]>
Commit | Line | Data |
---|---|---|
db9ecf05 | 1 | /* SPDX-License-Identifier: LGPL-2.1-or-later */ |
c2f1db8f | 2 | #pragma once |
8c6db833 | 3 | |
35d2e7ec | 4 | #include <dirent.h> |
a5edf95e | 5 | #include <fcntl.h> |
11c3a366 TA |
6 | #include <stdbool.h> |
7 | #include <stdint.h> | |
71d35b6b | 8 | #include <stdio.h> |
f0bef277 | 9 | #include <sys/statfs.h> |
71d35b6b | 10 | #include <sys/types.h> |
c6c18be3 | 11 | |
28db6fbf | 12 | #include "constants.h" |
12c7d27b | 13 | #include "pidref.h" |
93cc7779 | 14 | #include "set.h" |
8c6db833 | 15 | |
68ac0d05 LP |
16 | #define SYSTEMD_CGROUP_CONTROLLER_LEGACY "name=systemd" |
17 | #define SYSTEMD_CGROUP_CONTROLLER_HYBRID "name=unified" | |
18 | #define SYSTEMD_CGROUP_CONTROLLER "_systemd" | |
19 | ||
efdb0237 LP |
20 | /* An enum of well known cgroup controllers */ |
21 | typedef enum CGroupController { | |
17f14955 | 22 | /* Original cgroup controllers */ |
efdb0237 | 23 | CGROUP_CONTROLLER_CPU, |
00b4a247 | 24 | CGROUP_CONTROLLER_CPUACCT, /* v1 only */ |
047f5d63 | 25 | CGROUP_CONTROLLER_CPUSET, /* v2 only */ |
00b4a247 LP |
26 | CGROUP_CONTROLLER_IO, /* v2 only */ |
27 | CGROUP_CONTROLLER_BLKIO, /* v1 only */ | |
efdb0237 | 28 | CGROUP_CONTROLLER_MEMORY, |
00b4a247 | 29 | CGROUP_CONTROLLER_DEVICES, /* v1 only */ |
03a7b521 | 30 | CGROUP_CONTROLLER_PIDS, |
17f14955 RG |
31 | |
32 | /* BPF-based pseudo-controllers, v2 only */ | |
33 | CGROUP_CONTROLLER_BPF_FIREWALL, | |
084c7007 | 34 | CGROUP_CONTROLLER_BPF_DEVICES, |
506ea51b | 35 | CGROUP_CONTROLLER_BPF_FOREIGN, |
a8e5eb17 | 36 | CGROUP_CONTROLLER_BPF_SOCKET_BIND, |
6f50d4f7 | 37 | CGROUP_CONTROLLER_BPF_RESTRICT_NETWORK_INTERFACES, |
b1994387 | 38 | /* The BPF hook implementing RestrictFileSystems= is not defined here. |
bb5232b6 | 39 | * It's applied as late as possible in exec_invoke() so we don't block |
b1994387 | 40 | * our own unit setup code. */ |
17f14955 | 41 | |
efdb0237 | 42 | _CGROUP_CONTROLLER_MAX, |
2d93c20e | 43 | _CGROUP_CONTROLLER_INVALID = -EINVAL, |
efdb0237 LP |
44 | } CGroupController; |
45 | ||
46f84f95 | 46 | #define CGROUP_CONTROLLER_TO_MASK(c) (1U << (c)) |
efdb0237 | 47 | |
4ad49000 | 48 | /* A bit mask of well known cgroup controllers */ |
efdb0237 LP |
49 | typedef enum CGroupMask { |
50 | CGROUP_MASK_CPU = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_CPU), | |
51 | CGROUP_MASK_CPUACCT = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_CPUACCT), | |
047f5d63 | 52 | CGROUP_MASK_CPUSET = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_CPUSET), |
13c31542 | 53 | CGROUP_MASK_IO = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_IO), |
efdb0237 LP |
54 | CGROUP_MASK_BLKIO = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BLKIO), |
55 | CGROUP_MASK_MEMORY = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_MEMORY), | |
3905f127 | 56 | CGROUP_MASK_DEVICES = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_DEVICES), |
03a7b521 | 57 | CGROUP_MASK_PIDS = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_PIDS), |
17f14955 | 58 | CGROUP_MASK_BPF_FIREWALL = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_FIREWALL), |
