]> git.ipfire.org Git - thirdparty/systemd.git/blob - src/basic/process-util.c
Merge pull request #6392 from poettering/journal-cache
[thirdparty/systemd.git] / src / basic / process-util.c
1 /***
2 This file is part of systemd.
3
4 Copyright 2010 Lennart Poettering
5
6 systemd is free software; you can redistribute it and/or modify it
7 under the terms of the GNU Lesser General Public License as published by
8 the Free Software Foundation; either version 2.1 of the License, or
9 (at your option) any later version.
10
11 systemd is distributed in the hope that it will be useful, but
12 WITHOUT ANY WARRANTY; without even the implied warranty of
13 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
14 Lesser General Public License for more details.
15
16 You should have received a copy of the GNU Lesser General Public License
17 along with systemd; If not, see <http://www.gnu.org/licenses/>.
18 ***/
19
20 #include <ctype.h>
21 #include <errno.h>
22 #include <limits.h>
23 #include <linux/oom.h>
24 #include <sched.h>
25 #include <signal.h>
26 #include <stdbool.h>
27 #include <stdio.h>
28 #include <stdlib.h>
29 #include <string.h>
30 #include <sys/mman.h>
31 #include <sys/personality.h>
32 #include <sys/prctl.h>
33 #include <sys/types.h>
34 #include <sys/wait.h>
35 #include <syslog.h>
36 #include <unistd.h>
37 #ifdef HAVE_VALGRIND_VALGRIND_H
38 #include <valgrind/valgrind.h>
39 #endif
40
41 #include "alloc-util.h"
42 #include "architecture.h"
43 #include "escape.h"
44 #include "fd-util.h"
45 #include "fileio.h"
46 #include "fs-util.h"
47 #include "ioprio.h"
48 #include "log.h"
49 #include "macro.h"
50 #include "missing.h"
51 #include "process-util.h"
52 #include "raw-clone.h"
53 #include "signal-util.h"
54 #include "stat-util.h"
55 #include "string-table.h"
56 #include "string-util.h"
57 #include "user-util.h"
58 #include "util.h"
59
60 int get_process_state(pid_t pid) {
61 const char *p;
62 char state;
63 int r;
64 _cleanup_free_ char *line = NULL;
65
66 assert(pid >= 0);
67
68 p = procfs_file_alloca(pid, "stat");
69
70 r = read_one_line_file(p, &line);
71 if (r == -ENOENT)
72 return -ESRCH;
73 if (r < 0)
74 return r;
75
76 p = strrchr(line, ')');
77 if (!p)
78 return -EIO;
79
80 p++;
81
82 if (sscanf(p, " %c", &state) != 1)
83 return -EIO;
84
85 return (unsigned char) state;
86 }
87
88 int get_process_comm(pid_t pid, char **name) {
89 const char *p;
90 int r;
91
92 assert(name);
93 assert(pid >= 0);
94
95 p = procfs_file_alloca(pid, "comm");
96
97 r = read_one_line_file(p, name);
98 if (r == -ENOENT)
99 return -ESRCH;
100
101 return r;
102 }
103
104 int get_process_cmdline(pid_t pid, size_t max_length, bool comm_fallback, char **line) {
105 _cleanup_fclose_ FILE *f = NULL;
106 bool space = false;
107 char *k, *ans = NULL;
108 const char *p;
109 int c;
110
111 assert(line);
112 assert(pid >= 0);
113
114 /* Retrieves a process' command line. Replaces unprintable characters while doing so by whitespace (coalescing
115 * multiple sequential ones into one). If max_length is != 0 will return a string of the specified size at most
116 * (the trailing NUL byte does count towards the length here!), abbreviated with a "..." ellipsis. If
117 * comm_fallback is true and the process has no command line set (the case for kernel threads), or has a
118 * command line that resolves to the empty string will return the "comm" name of the process instead.
