Process.cpp 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210
  1. /*
  2. * Copyright (c) 2021, Andreas Kling <kling@serenityos.org>
  3. * Copyright (c) 2022-2023, MacDue <macdue@dueutil.tech>
  4. * Copyright (c) 2023, Sam Atkins <atkinssj@serenityos.org>
  5. *
  6. * SPDX-License-Identifier: BSD-2-Clause
  7. */
  8. #include <AK/DeprecatedString.h>
  9. #include <AK/ScopeGuard.h>
  10. #include <AK/String.h>
  11. #include <AK/Vector.h>
  12. #include <LibCore/File.h>
  13. #include <LibCore/Process.h>
  14. #include <LibCore/System.h>
  15. #include <errno.h>
  16. #include <spawn.h>
  17. #include <unistd.h>
  18. #if defined(AK_OS_SERENITY)
  19. # include <serenity.h>
  20. # include <syscall.h>
  21. #elif defined(AK_OS_BSD_GENERIC) && !defined(AK_OS_SOLARIS)
  22. # include <sys/sysctl.h>
  23. #endif
  24. namespace Core {
  25. struct ArgvList {
  26. DeprecatedString m_path;
  27. DeprecatedString m_working_directory;
  28. Vector<char const*, 10> m_argv;
  29. ArgvList(DeprecatedString path, size_t size)
  30. : m_path { path }
  31. {
  32. m_argv.ensure_capacity(size + 2);
  33. m_argv.append(m_path.characters());
  34. }
  35. void append(char const* arg)
  36. {
  37. m_argv.append(arg);
  38. }
  39. Span<char const*> get()
  40. {
  41. if (m_argv.is_empty() || m_argv.last() != nullptr)
  42. m_argv.append(nullptr);
  43. return m_argv;
  44. }
  45. void set_working_directory(DeprecatedString const& working_directory)
  46. {
  47. m_working_directory = working_directory;
  48. }
  49. ErrorOr<pid_t> spawn(Process::KeepAsChild keep_as_child)
  50. {
  51. #ifdef AK_OS_SERENITY
  52. posix_spawn_file_actions_t spawn_actions;
  53. posix_spawn_file_actions_init(&spawn_actions);
  54. ScopeGuard cleanup_spawn_actions = [&] {
  55. posix_spawn_file_actions_destroy(&spawn_actions);
  56. };
  57. if (!m_working_directory.is_empty())
  58. posix_spawn_file_actions_addchdir(&spawn_actions, m_working_directory.characters());
  59. auto pid = TRY(System::posix_spawn(m_path.view(), &spawn_actions, nullptr, const_cast<char**>(get().data()), System::environment()));
  60. if (keep_as_child == Process::KeepAsChild::No)
  61. TRY(System::disown(pid));
  62. #else
  63. auto pid = TRY(System::posix_spawn(m_path.view(), nullptr, nullptr, const_cast<char**>(get().data()), System::environment()));
  64. // FIXME: Support keep_as_child outside Serenity.
  65. (void)keep_as_child;
  66. #endif
  67. return pid;
  68. }
  69. };
  70. ErrorOr<pid_t> Process::spawn(StringView path, ReadonlySpan<DeprecatedString> arguments, DeprecatedString working_directory, KeepAsChild keep_as_child)
  71. {
  72. ArgvList argv { path, arguments.size() };
  73. for (auto const& arg : arguments)
  74. argv.append(arg.characters());
  75. argv.set_working_directory(working_directory);
  76. return argv.spawn(keep_as_child);
  77. }
  78. ErrorOr<pid_t> Process::spawn(StringView path, ReadonlySpan<StringView> arguments, DeprecatedString working_directory, KeepAsChild keep_as_child)
  79. {
  80. Vector<DeprecatedString> backing_strings;
  81. backing_strings.ensure_capacity(arguments.size());
  82. ArgvList argv { path, arguments.size() };
  83. for (auto const& arg : arguments) {
  84. backing_strings.append(arg);
  85. argv.append(backing_strings.last().characters());
  86. }
  87. argv.set_working_directory(working_directory);
  88. return argv.spawn(keep_as_child);
  89. }
  90. ErrorOr<pid_t> Process::spawn(StringView path, ReadonlySpan<char const*> arguments, DeprecatedString working_directory, KeepAsChild keep_as_child)
  91. {
  92. ArgvList argv { path, arguments.size() };
  93. for (auto arg : arguments)
  94. argv.append(arg);
  95. argv.set_working_directory(working_directory);
  96. return argv.spawn(keep_as_child);
  97. }
  98. ErrorOr<String> Process::get_name()
  99. {
  100. #if defined(AK_OS_SERENITY)
  101. char buffer[BUFSIZ];
  102. int rc = get_process_name(buffer, BUFSIZ);
  103. if (rc != 0)
  104. return Error::from_syscall("get_process_name"sv, -rc);
  105. return String::from_utf8(StringView { buffer, strlen(buffer) });
  106. #elif defined(AK_OS_LINUX)
  107. return String::from_utf8(StringView { program_invocation_name, strlen(program_invocation_name) });
  108. #elif defined(AK_OS_BSD_GENERIC)
  109. auto const* progname = getprogname();
  110. return String::from_utf8(StringView { progname, strlen(progname) });
  111. #else
  112. // FIXME: Implement Process::get_name() for other platforms.
