Home | History | Annotate | Download | only in base
      1 // Copyright (c) 2009 The Chromium Authors. All rights reserved.
      2 // Use of this source code is governed by a BSD-style license that can be
      3 // found in the LICENSE file.
      4 
      5 #include "base/process_util.h"
      6 
      7 #include <ctype.h>
      8 #include <dirent.h>
      9 #include <dlfcn.h>
     10 #include <errno.h>
     11 #include <fcntl.h>
     12 #include <sys/time.h>
     13 #include <sys/types.h>
     14 #include <sys/wait.h>
     15 #include <time.h>
     16 #include <unistd.h>
     17 
     18 #include "base/file_util.h"
     19 #include "base/logging.h"
     20 #include "base/string_number_conversions.h"
     21 #include "base/string_split.h"
     22 #include "base/string_tokenizer.h"
     23 #include "base/string_util.h"
     24 #include "base/sys_info.h"
     25 #include "base/threading/thread_restrictions.h"
     26 
     27 namespace {
     28 
     29 enum ParsingState {
     30   KEY_NAME,
     31   KEY_VALUE
     32 };
     33 
     34 // Reads /proc/<pid>/stat and populates |proc_stats| with the values split by
     35 // spaces. Returns true if successful.
     36 bool GetProcStats(pid_t pid, std::vector<std::string>* proc_stats) {
     37   // Synchronously reading files in /proc is safe.
     38   base::ThreadRestrictions::ScopedAllowIO allow_io;
     39 
     40   FilePath stat_file("/proc");
     41   stat_file = stat_file.Append(base::IntToString(pid));
     42   stat_file = stat_file.Append("stat");
     43   std::string mem_stats;
     44   if (!file_util::ReadFileToString(stat_file, &mem_stats))
     45     return false;
     46   base::SplitString(mem_stats, ' ', proc_stats);
     47   return true;
     48 }
     49 
     50 // Reads /proc/<pid>/cmdline and populates |proc_cmd_line_args| with the command
     51 // line arguments. Returns true if successful.
     52 // Note: /proc/<pid>/cmdline contains command line arguments separated by single
     53 // null characters. We tokenize it into a vector of strings using '\0' as a
     54 // delimiter.
     55 bool GetProcCmdline(pid_t pid, std::vector<std::string>* proc_cmd_line_args) {
     56   // Synchronously reading files in /proc is safe.
     57   base::ThreadRestrictions::ScopedAllowIO allow_io;
     58 
     59   FilePath cmd_line_file("/proc");
     60   cmd_line_file = cmd_line_file.Append(base::IntToString(pid));
     61   cmd_line_file = cmd_line_file.Append("cmdline");
     62   std::string cmd_line;
     63   if (!file_util::ReadFileToString(cmd_line_file, &cmd_line))
     64     return false;
     65   std::string delimiters;
     66   delimiters.push_back('\0');
     67   Tokenize(cmd_line, delimiters, proc_cmd_line_args);
     68   return true;
     69 }
     70 
     71 // Get the total CPU of a single process.  Return value is number of jiffies
     72 // on success or -1 on error.
     73 int GetProcessCPU(pid_t pid) {
     74   // Synchronously reading files in /proc is safe.
     75   base::ThreadRestrictions::ScopedAllowIO allow_io;
     76 
     77   // Use /proc/<pid>/task to find all threads and parse their /stat file.
     78   FilePath path = FilePath(StringPrintf("/proc/%d/task/", pid));
     79 
     80   DIR* dir = opendir(path.value().c_str());
     81   if (!dir) {
     82     PLOG(ERROR) << "opendir(" << path.value() << ")";
     83     return -1;
     84   }
     85 
     86   int total_cpu = 0;
     87   while (struct dirent* ent = readdir(dir)) {
     88     if (ent->d_name[0] == '.')
     89       continue;
     90 
     91     FilePath stat_path = path.AppendASCII(ent->d_name).AppendASCII("stat");
     92     std::string stat;
     93     if (file_util::ReadFileToString(stat_path, &stat)) {
     94       int cpu = base::ParseProcStatCPU(stat);
     95       if (cpu > 0)
     96         total_cpu += cpu;
     97     }
     98   }
     99   closedir(dir);
    100 
    101   return total_cpu;
    102 }
    103 
    104 }  // namespace
    105 
    106 namespace base {
    107 
    108 ProcessId GetParentProcessId(ProcessHandle process) {
    109   // Synchronously reading files in /proc is safe.
