OLD | NEW |
(Empty) | |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include "base/trace_event/process_memory_maps_dump_provider.h" |
| 6 |
| 7 #include <stdint.h> |
| 8 |
| 9 #include "base/files/file_util.h" |
| 10 #include "base/trace_event/process_memory_dump.h" |
| 11 #include "base/trace_event/process_memory_maps.h" |
| 12 #include "base/trace_event/trace_event_argument.h" |
| 13 #include "testing/gtest/include/gtest/gtest.h" |
| 14 |
| 15 namespace base { |
| 16 namespace trace_event { |
| 17 |
| 18 namespace { |
| 19 const char kTestSmaps1[] = |
| 20 "00400000-004be000 r-xp 00000000 fc:01 1234 /file/1\n" |
| 21 "Size: 760 kB\n" |
| 22 "Rss: 296 kB\n" |
| 23 "Pss: 162 kB\n" |
| 24 "Shared_Clean: 228 kB\n" |
| 25 "Shared_Dirty: 0 kB\n" |
| 26 "Private_Clean: 0 kB\n" |
| 27 "Private_Dirty: 68 kB\n" |
| 28 "Referenced: 296 kB\n" |
| 29 "Anonymous: 68 kB\n" |
| 30 "AnonHugePages: 0 kB\n" |
| 31 "Swap: 4 kB\n" |
| 32 "KernelPageSize: 4 kB\n" |
| 33 "MMUPageSize: 4 kB\n" |
| 34 "Locked: 0 kB\n" |
| 35 "VmFlags: rd ex mr mw me dw sd\n" |
| 36 "ff000000-ff800000 -w-p 00001080 fc:01 0 /file/name with space\n" |
| 37 "Size: 0 kB\n" |
| 38 "Rss: 192 kB\n" |
| 39 "Pss: 128 kB\n" |
| 40 "Shared_Clean: 120 kB\n" |
| 41 "Shared_Dirty: 4 kB\n" |
| 42 "Private_Clean: 60 kB\n" |
| 43 "Private_Dirty: 8 kB\n" |
| 44 "Referenced: 296 kB\n" |
| 45 "Anonymous: 0 kB\n" |
| 46 "AnonHugePages: 0 kB\n" |
| 47 "Swap: 0 kB\n" |
| 48 "KernelPageSize: 4 kB\n" |
| 49 "MMUPageSize: 4 kB\n" |
| 50 "Locked: 0 kB\n" |
| 51 "VmFlags: rd ex mr mw me dw sd"; |
| 52 |
| 53 const char kTestSmaps2[] = |
| 54 // An invalid region, with zero size and overlapping with the last one |
| 55 // (See crbug.com/461237). |
| 56 "7fe7ce79c000-7fe7ce79c000 ---p 00000000 00:00 0 \n" |
| 57 "Size: 4 kB\n" |
| 58 "Rss: 0 kB\n" |
| 59 "Pss: 0 kB\n" |
| 60 "Shared_Clean: 0 kB\n" |
| 61 "Shared_Dirty: 0 kB\n" |
| 62 "Private_Clean: 0 kB\n" |
| 63 "Private_Dirty: 0 kB\n" |
| 64 "Referenced: 0 kB\n" |
| 65 "Anonymous: 0 kB\n" |
| 66 "AnonHugePages: 0 kB\n" |
| 67 "Swap: 0 kB\n" |
| 68 "KernelPageSize: 4 kB\n" |
| 69 "MMUPageSize: 4 kB\n" |
| 70 "Locked: 0 kB\n" |
| 71 "VmFlags: rd ex mr mw me dw sd\n" |
| 72 // A invalid region with its range going backwards. |
| 73 "00400000-00200000 ---p 00000000 00:00 0 \n" |
| 74 "Size: 4 kB\n" |
| 75 "Rss: 0 kB\n" |
| 76 "Pss: 0 kB\n" |
| 77 "Shared_Clean: 0 kB\n" |
| 78 "Shared_Dirty: 0 kB\n" |
| 79 "Private_Clean: 0 kB\n" |
| 80 "Private_Dirty: 0 kB\n" |
| 81 "Referenced: 0 kB\n" |
| 82 "Anonymous: 0 kB\n" |
| 83 "AnonHugePages: 0 kB\n" |
| 84 "Swap: 0 kB\n" |
