1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
29 #include <sys/types.h>
32 #include "cgroup-util.h"
36 #include "formats-util.h"
37 #include "process-util.h"
38 #include "path-util.h"
39 #include "unit-name.h"
43 #include "login-util.h"
45 int cg_enumerate_processes(const char *controller
, const char *path
, FILE **_f
) {
46 _cleanup_free_
char *fs
= NULL
;
52 r
= cg_get_path(controller
, path
, "cgroup.procs", &fs
);
64 int cg_read_pid(FILE *f
, pid_t
*_pid
) {
67 /* Note that the cgroup.procs might contain duplicates! See
68 * cgroups.txt for details. */
74 if (fscanf(f
, "%lu", &ul
) != 1) {
79 return errno
? -errno
: -EIO
;
89 int cg_enumerate_subgroups(const char *controller
, const char *path
, DIR **_d
) {
90 _cleanup_free_
char *fs
= NULL
;
96 /* This is not recursive! */
98 r
= cg_get_path(controller
, path
, NULL
, &fs
);
110 int cg_read_subgroup(DIR *d
, char **fn
) {
116 FOREACH_DIRENT(de
, d
, return -errno
) {
119 if (de
->d_type
!= DT_DIR
)
122 if (streq(de
->d_name
, ".") ||
123 streq(de
->d_name
, ".."))
126 b
= strdup(de
->d_name
);
137 int cg_rmdir(const char *controller
, const char *path
) {
138 _cleanup_free_
char *p
= NULL
;
141 r
= cg_get_path(controller
, path
, NULL
, &p
);
146 if (r
< 0 && errno
!= ENOENT
)
152 int cg_kill(const char *controller
, const char *path
, int sig
, bool sigcont
, bool ignore_self
, Set
*s
) {
153 _cleanup_set_free_ Set
*allocated_set
= NULL
;
160 /* This goes through the tasks list and kills them all. This
161 * is repeated until no further processes are added to the
162 * tasks list, to properly handle forking processes */
165 s
= allocated_set
= set_new(NULL
);
173 _cleanup_fclose_
FILE *f
= NULL
;
177 r
= cg_enumerate_processes(controller
, path
, &f
);
179 if (ret
>= 0 && r
!= -ENOENT
)
185 while ((r
= cg_read_pid(f
, &pid
)) > 0) {
187 if (ignore_self
&& pid
== my_pid
)
190 if (set_get(s
, LONG_TO_PTR(pid
)) == LONG_TO_PTR(pid
))
193 /* If we haven't killed this process yet, kill
195 if (kill(pid
, sig
) < 0) {
196 if (ret
>= 0 && errno
!= ESRCH
)
199 if (sigcont
&& sig
!= SIGKILL
)
208 r
= set_put(s
, LONG_TO_PTR(pid
));
224 /* To avoid racing against processes which fork
225 * quicker than we can kill them we repeat this until
226 * no new pids need to be killed. */
233 int cg_kill_recursive(const char *controller
, const char *path
, int sig
, bool sigcont
, bool ignore_self
, bool rem
, Set
*s
) {
234 _cleanup_set_free_ Set
*allocated_set
= NULL
;
235 _cleanup_closedir_
DIR *d
= NULL
;
243 s
= allocated_set
= set_new(NULL
);
248 ret
= cg_kill(controller
, path
, sig
, sigcont
, ignore_self
, s
);
250 r
= cg_enumerate_subgroups(controller
, path
, &d
);
252 if (ret
>= 0 && r
!= -ENOENT
)
258 while ((r
= cg_read_subgroup(d
, &fn
)) > 0) {
259 _cleanup_free_
char *p
= NULL
;
261 p
= strjoin(path
, "/", fn
, NULL
);
266 r
= cg_kill_recursive(controller
, p
, sig
, sigcont
, ignore_self
, rem
, s
);
267 if (ret
>= 0 && r
!= 0)
271 if (ret
>= 0 && r
< 0)
275 r
= cg_rmdir(controller
