1 /*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
4 This file is part of systemd.
6 Copyright 2010 Lennart Poettering
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
29 #include <sys/types.h>
32 #include "cgroup-util.h"
36 #include "formats-util.h"
37 #include "process-util.h"
38 #include "path-util.h"
39 #include "unit-name.h"
43 #include "login-util.h"
45 int cg_enumerate_processes(const char *controller, const char *path, FILE **_f) {
46 _cleanup_free_ char *fs = NULL;
52 r = cg_get_path(controller, path, "cgroup.procs", &fs);
64 int cg_read_pid(FILE *f, pid_t *_pid) {
67 /* Note that the cgroup.procs might contain duplicates! See
68 * cgroups.txt for details. */
74 if (fscanf(f, "%lu", &ul) != 1) {
79 return errno ? -errno : -EIO;
89 int cg_enumerate_subgroups(const char *controller, const char *path, DIR **_d) {
90 _cleanup_free_ char *fs = NULL;
96 /* This is not recursive! */
98 r = cg_get_path(controller, path, NULL, &fs);
110 int cg_read_subgroup(DIR *d, char **fn) {
116 FOREACH_DIRENT(de, d, return -errno) {
119 if (de->d_type != DT_DIR)
122 if (streq(de->d_name, ".") ||
123 streq(de->d_name, ".."))
126 b = strdup(de->d_name);
137 int cg_rmdir(const char *controller, const char *path) {
138 _cleanup_free_ char *p = NULL;
141 r = cg_get_path(controller, path, NULL, &p);
146 if (r < 0 && errno != ENOENT)
152 int cg_kill(const char *controller, const char *path, int sig, bool sigcont, bool ignore_self, Set *s) {
153 _cleanup_set_free_ Set *allocated_set = NULL;
160 /* This goes through the tasks list and kills them all. This
161 * is repeated until no further processes are added to the
162 * tasks list, to properly handle forking processes */
165 s = allocated_set = set_new(NULL);
173 _cleanup_fclose_ FILE *f = NULL;
177 r = cg_enumerate_processes(controller, path, &f);
179 if (ret >= 0 && r != -ENOENT)
185 while ((r = cg_read_pid(f, &pid)) > 0) {
187 if (ignore_self && pid == my_pid)
190 if (set_get(s, LONG_TO_PTR(pid)) == LONG_TO_PTR(pid))
193 /* If we haven't killed this process yet, kill
195 if (kill(pid, sig) < 0) {
196 if (ret >= 0 && errno != ESRCH)
199 if (sigcont && sig != SIGKILL)
208 r = set_put(s, LONG_TO_PTR(pid));
224 /* To avoid racing against processes which fork
225 * quicker than we can kill them we repeat this until
226 * no new pids need to be killed. */
233 int cg_kill_recursive(const char *controller, const char *path, int sig, bool sigcont, bool ignore_self, bool rem, Set *s) {
234 _cleanup_set_free_ Set *allocated_set = NULL;
235 _cleanup_closedir_ DIR *d = NULL;
243 s = allocated_set = set_new(NULL);
248 ret = cg_kill(controller, path, sig, sigcont, ignore_self, s);
250 r = cg_enumerate_subgroups(controller, path, &d);
252 if (ret >= 0 && r != -ENOENT)
258 while ((r = cg_read_subgroup(d, &fn)) > 0) {
259 _cleanup_free_ char *p = NULL;
261 p = strjoin(path, "/", fn, NULL);
266 r = cg_kill_recursive(controller, p, sig, sigcont, ignore_self, rem, s);
267 if (ret >= 0 && r != 0)
271 if (ret >= 0 && r < 0)
275 r = cg_rmdir(controller, path);
276 if (r < 0 && ret >= 0 && r != -ENOENT && r != -EBUSY)
283 int cg_migrate(const char *cfrom, const char *pfrom, const char *cto, const char *pto, bool ignore_self) {
285 _cleanup_set_free_ Set *s = NULL;
301 _cleanup_fclose_ FILE *f = NULL;
305 r = cg_enumerate_processes(cfrom, pfrom, &f);
307 if (ret >= 0 && r != -ENOENT)
313 while ((r = cg_read_pid(f, &pid)) > 0) {
315 /* This might do weird stuff if we aren't a
