| // Copyright 2011 The Chromium Authors |
| // Use of this source code is governed by a BSD-style license that can be |
| // found in the LICENSE file. |
| |
| #include "base/process/process.h" |
| |
| #include <errno.h> |
| #include <linux/magic.h> |
| #include <sys/resource.h> |
| #include <sys/vfs.h> |
| |
| #include <cstring> |
| |
| #include "base/check.h" |
| #include "base/files/file_util.h" |
| #include "base/location.h" |
| #include "base/logging.h" |
| #include "base/notreached.h" |
| #include "base/posix/can_lower_nice_to.h" |
| #include "base/process/internal_linux.h" |
| #include "base/strings/string_number_conversions.h" |
| #include "base/strings/string_split.h" |
| #include "base/strings/stringprintf.h" |
| #include "base/threading/thread_restrictions.h" |
| #include "build/build_config.h" |
| #include "build/chromeos_buildflags.h" |
| |
| #if BUILDFLAG(IS_CHROMEOS) |
| #include "base/feature_list.h" |
| #include "base/files/file_enumerator.h" |
| #include "base/files/file_path.h" |
| #include "base/functional/bind.h" |
| #include "base/process/process_handle.h" |
| #include "base/strings/strcat.h" |
| #include "base/strings/string_util.h" |
| #include "base/task/thread_pool.h" |
| #include "base/unguessable_token.h" |
| #endif // BUILDFLAG(IS_CHROMEOS) |
| |
| namespace base { |
| |
| #if BUILDFLAG(IS_CHROMEOS) |
| BASE_FEATURE(kOneGroupPerRenderer, |
| "OneGroupPerRenderer", |
| #if BUILDFLAG(IS_CHROMEOS_LACROS) |
| FEATURE_ENABLED_BY_DEFAULT); |
| #else |
| FEATURE_DISABLED_BY_DEFAULT); |
| #endif // BUILDFLAG(IS_CHROMEOS_LACROS) |
| #endif // BUILDFLAG(IS_CHROMEOS) |
| |
| namespace { |
| |
| const int kForegroundPriority = 0; |
| |
| #if BUILDFLAG(IS_CHROMEOS) |
| // We are more aggressive in our lowering of background process priority |
| // for chromeos as we have much more control over other processes running |
| // on the machine. |
| // |
| // TODO(davemoore) Refactor this by adding support for higher levels to set |
| // the foregrounding / backgrounding process so we don't have to keep |
| // chrome / chromeos specific logic here. |
| const int kBackgroundPriority = 19; |
| const char kControlPath[] = "/sys/fs/cgroup/cpu%s/cgroup.procs"; |
| const char kFullRendererCgroupRoot[] = "/sys/fs/cgroup/cpu/chrome_renderers"; |
| const char kForeground[] = "/chrome_renderers/foreground"; |
| const char kBackground[] = "/chrome_renderers/background"; |
| const char kProcPath[] = "/proc/%d/cgroup"; |
| const char kUclampMinFile[] = "cpu.uclamp.min"; |
| const char kUclampMaxFile[] = "cpu.uclamp.max"; |
| |
| constexpr int kCgroupDeleteRetries = 3; |
| constexpr TimeDelta kCgroupDeleteRetryTime(Seconds(1)); |
| |
| #if BUILDFLAG(IS_CHROMEOS_LACROS) |
| const char kCgroupPrefix[] = "l-"; |
| #elif BUILDFLAG(IS_CHROMEOS_ASH) |
| const char kCgroupPrefix[] = "a-"; |
| #endif |
| |
| bool PathIsCGroupFileSystem(const FilePath& path) { |
| struct statfs statfs_buf; |
| if (statfs(path.value().c_str(), &statfs_buf) < 0) |
| return false; |
| return statfs_buf.f_type == CGROUP_SUPER_MAGIC; |
| } |
| |
| struct CGroups { |
| // Check for cgroups files. ChromeOS supports these by default. It creates |
| // a cgroup mount in /sys/fs/cgroup and then configures two cpu task groups, |
| // one contains at most a single foreground renderer and the other contains |
| // all background renderers. This allows us to limit the impact of background |
| // renderers on foreground ones to a greater level than simple renicing. |
| bool enabled; |
| FilePath foreground_file; |
| FilePath background_file; |
| |
| // A unique token for this instance of the browser. |
| std::string group_prefix_token; |
| |
