Chromium Code Reviews
chromiumcodereview-hr@appspot.gserviceaccount.com (chromiumcodereview-hr) | Please choose your nickname with Settings | Help | Chromium Project | Gerrit Changes | Sign out
(104)

Side by Side Diff: base/trace_event/process_memory_maps_dump_provider_unittest.cc

Issue 1417003003: [tracing] Dump child processes' memory metrics in browser (Closed) Base URL: https://chromium.googlesource.com/chromium/src.git@web_cache2_base
Patch Set: dNits. Created 5 years, 1 month ago
Use n/p to move between diff chunks; N/P to move between comments. Draft comments are only viewable by you.
Jump to:
View unified diff | Download patch
OLDNEW
(Empty)
1 // Copyright 2015 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4
5 #include "base/trace_event/process_memory_maps_dump_provider.h"
6
7 #include "base/files/file_util.h"
8 #include "base/trace_event/process_memory_dump.h"
9 #include "base/trace_event/process_memory_maps.h"
10 #include "base/trace_event/trace_event_argument.h"
11 #include "testing/gtest/include/gtest/gtest.h"
12
13 namespace base {
14 namespace trace_event {
15
16 namespace {
17 const char kTestSmaps1[] =
18 "00400000-004be000 r-xp 00000000 fc:01 1234 /file/1\n"
19 "Size: 760 kB\n"
20 "Rss: 296 kB\n"
21 "Pss: 162 kB\n"
22 "Shared_Clean: 228 kB\n"
23 "Shared_Dirty: 0 kB\n"
24 "Private_Clean: 0 kB\n"
25 "Private_Dirty: 68 kB\n"
26 "Referenced: 296 kB\n"
27 "Anonymous: 68 kB\n"
28 "AnonHugePages: 0 kB\n"
29 "Swap: 4 kB\n"
30 "KernelPageSize: 4 kB\n"
31 "MMUPageSize: 4 kB\n"
32 "Locked: 0 kB\n"
33 "VmFlags: rd ex mr mw me dw sd\n"
34 "ff000000-ff800000 -w-p 00001080 fc:01 0 /file/name with space\n"
35 "Size: 0 kB\n"
36 "Rss: 192 kB\n"
37 "Pss: 128 kB\n"
38 "Shared_Clean: 120 kB\n"
39 "Shared_Dirty: 4 kB\n"
40 "Private_Clean: 60 kB\n"
41 "Private_Dirty: 8 kB\n"
42 "Referenced: 296 kB\n"
43 "Anonymous: 0 kB\n"
44 "AnonHugePages: 0 kB\n"
45 "Swap: 0 kB\n"
46 "KernelPageSize: 4 kB\n"
47 "MMUPageSize: 4 kB\n"
48 "Locked: 0 kB\n"
49 "VmFlags: rd ex mr mw me dw sd";
50
51 const char kTestSmaps2[] =
52 // An invalid region, with zero size and overlapping with the last one
53 // (See crbug.com/461237).
54 "7fe7ce79c000-7fe7ce79c000 ---p 00000000 00:00 0 \n"
55 "Size: 4 kB\n"
56 "Rss: 0 kB\n"
57 "Pss: 0 kB\n"
58 "Shared_Clean: 0 kB\n"
59 "Shared_Dirty: 0 kB\n"
60 "Private_Clean: 0 kB\n"
61 "Private_Dirty: 0 kB\n"
62 "Referenced: 0 kB\n"
63 "Anonymous: 0 kB\n"
64 "AnonHugePages: 0 kB\n"
65 "Swap: 0 kB\n"
66 "KernelPageSize: 4 kB\n"
67 "MMUPageSize: 4 kB\n"
68 "Locked: 0 kB\n"
69 "VmFlags: rd ex mr mw me dw sd\n"
70 // A invalid region with its range going backwards.
71 "00400000-00200000 ---p 00000000 00:00 0 \n"
72 "Size: 4 kB\n"
73 "Rss: 0 kB\n"
74 "Pss: 0 kB\n"
75 "Shared_Clean: 0 kB\n"
76 "Shared_Dirty: 0 kB\n"
77 "Private_Clean: 0 kB\n"
78 "Private_Dirty: 0 kB\n"
79 "Referenced: 0 kB\n"
80 "Anonymous: 0 kB\n"
81 "AnonHugePages: 0 kB\n"
82 "Swap: 0 kB\n"
83 "KernelPageSize: 4 kB\n"
84 "MMUPageSize: 4 kB\n"
85 "Locked: 0 kB\n"
86 "VmFlags: rd ex mr mw me dw sd\n"
87 // A good anonymous region at the end.
88 "7fe7ce79c000-7fe7ce7a8000 ---p 00000000 00:00 0 \n"
89 "Size: 48 kB\n"
90 "Rss: 40 kB\n"
91 "Pss: 32 kB\n"
92 "Shared_Clean: 16 kB\n"
93 "Shared_Dirty: 12 kB\n"
94 "Private_Clean: 8 kB\n"
95 "Private_Dirty: 4 kB\n"
96 "Referenced: 40 kB\n"
97 "Anonymous: 16 kB\n"
98 "AnonHugePages: 0 kB\n"
99 "Swap: 0 kB\n"
100 "KernelPageSize: 4 kB\n"
101 "MMUPageSize: 4 kB\n"
102 "Locked: 0 kB\n"
103 "VmFlags: rd wr mr mw me ac sd\n";
104
105 void CreateAndSetSmapsFileForTesting(const char* smaps_string,
106 ScopedFILE& file) {
107 FilePath temp_path;
108 FILE* temp_file = CreateAndOpenTemporaryFile(&temp_path);
109 file.reset(temp_file);
110 ASSERT_TRUE(temp_file);
111
112 ASSERT_TRUE(base::WriteFileDescriptor(fileno(temp_file), smaps_string,
113 strlen(smaps_string)));
114 }
115
116 } // namespace
117
