mirror of
https://github.com/LadybirdBrowser/ladybird.git
synced 2024-11-28 18:40:29 +00:00
866609c682
Some checks are pending
CI / Lagom (false, NO_FUZZ, macos-15, macOS, Clang) (push) Waiting to run
CI / Lagom (false, FUZZ, ubuntu-24.04, Linux, Clang) (push) Waiting to run
CI / Lagom (false, NO_FUZZ, ubuntu-24.04, Linux, GNU) (push) Waiting to run
CI / Lagom (true, NO_FUZZ, ubuntu-24.04, Linux, Clang) (push) Waiting to run
Package the js repl as a binary artifact / build-and-package (macos-14, macOS, macOS-universal2) (push) Waiting to run
Package the js repl as a binary artifact / build-and-package (ubuntu-24.04, Linux, Linux-x86_64) (push) Waiting to run
Run test262 and test-wasm / run_and_update_results (push) Waiting to run
Lint Code / lint (push) Waiting to run
Push notes / build (push) Waiting to run
362 lines
12 KiB
C++
362 lines
12 KiB
C++
/*
|
|
* Copyright (c) 2021, Andreas Kling <andreas@ladybird.org>
|
|
* Copyright (c) 2022-2023, MacDue <macdue@dueutil.tech>
|
|
* Copyright (c) 2023-2024, Sam Atkins <atkinssj@serenityos.org>
|
|
* Copyright (c) 2024, Tim Flynn <trflynn89@serenityos.org>
|
|
*
|
|
* SPDX-License-Identifier: BSD-2-Clause
|
|
*/
|
|
|
|
#include <AK/ByteString.h>
|
|
#include <AK/ScopeGuard.h>
|
|
#include <AK/String.h>
|
|
#include <AK/Vector.h>
|
|
#include <LibCore/Environment.h>
|
|
#include <LibCore/File.h>
|
|
#include <LibCore/Process.h>
|
|
#include <LibCore/System.h>
|
|
#include <errno.h>
|
|
#include <signal.h>
|
|
#include <spawn.h>
|
|
#include <unistd.h>
|
|
|
|
#if defined(AK_OS_SERENITY)
|
|
# include <serenity.h>
|
|
# include <sys/prctl.h>
|
|
# include <syscall.h>
|
|
#elif defined(AK_OS_BSD_GENERIC) && !defined(AK_OS_SOLARIS)
|
|
# include <sys/sysctl.h>
|
|
#elif defined(AK_OS_GNU_HURD)
|
|
extern "C" {
|
|
# include <hurd.h>
|
|
}
|
|
#endif
|
|
#if defined(AK_OS_FREEBSD)
|
|
# include <sys/user.h>
|
|
#endif
|
|
|
|
namespace Core {
|
|
|
|
struct ArgvList {
|
|
ByteString m_path;
|
|
Vector<char const*, 10> m_argv;
|
|
|
|
ArgvList(ByteString path, size_t size)
|
|
: m_path { path }
|
|
{
|
|
m_argv.ensure_capacity(size + 2);
|
|
m_argv.append(m_path.characters());
|
|
}
|
|
|
|
void append(char const* arg)
|
|
{
|
|
m_argv.append(arg);
|
|
}
|
|
|
|
Span<char const*> get()
|
|
{
|
|
if (m_argv.is_empty() || m_argv.last() != nullptr)
|
|
m_argv.append(nullptr);
|
|
return m_argv;
|
|
}
|
|
};
|
|
|
|
Process::Process(Process&& other)
|
|
: m_pid(exchange(other.m_pid, 0))
|
|
, m_should_disown(exchange(other.m_should_disown, false))
|
|
{
|
|
}
|
|
|
|
Process& Process::operator=(Process&& other)
|
|
{
|
|
m_pid = exchange(other.m_pid, 0);
|
|
m_should_disown = exchange(other.m_should_disown, false);
|
|
return *this;
|
|
}
|
|
|
|
Process::~Process()
|
|
{
|
|
(void)disown();
|
|
}
|
|
|
|
Process Process::current()
|
|
{
|
|
auto p = Process { getpid() };
|
|
p.m_should_disown = false;
|
|
return p;
|
|
}
|
|
|
|
ErrorOr<Process> Process::spawn(ProcessSpawnOptions const& options)
|
|
{
|
|
#define CHECK(invocation) \
|
|
if (int returned_errno = (invocation)) \
|
|
return Error::from_errno(returned_errno);
|
|
|
|
posix_spawn_file_actions_t spawn_actions;
|
|
CHECK(posix_spawn_file_actions_init(&spawn_actions));
|
|
ScopeGuard cleanup_spawn_actions = [&] {
|
|
posix_spawn_file_actions_destroy(&spawn_actions);
|
|
};
|
|
|
|
if (options.working_directory.has_value()) {
|
|
#ifdef AK_OS_SERENITY
|
|
CHECK(posix_spawn_file_actions_addchdir(&spawn_actions, options.working_directory->characters()));
|
|
#else
|
|
// FIXME: Support ProcessSpawnOptions::working_directory n platforms that support it.
