'\" t .TH "SD_PID_GET_OWNER_UID" "3" "" "elogind 252.9" "sd_pid_get_owner_uid" .\" ----------------------------------------------------------------- .\" * Define some portability stuff .\" ----------------------------------------------------------------- .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ .\" http://bugs.debian.org/507673 .\" http://lists.gnu.org/archive/html/groff/2009-02/msg00013.html .\" ~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~~ .ie \n(.g .ds Aq \(aq .el .ds Aq ' .\" ----------------------------------------------------------------- .\" * set default formatting .\" ----------------------------------------------------------------- .\" disable hyphenation .nh .\" disable justification (adjust text to left margin only) .ad l .\" ----------------------------------------------------------------- .\" * MAIN CONTENT STARTS HERE * .\" ----------------------------------------------------------------- .SH "NAME" sd_pid_get_owner_uid, sd_pid_get_session, sd_pid_get_slice, sd_pid_get_user_slice, sd_pid_get_cgroup, sd_peer_get_owner_uid, sd_peer_get_session, sd_peer_get_slice, sd_peer_get_user_slice, sd_peer_get_cgroup \- Determine the owner uid of the user unit or session, or the session, user unit, system unit, container/VM or slice that a specific PID or socket peer belongs to .SH "SYNOPSIS" .sp .ft B .nf #include .fi .ft .HP \w'int\ sd_pid_get_owner_uid('u .BI "int sd_pid_get_owner_uid(pid_t\ " "pid" ", uid_t\ *" "uid" ");" .HP \w'int\ sd_pid_get_session('u .BI "int sd_pid_get_session(pid_t\ " "pid" ", char\ **" "session" ");" .HP \w'int\ sd_pid_get_slice('u .BI "int sd_pid_get_slice(pid_t\ " "pid" ", char\ **" "slice" ");" .HP \w'int\ sd_pid_get_user_slice('u .BI "int sd_pid_get_user_slice(pid_t\ " "pid" ", char\ **" "slice" ");" .HP \w'int\ sd_pid_get_cgroup('u .BI "int sd_pid_get_cgroup(pid_t\ " "pid" ", char\ **" "cgroup" ");" .HP \w'int\ sd_peer_get_owner_uid('u .BI "int sd_peer_get_owner_uid(int\ " "fd" ", uid_t\ *" "uid" ");" .HP \w'int\ sd_peer_get_session('u .BI "int sd_peer_get_session(int\ " "fd" ", char\ **" "session" ");" .HP \w'int\ sd_peer_get_slice('u .BI "int sd_peer_get_slice(int\ " "fd" ", char\ **" "slice" ");" .HP \w'int\ sd_peer_get_user_slice('u .BI "int sd_peer_get_user_slice(int\ " "fd" ", char\ **" "slice" ");" .HP \w'int\ sd_peer_get_cgroup('u .BI "int sd_peer_get_cgroup(int\ " "fd" ", char\ **" "cgroup" ");" .SH "DESCRIPTION" .PP \fBsd_pid_get_owner_uid()\fR may be used to determine the Unix UID (user identifier) which owns the login session of a process identified by the specified PID\&. For processes which are not part of a login session and not managed by a user manager, this function will fail with \fB\-ENODATA\fR\&. .PP \fBsd_pid_get_session()\fR may be used to determine the login session identifier of a process identified by the specified process identifier\&. The session identifier is a short string, suitable for usage in file system paths\&. For processes which are not part of a login session, this function will fail with \fB\-ENODATA\fR\&. The returned string needs to be freed with the libc \fBfree\fR(3) call after use\&. .PP \fBsd_pid_get_cgroup()\fR returns the control group path of the specified process, relative to the root of the hierarchy\&. Returns the path without trailing slash, except for processes located in the root control group, where "/" is returned\&. To find the actual control group path in the file system, the returned path needs to be prefixed with /sys/fs/cgroup/ (if the unified control group setup is used), or /sys/fs/cgroup/\fIHIERARCHY\fR/ (if the legacy multi\-hierarchy control group setup is used)\&. .PP If the \fIpid\fR parameter of any of these functions is passed as 0, the operation is executed for the calling process\&. .PP The \fBsd_peer_get_owner_uid()\fR, \fBsd_peer_get_session()\fR, \fBsd_peer_get_slice()\fR, \fBsd_peer_get_user_slice()\fR and \fBsd_peer_get_cgroup()\fR calls operate similarly to their PID counterparts, but accept a connected \fBAF_UNIX\fR socket and retrieve information about the connected peer process\&. Note that these fields are retrieved via /proc/, and hence are not suitable for authorization purposes, as they are subject to races\&. .SH "RETURN VALUE" .PP On success, these calls return 0 or a positive integer\&. On failure, these calls return a negative errno\-style error code\&. .SS "Errors" .PP Returned errors may indicate the following problems: .PP \fB\-ESRCH\fR .RS 4 The specified PID does not refer to a running process\&. .RE .PP \fB\-EBADF\fR .RS 4 The specified socket file descriptor was invalid\&. .RE .PP \fB\-ENODATA\fR .RS 4 The given field is not specified for the described process or peer\&. .RE .PP \fB\-EINVAL\fR .RS 4 An input parameter was invalid (out of range, or \fBNULL\fR, where that is not accepted)\&. .RE .PP \fB\-ENOMEM\fR .RS 4 Memory allocation failed\&. .RE .SH "NOTES" .PP These APIs are implemented as a shared library, which can be compiled and linked to with the \fBlibelogind\fR\ \&\fBpkg-config\fR(1) file\&. .PP Note that the login session identifier as returned by \fBsd_pid_get_session()\fR is completely unrelated to the process session identifier as returned by \fBgetsid\fR(2)\&. .SH "SEE ALSO" .PP \fBelogind\fR(8), \fBsd-login\fR(3), \fBsd_session_is_active\fR(3), \fBgetsid\fR(2)