, path
);
276 if (r
< 0 && ret
>= 0 && r
!= -ENOENT
&& r
!= -EBUSY
)
283 int cg_migrate(const char *cfrom
, const char *pfrom
, const char *cto
, const char *pto
, bool ignore_self
) {
285 _cleanup_set_free_ Set
*s
= NULL
;
301 _cleanup_fclose_
FILE *f
= NULL
;
305 r
= cg_enumerate_processes(cfrom
, pfrom
, &f
);
307 if (ret
>= 0 && r
!= -ENOENT
)
313 while ((r
= cg_read_pid(f
, &pid
)) > 0) {
315 /* This might do weird stuff if we aren't a
316 * single-threaded program. However, we
317 * luckily know we are not */
318 if (ignore_self
&& pid
== my_pid
)
321 if (set_get(s
, LONG_TO_PTR(pid
)) == LONG_TO_PTR(pid
))
324 /* Ignore kernel threads. Since they can only
325 * exist in the root cgroup, we only check for
328 (isempty(pfrom
) || path_equal(pfrom
, "/")) &&
329 is_kernel_thread(pid
) > 0)
332 r
= cg_attach(cto
, pto
, pid
);
334 if (ret
>= 0 && r
!= -ESRCH
)
341 r
= set_put(s
, LONG_TO_PTR(pid
));
361 int cg_migrate_recursive(
369 _cleanup_closedir_
DIR *d
= NULL
;
378 ret
= cg_migrate(cfrom
, pfrom
, cto
, pto
, ignore_self
);
380 r
= cg_enumerate_subgroups(cfrom
, pfrom
, &d
);
382 if (ret
>= 0 && r
!= -ENOENT
)
388 while ((r
= cg_read_subgroup(d
, &fn
)) > 0) {
389 _cleanup_free_
char *p
= NULL
;
391 p
= strjoin(pfrom
, "/", fn
, NULL
);
400 r
= cg_migrate_recursive(cfrom
, p
, cto
, pto
, ignore_self
, rem
);
401 if (r
!= 0 && ret
>= 0)
405 if (r
< 0 && ret
>= 0)
409 r
= cg_rmdir(cfrom
, pfrom
);
410 if (r
< 0 && ret
>= 0 && r
!= -ENOENT
&& r
!= -EBUSY
)
417 int cg_migrate_recursive_fallback(
432 r
= cg_migrate_recursive(cfrom
, pfrom
, cto
, pto
, ignore_self
, rem
);
434 char prefix
[strlen(pto
) + 1];
436 /* This didn't work? Then let's try all prefixes of the destination */
438 PATH_FOREACH_PREFIX(prefix
, pto
) {
439 r
= cg_migrate_recursive(cfrom
, pfrom
, cto
, prefix
, ignore_self
, rem
);
448 static const char *normalize_controller(const char *controller
) {
452 if (startswith(controller
, "name="))
453 return controller
+ 5;
458 static int join_path(const char *controller
, const char *path
, const char *suffix
, char **fs
) {
461 if (!isempty(controller
)) {
462 if (!isempty(path
) && !isempty(suffix
))
463 t
= strjoin("/sys/fs/cgroup/", controller
, "/", path
, "/", suffix
, NULL
);
464 else if (!isempty(path
))
465 t
= strjoin("/sys/fs/cgroup/", controller
, "/", path
, NULL
);
466 else if (!isempty(suffix
))
467 t
= strjoin("/sys/fs/cgroup/", controller
, "/", suffix
, NULL
);
469 t
= strappend("/sys/fs/cgroup/", controller
);
471 if (!isempty(path
) && !isempty(suffix
))
472 t
= strjoin(path
, "/", suffix
, NULL
);
473 else if (!isempty(path
))
482 *fs
= path_kill_slashes(t
);
486 int cg_get_path(const char *controller
, const char *path
, const char *suffix
, char **fs
) {
488 static thread_local
bool good
= false;
492 if (controller
&& !cg_controller_is_valid(controller
))
495 if (_unlikely_(!good
)) {
498 r
= path_is_mount_point("/sys/fs/cgroup", 0);
504 /* Cache this to save a few stat()s */
508 p
= controller
