1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120#define WANT_PIDFILE 1
121#include "libbb.h"
122#include "common_bufsiz.h"
123
124struct pid_list {
125 struct pid_list *next;
126 pid_t pid;
127};
128
129enum {
130 CTX_STOP = (1 << 0),
131 CTX_START = (1 << 1),
132 OPT_BACKGROUND = (1 << 2),
133 OPT_QUIET = (1 << 3),
134 OPT_TEST = (1 << 4),
135 OPT_MAKEPID = (1 << 5),
136 OPT_a = (1 << 6),
137 OPT_n = (1 << 7),
138 OPT_s = (1 << 8),
139 OPT_u = (1 << 9),
140 OPT_c = (1 << 10),
141 OPT_x = (1 << 11),
142 OPT_p = (1 << 12),
143 OPT_OKNODO = (1 << 13) * ENABLE_FEATURE_START_STOP_DAEMON_FANCY,
144 OPT_VERBOSE = (1 << 14) * ENABLE_FEATURE_START_STOP_DAEMON_FANCY,
145 OPT_NICELEVEL = (1 << 15) * ENABLE_FEATURE_START_STOP_DAEMON_FANCY,
146};
147#define QUIET (option_mask32 & OPT_QUIET)
148#define TEST (option_mask32 & OPT_TEST)
149
150struct globals {
151 struct pid_list *found_procs;
152 char *userspec;
153 char *cmdname;
154 char *execname;
155 char *pidfile;
156 char *execname_cmpbuf;
157 unsigned execname_sizeof;
158 int user_id;
159 smallint signal_nr;
160#ifdef OLDER_VERSION_OF_X
161 struct stat execstat;
162#endif
163} FIX_ALIASING;
164#define G (*(struct globals*)bb_common_bufsiz1)
165#define userspec (G.userspec )
166#define cmdname (G.cmdname )
167#define execname (G.execname )
168#define pidfile (G.pidfile )
169#define user_id (G.user_id )
170#define signal_nr (G.signal_nr )
171#define INIT_G() do { \
172 setup_common_bufsiz(); \
173 user_id = -1; \
174 signal_nr = 15; \
175} while (0)
176
177#ifdef OLDER_VERSION_OF_X
178
179
180
181
182static int pid_is_exec(pid_t pid)
183{
184 struct stat st;
185 char buf[sizeof("/proc/%u/exe") + sizeof(int)*3];
186
187 sprintf(buf, "/proc/%u/exe", (unsigned)pid);
188 if (stat(buf, &st) < 0)
189 return 0;
190 if (st.st_dev == G.execstat.st_dev
191 && st.st_ino == G.execstat.st_ino)
192 return 1;
193 return 0;
194}
195#else
196static int pid_is_exec(pid_t pid)
197{
198 ssize_t bytes;
199 char buf[sizeof("/proc/%u/cmdline") + sizeof(int)*3];
200 char *procname, *exelink;
201 int match;
202
203 procname = buf + sprintf(buf, "/proc/%u/exe", (unsigned)pid) - 3;
204
205 exelink = xmalloc_readlink(buf);
206 match = (exelink && strcmp(execname, exelink) == 0);
207 free(exelink);
208 if (match)
209 return match;
210
211 strcpy(procname, "cmdline");
212 bytes = open_read_close(buf, G.execname_cmpbuf, G.execname_sizeof);
213 if (bytes > 0) {
214 G.execname_cmpbuf[bytes] = '\0';
215 return strcmp(execname, G.execname_cmpbuf) == 0;
216 }
217 return 0;
218}
219#endif
220
221static int pid_is_name(pid_t pid)
222{
223
224 char buf[32];
225 char *p, *pe;
226
227 sprintf(buf, "/proc/%u/stat", (unsigned)pid);
228 if (open_read_close(buf, buf, sizeof(buf) - 1) < 0)
229 return 0;
230 buf[sizeof(buf) - 1] = '\0';
231 p = strchr(buf, '(');
232 if (!p)
233 return 0;
234 pe = strrchr(++p, ')');
235 if (!pe)
236 return 0;
237 *pe = '\0';
238
239
240
241 if (strlen(p) >= COMM_LEN - 1)
242 return 0;
243 return strcmp(p, cmdname) == 0;
244}
245
246static int pid_is_user(int pid)
247{
248 struct stat sb;
249 char buf[sizeof("/proc/") + sizeof(int)*3];
250
251 sprintf(buf, "/proc/%u", (unsigned)pid);
252 if (stat(buf, &sb) != 0)
253 return 0;
