summaryrefslogtreecommitdiff
path: root/doc
diff options
context:
space:
mode:
authorLennart Poettering <lennart@poettering.net>2018-05-02 10:51:48 +0200
committerGitHub <noreply@github.com>2018-05-02 10:51:48 +0200
commit9fc03455519878d54bfd8098eeb49972ade3ee29 (patch)
tree27da760c79b764c5ffc7706df08784d220f9fbc4 /doc
parentb0903bb585d2158f78a4cf603fde4aed5474e2b9 (diff)
parent3ee9b2f6e77b341f5249f6797eef3e34d6c1f580 (diff)
downloadsystemd-9fc03455519878d54bfd8098eeb49972ade3ee29.tar.gz
systemd-9fc03455519878d54bfd8098eeb49972ade3ee29.tar.bz2
systemd-9fc03455519878d54bfd8098eeb49972ade3ee29.zip
Merge pull request #8815 from poettering/get-unit-by-cgroup
add new GetUnitByControlGroup API
Diffstat (limited to 'doc')
-rw-r--r--doc/CGROUP_DELEGATION.md12
1 files changed, 11 insertions, 1 deletions
diff --git a/doc/CGROUP_DELEGATION.md b/doc/CGROUP_DELEGATION.md
index f78211b3a0..412f0a5fa0 100644
--- a/doc/CGROUP_DELEGATION.md
+++ b/doc/CGROUP_DELEGATION.md
@@ -434,7 +434,17 @@ unified you (of course, I guess) need to provide only `/sys/fs/cgroup/` itself.
replace it with an intermediary `tmpfs`, as long as the path to the
delegated sub-tree remains accessible as-is.
-5. ⚡ Think twice before delegating cgroupsv1 controllers to less privileged
+5. ⚡ Currently, the algorithm for mapping between slice/scope/service unit
+ naming and their cgroup paths is not considered public API of systemd, and
+ may change in future versions. This means: it's best to avoid implementing a
+ local logic of translating cgroup paths to slice/scope/service names in your
+ program, or vice versa — it's likely going to break sooner or later. Use the
+ appropriate D-Bus API calls for that instead, so that systemd translates
+ this for you. (Specifically: each Unit object has a `ControlGroup` property
+ to get the cgroup for a unit. The method `GetUnitByControlGroup()` may be
+ used to get the unit for a cgroup.)
+
+6. ⚡ Think twice before delegating cgroupsv1 controllers to less privileged
containers. It's not safe, you basically allow your containers to freeze the
system with that and worse. Delegation is a strongpoint of cgroupsv2 though,
and there it's safe to treat delegation boundaries as privilege boundaries.