1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
29 #include <sys/types.h>
32 #include "cgroup-util.h"
36 #include "formats-util.h"
37 #include "process-util.h"
38 #include "path-util.h"
39 #include "unit-name.h"
43 #include "login-util.h"
45 int cg_enumerate_processes(const char *controller
, const char *path
, FILE **_f
) {
46 _cleanup_free_
char *fs
= NULL
;
52 r
= cg_get_path(controller
, path
, "cgroup.procs", &fs
);
64 int cg_read_pid(FILE *f
, pid_t
*_pid
) {
67 /* Note that the cgroup.procs might contain duplicates! See
68 * cgroups.txt for details. */
74 if (fscanf(f
, "%lu", &ul
) != 1) {
79 return errno
? -errno
: -EIO
;
89 int cg_enumerate_subgroups(const char *controller
, const char *path
, DIR **_d
) {
90 _cleanup_free_
char *fs
= NULL
;
96 /* This is not recursive! */
98 r
= cg_get_path(controller
, path
, NULL
, &fs
);
110 int cg_read_subgroup(DIR *d
, char **fn
) {
116 FOREACH_DIRENT(de
, d
, return -errno
) {
119 if (de
->d_type
!= DT_DIR
)
122 if (streq(de
->d_name
, ".") ||
123 streq(de
->d_name
, ".."))
126 b
= strdup(de
->d_name
);
137 int cg_rmdir(const char *controller
, const char *path
) {
138 _cleanup_free_
char *p
= NULL
;
141 r
= cg_get_path(controller
, path
, NULL
, &p
);
146 if (r
< 0 && errno
!= ENOENT
)
152 int cg_kill(const char *controller
, const char *path
, int sig
, bool sigcont
, bool ignore_self
, Set
*s
) {
153 _cleanup_set_free_ Set
*allocated_set
= NULL
;
160 /* This goes through the tasks list and kills them all. This
161 * is repeated until no further processes are added to the
162 * tasks list, to properly handle forking processes */
165 s
= allocated_set
= set_new(NULL
);
173 _cleanup_fclose_
FILE *f
= NULL
;
177 r
= cg_enumerate_processes(controller
, path
, &f
);
179 if (ret
>= 0 && r
!= -ENOENT
)
185 while ((r
= cg_read_pid(f
, &pid
)) > 0) {
187 if (ignore_self
&& pid
== my_pid
)
190 if (set_get(s
, LONG_TO_PTR(pid
)) == LONG_TO_PTR(pid
))
193 /* If we haven't killed this process yet, kill
195 if (kill(pid
, sig
) < 0) {
196 if (ret
>= 0 && errno
!= ESRCH
)
199 if (sigcont
&& sig
!= SIGKILL
)
208 r
= set_put(s
, LONG_TO_PTR(pid
));
224 /* To avoid racing against processes which fork
225 * quicker than we can kill them we repeat this until
226 * no new pids need to be killed. */
233 int cg_kill_recursive(const char *controller
, const char *path
, int sig
, bool sigcont
, bool ignore_self
, bool rem
, Set
*s
) {
234 _cleanup_set_free_ Set
*allocated_set
= NULL
;
235 _cleanup_closedir_
DIR *d
= NULL
;
243 s
= allocated_set
= set_new(NULL
);
248 ret
= cg_kill(controller
, path
, sig
, sigcont
, ignore_self
, s
);
250 r
= cg_enumerate_subgroups(controller
, path
, &d
);
252 if (ret
>= 0 && r
!= -ENOENT
)
258 while ((r
= cg_read_subgroup(d
, &fn
)) > 0) {
259 _cleanup_free_
char *p
= NULL
;
261 p
= strjoin(path
, "/", fn
, NULL
);
266 r
= cg_kill_recursive(controller
, p
, sig
, sigcont
, ignore_self
, rem
, s
);
267 if (ret
>= 0 && r
!= 0)
271 if (ret
