2002-02-02 06:47:29 +08:00
|
|
|
/* emacs settings: -*- c-basic-offset: 8 tab-width: 8 -*-
|
|
|
|
*
|
|
|
|
* pgrep/pkill -- utilities to filter the process table
|
|
|
|
*
|
|
|
|
* Copyright 2000 Kjetil Torgrim Homme <kjetilho@ifi.uio.no>
|
|
|
|
*
|
|
|
|
* May be distributed under the conditions of the
|
|
|
|
* GNU General Public License; a copy is in COPYING
|
2002-12-15 08:30:17 +08:00
|
|
|
*
|
2006-06-19 07:19:30 +08:00
|
|
|
* Changes by Albert Cahalan, 2002,2006.
|
2002-12-15 08:30:17 +08:00
|
|
|
*
|
2002-02-02 06:47:29 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <stdlib.h>
|
2002-10-23 15:53:16 +08:00
|
|
|
#include <limits.h>
|
2002-02-02 06:47:29 +08:00
|
|
|
#include <unistd.h>
|
|
|
|
#include <ctype.h>
|
|
|
|
#include <string.h>
|
|
|
|
#include <sys/types.h>
|
2006-06-21 13:45:16 +08:00
|
|
|
#include <sys/stat.h>
|
|
|
|
#include <fcntl.h>
|
2002-02-02 06:47:29 +08:00
|
|
|
#include <signal.h>
|
|
|
|
#include <pwd.h>
|
|
|
|
#include <grp.h>
|
|
|
|
#include <regex.h>
|
|
|
|
#include <errno.h>
|
2011-09-27 04:03:43 +08:00
|
|
|
#include <getopt.h>
|
2002-02-02 06:47:29 +08:00
|
|
|
|
2011-10-10 03:29:26 +08:00
|
|
|
// EXIT_SUCCESS is 0
|
|
|
|
// EXIT_FAILURE is 1
|
|
|
|
#define EXIT_USAGE 2
|
|
|
|
#define EXIT_FATAL 3
|
|
|
|
#define XALLOC_EXIT_CODE EXIT_FATAL
|
|
|
|
|
2011-10-09 07:29:43 +08:00
|
|
|
#include "c.h"
|
|
|
|
#include "nls.h"
|
2011-10-10 03:29:26 +08:00
|
|
|
#include "xalloc.h"
|
2002-02-02 06:47:29 +08:00
|
|
|
#include "proc/readproc.h"
|
|
|
|
#include "proc/sig.h"
|
|
|
|
#include "proc/devname.h"
|
|
|
|
#include "proc/sysinfo.h"
|
2002-10-04 07:08:14 +08:00
|
|
|
#include "proc/version.h" /* procps_version */
|
2002-02-02 06:47:29 +08:00
|
|
|
|
|
|
|
static int i_am_pkill = 0;
|
|
|
|
|
2012-01-21 20:24:02 +08:00
|
|
|
struct el {
|
2002-02-02 06:47:29 +08:00
|
|
|
long num;
|
|
|
|
char * str;
|
|
|
|
};
|
|
|
|
|
|
|
|
/* User supplied arguments */
|
|
|
|
|
|
|
|
static int opt_full = 0;
|
|
|
|
static int opt_long = 0;
|
2002-10-23 15:53:16 +08:00
|
|
|
static int opt_oldest = 0;
|
2002-02-02 06:47:29 +08:00
|
|
|
static int opt_newest = 0;
|
|
|
|
static int opt_negate = 0;
|
|
|
|
static int opt_exact = 0;
|
2009-11-24 18:00:45 +08:00
|
|
|
static int opt_count = 0;
|
2002-02-02 06:47:29 +08:00
|
|
|
static int opt_signal = SIGTERM;
|
2006-06-25 04:12:29 +08:00
|
|
|
static int opt_lock = 0;
|
2006-06-19 04:55:02 +08:00
|
|
|
static int opt_case = 0;
|
2012-01-21 20:24:02 +08:00
|
|
|
static int opt_echo = 0;
|
2002-02-02 06:47:29 +08:00
|
|
|
|
2002-10-12 12:25:57 +08:00
|
|
|
static const char *opt_delim = "\n";
|
2012-01-21 20:24:02 +08:00
|
|
|
static struct el *opt_pgrp = NULL;
|
|
|
|
static struct el *opt_rgid = NULL;
|
|
|
|
static struct el *opt_pid = NULL;
|
|
|
|
static struct el *opt_ppid = NULL;
|
|
|
|
static struct el *opt_sid = NULL;
|
|
|
|
static struct el *opt_term = NULL;
|
|
|
|
static struct el *opt_euid = NULL;
|
|
|
|
static struct el *opt_ruid = NULL;
|
2002-02-02 06:47:29 +08:00
|
|
|
static char *opt_pattern = NULL;
|
2006-06-21 13:45:16 +08:00
|
|
|
static char *opt_pidfile = NULL;
|
2002-02-02 06:47:29 +08:00
|
|
|
|
2011-09-27 04:03:43 +08:00
|
|
|
static int __attribute__ ((__noreturn__)) usage(int opt)
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
2011-09-27 04:03:43 +08:00
|
|
|
int err = (opt == '?');
|
2007-05-28 08:16:39 +08:00
|
|
|
FILE *fp = err ? stderr : stdout;
|
|
|
|
|
2011-10-09 07:29:43 +08:00
|
|
|
fputs(USAGE_HEADER, fp);
|
2011-10-12 05:20:36 +08:00
|
|
|
fprintf(fp, _(" %s [options] <pattern>\n"), program_invocation_short_name);
|
2011-10-09 07:29:43 +08:00
|
|
|
fputs(USAGE_OPTIONS, fp);
|
|
|
|
if (i_am_pkill == 0) {
|
2011-12-28 04:46:16 +08:00
|
|
|
fputs(_(" -c, --count count of matching processes\n"
|
2012-01-05 16:36:12 +08:00
|
|
|
" -d, --delimeter <string> specify output delimeter\n"
|
2011-12-28 04:46:16 +08:00
|
|
|
" -l, --list-name list PID and process name\n"), fp);
|
2011-10-09 07:29:43 +08:00
|
|
|
}
|
|
|
|
if (i_am_pkill == 1) {
|
2012-01-21 20:24:02 +08:00
|
|
|
fputs(_(" -<sig>, --signal <sig> signal to send (either number or name)\n"
|
|
|
|
" -e, --echo display what is killed\n"), fp);
|
2011-10-09 07:29:43 +08:00
|
|
|
}
|
2011-12-28 04:46:16 +08:00
|
|
|
fputs(_(" -f, --full use full process name to match\n"
|
|
|
|
