procps/pgrep.c

1095 lines
27 KiB
C
Raw Normal View History

/*
2002-02-02 04:17:29 +05:30
* pgrep/pkill -- utilities to filter the process table
*
* Copyright 2000 Kjetil Torgrim Homme <kjetilho@ifi.uio.no>
* Changes by Albert Cahalan, 2002,2006.
* Changes by Roberto Polli <rpolli@babel.it>, 2012.
2002-02-02 04:17:29 +05:30
*
* This program is free software; you can redistribute it and/or
* modify it under the terms of the GNU General Public License
* as published by the Free Software Foundation; either version 2
* of the License, or (at your option) any later version.
*
* This program is distributed in the hope that it will be useful,
* but WITHOUT ANY WARRANTY; without even the implied warranty of
* MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
* GNU General Public License for more details.
*
* You should have received a copy of the GNU General Public License
* along with this program; if not, write to the Free Software
* Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
2002-02-02 04:17:29 +05:30
*/
#include <stdio.h>
#include <stdlib.h>
#include <limits.h>
2002-02-02 04:17:29 +05:30
#include <unistd.h>
#include <ctype.h>
#include <string.h>
#include <sys/types.h>
#include <sys/stat.h>
#include <fcntl.h>
2002-02-02 04:17:29 +05:30
#include <signal.h>
#include <pwd.h>
#include <grp.h>
#include <regex.h>
#include <errno.h>
#include <getopt.h>
#include <stdbool.h>
#include <time.h>
2002-02-02 04:17:29 +05:30
#if defined(ENABLE_PIDWAIT) && !defined(HAVE_PIDFD_OPEN)
2020-02-24 08:32:59 +05:30
#include <sys/epoll.h>
#include <sys/syscall.h>
#endif
/* EXIT_SUCCESS is 0 */
/* EXIT_FAILURE is 1 */
#define EXIT_USAGE 2
#define EXIT_FATAL 3
#define XALLOC_EXIT_CODE EXIT_FATAL
#include "c.h"
#include "fileutils.h"
#include "nsutils.h"
#include "nls.h"
#include "xalloc.h"
2002-02-02 04:17:29 +05:30
#include "proc/readproc.h"
#include "proc/sig.h"
#include "proc/devname.h"
#include "proc/sysinfo.h"
#define grow_size(x) do { \
if ((x) < 0 || (size_t)(x) >= INT_MAX / 5 / sizeof(struct el)) \
xerrx(EXIT_FAILURE, _("integer overflow")); \
(x) = (x) * 5 / 4 + 4; \
} while (0)
2020-02-24 08:32:59 +05:30
static enum {
PGREP = 0,
PKILL,
#ifdef ENABLE_PIDWAIT
PIDWAIT,
2020-02-24 08:32:59 +05:30
#endif
} prog_mode;
2002-02-02 04:17:29 +05:30
struct el {
2002-02-02 04:17:29 +05:30
long num;
char * str;
};
/* User supplied arguments */
static int opt_full = 0;
static int opt_long = 0;
static int opt_longlong = 0;
static int opt_oldest = 0;
static int opt_older = 0;
2002-02-02 04:17:29 +05:30
static int opt_newest = 0;
static int opt_negate = 0;
static int opt_exact = 0;
static int opt_count = 0;
2002-02-02 04:17:29 +05:30
static int opt_signal = SIGTERM;
2006-06-25 01:42:29 +05:30
static int opt_lock = 0;
2006-06-19 02:25:02 +05:30
static int opt_case = 0;
static int opt_echo = 0;
static int opt_threads = 0;
static pid_t opt_ns_pid = 0;
static bool use_sigqueue = false;
static union sigval sigval = {0};
2002-02-02 04:17:29 +05:30
2002-10-12 09:55:57 +05:30
static const char *opt_delim = "\n";
static struct el *opt_pgrp = NULL;
static struct el *opt_rgid = NULL;
static struct el *opt_pid = NULL;
static struct el *opt_ppid = NULL;
static struct el *opt_sid = NULL;
static struct el *opt_term = NULL;
static struct el *opt_euid = NULL;
static struct el *opt_ruid = NULL;
static struct el *opt_nslist = NULL;
2002-02-02 04:17:29 +05:30
static char *opt_pattern = NULL;
static char *opt_pidfile = NULL;
static char *opt_runstates = NULL;
2002-02-02 04:17:29 +05:30
/* by default, all namespaces will be checked */
static int ns_flags = 0x3f;
static int __attribute__ ((__noreturn__)) usage(int opt)
2002-02-02 04:17:29 +05:30
{
int err = (opt == '?');
2007-05-28 05:46:39 +05:30
FILE *fp = err ? stderr : stdout;
fputs(USAGE_HEADER, fp);
fprintf(fp, _(" %s [options] <pattern>\n"), program_invocation_short_name);
fputs(USAGE_OPTIONS, fp);
2020-02-24 08:32:59 +05:30
switch (prog_mode) {
case PGREP:
fputs(_(" -d, --delimiter <string> specify output delimiter\n"),fp);
fputs(_(" -l, --list-name list PID and process name\n"),fp);
2014-08-12 22:02:51 +05:30
fputs(_(" -a, --list-full list PID and full command line\n"),fp);
fputs(_(" -v, --inverse negates the matching\n"),fp);
fputs(_(" -w, --lightweight list all TID\n"), fp);
2020-02-24 08:32:59 +05:30
break;
case PKILL:
fputs(_(" -<sig>, --signal <sig> signal to send (either number or name)\n"), fp);
fputs(_(" -q, --queue <value> integer value to be sent with the signal\n"), fp);
fputs(_(" -e, --echo display what is killed\n"), fp);
2020-02-24 08:32:59 +05:30
break;
#ifdef ENABLE_PIDWAIT
case PIDWAIT:
2020-02-24 08:32:59 +05:30
fputs(_(" -e, --echo display PIDs before waiting\n"), fp);
break;
#endif
}
fputs(_(" -c, --count count of matching processes\n"), fp);
fputs(_(" -f, --full use full process name to match\n"), fp);
fputs(_(" -g, --pgroup <PGID,...> match listed process group IDs\n"), fp);
fputs(_(" -G, --group <GID,...> match real group IDs\n"), fp);
fputs(_(" -i, --ignore-case match case insensitively\n"), fp);
fputs(_(" -n, --newest select most recently started\n"), fp);
fputs(_(" -o, --oldest select least recently started\n"), fp);
fputs(_(" -O, --older <seconds> select where older than seconds\n"), fp);
fputs(_(" -P, --parent <PPID,...> match only child processes of the given parent\n"), fp);
fputs(_(" -s, --session <SID,...> match session IDs\n"), fp);
fputs(_(" -t, --terminal <tty,...> match by controlling terminal\n"), fp);
fputs(_(" -u, --euid <ID,...> match by effective IDs\n"), fp);
fputs(_(" -U, --uid <ID,...> match by real IDs\n"), fp);
fputs(_(" -x, --exact match exactly with the command name\n"), fp);
fputs(_(" -F, --pidfile <file> read PIDs from file\n"), fp);
fputs(_(" -L, --logpidfile fail if PID file is not locked\n"), fp);
fputs(_(" -r, --runstates <state> match runstates [D,S,Z,...]\n"), fp);
fputs(_(" --ns <PID> match the processes that belong to the same\n"
" namespace as <pid>\n"), fp);
fputs(_(" --nslist <ns,...> list which namespaces will be considered for\n"
" the --ns option.\n"
" Available namespaces: ipc, mnt, net, pid, user, uts\n"), fp);
fputs(USAGE_SEPARATOR, fp);
fputs(USAGE_HELP, fp);
fputs(USAGE_VERSION, fp);
fprintf(fp, USAGE_MAN_TAIL("pgrep(1)"));
exit(fp == stderr ? EXIT_USAGE : EXIT_SUCCESS);
2002-02-02 04:17:29 +05:30
}
static struct el *split_list (const char *restrict str, int (*convert)(const char *, struct el *))
2002-02-02 04:17:29 +05:30
{
2013-10-29 08:35:35 +05:30
char *copy;
char *ptr;
2002-02-02 04:17:29 +05:30
char *sep_pos;
int i = 0;
int size = 0;
struct el *list = NULL;
2002-02-02 04:17:29 +05:30
2013-10-29 08:35:35 +05:30
if (str[0] == '\0')
return NULL;
copy = xstrdup (str);
ptr = copy;
2002-02-02 04:17:29 +05:30
do {
if (i == size) {
grow_size(size);
/* add 1 because slot zero is a count */
list = xrealloc (list, (1 + size) * sizeof *list);
2002-02-02 04:17:29 +05:30
}
sep_pos = strchr (ptr, ',');
if (sep_pos)
*sep_pos = 0;
/* Use ++i instead of i++ because slot zero is a count */
if (list && !convert (ptr, &list[++i]))
2006-06-21 09:48:02 +05:30
exit (EXIT_USAGE);
2002-02-02 04:17:29 +05:30
if (sep_pos)
ptr = sep_pos + 1;
} while (sep_pos);
free (copy);
if (!i) {
2002-02-02 04:17:29 +05:30
free (list);
list = NULL;
} else {
list[0].num = i;
2002-02-02 04:17:29 +05:30
}
return list;
2002-02-02 04:17:29 +05:30
}
/* strict_atol returns a Boolean: TRUE if the input string
* contains a plain number, FALSE if there are any non-digits. */
2006-06-21 09:48:02 +05:30
static int strict_atol (const char *restrict str, long *restrict value)
2002-02-02 04:17:29 +05:30
{
long res = 0;
long sign = 1;
2002-02-02 04:17:29 +05:30
if (*str == '+')
++str;
else if (*str == '-') {
++str;
sign = -1;
}
for ( ; *str; ++str) {
if (! isdigit (*str))
return (0);
res *= 10;
res += *str - '0';
}
*value = sign * res;
return 1;
2002-02-02 04:17:29 +05:30
}
#include <sys/file.h>
/* We try a read lock. The daemon should have a write lock.