| // UCLAMP settings for the foreground cgroups. |
| std::string uclamp_min; |
| std::string uclamp_max; |
| |
| CGroups() { |
| foreground_file = FilePath(StringPrintf(kControlPath, kForeground)); |
| background_file = FilePath(StringPrintf(kControlPath, kBackground)); |
| enabled = PathIsCGroupFileSystem(foreground_file) && |
| PathIsCGroupFileSystem(background_file); |
| |
| if (!enabled || !FeatureList::IsEnabled(kOneGroupPerRenderer)) { |
| return; |
| } |
| |
| // Generate a unique token for the full browser process |
| group_prefix_token = |
| StrCat({kCgroupPrefix, UnguessableToken::Create().ToString(), "-"}); |
| |
| // Reads the ULCAMP settings from the foreground cgroup that will be used |
| // for each renderer's cgroup. |
| FilePath foreground_path = foreground_file.DirName(); |
| ReadFileToString(foreground_path.Append(kUclampMinFile), &uclamp_min); |
| ReadFileToString(foreground_path.Append(kUclampMaxFile), &uclamp_max); |
| } |
| |
| // Returns the full path to a the cgroup dir of a process using |
| // the supplied token. |
| static FilePath GetForegroundCgroupDir(const std::string& token) { |
| // Get individualized cgroup if the feature is enabled |
| std::string cgroup_path_str; |
| StrAppend(&cgroup_path_str, {kFullRendererCgroupRoot, "/", token}); |
| return FilePath(cgroup_path_str); |
| } |
| |
| // Returns the path to the cgroup.procs file of the foreground cgroup. |
| static FilePath GetForegroundCgroupFile(const std::string& token) { |
| // Processes with an empty token use the default foreground cgroup. |
| if (token.empty()) { |
| return CGroups::Get().foreground_file; |
| } |
| |
| FilePath cgroup_path = GetForegroundCgroupDir(token); |
| return cgroup_path.Append("cgroup.procs"); |
| } |
| |
| static CGroups& Get() { |
| static auto& groups = *new CGroups; |
| return groups; |
| } |
| }; |
| |
| // Returns true if the 'OneGroupPerRenderer' feature is enabled. The feature |
| // is enabled if the kOneGroupPerRenderer feature flag is enabled and the |
| // system supports the chrome cgroups. Will block if this is the first call |
| // that will read the cgroup configs. |
| bool OneGroupPerRendererEnabled() { |
| return FeatureList::IsEnabled(kOneGroupPerRenderer) && CGroups::Get().enabled; |
| } |
| #else |
| const int kBackgroundPriority = 5; |
| #endif // BUILDFLAG(IS_CHROMEOS) |
| |
| } // namespace |
| |
| Time Process::CreationTime() const { |
| int64_t start_ticks = is_current() |
| ? internal::ReadProcSelfStatsAndGetFieldAsInt64( |
| internal::VM_STARTTIME) |
| : internal::ReadProcStatsAndGetFieldAsInt64( |
| Pid(), internal::VM_STARTTIME); |
| |
| if (!start_ticks) |
| return Time(); |
| |
| TimeDelta start_offset = internal::ClockTicksToTimeDelta(start_ticks); |
| Time boot_time = internal::GetBootTime(); |
| if (boot_time.is_null()) |
| return Time(); |
| return Time(boot_time + start_offset); |
| } |
| |
| // static |
| bool Process::CanBackgroundProcesses() { |
| #if BUILDFLAG(IS_CHROMEOS) |
| if (CGroups::Get().enabled) |
| return true; |
| #endif // BUILDFLAG(IS_CHROMEOS) |
| |
| static const bool can_reraise_priority = |
| internal::CanLowerNiceTo(kForegroundPriority); |
| return can_reraise_priority; |
| } |
| |
| bool Process::IsProcessBackgrounded() const { |
| DCHECK(IsValid()); |
| |
| #if BUILDFLAG(IS_CHROMEOS) |
| if (CGroups::Get().enabled) { |
| // Used to allow reading the process priority from proc on thread launch. |
| ScopedAllowBlocking scoped_allow_blocking; |
| std::string proc; |
| if (ReadFileToString(FilePath(StringPrintf(kProcPath, process_)), &proc)) { |
| return IsProcessBackgroundedCGroup(proc); |
| } |
| return false; |
| } |
| #endif // BUILDFLAG(IS_CHROMEOS) |
| |