118 TEST(ProcessMemoryMapsDumpProviderTest, ParseProcSmaps) {
119 const uint32 kProtR = ProcessMemoryMaps::VMRegion::kProtectionFlagsRead;
120 const uint32 kProtW = ProcessMemoryMaps::VMRegion::kProtectionFlagsWrite;
121 const uint32 kProtX = ProcessMemoryMaps::VMRegion::kProtectionFlagsExec;
122 const MemoryDumpArgs dump_args = {MemoryDumpLevelOfDetail::DETAILED};
123
124 auto pmmdp = ProcessMemoryMapsDumpProvider::GetInstance();
125
126 // Emulate an empty /proc/self/smaps.
127 ProcessMemoryDump pmd_invalid(nullptr /* session_state */);
128 ScopedFILE empty_file(OpenFile(FilePath("/dev/null"), "r"));
129 ASSERT_TRUE(empty_file.get());
130 ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = empty_file.get();
131 pmmdp->OnMemoryDump(dump_args, &pmd_invalid);
132 ASSERT_FALSE(pmd_invalid.has_process_mmaps());
133
134 // Parse the 1st smaps file.
135 ProcessMemoryDump pmd_1(nullptr /* session_state */);
136 ScopedFILE temp_file1;
137 CreateAndSetSmapsFileForTesting(kTestSmaps1, temp_file1);
138 ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = temp_file1.get();
139 pmmdp->OnMemoryDump(dump_args, &pmd_1);
140 ASSERT_TRUE(pmd_1.has_process_mmaps());
141 const auto& regions_1 = pmd_1.process_mmaps()->vm_regions();
142 ASSERT_EQ(2UL, regions_1.size());
143
144 EXPECT_EQ(0x00400000UL, regions_1[0].start_address);
145 EXPECT_EQ(0x004be000UL - 0x00400000UL, regions_1[0].size_in_bytes);
146 EXPECT_EQ(kProtR | kProtX, regions_1[0].protection_flags);
147 EXPECT_EQ("/file/1", regions_1[0].mapped_file);
148 EXPECT_EQ(162 * 1024UL, regions_1[0].byte_stats_proportional_resident);
149 EXPECT_EQ(228 * 1024UL, regions_1[0].byte_stats_shared_clean_resident);
150 EXPECT_EQ(0UL, regions_1[0].byte_stats_shared_dirty_resident);
151 EXPECT_EQ(0UL, regions_1[0].byte_stats_private_clean_resident);
152 EXPECT_EQ(68 * 1024UL, regions_1[0].byte_stats_private_dirty_resident);
153 EXPECT_EQ(4 * 1024UL, regions_1[0].byte_stats_swapped);
154
155 EXPECT_EQ(0xff000000UL, regions_1[1].start_address);
156 EXPECT_EQ(0xff800000UL - 0xff000000UL, regions_1[1].size_in_bytes);
157 EXPECT_EQ(kProtW, regions_1[1].protection_flags);
158 EXPECT_EQ("/file/name with space", regions_1[1].mapped_file);
159 EXPECT_EQ(128 * 1024UL, regions_1[1].byte_stats_proportional_resident);
160 EXPECT_EQ(120 * 1024UL, regions_1[1].byte_stats_shared_clean_resident);
161 EXPECT_EQ(4 * 1024UL, regions_1[1].byte_stats_shared_dirty_resident);
162 EXPECT_EQ(60 * 1024UL, regions_1[1].byte_stats_private_clean_resident);
163 EXPECT_EQ(8 * 1024UL, regions_1[1].byte_stats_private_dirty_resident);
164 EXPECT_EQ(0 * 1024UL, regions_1[1].byte_stats_swapped);
165
166 // Parse the 2nd smaps file.
167 ProcessMemoryDump pmd_2(nullptr /* session_state */);
168 ScopedFILE temp_file2;
169 CreateAndSetSmapsFileForTesting(kTestSmaps2, temp_file2);
170 ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = temp_file2.get();
171 pmmdp->OnMemoryDump(dump_args, &pmd_2);
172 ASSERT_TRUE(pmd_2.has_process_mmaps());
173 const auto& regions_2 = pmd_2.process_mmaps()->vm_regions();
174 ASSERT_EQ(1UL, regions_2.size());
175 EXPECT_EQ(0x7fe7ce79c000UL, regions_2[0].start_address);
176 EXPECT_EQ(0x7fe7ce7a8000UL - 0x7fe7ce79c000UL, regions_2[0].size_in_bytes);
177 EXPECT_EQ(0U, regions_2[0].protection_flags);
178 EXPECT_EQ("", regions_2[0].mapped_file);
179 EXPECT_EQ(32 * 1024UL, regions_2[0].byte_stats_proportional_resident);
180 EXPECT_EQ(16 * 1024UL, regions_2[0].byte_stats_shared_clean_resident);
181 EXPECT_EQ(12 * 1024UL, regions_2[0].byte_stats_shared_dirty_resident);
182 EXPECT_EQ(8 * 1024UL, regions_2[0].byte_stats_private_clean_resident);
183 EXPECT_EQ(4 * 1024UL, regions_2[0].byte_stats_private_dirty_resident);
184 EXPECT_EQ(0 * 1024UL, regions_2[0].byte_stats_swapped);
185 }
186
187 } // namespace trace_event
188 } // namespace base
OLDNEW

Powered by Google App Engine
This is Rietveld 408576698