OLD | NEW |
| (Empty) |
1 // Copyright 2015 The Chromium Authors. All rights reserved. | |
2 // Use of this source code is governed by a BSD-style license that can be | |
3 // found in the LICENSE file. | |
4 | |
5 #include "components/tracing/process_metrics_memory_dump_provider.h" | |
6 | |
7 #include <stdint.h> | |
8 | |
9 #include <memory> | |
10 | |
11 #include "base/files/file_util.h" | |
12 #include "base/trace_event/process_memory_dump.h" | |
13 #include "base/trace_event/process_memory_maps.h" | |
14 #include "base/trace_event/process_memory_totals.h" | |
15 #include "base/trace_event/trace_event_argument.h" | |
16 #include "testing/gtest/include/gtest/gtest.h" | |
17 | |
18 namespace tracing { | |
19 | |
20 #if defined(OS_LINUX) || defined(OS_ANDROID) | |
21 namespace { | |
22 const char kTestSmaps1[] = | |
23 "00400000-004be000 r-xp 00000000 fc:01 1234 /file/1\n" | |
24 "Size: 760 kB\n" | |
25 "Rss: 296 kB\n" | |
26 "Pss: 162 kB\n" | |
27 "Shared_Clean: 228 kB\n" | |
28 "Shared_Dirty: 0 kB\n" | |
29 "Private_Clean: 0 kB\n" | |
30 "Private_Dirty: 68 kB\n" | |
31 "Referenced: 296 kB\n" | |
32 "Anonymous: 68 kB\n" | |
33 "AnonHugePages: 0 kB\n" | |
34 "Swap: 4 kB\n" | |
35 "KernelPageSize: 4 kB\n" | |
36 "MMUPageSize: 4 kB\n" | |
37 "Locked: 0 kB\n" | |
38 "VmFlags: rd ex mr mw me dw sd\n" | |
39 "ff000000-ff800000 -w-p 00001080 fc:01 0 /file/name with space\n" | |
40 "Size: 0 kB\n" | |
41 "Rss: 192 kB\n" | |
42 "Pss: 128 kB\n" | |
43 "Shared_Clean: 120 kB\n" | |
44 "Shared_Dirty: 4 kB\n" | |
45 "Private_Clean: 60 kB\n" | |
46 "Private_Dirty: 8 kB\n" | |
47 "Referenced: 296 kB\n" | |
48 "Anonymous: 0 kB\n" | |
49 "AnonHugePages: 0 kB\n" | |
50 "Swap: 0 kB\n" | |
51 "KernelPageSize: 4 kB\n" | |
52 "MMUPageSize: 4 kB\n" | |
53 "Locked: 0 kB\n" | |
54 "VmFlags: rd ex mr mw me dw sd"; | |
55 | |
56 const char kTestSmaps2[] = | |
57 // An invalid region, with zero size and overlapping with the last one | |
58 // (See crbug.com/461237). | |
59 "7fe7ce79c000-7fe7ce79c000 ---p 00000000 00:00 0 \n" | |
60 "Size: 4 kB\n" | |
61 "Rss: 0 kB\n" | |
62 "Pss: 0 kB\n" | |
63 "Shared_Clean: 0 kB\n" | |
64 "Shared_Dirty: 0 kB\n" | |
65 "Private_Clean: 0 kB\n" | |
66 "Private_Dirty: 0 kB\n" | |
67 "Referenced: 0 kB\n" | |
68 "Anonymous: 0 kB\n" | |
69 "AnonHugePages: 0 kB\n" | |
70 "Swap: 0 kB\n" | |
71 "KernelPageSize: 4 kB\n" | |
72 "MMUPageSize: 4 kB\n" | |
73 "Locked: 0 kB\n" | |
74 "VmFlags: rd ex mr mw me dw sd\n" | |
75 // A invalid region with its range going backwards. | |
76 "00400000-00200000 ---p 00000000 00:00 0 \n" | |
77 "Size: 4 kB\n" | |
78 "Rss: 0 kB\n" | |
79 "Pss: 0 kB\n" | |
80 "Shared_Clean: 0 kB\n" | |
81 "Shared_Dirty: 0 kB\n" | |
82 "Private_Clean: 0 kB\n" | |
83 "Private_Dirty: 0 kB\n" | |
84 "Referenced: 0 kB\n" | |
85 "Anonymous: 0 kB\n" | |
86 "AnonHugePages: 0 kB\n" | |
87 "Swap: 0 kB\n" | |
88 "KernelPageSize: 4 kB\n" | |
89 "MMUPageSize: 4 kB\n" | |
90 "Locked: 0 kB\n" | |
91 "VmFlags: rd ex mr mw me dw sd\n" | |
92 // A good anonymous region at the end. | |
93 "7fe7ce79c000-7fe7ce7a8000 ---p 00000000 00:00 0 \n" | |
94 "Size: 48 kB\n" | |
95 "Rss: 40 kB\n" | |
96 "Pss: 32 kB\n" | |
97 "Shared_Clean: 16 kB\n" | |
98 "Shared_Dirty: 12 kB\n" | |
99 "Private_Clean: 8 kB\n" | |
100 "Private_Dirty: 4 kB\n" | |
101 "Referenced: 40 kB\n" | |
102 "Anonymous: 16 kB\n" | |
