2 * kilall5.c Kill all processes except processes that have the
3 * same session id, so that the shell that called us
4 * won't be killed. Typically used in shutdown scripts.
6 * pidof.c Tries to get the pid of the process[es] named.
8 * Version: 2.86 30-Jul-2004 MvS
10 * Usage: killall5 [-][signal]
11 * pidof [-s] [-o omitpid [-o omitpid]] program [program..]
13 * Authors: Miquel van Smoorenburg, miquels@cistron.nl
15 * Riku Meskanen, <mesrik@jyu.fi>
16 * - return all running pids of given program name
17 * - single shot '-s' option for backwards combatibility
18 * - omit pid '-o' option and %PPID (parent pid metavariable)
19 * - syslog() only if not a connected to controlling terminal
20 * - swapped out programs pids are caught now
24 * - provide '-n' to skip stat(2) syscall on network based FS
26 * This file is part of the sysvinit suite,
27 * Copyright (C) 1991-2004 Miquel van Smoorenburg.
29 * This program is free software; you can redistribute it and/or modify
30 * it under the terms of the GNU General Public License as published by
31 * the Free Software Foundation; either version 2 of the License, or
32 * (at your option) any later version.
34 * This program is distributed in the hope that it will be useful,
35 * but WITHOUT ANY WARRANTY; without even the implied warranty of
36 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
37 * GNU General Public License for more details.
39 * You should have received a copy of the GNU General Public License
40 * along with this program; if not, write to the Free Software
41 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
55 #include <sys/param.h>
57 #include <sys/types.h>
61 char *Version
= "@(#)killall5 2.86 31-Jul-2004 miquels@cistron.nl";
65 # define PATH_MAX MAXPATHLEN
67 # define PATH_MAX 2048
71 #define STATNAMELEN 15
76 /* Info about a process. */
78 char *pathname
; /* full path to executable */
79 char *argv0
; /* Name as found out from argv[0] */
80 char *argv0base
; /* `basename argv[1]` */
81 char *argv1
; /* Name as found out from argv[1] */
82 char *argv1base
; /* `basename argv[1]` */
83 char *statname
; /* the statname without braces */
84 ino_t ino
; /* Inode number */
85 dev_t dev
; /* Device it is on */
86 pid_t pid
; /* Process ID. */
87 pid_t sid
; /* Session ID. */
88 char kernel
; /* Kernel thread or zombie. */
89 char nfs
; /* Name found on network FS. */
90 struct proc
*next
; /* Pointer to next struct. */
106 typedef struct _s_omit
{
107 struct _s_omit
*next
;
108 struct _s_omit
*prev
;
112 typedef struct _s_shadow
114 struct _s_shadow
*next
;
115 struct _s_shadow
*prev
;
120 typedef struct _s_nfs
122 struct _s_nfs
*next
; /* Pointer to next struct. */
123 struct _s_nfs
*prev
; /* Pointer to previous st. */
124 SHADOW
*shadow
; /* Pointer to shadows */
129 /* List of processes. */
132 /* List of processes to omit. */
135 /* List of NFS mountes partitions. */
138 /* Did we stop all processes ? */
143 char *progname
; /* the name of the running program */
145 __attribute__ ((format (printf
, 2, 3)))
147 void nsyslog(int pri
, char *fmt
, ...);
149 #if !defined(__STDC_VERSION__) || (__STDC_VERSION__ < 199901L)
151 # define inline __inline__
154 # define restrict __restrict__
157 #define alignof(type) ((sizeof(type)+(sizeof(void*)-1)) & ~(sizeof(void*)-1))
160 * Malloc space, barf if out of memory.
163 static void *xmalloc(size_t) __attribute__ ((__malloc__
));
165 static void *xmalloc(size_t bytes
)
169 if ((p
= malloc(bytes
)) == NULL
) {
170 if (sent_sigstop
) kill(-1, SIGCONT
);
171 nsyslog(LOG_ERR
, "out of memory");
178 static inline void xmemalign(void **, size_t, size_t) __attribute__ ((__nonnull__ (1)));
180 static inline void xmemalign(void **memptr
, size_t alignment
, size_t size
)
182 if ((posix_memalign(memptr
, alignment
, size
)) < 0) {
183 if (sent_sigstop
) kill(-1, SIGCONT
);
184 nsyslog(LOG_ERR
, "out of memory");
190 * See if the proc filesystem is there. Mount if needed.
