]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/basic/process-util.h
man/systemd-sysext: list ephemeral/ephemeral-import in the list of options
[thirdparty/systemd.git] / src / basic / process-util.h
CommitLineData
db9ecf05 1/* SPDX-License-Identifier: LGPL-2.1-or-later */
0b452006
RC
2#pragma once
3
71d35b6b 4#include <signal.h>
0c15577a 5
5fd63a5a 6#include "fileio.h"
f97b34a6 7#include "format-util.h"
0c15577a
DDM
8#include "forward.h"
9#include "string-util.h"
0b452006
RC
10
11#define procfs_file_alloca(pid, field) \
12 ({ \
13 pid_t _pid_ = (pid); \
a07f18cd
LP
14 const char *_field_ = (field); \
15 char *_r_; \
3589d6c0
MY
16 if (_pid_ == 0) \
17 _r_ = strjoina("/proc/self/", _field_); \
18 else { \
19 assert(_pid_ > 0); \
a07f18cd
LP
20 _r_ = newa(char, STRLEN("/proc/") + DECIMAL_STR_MAX(pid_t) + 1 + strlen(_field_) + 1); \
21 sprintf(_r_, "/proc/" PID_FMT "/%s", _pid_, _field_); \
0b452006 22 } \
a07f18cd 23 (const char*) _r_; \
0b452006
RC
24 })
25
5fd63a5a
MY
26static inline int procfs_file_get_field(pid_t pid, const char *name, const char *key, char **ret) {
27 return get_proc_field(procfs_file_alloca(pid, name), key, ret);
28}
29
09c1dcee
ZJS
30typedef enum ProcessCmdlineFlags {
31 PROCESS_CMDLINE_COMM_FALLBACK = 1 << 0,
e3b4efd2 32 PROCESS_CMDLINE_USE_LOCALE = 1 << 1,
61977664 33 PROCESS_CMDLINE_QUOTE = 1 << 2,
99009ed0 34 PROCESS_CMDLINE_QUOTE_POSIX = 1 << 3,
09c1dcee
ZJS
35} ProcessCmdlineFlags;
36
d7d74854
LP
37int pid_get_comm(pid_t pid, char **ret);
38int pidref_get_comm(const PidRef *pid, char **ret);
a034620f
LP
39int pid_get_cmdline(pid_t pid, size_t max_columns, ProcessCmdlineFlags flags, char **ret);
40int pidref_get_cmdline(const PidRef *pid, size_t max_columns, ProcessCmdlineFlags flags, char **ret);
41int pid_get_cmdline_strv(pid_t pid, ProcessCmdlineFlags flags, char ***ret);
42int pidref_get_cmdline_strv(const PidRef *pid, ProcessCmdlineFlags flags, char ***ret);
95a511b7 43int get_process_exe(pid_t pid, char **ret);
8b513415
LP
44int pid_get_uid(pid_t pid, uid_t *ret);
45int pidref_get_uid(const PidRef *pid, uid_t *ret);
95a511b7 46int get_process_gid(pid_t pid, gid_t *ret);
95a511b7
YW
47int get_process_cwd(pid_t pid, char **ret);
48int get_process_root(pid_t pid, char **ret);
49int get_process_environ(pid_t pid, char **ret);
47f64104
MY
50int pid_get_ppid(pid_t pid, pid_t *ret);
51int pidref_get_ppid(const PidRef *pidref, pid_t *ret);
9237a63a 52int pidref_get_ppid_as_pidref(const PidRef *pidref, PidRef *ret);
6fb97a85 53int pid_get_start_time(pid_t pid, usec_t *ret);
47f64104 54int pidref_get_start_time(const PidRef *pid, usec_t *ret);
95a511b7 55int get_process_umask(pid_t pid, mode_t *ret);
0b452006 56
3ec2ad35
ZJS
57int container_get_leader(const char *machine, pid_t *pid);
58
37149e69
MY
59static inline bool SIGINFO_CODE_IS_DEAD(int code) {
60 return IN_SET(code, CLD_EXITED, CLD_KILLED, CLD_DUMPED);
61}
62
147f1d7b 63int wait_for_terminate(pid_t pid, siginfo_t *ret);
7d4904fe
LP
64
65typedef enum WaitFlags {
ef31828d
LP
66 WAIT_LOG_ABNORMAL = 1 << 0,
67 WAIT_LOG_NON_ZERO_EXIT_STATUS = 1 << 1,
7d4904fe
LP
68