103 "AnonHugePages: 0 kB\n" | |
104 "Swap: 0 kB\n" | |
105 "KernelPageSize: 4 kB\n" | |
106 "MMUPageSize: 4 kB\n" | |
107 "Locked: 0 kB\n" | |
108 "VmFlags: rd wr mr mw me ac sd\n"; | |
109 | |
110 void CreateAndSetSmapsFileForTesting(const char* smaps_string, | |
111 base::ScopedFILE& file) { | |
112 base::FilePath temp_path; | |
113 FILE* temp_file = CreateAndOpenTemporaryFile(&temp_path); | |
114 file.reset(temp_file); | |
115 ASSERT_TRUE(temp_file); | |
116 | |
117 ASSERT_TRUE(base::WriteFileDescriptor(fileno(temp_file), smaps_string, | |
118 strlen(smaps_string))); | |
119 } | |
120 | |
121 } // namespace | |
122 #endif // defined(OS_LINUX) || defined(OS_ANDROID) | |
123 | |
124 TEST(ProcessMetricsMemoryDumpProviderTest, DumpRSS) { | |
125 const base::trace_event::MemoryDumpArgs high_detail_args = { | |
126 base::trace_event::MemoryDumpLevelOfDetail::DETAILED}; | |
127 std::unique_ptr<ProcessMetricsMemoryDumpProvider> pmtdp( | |
128 new ProcessMetricsMemoryDumpProvider(base::kNullProcessId)); | |
129 std::unique_ptr<base::trace_event::ProcessMemoryDump> pmd_before( | |
130 new base::trace_event::ProcessMemoryDump(nullptr)); | |
131 std::unique_ptr<base::trace_event::ProcessMemoryDump> pmd_after( | |
132 new base::trace_event::ProcessMemoryDump(nullptr)); | |
133 | |
134 ProcessMetricsMemoryDumpProvider::rss_bytes_for_testing = 1024; | |
135 pmtdp->OnMemoryDump(high_detail_args, pmd_before.get()); | |
136 | |
137 // Pretend that the RSS of the process increased of +1M. | |
138 const size_t kAllocSize = 1048576; | |
139 ProcessMetricsMemoryDumpProvider::rss_bytes_for_testing += kAllocSize; | |
140 | |
141 pmtdp->OnMemoryDump(high_detail_args, pmd_after.get()); | |
142 | |
143 ProcessMetricsMemoryDumpProvider::rss_bytes_for_testing = 0; | |
144 | |
145 ASSERT_TRUE(pmd_before->has_process_totals()); | |
146 ASSERT_TRUE(pmd_after->has_process_totals()); | |
147 | |
148 const uint64_t rss_before = | |
149 pmd_before->process_totals()->resident_set_bytes(); | |
150 const uint64_t rss_after = pmd_after->process_totals()->resident_set_bytes(); | |
151 | |
152 EXPECT_NE(0U, rss_before); | |
153 EXPECT_NE(0U, rss_after); | |
154 | |
155 EXPECT_EQ(rss_after - rss_before, kAllocSize); | |
156 } | |
157 | |
158 #if defined(OS_LINUX) || defined(OS_ANDROID) | |
159 TEST(ProcessMetricsMemoryDumpProviderTest, ParseProcSmaps) { | |
160 const uint32_t kProtR = | |
161 base::trace_event::ProcessMemoryMaps::VMRegion::kProtectionFlagsRead; | |
162 const uint32_t kProtW = | |
163 base::trace_event::ProcessMemoryMaps::VMRegion::kProtectionFlagsWrite; | |
164 const uint32_t kProtX = | |
165 base::trace_event::ProcessMemoryMaps::VMRegion::kProtectionFlagsExec; | |
166 const base::trace_event::MemoryDumpArgs dump_args = { | |
167 base::trace_event::MemoryDumpLevelOfDetail::DETAILED}; | |
168 | |
169 std::unique_ptr<ProcessMetricsMemoryDumpProvider> pmmdp( | |
170 new ProcessMetricsMemoryDumpProvider(base::kNullProcessId)); | |
171 | |
172 // Emulate an empty /proc/self/smaps. | |
173 base::trace_event::ProcessMemoryDump pmd_invalid(nullptr /* session_state */); | |
174 base::ScopedFILE empty_file(OpenFile(base::FilePath("/dev/null"), "r")); | |
175 ASSERT_TRUE(empty_file.get()); | |
176 ProcessMetricsMemoryDumpProvider::proc_smaps_for_testing = empty_file.get(); | |
177 pmmdp->OnMemoryDump(dump_args, &pmd_invalid); | |