195 char *args
[] = { "mount", "-t", "proc", "proc", "/proc", 0 };
200 /* Stat /proc/version to see if /proc is mounted. */
201 if (stat("/proc/version", &st
) < 0 && errno
== ENOENT
) {
203 /* It's not there, so mount it. */
204 if ((pid
= fork()) < 0) {
205 nsyslog(LOG_ERR
, "cannot fork");
209 /* Try a few mount binaries. */
210 execv("/bin/mount", args
);
211 execv("/sbin/mount", args
);
213 /* Okay, I give up. */
214 nsyslog(LOG_ERR
, "cannot execute mount");
217 /* Wait for child. */
218 while ((rc
= wait(&wst
)) != pid
)
219 if (rc
< 0 && errno
== ECHILD
)
221 if (rc
!= pid
|| WEXITSTATUS(wst
) != 0)
222 nsyslog(LOG_ERR
, "mount returned non-zero exit status");
227 /* See if mount succeeded. */
228 if (stat("/proc/version", &st
) < 0) {
230 nsyslog(LOG_ERR
, "/proc not mounted, failed to mount.");
232 nsyslog(LOG_ERR
, "/proc unavailable.");
239 static inline int isnetfs(const char * type
)
241 static const char* netfs
[] = {"nfs", "nfs4", "smbfs", "cifs", "afs", "ncpfs", (char*)0};
243 for (n
= 0; netfs
[n
]; n
++) {
244 if (!strcasecmp(netfs
[n
], type
))
251 * Remember all NFS typed partitions.
261 if (stat("/proc/version", &st
) < 0)
263 if ((mnt
= setmntent("/proc/mounts", "r")) == (FILE*)0)
266 while ((ent
= getmntent(mnt
))) {
267 if (isnetfs(ent
->mnt_type
)) {
268 size_t nlen
= strlen(ent
->mnt_dir
);
270 xmemalign((void*)&p
, sizeof(void*), alignof(NFS
)+(nlen
+1));
271 p
->name
= ((char*)p
)+alignof(NFS
);
273 p
->shadow
= (SHADOW
*)0;
275 strcpy(p
->name
, ent
->mnt_dir
);
285 if ((mnt
= setmntent("/proc/mounts", "r")) == (FILE*)0)
288 while ((ent
= getmntent(mnt
))) {
291 for (p
= nlist
; p
; p
= p
->next
) {
295 if (strcmp(ent
->mnt_dir
, p
->name
) == 0)
297 if (strncmp(ent
->mnt_dir
, p
->name
, p
->nlen
) != 0)
300 nlen
= strlen(ent
->mnt_dir
);
301 xmemalign((void*)&s
, sizeof(void*), alignof(SHADOW
)+(nlen
+1));
302 s
->name
= ((char*)s
)+alignof(SHADOW
);
305 strcpy(s
->name
, ent
->mnt_dir
);
309 s
->prev
= (SHADOW
*)0;
316 static void clear_shadow(SHADOW
*restrict shadow
)
322 for (s
= shadow
; n
; s
= n
) {
326 if (n
) n
->prev
= (SHADOW
*)0;
336 static void clear_mnt(void)
342 for (p
= nlist
; n
; p
= n
) {
346 if (n
) n
->prev
= (NFS
*)0;
353 clear_shadow(p
->shadow
);
359 * Check if path is a shadow off a NFS partition.
361 static int shadow(SHADOW
*restrict
this, const char *restrict name
, const size_t nlen
)
367 for (s
= this; s
; s
= s
->next
) {
370 if (name
[s
->nlen
] != '\0' && name
[s
->nlen
] != '/')
372 if (strncmp(name
, s
->name
, s
->nlen
) == 0)
380 * Check path is located on a network based partition.
