]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/basic/process-util.c
process-util: update the end pointer of the process name on rename (#6492)
[thirdparty/systemd.git] / src / basic / process-util.c
1 /***
2 This file is part of systemd.
3
4 Copyright 2010 Lennart Poettering
5
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
10
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
15
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
18 ***/
19
20 #include <ctype.h>
21 #include <errno.h>
22 #include <limits.h>
23 #include <linux/oom.h>
24 #include <sched.h>
25 #include <signal.h>
26 #include <stdbool.h>
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <sys/mman.h>
31 #include <sys/personality.h>
32 #include <sys/prctl.h>
33 #include <sys/types.h>
34 #include <sys/wait.h>
35 #include <syslog.h>
36 #include <unistd.h>
37 #ifdef HAVE_VALGRIND_VALGRIND_H
38 #include <valgrind/valgrind.h>
39 #endif
40
41 #include "alloc-util.h"
42 #include "architecture.h"
43 #include "escape.h"
44 #include "fd-util.h"
45 #include "fileio.h"
46 #include "fs-util.h"
47 #include "ioprio.h"
48 #include "log.h"
49 #include "macro.h"
50 #include "missing.h"
51 #include "process-util.h"
52 #include "raw-clone.h"
53 #include "signal-util.h"
54 #include "stat-util.h"
55 #include "string-table.h"
56 #include "string-util.h"
57 #include "user-util.h"
58 #include "util.h"
59
60 int get_process_state(pid_t pid) {
61 const char *p;
62 char state;
63 int r;
64 _cleanup_free_ char *line = NULL;
65
66 assert(pid >= 0);
67
68 p = procfs_file_alloca(pid, "stat");
69
70 r = read_one_line_file(p, &line);
71 if (r == -ENOENT)
72 return -ESRCH;
73 if (r < 0)
74 return r;
75
76 p = strrchr(line, ')');
77 if (!p)
78 return -EIO;
79
80 p++;
81
82 if (sscanf(p, " %c", &state) != 1)
83 return -EIO;
84
85 return (unsigned char) state;
86 }
87
88 int get_process_comm(pid_t pid, char **name) {
89 const char *p;
90 int r;
91
92 assert(name);
93 assert(pid >= 0);
94
95 p = procfs_file_alloca(pid, "comm");
96
97 r = read_one_line_file(p, name);
98 if (r == -ENOENT)
99 return -ESRCH;
100
101 return r;
102 }
103
104 int get_process_cmdline(pid_t pid, size_t max_length, bool comm_fallback, char **line) {
105 _cleanup_fclose_ FILE *f = NULL;
106 bool space = false;
107 char *k, *ans = NULL;
108 const char *p;
109 int c;
110
111 assert(line);
112 assert(pid >= 0);
113
114 /* Retrieves a process' command line. Replaces unprintable characters while doing so by whitespace (coalescing
115 * multiple sequential ones into one). If max_length is != 0 will return a string of the specified size at most
116 * (the trailing NUL byte does count towards the length here!), abbreviated with a "..." ellipsis. If
117 * comm_fallback is true and the process has no command line set (the case for kernel threads), or has a
118 * command line that resolves to the empty string will return the "comm" name of the process instead.
