function old new delta vgetopt32 1318 1392 +74 runsvdir_main 703 713 +10 bb_make_directory 423 425 +2 collect_cpu 546 545 -1 opt_chars 3 - -3 opt_complementary 4 - -4 tftpd_main 567 562 -5 ntp_init 476 471 -5 zcip_main 1266 1256 -10 xxd_main 428 418 -10 whois_main 140 130 -10 who_main 463 453 -10 which_main 212 202 -10 wget_main 2535 2525 -10 watchdog_main 291 281 -10 watch_main 222 212 -10 vlock_main 399 389 -10 uuencode_main 332 322 -10 uudecode_main 316 306 -10 unlink_main 45 35 -10 udhcpd_main 1482 1472 -10 udhcpc_main 2762 2752 -10 tune2fs_main 290 280 -10 tunctl_main 366 356 -10 truncate_main 218 208 -10 tr_main 518 508 -10 time_main 1134 1124 -10 tftp_main 286 276 -10 telnetd_main 1873 1863 -10 tcpudpsvd_main 1785 1775 -10 taskset_main 521 511 -10 tar_main 1009 999 -10 tail_main 1644 1634 -10 syslogd_main 1967 1957 -10 switch_root_main 368 358 -10 svlogd_main 1454 1444 -10 sv 1296 1286 -10 stat_main 104 94 -10 start_stop_daemon_main 1028 1018 -10 split_main 542 532 -10 sort_main 796 786 -10 slattach_main 624 614 -10 shuf_main 504 494 -10 setsid_main 96 86 -10 setserial_main 1132 1122 -10 setfont_main 388 378 -10 setconsole_main 78 68 -10 sendmail_main 1209 1199 -10 sed_main 677 667 -10 script_main 1077 1067 -10 run_parts_main 325 315 -10 rtcwake_main 454 444 -10 rm_main 175 165 -10 reformime_main 119 109 -10 readlink_main 123 113 -10 rdate_main 246 236 -10 pwdx_main 189 179 -10 pstree_main 317 307 -10 pscan_main 663 653 -10 popmaildir_main 818 808 -10 pmap_main 80 70 -10 nc_main 1042 1032 -10 mv_main 558 548 -10 mountpoint_main 477 467 -10 mount_main 1264 1254 -10 modprobe_main 768 758 -10 modinfo_main 333 323 -10 mktemp_main 200 190 -10 mkswap_main 324 314 -10 mkfs_vfat_main 1489 1479 -10 microcom_main 715 705 -10 md5_sha1_sum_main 521 511 -10 man_main 867 857 -10 makedevs_main 1052 1042 -10 ls_main 563 553 -10 losetup_main 432 422 -10 loadfont_main 89 79 -10 ln_main 524 514 -10 link_main 75 65 -10 ipcalc_main 544 534 -10 iostat_main 2397 2387 -10 install_main 768 758 -10 id_main 480 470 -10 i2cset_main 1239 1229 -10 i2cget_main 380 370 -10 i2cdump_main 1482 1472 -10 i2cdetect_main 682 672 -10 hwclock_main 406 396 -10 httpd_main 741 731 -10 grep_main 837 827 -10 getty_main 1559 1549 -10 fuser_main 297 287 -10 ftpgetput_main 345 335 -10 ftpd_main 2232 2222 -10 fstrim_main 251 241 -10 fsfreeze_main 77 67 -10 fsck_minix_main 2921 2911 -10 flock_main 314 304 -10 flashcp_main 740 730 -10 flash_eraseall_main 833 823 -10 fdformat_main 532 522 -10 expand_main 680 670 -10 eject_main 335 325 -10 dumpleases_main 630 620 -10 du_main 314 304 -10 dos2unix_main 441 431 -10 diff_main 1350 1340 -10 df_main 1064 1054 -10 date_main 1095 1085 -10 cut_main 961 951 -10 cryptpw_main 228 218 -10 crontab_main 575 565 -10 crond_main 1149 1139 -10 cp_main 370 360 -10 common_traceroute_main 3834 3824 -10 common_ping_main 1767 1757 -10 comm_main 239 229 -10 cmp_main 655 645 -10 chrt_main 379 369 -10 chpst_main 704 694 -10 chpasswd_main 308 298 -10 chown_main 171 161 -10 chmod_main 158 148 -10 cat_main 428 418 -10 bzip2_main 120 110 -10 blkdiscard_main 264 254 -10 base64_main 221 211 -10 arping_main 1665 1655 -10 ar_main 556 546 -10 adjtimex_main 406 396 -10 adduser_main 882 872 -10 addgroup_main 411 401 -10 acpid_main 1198 1188 -10 optstring 11 - -11 opt_string 18 - -18 OPT_STR 25 - -25 ubi_tools_main 1288 1258 -30 ls_options 31 - -31 ------------------------------------------------------------------------------ (add/remove: 0/6 grow/shrink: 3/129 up/down: 86/-1383) Total: -1297 bytes text data bss dec hex filename 915428 485 6876 922789 e14a5 busybox_old 914629 485 6872 921986 e1182 busybox_unstripped Signed-off-by: Denys Vlasenko <vda.linux@googlemail.com>
		
