setproctitle (3) - Linux Manuals
setproctitle: set process title
setproctitle - set process title
SYNOPSISIn sys/types.h In bsd/unistd.h Ft void Fn setproctitle_init int argc char *argv char *envp Ft void Fn setproctitle const char *fmt ...
DESCRIPTIONThe Fn setproctitle library routine sets the process title that appears on the ps(1) command.
The Fn setproctitle_init library routine only needs to be called (before any call to Fn setproctitle and with Fn main arguments), if the automatic constructor support has not been linked in through the libbsd-ctor pkg-config file.
The title is set from the executable's name, followed by the result of a printf(3) style expansion of the arguments as specified by the fmt argument. If the fmt argument begins with a ``-'' character, the executable's name is skipped.
If fmt is NULL, the process title is restored.
EXAMPLESTo set the title on a daemon to indicate its activity:
setproctitle("talking to %s", inet_ntoa(addr));
STANDARDSThe Fn setproctitle function is implicitly non-standard. Other methods of causing the ps(1) command line to change, including copying over the argv string are also implicitly non-portable. It is preferable to use an operating system supplied Fn setproctitle if present.
Unfortunately, it is possible that there are other calling conventions to other versions of Fn setproctitle , although none have been found by the author as yet. This is believed to be the predominant convention.
It is thought that the implementation is compatible with other systems, including Nx and Bs x .
HISTORYThe Fn setproctitle function first appeared in Fx 2.2 . Other operating systems have similar functions.
The Fn setproctitle_init function is a libbsd extension not present on the BSDs, avoid using it in portable code.
AUTHORSAn -nosplit An Peter Wemm Aq peter [at] FreeBSD.org stole the idea from the Sendmail 8.7.3 source code by An Eric Allman Aq eric [at] sendmail.org .
BUGSNever pass a string with user-supplied data as a format without using `%s' An attacker can put format specifiers in the string to mangle your stack, leading to a possible security hole. This holds true even if the string was built using a function like Fn snprintf , as the resulting string may still contain user-supplied conversion specifiers for later interpolation by Fn setproctitle .
Always use the proper secure idiom: