4b44ab98c1
pgrep and friends naturally filter their own processes from their matches. The same issue can occur when elevating with tools like sudo or doas, where the elevating shim layers linger as a parent and are returned in the results. For example: % sudo pkill -9 -cf someelevatedcmdline 1 zsh: killed sudo pkill -9 -cf someelevatedcmdline This is a situation we've actually seen in production, where some poor soul changes how permission management works (for example with Linux's hidepid option), needs to elevate a pgrep or pkill call, and now ends up with more than they bargained for. Even after the issue is noticed, resolving it requires reinventing some of the pgrep logic, which is unfortunate. This commit adds the -A/--ignore-ancestors option which excludes pgrep's ancestors from the results: % sudo ./pkill -9 -Acf someelevatedcmdline 0 We looks at multiple layers of the process hierarchy because, while things like sudo only have one layer of shimming, some mechanisms (like those found in a typical container manager like those found in Docker or Kubernetes) may have many more. Signed-off-by: Chris Down <chris@chrisdown.name> |
||
---|---|---|
.. | ||
free.1 | ||
kill.1 | ||
pgrep.1 | ||
pidof.1 | ||
pidwait.1 | ||
pkill.1 | ||
pmap.1 | ||
procio.3 | ||
procps_misc.3 | ||
procps_pids.3 | ||
procps.3 | ||
ps.1 | ||
pwdx.1 | ||
skill.1 | ||
slabtop.1 | ||
snice.1 | ||
sysctl.8 | ||
sysctl.conf.5 | ||
tload.1 | ||
top.1 | ||
uptime.1 | ||
vmstat.8 | ||
w.1 | ||
watch.1 |