mirror of
https://github.com/systemd/systemd.git
synced 2024-10-31 07:51:21 +03:00
064a5c1438
Compared to PID1 where systemd-oomd has to be the client to PID1 because PID1 is a more privileged process than systemd-oomd, systemd-oomd is the more privileged process compared to a user manager so we have user managers be the client whereas systemd-oomd is now the server. The same varlink protocol is used between user managers and systemd-oomd to deliver ManagedOOM property updates. systemd-oomd now sets up a varlink server that user managers connect to to send ManagedOOM property updates. We also add extra validation to make sure that non-root senders don't send updates for cgroups they don't own. The integration test was extended to repeat the chill/bloat test using a user manager instead of PID1.
62 lines
1.7 KiB
SYSTEMD
62 lines
1.7 KiB
SYSTEMD
# SPDX-License-Identifier: LGPL-2.1-or-later
|
|
#
|
|
# This file is part of systemd.
|
|
#
|
|
# systemd is free software; you can redistribute it and/or modify it
|
|
# under the terms of the GNU Lesser General Public License as published by
|
|
# the Free Software Foundation; either version 2.1 of the License, or
|
|
# (at your option) any later version.
|
|
|
|
[Unit]
|
|
Description=Userspace Out-Of-Memory (OOM) Killer
|
|
Documentation=man:systemd-oomd.service(8)
|
|
DefaultDependencies=no
|
|
Before=multi-user.target shutdown.target
|
|
Conflicts=shutdown.target
|
|
ConditionControlGroupController=v2
|
|
ConditionControlGroupController=memory
|
|
ConditionPathExists=/proc/pressure/cpu
|
|
ConditionPathExists=/proc/pressure/io
|
|
ConditionPathExists=/proc/pressure/memory
|
|
Requires=systemd-oomd.socket
|
|
After=systemd-oomd.socket
|
|
|
|
[Service]
|
|
AmbientCapabilities=CAP_KILL CAP_DAC_OVERRIDE
|
|
BusName=org.freedesktop.oom1
|
|
CapabilityBoundingSet=CAP_KILL CAP_DAC_OVERRIDE
|
|
ExecStart={{ROOTLIBEXECDIR}}/systemd-oomd
|
|
IPAddressDeny=any
|
|
LockPersonality=yes
|
|
MemoryDenyWriteExecute=yes
|
|
# Reserve some minimum amount of memory so that systemd-oomd can continue to
|
|
# run in resource starved scenarios.
|
|
MemoryMin=64M
|
|
MemoryLow=64M
|
|
NoNewPrivileges=yes
|
|
OOMScoreAdjust=-900
|
|
PrivateDevices=yes
|
|
PrivateTmp=yes
|
|
ProtectClock=yes
|
|
ProtectHome=yes
|
|
ProtectHostname=yes
|
|
ProtectKernelLogs=yes
|
|
ProtectKernelModules=yes
|
|
ProtectKernelTunables=yes
|
|
ProtectSystem=strict
|
|
Restart=on-failure
|
|
RestrictAddressFamilies=AF_UNIX
|
|
RestrictNamespaces=yes
|
|
RestrictRealtime=yes
|
|
RestrictSUIDSGID=yes
|
|
SystemCallArchitectures=native
|
|
SystemCallErrorNumber=EPERM
|
|
SystemCallFilter=@system-service
|
|
Type=notify
|
|
User=systemd-oom
|
|
{{SERVICE_WATCHDOG}}
|
|
|
|
[Install]
|
|
WantedBy=multi-user.target
|
|
Alias=dbus-org.freedesktop.oom1.service
|