OLD | NEW |
(Empty) | |
| 1 // Copyright 2015 The Chromium Authors. All rights reserved. |
| 2 // Use of this source code is governed by a BSD-style license that can be |
| 3 // found in the LICENSE file. |
| 4 |
| 5 #include "components/tracing/process_metrics_memory_dump_provider.h" |
| 6 |
| 7 #include <stdint.h> |
| 8 |
| 9 #include "base/files/file_util.h" |
| 10 #include "base/trace_event/process_memory_dump.h" |
| 11 #include "base/trace_event/process_memory_maps.h" |
| 12 #include "base/trace_event/process_memory_totals.h" |
| 13 #include "base/trace_event/trace_event_argument.h" |
| 14 #include "testing/gtest/include/gtest/gtest.h" |
| 15 |
| 16 namespace tracing { |
| 17 |
| 18 #if defined(OS_LINUX) || defined(OS_ANDROID) |
| 19 namespace { |
| 20 const char kTestSmaps1[] = |
| 21 "00400000-004be000 r-xp 00000000 fc:01 1234 /file/1\n" |
| 22 "Size: 760 kB\n" |
| 23 "Rss: 296 kB\n" |
| 24 "Pss: 162 kB\n" |
| 25 "Shared_Clean: 228 kB\n" |
| 26 "Shared_Dirty: 0 kB\n" |
| 27 "Private_Clean: 0 kB\n" |
| 28 "Private_Dirty: 68 kB\n" |
| 29 "Referenced: 296 kB\n" |
| 30 "Anonymous: 68 kB\n" |
| 31 "AnonHugePages: 0 kB\n" |
| 32 "Swap: 4 kB\n" |
| 33 "KernelPageSize: 4 kB\n" |
| 34 "MMUPageSize: 4 kB\n" |
| 35 "Locked: 0 kB\n" |
| 36 "VmFlags: rd ex mr mw me dw sd\n" |
| 37 "ff000000-ff800000 -w-p 00001080 fc:01 0 /file/name with space\n" |
| 38 "Size: 0 kB\n" |
| 39 "Rss: 192 kB\n" |
| 40 "Pss: 128 kB\n" |
| 41 "Shared_Clean: 120 kB\n" |
| 42 "Shared_Dirty: 4 kB\n" |
| 43 "Private_Clean: 60 kB\n" |
| 44 "Private_Dirty: 8 kB\n" |
| 45 "Referenced: 296 kB\n" |
| 46 "Anonymous: 0 kB\n" |
| 47 "AnonHugePages: 0 kB\n" |
| 48 "Swap: 0 kB\n" |
| 49 "KernelPageSize: 4 kB\n" |
| 50 "MMUPageSize: 4 kB\n" |
| 51 "Locked: 0 kB\n" |
| 52 "VmFlags: rd ex mr mw me dw sd"; |
| 53 |
| 54 const char kTestSmaps2[] = |
| 55 // An invalid region, with zero size and overlapping with the last one |
| 56 // (See crbug.com/461237). |
| 57 "7fe7ce79c000-7fe7ce79c000 ---p 00000000 00:00 0 \n" |
| 58 "Size: 4 kB\n" |
| 59 "Rss: 0 kB\n" |
| 60 "Pss: 0 kB\n" |
| 61 "Shared_Clean: 0 kB\n" |
| 62 "Shared_Dirty: 0 kB\n" |
| 63 "Private_Clean: 0 kB\n" |
| 64 "Private_Dirty: 0 kB\n" |
| 65 "Referenced: 0 kB\n" |
| 66 "Anonymous: 0 kB\n" |
| 67 "AnonHugePages: 0 kB\n" |
| 68 "Swap: 0 kB\n" |
| 69 "KernelPageSize: 4 kB\n" |
| 70 "MMUPageSize: 4 kB\n" |
| 71 "Locked: 0 kB\n" |
| 72 "VmFlags: rd ex mr mw me dw sd\n" |
| 73 // A invalid region with its range going backwards. |
| 74 "00400000-00200000 ---p 00000000 00:00 0 \n" |
| 75 "Size: 4 kB\n" |
| 76 "Rss: 0 kB\n" |
| 77 "Pss: 0 kB\n" |
| 78 "Shared_Clean: 0 kB\n" |
| 79 "Shared_Dirty: 0 kB\n" |
| 80 "Private_Clean: 0 kB\n" |
| 81 "Private_Dirty: 0 kB\n" |
| 82 "Referenced: 0 kB\n" |
| 83 "Anonymous: 0 kB\n" |
| 84 "AnonHugePages: 0 kB\n" |
| 85 "Swap: 0 kB\n" |
| 86 "KernelPageSize: 4 kB\n" |
| 87 "MMUPageSize: 4 kB\n" |
| 88 "Locked: 0 kB\n" |
| 89 "VmFlags: rd ex mr mw me dw sd\n" |
| 90 // A good anonymous region at the end. |
| 91 "7fe7ce79c000-7fe7ce7a8000 ---p 00000000 00:00 0 \n" |
| 92 "Size: 48 kB\n" |
| 93 "Rss: 40 kB\n" |
| 94 "Pss: 32 kB\n" |
| 95 "Shared_Clean: 16 kB\n" |
| 96 "Shared_Dirty: 12 kB\n" |
| 97 "Private_Clean: 8 kB\n" |
| 98 "Private_Dirty: 4 kB\n" |
| 99 "Referenced: 40 kB\n" |
| 100 "Anonymous: 16 kB\n" |
| 101 "AnonHugePages: 0 kB\n" |
