| Index: tools/android/heap_profiler/heap_profiler_integrationtest.cc
|
| diff --git a/tools/android/heap_profiler/heap_profiler_integrationtest.cc b/tools/android/heap_profiler/heap_profiler_integrationtest.cc
|
| deleted file mode 100644
|
| index f1909b1c0baa9117a32fc8bf9cde2d502d9be8e0..0000000000000000000000000000000000000000
|
| --- a/tools/android/heap_profiler/heap_profiler_integrationtest.cc
|
| +++ /dev/null
|
| @@ -1,179 +0,0 @@
|
| -// Copyright 2014 The Chromium Authors. All rights reserved.
|
| -// Use of this source code is governed by a BSD-style license that can be
|
| -// found in the LICENSE file.
|
| -
|
| -#include <dlfcn.h>
|
| -#include <fcntl.h>
|
| -#include <stddef.h>
|
| -#include <stdlib.h>
|
| -#include <string.h>
|
| -#include <sys/mman.h>
|
| -#include <unistd.h>
|
| -#include <map>
|
| -
|
| -#include "testing/gtest/include/gtest/gtest.h"
|
| -#include "tools/android/heap_profiler/heap_profiler.h"
|
| -
|
| -namespace {
|
| -
|
| -typedef void* (*AllocatorFn)(size_t);
|
| -typedef int (*FreeFn)(void*, size_t);
|
| -
|
| -const size_t kSize1 = 499 * PAGE_SIZE;
|
| -const size_t kSize2 = 503 * PAGE_SIZE;
|
| -const size_t kSize3 = 509 * PAGE_SIZE;
|
| -
|
| -// The purpose of the four functions below is to create watermarked allocations,
|
| -// so the test fixture can ascertain that the hooks work end-to-end.
|
| -__attribute__((noinline)) void* MallocInner(size_t size) {
|
| - void* ptr = malloc(size);
|
| - // The memset below is to avoid tail-call elimination optimizations and ensure
|
| - // that this function will be part of the stack trace.
|
| - memset(ptr, 0, size);
|
| - return ptr;
|
| -}
|
| -
|
| -__attribute__((noinline)) void* MallocOuter(size_t size) {
|
| - void* ptr = MallocInner(size);
|
| - memset(ptr, 0, size);
|
| - return ptr;
|
| -}
|
| -
|
| -__attribute__((noinline)) void* DoMmap(size_t size) {
|
| - return mmap(
|
| - 0, size, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, 0, 0);
|
| -}
|
| -
|
| -__attribute__((noinline)) void* MmapInner(size_t size) {
|
| - void* ptr = DoMmap(size);
|
| - memset(ptr, 0, size);
|
| - return ptr;
|
| -}
|
| -
|
| -__attribute__((noinline)) void* MmapOuter(size_t size) {
|
| - void* ptr = MmapInner(size);
|
| - memset(ptr, 0, size);
|
| - return ptr;
|
| -}
|
| -
|
| -const HeapStats* GetHeapStats() {
|
| - HeapStats* const* stats_ptr = reinterpret_cast<HeapStats* const*>(
|
| - dlsym(RTLD_DEFAULT, "heap_profiler_stats_for_tests"));
|
| - EXPECT_TRUE(stats_ptr != NULL);
|
| - const HeapStats* stats = *stats_ptr;
|
| - EXPECT_TRUE(stats != NULL);
|
| - EXPECT_EQ(HEAP_PROFILER_MAGIC_MARKER, stats->magic_start);
|
| - return stats;
|
| -}
|
| -
|
| -bool StackTraceContains(const StacktraceEntry* s, AllocatorFn fn) {
|
| - // kExpectedFnLen is a gross estimation of the watermark functions' size.
|
| - // It tries to address the following problem: the addrs in the unwound stack
|
| - // stack frames will NOT point to the beginning of the functions, but to the
|
| - // PC after the call to malloc/mmap.
