if (r < 0)
return r;
- if (p->cgroup_supported != 0) {
- r = serialize_item_format(f, "exec-parameters-cgroup-supported", "%u", (unsigned) p->cgroup_supported);
- if (r < 0)
- return r;
- }
-
r = serialize_item(f, "exec-parameters-cgroup-path", p->cgroup_path);
if (r < 0)
return r;
return r;
p->selinux_context_net = r;
- } else if ((val = startswith(l, "exec-parameters-cgroup-supported="))) {
- unsigned cgroup_supported;
-
- r = safe_atou(val, &cgroup_supported);
- if (r < 0)
- return r;
- p->cgroup_supported = cgroup_supported;
} else if ((val = startswith(l, "exec-parameters-cgroup-path="))) {
r = free_and_strdup(&p->cgroup_path, val);
if (r < 0)
"%sRuntimeScope: %s\n"
"%sExecFlags: %u\n"
"%sSELinuxContextNetwork: %s\n"
- "%sCgroupSupportedMask: %u\n"
"%sCgroupPath: %s\n"
"%sCrededentialsDirectory: %s\n"
"%sEncryptedCredentialsDirectory: %s\n"
prefix, runtime_scope_to_string(p->runtime_scope),
prefix, p->flags,
prefix, yes_no(p->selinux_context_net),
- prefix, p->cgroup_supported,
prefix, p->cgroup_path,
prefix, strempty(p->received_credentials_directory),
prefix, strempty(p->received_encrypted_credentials_directory),
ExecFlags flags;
bool selinux_context_net:1;
- CGroupMask cgroup_supported;
char *cgroup_path;
uint64_t cgroup_id;
if (r < 0)
return r;
- p->cgroup_supported = u->manager->cgroup_supported;
p->prefix = u->manager->prefix;
SET_FLAG(p->flags, EXEC_PASS_LOG_UNIT|EXEC_CHOWN_DIRECTORIES, MANAGER_IS_SYSTEM(u->manager));