? normalize_controller(controller
) : NULL
;
510 return join_path(p
, path
, suffix
, fs
);
513 static int check_hierarchy(const char *p
) {
518 if (!filename_is_valid(p
))
521 /* Check if this controller actually really exists */
522 cc
= strjoina("/sys/fs/cgroup/", p
);
523 if (laccess(cc
, F_OK
) < 0)
529 int cg_get_path_and_check(const char *controller
, const char *path
, const char *suffix
, char **fs
) {
535 if (!cg_controller_is_valid(controller
))
538 /* Normalize the controller syntax */
539 p
= normalize_controller(controller
);
541 /* Check if this controller actually really exists */
542 r
= check_hierarchy(p
);
546 return join_path(p
, path
, suffix
, fs
);
549 static int trim_cb(const char *path
, const struct stat
*sb
, int typeflag
, struct FTW
*ftwbuf
) {
554 if (typeflag
!= FTW_DP
)
557 if (ftwbuf
->level
< 1)
564 int cg_trim(const char *controller
, const char *path
, bool delete_root
) {
565 _cleanup_free_
char *fs
= NULL
;
570 r
= cg_get_path(controller
, path
, NULL
, &fs
);
575 if (nftw(fs
, trim_cb
, 64, FTW_DEPTH
|FTW_MOUNT
|FTW_PHYS
) != 0)
576 r
= errno
? -errno
: -EIO
;
579 if (rmdir(fs
) < 0 && errno
!= ENOENT
)
586 int cg_delete(const char *controller
, const char *path
) {
587 _cleanup_free_
char *parent
= NULL
;
592 r
= path_get_parent(path
, &parent
);
596 r
= cg_migrate_recursive(controller
, path
, controller
, parent
, false, true);
597 return r
== -ENOENT
? 0 : r
;
600 int cg_create(const char *controller
, const char *path
) {
601 _cleanup_free_
char *fs
= NULL
;
604 r
= cg_get_path_and_check(controller
, path
, NULL
, &fs
);
608 r
= mkdir_parents(fs
, 0755);
612 if (mkdir(fs
, 0755) < 0) {
623 int cg_create_and_attach(const char *controller
, const char *path
, pid_t pid
) {
628 r
= cg_create(controller
, path
);
632 q
= cg_attach(controller
, path
, pid
);
636 /* This does not remove the cgroup on failure */
640 int cg_attach(const char *controller
, const char *path
, pid_t pid
) {
641 _cleanup_free_
char *fs
= NULL
;
642 char c
[DECIMAL_STR_MAX(pid_t
) + 2];
648 r
= cg_get_path_and_check(controller
, path
, "cgroup.procs", &fs
);
655 snprintf(c
, sizeof(c
), PID_FMT
"\n", pid
);
657 return write_string_file(fs
, c
, 0);
660 int cg_attach_fallback(const char *controller
, const char *path
, pid_t pid
) {
667 r
= cg_attach(controller
, path
, pid
);
669 char prefix
[strlen(path
) + 1];
671 /* This didn't work? Then let's try all prefixes of
674 PATH_FOREACH_PREFIX(prefix
, path
) {
675 r
= cg_attach(controller
, prefix
, pid
);
684 int cg_set_group_access(
685 const char *controller
,
691 _cleanup_free_
char *fs
= NULL
;
696 if (mode
!= MODE_INVALID
)
699 r
= cg_get_path(controller
, path
, NULL
, &fs
);
703 return chmod_and_chown(fs
, mode
, uid
, gid
);
706 int cg_set_task_access(
707 const char *controller
,
713 _cleanup_free_
char *fs
= NULL
, *procs
= NULL
;
718 if (mode
== MODE_INVALID
&& uid
== UID_INVALID
&& gid
== GID_INVALID
)
721 if (mode
!= MODE_INVALID
)
724 r
= cg_get_path(controller
, path
