OLD | NEW |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
2 // Use of this source code is governed by a BSD-style license that can be | 2 // Use of this source code is governed by a BSD-style license that can be |
3 // found in the LICENSE file. | 3 // found in the LICENSE file. |
4 | 4 |
5 #include "base/trace_event/process_memory_maps_dump_provider.h" | 5 #include "base/trace_event/process_memory_maps_dump_provider.h" |
6 | 6 |
7 #include <fstream> | 7 #include <fstream> |
8 #include <sstream> | 8 #include <sstream> |
9 | 9 |
10 #include "base/trace_event/process_memory_dump.h" | 10 #include "base/trace_event/process_memory_dump.h" |
(...skipping 100 matching lines...) Expand 10 before | Expand all | Expand 10 after Loading... |
111 const uint32 kProtW = ProcessMemoryMaps::VMRegion::kProtectionFlagsWrite; | 111 const uint32 kProtW = ProcessMemoryMaps::VMRegion::kProtectionFlagsWrite; |
112 const uint32 kProtX = ProcessMemoryMaps::VMRegion::kProtectionFlagsExec; | 112 const uint32 kProtX = ProcessMemoryMaps::VMRegion::kProtectionFlagsExec; |
113 | 113 |
114 auto pmmdp = ProcessMemoryMapsDumpProvider::GetInstance(); | 114 auto pmmdp = ProcessMemoryMapsDumpProvider::GetInstance(); |
115 | 115 |
116 // Emulate a non-existent /proc/self/smaps. | 116 // Emulate a non-existent /proc/self/smaps. |
117 ProcessMemoryDump pmd_invalid(nullptr /* session_state */); | 117 ProcessMemoryDump pmd_invalid(nullptr /* session_state */); |
118 std::ifstream non_existent_file("/tmp/does-not-exist"); | 118 std::ifstream non_existent_file("/tmp/does-not-exist"); |
119 ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = &non_existent_file; | 119 ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = &non_existent_file; |
120 CHECK_EQ(false, non_existent_file.good()); | 120 CHECK_EQ(false, non_existent_file.good()); |
121 pmmdp->DumpInto(&pmd_invalid); | 121 pmmdp->OnMemoryDump(&pmd_invalid); |
122 ASSERT_FALSE(pmd_invalid.has_process_mmaps()); | 122 ASSERT_FALSE(pmd_invalid.has_process_mmaps()); |
123 | 123 |
124 // Emulate an empty /proc/self/smaps. | 124 // Emulate an empty /proc/self/smaps. |
125 std::ifstream empty_file("/dev/null"); | 125 std::ifstream empty_file("/dev/null"); |
126 ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = &empty_file; | 126 ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = &empty_file; |
127 CHECK_EQ(true, empty_file.good()); | 127 CHECK_EQ(true, empty_file.good()); |
128 pmmdp->DumpInto(&pmd_invalid); | 128 pmmdp->OnMemoryDump(&pmd_invalid); |
129 ASSERT_FALSE(pmd_invalid.has_process_mmaps()); | 129 ASSERT_FALSE(pmd_invalid.has_process_mmaps()); |
130 | 130 |
131 // Parse the 1st smaps file. | 131 // Parse the 1st smaps file. |
132 ProcessMemoryDump pmd_1(nullptr /* session_state */); | 132 ProcessMemoryDump pmd_1(nullptr /* session_state */); |
133 std::istringstream test_smaps_1(kTestSmaps1); | 133 std::istringstream test_smaps_1(kTestSmaps1); |
134 ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = &test_smaps_1; | 134 ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = &test_smaps_1; |
135 pmmdp->DumpInto(&pmd_1); | 135 pmmdp->OnMemoryDump(&pmd_1); |
136 ASSERT_TRUE(pmd_1.has_process_mmaps()); | 136 ASSERT_TRUE(pmd_1.has_process_mmaps()); |
137 const auto& regions_1 = pmd_1.process_mmaps()->vm_regions(); | 137 const auto& regions_1 = pmd_1.process_mmaps()->vm_regions(); |
138 ASSERT_EQ(2UL, regions_1.size()); | 138 ASSERT_EQ(2UL, regions_1.size()); |
139 | 139 |
140 EXPECT_EQ(0x00400000UL, regions_1[0].start_address); | 140 EXPECT_EQ(0x00400000UL, regions_1[0].start_address); |
141 EXPECT_EQ(0x004be000UL - 0x00400000UL, regions_1[0].size_in_bytes); | 141 EXPECT_EQ(0x004be000UL - 0x00400000UL, regions_1[0].size_in_bytes); |