* Seen using flock: FreeBSD code */
2006-06-23 08:48:12 +05:30
static int has_flock(int fd)
{
return flock(fd, LOCK_SH|LOCK_NB)==-1 && errno==EWOULDBLOCK;
}
/* We try a read lock. The daemon should have a write lock.
* Seen using fcntl: libslack */
2006-06-23 08:48:12 +05:30
static int has_fcntl(int fd)
{
struct flock f; /* seriously, struct flock is for a fnctl lock! */
2006-06-23 08:48:12 +05:30
f.l_type = F_RDLCK;
f.l_whence = SEEK_SET;
f.l_start = 0;
f.l_len = 0;
return fcntl(fd,F_SETLK,&f)==-1 && (errno==EACCES || errno==EAGAIN);
}
static struct el *read_pidfile(void)
{
char buf[12];
int fd;
struct stat sbuf;
char *endp;
2011-10-07 02:28:26 +05:30
int n, pid;
struct el *list = NULL;
fd = open(opt_pidfile, O_RDONLY|O_NOCTTY|O_NONBLOCK);
if(fd<0)
2011-10-07 02:28:26 +05:30
goto just_ret;
if(fstat(fd,&sbuf) || !S_ISREG(sbuf.st_mode) || sbuf.st_size<1)
goto out;
/* type of lock, if any, is not standardized on Linux */
2006-06-25 01:42:29 +05:30
if(opt_lock && !has_flock(fd) && !has_fcntl(fd))
2011-10-07 02:28:26 +05:30
goto out;
memset(buf,'\0',sizeof buf);
n = read(fd,buf,sizeof buf-1);
2011-10-07 02:28:26 +05:30
if (n<1)
goto out;
pid = strtoul(buf,&endp,10);
if(endp<=buf || pid<1 || pid>0x7fffffff)
goto out;
if(*endp && !isspace(*endp))
goto out;
list = xmalloc(2 * sizeof *list);
list[0].num = 1;
list[1].num = pid;
out:
close(fd);
2011-10-07 02:28:26 +05:30
just_ret:
return list;
}
static int conv_uid (const char *restrict name, struct el *restrict e)
2002-02-02 04:17:29 +05:30
{
struct passwd *pwd;
if (strict_atol (name, &e->num))
return (1);
pwd = getpwnam (name);
if (pwd == NULL) {
xwarnx(_("invalid user name: %s"), name);
return 0;
2002-02-02 04:17:29 +05:30
}
e->num = (int) pwd->pw_uid;
return 1;
2002-02-02 04:17:29 +05:30
}
static int conv_gid (const char *restrict name, struct el *restrict e)
2002-02-02 04:17:29 +05:30
{
struct group *grp;
if (strict_atol (name, &e->num))
return 1;
2002-02-02 04:17:29 +05:30
grp = getgrnam (name);
if (grp == NULL) {
xwarnx(_("invalid group name: %s"), name);
return 0;
2002-02-02 04:17:29 +05:30
}
e->num = (int) grp->gr_gid;
return 1;
2002-02-02 04:17:29 +05:30
}
static int conv_pgrp (const char *restrict name, struct el *restrict e)
2002-02-02 04:17:29 +05:30
{
if (! strict_atol (name, &e->num)) {
xwarnx(_("invalid process group: %s"), name);
return 0;
2002-02-02 04:17:29 +05:30
}
if (e->num == 0)
e->num = getpgrp ();
return 1;
2002-02-02 04:17:29 +05:30
}
static int conv_sid (const char *restrict name, struct el *restrict e)
2002-02-02 04:17:29 +05:30
{
if (! strict_atol (name, &e->num)) {
xwarnx(_("invalid session id: %s"), name);
return 0;
2002-02-02 04:17:29 +05:30
}
if (e->num == 0)
e->num = getsid (0);
return 1;
2002-02-02 04:17:29 +05:30
}
static int conv_num (const char *restrict name, struct el *restrict e)
2002-02-02 04:17:29 +05:30
{
if (! strict_atol (name, &e->num)) {
xwarnx(_("not a number: %s"), name);
return 0;
2002-02-02 04:17:29 +05:30
}
return 1;
2002-02-02 04:17:29 +05:30
}
static int conv_str (const char *restrict name, struct el *restrict e)
2002-02-02 04:17:29 +05:30
{
e->str = xstrdup (name);
return 1;
2002-02-02 04:17:29 +05:30
}
static int conv_ns (const char *restrict name, struct el *restrict e)
{
int rc = conv_str(name, e);
int id;
ns_flags = 0;
id = get_ns_id(name);
if (id == -1)
return 0;
ns_flags |= (1 << id);
return rc;
}
static int match_numlist (long value, const struct el *restrict list)
2002-02-02 04:17:29 +05:30
{
int found = 0;
if (list != NULL) {
2002-02-02 04:17:29 +05:30
int i;
for (i = list[0].num; i > 0; i--) {
if (list[i].num == value) {
2002-02-02 04:17:29 +05:30
found = 1;
break;
}
2002-02-02 04:17:29 +05:30
}
}
return found;
2002-02-02 04:17:29 +05:30
}
static int match_strlist (const char *restrict value, const struct el *restrict list)
