPoint &&
|
|
|
|
group->controllers[i].placement &&
|
|
|
|
STRNEQ(group->controllers[i].placement, "/")) {
|
|
|
|
return i;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-08-19 17:24:58 +00:00
|
|
|
static int
|
|
|
|
virCgroupV1PathOfController(virCgroupPtr group,
|
|
|
|
int controller,
|
|
|
|
const char *key,
|
|
|
|
char **path)
|
|
|
|
{
|
|
|
|
if (group->controllers[controller].mountPoint == NULL) {
|
|
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
|
|
_("v1 controller '%s' is not mounted"),
|
|
|
|
virCgroupV1ControllerTypeToString(controller));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (group->controllers[controller].placement == NULL) {
|
|
|
|
virReportError(VIR_ERR_INTERNAL_ERROR,
|
|
|
|
_("v1 controller '%s' is not enabled for group"),
|
|
|
|
virCgroupV1ControllerTypeToString(controller));
|
|
|
|
return -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (virAsprintf(path, "%s%s/%s",
|
|
|
|
group->controllers[controller].mountPoint,
|
|
|
|
group->controllers[controller].placement,
|
|
|
|
key ? key : "") < 0)
|
|
|
|
return -1;
|
|
|
|
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2018-08-17 08:19:59 +00:00
|
|
|
virCgroupBackend virCgroupV1Backend = {
|
|
|
|
.type = VIR_CGROUP_BACKEND_TYPE_V1,
|
2018-09-13 14:27:56 +00:00
|
|
|
|
|
|
|
.available = virCgroupV1Available,
|
2018-09-14 11:21:19 +00:00
|
|
|
.validateMachineGroup = virCgroupV1ValidateMachineGroup,
|
2018-08-17 07:46:10 +00:00
|
|
|
.copyMounts = virCgroupV1CopyMounts,
|
2018-09-14 10:53:47 +00:00
|
|
|
.copyPlacement = virCgroupV1CopyPlacement,
|
2018-09-14 10:51:27 +00:00
|
|
|
.detectMounts = virCgroupV1DetectMounts,
|
|
|
|
.detectPlacement = virCgroupV1DetectPlacement,
|
2018-08-24 13:15:23 +00:00
|
|
|
.validatePlacement = virCgroupV1ValidatePlacement,
|
2018-08-17 10:00:29 +00:00
|
|
|
.stealPlacement = virCgroupV1StealPlacement,
|
2018-09-24 23:12:22 +00:00
|
|
|
.detectControllers = virCgroupV1DetectControllers,
|
2018-08-19 17:17:27 +00:00
|
|
|
.hasController = virCgroupV1HasController,
|
2018-08-19 17:20:25 +00:00
|
|
|
.getAnyController = virCgroupV1GetAnyController,
|
2018-08-19 17:24:58 +00:00
|
|
|
.pathOfController = virCgroupV1PathOfController,
|
2018-08-17 08:19:59 +00:00
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
void
|
|
|
|
virCgroupV1Register(void)
|
|
|
|
{
|
|
|
|
virCgroupBackendRegister(&virCgroupV1Backend);
|
|
|
|
}
|