xref: /dragonfly/usr.bin/killall/killall.c (revision 631c21f2)
1 /*-
2  * Copyright (c) 2000 Peter Wemm <peter@FreeBSD.org>
3  * Copyright (c) 2000 Paul Saab <ps@FreeBSD.org>
4  * All rights reserved.
5  *
6  * Redistribution and use in source and binary forms, with or without
7  * modification, are permitted provided that the following conditions
8  * are met:
9  * 1. Redistributions of source code must retain the above copyright
10  *    notice, this list of conditions and the following disclaimer.
11  * 2. Redistributions in binary form must reproduce the above copyright
12  *    notice, this list of conditions and the following disclaimer in the
13  *    documentation and/or other materials provided with the distribution.
14  *
15  * THIS SOFTWARE IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS ``AS IS'' AND
16  * ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
17  * IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE
18  * ARE DISCLAIMED.  IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS BE LIABLE
19  * FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL
20  * DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS
21  * OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
22  * HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT
23  * LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY
24  * OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
25  * SUCH DAMAGE.
26  *
27  * $FreeBSD: src/usr.bin/killall/killall.c,v 1.5.2.4 2001/05/19 19:22:49 phk Exp $
28  */
29 
30 #include <sys/user.h>
31 #include <sys/param.h>
32 #include <sys/stat.h>
33 #include <sys/sysctl.h>
34 #include <fcntl.h>
35 #include <dirent.h>
36 #include <stdio.h>
37 #include <stdlib.h>
38 #include <string.h>
39 #include <pwd.h>
40 #include <signal.h>
41 #include <regex.h>
42 #include <ctype.h>
43 #include <err.h>
44 #include <errno.h>
45 #include <unistd.h>
46 
47 #define PHASH_SIZE	1024
48 
49 struct pchain {
50 	struct pchain *next;
51 	struct kinfo_proc *proc;
52 	struct pchain *parent;
53 };
54 
55 static char	*prog;
56 static struct pchain *phash[PHASH_SIZE];
57 
58 static struct pchain *saveparents(struct kinfo_proc *procs, int nprocs,
59 				pid_t mypid);
60 static int checkparent(struct pchain *mychain, pid_t pid);
61 
62 static void __dead2
63 usage(void)
64 {
65 
66 	fprintf(stderr, "usage: %s [-c cmd] [-d|-v] [-h|-?|-help] [-j jail] "
67 			"[-l] [-m] [-q] [-s] [-t tty] [-T] [-u user] "
68 			"[-sig] [cmd]...\n", prog);
69 	fprintf(stderr, "At least one option or argument to specify "
70 			"processes must be given.\n");
71 	exit(1);
72 }
73 
74 static char *
75 upper(const char *str)
76 {
77 	static char buf[80];
78 	char *s;
79 
80 	strlcpy(buf, str, sizeof(buf));
81 	for (s = buf; *s; s++)
82 		*s = toupper((unsigned char)*s);
83 	return buf;
84 }
85 
86 
87 static void
88 printsig(FILE *fp)
89 {
90 	const char	*const * p;
91 	int		cnt;
92 	int		offset = 0;
93 
94 	for (cnt = NSIG, p = sys_signame + 1; --cnt; ++p) {
95 		offset += fprintf(fp, "%s ", upper(*p));
96 		if (offset >= 75 && cnt > 1) {
97 			offset = 0;
98 			fprintf(fp, "\n");
99 		}
100 	}
101 	fprintf(fp, "\n");
102 }
103 
104 static void