119 *
120 * Returns -ESRCH if the process doesn't exist, and -ENOENT if the process has no command line (and
121 * comm_fallback is false). Returns 0 and sets *line otherwise. */
122
123 p = procfs_file_alloca(pid, "cmdline");
124
125 f = fopen(p, "re");
126 if (!f) {
127 if (errno == ENOENT)
128 return -ESRCH;
129 return -errno;
130 }
131
132 if (max_length == 1) {
133
134 /* If there's only room for one byte, return the empty string */
135 ans = new0(char, 1);
136 if (!ans)
137 return -ENOMEM;
138
139 *line = ans;
140 return 0;
141
142 } else if (max_length == 0) {
143 size_t len = 0, allocated = 0;
144
145 while ((c = getc(f)) != EOF) {
146
147 if (!GREEDY_REALLOC(ans, allocated, len+3)) {
148 free(ans);
149 return -ENOMEM;
150 }
151
152 if (isprint(c)) {
153 if (space) {
154 ans[len++] = ' ';
155 space = false;
156 }
157
158 ans[len++] = c;
159 } else if (len > 0)
160 space = true;
161 }
162
163 if (len > 0)
164 ans[len] = '\0';
165 else
166 ans = mfree(ans);
167
168 } else {
169 bool dotdotdot = false;
170 size_t left;
171
172 ans = new(char, max_length);
173 if (!ans)
174 return -ENOMEM;
175
176 k = ans;
177 left = max_length;
178 while ((c = getc(f)) != EOF) {
179
180 if (isprint(c)) {
181
182 if (space) {
183 if (left <= 2) {
184 dotdotdot = true;
185 break;
186 }
187
188 *(k++) = ' ';
189 left--;
190 space = false;
191 }
192
193 if (left <= 1) {
194 dotdotdot = true;
195 break;
196 }
197
198 *(k++) = (char) c;
199 left--;
200 } else if (k > ans)
201 space = true;
202 }
203
204 if (dotdotdot) {
205 if (max_length <= 4) {
206 k = ans;
207 left = max_length;
208 } else {
209 k = ans + max_length - 4;
210 left = 4;
211
212 /* Eat up final spaces */
213 while (k > ans && isspace(k[-1])) {
214 k--;
215 left++;
216 }
217 }
218
219 strncpy(k, "...", left-1);
220 k[left-1] = 0;
221 } else
222 *k = 0;
223 }
224
225 /* Kernel threads have no argv[] */
226 if (isempty(ans)) {
227 _cleanup_free_ char *t = NULL;
228 int h;
229
230 free(ans);
231
232 if (!comm_fallback)
233 return -ENOENT;
234
235 h = get_process_comm(pid, &t);
236 if (h < 0)
237 return h;
238
239 if (max_length == 0)
240 ans = strjoin("[", t, "]");
241 else {
242 size_t l;
243
244 l = strlen(t);
245
246 if (l + 3 <= max_length)
247 ans = strjoin("[", t, "]");
248 else if (max_length <= 6) {
249
250 ans = new(char, max_length);
251 if (!ans)
252 return -ENOMEM;
253
254 memcpy(ans, "[...]", max_length-1);
255 ans[max_length-1] = 0;
256 } else {
257 char *e;
258
259 t[max_length - 6] = 0;
260
261 /* Chop off final spaces */
262 e = strchr(t, 0);
263 while (e > t && isspace(e[-1]))
264 e--;
265 *e = 0;
266
267 ans = strjoin("[", t, "...]");
268 }
269 }
270 if (!ans)
271 return -ENOMEM;
272 }
273
274 *line = ans;
275 return 0;
276 }
277
278 int rename_process(const char name[]) {
279 static size_t mm_size = 0;
280 static char *mm = NULL;
281 bool truncated = false;
282 size_t l;
283
284 /* This is a like a poor man's setproctitle(). It changes the comm field, argv[0], and also the glibc's
285 * internally used name of the process. For the first one a limit of 16 chars applies; to the second one in
286 * many cases one of 10 (i.e. length of "/sbin/init") — however if we have CAP_SYS_RESOURCES it is unbounded;
287 * to the third one 7 (i.e. the length of "systemd". If you pass a longer string it will likely be
288 * truncated.