316 * single-threaded program. However, we
317 * luckily know we are not */
318 if (ignore_self && pid == my_pid)
321 if (set_get(s, LONG_TO_PTR(pid)) == LONG_TO_PTR(pid))
324 r = cg_attach(cto, pto, pid);
326 if (ret >= 0 && r != -ESRCH)
333 r = set_put(s, LONG_TO_PTR(pid));
353 int cg_migrate_recursive(
361 _cleanup_closedir_ DIR *d = NULL;
370 ret = cg_migrate(cfrom, pfrom, cto, pto, ignore_self);
372 r = cg_enumerate_subgroups(cfrom, pfrom, &d);
374 if (ret >= 0 && r != -ENOENT)
380 while ((r = cg_read_subgroup(d, &fn)) > 0) {
381 _cleanup_free_ char *p = NULL;
383 p = strjoin(pfrom, "/", fn, NULL);
392 r = cg_migrate_recursive(cfrom, p, cto, pto, ignore_self, rem);
393 if (r != 0 && ret >= 0)
397 if (r < 0 && ret >= 0)
401 r = cg_rmdir(cfrom, pfrom);
402 if (r < 0 && ret >= 0 && r != -ENOENT && r != -EBUSY)
409 int cg_migrate_recursive_fallback(
424 r = cg_migrate_recursive(cfrom, pfrom, cto, pto, ignore_self, rem);
426 char prefix[strlen(pto) + 1];
428 /* This didn't work? Then let's try all prefixes of the destination */
430 PATH_FOREACH_PREFIX(prefix, pto) {
431 r = cg_migrate_recursive(cfrom, pfrom, cto, prefix, ignore_self, rem);
440 static const char *normalize_controller(const char *controller) {
444 if (startswith(controller, "name="))
445 return controller + 5;
450 static int join_path(const char *controller, const char *path, const char *suffix, char **fs) {
453 if (!isempty(controller)) {
454 if (!isempty(path) && !isempty(suffix))
455 t = strjoin("/sys/fs/cgroup/", controller, "/", path, "/", suffix, NULL);
456 else if (!isempty(path))
457 t = strjoin("/sys/fs/cgroup/", controller, "/", path, NULL);
458 else if (!isempty(suffix))
459 t = strjoin("/sys/fs/cgroup/", controller, "/", suffix, NULL);
461 t = strappend("/sys/fs/cgroup/", controller);
463 if (!isempty(path) && !isempty(suffix))
464 t = strjoin(path, "/", suffix, NULL);
465 else if (!isempty(path))
474 *fs = path_kill_slashes(t);
478 int cg_get_path(const char *controller, const char *path, const char *suffix, char **fs) {
480 static thread_local bool good = false;
484 if (controller && !cg_controller_is_valid(controller))
487 if (_unlikely_(!good)) {
490 r = path_is_mount_point("/sys/fs/cgroup", 0);
496 /* Cache this to save a few stat()s */
500 p = controller ? normalize_controller(controller) : NULL;
502 return join_path(p, path, suffix, fs);
505 static int check_hierarchy(const char *p) {
510 if (!filename_is_valid(p))
513 /* Check if this controller actually really exists */
514 cc = strjoina("/sys/fs/cgroup/", p);
515 if (laccess(cc, F_OK) < 0)
521 int cg_get_path_and_check(const char *controller, const char *path, const char *suffix, char **fs) {
527 if (!cg_controller_is_valid(controller))
530 /* Normalize the controller syntax */
531 p = normalize_controller(controller);
533 /* Check if this controller actually really exists */
534 r = check_hierarchy(p);
538 return join_path(p, path, suffix, fs);
541 static int trim_cb(const char *path, const struct stat *sb, int typeflag, struct FTW *ftwbuf) {
546 if (typeflag != FTW_DP)
549 if (ftwbuf->level < 1)
556 int cg_trim(const char *controller, const char *path, bool delete_root) {
557 _cleanup_free_ char *fs = NULL;
562 r = cg_get_path(controller, path, NULL, &fs);
567 if (nftw(fs, trim_cb, 64, FTW_DEPTH|FTW_MOUNT|FTW_PHYS) != 0)
568 r = errno ? -errno : -EIO;
571 if (rmdir(fs) < 0 && errno != ENOENT)
578 /// UNNEDED by elogind
580 int cg_delete(const char *controller, const char *path) {
