[go: nahoru, domu]

blob: a7f8496924c75345f7f3b281facf2ab6a268655d [file] [log] [blame]
erg@google.coma502bbe72011-01-07 18:06:451// Copyright (c) 2011 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commitd7cae122008-07-26 21:49:384
5// This file/namespace contains utility functions for enumerating, ending and
6// computing statistics of processes.
7
deanm@google.comdb717282008-08-27 13:48:038#ifndef BASE_PROCESS_UTIL_H_
9#define BASE_PROCESS_UTIL_H_
thakis@chromium.org32b76ef2010-07-26 23:08:2410#pragma once
initial.commitd7cae122008-07-26 21:49:3811
paulg@google.com61659062008-08-06 01:04:1812#include "base/basictypes.h"
13
dkegel@google.comab0e2222008-10-31 20:19:4314#if defined(OS_WIN)
initial.commitd7cae122008-07-26 21:49:3815#include <windows.h>
16#include <tlhelp32.h>
wtc@chromium.org4a34ce02009-08-31 22:25:0017#elif defined(OS_MACOSX)
18// kinfo_proc is defined in <sys/sysctl.h>, but this forward declaration
19// is sufficient for the vector<kinfo_proc> below.
20struct kinfo_proc;
avi@chromium.org6cfa3392010-07-01 20:11:4321// malloc_zone_t is defined in <malloc/malloc.h>, but this forward declaration
22// is sufficient for GetPurgeableZone() below.
23typedef struct _malloc_zone_t malloc_zone_t;
thakis@chromium.orgc0028792010-01-12 00:39:1524#include <mach/mach.h>
wtc@chromium.org4a34ce02009-08-31 22:25:0025#elif defined(OS_POSIX)
dkegel@google.comab0e2222008-10-31 20:19:4326#include <dirent.h>
27#include <limits.h>
28#include <sys/types.h>
paulg@google.com61659062008-08-06 01:04:1829#endif
initial.commitd7cae122008-07-26 21:49:3830
maruel@chromium.orgb6128aa2010-04-29 17:44:4231#include <list>
paulg@google.com61659062008-08-06 01:04:1832#include <string>
thestig@chromium.org9ec8db02009-07-21 07:00:1333#include <utility>
mark@chromium.org962dd312009-02-05 21:44:1334#include <vector>
paulg@google.com61659062008-08-06 01:04:1835
maruel@chromium.orga5a00b1d2010-04-08 15:52:4536#include "base/file_descriptor_shuffle.h"
avi@chromium.org4f260d02010-12-23 18:35:4237#include "base/file_path.h"
initial.commitd7cae122008-07-26 21:49:3838#include "base/process.h"
39
erg@google.com5d91c9e2010-07-28 17:25:2840class CommandLine;
erg@google.com5d91c9e2010-07-28 17:25:2841
maruel@chromium.orga5a00b1d2010-04-08 15:52:4542namespace base {
43
paulg@google.com61659062008-08-06 01:04:1844#if defined(OS_WIN)
maruel@chromium.orga5a00b1d2010-04-08 15:52:4545struct ProcessEntry : public PROCESSENTRY32 {
maruel@chromium.orgb6128aa2010-04-29 17:44:4246 ProcessId pid() const { return th32ProcessID; }
47 ProcessId parent_pid() const { return th32ParentProcessID; }
48 const wchar_t* exe_file() const { return szExeFile; }
maruel@chromium.orga5a00b1d2010-04-08 15:52:4549};
maruel@chromium.orgb6128aa2010-04-29 17:44:4250
maruel@chromium.orga5a00b1d2010-04-08 15:52:4551struct IoCounters : public IO_COUNTERS {
52};
53
sanjeevr@chromium.org7d11f6d52010-10-12 21:44:2354// Process access masks. These constants provide platform-independent
55// definitions for the standard Windows access masks.
56// See http://msdn.microsoft.com/en-us/library/ms684880(VS.85).aspx for
57// the specific semantics of each mask value.