254 return (sb.st_uid == (uid_t)user_id);
255}
256
257static void check(int pid)
258{
259 struct pid_list *p;
260
261 if (execname && !pid_is_exec(pid)) {
262 return;
263 }
264 if (cmdname && !pid_is_name(pid)) {
265 return;
266 }
267 if (userspec && !pid_is_user(pid)) {
268 return;
269 }
270 p = xmalloc(sizeof(*p));
271 p->next = G.found_procs;
272 p->pid = pid;
273 G.found_procs = p;
274}
275
276static void do_pidfile(void)
277{
278 FILE *f;
279 unsigned pid;
280
281 f = fopen_for_read(pidfile);
282 if (f) {
283 if (fscanf(f, "%u", &pid) == 1)
284 check(pid);
285 fclose(f);
286 } else if (errno != ENOENT)
287 bb_perror_msg_and_die("open pidfile %s", pidfile);
288}
289
290static void do_procinit(void)
291{
292 DIR *procdir;
293 struct dirent *entry;
294 int pid;
295
296 if (pidfile) {
297 do_pidfile();
298 return;
299 }
300
301 procdir = xopendir("/proc");
302
303 pid = 0;
304 while (1) {
305 errno = 0;
306 entry = readdir(procdir);
307
308
309 if (errno)
310 continue;
311 if (!entry)
312 break;
313 pid = bb_strtou(entry->d_name, NULL, 10);
314 if (errno)
315 continue;
316 check(pid);
317 }
318 closedir(procdir);
319 if (!pid)
320 bb_simple_error_msg_and_die("nothing in /proc - not mounted?");
321}
322
323static int do_stop(void)
324{
325 char *what;
326 struct pid_list *p;
327 int killed = 0;
328
329 if (cmdname) {
330 if (ENABLE_FEATURE_CLEAN_UP) what = xstrdup(cmdname);
331 if (!ENABLE_FEATURE_CLEAN_UP) what = cmdname;
332 } else if (execname) {
333 if (ENABLE_FEATURE_CLEAN_UP) what = xstrdup(execname);
334 if (!ENABLE_FEATURE_CLEAN_UP) what = execname;
335 } else if (pidfile) {
336 what = xasprintf("process in pidfile '%s'", pidfile);
337 } else if (userspec) {
338 what = xasprintf("process(es) owned by '%s'", userspec);
339 } else {
340 bb_simple_error_msg_and_die("internal error, please report");
341 }
342
343 if (!G.found_procs) {
344 if (!QUIET)
345 printf("no %s found; none killed\n", what);
346 killed = -1;
347 goto ret;
348 }
349 for (p = G.found_procs; p; p = p->next) {
350 if (kill(p->pid, TEST ? 0 : signal_nr) == 0) {
351 killed++;
352 } else {
353 bb_perror_msg("warning: killing process %u", (unsigned)p->pid);
354 p->pid = 0;
355 if (TEST) {
356
357
358 killed = -1;
359 goto ret;
360 }
361 }
362 }
363 if (!QUIET && killed) {
364 printf("stopped %s (pid", what);
365 for (p = G.found_procs; p; p = p->next)
366 if (p->pid)
367 printf(" %u", (unsigned)p->pid);
368 puts(")");
369 }
370 ret:
371 if (ENABLE_FEATURE_CLEAN_UP)
372 free(what);
373 return killed;
374}
375
376#if ENABLE_FEATURE_START_STOP_DAEMON_LONG_OPTIONS
377static const char start_stop_daemon_longopts[] ALIGN1 =
378 "stop\0" No_argument "K"
379 "start\0" No_argument "S"
380 "background\0" No_argument "b"
381 "quiet\0" No_argument "q"
382 "test\0" No_argument "t"
383 "make-pidfile\0" No_argument "m"
384# if ENABLE_FEATURE_START_STOP_DAEMON_FANCY
385 "oknodo\0" No_argument "o"
386 "verbose\0" No_argument "v"
387 "nicelevel\0" Required_argument "N"
388# endif
389 "startas\0" Required_argument "a"
390 "name\0" Required_argument "n"
391 "signal\0" Required_argument "s"
392 "user\0" Required_argument "u"
393 "chuid\0" Required_argument "c"
394 "exec\0" Required_argument "x"
395 "pidfile\0" Required_argument "p"
