Process.cpp 7.0 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211
  1. /*
  2. * Copyright (c) 2021, Andreas Kling <kling@serenityos.org>
  3. * Copyright (c) 2022-2023, MacDue <macdue@dueutil.tech>
  4. * Copyright (c) 2023, Sam Atkins <atkinssj@serenityos.org>
  5. *
  6. * SPDX-License-Identifier: BSD-2-Clause
  7. */
  8. #include <AK/DeprecatedString.h>
  9. #include <AK/ScopeGuard.h>
  10. #include <AK/String.h>
  11. #include <AK/Vector.h>
  12. #include <LibCore/File.h>
  13. #include <LibCore/Process.h>
  14. #include <LibCore/System.h>
  15. #include <errno.h>
  16. #include <spawn.h>
  17. #include <unistd.h>
  18. #if defined(AK_OS_SERENITY)
  19. # include <serenity.h>
  20. # include <sys/prctl.h>
  21. # include <syscall.h>
  22. #elif defined(AK_OS_BSD_GENERIC) && !defined(AK_OS_SOLARIS)
  23. # include <sys/sysctl.h>
  24. #endif
  25. namespace Core {
  26. struct ArgvList {
  27. DeprecatedString m_path;
  28. DeprecatedString m_working_directory;
  29. Vector<char const*, 10> m_argv;
  30. ArgvList(DeprecatedString path, size_t size)
  31. : m_path { path }
  32. {
  33. m_argv.ensure_capacity(size + 2);
  34. m_argv.append(m_path.characters());
  35. }
  36. void append(char const* arg)
  37. {
  38. m_argv.append(arg);
  39. }
  40. Span<char const*> get()
  41. {
  42. if (m_argv.is_empty() || m_argv.last() != nullptr)
  43. m_argv.append(nullptr);
  44. return m_argv;
  45. }
  46. void set_working_directory(DeprecatedString const& working_directory)
  47. {
  48. m_working_directory = working_directory;
  49. }
  50. ErrorOr<pid_t> spawn(Process::KeepAsChild keep_as_child)
  51. {
  52. #ifdef AK_OS_SERENITY
  53. posix_spawn_file_actions_t spawn_actions;
  54. posix_spawn_file_actions_init(&spawn_actions);
  55. ScopeGuard cleanup_spawn_actions = [&] {
  56. posix_spawn_file_actions_destroy(&spawn_actions);
  57. };
  58. if (!m_working_directory.is_empty())
  59. posix_spawn_file_actions_addchdir(&spawn_actions, m_working_directory.characters());
  60. auto pid = TRY(System::posix_spawn(m_path.view(), &spawn_actions, nullptr, const_cast<char**>(get().data()), System::environment()));
  61. if (keep_as_child == Process::KeepAsChild::No)
  62. TRY(System::disown(pid));
  63. #else
  64. auto pid = TRY(System::posix_spawn(m_path.view(), nullptr, nullptr, const_cast<char**>(get().data()), System::environment()));
  65. // FIXME: Support keep_as_child outside Serenity.
  66. (void)keep_as_child;
  67. #endif
  68. return pid;
  69. }
  70. };
  71. ErrorOr<pid_t> Process::spawn(StringView path, ReadonlySpan<DeprecatedString> arguments, DeprecatedString working_directory, KeepAsChild keep_as_child)
  72. {
  73. ArgvList argv { path, arguments.size() };
  74. for (auto const& arg : arguments)
  75. argv.append(arg.characters());
  76. argv.set_working_directory(working_directory);
  77. return argv.spawn(keep_as_child);
  78. }
  79. ErrorOr<pid_t> Process::spawn(StringView path, ReadonlySpan<StringView> arguments, DeprecatedString working_directory, KeepAsChild keep_as_child)
  80. {
  81. Vector<DeprecatedString> backing_strings;
  82. backing_strings.ensure_capacity(arguments.size());
  83. ArgvList argv { path, arguments.size() };
  84. for (auto const& arg : arguments) {
  85. backing_strings.append(arg);
  86. argv.append(backing_strings.last().characters());
  87. }
  88. argv.set_working_directory(working_directory);
  89. return argv.spawn(keep_as_child);
  90. }
  91. ErrorOr<pid_t> Process::spawn(StringView path, ReadonlySpan<char const*> arguments, DeprecatedString working_directory, KeepAsChild keep_as_child)
  92. {
  93. ArgvList argv { path, arguments.size() };
  94. for (auto arg : arguments)
  95. argv.append(arg);
  96. argv.set_working_directory(working_directory);
  97. return argv.spawn(keep_as_child);
  98. }
  99. ErrorOr<String> Process::get_name()
  100. {
  101. #if defined(AK_OS_SERENITY)
  102. char buffer[BUFSIZ];
  103. int rc = get_process_name(buffer, BUFSIZ);
  104. if (rc != 0)
  105. return Error::from_syscall("get_process_name"sv, -rc);
  106. return String::from_utf8(StringView { buffer, strlen(buffer) });
  107. #elif defined(AK_OS_LINUX) && !defined(AK_OS_ANDROID)
  108. return String::from_utf8(StringView { program_invocation_name, strlen(program_invocation_name) });
  109. #elif defined(AK_OS_BSD_GENERIC)
  110. auto const* progname = getprogname();
  111. return String::from_utf8(StringView { progname, strlen(progname) });
  112. #else
  113. // FIXME: Implement Process::get_name() for other platforms.