69 /* A shortcut for requesting the most complete logging */
70 WAIT_LOG = WAIT_LOG_ABNORMAL|WAIT_LOG_NON_ZERO_EXIT_STATUS,
71} WaitFlags;
72
4ecc87bf 73int pidref_wait_for_terminate_and_check(const char *name, PidRef *pidref, WaitFlags flags);
7d4904fe 74int wait_for_terminate_and_check(const char *name, pid_t pid, WaitFlags flags);
4ecc87bf 75
d5641e0d 76int wait_for_terminate_with_timeout(pid_t pid, usec_t timeout);
0b452006 77
89c9030d
LP
78void sigkill_wait(pid_t pid);
79void sigkill_waitp(pid_t *pid);
392cf1d0 80void sigterm_wait(pid_t pid);
b293bb23
LP
81void sigkill_nowait(pid_t pid);
82void sigkill_nowaitp(pid_t *pid);
4d0d3d41 83
0b452006 84int kill_and_sigcont(pid_t pid, int sig);
405f8907 85
fc87713b
LP
86int pid_is_kernel_thread(pid_t pid);
87int pidref_is_kernel_thread(const PidRef *pid);
405f8907 88
0b452006
RC
89int getenv_for_pid(pid_t pid, const char *field, char **_value);
90
becdfcb9
LP
91int pid_is_alive(pid_t pid);
92int pidref_is_alive(const PidRef *pidref);
4d9f092b 93int pid_is_unwaited(pid_t pid);
4ace93da 94int pidref_is_unwaited(PidRef *pidref);
4d051546 95int pid_is_my_child(pid_t pid);
4ace93da 96int pidref_is_my_child(PidRef *pidref);
d6267b9b 97int pidref_from_same_root_fs(PidRef *a, PidRef *b);
d4510856
LP
98
99bool is_main_thread(void);
ceee6d3a 100
c4412d4d
LP
101bool oom_score_adjust_is_valid(int oa);
102
7b3e062c 103#ifndef PERSONALITY_INVALID
14ce9b4e 104/* personality(2) documents that 0xFFFFFFFFUL is used for querying the
7b3e062c
LP
105 * current personality, hence let's use that here as error
106 * indicator. */
14ce9b4e 107#define PERSONALITY_INVALID 0xFFFFFFFFUL
7b3e062c
LP
108#endif
109
3dc51ab2
FS
110/* The personality() syscall returns a 32-bit value where the top three bytes are reserved for flags that
111 * emulate historical or architectural quirks, and only the least significant byte reflects the actual
112 * personality we're interested in. */
113#define OPINIONATED_PERSONALITY_MASK 0xFFUL
114
7b3e062c 115unsigned long personality_from_string(const char *p);
bfd5a068 116const char* personality_to_string(unsigned long);
7b3e062c 117
21022b9d 118int safe_personality(unsigned long p);
e8132d63
LP
119int opinionated_personality(unsigned long *ret);
120
bfd5a068 121const char* sigchld_code_to_string(int i) _const_;
7b3e062c
LP
122int sigchld_code_from_string(const char *s) _pure_;
123
124int sched_policy_to_string_alloc(int i, char **s);
125int sched_policy_from_string(const char *s);
126
bc2fcf7f
LP
127static inline pid_t PTR_TO_PID(const void *p) {
128 return (pid_t) ((uintptr_t) p);
129}
130
131static inline void* PID_TO_PTR(pid_t pid) {
132 return (void*) ((uintptr_t) pid);
133}
dcadc967
EV
134
135void valgrind_summary_hack(void);
291d565a 136
93bab288 137int pid_compare_func(const pid_t *a, const pid_t *b);
41bf0590 138
180341e7 139bool nice_is_valid(int n) _const_;
7f452159 140
0c15577a
DDM
141bool sched_policy_is_valid(int i) _const_;
142bool sched_priority_is_valid(int i) _const_;
29ea9f0f 143
de34ec18 144#define PID_AUTOMATIC ((pid_t) INT_MIN) /* special value indicating "acquire pid from connection peer" */