178 ASSERT_FALSE(pmd_invalid.has_process_mmaps()); | |
179 | |
180 // Parse the 1st smaps file. | |
181 base::trace_event::ProcessMemoryDump pmd_1(nullptr /* session_state */); | |
182 base::ScopedFILE temp_file1; | |
183 CreateAndSetSmapsFileForTesting(kTestSmaps1, temp_file1); | |
184 ProcessMetricsMemoryDumpProvider::proc_smaps_for_testing = temp_file1.get(); | |
185 pmmdp->OnMemoryDump(dump_args, &pmd_1); | |
186 ASSERT_TRUE(pmd_1.has_process_mmaps()); | |
187 const auto& regions_1 = pmd_1.process_mmaps()->vm_regions(); | |
188 ASSERT_EQ(2UL, regions_1.size()); | |
189 | |
190 EXPECT_EQ(0x00400000UL, regions_1[0].start_address); | |
191 EXPECT_EQ(0x004be000UL - 0x00400000UL, regions_1[0].size_in_bytes); | |
192 EXPECT_EQ(kProtR | kProtX, regions_1[0].protection_flags); | |
193 EXPECT_EQ("/file/1", regions_1[0].mapped_file); | |
194 EXPECT_EQ(162 * 1024UL, regions_1[0].byte_stats_proportional_resident); | |
195 EXPECT_EQ(228 * 1024UL, regions_1[0].byte_stats_shared_clean_resident); | |
196 EXPECT_EQ(0UL, regions_1[0].byte_stats_shared_dirty_resident); | |
197 EXPECT_EQ(0UL, regions_1[0].byte_stats_private_clean_resident); | |
198 EXPECT_EQ(68 * 1024UL, regions_1[0].byte_stats_private_dirty_resident); | |
199 EXPECT_EQ(4 * 1024UL, regions_1[0].byte_stats_swapped); | |
200 | |
201 EXPECT_EQ(0xff000000UL, regions_1[1].start_address); | |
202 EXPECT_EQ(0xff800000UL - 0xff000000UL, regions_1[1].size_in_bytes); | |
203 EXPECT_EQ(kProtW, regions_1[1].protection_flags); | |
204 EXPECT_EQ("/file/name with space", regions_1[1].mapped_file); | |
205 EXPECT_EQ(128 * 1024UL, regions_1[1].byte_stats_proportional_resident); | |
206 EXPECT_EQ(120 * 1024UL, regions_1[1].byte_stats_shared_clean_resident); | |
207 EXPECT_EQ(4 * 1024UL, regions_1[1].byte_stats_shared_dirty_resident); | |
208 EXPECT_EQ(60 * 1024UL, regions_1[1].byte_stats_private_clean_resident); | |
209 EXPECT_EQ(8 * 1024UL, regions_1[1].byte_stats_private_dirty_resident); | |
210 EXPECT_EQ(0 * 1024UL, regions_1[1].byte_stats_swapped); | |
211 | |
212 // Parse the 2nd smaps file. | |
213 base::trace_event::ProcessMemoryDump pmd_2(nullptr /* session_state */); | |
214 base::ScopedFILE temp_file2; | |
215 CreateAndSetSmapsFileForTesting(kTestSmaps2, temp_file2); | |
216 ProcessMetricsMemoryDumpProvider::proc_smaps_for_testing = temp_file2.get(); | |
217 pmmdp->OnMemoryDump(dump_args, &pmd_2); | |
218 ASSERT_TRUE(pmd_2.has_process_mmaps()); | |
219 const auto& regions_2 = pmd_2.process_mmaps()->vm_regions(); | |
220 ASSERT_EQ(1UL, regions_2.size()); | |
221 EXPECT_EQ(0x7fe7ce79c000UL, regions_2[0].start_address); | |
222 EXPECT_EQ(0x7fe7ce7a8000UL - 0x7fe7ce79c000UL, regions_2[0].size_in_bytes); | |
223 EXPECT_EQ(0U, regions_2[0].protection_flags); | |
224 EXPECT_EQ("", regions_2[0].mapped_file); | |
225 EXPECT_EQ(32 * 1024UL, regions_2[0].byte_stats_proportional_resident); | |
226 EXPECT_EQ(16 * 1024UL, regions_2[0].byte_stats_shared_clean_resident); | |
227 EXPECT_EQ(12 * 1024UL, regions_2[0].byte_stats_shared_dirty_resident); | |
228 EXPECT_EQ(8 * 1024UL, regions_2[0].byte_stats_private_clean_resident); | |
229 EXPECT_EQ(4 * 1024UL, regions_2[0].byte_stats_private_dirty_resident); | |
230 EXPECT_EQ(0 * 1024UL, regions_2[0].byte_stats_swapped); | |
231 } | |
232 #endif // defined(OS_LINUX) || defined(OS_ANDROID) | |
233 | |
234 } // namespace tracing | |
OLD | NEW |