>= 0 && r
< 0)
275 r
= cg_rmdir(controller
, path
);
276 if (r
< 0 && ret
>= 0 && r
!= -ENOENT
&& r
!= -EBUSY
)
283 int cg_migrate(const char *cfrom
, const char *pfrom
, const char *cto
, const char *pto
, bool ignore_self
) {
285 _cleanup_set_free_ Set
*s
= NULL
;
301 _cleanup_fclose_
FILE *f
= NULL
;
305 r
= cg_enumerate_processes(cfrom
, pfrom
, &f
);
307 if (ret
>= 0 && r
!= -ENOENT
)
313 while ((r
= cg_read_pid(f
, &pid
)) > 0) {
315 /* This might do weird stuff if we aren't a
316 * single-threaded program. However, we
317 * luckily know we are not */
318 if (ignore_self
&& pid
== my_pid
)
321 if (set_get(s
, LONG_TO_PTR(pid
)) == LONG_TO_PTR(pid
))
324 r
= cg_attach(cto
, pto
, pid
);
326 if (ret
>= 0 && r
!= -ESRCH
)
333 r
= set_put(s
, LONG_TO_PTR(pid
));
353 int cg_migrate_recursive(
361 _cleanup_closedir_
DIR *d
= NULL
;
370 ret
= cg_migrate(cfrom
, pfrom
, cto
, pto
, ignore_self
);
372 r
= cg_enumerate_subgroups(cfrom
, pfrom
, &d
);
374 if (ret
>= 0 && r
!= -ENOENT
)
380 while ((r
= cg_read_subgroup(d
, &fn
)) > 0) {
381 _cleanup_free_
char *p
= NULL
;
383 p
= strjoin(pfrom
, "/", fn
, NULL
);
392 r
= cg_migrate_recursive(cfrom
, p
, cto
, pto
, ignore_self
, rem
);
393 if (r
!= 0 && ret
>= 0)
397 if (r
< 0 && ret
>= 0)
401 r
= cg_rmdir(cfrom
, pfrom
);
402 if (r
< 0 && ret
>= 0 && r
!= -ENOENT
&& r
!= -EBUSY
)
409 int cg_migrate_recursive_fallback(
424 r
= cg_migrate_recursive(cfrom
, pfrom
, cto
, pto
, ignore_self
, rem
);
426 char prefix
[strlen(pto
) + 1];
428 /* This didn't work? Then let's try all prefixes of the destination */
430 PATH_FOREACH_PREFIX(prefix
, pto
) {
431 r
= cg_migrate_recursive(cfrom
, pfrom
, cto
, prefix
, ignore_self
, rem
);
440 static const char *normalize_controller(const char *controller
) {
444 if (startswith(controller
, "name="))
445 return controller
+ 5;
450 static int join_path(const char *controller
, const char *path
, const char *suffix
, char **fs
) {
453 if (!isempty(controller
)) {
454 if (!isempty(path
) && !isempty(suffix
))
455 t
= strjoin("/sys/fs/cgroup/", controller
, "/", path
, "/", suffix
, NULL
);
456 else if (!isempty(path
))
457 t
= strjoin("/sys/fs/cgroup/", controller
, "/", path
, NULL
);
458 else if (!isempty(suffix
))
459 t
= strjoin("/sys/fs/cgroup/", controller
, "/", suffix
, NULL
);
461 t
= strappend("/sys/fs/cgroup/", controller
);
463 if (!isempty(path
) && !isempty(suffix
))
464 t
= strjoin(path
, "/", suffix
, NULL
);
465 else if (!isempty(path
))
474 *fs
= path_kill_slashes(t
);
478 int cg_get_path(const char *controller
, const char *path
, const char *suffix
, char **fs
) {
480 static thread_local
bool good
= false;
484 if (controller
&& !cg_controller_is_valid(controller
))
487 if (_unlikely_(!good
)) {
490 r
= path_is_mount_point("/sys/fs/cgroup", 0);
496 /* Cache this to save a few stat()s */
500 p
= controller
? normalize_controller(controller
) : NULL
;
502 return join_path(p
, path
, suffix
, fs
);