382 int check4nfs(const char * path
, char * real
)
384 char buf
[PATH_MAX
+1];
386 int deep
= MAXSYMLINKS
;
388 if (!nlist
) return 0;
395 if ((prev
= strdupa(curr
)) == NULL
) {
396 nsyslog(LOG_ERR
, "strdupa(): %s\n", strerror(errno
));
401 if ((len
= readlink(curr
, buf
, PATH_MAX
)) < 0)
408 if ((slash
= strrchr(prev
, '/'))) {
409 size_t off
= slash
- prev
+ 1;
411 if (off
+ len
> PATH_MAX
)
412 len
= PATH_MAX
- off
;
414 memmove(&buf
[off
], &buf
[0], len
+ 1);
415 memcpy(&buf
[0], prev
, off
);
420 if (deep
-- <= 0) return 0;
424 if (real
) strcpy(real
, curr
);
426 if (errno
== EINVAL
) {
427 const size_t nlen
= strlen(curr
);
429 for (p
= nlist
; p
; p
= p
->next
) {
432 if (curr
[p
->nlen
] != '\0' && curr
[p
->nlen
] != '/')
434 if (!strncmp(curr
, p
->name
, p
->nlen
)) {
435 if (shadow(p
->shadow
, curr
, nlen
))
445 int readarg(FILE *fp
, char *buf
, int sz
)
449 while (f
< (sz
-1) && (c
= fgetc(fp
)) != EOF
&& c
)
453 return (c
== EOF
&& f
== 0) ? c
: f
;
457 * Read the proc filesystem.
458 * CWD must be /proc to avoid problems if / is affected by the killing (ie depend on fuse).
460 int readproc(int do_stat
)
467 char path
[PATH_MAX
+1];
468 char buf
[PATH_MAX
+1];
470 unsigned long startcode
, endcode
;
474 /* Open the /proc directory. */
475 if (chdir("/proc") == -1) {
476 nsyslog(LOG_ERR
, "chdir /proc failed");
479 if ((dir
= opendir(".")) == NULL
) {
480 nsyslog(LOG_ERR
, "cannot opendir(/proc)");
484 /* Free the already existing process list. */
486 for (p
= plist
; n
; p
= n
) {
488 if (p
->argv0
) free(p
->argv0
);
489 if (p
->argv1
) free(p
->argv1
);
490 if (p
->statname
) free(p
->statname
);
496 /* Walk through the directory. */
497 while ((d
= readdir(dir
)) != NULL
) {
499 /* See if this is a process */
500 if ((pid
= atoi(d
->d_name
)) == 0) continue;
502 /* Get a PROC struct . */
503 p
= (PROC
*)xmalloc(sizeof(PROC
));
504 memset(p
, 0, sizeof(PROC
));
506 /* Open the status file. */
507 snprintf(path
, sizeof(path
), "%s/stat", d
->d_name
);
509 /* Read SID & statname from it. */
510 if ((fp
= fopen(path
, "r")) != NULL
) {
511 if (!fgets(buf
, sizeof(buf
), fp
))
514 if (buf
[0] == '\0') {
516 "can't read from %s\n", path
);
522 /* See if name starts with '(' */
524 while (*s
&& *s
!= ' ') s
++;
527 /* Read program name. */
528 q
= strrchr(buf
, ')');
532 "can't get program name from /proc/%s\n",
535 if (p
->argv0
) free(p
->argv0
);
536 if (p
->argv1
) free(p
->argv1
);
537 if (p
->statname
) free(p
->statname
);
545 while (*q
&& *q
!= ' ') q
++;
548 while (*q
== ' ') q
++;
549 p
->statname
= (char *)xmalloc(strlen(s
)+1);
550 strcpy(p
->statname
, s
);
552 /* Get session, startcode, endcode. */
553 startcode
= endcode
= 0;
554 if (sscanf(q
, "%*c %*d %*d %d %*d %*d %*u %*u "
555 "%*u %*u %*u %*u %*u %*d %*d "
556 "%*d %*d %*d %*d %*u %*u %*d "
558 &p
->sid
, &startcode
, &endcode
) != 3) {
560 nsyslog(LOG_ERR
, "can't read sid from %s\n",
563 if (p
->argv0
) free(p
->argv0
);
564 if (p
->argv1
) free(p
->argv1
);
565 if (p
->statname
) free(p
->statname
);
570 if (startcode
== 0 && endcode
== 0)
574 /* Process disappeared.. */
575 if (p
->argv0
) free(p
->argv0
);
576 if (p
->argv1
) free(p
->argv1
);
577 if (p
->statname
) free(p
->statname