142 EXPECT_EQ(kProtR | kProtX, regions_1[0].protection_flags); | 142 EXPECT_EQ(kProtR | kProtX, regions_1[0].protection_flags); |
143 EXPECT_EQ("/file/1", regions_1[0].mapped_file); | 143 EXPECT_EQ("/file/1", regions_1[0].mapped_file); |
144 EXPECT_EQ(162 * 1024UL, regions_1[0].byte_stats_proportional_resident); | 144 EXPECT_EQ(162 * 1024UL, regions_1[0].byte_stats_proportional_resident); |
145 EXPECT_EQ((228 + 0) * 1024UL, regions_1[0].byte_stats_shared_resident); | 145 EXPECT_EQ((228 + 0) * 1024UL, regions_1[0].byte_stats_shared_resident); |
146 EXPECT_EQ((0 + 68) * 1024UL, regions_1[0].byte_stats_private_resident); | 146 EXPECT_EQ((0 + 68) * 1024UL, regions_1[0].byte_stats_private_resident); |
147 | 147 |
148 EXPECT_EQ(0xff000000UL, regions_1[1].start_address); | 148 EXPECT_EQ(0xff000000UL, regions_1[1].start_address); |
149 EXPECT_EQ(0xff800000UL - 0xff000000UL, regions_1[1].size_in_bytes); | 149 EXPECT_EQ(0xff800000UL - 0xff000000UL, regions_1[1].size_in_bytes); |
150 EXPECT_EQ(kProtW, regions_1[1].protection_flags); | 150 EXPECT_EQ(kProtW, regions_1[1].protection_flags); |
151 EXPECT_EQ("/file/name with space", regions_1[1].mapped_file); | 151 EXPECT_EQ("/file/name with space", regions_1[1].mapped_file); |
152 EXPECT_EQ(128 * 1024UL, regions_1[1].byte_stats_proportional_resident); | 152 EXPECT_EQ(128 * 1024UL, regions_1[1].byte_stats_proportional_resident); |
153 EXPECT_EQ((120 + 4) * 1024UL, regions_1[1].byte_stats_shared_resident); | 153 EXPECT_EQ((120 + 4) * 1024UL, regions_1[1].byte_stats_shared_resident); |
154 EXPECT_EQ((60 + 8) * 1024UL, regions_1[1].byte_stats_private_resident); | 154 EXPECT_EQ((60 + 8) * 1024UL, regions_1[1].byte_stats_private_resident); |
155 | 155 |
156 // Parse the 2nd smaps file. | 156 // Parse the 2nd smaps file. |
157 ProcessMemoryDump pmd_2(nullptr /* session_state */); | 157 ProcessMemoryDump pmd_2(nullptr /* session_state */); |
158 std::istringstream test_smaps_2(kTestSmaps2); | 158 std::istringstream test_smaps_2(kTestSmaps2); |
159 ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = &test_smaps_2; | 159 ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = &test_smaps_2; |
160 pmmdp->DumpInto(&pmd_2); | 160 pmmdp->OnMemoryDump(&pmd_2); |
161 ASSERT_TRUE(pmd_2.has_process_mmaps()); | 161 ASSERT_TRUE(pmd_2.has_process_mmaps()); |
162 const auto& regions_2 = pmd_2.process_mmaps()->vm_regions(); | 162 const auto& regions_2 = pmd_2.process_mmaps()->vm_regions(); |
163 ASSERT_EQ(1UL, regions_2.size()); | 163 ASSERT_EQ(1UL, regions_2.size()); |
164 EXPECT_EQ(0x7fe7ce79c000UL, regions_2[0].start_address); | 164 EXPECT_EQ(0x7fe7ce79c000UL, regions_2[0].start_address); |
165 EXPECT_EQ(0x7fe7ce7a8000UL - 0x7fe7ce79c000UL, regions_2[0].size_in_bytes); | 165 EXPECT_EQ(0x7fe7ce7a8000UL - 0x7fe7ce79c000UL, regions_2[0].size_in_bytes); |
166 EXPECT_EQ(0U, regions_2[0].protection_flags); | 166 EXPECT_EQ(0U, regions_2[0].protection_flags); |
167 EXPECT_EQ("", regions_2[0].mapped_file); | 167 EXPECT_EQ("", regions_2[0].mapped_file); |
168 EXPECT_EQ(32 * 1024UL, regions_2[0].byte_stats_proportional_resident); | 168 EXPECT_EQ(32 * 1024UL, regions_2[0].byte_stats_proportional_resident); |
169 EXPECT_EQ((16 + 12) * 1024UL, regions_2[0].byte_stats_shared_resident); | 169 EXPECT_EQ((16 + 12) * 1024UL, regions_2[0].byte_stats_shared_resident); |
170 EXPECT_EQ((8 + 4) * 1024UL, regions_2[0].byte_stats_private_resident); | 170 EXPECT_EQ((8 + 4) * 1024UL, regions_2[0].byte_stats_private_resident); |
171 } | 171 } |
172 #endif // defined(OS_LINUX) || defined(OS_ANDROID) | 172 #endif // defined(OS_LINUX) || defined(OS_ANDROID) |
173 | 173 |
174 } // namespace trace_event | 174 } // namespace trace_event |
175 } // namespace base | 175 } // namespace base |
OLD | NEW |