Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(1759)

Unified Diff: util/posix/process_info_mac.cc

Issue 727973002: Move some parts of ProcessReader (in snapshot) to ProcessInfo (in util) (Closed) Base URL: https://chromium.googlesource.com/crashpad/crashpad@master
Patch Set: Address review feedback Created 6 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View side-by-side diff with in-line comments
Download patch
« no previous file with comments | « util/posix/process_info.h ('k') | util/posix/process_info_test.cc » ('j') | no next file with comments »
Expand Comments ('e') | Collapse Comments ('c') | Show Comments Hide Comments ('s')
Index: util/posix/process_info_mac.cc
diff --git a/util/posix/process_info_mac.cc b/util/posix/process_info_mac.cc
new file mode 100644
index 0000000000000000000000000000000000000000..a5e375380bd63f3d09ce0efe55cf17b58fbe2982
--- /dev/null
+++ b/util/posix/process_info_mac.cc
@@ -0,0 +1,233 @@
+// Copyright 2014 The Crashpad Authors. All rights reserved.
+//
+// Licensed under the Apache License, Version 2.0 (the "License");
+// you may not use this file except in compliance with the License.
+// You may obtain a copy of the License at
+//
+// http://www.apache.org/licenses/LICENSE-2.0
+//
+// Unless required by applicable law or agreed to in writing, software
+// distributed under the License is distributed on an "AS IS" BASIS,
+// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
+// See the License for the specific language governing permissions and
+// limitations under the License.
+
+#include "util/posix/process_info.h"
+
+#include <string.h>
+
+#include "base/logging.h"
+#include "base/mac/mach_logging.h"
+
+namespace crashpad {
+
+ProcessInfo::ProcessInfo() : kern_proc_info_(), initialized_() {
+}
+
+ProcessInfo::~ProcessInfo() {
+}
+
+bool ProcessInfo::Initialize(pid_t pid) {
+ INITIALIZATION_STATE_SET_INITIALIZING(initialized_);
+
+ int mib[] = {CTL_KERN, KERN_PROC, KERN_PROC_PID, pid};
+ size_t len = sizeof(kern_proc_info_);
+ if (sysctl(mib, arraysize(mib), &kern_proc_info_, &len, nullptr, 0) != 0) {
+ PLOG(ERROR) << "sysctl for pid " << pid;
+ return false;
+ }
+
+ // This sysctl does not return an error if the pid was not found. 10.9.5
+ // xnu-2422.115.4/bsd/kern/kern_sysctl.c sysctl_prochandle() calls
+ // xnu-2422.115.4/bsd/kern/kern_proc.c proc_iterate(), which provides no
+ // indication of whether anything was done. To catch this, check that the PID
+ // has changed from the 0 value it was given when initialized by the
+ // constructor.
+ if (kern_proc_info_.kp_proc.p_pid == 0) {
+ LOG(WARNING) << "pid " << pid << " not found";
+ return false;
+ }
+
+ DCHECK_EQ(kern_proc_info_.kp_proc.p_pid, pid);
+
+ INITIALIZATION_STATE_SET_VALID(initialized_);
+ return true;
+}
+
+bool ProcessInfo::InitializeFromTask(task_t task) {
+ pid_t pid;
+ kern_return_t kr = pid_for_task(task, &pid);
+ if (kr != KERN_SUCCESS) {
+ MACH_LOG(ERROR, kr) << "pid_for_task";
+ return false;
+ }
+
+ return Initialize(pid);
+}
+
+pid_t ProcessInfo::ProcessID() const {
+ INITIALIZATION_STATE_DCHECK_VALID(initialized_);
+ return kern_proc_info_.kp_proc.p_pid;
+}
+
+pid_t ProcessInfo::ParentProcessID() const {
+ INITIALIZATION_STATE_DCHECK_VALID(initialized_);
+ return kern_proc_info_.kp_eproc.e_ppid;
+}
+
+uid_t ProcessInfo::RealUserID() const {
+ INITIALIZATION_STATE_DCHECK_VALID(initialized_);
+ return kern_proc_info_.kp_eproc.e_pcred.p_ruid;
+}
+
+uid_t ProcessInfo::EffectiveUserID() const {
+ INITIALIZATION_STATE_DCHECK_VALID(initialized_);
+ return kern_proc_info_.kp_eproc.e_ucred.cr_uid;
+}
+
+uid_t ProcessInfo::SavedUserID() const {
+ INITIALIZATION_STATE_DCHECK_VALID(initialized_);
+ return kern_proc_info_.kp_eproc.e_pcred.p_svuid;
+}
+
+gid_t ProcessInfo::RealGroupID() const {
+ INITIALIZATION_STATE_DCHECK_VALID(initialized_);
+ return kern_proc_info_.kp_eproc.e_pcred.p_rgid;
+}
+
+gid_t ProcessInfo::EffectiveGroupID() const {
+ INITIALIZATION_STATE_DCHECK_VALID(initialized_);
+ return kern_proc_info_.kp_eproc.e_ucred.cr_gid;
+}
+
+gid_t ProcessInfo::SavedGroupID() const {
+ INITIALIZATION_STATE_DCHECK_VALID(initialized_);
+ return kern_proc_info_.kp_eproc.e_pcred.p_svgid;
+}
+
