// Copyright (c) 2006-2008 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include #include #include #include #include #include #include #include #include #include #include #include #include "base/basictypes.h" #include "base/eintr_wrapper.h" #include "base/logging.h" #include "base/platform_thread.h" #include "base/process_util.h" #include "base/scoped_ptr.h" #include "base/sys_info.h" #include "base/time.h" #include "base/waitable_event.h" const int kMicrosecondsPerSecond = 1000000; namespace base { ProcessId GetCurrentProcId() { return getpid(); } ProcessHandle GetCurrentProcessHandle() { return GetCurrentProcId(); } bool OpenProcessHandle(ProcessId pid, ProcessHandle* handle) { // On Posix platforms, process handles are the same as PIDs, so we // don't need to do anything. *handle = pid; return true; } bool OpenPrivilegedProcessHandle(ProcessId pid, ProcessHandle* handle) { // On POSIX permissions are checked for each operation on process, // not when opening a "handle". return OpenProcessHandle(pid, handle); } void CloseProcessHandle(ProcessHandle process) { // See OpenProcessHandle, nothing to do. return; } ProcessId GetProcId(ProcessHandle process) { return process; } // Attempts to kill the process identified by the given process // entry structure. Ignores specified exit_code; posix can't force that. // Returns true if this is successful, false otherwise. bool KillProcess(ProcessHandle process_id, int exit_code, bool wait) { DCHECK(process_id > 1); if (process_id <= 1) { LOG(ERROR) << "tried to kill process_id " << process_id; return false; } bool result = kill(process_id, SIGTERM) == 0; if (result && wait) { int tries = 60; // The process may not end immediately due to pending I/O bool exited = false; while (tries-- > 0) { int pid = HANDLE_EINTR(waitpid(process_id, NULL, WNOHANG)); if (pid == process_id) { exited = true; break; } sleep(1); } if (!exited) { result = kill(process_id, SIGKILL) == 0; } } if (!result) { DLOG(ERROR) << "Unable to terminate process " << process_id << "; error " << errno; } return result; } // A class to handle auto-closing of DIR*'s. class ScopedDIRClose { public: inline void operator()(DIR* x) const { if (x) { closedir(x); } } }; typedef scoped_ptr_malloc ScopedDIR; void CloseSuperfluousFds(const base::InjectiveMultimap& saved_mapping) { #if defined(OS_LINUX) static const rlim_t kSystemDefaultMaxFds = 8192; static const char fd_dir[] = "/proc/self/fd"; #elif defined(OS_MACOSX) static const rlim_t kSystemDefaultMaxFds = 256; static const char fd_dir[] = "/dev/fd"; #elif defined(OS_FREEBSD) static const rlim_t kSystemDefaultMaxFds = 8192; static const char fd_dir[] = "/dev/fd"; #endif std::set saved_fds; // Get the maximum number of FDs possible. struct rlimit nofile; rlim_t max_fds; if (getrlimit(RLIMIT_NOFILE, &nofile)) { // getrlimit failed. Take a best guess. max_fds = kSystemDefaultMaxFds; DLOG(ERROR) << "getrlimit(RLIMIT_NOFILE) failed: " << errno; } else { max_fds = nofile.rlim_cur; } if (max_fds > INT_MAX) max_fds = INT_MAX; // Don't close stdin, stdout and stderr saved_fds.insert(STDIN_FILENO); saved_fds.insert(STDOUT_FILENO); saved_fds.insert(STDERR_FILENO); for (base::InjectiveMultimap::const_iterator i = saved_mapping.begin(); i != saved_mapping.end(); ++i) { saved_fds.insert(i->dest); } ScopedDIR dir_closer(opendir(fd_dir)); DIR *dir = dir_closer.get(); if (NULL == dir) { DLOG(ERROR) << "Unable to open " << fd_dir; // Fallback case: Try every possible fd. for (rlim_t i = 0; i < max_fds; ++i) { const int fd = static_cast(i); if (saved_fds.find(fd) != saved_fds.end()) continue; HANDLE_EINTR(close(fd)); } return; } int dir_fd = dirfd(dir); struct dirent *ent; while ((ent = readdir(dir))) { // Skip . and .. entries. if (ent->d_name[0] == '.') continue; char *endptr; errno = 0; const long int fd = strtol(ent->d_name, &endptr, 10); if (ent->d_name[0] == 0 || *endptr || fd < 0 || errno) continue; if (saved_fds.find(fd) != saved_fds.end()) continue; if (fd == dir_fd) continue; // When running under Valgrind, Valgrind opens several FDs for its // own use and will complain if we try to close them. All of // these FDs are >= |max_fds|, so we can check against that here // before closing. See https://bugs.kde.org/show_bug.cgi?id=191758 if (fd < static_cast(max_fds)) HANDLE_EINTR(close(fd)); } } // Sets all file descriptors to close on exec except for stdin, stdout // and stderr. // TODO(agl): Remove this function. It's fundamentally broken for multithreaded // apps. void SetAllFDsToCloseOnExec() { #if defined(OS_LINUX) const char fd_dir[] = "/proc/self/fd"; #elif defined(OS_MACOSX) || defined(OS_FREEBSD) const char fd_dir[] = "/dev/fd"; #endif ScopedDIR dir_closer(opendir(fd_dir)); DIR *dir = dir_closer.get(); if (NULL == dir) { DLOG(ERROR) << "Unable to open " << fd_dir; return; } struct dirent *ent; while ((ent = readdir(dir))) { // Skip . and .. entries. if (ent->d_name[0] == '.') continue; int i = atoi(ent->d_name); // We don't close stdin, stdout or stderr. if (i <= STDERR_FILENO) continue; int flags = fcntl(i, F_GETFD); if ((flags == -1) || (fcntl(i, F_SETFD, flags | FD_CLOEXEC) == -1)) { DLOG(ERROR) << "fcntl failure."; } } } bool LaunchApp(const std::vector& argv, const environment_vector& environ, const file_handle_mapping_vector& fds_to_remap, bool wait, ProcessHandle* process_handle) { pid_t pid = fork(); if (pid < 0) return false; if (pid == 0) { // Child process #if defined(OS_MACOSX) RestoreDefaultExceptionHandler(); #endif InjectiveMultimap fd_shuffle; for (file_handle_mapping_vector::const_iterator it = fds_to_remap.begin(); it != fds_to_remap.end(); ++it) { fd_shuffle.push_back(InjectionArc(it->first, it->second, false)); } for (environment_vector::const_iterator it = environ.begin(); it != environ.end(); ++it) { if (it->first) { if (it->second) { setenv(it->first, it->second, 1); } else { unsetenv(it->first); } } } // Obscure fork() rule: in the child, if you don't end up doing exec*(), // you call _exit() instead of exit(). This is because _exit() does not // call any previously-registered (in the parent) exit handlers, which // might do things like block waiting for threads that don't even exist // in the child. if (!ShuffleFileDescriptors(fd_shuffle)) _exit(127); // If we are using the SUID sandbox, it sets a magic environment variable // ("SBX_D"), so we remove that variable from the environment here on the // off chance that it's already set. unsetenv("SBX_D"); CloseSuperfluousFds(fd_shuffle); scoped_array argv_cstr(new char*[argv.size() + 1]); for (size_t i = 0; i < argv.size(); i++) argv_cstr[i] = const_cast(argv[i].c_str()); argv_cstr[argv.size()] = NULL; execvp(argv_cstr[0], argv_cstr.get()); LOG(ERROR) << "LaunchApp: execvp(" << argv_cstr[0] << ") failed: " << strerror(errno); _exit(127); } else { // Parent process if (wait) HANDLE_EINTR(waitpid(pid, 0, 0)); if (process_handle) *process_handle = pid; } return true; } bool LaunchApp(const std::vector& argv, const file_handle_mapping_vector& fds_to_remap, bool wait, ProcessHandle* process_handle) { base::environment_vector no_env; return LaunchApp(argv, no_env, fds_to_remap, wait, process_handle); } bool LaunchApp(const CommandLine& cl, bool wait, bool start_hidden, ProcessHandle* process_handle) { file_handle_mapping_vector no_files; return LaunchApp(cl.argv(), no_files, wait, process_handle); } ProcessMetrics::ProcessMetrics(ProcessHandle process) : process_(process), last_time_(0), last_system_time_(0) #if defined(OS_LINUX) , last_cpu_(0) #endif { processor_count_ = base::SysInfo::NumberOfProcessors(); } // static ProcessMetrics* ProcessMetrics::CreateProcessMetrics(ProcessHandle process) { return new ProcessMetrics(process); } ProcessMetrics::~ProcessMetrics() { } void EnableTerminationOnHeapCorruption() { // On POSIX, there nothing to do AFAIK. } void RaiseProcessToHighPriority() { // On POSIX, we don't actually do anything here. We could try to nice() or // setpriority() or sched_getscheduler, but these all require extra rights. } bool DidProcessCrash(bool* child_exited, ProcessHandle handle) { int status; const int result = HANDLE_EINTR(waitpid(handle, &status, WNOHANG)); if (result == -1) { LOG(ERROR) << "waitpid(" << handle << "): " << strerror(errno); if (child_exited) *child_exited = false; return false; } else if (result == 0) { // the child hasn't exited yet. if (child_exited) *child_exited = false; return false; } if (child_exited) *child_exited = true; if (WIFSIGNALED(status)) { switch(WTERMSIG(status)) { case SIGSEGV: case SIGILL: case SIGABRT: case SIGFPE: return true; default: return false; } } if (WIFEXITED(status)) return WEXITSTATUS(status) != 0; return false; } bool WaitForExitCode(ProcessHandle handle, int* exit_code) { int status; if (HANDLE_EINTR(waitpid(handle, &status, 0)) == -1) { NOTREACHED(); return false; } if (WIFEXITED(status)) { *exit_code = WEXITSTATUS(status); return true; } // If it didn't exit cleanly, it must have been signaled. DCHECK(WIFSIGNALED(status)); return false; } namespace { int WaitpidWithTimeout(ProcessHandle handle, int64 wait_milliseconds, bool* success) { // This POSIX version of this function only guarantees that we wait no less // than |wait_milliseconds| for the proces to exit. The child process may // exit sometime before the timeout has ended but we may still block for // up to 0.25 seconds after the fact. // // waitpid() has no direct support on POSIX for specifying a timeout, you can // either ask it to block indefinitely or return immediately (WNOHANG). // When a child process terminates a SIGCHLD signal is sent to the parent. // Catching this signal would involve installing a signal handler which may // affect other parts of the application and would be difficult to debug. // // Our strategy is to call waitpid() once up front to check if the process // has already exited, otherwise to loop for wait_milliseconds, sleeping for // at most 0.25 secs each time using usleep() and then calling waitpid(). // // usleep() is speced to exit if a signal is received for which a handler // has been installed. This means that when a SIGCHLD is sent, it will exit // depending on behavior external to this function. // // This function is used primarily for unit tests, if we want to use it in // the application itself it would probably be best to examine other routes. int status = -1; pid_t ret_pid = HANDLE_EINTR(waitpid(handle, &status, WNOHANG)); static const int64 kQuarterSecondInMicroseconds = kMicrosecondsPerSecond/4; // If the process hasn't exited yet, then sleep and try again. Time wakeup_time = Time::Now() + TimeDelta::FromMilliseconds( wait_milliseconds); while (ret_pid == 0) { Time now = Time::Now(); if (now > wakeup_time) break; // Guaranteed to be non-negative! int64 sleep_time_usecs = (wakeup_time - now).InMicroseconds(); // Don't sleep for more than 0.25 secs at a time. if (sleep_time_usecs > kQuarterSecondInMicroseconds) { sleep_time_usecs = kQuarterSecondInMicroseconds; } // usleep() will return 0 and set errno to EINTR on receipt of a signal // such as SIGCHLD. usleep(sleep_time_usecs); ret_pid = HANDLE_EINTR(waitpid(handle, &status, WNOHANG)); } if (success) *success = (ret_pid != -1); return status; } } // namespace bool WaitForSingleProcess(ProcessHandle handle, int64 wait_milliseconds) { bool waitpid_success; int status; if (wait_milliseconds == base::kNoTimeout) waitpid_success = (HANDLE_EINTR(waitpid(handle, &status, 0)) != -1); else status = WaitpidWithTimeout(handle, wait_milliseconds, &waitpid_success); if (status != -1) { DCHECK(waitpid_success); return WIFEXITED(status); } else { return false; } } bool CrashAwareSleep(ProcessHandle handle, int64 wait_milliseconds) { bool waitpid_success; int status = WaitpidWithTimeout(handle, wait_milliseconds, &waitpid_success); if (status != -1) { DCHECK(waitpid_success); return !