2002-02-02 04:17:29 +05:30
{
int found = 0;
if (list != NULL) {
2002-02-02 04:17:29 +05:30
int i;
for (i = list[0].num; i > 0; i--) {
if (! strcmp (list[i].str, value)) {
2002-02-02 04:17:29 +05:30
found = 1;
break;
}
2002-02-02 04:17:29 +05:30
}
}
return found;
2002-02-02 04:17:29 +05:30
}
static int match_ns (const proc_t *task, const proc_t *ns_task)
{
int found = 1;
int i;
for (i = 0; i < NUM_NS; i++) {
if (ns_flags & (1 << i)) {
if (task->ns[i] != ns_task->ns[i]) {
found = 0;
break;
}
}
}
return found;
}
static void output_numlist (const struct el *restrict list, int num)
2002-02-02 04:17:29 +05:30
{
int i;
const char *delim = opt_delim;
for (i = 0; i < num; i++) {
if(i+1==num)
delim = "\n";
printf ("%ld%s", list[i].num, delim);
}
2002-02-02 04:17:29 +05:30
}
static void output_strlist (const struct el *restrict list, int num)
2002-02-02 04:17:29 +05:30
{
/* FIXME: escape codes */
2002-02-02 04:17:29 +05:30
int i;
const char *delim = opt_delim;
for (i = 0; i < num; i++) {
if(i+1==num)
delim = "\n";
printf ("%lu %s%s", list[i].num, list[i].str, delim);
}
2002-02-02 04:17:29 +05:30
}
2006-06-21 09:48:02 +05:30
static PROCTAB *do_openproc (void)
2002-02-02 04:17:29 +05:30
{
PROCTAB *ptp;
2002-12-09 01:58:40 +05:30
int flags = 0;
2002-02-02 04:17:29 +05:30
if (opt_pattern || opt_full || opt_longlong)
2002-10-09 09:58:48 +05:30
flags |= PROC_FILLCOM;
2002-12-09 01:58:40 +05:30
if (opt_ruid || opt_rgid)
2002-02-02 04:17:29 +05:30
flags |= PROC_FILLSTATUS;
if (opt_oldest || opt_newest || opt_pgrp || opt_sid || opt_term || opt_older)
2002-12-09 01:58:40 +05:30
flags |= PROC_FILLSTAT;
if (!(flags & PROC_FILLSTAT))
flags |= PROC_FILLSTATUS; /* FIXME: need one, and PROC_FILLANY broken */
if (opt_ns_pid)
flags |= PROC_FILLNS;
2002-02-02 04:17:29 +05:30
if (opt_euid && !opt_negate) {
int num = opt_euid[0].num;
int i = num;
uid_t *uids = xmalloc (num * sizeof (uid_t));
2002-02-02 04:17:29 +05:30
while (i-- > 0) {
uids[i] = opt_euid[i+1].num;
}
flags |= PROC_UID;
ptp = openproc (flags, uids, num);
} else {
ptp = openproc (flags);
}
return ptp;
2002-02-02 04:17:29 +05:30
}
2006-06-21 09:48:02 +05:30
static regex_t * do_regcomp (void)
2002-02-02 04:17:29 +05:30
{
regex_t *preg = NULL;
if (opt_pattern) {
char *re;
char errbuf[256];
int re_err;
preg = xmalloc (sizeof (regex_t));
2002-02-02 04:17:29 +05:30
if (opt_exact) {
re = xmalloc (strlen (opt_pattern) + 5);
2002-02-02 04:17:29 +05:30
sprintf (re, "^(%s)$", opt_pattern);
} else {
re = opt_pattern;
2002-02-02 04:17:29 +05:30
}
2006-06-19 02:25:02 +05:30
re_err = regcomp (preg, re, REG_EXTENDED | REG_NOSUB | opt_case);
if (opt_exact) free(re);
2002-02-02 04:17:29 +05:30
if (re_err) {
regerror (re_err, preg, errbuf, sizeof(errbuf));
2005-10-31 05:15:47 +05:30
fputs(errbuf,stderr);
2006-06-21 09:48:02 +05:30
exit (EXIT_USAGE);
2002-02-02 04:17:29 +05:30
}
}
return preg;
}
/*
* SC_ARG_MAX used to return the maximum size a command line can be
* however changes to the kernel mean this can be bigger than we can
* alloc. Clamp it to 128kB like xargs and friends do
* Should also not be smaller than POSIX_ARG_MAX which is 4096
*/
static size_t get_arg_max(void)
{
#define MIN_ARG_SIZE 4096u
#define MAX_ARG_SIZE (128u * 1024u)
size_t val = sysconf(_SC_ARG_MAX);
if (val < MIN_ARG_SIZE)
val = MIN_ARG_SIZE;
if (val > MAX_ARG_SIZE)
val = MAX_ARG_SIZE;
return val;
}
static struct el * select_procs (int *num)
2002-02-02 04:17:29 +05:30
{
PROCTAB *ptp;
proc_t task;
proc_t subtask;
unsigned long long saved_start_time; /* for new/old support */
pid_t saved_pid = 0; /* for new/old support */
2002-02-02 04:17:29 +05:30
int matches = 0;
int size = 0;
2002-02-02 04:17:29 +05:30
regex_t *preg;
pid_t myself = getpid();
struct el *list = NULL;
