forked from git-for-windows/git
-
Notifications
You must be signed in to change notification settings - Fork 97
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
trace2: collect Windows-specific process information
Add platform-specific interface to log information about the current process. On Windows, this interface is used to indicate whether the git process is running under a debugger and list names of the process ancestors. Information for other platforms is left for a future effort. Signed-off-by: Jeff Hostetler <[email protected]> Signed-off-by: Junio C Hamano <[email protected]>
- Loading branch information
1 parent
2a4785a
commit df00b65
Showing
4 changed files
with
136 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,119 @@ | ||
#include "../../cache.h" | ||
#include "../../json-writer.h" | ||
#include <Psapi.h> | ||
#include <tlHelp32.h> | ||
|
||
#define NR_PIDS_LIMIT 42 | ||
|
||
/* | ||
* Find the process data for the given PID in the given snapshot | ||
* and update the PROCESSENTRY32 data. | ||
*/ | ||
static int find_pid(DWORD pid, HANDLE hSnapshot, PROCESSENTRY32 *pe32) | ||
{ | ||
pe32->dwSize = sizeof(PROCESSENTRY32); | ||
|
||
if (Process32First(hSnapshot, pe32)) { | ||
do { | ||
if (pe32->th32ProcessID == pid) | ||
return 1; | ||
} while (Process32Next(hSnapshot, pe32)); | ||
} | ||
return 0; | ||
} | ||
|
||
/* | ||
* Accumulate JSON array of our parent processes: | ||
* [ | ||
* exe-name-parent, | ||
* exe-name-grand-parent, | ||
* ... | ||
* ] | ||
* | ||
* We artificially limit this to NR_PIDS_LIMIT to quickly guard against cycles | ||
* in the parent PIDs without a lot of fuss and because we just want some | ||
* context and don't need an absolute answer. | ||
* | ||
* Note: we only report the filename of the process executable; the | ||
* only way to get its full pathname is to use OpenProcess() | ||
* and GetModuleFileNameEx() or QueryfullProcessImageName() | ||
* and that seems rather expensive (on top of the cost of | ||
* getting the snapshot). | ||
*/ | ||
static void get_processes(struct json_writer *jw, HANDLE hSnapshot) | ||
{ | ||
PROCESSENTRY32 pe32; | ||
DWORD pid; | ||
DWORD pid_list[NR_PIDS_LIMIT]; | ||
int k, nr_pids = 0; | ||
|
||
pid = GetCurrentProcessId(); | ||
while (find_pid(pid, hSnapshot, &pe32)) { | ||
/* Only report parents. Omit self from the JSON output. */ | ||
if (nr_pids) | ||
jw_array_string(jw, pe32.szExeFile); | ||
|
||
/* Check for cycle in snapshot. (Yes, it happened.) */ | ||
for (k = 0; k < nr_pids; k++) | ||
if (pid == pid_list[k]) { | ||
jw_array_string(jw, "(cycle)"); | ||
return; | ||
} | ||
|
||
if (nr_pids == NR_PIDS_LIMIT) { | ||
jw_array_string(jw, "(truncated)"); | ||
return; | ||
} | ||
|
||
pid_list[nr_pids++] = pid; | ||
|
||
pid = pe32.th32ParentProcessID; | ||
} | ||
} | ||
|
||
/* | ||
* Emit JSON data for the current and parent processes. Individual | ||
* trace2 targets can decide how to actually print it. | ||
*/ | ||
static void get_ancestry(void) | ||
{ | ||
HANDLE hSnapshot = CreateToolhelp32Snapshot(TH32CS_SNAPPROCESS, 0); | ||
|
||
if (hSnapshot != INVALID_HANDLE_VALUE) { | ||
struct json_writer jw = JSON_WRITER_INIT; | ||
|
||
jw_array_begin(&jw, 0); | ||
get_processes(&jw, hSnapshot); | ||
jw_end(&jw); | ||
|
||
trace2_data_json("process", the_repository, "windows/ancestry", | ||
&jw); | ||
|
||
jw_release(&jw); | ||
CloseHandle(hSnapshot); | ||
} | ||
} | ||
|
||
/* | ||
* Is a debugger attached to the current process? | ||
* | ||
* This will catch debug runs (where the debugger started the process). | ||
* This is the normal case. Since this code is called during our startup, | ||
* it will not report instances where a debugger is attached dynamically | ||
* to a running git process, but that is relatively rare. | ||
*/ | ||
static void get_is_being_debugged(void) | ||
{ | ||
if (IsDebuggerPresent()) | ||
trace2_data_intmax("process", the_repository, | ||
"windows/debugger_present", 1); | ||
} | ||
|
||
void trace2_collect_process_info(void) | ||
{ | ||
if (!trace2_is_enabled()) | ||
return; | ||
|
||
get_is_being_debugged(); | ||
get_ancestry(); | ||
} |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters