Print process tree with PID and module path.
Thanks Bader Aldurai.
\r
Since version 2.25, NSSM can dump the configuration of services it manages.\r
\r
+Since version 2.25, NSSM can show the processes managed by a service.\r
+\r
\r
Usage\r
-----\r
nssm list\r
\r
\r
+Showing processes started by a service\r
+--------------------------------------\r
+The following command will print the process ID and executable path of\r
+processes started by a given service:\r
+\r
+ nssm processes <servicename>\r
+\r
+\r
Exporting service configuration\r
-------------------------------\r
NSSM can dump commands which would recreate the configuration of a service.\r
Thanks to Mathias Breiner for help with Visual Studio and some registry fixes.\r
Thanks to David Bremner for general tidyups.\r
Thanks to Nabil Redmann for suggesting redirecting hooks' output.\r
+Thanks to Bader Aldurai for suggesting the process tree.\r
\r
Licence\r
-------\r
exit(ret);\r
}\r
if (str_equiv(argv[1], _T("list"))) exit(list_nssm_services());\r
+ if (str_equiv(argv[1], _T("processes"))) exit(service_process_tree(argc - 2, argv + 2));\r
if (str_equiv(argv[1], _T("remove"))) {\r
if (! is_admin) exit(elevate(argc, argv, NSSM_MESSAGE_NOT_ADMINISTRATOR_CANNOT_REMOVE));\r
exit(pre_remove_service(argc - 2, argv + 2));\r
/>\r
<Tool\r
Name="VCLinkerTool"\r
- AdditionalDependencies="shlwapi.lib"\r
+ AdditionalDependencies="psapi.lib shlwapi.lib"\r
LinkIncremental="2"\r
SuppressStartupBanner="true"\r
GenerateDebugInformation="true"\r
/>\r
<Tool\r
Name="VCLinkerTool"\r
- AdditionalDependencies="shlwapi.lib"\r
+ AdditionalDependencies="psapi.lib shlwapi.lib"\r
LinkIncremental="2"\r
SuppressStartupBanner="true"\r
GenerateDebugInformation="true"\r
/>\r
<Tool\r
Name="VCLinkerTool"\r
- AdditionalDependencies="shlwapi.lib"\r
+ AdditionalDependencies="psapi.lib shlwapi.lib"\r
LinkIncremental="1"\r
SuppressStartupBanner="true"\r
ProgramDatabaseFile="$(OutDir)/$(ProjectName).pdb"\r
/>\r
<Tool\r
Name="VCLinkerTool"\r
- AdditionalDependencies="shlwapi.lib"\r
+ AdditionalDependencies="psapi.lib shlwapi.lib"\r
LinkIncremental="1"\r
SuppressStartupBanner="true"\r
ProgramDatabaseFile="$(OutDir)/$(ProjectName).pdb"\r
/* Shouldn't happen unless the service failed to start. */\r
if (! k->pid) return; /* XXX: needed? */\r
unsigned long pid = k->pid;\r
+ unsigned long depth = k->depth;\r
\r
TCHAR pid_string[16], code[16];\r
_sntprintf_s(pid_string, _countof(pid_string), _TRUNCATE, _T("%lu"), pid);\r
_sntprintf_s(code, _countof(code), _TRUNCATE, _T("%lu"), k->exitcode);\r
- log_event(EVENTLOG_INFORMATION_TYPE, NSSM_EVENT_KILLING, k->name, pid_string, code, 0);\r
+ if (fn == kill_process) log_event(EVENTLOG_INFORMATION_TYPE, NSSM_EVENT_KILLING, k->name, pid_string, code, 0);\r
\r
/* We will need a process handle in order to call TerminateProcess() later. */\r
HANDLE process_handle = OpenProcess(SYNCHRONIZE | PROCESS_QUERY_INFORMATION | PROCESS_VM_READ | PROCESS_TERMINATE, false, pid);\r
/* Kill this process first, then its descendents. */\r
TCHAR ppid_string[16];\r
_sntprintf_s(ppid_string, _countof(ppid_string), _TRUNCATE, _T("%lu"), ppid);\r
- log_event(EVENTLOG_INFORMATION_TYPE, NSSM_EVENT_KILL_PROCESS_TREE, pid_string, ppid_string, k->name, 0);\r
+ if (fn == kill_process) log_event(EVENTLOG_INFORMATION_TYPE, NSSM_EVENT_KILL_PROCESS_TREE, pid_string, ppid_string, k->name, 0);\r
k->process_handle = process_handle; /* XXX: open directly? */\r
if (! fn(service, k)) {\r
/* Maybe it already died. */\r
}\r
\r
/* This is a child of the doomed process so kill it. */\r
+ k->depth++;\r
if (! check_parent(k, &pe, pid)) {\r
k->pid = pe.th32ProcessID;\r
walk_process_tree(service, fn, k, ppid);\r
if (ret == ERROR_NO_MORE_FILES) break;\r
log_event(EVENTLOG_ERROR_TYPE, NSSM_EVENT_PROCESS_ENUMERATE_FAILED, k->name, error_string(GetLastError()), 0);\r
CloseHandle(snapshot);\r
+ k->depth = depth;\r
return;\r
}\r
\r
}\r
k->pid = pid;\r
}\r
+ k->depth = depth;\r
\r
CloseHandle(snapshot);\r
}\r