			
				
	
	
		
			334 lines
		
	
	
		
			6.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
			
		
		
	
	
			334 lines
		
	
	
		
			6.6 KiB
		
	
	
	
		
			C
		
	
	
	
	
	
/* vi: set sw=4 ts=4: */
 | 
						|
/*
 | 
						|
 * tiny fuser implementation
 | 
						|
 *
 | 
						|
 * Copyright 2004 Tony J. White
 | 
						|
 *
 | 
						|
 * Licensed under GPLv2, see file LICENSE in this source tree.
 | 
						|
 */
 | 
						|
//config:config FUSER
 | 
						|
//config:	bool "fuser (7 kb)"
 | 
						|
//config:	default y
 | 
						|
//config:	help
 | 
						|
//config:	fuser lists all PIDs (Process IDs) that currently have a given
 | 
						|
//config:	file open. fuser can also list all PIDs that have a given network
 | 
						|
//config:	(TCP or UDP) port open.
 | 
						|
 | 
						|
//applet:IF_FUSER(APPLET(fuser, BB_DIR_USR_BIN, BB_SUID_DROP))
 | 
						|
 | 
						|
//kbuild:lib-$(CONFIG_FUSER) += fuser.o
 | 
						|
 | 
						|
//usage:#define fuser_trivial_usage
 | 
						|
//usage:       "[OPTIONS] FILE or PORT/PROTO"
 | 
						|
//usage:#define fuser_full_usage "\n\n"
 | 
						|
//usage:       "Find processes which use FILEs or PORTs\n"
 | 
						|
//usage:     "\n	-m	Find processes which use same fs as FILEs"
 | 
						|
//usage:     "\n	-4,-6	Search only IPv4/IPv6 space"
 | 
						|
//usage:     "\n	-s	Don't display PIDs"
 | 
						|
//usage:     "\n	-k	Kill found processes"
 | 
						|
//usage:     "\n	-SIGNAL	Signal to send (default: KILL)"
 | 
						|
 | 
						|
#include "libbb.h"
 | 
						|
#include "common_bufsiz.h"
 | 
						|
 | 
						|
#define MAX_LINE 255
 | 
						|
 | 
						|
#define OPTION_STRING "mks64"
 | 
						|
enum {
 | 
						|
	OPT_MOUNT  = (1 << 0),
 | 
						|
	OPT_KILL   = (1 << 1),
 | 
						|
	OPT_SILENT = (1 << 2),
 | 
						|
	OPT_IP6    = (1 << 3),
 | 
						|
	OPT_IP4    = (1 << 4),
 | 
						|
};
 | 
						|
 | 
						|
typedef struct inode_list {
 | 
						|
	struct inode_list *next;
 | 
						|
	ino_t inode;
 | 
						|
	dev_t dev;
 | 
						|
} inode_list;
 | 
						|
 | 
						|
struct globals {
 | 
						|
	int recursion_depth;
 | 
						|
	pid_t mypid;
 | 
						|
	inode_list *inode_list_head;
 | 
						|
	smallint kill_failed;
 | 
						|
	int killsig;
 | 
						|
} FIX_ALIASING;
 | 
						|
#define G (*(struct globals*)bb_common_bufsiz1)
 | 
						|
#define INIT_G() do { \
 | 
						|
	setup_common_bufsiz(); \
 | 
						|
	G.mypid = getpid(); \
 | 
						|
	G.killsig = SIGKILL; \
 | 
						|
} while (0)
 | 
						|
 | 
						|
static void add_inode(const struct stat *st)
 | 
						|
{
 | 
						|
	inode_list **curr = &G.inode_list_head;
 | 
						|
 | 
						|
	while (*curr) {
 | 
						|
		if ((*curr)->dev == st->st_dev
 | 