" -g, --pgroup <id,...> match listed process group IDs\n"
|
|
|
|
" -G, --group <gid,...> match real group IDs\n"
|
|
|
|
" -n, --newest select most recently started\n"
|
|
|
|
" -o, --oldest select least recently started\n"
|
|
|
|
" -P, --parent <ppid,...> match only childs of given parent\n"
|
|
|
|
" -s, --session <sid,...> match session IDs\n"
|
|
|
|
" -t, --terminal <tty,...> match by controlling terminal\n"
|
|
|
|
" -u, --euid <id,...> match by effective IDs\n"
|
|
|
|
" -U, --uid <id,...> match by real IDs\n"
|
|
|
|
" -v, --inverse negates the matching\n"
|
|
|
|
" -x, --exact match exectly with command name\n"
|
|
|
|
" -F, --pidfile <file> read PIDs from file\n"
|
|
|
|
" -L, --logpidfile fail if PID file is not locked\n"), fp);
|
2011-10-09 07:29:43 +08:00
|
|
|
fputs(USAGE_SEPARATOR, fp);
|
|
|
|
fputs(USAGE_HELP, fp);
|
|
|
|
fputs(USAGE_VERSION, fp);
|
|
|
|
fprintf(fp, USAGE_MAN_TAIL("pgrep(1)"));
|
2011-09-27 04:03:43 +08:00
|
|
|
|
|
|
|
exit(fp == stderr ? EXIT_FAILURE : EXIT_SUCCESS);
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
|
2012-01-21 20:24:02 +08:00
|
|
|
static struct el *split_list (const char *restrict str, int (*convert)(const char *, struct el *))
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
2011-10-10 03:29:26 +08:00
|
|
|
char *copy = xstrdup (str);
|
2002-02-02 06:47:29 +08:00
|
|
|
char *ptr = copy;
|
|
|
|
char *sep_pos;
|
2006-06-19 07:19:30 +08:00
|
|
|
int i = 0;
|
|
|
|
int size = 0;
|
2012-01-21 20:24:02 +08:00
|
|
|
struct el *list = NULL;
|
2002-02-02 06:47:29 +08:00
|
|
|
|
|
|
|
do {
|
|
|
|
if (i == size) {
|
2006-06-19 07:19:30 +08:00
|
|
|
size = size * 5 / 4 + 4;
|
|
|
|
// add 1 because slot zero is a count
|
2011-10-10 03:29:26 +08:00
|
|
|
list = xrealloc (list, 1 + size * sizeof *list);
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
2006-06-19 07:19:30 +08:00
|
|
|
sep_pos = strchr (ptr, ',');
|
|
|
|
if (sep_pos)
|
|
|
|
*sep_pos = 0;
|
|
|
|
// Use ++i instead of i++ because slot zero is a count
|
|
|
|
if (!convert (ptr, &list[++i]))
|
2006-06-21 12:18:02 +08:00
|
|
|
exit (EXIT_USAGE);
|
2002-02-02 06:47:29 +08:00
|
|
|
if (sep_pos)
|
|
|
|
ptr = sep_pos + 1;
|
|
|
|
} while (sep_pos);
|
|
|
|
|
|
|
|
free (copy);
|
2006-06-19 07:19:30 +08:00
|
|
|
if (!i) {
|
2002-02-02 06:47:29 +08:00
|
|
|
free (list);
|
|
|
|
list = NULL;
|
|
|
|
} else {
|
2006-06-19 07:19:30 +08:00
|
|
|
list[0].num = i;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
2006-06-17 12:14:57 +08:00
|
|
|
return list;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
|
2006-06-21 12:18:02 +08:00
|
|
|
// strict_atol returns a Boolean: TRUE if the input string
|
|
|
|
// contains a plain number, FALSE if there are any non-digits.
|
|
|
|
static int strict_atol (const char *restrict str, long *restrict value)
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
|
|
|
int res = 0;
|
|
|
|
int sign = 1;
|
|
|
|
|
|
|
|
if (*str == '+')
|
|
|
|
++str;
|
|
|
|
else if (*str == '-') {
|
|
|
|
++str;
|
|
|
|
sign = -1;
|
|
|
|
}
|
|
|
|
|
|
|
|
for ( ; *str; ++str) {
|
|
|
|
if (! isdigit (*str))
|
|
|
|
return (0);
|
|
|
|
res *= 10;
|
|
|
|
res += *str - '0';
|
|
|
|
}
|
|
|
|
*value = sign * res;
|
2006-06-17 12:14:57 +08:00
|
|
|
return 1;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
|
2006-06-21 13:45:16 +08:00
|
|
|
#include <sys/file.h>
|
|
|
|
|
2006-06-23 11:18:12 +08:00
|
|
|
// Seen non-BSD code do this:
|
|
|
|
//
|
|
|
|
//if (fcntl_lock(pid_fd, F_SETLK, F_WRLCK, SEEK_SET, 0, 0) == -1)
|
|
|
|
// return -1;
|
|
|
|
int fcntl_lock(int fd, int cmd, int type, int whence, int start, int len)
|
|
|
|
{
|
|
|
|
struct flock lock[1];
|
|
|
|
|
|
|
|
lock->l_type = type;
|
|
|
|
lock->l_whence = whence;
|
|
|
|
lock->l_start = start;
|
|
|
|
lock->l_len = len;
|
|
|
|
|
|
|
|
return fcntl(fd, cmd, lock);
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
// We try a read lock. The daemon should have a write lock.
|
|
|
|
// Seen using flock: FreeBSD code
|
|
|
|
static int has_flock(int fd)
|
|
|
|
{
|
|
|
|
return flock(fd, LOCK_SH|LOCK_NB)==-1 && errno==EWOULDBLOCK;
|
|
|
|
}
|
|
|
|
|
|
|
|
// We try a read lock. The daemon should have a write lock.
|
|
|
|
// Seen using fcntl: libslack
|
|
|
|
static int has_fcntl(int fd)
|
|
|
|
{
|
|
|
|
struct flock f; // seriously, struct flock is for a fnctl lock!
|
|
|
|
f.l_type = F_RDLCK;
|
|
|
|
f.l_whence = SEEK_SET;
|
|
|
|
f.l_start = 0;
|
|
|
|
f.l_len = 0;
|
|
|
|
return fcntl(fd,F_SETLK,&f)==-1 && (errno==EACCES || errno==EAGAIN);
|
|
|
|
}
|
|
|
|
|
2012-01-21 20:24:02 +08:00
|
|
|
static struct el *read_pidfile(void)
|
2006-06-21 13:45:16 +08:00
|
|
|
{
|
|
|
|
char buf[12];
|
|
|
|
int fd;
|
|
|
|
struct stat sbuf;
|
|
|
|
char *endp;
|
2011-10-07 04:58:26 +08:00
|
|
|
int n, pid;
|
2012-01-21 20:24:02 +08:00
|
|
|
struct el *list = NULL;
|
2006-06-21 13:45:16 +08:00
|
|
|
|
|
|
|
fd = open(opt_pidfile, O_RDONLY|O_NOCTTY|O_NONBLOCK);
|
|
|
|
if(fd<0)
|
2011-10-07 04:58:26 +08:00
|
|
|
goto just_ret;
|
2006-06-21 13:45:16 +08:00
|
|
|
if(fstat(fd,&sbuf) || !S_ISREG(sbuf.st_mode) || sbuf.st_size<1)
|
|
|
|
goto out;
|
2006-06-23 11:18:12 +08:00
|
|
|
// type of lock, if any, is not standardized on Linux
|
2006-06-25 04:12:29 +08:00
|
|
|
if(opt_lock && !has_flock(fd) && !has_fcntl(fd))
|
2011-10-07 04:58:26 +08:00
|
|
|
goto out;
|
2006-06-21 13:45:16 +08:00
|
|
|
memset(buf,'\0',sizeof buf);
|
2011-10-07 04:58:26 +08:00
|
|
|
n = read(fd,buf+1,sizeof buf-2);
|
|
|
|
if (n<1)
|
|
|
|
goto out;
|
|
|
|
buf[n] = '\0';
|
2006-06-21 13:45:16 +08:00
|
|
|
pid = strtoul(buf+1,&endp,10);
|
|
|
|
if(endp<=buf+1 || pid<1 || pid>0x7fffffff)
|
|
|
|
goto out;
|
|
|
|
if(*endp && !isspace(*endp))
|
|
|
|
goto out;
|
2011-10-10 03:29:26 +08:00
|
|
|
list = xmalloc(2 * sizeof *list);
|
2006-06-21 13:45:16 +08:00
|
|
|
list[0].num = 1;
|
|
|
|
list[1].num = pid;
|
|
|
|
out:
|
|
|
|
close(fd);
|
2011-10-07 04:58:26 +08:00
|
|
|
just_ret:
|
2006-06-21 13:45:16 +08:00
|
|
|
return list;
|
|
|
|
}
|
|
|
|
|
2012-01-21 20:24:02 +08:00
|
|
|
static int conv_uid (const char *restrict name, struct el *restrict e)
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
|
|
|
struct passwd *pwd;
|
|
|
|
|
|
|
|
if (strict_atol (name, &e->num))
|
|
|
|
return (1);
|
|
|
|
|
|
|
|
pwd = getpwnam (name);
|
|
|
|
if (pwd == NULL) {
|
2012-01-03 15:48:43 +08:00
|
|
|
xwarnx(_("invalid user name: %s"), name);
|
2006-06-17 12:14:57 +08:00
|
|
|
return 0;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
e->num = pwd->pw_uid;
|
2006-06-17 12:14:57 +08:00
|
|
|
return 1;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-01-21 20:24:02 +08:00
|
|
|
static int conv_gid (const char *restrict name, struct el *restrict e)
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
|
|
|
struct group *grp;
|
|
|
|
|
|
|
|
if (strict_atol (name, &e->num))
|
2006-06-17 12:14:57 +08:00
|
|
|
return 1;
|
2002-02-02 06:47:29 +08:00
|
|
|
|
|
|
|
grp = getgrnam (name);
|
|
|
|
if (grp == NULL) {
|
2012-01-03 15:48:43 +08:00
|
|
|
xwarnx(_("invalid group name: %s"), name);
|
2006-06-17 12:14:57 +08:00
|
|
|
return 0;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
e->num = grp->gr_gid;
|
2006-06-17 12:14:57 +08:00
|
|
|
return 1;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-01-21 20:24:02 +08:00
|
|
|
static int conv_pgrp (const char *restrict name, struct el *restrict e)
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
|
|
|
if (! strict_atol (name, &e->num)) {
|
2012-01-03 15:48:43 +08:00
|
|
|
xwarnx(_("invalid process group: %s"), name);
|
2006-06-17 12:14:57 +08:00
|
|
|
return 0;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
if (e->num == 0)
|
|
|
|
e->num = getpgrp ();
|
2006-06-17 12:14:57 +08:00
|
|
|
return 1;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-01-21 20:24:02 +08:00
|
|
|
static int conv_sid (const char *restrict name, struct el *restrict e)
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
|
|
|
if (! strict_atol (name, &e->num)) {
|
2012-01-03 15:48:43 +08:00
|
|
|
xwarnx(_("invalid session id: %s"), name);
|
2006-06-17 12:14:57 +08:00
|
|
|
return 0;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
if (e->num == 0)
|
|
|
|
e->num = getsid (0);
|
2006-06-17 12:14:57 +08:00
|
|
|
return 1;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-01-21 20:24:02 +08:00
|
|
|
static int conv_num (const char *restrict name, struct el *restrict e)