084c7007 | 59 | CGROUP_MASK_BPF_DEVICES = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_DEVICES), |
506ea51b | 60 | CGROUP_MASK_BPF_FOREIGN = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_FOREIGN), |
a8e5eb17 | 61 | CGROUP_MASK_BPF_SOCKET_BIND = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_SOCKET_BIND), |
6f50d4f7 | 62 | CGROUP_MASK_BPF_RESTRICT_NETWORK_INTERFACES = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_RESTRICT_NETWORK_INTERFACES), |
4edd65e4 | 63 | |
4e1dfa45 | 64 | /* All real cgroup v1 controllers */ |
4edd65e4 LP |
65 | CGROUP_MASK_V1 = CGROUP_MASK_CPU|CGROUP_MASK_CPUACCT|CGROUP_MASK_BLKIO|CGROUP_MASK_MEMORY|CGROUP_MASK_DEVICES|CGROUP_MASK_PIDS, |
66 | ||
4e1dfa45 | 67 | /* All real cgroup v2 controllers */ |
047f5d63 | 68 | CGROUP_MASK_V2 = CGROUP_MASK_CPU|CGROUP_MASK_CPUSET|CGROUP_MASK_IO|CGROUP_MASK_MEMORY|CGROUP_MASK_PIDS, |
4edd65e4 | 69 | |
4e1dfa45 | 70 | /* All cgroup v2 BPF pseudo-controllers */ |
6f50d4f7 | 71 | CGROUP_MASK_BPF = CGROUP_MASK_BPF_FIREWALL|CGROUP_MASK_BPF_DEVICES|CGROUP_MASK_BPF_FOREIGN|CGROUP_MASK_BPF_SOCKET_BIND|CGROUP_MASK_BPF_RESTRICT_NETWORK_INTERFACES, |
4edd65e4 | 72 | |
efdb0237 LP |
73 | _CGROUP_MASK_ALL = CGROUP_CONTROLLER_TO_MASK(_CGROUP_CONTROLLER_MAX) - 1 |
74 | } CGroupMask; | |
4ad49000 | 75 | |
c01ef321 LP |
76 | static inline CGroupMask CGROUP_MASK_EXTEND_JOINED(CGroupMask mask) { |
77 | /* We always mount "cpu" and "cpuacct" in the same hierarchy. Hence, when one bit is set also set the other */ | |
78 | ||
79 | if (mask & (CGROUP_MASK_CPU|CGROUP_MASK_CPUACCT)) | |
80 | mask |= (CGROUP_MASK_CPU|CGROUP_MASK_CPUACCT); | |
81 | ||
82 | return mask; | |
83 | } | |
84 | ||
f98c2585 CD |
85 | CGroupMask get_cpu_accounting_mask(void); |
86 | bool cpu_accounting_is_cheap(void); | |
87 | ||
13c31542 | 88 | /* Special values for all weight knobs on unified hierarchy */ |
fd4e991d | 89 | #define CGROUP_WEIGHT_INVALID UINT64_MAX |
c8340822 | 90 | #define CGROUP_WEIGHT_IDLE UINT64_C(0) |
13c31542 TH |
91 | #define CGROUP_WEIGHT_MIN UINT64_C(1) |
92 | #define CGROUP_WEIGHT_MAX UINT64_C(10000) | |
93 | #define CGROUP_WEIGHT_DEFAULT UINT64_C(100) | |
94 | ||
95 | #define CGROUP_LIMIT_MIN UINT64_C(0) | |
fd4e991d | 96 | #define CGROUP_LIMIT_MAX UINT64_MAX |
13c31542 TH |
97 | |
98 | static inline bool CGROUP_WEIGHT_IS_OK(uint64_t x) { | |
99 | return | |
100 | x == CGROUP_WEIGHT_INVALID || | |
101 | (x >= CGROUP_WEIGHT_MIN && x <= CGROUP_WEIGHT_MAX); | |
102 | } | |
103 | ||
9be57249 TH |
104 | /* IO limits on unified hierarchy */ |
105 | typedef enum CGroupIOLimitType { | |
106 | CGROUP_IO_RBPS_MAX, | |
107 | CGROUP_IO_WBPS_MAX, | |
ac06a0cf TH |
108 | CGROUP_IO_RIOPS_MAX, |
109 | CGROUP_IO_WIOPS_MAX, | |
9be57249 TH |
110 | |
111 | _CGROUP_IO_LIMIT_TYPE_MAX, | |
2d93c20e | 112 | _CGROUP_IO_LIMIT_TYPE_INVALID = -EINVAL, |
9be57249 TH |
113 | } CGroupIOLimitType; |
114 | ||
115 | extern const uint64_t cgroup_io_limit_defaults[_CGROUP_IO_LIMIT_TYPE_MAX]; | |
116 | ||