);
583 snprintf(path
, sizeof(path
), "%s/cmdline", d
->d_name
);
584 if ((fp
= fopen(path
, "r")) != NULL
) {
586 /* Now read argv[0] */
587 f
= readarg(fp
, buf
, sizeof(buf
));
590 /* Store the name into malloced memory. */
591 p
->argv0
= (char *)xmalloc(f
+ 1);
592 strcpy(p
->argv0
, buf
);
594 /* Get a pointer to the basename. */
595 p
->argv0base
= strrchr(p
->argv0
, '/');
596 if (p
->argv0base
!= NULL
)
599 p
->argv0base
= p
->argv0
;
602 /* And read argv[1] */
603 while ((f
= readarg(fp
, buf
, sizeof(buf
))) != EOF
)
604 if (buf
[0] != '-') break;
607 /* Store the name into malloced memory. */
608 p
->argv1
= (char *)xmalloc(f
+ 1);
609 strcpy(p
->argv1
, buf
);
611 /* Get a pointer to the basename. */
612 p
->argv1base
= strrchr(p
->argv1
, '/');
613 if (p
->argv1base
!= NULL
)
616 p
->argv1base
= p
->argv1
;
622 /* Process disappeared.. */
623 if (p
->argv0
) free(p
->argv0
);
624 if (p
->argv1
) free(p
->argv1
);
625 if (p
->statname
) free(p
->statname
);
631 /* Try to stat the executable. */
632 snprintf(path
, sizeof(path
), "/proc/%s/exe", d
->d_name
);
638 if ((p
->nfs
= check4nfs(path
, buf
)))
641 if (stat(path
, &st
) != 0)
649 len
= readlink(path
, buf
, PATH_MAX
);
651 p
->pathname
= (char *)xmalloc(len
+ 1);
652 memcpy(p
->pathname
, buf
, len
);
653 p
->pathname
[len
] = '\0';
658 /* Link it into the list. */
669 PIDQ_HEAD
*init_pid_q(PIDQ_HEAD
*q
)
671 q
->head
= q
->next
= q
->tail
= NULL
;
675 int empty_q(PIDQ_HEAD
*q
)
677 return (q
->head
== NULL
);
680 int add_pid_to_q(PIDQ_HEAD
*q
, PROC
*p
)
684 tmp
= (PIDQ
*)xmalloc(sizeof(PIDQ
));
699 PROC
*get_next_from_pid_q(PIDQ_HEAD
*q
)
714 /* Try to get the process ID of a given process. */
715 PIDQ_HEAD
*pidof(char *prog
)
725 const int root
= (getuid() == 0);
726 char real
[PATH_MAX
+1];
731 /* Try to stat the executable. */
732 if (prog
[0] == '/') {
733 memset(&real
[0], 0, sizeof(real
));
735 if (check4nfs(prog
, real
))
739 prog
= &real
[0]; /* Binary located on network FS. */
741 if ((nfs
== 0) && (stat(prog
, &st
) == 0))
742 dostat
++; /* Binary located on a local FS. */
745 /* Get basename of program. */
746 if ((s
= strrchr(prog
, '/')) == NULL
)
754 q
= (PIDQ_HEAD
*)xmalloc(sizeof(PIDQ_HEAD
));
757 /* First try to find a match based on dev/ino pair. */
758 if (dostat
&& !nfs
) {
759 for (p
= plist
; p
; p
= p
->next
) {
762 if (p
->dev
== st
.st_dev
&& p
->ino
== st
.st_ino
) {
769 /* Second try to find a match based on full path name on
770 * network FS located binaries */
771 if (!foundone
&& nfs
) {
772 for (p
= plist
; p
; p
= p
->next
) {
777 if (strcmp(prog
, p
->pathname
) != 0)
784 /* If we didn't find a match based on dev/ino, try the name. */
785 if (!foundone
) for (p
= plist
; p
; p
= p
->next
) {
786 if (prog
[0] == '/') {
792 if (strcmp(prog
, p
->pathname
)) {
793 int len
= strlen(prog
);
794 if (strncmp(prog
, p
->pathname
, len
))
800 if (strcmp(" (deleted)", p
->pathname
+ len
))
814 /* matching nonmatching
815 * proc name prog name prog name
816 * --- ----------- ------------
820 * Algorithm: Match if:
825 * Specifically, do not match just because base(cmd) = base(arg)
826 * as was done in earlier versions of this program, since this
827 * allows /aaa/foo to match /bbb/foo .