119 *
120 * Returns -ESRCH if the process doesn't exist, and -ENOENT if the process has no command line (and
121 * comm_fallback is false). Returns 0 and sets *line otherwise. */
122
123 p = procfs_file_alloca(pid, "cmdline");
124
125 f = fopen(p, "re");
126 if (!f) {
127 if (errno == ENOENT)
128 return -ESRCH;
129 return -errno;
130 }
131
132 if (max_length == 1) {
133
134 /* If there's only room for one byte, return the empty string */
135 ans = new0(char, 1);
136 if (!ans)
137 return -ENOMEM;
138
139 *line = ans;
140 return 0;
141
142 } else if (max_length == 0) {
143 size_t len = 0, allocated = 0;
144
145 while ((c = getc(f)) != EOF) {
146
147 if (!GREEDY_REALLOC(ans, allocated, len+3)) {
148 free(ans);
149 return -ENOMEM;
150 }
151
152 if (isprint(c)) {
153 if (space) {
154 ans[len++] = ' ';
155 space = false;
156 }
157
158 ans[len++] = c;
159 } else if (len > 0)
160 space = true;
161 }
162
163 if (len > 0)
164 ans[len] = '\0';
165 else
166 ans = mfree(ans);
167
168 } else {
169 bool dotdotdot = false;
170 size_t left;
171
172 ans = new(char, max_length);
173 if (!ans)
174 return -ENOMEM;
175
176 k = ans;
177 left = max_length;
178 while ((c = getc(f)) != EOF) {
179
180 if (isprint(c)) {
181
182 if (space) {
183 if (left <= 2) {
184 dotdotdot = true;
185 break;
186 }
187
188 *(k++) = ' ';
189 left--;
190 space = false;
191 }
192
193 if (left <= 1) {
194 dotdotdot = true;
195 break;
196 }
197
198 *(k++) = (char) c;
199 left--;
200 } else if (k > ans)
201 space = true;
202 }
203
204 if (dotdotdot) {
205 if (max_length <= 4) {
206 k = ans;
207 left = max_length;
208 } else {
209 k = ans + max_length - 4;
210 left = 4;
211
212 /* Eat up final spaces */
213 while (k > ans && isspace(k[-1])) {
214 k--;
215 left++;
216 }
217 }
218
219 strncpy(k, "...", left-1);
220 k[left-1] = 0;
221 } else
222 *k = 0;
223 }
224
225 /* Kernel threads have no argv[] */
226 if (isempty(ans)) {
227 _cleanup_free_ char *t = NULL;
228 int h;
229
230 free(ans);
231
232 if (!comm_fallback)
233 return -ENOENT;
234
235 h = get_process_comm(pid, &t);
236 if (h < 0)
237 return h;
238
239 if (max_length == 0)
240 ans = strjoin("[", t, "]");
241 else {
242 size_t l;
243
244 l = strlen(t);
245
246 if (l + 3 <= max_length)
247 ans = strjoin("[", t, "]");
248 else if (max_length <= 6) {
249
250 ans = new(char, max_length);
251 if (!ans)
252 return -ENOMEM;
253
254 memcpy(ans, "[...]", max_length-1);
255 ans[max_length-1] = 0;
256 } else {
257 char *e;
258
259 t[max_length - 6] = 0;
260
261 /* Chop off final spaces */
262 e = strchr(t, 0);
263 while (e > t && isspace(e[-1]))
264 e--;
265 *e = 0;
266
267 ans = strjoin("[", t, "...]");
268 }
269 }
270 if (!ans)
271 return -ENOMEM;
272 }
273
274 *line = ans;
275 return 0;
276 }
277
278 int rename_process(const char name[]) {
279 static size_t mm_size = 0;
280 static char *mm = NULL;
281 bool truncated = false;
282 size_t l;
283
284 /* This is a like a poor man's setproctitle(). It changes the comm field, argv[0], and also the glibc's
285 * internally used name of the process. For the first one a limit of 16 chars applies; to the second one in
286 * many cases one of 10 (i.e. length of "/sbin/init") — however if we have CAP_SYS_RESOURCES it is unbounded;
287 * to the third one 7 (i.e. the length of "systemd". If you pass a longer string it will likely be
288 * truncated.