    110   base::ThreadRestrictions::ScopedAllowIO allow_io;
    111 
    112   FilePath stat_file("/proc");
    113   stat_file = stat_file.Append(base::IntToString(process));
    114   stat_file = stat_file.Append("status");
    115   std::string status;
    116   if (!file_util::ReadFileToString(stat_file, &status))
    117     return -1;
    118 
    119   StringTokenizer tokenizer(status, ":\n");
    120   ParsingState state = KEY_NAME;
    121   std::string last_key_name;
    122   while (tokenizer.GetNext()) {
    123     switch (state) {
    124       case KEY_NAME:
    125         last_key_name = tokenizer.token();
    126         state = KEY_VALUE;
    127         break;
    128       case KEY_VALUE:
    129         DCHECK(!last_key_name.empty());
    130         if (last_key_name == "PPid") {
    131           int ppid;
    132           base::StringToInt(tokenizer.token(), &ppid);
    133           return ppid;
    134         }
    135         state = KEY_NAME;
    136         break;
    137     }
    138   }
    139   NOTREACHED();
    140   return -1;
    141 }
    142 
    143 FilePath GetProcessExecutablePath(ProcessHandle process) {
    144   FilePath stat_file("/proc");
    145   stat_file = stat_file.Append(base::IntToString(process));
    146   stat_file = stat_file.Append("exe");
    147   FilePath exe_name;
    148   if (!file_util::ReadSymbolicLink(stat_file, &exe_name)) {
    149     // No such process.  Happens frequently in e.g. TerminateAllChromeProcesses
    150     return FilePath();
    151   }
    152   return exe_name;
    153 }
    154 
    155 ProcessIterator::ProcessIterator(const ProcessFilter* filter)
    156     : filter_(filter) {
    157   procfs_dir_ = opendir("/proc");
    158 }
    159 
    160 ProcessIterator::~ProcessIterator() {
    161   if (procfs_dir_) {
    162     closedir(procfs_dir_);
    163     procfs_dir_ = NULL;
    164   }
    165 }
    166 
    167 bool ProcessIterator::CheckForNextProcess() {
    168   // TODO(port): skip processes owned by different UID
    169 
    170   dirent* slot = 0;
    171   const char* openparen;
    172   const char* closeparen;
    173   std::vector<std::string> cmd_line_args;
    174 
    175   // Arbitrarily guess that there will never be more than 200 non-process
    176   // files in /proc.  Hardy has 53.
    177   int skipped = 0;
    178   const int kSkipLimit = 200;
    179   while (skipped < kSkipLimit) {
    180     slot = readdir(procfs_dir_);
    181     // all done looking through /proc?
    182     if (!slot)
    183       return false;
    184 
    185     // If not a process, keep looking for one.
    186     bool notprocess = false;
    187     int i;
    188     for (i = 0; i < NAME_MAX && slot->d_name[i]; ++i) {
    189        if (!isdigit(slot->d_name[i])) {
    190          notprocess = true;
    191          break;
    192        }
    193     }
    194     if (i == NAME_MAX || notprocess) {
    195       skipped++;
    196       continue;
    197     }
    198 
    199     // Read the process's command line.
    200     std::string pid_string(slot->d_name);
    201     int pid;
    202     if (StringToInt(pid_string, &pid) && !GetProcCmdline(pid, &cmd_line_args))
    203       continue;
    204 
    205     // Read the process's status.
    206     char buf[NAME_MAX + 12];
    207     sprintf(buf, "/proc/%s/stat", slot->d_name);
    208     FILE *fp = fopen(buf, "r");
    209     if (!fp)
    210       continue;
    211     const char* result = fgets(buf, sizeof(buf), fp);
    212     fclose(fp);
    213     if (!result)
    214       continue;
    215 
    216     // Parse the status.  It is formatted like this:
    217     // %d (%s) %c %d %d ...