| return GetPriority() == kBackgroundPriority; |
| } |
| |
| bool Process::SetProcessBackgrounded(bool background) { |
| DCHECK(IsValid()); |
| |
| #if BUILDFLAG(IS_CHROMEOS) |
| if (CGroups::Get().enabled) { |
| std::string pid = NumberToString(process_); |
| const FilePath file = |
| background ? CGroups::Get().background_file |
| : CGroups::Get().GetForegroundCgroupFile(unique_token_); |
| return WriteFile(file, pid); |
| } |
| #endif // BUILDFLAG(IS_CHROMEOS) |
| |
| if (!CanBackgroundProcesses()) |
| return false; |
| |
| int priority = background ? kBackgroundPriority : kForegroundPriority; |
| int result = setpriority(PRIO_PROCESS, static_cast<id_t>(process_), priority); |
| DPCHECK(result == 0); |
| return result == 0; |
| } |
| |
| #if BUILDFLAG(IS_CHROMEOS) |
| bool IsProcessBackgroundedCGroup(const StringPiece& cgroup_contents) { |
| // The process can be part of multiple control groups, and for each cgroup |
| // hierarchy there's an entry in the file. We look for a control group |
| // named "/chrome_renderers/background" to determine if the process is |
| // backgrounded. crbug.com/548818. |
| std::vector<StringPiece> lines = SplitStringPiece( |
| cgroup_contents, "\n", TRIM_WHITESPACE, SPLIT_WANT_NONEMPTY); |
| for (const auto& line : lines) { |
| std::vector<StringPiece> fields = |
| SplitStringPiece(line, ":", TRIM_WHITESPACE, SPLIT_WANT_ALL); |
| if (fields.size() != 3U) { |
| NOTREACHED(); |
| continue; |
| } |
| if (fields[2] == kBackground) |
| return true; |
| } |
| |
| return false; |
| } |
| #endif // BUILDFLAG(IS_CHROMEOS) |
| |
| #if BUILDFLAG(IS_CHROMEOS_ASH) |
| // Reads /proc/<pid>/status and returns the PID in its PID namespace. |
| // If the process is not in a PID namespace or /proc/<pid>/status does not |
| // report NSpid, kNullProcessId is returned. |
| ProcessId Process::GetPidInNamespace() const { |
| std::string status; |
| { |
| // Synchronously reading files in /proc does not hit the disk. |
| ScopedAllowBlocking scoped_allow_blocking; |
| FilePath status_file = |
| FilePath("/proc").Append(NumberToString(process_)).Append("status"); |
| if (!ReadFileToString(status_file, &status)) { |
| return kNullProcessId; |
| } |
| } |
| |
| StringPairs pairs; |
| SplitStringIntoKeyValuePairs(status, ':', '\n', &pairs); |
| for (const auto& pair : pairs) { |
| const std::string& key = pair.first; |
| const std::string& value_str = pair.second; |
| if (key == "NSpid") { |
| std::vector<StringPiece> split_value_str = SplitStringPiece( |
| value_str, "\t", TRIM_WHITESPACE, SPLIT_WANT_NONEMPTY); |
| if (split_value_str.size() <= 1) { |
| return kNullProcessId; |
| } |
| int value; |
| // The last value in the list is the PID in the namespace. |
| if (!StringToInt(split_value_str.back(), &value)) { |
| NOTREACHED(); |
| return kNullProcessId; |
| } |
| return value; |
| } |
| } |
| return kNullProcessId; |
| } |
| #endif // BUILDFLAG(IS_CHROMEOS_ASH) |
| |
| #if BUILDFLAG(IS_CHROMEOS) |
| // static |
| bool Process::OneGroupPerRendererEnabledForTesting() { |
| return OneGroupPerRendererEnabled(); |
| } |
| |
| // On Chrome OS, each renderer runs in its own cgroup when running in the |
| // foreground. After process creation the cgroup is created using a |
| // unique token. |
| void Process::InitializePriority() { |
| if (!OneGroupPerRendererEnabled() || !IsValid() || !unique_token_.empty()) { |
| return; |
| } |
| |
| // The token has the following format: |
| // {cgroup_prefix}{UnguessableToken} |
| // The cgroup prefix is to distinguish ash from lacros tokens for stale |
| // cgroup cleanup. |
| unique_token_ = StrCat({CGroups::Get().group_prefix_token, |
| UnguessableToken::Create().ToString()}); |
| |
