]>
Commit | Line | Data |
---|---|---|
db9ecf05 | 1 | /* SPDX-License-Identifier: LGPL-2.1-or-later */ |
c2f1db8f | 2 | #pragma once |
8c6db833 | 3 | |
35d2e7ec | 4 | #include <dirent.h> |
a5edf95e | 5 | #include <fcntl.h> |
11c3a366 TA |
6 | #include <stdbool.h> |
7 | #include <stdint.h> | |
71d35b6b | 8 | #include <stdio.h> |
f0bef277 | 9 | #include <sys/statfs.h> |
71d35b6b | 10 | #include <sys/types.h> |
c6c18be3 | 11 | |
28db6fbf | 12 | #include "constants.h" |
12c7d27b | 13 | #include "pidref.h" |
93cc7779 | 14 | #include "set.h" |
8c6db833 | 15 | |
68ac0d05 LP |
16 | #define SYSTEMD_CGROUP_CONTROLLER_LEGACY "name=systemd" |
17 | #define SYSTEMD_CGROUP_CONTROLLER_HYBRID "name=unified" | |
18 | #define SYSTEMD_CGROUP_CONTROLLER "_systemd" | |
19 | ||
efdb0237 LP |
20 | /* An enum of well known cgroup controllers */ |
21 | typedef enum CGroupController { | |
17f14955 | 22 | /* Original cgroup controllers */ |
efdb0237 | 23 | CGROUP_CONTROLLER_CPU, |
00b4a247 | 24 | CGROUP_CONTROLLER_CPUACCT, /* v1 only */ |
047f5d63 | 25 | CGROUP_CONTROLLER_CPUSET, /* v2 only */ |
00b4a247 LP |
26 | CGROUP_CONTROLLER_IO, /* v2 only */ |
27 | CGROUP_CONTROLLER_BLKIO, /* v1 only */ | |
efdb0237 | 28 | CGROUP_CONTROLLER_MEMORY, |
00b4a247 | 29 | CGROUP_CONTROLLER_DEVICES, /* v1 only */ |
03a7b521 | 30 | CGROUP_CONTROLLER_PIDS, |
17f14955 RG |
31 | |
32 | /* BPF-based pseudo-controllers, v2 only */ | |
33 | CGROUP_CONTROLLER_BPF_FIREWALL, | |
084c7007 | 34 | CGROUP_CONTROLLER_BPF_DEVICES, |
506ea51b | 35 | CGROUP_CONTROLLER_BPF_FOREIGN, |
a8e5eb17 | 36 | CGROUP_CONTROLLER_BPF_SOCKET_BIND, |
6f50d4f7 | 37 | CGROUP_CONTROLLER_BPF_RESTRICT_NETWORK_INTERFACES, |
b1994387 | 38 | /* The BPF hook implementing RestrictFileSystems= is not defined here. |
bb5232b6 | 39 | * It's applied as late as possible in exec_invoke() so we don't block |
b1994387 | 40 | * our own unit setup code. */ |
17f14955 | 41 | |
efdb0237 | 42 | _CGROUP_CONTROLLER_MAX, |
2d93c20e | 43 | _CGROUP_CONTROLLER_INVALID = -EINVAL, |
efdb0237 LP |
44 | } CGroupController; |
45 | ||
46f84f95 | 46 | #define CGROUP_CONTROLLER_TO_MASK(c) (1U << (c)) |
efdb0237 | 47 | |
4ad49000 | 48 | /* A bit mask of well known cgroup controllers */ |
efdb0237 LP |
49 | typedef enum CGroupMask { |
50 | CGROUP_MASK_CPU = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_CPU), | |
51 | CGROUP_MASK_CPUACCT = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_CPUACCT), | |
047f5d63 | 52 | CGROUP_MASK_CPUSET = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_CPUSET), |
13c31542 | 53 | CGROUP_MASK_IO = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_IO), |
efdb0237 LP |
54 | CGROUP_MASK_BLKIO = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BLKIO), |
55 | CGROUP_MASK_MEMORY = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_MEMORY), | |
3905f127 | 56 | CGROUP_MASK_DEVICES = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_DEVICES), |
03a7b521 | 57 | CGROUP_MASK_PIDS = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_PIDS), |
17f14955 | 58 | CGROUP_MASK_BPF_FIREWALL = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_FIREWALL), |
084c7007 | 59 | CGROUP_MASK_BPF_DEVICES = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_DEVICES), |