    218     // pid (name) runstate ppid gid
    219     // To avoid being fooled by names containing a closing paren, scan
    220     // backwards.
    221     openparen = strchr(buf, '(');
    222     closeparen = strrchr(buf, ')');
    223     if (!openparen || !closeparen)
    224       continue;
    225     char runstate = closeparen[2];
    226 
    227     // Is the process in 'Zombie' state, i.e. dead but waiting to be reaped?
    228     // Allowed values: D R S T Z
    229     if (runstate != 'Z')
    230       break;
    231 
    232     // Nope, it's a zombie; somebody isn't cleaning up after their children.
    233     // (e.g. WaitForProcessesToExit doesn't clean up after dead children yet.)
    234     // There could be a lot of zombies, can't really decrement i here.
    235   }
    236   if (skipped >= kSkipLimit) {
    237     NOTREACHED();
    238     return false;
    239   }
    240 
    241   // This seems fragile.
    242   entry_.pid_ = atoi(slot->d_name);
    243   entry_.ppid_ = atoi(closeparen + 3);
    244   entry_.gid_ = atoi(strchr(closeparen + 4, ' '));
    245 
    246   entry_.cmd_line_args_.assign(cmd_line_args.begin(), cmd_line_args.end());
    247 
    248   // TODO(port): read pid's commandline's $0, like killall does.  Using the
    249   // short name between openparen and closeparen won't work for long names!
    250   int len = closeparen - openparen - 1;
    251   entry_.exe_file_.assign(openparen + 1, len);
    252   return true;
    253 }
    254 
    255 bool NamedProcessIterator::IncludeEntry() {
    256   if (executable_name_ != entry().exe_file())
    257     return false;
    258   return ProcessIterator::IncludeEntry();
    259 }
    260 
    261 
    262 // static
    263 ProcessMetrics* ProcessMetrics::CreateProcessMetrics(ProcessHandle process) {
    264   return new ProcessMetrics(process);
    265 }
    266 
    267 // On linux, we return vsize.
    268 size_t ProcessMetrics::GetPagefileUsage() const {
    269   std::vector<std::string> proc_stats;
    270   if (!GetProcStats(process_, &proc_stats))
    271     LOG(WARNING) << "Failed to get process stats.";
    272   const size_t kVmSize = 22;
    273   if (proc_stats.size() > kVmSize) {
    274     int vm_size;
    275     base::StringToInt(proc_stats[kVmSize], &vm_size);
    276     return static_cast<size_t>(vm_size);
    277   }
    278   return 0;
    279 }
    280 
    281 // On linux, we return the high water mark of vsize.
    282 size_t ProcessMetrics::GetPeakPagefileUsage() const {
    283   std::vector<std::string> proc_stats;
    284   if (!GetProcStats(process_, &proc_stats))
    285     LOG(WARNING) << "Failed to get process stats.";
    286   const size_t kVmPeak = 21;
    287   if (proc_stats.size() > kVmPeak) {
    288     int vm_peak;
    289     if (base::StringToInt(proc_stats[kVmPeak], &vm_peak))
    290       return vm_peak;
    291   }
    292   return 0;
    293 }
    294 
    295 // On linux, we return RSS.
    296 size_t ProcessMetrics::GetWorkingSetSize() const {
    297   std::vector<std::string> proc_stats;
    298   if (!GetProcStats(process_, &proc_stats))
    299     LOG(WARNING) << "Failed to get process stats.";
    300   const size_t kVmRss = 23;
    301   if (proc_stats.size() > kVmRss) {
    302     int num_pages;
    303     if (base::StringToInt(proc_stats[kVmRss], &num_pages))
    304       return static_cast<size_t>(num_pages) * getpagesize();
    305   }
    306   return 0;
    307 }
    308 
    309 // On linux, we return the high water mark of RSS.
