mirror of
https://github.com/klzgrad/naiveproxy.git
synced 2024-12-01 01:36:09 +03:00
210 lines
6.6 KiB
C++
210 lines
6.6 KiB
C++
// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
|
// Use of this source code is governed by a BSD-style license that can be
|
|
// found in the LICENSE file.
|
|
|
|
#include "base/process/process.h"
|
|
|
|
#include <errno.h>
|
|
#include <sys/resource.h>
|
|
|
|
#include "base/files/file_util.h"
|
|
#include "base/lazy_instance.h"
|
|
#include "base/logging.h"
|
|
#include "base/strings/string_number_conversions.h"
|
|
#include "base/strings/string_split.h"
|
|
#include "base/strings/stringprintf.h"
|
|
#include "base/synchronization/lock.h"
|
|
#include "base/threading/thread_restrictions.h"
|
|
#include "build/build_config.h"
|
|
|
|
// Not defined on AIX by default.
|
|
#if defined(OS_AIX)
|
|
#define RLIMIT_NICE 20
|
|
#endif
|
|
|
|
namespace base {
|
|
|
|
namespace {
|
|
|
|
const int kForegroundPriority = 0;
|
|
|
|
#if defined(OS_CHROMEOS)
|
|
// We are more aggressive in our lowering of background process priority
|
|
// for chromeos as we have much more control over other processes running
|
|
// on the machine.
|
|
//
|
|
// TODO(davemoore) Refactor this by adding support for higher levels to set
|
|
// the foregrounding / backgrounding process so we don't have to keep
|
|
// chrome / chromeos specific logic here.
|
|
const int kBackgroundPriority = 19;
|
|
const char kControlPath[] = "/sys/fs/cgroup/cpu%s/cgroup.procs";
|
|
const char kForeground[] = "/chrome_renderers/foreground";
|
|
const char kBackground[] = "/chrome_renderers/background";
|
|
const char kProcPath[] = "/proc/%d/cgroup";
|
|
|
|
struct CGroups {
|
|
// Check for cgroups files. ChromeOS supports these by default. It creates
|
|
// a cgroup mount in /sys/fs/cgroup and then configures two cpu task groups,
|
|
// one contains at most a single foreground renderer and the other contains
|
|
// all background renderers. This allows us to limit the impact of background
|
|
// renderers on foreground ones to a greater level than simple renicing.
|
|
bool enabled;
|
|
base::FilePath foreground_file;
|
|
base::FilePath background_file;
|
|
|
|
CGroups() {
|
|
foreground_file =
|
|
base::FilePath(base::StringPrintf(kControlPath, kForeground));
|
|
background_file =
|
|
base::FilePath(base::StringPrintf(kControlPath, kBackground));
|
|
base::FileSystemType foreground_type;
|
|
base::FileSystemType background_type;
|
|
enabled =
|
|
base::GetFileSystemType(foreground_file, &foreground_type) &&
|
|
base::GetFileSystemType(background_file, &background_type) &&
|
|
foreground_type == FILE_SYSTEM_CGROUP &&
|
|
background_type == FILE_SYSTEM_CGROUP;
|
|
}
|
|
|
|
static CGroups& Get() {
|
|
static auto& groups = *new CGroups;
|
|
return groups;
|
|
}
|
|
};
|
|
#else
|
|
const int kBackgroundPriority = 5;
|
|
#endif // defined(OS_CHROMEOS)
|
|
|
|
struct CheckForNicePermission {
|
|
CheckForNicePermission() : can_reraise_priority(false) {
|
|
// We won't be able to raise the priority if we don't have the right rlimit.
|
|
// The limit may be adjusted in /etc/security/limits.conf for PAM systems.
|
|
struct rlimit rlim;
|
|
if ((getrlimit(RLIMIT_NICE, &rlim) == 0) &&
|
|
(20 - kForegroundPriority) <= static_cast<int>(rlim.rlim_cur)) {
|
|
can_reraise_priority = true;
|
|
}
|
|
};
|
|
|
|
bool can_reraise_priority;
|
|
};
|
|
|
|
} // namespace
|
|
|
|
// static
|
|
bool Process::CanBackgroundProcesses() {
|
|
#if defined(OS_CHROMEOS)
|
|
if (CGroups::Get().enabled)
|
|
return true;
|
|
#endif // defined(OS_CHROMEOS)
|
|
|
|
static LazyInstance<CheckForNicePermission>::DestructorAtExit
|
|
check_for_nice_permission = LAZY_INSTANCE_INITIALIZER;
|
|
return check_for_nice_permission.Get().can_reraise_priority;
|
|
}
|
|
|
|
bool Process::IsProcessBackgrounded() const {
|
|
DCHECK(IsValid());
|
|
|
|
#if defined(OS_CHROMEOS)
|
|
if (CGroups::Get().enabled) {
|
|
// Used to allow reading the process priority from proc on thread launch.