506ea51b | 60 | CGROUP_MASK_BPF_FOREIGN = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_FOREIGN), |
a8e5eb17 | 61 | CGROUP_MASK_BPF_SOCKET_BIND = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_SOCKET_BIND), |
6f50d4f7 | 62 | CGROUP_MASK_BPF_RESTRICT_NETWORK_INTERFACES = CGROUP_CONTROLLER_TO_MASK(CGROUP_CONTROLLER_BPF_RESTRICT_NETWORK_INTERFACES), |
4edd65e4 | 63 | |
4e1dfa45 | 64 | /* All real cgroup v1 controllers */ |
4edd65e4 LP |
65 | CGROUP_MASK_V1 = CGROUP_MASK_CPU|CGROUP_MASK_CPUACCT|CGROUP_MASK_BLKIO|CGROUP_MASK_MEMORY|CGROUP_MASK_DEVICES|CGROUP_MASK_PIDS, |
66 | ||
4e1dfa45 | 67 | /* All real cgroup v2 controllers */ |
047f5d63 | 68 | CGROUP_MASK_V2 = CGROUP_MASK_CPU|CGROUP_MASK_CPUSET|CGROUP_MASK_IO|CGROUP_MASK_MEMORY|CGROUP_MASK_PIDS, |
4edd65e4 | 69 | |
d282d55d | 70 | /* All controllers we want to delegate in case of Delegate=yes. Which are pretty much the v2 controllers only, as delegation on v1 is not safe, and bpf stuff isn't a real controller */ |
677e6c14 LP |
71 | CGROUP_MASK_DELEGATE = CGROUP_MASK_V2, |
72 | ||
4e1dfa45 | 73 | /* All cgroup v2 BPF pseudo-controllers */ |
6f50d4f7 | 74 | CGROUP_MASK_BPF = CGROUP_MASK_BPF_FIREWALL|CGROUP_MASK_BPF_DEVICES|CGROUP_MASK_BPF_FOREIGN|CGROUP_MASK_BPF_SOCKET_BIND|CGROUP_MASK_BPF_RESTRICT_NETWORK_INTERFACES, |
4edd65e4 | 75 | |
677e6c14 | 76 | _CGROUP_MASK_ALL = CGROUP_CONTROLLER_TO_MASK(_CGROUP_CONTROLLER_MAX) - 1, |
efdb0237 | 77 | } CGroupMask; |
4ad49000 | 78 | |
c01ef321 LP |
79 | static inline CGroupMask CGROUP_MASK_EXTEND_JOINED(CGroupMask mask) { |
80 | /* We always mount "cpu" and "cpuacct" in the same hierarchy. Hence, when one bit is set also set the other */ | |
81 | ||
82 | if (mask & (CGROUP_MASK_CPU|CGROUP_MASK_CPUACCT)) | |
83 | mask |= (CGROUP_MASK_CPU|CGROUP_MASK_CPUACCT); | |
84 | ||
85 | return mask; | |
86 | } | |
87 | ||
f98c2585 CD |
88 | CGroupMask get_cpu_accounting_mask(void); |
89 | bool cpu_accounting_is_cheap(void); | |
90 | ||
13c31542 | 91 | /* Special values for all weight knobs on unified hierarchy */ |
fd4e991d | 92 | #define CGROUP_WEIGHT_INVALID UINT64_MAX |
c8340822 | 93 | #define CGROUP_WEIGHT_IDLE UINT64_C(0) |
13c31542 TH |
94 | #define CGROUP_WEIGHT_MIN UINT64_C(1) |
95 | #define CGROUP_WEIGHT_MAX UINT64_C(10000) | |
96 | #define CGROUP_WEIGHT_DEFAULT UINT64_C(100) | |
97 | ||
98 | #define CGROUP_LIMIT_MIN UINT64_C(0) | |
fd4e991d | 99 | #define CGROUP_LIMIT_MAX UINT64_MAX |
13c31542 TH |
100 | |
101 | static inline bool CGROUP_WEIGHT_IS_OK(uint64_t x) { | |
102 | return | |
103 | x == CGROUP_WEIGHT_INVALID || | |
104 | (x >= CGROUP_WEIGHT_MIN && x <= CGROUP_WEIGHT_MAX); | |
105 | } | |
106 | ||
9be57249 TH |
107 | /* IO limits on unified hierarchy */ |
108 | typedef enum CGroupIOLimitType { | |
109 | CGROUP_IO_RBPS_MAX, | |
110 | CGROUP_IO_WBPS_MAX, | |
ac06a0cf TH |
111 | CGROUP_IO_RIOPS_MAX, |
112 | CGROUP_IO_WIOPS_MAX, | |
9be57249 TH |
113 | |
114 | _CGROUP_IO_LIMIT_TYPE_MAX, | |
2d93c20e | 115 | _CGROUP_IO_LIMIT_TYPE_INVALID = -EINVAL, |
9be57249 TH |
116 | } CGroupIOLimitType; |
117 | ||
118 | extern const uint64_t cgroup_io_limit_defaults[_CGROUP_IO_LIMIT_TYPE_MAX]; | |
119 | ||