  114. return "???"_string;
  115. #endif
  116. }
  117. ErrorOr<void> Process::set_name([[maybe_unused]] StringView name, [[maybe_unused]] SetThreadName set_thread_name)
  118. {
  119. #if defined(AK_OS_SERENITY)
  120. int rc = set_process_name(name.characters_without_null_termination(), name.length());
  121. if (rc != 0)
  122. return Error::from_syscall("set_process_name"sv, -rc);
  123. if (set_thread_name == SetThreadName::No)
  124. return {};
  125. rc = prctl(PR_SET_THREAD_NAME, gettid(), name.characters_without_null_termination(), name.length());
  126. if (rc != 0)
  127. return Error::from_syscall("set_thread_name"sv, -rc);
  128. return {};
  129. #else
  130. // FIXME: Implement Process::set_name() for other platforms.
  131. return {};
  132. #endif
  133. }
  134. ErrorOr<bool> Process::is_being_debugged()
  135. {
  136. #if defined(AK_OS_LINUX)
  137. auto unbuffered_status_file = TRY(Core::File::open("/proc/self/status"sv, Core::File::OpenMode::Read));
  138. auto status_file = TRY(Core::InputBufferedFile::create(move(unbuffered_status_file)));
  139. auto buffer = TRY(ByteBuffer::create_uninitialized(4096));
  140. while (TRY(status_file->can_read_line())) {
  141. auto line = TRY(status_file->read_line(buffer));
  142. auto const parts = line.split_view(':');
  143. if (parts.size() < 2 || parts[0] != "TracerPid"sv)
  144. continue;
  145. auto tracer_pid = parts[1].to_uint<u32>();
  146. return (tracer_pid != 0UL);
  147. }
  148. return false;
  149. #elif defined(AK_OS_MACOS)
  150. // https://developer.apple.com/library/archive/qa/qa1361/_index.html
  151. int mib[4] = {};
  152. struct kinfo_proc info = {};
  153. size_t size = sizeof(info);
  154. // Initialize mib, which tells sysctl the info we want, in this case
  155. // we're looking for information about a specific process ID.
  156. mib[0] = CTL_KERN;
  157. mib[1] = KERN_PROC;
  158. mib[2] = KERN_PROC_PID;
  159. mib[3] = getpid();
  160. if (sysctl(mib, sizeof(mib) / sizeof(*mib), &info, &size, NULL, 0) < 0)
  161. return Error::from_syscall("sysctl"sv, -errno);
  162. // We're being debugged if the P_TRACED flag is set.
  163. return ((info.kp_proc.p_flag & P_TRACED) != 0);
  164. #endif
  165. // FIXME: Implement this for more platforms.
  166. return Error::from_string_view("Platform does not support checking for debugger"sv);
  167. }
  168. // Forces the process to sleep until a debugger is attached, then breaks.
  169. void Process::wait_for_debugger_and_break()
  170. {
  171. bool should_print_process_info { true };
  172. for (;;) {
  173. auto check = Process::is_being_debugged();
  174. if (check.is_error()) {
  175. dbgln("Cannot wait for debugger: {}. Continuing.", check.release_error());
  176. return;
  177. }
  178. if (check.value()) {
  179. kill(getpid(), SIGTRAP);
  180. return;
  181. }
  182. if (should_print_process_info) {
  183. dbgln("Process {} with pid {} is sleeping, waiting for debugger.", Process::get_name(), getpid());
  184. should_print_process_info = false;
  185. }
  186. ::usleep(100 * 1000);
  187. }
  188. }
  189. }