| Index: base/process_linux.cc
|
| diff --git a/base/process_linux.cc b/base/process_linux.cc
|
| index bfa1e4a03cc4b2caf6f741c554e701dbe6062804..cb413e153b6d02cbeb36d0bbe7745f118a21e001 100644
|
| --- a/base/process_linux.cc
|
| +++ b/base/process_linux.cc
|
| @@ -8,121 +8,128 @@
|
| #include <sys/resource.h>
|
|
|
| #include "base/file_util.h"
|
| +#include "base/lazy_instance.h"
|
| #include "base/logging.h"
|
| #include "base/stringprintf.h"
|
| +#include "base/string_split.h"
|
| +#include "base/synchronization/lock.h"
|
|
|
| -namespace base {
|
| +namespace {
|
| +const int kForegroundPriority = 0;
|
|
|
| #if defined(OS_CHROMEOS)
|
| // We are more aggressive in our lowering of background process priority
|
| // for chromeos as we have much more control over other processes running
|
| // on the machine.
|
| -const int kPriorityAdjustment = 19;
|
| -#else
|
| -const int kPriorityAdjustment = 5;
|
| -#endif
|
| -
|
| -bool Process::IsProcessBackgrounded() const {
|
| - DCHECK(process_);
|
| - return saved_priority_ == kUnsetProcessPriority;
|
| -}
|
| -
|
| -bool Process::SetProcessBackgrounded(bool background) {
|
| - DCHECK(process_);
|
| -
|
| -#if defined(OS_CHROMEOS)
|
| - static bool cgroups_inited = false;
|
| - static bool use_cgroups = false;
|
| +//
|
| +// TODO(davemoore) Refactor this by adding support for higher levels to set
|
| +// the foregrounding / backgrounding process so we don't have to keep
|
| +// chrome / chromeos specific logic here.
|
| +const int kBackgroundPriority = 19;
|
| +const char kControlPath[] = "/tmp/cgroup/cpu%s/cgroup.procs";
|
| +const char kForeground[] = "/chrome_renderers/foreground";
|
| +const char kBackground[] = "/chrome_renderers/background";
|
| +const char kProcPath[] = "/proc/%d/cgroup";
|
|
|
| +struct CGroups {
|
| // Check for cgroups files. ChromeOS supports these by default. It creates
|
| // a cgroup mount in /tmp/cgroup and then configures two cpu task groups,
|
| // one contains at most a single foreground renderer and the other contains
|
| // all background renderers. This allows us to limit the impact of background
|
| // renderers on foreground ones to a greater level than simple renicing.
|
| - FilePath foreground_tasks(
|
| - "/tmp/cgroup/cpu/chrome_renderers/foreground/tasks");
|
| - FilePath background_tasks(
|
| - "/tmp/cgroup/cpu/chrome_renderers/background/tasks");
|
| - if (!cgroups_inited) {
|
| - cgroups_inited = true;
|
| + bool enabled;
|
| + FilePath foreground_file;
|
| + FilePath background_file;
|
| +
|
| + CGroups() {
|
| + foreground_file = FilePath(StringPrintf(kControlPath, kForeground));
|
| + background_file = FilePath(StringPrintf(kControlPath, kBackground));
|
| file_util::FileSystemType foreground_type;
|
| file_util::FileSystemType background_type;
|
| - use_cgroups =
|
| - file_util::GetFileSystemType(foreground_tasks, &foreground_type) &&
|
| - file_util::GetFileSystemType(background_tasks, &background_type) &&
|
| + enabled =
|
| + file_util::GetFileSystemType(foreground_file, &foreground_type) &&
|
| + file_util::GetFileSystemType(background_file, &background_type) &&
|
| foreground_type == file_util::FILE_SYSTEM_CGROUP &&
|
| background_type == file_util::FILE_SYSTEM_CGROUP;
|
| }
|
| +};
|
|
|
| - if (use_cgroups) {
|
| - if (background) {
|
| - std::string pid = StringPrintf("%d", process_);
|
| - if (file_util::WriteFile(background_tasks, pid.c_str(), pid.size()) > 0) {
|
| - // With cgroups there's no real notion of priority as an int, but this
|
| - // will ensure we only move renderers back to the foreground group
|
| - // if we've ever put them in the background one.