void kill_process_tree(kill_t *k, unsigned long ppid) {\r
return walk_process_tree(NULL, kill_process, k, ppid);\r
}\r
+\r
+int print_process(nssm_service_t *service, kill_t *k) {\r
+ TCHAR exe[EXE_LENGTH];\r
+ TCHAR *buffer = 0;\r
+ if (k->depth) {\r
+ buffer = (TCHAR *) HeapAlloc(GetProcessHeap(), 0, (k->depth + 1) * sizeof(TCHAR));\r
+ if (buffer) {\r
+ unsigned long i;\r
+ for (i = 0; i < k->depth; i++) buffer[i] = _T(' ');\r
+ buffer[i] = _T('\0');\r
+ }\r
+ }\r
+ if (! GetModuleFileNameEx(k->process_handle, NULL, exe, _countof(exe))) _sntprintf_s(exe, _countof(exe), _TRUNCATE, _T("???"));\r
+\r
+ _tprintf(_T("% 8lu %s%s\n"), k->pid, buffer ? buffer : _T(""), exe);\r
+\r
+ if (buffer) HeapFree(GetProcessHeap(), 0, buffer);\r
+ return 1;\r
+}\r
+\r
+int print_process(kill_t *k) {\r
+ return print_process(NULL, k);\r
+}\r
#ifndef PROCESS_H\r
#define PROCESS_H\r
\r
+#include <psapi.h>\r
#include <tlhelp32.h>\r
\r
typedef struct {\r
TCHAR *name;\r
HANDLE process_handle;\r
+ unsigned long depth;\r
unsigned long pid;\r
unsigned long exitcode;\r
unsigned long stop_method;\r
int kill_console(kill_t *);\r
int kill_process(nssm_service_t *, kill_t *);\r
int kill_process(kill_t *);\r
+int print_process(nssm_service_t *, kill_t *);\r
+int print_process(kill_t *);\r
void walk_process_tree(nssm_service_t *, walk_function_t, kill_t *, unsigned long);\r
void kill_process_tree(kill_t *, unsigned long);\r
\r
HeapFree(GetProcessHeap(), 0, status);\r
return 0;\r
}\r
+\r
+int service_process_tree(int argc, TCHAR **argv) {\r
+ int errors = 0;\r
+ if (argc < 1) return usage(1);\r
+\r
+ SC_HANDLE services = open_service_manager(SC_MANAGER_CONNECT);\r
+ if (! services) {\r
+ print_message(stderr, NSSM_MESSAGE_OPEN_SERVICE_MANAGER_FAILED);\r
+ return 1;\r
+ }\r
+\r
+ /*\r
+ We need SeDebugPrivilege to read the process tree.\r
+ We ignore failure here so that an error will be printed later when we\r
+ try to open a process handle.\r
+ */\r
+ HANDLE token = get_debug_token();\r
+\r
+ TCHAR canonical_name[SERVICE_NAME_LENGTH];\r
+ SERVICE_STATUS_PROCESS service_status;\r
+ nssm_service_t *service;\r
+ kill_t k;\r
+\r
+ int i;\r
+ for (i = 0; i < argc; i++) {\r
+ TCHAR *service_name = argv[i];\r
+ SC_HANDLE service_handle = open_service(services, service_name, SERVICE_QUERY_STATUS, canonical_name, _countof(canonical_name));\r
+ if (! service_handle) {\r
+ errors++;\r
+ continue;\r
+ }\r
+\r
+ unsigned long size;\r
+ int ret = QueryServiceStatusEx(service_handle, SC_STATUS_PROCESS_INFO, (LPBYTE) &service_status, sizeof(service_status), &size);\r
+ long error = GetLastError();\r
+ CloseServiceHandle(service_handle);\r
+ if (! ret) {\r
+ _ftprintf(stderr, _T("%s: %s\n"), canonical_name, error_string(error));\r
+ errors++;\r
+ continue;\r
+ }\r
+\r
+ ZeroMemory(&k, sizeof(k));\r
+ k.pid = service_status.dwProcessId;\r
+ if (! k.pid) continue;\r
+\r
+ k.process_handle = OpenProcess(PROCESS_QUERY_INFORMATION | PROCESS_VM_READ, false, k.pid);\r
+ if (! k.process_handle) {\r
+ _ftprintf(stderr, _T("%s: %lu: %s\n"), canonical_name, k.pid, error_string(GetLastError()));\r
+ continue;\r
+ }\r
+\r
+ if (get_process_creation_time(k.process_handle, &k.creation_time)) continue;\r
+ /* Dummy exit time so we can check processes' parents. */\r
+ GetSystemTimeAsFileTime(&k.exit_time);\r
+\r
+ service = alloc_nssm_service();\r
+ if (! service) {\r
+ errors++;\r
+ continue;\r
+ }\r
+\r
+ _sntprintf_s(service->name, _countof(service->name), _TRUNCATE, _T("%s"), canonical_name);\r
+ k.name = service->name;\r
+ walk_process_tree(service, print_process, &k, k.pid);\r
+\r
+ cleanup_nssm_service(service);\r
+ }\r
+\r
+ CloseServiceHandle(services);\r
+ if (token != INVALID_HANDLE_VALUE) CloseHandle(token);\r
+\r
+ return errors;\r
+}\r
void throttle_restart(nssm_service_t *);\r
int await_single_handle(SERVICE_STATUS_HANDLE, SERVICE_STATUS *, HANDLE, TCHAR *, TCHAR *, unsigned long);\r
int list_nssm_services();\r
+int service_process_tree(int, TCHAR **);\r
\r
#endif\r