58const uint32 kProcessAccessTerminate = PROCESS_TERMINATE;
59const uint32 kProcessAccessCreateThread = PROCESS_CREATE_THREAD;
60const uint32 kProcessAccessSetSessionId = PROCESS_SET_SESSIONID;
61const uint32 kProcessAccessVMOperation = PROCESS_VM_OPERATION;
62const uint32 kProcessAccessVMRead = PROCESS_VM_READ;
63const uint32 kProcessAccessVMWrite = PROCESS_VM_WRITE;
64const uint32 kProcessAccessDuplicateHandle = PROCESS_DUP_HANDLE;
65const uint32 kProcessAccessCreateProcess = PROCESS_CREATE_PROCESS;
66const uint32 kProcessAccessSetQuota = PROCESS_SET_QUOTA;
67const uint32 kProcessAccessSetInformation = PROCESS_SET_INFORMATION;
68const uint32 kProcessAccessQueryInformation = PROCESS_QUERY_INFORMATION;
69const uint32 kProcessAccessSuspendResume = PROCESS_SUSPEND_RESUME;
70const uint32 kProcessAccessQueryLimitedInfomation =
71 PROCESS_QUERY_LIMITED_INFORMATION;
72const uint32 kProcessAccessWaitForTermination = SYNCHRONIZE;
paulg@google.com61659062008-08-06 01:04:1873#elif defined(OS_POSIX)
maruel@chromium.orga5a00b1d2010-04-08 15:52:4574
dkegel@google.comab0e2222008-10-31 20:19:4375struct ProcessEntry {
erg@google.combbf94a32010-10-13 17:44:1576 ProcessEntry();
77 ~ProcessEntry();
78
maruel@chromium.orgb6128aa2010-04-29 17:44:4279 ProcessId pid() const { return pid_; }
80 ProcessId parent_pid() const { return ppid_; }
rsimha@chromium.orgc47d81d2010-10-05 23:41:0481 ProcessId gid() const { return gid_; }
maruel@chromium.orgb6128aa2010-04-29 17:44:4282 const char* exe_file() const { return exe_file_.c_str(); }
rsimha@chromium.orgc47d81d2010-10-05 23:41:0483 const std::vector<std::string>& cmd_line_args() const {
84 return cmd_line_args_;
85 }
erg@google.coma502bbe72011-01-07 18:06:4586
87 ProcessId pid_;
88 ProcessId ppid_;
89 ProcessId gid_;
90 std::string exe_file_;
91 std::vector<std::string> cmd_line_args_;
dkegel@google.comab0e2222008-10-31 20:19:4392};
93
evanm@google.com0b100bc82008-10-14 20:49:1694struct IoCounters {
evan@chromium.org34b2b002009-11-20 06:53:2895 uint64_t ReadOperationCount;
96 uint64_t WriteOperationCount;
97 uint64_t OtherOperationCount;
98 uint64_t ReadTransferCount;
99 uint64_t WriteTransferCount;
100 uint64_t OtherTransferCount;
evanm@google.com0b100bc82008-10-14 20:49:16101};
agl@chromium.org3f04f2b2009-04-30 19:40:03102
sanjeevr@chromium.org7d11f6d52010-10-12 21:44:23103// Process access masks. They are not used on Posix because access checking
104// does not happen during handle creation.
105const uint32 kProcessAccessTerminate = 0;
106const uint32 kProcessAccessCreateThread = 0;
107const uint32 kProcessAccessSetSessionId = 0;
108const uint32 kProcessAccessVMOperation = 0;
109const uint32 kProcessAccessVMRead = 0;
110const uint32 kProcessAccessVMWrite = 0;
111const uint32 kProcessAccessDuplicateHandle = 0;
112const uint32 kProcessAccessCreateProcess = 0;
113const uint32 kProcessAccessSetQuota = 0;
114const uint32 kProcessAccessSetInformation = 0;
115const uint32 kProcessAccessQueryInformation = 0;
116const uint32 kProcessAccessSuspendResume = 0;
117const uint32 kProcessAccessQueryLimitedInfomation = 0;
118const uint32 kProcessAccessWaitForTermination = 0;
maruel@chromium.orga5a00b1d2010-04-08 15:52:45119#endif // defined(OS_POSIX)
initial.commitd7cae122008-07-26 21:49:38120
gspencer@chromium.org443b80e2010-12-14 00:42:23121// Return status values from GetTerminationStatus. Don't use these as
122// exit code arguments to KillProcess*(), use platform/application
123// specific values instead.
124enum TerminationStatus {
125 TERMINATION_STATUS_NORMAL_TERMINATION, // zero exit status
126 TERMINATION_STATUS_ABNORMAL_TERMINATION, // non-zero exit status
127 TERMINATION_STATUS_PROCESS_WAS_KILLED, // e.g. SIGKILL or task manager kill
128 TERMINATION_STATUS_PROCESS_CRASHED, // e.g. Segmentation fault
129 TERMINATION_STATUS_STILL_RUNNING // child hasn't exited yet
cpu@google.comeef576f2008-11-03 23:28:06130};
131
initial.commitd7cae122008-07-26 21:49:38132// Returns the id of the current process.
phajdan.jr@chromium.org43cf3252009-04-01 09:19:37133ProcessId GetCurrentProcId();
initial.commitd7cae122008-07-26 21:49:38134
erikkay@google.com113ab132008-09-18 20:42:55135// Returns the ProcessHandle of the current process.
136ProcessHandle GetCurrentProcessHandle();
maruel@chromium.org52a261f2009-03-03 15:01:12137
brettw@google.com5986ed22009-02-06 00:19:17138// Converts a PID to a process handle. This handle must be closed by
phajdan.jr@chromium.org6c6cc802009-04-03 17:01:36139// CloseProcessHandle when you are done with it. Returns true on success.
140bool OpenProcessHandle(ProcessId pid, ProcessHandle* handle);
maruel@chromium.org52a261f2009-03-03 15:01:12141
phajdan.jr@chromium.org5d438dbad2009-04-30 08:59:39142// Converts a PID to a process handle. On Windows the handle is opened
143// with more access rights and must only be used by trusted code.
144// You have to close returned handle using CloseProcessHandle. Returns true
145// on success.
sanjeevr@chromium.org7d11f6d52010-10-12 21:44:23146// TODO(sanjeevr): Replace all calls to OpenPrivilegedProcessHandle with the
147// more specific OpenProcessHandleWithAccess method and delete this.
phajdan.jr@chromium.org5d438dbad2009-04-30 08:59:39148bool OpenPrivilegedProcessHandle(ProcessId pid, ProcessHandle* handle);
149
sanjeevr@chromium.org7d11f6d52010-10-12 21:44:23150// Converts a PID to a process handle using the desired access flags. Use a
151// combination of the kProcessAccess* flags defined above for |access_flags|.
152bool OpenProcessHandleWithAccess(ProcessId pid,
153 uint32 access_flags,
154 ProcessHandle* handle);
155
brettw@google.com5986ed22009-02-06 00:19:17156// Closes the process handle opened by OpenProcessHandle.
