| Index: base/process_linux.cc
|
| diff --git a/base/process_linux.cc b/base/process_linux.cc
|
| deleted file mode 100644
|
| index 9fd4a7d56ec8ae38356deee7d4b438f854654397..0000000000000000000000000000000000000000
|
| --- a/base/process_linux.cc
|
| +++ /dev/null
|
| @@ -1,137 +0,0 @@
|
| -// Copyright (c) 2011 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include "base/process.h"
|
| -
|
| -#include <errno.h>
|
| -#include <sys/resource.h>
|
| -
|
| -#include "base/file_util.h"
|
| -#include "base/lazy_instance.h"
|
| -#include "base/logging.h"
|
| -#include "base/strings/string_split.h"
|
| -#include "base/strings/stringprintf.h"
|
| -#include "base/synchronization/lock.h"
|
| -
|
| -namespace {
|
| -const int kForegroundPriority = 0;
|
| -
|
| -#if defined(OS_CHROMEOS)
|
| -// We are more aggressive in our lowering of background process priority
|
| -// for chromeos as we have much more control over other processes running
|
| -// on the machine.
|
| -//
|
| -// TODO(davemoore) Refactor this by adding support for higher levels to set
|
| -// the foregrounding / backgrounding process so we don't have to keep
|
| -// chrome / chromeos specific logic here.
|
| -const int kBackgroundPriority = 19;
|
| -const char kControlPath[] = "/sys/fs/cgroup/cpu%s/cgroup.procs";
|
| -const char kForeground[] = "/chrome_renderers/foreground";
|
| -const char kBackground[] = "/chrome_renderers/background";
|
| -const char kProcPath[] = "/proc/%d/cgroup";
|
| -
|
| -struct CGroups {
|
| - // Check for cgroups files. ChromeOS supports these by default. It creates
|
| - // a cgroup mount in /sys/fs/cgroup and then configures two cpu task groups,
|
| - // one contains at most a single foreground renderer and the other contains
|
| - // all background renderers. This allows us to limit the impact of background
|
| - // renderers on foreground ones to a greater level than simple renicing.
|
| - bool enabled;
|
| - base::FilePath foreground_file;
|
| - base::FilePath background_file;
|
| -
|
| - CGroups() {
|
| - foreground_file =
|
| - base::FilePath(base::StringPrintf(kControlPath, kForeground));
|
| - background_file =
|
| - base::FilePath(base::StringPrintf(kControlPath, kBackground));
|
| - file_util::FileSystemType foreground_type;
|
| - file_util::FileSystemType background_type;
|
| - enabled =
|
| - file_util::GetFileSystemType(foreground_file, &foreground_type) &&
|
| - file_util::GetFileSystemType(background_file, &background_type) &&
|
| - foreground_type == file_util::FILE_SYSTEM_CGROUP &&
|
| - background_type == file_util::FILE_SYSTEM_CGROUP;
|
| - }
|
| -};
|
| -
|
| -base::LazyInstance<CGroups> cgroups = LAZY_INSTANCE_INITIALIZER;
|
| -#else
|
| -const int kBackgroundPriority = 5;
|
| -#endif
|
| -}
|
| -
|
| -namespace base {
|
| -
|
| -bool Process::IsProcessBackgrounded() const {
|
| - DCHECK(process_);
|
| -
|
| -#if defined(OS_CHROMEOS)
|
| - if (cgroups.Get().enabled) {
|
| - std::string proc;
|
| - if (file_util::ReadFileToString(
|
| - base::FilePath(StringPrintf(kProcPath, process_)),
|
| - &proc)) {
|
| - std::vector<std::string> proc_parts;
|
| - base::SplitString(proc, ':', &proc_parts);
|
| - DCHECK(proc_parts.size() == 3);
|
| - bool ret = proc_parts[2] == std::string(kBackground);
|
| - return ret;
|
| - } else {
|
| - return false;
|
| - }
|
| - }
|
| -#endif
|
| - return GetPriority() == kBackgroundPriority;
|
| -}
|
| -
|
| -bool Process::SetProcessBackgrounded(bool background) {
|
| - DCHECK(process_);
|
| -
|
| -#if defined(OS_CHROMEOS)
|
| - if (cgroups.Get().enabled) {
|
| - std::string pid = StringPrintf("%d", process_);
|
| - const base::FilePath file =
|
| - background ?
|
| - cgroups.Get().background_file : cgroups.Get().foreground_file;
|
| - return file_util::WriteFile(file, pid.c_str(), pid.size()) > 0;
|
| - }
|
| -#endif // OS_CHROMEOS
|
| -
|
| - if (!CanBackgroundProcesses())
|
| - return false;
|
| -
|
| - int priority = background ? kBackgroundPriority : kForegroundPriority;
|
| - int result = setpriority(PRIO_PROCESS, process_, priority);
|
| - DPCHECK(result == 0);
|
| - return result == 0;
|
| -}
|
| -
|
| -struct CheckForNicePermission {
|
| - CheckForNicePermission() : can_reraise_priority(false) {
|
| - // We won't be able to raise the priority if we don't have the right rlimit.
|
| - // The limit may be adjusted in /etc/security/limits.conf for PAM systems.
|
| - struct rlimit rlim;
|
| - if ((getrlimit(RLIMIT_NICE, &rlim) == 0) &&
|
| - (20 - kForegroundPriority) <= static_cast<int>(rlim.rlim_cur)) {
|
| - can_reraise_priority = true;
|
| - }
|
| - };
|
| -
|
| - bool can_reraise_priority;
|
| -};
|
| -
|
| -// static
|
| -bool Process::CanBackgroundProcesses() {
|
| -#if defined(OS_CHROMEOS)
|
| - if (cgroups.Get().enabled)
|
| - return true;
|
| -#endif
|
| -
|
| - static LazyInstance<CheckForNicePermission> check_for_nice_permission =
|
| - LAZY_INSTANCE_INITIALIZER;
|
| - return check_for_nice_permission.Get().can_reraise_priority;
|
| -}
|
| -
|
| -} // namespace base
|
|
|