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
|
|
|
if (! strict_atol (name, &e->num)) {
|
2012-01-03 15:48:43 +08:00
|
|
|
xwarnx(_("not a number: %s"), name);
|
2006-06-17 12:14:57 +08:00
|
|
|
return 0;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
2006-06-17 12:14:57 +08:00
|
|
|
return 1;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-01-21 20:24:02 +08:00
|
|
|
static int conv_str (const char *restrict name, struct el *restrict e)
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
2011-10-10 03:29:26 +08:00
|
|
|
e->str = xstrdup (name);
|
2006-06-17 12:14:57 +08:00
|
|
|
return 1;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2012-01-21 20:24:02 +08:00
|
|
|
static int match_numlist (long value, const struct el *restrict list)
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
|
|
|
int found = 0;
|
|
|
|
if (list == NULL)
|
|
|
|
found = 0;
|
|
|
|
else {
|
|
|
|
int i;
|
|
|
|
for (i = list[0].num; i > 0; i--) {
|
|
|
|
if (list[i].num == value)
|
|
|
|
found = 1;
|
|
|
|
}
|
|
|
|
}
|
2006-06-17 12:14:57 +08:00
|
|
|
return found;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
|
2012-01-21 20:24:02 +08:00
|
|
|
static int match_strlist (const char *restrict value, const struct el *restrict list)
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
|
|
|
int found = 0;
|
|
|
|
if (list == NULL)
|
|
|
|
found = 0;
|
|
|
|
else {
|
|
|
|
int i;
|
|
|
|
for (i = list[0].num; i > 0; i--) {
|
|
|
|
if (! strcmp (list[i].str, value))
|
|
|
|
found = 1;
|
|
|
|
}
|
|
|
|
}
|
2006-06-17 12:14:57 +08:00
|
|
|
return found;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
|
2012-01-21 20:24:02 +08:00
|
|
|
static void output_numlist (const struct el *restrict list, int num)
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
|
|
|
int i;
|
2006-06-19 07:19:30 +08:00
|
|
|
const char *delim = opt_delim;
|
|
|
|
for (i = 0; i < num; i++) {
|
|
|
|
if(i+1==num)
|
|
|
|
delim = "\n";
|
|
|
|
printf ("%ld%s", list[i].num, delim);
|
|
|
|
}
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
|
2012-01-21 20:24:02 +08:00
|
|
|
static void output_strlist (const struct el *restrict list, int num)
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
2002-12-21 22:13:33 +08:00
|
|
|
// FIXME: escape codes
|
2002-02-02 06:47:29 +08:00
|
|
|
int i;
|
2006-06-19 07:19:30 +08:00
|
|
|
const char *delim = opt_delim;
|
|
|
|
for (i = 0; i < num; i++) {
|
|
|
|
if(i+1==num)
|
|
|
|
delim = "\n";
|
2012-01-21 20:24:02 +08:00
|
|
|
printf ("%lu %s%s", list[i].num, list[i].str, delim);
|
2006-06-19 07:19:30 +08:00
|
|
|
}
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
|
2006-06-21 12:18:02 +08:00
|
|
|
static PROCTAB *do_openproc (void)
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
|
|
|
PROCTAB *ptp;
|
2002-12-09 04:28:40 +08:00
|
|
|
int flags = 0;
|
2002-02-02 06:47:29 +08:00
|
|
|
|
|
|
|
if (opt_pattern || opt_full)
|
2002-10-09 12:28:48 +08:00
|
|
|
flags |= PROC_FILLCOM;
|
2002-12-09 04:28:40 +08:00
|
|
|
if (opt_ruid || opt_rgid)
|
2002-02-02 06:47:29 +08:00
|
|
|
flags |= PROC_FILLSTATUS;
|
2002-12-09 04:28:40 +08:00
|
|
|
if (opt_oldest || opt_newest || opt_pgrp || opt_sid || opt_term)
|
|
|
|
flags |= PROC_FILLSTAT;
|
|
|
|
if (!(flags & PROC_FILLSTAT))
|
|
|
|
flags |= PROC_FILLSTATUS; // FIXME: need one, and PROC_FILLANY broken
|
2002-02-02 06:47:29 +08:00
|
|
|
if (opt_euid && !opt_negate) {
|
|
|
|
int num = opt_euid[0].num;
|
|
|
|
int i = num;
|
2011-10-10 03:29:26 +08:00
|
|
|
uid_t *uids = xmalloc (num * sizeof (uid_t));
|
2002-02-02 06:47:29 +08:00
|
|
|
while (i-- > 0) {
|
|
|
|
uids[i] = opt_euid[i+1].num;
|
|
|
|
}
|
|
|
|
flags |= PROC_UID;
|
|
|
|
ptp = openproc (flags, uids, num);
|
|
|
|
} else {
|
|
|
|
ptp = openproc (flags);
|
|
|
|
}
|
2006-06-17 12:14:57 +08:00
|
|
|
return ptp;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
|
2006-06-21 12:18:02 +08:00
|
|
|
static regex_t * do_regcomp (void)
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
|
|
|
regex_t *preg = NULL;
|
|
|
|
|
|
|
|
if (opt_pattern) {
|
|
|
|
char *re;
|