    310 size_t ProcessMetrics::GetPeakWorkingSetSize() const {
    311   std::vector<std::string> proc_stats;
    312   if (!GetProcStats(process_, &proc_stats))
    313     LOG(WARNING) << "Failed to get process stats.";
    314   const size_t kVmHwm = 23;
    315   if (proc_stats.size() > kVmHwm) {
    316     int num_pages;
    317     base::StringToInt(proc_stats[kVmHwm], &num_pages);
    318     return static_cast<size_t>(num_pages) * getpagesize();
    319   }
    320   return 0;
    321 }
    322 
    323 bool ProcessMetrics::GetMemoryBytes(size_t* private_bytes,
    324                                     size_t* shared_bytes) {
    325   WorkingSetKBytes ws_usage;
    326   if (!GetWorkingSetKBytes(&ws_usage))
    327     return false;
    328 
    329   if (private_bytes)
    330     *private_bytes = ws_usage.priv << 10;
    331 
    332   if (shared_bytes)
    333     *shared_bytes = ws_usage.shared * 1024;
    334 
    335   return true;
    336 }
    337 
    338 // Private and Shared working set sizes are obtained from /proc/<pid>/smaps.
    339 // When that's not available, use the values from /proc<pid>/statm as a
    340 // close approximation.
    341 // See http://www.pixelbeat.org/scripts/ps_mem.py
    342 bool ProcessMetrics::GetWorkingSetKBytes(WorkingSetKBytes* ws_usage) const {
    343   // Synchronously reading files in /proc is safe.
    344   base::ThreadRestrictions::ScopedAllowIO allow_io;
    345 
    346   FilePath proc_dir = FilePath("/proc").Append(base::IntToString(process_));
    347   std::string smaps;
    348   int private_kb = 0;
    349   int pss_kb = 0;
    350   bool have_pss = false;
    351   bool ret;
    352 
    353   {
    354     FilePath smaps_file = proc_dir.Append("smaps");
    355     // Synchronously reading files in /proc is safe.
    356     base::ThreadRestrictions::ScopedAllowIO allow_io;
    357     ret = file_util::ReadFileToString(smaps_file, &smaps);
    358   }
    359   if (ret && smaps.length() > 0) {
    360     const std::string private_prefix = "Private_";
    361     const std::string pss_prefix = "Pss";
    362     StringTokenizer tokenizer(smaps, ":\n");
    363     StringPiece last_key_name;
    364     ParsingState state = KEY_NAME;
    365     while (tokenizer.GetNext()) {
    366       switch (state) {
    367         case KEY_NAME:
    368           last_key_name = tokenizer.token_piece();
    369           state = KEY_VALUE;
    370           break;
    371         case KEY_VALUE:
    372           if (last_key_name.empty()) {
    373             NOTREACHED();
    374             return false;
    375           }
    376           if (last_key_name.starts_with(private_prefix)) {
    377             int cur;
    378             base::StringToInt(tokenizer.token(), &cur);
    379             private_kb += cur;
    380           } else if (last_key_name.starts_with(pss_prefix)) {
    381             have_pss = true;
    382             int cur;
    383             base::StringToInt(tokenizer.token(), &cur);
    384             pss_kb += cur;
    385           }
    386           state = KEY_NAME;
    387           break;
    388       }
    389     }
    390   } else {
    391     // Try statm if smaps is empty because of the SUID sandbox.
    392     // First we need to get the page size though.
    393     int page_size_kb = sysconf(_SC_PAGE_SIZE) / 1024;
    394     if (page_size_kb <= 0)
    395       return false;
    396 
    397     std::string statm;
    398     {
    399       FilePath statm_file = proc_dir.Append("statm");
    400       // Synchronously reading files in /proc is safe.
    401       base::ThreadRestrictions::ScopedAllowIO allow_io;
    402       ret = file_util::ReadFileToString(statm_file, &statm);
    403     }
    404     if (!ret || statm.length() == 0)
    405       return false;
    406 
    407     std::vector<std::string> statm_vec;
    408     base::SplitString(statm, ' ', &statm_vec);
    409     if (statm_vec.size() != 7)
    410       return false;  // Not the format we expect.
    411 
    412     int statm1, statm2;
    413     base::StringToInt(statm_vec[1], &statm1);
    414     base::StringToInt(statm_vec[2], &statm2);
    415     private_kb = (statm1 - statm2) * page_size_kb;
    416   }
    417   ws_usage->priv = private_kb;
    418   // Sharable is not calculated, as it does not provide interesting data.