, "cgroup.procs", &fs
);
728 r
= chmod_and_chown(fs
, mode
, uid
, gid
);
732 /* Compatibility, Always keep values for "tasks" in sync with
734 r
= cg_get_path(controller
, path
, "tasks", &procs
);
738 return chmod_and_chown(procs
, mode
, uid
, gid
);
741 int cg_pid_get_path(const char *controller
, pid_t pid
, char **path
) {
742 _cleanup_fclose_
FILE *f
= NULL
;
751 if (!cg_controller_is_valid(controller
))
754 controller
= normalize_controller(controller
);
756 controller
= SYSTEMD_CGROUP_CONTROLLER
;
758 fs
= procfs_file_alloca(pid
, "cgroup");
762 return errno
== ENOENT
? -ESRCH
: -errno
;
764 cs
= strlen(controller
);
766 FOREACH_LINE(line
, f
, return -errno
) {
769 const char *word
, *state
;
774 l
= strchr(line
, ':');
785 FOREACH_WORD_SEPARATOR(word
, k
, l
, ",", state
) {
787 if (k
== cs
&& memcmp(word
, controller
, cs
) == 0) {
793 memcmp(word
, "name=", 5) == 0 &&
794 memcmp(word
+5, controller
, cs
) == 0) {
814 int cg_install_release_agent(const char *controller
, const char *agent
) {
815 _cleanup_free_
char *fs
= NULL
, *contents
= NULL
;
821 r
= cg_get_path(controller
, NULL
, "release_agent", &fs
);
825 r
= read_one_line_file(fs
, &contents
);
829 sc
= strstrip(contents
);
831 r
= write_string_file(fs
, agent
, 0);
834 } else if (!streq(sc
, agent
))
838 r
= cg_get_path(controller
, NULL
, "notify_on_release", &fs
);
842 contents
= mfree(contents
);
843 r
= read_one_line_file(fs
, &contents
);
847 sc
= strstrip(contents
);
848 if (streq(sc
, "0")) {
849 r
= write_string_file(fs
, "1", 0);
862 int cg_uninstall_release_agent(const char *controller
) {
863 _cleanup_free_
char *fs
= NULL
;
866 r
= cg_get_path(controller
, NULL
, "notify_on_release", &fs
);
870 r
= write_string_file(fs
, "0", 0);
876 r
= cg_get_path(controller
, NULL
, "release_agent", &fs
);
880 r
= write_string_file(fs
, "", 0);
887 int cg_is_empty(const char *controller
, const char *path
, bool ignore_self
) {
888 _cleanup_fclose_
FILE *f
= NULL
;
889 pid_t pid
= 0, self_pid
;
895 r
= cg_enumerate_processes(controller
, path
, &f
);
897 return r
== -ENOENT
? 1 : r
;
901 while ((r
= cg_read_pid(f
, &pid
)) > 0) {
903 if (ignore_self
&& pid
== self_pid
)
916 int cg_is_empty_recursive(const char *controller
, const char *path
, bool ignore_self
) {
917 _cleanup_closedir_
DIR *d
= NULL
;
923 r
= cg_is_empty(controller
, path
, ignore_self
);
927 r
= cg_enumerate_subgroups(controller
, path
, &d
);
929 return r
== -ENOENT
? 1 : r
;
931 while ((r
= cg_read_subgroup(d
, &fn
)) > 0) {
932 _cleanup_free_
char *p
= NULL
;
934 p
= strjoin(path
, "/", fn
, NULL
);
939 r
= cg_is_empty_recursive(controller
, p
, ignore_self
);
950 int cg_split_spec(const char *spec
, char **controller
, char **path
) {
952 char *t
= NULL
, *u
= NULL
;
953 _cleanup_free_
char *v
= NULL
;
958 if (!path_is_safe(spec
))
966 *path
= path_kill_slashes(t
);
975 e
= strchr(spec
, ':');
977 if (!cg_controller_is_valid(spec
))
981 t
= strdup(normalize_controller(spec
));
994 v
= strndup(spec
, e
-spec