117 | const char* cgroup_io_limit_type_to_string(CGroupIOLimitType t) _const_; | |
118 | CGroupIOLimitType cgroup_io_limit_type_from_string(const char *s) _pure_; | |
119 | ||
d53d9474 | 120 | /* Special values for the cpu.shares attribute */ |
fd4e991d | 121 | #define CGROUP_CPU_SHARES_INVALID UINT64_MAX |
d53d9474 LP |
122 | #define CGROUP_CPU_SHARES_MIN UINT64_C(2) |
123 | #define CGROUP_CPU_SHARES_MAX UINT64_C(262144) | |
124 | #define CGROUP_CPU_SHARES_DEFAULT UINT64_C(1024) | |
125 | ||
126 | static inline bool CGROUP_CPU_SHARES_IS_OK(uint64_t x) { | |
127 | return | |
128 | x == CGROUP_CPU_SHARES_INVALID || | |
129 | (x >= CGROUP_CPU_SHARES_MIN && x <= CGROUP_CPU_SHARES_MAX); | |
130 | } | |
131 | ||
d2bd0bfa MK |
132 | /* Special values for the special {blkio,io}.bfq.weight attribute */ |
133 | #define CGROUP_BFQ_WEIGHT_INVALID UINT64_MAX | |
134 | #define CGROUP_BFQ_WEIGHT_MIN UINT64_C(1) | |
135 | #define CGROUP_BFQ_WEIGHT_MAX UINT64_C(1000) | |
136 | #define CGROUP_BFQ_WEIGHT_DEFAULT UINT64_C(100) | |
137 | ||
138 | /* Convert the normal io.weight value to io.bfq.weight */ | |
139 | static inline uint64_t BFQ_WEIGHT(uint64_t io_weight) { | |
140 | return | |
141 | io_weight <= CGROUP_WEIGHT_DEFAULT ? | |
142 | CGROUP_BFQ_WEIGHT_DEFAULT - (CGROUP_WEIGHT_DEFAULT - io_weight) * (CGROUP_BFQ_WEIGHT_DEFAULT - CGROUP_BFQ_WEIGHT_MIN) / (CGROUP_WEIGHT_DEFAULT - CGROUP_WEIGHT_MIN) : | |
143 | CGROUP_BFQ_WEIGHT_DEFAULT + (io_weight - CGROUP_WEIGHT_DEFAULT) * (CGROUP_BFQ_WEIGHT_MAX - CGROUP_BFQ_WEIGHT_DEFAULT) / (CGROUP_WEIGHT_MAX - CGROUP_WEIGHT_DEFAULT); | |
144 | } | |
145 | ||
d53d9474 | 146 | /* Special values for the blkio.weight attribute */ |
fd4e991d | 147 | #define CGROUP_BLKIO_WEIGHT_INVALID UINT64_MAX |
d53d9474 LP |
148 | #define CGROUP_BLKIO_WEIGHT_MIN UINT64_C(10) |
149 | #define CGROUP_BLKIO_WEIGHT_MAX UINT64_C(1000) | |
150 | #define CGROUP_BLKIO_WEIGHT_DEFAULT UINT64_C(500) | |
151 | ||
152 | static inline bool CGROUP_BLKIO_WEIGHT_IS_OK(uint64_t x) { | |
153 | return | |
154 | x == CGROUP_BLKIO_WEIGHT_INVALID || | |
155 | (x >= CGROUP_BLKIO_WEIGHT_MIN && x <= CGROUP_BLKIO_WEIGHT_MAX); | |
156 | } | |
157 | ||
5da38d07 TH |
158 | typedef enum CGroupUnified { |
159 | CGROUP_UNIFIED_UNKNOWN = -1, | |
160 | CGROUP_UNIFIED_NONE = 0, /* Both systemd and controllers on legacy */ | |
161 | CGROUP_UNIFIED_SYSTEMD = 1, /* Only systemd on unified */ | |
162 | CGROUP_UNIFIED_ALL = 2, /* Both systemd and controllers on unified */ | |
163 | } CGroupUnified; | |
164 | ||
5954c074 LP |
165 | /* |
166 | * General rules: | |
167 | * | |
168 | * We accept named hierarchies in the syntax "foo" and "name=foo". | |
169 | * | |
170 | * We expect that named hierarchies do not conflict in name with a | |
171 | * kernel hierarchy, modulo the "name=" prefix. | |
172 | * | |
173 | * We always generate "normalized" controller names, i.e. without the | |
174 | * "name=" prefix. | |
175 | * | |
176 | * We require absolute cgroup paths. When returning, we will always | |
177 | * generate paths with multiple adjacent / removed. | |
178 | */ | |
179 | ||
aef43552 LP |