dafd44de 145
54191eb3
LP
146static inline bool pid_is_valid(pid_t p) {
147 return p > 0;
148}
149
dafd44de
IK
150static inline bool pid_is_automatic(pid_t p) {
151 return p == PID_AUTOMATIC;
152}
153
5c30a6d2 154pid_t getpid_cached(void);
799a960d 155void reset_cached_pid(void);
fba868fa
LP
156
157int must_be_root(void);
4c253ed1 158
29c3520f
LP
159pid_t clone_with_nested_stack(int (*fn)(void *), int flags, void *userdata);
160
406f1775 161/* 💣 Note that FORK_NEW_USERNS, FORK_NEW_MOUNTNS, FORK_NEW_NETNS or FORK_NEW_PIDNS should not be called in threaded
387f39ea
YW
162 * programs, because they cause us to use raw_clone() which does not synchronize the glibc malloc() locks,
163 * and thus will cause deadlocks if the parent uses threads and the child does memory allocations. Hence: if
164 * the parent is threaded these flags may not be used. These flags cannot be used if the parent uses threads
165 * or the child uses malloc(). 💣 */
4c253ed1 166typedef enum ForkFlags {
8987afc4
LP
167 FORK_RESET_SIGNALS = 1 << 0, /* Reset all signal handlers and signal mask */
168 FORK_CLOSE_ALL_FDS = 1 << 1, /* Close all open file descriptors in the child, except for 0,1,2 */
e9ccae31 169 FORK_DEATHSIG_SIGTERM = 1 << 2, /* Set PR_DEATHSIG in the child to SIGTERM */
97033ba4 170 FORK_DEATHSIG_SIGINT = 1 << 3, /* Set PR_DEATHSIG in the child to SIGINT */
e9ccae31
LP
171 FORK_DEATHSIG_SIGKILL = 1 << 4, /* Set PR_DEATHSIG in the child to SIGKILL */
172 FORK_REARRANGE_STDIO = 1 << 5, /* Connect 0,1,2 to specified fds or /dev/null */
173 FORK_REOPEN_LOG = 1 << 6, /* Reopen log connection */
174 FORK_LOG = 1 << 7, /* Log above LOG_DEBUG log level about failures */
175 FORK_WAIT = 1 << 8, /* Wait until child exited */
406f1775
DDM
176 FORK_MOUNTNS_SLAVE = 1 << 9, /* Make child's mount namespace MS_SLAVE */
177 FORK_PRIVATE_TMP = 1 << 10, /* Mount new /tmp/ in the child (combine with FORK_NEW_MOUNTNS!) */
178 FORK_RLIMIT_NOFILE_SAFE = 1 << 11, /* Set RLIMIT_NOFILE soft limit to 1K for select() compat */
179 FORK_STDOUT_TO_STDERR = 1 << 12, /* Make stdout a copy of stderr */
180 FORK_FLUSH_STDIO = 1 << 13, /* fflush() stdout (and stderr) before forking */
181 FORK_CLOEXEC_OFF = 1 << 14, /* In the child: turn off O_CLOEXEC on all fds in except_fds[] */
182 FORK_KEEP_NOTIFY_SOCKET = 1 << 15, /* Unless this specified, $NOTIFY_SOCKET will be unset. */
183 FORK_DETACH = 1 << 16, /* Double fork if needed to ensure PID1/subreaper is parent */
184 FORK_PACK_FDS = 1 << 17, /* Rearrange the passed FDs to be FD 3,4,5,etc. Updates the array in place (combine with FORK_CLOSE_ALL_FDS!) */
185 FORK_NEW_MOUNTNS = 1 << 18, /* Run child in its own mount namespace 💣 DO NOT USE IN THREADED PROGRAMS! 💣 */
186 FORK_NEW_USERNS = 1 << 19, /* Run child in its own user namespace 💣 DO NOT USE IN THREADED PROGRAMS! 💣 */
187 FORK_NEW_NETNS = 1 << 20, /* Run child in its own network namespace 💣 DO NOT USE IN THREADED PROGRAMS! 💣 */
188 FORK_NEW_PIDNS = 1 << 21, /* Run child in its own PID namespace 💣 DO NOT USE IN THREADED PROGRAMS! 💣 */
6eeeef9f 189 FORK_FREEZE = 1 << 22, /* Don't return in child, just call freeze() instead */