289 *
290 * Returns 0 if a name was set but truncated, > 0 if it was set but not truncated. */
291
292 if (isempty(name))
293 return -EINVAL; /* let's not confuse users unnecessarily with an empty name */
294
295 l = strlen(name);
296
297 /* First step, change the comm field. */
298 (void) prctl(PR_SET_NAME, name);
299 if (l > 15) /* Linux process names can be 15 chars at max */
300 truncated = true;
301
302 /* Second step, change glibc's ID of the process name. */
303 if (program_invocation_name) {
304 size_t k;
305
306 k = strlen(program_invocation_name);
307 strncpy(program_invocation_name, name, k);
308 if (l > k)
309 truncated = true;
310 }
311
312 /* Third step, completely replace the argv[] array the kernel maintains for us. This requires privileges, but
313 * has the advantage that the argv[] array is exactly what we want it to be, and not filled up with zeros at
314 * the end. This is the best option for changing /proc/self/cmdline. */
315 if (mm_size < l+1) {
316 size_t nn_size;
317 char *nn;
318
319 /* Let's not bother with this if we don't have euid == 0. Strictly speaking if people do weird stuff
320 * with capabilities this could work even for euid != 0, but our own code generally doesn't do that,
321 * hence let's use this as quick bypass check, to avoid calling mmap() if PR_SET_MM_ARG_START fails
322 * with EPERM later on anyway. After all geteuid() is dead cheap to call, but mmap() is not. */
323 if (geteuid() != 0) {
324 log_debug("Skipping PR_SET_MM_ARG_START, as we don't have privileges.");
325 goto use_saved_argv;
326 }
327
328 nn_size = PAGE_ALIGN(l+1);
329 nn = mmap(NULL, nn_size, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0);
330 if (nn == MAP_FAILED) {
331 log_debug_errno(errno, "mmap() failed: %m");
332 goto use_saved_argv;
333 }
334
335 strncpy(nn, name, nn_size);
336
337 /* Now, let's tell the kernel about this new memory */
338 if (prctl(PR_SET_MM, PR_SET_MM_ARG_START, (unsigned long) nn, 0, 0) < 0) {
339 log_debug_errno(errno, "PR_SET_MM_ARG_START failed, proceeding without: %m");
340 (void) munmap(nn, nn_size);
341 goto use_saved_argv;
342 }
343
344 /* And update the end pointer to the new end, too. If this fails, we don't really know what to do, it's
345 * pretty unlikely that we can rollback, hence we'll just accept the failure, and continue. */
346 if (prctl(PR_SET_MM, PR_SET_MM_ARG_END, (unsigned long) nn + l + 1, 0, 0) < 0)
347 log_debug_errno(errno, "PR_SET_MM_ARG_END failed, proceeding without: %m");
348
349 if (mm)
350 (void) munmap(mm, mm_size);
351
352 mm = nn;
353 mm_size = nn_size;
354 } else
355 strncpy(mm, name, mm_size);
356
357 use_saved_argv:
358 /* Fourth step: in all cases we'll also update the original argv[], so that our own code gets it right too if
359 * it still looks here */
360
361 if (saved_argc > 0) {
362 int i;
363
364 if (saved_argv[0]) {
365 size_t k;
366
367 k = strlen(saved_argv[0]);
368 strncpy(saved_argv[0], name, k);
369 if (l > k)
370 truncated = true;
371 }
372
373 for (i = 1; i < saved_argc; i++) {
374 if (!saved_argv[i])
375 break;
376
377 memzero(saved_argv[i], strlen(saved_argv[i]));
378 }
379 }
380
381 return !truncated;
382 }
383
384 int is_kernel_thread(pid_t pid) {
385 const char *p;
386 size_t count;
387 char c;
388 bool eof;
389 FILE *f;
390
391 if (pid == 0 || pid == 1 || pid == getpid_cached()) /* pid 1, and we ourselves certainly aren't a kernel thread */
392 return 0;
393
394 assert(pid > 1);
395
396 p = procfs_file_alloca(pid, "cmdline");
397 f = fopen(p, "re");
398 if (!f) {
399 if (errno == ENOENT)
400 return -ESRCH;
401 return -errno;
402 }
403
404 count = fread(&c, 1, 1, f);
405 eof = feof(f);
406 fclose(f);
407
408 /* Kernel threads have an empty cmdline */
409
410 if (count <= 0)
411 return eof ? 1 : -errno;
412
413 return 0;
414 }
415
416 int get_process_capeff(pid_t pid, char **capeff) {
417 const char *p;
418 int r;
419
420 assert(capeff);
421 assert(pid >= 0);
422
423 p = procfs_file_alloca(pid, "status");
424
425 r = get_proc_field(p, "CapEff", WHITESPACE, capeff);
426 if (r == -ENOENT)
427 return -ESRCH;
428
429 return r;
430 }
431
432 static int get_process_link_contents(const char *proc_file, char **name) {
433 int r;
434
435 assert(proc_file);
436 assert(name);
437