);
997 t
= strdup(normalize_controller(v
));
1000 if (!cg_controller_is_valid(t
)) {
1005 if (streq(e
+1, "")) {
1018 if (!path_is_safe(u
) ||
1019 !path_is_absolute(u
)) {
1025 path_kill_slashes(u
);
1041 int cg_mangle_path(const char *path
, char **result
) {
1042 _cleanup_free_
char *c
= NULL
, *p
= NULL
;
1049 /* First, check if it already is a filesystem path */
1050 if (path_startswith(path
, "/sys/fs/cgroup")) {
1056 *result
= path_kill_slashes(t
);
1060 /* Otherwise, treat it as cg spec */
1061 r
= cg_split_spec(path
, &c
, &p
);
1065 return cg_get_path(c
? c
: SYSTEMD_CGROUP_CONTROLLER
, p
? p
: "/", NULL
, result
);
1068 int cg_get_root_path(char **path
) {
1074 r
= cg_pid_get_path(SYSTEMD_CGROUP_CONTROLLER
, 1, &p
);
1078 e
= endswith(p
, "/" SPECIAL_SYSTEM_SLICE
);
1086 int cg_shift_path(const char *cgroup
, const char *root
, const char **shifted
) {
1087 _cleanup_free_
char *rt
= NULL
;
1095 /* If the root was specified let's use that, otherwise
1096 * let's determine it from PID 1 */
1098 r
= cg_get_root_path(&rt
);
1105 p
= path_startswith(cgroup
, root
);
1114 int cg_pid_get_path_shifted(pid_t pid
, const char *root
, char **cgroup
) {
1115 _cleanup_free_
char *raw
= NULL
;
1122 r
= cg_pid_get_path(SYSTEMD_CGROUP_CONTROLLER
, pid
, &raw
);
1126 r
= cg_shift_path(raw
, root
, &c
);
1146 int cg_path_decode_unit(const char *cgroup
, char **unit
){
1153 n
= strcspn(cgroup
, "/");
1157 c
= strndupa(cgroup
, n
);
1160 if (!unit_name_is_valid(c
, UNIT_NAME_PLAIN
|UNIT_NAME_INSTANCE
))
1171 static bool valid_slice_name(const char *p
, size_t n
) {
1176 if (n
< strlen("x.slice"))
1179 if (memcmp(p
+ n
- 6, ".slice", 6) == 0) {
1185 c
= cg_unescape(buf
);
1187 return unit_name_is_valid(c
, UNIT_NAME_PLAIN
);
1193 static const char *skip_slices(const char *p
) {
1196 /* Skips over all slice assignments */
1201 p
+= strspn(p
, "/");
1203 n
= strcspn(p
, "/");
1204 if (!valid_slice_name(p
, n
))
1211 int cg_path_get_unit(const char *path
, char **ret
) {
1219 e
= skip_slices(path
);
1221 r
= cg_path_decode_unit(e
, &unit
);
1225 /* We skipped over the slices, don't accept any now */
1226 if (endswith(unit
, ".slice")) {
1235 int cg_pid_get_unit(pid_t pid
, char **unit
) {
1236 _cleanup_free_
char *cgroup
= NULL
;
1241 r
= cg_pid_get_path_shifted(pid
, NULL
, &cgroup
);
1245 return cg_path_get_unit(cgroup
, unit
);
1249 * Skip session-*.scope, but require it to be there.
1251 static const char *skip_session(const char *p
) {
1257 p
+= strspn(p
, "/");
1259 n
= strcspn(p
, "/");
1260 if (n
< strlen("session-x.scope"))
1263 if (memcmp(p
, "session-", 8) == 0 && memcmp(p
+ n
- 6, ".scope", 6) == 0) {
1264 char buf
[n
- 8 - 6 + 1];
1266 memcpy(buf
, p
+ 8, n
- 8 - 6);
1269 /* Note that session scopes never need unescaping,
1270 * since they cannot conflict with the kernel's own
1271 * names, hence we don't need to call cg_unescape()
1274 if (!session_id_valid(buf
))
1278 p
+= strspn(p
, "/");
1286 * Skip user@*.service, but require it to be there.