long cmdlen = get_arg_max() * sizeof(char);
char *cmdline = xmalloc(cmdlen);
char *cmdsearch = xmalloc(cmdlen);
char *cmdoutput = xmalloc(cmdlen);
proc_t ns_task;
time_t now;
2019-03-22 03:02:22 +05:30
int uptime_secs;
2002-02-02 04:17:29 +05:30
ptp = do_openproc();
preg = do_regcomp();
now = time(NULL);
2019-03-22 03:02:22 +05:30
if ((uptime_secs=uptime(0,0)) == 0)
xerrx(EXIT_FAILURE, "uptime");
if (opt_newest) saved_start_time = 0ULL;
else saved_start_time = ~0ULL;
if (opt_newest) saved_pid = 0;
if (opt_oldest) saved_pid = INT_MAX;
if (opt_ns_pid && ns_read(opt_ns_pid, &ns_task)) {
fputs(_("Error reading reference namespace information\n"),
stderr);
exit (EXIT_FATAL);
}
memset(&task, 0, sizeof (task));
memset(&subtask, 0, sizeof (subtask));
while(readproc(ptp, &task)) {
2002-02-02 04:17:29 +05:30
int match = 1;
2003-09-20 13:59:55 +05:30
if (task.XXXID == myself)
2002-02-02 04:17:29 +05:30
continue;
else if (opt_newest && task.start_time < saved_start_time)
match = 0;
else if (opt_oldest && task.start_time > saved_start_time)
2002-02-02 04:17:29 +05:30
match = 0;
else if (opt_ppid && ! match_numlist (task.ppid, opt_ppid))
match = 0;
else if (opt_pid && ! match_numlist (task.tgid, opt_pid))
match = 0;
2002-02-02 04:17:29 +05:30
else if (opt_pgrp && ! match_numlist (task.pgrp, opt_pgrp))
match = 0;
else if (opt_euid && ! match_numlist (task.euid, opt_euid))
match = 0;
2002-12-09 01:58:40 +05:30
else if (opt_ruid && ! match_numlist (task.ruid, opt_ruid))
2002-02-02 04:17:29 +05:30
match = 0;
2002-12-09 01:58:40 +05:30
else if (opt_rgid && ! match_numlist (task.rgid, opt_rgid))
2002-02-02 04:17:29 +05:30
match = 0;
else if (opt_sid && ! match_numlist (task.session, opt_sid))
match = 0;
else if (opt_ns_pid && ! match_ns (&task, &ns_task))
match = 0;
2002-02-02 04:17:29 +05:30
else if (opt_term) {
2002-12-03 14:37:59 +05:30
if (task.tty == 0) {
2002-02-02 04:17:29 +05:30
match = 0;
} else {
char tty[256];
dev_to_tty (tty, sizeof(tty) - 1,
2003-09-20 13:59:55 +05:30
task.tty, task.XXXID, ABBREV_DEV);
2002-02-02 04:17:29 +05:30
match = match_strlist (tty, opt_term);
}
}
else if (opt_older) {
if(now - uptime_secs + (task.start_time / Hertz) + opt_older > now) match = 0;
}
else if (opt_runstates) {
match = 0;
if (strchr(opt_runstates, task.state)) match = 1;
}
if (task.cmdline && (opt_longlong || opt_full) ) {
int i = 0;
long bytes = cmdlen;
char *str = cmdline;
/* make sure it is always NUL-terminated */
*str = '\0';
while (task.cmdline[i] && bytes > 1) {
const int len = snprintf(str, bytes, "%s%s", i ? " " : "", task.cmdline[i]);
if (len < 0) {
*str = '\0';
break;
}
if (len >= bytes) {
break;
}
str += len;
bytes -= len;
i++;
2002-02-02 04:17:29 +05:30
}
}
if (opt_long || opt_longlong || (match && opt_pattern)) {
if (opt_longlong && task.cmdline)
strncpy (cmdoutput, cmdline, cmdlen - 1);
else
strncpy (cmdoutput, task.cmd, cmdlen - 1);
cmdoutput[cmdlen - 1] = '\0';
}
2002-02-02 04:17:29 +05:30
if (match && opt_pattern) {
if (opt_full && task.cmdline)
strncpy (cmdsearch, cmdline, cmdlen - 1);
else
strncpy (cmdsearch, task.cmd, cmdlen - 1);
cmdsearch[cmdlen - 1] = '\0';
if (regexec (preg, cmdsearch, 0, NULL, 0) != 0)
2002-02-02 04:17:29 +05:30
match = 0;
}
if (match ^ opt_negate) { /* Exclusive OR is neat */
if (opt_newest) {
if (saved_start_time == task.start_time &&
2003-09-20 13:59:55 +05:30
saved_pid > task.XXXID)
continue;
saved_start_time = task.start_time;
2003-09-20 13:59:55 +05:30
saved_pid = task.XXXID;
matches = 0;
}
if (opt_oldest) {
if (saved_start_time == task.start_time &&
2003-09-20 13:59:55 +05:30
saved_pid < task.XXXID)
2002-02-02 04:17:29 +05:30
continue;
saved_start_time = task.start_time;
2003-09-20 13:59:55 +05:30
saved_pid = task.XXXID;
2002-02-02 04:17:29 +05:30
matches = 0;
}