|
|
base::ThreadRestrictions::ScopedAllowIO allow_io;
|
|
std::string proc;
|
|
if (base::ReadFileToString(
|
|
base::FilePath(StringPrintf(kProcPath, process_)), &proc)) {
|
|
return IsProcessBackgroundedCGroup(proc);
|
|
}
|
|
return false;
|
|
}
|
|
#endif // defined(OS_CHROMEOS)
|
|
|
|
return GetPriority() == kBackgroundPriority;
|
|
}
|
|
|
|
bool Process::SetProcessBackgrounded(bool background) {
|
|
DCHECK(IsValid());
|
|
|
|
#if defined(OS_CHROMEOS)
|
|
if (CGroups::Get().enabled) {
|
|
std::string pid = IntToString(process_);
|
|
const base::FilePath file = background ? CGroups::Get().background_file
|
|
: CGroups::Get().foreground_file;
|
|
return base::WriteFile(file, pid.c_str(), pid.size()) > 0;
|
|
}
|
|
#endif // defined(OS_CHROMEOS)
|
|
|
|
if (!CanBackgroundProcesses())
|
|
return false;
|
|
|
|
int priority = background ? kBackgroundPriority : kForegroundPriority;
|
|
int result = setpriority(PRIO_PROCESS, process_, priority);
|
|
DPCHECK(result == 0);
|
|
return result == 0;
|
|
}
|
|
|
|
#if defined(OS_CHROMEOS)
|
|
bool IsProcessBackgroundedCGroup(const StringPiece& cgroup_contents) {
|
|
// The process can be part of multiple control groups, and for each cgroup
|
|
// hierarchy there's an entry in the file. We look for a control group
|
|
// named "/chrome_renderers/background" to determine if the process is
|
|
// backgrounded. crbug.com/548818.
|
|
std::vector<StringPiece> lines = SplitStringPiece(
|
|
cgroup_contents, "\n", TRIM_WHITESPACE, SPLIT_WANT_NONEMPTY);
|
|
for (const auto& line : lines) {
|
|
std::vector<StringPiece> fields =
|
|
SplitStringPiece(line, ":", TRIM_WHITESPACE, SPLIT_WANT_ALL);
|
|
if (fields.size() != 3U) {
|
|
NOTREACHED();
|
|
continue;
|
|
}
|
|
if (fields[2] == kBackground)
|
|
return true;
|
|
}
|
|
|
|
return false;
|
|
}
|
|
#endif // defined(OS_CHROMEOS)
|
|
|
|
#if defined(OS_CHROMEOS)
|
|
// Reads /proc/<pid>/status and returns the PID in its PID namespace.
|
|
// If the process is not in a PID namespace or /proc/<pid>/status does not
|
|
// report NSpid, kNullProcessId is returned.
|
|
ProcessId Process::GetPidInNamespace() const {
|
|
std::string status;
|
|
{
|
|
// Synchronously reading files in /proc does not hit the disk.
|
|
ThreadRestrictions::ScopedAllowIO allow_io;
|
|
FilePath status_file =
|
|
FilePath("/proc").Append(IntToString(process_)).Append("status");
|
|
if (!ReadFileToString(status_file, &status)) {
|
|
return kNullProcessId;
|
|
}
|
|
}
|
|
|
|
StringPairs pairs;
|
|
SplitStringIntoKeyValuePairs(status, ':', '\n', &pairs);
|
|
for (const auto& pair : pairs) {
|
|
const std::string& key = pair.first;
|
|
const std::string& value_str = pair.second;
|
|
if (key == "NSpid") {
|
|
std::vector<StringPiece> split_value_str = SplitStringPiece(
|
|
value_str, "\t", TRIM_WHITESPACE, SPLIT_WANT_NONEMPTY);
|
|
if (split_value_str.size() <= 1) {
|
|
return kNullProcessId;
|
|
}
|
|
int value;
|
|
// The last value in the list is the PID in the namespace.
|
|
if (!StringToInt(split_value_str.back(), &value)) {
|
|
NOTREACHED();
|
|
return kNullProcessId;
|
|
}
|
|
return value;
|
|
}
|
|
}
|
|
return kNullProcessId;
|
|
}
|
|
#endif // defined(OS_CHROMEOS)
|
|
|
|
} // namespace base
|