Compare commits
No commits in common. "c37a43d2ddf7a380ade9b7233817c280e2a51fd1" and "397cca2453465d4ad5a51b16ad71acf45a3de352" have entirely different histories.
c37a43d2dd
...
397cca2453
|
@ -318,14 +318,6 @@ layout: default
|
|||
unlink("/foo/bar/baz");
|
||||
```
|
||||
|
||||
When returning from a `void` function, you may also want to shorten the error
|
||||
path boilerplate by returning a function invocation cast to `(void)` like so:
|
||||
|
||||
```c
|
||||
if (condition_not_met)
|
||||
return (void) log_tests_skipped("Cannot run ...");
|
||||
```
|
||||
|
||||
Don't cast function calls to `(void)` that return no error
|
||||
conditions. Specifically, the various `xyz_unref()` calls that return a
|
||||
`NULL` object shouldn't be cast to `(void)`, since not using the return value
|
||||
|
|
|
@ -1422,7 +1422,6 @@ else
|
|||
endif
|
||||
endif
|
||||
conf.set10('ENABLE_OOMD', have)
|
||||
substs.set10('ENABLE_OOMD', have)
|
||||
|
||||
want_remote = get_option('remote')
|
||||
if want_remote != 'false'
|
||||
|
@ -1463,6 +1462,7 @@ foreach term : ['analyze',
|
|||
'networkd',
|
||||
'nss-myhostname',
|
||||
'nss-systemd',
|
||||
'oomd',
|
||||
'portabled',
|
||||
'pstore',
|
||||
'quotacheck',
|
||||
|
|
|
@ -989,7 +989,7 @@ static int automount_dispatch_io(sd_event_source *s, int fd, uint32_t events, vo
|
|||
if (packet.v5_packet.pid > 0) {
|
||||
_cleanup_free_ char *p = NULL;
|
||||
|
||||
(void) get_process_comm(packet.v5_packet.pid, &p);
|
||||
get_process_comm(packet.v5_packet.pid, &p);
|
||||
log_unit_info(UNIT(a), "Got automount request for %s, triggered by %"PRIu32" (%s)", a->where, packet.v5_packet.pid, strna(p));
|
||||
} else
|
||||
log_unit_debug(UNIT(a), "Got direct mount request on %s", a->where);
|
||||
|
|
|
@ -2422,29 +2422,6 @@ void unit_release_cgroup(Unit *u) {
|
|||
}
|
||||
}
|
||||
|
||||
bool unit_maybe_release_cgroup(Unit *u) {
|
||||
int r;
|
||||
|
||||
assert(u);
|
||||
|
||||
if (!u->cgroup_path)
|
||||
return true;
|
||||
|
||||
/* Don't release the cgroup if there are still processes under it. If we get notified later when all the
|
||||
* processes exit (e.g. the processes were in D-state and exited after the unit was marked as failed)
|
||||
* we need the cgroup paths to continue to be tracked by the manager so they can be looked up and cleaned
|
||||
* up later. */
|
||||
r = cg_is_empty_recursive(SYSTEMD_CGROUP_CONTROLLER, u->cgroup_path);
|
||||
if (r < 0)
|
||||
log_unit_debug_errno(u, r, "Error checking if the cgroup is recursively empty, ignoring: %m");
|
||||
else if (r == 1) {
|
||||
unit_release_cgroup(u);
|
||||
return true;
|
||||
}
|
||||
|
||||
return false;
|
||||
}
|
||||
|
||||
void unit_prune_cgroup(Unit *u) {
|
||||
int r;
|
||||
bool is_root_slice;
|
||||
|
@ -2472,8 +2449,7 @@ void unit_prune_cgroup(Unit *u) {
|
|||
if (is_root_slice)
|
||||
return;
|
||||
|
||||
if (!unit_maybe_release_cgroup(u)) /* Returns true if the cgroup was released */
|
||||
return;
|
||||
unit_release_cgroup(u);
|
||||
|
||||
u->cgroup_realized = false;
|
||||
u->cgroup_realized_mask = 0;
|
||||
|
|
|
@ -223,15 +223,11 @@ int unit_set_cgroup_path(Unit *u, const char *path);
|
|||
int unit_pick_cgroup_path(Unit *u);
|
||||
|
||||
int unit_realize_cgroup(Unit *u);
|
||||
void unit_release_cgroup(Unit *u);
|
||||
void unit_prune_cgroup(Unit *u);
|
||||
int unit_watch_cgroup(Unit *u);
|
||||
int unit_watch_cgroup_memory(Unit *u);
|
||||
|
||||
void unit_release_cgroup(Unit *u);
|
||||
/* Releases the cgroup only if it is recursively empty.