120 | const char* cgroup_io_limit_type_to_string(CGroupIOLimitType t) _const_; | |
121 | CGroupIOLimitType cgroup_io_limit_type_from_string(const char *s) _pure_; | |
122 | ||
d53d9474 | 123 | /* Special values for the cpu.shares attribute */ |
fd4e991d | 124 | #define CGROUP_CPU_SHARES_INVALID UINT64_MAX |
d53d9474 LP |
125 | #define CGROUP_CPU_SHARES_MIN UINT64_C(2) |
126 | #define CGROUP_CPU_SHARES_MAX UINT64_C(262144) | |
127 | #define CGROUP_CPU_SHARES_DEFAULT UINT64_C(1024) | |
128 | ||
129 | static inline bool CGROUP_CPU_SHARES_IS_OK(uint64_t x) { | |
130 | return | |
131 | x == CGROUP_CPU_SHARES_INVALID || | |
132 | (x >= CGROUP_CPU_SHARES_MIN && x <= CGROUP_CPU_SHARES_MAX); | |
133 | } | |
134 | ||
d2bd0bfa MK |
135 | /* Special values for the special {blkio,io}.bfq.weight attribute */ |
136 | #define CGROUP_BFQ_WEIGHT_INVALID UINT64_MAX | |
137 | #define CGROUP_BFQ_WEIGHT_MIN UINT64_C(1) | |
138 | #define CGROUP_BFQ_WEIGHT_MAX UINT64_C(1000) | |
139 | #define CGROUP_BFQ_WEIGHT_DEFAULT UINT64_C(100) | |
140 | ||
141 | /* Convert the normal io.weight value to io.bfq.weight */ | |
142 | static inline uint64_t BFQ_WEIGHT(uint64_t io_weight) { | |
143 | return | |
144 | io_weight <= CGROUP_WEIGHT_DEFAULT ? | |
145 | CGROUP_BFQ_WEIGHT_DEFAULT - (CGROUP_WEIGHT_DEFAULT - io_weight) * (CGROUP_BFQ_WEIGHT_DEFAULT - CGROUP_BFQ_WEIGHT_MIN) / (CGROUP_WEIGHT_DEFAULT - CGROUP_WEIGHT_MIN) : | |
146 | CGROUP_BFQ_WEIGHT_DEFAULT + (io_weight - CGROUP_WEIGHT_DEFAULT) * (CGROUP_BFQ_WEIGHT_MAX - CGROUP_BFQ_WEIGHT_DEFAULT) / (CGROUP_WEIGHT_MAX - CGROUP_WEIGHT_DEFAULT); | |
147 | } | |
148 | ||
d53d9474 | 149 | /* Special values for the blkio.weight attribute */ |
fd4e991d | 150 | #define CGROUP_BLKIO_WEIGHT_INVALID UINT64_MAX |
d53d9474 LP |
151 | #define CGROUP_BLKIO_WEIGHT_MIN UINT64_C(10) |
152 | #define CGROUP_BLKIO_WEIGHT_MAX UINT64_C(1000) | |
153 | #define CGROUP_BLKIO_WEIGHT_DEFAULT UINT64_C(500) | |
154 | ||
155 | static inline bool CGROUP_BLKIO_WEIGHT_IS_OK(uint64_t x) { | |
156 | return | |
157 | x == CGROUP_BLKIO_WEIGHT_INVALID || | |
158 | (x >= CGROUP_BLKIO_WEIGHT_MIN && x <= CGROUP_BLKIO_WEIGHT_MAX); | |
159 | } | |
160 | ||
5da38d07 TH |
161 | typedef enum CGroupUnified { |
162 | CGROUP_UNIFIED_UNKNOWN = -1, | |
163 | CGROUP_UNIFIED_NONE = 0, /* Both systemd and controllers on legacy */ | |
164 | CGROUP_UNIFIED_SYSTEMD = 1, /* Only systemd on unified */ | |
165 | CGROUP_UNIFIED_ALL = 2, /* Both systemd and controllers on unified */ | |
166 | } CGroupUnified; | |
167 | ||
5954c074 LP |
168 | /* |
169 | * General rules: | |
170 | * | |
171 | * We accept named hierarchies in the syntax "foo" and "name=foo". | |
172 | * | |
173 | * We expect that named hierarchies do not conflict in name with a | |
174 | * kernel hierarchy, modulo the "name=" prefix. | |
175 | * | |
176 | * We always generate "normalized" controller names, i.e. without the | |
177 | * "name=" prefix. | |
178 | * | |
179 | * We require absolute cgroup paths. When returning, we will always | |
180 | * generate paths with multiple adjacent / removed. | |
181 | */ | |
182 | ||
3b287495 LP |
183 | int cg_path_open(const char *controller, const char *path); |
184 | int cg_cgroupid_open(int fsfd, uint64_t id); | |
185 | ||