    419   ws_usage->shareable = 0;
    420 
    421   ws_usage->shared = 0;
    422   if (have_pss)
    423     ws_usage->shared = pss_kb;
    424   return true;
    425 }
    426 
    427 double ProcessMetrics::GetCPUUsage() {
    428   // This queries the /proc-specific scaling factor which is
    429   // conceptually the system hertz.  To dump this value on another
    430   // system, try
    431   //   od -t dL /proc/self/auxv
    432   // and look for the number after 17 in the output; mine is
    433   //   0000040          17         100           3   134512692
    434   // which means the answer is 100.
    435   // It may be the case that this value is always 100.
    436   static const int kHertz = sysconf(_SC_CLK_TCK);
    437 
    438   struct timeval now;
    439   int retval = gettimeofday(&now, NULL);
    440   if (retval)
    441     return 0;
    442   int64 time = TimeValToMicroseconds(now);
    443 
    444   if (last_time_ == 0) {
    445     // First call, just set the last values.
    446     last_time_ = time;
    447     last_cpu_ = GetProcessCPU(process_);
    448     return 0;
    449   }
    450 
    451   int64 time_delta = time - last_time_;
    452   DCHECK_NE(time_delta, 0);
    453   if (time_delta == 0)
    454     return 0;
    455 
    456   int cpu = GetProcessCPU(process_);
    457 
    458   // We have the number of jiffies in the time period.  Convert to percentage.
    459   // Note this means we will go *over* 100 in the case where multiple threads
    460   // are together adding to more than one CPU's worth.
    461   int percentage = 100 * (cpu - last_cpu_) /
    462       (kHertz * TimeDelta::FromMicroseconds(time_delta).InSecondsF());
    463 
    464   last_time_ = time;
    465   last_cpu_ = cpu;
    466 
    467   return percentage;
    468 }
    469 
    470 // To have /proc/self/io file you must enable CONFIG_TASK_IO_ACCOUNTING
    471 // in your kernel configuration.
    472 bool ProcessMetrics::GetIOCounters(IoCounters* io_counters) const {
    473   // Synchronously reading files in /proc is safe.
    474   base::ThreadRestrictions::ScopedAllowIO allow_io;
    475 
    476   std::string proc_io_contents;
    477   FilePath io_file("/proc");
    478   io_file = io_file.Append(base::IntToString(process_));
    479   io_file = io_file.Append("io");
    480   if (!file_util::ReadFileToString(io_file, &proc_io_contents))
    481     return false;
    482 
    483   (*io_counters).OtherOperationCount = 0;
    484   (*io_counters).OtherTransferCount = 0;
    485 
    486   StringTokenizer tokenizer(proc_io_contents, ": \n");
    487   ParsingState state = KEY_NAME;
    488   std::string last_key_name;
    489   while (tokenizer.GetNext()) {
    490     switch (state) {
    491       case KEY_NAME:
    492         last_key_name = tokenizer.token();
    493         state = KEY_VALUE;
    494         break;
    495       case KEY_VALUE:
    496         DCHECK(!last_key_name.empty());
    497         if (last_key_name == "syscr") {
    498           base::StringToInt64(tokenizer.token(),
    499               reinterpret_cast<int64*>(&(*io_counters).ReadOperationCount));
    500         } else if (last_key_name == "syscw") {
    501           base::StringToInt64(tokenizer.token(),
    502               reinterpret_cast<int64*>(&(*io_counters).WriteOperationCount));
    503         } else if (last_key_name == "rchar") {
    504           base::StringToInt64(tokenizer.token(),
    505               reinterpret_cast<int64*>(&(*io_counters).ReadTransferCount));
    506         } else if (last_key_name == "wchar") {
    507           base::StringToInt64(tokenizer.token(),
    508               reinterpret_cast<int64*>(&(*io_counters).WriteTransferCount));
    509         }
    510         state = KEY_NAME;
    511         break;
    512     }
    513   }
    514   return true;
    515 }
    516 
    517 ProcessMetrics::ProcessMetrics(ProcessHandle process)
    518     : process_(process),
    519       last_time_(0),
    520       last_system_time_(0),
    521       last_cpu_(0) {
    522   processor_count_ = base::SysInfo::NumberOfProcessors();
    523 }
    524 
    525 
    526 // Exposed for testing.