|
|
|
char errbuf[256];
|
|
|
|
int re_err;
|
|
|
|
|
2011-10-10 03:29:26 +08:00
|
|
|
preg = xmalloc (sizeof (regex_t));
|
2002-02-02 06:47:29 +08:00
|
|
|
if (opt_exact) {
|
2011-10-10 03:29:26 +08:00
|
|
|
re = xmalloc (strlen (opt_pattern) + 5);
|
2002-02-02 06:47:29 +08:00
|
|
|
sprintf (re, "^(%s)$", opt_pattern);
|
|
|
|
} else {
|
|
|
|
re = opt_pattern;
|
|
|
|
}
|
|
|
|
|
2006-06-19 04:55:02 +08:00
|
|
|
re_err = regcomp (preg, re, REG_EXTENDED | REG_NOSUB | opt_case);
|
2002-02-02 06:47:29 +08:00
|
|
|
if (re_err) {
|
|
|
|
regerror (re_err, preg, errbuf, sizeof(errbuf));
|
2005-10-31 07:45:47 +08:00
|
|
|
fputs(errbuf,stderr);
|
2006-06-21 12:18:02 +08:00
|
|
|
exit (EXIT_USAGE);
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
return preg;
|
|
|
|
}
|
|
|
|
|
2012-01-21 20:24:02 +08:00
|
|
|
static struct el * select_procs (int *num)
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
|
|
|
PROCTAB *ptp;
|
|
|
|
proc_t task;
|
2002-10-23 15:53:16 +08:00
|
|
|
unsigned long long saved_start_time; // for new/old support
|
|
|
|
pid_t saved_pid = 0; // for new/old support
|
2002-02-02 06:47:29 +08:00
|
|
|
int matches = 0;
|
2006-06-19 07:19:30 +08:00
|
|
|
int size = 0;
|
2002-02-02 06:47:29 +08:00
|
|
|
regex_t *preg;
|
|
|
|
pid_t myself = getpid();
|
2012-01-21 20:24:02 +08:00
|
|
|
struct el *list = NULL;
|
2002-02-02 06:47:29 +08:00
|
|
|
char cmd[4096];
|
|
|
|
|
2006-06-19 07:19:30 +08:00
|
|
|
ptp = do_openproc();
|
|
|
|
preg = do_regcomp();
|
2002-10-23 15:53:16 +08:00
|
|
|
|
|
|
|
if (opt_newest) saved_start_time = 0ULL;
|
2009-11-24 08:00:41 +08:00
|
|
|
else saved_start_time = ~0ULL;
|
|
|
|
|
2002-10-23 15:53:16 +08:00
|
|
|
if (opt_newest) saved_pid = 0;
|
|
|
|
if (opt_oldest) saved_pid = INT_MAX;
|
2002-02-02 06:47:29 +08:00
|
|
|
|
2006-06-19 07:19:30 +08:00
|
|
|
memset(&task, 0, sizeof (task));
|
|
|
|
while(readproc(ptp, &task)) {
|
2002-02-02 06:47:29 +08:00
|
|
|
int match = 1;
|
|
|
|
|
2003-09-20 16:29:55 +08:00
|
|
|
if (task.XXXID == myself)
|
2002-02-02 06:47:29 +08:00
|
|
|
continue;
|
2002-10-23 15:53:16 +08:00
|
|
|
else if (opt_newest && task.start_time < saved_start_time)
|
|
|
|
match = 0;
|
|
|
|
else if (opt_oldest && task.start_time > saved_start_time)
|
2002-02-02 06:47:29 +08:00
|
|
|
match = 0;
|
|
|
|
else if (opt_ppid && ! match_numlist (task.ppid, opt_ppid))
|
|
|
|
match = 0;
|
2006-06-21 13:45:16 +08:00
|
|
|
else if (opt_pid && ! match_numlist (task.tgid, opt_pid))
|
|
|
|
match = 0;
|
2002-02-02 06:47:29 +08:00
|
|
|
else if (opt_pgrp && ! match_numlist (task.pgrp, opt_pgrp))
|
|
|
|
match = 0;
|
|
|
|
else if (opt_euid && ! match_numlist (task.euid, opt_euid))
|
|
|
|
match = 0;
|
2002-12-09 04:28:40 +08:00
|
|
|
else if (opt_ruid && ! match_numlist (task.ruid, opt_ruid))
|
2002-02-02 06:47:29 +08:00
|
|
|
match = 0;
|
2002-12-09 04:28:40 +08:00
|
|
|
else if (opt_rgid && ! match_numlist (task.rgid, opt_rgid))
|
2002-02-02 06:47:29 +08:00
|
|
|
match = 0;
|
|
|
|
else if (opt_sid && ! match_numlist (task.session, opt_sid))
|
|
|
|
match = 0;
|
|
|
|
else if (opt_term) {
|
2002-12-03 17:07:59 +08:00
|
|
|
if (task.tty == 0) {
|
2002-02-02 06:47:29 +08:00
|
|
|
match = 0;
|
|
|
|
} else {
|
|
|
|
char tty[256];
|
|
|
|
dev_to_tty (tty, sizeof(tty) - 1,
|
2003-09-20 16:29:55 +08:00
|
|
|
task.tty, task.XXXID, ABBREV_DEV);
|
2002-02-02 06:47:29 +08:00
|
|
|
match = match_strlist (tty, opt_term);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
if (opt_long || (match && opt_pattern)) {
|
|
|
|
if (opt_full && task.cmdline) {
|
|
|
|
int i = 0;
|
|
|
|
int bytes = sizeof (cmd) - 1;
|
|
|
|
|
|
|
|
/* make sure it is always NUL-terminated */
|
|
|
|
cmd[bytes] = 0;
|
|
|
|
/* make room for SPC in loop below */
|
|
|
|
--bytes;
|
|
|
|
|
|
|
|
strncpy (cmd, task.cmdline[i], bytes);
|
|
|
|
bytes -= strlen (task.cmdline[i++]);
|
|
|
|
while (task.cmdline[i] && bytes > 0) {
|
|
|
|
strncat (cmd, " ", bytes);
|
|
|
|
strncat (cmd, task.cmdline[i], bytes);
|
|
|
|
bytes -= strlen (task.cmdline[i++]) + 1;
|
|
|
|
}
|
|
|
|
} else {
|
|
|
|