289 *
290 * Returns 0 if a name was set but truncated, > 0 if it was set but not truncated. */
291
292 if (isempty(name))
293 return -EINVAL; /* let's not confuse users unnecessarily with an empty name */
294
295 l = strlen(name);
296
297 /* First step, change the comm field. */
298 (void) prctl(PR_SET_NAME, name);
299 if (l > 15) /* Linux process names can be 15 chars at max */
300 truncated = true;
301
302 /* Second step, change glibc's ID of the process name. */
303 if (program_invocation_name) {
304 size_t k;
305
306 k = strlen(program_invocation_name);
307 strncpy(program_invocation_name, name, k);
308 if (l > k)
309 truncated = true;
310 }
311
312 /* Third step, completely replace the argv[] array the kernel maintains for us. This requires privileges, but
313 * has the advantage that the argv[] array is exactly what we want it to be, and not filled up with zeros at
314 * the end. This is the best option for changing /proc/self/cmdline. */
315
316 /* Let's not bother with this if we don't have euid == 0. Strictly speaking we should check for the
317 * CAP_SYS_RESOURCE capability which is independent of the euid. In our own code the capability generally is
318 * present only for euid == 0, hence let's use this as quick bypass check, to avoid calling mmap() if
319 * PR_SET_MM_ARG_{START,END} fails with EPERM later on anyway. After all geteuid() is dead cheap to call, but
320 * mmap() is not. */
321 if (geteuid() != 0)
322 log_debug("Skipping PR_SET_MM, as we don't have privileges.");
323 else if (mm_size < l+1) {
324 size_t nn_size;
325 char *nn;
326
327 nn_size = PAGE_ALIGN(l+1);
328 nn = mmap(NULL, nn_size, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0);
329 if (nn == MAP_FAILED) {
330 log_debug_errno(errno, "mmap() failed: %m");
331 goto use_saved_argv;
332 }
333
334 strncpy(nn, name, nn_size);
335
336 /* Now, let's tell the kernel about this new memory */
337 if (prctl(PR_SET_MM, PR_SET_MM_ARG_START, (unsigned long) nn, 0, 0) < 0) {
338 log_debug_errno(errno, "PR_SET_MM_ARG_START failed, proceeding without: %m");
339 (void) munmap(nn, nn_size);
340 goto use_saved_argv;
341 }
342
343 /* And update the end pointer to the new end, too. If this fails, we don't really know what to do, it's
344 * pretty unlikely that we can rollback, hence we'll just accept the failure, and continue. */
345 if (prctl(PR_SET_MM, PR_SET_MM_ARG_END, (unsigned long) nn + l + 1, 0, 0) < 0)
346 log_debug_errno(errno, "PR_SET_MM_ARG_END failed, proceeding without: %m");
347
348 if (mm)
349 (void) munmap(mm, mm_size);
350
351 mm = nn;
352 mm_size = nn_size;
353 } else {
354 strncpy(mm, name, mm_size);
355
356 /* Update the end pointer, continuing regardless of any failure. */
357 if (prctl(PR_SET_MM, PR_SET_MM_ARG_END, (unsigned long) mm + l + 1, 0, 0) < 0)
358 log_debug_errno(errno, "PR_SET_MM_ARG_END failed, proceeding without: %m");
359 }
360
361 use_saved_argv:
362 /* Fourth step: in all cases we'll also update the original argv[], so that our own code gets it right too if
363 * it still looks here */
364
365 if (saved_argc > 0) {
366 int i;
367
368 if (saved_argv[0]) {
369 size_t k;
370
371 k = strlen(saved_argv[0]);
372 strncpy(saved_argv[0], name, k);
373 if (l > k)
374 truncated = true;
375 }
376
377 for (i = 1; i < saved_argc; i++) {
378 if (!saved_argv[i])
379 break;
380
381 memzero(saved_argv[i], strlen(saved_argv[i]));
382 }
383 }
384
385 return !truncated;
386 }
387
388 int is_kernel_thread(pid_t pid) {
389 const char *p;
390 size_t count;
391 char c;
392 bool eof;
393 FILE *f;
394
395 if (pid == 0 || pid == 1 || pid == getpid_cached()) /* pid 1, and we ourselves certainly aren't a kernel thread */
396 return 0;
397
398 assert(pid > 1);
399
400 p = procfs_file_alloca(pid, "cmdline");
401 f = fopen(p, "re");
402 if (!f) {
403 if (errno == ENOENT)
404 return -ESRCH;
405 return -errno;
406 }
407
408 count = fread(&c, 1, 1, f);
409 eof = feof(f);
410 fclose(f);
411
412 /* Kernel threads have an empty cmdline */
413
414 if (count <= 0)
415 return eof ? 1 : -errno;
416
417 return 0;
418 }
419
420 int get_process_capeff(pid_t pid, char **capeff) {
421 const char *p;
422 int r;
423
424 assert(capeff);
425 assert(pid >= 0);
426
427 p = procfs_file_alloca(pid, "status");
428
429 r = get_proc_field(p, "CapEff", WHITESPACE, capeff);
430 if (r == -ENOENT)
431 return -ESRCH;
432
433 return r;
434 }
435
