Chromium Code Reviews| OLD | NEW |
|---|---|
| 1 // Copyright (c) 2017, the Dart project authors. Please see the AUTHORS file | 1 // Copyright (c) 2017, the Dart project authors. Please see the AUTHORS file |
| 2 // for details. All rights reserved. Use of this source code is governed by a | 2 // for details. All rights reserved. Use of this source code is governed by a |
| 3 // BSD-style license that can be found in the LICENSE file. | 3 // BSD-style license that can be found in the LICENSE file. |
| 4 | 4 |
| 5 #include "platform/globals.h" | 5 #include "platform/globals.h" |
| 6 | 6 |
| 7 #if defined(DART_USE_TCMALLOC) && !defined(PRODUCT) | 7 #if defined(DART_USE_TCMALLOC) && !defined(PRODUCT) |
| 8 | 8 |
| 9 #if defined(TARGET_OS_LINUX) | |
| 10 #include <execinfo.h> | |
| 11 #endif // defined(TARGET_OS_LINUX) | |
| 12 | |
| 9 #include "platform/assert.h" | 13 #include "platform/assert.h" |
| 10 #include "vm/class_finalizer.h" | |
| 11 #include "vm/globals.h" | 14 #include "vm/globals.h" |
| 12 #include "vm/malloc_hooks.h" | 15 #include "vm/malloc_hooks.h" |
| 13 #include "vm/symbols.h" | 16 #include "vm/profiler.h" |
| 17 #include "vm/profiler_service.h" | |
| 14 #include "vm/unit_test.h" | 18 #include "vm/unit_test.h" |
| 15 | 19 |
| 16 namespace dart { | 20 namespace dart { |
| 17 | 21 |
| 18 static void MallocHookTestBufferInitializer(volatile char* buffer, | 22 static void MallocHookTestBufferInitializer(volatile char* buffer, |
| 19 uintptr_t size) { | 23 uintptr_t size) { |
| 20 // Run through the buffer and do something. If we don't do this and the memory | 24 // Run through the buffer and do something. If we don't do this and the memory |
| 21 // in buffer isn't touched, the tcmalloc hooks won't be called. | 25 // in buffer isn't touched, the tcmalloc hooks won't be called. |
| 22 for (uintptr_t i = 0; i < size; ++i) { | 26 for (uintptr_t i = 0; i < size; ++i) { |
| 23 buffer[i] = i; | 27 buffer[i] = i; |
| (...skipping 25 matching lines...) Expand all Loading... | |
| 49 MallocHooks::InitOnce(); | 53 MallocHooks::InitOnce(); |
| 50 const intptr_t pre_hook_buffer_size = 3; | 54 const intptr_t pre_hook_buffer_size = 3; |
| 51 char* pre_hook_buffer = new char[pre_hook_buffer_size]; | 55 char* pre_hook_buffer = new char[pre_hook_buffer_size]; |
| 52 MallocHookTestBufferInitializer(pre_hook_buffer, pre_hook_buffer_size); | 56 MallocHookTestBufferInitializer(pre_hook_buffer, pre_hook_buffer_size); |
| 53 | 57 |
| 54 MallocHooks::ResetStats(); | 58 MallocHooks::ResetStats(); |
| 55 EXPECT_EQ(0L, MallocHooks::allocation_count()); | 59 EXPECT_EQ(0L, MallocHooks::allocation_count()); |
| 56 EXPECT_EQ(0L, MallocHooks::heap_allocated_memory_in_bytes()); | 60 EXPECT_EQ(0L, MallocHooks::heap_allocated_memory_in_bytes()); |
| 57 | 61 |
| 58 const intptr_t buffer_size = 10; | 62 const intptr_t buffer_size = 10; |
| 59 volatile char* buffer = new char[buffer_size]; | 63 char* buffer = new char[buffer_size]; |
| 60 MallocHookTestBufferInitializer(buffer, buffer_size); | 64 MallocHookTestBufferInitializer(buffer, buffer_size); |
| 61 | 65 |
| 62 EXPECT_EQ(1L, MallocHooks::allocation_count()); | 66 EXPECT_EQ(1L, MallocHooks::allocation_count()); |
| 63 EXPECT_EQ(static_cast<intptr_t>(sizeof(char) * buffer_size), | 67 EXPECT_EQ(static_cast<intptr_t>(sizeof(char) * buffer_size), |
| 64 MallocHooks::heap_allocated_memory_in_bytes()); | 68 MallocHooks::heap_allocated_memory_in_bytes()); |
| 65 | 69 |
| 66 delete[] pre_hook_buffer; | 70 delete[] pre_hook_buffer; |
| 67 EXPECT_EQ(1L, MallocHooks::allocation_count()); | 71 EXPECT_EQ(1L, MallocHooks::allocation_count()); |
| 68 EXPECT_EQ(static_cast<intptr_t>(sizeof(char) * buffer_size), | 72 EXPECT_EQ(static_cast<intptr_t>(sizeof(char) * buffer_size), |
| 69 MallocHooks::heap_allocated_memory_in_bytes()); | 73 MallocHooks::heap_allocated_memory_in_bytes()); |
