152 lines
4.8 KiB
C++
152 lines
4.8 KiB
C++
$NetBSD$
|
|
|
|
--- base/process/process_iterator_netbsd.cc.orig 2020-07-09 13:18:47.324483044 +0000
|
|
+++ base/process/process_iterator_netbsd.cc
|
|
@@ -0,0 +1,146 @@
|
|
+// Copyright (c) 2013 The Chromium Authors. All rights reserved.
|
|
+// Use of this source code is governed by a BSD-style license that can be
|
|
+// found in the LICENSE file.
|
|
+
|
|
+#include "base/process/process_iterator.h"
|
|
+
|
|
+#include <errno.h>
|
|
+#include <sys/types.h>
|
|
+#include <stddef.h>
|
|
+#include <sys/sysctl.h>
|
|
+#include <unistd.h>
|
|
+
|
|
+/* getuid() */
|
|
+#include <unistd.h>
|
|
+#include <sys/types.h>
|
|
+
|
|
+#include "base/logging.h"
|
|
+#include "base/macros.h"
|
|
+#include "base/strings/string_split.h"
|
|
+#include "base/strings/string_util.h"
|
|
+
|
|
+namespace base {
|
|
+
|
|
+ProcessIterator::ProcessIterator(const ProcessFilter* filter)
|
|
+ : index_of_kinfo_proc_(),
|
|
+ filter_(filter) {
|
|
+
|
|
+ int mib[6];
|
|
+
|
|
+ printf("%s\n", __PRETTY_FUNCTION__);
|
|
+
|
|
+ mib[0] = CTL_KERN;
|
|
+ mib[1] = KERN_PROC2;
|
|
+ mib[2] = KERN_PROC_UID;
|
|
+ mib[3] = getuid();
|
|
+ mib[4] = sizeof(struct kinfo_proc2);
|
|
+ mib[5] = 0;
|
|
+
|
|
+ bool done = false;
|
|
+ int try_num = 1;
|
|
+ const int max_tries = 10;
|
|
+
|
|
+ do {
|
|
+ size_t len = 0;
|
|
+ if (sysctl(mib, 6, NULL, &len, NULL, 0) <0 ){
|
|
+ LOG(ERROR) << "failed to get the size needed for the process list";
|
|
+ kinfo_procs_.resize(0);
|
|
+ done = true;
|
|
+ } else {
|
|
+ size_t num_of_kinfo_proc = len / sizeof(struct kinfo_proc2);
|
|
+ // Leave some spare room for process table growth (more could show up
|
|
+ // between when we check and now)
|
|
+ num_of_kinfo_proc += 16;
|
|
+ kinfo_procs_.resize(num_of_kinfo_proc);
|
|
+ len = num_of_kinfo_proc * sizeof(struct kinfo_proc2);
|
|
+ if (sysctl(mib, 6, &kinfo_procs_[0], &len, NULL, 0) <0) {
|
|
+ // If we get a mem error, it just means we need a bigger buffer, so
|
|
+ // loop around again. Anything else is a real error and give up.
|
|
+ if (errno != ENOMEM) {
|
|
+ LOG(ERROR) << "failed to get the process list";
|
|
+ kinfo_procs_.resize(0);
|
|
+ done = true;
|
|
+ }
|
|
+ } else {
|
|
+ // Got the list, just make sure we're sized exactly right
|
|
+ size_t num_of_kinfo_proc = len / sizeof(struct kinfo_proc2);
|
|
+ kinfo_procs_.resize(num_of_kinfo_proc);
|
|
+ done = true;
|
|
+ }
|
|
+ }
|
|
+ } while (!done && (try_num++ < max_tries));
|
|
+
|
|
+ if (!done) {
|
|
+ LOG(ERROR) << "failed to collect the process list in a few tries";
|
|
+ kinfo_procs_.resize(0);
|
|
+ }
|
|
+}
|
|
+
|
|
+ProcessIterator::~ProcessIterator() {
|
|
+}
|
|
+
|
|
+bool ProcessIterator::CheckForNextProcess() {
|
|
+ std::string data;
|
|
+ for (; index_of_kinfo_proc_ < kinfo_procs_.size(); ++index_of_kinfo_proc_) {
|
|
+ kinfo_proc2& kinfo = kinfo_procs_[index_of_kinfo_proc_];
|
|
+
|
|
+ // Skip processes just awaiting collection
|
|
+ if ((kinfo.p_pid > 0) && (kinfo.p_stat == SZOMB))
|
|
+ continue;
|
|
+
|
|
+ int mib[] = { CTL_KERN, KERN_PROC_ARGS, kinfo.p_pid };
|
|
+
|
|
+ // Find out what size buffer we need.
|
|
+ size_t data_len = 0;
|
|
+ if (sysctl(mib, __arraycount(mib), NULL, &data_len, NULL, 0) < 0) {
|
|
+ DVPLOG(1) << "failed to figure out the buffer size for a commandline";
|
|
+ continue;
|
|
+ }
|
|
+
|
|
+ data.resize(data_len);
|
|
+ if (sysctl(mib, __arraycount(mib), &data[0], &data_len, NULL, 0) < 0) {
|
|
+ DVPLOG(1) << "failed to fetch a commandline";
|
|
+ continue;
|
|
+ }
|
|
+
|
|
+ // |data| contains all the command line parameters of the process, separated
|
|
+ // by blocks of one or more null characters. We tokenize |data| into a
|
|
+ // vector of strings using '\0' as a delimiter and populate
|
|
+ // |entry_.cmd_line_args_|.
|
|
+ std::string delimiters;
|
|
+ delimiters.push_back('\0');
|
|
+ entry_.cmd_line_args_ = SplitString(data, delimiters, KEEP_WHITESPACE,
|
|
+ SPLIT_WANT_NONEMPTY);
|
|
+
|
|
+ // |data| starts with the full executable path followed by a null character.
|
|
+ // We search for the first instance of '\0' and extract everything before it
|
|
+ // to populate |entry_.exe_file_|.
|
|
+ size_t exec_name_end = data.find('\0');
|
|
+ if (exec_name_end == std::string::npos) {
|
|
+ DLOG(ERROR) << "command line data didn't match expected format";
|
|
+ continue;
|
|
+ }
|
|
+
|
|
+ entry_.pid_ = kinfo.p_pid;
|
|
+ entry_.ppid_ = kinfo.p_ppid;
|
|
+ entry_.gid_ = kinfo.p__pgid;
|
|
+ size_t last_slash = data.rfind('/', exec_name_end);
|
|
+ if (last_slash == std::string::npos)
|
|
+ entry_.exe_file_.assign(data, 0, exec_name_end);
|
|
+ else
|
|
+ entry_.exe_file_.assign(data, last_slash + 1,
|
|
+ exec_name_end - last_slash - 1);
|
|
+ // Start w/ the next entry next time through
|
|
+ ++index_of_kinfo_proc_;
|
|
+ // Done
|
|
+ return true;
|
|
+ }
|
|
+ return false;
|
|
+}
|
|
+
|
|
+bool NamedProcessIterator::IncludeEntry() {
|
|
+ return (executable_name_ == entry().exe_file() &&
|
|
+ ProcessIterator::IncludeEntry());
|
|
+}
|
|
+
|
|
+} // namespace base
|