438 r = readlink_malloc(proc_file, name);
439 if (r == -ENOENT)
440 return -ESRCH;
441 if (r < 0)
442 return r;
443
444 return 0;
445 }
446
447 int get_process_exe(pid_t pid, char **name) {
448 const char *p;
449 char *d;
450 int r;
451
452 assert(pid >= 0);
453
454 p = procfs_file_alloca(pid, "exe");
455 r = get_process_link_contents(p, name);
456 if (r < 0)
457 return r;
458
459 d = endswith(*name, " (deleted)");
460 if (d)
461 *d = '\0';
462
463 return 0;
464 }
465
466 static int get_process_id(pid_t pid, const char *field, uid_t *uid) {
467 _cleanup_fclose_ FILE *f = NULL;
468 char line[LINE_MAX];
469 const char *p;
470
471 assert(field);
472 assert(uid);
473
474 if (pid < 0)
475 return -EINVAL;
476
477 p = procfs_file_alloca(pid, "status");
478 f = fopen(p, "re");
479 if (!f) {
480 if (errno == ENOENT)
481 return -ESRCH;
482 return -errno;
483 }
484
485 FOREACH_LINE(line, f, return -errno) {
486 char *l;
487
488 l = strstrip(line);
489
490 if (startswith(l, field)) {
491 l += strlen(field);
492 l += strspn(l, WHITESPACE);
493
494 l[strcspn(l, WHITESPACE)] = 0;
495
496 return parse_uid(l, uid);
497 }
498 }
499
500 return -EIO;
501 }
502
503 int get_process_uid(pid_t pid, uid_t *uid) {
504
505 if (pid == 0 || pid == getpid_cached()) {
506 *uid = getuid();
507 return 0;
508 }
509
510 return get_process_id(pid, "Uid:", uid);
511 }
512
513 int get_process_gid(pid_t pid, gid_t *gid) {
514
515 if (pid == 0 || pid == getpid_cached()) {
516 *gid = getgid();
517 return 0;
518 }
519
520 assert_cc(sizeof(uid_t) == sizeof(gid_t));
521 return get_process_id(pid, "Gid:", gid);
522 }
523
524 int get_process_cwd(pid_t pid, char **cwd) {
525 const char *p;
526
527 assert(pid >= 0);
528
529 p = procfs_file_alloca(pid, "cwd");
530
531 return get_process_link_contents(p, cwd);
532 }
533
534 int get_process_root(pid_t pid, char **root) {
535 const char *p;
536
537 assert(pid >= 0);
538
539 p = procfs_file_alloca(pid, "root");
540
541 return get_process_link_contents(p, root);
542 }
543
544 int get_process_environ(pid_t pid, char **env) {
545 _cleanup_fclose_ FILE *f = NULL;
546 _cleanup_free_ char *outcome = NULL;
547 int c;
548 const char *p;
549 size_t allocated = 0, sz = 0;
550
551 assert(pid >= 0);
552 assert(env);
553
554 p = procfs_file_alloca(pid, "environ");
555
556 f = fopen(p, "re");
557 if (!f) {
558 if (errno == ENOENT)
559 return -ESRCH;
560 return -errno;
561 }
562
563 while ((c = fgetc(f)) != EOF) {
564 if (!GREEDY_REALLOC(outcome, allocated, sz + 5))
565 return -ENOMEM;
566
567 if (c == '\0')
568 outcome[sz++] = '\n';
569 else
570 sz += cescape_char(c, outcome + sz);
571 }
572
573 if (!outcome) {
574 outcome = strdup("");
575 if (!outcome)
576 return -ENOMEM;
577 } else
578 outcome[sz] = '\0';
579
580 *env = outcome;
581 outcome = NULL;
582
583 return 0;
584 }
585
586 int get_process_ppid(pid_t pid, pid_t *_ppid) {
587 int r;
588 _cleanup_free_ char *line = NULL;
589 long unsigned ppid;
590 const char *p;
591
592 assert(pid >= 0);
593 assert(_ppid);
594
595 if (pid == 0 || pid == getpid_cached()) {
596 *_ppid = getppid();
597 return 0;
598 }
599
600 p = procfs_file_alloca(pid, "stat");
601 r = read_one_line_file(p, &line);
602 if (r == -ENOENT)
603 return -ESRCH;
604 if (r < 0)
605 return r;
606
607 /* Let's skip the pid and comm fields. The latter is enclosed
608 * in () but does not escape any () in its value, so let's
609 * skip over it manually */
610
611 p = strrchr(line, ')');
612 if (!p)
613 return -EIO;
614
615 p++;
616
617 if (sscanf(p, " "
618 "%*c " /* state */
619 "%lu ", /* ppid */
620 &ppid) != 1)
621 return -EIO;
622
623 if ((long unsigned) (pid_t) ppid != ppid)
624 return -ERANGE;
625
626 *_ppid = (pid_t) ppid;
627
628 return 0;
629 }
630
631 int wait_for_terminate(pid_t pid, siginfo_t *status) {
632 siginfo_t dummy;
633
634 assert(pid >= 1);
635
636 if (!status)
637 status = &dummy;
638
639 for (;;) {
640 zero(*status);
641
642 if (waitid(P_PID, pid, status, WEXITED) < 0) {
643
644 if (errno == EINTR)
645 continue;
646
647 return negative_errno();
648 }
649
650 return 0;
651 }
652 }
653
654 /*
655 * Return values:
656 * < 0 : wait_for_terminate() failed to get the state of the
657 * process, the process was terminated by a signal, or
658 * failed for an unknown reason.