505 static int check_hierarchy(const char *p
) {
510 if (!filename_is_valid(p
))
513 /* Check if this controller actually really exists */
514 cc
= strjoina("/sys/fs/cgroup/", p
);
515 if (laccess(cc
, F_OK
) < 0)
521 int cg_get_path_and_check(const char *controller
, const char *path
, const char *suffix
, char **fs
) {
527 if (!cg_controller_is_valid(controller
))
530 /* Normalize the controller syntax */
531 p
= normalize_controller(controller
);
533 /* Check if this controller actually really exists */
534 r
= check_hierarchy(p
);
538 return join_path(p
, path
, suffix
, fs
);
541 static int trim_cb(const char *path
, const struct stat
*sb
, int typeflag
, struct FTW
*ftwbuf
) {
546 if (typeflag
!= FTW_DP
)
549 if (ftwbuf
->level
< 1)
556 int cg_trim(const char *controller
, const char *path
, bool delete_root
) {
557 _cleanup_free_
char *fs
= NULL
;
562 r
= cg_get_path(controller
, path
, NULL
, &fs
);
567 if (nftw(fs
, trim_cb
, 64, FTW_DEPTH
|FTW_MOUNT
|FTW_PHYS
) != 0)
568 r
= errno
? -errno
: -EIO
;
571 if (rmdir(fs
) < 0 && errno
!= ENOENT
)
578 int cg_delete(const char *controller
, const char *path
) {
579 _cleanup_free_
char *parent
= NULL
;
584 r
= path_get_parent(path
, &parent
);
588 r
= cg_migrate_recursive(controller
, path
, controller
, parent
, false, true);
589 return r
== -ENOENT
? 0 : r
;
592 int cg_create(const char *controller
, const char *path
) {
593 _cleanup_free_
char *fs
= NULL
;
596 r
= cg_get_path_and_check(controller
, path
, NULL
, &fs
);
600 r
= mkdir_parents(fs
, 0755);
604 if (mkdir(fs
, 0755) < 0) {
615 int cg_create_and_attach(const char *controller
, const char *path
, pid_t pid
) {
620 r
= cg_create(controller
, path
);
624 q
= cg_attach(controller
, path
, pid
);
628 /* This does not remove the cgroup on failure */
632 int cg_attach(const char *controller
, const char *path
, pid_t pid
) {
633 _cleanup_free_
char *fs
= NULL
;
634 char c
[DECIMAL_STR_MAX(pid_t
) + 2];
640 r
= cg_get_path_and_check(controller
, path
, "cgroup.procs", &fs
);
647 snprintf(c
, sizeof(c
), PID_FMT
"\n", pid
);
649 return write_string_file(fs
, c
, 0);
652 int cg_attach_fallback(const char *controller
, const char *path
, pid_t pid
) {
659 r
= cg_attach(controller
, path
, pid
);
661 char prefix
[strlen(path
) + 1];
663 /* This didn't work? Then let's try all prefixes of
666 PATH_FOREACH_PREFIX(prefix
, path
) {
667 r
= cg_attach(controller
, prefix
, pid
);
676 int cg_set_group_access(
677 const char *controller
,
683 _cleanup_free_
char *fs
= NULL
;
688 if (mode
!= MODE_INVALID
)
691 r
= cg_get_path(controller
, path
, NULL
, &fs
);
695 return chmod_and_chown(fs
, mode
, uid
, gid
);
698 int cg_set_task_access(
699 const char *controller
,
705 _cleanup_free_
char *fs
= NULL
, *procs
= NULL
;
710 if (mode
== MODE_INVALID
&& uid
== UID_INVALID
&& gid
== GID_INVALID
)
713 if (mode
!= MODE_INVALID
)
716 r
= cg_get_path(controller
, path
, "cgroup.procs", &fs
);
720 r
= chmod_and_chown(fs
, mode