180 | int cg_enumerate_processes(const char *controller, const char *path, FILE **ret); |
181 | int cg_read_pid(FILE *f, pid_t *ret); | |
12c7d27b | 182 | int cg_read_pidref(FILE *f, PidRef *ret); |
aef43552 | 183 | int cg_read_event(const char *controller, const char *path, const char *event, char **ret); |
c6c18be3 | 184 | |
aef43552 LP |
185 | int cg_enumerate_subgroups(const char *controller, const char *path, DIR **ret); |
186 | int cg_read_subgroup(DIR *d, char **ret); | |
35d2e7ec | 187 | |
1d98fef1 | 188 | typedef enum CGroupFlags { |
be0b7a1a LP |
189 | CGROUP_SIGCONT = 1 << 0, |
190 | CGROUP_IGNORE_SELF = 1 << 1, | |
191 | CGROUP_REMOVE = 1 << 2, | |
1d98fef1 | 192 | } CGroupFlags; |
8c6db833 | 193 | |
4d1b2df1 | 194 | typedef int (*cg_kill_log_func_t)(const PidRef *pid, int sig, void *userdata); |
1d98fef1 | 195 | |
bd1791b5 LP |
196 | int cg_kill(const char *path, int sig, CGroupFlags flags, Set *s, cg_kill_log_func_t kill_log, void *userdata); |
197 | int cg_kill_kernel_sigkill(const char *path); | |
198 | int cg_kill_recursive(const char *path, int sig, CGroupFlags flags, Set *s, cg_kill_log_func_t kill_log, void *userdata); | |
1d98fef1 | 199 | |
2a8020fe | 200 | int cg_split_spec(const char *spec, char **ret_controller, char **ret_path); |
820fe745 | 201 | int cg_mangle_path(const char *path, char **ret); |
8c6db833 | 202 | |
820fe745 LP |
203 | int cg_get_path(const char *controller, const char *path, const char *suffix, char **ret); |
204 | int cg_get_path_and_check(const char *controller, const char *path, const char *suffix, char **ret); | |
7027ff61 | 205 | |
820fe745 | 206 | int cg_pid_get_path(const char *controller, pid_t pid, char **ret); |
f2a2e60b | 207 | int cg_pidref_get_path(const char *controller, const PidRef *pidref, char **ret); |
8c6db833 | 208 | |
4ad49000 | 209 | int cg_rmdir(const char *controller, const char *path); |
8c6db833 | 210 | |
bd1791b5 | 211 | int cg_is_threaded(const char *path); |
084e7706 | 212 | |
b426b4ee NR |
213 | int cg_is_delegated(const char *path); |
214 | ||
6cf96ab4 NR |
215 | int cg_has_coredump_receive(const char *path); |
216 | ||
25a1f04c MS |
217 | typedef enum { |
218 | CG_KEY_MODE_GRACEFUL = 1 << 0, | |
219 | } CGroupKeyMode; | |
220 | ||
4ad49000 | 221 | int cg_set_attribute(const char *controller, const char *path, const char *attribute, const char *value); |
934277fe | 222 | int cg_get_attribute(const char *controller, const char *path, const char *attribute, char **ret); |
25a1f04c MS |
223 | int cg_get_keyed_attribute_full(const char *controller, const char *path, const char *attribute, char **keys, char **values, CGroupKeyMode mode); |
224 | ||
225 | static inline int cg_get_keyed_attribute( | |
226 | const char *controller, | |
227 | const char *path, | |
228 | const char *attribute, | |
229 | char **keys, | |
230 | char **ret_values) { | |
231 | return cg_get_keyed_attribute_full(controller, path, attribute, keys, ret_values, 0); | |
232 | } | |
233 | ||
234 | static inline int cg_get_keyed_attribute_graceful( | |
235 | const char *controller, | |
236 | const char *path, | |