(WIFEXITED(status) || WIFSIGNALED(status)); } else { // If waitpid returned with an error, then the process doesn't exist // (which most probably means it didn't exist before our call). return waitpid_success; } } int64 TimeValToMicroseconds(const struct timeval& tv) { return tv.tv_sec * kMicrosecondsPerSecond + tv.tv_usec; } #if defined(OS_MACOSX) // TODO(port): this function only returns the *current* CPU's usage; // we want to return this->process_'s CPU usage. int ProcessMetrics::GetCPUUsage() { struct timeval now; struct rusage usage; int retval = gettimeofday(&now, NULL); if (retval) return 0; retval = getrusage(RUSAGE_SELF, &usage); if (retval) return 0; int64 system_time = (TimeValToMicroseconds(usage.ru_stime) + TimeValToMicroseconds(usage.ru_utime)) / processor_count_; int64 time = TimeValToMicroseconds(now); if ((last_system_time_ == 0) || (last_time_ == 0)) { // First call, just set the last values. last_system_time_ = system_time; last_time_ = time; return 0; } int64 system_time_delta = system_time - last_system_time_; int64 time_delta = time - last_time_; DCHECK(time_delta != 0); if (time_delta == 0) return 0; // We add time_delta / 2 so the result is rounded. int cpu = static_cast((system_time_delta * 100 + time_delta / 2) / time_delta); last_system_time_ = system_time; last_time_ = time; return cpu; } #endif bool GetAppOutput(const CommandLine& cl, std::string* output) { int pipe_fd[2]; pid_t pid; if (pipe(pipe_fd) < 0) return false; switch (pid = fork()) { case -1: // error close(pipe_fd[0]); close(pipe_fd[1]); return false; case 0: // child { #if defined(OS_MACOSX) RestoreDefaultExceptionHandler(); #endif // Obscure fork() rule: in the child, if you don't end up doing exec*(), // you call _exit() instead of exit(). This is because _exit() does not // call any previously-registered (in the parent) exit handlers, which // might do things like block waiting for threads that don't even exist // in the child. int dev_null = open("/dev/null", O_WRONLY); if (dev_null < 0) _exit(127); InjectiveMultimap fd_shuffle; fd_shuffle.push_back(InjectionArc(pipe_fd[1], STDOUT_FILENO, true)); fd_shuffle.push_back(InjectionArc(dev_null, STDERR_FILENO, true)); fd_shuffle.push_back(InjectionArc(dev_null, STDIN_FILENO, true)); if (!ShuffleFileDescriptors(fd_shuffle)) _exit(127); CloseSuperfluousFds(fd_shuffle); const std::vector argv = cl.argv(); scoped_array argv_cstr(new char*[argv.size() + 1]); for (size_t i = 0; i < argv.size(); i++) argv_cstr[i] = const_cast(argv[i].c_str()); argv_cstr[argv.size()] = NULL; execvp(argv_cstr[0], argv_cstr.get()); _exit(127); } default: // parent { // Close our writing end of pipe now. Otherwise later read would not // be able to detect end of child's output (in theory we could still // write to the pipe). close(pipe_fd[1]); char buffer[256]; std::string buf_output; while (true) { ssize_t bytes_read = HANDLE_EINTR(read(pipe_fd[0], buffer, sizeof(buffer))); if (bytes_read <= 0) break; buf_output.append(buffer, bytes_read); } close(pipe_fd[0]); int exit_code = EXIT_FAILURE; bool success = WaitForExitCode(pid, &exit_code); if (!success || exit_code != EXIT_SUCCESS) return false; output->swap(buf_output); return true; } } } int GetProcessCount(const std::wstring& executable_name, const ProcessFilter* filter) { int count = 0; NamedProcessIterator iter(executable_name, filter); while (iter.NextProcessEntry()) ++count; return count; } bool KillProcesses(const std::wstring& executable_name, int exit_code, const ProcessFilter* filter) { bool result = true; const ProcessEntry* entry; NamedProcessIterator iter(executable_name, filter); while ((entry = iter.NextProcessEntry()) != NULL) result = KillProcess((*entry).pid, exit_code, true) && result; return result; } bool WaitForProcessesToExit(const std::wstring& executable_name, int64 wait_milliseconds, const ProcessFilter* filter) { bool result = false; // TODO(port): This is inefficient, but works if there are multiple procs. // TODO(port): use waitpid to avoid leaving zombies around base::Time end_time = base::Time::Now() + base::TimeDelta::FromMilliseconds(wait_milliseconds); do { NamedProcessIterator iter(executable_name, filter); if (!iter.NextProcessEntry()) { result = true; break; } PlatformThread::Sleep(100); } while ((base::Time::Now() - end_time) > base::TimeDelta()); return result; } bool CleanupProcesses(const std::wstring& executable_name, int64 wait_milliseconds, int exit_code, const ProcessFilter* filter) { bool exited_cleanly = WaitForProcessesToExit(executable_name, wait_milliseconds, filter); if (!exited_cleanly) KillProcesses(executable_name, exit_code, filter); return exited_cleanly; } } // namespace base