, uid
, gid
);
724 /* Compatibility, Always keep values for "tasks" in sync with
726 r
= cg_get_path(controller
, path
, "tasks", &procs
);
730 return chmod_and_chown(procs
, mode
, uid
, gid
);
733 int cg_pid_get_path(const char *controller
, pid_t pid
, char **path
) {
734 _cleanup_fclose_
FILE *f
= NULL
;
743 if (!cg_controller_is_valid(controller
))
746 controller
= normalize_controller(controller
);
748 controller
= SYSTEMD_CGROUP_CONTROLLER
;
750 fs
= procfs_file_alloca(pid
, "cgroup");
754 return errno
== ENOENT
? -ESRCH
: -errno
;
756 cs
= strlen(controller
);
758 FOREACH_LINE(line
, f
, return -errno
) {
761 const char *word
, *state
;
766 l
= strchr(line
, ':');
777 FOREACH_WORD_SEPARATOR(word
, k
, l
, ",", state
) {
779 if (k
== cs
&& memcmp(word
, controller
, cs
) == 0) {
785 memcmp(word
, "name=", 5) == 0 &&
786 memcmp(word
+5, controller
, cs
) == 0) {
806 int cg_install_release_agent(const char *controller
, const char *agent
) {
807 _cleanup_free_
char *fs
= NULL
, *contents
= NULL
;
813 r
= cg_get_path(controller
, NULL
, "release_agent", &fs
);
817 r
= read_one_line_file(fs
, &contents
);
821 sc
= strstrip(contents
);
823 r
= write_string_file(fs
, agent
, 0);
826 } else if (!streq(sc
, agent
))
831 r
= cg_get_path(controller
, NULL
, "notify_on_release", &fs
);
837 r
= read_one_line_file(fs
, &contents
);
841 sc
= strstrip(contents
);
842 if (streq(sc
, "0")) {
843 r
= write_string_file(fs
, "1", 0);
856 int cg_uninstall_release_agent(const char *controller
) {
857 _cleanup_free_
char *fs
= NULL
;
860 r
= cg_get_path(controller
, NULL
, "notify_on_release", &fs
);
864 r
= write_string_file(fs
, "0", 0);
871 r
= cg_get_path(controller
, NULL
, "release_agent", &fs
);
875 r
= write_string_file(fs
, "", 0);
882 int cg_is_empty(const char *controller
, const char *path
, bool ignore_self
) {
883 _cleanup_fclose_
FILE *f
= NULL
;
884 pid_t pid
= 0, self_pid
;
890 r
= cg_enumerate_processes(controller
, path
, &f
);
892 return r
== -ENOENT
? 1 : r
;
896 while ((r
= cg_read_pid(f
, &pid
)) > 0) {
898 if (ignore_self
&& pid
== self_pid
)
911 int cg_is_empty_recursive(const char *controller
, const char *path
, bool ignore_self
) {
912 _cleanup_closedir_
DIR *d
= NULL
;
918 r
= cg_is_empty(controller
, path
, ignore_self
);
922 r
= cg_enumerate_subgroups(controller
, path
, &d
);
924 return r
== -ENOENT
? 1 : r
;
926 while ((r
= cg_read_subgroup(d
, &fn
)) > 0) {
927 _cleanup_free_
char *p
= NULL
;
929 p
= strjoin(path
, "/", fn
, NULL
);
934 r
= cg_is_empty_recursive(controller
, p
, ignore_self
);
945 int cg_split_spec(const char *spec
, char **controller
, char **path
) {
947 char *t
= NULL
, *u
= NULL
;
948 _cleanup_free_
char *v
= NULL
;
953 if (!path_is_safe(spec
))
961 *path
= path_kill_slashes(t
);
970 e
= strchr(spec
, ':');
972 if (!cg_controller_is_valid(spec
))
976 t
= strdup(normalize_controller(spec
));
989 v
= strndup(spec
, e
-spec
);
992 t
= strdup(normalize_controller(v
));