|
||||
* Returns true if the cgroup was released, false otherwise. */
|
||||
bool unit_maybe_release_cgroup(Unit *u);
|
||||
|
||||
void unit_add_to_cgroup_empty_queue(Unit *u);
|
||||
int unit_check_oomd_kill(Unit *u);
|
||||
int unit_check_oom(Unit *u);
|
||||
|
|
|
@ -214,7 +214,7 @@ static int killall(int sig, Set *pids, bool send_sighup) {
|
|||
if (sig == SIGKILL) {
|
||||
_cleanup_free_ char *s = NULL;
|
||||
|
||||
(void) get_process_comm(pid, &s);
|
||||
get_process_comm(pid, &s);
|
||||
log_notice("Sending SIGKILL to PID "PID_FMT" (%s).", pid, strna(s));
|
||||
}
|
||||
|
||||
|
|
|
@ -487,11 +487,6 @@ static void scope_notify_cgroup_empty_event(Unit *u) {
|
|||
|
||||
if (IN_SET(s->state, SCOPE_RUNNING, SCOPE_ABANDONED, SCOPE_STOP_SIGTERM, SCOPE_STOP_SIGKILL))
|
||||
scope_enter_dead(s, SCOPE_SUCCESS);
|
||||
|
||||
/* If the cgroup empty notification comes when the unit is not active, we must have failed to clean
|
||||
* up the cgroup earlier and should do it now. */
|
||||
if (IN_SET(s->state, SCOPE_DEAD, SCOPE_FAILED))
|
||||
unit_prune_cgroup(u);
|
||||
}
|
||||
|
||||
static void scope_sigchld_event(Unit *u, pid_t pid, int code, int status) {
|
||||
|
|
|
@ -3330,13 +3330,6 @@ static void service_notify_cgroup_empty_event(Unit *u) {
|
|||
|
||||
break;
|
||||
|
||||
/* If the cgroup empty notification comes when the unit is not active, we must have failed to clean
|
||||
* up the cgroup earlier and should do it now. */
|
||||
case SERVICE_DEAD:
|
||||
case SERVICE_FAILED:
|
||||
unit_prune_cgroup(u);
|
||||
break;
|
||||
|
||||
default:
|
||||
;
|
||||
}
|
||||
|
|
|
@ -66,7 +66,7 @@ void server_forward_console(
|
|||
/* Second: identifier and PID */
|
||||
if (ucred) {
|
||||
if (!identifier) {
|
||||
(void) get_process_comm(ucred->pid, &ident_buf);
|
||||
get_process_comm(ucred->pid, &ident_buf);
|
||||
identifier = ident_buf;
|
||||
}
|
||||
|
||||
|
|
|
@ -58,7 +58,7 @@ void server_forward_kmsg(
|
|||
/* Second: identifier and PID */
|
||||
if (ucred) {
|
||||
if (!identifier) {
|
||||
(void) get_process_comm(ucred->pid, &ident_buf);
|
||||
get_process_comm(ucred->pid, &ident_buf);
|
||||
identifier = ident_buf;
|
||||
}
|
||||
|
||||
|
|
|
@ -153,7 +153,7 @@ void server_forward_syslog(Server *s, int priority, const char *identifier, cons
|
|||
/* Third: identifier and PID */
|
||||
if (ucred) {
|
||||
if (!identifier) {
|
||||
(void) get_process_comm(ucred->pid, &ident_buf);
|
||||
get_process_comm(ucred->pid, &ident_buf);
|
||||
identifier = ident_buf;
|
||||
}
|
||||
|
||||
|
|
|
@ -27,7 +27,7 @@ void server_forward_wall(
|
|||
|
||||
if (ucred) {
|
||||
if (!identifier) {
|
||||
(void) get_process_comm(ucred->pid, &ident_buf);
|
||||
get_process_comm(ucred->pid, &ident_buf);
|
||||
identifier = ident_buf;
|
||||
}
|
||||
|
||||
|
|
|
@ -485,7 +485,7 @@ static int print_session_status_info(sd_bus *bus, const char *path, bool *new_li
|
|||
|
||||
printf("\t Leader: %"PRIu32, i.leader);
|
||||
|
||||
(void) get_process_comm(i.leader, &t);
|
||||
get_process_comm(i.leader, &t);
|
||||
if (t)
|
||||
printf(" (%s)", t);
|
||||
|
||||
|
|
|
@ -2782,7 +2782,7 @@ int link_update(Link *link, sd_netlink_message *m) {
|
|||
if (r < 0)
|
||||
return log_link_warning_errno(link, r, "Could not update MAC address in DHCPv6 client: %m");
|
||||
|
||||
r = radv_update_mac(link);
|
||||
r = dhcp6_update_mac(link);
|
||||
if (r < 0)
|
||||
return log_link_warning_errno(link, r, "Could not update MAC address for Router Advertisement: %m");
|
||||
|
||||
|
|
|
