1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88 89 90 91 92 93 94 95 96 97 98 99 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131
|
// Copyright 2013 The Chromium Authors
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/process/process_iterator.h"
#include <stddef.h>
#include <string_view>
#include "base/containers/span.h"
#include "base/files/file_util.h"
#include "base/logging.h"
#include "base/notreached.h"
#include "base/numerics/safe_conversions.h"
#include "base/process/internal_linux.h"
#include "base/strings/string_split.h"
#include "base/strings/string_util.h"
#include "base/threading/thread_restrictions.h"
namespace base {
class ScopedAllowBlockingForProc : public ScopedAllowBlocking {};
namespace {
// Reads /proc/<pid>/cmdline and populates |proc_cmd_line_args| with the command
// line arguments. Returns true if successful.
// Note: /proc/<pid>/cmdline contains command line arguments separated by single
// null characters. We tokenize it into a vector of strings using '\0' as a
// delimiter.
bool GetProcCmdline(pid_t pid, std::vector<std::string>* proc_cmd_line_args) {
// Synchronously reading files in /proc is safe.
ScopedAllowBlockingForProc allow_blocking;
FilePath cmd_line_file = internal::GetProcPidDir(pid).Append("cmdline");
std::string cmd_line;
if (!ReadFileToString(cmd_line_file, &cmd_line)) {
return false;
}
std::string delimiters;
delimiters.push_back('\0');
*proc_cmd_line_args =
SplitString(cmd_line, delimiters, KEEP_WHITESPACE, SPLIT_WANT_NONEMPTY);
return true;
}
} // namespace
ProcessIterator::ProcessIterator(const ProcessFilter* filter)
: procfs_dir_(opendir(internal::kProcDir)), filter_(filter) {
if (!procfs_dir_) {
// On Android, SELinux may prevent reading /proc. See
// https://crbug.com/581517 for details.
PLOG(ERROR) << "opendir " << internal::kProcDir;
}
}
ProcessIterator::~ProcessIterator() = default;
bool ProcessIterator::CheckForNextProcess() {
// TODO(port): skip processes owned by different UID
if (!procfs_dir_) {
DLOG(ERROR) << "Skipping CheckForNextProcess(), no procfs_dir_";
return false;
}
pid_t pid = kNullProcessId;
std::vector<std::string> cmd_line_args;
std::string stats_data;
std::vector<std::string_view> proc_stats;
while (true) {
dirent* const slot = readdir(procfs_dir_.get());
// all done looking through /proc?
if (!slot) {
return false;
}
// If not a process, keep looking for one.
pid = internal::ProcDirSlotToPid(slot->d_name);
if (!pid) {
continue;
}
if (!internal::ReadProcStats(pid, &stats_data)) {
continue;
}
if (!internal::ParseProcStats(stats_data, &proc_stats)) {
continue;
}
std::string_view runstate = proc_stats.at(internal::VM_STATE);
if (runstate.size() != 1) {
NOTREACHED();
}
// Is the process in 'Zombie' state, i.e. dead but waiting to be reaped?
// Allowed values: D R S T Z
if (runstate[0] == 'Z') {
// Nope, it's a zombie; somebody isn't cleaning up after their children.
// (e.g. WaitForProcessesToExit doesn't clean up after dead children yet.)
// There could be a lot of zombies, can't really decrement i here.
continue;
}
// Read the command-line args. Do this last to avoid useless string copies.
if (GetProcCmdline(pid, &cmd_line_args)) {
break;
}
}
entry_.pid_ = pid;
entry_.ppid_ = checked_cast<ProcessId>(
GetProcStatsFieldAsInt64(proc_stats, internal::VM_PPID));
entry_.gid_ = checked_cast<ProcessId>(
GetProcStatsFieldAsInt64(proc_stats, internal::VM_PGRP));
entry_.cmd_line_args_.assign(cmd_line_args.begin(), cmd_line_args.end());
entry_.exe_file_ = GetProcessExecutablePath(pid).BaseName().value();
return true;
}
bool NamedProcessIterator::IncludeEntry() {
if (executable_name_ != entry().exe_file()) {
return false;
}
return ProcessIterator::IncludeEntry();
}
} // namespace base
|