f48103ea 190 FORK_PID_ONLY = 1 << 23, /* Don't open a pidfd referencing the child process */
4c253ed1
LP
191} ForkFlags;
192
f48103ea 193int pidref_safe_fork_full(
911f8f01
YW
194 const char *name,
195 const int stdio_fds[3],
85f660d4 196 int except_fds[],
911f8f01
YW
197 size_t n_except_fds,
198 ForkFlags flags,
f48103ea 199 PidRef *ret_pid);
4c253ed1 200
f48103ea
DDM
201static inline int pidref_safe_fork(const char *name, ForkFlags flags, PidRef *ret_pid) {
202 return pidref_safe_fork_full(name, NULL, NULL, 0, flags, ret_pid);
4c253ed1 203}
78752f2e 204
f48103ea 205int safe_fork_full(
f1713226
LP
206 const char *name,
207 const int stdio_fds[3],
85f660d4 208 int except_fds[],
f1713226
LP
209 size_t n_except_fds,
210 ForkFlags flags,
f48103ea 211 pid_t *ret_pid);
f1713226 212
f48103ea
DDM
213static inline int safe_fork(const char *name, ForkFlags flags, pid_t *ret_pid) {
214 return safe_fork_full(name, NULL, NULL, 0, flags, ret_pid);
f1713226
LP
215}
216
85f660d4
AV
217int namespace_fork(
218 const char *outer_name,
219 const char *inner_name,
220 int except_fds[],
221 size_t n_except_fds,
222 ForkFlags flags,
223 int pidns_fd,
224 int mntns_fd,
225 int netns_fd,
226 int userns_fd,
227 int root_fd,
228 pid_t *ret_pid);
27096982 229
9f8168eb 230int set_oom_score_adjust(int value);
2c37c613 231int get_oom_score_adjust(int *ret);
9f8168eb 232
f3a367d6
LP
233/* The highest possibly (theoretic) pid_t value on this architecture. */
234#define PID_T_MAX ((pid_t) INT32_MAX)
235/* The maximum number of concurrent processes Linux allows on this architecture, as well as the highest valid PID value
236 * the kernel will potentially assign. This reflects a value compiled into the kernel (PID_MAX_LIMIT), and sets the
237 * upper boundary on what may be written to the /proc/sys/kernel/pid_max sysctl (but do note that the sysctl is off by
238 * 1, since PID 0 can never exist and there can hence only be one process less than the limit would suggest). Since
239 * these values are documented in proc(5) we feel quite confident that they are stable enough for the near future at
240 * least to define them here too. */
241#define TASKS_MAX 4194303U
f3a367d6 242
ab1a1ba5 243assert_cc(TASKS_MAX <= (unsigned long) PID_T_MAX);
342f6f80 244
40c5cc2b
DS
245/* Like TAKE_PTR() but for pid_t, resetting them to 0 */
246#define TAKE_PID(pid) TAKE_GENERIC(pid, pid_t, 0)
298f466f 247
39090201 248int setpriority_closest(int priority);
2306d177 249
8ddefb8e 250_noreturn_ void freeze(void);
6aa90884
LP
251
252int get_process_threads(pid_t pid);
09f9530b
LP
253
254int is_reaper_process(void);
8c3fe1b5 255int make_reaper_process(bool b);
6ecdfe7d 256
c9033540
MY
257int posix_spawn_wrapper(
258 const char *path,
259 char * const *argv,
260 char * const *envp,
261 const char *cgroup,
262 PidRef *ret_pidref);
eefb7d22
LP
263
264int proc_dir_open(DIR **ret);
265int proc_dir_read(DIR *d, pid_t *ret);
266int proc_dir_read_pidref(DIR *d, PidRef *ret);
a567de39
IK
267
268_noreturn_ void report_errno_and_exit(int errno_fd, int error);
64db44f7 269int read_errno(int errno_fd);