						|
		 && (*curr)->inode == st->st_ino
 | 
						|
		) {
 | 
						|
			return;
 | 
						|
		}
 | 
						|
		curr = &(*curr)->next;
 | 
						|
	}
 | 
						|
 | 
						|
	*curr = xzalloc(sizeof(inode_list));
 | 
						|
	(*curr)->dev = st->st_dev;
 | 
						|
	(*curr)->inode = st->st_ino;
 | 
						|
}
 | 
						|
 | 
						|
static smallint search_dev_inode(const struct stat *st)
 | 
						|
{
 | 
						|
	inode_list *ilist = G.inode_list_head;
 | 
						|
 | 
						|
	while (ilist) {
 | 
						|
		if (ilist->dev == st->st_dev) {
 | 
						|
			if (option_mask32 & OPT_MOUNT)
 | 
						|
				return 1;
 | 
						|
			if (ilist->inode == st->st_ino)
 | 
						|
				return 1;
 | 
						|
		}
 | 
						|
		ilist = ilist->next;
 | 
						|
	}
 | 
						|
	return 0;
 | 
						|
}
 | 
						|
 | 
						|
enum {
 | 
						|
	PROC_NET = 0,
 | 
						|
	PROC_DIR,
 | 
						|
	PROC_DIR_LINKS,
 | 
						|
	PROC_SUBDIR_LINKS,
 | 
						|
};
 | 
						|
 | 
						|
static smallint scan_proc_net_or_maps(const char *path, unsigned port)
 | 
						|
{
 | 
						|
	FILE *f;
 | 
						|
	char line[MAX_LINE + 1], addr[68];
 | 
						|
	int major, minor, r;
 | 
						|
	long long uint64_inode;
 | 
						|
	unsigned tmp_port;
 | 
						|
	smallint retval;
 | 
						|
	struct stat statbuf;
 | 
						|
	const char *fmt;
 | 
						|
	void *fag, *sag;
 | 
						|
 | 
						|
	f = fopen_for_read(path);
 | 
						|
	if (!f)
 | 
						|
		return 0;
 | 
						|
 | 
						|
	if (G.recursion_depth == PROC_NET) {
 | 
						|
		int fd;
 | 
						|
 | 
						|
		/* find socket dev */
 | 
						|
		statbuf.st_dev = 0;
 | 
						|
		fd = socket(AF_INET, SOCK_DGRAM, 0);
 | 
						|
		if (fd >= 0) {
 | 
						|
			fstat(fd, &statbuf);
 | 
						|
			close(fd);
 | 
						|
		}
 | 
						|
 | 
						|
		fmt = "%*d: %64[0-9A-Fa-f]:%x %*x:%*x %*x "
 | 
						|
			"%*x:%*x %*x:%*x %*x %*d %*d %llu";
 | 
						|
		fag = addr;
 | 
						|
		sag = &tmp_port;
 | 
						|
	} else {
 | 
						|
		fmt = "%*s %*s %*s %x:%x %llu";
 | 
						|
		fag = &major;
 | 
						|
		sag = &minor;
 | 
						|
	}
 | 
						|
 | 
						|
	retval = 0;
 | 
						|
	while (fgets(line, MAX_LINE, f)) {
 | 
						|
		r = sscanf(line, fmt, fag, sag, &uint64_inode);
 | 
						|
		if (r != 3)
 | 
						|
			continue;
 | 
						|
 | 
						|
		statbuf.st_ino = uint64_inode;
 | 
						|
		if (G.recursion_depth == PROC_NET) {
 | 
						|
			r = strlen(addr);
 | 
						|
			if (r == 8 && (option_mask32 & OPT_IP6))
 | 
						|
				continue;
 | 
						|
			if (r > 8 && (option_mask32 & OPT_IP4))
 | 
						|
				continue;
 | 
						|
			if (tmp_port == port)
 | 
						|
				add_inode(&statbuf);
 | 
						|
		} else {
 | 
						|