| FilePath cgroup_path = CGroups::Get().GetForegroundCgroupDir(unique_token_); |
| // Note that CreateDirectoryAndGetError() does not fail if the directory |
| // already exits. |
| if (!CreateDirectoryAndGetError(cgroup_path, nullptr)) { |
| // If creating the directory fails, fall back to use the foreground group. |
| int saved_errno = errno; |
| LOG(ERROR) << "Failed to create cgroup, falling back to foreground" |
| << ", cgroup=" << cgroup_path |
| << ", errno=" << strerror(saved_errno); |
| |
| unique_token_.clear(); |
| return; |
| } |
| |
| if (!CGroups::Get().uclamp_min.empty() && |
| !WriteFile(cgroup_path.Append(kUclampMinFile), |
| CGroups::Get().uclamp_min)) { |
| LOG(ERROR) << "Failed to write uclamp min file, cgroup_path=" |
| << cgroup_path; |
| } |
| if (!CGroups::Get().uclamp_min.empty() && |
| !WriteFile(cgroup_path.Append(kUclampMaxFile), |
| CGroups::Get().uclamp_max)) { |
| LOG(ERROR) << "Failed to write uclamp max file, cgroup_path=" |
| << cgroup_path; |
| } |
| } |
| |
| // static |
| void Process::CleanUpProcessScheduled(Process process, int remaining_retries) { |
| process.CleanUpProcess(remaining_retries); |
| } |
| |
| void Process::CleanUpProcessAsync() const { |
| if (!FeatureList::IsEnabled(kOneGroupPerRenderer) || unique_token_.empty()) { |
| return; |
| } |
| |
| ThreadPool::PostTask(FROM_HERE, {MayBlock(), TaskPriority::BEST_EFFORT}, |
| BindOnce(&Process::CleanUpProcessScheduled, Duplicate(), |
| kCgroupDeleteRetries)); |
| } |
| |
| void Process::CleanUpProcess(int remaining_retries) const { |
| if (!OneGroupPerRendererEnabled() || unique_token_.empty()) { |
| return; |
| } |
| |
| // Try to delete the cgroup |
| // TODO(1322562): We can use notify_on_release to automoatically delete the |
| // cgroup when the process has left the cgroup. |
| FilePath cgroup = CGroups::Get().GetForegroundCgroupDir(unique_token_); |
| if (!DeleteFile(cgroup)) { |
| auto saved_errno = errno; |
| LOG(ERROR) << "Failed to delete cgroup " << cgroup |
| << ", errno=" << strerror(saved_errno); |
| // If the delete failed, then the process is still potentially in the |
| // cgroup. Move the process to background and schedule a callback to try |
| // again. |
| if (remaining_retries > 0) { |
| std::string pidstr = NumberToString(process_); |
| if (!WriteFile(CGroups::Get().background_file, pidstr)) { |
| // Failed to move the process, LOG a warning but try again. |
| saved_errno = errno; |
| LOG(WARNING) << "Failed to move the process to background" |
| << ", pid=" << pidstr |
| << ", errno=" << strerror(saved_errno); |
| } |
| ThreadPool::PostDelayedTask(FROM_HERE, |
| {MayBlock(), TaskPriority::BEST_EFFORT}, |
| BindOnce(&Process::CleanUpProcessScheduled, |
| Duplicate(), remaining_retries - 1), |
| kCgroupDeleteRetryTime); |
| } |
| } |
| } |
| |
| // static |
| void Process::CleanUpStaleProcessStates() { |
| if (!OneGroupPerRendererEnabled()) { |
| return; |
| } |
| |
| FileEnumerator traversal(FilePath(kFullRendererCgroupRoot), false, |
| FileEnumerator::DIRECTORIES); |
| for (FilePath path = traversal.Next(); !path.empty(); |
| path = traversal.Next()) { |
| std::string dirname = path.BaseName().value(); |
| if (dirname == FilePath(kForeground).BaseName().value() || |
| dirname == FilePath(kBackground).BaseName().value()) { |
| continue; |
| } |
| |
| if (!StartsWith(dirname, kCgroupPrefix) || |
| StartsWith(dirname, CGroups::Get().group_prefix_token)) { |
| continue; |
| } |
| |
| if (!DeleteFile(path)) { |
| auto saved_errno = errno; |
| LOG(ERROR) << "Failed to delete " << path |
| << ", errno=" << strerror(saved_errno); |
| } |
| } |
| } |
| #endif // BUILDFLAG(IS_CHROMEOS) |
| |
| } // namespace base |