237 | const char *attribute, | |
238 | char **keys, | |
239 | char **ret_values) { | |
240 | return cg_get_keyed_attribute_full(controller, path, attribute, keys, ret_values, CG_KEY_MODE_GRACEFUL); | |
241 | } | |
4ad49000 | 242 | |
613328c3 AZ |
243 | int cg_get_attribute_as_uint64(const char *controller, const char *path, const char *attribute, uint64_t *ret); |
244 | ||
b41dcc51 AZ |
245 | /* Does a parse_boolean() on the attribute contents and sets ret accordingly */ |
246 | int cg_get_attribute_as_bool(const char *controller, const char *path, const char *attribute, bool *ret); | |
247 | ||
bd1791b5 | 248 | int cg_get_owner(const char *path, uid_t *ret_uid); |
8c6db833 | 249 | |
bd1791b5 LP |
250 | int cg_set_xattr(const char *path, const char *name, const void *value, size_t size, int flags); |
251 | int cg_get_xattr(const char *path, const char *name, void *value, size_t size); | |
252 | int cg_get_xattr_malloc(const char *path, const char *name, char **ret); | |
59331b8e | 253 | /* Returns negative on error, and 0 or 1 on success for the bool value */ |
bd1791b5 LP |
254 | int cg_get_xattr_bool(const char *path, const char *name); |
255 | int cg_remove_xattr(const char *path, const char *name); | |
4b58153d | 256 | |
8c6db833 | 257 | int cg_install_release_agent(const char *controller, const char *agent); |
ad929bcc | 258 | int cg_uninstall_release_agent(const char *controller); |
8c6db833 | 259 | |
6f883237 LP |
260 | int cg_is_empty(const char *controller, const char *path); |
261 | int cg_is_empty_recursive(const char *controller, const char *path); | |
8c6db833 | 262 | |
7027ff61 | 263 | int cg_get_root_path(char **path); |
6c03089c | 264 | |
535e3dd0 | 265 | int cg_path_get_cgroupid(const char *path, uint64_t *ret); |
820fe745 LP |
266 | int cg_path_get_session(const char *path, char **ret_session); |
267 | int cg_path_get_owner_uid(const char *path, uid_t *ret_uid); | |
268 | int cg_path_get_unit(const char *path, char **ret_unit); | |
269 | int cg_path_get_unit_path(const char *path, char **ret_unit); | |
270 | int cg_path_get_user_unit(const char *path, char **ret_unit); | |
271 | int cg_path_get_machine_name(const char *path, char **ret_machine); | |
272 | int cg_path_get_slice(const char *path, char **ret_slice); | |
273 | int cg_path_get_user_slice(const char *path, char **ret_slice); | |
274 | ||
275 | int cg_shift_path(const char *cgroup, const char *cached_root, const char **ret_shifted); | |
276 | int cg_pid_get_path_shifted(pid_t pid, const char *cached_root, char **ret_cgroup); | |
277 | ||
278 | int cg_pid_get_session(pid_t pid, char **ret_session); | |
279 | int cg_pid_get_owner_uid(pid_t pid, uid_t *ret_uid); | |
280 | int cg_pid_get_unit(pid_t pid, char **ret_unit); | |
281 | int cg_pid_get_user_unit(pid_t pid, char **ret_unit); | |
282 | int cg_pid_get_machine_name(pid_t pid, char **ret_machine); | |
283 | int cg_pid_get_slice(pid_t pid, char **ret_slice); | |
284 | int cg_pid_get_user_slice(pid_t pid, char **ret_slice); | |
285 | ||
286 | int cg_path_decode_unit(const char *cgroup, char **ret_unit); | |