			if (major != 0 && minor != 0 && statbuf.st_ino != 0) {
 | 
						|
				statbuf.st_dev = makedev(major, minor);
 | 
						|
				retval = search_dev_inode(&statbuf);
 | 
						|
				if (retval)
 | 
						|
					break;
 | 
						|
			}
 | 
						|
		}
 | 
						|
	}
 | 
						|
	fclose(f);
 | 
						|
 | 
						|
	return retval;
 | 
						|
}
 | 
						|
 | 
						|
static smallint scan_recursive(const char *path)
 | 
						|
{
 | 
						|
	DIR *d;
 | 
						|
	struct dirent *d_ent;
 | 
						|
	smallint stop_scan;
 | 
						|
	smallint retval;
 | 
						|
 | 
						|
	d = opendir(path);
 | 
						|
	if (d == NULL)
 | 
						|
		return 0;
 | 
						|
 | 
						|
	G.recursion_depth++;
 | 
						|
	retval = 0;
 | 
						|
	stop_scan = 0;
 | 
						|
	while (!stop_scan && (d_ent = readdir(d)) != NULL) {
 | 
						|
		struct stat statbuf;
 | 
						|
		pid_t pid;
 | 
						|
		char *subpath;
 | 
						|
 | 
						|
		subpath = concat_subpath_file(path, d_ent->d_name);
 | 
						|
		if (subpath == NULL)
 | 
						|
			continue; /* . or .. */
 | 
						|
 | 
						|
		switch (G.recursion_depth) {
 | 
						|
		case PROC_DIR:
 | 
						|
			pid = (pid_t)bb_strtou(d_ent->d_name, NULL, 10);
 | 
						|
			if (errno != 0
 | 
						|
			 || pid == G.mypid
 | 
						|
			/* "this PID doesn't use specified FILEs or PORT/PROTO": */
 | 
						|
			 || scan_recursive(subpath) == 0
 | 
						|
			) {
 | 
						|
				break;
 | 
						|
			}
 | 
						|
			if (option_mask32 & OPT_KILL) {
 | 
						|
				if (kill(pid, G.killsig) != 0) {
 | 
						|
					bb_perror_msg("kill pid %s", d_ent->d_name);
 | 
						|
					G.kill_failed = 1;
 | 
						|
				}
 | 
						|
			}
 | 
						|
			if (!(option_mask32 & OPT_SILENT))
 | 
						|
				printf("%s ", d_ent->d_name);
 | 
						|
			retval = 1;
 | 
						|
			break;
 | 
						|
 | 
						|
		case PROC_DIR_LINKS:
 | 
						|
			switch (
 | 
						|
				index_in_substrings(
 | 
						|
					"cwd"  "\0" "exe"  "\0"
 | 
						|
					"root" "\0" "fd"   "\0"
 | 
						|
					"lib"  "\0" "mmap" "\0"
 | 
						|
					"maps" "\0",
 | 
						|
					d_ent->d_name
 | 
						|
				)
 | 
						|
			) {
 | 
						|
			enum {
 | 
						|
				CWD_LINK,
 | 
						|
				EXE_LINK,
 | 
						|
				ROOT_LINK,
 | 
						|
				FD_DIR_LINKS,
 | 
						|
				LIB_DIR_LINKS,
 | 
						|
				MMAP_DIR_LINKS,
 | 
						|
				MAPS,
 | 
						|
			};
 | 
						|
			case CWD_LINK:
 | 
						|
			case EXE_LINK:
 | 
						|
			case ROOT_LINK:
 | 
						|
				goto scan_link;
 | 
						|
			case FD_DIR_LINKS:
 | 
						|
			case LIB_DIR_LINKS:
 | 
						|
			case MMAP_DIR_LINKS:
 | 
						|
				stop_scan = scan_recursive(subpath);
 | 
						|
				if (stop_scan)
 | 
						|
					retval = stop_scan;
 | 
						|
				break;