| 85 "KernelPageSize: 4 kB\n" |
| 86 "MMUPageSize: 4 kB\n" |
| 87 "Locked: 0 kB\n" |
| 88 "VmFlags: rd ex mr mw me dw sd\n" |
| 89 // A good anonymous region at the end. |
| 90 "7fe7ce79c000-7fe7ce7a8000 ---p 00000000 00:00 0 \n" |
| 91 "Size: 48 kB\n" |
| 92 "Rss: 40 kB\n" |
| 93 "Pss: 32 kB\n" |
| 94 "Shared_Clean: 16 kB\n" |
| 95 "Shared_Dirty: 12 kB\n" |
| 96 "Private_Clean: 8 kB\n" |
| 97 "Private_Dirty: 4 kB\n" |
| 98 "Referenced: 40 kB\n" |
| 99 "Anonymous: 16 kB\n" |
| 100 "AnonHugePages: 0 kB\n" |
| 101 "Swap: 0 kB\n" |
| 102 "KernelPageSize: 4 kB\n" |
| 103 "MMUPageSize: 4 kB\n" |
| 104 "Locked: 0 kB\n" |
| 105 "VmFlags: rd wr mr mw me ac sd\n"; |
| 106 |
| 107 void CreateAndSetSmapsFileForTesting(const char* smaps_string, |
| 108 ScopedFILE& file) { |
| 109 FilePath temp_path; |
| 110 FILE* temp_file = CreateAndOpenTemporaryFile(&temp_path); |
| 111 file.reset(temp_file); |
| 112 ASSERT_TRUE(temp_file); |
| 113 |
| 114 ASSERT_TRUE(base::WriteFileDescriptor(fileno(temp_file), smaps_string, |
| 115 strlen(smaps_string))); |
| 116 } |
| 117 |
| 118 } // namespace |
| 119 |
| 120 TEST(ProcessMemoryMapsDumpProviderTest, ParseProcSmaps) { |
| 121 const uint32_t kProtR = ProcessMemoryMaps::VMRegion::kProtectionFlagsRead; |
| 122 const uint32_t kProtW = ProcessMemoryMaps::VMRegion::kProtectionFlagsWrite; |
| 123 const uint32_t kProtX = ProcessMemoryMaps::VMRegion::kProtectionFlagsExec; |
| 124 const MemoryDumpArgs dump_args = {MemoryDumpLevelOfDetail::DETAILED}; |
| 125 |
| 126 auto pmmdp = ProcessMemoryMapsDumpProvider::GetInstance(); |
| 127 |
| 128 // Emulate an empty /proc/self/smaps. |
| 129 ProcessMemoryDump pmd_invalid(nullptr /* session_state */); |
| 130 ScopedFILE empty_file(OpenFile(FilePath("/dev/null"), "r")); |
| 131 ASSERT_TRUE(empty_file.get()); |
| 132 ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = empty_file.get(); |
| 133 pmmdp->OnMemoryDump(dump_args, &pmd_invalid); |
| 134 ASSERT_FALSE(pmd_invalid.has_process_mmaps()); |
| 135 |
| 136 // Parse the 1st smaps file. |
| 137 ProcessMemoryDump pmd_1(nullptr /* session_state */); |
| 138 ScopedFILE temp_file1; |
| 139 CreateAndSetSmapsFileForTesting(kTestSmaps1, temp_file1); |
| 140 ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = temp_file1.get(); |
| 141 pmmdp->OnMemoryDump(dump_args, &pmd_1); |
| 142 ASSERT_TRUE(pmd_1.has_process_mmaps()); |
| 143 const auto& regions_1 = pmd_1.process_mmaps()->vm_regions(); |
| 144 ASSERT_EQ(2UL, regions_1.size()); |
| 145 |
| 146 EXPECT_EQ(0x00400000UL, regions_1[0].start_address); |
| 147 EXPECT_EQ(0x004be000UL - 0x00400000UL, regions_1[0].size_in_bytes); |