96cde13a | 287 | |
1a56b0c0 LP |
288 | bool cg_needs_escape(const char *p); |
289 | int cg_escape(const char *p, char **ret); | |
44a6b1b6 | 290 | char *cg_unescape(const char *p) _pure_; |
78edb35a | 291 | |
185a0874 | 292 | bool cg_controller_is_valid(const char *p); |
a016b922 LP |
293 | |
294 | int cg_slice_to_path(const char *unit, char **ret); | |
4ad49000 | 295 | |
efdb0237 | 296 | typedef const char* (*cg_migrate_callback_t)(CGroupMask mask, void *userdata); |
03b90d4b | 297 | |
efdb0237 | 298 | int cg_mask_supported(CGroupMask *ret); |
0fa7b500 | 299 | int cg_mask_supported_subtree(const char *root, CGroupMask *ret); |
aae7e17f FB |
300 | int cg_mask_from_string(const char *s, CGroupMask *ret); |
301 | int cg_mask_to_string(CGroupMask mask, char **ret); | |
b12afc8c | 302 | |
6925a0de | 303 | int cg_kernel_controllers(Set **controllers); |
efdb0237 | 304 | |
3228995c | 305 | bool cg_ns_supported(void); |
d9e45bc3 | 306 | bool cg_freezer_supported(void); |
8a513eee | 307 | bool cg_kill_supported(void); |
3228995c | 308 | |
b4cccbc1 LP |
309 | int cg_all_unified(void); |
310 | int cg_hybrid_unified(void); | |
c22800e4 | 311 | int cg_unified_controller(const char *controller); |
d4d99bc6 ZJS |
312 | int cg_unified_cached(bool flush); |
313 | static inline int cg_unified(void) { | |
314 | return cg_unified_cached(true); | |
315 | } | |
efdb0237 LP |
316 | |
317 | const char* cgroup_controller_to_string(CGroupController c) _const_; | |
318 | CGroupController cgroup_controller_from_string(const char *s) _pure_; | |
d53d9474 | 319 | |
f0bef277 EV |
320 | bool is_cgroup_fs(const struct statfs *s); |
321 | bool fd_is_cgroup_fs(int fd); | |
4d824a4e AZ |
322 | |
323 | typedef enum ManagedOOMMode { | |
324 | MANAGED_OOM_AUTO, | |
325 | MANAGED_OOM_KILL, | |
326 | _MANAGED_OOM_MODE_MAX, | |
2d93c20e | 327 | _MANAGED_OOM_MODE_INVALID = -EINVAL, |
4d824a4e AZ |
328 | } ManagedOOMMode; |
329 | ||
330 | const char* managed_oom_mode_to_string(ManagedOOMMode m) _const_; | |
331 | ManagedOOMMode managed_oom_mode_from_string(const char *s) _pure_; | |
242d75bd AZ |
332 | |
333 | typedef enum ManagedOOMPreference { | |
334 | MANAGED_OOM_PREFERENCE_NONE = 0, | |
335 | MANAGED_OOM_PREFERENCE_AVOID = 1, | |
336 | MANAGED_OOM_PREFERENCE_OMIT = 2, | |
337 | _MANAGED_OOM_PREFERENCE_MAX, | |
925484aa | 338 | _MANAGED_OOM_PREFERENCE_INVALID = -EINVAL, |
242d75bd AZ |
339 | } ManagedOOMPreference; |
340 | ||
341 | const char* managed_oom_preference_to_string(ManagedOOMPreference a) _const_; | |
342 | ManagedOOMPreference managed_oom_preference_from_string(const char *s) _pure_; | |
a5edf95e LP |
343 | |
344 | /* The structure to pass to name_to_handle_at() on cgroupfs2 */ | |
345 | typedef union { | |
346 | struct file_handle file_handle; | |
347 | uint8_t space[offsetof(struct file_handle, f_handle) + sizeof(uint64_t)]; | |
348 | } cg_file_handle; | |
349 | ||
350 | #define CG_FILE_HANDLE_INIT { .file_handle.handle_bytes = sizeof(uint64_t) } | |
351 | #define CG_FILE_HANDLE_CGROUPID(fh) (*(uint64_t*) (fh).file_handle.f_handle) |