157void CloseProcessHandle(ProcessHandle process);
erikkay@google.com113ab132008-09-18 20:42:55158
cpu@google.comeef576f2008-11-03 23:28:06159// Returns the unique ID for the specified process. This is functionally the
initial.commitd7cae122008-07-26 21:49:38160// same as Windows' GetProcessId(), but works on versions of Windows before
161// Win XP SP1 as well.
phajdan.jr@chromium.org43cf3252009-04-01 09:19:37162ProcessId GetProcId(ProcessHandle process);
initial.commitd7cae122008-07-26 21:49:38163
dkegel@google.com78c6dd62009-06-08 23:29:11164#if defined(OS_LINUX)
165// Returns the ID for the parent of the given process.
166ProcessId GetParentProcessId(ProcessHandle process);
167
168// Returns the path to the executable of the given process.
169FilePath GetProcessExecutablePath(ProcessHandle process);
evan@chromium.orgd2ed23832009-09-19 01:57:39170
171// Parse the data found in /proc/<pid>/stat and return the sum of the
172// CPU-related ticks. Returns -1 on parse error.
173// Exposed for testing.
174int ParseProcStatCPU(const std::string& input);
thestig@chromium.orge5856a7a2009-12-10 02:08:10175
176static const char kAdjustOOMScoreSwitch[] = "--adjust-oom-score";
177
178// This adjusts /proc/process/oom_adj so the Linux OOM killer will prefer
179// certain process types over others. The range for the adjustment is
180// [-17,15], with [0,15] being user accessible.
181bool AdjustOOMScore(ProcessId process, int score);
dkegel@google.com78c6dd62009-06-08 23:29:11182#endif
183
jeremy@chromium.orgfa3097a6a52008-12-17 22:41:50184#if defined(OS_POSIX)
gspencer@chromium.org443b80e2010-12-14 00:42:23185// Close all file descriptors, except those which are a destination in the
agl@chromium.org3f04f2b2009-04-30 19:40:03186// given multimap. Only call this function in a child process where you know
187// that there aren't any other threads.
maruel@chromium.orgb6128aa2010-04-29 17:44:42188void CloseSuperfluousFds(const InjectiveMultimap& saved_map);
jeremy@chromium.orgfa3097a6a52008-12-17 22:41:50189#endif
190
estade@chromium.orgfb7f9be2008-10-22 01:15:47191#if defined(OS_WIN)
tommi@chromium.org48dc9e12010-08-26 19:49:57192
193enum IntegrityLevel {
194 INTEGRITY_UNKNOWN,
195 LOW_INTEGRITY,
196 MEDIUM_INTEGRITY,
197 HIGH_INTEGRITY,
198};
199// Determine the integrity level of the specified process. Returns false
200// if the system does not support integrity levels (pre-Vista) or in the case
201// of an underlying system failure.
202bool GetProcessIntegrityLevel(ProcessHandle process, IntegrityLevel *level);
203
initial.commitd7cae122008-07-26 21:49:38204// Runs the given application name with the given command line. Normally, the
205// first command line argument should be the path to the process, and don't
206// forget to quote it.
207//
208// If wait is true, it will block and wait for the other process to finish,
209// otherwise, it will just continue asynchronously.
210//
211// Example (including literal quotes)
212// cmdline = "c:\windows\explorer.exe" -foo "c:\bar\"
213//
214// If process_handle is non-NULL, the process handle of the launched app will be
215// stored there on a successful launch.
216// NOTE: In this case, the caller is responsible for closing the handle so
217// that it doesn't leak!
218bool LaunchApp(const std::wstring& cmdline,
estade@chromium.orgfb7f9be2008-10-22 01:15:47219 bool wait, bool start_hidden, ProcessHandle* process_handle);
cpu@chromium.orge50130b2010-02-01 03:28:47220
finnur@chromium.org81e32602010-09-07 14:01:31221// Same as LaunchApp, except allows the new process to inherit handles of the
222// parent process.
223bool LaunchAppWithHandleInheritance(const std::wstring& cmdline,
224 bool wait,
225 bool start_hidden,
226 ProcessHandle* process_handle);
227
cpu@chromium.orge50130b2010-02-01 03:28:47228// Runs the given application name with the given command line as if the user
229// represented by |token| had launched it. The caveats about |cmdline| and
230// |process_handle| explained for LaunchApp above apply as well.
231//
232// Whether the application is visible on the interactive desktop depends on
233// the token belonging to an interactive logon session.
234//
235// To avoid hard to diagnose problems, this function internally loads the
236// environment variables associated with the user and if this operation fails
237// the entire call fails as well.
238bool LaunchAppAsUser(UserTokenHandle token, const std::wstring& cmdline,
239 bool start_hidden, ProcessHandle* process_handle);
240
gwilson@google.comc020ddc2010-02-18 23:01:52241// Has the same behavior as LaunchAppAsUser, but offers the boolean option to
finnur@chromium.org81e32602010-09-07 14:01:31242// use an empty string for the desktop name and a boolean for allowing the
243// child process to inherit handles from its parent.
gwilson@google.comc020ddc2010-02-18 23:01:52244bool LaunchAppAsUser(UserTokenHandle token, const std::wstring& cmdline,
245 bool start_hidden, ProcessHandle* process_handle,
finnur@chromium.org81e32602010-09-07 14:01:31246 bool empty_desktop_name, bool inherit_handles);
gwilson@google.comc020ddc2010-02-18 23:01:52247
248
estade@chromium.orgfb7f9be2008-10-22 01:15:47249#elif defined(OS_POSIX)
250// Runs the application specified in argv[0] with the command line argv.
jeremy@chromium.orgfa3097a6a52008-12-17 22:41:50251// Before launching all FDs open in the parent process will be marked as
252// close-on-exec. |fds_to_remap| defines a mapping of src fd->dest fd to
253// propagate FDs into the child process.
estade@chromium.orgfb7f9be2008-10-22 01:15:47254//
255// As above, if wait is true, execute synchronously. The pid will be stored
256// in process_handle if that pointer is non-null.