581 _cleanup_free_ char *parent = NULL;
586 r = path_get_parent(path, &parent);
590 r = cg_migrate_recursive(controller, path, controller, parent, false, true);
591 return r == -ENOENT ? 0 : r;
595 int cg_create(const char *controller, const char *path) {
596 _cleanup_free_ char *fs = NULL;
599 r = cg_get_path_and_check(controller, path, NULL, &fs);
603 r = mkdir_parents(fs, 0755);
607 if (mkdir(fs, 0755) < 0) {
618 int cg_create_and_attach(const char *controller, const char *path, pid_t pid) {
623 r = cg_create(controller, path);
627 q = cg_attach(controller, path, pid);
631 /* This does not remove the cgroup on failure */
635 int cg_attach(const char *controller, const char *path, pid_t pid) {
636 _cleanup_free_ char *fs = NULL;
637 char c[DECIMAL_STR_MAX(pid_t) + 2];
643 r = cg_get_path_and_check(controller, path, "cgroup.procs", &fs);
650 snprintf(c, sizeof(c), PID_FMT"\n", pid);
652 return write_string_file_no_create(fs, c);
655 int cg_attach_fallback(const char *controller, const char *path, pid_t pid) {
662 r = cg_attach(controller, path, pid);
664 char prefix[strlen(path) + 1];
666 /* This didn't work? Then let's try all prefixes of
669 PATH_FOREACH_PREFIX(prefix, path) {
670 r = cg_attach(controller, prefix, pid);
679 int cg_set_group_access(
680 const char *controller,
686 _cleanup_free_ char *fs = NULL;
691 if (mode != MODE_INVALID)
694 r = cg_get_path(controller, path, NULL, &fs);
698 return chmod_and_chown(fs, mode, uid, gid);
701 int cg_set_task_access(
702 const char *controller,
708 _cleanup_free_ char *fs = NULL, *procs = NULL;
713 if (mode == MODE_INVALID && uid == UID_INVALID && gid == GID_INVALID)
716 if (mode != MODE_INVALID)
719 r = cg_get_path(controller, path, "cgroup.procs", &fs);
723 r = chmod_and_chown(fs, mode, uid, gid);
727 /* Compatibility, Always keep values for "tasks" in sync with
729 r = cg_get_path(controller, path, "tasks", &procs);
733 return chmod_and_chown(procs, mode, uid, gid);
736 int cg_pid_get_path(const char *controller, pid_t pid, char **path) {
737 _cleanup_fclose_ FILE *f = NULL;
746 if (!cg_controller_is_valid(controller))
749 controller = normalize_controller(controller);
751 controller = SYSTEMD_CGROUP_CONTROLLER;
753 fs = procfs_file_alloca(pid, "cgroup");
757 return errno == ENOENT ? -ESRCH : -errno;
759 cs = strlen(controller);
761 FOREACH_LINE(line, f, return -errno) {
764 const char *word, *state;
769 l = strchr(line, ':');
780 FOREACH_WORD_SEPARATOR(word, k, l, ",", state) {
782 if (k == cs && memcmp(word, controller, cs) == 0) {
788 memcmp(word, "name=", 5) == 0 &&
789 memcmp(word+5, controller, cs) == 0) {
809 int cg_install_release_agent(const char *controller, const char *agent) {
810 _cleanup_free_ char *fs = NULL, *contents = NULL;
816 r = cg_get_path(controller, NULL, "release_agent", &fs);
820 r = read_one_line_file(fs, &contents);
824 sc = strstrip(contents);
826 r = write_string_file_no_create(fs, agent);
829 } else if (!streq(sc, agent))
834 r = cg_get_path(controller, NULL, "notify_on_release", &fs);
840 r = read_one_line_file(fs, &contents);
844 sc = strstrip(contents);
845 if (streq(sc, "0")) {
846 r = write_string_file_no_create(fs, "1");
859 int cg_uninstall_release_agent(const char *controller) {
860 _cleanup_free_ char *fs = NULL;
863 r = cg_get_path(controller, NULL, "notify_on_release", &fs);
867 r = write_string_file_no_create(fs, "0");
874 r = cg_get_path(controller, NULL, "release_agent", &fs);
878 r = write_string_file_no_create(fs, "");