|
|
TODO();
|
|
#endif
|
|
}
|
|
|
|
for (auto const& file_action : options.file_actions) {
|
|
TRY(file_action.visit(
|
|
[&](FileAction::OpenFile const& action) -> ErrorOr<void> {
|
|
CHECK(posix_spawn_file_actions_addopen(
|
|
&spawn_actions,
|
|
action.fd,
|
|
action.path.characters(),
|
|
File::open_mode_to_options(action.mode | Core::File::OpenMode::KeepOnExec),
|
|
action.permissions));
|
|
return {};
|
|
},
|
|
[&](FileAction::CloseFile const& action) -> ErrorOr<void> {
|
|
CHECK(posix_spawn_file_actions_addclose(&spawn_actions, action.fd));
|
|
return {};
|
|
}));
|
|
}
|
|
|
|
#undef CHECK
|
|
|
|
ArgvList argv_list(options.executable, options.arguments.size());
|
|
for (auto const& argument : options.arguments)
|
|
argv_list.append(argument.characters());
|
|
|
|
pid_t pid;
|
|
if (options.search_for_executable_in_path) {
|
|
pid = TRY(System::posix_spawnp(options.executable.view(), &spawn_actions, nullptr, const_cast<char**>(argv_list.get().data()), Core::Environment::raw_environ()));
|
|
} else {
|
|
pid = TRY(System::posix_spawn(options.executable.view(), &spawn_actions, nullptr, const_cast<char**>(argv_list.get().data()), Core::Environment::raw_environ()));
|
|
}
|
|
return Process { pid };
|
|
}
|
|
|
|
ErrorOr<Process> Process::spawn(StringView path, ReadonlySpan<ByteString> arguments, ByteString working_directory, KeepAsChild keep_as_child)
|
|
{
|
|
auto process = TRY(spawn({
|
|
.executable = path,
|
|
.arguments = Vector<ByteString> { arguments },
|
|
.working_directory = working_directory.is_empty() ? Optional<ByteString> {} : Optional<ByteString> { working_directory },
|
|
}));
|
|
|
|
if (keep_as_child == KeepAsChild::No)
|
|
TRY(process.disown());
|
|
|
|
return process;
|
|
}
|
|
|
|
ErrorOr<Process> Process::spawn(StringView path, ReadonlySpan<StringView> arguments, ByteString working_directory, KeepAsChild keep_as_child)
|
|
{
|
|
Vector<ByteString> backing_strings;
|
|
backing_strings.ensure_capacity(arguments.size());
|
|
for (auto const& argument : arguments)
|
|
backing_strings.append(argument);
|
|
|
|
auto process = TRY(spawn({
|
|
.executable = path,
|
|
.arguments = backing_strings,
|
|
.working_directory = working_directory.is_empty() ? Optional<ByteString> {} : Optional<ByteString> { working_directory },
|
|
}));
|
|
|
|
if (keep_as_child == KeepAsChild::No)
|
|
TRY(process.disown());
|
|
|
|
return process;
|
|
}
|
|
|
|
ErrorOr<String> Process::get_name()
|
|
{
|
|
#if defined(AK_OS_SERENITY)
|
|
char buffer[BUFSIZ];
|
|
int rc = get_process_name(buffer, BUFSIZ);
|
|
if (rc != 0)
|
|
return Error::from_syscall("get_process_name"sv, -rc);
|
|
return String::from_utf8(StringView { buffer, strlen(buffer) });
|
|
#elif defined(AK_LIBC_GLIBC) || (defined(AK_OS_LINUX) && !defined(AK_OS_ANDROID))
|
|
return String::from_utf8(StringView { program_invocation_name, strlen(program_invocation_name) });
|
|
#elif defined(AK_OS_BSD_GENERIC) || defined(AK_OS_HAIKU)
|
|
auto const* progname = getprogname();
|
|
return String::from_utf8(StringView { progname, strlen(progname) });
|
|
#else
|
|
// FIXME: Implement Process::get_name() for other platforms.