257//
mattm@chromium.orgb74d21b32009-07-17 19:36:00258// Note that the first argument in argv must point to the executable filename.
259// If the filename is not fully specified, PATH will be searched.
jeremy@chromium.orgfa3097a6a52008-12-17 22:41:50260typedef std::vector<std::pair<int, int> > file_handle_mapping_vector;
estade@chromium.orgfb7f9be2008-10-22 01:15:47261bool LaunchApp(const std::vector<std::string>& argv,
jeremy@chromium.orgfa3097a6a52008-12-17 22:41:50262 const file_handle_mapping_vector& fds_to_remap,
estade@chromium.orgfb7f9be2008-10-22 01:15:47263 bool wait, ProcessHandle* process_handle);
stuartmorgan@google.com2aea9e092009-08-06 20:03:01264
thakis@chromium.orgc0028792010-01-12 00:39:15265// Similar to the above, but also (un)set environment variables in child process
thestig@chromium.org9ec8db02009-07-21 07:00:13266// through |environ|.
jam@chromium.org3d2217d2009-11-23 21:26:47267typedef std::vector<std::pair<std::string, std::string> > environment_vector;
thestig@chromium.org9ec8db02009-07-21 07:00:13268bool LaunchApp(const std::vector<std::string>& argv,
269 const environment_vector& environ,
270 const file_handle_mapping_vector& fds_to_remap,
271 bool wait, ProcessHandle* process_handle);
thakis@chromium.orgc0028792010-01-12 00:39:15272
rsimha@chromium.org61b93f88f2010-09-22 17:28:30273// Similar to the above two methods, but starts the child process in a process
274// group of its own, instead of allowing it to inherit the parent's process
275// group. The pgid of the child process will be the same as its pid.
276bool LaunchAppInNewProcessGroup(const std::vector<std::string>& argv,
277 const environment_vector& environ,
278 const file_handle_mapping_vector& fds_to_remap,
279 bool wait, ProcessHandle* process_handle);
280
agl@chromium.orgef73044e2010-03-11 15:25:54281// AlterEnvironment returns a modified environment vector, constructed from the
282// given environment and the list of changes given in |changes|. Each key in
283// the environment is matched against the first element of the pairs. In the
284// event of a match, the value is replaced by the second of the pair, unless
285// the second is empty, in which case the key-value is removed.
286//
287// The returned array is allocated using new[] and must be freed by the caller.
288char** AlterEnvironment(const environment_vector& changes,
289 const char* const* const env);
thestig@chromium.org9ec8db02009-07-21 07:00:13290#endif // defined(OS_POSIX)
estade@chromium.orgfb7f9be2008-10-22 01:15:47291
jcampan@chromium.org1e312112009-04-21 21:44:12292// Executes the application specified by cl. This function delegates to one
estade@chromium.orgfb7f9be2008-10-22 01:15:47293// of the above two platform-specific functions.
294bool LaunchApp(const CommandLine& cl,
initial.commitd7cae122008-07-26 21:49:38295 bool wait, bool start_hidden, ProcessHandle* process_handle);
296
jcampan@chromium.org1e312112009-04-21 21:44:12297// Executes the application specified by |cl| and wait for it to exit. Stores
phajdan.jr@chromium.org1912cfe2009-04-21 08:09:30298// the output (stdout) in |output|. Redirects stderr to /dev/null. Returns true
299// on success (application launched and exited cleanly, with exit code
maruel@chromium.org96878a212010-06-10 18:26:33300// indicating success).
phajdan.jr@chromium.orgc0b210ee2009-04-17 09:57:52301bool GetAppOutput(const CommandLine& cl, std::string* output);
phajdan.jr@chromium.orgc0b210ee2009-04-17 09:57:52302
viettrungluu@chromium.orgf164cea2009-11-05 23:37:40303#if defined(OS_POSIX)
304// A restricted version of |GetAppOutput()| which (a) clears the environment,
305// and (b) stores at most |max_output| bytes; also, it doesn't search the path
306// for the command.
307bool GetAppOutputRestricted(const CommandLine& cl,
308 std::string* output, size_t max_output);
309#endif
310
initial.commitd7cae122008-07-26 21:49:38311// Used to filter processes by process ID.