| 102 "Swap: 0 kB\n" |
| 103 "KernelPageSize: 4 kB\n" |
| 104 "MMUPageSize: 4 kB\n" |
| 105 "Locked: 0 kB\n" |
| 106 "VmFlags: rd wr mr mw me ac sd\n"; |
| 107 |
| 108 void CreateAndSetSmapsFileForTesting(const char* smaps_string, |
| 109 base::ScopedFILE& file) { |
| 110 base::FilePath temp_path; |
| 111 FILE* temp_file = CreateAndOpenTemporaryFile(&temp_path); |
| 112 file.reset(temp_file); |
| 113 ASSERT_TRUE(temp_file); |
| 114 |
| 115 ASSERT_TRUE(base::WriteFileDescriptor(fileno(temp_file), smaps_string, |
| 116 strlen(smaps_string))); |
| 117 } |
| 118 |
| 119 } // namespace |
| 120 #endif // defined(OS_LINUX) || defined(OS_ANDROID) |
| 121 |
| 122 TEST(ProcessMetricsMemoryDumpProviderTest, DumpRSS) { |
| 123 const base::trace_event::MemoryDumpArgs high_detail_args = { |
| 124 base::trace_event::MemoryDumpLevelOfDetail::DETAILED}; |
| 125 scoped_ptr<ProcessMetricsMemoryDumpProvider> pmtdp( |
| 126 new ProcessMetricsMemoryDumpProvider(base::kNullProcessId)); |
| 127 scoped_ptr<base::trace_event::ProcessMemoryDump> pmd_before( |
| 128 new base::trace_event::ProcessMemoryDump(nullptr)); |
| 129 scoped_ptr<base::trace_event::ProcessMemoryDump> pmd_after( |
| 130 new base::trace_event::ProcessMemoryDump(nullptr)); |
| 131 |
| 132 ProcessMetricsMemoryDumpProvider::rss_bytes_for_testing = 1024; |
| 133 pmtdp->OnMemoryDump(high_detail_args, pmd_before.get()); |
| 134 |
| 135 // Pretend that the RSS of the process increased of +1M. |
| 136 const size_t kAllocSize = 1048576; |
| 137 ProcessMetricsMemoryDumpProvider::rss_bytes_for_testing += kAllocSize; |
| 138 |
| 139 pmtdp->OnMemoryDump(high_detail_args, pmd_after.get()); |
| 140 |
| 141 ProcessMetricsMemoryDumpProvider::rss_bytes_for_testing = 0; |
| 142 |
| 143 ASSERT_TRUE(pmd_before->has_process_totals()); |
| 144 ASSERT_TRUE(pmd_after->has_process_totals()); |
| 145 |
| 146 const uint64_t rss_before = |
| 147 pmd_before->process_totals()->resident_set_bytes(); |
| 148 const uint64_t rss_after = pmd_after->process_totals()->resident_set_bytes(); |
| 149 |
| 150 EXPECT_NE(0U, rss_before); |
| 151 EXPECT_NE(0U, rss_after); |
| 152 |
| 153 EXPECT_EQ(rss_after - rss_before, kAllocSize); |
| 154 } |
| 155 |
| 156 #if defined(OS_LINUX) || defined(OS_ANDROID) |
| 157 TEST(ProcessMetricsMemoryDumpProviderTest, ParseProcSmaps) { |
| 158 const uint32_t kProtR = |
| 159 base::trace_event::ProcessMemoryMaps::VMRegion::kProtectionFlagsRead; |
| 160 const uint32_t kProtW = |
| 161 base::trace_event::ProcessMemoryMaps::VMRegion::kProtectionFlagsWrite; |
| 162 const uint32_t kProtX = |
| 163 base::trace_event::ProcessMemoryMaps::VMRegion::kProtectionFlagsExec; |
| 164 const base::trace_event::MemoryDumpArgs dump_args = { |
| 165 base::trace_event::MemoryDumpLevelOfDetail::DETAILED}; |
| 166 |
| 167 scoped_ptr<ProcessMetricsMemoryDumpProvider> pmmdp( |
| 168 new ProcessMetricsMemoryDumpProvider(base::kNullProcessId)); |
| 169 |
| 170 // Emulate an empty /proc/self/smaps. |
| 171 base::trace_event::ProcessMemoryDump pmd_invalid(nullptr /* session_state */); |
| 172 base::ScopedFILE empty_file(OpenFile(base::FilePath("/dev/null"), "r")); |
| 173 ASSERT_TRUE(empty_file.get()); |
| 174 ProcessMetricsMemoryDumpProvider::proc_smaps_for_testing = empty_file.get(); |
| 175 pmmdp->OnMemoryDump(dump_args, &pmd_invalid); |
| 176 ASSERT_FALSE(pmd_invalid.has_process_mmaps()); |
