]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/basic/process-util.h
Move cpus_in_affinity_mask() to cpu-set-util.[ch]
[thirdparty/systemd.git] / src / basic / process-util.h
CommitLineData
53e1b683 1/* SPDX-License-Identifier: LGPL-2.1+ */
0b452006
RC
2#pragma once
3
0b452006 4#include <alloca.h>
dccca82b 5#include <errno.h>
29ea9f0f 6#include <sched.h>
71d35b6b
TA
7#include <signal.h>
8#include <stdbool.h>
11c3a366 9#include <stddef.h>
0b452006
RC
10#include <stdio.h>
11#include <string.h>
41bf0590 12#include <sys/resource.h>
7f452159 13#include <sys/types.h>
0b452006 14
0cb8e3d1 15#include "alloc-util.h"
f97b34a6 16#include "format-util.h"
7f452159 17#include "ioprio.h"
7b3e062c 18#include "macro.h"
d5641e0d 19#include "time-util.h"
0b452006
RC
20
21#define procfs_file_alloca(pid, field) \
22 ({ \
23 pid_t _pid_ = (pid); \
24 const char *_r_; \
25 if (_pid_ == 0) { \
26 _r_ = ("/proc/self/" field); \
27 } else { \
6e9417f5
LP
28 _r_ = newa(char, STRLEN("/proc/") + DECIMAL_STR_MAX(pid_t) + 1 + sizeof(field)); \
29 sprintf((char*) _r_, "/proc/"PID_FMT"/" field, _pid_); \
0b452006
RC
30 } \
31 _r_; \
32 })
33
34int get_process_state(pid_t pid);
35int get_process_comm(pid_t pid, char **name);
36int get_process_cmdline(pid_t pid, size_t max_length, bool comm_fallback, char **line);
37int get_process_exe(pid_t pid, char **name);
38int get_process_uid(pid_t pid, uid_t *uid);
39int get_process_gid(pid_t pid, gid_t *gid);
40int get_process_capeff(pid_t pid, char **capeff);
41int get_process_cwd(pid_t pid, char **cwd);
42int get_process_root(pid_t pid, char **root);
43int get_process_environ(pid_t pid, char **environ);
6bc73acb 44int get_process_ppid(pid_t pid, pid_t *ppid);
0b452006
RC
45
46int wait_for_terminate(pid_t pid, siginfo_t *status);
7d4904fe
LP
47
48typedef enum WaitFlags {
ef31828d
LP
49 WAIT_LOG_ABNORMAL = 1 << 0,
50 WAIT_LOG_NON_ZERO_EXIT_STATUS = 1 << 1,
7d4904fe
LP
51
52 /* A shortcut for requesting the most complete logging */
53 WAIT_LOG = WAIT_LOG_ABNORMAL|WAIT_LOG_NON_ZERO_EXIT_STATUS,
54} WaitFlags;
55
56int wait_for_terminate_and_check(const char *name, pid_t pid, WaitFlags flags);
d5641e0d 57int wait_for_terminate_with_timeout(pid_t pid, usec_t timeout);
0b452006 58
89c9030d
LP
59void sigkill_wait(pid_t pid);
60void sigkill_waitp(pid_t *pid);
392cf1d0 61void sigterm_wait(pid_t pid);
4d0d3d41 62
0b452006 63int kill_and_sigcont(pid_t pid, int sig);
405f8907 64
9bfaffd5 65int rename_process(const char name[]);
0b452006 66int is_kernel_thread(pid_t pid);
405f8907 67
0b452006
RC
68int getenv_for_pid(pid_t pid, const char *field, char **_value);
69
70bool pid_is_alive(pid_t pid);
71bool pid_is_unwaited(pid_t pid);
4d051546 72int pid_is_my_child(pid_t pid);
1359fffa 73int pid_from_same_root_fs(pid_t pid);
d4510856
LP
74
75bool is_main_thread(void);
ceee6d3a 76
848e863a 77_noreturn_ void freeze(void);
7b3e062c
LP
78
79bool oom_score_adjust_is_valid(int oa);
80
81#ifndef PERSONALITY_INVALID
82/* personality(7) documents that 0xffffffffUL is used for querying the
83 * current personality, hence let's use that here as error
84 * indicator. */
85#define PERSONALITY_INVALID 0xffffffffLU
86#endif
87
88unsigned long personality_from_string(const char *p);
89const char *personality_to_string(unsigned long);
90
21022b9d 91int safe_personality(unsigned long p);
e8132d63
LP
92int opinionated_personality(unsigned long *ret);
93
7b3e062c
LP
94int ioprio_class_to_string_alloc(int i, char **s);
95int ioprio_class_from_string(const char *s);
96
97const char *sigchld_code_to_string(int i) _const_;
98int sigchld_code_from_string(const char *s) _pure_;
99
100int sched_policy_to_string_alloc(int i, char **s);
101int sched_policy_from_string(const char *s);
102
bc2fcf7f
LP
103static inline pid_t PTR_TO_PID(const void *p) {
104 return (pid_t) ((uintptr_t) p);
105}
106
107static inline void* PID_TO_PTR(pid_t pid) {