312class ProcessFilter {
313 public:
314 // Returns true to indicate set-inclusion and false otherwise. This method
315 // should not have side-effects and should be idempotent.
maruel@chromium.orgb6128aa2010-04-29 17:44:42316 virtual bool Includes(const ProcessEntry& entry) const = 0;
ziadh@chromium.org695092f2010-08-02 16:34:16317
318 protected:
319 virtual ~ProcessFilter() {}
initial.commitd7cae122008-07-26 21:49:38320};
321
322// Returns the number of processes on the machine that are running from the
323// given executable name. If filter is non-null, then only processes selected
324// by the filter will be counted.
avi@chromium.org4f260d02010-12-23 18:35:42325int GetProcessCount(const FilePath::StringType& executable_name,
initial.commitd7cae122008-07-26 21:49:38326 const ProcessFilter* filter);
327
328// Attempts to kill all the processes on the current machine that were launched
329// from the given executable name, ending them with the given exit code. If
330// filter is non-null, then only processes selected by the filter are killed.
rsimha@chromium.org61b93f88f2010-09-22 17:28:30331// Returns true if all processes were able to be killed off, false if at least
initial.commitd7cae122008-07-26 21:49:38332// one couldn't be killed.
avi@chromium.org4f260d02010-12-23 18:35:42333bool KillProcesses(const FilePath::StringType& executable_name, int exit_code,
initial.commitd7cae122008-07-26 21:49:38334 const ProcessFilter* filter);
335
336// Attempts to kill the process identified by the given process
337// entry structure, giving it the specified exit code. If |wait| is true, wait
338// for the process to be actually terminated before returning.
339// Returns true if this is successful, false otherwise.
stoyan@chromium.orgcd4fd152009-02-09 19:28:41340bool KillProcess(ProcessHandle process, int exit_code, bool wait);
rsimha@chromium.org61b93f88f2010-09-22 17:28:30341
342#if defined(OS_POSIX)
343// Attempts to kill the process group identified by |process_group_id|. Returns
344// true on success.
345bool KillProcessGroup(ProcessHandle process_group_id);
346#endif
347
agl@chromium.orgdfe14862009-01-22 01:23:11348#if defined(OS_WIN)
phajdan.jr@chromium.org43cf3252009-04-01 09:19:37349bool KillProcessById(ProcessId process_id, int exit_code, bool wait);
agl@chromium.orgdfe14862009-01-22 01:23:11350#endif
initial.commitd7cae122008-07-26 21:49:38351
gspencer@chromium.org443b80e2010-12-14 00:42:23352// Get the termination status of the process by interpreting the
353// circumstances of the child process' death. |exit_code| is set to
354// the status returned by waitpid() on POSIX, and from
355// GetExitCodeProcess() on Windows. |exit_code| may be NULL if the
356// caller is not interested in it. Note that on Linux, this function
357// will only return a useful result the first time it is called after
358// the child exits (because it will reap the child and the information
359// will no longer be available).
360TerminationStatus GetTerminationStatus(ProcessHandle handle, int* exit_code);
initial.commitd7cae122008-07-26 21:49:38361
phajdan.jr@chromium.orgc7856632009-01-13 17:38:49362// Waits for process to exit. In POSIX systems, if the process hasn't been
363// signaled then puts the exit code in |exit_code|; otherwise it's considered
364// a failure. On Windows |exit_code| is always filled. Returns true on success,
365// and closes |handle| in any case.
366bool WaitForExitCode(ProcessHandle handle, int* exit_code);
367
phajdan.jr@chromium.org8004e682010-03-16 07:41:22368// Waits for process to exit. If it did exit within |timeout_milliseconds|,
369// then puts the exit code in |exit_code|, closes |handle|, and returns true.
370// In POSIX systems, if the process has been signaled then |exit_code| is set
371// to -1. Returns false on failure (the caller is then responsible for closing
372// |handle|).
373bool WaitForExitCodeWithTimeout(ProcessHandle handle, int* exit_code,
374 int64 timeout_milliseconds);
375
initial.commitd7cae122008-07-26 21:49:38376// Wait for all the processes based on the named executable to exit. If filter
377// is non-null, then only processes selected by the filter are waited on.
378// Returns after all processes have exited or wait_milliseconds have expired.
379// Returns true if all the processes exited, false otherwise.
avi@chromium.org4f260d02010-12-23 18:35:42380bool WaitForProcessesToExit(const FilePath::StringType& executable_name,
phajdan.jr@chromium.org743ace42009-06-17 17:23:51381 int64 wait_milliseconds,
initial.commitd7cae122008-07-26 21:49:38382 const ProcessFilter* filter);
383
estade@chromium.orgfb7f9be2008-10-22 01:15:47384// Wait for a single process to exit. Return true if it exited cleanly within
385// the given time limit.
386bool WaitForSingleProcess(ProcessHandle handle,
phajdan.jr@chromium.org743ace42009-06-17 17:23:51387 int64 wait_milliseconds);
estade@chromium.orgfb7f9be2008-10-22 01:15:47388
phajdan.jr@chromium.org076bf0b62009-03-04 20:57:58389// Returns true when |wait_milliseconds| have elapsed and the process
390// is still running.
phajdan.jr@chromium.org743ace42009-06-17 17:23:51391bool CrashAwareSleep(ProcessHandle handle, int64 wait_milliseconds);
phajdan.jr@chromium.org076bf0b62009-03-04 20:57:58392
initial.commitd7cae122008-07-26 21:49:38393// Waits a certain amount of time (can be 0) for all the processes with a given
394// executable name to exit, then kills off any of them that are still around.
395// If filter is non-null, then only processes selected by the filter are waited
396// on. Killed processes are ended with the given exit code. Returns false if
397// any processes needed to be killed, true if they all exited cleanly within
398// the wait_milliseconds delay.
avi@chromium.org4f260d02010-12-23 18:35:42399bool CleanupProcesses(const FilePath::StringType& executable_name,
phajdan.jr@chromium.org743ace42009-06-17 17:23:51400 int64 wait_milliseconds,
initial.commitd7cae122008-07-26 21:49:38401 int exit_code,
402 const ProcessFilter* filter);
403
maruel@chromium.orgb6128aa2010-04-29 17:44:42404// This class provides a way to iterate through a list of processes on the
405// current machine with a specified filter.
