1 /*- 2 * Copyright (c) 2000 Peter Wemm <peter@FreeBSD.org> 3 * Copyright (c) 2000 Paul Saab <ps@FreeBSD.org> 4 * All rights reserved. 5 * 6 * Redistribution and use in source and binary forms, with or without 7 * modification, are permitted provided that the following conditions 8 * are met: 9 * 1. Redistributions of source code must retain the above copyright 10 * notice, this list of conditions and the following disclaimer. 11 * 2. Redistributions in binary form must reproduce the above copyright 12 * notice, this list of conditions and the following disclaimer in the 13 * documentation and/or other materials provided with the distribution. 14 * 15 * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND 16 * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE 17 * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE 18 * ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE 19 * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL 20 * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS 21 * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) 22 * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT 23 * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY 24 * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF 25 * SUCH DAMAGE. 26 * 27 * $FreeBSD: src/usr.bin/killall/killall.c,v 1.5.2.4 2001/05/19 19:22:49 phk Exp $ 28 */ 29 30 #include <sys/user.h> 31 #include <sys/param.h> 32 #include <sys/stat.h> 33 #include <sys/sysctl.h> 34 #include <fcntl.h> 35 #include <dirent.h> 36 #include <stdio.h> 37 #include <stdlib.h> 38 #include <string.h> 39 #include <pwd.h> 40 #include <signal.h> 41 #include <regex.h> 42 #include <ctype.h> 43 #include <err.h> 44 #include <errno.h> 45 #include <unistd.h> 46 47 #define PHASH_SIZE 1024 48 49 struct pchain { 50 struct pchain *next; 51 struct kinfo_proc *proc; 52 struct pchain *parent; 53 }; 54 55 static char *prog; 56 static struct pchain *phash[PHASH_SIZE]; 57 58 static struct pchain *saveparents(struct kinfo_proc *procs, int nprocs, 59 pid_t mypid); 60 static int checkparent(struct pchain *mychain, pid_t pid); 61 62 static void __dead2 63 usage(void) 64 { 65 66 fprintf(stderr, "usage: %s [-l] [-v] [-m] [-sig] " 67 "[-u user] [-j jail] [-t tty] [-T] " 68 "[-c cmd] [cmd]...\n", prog); 69 fprintf(stderr, "At least one option or argument to specify " 70 "processes must be given.\n"); 71 exit(1); 72 } 73 74 static char * 75 upper(const char *str) 76 { 77 static char buf[80]; 78 char *s; 79 80 strlcpy(buf, str, sizeof(buf)); 81 for (s = buf; *s; s++) 82 *s = toupper((unsigned char)*s); 83 return buf; 84 } 85 86 87 static void 88 printsig(FILE *fp) 89 { 90 const char *const * p; 91 int cnt; 92 int offset = 0; 93 94 for (cnt = NSIG, p = sys_signame + 1; --cnt; ++p) { 95 offset += fprintf(fp, "%s ", upper(*p)); 96 if (offset >= 75 && cnt > 1) { 97 offset = 0; 98 fprintf(fp, "\n"); 99 } 100 } 101 fprintf(fp, "\n"); 102 } 103 104 static void 105 nosig(char *name) 106 { 107 108 warnx("unknown signal %s; valid signals:", name); 109 printsig(stderr); 110 exit(1); 111 } 112 113 int 114 main(int ac, char **av) 115 { 116 struct kinfo_proc *procs = NULL, *newprocs; 117 struct pchain *mychain; 118 struct stat sb; 119 struct passwd *pw; 120 regex_t rgx; 121 regmatch_t pmatch; 122 int i, j; 123 char buf[256]; 124 char *user = NULL; 125 char *tty = NULL; 126 char *cmd = NULL; 127 int qflag = 0; 128 int vflag = 0; 129 int sflag = 0; 130 int jflag = 0, jailid = 0; 131 int dflag = 0; 132 int mflag = 0; 133 int Tflag = 0; 134 uid_t uid = 0; 135 dev_t tdev = 0; 136 pid_t mypid; 137 char thiscmd[MAXCOMLEN + 1]; 138 pid_t thispid; 139 uid_t thisuid; 140 dev_t thistdev; 141 int sig = SIGTERM; 142 const char *const *p; 143 char *ep; 144 int errors = 0; 145 int mib[4]; 146 size_t miblen; 147 