1288 static const char *skip_user_manager(const char *p
) {
1294 p
+= strspn(p
, "/");
1296 n
= strcspn(p
, "/");
1297 if (n
< strlen("user@x.service"))
1300 if (memcmp(p
, "user@", 5) == 0 && memcmp(p
+ n
- 8, ".service", 8) == 0) {
1301 char buf
[n
- 5 - 8 + 1];
1303 memcpy(buf
, p
+ 5, n
- 5 - 8);
1306 /* Note that user manager services never need unescaping,
1307 * since they cannot conflict with the kernel's own
1308 * names, hence we don't need to call cg_unescape()
1311 if (parse_uid(buf
, NULL
) < 0)
1315 p
+= strspn(p
, "/");
1323 static const char *skip_user_prefix(const char *path
) {
1328 /* Skip slices, if there are any */
1329 e
= skip_slices(path
);
1331 /* Skip the user manager, if it's in the path now... */
1332 t
= skip_user_manager(e
);
1336 /* Alternatively skip the user session if it is in the path... */
1337 return skip_session(e
);
1340 int cg_path_get_user_unit(const char *path
, char **ret
) {
1346 t
= skip_user_prefix(path
);
1350 /* And from here on it looks pretty much the same as for a
1351 * system unit, hence let's use the same parser from here
1353 return cg_path_get_unit(t
, ret
);
1356 int cg_pid_get_user_unit(pid_t pid
, char **unit
) {
1357 _cleanup_free_
char *cgroup
= NULL
;
1362 r
= cg_pid_get_path_shifted(pid
, NULL
, &cgroup
);
1366 return cg_path_get_user_unit(cgroup
, unit
);
1369 int cg_path_get_machine_name(const char *path
, char **machine
) {
1370 _cleanup_free_
char *u
= NULL
, *sl
= NULL
;
1373 r
= cg_path_get_unit(path
, &u
);
1377 sl
= strjoin("/run/systemd/machines/unit:", u
, NULL
);
1381 return readlink_malloc(sl
, machine
);
1384 int cg_pid_get_machine_name(pid_t pid
, char **machine
) {
1385 _cleanup_free_
char *cgroup
= NULL
;
1390 r
= cg_pid_get_path_shifted(pid
, NULL
, &cgroup
);
1394 return cg_path_get_machine_name(cgroup
, machine
);
1397 int cg_path_get_session(const char *path
, char **session
) {
1398 _cleanup_free_
char *unit
= NULL
;
1404 r
= cg_path_get_unit(path
, &unit
);
1408 start
= startswith(unit
, "session-");
1411 end
= endswith(start
, ".scope");
1416 if (!session_id_valid(start
))
1432 int cg_pid_get_session(pid_t pid
, char **session
) {
1433 _cleanup_free_
char *cgroup
= NULL
;
1436 r
= cg_pid_get_path_shifted(pid
, NULL
, &cgroup
);
1440 return cg_path_get_session(cgroup
, session
);
1443 int cg_path_get_owner_uid(const char *path
, uid_t
*uid
) {
1444 _cleanup_free_
char *slice
= NULL
;
1450 r
= cg_path_get_slice(path
, &slice
);
1454 start
= startswith(slice
, "user-");
1457 end
= endswith(start
, ".slice");
1462 if (parse_uid(start
, uid
) < 0)
1468 int cg_pid_get_owner_uid(pid_t pid
, uid_t
*uid
) {
1469 _cleanup_free_
char *cgroup
= NULL
;
1472 r
= cg_pid_get_path_shifted(pid
, NULL
, &cgroup
);
1476 return cg_path_get_owner_uid(cgroup
, uid
);
1479 int cg_path_get_slice(const char *p
, char **slice
) {
1480 const char *e
= NULL
;
1485 /* Finds the right-most slice unit from the beginning, but
1486 * stops before we come to the first non-slice unit. */
1491 p
+= strspn(p
, "/");
1493 n