 | 
						|
			case MAPS:
 | 
						|
				stop_scan = scan_proc_net_or_maps(subpath, 0);
 | 
						|
				if (stop_scan)
 | 
						|
					retval = stop_scan;
 | 
						|
			default:
 | 
						|
				break;
 | 
						|
			}
 | 
						|
			break;
 | 
						|
		case PROC_SUBDIR_LINKS:
 | 
						|
  scan_link:
 | 
						|
			if (stat(subpath, &statbuf) < 0)
 | 
						|
				break;
 | 
						|
			stop_scan = search_dev_inode(&statbuf);
 | 
						|
			if (stop_scan)
 | 
						|
				retval = stop_scan;
 | 
						|
		default:
 | 
						|
			break;
 | 
						|
		}
 | 
						|
		free(subpath);
 | 
						|
	}
 | 
						|
	closedir(d);
 | 
						|
	G.recursion_depth--;
 | 
						|
	return retval;
 | 
						|
}
 | 
						|
 | 
						|
int fuser_main(int argc, char **argv) MAIN_EXTERNALLY_VISIBLE;
 | 
						|
int fuser_main(int argc UNUSED_PARAM, char **argv)
 | 
						|
{
 | 
						|
	char **pp;
 | 
						|
 | 
						|
	INIT_G();
 | 
						|
 | 
						|
	/* Handle -SIGNAL. Oh my... */
 | 
						|
	pp = argv;
 | 
						|
	while (*++pp) {
 | 
						|
		int sig;
 | 
						|
		char *arg = *pp;
 | 
						|
 | 
						|
		if (arg[0] != '-')
 | 
						|
			continue;
 | 
						|
		if (arg[1] == '-' && arg[2] == '\0') /* "--" */
 | 
						|
			break;
 | 
						|
		if ((arg[1] == '4' || arg[1] == '6') && arg[2] == '\0')
 | 
						|
			continue; /* it's "-4" or "-6" */
 | 
						|
		sig = get_signum(&arg[1]);
 | 
						|
		if (sig < 0)
 | 
						|
			continue;
 | 
						|
		/* "-SIGNAL" option found. Remove it and bail out */
 | 
						|
		G.killsig = sig;
 | 
						|
		do {
 | 
						|
			pp[0] = arg = pp[1];
 | 
						|
			pp++;
 | 
						|
		} while (arg);
 | 
						|
		break;
 | 
						|
	}
 | 
						|
 | 
						|
	getopt32(argv, "^" OPTION_STRING "\0" "-1"/*at least one arg*/);
 | 
						|
	argv += optind;
 | 
						|
 | 
						|
	pp = argv;
 | 
						|
	while (*pp) {
 | 
						|
		/* parse net arg */
 | 
						|
		unsigned port;
 | 
						|
		char path[sizeof("/proc/net/TCP6")];
 | 
						|
 | 
						|
		strcpy(path, "/proc/net/");
 | 
						|
		if (sscanf(*pp, "%u/%4s", &port, path + sizeof("/proc/net/")-1) == 2
 | 
						|
		 && access(path, R_OK) == 0
 | 
						|
		) {
 | 
						|
			/* PORT/PROTO */
 | 
						|
			scan_proc_net_or_maps(path, port);
 | 
						|
		} else {
 | 
						|
			/* FILE */
 | 
						|
			struct stat statbuf;
 | 
						|
			xstat(*pp, &statbuf);
 | 
						|
			add_inode(&statbuf);
 | 
						|
		}
 | 
						|
		pp++;
 | 
						|
	}
 | 
						|
 | 
						|
	if (scan_recursive("/proc")) {
 | 
						|
		if (!(option_mask32 & OPT_SILENT))
 | 
						|
			bb_putchar('\n');
 | 
						|
		return G.kill_failed;
 | 
						|
	}
 | 
						|
 | 
						|
	return EXIT_FAILURE;
 | 
						|
}
 |