2010-05-27 21:18:32 -06:00
|
|
|
/*
|
|
|
|
www.sourceforge.net/projects/dfhack
|
|
|
|
Copyright (c) 2009 Petr Mrázek (peterix), Kenneth Ferland (Impaler[WrG]), dorf
|
|
|
|
|
|
|
|
This software is provided 'as-is', without any express or implied
|
|
|
|
warranty. In no event will the authors be held liable for any
|
|
|
|
damages arising from the use of this software.
|
|
|
|
|
|
|
|
Permission is granted to anyone to use this software for any
|
|
|
|
purpose, including commercial applications, and to alter it and
|
|
|
|
redistribute it freely, subject to the following restrictions:
|
|
|
|
|
|
|
|
1. The origin of this software must not be misrepresented; you must
|
|
|
|
not claim that you wrote the original software. If you use this
|
|
|
|
software in a product, an acknowledgment in the product documentation
|
|
|
|
would be appreciated but is not required.
|
|
|
|
|
|
|
|
2. Altered source versions must be plainly marked as such, and
|
|
|
|
must not be misrepresented as being the original software.
|
|
|
|
|
|
|
|
3. This notice may not be removed or altered from any source
|
|
|
|
distribution.
|
|
|
|
*/
|
|
|
|
|
|
|
|
#include "Internal.h"
|
2011-02-23 04:08:30 -07:00
|
|
|
#include "ProcessFactory.h"
|
2010-05-29 21:13:59 -06:00
|
|
|
|
2010-08-27 19:57:56 -06:00
|
|
|
#include "dfhack/VersionInfoFactory.h"
|
2010-05-27 21:18:32 -06:00
|
|
|
#include "dfhack/DFProcessEnumerator.h"
|
2010-08-20 06:10:05 -06:00
|
|
|
#include "dfhack/VersionInfo.h"
|
2010-05-29 21:13:59 -06:00
|
|
|
|
2010-05-27 21:18:32 -06:00
|
|
|
|
|
|
|
using namespace DFHack;
|
|
|
|
|
|
|
|
typedef std::vector<Process *> PROC_V;
|
|
|
|
typedef std::map<ProcessID, Process*> PID2PROC;
|
|
|
|
|
|
|
|
class DFHack::ProcessEnumerator::Private
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
Private(){};
|
2010-08-20 06:10:05 -06:00
|
|
|
VersionInfoFactory *meminfo;
|
2010-05-27 21:18:32 -06:00
|
|
|
PROC_V Processes;
|
|
|
|
PID2PROC ProcMap;
|
|
|
|
Process *GetProcessObject(ProcessID ID);
|
|
|
|
void EnumPIDs (vector <ProcessID> &PIDs);
|
|
|
|
};
|
|
|
|
|
2010-05-29 13:34:36 -06:00
|
|
|
class DFHack::BadProcesses::Private
|
|
|
|
{
|
|
|
|
public:
|
|
|
|
Private(){};
|
|
|
|
PROC_V bad;
|
|
|
|
};
|
|
|
|
|
|
|
|
BadProcesses::BadProcesses():d(new Private()){}
|
|
|
|
|
|
|
|
BadProcesses::~BadProcesses()
|
|
|
|
{
|
|
|
|
clear();
|
|
|
|
delete d;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool BadProcesses::Contains(Process* p)
|
|
|
|
{
|
2010-11-17 12:50:50 -07:00
|
|
|
for(unsigned int i = 0; i < d->bad.size(); i++)
|
2010-05-29 13:34:36 -06:00
|
|
|
{
|
|
|
|
if(d->bad[i] == p)
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
bool BadProcesses::excise(Process* p)
|
|
|
|
{
|
|
|
|
vector<Process*>::iterator it = d->bad.begin();