if (matches == size) {
grow_size(size);
list = xrealloc(list, size * sizeof *list);
}
if (list && (opt_long || opt_longlong || opt_echo)) {
list[matches].num = task.XXXID;
list[matches++].str = xstrdup (cmdoutput);
} else if (list) {
list[matches++].num = task.XXXID;
} else {
xerrx(EXIT_FAILURE, _("internal error"));
2002-02-02 04:17:29 +05:30
}
// pkill and pidwait don't support -w, but this is checked in getopt
2020-02-24 08:32:59 +05:30
if (opt_threads) {
while (readtask(ptp, &task, &subtask)){
// don't add redundant tasks
if (task.XXXID == subtask.XXXID)
continue;
// eventually grow output buffer
if (matches == size) {
grow_size(size);
list = xrealloc(list, size * sizeof *list);
}
if (opt_long || opt_longlong) {
list[matches].str = xstrdup (cmdoutput);
list[matches++].num = subtask.XXXID;
} else {
list[matches++].num = subtask.XXXID;
}
}
}
2002-02-02 04:17:29 +05:30
}
}
closeproc (ptp);
*num = matches;
free(cmdline);
free(cmdsearch);
free(cmdoutput);
if (preg) {
regfree(preg);
free(preg);
}
return list;
2002-02-02 04:17:29 +05:30
}
static int signal_option(int *argc, char **argv)
{
int sig;
int i;
for (i = 1; i < *argc; i++) {
if (argv[i][0] == '-') {
sig = signal_name_to_number(argv[i] + 1);
if (-1 < sig) {
memmove(argv + i, argv + i + 1,
sizeof(char *) * (*argc - i));
(*argc)--;
return sig;
}
}
}
return -1;
}
2002-02-02 04:17:29 +05:30
#if defined(ENABLE_PIDWAIT) && !defined(HAVE_PIDFD_OPEN)
2020-02-24 08:32:59 +05:30
static int pidfd_open (pid_t pid, unsigned int flags)
{
return syscall(__NR_pidfd_open, pid, flags);
}
#endif
2006-06-21 09:48:02 +05:30
static void parse_opts (int argc, char **argv)
2002-11-26 02:42:25 +05:30
{
char opts[64] = "";
2002-11-26 02:42:25 +05:30
int opt;
int criteria_count = 0;
enum {
SIGNAL_OPTION = CHAR_MAX + 1,
NS_OPTION,
NSLIST_OPTION,
};
static const struct option longopts[] = {
{"signal", required_argument, NULL, SIGNAL_OPTION},
{"count", no_argument, NULL, 'c'},
{"delimiter", required_argument, NULL, 'd'},
{"list-name", no_argument, NULL, 'l'},
{"list-full", no_argument, NULL, 'a'},
{"full", no_argument, NULL, 'f'},
{"pgroup", required_argument, NULL, 'g'},
{"group", required_argument, NULL, 'G'},
{"ignore-case", no_argument, NULL, 'i'},
{"newest", no_argument, NULL, 'n'},
{"oldest", no_argument, NULL, 'o'},
{"older", required_argument, NULL, 'O'},
{"parent", required_argument, NULL, 'P'},
{"session", required_argument, NULL, 's'},
{"terminal", required_argument, NULL, 't'},
{"euid", required_argument, NULL, 'u'},
{"uid", required_argument, NULL, 'U'},
{"inverse", no_argument, NULL, 'v'},
{"lightweight", no_argument, NULL, 'w'},
{"exact", no_argument, NULL, 'x'},
{"pidfile", required_argument, NULL, 'F'},
{"logpidfile", no_argument, NULL, 'L'},
{"echo", no_argument, NULL, 'e'},
{"ns", required_argument, NULL, NS_OPTION},
{"nslist", required_argument, NULL, NSLIST_OPTION},
{"queue", required_argument, NULL, 'q'},
{"runstates", required_argument, NULL, 'r'},
{"help", no_argument, NULL, 'h'},
{"version", no_argument, NULL, 'V'},
{NULL, 0, NULL, 0}
};
#ifdef ENABLE_PIDWAIT
if (strcmp (program_invocation_short_name, "pidwait") == 0) {
prog_mode = PIDWAIT;
2020-02-24 08:32:59 +05:30
strcat (opts, "e");
} else
#endif
if (strcmp (program_invocation_short_name, "pkill") == 0) {
int sig;
2020-02-24 08:32:59 +05:30
prog_mode = PKILL;
sig = signal_option(&argc, argv);
if (-1 < sig)
opt_signal = sig;
strcat (opts, "eq:");
2002-11-26 02:42:25 +05:30
} else {
2020-02-24 08:32:59 +05:30
prog_mode = PGREP;
strcat (opts, "lad:vw");
2002-11-26 02:42:25 +05:30
}
strcat (opts, "LF:cfinoxP:O:g:s:u:U:G:t:r:?Vh");
while ((opt = getopt_long (argc, argv, opts, longopts, NULL)) != -1) {
2002-11-26 02:42:25 +05:30
switch (opt) {
case SIGNAL_OPTION:
opt_signal = signal_name_to_number (optarg);