| 148 EXPECT_EQ(kProtR | kProtX, regions_1[0].protection_flags); |
| 149 EXPECT_EQ("/file/1", regions_1[0].mapped_file); |
| 150 EXPECT_EQ(162 * 1024UL, regions_1[0].byte_stats_proportional_resident); |
| 151 EXPECT_EQ(228 * 1024UL, regions_1[0].byte_stats_shared_clean_resident); |
| 152 EXPECT_EQ(0UL, regions_1[0].byte_stats_shared_dirty_resident); |
| 153 EXPECT_EQ(0UL, regions_1[0].byte_stats_private_clean_resident); |
| 154 EXPECT_EQ(68 * 1024UL, regions_1[0].byte_stats_private_dirty_resident); |
| 155 EXPECT_EQ(4 * 1024UL, regions_1[0].byte_stats_swapped); |
| 156 |
| 157 EXPECT_EQ(0xff000000UL, regions_1[1].start_address); |
| 158 EXPECT_EQ(0xff800000UL - 0xff000000UL, regions_1[1].size_in_bytes); |
| 159 EXPECT_EQ(kProtW, regions_1[1].protection_flags); |
| 160 EXPECT_EQ("/file/name with space", regions_1[1].mapped_file); |
| 161 EXPECT_EQ(128 * 1024UL, regions_1[1].byte_stats_proportional_resident); |
| 162 EXPECT_EQ(120 * 1024UL, regions_1[1].byte_stats_shared_clean_resident); |
| 163 EXPECT_EQ(4 * 1024UL, regions_1[1].byte_stats_shared_dirty_resident); |
| 164 EXPECT_EQ(60 * 1024UL, regions_1[1].byte_stats_private_clean_resident); |
| 165 EXPECT_EQ(8 * 1024UL, regions_1[1].byte_stats_private_dirty_resident); |
| 166 EXPECT_EQ(0 * 1024UL, regions_1[1].byte_stats_swapped); |
| 167 |
| 168 // Parse the 2nd smaps file. |
| 169 ProcessMemoryDump pmd_2(nullptr /* session_state */); |
| 170 ScopedFILE temp_file2; |
| 171 CreateAndSetSmapsFileForTesting(kTestSmaps2, temp_file2); |
| 172 ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = temp_file2.get(); |
| 173 pmmdp->OnMemoryDump(dump_args, &pmd_2); |
| 174 ASSERT_TRUE(pmd_2.has_process_mmaps()); |
| 175 const auto& regions_2 = pmd_2.process_mmaps()->vm_regions(); |
| 176 ASSERT_EQ(1UL, regions_2.size()); |
| 177 EXPECT_EQ(0x7fe7ce79c000UL, regions_2[0].start_address); |
| 178 EXPECT_EQ(0x7fe7ce7a8000UL - 0x7fe7ce79c000UL, regions_2[0].size_in_bytes); |
| 179 EXPECT_EQ(0U, regions_2[0].protection_flags); |
| 180 EXPECT_EQ("", regions_2[0].mapped_file); |
| 181 EXPECT_EQ(32 * 1024UL, regions_2[0].byte_stats_proportional_resident); |
| 182 EXPECT_EQ(16 * 1024UL, regions_2[0].byte_stats_shared_clean_resident); |
| 183 EXPECT_EQ(12 * 1024UL, regions_2[0].byte_stats_shared_dirty_resident); |
| 184 EXPECT_EQ(8 * 1024UL, regions_2[0].byte_stats_private_clean_resident); |
| 185 EXPECT_EQ(4 * 1024UL, regions_2[0].byte_stats_private_dirty_resident); |
| 186 EXPECT_EQ(0 * 1024UL, regions_2[0].byte_stats_swapped); |
| 187 } |
| 188 |
| 189 } // namespace trace_event |
| 190 } // namespace base |
OLD | NEW |