830 (p
->argv0
&& strcmp(p
->argv0
, prog
) == 0)
831 || (p
->argv0
&& s
!= prog
&& strcmp(p
->argv0
, s
) == 0)
832 || (p
->argv0base
&& strcmp(p
->argv0base
, prog
) == 0);
834 /* For scripts, compare argv[1] as well. */
836 scripts_too
&& p
->statname
&& p
->argv1base
837 && !strncmp(p
->statname
, p
->argv1base
, STATNAMELEN
)
840 (p
->argv1
&& strcmp(p
->argv1
, prog
) == 0)
841 || (p
->argv1
&& s
!= prog
&& strcmp(p
->argv1
, s
) == 0)
842 || (p
->argv1base
&& strcmp(p
->argv1base
, prog
) == 0);
846 * if we have a space in argv0, process probably
847 * used setproctitle so try statname.
849 if (strlen(s
) <= STATNAMELEN
&&
852 strchr(p
->argv0
, ' '))) {
853 ok
|= (strcmp(p
->statname
, s
) == 0);
857 * if we have a `-' as the first character, process
858 * probably used as a login shell
860 if (strlen(s
) <= STATNAMELEN
&&
863 p
->argv0
[0] == '-')) {
864 ok
|= (strcmp(p
->statname
, s
) == 0);
867 if (ok
) add_pid_to_q(q
, p
);
873 /* Give usage message and exit. */
876 nsyslog(LOG_ERR
, "only one argument, a signal number, allowed");
881 /* write to syslog file if not open terminal */
883 __attribute__ ((format (printf
, 2, 3)))
885 void nsyslog(int pri
, char *fmt
, ...)
891 if (ttyname(0) == NULL
) {
892 vsyslog(pri
, fmt
, args
);
894 fprintf(stderr
, "%s: ",progname
);
895 vfprintf(stderr
, fmt
, args
);
896 fprintf(stderr
, "\n");
902 #define PIDOF_SINGLE 0x01
903 #define PIDOF_OMIT 0x02
904 #define PIDOF_NETFS 0x04
907 * Pidof functionality.