659 * >=0 : The process terminated normally, and its exit code is
660 * returned.
661 *
662 * That is, success is indicated by a return value of zero, and an
663 * error is indicated by a non-zero value.
664 *
665 * A warning is emitted if the process terminates abnormally,
666 * and also if it returns non-zero unless check_exit_code is true.
667 */
668 int wait_for_terminate_and_warn(const char *name, pid_t pid, bool check_exit_code) {
669 int r;
670 siginfo_t status;
671
672 assert(name);
673 assert(pid > 1);
674
675 r = wait_for_terminate(pid, &status);
676 if (r < 0)
677 return log_warning_errno(r, "Failed to wait for %s: %m", name);
678
679 if (status.si_code == CLD_EXITED) {
680 if (status.si_status != 0)
681 log_full(check_exit_code ? LOG_WARNING : LOG_DEBUG,
682 "%s failed with error code %i.", name, status.si_status);
683 else
684 log_debug("%s succeeded.", name);
685
686 return status.si_status;
687 } else if (status.si_code == CLD_KILLED ||
688 status.si_code == CLD_DUMPED) {
689
690 log_warning("%s terminated by signal %s.", name, signal_to_string(status.si_status));
691 return -EPROTO;
692 }
693
694 log_warning("%s failed due to unknown reason.", name);
695 return -EPROTO;
696 }
697
698 void sigkill_wait(pid_t pid) {
699 assert(pid > 1);
700
701 if (kill(pid, SIGKILL) > 0)
702 (void) wait_for_terminate(pid, NULL);
703 }
704
705 void sigkill_waitp(pid_t *pid) {
706 if (!pid)
707 return;
708 if (*pid <= 1)
709 return;
710
711 sigkill_wait(*pid);
712 }
713
714 int kill_and_sigcont(pid_t pid, int sig) {
715 int r;
716
717 r = kill(pid, sig) < 0 ? -errno : 0;
718
719 /* If this worked, also send SIGCONT, unless we already just sent a SIGCONT, or SIGKILL was sent which isn't
720 * affected by a process being suspended anyway. */
721 if (r >= 0 && !IN_SET(sig, SIGCONT, SIGKILL))
722 (void) kill(pid, SIGCONT);
723
724 return r;
725 }
726
727 int getenv_for_pid(pid_t pid, const char *field, char **_value) {
728 _cleanup_fclose_ FILE *f = NULL;
729 char *value = NULL;
730 int r;
731 bool done = false;
732 size_t l;
733 const char *path;
734
735 assert(pid >= 0);
736 assert(field);
737 assert(_value);
738
739 path = procfs_file_alloca(pid, "environ");
740
741 f = fopen(path, "re");
742 if (!f) {
743 if (errno == ENOENT)
744 return -ESRCH;
745 return -errno;
746 }
747
748 l = strlen(field);
749 r = 0;
750
751 do {
752 char line[LINE_MAX];
753 unsigned i;
754
755 for (i = 0; i < sizeof(line)-1; i++) {
756 int c;
757
758 c = getc(f);
759 if (_unlikely_(c == EOF)) {
760 done = true;
761 break;
762 } else if (c == 0)
763 break;
764
765 line[i] = c;
766 }
767 line[i] = 0;
768
769 if (strneq(line, field, l) && line[l] == '=') {
770 value = strdup(line + l + 1);
771 if (!value)
772 return -ENOMEM;
773
774 r = 1;
775 break;
776 }
777
778 } while (!done);
779
780 *_value = value;
781 return r;
782 }
783
784 bool pid_is_unwaited(pid_t pid) {
785 /* Checks whether a PID is still valid at all, including a zombie */
786
787 if (pid < 0)
788 return false;
789
790 if (pid <= 1) /* If we or PID 1 would be dead and have been waited for, this code would not be running */
791 return true;
792
793 if (pid == getpid_cached())
794 return true;
795
796 if (kill(pid, 0) >= 0)
797 return true;
798
799 return errno != ESRCH;
800 }
801