| 177 |
| 178 // Parse the 1st smaps file. |
| 179 base::trace_event::ProcessMemoryDump pmd_1(nullptr /* session_state */); |
| 180 base::ScopedFILE temp_file1; |
| 181 CreateAndSetSmapsFileForTesting(kTestSmaps1, temp_file1); |
| 182 ProcessMetricsMemoryDumpProvider::proc_smaps_for_testing = temp_file1.get(); |
| 183 pmmdp->OnMemoryDump(dump_args, &pmd_1); |
| 184 ASSERT_TRUE(pmd_1.has_process_mmaps()); |
| 185 const auto& regions_1 = pmd_1.process_mmaps()->vm_regions(); |
| 186 ASSERT_EQ(2UL, regions_1.size()); |
| 187 |
| 188 EXPECT_EQ(0x00400000UL, regions_1[0].start_address); |
| 189 EXPECT_EQ(0x004be000UL - 0x00400000UL, regions_1[0].size_in_bytes); |
| 190 EXPECT_EQ(kProtR | kProtX, regions_1[0].protection_flags); |
| 191 EXPECT_EQ("/file/1", regions_1[0].mapped_file); |
| 192 EXPECT_EQ(162 * 1024UL, regions_1[0].byte_stats_proportional_resident); |
| 193 EXPECT_EQ(228 * 1024UL, regions_1[0].byte_stats_shared_clean_resident); |
| 194 EXPECT_EQ(0UL, regions_1[0].byte_stats_shared_dirty_resident); |
| 195 EXPECT_EQ(0UL, regions_1[0].byte_stats_private_clean_resident); |
| 196 EXPECT_EQ(68 * 1024UL, regions_1[0].byte_stats_private_dirty_resident); |
| 197 EXPECT_EQ(4 * 1024UL, regions_1[0].byte_stats_swapped); |
| 198 |
| 199 EXPECT_EQ(0xff000000UL, regions_1[1].start_address); |
| 200 EXPECT_EQ(0xff800000UL - 0xff000000UL, regions_1[1].size_in_bytes); |
| 201 EXPECT_EQ(kProtW, regions_1[1].protection_flags); |
| 202 EXPECT_EQ("/file/name with space", regions_1[1].mapped_file); |
| 203 EXPECT_EQ(128 * 1024UL, regions_1[1].byte_stats_proportional_resident); |
| 204 EXPECT_EQ(120 * 1024UL, regions_1[1].byte_stats_shared_clean_resident); |
| 205 EXPECT_EQ(4 * 1024UL, regions_1[1].byte_stats_shared_dirty_resident); |
| 206 EXPECT_EQ(60 * 1024UL, regions_1[1].byte_stats_private_clean_resident); |
| 207 EXPECT_EQ(8 * 1024UL, regions_1[1].byte_stats_private_dirty_resident); |
| 208 EXPECT_EQ(0 * 1024UL, regions_1[1].byte_stats_swapped); |
| 209 |
| 210 // Parse the 2nd smaps file. |
| 211 base::trace_event::ProcessMemoryDump pmd_2(nullptr /* session_state */); |
| 212 base::ScopedFILE temp_file2; |
| 213 CreateAndSetSmapsFileForTesting(kTestSmaps2, temp_file2); |
| 214 ProcessMetricsMemoryDumpProvider::proc_smaps_for_testing = temp_file2.get(); |
| 215 pmmdp->OnMemoryDump(dump_args, &pmd_2); |
| 216 ASSERT_TRUE(pmd_2.has_process_mmaps()); |
| 217 const auto& regions_2 = pmd_2.process_mmaps()->vm_regions(); |
| 218 ASSERT_EQ(1UL, regions_2.size()); |
| 219 EXPECT_EQ(0x7fe7ce79c000UL, regions_2[0].start_address); |
| 220 EXPECT_EQ(0x7fe7ce7a8000UL - 0x7fe7ce79c000UL, regions_2[0].size_in_bytes); |
| 221 EXPECT_EQ(0U, regions_2[0].protection_flags); |
| 222 EXPECT_EQ("", regions_2[0].mapped_file); |
| 223 EXPECT_EQ(32 * 1024UL, regions_2[0].byte_stats_proportional_resident); |
| 224 EXPECT_EQ(16 * 1024UL, regions_2[0].byte_stats_shared_clean_resident); |
| 225 EXPECT_EQ(12 * 1024UL, regions_2[0].byte_stats_shared_dirty_resident); |
| 226 EXPECT_EQ(8 * 1024UL, regions_2[0].byte_stats_private_clean_resident); |
| 227 EXPECT_EQ(4 * 1024UL, regions_2[0].byte_stats_private_dirty_resident); |
| 228 EXPECT_EQ(0 * 1024UL, regions_2[0].byte_stats_swapped); |
| 229 } |
| 230 #endif // defined(OS_LINUX) || defined(OS_ANDROID) |
| 231 |
| 232 } // namespace tracing |
OLD | NEW |