|
|
|
|
while(it != d->bad.end())
|
|
|
|
{
|
|
|
|
if((*it) == p)
|
|
|
|
{
|
|
|
|
d->bad.erase(it);
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
it++;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t BadProcesses::size()
|
|
|
|
{
|
|
|
|
return d->bad.size();
|
|
|
|
}
|
|
|
|
|
|
|
|
void BadProcesses::clear()
|
|
|
|
{
|
2010-11-17 12:50:50 -07:00
|
|
|
for(unsigned int i = 0; i < d->bad.size(); i++)
|
2010-05-29 13:34:36 -06:00
|
|
|
{
|
|
|
|
delete d->bad[i];
|
|
|
|
}
|
|
|
|
d->bad.clear();
|
|
|
|
}
|
|
|
|
|
|
|
|
void BadProcesses::push_back(Process* p)
|
|
|
|
{
|
|
|
|
if(p)
|
|
|
|
d->bad.push_back(p);
|
|
|
|
}
|
|
|
|
|
|
|
|
Process * BadProcesses::operator[](uint32_t index)
|
|
|
|
{
|
|
|
|
if(index < d->bad.size())
|
|
|
|
return d->bad[index];
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2010-05-27 21:18:32 -06:00
|
|
|
//FIXME: wasteful
|
|
|
|
Process *ProcessEnumerator::Private::GetProcessObject(ProcessID ID)
|
|
|
|
{
|
2010-08-20 06:10:05 -06:00
|
|
|
|
2011-02-24 03:43:33 -07:00
|
|
|
Process *p1 = createSHMProcess(ID.pid, meminfo);
|
2010-05-27 21:18:32 -06:00
|
|
|
if(p1->isIdentified())
|
|
|
|
return p1;
|
|
|
|
else
|
|
|
|
delete p1;
|
2010-08-20 06:10:05 -06:00
|
|
|
|
2011-02-24 03:43:33 -07:00
|
|
|
Process *p2 = createNormalProcess(ID.pid, meminfo);
|
2010-05-27 21:18:32 -06:00
|
|
|
if(p2->isIdentified())
|
|
|
|
return p2;
|
|
|
|
else
|
|
|
|
delete p2;
|
2010-05-29 13:34:36 -06:00
|
|
|
#ifdef LINUX_BUILD
|
2011-02-24 03:43:33 -07:00
|
|
|
Process *p3 = createWineProcess(ID.pid, meminfo);
|
2010-05-27 21:18:32 -06:00
|
|
|
if(p3->isIdentified())
|
|
|
|
return p3;
|
|
|
|
else
|
|
|
|
delete p3;
|
2010-05-29 13:34:36 -06:00
|
|
|
#endif
|
2010-06-03 19:05:38 -06:00
|
|
|
return 0;
|
2010-05-27 21:18:32 -06:00
|
|
|
}
|
|
|
|
|
2010-05-29 13:34:36 -06:00
|
|
|
#ifdef LINUX_BUILD
|
2010-05-27 21:18:32 -06:00
|
|
|
void ProcessEnumerator::Private::EnumPIDs (vector <ProcessID> &PIDs)
|
|
|
|
{
|
|
|
|
DIR *dir_p;
|
|
|
|
struct dirent *dir_entry_p;
|
|
|
|
struct stat st;
|
|
|
|
char fullname[512];
|
|
|
|
fullname[0] = 0;
|
|
|
|
PIDs.clear(); // make sure the vector is clear
|
|
|
|
|
|
|
|
// Open /proc/ directory
|
|
|
|
dir_p = opendir("/proc/");
|
|
|
|
// Reading /proc/ entries
|
|
|
|
while(NULL != (dir_entry_p = readdir(dir_p)))
|
|
|
|
{
|
|
|
|
// Only PID folders (numbers)
|
|
|
|
if (strspn(dir_entry_p->d_name, "0123456789") != strlen(dir_entry_p->d_name))
|
|
|
|
{
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
sprintf(fullname, "/proc/%s", dir_entry_p->d_name);
|
|
|
|
int ierr = stat (fullname, &st);
|
|
|
|
if (ierr != 0)
|
|
|
|
{
|
|
|
|
printf("Cannot stat %s: ierr= %d\n", fullname, ierr);
|
|
|
|
continue;
|
|
|
|
}
|
|
|
|
uint64_t Pnum = atoi(dir_entry_p->d_name);