strcpy (cmd, task.cmd);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (match && opt_pattern) {
|
|
|
|
if (regexec (preg, cmd, 0, NULL, 0) != 0)
|
|
|
|
match = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (match ^ opt_negate) { /* Exclusive OR is neat */
|
|
|
|
if (opt_newest) {
|
2002-10-23 15:53:16 +08:00
|
|
|
if (saved_start_time == task.start_time &&
|
2003-09-20 16:29:55 +08:00
|
|
|
saved_pid > task.XXXID)
|
2002-10-23 15:53:16 +08:00
|
|
|
continue;
|
|
|
|
saved_start_time = task.start_time;
|
2003-09-20 16:29:55 +08:00
|
|
|
saved_pid = task.XXXID;
|
2002-10-23 15:53:16 +08:00
|
|
|
matches = 0;
|
|
|
|
}
|
|
|
|
if (opt_oldest) {
|
|
|
|
if (saved_start_time == task.start_time &&
|
2003-09-20 16:29:55 +08:00
|
|
|
saved_pid < task.XXXID)
|
2002-02-02 06:47:29 +08:00
|
|
|
continue;
|
2002-10-23 15:53:16 +08:00
|
|
|
saved_start_time = task.start_time;
|
2003-09-20 16:29:55 +08:00
|
|
|
saved_pid = task.XXXID;
|
2002-02-02 06:47:29 +08:00
|
|
|
matches = 0;
|
|
|
|
}
|
2006-06-19 07:19:30 +08:00
|
|
|
if (matches == size) {
|
|
|
|
size = size * 5 / 4 + 4;
|
2011-10-10 03:29:26 +08:00
|
|
|
list = xrealloc(list, size * sizeof *list);
|
2006-06-19 07:19:30 +08:00
|
|
|
}
|
2012-01-21 20:24:02 +08:00
|
|
|
if (opt_long || opt_echo) {
|
2002-12-21 22:13:33 +08:00
|
|
|
char buff[5096]; // FIXME
|
2012-01-21 20:24:02 +08:00
|
|
|
list[matches].num = task.XXXID;
|
|
|
|
list[matches++].str = xstrdup (cmd);
|
2002-02-02 06:47:29 +08:00
|
|
|
} else {
|
2006-06-17 12:14:57 +08:00
|
|
|
list[matches++].num = task.XXXID;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
memset (&task, 0, sizeof (task));
|
|
|
|
}
|
|
|
|
closeproc (ptp);
|
2006-06-17 12:14:57 +08:00
|
|
|
*num = matches;
|
|
|
|
return list;
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-06-21 12:18:02 +08:00
|
|
|
static void parse_opts (int argc, char **argv)
|
2002-11-26 05:12:25 +08:00
|
|
|
{
|
|
|
|
char opts[32] = "";
|
|
|
|
int opt;
|
|
|
|
int criteria_count = 0;
|
|
|
|
|
2011-09-27 04:03:43 +08:00
|
|
|
enum {
|
|
|
|
SIGNAL_OPTION = CHAR_MAX + 1
|
|
|
|
};
|
|
|
|
static const struct option longopts[] = {
|
|
|
|
{"signal", required_argument, NULL, SIGNAL_OPTION},
|
|
|
|
{"count", no_argument, NULL, 'c'},
|
|
|
|
{"delimeter", required_argument, NULL, 'd'},
|
|
|
|
{"list-name", no_argument, NULL, 'l'},
|
|
|
|
{"full", no_argument, NULL, 'f'},
|
|
|
|
{"pgroup", required_argument, NULL, 'g'},
|
|
|
|
{"group", required_argument, NULL, 'G'},
|
|
|
|
{"newest", no_argument, NULL, 'n'},
|
|
|
|
{"oldest", no_argument, NULL, 'o'},
|
|
|
|
{"parent", required_argument, NULL, 'P'},
|
|
|
|
{"session", required_argument, NULL, 's'},
|
|
|
|
{"terminal", required_argument, NULL, 't'},
|
|
|
|
{"euid", required_argument, NULL, 'u'},
|
|
|
|
{"uid", required_argument, NULL, 'U'},
|
|
|
|
{"inverse", no_argument, NULL, 'v'},
|
|
|
|
{"exact", no_argument, NULL, 'x'},
|
|
|
|
{"pidfile", required_argument, NULL, 'F'},
|
|
|
|
{"logpidfile", no_argument, NULL, 'L'},
|
2012-01-21 20:24:02 +08:00
|
|
|
{"echo", no_argument, NULL, 'e'},
|
2011-09-27 04:03:43 +08:00
|
|
|
{"help", no_argument, NULL, 'h'},
|
|
|
|
{"version", no_argument, NULL, 'V'},
|
|
|
|
{NULL, 0, NULL, 0}
|
|
|
|
};
|
|
|
|
|
2011-10-12 05:20:36 +08:00
|
|
|
if (strstr (program_invocation_short_name, "pkill")) {
|
|
|
|
i_am_pkill = 1;
|
2002-11-26 05:12:25 +08:00
|
|
|
/* Look for a signal name or number as first argument */
|
|
|
|
if (argc > 1 && argv[1][0] == '-') {
|
|
|
|
int sig;
|
|
|
|
sig = signal_name_to_number (argv[1] + 1);
|
|
|
|
if (sig == -1 && isdigit (argv[1][1]))
|
|
|
|
sig = atoi (argv[1] + 1);
|
|
|
|
if (sig != -1) {
|
|
|
|
int i;
|
|
|
|
for (i = 2; i < argc; i++)
|
|
|
|
argv[i-1] = argv[i];
|
|
|
|
--argc;
|
|
|
|
opt_signal = sig;
|
|
|
|
}
|
|
|
|
}
|
2012-01-21 20:24:02 +08:00
|
|
|
/* These options are for pkill only */
|
|
|
|
strcat (opts, "e");
|
2002-11-26 05:12:25 +08:00
|
|
|
} else {
|
|
|
|
/* These options are for pgrep only */
|
2011-09-27 04:03:43 +08:00
|
|
|
strcat (opts, "cld:");
|
2002-11-26 05:12:25 +08:00