+std::set<gid_t> ProcessInfo::SupplementaryGroups() const {
+ INITIALIZATION_STATE_DCHECK_VALID(initialized_);
+
+ const short ngroups = kern_proc_info_.kp_eproc.e_ucred.cr_ngroups;
+ DCHECK_GE(ngroups, 0);
+ DCHECK_LT(static_cast<size_t>(ngroups),
+ arraysize(kern_proc_info_.kp_eproc.e_ucred.cr_groups));
+
+ const gid_t* groups = kern_proc_info_.kp_eproc.e_ucred.cr_groups;
+ return std::set<gid_t>(&groups[0], &groups[ngroups]);
+}
+
+std::set<gid_t> ProcessInfo::AllGroups() const {
+ INITIALIZATION_STATE_DCHECK_VALID(initialized_);
+
+ std::set<gid_t> all_groups = SupplementaryGroups();
+ all_groups.insert(RealGroupID());
+ all_groups.insert(EffectiveGroupID());
+ all_groups.insert(SavedGroupID());
+ return all_groups;
+}
+
+bool ProcessInfo::DidChangePrivileges() const {
+ INITIALIZATION_STATE_DCHECK_VALID(initialized_);
+ return kern_proc_info_.kp_proc.p_flag & P_SUGID;
+}
+
+bool ProcessInfo::Is64Bit() const {
+ INITIALIZATION_STATE_DCHECK_VALID(initialized_);
+ return kern_proc_info_.kp_proc.p_flag & P_LP64;
+}
+
+void ProcessInfo::StartTime(timeval* start_time) const {
+ INITIALIZATION_STATE_DCHECK_VALID(initialized_);
+ *start_time = kern_proc_info_.kp_proc.p_starttime;
+}
+
+bool ProcessInfo::Arguments(std::vector<std::string>* argv) const {
+ INITIALIZATION_STATE_DCHECK_VALID(initialized_);
+
+ // The format of KERN_PROCARGS2 is explained in 10.9.2 adv_cmds-153/ps/print.c
+ // getproclline(). It is an int (argc) followed by the executable’s string
+ // area. The string area consists of NUL-terminated strings, beginning with
+ // the executable path, and then starting on an aligned boundary, all of the
+ // elements of argv, envp, and applev.
+
+ // It is possible for a process to exec() in between the two sysctl() calls
+ // below. If that happens, and the string area of the new program is larger
+ // than that of the old one, args_size_estimate will be too small. To detect
+ // this situation, the second sysctl() attempts to fetch args_size_estimate +
+ // 1 bytes, expecting to only receive args_size_estimate. If it gets the extra
+ // byte, it indicates that the string area has grown, and the sysctl() pair
+ // will be retried a limited number of times.
+
+ size_t args_size_estimate;
+ size_t args_size;
+ std::string args;
+ int tries = 3;
+ const pid_t pid = ProcessID();
+ do {
+ int mib[] = {CTL_KERN, KERN_PROCARGS2, pid};
+ int rv =
+ sysctl(mib, arraysize(mib), nullptr, &args_size_estimate, nullptr, 0);
+ if (rv != 0) {
+ PLOG(ERROR) << "sysctl (size) for pid " << pid;
+ return false;
+ }
+
+ args_size = args_size_estimate + 1;
+ args.resize(args_size);
+ rv = sysctl(mib, arraysize(mib), &args[0], &args_size, nullptr, 0);
+ if (rv != 0) {
+ PLOG(ERROR) << "sysctl (data) for pid " << pid;
+ return false;
+ }
+ } while (args_size == args_size_estimate + 1 && tries--);
+
+ if (args_size == args_size_estimate + 1) {
+ LOG(ERROR) << "unexpected args_size";
+ return false;
+ }
+
+ // KERN_PROCARGS2 needs to at least contain argc.
+ if (args_size < sizeof(int)) {
+ LOG(ERROR) << "tiny args_size";
+ return false;
+ }
+ args.resize(args_size);
+
+ // Get argc.
+ int argc;
+ memcpy(&argc, &args[0], sizeof(argc));
+
+ // Find the end of the executable path.
+ size_t start_pos = sizeof(argc);
+ size_t nul_pos = args.find('\0', start_pos);
+ if (nul_pos == std::string::npos) {
+ LOG(ERROR) << "unterminated executable path";
+ return false;
+ }
+
+ // Find the beginning of the string area.
+ start_pos = args.find_first_not_of('\0', nul_pos);
+ if (start_pos == std::string::npos) {
+ LOG(ERROR) << "no string area";
+ return false;
+ }
+
+ std::vector<std::string> local_argv;
+ while (argc-- && nul_pos != std::string::npos) {
+ nul_pos = args.find('\0', start_pos);
+ local_argv.push_back(args.substr(start_pos, nul_pos - start_pos));
+ start_pos = nul_pos + 1;
+ }
+
+ if (argc >= 0) {
+ // Not every argument was recovered.
+ LOG(ERROR) << "did not recover all arguments";
+ return false;
+ }
+
+ argv->swap(local_argv);
+ return true;
+}
+
+} // namespace crashpad
« no previous file with comments | « util/posix/process_info.h ('k') | util/posix/process_info_test.cc » ('j') | no next file with comments »

Powered by Google App Engine
This is Rietveld 408576698