process_metric.cc 5.1 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172
  1. // Copyright (c) 2019 GitHub, Inc.
  2. // Use of this source code is governed by the MIT license that can be
  3. // found in the LICENSE file.
  4. #include "shell/browser/api/process_metric.h"
  5. #include <memory>
  6. #include <utility>
  7. #include "third_party/abseil-cpp/absl/types/optional.h"
  8. #if BUILDFLAG(IS_WIN)
  9. #include <windows.h>
  10. #include <psapi.h>
  11. #include "base/win/win_util.h"
  12. #endif
  13. #if BUILDFLAG(IS_MAC)
  14. #include <mach/mach.h>
  15. #include "base/process/port_provider_mac.h"
  16. #include "content/public/browser/browser_child_process_host.h"
  17. extern "C" int sandbox_check(pid_t pid, const char* operation, int type, ...);
  18. namespace {
  19. mach_port_t TaskForPid(pid_t pid) {
  20. mach_port_t task = MACH_PORT_NULL;
  21. if (auto* port_provider = content::BrowserChildProcessHost::GetPortProvider())
  22. task = port_provider->TaskForPid(pid);
  23. if (task == MACH_PORT_NULL && pid == getpid())
  24. task = mach_task_self();
  25. return task;
  26. }
  27. absl::optional<mach_task_basic_info_data_t> GetTaskInfo(mach_port_t task) {
  28. if (task == MACH_PORT_NULL)
  29. return absl::nullopt;
  30. mach_task_basic_info_data_t info = {};
  31. mach_msg_type_number_t count = MACH_TASK_BASIC_INFO_COUNT;
  32. kern_return_t kr = task_info(task, MACH_TASK_BASIC_INFO,
  33. reinterpret_cast<task_info_t>(&info), &count);
  34. return (kr == KERN_SUCCESS) ? absl::make_optional(info) : absl::nullopt;
  35. }
  36. } // namespace
  37. #endif // BUILDFLAG(IS_MAC)
  38. namespace electron {
  39. ProcessMetric::ProcessMetric(int type,
  40. base::ProcessHandle handle,
  41. std::unique_ptr<base::ProcessMetrics> metrics,
  42. const std::string& service_name,
  43. const std::string& name) {
  44. this->type = type;
  45. this->metrics = std::move(metrics);
  46. this->service_name = service_name;
  47. this->name = name;
  48. #if BUILDFLAG(IS_WIN)
  49. HANDLE duplicate_handle = INVALID_HANDLE_VALUE;
  50. ::DuplicateHandle(::GetCurrentProcess(), handle, ::GetCurrentProcess(),
  51. &duplicate_handle, 0, false, DUPLICATE_SAME_ACCESS);
  52. this->process = base::Process(duplicate_handle);
  53. #else
  54. this->process = base::Process(handle);
  55. #endif
  56. }
  57. ProcessMetric::~ProcessMetric() = default;
  58. #if BUILDFLAG(IS_WIN)
  59. ProcessMemoryInfo ProcessMetric::GetMemoryInfo() const {
  60. ProcessMemoryInfo result;
  61. PROCESS_MEMORY_COUNTERS_EX info = {};
  62. if (::GetProcessMemoryInfo(process.Handle(),
  63. reinterpret_cast<PROCESS_MEMORY_COUNTERS*>(&info),
  64. sizeof(info))) {
  65. result.working_set_size = info.WorkingSetSize;
  66. result.peak_working_set_size = info.PeakWorkingSetSize;
  67. result.private_bytes = info.PrivateUsage;
  68. }
  69. return result;
  70. }
  71. ProcessIntegrityLevel ProcessMetric::GetIntegrityLevel() const {
  72. HANDLE token = nullptr;
  73. if (!::OpenProcessToken(process.Handle(), TOKEN_QUERY, &token)) {
  74. return ProcessIntegrityLevel::kUnknown;
  75. }
  76. base::win::ScopedHandle token_scoped(token);
  77. DWORD token_info_length = 0;
  78. if (::GetTokenInformation(token, TokenIntegrityLevel, nullptr, 0,
  79. &token_info_length) ||
  80. ::GetLastError() != ERROR_INSUFFICIENT_BUFFER) {
  81. return ProcessIntegrityLevel::kUnknown;
  82. }
  83. auto token_label_bytes = std::make_unique<char[]>(token_info_length);
  84. auto* token_label =
  85. reinterpret_cast<TOKEN_MANDATORY_LABEL*>(token_label_bytes.get());
  86. if (!::GetTokenInformation(token, TokenIntegrityLevel, token_label,
  87. token_info_length, &token_info_length)) {
  88. return ProcessIntegrityLevel::kUnknown;
  89. }
  90. DWORD integrity_level = *::GetSidSubAuthority(
  91. token_label->Label.Sid,
  92. static_cast<DWORD>(*::GetSidSubAuthorityCount(token_label->Label.Sid) -
  93. 1));
  94. if (integrity_level >= SECURITY_MANDATORY_UNTRUSTED_RID &&
  95. integrity_level < SECURITY_MANDATORY_LOW_RID) {
  96. return ProcessIntegrityLevel::kUntrusted;
  97. }
  98. if (integrity_level >= SECURITY_MANDATORY_LOW_RID &&
  99. integrity_level < SECURITY_MANDATORY_MEDIUM_RID) {
  100. return ProcessIntegrityLevel::kLow;
  101. }
  102. if (integrity_level >= SECURITY_MANDATORY_MEDIUM_RID &&
  103. integrity_level < SECURITY_MANDATORY_HIGH_RID) {
  104. return ProcessIntegrityLevel::kMedium;
  105. }
  106. if (integrity_level >= SECURITY_MANDATORY_HIGH_RID &&
  107. integrity_level < SECURITY_MANDATORY_SYSTEM_RID) {
  108. return ProcessIntegrityLevel::kHigh;
  109. }
  110. return ProcessIntegrityLevel::kUnknown;
  111. }
  112. // static
  113. bool ProcessMetric::IsSandboxed(ProcessIntegrityLevel integrity_level) {
  114. return integrity_level > ProcessIntegrityLevel::kUnknown &&
  115. integrity_level < ProcessIntegrityLevel::kMedium;
  116. }
  117. #elif BUILDFLAG(IS_MAC)
  118. ProcessMemoryInfo ProcessMetric::GetMemoryInfo() const {
  119. ProcessMemoryInfo result;
  120. if (auto info = GetTaskInfo(TaskForPid(process.Pid()))) {
  121. result.working_set_size = info->resident_size;
  122. result.peak_working_set_size = info->resident_size_max;
  123. }
  124. return result;
  125. }
  126. bool ProcessMetric::IsSandboxed() const {
  127. #if IS_MAS_BUILD()
  128. return true;
  129. #else
  130. return sandbox_check(process.Pid(), nullptr, 0) != 0;
  131. #endif
  132. }
  133. #endif // BUILDFLAG(IS_MAC)
  134. } // namespace electron