  113. return "???"_string;
  114. #endif
  115. }
  116. ErrorOr<void> Process::set_name([[maybe_unused]] StringView name, [[maybe_unused]] SetThreadName set_thread_name)
  117. {
  118. #if defined(AK_OS_SERENITY)
  119. int rc = set_process_name(name.characters_without_null_termination(), name.length());
  120. if (rc != 0)
  121. return Error::from_syscall("set_process_name"sv, -rc);
  122. if (set_thread_name == SetThreadName::No)
  123. return {};
  124. rc = syscall(SC_set_thread_name, gettid(), name.characters_without_null_termination(), name.length());
  125. if (rc != 0)
  126. return Error::from_syscall("set_thread_name"sv, -rc);
  127. return {};
  128. #else
  129. // FIXME: Implement Process::set_name() for other platforms.
  130. return {};
  131. #endif
  132. }
  133. ErrorOr<bool> Process::is_being_debugged()
  134. {
  135. #if defined(AK_OS_LINUX)
  136. auto unbuffered_status_file = TRY(Core::File::open("/proc/self/status"sv, Core::File::OpenMode::Read));
  137. auto status_file = TRY(Core::InputBufferedFile::create(move(unbuffered_status_file)));
  138. auto buffer = TRY(ByteBuffer::create_uninitialized(4096));
  139. while (TRY(status_file->can_read_line())) {
  140. auto line = TRY(status_file->read_line(buffer));
  141. auto const parts = line.split_view(':');
  142. if (parts.size() < 2 || parts[0] != "TracerPid"sv)
  143. continue;
  144. auto tracer_pid = parts[1].to_uint<u32>();
  145. return (tracer_pid != 0UL);
  146. }
  147. return false;
  148. #elif defined(AK_OS_MACOS)
  149. // https://developer.apple.com/library/archive/qa/qa1361/_index.html
  150. int mib[4] = {};
  151. struct kinfo_proc info = {};
  152. size_t size = sizeof(info);
  153. // Initialize mib, which tells sysctl the info we want, in this case
  154. // we're looking for information about a specific process ID.
  155. mib[0] = CTL_KERN;
  156. mib[1] = KERN_PROC;
  157. mib[2] = KERN_PROC_PID;
  158. mib[3] = getpid();
  159. if (sysctl(mib, sizeof(mib) / sizeof(*mib), &info, &size, NULL, 0) < 0)
  160. return Error::from_syscall("sysctl"sv, -errno);
  161. // We're being debugged if the P_TRACED flag is set.
  162. return ((info.kp_proc.p_flag & P_TRACED) != 0);
  163. #endif
  164. // FIXME: Implement this for more platforms.
  165. return Error::from_string_view("Platform does not support checking for debugger"sv);
  166. }
  167. // Forces the process to sleep until a debugger is attached, then breaks.
  168. void Process::wait_for_debugger_and_break()
  169. {
  170. bool should_print_process_info { true };
  171. for (;;) {
  172. auto check = Process::is_being_debugged();
  173. if (check.is_error()) {
  174. dbgln("Cannot wait for debugger: {}. Continuing.", check.release_error());
  175. return;
  176. }
  177. if (check.value()) {
  178. kill(getpid(), SIGTRAP);
  179. return;
  180. }
  181. if (should_print_process_info) {
  182. dbgln("Process {} with pid {} is sleeping, waiting for debugger.", Process::get_name(), getpid());
  183. should_print_process_info = false;
  184. }
  185. ::usleep(100 * 1000);
  186. }
  187. }
  188. }