|
| - const size_t kExpectedFnLen = 16;
|
| - const uintptr_t fn_addr = reinterpret_cast<uintptr_t>(fn);
|
| - for (size_t i = 0; i < HEAP_PROFILER_MAX_DEPTH; ++i) {
|
| - if (s->frames[i] >= fn_addr && s->frames[i] <= fn_addr + kExpectedFnLen)
|
| - return true;
|
| - }
|
| - return false;
|
| -}
|
| -
|
| -const StacktraceEntry* LookupStackTrace(size_t size, AllocatorFn fn) {
|
| - const HeapStats* stats = GetHeapStats();
|
| - for (size_t i = 0; i < stats->max_stack_traces; ++i) {
|
| - const StacktraceEntry* st = &stats->stack_traces[i];
|
| - if (st->alloc_bytes == size && StackTraceContains(st, fn))
|
| - return st;
|
| - }
|
| - return NULL;
|
| -}
|
| -
|
| -int DoFree(void* addr, size_t /*size, ignored.*/) {
|
| - free(addr);
|
| - return 0;
|
| -}
|
| -
|
| -void TestStackTracesWithParams(AllocatorFn outer_fn,
|
| - AllocatorFn inner_fn,
|
| - FreeFn free_fn) {
|
| - const HeapStats* stats = GetHeapStats();
|
| -
|
| - void* m1 = outer_fn(kSize1);
|
| - void* m2 = inner_fn(kSize2);
|
| - void* m3 = inner_fn(kSize3);
|
| - free_fn(m3, kSize3);
|
| -
|
| - const StacktraceEntry* st1 = LookupStackTrace(kSize1, inner_fn);
|
| - const StacktraceEntry* st2 = LookupStackTrace(kSize2, inner_fn);
|
| - const StacktraceEntry* st3 = LookupStackTrace(kSize3, inner_fn);
|
| -
|
| - EXPECT_TRUE(st1 != NULL);
|
| - EXPECT_TRUE(StackTraceContains(st1, outer_fn));
|
| - EXPECT_TRUE(StackTraceContains(st1, inner_fn));
|
| -
|
| - EXPECT_TRUE(st2 != NULL);
|
| - EXPECT_FALSE(StackTraceContains(st2, outer_fn));
|
| - EXPECT_TRUE(StackTraceContains(st2, inner_fn));
|
| -
|
| - EXPECT_EQ(NULL, st3);
|
| -
|
| - const size_t total_alloc_start = stats->total_alloc_bytes;
|
| - const size_t num_stack_traces_start = stats->num_stack_traces;
|
| -
|
| - free_fn(m1, kSize1);
|
| - free_fn(m2, kSize2);
|
| -
|
| - const size_t total_alloc_end = stats->total_alloc_bytes;
|
| - const size_t num_stack_traces_end = stats->num_stack_traces;
|
| -
|
| - EXPECT_EQ(kSize1 + kSize2, total_alloc_start - total_alloc_end);
|
| - EXPECT_EQ(2, num_stack_traces_start - num_stack_traces_end);
|
| - EXPECT_EQ(NULL, LookupStackTrace(kSize1, inner_fn));
|
| - EXPECT_EQ(NULL, LookupStackTrace(kSize2, inner_fn));
|
| - EXPECT_EQ(NULL, LookupStackTrace(kSize3, inner_fn));
|
| -}
|
| -
|
| -TEST(HeapProfilerIntegrationTest, TestMallocStackTraces) {
|
| - TestStackTracesWithParams(&MallocOuter, &MallocInner, &DoFree);
|
| -}
|
| -
|
| -TEST(HeapProfilerIntegrationTest, TestMmapStackTraces) {
|
| - TestStackTracesWithParams(&MmapOuter, &MmapInner, &munmap);
|
| -}
|
| -
|
| -// Returns the path of the directory containing the current executable.
|
| -std::string GetExePath() {
|
| - char buf[1024];
|
| - ssize_t len = readlink("/proc/self/exe", buf, sizeof(buf) - 1);
|
| - if (len == -1)
|
| - return std::string();
|
| - std::string path(buf, len);
|
| - size_t sep = path.find_last_of('/');
|
| - if (sep == std::string::npos)
|
| - return std::string();
|
| - path.erase(sep);
|
| - return path;
|
| -}
|
| -
|
| -} // namespace
|
| -
|
| -int main(int argc, char** argv) {
|
| - // Re-launch the process itself forcing the preload of the libheap_profiler.
|
| - char* ld_preload = getenv("LD_PRELOAD");
|
| - if (ld_preload == NULL || strstr(ld_preload, "libheap_profiler.so") == NULL) {
|
| - char env_ld_lib_path[256];
|
| - strlcpy(env_ld_lib_path, "LD_LIBRARY_PATH=", sizeof(env_ld_lib_path));
|
| - strlcat(env_ld_lib_path, GetExePath().c_str(), sizeof(env_ld_lib_path));
|
| - char env_ld_preload[] = "LD_PRELOAD=libheap_profiler.so";
|
| - char* const env[] = {env_ld_preload, env_ld_lib_path, 0};
|
| - execve("/proc/self/exe", argv, env);
|
| - // execve() never returns, unless something goes wrong.
|
| - perror("execve");
|
| - assert(false);
|
| - }
|
| -
|
| - testing::InitGoogleTest(&argc, argv);
|
| - return RUN_ALL_TESTS();
|
| -}
|
|
|