436 static int get_process_link_contents(const char *proc_file, char **name) {
437 int r;
438
439 assert(proc_file);
440 assert(name);
441
442 r = readlink_malloc(proc_file, name);
443 if (r == -ENOENT)
444 return -ESRCH;
445 if (r < 0)
446 return r;
447
448 return 0;
449 }
450
451 int get_process_exe(pid_t pid, char **name) {
452 const char *p;
453 char *d;
454 int r;
455
456 assert(pid >= 0);
457
458 p = procfs_file_alloca(pid, "exe");
459 r = get_process_link_contents(p, name);
460 if (r < 0)
461 return r;
462
463 d = endswith(*name, " (deleted)");
464 if (d)
465 *d = '\0';
466
467 return 0;
468 }
469
470 static int get_process_id(pid_t pid, const char *field, uid_t *uid) {
471 _cleanup_fclose_ FILE *f = NULL;
472 char line[LINE_MAX];
473 const char *p;
474
475 assert(field);
476 assert(uid);
477
478 if (pid < 0)
479 return -EINVAL;
480
481 p = procfs_file_alloca(pid, "status");
482 f = fopen(p, "re");
483 if (!f) {
484 if (errno == ENOENT)
485 return -ESRCH;
486 return -errno;
487 }
488
489 FOREACH_LINE(line, f, return -errno) {
490 char *l;
491
492 l = strstrip(line);
493
494 if (startswith(l, field)) {
495 l += strlen(field);
496 l += strspn(l, WHITESPACE);
497
498 l[strcspn(l, WHITESPACE)] = 0;
499
500 return parse_uid(l, uid);
501 }
502 }
503
504 return -EIO;
505 }
506
507 int get_process_uid(pid_t pid, uid_t *uid) {
508
509 if (pid == 0 || pid == getpid_cached()) {
510 *uid = getuid();
511 return 0;
512 }
513
514 return get_process_id(pid, "Uid:", uid);
515 }
516
517 int get_process_gid(pid_t pid, gid_t *gid) {
518
519 if (pid == 0 || pid == getpid_cached()) {
520 *gid = getgid();
521 return 0;
522 }
523
524 assert_cc(sizeof(uid_t) == sizeof(gid_t));
525 return get_process_id(pid, "Gid:", gid);
526 }
527
528 int get_process_cwd(pid_t pid, char **cwd) {
529 const char *p;
530
531 assert(pid >= 0);
532
533 p = procfs_file_alloca(pid, "cwd");
534
535 return get_process_link_contents(p, cwd);
536 }
537
538 int get_process_root(pid_t pid, char **root) {
539 const char *p;
540
541 assert(pid >= 0);
542
543 p = procfs_file_alloca(pid, "root");
544
545 return get_process_link_contents(p, root);
546 }
547
548 int get_process_environ(pid_t pid, char **env) {
549 _cleanup_fclose_ FILE *f = NULL;
550 _cleanup_free_ char *outcome = NULL;
551 int c;
552 const char *p;
553 size_t allocated = 0, sz = 0;
554
555 assert(pid >= 0);
556 assert(env);
557
558 p = procfs_file_alloca(pid, "environ");
559
560 f = fopen(p, "re");
561 if (!f) {
562 if (errno == ENOENT)
563 return -ESRCH;
564 return -errno;
565 }
566
567 while ((c = fgetc(f)) != EOF) {
568 if (!GREEDY_REALLOC(outcome, allocated, sz + 5))
569 return -ENOMEM;
570
571 if (c == '\0')
572 outcome[sz++] = '\n';
573 else
574 sz += cescape_char(c, outcome + sz);
575 }
576
577 if (!outcome) {
578 outcome = strdup("");
579 if (!outcome)
580 return -ENOMEM;
581 } else
582 outcome[sz] = '\0';
583
584 *env = outcome;
585 outcome = NULL;
586
587 return 0;
588 }
589
590 int get_process_ppid(pid_t pid, pid_t *_ppid) {
591 int r;
592 _cleanup_free_ char *line = NULL;
593 long unsigned ppid;
594 const char *p;
595
596 assert(pid >= 0);
597 assert(_ppid);
598
599 if (pid == 0 || pid == getpid_cached()) {
600 *_ppid = getppid();
601 return 0;
602 }
603
604 p = procfs_file_alloca(pid, "stat");
605 r = read_one_line_file(p, &line);
606 if (r == -ENOENT)
607 return -ESRCH;
608 if (r < 0)
609 return r;
610
611 /* Let's skip the pid and comm fields. The latter is enclosed
612 * in () but does not escape any () in its value, so let's
613 * skip over it manually */
614
615 p = strrchr(line, ')');
616 if (!p)
617 return -EIO;
618
619 p++;
620
621 if (sscanf(p, " "
622 "%*c " /* state */
623 "%lu ", /* ppid */
624 &ppid) != 1)
625 return -EIO;
626
627 if ((long unsigned) (pid_t) ppid != ppid)
628 return -ERANGE;
629
630 *_ppid = (pid_t) ppid;
631
632 return 0;
633 }
634
635 int wait_for_terminate(pid_t pid, siginfo_t *status) {
636 siginfo_t dummy;
637
638 assert(pid >= 1);
639
640 if (!status)
641 status = &dummy;
642
643 for (;;) {
644 zero(*status);
645
646 if (waitid(P_PID, pid, status, WEXITED) < 0) {
647
648 if (errno == EINTR)
649 continue;
650
651 return negative_errno();
652 }
653
654 return 0;
655 }
656 }
657
658 /*
659 * Return values:
660 * < 0 : wait_for_terminate() failed to get the state of the
661 * process, the process was terminated by a signal, or
662 * failed for an unknown reason.