995 if (!cg_controller_is_valid(t
)) {
1000 if (streq(e
+1, "")) {
1013 if (!path_is_safe(u
) ||
1014 !path_is_absolute(u
)) {
1020 path_kill_slashes(u
);
1036 int cg_mangle_path(const char *path
, char **result
) {
1037 _cleanup_free_
char *c
= NULL
, *p
= NULL
;
1044 /* First, check if it already is a filesystem path */
1045 if (path_startswith(path
, "/sys/fs/cgroup")) {
1051 *result
= path_kill_slashes(t
);
1055 /* Otherwise, treat it as cg spec */
1056 r
= cg_split_spec(path
, &c
, &p
);
1060 return cg_get_path(c
? c
: SYSTEMD_CGROUP_CONTROLLER
, p
? p
: "/", NULL
, result
);
1063 int cg_get_root_path(char **path
) {
1069 r
= cg_pid_get_path(SYSTEMD_CGROUP_CONTROLLER
, 1, &p
);
1073 e
= endswith(p
, "/" SPECIAL_SYSTEM_SLICE
);
1081 int cg_shift_path(const char *cgroup
, const char *root
, const char **shifted
) {
1082 _cleanup_free_
char *rt
= NULL
;
1090 /* If the root was specified let's use that, otherwise
1091 * let's determine it from PID 1 */
1093 r
= cg_get_root_path(&rt
);
1100 p
= path_startswith(cgroup
, root
);
1109 int cg_pid_get_path_shifted(pid_t pid
, const char *root
, char **cgroup
) {
1110 _cleanup_free_
char *raw
= NULL
;
1117 r
= cg_pid_get_path(SYSTEMD_CGROUP_CONTROLLER
, pid
, &raw
);
1121 r
= cg_shift_path(raw
, root
, &c
);
1141 int cg_path_decode_unit(const char *cgroup
, char **unit
){
1148 n
= strcspn(cgroup
, "/");
1152 c
= strndupa(cgroup
, n
);
1155 if (!unit_name_is_valid(c
, UNIT_NAME_PLAIN
|UNIT_NAME_INSTANCE
))
1166 static bool valid_slice_name(const char *p
, size_t n
) {
1171 if (n
< strlen("x.slice"))
1174 if (memcmp(p
+ n
- 6, ".slice", 6) == 0) {
1180 c
= cg_unescape(buf
);
1182 return unit_name_is_valid(c
, UNIT_NAME_PLAIN
);
1188 static const char *skip_slices(const char *p
) {
1191 /* Skips over all slice assignments */
1196 p
+= strspn(p
, "/");
1198 n
= strcspn(p
, "/");
1199 if (!valid_slice_name(p
, n
))
1206 int cg_path_get_unit(const char *path
, char **ret
) {
1214 e
= skip_slices(path
);
1216 r
= cg_path_decode_unit(e
, &unit
);
1220 /* We skipped over the slices, don't accept any now */
1221 if (endswith(unit
, ".slice")) {
1230 int cg_pid_get_unit(pid_t pid
, char **unit
) {
1231 _cleanup_free_
char *cgroup
= NULL
;
1236 r
= cg_pid_get_path_shifted(pid
, NULL
, &cgroup
);
1240 return cg_path_get_unit(cgroup
, unit
);
1244 * Skip session-*.scope, but require it to be there.
1246 static const char *skip_session(const char *p
) {
1252 p
+= strspn(p
, "/");
1254 n
= strcspn(p
, "/");
1255 if (n
< strlen("session-x.scope"))
1258 if (memcmp(p
, "session-", 8) == 0 && memcmp(p
+ n
- 6, ".scope", 6) == 0) {
1259 char buf
[n
- 8 - 6 + 1];
1261 memcpy(buf
, p
+ 8, n
- 8 - 6);
1264 /* Note that session scopes never need unescaping,
1265 * since they cannot conflict with the kernel's own
1266 * names, hence we don't need to call cg_unescape()
1269 if (!session_id_valid(buf
))
1273 p
+= strspn(p
, "/");
1281 * Skip user@*.service, but require it to be there.
