Skip direct map from apk check for Samsung Mega.
[chromium-blink-merge.git] / sandbox / linux / services / proc_util.cc
blobfd0e34826e787c58ea07ed2aa98044bd95002908
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
5 #include "sandbox/linux/services/proc_util.h"
7 #include <dirent.h>
8 #include <errno.h>
9 #include <fcntl.h>
10 #include <string.h>
11 #include <sys/stat.h>
12 #include <sys/types.h>
14 #include "base/logging.h"
15 #include "base/memory/scoped_ptr.h"
16 #include "base/strings/string_number_conversions.h"
18 namespace sandbox {
19 namespace {
21 struct DIRCloser {
22 void operator()(DIR* d) const {
23 DCHECK(d);
24 PCHECK(0 == closedir(d));
28 typedef scoped_ptr<DIR, DIRCloser> ScopedDIR;
30 } // namespace
32 int ProcUtil::CountOpenFds(int proc_fd) {
33 DCHECK_LE(0, proc_fd);
34 int proc_self_fd = openat(proc_fd, "self/fd", O_DIRECTORY | O_RDONLY);
35 PCHECK(0 <= proc_self_fd);
37 // Ownership of proc_self_fd is transferred here, it must not be closed
38 // or modified afterwards except via dir.
39 ScopedDIR dir(fdopendir(proc_self_fd));
40 CHECK(dir);
42 int count = 0;
43 struct dirent e;
44 struct dirent* de;
45 while (!readdir_r(dir.get(), &e, &de) && de) {
46 if (strcmp(e.d_name, ".") == 0 || strcmp(e.d_name, "..") == 0) {
47 continue;
50 int fd_num;
51 CHECK(base::StringToInt(e.d_name, &fd_num));
52 if (fd_num == proc_fd || fd_num == proc_self_fd) {
53 continue;
56 ++count;
58 return count;
61 bool ProcUtil::HasOpenDirectory(int proc_fd) {
62 int proc_self_fd = -1;
63 if (proc_fd >= 0) {
64 proc_self_fd = openat(proc_fd, "self/fd", O_DIRECTORY | O_RDONLY);
65 } else {
66 proc_self_fd = openat(AT_FDCWD, "/proc/self/fd", O_DIRECTORY | O_RDONLY);
67 if (proc_self_fd < 0) {
68 // If this process has been chrooted (eg into /proc/self/fdinfo) then
69 // the new root dir will not have directory listing permissions for us
70 // (hence EACCES). And if we do have this permission, then /proc won't
71 // exist anyway (hence ENOENT).
72 DPCHECK(errno == EACCES || errno == ENOENT)
73 << "Unexpected failure when trying to open /proc/self/fd: ("
74 << errno << ") " << strerror(errno);
76 // If not available, guess false.
77 return false;
80 PCHECK(0 <= proc_self_fd);
82 // Ownership of proc_self_fd is transferred here, it must not be closed
83 // or modified afterwards except via dir.
84 ScopedDIR dir(fdopendir(proc_self_fd));
85 CHECK(dir);
87 struct dirent e;
88 struct dirent* de;
89 while (!readdir_r(dir.get(), &e, &de) && de) {
90 if (strcmp(e.d_name, ".") == 0 || strcmp(e.d_name, "..") == 0) {
91 continue;
94 int fd_num;
95 CHECK(base::StringToInt(e.d_name, &fd_num));
96 if (fd_num == proc_fd || fd_num == proc_self_fd) {
97 continue;
100 struct stat s;
101 // It's OK to use proc_self_fd here, fstatat won't modify it.
102 CHECK(fstatat(proc_self_fd, e.d_name, &s, 0) == 0);
103 if (S_ISDIR(s.st_mode)) {
104 return true;
108 // No open unmanaged directories found.
109 return false;
112 } // namespace sandbox