    527 int ParseProcStatCPU(const std::string& input) {
    528   // /proc/<pid>/stat contains the process name in parens.  In case the
    529   // process name itself contains parens, skip past them.
    530   std::string::size_type rparen = input.rfind(')');
    531   if (rparen == std::string::npos)
    532     return -1;
    533 
    534   // From here, we expect a bunch of space-separated fields, where the
    535   // 0-indexed 11th and 12th are utime and stime.  On two different machines
    536   // I found 42 and 39 fields, so let's just expect the ones we need.
    537   std::vector<std::string> fields;
    538   base::SplitString(input.substr(rparen + 2), ' ', &fields);
    539   if (fields.size() < 13)
    540     return -1;  // Output not in the format we expect.
    541 
    542   int fields11, fields12;
    543   base::StringToInt(fields[11], &fields11);
    544   base::StringToInt(fields[12], &fields12);
    545   return fields11 + fields12;
    546 }
    547 
    548 namespace {
    549 
    550 // The format of /proc/meminfo is:
    551 //
    552 // MemTotal:      8235324 kB
    553 // MemFree:       1628304 kB
    554 // Buffers:        429596 kB
    555 // Cached:        4728232 kB
    556 // ...
    557 const size_t kMemTotalIndex = 1;
    558 const size_t kMemFreeIndex = 4;
    559 const size_t kMemBuffersIndex = 7;
    560 const size_t kMemCacheIndex = 10;
    561 
    562 }  // namespace
    563 
    564 size_t GetSystemCommitCharge() {
    565   // Synchronously reading files in /proc is safe.
    566   base::ThreadRestrictions::ScopedAllowIO allow_io;
    567 
    568   // Used memory is: total - free - buffers - caches
    569   FilePath meminfo_file("/proc/meminfo");
    570   std::string meminfo_data;
    571   if (!file_util::ReadFileToString(meminfo_file, &meminfo_data)) {
    572     LOG(WARNING) << "Failed to open /proc/meminfo.";
    573     return 0;
    574   }
    575   std::vector<std::string> meminfo_fields;
    576   SplitStringAlongWhitespace(meminfo_data, &meminfo_fields);
    577 
    578   if (meminfo_fields.size() < kMemCacheIndex) {
    579     LOG(WARNING) << "Failed to parse /proc/meminfo.  Only found " <<
    580       meminfo_fields.size() << " fields.";
    581     return 0;
    582   }
    583 
    584   DCHECK_EQ(meminfo_fields[kMemTotalIndex-1], "MemTotal:");
    585   DCHECK_EQ(meminfo_fields[kMemFreeIndex-1], "MemFree:");
    586   DCHECK_EQ(meminfo_fields[kMemBuffersIndex-1], "Buffers:");
    587   DCHECK_EQ(meminfo_fields[kMemCacheIndex-1], "Cached:");
    588 
    589   int mem_total, mem_free, mem_buffers, mem_cache;
    590   base::StringToInt(meminfo_fields[kMemTotalIndex], &mem_total);
    591   base::StringToInt(meminfo_fields[kMemFreeIndex], &mem_free);
    592   base::StringToInt(meminfo_fields[kMemBuffersIndex], &mem_buffers);
    593   base::StringToInt(meminfo_fields[kMemCacheIndex], &mem_cache);
    594 
    595   return mem_total - mem_free - mem_buffers - mem_cache;
    596 }
    597 
    598 namespace {
    599 
    600 void OnNoMemorySize(size_t size) {
    601   if (size != 0)
    602     LOG(FATAL) << "Out of memory, size = " << size;
    603   LOG(FATAL) << "Out of memory.";
    604 }
    605 
    606 void OnNoMemory() {
    607   OnNoMemorySize(0);
    608 }
    609 
    610 }  // namespace
    611 
    612 extern "C" {
    613 #if !defined(USE_TCMALLOC)
    614 
    615 extern "C" {
    616 void* __libc_malloc(size_t size);
    617 void* __libc_realloc(void* ptr, size_t size);
    618 void* __libc_calloc(size_t nmemb, size_t size);
    619 void* __libc_valloc(size_t size);
    620 void* __libc_pvalloc(size_t size);
    621 void* __libc_memalign(size_t alignment, size_t size);
    622 }  // extern "C"
    623 
    624 // Overriding the system memory allocation functions:
    625 //
    626 // For security reasons, we want malloc failures to be fatal. Too much code
    627 // doesn't check for a NULL return value from malloc and unconditionally uses
    628 // the resulting pointer. If the first offset that they try to access is
    629 // attacker controlled, then the attacker can direct the code to access any
    630 // part of memory.