int st, nprocs; 148 size_t size; 149 int matched; 150 int killed = 0; 151 152 prog = av[0]; 153 av++; 154 ac--; 155 156 while (ac > 0) { 157 if (strcmp(*av, "-l") == 0) { 158 printsig(stdout); 159 exit(0); 160 } 161 if (strcmp(*av, "-help") == 0) 162 usage(); 163 if (**av == '-') { 164 ++*av; 165 switch (**av) { 166 case 'u': 167 ++*av; 168 if (**av == '\0') 169 ++av; 170 --ac; 171 user = *av; 172 break; 173 case 't': 174 ++*av; 175 if (**av == '\0') 176 ++av; 177 --ac; 178 tty = *av; 179 break; 180 case 'c': 181 ++*av; 182 if (**av == '\0') 183 ++av; 184 --ac; 185 cmd = *av; 186 break; 187 case 'j': 188 { 189 const char *errstr; 190 ++*av; 191 if (**av == '\0') 192 ++av; 193 --ac; 194 jailid = strtonum(*av, 1, INT_MAX, &errstr); 195 196 if (errstr) 197 errx(1, "jail id is %s: %s", errstr, *av); 198 jflag++; 199 break; 200 } 201 case 'q': 202 qflag++; 203 break; 204 case 'v': 205 vflag++; 206 break; 207 case 's': 208 sflag++; 209 break; 210 case 'd': 211 dflag++; 212 break; 213 case 'm': 214 mflag++; 215 break; 216 case 'T': 217 Tflag++; 218 break; 219 default: 220 if (isalpha((unsigned char)**av)) { 221 if (strncasecmp(*av, "sig", 3) == 0) 222 *av += 3; 223 for (sig = NSIG, p = sys_signame + 1; 224 --sig; ++p) 225 if (strcasecmp(*p, *av) == 0) { 226 sig = p - sys_signame; 227 break; 228 } 229 if (!sig) 230 nosig(*av); 231 } else if (isdigit((unsigned char)**av)) { 232 sig = strtol(*av, &ep, 10); 233 if (!*av || *ep) 234 errx(1, "illegal signal number: %s", *av); 235 if (sig < 0 || sig >= NSIG) 236 nosig(*av); 237 } else 238 nosig(*av); 239 } 240 ++av; 241 --ac; 242 } else { 243 break; 244 } 245 } 246 247 if (user == NULL && tty == NULL && cmd == NULL && 248 jflag == 0 && Tflag == 0 && ac == 0) { 249 usage(); 250 } 251 252 if (Tflag) { 253 tty = ttyname(0); 254 if (tty) 255 tty = strdup(tty); 256 } 257 258 if (tty) { 259 if (strncmp(tty, "/dev/", 5) == 0) 260 snprintf(buf, sizeof(buf), "%s", tty); 261 else if (strncmp(tty, "tty", 3) == 0) 262 snprintf(buf, sizeof(buf), "/dev/%s", tty); 263 else if (isdigit(tty[0])) 264 snprintf(buf, sizeof(buf), "/dev/pts/%s", tty); 265 else 266 snprintf(buf, sizeof(buf), "/dev/tty%s", tty); 267 if (stat(buf, &sb) < 0) 268 err(1, "stat(%s)", buf); 269 if (!S_ISCHR(sb.st_mode)) 270 errx(1, "%s: not a character device", buf); 271 tdev = sb.st_rdev; 272 if (dflag) 273 printf("ttydev:0x%x\n", tdev); 274 } 275 if (user) { 276 pw = getpwnam(user); 277 if (pw == NULL) 278 errx(1, "user %s does not exist", user); 279 uid = pw->pw_uid; 280 if (dflag) 281 printf("uid:%d\n", uid); 282 } else { 283 uid = getuid(); 284 if (uid != 0) { 285 pw = getpwuid(uid); 286 if (pw) 287 user = pw->pw_name; 288 if (dflag) 289 printf("uid:%d\n", uid); 290 } 291 } 292 size = 0; 293 mib[0] = CTL_KERN; 294 mib[1] = KERN_PROC; 295 mib[2] = KERN_PROC_ALL; 296 mib[3] = 0; 297 miblen = 3; 298 299 if (user && mib[2] == KERN_PROC_ALL) { 300 mib[2] = KERN_PROC_RUID; 301 mib[3] = uid; 302 miblen = 4; 303 } 304 if (tty && mib[2] == KERN_PROC_ALL) { 305 mib[2] = KERN_PROC_TTY; 306 mib[3] = tdev; 307 miblen = 4; 308 } 309 310 st = sysctl(mib, miblen, NULL, &size, NULL, 0); 311 do { 312 size += size / 10; 313 newprocs = realloc(procs, size); 314 if (newprocs == NULL) { 315 if (procs) 316 free(procs); 317 errx(1, "could not reallocate memory"); 318 } 319 procs = newprocs; 320 st = sysctl(mib, miblen, procs, &size, NULL, 0); 321 } while (st == -1 && errno == ENOMEM); 322 if (st == -1) 323 err(1, "could not sysctl(KERN_PROC)"); 324 if (size % sizeof(struct kinfo_proc) != 0) { 325 fprintf(stderr, "proc size mismatch (%zu total, %zu chunks)\n", 326 size, sizeof(struct kinfo_proc)); 327 fprintf(stderr, "userland out of sync with kernel, recompile libkvm etc\n"); 328 exit(1); 329 } 330 nprocs = size / sizeof(struct kinfo_proc); 