406// To use, create an instance and then call NextProcessEntry() until it returns
407// false.
408class ProcessIterator {
initial.commitd7cae122008-07-26 21:49:38409 public:
maruel@chromium.orgbaead4f2010-06-11 19:10:30410 typedef std::list<ProcessEntry> ProcessEntries;
411
maruel@chromium.orgb6128aa2010-04-29 17:44:42412 explicit ProcessIterator(const ProcessFilter* filter);
413 virtual ~ProcessIterator();
initial.commitd7cae122008-07-26 21:49:38414
415 // If there's another process that matches the given executable name,
416 // returns a const pointer to the corresponding PROCESSENTRY32.
417 // If there are no more matching processes, returns NULL.
418 // The returned pointer will remain valid until NextProcessEntry()
419 // is called again or this NamedProcessIterator goes out of scope.
420 const ProcessEntry* NextProcessEntry();
421
maruel@chromium.orgb6128aa2010-04-29 17:44:42422 // Takes a snapshot of all the ProcessEntry found.
maruel@chromium.orgbaead4f2010-06-11 19:10:30423 ProcessEntries Snapshot();
maruel@chromium.orgb6128aa2010-04-29 17:44:42424
425 protected:
426 virtual bool IncludeEntry();
427 const ProcessEntry& entry() { return entry_; }
428
initial.commitd7cae122008-07-26 21:49:38429 private:
430 // Determines whether there's another process (regardless of executable)
431 // left in the list of all processes. Returns true and sets entry_ to
432 // that process's info if there is one, false otherwise.
433 bool CheckForNextProcess();
434
initial.commitd7cae122008-07-26 21:49:38435 // Initializes a PROCESSENTRY32 data structure so that it's ready for
436 // use with Process32First/Process32Next.
437 void InitProcessEntry(ProcessEntry* entry);
dkegel@google.comab0e2222008-10-31 20:19:43438
439#if defined(OS_WIN)
initial.commitd7cae122008-07-26 21:49:38440 HANDLE snapshot_;
initial.commitd7cae122008-07-26 21:49:38441 bool started_iteration_;
dkegel@google.comab0e2222008-10-31 20:19:43442#elif defined(OS_MACOSX)
mark@chromium.org962dd312009-02-05 21:44:13443 std::vector<kinfo_proc> kinfo_procs_;
444 size_t index_of_kinfo_proc_;
wtc@chromium.org4a34ce02009-08-31 22:25:00445#elif defined(OS_POSIX)
446 DIR *procfs_dir_;
dkegel@google.comab0e2222008-10-31 20:19:43447#endif
initial.commitd7cae122008-07-26 21:49:38448 ProcessEntry entry_;
449 const ProcessFilter* filter_;
450
maruel@chromium.orgb6128aa2010-04-29 17:44:42451 DISALLOW_COPY_AND_ASSIGN(ProcessIterator);
452};
453
454// This class provides a way to iterate through the list of processes
455// on the current machine that were started from the given executable
456// name. To use, create an instance and then call NextProcessEntry()
457// until it returns false.
458class NamedProcessIterator : public ProcessIterator {
459 public:
avi@chromium.org4f260d02010-12-23 18:35:42460 NamedProcessIterator(const FilePath::StringType& executable_name,
maruel@chromium.orgb6128aa2010-04-29 17:44:42461 const ProcessFilter* filter);
462 virtual ~NamedProcessIterator();
463
464 protected:
465 virtual bool IncludeEntry();
466
467 private:
avi@chromium.org4f260d02010-12-23 18:35:42468 FilePath::StringType executable_name_;
maruel@chromium.orgb6128aa2010-04-29 17:44:42469
470 DISALLOW_COPY_AND_ASSIGN(NamedProcessIterator);
initial.commitd7cae122008-07-26 21:49:38471};
472
473// Working Set (resident) memory usage broken down by
agl@chromium.org54fd1d32009-09-01 00:12:58474//
475// On Windows:
initial.commitd7cae122008-07-26 21:49:38476// priv (private): These pages (kbytes) cannot be shared with any other process.
477// shareable: These pages (kbytes) can be shared with other processes under
478// the right circumstances.
479// shared : These pages (kbytes) are currently shared with at least one
480// other process.
agl@chromium.org54fd1d32009-09-01 00:12:58481//
482// On Linux:
483// priv: Pages mapped only by this process
484// shared: PSS or 0 if the kernel doesn't support this
485// shareable: 0
viettrungluu@chromium.org3740cb9b52009-12-19 04:50:04486//
487// On OS X: TODO(thakis): Revise.
488// priv: Memory.
489// shared: 0
490// shareable: 0
initial.commitd7cae122008-07-26 21:49:38491struct WorkingSetKBytes {
agl@chromium.org54fd1d32009-09-01 00:12:58492 WorkingSetKBytes() : priv(0), shareable(0), shared(0) {}
initial.commitd7cae122008-07-26 21:49:38493 size_t priv;
494 size_t shareable;
495 size_t shared;
496};
497
498// Committed (resident + paged) memory usage broken down by
499// private: These pages cannot be shared with any other process.