|
|
|
|
uint64_t ctime = st.st_ctime;
|
|
|
|
PIDs.push_back(ProcessID(ctime,Pnum));
|
|
|
|
}
|
|
|
|
closedir(dir_p);
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
|
|
|
#ifndef LINUX_BUILD
|
|
|
|
// some magic - will come in handy when we start doing debugger stuff on Windows
|
|
|
|
bool EnableDebugPriv()
|
|
|
|
{
|
|
|
|
bool bRET = FALSE;
|
|
|
|
TOKEN_PRIVILEGES tp;
|
|
|
|
HANDLE hToken;
|
|
|
|
|
|
|
|
if (LookupPrivilegeValue(NULL, SE_DEBUG_NAME, &tp.Privileges[0].Luid))
|
|
|
|
{
|
|
|
|
if (OpenProcessToken(GetCurrentProcess(), TOKEN_ADJUST_PRIVILEGES, &hToken))
|
|
|
|
{
|
|
|
|
if (hToken != INVALID_HANDLE_VALUE)
|
|
|
|
{
|
|
|
|
tp.Privileges[0].Attributes = SE_PRIVILEGE_ENABLED;
|
|
|
|
tp.PrivilegeCount = 1;
|
|
|
|
if (AdjustTokenPrivileges(hToken, FALSE, &tp, 0, 0, 0))
|
|
|
|
{
|
|
|
|
bRET = TRUE;
|
|
|
|
}
|
|
|
|
CloseHandle(hToken);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
return bRET;
|
|
|
|
}
|
|
|
|
|
2010-06-11 11:53:28 -06:00
|
|
|
typedef union
|
|
|
|
{
|
|
|
|
struct
|
|
|
|
{
|
|
|
|
uint32_t LowDword;
|
|
|
|
uint32_t HighDword;
|
|
|
|
};
|
|
|
|
uint64_t Quad;
|
|
|
|
} TWO_DWORDS;
|
|
|
|
|
2010-05-27 21:18:32 -06:00
|
|
|
// Convert Windows FileTime structs to POSIX timestamp
|
|
|
|
// from http://frenk.wordpress.com/2009/12/14/convert-filetime-to-unix-timestamp/
|
|
|
|
uint64_t FileTime_to_POSIX(FILETIME ft)
|
|
|
|
{
|
|
|
|
// takes the last modified date
|
2010-06-11 11:53:28 -06:00
|
|
|
TWO_DWORDS date, adjust;
|
|
|
|
date.HighDword = ft.dwHighDateTime;
|
|
|
|
date.LowDword = ft.dwLowDateTime;
|
2010-05-27 21:18:32 -06:00
|
|
|
|
|
|
|
// 100-nanoseconds = milliseconds * 10000
|
2010-06-11 12:13:37 -06:00
|
|
|
adjust.Quad = 11644473600000LL * 10000LL;
|
2010-05-27 21:18:32 -06:00
|
|
|
|
|
|
|
// removes the diff between 1970 and 1601
|
2010-06-11 11:53:28 -06:00
|
|
|
date.Quad -= adjust.Quad;
|
2010-05-27 21:18:32 -06:00
|
|
|
|
|
|
|
// converts back from 100-nanoseconds to seconds
|
2010-06-11 12:13:37 -06:00
|
|
|
return date.Quad / 10000000LL;
|
2010-05-27 21:18:32 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
void ProcessEnumerator::Private::EnumPIDs (vector <ProcessID> &PIDs)
|
|
|
|
{
|
|
|
|
FILETIME ftCreate, ftExit, ftKernel, ftUser;
|
2010-05-29 21:13:59 -06:00
|
|
|
|
2010-05-27 21:18:32 -06:00
|
|
|
PIDs.clear(); // make sure the vector is clear
|
|
|
|
|
|
|
|
// Get the list of process identifiers.
|
|
|
|
DWORD ProcArray[2048], memoryNeeded, numProccesses;
|
|
|
|
//EnableDebugPriv();
|
|
|
|
if ( !EnumProcesses( ProcArray, sizeof(ProcArray), &memoryNeeded ) )
|
|
|
|
{
|
|
|
|
cout << "EnumProcesses fail'd" << endl;
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
// Calculate how many process identifiers were returned.