105 nosig(char *name)
106 {
107 
108 	warnx("unknown signal %s; valid signals:", name);
109 	printsig(stderr);
110 	exit(1);
111 }
112 
113 int
114 main(int ac, char **av)
115 {
116 	struct kinfo_proc *procs = NULL, *newprocs;
117 	struct pchain 	*mychain;
118 	struct stat	sb;
119 	struct passwd	*pw;
120 	regex_t		rgx;
121 	regmatch_t	pmatch;
122 	int		i, j;
123 	char		buf[256];
124 	char		*user = NULL;
125 	char		*tty = NULL;
126 	char		*cmd = NULL;
127 	int		qflag = 0;
128 	int		vflag = 0;
129 	int		sflag = 0;
130 	int		jflag = 0, jailid = 0;
131 	int		dflag = 0;
132 	int		mflag = 0;
133 	int		Tflag = 0;
134 	uid_t		uid = 0;
135 	dev_t		tdev = 0;
136 	pid_t		mypid;
137 	char		thiscmd[MAXCOMLEN + 1];
138 	pid_t		thispid;
139 	uid_t		thisuid;
140 	dev_t		thistdev;
141 	int		sig = SIGTERM;
142 	const char *const *p;
143 	char		*ep;
144 	int		errors = 0;
145 	int		mib[4];
146 	size_t		miblen;
147 	int		st, nprocs;
148 	size_t		size;
149 	int		matched;
150 	int		killed = 0;
151 
152 	prog = av[0];
153 	av++;
154 	ac--;
155 
156 	while (ac > 0) {
157 		if (strcmp(*av, "-l") == 0) {
158 			printsig(stdout);
159 			exit(0);
160 		}
161 		if (strcmp(*av, "-help") == 0)
162 			usage();
163 		if (**av == '-') {
164 			++*av;
165 			switch (**av) {
166 			case 'h':
167 			case '?':
168 				usage();
169 				/* NOTREACHED */
170 			case 'u':
171 				++*av;
172 				if (**av == '\0')
173 					++av;
174 				--ac;
175 				user = *av;
176 				break;
177 			case 't':
178 				++*av;
179 				if (**av == '\0')
180 					++av;
181 				--ac;
182 				tty = *av;
183 				break;
184 			case 'c':
185 				++*av;
186 				if (**av == '\0')
187 					++av;
188 				--ac;
189 				cmd = *av;
190 				break;
191 			case 'j':
192 			{
193 				const char *errstr;
194 				++*av;
195 				if (**av == '\0')
196 					++av;
197 				--ac;
198 				jailid = strtonum(*av, 1, INT_MAX, &errstr);
199 
200 				if (errstr)
201 					errx(1, "jail id is %s: %s", errstr, *av);
202 				jflag++;
203 				break;
204 			}
205 			case 'q':
206 				qflag++;
207 				break;
208 			case 'v':
209 				vflag++;
210 				break;
211 			case 's':
212 				sflag++;
213 				break;
214 			case 'd':
215 				dflag++;
216 				break;
217 			case 'm':
218 				mflag++;
219 				break;
220 			case 'T':
221 				Tflag++;
222 				break;
223 			default:
224 				if (isalpha((unsigned char)**av)) {
225 					if (strncasecmp(*av, "sig", 3) == 0)
226 						*av += 3;
227 					for (sig = NSIG, p = sys_signame + 1;
228 					     --sig; ++p)
229 						if (strcasecmp(*p, *av) == 0) {
230 							sig = p - sys_signame;
231 							break;
232 						}
233 					if (!sig)
234 						nosig(*av);
235 				} else if (isdigit((unsigned char)**av)) {
236 					sig = strtol(*av, &ep, 10);
237 					if (!*av || *ep)
238 						errx(1, "illegal signal number: %s", *av);
239 					if (sig < 0 || sig >= NSIG)
240 						nosig(*av);
241 				} else
242 					nosig(*av);
243 			}
244 			++av;
245 			--ac;
246 		} else {
247 			break;
248 		}
249 	}
250 
251 	if (user == NULL && tty == NULL && cmd == NULL &&
252 	    jflag == 0 && Tflag == 0 && ac == 0) {
253 		usage();
254 	}
255 
256 	if (Tflag) {
257 		tty = ttyname(0);
258 		if (tty)
