OLD | NEW |
| (Empty) |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "base/trace_event/process_memory_maps_dump_provider.h" | |
6 | |
7 #include <stdint.h> | |
8 | |
9 #include "base/files/scoped_file.h" | |
10 #include "base/format_macros.h" | |
11 #include "base/logging.h" | |
12 #include "base/strings/string_util.h" | |
13 #include "base/trace_event/process_memory_dump.h" | |
14 #include "base/trace_event/process_memory_maps.h" | |
15 | |
16 namespace base { | |
17 namespace trace_event { | |
18 | |
19 // static | |
20 FILE* ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = nullptr; | |
21 | |
22 namespace { | |
23 | |
24 const uint32_t kMaxLineSize = 4096; | |
25 | |
26 bool ParseSmapsHeader(const char* header_line, | |
27 ProcessMemoryMaps::VMRegion* region) { | |
28 // e.g., "00400000-00421000 r-xp 00000000 fc:01 1234 /foo.so\n" | |
29 bool res = true; // Whether this region should be appended or skipped. | |
30 uint64_t end_addr = 0; | |
31 char protection_flags[5] = {0}; | |
32 char mapped_file[kMaxLineSize]; | |
33 | |
34 if (sscanf(header_line, "%" SCNx64 "-%" SCNx64 " %4c %*s %*s %*s%4095[^\n]\n", | |
35 ®ion->start_address, &end_addr, protection_flags, | |
36 mapped_file) != 4) | |
37 return false; | |
38 | |
39 if (end_addr > region->start_address) { | |
40 region->size_in_bytes = end_addr - region->start_address; | |
41 } else { | |
42 // This is not just paranoia, it can actually happen (See crbug.com/461237). | |
43 region->size_in_bytes = 0; | |
44 res = false; | |
45 } | |
46 | |
47 region->protection_flags = 0; | |
48 if (protection_flags[0] == 'r') { | |
49 region->protection_flags |= | |
50 ProcessMemoryMaps::VMRegion::kProtectionFlagsRead; | |
51 } | |
52 if (protection_flags[1] == 'w') { | |
53 region->protection_flags |= | |
54 ProcessMemoryMaps::VMRegion::kProtectionFlagsWrite; | |
55 } | |
56 if (protection_flags[2] == 'x') { | |
57 region->protection_flags |= | |
58 ProcessMemoryMaps::VMRegion::kProtectionFlagsExec; | |
59 } | |
60 | |
61 region->mapped_file = mapped_file; | |
62 TrimWhitespaceASCII(region->mapped_file, TRIM_ALL, ®ion->mapped_file); | |
63 | |
64 return res; | |
65 } | |
66 | |
67 uint64_t ReadCounterBytes(char* counter_line) { | |
68 uint64_t counter_value = 0; | |
69 int res = sscanf(counter_line, "%*s %" SCNu64 " kB", &counter_value); | |
70 DCHECK_EQ(1, res); | |
71 return counter_value * 1024; | |
72 } | |
73 | |
74 uint32_t ParseSmapsCounter(char* counter_line, | |
75 ProcessMemoryMaps::VMRegion* region) { | |
76 // A smaps counter lines looks as follows: "RSS: 0 Kb\n" | |
77 uint32_t res = 1; | |
78 char counter_name[20]; | |
79 int did_read = sscanf(counter_line, "%19[^\n ]", counter_name); | |
80 DCHECK_EQ(1, did_read); | |
81 | |
82 if (strcmp(counter_name, "Pss:") == 0) { | |
83 region->byte_stats_proportional_resident = ReadCounterBytes(counter_line); | |
84 } else if (strcmp(counter_name, "Private_Dirty:") == 0) { | |
85 region->byte_stats_private_dirty_resident = ReadCounterBytes(counter_line); | |
86 } else if (strcmp(counter_name, "Private_Clean:") == 0) { | |
87 region->byte_stats_private_clean_resident = ReadCounterBytes(counter_line); | |
88 } else if (strcmp(counter_name, "Shared_Dirty:") == 0) { | |