108 return (void*) ((uintptr_t) pid);
109}
dcadc967
EV
110
111void valgrind_summary_hack(void);
291d565a 112
93bab288 113int pid_compare_func(const pid_t *a, const pid_t *b);
41bf0590
LP
114
115static inline bool nice_is_valid(int n) {
116 return n >= PRIO_MIN && n < PRIO_MAX;
117}
7f452159 118
29ea9f0f
YW
119static inline bool sched_policy_is_valid(int i) {
120 return IN_SET(i, SCHED_OTHER, SCHED_BATCH, SCHED_IDLE, SCHED_FIFO, SCHED_RR);
121}
122
123static inline bool sched_priority_is_valid(int i) {
124 return i >= 0 && i <= sched_get_priority_max(SCHED_RR);
125}
126
7f452159
LP
127static inline bool ioprio_class_is_valid(int i) {
128 return IN_SET(i, IOPRIO_CLASS_NONE, IOPRIO_CLASS_RT, IOPRIO_CLASS_BE, IOPRIO_CLASS_IDLE);
129}
130
131static inline bool ioprio_priority_is_valid(int i) {
132 return i >= 0 && i < IOPRIO_BE_NR;
133}
134
54191eb3
LP
135static inline bool pid_is_valid(pid_t p) {
136 return p > 0;
137}
138
7f452159 139int ioprio_parse_priority(const char *s, int *ret);
5c30a6d2
LP
140
141pid_t getpid_cached(void);
799a960d 142void reset_cached_pid(void);
fba868fa
LP
143
144int must_be_root(void);
4c253ed1
LP
145
146typedef enum ForkFlags {
909106eb
LP
147 FORK_RESET_SIGNALS = 1 << 0, /* Reset all signal handlers and signal mask */
148 FORK_CLOSE_ALL_FDS = 1 << 1, /* Close all open file descriptors in the child, except for 0,1,2 */
149 FORK_DEATHSIG = 1 << 2, /* Set PR_DEATHSIG in the child */
150 FORK_NULL_STDIO = 1 << 3, /* Connect 0,1,2 to /dev/null */
151 FORK_REOPEN_LOG = 1 << 4, /* Reopen log connection */
152 FORK_LOG = 1 << 5, /* Log above LOG_DEBUG log level about failures */
153 FORK_WAIT = 1 << 6, /* Wait until child exited */
154 FORK_NEW_MOUNTNS = 1 << 7, /* Run child in its own mount namespace */
155 FORK_MOUNTNS_SLAVE = 1 << 8, /* Make child's mount namespace MS_SLAVE */
156 FORK_RLIMIT_NOFILE_SAFE = 1 << 9, /* Set RLIMIT_NOFILE soft limit to 1K for select() compat */
4c253ed1
LP
157} ForkFlags;
158
159int safe_fork_full(const char *name, const int except_fds[], size_t n_except_fds, ForkFlags flags, pid_t *ret_pid);
160
161static inline int safe_fork(const char *name, ForkFlags flags, pid_t *ret_pid) {
162 return safe_fork_full(name, NULL, 0, flags, ret_pid);
163}
78752f2e 164
27096982
LP
165int namespace_fork(const char *outer_name, const char *inner_name, const int except_fds[], size_t n_except_fds, ForkFlags flags, int pidns_fd, int mntns_fd, int netns_fd, int userns_fd, int root_fd, pid_t *ret_pid);
166
7593c3ec 167int fork_agent(const char *name, const int except[], size_t n_except, pid_t *pid, const char *path, ...) _sentinel_;
f3a367d6 168
9f8168eb
LP
169int set_oom_score_adjust(int value);
170
f3a367d6
LP
171#if SIZEOF_PID_T == 4
172/* The highest possibly (theoretic) pid_t value on this architecture. */
173#define PID_T_MAX ((pid_t) INT32_MAX)
174/* The maximum number of concurrent processes Linux allows on this architecture, as well as the highest valid PID value
175 * the kernel will potentially assign. This reflects a value compiled into the kernel (PID_MAX_LIMIT), and sets the
176 * upper boundary on what may be written to the /proc/sys/kernel/pid_max sysctl (but do note that the sysctl is off by
177 * 1, since PID 0 can never exist and there can hence only be one process less than the limit would suggest). Since
178 * these values are documented in proc(5) we feel quite confident that they are stable enough for the near future at
179 * least to define them here too. */
180#define TASKS_MAX 4194303U
181#elif SIZEOF_PID_T == 2
182#define PID_T_MAX ((pid_t) INT16_MAX)
183#define TASKS_MAX 32767U
184#else
185#error "Unknown pid_t size"
186#endif
187
188assert_cc(TASKS_MAX <= (unsigned long) PID_T_MAX)
342f6f80
LP
189
190/* Like TAKE_PTR() but for child PIDs, resetting them to 0 */
191#define TAKE_PID(pid) \
192 ({ \
193 pid_t _pid_ = (pid); \
194 (pid) = 0; \
195 _pid_; \
196 })