259 			tty = strdup(tty);
260 	}
261 
262 	if (tty) {
263 		if (strncmp(tty, "/dev/", 5) == 0)
264 			snprintf(buf, sizeof(buf), "%s", tty);
265 		else if (strncmp(tty, "tty", 3) == 0)
266 			snprintf(buf, sizeof(buf), "/dev/%s", tty);
267 		else if (isdigit(tty[0]))
268 			snprintf(buf, sizeof(buf), "/dev/pts/%s", tty);
269 		else
270 			snprintf(buf, sizeof(buf), "/dev/tty%s", tty);
271 		if (stat(buf, &sb) < 0)
272 			err(1, "stat(%s)", buf);
273 		if (!S_ISCHR(sb.st_mode))
274 			errx(1, "%s: not a character device", buf);
275 		tdev = sb.st_rdev;
276 		if (dflag)
277 			printf("ttydev:0x%x\n", tdev);
278 	}
279 	if (user) {
280 		pw = getpwnam(user);
281 		if (pw == NULL)
282 			errx(1, "user %s does not exist", user);
283 		uid = pw->pw_uid;
284 		if (dflag)
285 			printf("uid:%d\n", uid);
286 	} else {
287 		uid = getuid();
288 		if (uid != 0) {
289 			pw = getpwuid(uid);
290 			if (pw)
291 				user = pw->pw_name;
292 			if (dflag)
293 				printf("uid:%d\n", uid);
294 		}
295 	}
296 	size = 0;
297 	mib[0] = CTL_KERN;
298 	mib[1] = KERN_PROC;
299 	mib[2] = KERN_PROC_ALL;
300 	mib[3] = 0;
301 	miblen = 3;
302 
303 	if (user && mib[2] == KERN_PROC_ALL) {
304 		mib[2] = KERN_PROC_RUID;
305 		mib[3] = uid;
306 		miblen = 4;
307 	}
308 	if (tty && mib[2] == KERN_PROC_ALL) {
309 		mib[2] = KERN_PROC_TTY;
310 		mib[3] = tdev;
311 		miblen = 4;
312 	}
313 
314 	st = sysctl(mib, miblen, NULL, &size, NULL, 0);
315 	do {
316 		size += size / 10;
317 		newprocs = realloc(procs, size);
318 		if (newprocs == NULL) {
319 			if (procs)
320 				free(procs);
321 			errx(1, "could not reallocate memory");
322 		}
323 		procs = newprocs;
324 		st = sysctl(mib, miblen, procs, &size, NULL, 0);
325 	} while (st == -1 && errno == ENOMEM);
326 	if (st == -1)
327 		err(1, "could not sysctl(KERN_PROC)");
328 	if (size % sizeof(struct kinfo_proc) != 0) {
329 		fprintf(stderr, "proc size mismatch (%zu total, %zu chunks)\n",
330 			size, sizeof(struct kinfo_proc));
331 		fprintf(stderr, "userland out of sync with kernel, recompile libkvm etc\n");
332 		exit(1);
333 	}
334 	nprocs = size / sizeof(struct kinfo_proc);
335 	if (dflag)
336 		printf("nprocs %d\n", nprocs);
337 	mypid = getpid();
338 
339 	/*
340 	 * Record parent chain if Tflag
341 	 */
342 	if (Tflag && tty)
343 		mychain = saveparents(procs, nprocs, mypid);
344 	else
345 		mychain = NULL;
346 
347 	/*
348 	 * Final scan
349 	 */
350 	for (i = 0; i < nprocs; i++) {
351 		thispid = procs[i].kp_pid;
352 		strncpy(thiscmd, procs[i].kp_comm, MAXCOMLEN);
353 		thiscmd[MAXCOMLEN] = '\0';
354 		thistdev = procs[i].kp_tdev;
355 		thisuid = procs[i].kp_ruid;	/* real uid */
356 
357 		if (thispid == mypid)
358 			continue;
359 		matched = 1;
360 		if ((int)procs[i].kp_pid < 0)
361 			matched = 0;
362 		if (user) {
363 			if (thisuid != uid)
364 				matched = 0;
365 		}
366 		if (tty) {
367 			if (thistdev != tdev)
368 				matched = 0;
369 			if (Tflag && checkparent(mychain, procs[i].kp_pid))
370 				matched = 0;
371 		}
372 		if (jflag) {
373 			if (procs[i].kp_jailid != jailid)
374 				matched = 0;
375 		}
376 		if (cmd) {
377 			if (mflag) {
378 				if (regcomp(&rgx, cmd,
379 				    REG_EXTENDED|REG_NOSUB) != 0) {