89 region->byte_stats_shared_dirty_resident = ReadCounterBytes(counter_line); | |
90 } else if (strcmp(counter_name, "Shared_Clean:") == 0) { | |
91 region->byte_stats_shared_clean_resident = ReadCounterBytes(counter_line); | |
92 } else if (strcmp(counter_name, "Swap:") == 0) { | |
93 region->byte_stats_swapped = ReadCounterBytes(counter_line); | |
94 } else { | |
95 res = 0; | |
96 } | |
97 | |
98 return res; | |
99 } | |
100 | |
101 uint32_t ReadLinuxProcSmapsFile(FILE* smaps_file, ProcessMemoryMaps* pmm) { | |
102 if (!smaps_file) | |
103 return 0; | |
104 | |
105 fseek(smaps_file, 0, SEEK_SET); | |
106 | |
107 char line[kMaxLineSize]; | |
108 const uint32_t kNumExpectedCountersPerRegion = 6; | |
109 uint32_t counters_parsed_for_current_region = 0; | |
110 uint32_t num_valid_regions = 0; | |
111 ProcessMemoryMaps::VMRegion region; | |
112 bool should_add_current_region = false; | |
113 for (;;) { | |
114 line[0] = '\0'; | |
115 if (fgets(line, kMaxLineSize, smaps_file) == nullptr) | |
116 break; | |
117 DCHECK_GT(strlen(line), 0u); | |
118 if (isxdigit(line[0]) && !isupper(line[0])) { | |
119 region = ProcessMemoryMaps::VMRegion(); | |
120 counters_parsed_for_current_region = 0; | |
121 should_add_current_region = ParseSmapsHeader(line, ®ion); | |
122 } else { | |
123 counters_parsed_for_current_region += ParseSmapsCounter(line, ®ion); | |
124 DCHECK_LE(counters_parsed_for_current_region, | |
125 kNumExpectedCountersPerRegion); | |
126 if (counters_parsed_for_current_region == kNumExpectedCountersPerRegion) { | |
127 if (should_add_current_region) { | |
128 pmm->AddVMRegion(region); | |
129 ++num_valid_regions; | |
130 should_add_current_region = false; | |
131 } | |
132 } | |
133 } | |
134 } | |
135 return num_valid_regions; | |
136 } | |
137 | |
138 } // namespace | |
139 | |
140 // static | |
141 ProcessMemoryMapsDumpProvider* ProcessMemoryMapsDumpProvider::GetInstance() { | |
142 return Singleton<ProcessMemoryMapsDumpProvider, | |
143 LeakySingletonTraits<ProcessMemoryMapsDumpProvider>>::get(); | |
144 } | |
145 | |
146 ProcessMemoryMapsDumpProvider::ProcessMemoryMapsDumpProvider() { | |
147 } | |
148 | |
149 ProcessMemoryMapsDumpProvider::~ProcessMemoryMapsDumpProvider() { | |
150 } | |
151 | |
152 // Called at trace dump point time. Creates a snapshot of the memory maps for | |
153 // the current process. | |
154 bool ProcessMemoryMapsDumpProvider::OnMemoryDump(const MemoryDumpArgs& args, | |
155 ProcessMemoryDump* pmd) { | |
156 // Snapshot of memory maps is not taken for light dump requests. | |
157 if (args.level_of_detail == MemoryDumpLevelOfDetail::LIGHT) | |
158 return true; | |
159 | |
160 uint32_t res = 0; | |
161 if (UNLIKELY(proc_smaps_for_testing)) { | |
162 res = ReadLinuxProcSmapsFile(proc_smaps_for_testing, pmd->process_mmaps()); | |
163 } else { | |
164 ScopedFILE smaps_file(fopen("/proc/self/smaps", "r")); | |
165 res = ReadLinuxProcSmapsFile(smaps_file.get(), pmd->process_mmaps()); | |
166 } | |
167 | |
168 if (res > 0) { | |
169 pmd->set_has_process_mmaps(); | |
170 return true; | |
171 } | |
172 return false; | |
173 } | |
174 | |
175 } // namespace trace_event | |
176 } // namespace base | |
OLD | NEW |