naiveproxy/base/linux_util.cc
2018-02-02 05:49:39 -05:00

227 lines
6.3 KiB
C++

// Copyright (c) 2012 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/linux_util.h"
#include <dirent.h>
#include <errno.h>
#include <fcntl.h>
#include <limits.h>
#include <stdlib.h>
#include <sys/stat.h>
#include <sys/types.h>
#include <unistd.h>
#include <memory>
#include <vector>
#include "base/command_line.h"
#include "base/files/file_util.h"
#include "base/memory/singleton.h"
#include "base/process/launch.h"
#include "base/strings/string_number_conversions.h"
#include "base/strings/string_split.h"
#include "base/strings/string_tokenizer.h"
#include "base/strings/string_util.h"
#include "base/synchronization/lock.h"
#include "build/build_config.h"
namespace {
// Not needed for OS_CHROMEOS.
#if defined(OS_LINUX)
enum LinuxDistroState {
STATE_DID_NOT_CHECK = 0,
STATE_CHECK_STARTED = 1,
STATE_CHECK_FINISHED = 2,
};
// Helper class for GetLinuxDistro().
class LinuxDistroHelper {
public:
// Retrieves the Singleton.
static LinuxDistroHelper* GetInstance() {
return base::Singleton<LinuxDistroHelper>::get();
}
// The simple state machine goes from:
// STATE_DID_NOT_CHECK -> STATE_CHECK_STARTED -> STATE_CHECK_FINISHED.
LinuxDistroHelper() : state_(STATE_DID_NOT_CHECK) {}
~LinuxDistroHelper() = default;
// Retrieve the current state, if we're in STATE_DID_NOT_CHECK,
// we automatically move to STATE_CHECK_STARTED so nobody else will
// do the check.
LinuxDistroState State() {
base::AutoLock scoped_lock(lock_);
if (STATE_DID_NOT_CHECK == state_) {
state_ = STATE_CHECK_STARTED;
return STATE_DID_NOT_CHECK;
}
return state_;
}
// Indicate the check finished, move to STATE_CHECK_FINISHED.
void CheckFinished() {
base::AutoLock scoped_lock(lock_);
DCHECK_EQ(STATE_CHECK_STARTED, state_);
state_ = STATE_CHECK_FINISHED;
}
private:
base::Lock lock_;
LinuxDistroState state_;
};
#endif // if defined(OS_LINUX)
bool GetTasksForProcess(pid_t pid, std::vector<pid_t>* tids) {
char buf[256];
snprintf(buf, sizeof(buf), "/proc/%d/task", pid);
DIR* task = opendir(buf);
if (!task) {
DLOG(WARNING) << "Cannot open " << buf;
return false;
}
struct dirent* dent;
while ((dent = readdir(task))) {
char* endptr;
const unsigned long int tid_ul = strtoul(dent->d_name, &endptr, 10);
if (tid_ul == ULONG_MAX || *endptr)
continue;
tids->push_back(tid_ul);
}
closedir(task);
return true;
}
} // namespace
namespace base {
// Account for the terminating null character.
static const int kDistroSize = 128 + 1;
// We use this static string to hold the Linux distro info. If we
// crash, the crash handler code will send this in the crash dump.
char g_linux_distro[kDistroSize] =
#if defined(OS_CHROMEOS)
"CrOS";
#elif defined(OS_ANDROID)
"Android";
#else // if defined(OS_LINUX)
"Unknown";
#endif
std::string GetLinuxDistro() {
#if defined(OS_CHROMEOS) || defined(OS_ANDROID)
return g_linux_distro;
#elif defined(OS_LINUX)
LinuxDistroHelper* distro_state_singleton = LinuxDistroHelper::GetInstance();
LinuxDistroState state = distro_state_singleton->State();
if (STATE_CHECK_FINISHED == state)
return g_linux_distro;
if (STATE_CHECK_STARTED == state)
return "Unknown"; // Don't wait for other thread to finish.
DCHECK_EQ(state, STATE_DID_NOT_CHECK);
// We do this check only once per process. If it fails, there's
// little reason to believe it will work if we attempt to run
// lsb_release again.
std::vector<std::string> argv;
argv.push_back("lsb_release");
argv.push_back("-d");
std::string output;
GetAppOutput(CommandLine(argv), &output);
if (output.length() > 0) {
// lsb_release -d should return: Description:<tab>Distro Info
const char field[] = "Description:\t";
if (output.compare(0, strlen(field), field) == 0) {
SetLinuxDistro(output.substr(strlen(field)));
}
}
distro_state_singleton->CheckFinished();
return g_linux_distro;
#else
NOTIMPLEMENTED();
return "Unknown";
#endif
}
void SetLinuxDistro(const std::string& distro) {
std::string trimmed_distro;
TrimWhitespaceASCII(distro, TRIM_ALL, &trimmed_distro);
strlcpy(g_linux_distro, trimmed_distro.c_str(), kDistroSize);
}
pid_t FindThreadIDWithSyscall(pid_t pid, const std::string& expected_data,
bool* syscall_supported) {
if (syscall_supported != nullptr)
*syscall_supported = false;
std::vector<pid_t> tids;
if (!GetTasksForProcess(pid, &tids))
return -1;
std::unique_ptr<char[]> syscall_data(new char[expected_data.length()]);
for (pid_t tid : tids) {
char buf[256];
snprintf(buf, sizeof(buf), "/proc/%d/task/%d/syscall", pid, tid);
int fd = open(buf, O_RDONLY);
if (fd < 0)
continue;
if (syscall_supported != nullptr)
*syscall_supported = true;
bool read_ret = ReadFromFD(fd, syscall_data.get(), expected_data.length());
close(fd);
if (!read_ret)
continue;
if (0 == strncmp(expected_data.c_str(), syscall_data.get(),
expected_data.length())) {
return tid;
}
}
return -1;
}
pid_t FindThreadID(pid_t pid, pid_t ns_tid, bool* ns_pid_supported) {
if (ns_pid_supported)
*ns_pid_supported = false;
std::vector<pid_t> tids;
if (!GetTasksForProcess(pid, &tids))
return -1;
for (pid_t tid : tids) {
char buf[256];
snprintf(buf, sizeof(buf), "/proc/%d/task/%d/status", pid, tid);
std::string status;
if (!ReadFileToString(FilePath(buf), &status))
return -1;
StringTokenizer tokenizer(status, "\n");
while (tokenizer.GetNext()) {
StringPiece value_str(tokenizer.token_piece());
if (!value_str.starts_with("NSpid"))
continue;
if (ns_pid_supported)
*ns_pid_supported = true;
std::vector<StringPiece> split_value_str = SplitStringPiece(
value_str, "\t", TRIM_WHITESPACE, SPLIT_WANT_NONEMPTY);
DCHECK_GE(split_value_str.size(), 2u);
int value;
// The last value in the list is the PID in the namespace.
if (StringToInt(split_value_str.back(), &value) && value == ns_tid) {
// The second value in the list is the real PID.
if (StringToInt(split_value_str[1], &value))
return value;
}
break;
}
}
return -1;
}
} // namespace base