1283 static const char *skip_user_manager(const char *p
) {
1289 p
+= strspn(p
, "/");
1291 n
= strcspn(p
, "/");
1292 if (n
< strlen("user@x.service"))
1295 if (memcmp(p
, "user@", 5) == 0 && memcmp(p
+ n
- 8, ".service", 8) == 0) {
1296 char buf
[n
- 5 - 8 + 1];
1298 memcpy(buf
, p
+ 5, n
- 5 - 8);
1301 /* Note that user manager services never need unescaping,
1302 * since they cannot conflict with the kernel's own
1303 * names, hence we don't need to call cg_unescape()
1306 if (parse_uid(buf
, NULL
) < 0)
1310 p
+= strspn(p
, "/");
1318 static const char *skip_user_prefix(const char *path
) {
1323 /* Skip slices, if there are any */
1324 e
= skip_slices(path
);
1326 /* Skip the user manager, if it's in the path now... */
1327 t
= skip_user_manager(e
);
1331 /* Alternatively skip the user session if it is in the path... */
1332 return skip_session(e
);
1335 int cg_path_get_user_unit(const char *path
, char **ret
) {
1341 t
= skip_user_prefix(path
);
1345 /* And from here on it looks pretty much the same as for a
1346 * system unit, hence let's use the same parser from here
1348 return cg_path_get_unit(t
, ret
);
1351 int cg_pid_get_user_unit(pid_t pid
, char **unit
) {
1352 _cleanup_free_
char *cgroup
= NULL
;
1357 r
= cg_pid_get_path_shifted(pid
, NULL
, &cgroup
);
1361 return cg_path_get_user_unit(cgroup
, unit
);
1364 int cg_path_get_machine_name(const char *path
, char **machine
) {
1365 _cleanup_free_
char *u
= NULL
, *sl
= NULL
;
1368 r
= cg_path_get_unit(path
, &u
);
1372 sl
= strjoin("/run/systemd/machines/unit:", u
, NULL
);
1376 return readlink_malloc(sl
, machine
);
1379 int cg_pid_get_machine_name(pid_t pid
, char **machine
) {
1380 _cleanup_free_
char *cgroup
= NULL
;
1385 r
= cg_pid_get_path_shifted(pid
, NULL
, &cgroup
);
1389 return cg_path_get_machine_name(cgroup
, machine
);
1392 int cg_path_get_session(const char *path
, char **session
) {
1393 _cleanup_free_
char *unit
= NULL
;
1399 r
= cg_path_get_unit(path
, &unit
);
1403 start
= startswith(unit
, "session-");
1406 end
= endswith(start
, ".scope");
1411 if (!session_id_valid(start
))
1427 int cg_pid_get_session(pid_t pid
, char **session
) {
1428 _cleanup_free_
char *cgroup
= NULL
;
1431 r
= cg_pid_get_path_shifted(pid
, NULL
, &cgroup
);
1435 return cg_path_get_session(cgroup
, session
);
1438 int cg_path_get_owner_uid(const char *path
, uid_t
*uid
) {
1439 _cleanup_free_
char *slice
= NULL
;
1445 r
= cg_path_get_slice(path
, &slice
);
1449 start
= startswith(slice
, "user-");
1452 end
= endswith(start
, ".slice");
1457 if (parse_uid(start
, uid
) < 0)
1463 int cg_pid_get_owner_uid(pid_t pid
, uid_t
*uid
) {
1464 _cleanup_free_
char *cgroup
= NULL
;
1467 r
= cg_pid_get_path_shifted(pid
, NULL
, &cgroup
);
1471 return cg_path_get_owner_uid(cgroup
, uid
);
1474 int cg_path_get_slice(const char *p
, char **slice
) {
1475 const char *e
= NULL
;
1480 /* Finds the right-most slice unit from the beginning, but
1481 * stops before we come to the first non-slice unit. */
1486 p
+= strspn(p
, "/");
1488 n