500// mapped: These pages are mapped into the view of a section (backed by
501// pagefile.sys)
502// image: These pages are mapped into the view of an image section (backed by
503// file system)
504struct CommittedKBytes {
agl@chromium.org54fd1d32009-09-01 00:12:58505 CommittedKBytes() : priv(0), mapped(0), image(0) {}
initial.commitd7cae122008-07-26 21:49:38506 size_t priv;
507 size_t mapped;
508 size_t image;
509};
510
511// Free memory (Megabytes marked as free) in the 2G process address space.
512// total : total amount in megabytes marked as free. Maximum value is 2048.
513// largest : size of the largest contiguous amount of memory found. It is
514// always smaller or equal to FreeMBytes::total.
515// largest_ptr: starting address of the largest memory block.
516struct FreeMBytes {
517 size_t total;
518 size_t largest;
519 void* largest_ptr;
520};
521
evan@chromium.orgd2ed23832009-09-19 01:57:39522// Convert a POSIX timeval to microseconds.
523int64 TimeValToMicroseconds(const struct timeval& tv);
524
initial.commitd7cae122008-07-26 21:49:38525// Provides performance metrics for a specified process (CPU usage, memory and
526// IO counters). To use it, invoke CreateProcessMetrics() to get an instance
527// for a specific process, then access the information with the different get
528// methods.
529class ProcessMetrics {
530 public:
erg@google.coma502bbe72011-01-07 18:06:45531 ~ProcessMetrics();
532
initial.commitd7cae122008-07-26 21:49:38533 // Creates a ProcessMetrics for the specified process.
534 // The caller owns the returned object.
viettrungluu@chromium.org3740cb9b52009-12-19 04:50:04535#if !defined(OS_MACOSX)
initial.commitd7cae122008-07-26 21:49:38536 static ProcessMetrics* CreateProcessMetrics(ProcessHandle process);
viettrungluu@chromium.org3740cb9b52009-12-19 04:50:04537#else
538 class PortProvider {
539 public:
thakis@chromium.orgb2e8e082009-12-21 17:44:20540 // Should return the mach task for |process| if possible, or else
541 // |MACH_PORT_NULL|. Only processes that this returns tasks for will have
542 // metrics on OS X (except for the current process, which always gets
543 // metrics).
viettrungluu@chromium.org3740cb9b52009-12-19 04:50:04544 virtual mach_port_t TaskForPid(ProcessHandle process) const = 0;
545 };
546
547 // The port provider needs to outlive the ProcessMetrics object returned by
548 // this function. If NULL is passed as provider, the returned object
549 // only returns valid metrics if |process| is the current process.
550 static ProcessMetrics* CreateProcessMetrics(ProcessHandle process,
551 PortProvider* port_provider);
maruel@chromium.orgb6128aa2010-04-29 17:44:42552#endif // !defined(OS_MACOSX)
initial.commitd7cae122008-07-26 21:49:38553
554 // Returns the current space allocated for the pagefile, in bytes (these pages
thomasvl@chromium.org796da7c2009-06-11 12:45:45555 // may or may not be in memory). On Linux, this returns the total virtual
556 // memory size.
phajdan.jr@chromium.orgd043c2cc2009-03-25 18:30:45557 size_t GetPagefileUsage() const;
initial.commitd7cae122008-07-26 21:49:38558 // Returns the peak space allocated for the pagefile, in bytes.
phajdan.jr@chromium.orgd043c2cc2009-03-25 18:30:45559 size_t GetPeakPagefileUsage() const;
thomasvl@chromium.org796da7c2009-06-11 12:45:45560 // Returns the current working set size, in bytes. On Linux, this returns
561 // the resident set size.
phajdan.jr@chromium.orgd043c2cc2009-03-25 18:30:45562 size_t GetWorkingSetSize() const;
tc@google.com0c557f12009-05-11 23:35:52563 // Returns the peak working set size, in bytes.
564 size_t GetPeakWorkingSetSize() const;
erg@chromium.org98947a02010-05-11 17:46:08565 // Returns private and sharedusage, in bytes. Private bytes is the amount of
566 // memory currently allocated to a process that cannot be shared. Returns
567 // false on platform specific error conditions. Note: |private_bytes|
568 // returns 0 on unsupported OSes: prior to XP SP2.
569 bool GetMemoryBytes(size_t* private_bytes,
570 size_t* shared_bytes);
initial.commitd7cae122008-07-26 21:49:38571 // Fills a CommittedKBytes with both resident and paged
572 // memory usage as per definition of CommittedBytes.
phajdan.jr@chromium.orgd043c2cc2009-03-25 18:30:45573 void GetCommittedKBytes(CommittedKBytes* usage) const;
initial.commitd7cae122008-07-26 21:49:38574 // Fills a WorkingSetKBytes containing resident private and shared memory
575 // usage in bytes, as per definition of WorkingSetBytes.
phajdan.jr@chromium.orgd043c2cc2009-03-25 18:30:45576 bool GetWorkingSetKBytes(WorkingSetKBytes* ws_usage) const;
initial.commitd7cae122008-07-26 21:49:38577
578 // Computes the current process available memory for allocation.
579 // It does a linear scan of the address space querying each memory region
580 // for its free (unallocated) status. It is useful for estimating the memory
581 // load and fragmentation.
phajdan.jr@chromium.orgd043c2cc2009-03-25 18:30:45582 bool CalculateFreeMemory(FreeMBytes* free) const;
initial.commitd7cae122008-07-26 21:49:38583
584 // Returns the CPU usage in percent since the last time this method was
585 // called. The first time this method is called it returns 0 and will return
586 // the actual CPU info on subsequent calls.
thakis@chromium.org022eab62010-01-13 04:55:06587 // On Windows, the CPU usage value is for all CPUs. So if you have 2 CPUs and
588 // your process is using all the cycles of 1 CPU and not the other CPU, this
589 // method returns 50.
