1 .\" Copyright (C) 2012, Cyrill Gorcunov <gorcunov@openvz.org>
2 .\" and Copyright (C) 2012, 2016, Michael Kerrisk <mtk.manpages@gmail.com>
4 .\" %%%LICENSE_START(VERBATIM)
5 .\" Permission is granted to make and distribute verbatim copies of this
6 .\" manual provided the copyright notice and this permission notice are
7 .\" preserved on all copies.
9 .\" Permission is granted to copy and distribute modified versions of
10 .\" this manual under the conditions for verbatim copying, provided that
11 .\" the entire resulting derived work is distributed under the terms of
12 .\" a permission notice identical to this one.
14 .\" Since the Linux kernel and libraries are constantly changing, this
15 .\" manual page may be incorrect or out-of-date. The author(s) assume
16 .\" no responsibility for errors or omissions, or for damages resulting
17 .\" from the use of the information contained herein. The author(s) may
18 .\" not have taken the same level of care in the production of this
19 .\" manual, which is licensed free of charge, as they might when working
22 .\" Formatted or processed versions of this manual, if unaccompanied by
23 .\" the source, must acknowledge the copyright and authors of this work.
26 .\" Kernel commit d97b46a64674a267bc41c9e16132ee2a98c3347d
28 .TH KCMP 2 2021-03-22 "Linux" "Linux Programmer's Manual"
30 kcmp \- compare two processes to determine if they share a kernel resource
33 .BR "#include <linux/kcmp.h>" " /* Definition of " KCMP_* " constants */"
34 .BR "#include <sys/syscall.h>" " /* Definition of " SYS_* " constants */"
35 .B #include <unistd.h>
37 .BI "int syscall(SYS_kcmp, pid_t " pid1 ", pid_t " pid2 ", int " type ,
38 .BI " unsigned long " idx1 ", unsigned long " idx2 );
42 glibc provides no wrapper for
44 necessitating the use of
49 system call can be used to check whether the two processes identified by
53 share a kernel resource such as virtual memory, file descriptors,
58 is governed by ptrace access mode
59 .B PTRACE_MODE_READ_REALCREDS
69 argument specifies which resource is to be compared in the two processes.
70 It has one of the following values:
73 Check whether a file descriptor
77 refers to the same open file description (see
83 The existence of two file descriptors that refer to the same
84 open file description can occur as a result of
88 or passing file descriptors via a domain socket (see
92 Check whether the processes share the same set of open file descriptors.
98 See the discussion of the
104 Check whether the processes share the same filesystem information
105 (i.e., file mode creation mask, working directory, and filesystem root).
111 See the discussion of the
117 Check whether the processes share I/O context.
123 See the discussion of the
129 Check whether the processes share the same table of signal dispositions.
135 See the discussion of the
141 Check whether the processes share the same
142 list of System\ V semaphore undo operations.
148 See the discussion of the
154 Check whether the processes share the same address space.
160 See the discussion of the
165 .BR KCMP_EPOLL_TFD " (since Linux 4.13)"
166 .\" commit 0791e3644e5ef21646fe565b9061788d05ec71d4
167 Check whether the file descriptor
173 instance described by
179 is a pointer to a structure where the target file is described.
180 This structure has the form:
184 struct kcmp_epoll_slot {
192 Within this structure,
194 is an epoll file descriptor returned from
195 .BR epoll_create (2),
197 is a target file descriptor number, and
199 is a target file offset counted from zero.
200 Several different targets may be registered with
201 the same file descriptor number and setting a specific
202 offset helps to investigate each of them.
206 is not protected against false positives which may occur if
207 the processes are currently running.
208 One should stop the processes by sending
212 prior to inspection with this system call to obtain meaningful results.
214 The return value of a successful call to
216 is simply the result of arithmetic comparison
217 of kernel pointers (when the kernel compares resources, it uses their
220 The easiest way to explain is to consider an example.
225 are the addresses of appropriate resources, then the return value
226 is one of the following:
232 in other words, the two processes share the resource.