= strcspn(p
, "/");
1489 if (!valid_slice_name(p
, n
)) {
1494 s
= strdup("-.slice");
1502 return cg_path_decode_unit(e
, slice
);
1510 int cg_pid_get_slice(pid_t pid
, char **slice
) {
1511 _cleanup_free_
char *cgroup
= NULL
;
1516 r
= cg_pid_get_path_shifted(pid
, NULL
, &cgroup
);
1520 return cg_path_get_slice(cgroup
, slice
);
1523 int cg_path_get_user_slice(const char *p
, char **slice
) {
1528 t
= skip_user_prefix(p
);
1532 /* And now it looks pretty much the same as for a system
1533 * slice, so let's just use the same parser from here on. */
1534 return cg_path_get_slice(t
, slice
);
1537 int cg_pid_get_user_slice(pid_t pid
, char **slice
) {
1538 _cleanup_free_
char *cgroup
= NULL
;
1543 r
= cg_pid_get_path_shifted(pid
, NULL
, &cgroup
);
1547 return cg_path_get_user_slice(cgroup
, slice
);
1550 char *cg_escape(const char *p
) {
1551 bool need_prefix
= false;
1553 /* This implements very minimal escaping for names to be used
1554 * as file names in the cgroup tree: any name which might
1555 * conflict with a kernel name or is prefixed with '_' is
1556 * prefixed with a '_'. That way, when reading cgroup names it
1557 * is sufficient to remove a single prefixing underscore if
1560 /* The return value of this function (unlike cg_unescape())
1566 streq(p
, "notify_on_release") ||
1567 streq(p
, "release_agent") ||
1573 dot
= strrchr(p
, '.');
1576 if (dot
- p
== 6 && memcmp(p
, "cgroup", 6) == 0)
1581 n
= strndupa(p
, dot
- p
);
1583 if (check_hierarchy(n
) >= 0)
1590 return strappend("_", p
);
1595 char *cg_unescape(const char *p
) {
1598 /* The return value of this function (unlike cg_escape())
1599 * doesn't need free()! */
1607 #define CONTROLLER_VALID \
1611 bool cg_controller_is_valid(const char *p
) {
1617 s
= startswith(p
, "name=");
1621 if (*p
== 0 || *p
== '_')
1624 for (t
= p
; *t
; t
++)
1625 if (!strchr(CONTROLLER_VALID
, *t
))
1628 if (t
- p
> FILENAME_MAX
)
1634 int cg_slice_to_path(const char *unit
, char **ret
) {
1635 _cleanup_free_
char *p
= NULL
, *s
= NULL
, *e
= NULL
;
1642 if (streq(unit
, "-.slice")) {
1652 if (!unit_name_is_valid(unit
, UNIT_NAME_PLAIN
))
1655 if (!endswith(unit
, ".slice"))
1658 r
= unit_name_to_prefix(unit
, &p
);
1662 dash
= strchr(p
, '-');
1664 /* Don't allow initial dashes */
1669 _cleanup_free_
char *escaped
= NULL
;
1670 char n
[dash
- p
+ sizeof(".slice")];
1672 /* Don't allow trailing or double dashes */
1673 if (dash
[1] == 0 || dash
[1] == '-')
1676 strcpy(stpncpy(n
, p
, dash
- p
), ".slice");
1677 if (!unit_name_is_valid(n
, UNIT_NAME_PLAIN
))
1680 escaped
= cg_escape(n
);
1684 if (!strextend(&s
, escaped
, "/", NULL
))
1687 dash
= strchr(dash
+1, '-');
1690 e
= cg_escape(unit
);
1694 if (!strextend(&s
, e
, NULL
))
1703 int cg_set_attribute(const char *controller
, const char *path
, const char *attribute
, const char *value
) {
1704 _cleanup_free_
char *p
= NULL
;
1707 r
= cg_get_path(controller
, path
, attribute
, &p
);
1711 return write_string_file(p
, value
, 0);
1714 int cg_get_attribute(const char *controller