if (opt_signal == -1 && isdigit (optarg[0]))
opt_signal = atoi (optarg);
break;
case 'e':
opt_echo = 1;
break;
/* case 'D': / * FreeBSD: print info about non-matches for debugging * /
* break; */
case 'F': /* FreeBSD: the arg is a file containing a PID to match */
opt_pidfile = xstrdup (optarg);
++criteria_count;
break;
case 'G': /* Solaris: match rgid/rgroup */
opt_rgid = split_list (optarg, conv_gid);
if (opt_rgid == NULL)
usage ('?');
2002-11-26 02:42:25 +05:30
++criteria_count;
break;
/* case 'I': / * FreeBSD: require confirmation before killing * /
* break; */
/* case 'J': / * Solaris: match by project ID (name or number) * /
* break; */
case 'L': /* FreeBSD: fail if pidfile (see -F) not locked */
2006-06-25 01:42:29 +05:30
opt_lock++;
break;
/* case 'M': / * FreeBSD: specify core (OS crash dump) file * /
* break; */
/* case 'N': / * FreeBSD: specify alternate namelist file (for us, System.map -- but we don't need it) * /
* break; */
case 'P': /* Solaris: match by PPID */
opt_ppid = split_list (optarg, conv_num);
if (opt_ppid == NULL)
usage ('?');
2002-11-26 02:42:25 +05:30
++criteria_count;
break;
/* case 'S': / * FreeBSD: don't ignore the built-in kernel tasks * /
* break; */
/* case 'T': / * Solaris: match by "task ID" (probably not a Linux task) * /
* break; */
case 'U': /* Solaris: match by ruid/rgroup */
opt_ruid = split_list (optarg, conv_uid);
if (opt_ruid == NULL)
usage ('?');
++criteria_count;
2002-11-26 02:42:25 +05:30
break;
case 'V':
printf(PROCPS_NG_VERSION);
2006-06-21 09:48:02 +05:30
exit(EXIT_SUCCESS);
/* case 'c': / * Solaris: match by contract ID * /
* break; */
case 'c':
opt_count = 1;
break;
case 'd': /* Solaris: change the delimiter */
opt_delim = xstrdup (optarg);
2002-11-26 02:42:25 +05:30
break;
case 'f': /* Solaris: match full process name (as in "ps -f") */
opt_full = 1;
2002-11-26 02:42:25 +05:30
break;
case 'g': /* Solaris: match pgrp */
opt_pgrp = split_list (optarg, conv_pgrp);
2002-11-26 02:42:25 +05:30
if (opt_pgrp == NULL)
usage ('?');
2006-06-25 01:42:29 +05:30
++criteria_count;
2002-11-26 02:42:25 +05:30
break;
case 'i': /* FreeBSD: ignore case. OpenBSD: withdrawn. See -I. This sucks. */
if (opt_case)
usage (opt);
opt_case = REG_ICASE;
break;
/* case 'j': / * FreeBSD: restricted to the given jail ID * /
* break; */
case 'l': /* Solaris: long output format (pgrep only) Should require -f for beyond argv[0] maybe? */
opt_long = 1;
2002-11-26 02:42:25 +05:30
break;
case 'a':
opt_longlong = 1;
break;
case 'n': /* Solaris: match only the newest */
if (opt_oldest|opt_negate|opt_newest)
usage ('?');
opt_newest = 1;
2002-11-26 02:42:25 +05:30
++criteria_count;
break;
case 'o': /* Solaris: match only the oldest */
if (opt_oldest|opt_negate|opt_newest)
usage ('?');
opt_oldest = 1;
2002-11-26 02:42:25 +05:30
++criteria_count;
break;
case 'O':
opt_older = atoi (optarg);
break;
case 's': /* Solaris: match by session ID -- zero means self */
opt_sid = split_list (optarg, conv_sid);
if (opt_sid == NULL)
usage ('?');
2002-11-26 02:42:25 +05:30
++criteria_count;
break;
case 't': /* Solaris: match by tty */
opt_term = split_list (optarg, conv_str);
2002-11-26 02:42:25 +05:30
if (opt_term == NULL)
usage ('?');
2002-11-26 02:42:25 +05:30
++criteria_count;
break;
case 'u': /* Solaris: match by euid/egroup */
opt_euid = split_list (optarg, conv_uid);
if (opt_euid == NULL)
usage ('?');
++criteria_count;
break;
case 'v': /* Solaris: as in grep, invert the matching (uh... applied after selection I think) */
if (opt_oldest|opt_negate|opt_newest)
usage ('?');
opt_negate = 1;
break;
case 'w': // Linux: show threads (lightweight process) too
opt_threads = 1;
break;
/* OpenBSD -x, being broken, does a plain string */
case 'x': /* Solaris: use ^(regexp)$ in place of regexp (FreeBSD too) */