|
|
return "???"_string;
|
|
#endif
|
|
}
|
|
|
|
ErrorOr<void> Process::set_name([[maybe_unused]] StringView name, [[maybe_unused]] SetThreadName set_thread_name)
|
|
{
|
|
#if defined(AK_OS_SERENITY)
|
|
int rc = set_process_name(name.characters_without_null_termination(), name.length());
|
|
if (rc != 0)
|
|
return Error::from_syscall("set_process_name"sv, -rc);
|
|
if (set_thread_name == SetThreadName::No)
|
|
return {};
|
|
|
|
rc = prctl(PR_SET_THREAD_NAME, gettid(), name.characters_without_null_termination(), name.length());
|
|
if (rc != 0)
|
|
return Error::from_syscall("set_thread_name"sv, -rc);
|
|
return {};
|
|
#else
|
|
// FIXME: Implement Process::set_name() for other platforms.
|
|
return {};
|
|
#endif
|
|
}
|
|
|
|
ErrorOr<bool> Process::is_being_debugged()
|
|
{
|
|
#if defined(AK_OS_LINUX)
|
|
auto unbuffered_status_file = TRY(Core::File::open("/proc/self/status"sv, Core::File::OpenMode::Read));
|
|
auto status_file = TRY(Core::InputBufferedFile::create(move(unbuffered_status_file)));
|
|
auto buffer = TRY(ByteBuffer::create_uninitialized(4096));
|
|
while (TRY(status_file->can_read_line())) {
|
|
auto line = TRY(status_file->read_line(buffer));
|
|
auto const parts = line.split_view(':');
|
|
if (parts.size() < 2 || parts[0] != "TracerPid"sv)
|
|
continue;
|
|
auto tracer_pid = parts[1].to_number<u32>();
|
|
return (tracer_pid != 0UL);
|
|
}
|
|
return false;
|
|
#elif defined(AK_OS_GNU_HURD)
|
|
process_t proc = getproc();
|
|
if (!MACH_PORT_VALID(proc))
|
|
return Error::from_syscall("getproc"sv, -errno);
|
|
|
|
int flags = PI_FETCH_TASKINFO;
|
|
// We're going to ask the proc server for the info about our process,
|
|
// and it is going to reply, placing the info into a buffer. It can
|
|
// either fill in (overwrite) the buffer we provide to it (called pi_buffer
|
|
// below), or allocate (as if with mmap or vm_allocate) a new buffer.
|
|
// The buffer is really of type struct procinfo[], but it's transferred
|
|
// over IPC as int[]. We pass in a double pointer (int** pi_array) that
|
|
// initially points to our pi_buffer, but the call will update it to
|
|
// point to the newly allocated buffer if it ends up making one.
|
|
struct procinfo pi_buffer = {};
|
|
int* pi_array = reinterpret_cast<int*>(&pi_buffer);
|
|
mach_msg_type_number_t pi_array_len = sizeof(pi_buffer) / sizeof(int);
|
|
data_t waits = nullptr;
|
|
mach_msg_type_number_t waits_len = 0;
|
|
|
|
kern_return_t err = proc_getprocinfo(proc, getpid(), &flags, &pi_array, &pi_array_len, &waits, &waits_len);
|
|
mach_port_deallocate(mach_task_self(), proc);
|
|
if (err) {
|
|
__hurd_fail(static_cast<error_t>(err));
|
|
return Error::from_syscall("proc_getprocinfo"sv, -errno);
|
|
}
|
|
|
|
// Now cast the returned buffer pointer back to struct procinfo, and
|
|
// read the info we're interested in (the PI_TRACED flag) from there.