= strcspn(p
, "/");
1494 if (!valid_slice_name(p
, n
)) {
1499 s
= strdup("-.slice");
1507 return cg_path_decode_unit(e
, slice
);
1515 int cg_pid_get_slice(pid_t pid
, char **slice
) {
1516 _cleanup_free_
char *cgroup
= NULL
;
1521 r
= cg_pid_get_path_shifted(pid
, NULL
, &cgroup
);
1525 return cg_path_get_slice(cgroup
, slice
);
1528 int cg_path_get_user_slice(const char *p
, char **slice
) {
1533 t
= skip_user_prefix(p
);
1537 /* And now it looks pretty much the same as for a system
1538 * slice, so let's just use the same parser from here on. */
1539 return cg_path_get_slice(t
, slice
);
1542 int cg_pid_get_user_slice(pid_t pid
, char **slice
) {
1543 _cleanup_free_
char *cgroup
= NULL
;
1548 r
= cg_pid_get_path_shifted(pid
, NULL
, &cgroup
);
1552 return cg_path_get_user_slice(cgroup
, slice
);
1555 char *cg_escape(const char *p
) {
1556 bool need_prefix
= false;
1558 /* This implements very minimal escaping for names to be used
1559 * as file names in the cgroup tree: any name which might
1560 * conflict with a kernel name or is prefixed with '_' is
1561 * prefixed with a '_'. That way, when reading cgroup names it
1562 * is sufficient to remove a single prefixing underscore if
1565 /* The return value of this function (unlike cg_unescape())
1571 streq(p
, "notify_on_release") ||
1572 streq(p
, "release_agent") ||
1578 dot
= strrchr(p
, '.');
1581 if (dot
- p
== 6 && memcmp(p
, "cgroup", 6) == 0)
1586 n
= strndupa(p
, dot
- p
);
1588 if (check_hierarchy(n
) >= 0)
1595 return strappend("_", p
);
1600 char *cg_unescape(const char *p
) {
1603 /* The return value of this function (unlike cg_escape())
1604 * doesn't need free()! */
1612 #define CONTROLLER_VALID \
1616 bool cg_controller_is_valid(const char *p
) {
1622 s
= startswith(p
, "name=");
1626 if (*p
== 0 || *p
== '_')
1629 for (t
= p
; *t
; t
++)
1630 if (!strchr(CONTROLLER_VALID
, *t
))
1633 if (t
- p
> FILENAME_MAX
)
1639 int cg_slice_to_path(const char *unit
, char **ret
) {
1640 _cleanup_free_
char *p
= NULL
, *s
= NULL
, *e
= NULL
;
1647 if (streq(unit
, "-.slice")) {
1657 if (!unit_name_is_valid(unit
, UNIT_NAME_PLAIN
))
1660 if (!endswith(unit
, ".slice"))
1663 r
= unit_name_to_prefix(unit
, &p
);
1667 dash
= strchr(p
, '-');
1669 /* Don't allow initial dashes */
1674 _cleanup_free_
char *escaped
= NULL
;
1675 char n
[dash
- p
+ sizeof(".slice")];
1677 /* Don't allow trailing or double dashes */
1678 if (dash
[1] == 0 || dash
[1] == '-')
1681 strcpy(stpncpy(n
, p
, dash
- p
), ".slice");
1682 if (!unit_name_is_valid(n
, UNIT_NAME_PLAIN
))
1685 escaped
= cg_escape(n
);
1689 if (!strextend(&s
, escaped
, "/", NULL
))
1692 dash
= strchr(dash
+1, '-');
1695 e
= cg_escape(unit
);
1699 if (!strextend(&s
, e
, NULL
))
1708 int cg_set_attribute(const char *controller
, const char *path
, const char *attribute
, const char *value
) {
1709 _cleanup_free_
char *p
= NULL
;
1712 r
= cg_get_path(controller
, path
, attribute
, &p
);
1716 return write_string_file(p
, value
, 0);
1719 int cg_get_attribute(const char *controller