aef43552 LP |
186 | int cg_enumerate_processes(const char *controller, const char *path, FILE **ret); |
187 | int cg_read_pid(FILE *f, pid_t *ret); | |
12c7d27b | 188 | int cg_read_pidref(FILE *f, PidRef *ret); |
aef43552 | 189 | int cg_read_event(const char *controller, const char *path, const char *event, char **ret); |
c6c18be3 | 190 | |
aef43552 LP |
191 | int cg_enumerate_subgroups(const char *controller, const char *path, DIR **ret); |
192 | int cg_read_subgroup(DIR *d, char **ret); | |
35d2e7ec | 193 | |
1d98fef1 | 194 | typedef enum CGroupFlags { |
be0b7a1a LP |
195 | CGROUP_SIGCONT = 1 << 0, |
196 | CGROUP_IGNORE_SELF = 1 << 1, | |
197 | CGROUP_REMOVE = 1 << 2, | |
1d98fef1 | 198 | } CGroupFlags; |
8c6db833 | 199 | |
4d1b2df1 | 200 | typedef int (*cg_kill_log_func_t)(const PidRef *pid, int sig, void *userdata); |
1d98fef1 | 201 | |
bd1791b5 LP |
202 | int cg_kill(const char *path, int sig, CGroupFlags flags, Set *s, cg_kill_log_func_t kill_log, void *userdata); |
203 | int cg_kill_kernel_sigkill(const char *path); | |
204 | int cg_kill_recursive(const char *path, int sig, CGroupFlags flags, Set *s, cg_kill_log_func_t kill_log, void *userdata); | |
1d98fef1 | 205 | |
2a8020fe | 206 | int cg_split_spec(const char *spec, char **ret_controller, char **ret_path); |
820fe745 | 207 | int cg_mangle_path(const char *path, char **ret); |
8c6db833 | 208 | |
820fe745 LP |
209 | int cg_get_path(const char *controller, const char *path, const char *suffix, char **ret); |
210 | int cg_get_path_and_check(const char *controller, const char *path, const char *suffix, char **ret); | |
7027ff61 | 211 | |
820fe745 | 212 | int cg_pid_get_path(const char *controller, pid_t pid, char **ret); |
f2a2e60b | 213 | int cg_pidref_get_path(const char *controller, const PidRef *pidref, char **ret); |
8c6db833 | 214 | |
4ad49000 | 215 | int cg_rmdir(const char *controller, const char *path); |
8c6db833 | 216 | |
bd1791b5 | 217 | int cg_is_threaded(const char *path); |
084e7706 | 218 | |
b426b4ee | 219 | int cg_is_delegated(const char *path); |
6414203c | 220 | int cg_is_delegated_fd(int fd); |
b426b4ee | 221 | |
6cf96ab4 NR |
222 | int cg_has_coredump_receive(const char *path); |
223 | ||
07e8c305 | 224 | typedef enum { |
25a1f04c MS |
225 | CG_KEY_MODE_GRACEFUL = 1 << 0, |
226 | } CGroupKeyMode; | |
227 | ||
4ad49000 | 228 | int cg_set_attribute(const char *controller, const char *path, const char *attribute, const char *value); |
934277fe | 229 | int cg_get_attribute(const char *controller, const char *path, const char *attribute, char **ret); |
25a1f04c MS |
230 | int cg_get_keyed_attribute_full(const char *controller, const char *path, const char *attribute, char **keys, char **values, CGroupKeyMode mode); |
231 | ||
232 | static inline int cg_get_keyed_attribute( | |
233 | const char *controller, | |
234 | const char *path, | |
235 | const char *attribute, | |
236 | char **keys, | |
237 | char **ret_values) { | |
238 | return cg_get_keyed_attribute_full(controller, path, attribute, keys, ret_values, 0); | |
239 | } | |
240 | ||
241 | static inline int cg_get_keyed_attribute_graceful( | |
242 | const char *controller, | |
243 | const char *path, | |
244 | const char *attribute, | |