331 if (dflag) 332 printf("nprocs %d\n", nprocs); 333 mypid = getpid(); 334 335 /* 336 * Record parent chain if Tflag 337 */ 338 if (Tflag && tty) 339 mychain = saveparents(procs, nprocs, mypid); 340 else 341 mychain = NULL; 342 343 /* 344 * Final scan 345 */ 346 for (i = 0; i < nprocs; i++) { 347 thispid = procs[i].kp_pid; 348 strncpy(thiscmd, procs[i].kp_comm, MAXCOMLEN); 349 thiscmd[MAXCOMLEN] = '\0'; 350 thistdev = procs[i].kp_tdev; 351 thisuid = procs[i].kp_ruid; /* real uid */ 352 353 if (thispid == mypid) 354 continue; 355 matched = 1; 356 if ((int)procs[i].kp_pid < 0) 357 matched = 0; 358 if (user) { 359 if (thisuid != uid) 360 matched = 0; 361 } 362 if (tty) { 363 if (thistdev != tdev) 364 matched = 0; 365 if (Tflag && checkparent(mychain, procs[i].kp_pid)) 366 matched = 0; 367 } 368 if (jflag) { 369 if (procs[i].kp_jailid != jailid) 370 matched = 0; 371 } 372 if (cmd) { 373 if (mflag) { 374 if (regcomp(&rgx, cmd, 375 REG_EXTENDED|REG_NOSUB) != 0) { 376 mflag = 0; 377 warnx("%s: illegal regexp", cmd); 378 } 379 } 380 if (mflag) { 381 pmatch.rm_so = 0; 382 pmatch.rm_eo = strlen(thiscmd); 383 if (regexec(&rgx, thiscmd, 0, &pmatch, 384 REG_STARTEND) != 0) 385 matched = 0; 386 regfree(&rgx); 387 } else { 388 if (strcmp(thiscmd, cmd) != 0) 389 matched = 0; 390 } 391 } 392 if (matched == 0) 393 continue; 394 if (ac > 0) { 395 matched = 0; 396 for (j = 0; j < ac; j++) { 397 if (mflag) { 398 if (regcomp(&rgx, av[j], 399 REG_EXTENDED|REG_NOSUB) != 0) { 400 mflag = 0; 401 warnx("%s: illegal regexp", av[j]); 402 } 403 } 404 if (mflag) { 405 pmatch.rm_so = 0; 406 pmatch.rm_eo = strlen(thiscmd); 407 if (regexec(&rgx, thiscmd, 0, &pmatch, 408 REG_STARTEND) == 0) 409 matched = 1; 410 regfree(&rgx); 411 } else { 412 if (strcmp(thiscmd, av[j]) == 0) 413 matched = 1; 414 } 415 if (matched) 416 break; 417 } 418 if (matched == 0) 419 continue; 420 } 421 if (dflag) 422 printf("sig:%d, cmd:%s, pid:%d, dev:0x%x uid:%d\n", sig, 423 thiscmd, thispid, thistdev, thisuid); 424 425 if (vflag || sflag) 426 printf("kill -%s %d\n", upper(sys_signame[sig]), 427 thispid); 428 429 killed++; 430 if (!dflag && !sflag) { 431 if (kill(thispid, sig) < 0 /* && errno != ESRCH */ ) { 432 warn("kill -%s %d", upper(sys_signame[sig]), 433 thispid); 434 errors = 1; 435 } 436 } 437 } 438 if (!qflag && killed == 0) { 439 fprintf(stderr, "No matching processes %swere found\n", 440 getuid() != 0 ? "belonging to you " : ""); 441 errors = 1; 442 } 443 exit(errors); 444 } 445 446 447 static 448 struct pchain * 449 saveparents(struct kinfo_proc *procs, int nprocs, pid_t mypid) 450 { 451 struct pchain *rchain = NULL; 452 struct pchain *chain; 453 struct pchain *pchain; 454 int i; 455 int hv; 456 457 for (i = 0; i < nprocs; ++i) { 458 if ((int)procs[i].kp_pid < 0) 459 continue; 460 hv = (int)procs[i].kp_pid & 1023; 461 chain = malloc(sizeof(*chain)); 462 chain->proc = &procs[i]; 463 chain->parent = NULL; 464 chain->next = phash[hv]; 465 phash[hv] = chain; 466 if (mypid == procs[i].kp_pid) 467 rchain = chain; 468 } 469 for (i = 0; i < nprocs; ++i) { 470 if ((int)procs[i].kp_pid < 0) 471 continue; 472 if ((int)procs[i].kp_ppid < 0) 473 continue; 474 hv = (int)procs[i].kp_pid & 1023; 475 for (chain = phash[hv]; chain; chain = chain->next) { 476 if (chain->proc->kp_pid == procs[i].kp_pid) 477 break; 478 } 479 hv = (int)procs[i].kp_ppid & 1023; 480 for (pchain = phash[hv]; pchain; pchain = pchain->next) { 481 if (pchain->proc->kp_pid == procs[i].kp_ppid) { 482 if (chain) 483 chain->parent = pchain; 484 break; 485 } 486 } 487 } 488 return (rchain); 489 } 490 491 static 492 int 493 checkparent(struct pchain *chain, pid_t pid) 494 { 495 while (chain) { 496 if (chain->proc->kp_pid == pid) 497 return(1); 498 chain = chain->parent; 499 } 500 return(0); 501 } 502