@ -146,7 +146,7 @@ int logind_check_inhibitors(enum action a) {
|
|||
ACTION_KEXEC) ? "shutdown" : "sleep"))
|
||||
continue;
|
||||
|
||||
(void) get_process_comm(pid, &comm);
|
||||
get_process_comm(pid, &comm);
|
||||
user = uid_to_name(uid);
|
||||
|
||||
log_warning("Operation inhibited by \"%s\" (PID "PID_FMT" \"%s\", user %s), reason is \"%s\".",
|
||||
|
|
|
@ -1,9 +0,0 @@
|
|||
[Unit]
|
||||
Description=Create a lot of memory pressure
|
||||
|
||||
[Service]
|
||||
# A very small memory.high will cause the script (trying to use a lot of memory)
|
||||
# to throttle and be put under heavy pressure
|
||||
MemoryHigh=2M
|
||||
Slice=testsuite-56-workload.slice
|
||||
ExecStart=/usr/lib/systemd/tests/testdata/units/testsuite-56-slowgrowth.sh
|
|
@ -1,6 +0,0 @@
|
|||
[Unit]
|
||||
Description=No memory pressure
|
||||
|
||||
[Service]
|
||||
Slice=testsuite-56-workload.slice
|
||||
ExecStart=sleep infinity
|
|
@ -1,10 +0,0 @@
|
|||
[Unit]
|
||||
Description=Test slice for memory pressure kills
|
||||
|
||||
[Slice]
|
||||
CPUAccounting=true
|
||||
MemoryAccounting=true
|
||||
IOAccounting=true
|
||||
TasksAccounting=true
|
||||
ManagedOOMMemoryPressure=kill
|
||||
ManagedOOMMemoryPressureLimitPercent=50%
|
|
@ -14,26 +14,54 @@ if [[ "$cgroup_type" != *"cgroup2"* ]] && [[ "$cgroup_type" != *"0x63677270"* ]]
|
|||
fi
|
||||
[[ -e /skipped ]] && exit 0 || true
|
||||
|
||||
systemctl start testsuite-56-testbloat.service
|
||||
systemctl start testsuite-56-testchill.service
|
||||
cat > /etc/systemd/system/testworkload.slice <<EOF
|
||||
[Slice]
|
||||
CPUAccounting=true
|
||||
MemoryAccounting=true
|
||||
IOAccounting=true
|
||||
TasksAccounting=true
|
||||
ManagedOOMMemoryPressure=kill
|
||||
ManagedOOMMemoryPressureLimitPercent=50%
|
||||
EOF
|
||||
|
||||
# Create a lot of memory pressure by setting memory.high to a very small value
|
||||
cat > /etc/systemd/system/testbloat.service <<EOF
|
||||
[Service]
|
||||
MemoryHigh=2M
|
||||
Slice=testworkload.slice
|
||||
ExecStart=/usr/lib/systemd/tests/testdata/units/testsuite-56-slowgrowth.sh
|
||||
EOF
|
||||
|
||||
# This generates no memory pressure
|
||||
cat > /etc/systemd/system/testchill.service <<EOF
|
||||
[Service]
|
||||
MemoryHigh=2M
|
||||
Slice=testworkload.slice
|
||||
ExecStart=sleep infinity
|
||||
EOF
|
||||
|
||||
systemctl daemon-reload
|
||||
|
||||
systemctl start testbloat.service
|
||||
systemctl start testchill.service
|
||||
|
||||
# Verify systemd-oomd is monitoring the expected units
|
||||
oomctl | grep "/testsuite-56-workload.slice"
|
||||
oomctl | grep "/testworkload.slice"
|
||||
oomctl | grep "50%"
|
||||
|
||||
# systemd-oomd watches for elevated pressure for 30 seconds before acting.
|
||||
# It can take time to build up pressure so either wait 5 minutes or for the service to fail.
|
||||
timeout=$(date -ud "5 minutes" +%s)
|
||||
while [[ $(date -u +%s) -le $timeout ]]; do
|
||||
if ! systemctl status testsuite-56-testbloat.service; then
|
||||
if ! systemctl status testbloat.service; then
|
||||
break
|
||||
fi
|
||||
sleep 15
|
||||
done
|
||||
|
||||
# testbloat should be killed and testchill should be fine
|
||||
if systemctl status testsuite-56-testbloat.service; then exit 42; fi
|
||||
if ! systemctl status testsuite-56-testchill.service; then exit 24; fi
|
||||
if systemctl status testbloat.service; then exit 42; fi
|
||||
if ! systemctl status testchill.service; then exit 24; fi
|
||||
|
||||
systemd-analyze log-level info
|
||||
|
||||
|
|
Loading…
Reference in New Issue