]> git.ipfire.org Git - thirdparty/systemd.git/blame - src/core/killall.c
util: split out escaping code into escape.[ch]
[thirdparty/systemd.git] / src / core / killall.c
CommitLineData
bd3fa1d2
LP
1/*-*- Mode: C; c-basic-offset: 8; indent-tabs-mode: nil -*-*/
2
3/***
4 This file is part of systemd.
5
6 Copyright 2010 ProFUSION embedded systems
7
8 systemd is free software; you can redistribute it and/or modify it
9 under the terms of the GNU Lesser General Public License as published by
10 the Free Software Foundation; either version 2.1 of the License, or
11 (at your option) any later version.
12
13 systemd is distributed in the hope that it will be useful, but
14 WITHOUT ANY WARRANTY; without even the implied warranty of
15 MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
16 Lesser General Public License for more details.
17
18 You should have received a copy of the GNU Lesser General Public License
19 along with systemd; If not, see <http://www.gnu.org/licenses/>.
20***/
21
22#include <sys/wait.h>
23#include <signal.h>
24#include <errno.h>
aaf7eb81 25#include <unistd.h>
bd3fa1d2
LP
26
27#include "util.h"
bd3fa1d2 28#include "killall.h"
aaf7eb81 29#include "set.h"
6482f626 30#include "formats-util.h"
0b452006 31#include "process-util.h"
288a74cc 32#include "terminal-util.h"
bd3fa1d2 33
aaf7eb81 34#define TIMEOUT_USEC (10 * USEC_PER_SEC)
bd3fa1d2
LP
35
36static bool ignore_proc(pid_t pid) {
31885cd5 37 _cleanup_fclose_ FILE *f = NULL;
b68fa010
SP
38 char c;
39 const char *p;
bd3fa1d2
LP
40 size_t count;
41 uid_t uid;
42 int r;
43
44 /* We are PID 1, let's not commit suicide */
45 if (pid == 1)
46 return true;
47
48 r = get_process_uid(pid, &uid);
49 if (r < 0)
50 return true; /* not really, but better safe than sorry */
51
52 /* Non-root processes otherwise are always subject to be killed */
53 if (uid != 0)
54 return false;
55
5841bd80
ZJS
56 p = procfs_file_alloca(pid, "cmdline");
57 f = fopen(p, "re");
bd3fa1d2
LP
58 if (!f)
59 return true; /* not really, but has the desired effect */
60
61 count = fread(&c, 1, 1, f);
bd3fa1d2
LP
62
63 /* Kernel threads have an empty cmdline */
64 if (count <= 0)
65 return true;
66
67 /* Processes with argv[0][0] = '@' we ignore from the killing
68 * spree.
69 *
70 * http://www.freedesktop.org/wiki/Software/systemd/RootStorageDaemons */
71 if (count == 1 && c == '@')
72 return true;
73
74 return false;
75}
76
aaf7eb81 77static void wait_for_children(Set *pids, sigset_t *mask) {
bd3fa1d2
LP
78 usec_t until;
79
80 assert(mask);
81
aaf7eb81
LP
82 if (set_isempty(pids))
83 return;
84
bd3fa1d2
LP
85 until = now(CLOCK_MONOTONIC) + TIMEOUT_USEC;
86 for (;;) {
87 struct timespec ts;
88 int k;
89 usec_t n;
aaf7eb81
LP
90 void *p;
91 Iterator i;
bd3fa1d2 92
aaf7eb81
LP
93 /* First, let the kernel inform us about killed
94 * children. Most processes will probably be our
95 * children, but some are not (might be our
96 * grandchildren instead...). */
bd3fa1d2 97 for (;;) {
aaf7eb81 98 pid_t pid;
bd3fa1d2 99
aaf7eb81 100 pid = waitpid(-1, NULL, WNOHANG);
bd3fa1d2
LP
101 if (pid == 0)
102 break;
aaf7eb81
LP
103 if (pid < 0) {
104 if (errno == ECHILD)
105 break;
bd3fa1d2 106
56f64d95 107 log_error_errno(errno, "waitpid() failed: %m");
bd3fa1d2 108 return;
aaf7eb81
LP
109 }
110
fea72cc0 111 (void) set_remove(pids, PID_TO_PTR(pid));
aaf7eb81 112 }
bd3fa1d2 113
aaf7eb81
LP
114 /* Now explicitly check who might be remaining, who
115 * might not be our child. */
116 SET_FOREACH(p, pids, i) {
117
118 /* We misuse getpgid as a check whether a
119 * process still exists. */
fea72cc0 120 if (getpgid(PTR_TO_PID(p)) >= 0)
aaf7eb81
LP
121 continue;
122
123 if (errno != ESRCH)
124 continue;
125
126 set_remove(pids, p);
bd3fa1d2
LP
127 }
128
aaf7eb81
LP
129 if (set_isempty(pids))
130 return;
131
bd3fa1d2
LP
132 n = now(CLOCK_MONOTONIC);
133 if (n >= until)
134 return;
135
136 timespec_store(&ts, until - n);
aaf7eb81
LP
137 k = sigtimedwait(mask, NULL, &ts);
138 if (k != SIGCHLD) {
bd3fa1d2
LP
139
140 if (k < 0 && errno != EAGAIN) {
56f64d95 141 log_error_errno(errno, "sigtimedwait() failed: %m");
bd3fa1d2
LP
142 return;
143 }
144
145 if (k >= 0)
146 log_warning("sigtimedwait() returned unexpected signal.");
147 }
148 }
149}
150
0bee65f0 151static int killall(int sig, Set *pids, bool send_sighup) {
aaf7eb81 152 _cleanup_closedir_ DIR *dir = NULL;
bd3fa1d2 153 struct dirent *d;
bd3fa1d2
LP
154
155 dir = opendir("/proc");
156 if (!dir)
157 return -errno;
158
159 while ((d = readdir(dir))) {
160 pid_t pid;
60053efb 161 int r;
bd3fa1d2
LP
162
163 if (d->d_type != DT_DIR &&
164 d->d_type != DT_UNKNOWN)
165 continue;
166
167 if (parse_pid(d->d_name, &pid) < 0)
168 continue;
169
170 if (ignore_proc(pid))
171 continue;
172
df758e98 173 if (sig == SIGKILL) {
3e09eb5c 174 _cleanup_free_ char *s = NULL;
df758e98
KS
175
176 get_process_comm(pid, &s);
ccd06097 177 log_notice("Sending SIGKILL to PID "PID_FMT" (%s).", pid, strna(s));
df758e98
KS
178 }
179
aaf7eb81 180 if (kill(pid, sig) >= 0) {
60053efb 181 if (pids) {
fea72cc0 182 r = set_put(pids, PID_TO_PTR(pid));
60053efb
TA
183 if (r < 0)
184 log_oom();
185 }
aaf7eb81 186 } else if (errno != ENOENT)
56f64d95 187 log_warning_errno(errno, "Could not kill %d: %m", pid);
0bee65f0
LP
188
189 if (send_sighup) {
190 /* Optionally, also send a SIGHUP signal, but
191 only if the process has a controlling
192 tty. This is useful to allow handling of
193 shells which ignore SIGTERM but react to
194 SIGHUP. We do not send this to processes that
195 have no controlling TTY since we don't want to
196 trigger reloads of daemon processes. Also we
197 make sure to only send this after SIGTERM so
198 that SIGTERM is always first in the queue. */
199
200
201 if (get_ctty_devnr(pid, NULL) >= 0)
202 kill(pid, SIGHUP);
203 }
bd3fa1d2
LP
204 }
205
aaf7eb81 206 return set_size(pids);
bd3fa1d2
LP
207}
208
6301a98c 209void broadcast_signal(int sig, bool wait_for_exit, bool send_sighup) {
bd3fa1d2 210 sigset_t mask, oldmask;
e1d75803 211 _cleanup_set_free_ Set *pids = NULL;
aaf7eb81
LP
212
213 if (wait_for_exit)
d5099efc 214 pids = set_new(NULL);
bd3fa1d2
LP
215
216 assert_se(sigemptyset(&mask) == 0);
217 assert_se(sigaddset(&mask, SIGCHLD) == 0);
218 assert_se(sigprocmask(SIG_BLOCK, &mask, &oldmask) == 0);
219
220 if (kill(-1, SIGSTOP) < 0 && errno != ESRCH)
56f64d95 221 log_warning_errno(errno, "kill(-1, SIGSTOP) failed: %m");
bd3fa1d2 222
0bee65f0 223 killall(sig, pids, send_sighup);
bd3fa1d2
LP
224
225 if (kill(-1, SIGCONT) < 0 && errno != ESRCH)
56f64d95 226 log_warning_errno(errno, "kill(-1, SIGCONT) failed: %m");
bd3fa1d2 227
3d141780 228 if (wait_for_exit)
aaf7eb81
LP
229 wait_for_children(pids, &mask);
230
231 assert_se(sigprocmask(SIG_SETMASK, &oldmask, NULL) == 0);
bd3fa1d2 232}