|
|
VERIFY(pi_array_len >= sizeof(struct procinfo));
|
|
struct procinfo* procinfo = reinterpret_cast<struct procinfo*>(pi_array);
|
|
bool traced = procinfo->state & PI_TRACED;
|
|
|
|
// If the returned buffer is not the one we allocated on the stack,
|
|
// we should unmap it.
|
|
if (procinfo != &pi_buffer)
|
|
(void)System::munmap(pi_array, pi_array_len * sizeof(int));
|
|
if (waits)
|
|
(void)System::munmap(waits, waits_len);
|
|
|
|
return traced;
|
|
#elif defined(AK_OS_MACOS) || defined(AK_OS_FREEBSD)
|
|
// https://developer.apple.com/library/archive/qa/qa1361/_index.html
|
|
int mib[4] = {};
|
|
struct kinfo_proc info = {};
|
|
size_t size = sizeof(info);
|
|
|
|
// Initialize mib, which tells sysctl the info we want, in this case
|
|
// we're looking for information about a specific process ID.
|
|
mib[0] = CTL_KERN;
|
|
mib[1] = KERN_PROC;
|
|
mib[2] = KERN_PROC_PID;
|
|
mib[3] = getpid();
|
|
|
|
if (sysctl(mib, sizeof(mib) / sizeof(*mib), &info, &size, NULL, 0) < 0)
|
|
return Error::from_syscall("sysctl"sv, -errno);
|
|
|
|
// We're being debugged if the P_TRACED flag is set.
|
|
# if defined(AK_OS_MACOS)
|
|
return ((info.kp_proc.p_flag & P_TRACED) != 0);
|
|
# elif defined(AK_OS_FREEBSD)
|
|
return ((info.ki_flag & P_TRACED) != 0);
|
|
# endif
|
|
#endif
|
|
// FIXME: Implement this for more platforms.
|
|
return Error::from_string_literal("Platform does not support checking for debugger");
|
|
}
|
|
|
|
// Forces the process to sleep until a debugger is attached, then breaks.
|
|
void Process::wait_for_debugger_and_break()
|
|
{
|
|
bool should_print_process_info { true };
|
|
for (;;) {
|
|
auto check = Process::is_being_debugged();
|
|
if (check.is_error()) {
|
|
dbgln("Cannot wait for debugger: {}. Continuing.", check.release_error());
|
|
return;
|
|
}
|
|
if (check.value()) {
|
|
kill(getpid(), SIGTRAP);
|
|
return;
|
|
}
|
|
if (should_print_process_info) {
|
|
dbgln("Process {} with pid {} is sleeping, waiting for debugger.", Process::get_name(), getpid());
|
|
should_print_process_info = false;
|
|
}
|
|
::usleep(100 * 1000);
|
|
}
|
|
}
|
|
|
|
pid_t Process::pid() const
|
|
{
|
|
return m_pid;
|
|
}
|
|
|
|
ErrorOr<void> Process::disown()
|
|
{
|
|
if (m_pid != 0 && m_should_disown) {
|
|
#ifdef AK_OS_SERENITY
|
|
TRY(System::disown(m_pid));
|
|
#else
|
|
// FIXME: Support disown outside Serenity.
|
|
#endif
|
|
m_should_disown = false;
|
|
return {};
|
|
} else {
|
|
return Error::from_errno(EINVAL);
|
|
}
|
|
}
|
|
|
|
ErrorOr<int> Process::wait_for_termination()
|
|
{
|
|
VERIFY(m_pid > 0);
|
|
|
|
int exit_code = -1;
|
|
int status;
|
|
if (waitpid(m_pid, &status, 0) == -1)
|
|
return Error::from_syscall("waitpid"sv, errno);
|
|
|
|
if (WIFEXITED(status)) {
|
|
exit_code = WEXITSTATUS(status);
|
|
} else if (WIFSIGNALED(status)) {
|
|
exit_code = 128 + WTERMSIG(status);
|
|
} else if (WIFSTOPPED(status)) {
|
|
// This is only possible if the child process is being traced by us.
|
|
VERIFY_NOT_REACHED();
|
|
} else {
|
|
VERIFY_NOT_REACHED();
|
|
}
|
|
|
|
m_should_disown = false;
|
|
return exit_code;
|
|
}
|
|
|
|
}
|