|
|
|
|
numProccesses = memoryNeeded / sizeof(DWORD);
|
|
|
|
EnableDebugPriv();
|
|
|
|
// iterate through processes
|
|
|
|
for ( int i = 0; i < (int)numProccesses; i++ )
|
|
|
|
{
|
|
|
|
HANDLE proc = OpenProcess (PROCESS_QUERY_INFORMATION, false, ProcArray[i]);
|
|
|
|
if(!proc)
|
|
|
|
continue;
|
|
|
|
if(GetProcessTimes(proc, &ftCreate, &ftExit, &ftKernel, &ftUser))
|
|
|
|
{
|
|
|
|
uint64_t ctime = FileTime_to_POSIX(ftCreate);
|
|
|
|
uint64_t Pnum = ProcArray[i];
|
|
|
|
PIDs.push_back(ProcessID(ctime,Pnum));
|
|
|
|
}
|
|
|
|
CloseHandle(proc);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
#endif
|
|
|
|
|
2010-05-29 21:13:59 -06:00
|
|
|
bool ProcessEnumerator::Refresh( BadProcesses* invalidated_processes )
|
2010-05-27 21:18:32 -06:00
|
|
|
{
|
|
|
|
// PIDs to process
|
|
|
|
vector <ProcessID> PIDs;
|
|
|
|
// this will be the new process map
|
|
|
|
PID2PROC temporary;
|
2010-05-29 13:34:36 -06:00
|
|
|
// clear the vector
|
2010-05-27 21:18:32 -06:00
|
|
|
d->Processes.clear();
|
|
|
|
if(invalidated_processes)
|
|
|
|
invalidated_processes->clear();
|
2010-05-29 13:34:36 -06:00
|
|
|
|
2010-05-27 21:18:32 -06:00
|
|
|
d->EnumPIDs(PIDs);
|
2010-05-29 13:34:36 -06:00
|
|
|
|
2010-05-27 21:18:32 -06:00
|
|
|
for(uint64_t i = 0; i < PIDs.size();i++)
|
|
|
|
{
|
|
|
|
ProcessID & PID = PIDs[i];
|
|
|
|
// check if we know about the OS process already
|
|
|
|
PID2PROC::iterator found= d->ProcMap.find(PID);
|
|
|
|
if( found != d->ProcMap.end())
|
|
|
|
{
|
|
|
|
// we do
|
|
|
|
// check if it does have a DFHack Process object associated with it
|
|
|
|
Process * p = (*found).second;
|
|
|
|
if(p)
|
|
|
|
{
|
|
|
|
// add it back to the vector we export
|
|
|
|
d->Processes.push_back(p);
|
|
|
|
}
|
|
|
|
// remove the OS Process from ProcMap
|
|
|
|
d->ProcMap.erase(found);
|
|
|
|
// add the OS Process to what will be the new ProcMap
|
|
|
|
temporary[PID] = p;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
// an OS process we don't know yet!
|
|
|
|
// try to make a DFHack Process object for it
|
|
|
|
if(Process*p = d->GetProcessObject(PID))
|
|
|
|
{
|
|
|
|
// allright. this is something that can be used
|
|
|
|
d->Processes.push_back(p);
|
|
|
|
temporary[PID] = p;
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
// just a process. we track it anyway. Why not.
|
|
|
|
temporary[PID] = 0;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
// now the vector we export is filled again and a temporary map with valid processes is created.
|
|
|
|
// we iterate over the old Process map and destroy all the processes that are dead.
|
|
|
|
for(PID2PROC::const_iterator idx = d->ProcMap.begin(); idx != d->ProcMap.end();++idx)
|
|
|
|
{
|
|
|
|
Process * p = (*idx).second;
|
|
|
|
if(p)
|
|
|
|
{
|
|
|
|
if(invalidated_processes)
|
|
|
|
{
|
|
|
|
invalidated_processes->push_back(p);
|
|
|
|
}
|
|
|
|
else
|
|
|
|
{
|
|
|
|
delete p;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
d->ProcMap.swap(temporary);
|
|
|
|
// return value depends on if we found some DF processes
|
|
|
|
if(d->Processes.size())
|
|
|
|
{
|
|
|
|
return true;
|
|
|
|
}
|
|
|
|
return false;
|
|
|
|
}
|
|
|
|
|
|
|
|
uint32_t ProcessEnumerator::size()
|
|
|
|
{
|
|
|
|
return d->Processes.size();
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
Process * ProcessEnumerator::operator[](uint32_t index)
|
|
|
|
{
|
|
|
|
assert(index < d->Processes.size());
|
|
|
|
return d->Processes[index];
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
ProcessEnumerator::ProcessEnumerator( string path_to_xml )
|
|
|
|
: d(new Private())
|
|
|
|
{
|
2010-08-20 06:10:05 -06:00
|
|
|
d->meminfo = new VersionInfoFactory(path_to_xml);
|
2010-05-27 21:18:32 -06:00
|
|
|
}
|
|
|
|
|
|
|
|
void ProcessEnumerator::purge()
|
|
|
|
{
|
|
|
|
for(uint32_t i = 0;i < d->Processes.size();i++)
|
|
|
|
{
|
|
|
|
delete d->Processes[i];
|
|
|
|
}
|
|
|
|
d->ProcMap.clear();
|
|
|
|
d->Processes.clear();
|
|
|
|
}
|
|
|
|
|
|
|
|
ProcessEnumerator::~ProcessEnumerator()
|
|
|
|
{
|
|
|
|
// delete all processes
|
|
|
|
purge();
|
|
|
|
delete d->meminfo;
|
|
|
|
delete d;
|
|
|
|
}
|