802 bool pid_is_alive(pid_t pid) {
803 int r;
804
805 /* Checks whether a PID is still valid and not a zombie */
806
807 if (pid < 0)
808 return false;
809
810 if (pid <= 1) /* If we or PID 1 would be a zombie, this code would not be running */
811 return true;
812
813 if (pid == getpid_cached())
814 return true;
815
816 r = get_process_state(pid);
817 if (r == -ESRCH || r == 'Z')
818 return false;
819
820 return true;
821 }
822
823 int pid_from_same_root_fs(pid_t pid) {
824 const char *root;
825
826 if (pid < 0)
827 return false;
828
829 if (pid == 0 || pid == getpid_cached())
830 return true;
831
832 root = procfs_file_alloca(pid, "root");
833
834 return files_same(root, "/proc/1/root", 0);
835 }
836
837 bool is_main_thread(void) {
838 static thread_local int cached = 0;
839
840 if (_unlikely_(cached == 0))
841 cached = getpid_cached() == gettid() ? 1 : -1;
842
843 return cached > 0;
844 }
845
846 noreturn void freeze(void) {
847
848 log_close();
849
850 /* Make sure nobody waits for us on a socket anymore */
851 close_all_fds(NULL, 0);
852
853 sync();
854
855 for (;;)
856 pause();
857 }
858
859 bool oom_score_adjust_is_valid(int oa) {
860 return oa >= OOM_SCORE_ADJ_MIN && oa <= OOM_SCORE_ADJ_MAX;
861 }
862
863 unsigned long personality_from_string(const char *p) {
864 int architecture;
865
866 if (!p)
867 return PERSONALITY_INVALID;
868
869 /* Parse a personality specifier. We use our own identifiers that indicate specific ABIs, rather than just
870 * hints regarding the register size, since we want to keep things open for multiple locally supported ABIs for
871 * the same register size. */
872
873 architecture = architecture_from_string(p);
874 if (architecture < 0)
875 return PERSONALITY_INVALID;
876
877 if (architecture == native_architecture())
878 return PER_LINUX;
879 #ifdef SECONDARY_ARCHITECTURE
880 if (architecture == SECONDARY_ARCHITECTURE)
881 return PER_LINUX32;
882 #endif
883
884 return PERSONALITY_INVALID;
885 }
886
887 const char* personality_to_string(unsigned long p) {
888 int architecture = _ARCHITECTURE_INVALID;
889
890 if (p == PER_LINUX)
891 architecture = native_architecture();
892 #ifdef SECONDARY_ARCHITECTURE
893 else if (p == PER_LINUX32)
894 architecture = SECONDARY_ARCHITECTURE;
895 #endif
896
897 if (architecture < 0)
898 return NULL;
899
900 return architecture_to_string(architecture);
901 }
902
903 void valgrind_summary_hack(void) {
904 #ifdef HAVE_VALGRIND_VALGRIND_H
905 if (getpid_cached() == 1 && RUNNING_ON_VALGRIND) {
906 pid_t pid;
907 pid = raw_clone(SIGCHLD);
908 if (pid < 0)
909 log_emergency_errno(errno, "Failed to fork off valgrind helper: %m");
910 else if (pid == 0)
911 exit(EXIT_SUCCESS);
912 else {
913 log_info("Spawned valgrind helper as PID "PID_FMT".", pid);
914 (void) wait_for_terminate(pid, NULL);
915 }
916 }
917 #endif
918 }
919
920 int pid_compare_func(const void *a, const void *b) {
921 const pid_t *p = a, *q = b;
922
923 /* Suitable for usage in qsort() */
924
925 if (*p < *q)
926 return -1;
927 if (*p > *q)
928 return 1;
929 return 0;
930 }
931
932 int ioprio_parse_priority(const char *s, int *ret) {
933 int i, r;
934
935 assert(s);
936 assert(ret);
937
938 r = safe_atoi(s, &i);
939 if (r < 0)
940 return r;
941
942 if (!ioprio_priority_is_valid(i))