opt_exact = 1;
break;
/* case 'z': / * Solaris: match by zone ID * /
* break; */
case 'r': /* match by runstate */
opt_runstates = xstrdup (optarg);
++criteria_count;
break;
case NS_OPTION:
opt_ns_pid = atoi(optarg);
if (opt_ns_pid == 0)
usage ('?');
++criteria_count;
break;
case NSLIST_OPTION:
opt_nslist = split_list (optarg, conv_ns);
if (opt_nslist == NULL)
usage ('?');
break;
case 'q':
sigval.sival_int = atoi(optarg);
use_sigqueue = true;
break;
case 'h':
2002-11-26 02:42:25 +05:30
case '?':
usage (opt);
2002-11-26 02:42:25 +05:30
break;
}
}
if(opt_lock && !opt_pidfile)
xerrx(EXIT_USAGE, _("-L without -F makes no sense\n"
"Try `%s --help' for more information."),
program_invocation_short_name);
if(opt_pidfile){
opt_pid = read_pidfile();
if(!opt_pid)
xerrx(EXIT_FAILURE, _("pidfile not valid\n"
"Try `%s --help' for more information."),
program_invocation_short_name);
}
if (argc - optind == 1)
2002-11-26 02:42:25 +05:30
opt_pattern = argv[optind];
else if (argc - optind > 1)
xerrx(EXIT_USAGE, _("only one pattern can be provided\n"
"Try `%s --help' for more information."),
program_invocation_short_name);
else if (criteria_count == 0)
xerrx(EXIT_USAGE, _("no matching criteria specified\n"
"Try `%s --help' for more information."),
program_invocation_short_name);
2002-11-26 02:42:25 +05:30
}
inline static int execute_kill(pid_t pid, int sig_num)
{
if (use_sigqueue)
return sigqueue(pid, sig_num, sigval);
else
return kill(pid, sig_num);
}
2002-11-26 02:42:25 +05:30
int main (int argc, char **argv)
2002-02-02 04:17:29 +05:30
{
struct el *procs;
int num;
2020-02-24 08:32:59 +05:30
int i;
int kill_count = 0;
#ifdef ENABLE_PIDWAIT
2020-02-24 08:32:59 +05:30
int poll_count = 0;
int wait_count = 0;
int epollfd = epoll_create(1);
struct epoll_event ev, events[32];
#endif
2002-02-02 04:17:29 +05:30
#ifdef HAVE_PROGRAM_INVOCATION_NAME
program_invocation_name = program_invocation_short_name;
#endif
setlocale (LC_ALL, "");
bindtextdomain(PACKAGE, LOCALEDIR);
textdomain(PACKAGE);
atexit(close_stdout);
2002-02-02 04:17:29 +05:30
parse_opts (argc, argv);
procs = select_procs (&num);
2020-02-24 08:32:59 +05:30
switch (prog_mode) {
case PGREP:
if (opt_count) {
fprintf(stdout, "%d\n", num);
} else {
if (opt_long || opt_longlong)
output_strlist (procs,num);
else
output_numlist (procs,num);
}
return !num;
case PKILL:
for (i = 0; i < num; i++) {
if (execute_kill (procs[i].num, opt_signal) != -1) {
if (opt_echo)
printf(_("%s killed (pid %lu)\n"), procs[i].str, procs[i].num);
2020-02-24 08:32:59 +05:30
kill_count++;
continue;
}
if (errno==ESRCH)
2020-02-24 08:32:59 +05:30
/* gone now, which is OK */
continue;
xwarn(_("killing pid %ld failed"), procs[i].num);
2002-02-02 04:17:29 +05:30
}
if (opt_count)
fprintf(stdout, "%d\n", num);
return !kill_count;
2020-02-24 08:32:59 +05:30
#ifdef ENABLE_PIDWAIT
case PIDWAIT:
2020-02-24 08:32:59 +05:30
if (opt_count)
fprintf(stdout, "%d\n", num);
2020-02-24 08:32:59 +05:30
for (i = 0; i < num; i++) {
if (opt_echo)
printf(_("waiting for %s (pid %lu)\n"), procs[i].str, procs[i].num);
int pidfd = pidfd_open(procs[i].num, 0);
if (pidfd == -1) {
/* ignore ESRCH, same as pkill */
if (errno != ESRCH)
xwarn(_("opening pid %ld failed"), procs[i].num);
continue;
}
ev.events = EPOLLIN | EPOLLET;
ev.data.fd = pidfd;
if (epoll_ctl(epollfd, EPOLL_CTL_ADD, pidfd, &ev) != -1)
poll_count++;
}
while (wait_count < poll_count) {
int ew = epoll_wait(epollfd, events, sizeof(events)/sizeof(events[0]), -1);
if (ew == -1) {
if (errno == EINTR)
continue;
xwarn(_("epoll_wait failed"));
}
wait_count += ew;
}
2020-02-24 08:32:59 +05:30
return !wait_count;
#endif
2002-02-02 04:17:29 +05:30
}
2020-02-24 08:32:59 +05:30
/* Not sure if it is possible to get here */
return -1;
2002-02-02 04:17:29 +05:30
}