380 					mflag = 0;
381 					warnx("%s: illegal regexp", cmd);
382 				}
383 			}
384 			if (mflag) {
385 				pmatch.rm_so = 0;
386 				pmatch.rm_eo = strlen(thiscmd);
387 				if (regexec(&rgx, thiscmd, 0, &pmatch,
388 				    REG_STARTEND) != 0)
389 					matched = 0;
390 				regfree(&rgx);
391 			} else {
392 				if (strcmp(thiscmd, cmd) != 0)
393 					matched = 0;
394 			}
395 		}
396 		if (matched == 0)
397 			continue;
398 		if (ac > 0) {
399 			matched = 0;
400 			for (j = 0; j < ac; j++) {
401 				if (mflag) {
402 					if (regcomp(&rgx, av[j],
403 					    REG_EXTENDED|REG_NOSUB) != 0) {
404 						mflag = 0;
405 						warnx("%s: illegal regexp", av[j]);
406 					}
407 				}
408 				if (mflag) {
409 					pmatch.rm_so = 0;
410 					pmatch.rm_eo = strlen(thiscmd);
411 					if (regexec(&rgx, thiscmd, 0, &pmatch,
412 					    REG_STARTEND) == 0)
413 						matched = 1;
414 					regfree(&rgx);
415 				} else {
416 					if (strcmp(thiscmd, av[j]) == 0)
417 						matched = 1;
418 				}
419 				if (matched)
420 					break;
421 			}
422 			if (matched == 0)
423 				continue;
424 		}
425 		if (dflag)
426 			printf("sig:%d, cmd:%s, pid:%d, dev:0x%x uid:%d\n", sig,
427 			    thiscmd, thispid, thistdev, thisuid);
428 
429 		if (vflag || sflag)
430 			printf("kill -%s %d\n", upper(sys_signame[sig]),
431 			    thispid);
432 
433 		killed++;
434 		if (!dflag && !sflag) {
435 			if (kill(thispid, sig) < 0 /* && errno != ESRCH */ ) {
436 				warn("kill -%s %d", upper(sys_signame[sig]),
437 				    thispid);
438 				errors = 1;
439 			}
440 		}
441 	}
442 	if (!qflag && killed == 0) {
443 		fprintf(stderr, "No matching processes %swere found\n",
444 		    getuid() != 0 ? "belonging to you " : "");
445 		errors = 1;
446 	}
447 	exit(errors);
448 }
449 
450 
451 static
452 struct pchain *
453 saveparents(struct kinfo_proc *procs, int nprocs, pid_t mypid)
454 {
455 	struct pchain *rchain = NULL;
456 	struct pchain *chain;
457 	struct pchain *pchain;
458 	int	i;
459 	int	hv;
460 
461 	for (i = 0; i < nprocs; ++i) {
462 		if ((int)procs[i].kp_pid < 0)
463 			continue;
464 		hv = (int)procs[i].kp_pid & 1023;
465 		chain = malloc(sizeof(*chain));
466 		chain->proc = &procs[i];
467 		chain->parent = NULL;
468 		chain->next = phash[hv];
469 		phash[hv] = chain;
470 		if (mypid == procs[i].kp_pid)
471 			rchain = chain;
472 	}
473 	for (i = 0; i < nprocs; ++i) {
474 		if ((int)procs[i].kp_pid < 0)
475 			continue;
476 		if ((int)procs[i].kp_ppid < 0)
477 			continue;
478 		hv = (int)procs[i].kp_pid & 1023;
479 		for (chain = phash[hv]; chain; chain = chain->next) {
480 			if (chain->proc->kp_pid == procs[i].kp_pid)
481 				break;
482 		}
483 		hv = (int)procs[i].kp_ppid & 1023;
484 		for (pchain = phash[hv]; pchain; pchain = pchain->next) {
485 			if (pchain->proc->kp_pid == procs[i].kp_ppid) {
486 				if (chain)
487 					chain->parent = pchain;
488 				break;
489 			}
490 		}
491 	}
492 	return (rchain);
493 }
494 
495 static
496 int
497 checkparent(struct pchain *chain, pid_t pid)
498 {
499 	while (chain) {
500 		if (chain->proc->kp_pid == pid)
501 			return(1);
502 		chain = chain->parent;
503 	}
504 	return(0);
505 }
506