, const char *path
, const char *attribute
, char **ret
) {
1720 _cleanup_free_
char *p
= NULL
;
1723 r
= cg_get_path(controller
, path
, attribute
, &p
);
1727 return read_one_line_file(p
, ret
);
1730 static const char mask_names
[] =
1737 int cg_create_everywhere(CGroupControllerMask supported
, CGroupControllerMask mask
, const char *path
) {
1738 CGroupControllerMask bit
= 1;
1742 /* This one will create a cgroup in our private tree, but also
1743 * duplicate it in the trees specified in mask, and remove it
1746 /* First create the cgroup in our own hierarchy. */
1747 r
= cg_create(SYSTEMD_CGROUP_CONTROLLER
, path
);
1751 /* Then, do the same in the other hierarchies */
1752 NULSTR_FOREACH(n
, mask_names
) {
1755 else if (supported
& bit
)
1756 cg_trim(n
, path
, true);
1764 int cg_attach_everywhere(CGroupControllerMask supported
, const char *path
, pid_t pid
, cg_migrate_callback_t path_callback
, void *userdata
) {
1765 CGroupControllerMask bit
= 1;
1769 r
= cg_attach(SYSTEMD_CGROUP_CONTROLLER
, path
, pid
);
1773 NULSTR_FOREACH(n
, mask_names
) {
1775 if (supported
& bit
) {
1776 const char *p
= NULL
;
1779 p
= path_callback(bit
, userdata
);
1784 cg_attach_fallback(n
, p
, pid
);
1793 int cg_attach_many_everywhere(CGroupControllerMask supported
, const char *path
, Set
* pids
, cg_migrate_callback_t path_callback
, void *userdata
) {
1798 SET_FOREACH(pidp
, pids
, i
) {
1799 pid_t pid
= PTR_TO_LONG(pidp
);
1802 q
= cg_attach_everywhere(supported
, path
, pid
, path_callback
, userdata
);
1810 int cg_migrate_everywhere(CGroupControllerMask supported
, const char *from
, const char *to
, cg_migrate_callback_t to_callback
, void *userdata
) {
1811 CGroupControllerMask bit
= 1;
1815 if (!path_equal(from
, to
)) {
1816 r
= cg_migrate_recursive(SYSTEMD_CGROUP_CONTROLLER
, from
, SYSTEMD_CGROUP_CONTROLLER
, to
, false, true);
1821 NULSTR_FOREACH(n
, mask_names
) {
1822 if (supported
& bit
) {
1823 const char *p
= NULL
;
1826 p
= to_callback(bit
, userdata
);
1831 cg_migrate_recursive_fallback(SYSTEMD_CGROUP_CONTROLLER
, to
, n
, p
, false, false);
1840 int cg_trim_everywhere(CGroupControllerMask supported
, const char *path
, bool delete_root
) {
1841 CGroupControllerMask bit
= 1;
1845 r
= cg_trim(SYSTEMD_CGROUP_CONTROLLER
, path
, delete_root
);
1849 NULSTR_FOREACH(n
, mask_names
) {
1850 if (supported
& bit
)
1851 cg_trim(n
, path
, delete_root
);
1859 CGroupControllerMask
cg_mask_supported(void) {
1860 CGroupControllerMask bit
= 1, mask
= 0;
1863 NULSTR_FOREACH(n
, mask_names
) {
1864 if (check_hierarchy(n
) >= 0)
1873 int cg_kernel_controllers(Set
*controllers
) {
1874 _cleanup_fclose_
FILE *f
= NULL
;
1878 assert(controllers
);
1880 f
= fopen("/proc/cgroups", "re");
1882 if (errno
== ENOENT
)
1887 /* Ignore the header line */
1888 (void) fgets(buf
, sizeof(buf
), f
);
1895 if (fscanf(f
, "%ms %*i %*i %i", &controller
, &enabled
) != 2) {
1900 if (ferror(f
) && errno
)
1911 if (!filename_is_valid(controller
)) {
1916 r
= set_consume(controllers
, controller
);