, const char *path
, const char *attribute
, char **ret
) {
1715 _cleanup_free_
char *p
= NULL
;
1718 r
= cg_get_path(controller
, path
, attribute
, &p
);
1722 return read_one_line_file(p
, ret
);
1725 static const char mask_names
[] =
1732 int cg_create_everywhere(CGroupControllerMask supported
, CGroupControllerMask mask
, const char *path
) {
1733 CGroupControllerMask bit
= 1;
1737 /* This one will create a cgroup in our private tree, but also
1738 * duplicate it in the trees specified in mask, and remove it
1741 /* First create the cgroup in our own hierarchy. */
1742 r
= cg_create(SYSTEMD_CGROUP_CONTROLLER
, path
);
1746 /* Then, do the same in the other hierarchies */
1747 NULSTR_FOREACH(n
, mask_names
) {
1750 else if (supported
& bit
)
1751 cg_trim(n
, path
, true);
1759 int cg_attach_everywhere(CGroupControllerMask supported
, const char *path
, pid_t pid
, cg_migrate_callback_t path_callback
, void *userdata
) {
1760 CGroupControllerMask bit
= 1;
1764 r
= cg_attach(SYSTEMD_CGROUP_CONTROLLER
, path
, pid
);
1768 NULSTR_FOREACH(n
, mask_names
) {
1770 if (supported
& bit
) {
1771 const char *p
= NULL
;
1774 p
= path_callback(bit
, userdata
);
1779 cg_attach_fallback(n
, p
, pid
);
1788 int cg_attach_many_everywhere(CGroupControllerMask supported
, const char *path
, Set
* pids
, cg_migrate_callback_t path_callback
, void *userdata
) {
1793 SET_FOREACH(pidp
, pids
, i
) {
1794 pid_t pid
= PTR_TO_LONG(pidp
);
1797 q
= cg_attach_everywhere(supported
, path
, pid
, path_callback
, userdata
);
1805 int cg_migrate_everywhere(CGroupControllerMask supported
, const char *from
, const char *to
, cg_migrate_callback_t to_callback
, void *userdata
) {
1806 CGroupControllerMask bit
= 1;
1810 if (!path_equal(from
, to
)) {
1811 r
= cg_migrate_recursive(SYSTEMD_CGROUP_CONTROLLER
, from
, SYSTEMD_CGROUP_CONTROLLER
, to
, false, true);
1816 NULSTR_FOREACH(n
, mask_names
) {
1817 if (supported
& bit
) {
1818 const char *p
= NULL
;
1821 p
= to_callback(bit
, userdata
);
1826 cg_migrate_recursive_fallback(SYSTEMD_CGROUP_CONTROLLER
, to
, n
, p
, false, false);
1835 int cg_trim_everywhere(CGroupControllerMask supported
, const char *path
, bool delete_root
) {
1836 CGroupControllerMask bit
= 1;
1840 r
= cg_trim(SYSTEMD_CGROUP_CONTROLLER
, path
, delete_root
);
1844 NULSTR_FOREACH(n
, mask_names
) {
1845 if (supported
& bit
)
1846 cg_trim(n
, path
, delete_root
);
1854 CGroupControllerMask
cg_mask_supported(void) {
1855 CGroupControllerMask bit
= 1, mask
= 0;
1858 NULSTR_FOREACH(n
, mask_names
) {
1859 if (check_hierarchy(n
) >= 0)
1868 int cg_kernel_controllers(Set
*controllers
) {
1869 _cleanup_fclose_
FILE *f
= NULL
;
1873 assert(controllers
);
1875 f
= fopen("/proc/cgroups", "re");
1877 if (errno
== ENOENT
)
1882 /* Ignore the header line */
1883 (void) fgets(buf
, sizeof(buf
), f
);
1890 if (fscanf(f
, "%ms %*i %*i %i", &controller
, &enabled
) != 2) {
1895 if (ferror(f
) && errno
)
1906 if (!filename_is_valid(controller
)) {
1911 r
= set_consume(controllers
, controller
);