    631 //
    632 // Thus, we define all the standard malloc functions here and mark them as
    633 // visibility 'default'. This means that they replace the malloc functions for
    634 // all Chromium code and also for all code in shared libraries. There are tests
    635 // for this in process_util_unittest.cc.
    636 //
    637 // If we are using tcmalloc, then the problem is moot since tcmalloc handles
    638 // this for us. Thus this code is in a !defined(USE_TCMALLOC) block.
    639 //
    640 // We call the real libc functions in this code by using __libc_malloc etc.
    641 // Previously we tried using dlsym(RTLD_NEXT, ...) but that failed depending on
    642 // the link order. Since ld.so needs calloc during symbol resolution, it
    643 // defines its own versions of several of these functions in dl-minimal.c.
    644 // Depending on the runtime library order, dlsym ended up giving us those
    645 // functions and bad things happened. See crbug.com/31809
    646 //
    647 // This means that any code which calls __libc_* gets the raw libc versions of
    648 // these functions.
    649 
    650 #define DIE_ON_OOM_1(function_name) \
    651   void* function_name(size_t) __attribute__ ((visibility("default"))); \
    652   \
    653   void* function_name(size_t size) { \
    654     void* ret = __libc_##function_name(size); \
    655     if (ret == NULL && size != 0) \
    656       OnNoMemorySize(size); \
    657     return ret; \
    658   }
    659 
    660 #define DIE_ON_OOM_2(function_name, arg1_type) \
    661   void* function_name(arg1_type, size_t) \
    662       __attribute__ ((visibility("default"))); \
    663   \
    664   void* function_name(arg1_type arg1, size_t size) { \
    665     void* ret = __libc_##function_name(arg1, size); \
    666     if (ret == NULL && size != 0) \
    667       OnNoMemorySize(size); \
    668     return ret; \
    669   }
    670 
    671 DIE_ON_OOM_1(malloc)
    672 DIE_ON_OOM_1(valloc)
    673 DIE_ON_OOM_1(pvalloc)
    674 
    675 DIE_ON_OOM_2(calloc, size_t)
    676 DIE_ON_OOM_2(realloc, void*)
    677 DIE_ON_OOM_2(memalign, size_t)
    678 
    679 // posix_memalign has a unique signature and doesn't have a __libc_ variant.
    680 int posix_memalign(void** ptr, size_t alignment, size_t size)
    681     __attribute__ ((visibility("default")));
    682 
    683 int posix_memalign(void** ptr, size_t alignment, size_t size) {
    684   // This will use the safe version of memalign, above.
    685   *ptr = memalign(alignment, size);
    686   return 0;
    687 }
    688 
    689 #endif  // !defined(USE_TCMALLOC)
    690 }  // extern C
    691 
    692 void EnableTerminationOnOutOfMemory() {
    693   // Set the new-out of memory handler.
    694   std::set_new_handler(&OnNoMemory);
    695   // If we're using glibc's allocator, the above functions will override
    696   // malloc and friends and make them die on out of memory.
    697 }
    698 
    699 bool AdjustOOMScore(ProcessId process, int score) {
    700   if (score < 0 || score > 15)
    701     return false;
    702 
    703   FilePath oom_adj("/proc");
    704   oom_adj = oom_adj.Append(base::Int64ToString(process));
    705   oom_adj = oom_adj.AppendASCII("oom_adj");
    706 
    707   if (!file_util::PathExists(oom_adj))
    708     return false;
    709 
    710   std::string score_str = base::IntToString(score);
    711   return (static_cast<int>(score_str.length()) ==
    712           file_util::WriteFile(oom_adj, score_str.c_str(), score_str.length()));
    713 }
    714 
    715 }  // namespace base
    716