DescriptionAdd Results.Process.executable and command.
Permits to know _what_ was executed, which is really needed to understand which
child process is using what. Most of the time was spent in normalizing accross
OSes. Some things where more difficult, especially because of python usage,
since on OSX the /usr/bin/python is a stub that reads /usr/bin/python2.7 symlink
and calls the linked executable manually. Also tries to 'guess' the initial
directory on Windows since the event log is lossy.
Fix yet again NTFS' EXTEND. Will have to redo the blacklisting logic later.
NOTRY=true
TBR=mad@chromium.org
BUG=98636
TEST=manually tested on each OS
Committed: http://src.chromium.org/viewvc/chrome?view=rev&revision=140113
Patch Set 1 #Patch Set 2 : Rebase against 10444052 #Patch Set 3 : Rebase #
Total comments: 10
Patch Set 4 : Address review comments #
Messages
Total messages: 8 (0 generated)
|