396# if ENABLE_FEATURE_START_STOP_DAEMON_FANCY
397 "retry\0" Required_argument "R"
398# endif
399 ;
400# define GETOPT32 getopt32long
401# define LONGOPTS start_stop_daemon_longopts,
402#else
403# define GETOPT32 getopt32
404# define LONGOPTS
405#endif
406
407int start_stop_daemon_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
408int start_stop_daemon_main(int argc UNUSED_PARAM, char **argv)
409{
410 unsigned opt;
411 char *signame;
412 char *startas = NULL;
413 char *chuid;
414#if ENABLE_FEATURE_START_STOP_DAEMON_FANCY
415
416
417 char *opt_N;
418#endif
419
420 INIT_G();
421
422 opt = GETOPT32(argv, "^"
423 "KSbqtma:n:s:u:c:x:p:"
424 IF_FEATURE_START_STOP_DAEMON_FANCY("ovN:R:")
425
426
427
428
429
430
431 "\0"
432 "K:S:K--S:S--K:m?p:K?xpun"
433 IF_FEATURE_START_STOP_DAEMON_FANCY("q-v"),
434 LONGOPTS
435 &startas, &cmdname, &signame, &userspec, &chuid, &execname, &pidfile
436 IF_FEATURE_START_STOP_DAEMON_FANCY(,&opt_N)
437
438 IF_FEATURE_START_STOP_DAEMON_FANCY(,NULL)
439 );
440
441 if (opt & OPT_s) {
442 signal_nr = get_signum(signame);
443 if (signal_nr < 0) bb_show_usage();
444 }
445
446
447 argv += optind;
448
449
450
451
452
453
454
455 if (opt & CTX_START) {
456 if (!execname) {
457 execname = startas;
458 if (!execname) {
459 execname = argv[0];
460 if (!execname)
461 bb_show_usage();
462 argv++;
463 }
464 }
465 if (!startas)
466 startas = execname;
467 *--argv = startas;
468 }
469 if (execname) {
470 G.execname_sizeof = strlen(execname) + 1;
471 G.execname_cmpbuf = xmalloc(G.execname_sizeof + 1);
472 }
473
474
475
476
477 if (userspec) {
478 user_id = bb_strtou(userspec, NULL, 10);
479 if (errno)
480 user_id = xuname2uid(userspec);
481 }
482
483
484 do_procinit();
485
486 if (opt & CTX_STOP) {
487 int i = do_stop();
488 return (opt & OPT_OKNODO) ? 0 : (i <= 0);
489 }
490
491
492
493 if (G.found_procs) {
494 if (!QUIET)
495 printf("%s is already running\n", execname);
496 return !(opt & OPT_OKNODO);
497 }
498
499#ifdef OLDER_VERSION_OF_X
500 if (execname)
501 xstat(execname, &G.execstat);
502#endif
503
504 if (opt & OPT_BACKGROUND) {
505
506
507
508
509
510
511
512
513
514
515
516 pid_t pid = xvfork();
517 if (pid != 0) {
518
519
520
521
522 _exit(EXIT_SUCCESS);
523 }
524
525 setsid();
526
527 bb_daemon_helper(DAEMON_DEVNULL_STDIO + DAEMON_CLOSE_EXTRA_FDS);
528
529
530
531
532 pid = xvfork();
533 if (pid != 0)
534 _exit(EXIT_SUCCESS);
535 }
536 if (opt & OPT_MAKEPID) {
537
538 write_pidfile(pidfile);
539 }
540#if ENABLE_FEATURE_START_STOP_DAEMON_FANCY
541 if (opt & OPT_NICELEVEL) {
542
543 int prio = getpriority(PRIO_PROCESS, 0) + xatoi_range(opt_N, INT_MIN/2, INT_MAX/2);
544 if (setpriority(PRIO_PROCESS, 0, prio) < 0) {
545 bb_perror_msg_and_die("setpriority(%d)", prio);
546 }
547 }
548#endif
549 if (opt & OPT_c) {
550 struct bb_uidgid_t ugid;
551 parse_chown_usergroup_or_die(&ugid, chuid);
552 if (ugid.uid != (uid_t) -1L) {
553 struct passwd *pw = xgetpwuid(ugid.uid);
554 if (ugid.gid != (gid_t) -1L)
555 pw->pw_gid = ugid.gid;
556
557 change_identity(pw);
558 } else if (ugid.gid != (gid_t) -1L) {
559 xsetgid(ugid.gid);
560 setgroups(1, &ugid.gid);
561 }
562 }
563
564
565
566
567 execvp(execname, argv);
568 bb_perror_msg_and_die("can't execute '%s'", startas);
569}
570