|
| - saved_priority_ = 0;
|
| - return true;
|
| - } else {
|
| - return false;
|
| - }
|
| +base::LazyInstance<CGroups> cgroups = LAZY_INSTANCE_INITIALIZER;
|
| +#else
|
| +const int kBackgroundPriority = 5;
|
| +#endif
|
| +}
|
| +
|
| +namespace base {
|
| +
|
| +bool Process::IsProcessBackgrounded() const {
|
| + DCHECK(process_);
|
| +
|
| +#if defined(OS_CHROMEOS)
|
| + if (cgroups.Get().enabled) {
|
| + std::string proc;
|
| + if (file_util::ReadFileToString(
|
| + FilePath(StringPrintf(kProcPath, process_)),
|
| + &proc)) {
|
| + std::vector<std::string> proc_parts;
|
| + base::SplitString(proc, ':', &proc_parts);
|
| + DCHECK(proc_parts.size() == 3);
|
| + bool ret = proc_parts[2] == std::string(kBackground);
|
| + return ret;
|
| } else {
|
| - if (saved_priority_ == kUnsetProcessPriority) {
|
| - // Can't restore if we were never backgrounded.
|
| - return false;
|
| - }
|
| - std::string pid = StringPrintf("%d", process_);
|
| - if (file_util::WriteFile(foreground_tasks, pid.c_str(), pid.size()) > 0) {
|
| - saved_priority_ = kUnsetProcessPriority;
|
| - return true;
|
| - } else {
|
| - return false;
|
| - }
|
| + return false;
|
| }
|
| }
|
| +#endif
|
| + return GetPriority() == kBackgroundPriority;
|
| +}
|
| +
|
| +bool Process::SetProcessBackgrounded(bool background) {
|
| + DCHECK(process_);
|
| +
|
| +#if defined(OS_CHROMEOS)
|
| + if (cgroups.Get().enabled) {
|
| + std::string pid = StringPrintf("%d", process_);
|
| + const FilePath file =
|
| + background ?
|
| + cgroups.Get().background_file : cgroups.Get().foreground_file;
|
| + return file_util::WriteFile(file, pid.c_str(), pid.size()) > 0;
|
| + }
|
| #endif // OS_CHROMEOS
|
|
|
| - if (background) {
|
| + if (!CanBackgroundProcesses())
|
| + return false;
|
| +
|
| + int priority = background ? kBackgroundPriority : kForegroundPriority;
|
| + int result = setpriority(PRIO_PROCESS, process_, priority);
|
| + DPCHECK(result == 0);
|
| + return result == 0;
|
| +}
|
| +
|
| +struct CheckForNicePermission {
|
| + bool can_reraise_priority;
|
| +
|
| + CheckForNicePermission() {
|
| // We won't be able to raise the priority if we don't have the right rlimit.
|
| // The limit may be adjusted in /etc/security/limits.conf for PAM systems.
|
| struct rlimit rlim;
|
| - if (getrlimit(RLIMIT_NICE, &rlim) != 0) {
|
| - // Call to getrlimit failed, don't background.
|
| - return false;
|
| - }
|
| - errno = 0;
|
| - int current_priority = GetPriority();
|
| - if (errno) {
|
| - // Couldn't get priority.
|
| - return false;
|
| + if ((getrlimit(RLIMIT_NICE, &rlim) == 0) &&
|
| + (20 - kForegroundPriority) <= static_cast<int>(rlim.rlim_cur)) {
|
| + can_reraise_priority = true;
|
| }
|
| - // {set,get}priority values are in the range -20 to 19, where -1 is higher
|
| - // priority than 0. But rlimit's are in the range from 0 to 39 where
|
| - // 1 is higher than 0.
|
| - if ((20 - current_priority) > static_cast<int>(rlim.rlim_cur)) {
|
| - // User is not allowed to raise the priority back to where it is now.
|
| - return false;
|
| - }
|
| - int result =
|
| - setpriority(
|
| - PRIO_PROCESS, process_, current_priority + kPriorityAdjustment);
|
| - if (result == -1) {
|
| - DLOG(ERROR) << "Failed to lower priority, errno: " << errno;
|
| - return false;
|
| - }
|
| - saved_priority_ = current_priority;
|
| - return true;
|
| - } else {
|
| - if (saved_priority_ == kUnsetProcessPriority) {
|
| - // Can't restore if we were never backgrounded.
|
| - return false;
|
| - }
|
| - int result = setpriority(PRIO_PROCESS, process_, saved_priority_);
|
| - // If we can't restore something has gone terribly wrong.
|
| - DPCHECK(result == 0);
|
| - saved_priority_ = kUnsetProcessPriority;
|
| + };
|
| +};
|
| +
|
| +// static
|
| +bool Process::CanBackgroundProcesses() {
|
| +#if defined(OS_CHROMEOS)
|
| + if (cgroups.Get().enabled)
|
| return true;
|
| - }
|
| +#endif
|
| +
|
| + static LazyInstance<CheckForNicePermission> check_for_nice_permission =
|
| + LAZY_INSTANCE_INITIALIZER;
|
| + return check_for_nice_permission.Get().can_reraise_priority;
|
| }
|
|
|
| } // namespace base
|
|
|