885 int cg_is_empty(const char *controller, const char *path, bool ignore_self) {
886 _cleanup_fclose_ FILE *f = NULL;
887 pid_t pid = 0, self_pid;
893 r = cg_enumerate_processes(controller, path, &f);
895 return r == -ENOENT ? 1 : r;
899 while ((r = cg_read_pid(f, &pid)) > 0) {
901 if (ignore_self && pid == self_pid)
914 int cg_is_empty_recursive(const char *controller, const char *path, bool ignore_self) {
915 _cleanup_closedir_ DIR *d = NULL;
921 r = cg_is_empty(controller, path, ignore_self);
925 r = cg_enumerate_subgroups(controller, path, &d);
927 return r == -ENOENT ? 1 : r;
929 while ((r = cg_read_subgroup(d, &fn)) > 0) {
930 _cleanup_free_ char *p = NULL;
932 p = strjoin(path, "/", fn, NULL);
937 r = cg_is_empty_recursive(controller, p, ignore_self);
948 int cg_split_spec(const char *spec, char **controller, char **path) {
950 char *t = NULL, *u = NULL;
951 _cleanup_free_ char *v = NULL;
956 if (!path_is_safe(spec))
964 *path = path_kill_slashes(t);
973 e = strchr(spec, ':');
975 if (!cg_controller_is_valid(spec))
979 t = strdup(normalize_controller(spec));
992 v = strndup(spec, e-spec);
995 t = strdup(normalize_controller(v));
998 if (!cg_controller_is_valid(t)) {
1003 if (streq(e+1, "")) {
1016 if (!path_is_safe(u) ||
1017 !path_is_absolute(u)) {
1023 path_kill_slashes(u);
1039 int cg_mangle_path(const char *path, char **result) {
1040 _cleanup_free_ char *c = NULL, *p = NULL;
1047 /* First, check if it already is a filesystem path */
1048 if (path_startswith(path, "/sys/fs/cgroup")) {
1054 *result = path_kill_slashes(t);
1058 /* Otherwise, treat it as cg spec */
1059 r = cg_split_spec(path, &c, &p);
1063 return cg_get_path(c ? c : SYSTEMD_CGROUP_CONTROLLER, p ? p : "/", NULL, result);
1066 int cg_get_root_path(char **path) {
1072 r = cg_pid_get_path(SYSTEMD_CGROUP_CONTROLLER, 1, &p);
1076 e = endswith(p, "/" SPECIAL_SYSTEM_SLICE);
1084 int cg_shift_path(const char *cgroup, const char *root, const char **shifted) {
1085 _cleanup_free_ char *rt = NULL;
1093 /* If the root was specified let's use that, otherwise
1094 * let's determine it from PID 1 */
1096 r = cg_get_root_path(&rt);
1103 p = path_startswith(cgroup, root);
1112 int cg_pid_get_path_shifted(pid_t pid, const char *root, char **cgroup) {
1113 _cleanup_free_ char *raw = NULL;
1120 r = cg_pid_get_path(SYSTEMD_CGROUP_CONTROLLER, pid, &raw);
1124 r = cg_shift_path(raw, root, &c);
1144 int cg_path_decode_unit(const char *cgroup, char **unit){
1151 n = strcspn(cgroup, "/");
1155 c = strndupa(cgroup, n);
1158 if (!unit_name_is_valid(c, UNIT_NAME_PLAIN|UNIT_NAME_INSTANCE))
1169 static bool valid_slice_name(const char *p, size_t n) {
1174 if (n < strlen("x.slice"))
1177 if (memcmp(p + n - 6, ".slice", 6) == 0) {
1183 c = cg_unescape(buf);
1185 return unit_name_is_valid(c, UNIT_NAME_PLAIN);
1191 static const char *skip_slices(const char *p) {
1194 /* Skips over all slice assignments */
1199 p += strspn(p, "/");
1201 n = strcspn(p, "/");
1202 if (!valid_slice_name(p, n))
1209 int cg_path_get_unit(const char *path, char **ret) {
1217 e = skip_slices(path);
1219 r = cg_path_decode_unit(e, &unit);
1223 /* We skipped over the slices, don't accept any now */
1224 if (endswith(unit, ".slice")) {
1233 int cg_pid_get_unit(pid_t pid, char **unit) {
1234 _cleanup_free_ char *cgroup = NULL;
1239 r = cg_pid_get_path_shifted(pid, NULL, &cgroup);
1243 return cg_path_get_unit(cgroup, unit);
1247 * Skip session-*.scope, but require it to be there.
1249 static const char *skip_session(const char *p) {
1255 p += strspn(p, "/");
1257 n = strcspn(p, "/");
1258 if (n < strlen("session-x.scope"))
1261 if (memcmp(p, "session-", 8) == 0 && memcmp(p + n - 6, ".scope", 6) == 0) {
1262 char buf[n - 8 - 6 + 1];
1264 memcpy(buf, p + 8, n - 8 - 6);
1267 /* Note that session scopes never need unescaping,
1268 * since they cannot conflict with the kernel's own
1269 * names, hence we don't need to call cg_unescape()
1272 if (!session_id_valid(buf))
1276 p += strspn(p, "/");
1284 * Skip user@*.service, but require it to be there.
1286 static const char *skip_user_manager(const char *p) {
1292 p += strspn(p, "/");
1294 n = strcspn(p, "/");
1295 if (n < strlen("user@x.service"))
1298 if (memcmp(p, "user@", 5) == 0 && memcmp(p + n - 8, ".service", 8) == 0) {
1299 char buf[n - 5 - 8 + 1];
1301 memcpy(buf, p + 5, n - 5 - 8);
1304 /* Note that user manager services never need unescaping,
1305 * since they cannot conflict with the kernel's own
1306 * names, hence we don't need to call cg_unescape()
1309 if (parse_uid(buf, NULL) < 0)
1313 p += strspn(p, "/");
1321 static const char *skip_user_prefix(const char *path) {
1326 /* Skip slices, if there are any */
1327 e = skip_slices(path);
1329 /* Skip the user manager, if it's in the path now... */
1330 t = skip_user_manager(e);
1334 /* Alternatively skip the user session if it is in the path... */
1335 return skip_session(e);
1338 int cg_path_get_user_unit(const char *path, char **ret) {
1344 t = skip_user_prefix(path);
1348 /* And from here on it looks pretty much the same as for a
1349 * system unit, hence let's use the same parser from here
1351 return cg_path_get_unit(t, ret);
1354 /// UNNEDED by elogind
1356 int cg_pid_get_user_unit(pid_t pid, char **unit) {
1357 _cleanup_free_ char *cgroup = NULL;
1362 r = cg_pid_get_path_shifted(pid, NULL, &cgroup);
1366 return cg_path_get_user_unit(cgroup, unit);
1370 int cg_path_get_machine_name(const char *path, char **machine) {
1371 _cleanup_free_ char *u = NULL, *sl = NULL;
1374 r = cg_path_get_unit(path, &u);
1378 sl = strjoin("/run/systemd/machines/unit:", u, NULL);
1382 return readlink_malloc(sl, machine);
1385 /// UNNEDED by elogind
1387 int cg_pid_get_machine_name(pid_t pid, char **machine) {
1388 _cleanup_free_ char *cgroup = NULL;
1393 r = cg_pid_get_path_shifted(pid, NULL, &cgroup);
1397 return cg_path_get_machine_name(cgroup, machine);
1401 int cg_path_get_session(const char *path, char **session) {
1402 _cleanup_free_ char *unit = NULL;
1408 r = cg_path_get_unit(path, &unit);
1412 start = startswith(unit, "session-");
1415 end = endswith(start, ".scope");
1420 if (!session_id_valid(start))
1436 int cg_pid_get_session(pid_t pid, char **session) {
1437 _cleanup_free_ char *cgroup = NULL;
1440 r = cg_pid_get_path_shifted(pid, NULL, &cgroup);
1444 return cg_path_get_session(cgroup, session);
1447 int cg_path_get_owner_uid(const char *path, uid_t *uid) {
1448 _cleanup_free_ char *slice = NULL;
1454 r = cg_path_get_slice(path, &slice);
1458 start = startswith(slice, "user-");
1461 end = endswith(start, ".slice");
1466 if (parse_uid(start, uid) < 0)
1472 /// UNNEDED by elogind