|
|
|
}
|
|
|
|
|
2011-09-27 04:03:43 +08:00
|
|
|
strcat (opts, "LF:fnovxP:g:s:u:U:G:t:?Vh");
|
2002-11-26 05:12:25 +08:00
|
|
|
|
2011-09-27 04:03:43 +08:00
|
|
|
while ((opt = getopt_long (argc, argv, opts, longopts, NULL)) != -1) {
|
2002-11-26 05:12:25 +08:00
|
|
|
switch (opt) {
|
2011-09-27 04:03:43 +08:00
|
|
|
case SIGNAL_OPTION:
|
|
|
|
opt_signal = signal_name_to_number (optarg);
|
|
|
|
if (opt_signal == -1 && isdigit (optarg[0]))
|
|
|
|
opt_signal = atoi (optarg);
|
|
|
|
break;
|
2012-01-21 20:24:02 +08:00
|
|
|
case 'e':
|
|
|
|
opt_echo = 1;
|
|
|
|
break;
|
2006-06-21 12:41:58 +08:00
|
|
|
// case 'D': // FreeBSD: print info about non-matches for debugging
|
|
|
|
// break;
|
2006-06-21 13:45:16 +08:00
|
|
|
case 'F': // FreeBSD: the arg is a file containing a PID to match
|
2011-10-10 03:29:26 +08:00
|
|
|
opt_pidfile = xstrdup (optarg);
|
2006-06-21 13:45:16 +08:00
|
|
|
++criteria_count;
|
|
|
|
break;
|
2006-06-19 04:55:02 +08:00
|
|
|
case 'G': // Solaris: match rgid/rgroup
|
2004-07-21 22:27:56 +08:00
|
|
|
opt_rgid = split_list (optarg, conv_gid);
|
|
|
|
if (opt_rgid == NULL)
|
2002-11-26 05:12:25 +08:00
|
|
|
usage (opt);
|
|
|
|
++criteria_count;
|
|
|
|
break;
|
2006-06-19 04:55:02 +08:00
|
|
|
// case 'I': // FreeBSD: require confirmation before killing
|
|
|
|
// break;
|
|
|
|
// case 'J': // Solaris: match by project ID (name or number)
|
|
|
|
// break;
|
2006-06-25 04:12:29 +08:00
|
|
|
case 'L': // FreeBSD: fail if pidfile (see -F) not locked
|
|
|
|
opt_lock++;
|
2006-06-21 13:45:16 +08:00
|
|
|
break;
|
2006-06-19 04:55:02 +08:00
|
|
|
// case 'M': // FreeBSD: specify core (OS crash dump) file
|
|
|
|
// break;
|
|
|
|
// case 'N': // FreeBSD: specify alternate namelist file (for us, System.map -- but we don't need it)
|
|
|
|
// break;
|
|
|
|
case 'P': // Solaris: match by PPID
|
2004-07-21 22:27:56 +08:00
|
|
|
opt_ppid = split_list (optarg, conv_num);
|
|
|
|
if (opt_ppid == NULL)
|
2002-11-26 05:12:25 +08:00
|
|
|
usage (opt);
|
|
|
|
++criteria_count;
|
|
|
|
break;
|
2006-06-19 04:55:02 +08:00
|
|
|
// case 'S': // FreeBSD: don't ignore the built-in kernel tasks
|
|
|
|
// break;
|
|
|
|
// case 'T': // Solaris: match by "task ID" (probably not a Linux task)
|
|
|
|
// break;
|
|
|
|
case 'U': // Solaris: match by ruid/rgroup
|
2004-07-21 22:27:56 +08:00
|
|
|
opt_ruid = split_list (optarg, conv_uid);
|
|
|
|
if (opt_ruid == NULL)
|
2002-11-26 05:12:25 +08:00
|
|
|
usage (opt);
|
2004-07-21 22:27:56 +08:00
|
|
|
++criteria_count;
|
2002-11-26 05:12:25 +08:00
|
|
|
break;
|
2004-07-21 22:27:56 +08:00
|
|
|
case 'V':
|
2011-10-09 07:29:43 +08:00
|
|
|
printf(PROCPS_NG_VERSION);
|
2006-06-21 12:18:02 +08:00
|
|
|
exit(EXIT_SUCCESS);
|
2006-06-19 04:55:02 +08:00
|
|
|
// case 'c': // Solaris: match by contract ID
|
|
|
|
// break;
|
2009-11-24 18:00:45 +08:00
|
|
|
case 'c':
|
|
|
|
opt_count = 1;
|
|
|
|
break;
|
2006-06-19 04:55:02 +08:00
|
|
|
case 'd': // Solaris: change the delimiter
|
2011-10-10 03:29:26 +08:00
|
|
|
opt_delim = xstrdup (optarg);
|
2002-11-26 05:12:25 +08:00
|
|
|
break;
|
2006-06-19 04:55:02 +08:00
|
|
|
case 'f': // Solaris: match full process name (as in "ps -f")
|
2004-07-21 22:27:56 +08:00
|
|
|
opt_full = 1;
|
2002-11-26 05:12:25 +08:00
|
|
|
break;
|
2006-06-19 04:55:02 +08:00
|
|
|
case 'g': // Solaris: match pgrp
|
2002-11-26 05:36:43 +08:00
|
|
|
opt_pgrp = split_list (optarg, conv_pgrp);
|
2002-11-26 05:12:25 +08:00
|
|
|
if (opt_pgrp == NULL)
|
|
|
|
usage (opt);
|
2006-06-25 04:12:29 +08:00
|
|
|
++criteria_count;
|
2002-11-26 05:12:25 +08:00
|
|
|
break;
|
2006-06-19 04:55:02 +08:00
|
|
|
// case 'i': // FreeBSD: ignore case. OpenBSD: withdrawn. See -I. This sucks.
|
|
|
|
// if (opt_case)
|
|
|
|
// usage (opt);
|
|
|
|
// opt_case = REG_ICASE;
|
2004-07-21 22:27:56 +08:00
|
|
|
// break;
|
2006-06-19 04:55:02 +08:00
|
|
|
// case 'j': // FreeBSD: restricted to the given jail ID
|
|
|
|
// break;
|
2006-06-21 12:41:58 +08:00
|
|
|
case 'l': // Solaris: long output format (pgrep only) Should require -f for beyond argv[0] maybe?