663 * >=0 : The process terminated normally, and its exit code is
664 * returned.
665 *
666 * That is, success is indicated by a return value of zero, and an
667 * error is indicated by a non-zero value.
668 *
669 * A warning is emitted if the process terminates abnormally,
670 * and also if it returns non-zero unless check_exit_code is true.
671 */
672 int wait_for_terminate_and_warn(const char *name, pid_t pid, bool check_exit_code) {
673 int r;
674 siginfo_t status;
675
676 assert(name);
677 assert(pid > 1);
678
679 r = wait_for_terminate(pid, &status);
680 if (r < 0)
681 return log_warning_errno(r, "Failed to wait for %s: %m", name);
682
683 if (status.si_code == CLD_EXITED) {
684 if (status.si_status != 0)
685 log_full(check_exit_code ? LOG_WARNING : LOG_DEBUG,
686 "%s failed with error code %i.", name, status.si_status);
687 else
688 log_debug("%s succeeded.", name);
689
690 return status.si_status;
691 } else if (status.si_code == CLD_KILLED ||
692 status.si_code == CLD_DUMPED) {
693
694 log_warning("%s terminated by signal %s.", name, signal_to_string(status.si_status));
695 return -EPROTO;
696 }
697
698 log_warning("%s failed due to unknown reason.", name);
699 return -EPROTO;
700 }
701
702 void sigkill_wait(pid_t pid) {
703 assert(pid > 1);
704
705 if (kill(pid, SIGKILL) > 0)
706 (void) wait_for_terminate(pid, NULL);
707 }
708
709 void sigkill_waitp(pid_t *pid) {
710 if (!pid)
711 return;
712 if (*pid <= 1)
713 return;
714
715 sigkill_wait(*pid);
716 }
717
718 int kill_and_sigcont(pid_t pid, int sig) {
719 int r;
720
721 r = kill(pid, sig) < 0 ? -errno : 0;
722
723 /* If this worked, also send SIGCONT, unless we already just sent a SIGCONT, or SIGKILL was sent which isn't
724 * affected by a process being suspended anyway. */
725 if (r >= 0 && !IN_SET(sig, SIGCONT, SIGKILL))
726 (void) kill(pid, SIGCONT);
727
728 return r;
729 }
730
731 int getenv_for_pid(pid_t pid, const char *field, char **_value) {
732 _cleanup_fclose_ FILE *f = NULL;
733 char *value = NULL;
734 int r;
735 bool done = false;
736 size_t l;
737 const char *path;
738
739 assert(pid >= 0);
740 assert(field);
741 assert(_value);
742
743 path = procfs_file_alloca(pid, "environ");
744
745 f = fopen(path, "re");
746 if (!f) {
747 if (errno == ENOENT)
748 return -ESRCH;
749 return -errno;
750 }
751
752 l = strlen(field);
753 r = 0;
754
755 do {
756 char line[LINE_MAX];
757 unsigned i;
758
759 for (i = 0; i < sizeof(line)-1; i++) {
760 int c;
761
762 c = getc(f);
763 if (_unlikely_(c == EOF)) {
764 done = true;
765 break;
766 } else if (c == 0)
767 break;
768
769 line[i] = c;
770 }
771 line[i] = 0;
772
773 if (strneq(line, field, l) && line[l] == '=') {
774 value = strdup(line + l + 1);
775 if (!value)
776 return -ENOMEM;
777
778 r = 1;
779 break;
780 }
781
782 } while (!done);
783
784 *_value = value;
785 return r;
786 }
787
788 bool pid_is_unwaited(pid_t pid) {
789 /* Checks whether a PID is still valid at all, including a zombie */
790
791 if (pid < 0)
792 return false;
793
794 if (pid <= 1) /* If we or PID 1 would be dead and have been waited for, this code would not be running */
795 return true;
796
797 if (pid == getpid_cached())
798 return true;
799
800 if (kill(pid, 0) >= 0)
801 return true;
802
803 return errno != ESRCH;
804 }
805