245 | char **keys, | |
246 | char **ret_values) { | |
247 | return cg_get_keyed_attribute_full(controller, path, attribute, keys, ret_values, CG_KEY_MODE_GRACEFUL); | |
248 | } | |
4ad49000 | 249 | |
613328c3 AZ |
250 | int cg_get_attribute_as_uint64(const char *controller, const char *path, const char *attribute, uint64_t *ret); |
251 | ||
b41dcc51 AZ |
252 | /* Does a parse_boolean() on the attribute contents and sets ret accordingly */ |
253 | int cg_get_attribute_as_bool(const char *controller, const char *path, const char *attribute, bool *ret); | |
254 | ||
bd1791b5 | 255 | int cg_get_owner(const char *path, uid_t *ret_uid); |
8c6db833 | 256 | |
bd1791b5 LP |
257 | int cg_set_xattr(const char *path, const char *name, const void *value, size_t size, int flags); |
258 | int cg_get_xattr(const char *path, const char *name, void *value, size_t size); | |
259 | int cg_get_xattr_malloc(const char *path, const char *name, char **ret); | |
59331b8e | 260 | /* Returns negative on error, and 0 or 1 on success for the bool value */ |
bd1791b5 LP |
261 | int cg_get_xattr_bool(const char *path, const char *name); |
262 | int cg_remove_xattr(const char *path, const char *name); | |
4b58153d | 263 | |
8c6db833 | 264 | int cg_install_release_agent(const char *controller, const char *agent); |
ad929bcc | 265 | int cg_uninstall_release_agent(const char *controller); |
8c6db833 | 266 | |
6f883237 LP |
267 | int cg_is_empty(const char *controller, const char *path); |
268 | int cg_is_empty_recursive(const char *controller, const char *path); | |
8c6db833 | 269 | |
7027ff61 | 270 | int cg_get_root_path(char **path); |
6c03089c | 271 | |
535e3dd0 | 272 | int cg_path_get_cgroupid(const char *path, uint64_t *ret); |
3b287495 | 273 | int cg_fd_get_cgroupid(int fd, uint64_t *ret); |
820fe745 LP |
274 | int cg_path_get_session(const char *path, char **ret_session); |
275 | int cg_path_get_owner_uid(const char *path, uid_t *ret_uid); | |
276 | int cg_path_get_unit(const char *path, char **ret_unit); | |
277 | int cg_path_get_unit_path(const char *path, char **ret_unit); | |
278 | int cg_path_get_user_unit(const char *path, char **ret_unit); | |
279 | int cg_path_get_machine_name(const char *path, char **ret_machine); | |
280 | int cg_path_get_slice(const char *path, char **ret_slice); | |
281 | int cg_path_get_user_slice(const char *path, char **ret_slice); | |
282 | ||
283 | int cg_shift_path(const char *cgroup, const char *cached_root, const char **ret_shifted); | |
284 | int cg_pid_get_path_shifted(pid_t pid, const char *cached_root, char **ret_cgroup); | |
285 | ||
286 | int cg_pid_get_session(pid_t pid, char **ret_session); | |
287 | int cg_pid_get_owner_uid(pid_t pid, uid_t *ret_uid); | |
288 | int cg_pid_get_unit(pid_t pid, char **ret_unit); | |
2c302e89 | 289 | int cg_pidref_get_unit(const PidRef *pidref, char **ret); |
820fe745 LP |
290 | int cg_pid_get_user_unit(pid_t pid, char **ret_unit); |
291 | int cg_pid_get_machine_name(pid_t pid, char **ret_machine); | |
292 | int cg_pid_get_slice(pid_t pid, char **ret_slice); | |
293 | int cg_pid_get_user_slice(pid_t pid, char **ret_slice); | |
294 | ||
295 | int cg_path_decode_unit(const char *cgroup, char **ret_unit); | |