1474 int cg_pid_get_owner_uid(pid_t pid, uid_t *uid) {
1475 _cleanup_free_ char *cgroup = NULL;
1478 r = cg_pid_get_path_shifted(pid, NULL, &cgroup);
1482 return cg_path_get_owner_uid(cgroup, uid);
1486 int cg_path_get_slice(const char *p, char **slice) {
1487 const char *e = NULL;
1492 /* Finds the right-most slice unit from the beginning, but
1493 * stops before we come to the first non-slice unit. */
1498 p += strspn(p, "/");
1500 n = strcspn(p, "/");
1501 if (!valid_slice_name(p, n)) {
1506 s = strdup("-.slice");
1514 return cg_path_decode_unit(e, slice);
1522 int cg_pid_get_slice(pid_t pid, char **slice) {
1523 _cleanup_free_ char *cgroup = NULL;
1528 r = cg_pid_get_path_shifted(pid, NULL, &cgroup);
1532 return cg_path_get_slice(cgroup, slice);
1535 int cg_path_get_user_slice(const char *p, char **slice) {
1540 t = skip_user_prefix(p);
1544 /* And now it looks pretty much the same as for a system
1545 * slice, so let's just use the same parser from here on. */
1546 return cg_path_get_slice(t, slice);
1549 int cg_pid_get_user_slice(pid_t pid, char **slice) {
1550 _cleanup_free_ char *cgroup = NULL;
1555 r = cg_pid_get_path_shifted(pid, NULL, &cgroup);
1559 return cg_path_get_user_slice(cgroup, slice);
1562 char *cg_escape(const char *p) {
1563 bool need_prefix = false;
1565 /* This implements very minimal escaping for names to be used
1566 * as file names in the cgroup tree: any name which might
1567 * conflict with a kernel name or is prefixed with '_' is
1568 * prefixed with a '_'. That way, when reading cgroup names it
1569 * is sufficient to remove a single prefixing underscore if
1572 /* The return value of this function (unlike cg_unescape())
1578 streq(p, "notify_on_release") ||
1579 streq(p, "release_agent") ||
1585 dot = strrchr(p, '.');
1588 if (dot - p == 6 && memcmp(p, "cgroup", 6) == 0)
1593 n = strndupa(p, dot - p);
1595 if (check_hierarchy(n) >= 0)
1602 return strappend("_", p);
1607 char *cg_unescape(const char *p) {
1610 /* The return value of this function (unlike cg_escape())
1611 * doesn't need free()! */
1619 #define CONTROLLER_VALID \
1623 bool cg_controller_is_valid(const char *p) {
1629 s = startswith(p, "name=");
1633 if (*p == 0 || *p == '_')
1636 for (t = p; *t; t++)
1637 if (!strchr(CONTROLLER_VALID, *t))
1640 if (t - p > FILENAME_MAX)
1646 /// UNNEEDED by elogind
1648 int cg_slice_to_path(const char *unit, char **ret) {
1649 _cleanup_free_ char *p = NULL, *s = NULL, *e = NULL;
1656 if (streq(unit, "-.slice")) {
1666 if (!unit_name_is_valid(unit, UNIT_NAME_PLAIN))
1669 if (!endswith(unit, ".slice"))
1672 r = unit_name_to_prefix(unit, &p);
1676 dash = strchr(p, '-');
1678 /* Don't allow initial dashes */
1683 _cleanup_free_ char *escaped = NULL;
1684 char n[dash - p + sizeof(".slice")];
1686 /* Don't allow trailing or double dashes */
1687 if (dash[1] == 0 || dash[1] == '-')
1690 strcpy(stpncpy(n, p, dash - p), ".slice");
1691 if (!unit_name_is_valid(n, UNIT_NAME_PLAIN))
1694 escaped = cg_escape(n);
1698 if (!strextend(&s, escaped, "/", NULL))
1701 dash = strchr(dash+1, '-');
1704 e = cg_escape(unit);
1708 if (!strextend(&s, e, NULL))