806 bool pid_is_alive(pid_t pid) {
807 int r;
808
809 /* Checks whether a PID is still valid and not a zombie */
810
811 if (pid < 0)
812 return false;
813
814 if (pid <= 1) /* If we or PID 1 would be a zombie, this code would not be running */
815 return true;
816
817 if (pid == getpid_cached())
818 return true;
819
820 r = get_process_state(pid);
821 if (r == -ESRCH || r == 'Z')
822 return false;
823
824 return true;
825 }
826
827 int pid_from_same_root_fs(pid_t pid) {
828 const char *root;
829
830 if (pid < 0)
831 return false;
832
833 if (pid == 0 || pid == getpid_cached())
834 return true;
835
836 root = procfs_file_alloca(pid, "root");
837
838 return files_same(root, "/proc/1/root", 0);
839 }
840
841 bool is_main_thread(void) {
842 static thread_local int cached = 0;
843
844 if (_unlikely_(cached == 0))
845 cached = getpid_cached() == gettid() ? 1 : -1;
846
847 return cached > 0;
848 }
849
850 noreturn void freeze(void) {
851
852 log_close();
853
854 /* Make sure nobody waits for us on a socket anymore */
855 close_all_fds(NULL, 0);
856
857 sync();
858
859 for (;;)
860 pause();
861 }
862
863 bool oom_score_adjust_is_valid(int oa) {
864 return oa >= OOM_SCORE_ADJ_MIN && oa <= OOM_SCORE_ADJ_MAX;
865 }
866
867 unsigned long personality_from_string(const char *p) {
868 int architecture;
869
870 if (!p)
871 return PERSONALITY_INVALID;
872
873 /* Parse a personality specifier. We use our own identifiers that indicate specific ABIs, rather than just
874 * hints regarding the register size, since we want to keep things open for multiple locally supported ABIs for
875 * the same register size. */
876
877 architecture = architecture_from_string(p);
878 if (architecture < 0)
879 return PERSONALITY_INVALID;
880
881 if (architecture == native_architecture())
882 return PER_LINUX;
883 #ifdef SECONDARY_ARCHITECTURE
884 if (architecture == SECONDARY_ARCHITECTURE)
885 return PER_LINUX32;
886 #endif
887
888 return PERSONALITY_INVALID;
889 }
890
891 const char* personality_to_string(unsigned long p) {
892 int architecture = _ARCHITECTURE_INVALID;
893
894 if (p == PER_LINUX)
895 architecture = native_architecture();
896 #ifdef SECONDARY_ARCHITECTURE
897 else if (p == PER_LINUX32)
898 architecture = SECONDARY_ARCHITECTURE;
899 #endif
900
901 if (architecture < 0)
902 return NULL;
903
904 return architecture_to_string(architecture);
905 }
906
907 void valgrind_summary_hack(void) {
908 #ifdef HAVE_VALGRIND_VALGRIND_H
909 if (getpid_cached() == 1 && RUNNING_ON_VALGRIND) {
910 pid_t pid;
911 pid = raw_clone(SIGCHLD);
912 if (pid < 0)
913 log_emergency_errno(errno, "Failed to fork off valgrind helper: %m");
914 else if (pid == 0)
915 exit(EXIT_SUCCESS);
916 else {
917 log_info("Spawned valgrind helper as PID "PID_FMT".", pid);
918 (void) wait_for_terminate(pid, NULL);
919 }
920 }
921 #endif
922 }
923
924 int pid_compare_func(const void *a, const void *b) {
925 const pid_t *p = a, *q = b;
926
927 /* Suitable for usage in qsort() */
928
929 if (*p < *q)
930 return -1;
931 if (*p > *q)
932 return 1;
933 return 0;
934 }
935
936 int ioprio_parse_priority(const char *s, int *ret) {
937 int i, r;
938
939 assert(s);
940 assert(ret);
941
942 r = safe_atoi(s, &i);
943 if (r < 0)
944 return r;
945
946 if (!ioprio_priority_is_valid(i))
947 return -EINVAL;