96cde13a | 296 | |
1a56b0c0 LP |
297 | bool cg_needs_escape(const char *p); |
298 | int cg_escape(const char *p, char **ret); | |
44a6b1b6 | 299 | char *cg_unescape(const char *p) _pure_; |
78edb35a | 300 | |
185a0874 | 301 | bool cg_controller_is_valid(const char *p); |
a016b922 LP |
302 | |
303 | int cg_slice_to_path(const char *unit, char **ret); | |
4ad49000 | 304 | |
efdb0237 | 305 | typedef const char* (*cg_migrate_callback_t)(CGroupMask mask, void *userdata); |
03b90d4b | 306 | |
efdb0237 | 307 | int cg_mask_supported(CGroupMask *ret); |
0fa7b500 | 308 | int cg_mask_supported_subtree(const char *root, CGroupMask *ret); |
aae7e17f FB |
309 | int cg_mask_from_string(const char *s, CGroupMask *ret); |
310 | int cg_mask_to_string(CGroupMask mask, char **ret); | |
b12afc8c | 311 | |
6925a0de | 312 | int cg_kernel_controllers(Set **controllers); |
efdb0237 | 313 | |
3228995c | 314 | bool cg_ns_supported(void); |
d9e45bc3 | 315 | bool cg_freezer_supported(void); |
8a513eee | 316 | bool cg_kill_supported(void); |
3228995c | 317 | |
b4cccbc1 LP |
318 | int cg_all_unified(void); |
319 | int cg_hybrid_unified(void); | |
c22800e4 | 320 | int cg_unified_controller(const char *controller); |
d4d99bc6 ZJS |
321 | int cg_unified_cached(bool flush); |
322 | static inline int cg_unified(void) { | |
323 | return cg_unified_cached(true); | |
324 | } | |
efdb0237 LP |
325 | |
326 | const char* cgroup_controller_to_string(CGroupController c) _const_; | |
327 | CGroupController cgroup_controller_from_string(const char *s) _pure_; | |
d53d9474 | 328 | |
f0bef277 EV |
329 | bool is_cgroup_fs(const struct statfs *s); |
330 | bool fd_is_cgroup_fs(int fd); | |
4d824a4e AZ |
331 | |
332 | typedef enum ManagedOOMMode { | |
333 | MANAGED_OOM_AUTO, | |
334 | MANAGED_OOM_KILL, | |
335 | _MANAGED_OOM_MODE_MAX, | |
2d93c20e | 336 | _MANAGED_OOM_MODE_INVALID = -EINVAL, |
4d824a4e AZ |
337 | } ManagedOOMMode; |
338 | ||
339 | const char* managed_oom_mode_to_string(ManagedOOMMode m) _const_; | |
340 | ManagedOOMMode managed_oom_mode_from_string(const char *s) _pure_; | |
242d75bd AZ |
341 | |
342 | typedef enum ManagedOOMPreference { | |
343 | MANAGED_OOM_PREFERENCE_NONE = 0, | |
344 | MANAGED_OOM_PREFERENCE_AVOID = 1, | |
345 | MANAGED_OOM_PREFERENCE_OMIT = 2, | |
346 | _MANAGED_OOM_PREFERENCE_MAX, | |
925484aa | 347 | _MANAGED_OOM_PREFERENCE_INVALID = -EINVAL, |
242d75bd AZ |
348 | } ManagedOOMPreference; |
349 | ||
350 | const char* managed_oom_preference_to_string(ManagedOOMPreference a) _const_; | |
351 | ManagedOOMPreference managed_oom_preference_from_string(const char *s) _pure_; | |
a5edf95e LP |
352 | |
353 | /* The structure to pass to name_to_handle_at() on cgroupfs2 */ | |
354 | typedef union { | |
355 | struct file_handle file_handle; | |
356 | uint8_t space[offsetof(struct file_handle, f_handle) + sizeof(uint64_t)]; | |
357 | } cg_file_handle; | |
358 | ||
3b287495 LP |
359 | #define CG_FILE_HANDLE_INIT \ |
360 | (cg_file_handle) { \ | |
361 | .file_handle.handle_bytes = sizeof(uint64_t), \ | |
362 | .file_handle.handle_type = FILEID_KERNFS, \ | |
363 | } | |
364 | ||
a5edf95e | 365 | #define CG_FILE_HANDLE_CGROUPID(fh) (*(uint64_t*) (fh).file_handle.f_handle) |