245 but ordering information is unavailable.
248 On error, \-1 is returned, and
250 is set to indicate the error.
253 was designed to return values suitable for sorting.
254 This is particularly handy if one needs to compare
255 a large number of file descriptors.
266 is not an open file descriptor.
269 The epoll slot addressed by
271 is outside of the user's address space.
278 The target file is not present in
283 Insufficient permission to inspect process resources.
286 capability is required to inspect processes that you do not own.
287 Other ptrace limitations may also apply, such as
288 .BR CONFIG_SECURITY_YAMA ,
290 .I /proc/sys/kernel/yama/ptrace_scope
306 system call first appeared in Linux 3.5.
309 is Linux-specific and should not be used in programs intended to be portable.
312 this system call is available only if the kernel is configured with
313 .BR CONFIG_CHECKPOINT_RESTORE ,
314 since the original purpose of the system call was for the
315 checkpoint/restore in user space (CRIU) feature.
316 (The alternative to this system call would have been to expose suitable
317 process information via the
319 filesystem; this was deemed to be unsuitable for security reasons.)
320 Since Linux 5.12, this system call is made available unconditionally.
324 for some background information on the shared resources
325 referred to on this page.
327 The program below uses
329 to test whether pairs of file descriptors refer to
330 the same open file description.
331 The program tests different cases for the file descriptor pairs,
332 as described in the program output.
333 An example run of the program is as follows:
339 Parent opened file on FD 3
341 PID of child of fork() is 1145
342 Compare duplicate FDs from different processes:
343 kcmp(1145, 1144, KCMP_FILE, 3, 3) ==> same
344 Child opened file on FD 4
345 Compare FDs from distinct open()s in same process:
346 kcmp(1145, 1145, KCMP_FILE, 3, 4) ==> different
347 Child duplicated FD 3 to create FD 5
348 Compare duplicated FDs in same process:
349 kcmp(1145, 1145, KCMP_FILE, 3, 5) ==> same
356 #include <sys/syscall.h>
357 #include <sys/wait.h>
358 #include <sys/stat.h>
364 #include <linux/kcmp.h>
366 #define errExit(msg) do { perror(msg); exit(EXIT_FAILURE); \e
370 kcmp(pid_t pid1, pid_t pid2, int type,
371 unsigned long idx1, unsigned long idx2)
373 return syscall(SYS_kcmp, pid1, pid2, type, idx1, idx2);
377 test_kcmp(char *msg, pid_t pid1, pid_t pid2, int fd_a, int fd_b)
379 printf("\et%s\en", msg);
380 printf("\et\etkcmp(%jd, %jd, KCMP_FILE, %d, %d) ==> %s\en",
381 (intmax_t) pid1, (intmax_t) pid2, fd_a, fd_b,
382 (kcmp(pid1, pid2, KCMP_FILE, fd_a, fd_b) == 0) ?
383 "same" : "different");
387 main(int argc, char *argv[])
390 char pathname[] = "/tmp/kcmp.test";
392 fd1 = open(pathname, O_CREAT | O_RDWR, S_IRUSR | S_IWUSR);
396 printf("Parent PID is %jd\en", (intmax_t) getpid());
397 printf("Parent opened file on FD %d\en\en", fd1);
404 printf("PID of child of fork() is %jd\en", (intmax_t) getpid());
406 test_kcmp("Compare duplicate FDs from different processes:",
407 getpid(), getppid(), fd1, fd1);
409 fd2 = open(pathname, O_CREAT | O_RDWR, S_IRUSR | S_IWUSR);
412 printf("Child opened file on FD %d\en", fd2);
414 test_kcmp("Compare FDs from distinct open()s in same process:",
415 getpid(), getpid(), fd1, fd2);
420 printf("Child duplicated FD %d to create FD %d\en", fd1, fd3);
422 test_kcmp("Compare duplicated FDs in same process:",
423 getpid(), getpid(), fd1, fd3);