909 int main_pidof(int argc
, char **argv
)
917 int chroot_check
= 0;
925 if ((token
= getenv("PIDOF_NETFS")) && (strcmp(token
,"no") != 0))
926 flags
|= PIDOF_NETFS
;
928 while ((opt
= getopt(argc
,argv
,"hco:sxn")) != EOF
) switch (opt
) {
930 nsyslog(LOG_ERR
,"invalid options on command line!\n");
934 if (geteuid() == 0) chroot_check
= 1;
938 while ((token
= strsep(&here
, ",;:"))) {
942 if (strcmp("%PPID", token
) == 0)
945 opid
= (pid_t
)atoi(token
);
949 "illegal omit pid value "
953 xmemalign((void*)&optr
, sizeof(void*), alignof(OMIT
));
955 optr
->prev
= (OMIT
*)0;
962 flags
|= PIDOF_SINGLE
;
968 flags
|= PIDOF_NETFS
;
977 /* Check if we are in a chroot */
979 snprintf(tmp
, 512, "/proc/%d/root", getpid());
980 if (stat(tmp
, &st
) < 0) {
981 nsyslog(LOG_ERR
, "stat failed for %s!\n", tmp
);
987 if (flags
& PIDOF_NETFS
)
988 init_nfs(); /* Which network based FS are online? */
990 /* Print out process-ID's one by one. */
991 readproc((flags
& PIDOF_NETFS
) ? DO_NETFS
: DO_STAT
);
993 for(f
= 0; f
< argc
; f
++) {
994 if ((q
= pidof(argv
[f
])) != NULL
) {
996 while ((p
= get_next_from_pid_q(q
))) {
997 if ((flags
& PIDOF_OMIT
) && omit
) {
999 for (optr
= omit
; optr
; optr
= optr
->next
) {
1000 if (optr
->pid
== p
->pid
)
1005 * On a match, continue with
1006 * the for loop above.
1011 if (flags
& PIDOF_SINGLE
) {
1019 snprintf(tmp
, 512, "/proc/%d/root",
1021 if (stat(tmp
, &st2
) < 0 ||
1022 st
.st_dev
!= st2
.st_dev
||
1023 st
.st_ino
!= st2
.st_ino
) {
1029 printf("%d", p
->pid
);
1040 return(first ?
1 : 0);
1043 /* Main for either killall or pidof. */
1044 int main(int argc
, char **argv
)
1051 /* return non-zero if no process was killed */
1054 /* Get program name. */
1055 if ((progname
= strrchr(argv
[0], '/')) == NULL
)
1060 /* Now connect to syslog. */
1061 openlog(progname
, LOG_CONS
|LOG_PID
, LOG_DAEMON
);
1063 /* Were we called as 'pidof' ? */
1064 if (strcmp(progname
, "pidof") == 0)
1065 return main_pidof(argc
, argv
);
1067 /* Right, so we are "killall". */
1071 for (c
= 1; c
< argc
; c
++) {
1072 if (argv
[c
][0] == '-') (argv
[c
])++;
1073 if (argv
[c
][0] == 'o') {
1074 char * token
, * here
;
1080 while ((token
= strsep(&here
, ",;:"))) {
1081 OMIT
*restrict optr
;
1082 pid_t opid
= (pid_t
)atoi(token
);
1086 "illegal omit pid value "
1090 xmemalign((void*)&optr
, sizeof(void*), alignof(OMIT
));
1092 optr
->prev
= (OMIT
*)0;
1097 else if ((sig
= atoi(argv
[1])) <= 0 || sig
> 31)
1102 /* First get the /proc filesystem online. */
1106 * Ignoring SIGKILL and SIGSTOP do not make sense, but
1107 * someday kill(-1, sig) might kill ourself if we don't
1108 * do this. This certainly is a valid concern for SIGTERM-
1109 * Linux 2.1 might send the calling process the signal too.
1111 signal(SIGTERM
, SIG_IGN
);
1112 signal(SIGSTOP
, SIG_IGN
);
1113 signal(SIGKILL
, SIG_IGN
);
1115 /* lock us into memory */
1116 mlockall(MCL_CURRENT
| MCL_FUTURE
);
1118 /* Now stop all processes. */
1122 /* Read /proc filesystem */
1123 if (readproc(NO_STAT
) < 0) {
1128 /* Now kill all processes except init (pid 1) and our session. */
1129 sid
= (int)getsid(0);
1130 pid
= (int)getpid();
1131 for (p
= plist
; p
; p
= p
->next
) {
1132 if (p
->pid
== 1 || p
->pid
== pid
|| p
->sid
== sid
|| p
->kernel
)
1137 for (optr
= omit
; optr
; optr
= optr
->next
) {
1138 if (optr
->pid
== p
->pid
)
1142 /* On a match, continue with the for loop above. */
1151 /* And let them continue. */
1157 /* Force the kernel to run the scheduler */