1718 int cg_set_attribute(const char *controller, const char *path, const char *attribute, const char *value) {
1719 _cleanup_free_ char *p = NULL;
1722 r = cg_get_path(controller, path, attribute, &p);
1726 return write_string_file_no_create(p, value);
1729 int cg_get_attribute(const char *controller, const char *path, const char *attribute, char **ret) {
1730 _cleanup_free_ char *p = NULL;
1733 r = cg_get_path(controller, path, attribute, &p);
1737 return read_one_line_file(p, ret);
1740 static const char mask_names[] =
1747 int cg_create_everywhere(CGroupControllerMask supported, CGroupControllerMask mask, const char *path) {
1748 CGroupControllerMask bit = 1;
1752 /* This one will create a cgroup in our private tree, but also
1753 * duplicate it in the trees specified in mask, and remove it
1756 /* First create the cgroup in our own hierarchy. */
1757 r = cg_create(SYSTEMD_CGROUP_CONTROLLER, path);
1761 /* Then, do the same in the other hierarchies */
1762 NULSTR_FOREACH(n, mask_names) {
1765 else if (supported & bit)
1766 cg_trim(n, path, true);
1774 int cg_attach_everywhere(CGroupControllerMask supported, const char *path, pid_t pid, cg_migrate_callback_t path_callback, void *userdata) {
1775 CGroupControllerMask bit = 1;
1779 r = cg_attach(SYSTEMD_CGROUP_CONTROLLER, path, pid);
1783 NULSTR_FOREACH(n, mask_names) {
1785 if (supported & bit) {
1786 const char *p = NULL;
1789 p = path_callback(bit, userdata);
1794 cg_attach_fallback(n, p, pid);
1803 int cg_attach_many_everywhere(CGroupControllerMask supported, const char *path, Set* pids, cg_migrate_callback_t path_callback, void *userdata) {
1808 SET_FOREACH(pidp, pids, i) {
1809 pid_t pid = PTR_TO_LONG(pidp);
1812 q = cg_attach_everywhere(supported, path, pid, path_callback, userdata);
1820 int cg_migrate_everywhere(CGroupControllerMask supported, const char *from, const char *to, cg_migrate_callback_t to_callback, void *userdata) {
1821 CGroupControllerMask bit = 1;
1825 if (!path_equal(from, to)) {
1826 r = cg_migrate_recursive(SYSTEMD_CGROUP_CONTROLLER, from, SYSTEMD_CGROUP_CONTROLLER, to, false, true);
1831 NULSTR_FOREACH(n, mask_names) {
1832 if (supported & bit) {
1833 const char *p = NULL;
1836 p = to_callback(bit, userdata);
1841 cg_migrate_recursive_fallback(SYSTEMD_CGROUP_CONTROLLER, to, n, p, false, false);
1850 int cg_trim_everywhere(CGroupControllerMask supported, const char *path, bool delete_root) {
1851 CGroupControllerMask bit = 1;
1855 r = cg_trim(SYSTEMD_CGROUP_CONTROLLER, path, delete_root);
1859 NULSTR_FOREACH(n, mask_names) {
1860 if (supported & bit)
1861 cg_trim(n, path, delete_root);
1869 CGroupControllerMask cg_mask_supported(void) {
1870 CGroupControllerMask bit = 1, mask = 0;
1873 NULSTR_FOREACH(n, mask_names) {
1874 if (check_hierarchy(n) >= 0)
1883 int cg_kernel_controllers(Set *controllers) {
1884 _cleanup_fclose_ FILE *f = NULL;
1888 assert(controllers);
1890 f = fopen("/proc/cgroups", "re");
1892 if (errno == ENOENT)
1897 /* Ignore the header line */
1898 (void) fgets(buf, sizeof(buf), f);
1905 if (fscanf(f, "%ms %*i %*i %i", &controller, &enabled) != 2) {
1910 if (ferror(f) && errno)
1921 if (!filename_is_valid(controller)) {
1926 r = set_consume(controllers, controller);