943 return -EINVAL;
944
945 *ret = i;
946 return 0;
947 }
948
949 /* The cached PID, possible values:
950 *
951 * == UNSET [0] → cache not initialized yet
952 * == BUSY [-1] → some thread is initializing it at the moment
953 * any other → the cached PID
954 */
955
956 #define CACHED_PID_UNSET ((pid_t) 0)
957 #define CACHED_PID_BUSY ((pid_t) -1)
958
959 static pid_t cached_pid = CACHED_PID_UNSET;
960
961 static void reset_cached_pid(void) {
962 /* Invoked in the child after a fork(), i.e. at the first moment the PID changed */
963 cached_pid = CACHED_PID_UNSET;
964 }
965
966 /* We use glibc __register_atfork() + __dso_handle directly here, as they are not included in the glibc
967 * headers. __register_atfork() is mostly equivalent to pthread_atfork(), but doesn't require us to link against
968 * libpthread, as it is part of glibc anyway. */
969 extern int __register_atfork(void (*prepare) (void), void (*parent) (void), void (*child) (void), void * __dso_handle);
970 extern void* __dso_handle __attribute__ ((__weak__));
971
972 pid_t getpid_cached(void) {
973 pid_t current_value;
974
975 /* getpid_cached() is much like getpid(), but caches the value in local memory, to avoid having to invoke a
976 * system call each time. This restores glibc behaviour from before 2.24, when getpid() was unconditionally
977 * cached. Starting with 2.24 getpid() started to become prohibitively expensive when used for detecting when
978 * objects were used across fork()s. With this caching the old behaviour is somewhat restored.
979 *
980 * https://bugzilla.redhat.com/show_bug.cgi?id=1443976
981 * https://sourceware.org/git/gitweb.cgi?p=glibc.git;h=1d2bc2eae969543b89850e35e532f3144122d80a
982 */
983
984 current_value = __sync_val_compare_and_swap(&cached_pid, CACHED_PID_UNSET, CACHED_PID_BUSY);
985
986 switch (current_value) {
987
988 case CACHED_PID_UNSET: { /* Not initialized yet, then do so now */
989 pid_t new_pid;
990
991 new_pid = getpid();
992
993 if (__register_atfork(NULL, NULL, reset_cached_pid, __dso_handle) != 0) {
994 /* OOM? Let's try again later */
995 cached_pid = CACHED_PID_UNSET;
996 return new_pid;
997 }
998
999 cached_pid = new_pid;
1000 return new_pid;
1001 }
1002
1003 case CACHED_PID_BUSY: /* Somebody else is currently initializing */
1004 return getpid();
1005
1006 default: /* Properly initialized */
1007 return current_value;
1008 }
1009 }
1010
1011 static const char *const ioprio_class_table[] = {
1012 [IOPRIO_CLASS_NONE] = "none",
1013 [IOPRIO_CLASS_RT] = "realtime",
1014 [IOPRIO_CLASS_BE] = "best-effort",
1015 [IOPRIO_CLASS_IDLE] = "idle"
1016 };
1017
1018 DEFINE_STRING_TABLE_LOOKUP_WITH_FALLBACK(ioprio_class, int, INT_MAX);
1019
1020 static const char *const sigchld_code_table[] = {
1021 [CLD_EXITED] = "exited",
1022 [CLD_KILLED] = "killed",
1023 [CLD_DUMPED] = "dumped",
1024 [CLD_TRAPPED] = "trapped",
1025 [CLD_STOPPED] = "stopped",
1026 [CLD_CONTINUED] = "continued",
1027 };
1028
1029 DEFINE_STRING_TABLE_LOOKUP(sigchld_code, int);
1030
1031 static const char* const sched_policy_table[] = {
1032 [SCHED_OTHER] = "other",
1033 [SCHED_BATCH] = "batch",
1034 [SCHED_IDLE] = "idle",
1035 [SCHED_FIFO] = "fifo",
1036 [SCHED_RR] = "rr"
1037 };
1038
1039 DEFINE_STRING_TABLE_LOOKUP_WITH_FALLBACK(sched_policy, int, INT_MAX);