|
2004-07-21 22:27:56 +08:00
|
|
|
opt_long = 1;
|
2002-11-26 05:12:25 +08:00
|
|
|
break;
|
2006-06-19 04:55:02 +08:00
|
|
|
case 'n': // Solaris: match only the newest
|
2004-07-21 22:27:56 +08:00
|
|
|
if (opt_oldest|opt_negate|opt_newest)
|
2002-11-26 05:12:25 +08:00
|
|
|
usage (opt);
|
2004-07-21 22:27:56 +08:00
|
|
|
opt_newest = 1;
|
2002-11-26 05:12:25 +08:00
|
|
|
++criteria_count;
|
|
|
|
break;
|
2006-06-19 04:55:02 +08:00
|
|
|
case 'o': // Solaris: match only the oldest
|
2004-07-21 22:27:56 +08:00
|
|
|
if (opt_oldest|opt_negate|opt_newest)
|
2002-11-26 05:12:25 +08:00
|
|
|
usage (opt);
|
2004-07-21 22:27:56 +08:00
|
|
|
opt_oldest = 1;
|
2002-11-26 05:12:25 +08:00
|
|
|
++criteria_count;
|
|
|
|
break;
|
2006-06-19 04:55:02 +08:00
|
|
|
case 's': // Solaris: match by session ID -- zero means self
|
2004-07-21 22:27:56 +08:00
|
|
|
opt_sid = split_list (optarg, conv_sid);
|
|
|
|
if (opt_sid == NULL)
|
2002-11-26 05:12:25 +08:00
|
|
|
usage (opt);
|
|
|
|
++criteria_count;
|
|
|
|
break;
|
2006-06-19 04:55:02 +08:00
|
|
|
case 't': // Solaris: match by tty
|
2002-11-26 05:36:43 +08:00
|
|
|
opt_term = split_list (optarg, conv_str);
|
2002-11-26 05:12:25 +08:00
|
|
|
if (opt_term == NULL)
|
|
|
|
usage (opt);
|
|
|
|
++criteria_count;
|
|
|
|
break;
|
2006-06-19 04:55:02 +08:00
|
|
|
case 'u': // Solaris: match by euid/egroup
|
2004-07-21 22:27:56 +08:00
|
|
|
opt_euid = split_list (optarg, conv_uid);
|
|
|
|
if (opt_euid == NULL)
|
|
|
|
usage (opt);
|
|
|
|
++criteria_count;
|
|
|
|
break;
|
2006-06-19 04:55:02 +08:00
|
|
|
case 'v': // Solaris: as in grep, invert the matching (uh... applied after selection I think)
|
2004-07-21 22:27:56 +08:00
|
|
|
if (opt_oldest|opt_negate|opt_newest)
|
|
|
|
usage (opt);
|
|
|
|
opt_negate = 1;
|
|
|
|
break;
|
|
|
|
// OpenBSD -x, being broken, does a plain string
|
2006-06-19 04:55:02 +08:00
|
|
|
case 'x': // Solaris: use ^(regexp)$ in place of regexp (FreeBSD too)
|
2004-07-21 22:27:56 +08:00
|
|
|
opt_exact = 1;
|
|
|
|
break;
|
2006-06-19 04:55:02 +08:00
|
|
|
// case 'z': // Solaris: match by zone ID
|
|
|
|
// break;
|
2011-09-27 04:03:43 +08:00
|
|
|
case 'h':
|
|
|
|
usage (opt);
|
|
|
|
break;
|
2002-11-26 05:12:25 +08:00
|
|
|
case '?':
|
2009-11-24 08:00:49 +08:00
|
|
|
usage (optopt ? optopt : opt);
|
2002-11-26 05:12:25 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
2006-06-21 13:45:16 +08:00
|
|
|
|
2011-12-18 20:39:28 +08:00
|
|
|
if(opt_lock && !opt_pidfile)
|
2012-01-03 15:48:43 +08:00
|
|
|
xerrx(EXIT_FAILURE, _("-L without -F makes no sense\n"
|
2011-12-18 20:39:28 +08:00
|
|
|
"Try `%s --help' for more information."),
|
|
|
|
program_invocation_short_name);
|
2006-06-21 13:45:16 +08:00
|
|
|
|
|
|
|
if(opt_pidfile){
|
|
|
|
opt_pid = read_pidfile();
|
2011-12-18 20:39:28 +08:00
|
|
|
if(!opt_pid)
|
2012-01-03 15:48:43 +08:00
|
|
|
xerrx(EXIT_FAILURE, _("pidfile not valid\n"
|
2011-12-18 20:39:28 +08:00
|
|
|
"Try `%s --help' for more information."),
|
|
|
|
program_invocation_short_name);
|
2006-06-21 13:45:16 +08:00
|
|
|
}
|
|
|
|
|
2002-11-26 05:12:25 +08:00
|
|
|
if (argc - optind == 1)
|
|
|
|
opt_pattern = argv[optind];
|
|
|
|
else if (argc - optind > 1)
|
2012-01-03 15:48:43 +08:00
|
|
|
xerrx(EXIT_FAILURE, _("only one pattern can be provided\n"
|
2011-12-18 20:39:28 +08:00
|
|
|
"Try `%s --help' for more information."),
|
|
|
|
program_invocation_short_name);
|
|
|
|
else if (criteria_count == 0)
|
2012-01-03 15:48:43 +08:00
|
|
|
xerrx(EXIT_FAILURE, _("no matching criteria specified\n"
|
2011-12-18 20:39:28 +08:00
|
|
|
"Try `%s --help' for more information."),
|
|
|
|
program_invocation_short_name);
|
2002-11-26 05:12:25 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
2011-10-12 05:20:36 +08:00
|
|
|
int main (int argc, char **argv)
|
2002-02-02 06:47:29 +08:00
|
|
|
{
|
2012-01-21 20:24:02 +08:00
|
|
|
struct el *procs;
|
2006-06-17 12:14:57 +08:00
|
|
|
int num;
|
2002-02-02 06:47:29 +08:00
|
|
|
|
2012-01-03 15:48:43 +08:00
|
|
|
program_invocation_name = program_invocation_short_name;
|
2011-12-07 20:27:21 +08:00
|
|
|
setlocale (LC_ALL, "");
|
|
|
|
bindtextdomain(PACKAGE, LOCALEDIR);
|
|
|
|
textdomain(PACKAGE);
|
|
|
|
|
2002-02-02 06:47:29 +08:00
|
|
|
parse_opts (argc, argv);
|
|
|
|
|
2006-06-17 12:14:57 +08:00
|
|
|
procs = select_procs (&num);
|
2002-02-02 06:47:29 +08:00
|
|
|
if (i_am_pkill) {
|
|
|
|
int i;
|
2006-06-17 12:14:57 +08:00
|
|
|
for (i = 0; i < num; i++) {
|
2012-01-21 20:24:02 +08:00
|
|
|
if (kill (procs[i].num, opt_signal) != -1) {
|
|
|
|
if (opt_echo)
|
|
|
|
printf(_("%s killed (pid %lu)\n"), procs[i].str, procs[i].num);
|
|
|
|
continue;
|
|
|
|
}
|
2011-10-12 05:20:36 +08:00
|
|
|
if (errno==ESRCH)
|
|
|
|
// gone now, which is OK
|
|
|
|
continue;
|
2012-01-21 09:09:48 +08:00
|
|
|
xwarn(_("killing pid %d failed"), procs[i].num);
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
|
|
|
} else {
|
2009-11-24 18:00:45 +08:00
|
|
|
if (opt_count) {
|
2012-01-21 09:14:21 +08:00
|
|
|
fprintf(stdout, "%d\n", num);
|
2009-11-24 18:00:45 +08:00
|
|
|
} else {
|
|
|
|
if (opt_long)
|
|
|
|
output_strlist (procs,num);
|
|
|
|
else
|
|
|
|
output_numlist (procs,num);
|
|
|
|
}
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|
2006-06-21 12:18:02 +08:00
|
|
|
return !num; // exit(EXIT_SUCCESS) if match, otherwise exit(EXIT_FAILURE)
|
2002-02-02 06:47:29 +08:00
|
|
|
}
|