590 double GetCPUUsage();
initial.commitd7cae122008-07-26 21:49:38591
592 // Retrieves accounting information for all I/O operations performed by the
593 // process.
594 // If IO information is retrieved successfully, the function returns true
595 // and fills in the IO_COUNTERS passed in. The function returns false
596 // otherwise.
phajdan.jr@chromium.orgd043c2cc2009-03-25 18:30:45597 bool GetIOCounters(IoCounters* io_counters) const;
initial.commitd7cae122008-07-26 21:49:38598
599 private:
viettrungluu@chromium.org3740cb9b52009-12-19 04:50:04600#if !defined(OS_MACOSX)
initial.commitd7cae122008-07-26 21:49:38601 explicit ProcessMetrics(ProcessHandle process);
viettrungluu@chromium.org3740cb9b52009-12-19 04:50:04602#else
603 ProcessMetrics(ProcessHandle process, PortProvider* port_provider);
maruel@chromium.orgb6128aa2010-04-29 17:44:42604#endif // !defined(OS_MACOSX)
initial.commitd7cae122008-07-26 21:49:38605
606 ProcessHandle process_;
607
608 int processor_count_;
609
evan@chromium.orgd2ed23832009-09-19 01:57:39610 // Used to store the previous times and CPU usage counts so we can
611 // compute the CPU usage between calls.
initial.commitd7cae122008-07-26 21:49:38612 int64 last_time_;
613 int64 last_system_time_;
614
viettrungluu@chromium.org3740cb9b52009-12-19 04:50:04615#if defined(OS_MACOSX)
616 // Queries the port provider if it's set.
617 mach_port_t TaskForPid(ProcessHandle process) const;
618
619 PortProvider* port_provider_;
pvalchev@google.com66700d42010-03-10 07:46:43620#elif defined(OS_POSIX)
621 // Jiffie count at the last_time_ we updated.
622 int last_cpu_;
maruel@chromium.orgb6128aa2010-04-29 17:44:42623#endif // defined(OS_MACOSX)
viettrungluu@chromium.org3740cb9b52009-12-19 04:50:04624
maruel@chromium.orgb6128aa2010-04-29 17:44:42625 DISALLOW_COPY_AND_ASSIGN(ProcessMetrics);
initial.commitd7cae122008-07-26 21:49:38626};
627
sgk@chromium.orged26d942009-11-09 06:57:28628// Returns the memory commited by the system in KBytes.
629// Returns 0 if it can't compute the commit charge.
630size_t GetSystemCommitCharge();
631
initial.commitd7cae122008-07-26 21:49:38632// Enables low fragmentation heap (LFH) for every heaps of this process. This
633// won't have any effect on heaps created after this function call. It will not
634// modify data allocated in the heaps before calling this function. So it is
635// better to call this function early in initialization and again before
636// entering the main loop.
637// Note: Returns true on Windows 2000 without doing anything.
638bool EnableLowFragmentationHeap();
639
maruel@chromium.orgd6fc9fd2009-10-27 18:03:47640// Enables 'terminate on heap corruption' flag. Helps protect against heap
maruel@google.comc9d40872008-09-24 12:58:37641// overflow. Has no effect if the OS doesn't provide the necessary facility.
642void EnableTerminationOnHeapCorruption();
643
avi@chromium.orgcccb21212009-11-12 20:39:56644#if !defined(OS_WIN)
645// Turns on process termination if memory runs out. This is handled on Windows
646// inside RegisterInvalidParamHandler().
647void EnableTerminationOnOutOfMemory();
avi@chromium.org6cfa3392010-07-01 20:11:43648#if defined(OS_MACOSX)
649// Exposed for testing.
650malloc_zone_t* GetPurgeableZone();
651#endif
avi@chromium.orgcccb21212009-11-12 20:39:56652#endif
653
maruel@chromium.orgd6fc9fd2009-10-27 18:03:47654#if defined(UNIT_TEST)
655// Enables stack dump to console output on exception and signals.
656// When enabled, the process will quit immediately. This is meant to be used in
657// unit_tests only!
658bool EnableInProcessStackDumping();
659#endif // defined(UNIT_TEST)
660
deanm@google.comdb717282008-08-27 13:48:03661// If supported on the platform, and the user has sufficent rights, increase
662// the current process's scheduling priority to a high priority.
663void RaiseProcessToHighPriority();
664
mark@chromium.orge9a8c19f2009-09-03 21:27:36665#if defined(OS_MACOSX)
666// Restore the default exception handler, setting it to Apple Crash Reporter
667// (ReportCrash). When forking and execing a new process, the child will
668// inherit the parent's exception ports, which may be set to the Breakpad
669// instance running inside the parent. The parent's Breakpad instance should
670// not handle the child's exceptions. Calling RestoreDefaultExceptionHandler
671// in the child after forking will restore the standard exception handler.
672// See http://crbug.com/20371/ for more details.
673void RestoreDefaultExceptionHandler();
maruel@chromium.orgb6128aa2010-04-29 17:44:42674#endif // defined(OS_MACOSX)
mark@chromium.orge9a8c19f2009-09-03 21:27:36675
brettw@google.com176aa482008-11-14 03:25:15676} // namespace base
initial.commitd7cae122008-07-26 21:49:38677
deanm@google.comdb717282008-08-27 13:48:03678#endif // BASE_PROCESS_UTIL_H_