948
949 *ret = i;
950 return 0;
951 }
952
953 /* The cached PID, possible values:
954 *
955 * == UNSET [0] → cache not initialized yet
956 * == BUSY [-1] → some thread is initializing it at the moment
957 * any other → the cached PID
958 */
959
960 #define CACHED_PID_UNSET ((pid_t) 0)
961 #define CACHED_PID_BUSY ((pid_t) -1)
962
963 static pid_t cached_pid = CACHED_PID_UNSET;
964
965 static void reset_cached_pid(void) {
966 /* Invoked in the child after a fork(), i.e. at the first moment the PID changed */
967 cached_pid = CACHED_PID_UNSET;
968 }
969
970 /* We use glibc __register_atfork() + __dso_handle directly here, as they are not included in the glibc
971 * headers. __register_atfork() is mostly equivalent to pthread_atfork(), but doesn't require us to link against
972 * libpthread, as it is part of glibc anyway. */
973 extern int __register_atfork(void (*prepare) (void), void (*parent) (void), void (*child) (void), void * __dso_handle);
974 extern void* __dso_handle __attribute__ ((__weak__));
975
976 pid_t getpid_cached(void) {
977 pid_t current_value;
978
979 /* getpid_cached() is much like getpid(), but caches the value in local memory, to avoid having to invoke a
980 * system call each time. This restores glibc behaviour from before 2.24, when getpid() was unconditionally
981 * cached. Starting with 2.24 getpid() started to become prohibitively expensive when used for detecting when
982 * objects were used across fork()s. With this caching the old behaviour is somewhat restored.
983 *
984 * https://bugzilla.redhat.com/show_bug.cgi?id=1443976
985 * https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=1d2bc2eae969543b89850e35e532f3144122d80a
986 */
987
988 current_value = __sync_val_compare_and_swap(&cached_pid, CACHED_PID_UNSET, CACHED_PID_BUSY);
989
990 switch (current_value) {
991
992 case CACHED_PID_UNSET: { /* Not initialized yet, then do so now */
993 pid_t new_pid;
994
995 new_pid = getpid();
996
997 if (__register_atfork(NULL, NULL, reset_cached_pid, __dso_handle) != 0) {
998 /* OOM? Let's try again later */
999 cached_pid = CACHED_PID_UNSET;
1000 return new_pid;
1001 }
1002
1003 cached_pid = new_pid;
1004 return new_pid;
1005 }
1006
1007 case CACHED_PID_BUSY: /* Somebody else is currently initializing */
1008 return getpid();
1009
1010 default: /* Properly initialized */
1011 return current_value;
1012 }
1013 }
1014
1015 static const char *const ioprio_class_table[] = {
1016 [IOPRIO_CLASS_NONE] = "none",
1017 [IOPRIO_CLASS_RT] = "realtime",
1018 [IOPRIO_CLASS_BE] = "best-effort",
1019 [IOPRIO_CLASS_IDLE] = "idle"
1020 };
1021
1022 DEFINE_STRING_TABLE_LOOKUP_WITH_FALLBACK(ioprio_class, int, INT_MAX);
1023
1024 static const char *const sigchld_code_table[] = {
1025 [CLD_EXITED] = "exited",
1026 [CLD_KILLED] = "killed",
1027 [CLD_DUMPED] = "dumped",
1028 [CLD_TRAPPED] = "trapped",
1029 [CLD_STOPPED] = "stopped",
1030 [CLD_CONTINUED] = "continued",
1031 };
1032
1033 DEFINE_STRING_TABLE_LOOKUP(sigchld_code, int);
1034
1035 static const char* const sched_policy_table[] = {
1036 [SCHED_OTHER] = "other",
1037 [SCHED_BATCH] = "batch",
1038 [SCHED_IDLE] = "idle",
1039 [SCHED_FIFO] = "fifo",
1040 [SCHED_RR] = "rr"
1041 };
1042
1043 DEFINE_STRING_TABLE_LOOKUP_WITH_FALLBACK(sched_policy, int, INT_MAX);