| 70 | 74 |
| 71 | 75 |
| 72 delete[] buffer; | 76 delete[] buffer; |
| 73 EXPECT_EQ(0L, MallocHooks::allocation_count()); | 77 EXPECT_EQ(0L, MallocHooks::allocation_count()); |
| 74 EXPECT_EQ(0L, MallocHooks::heap_allocated_memory_in_bytes()); | 78 EXPECT_EQ(0L, MallocHooks::heap_allocated_memory_in_bytes()); |
| 75 MallocHooks::TearDown(); | 79 MallocHooks::TearDown(); |
| 76 } | 80 } |
| 77 | 81 |
| 82 | |
| 83 VM_UNIT_TEST_CASE(StackTraceMallocHookSimpleTest) { | |
| 84 MallocHooks::ResetStats(); | |
| 85 ASSERT(MallocHooks::ProfilingEnabled()); | |
| 86 | |
| 87 char* var = static_cast<char*>(malloc(16 * sizeof(char))); | |
| 88 Sample* sample = MallocHooks::GetSample(var); | |
| 89 EXPECT(sample != NULL); | |
| 90 | |
| 91 free(var); | |
| 92 sample = MallocHooks::GetSample(var); | |
| 93 EXPECT(sample == NULL); | |
| 94 } | |
| 95 | |
| 96 | |
| 97 ISOLATE_UNIT_TEST_CASE(StackTraceMallocHookSimpleJSONTest) { | |
| 98 MallocHooks::ResetStats(); | |
| 99 ASSERT(MallocHooks::ProfilingEnabled()); | |
| 100 ClearProfileVisitor cpv(Isolate::Current()); | |
| 101 Profiler::sample_buffer()->VisitSamples(&cpv); | |
| 102 | |
| 103 char* var = static_cast<char*>(malloc(16 * sizeof(char))); | |
| 104 JSONStream js; | |
| 105 ProfilerService::PrintNativeAllocationJSON(&js, Profile::kNoTags, -1, -1); | |
| 106 const char* json = js.ToCString(); | |
| 107 | |
| 108 // Check that all the stack frames from the current down to main are actually | |
| 109 // present in the profile. This is just a simple sanity check to make sure | |
| 110 // that the ProfileTrie has a representation of the stack trace collected when | |
| 111 // var is allocated. More intense testing is already done in profiler_test.cc. | |
| 112 EXPECT_SUBSTRING("\"dart::Dart_TestStackTraceMallocHookSimpleJSONTest()\"", | |
| 113 json); | |
| 114 EXPECT_SUBSTRING("\"dart::TestCase::Run()\"", json); | |
| 115 EXPECT_SUBSTRING("\"dart::TestCaseBase::RunTest()\"", json); | |
| 116 EXPECT_SUBSTRING("\"main\"", json); | |
| 117 | |
| 118 free(var); | |
| 119 } | |
| 120 | |
| 121 | |
| 122 #if defined(TARGET_OS_LINUX) | |
|
Cutch
2017/02/15 08:21:00
Not sure if this OS_LINUX test is a good idea
bkonyi
2017/02/16 00:28:28
After reading the comments below, I agree with you
| |
| 123 // Helper used to add another frame to the stack before allocating. | |
| 124 char* AllocationHelper(void* stack_trace[32]) { | |
| 125 backtrace(stack_trace, 32); | |
| 126 return static_cast<char*>(malloc(16 * sizeof(char))); | |
| 127 } | |
| 128 | |
| 129 | |
| 130 VM_UNIT_TEST_CASE(StackTraceMallocHookTest) { | |
| 131 MallocHooks::ResetStats(); | |
| 132 ASSERT(MallocHooks::ProfilingEnabled()); | |
| 133 | |
| 134 void* stack_trace[32]; | |
| 135 | |
| 136 // Perform the memory allocation and grab the stack trace created by | |
| 137 // backtrace() for comparison purposes. | |
| 138 char* var = AllocationHelper(stack_trace); | |
| 139 | |
| 140 // Update top pc of the stack trace to match the location that malloc was | |
| 141 // called in AllocationHelper. The rest of the pcs should match without any | |
| 142 // changes. | |
| 143 stack_trace[0] = | |
| 144 reinterpret_cast<void*>(reinterpret_cast<uintptr_t>(stack_trace[0]) + 10); | |
|
Cutch
2017/02/15 08:21:00
this won't be the same across MIPS/ARM/ARM64/etc
| |
| 145 | |
| 146 Sample* sample = MallocHooks::GetSample(var); | |
| 147 ASSERT(sample != NULL); | |
| 148 | |
| 149 while (sample != NULL) { | |
| 150 for (uintptr_t i = 0; i < 8; ++i) { | |
|
Cutch
2017/02/15 08:21:00
Where did 8 come from?
| |
| 151 // Cease comparisons after we pass the frame for main. | |
| 152 if (sample->At(i) == 0) { | |
| 153 break; | |
| 154 } | |
| 155 EXPECT_EQ(reinterpret_cast<uword>(stack_trace[i]), sample->At(i)); | |
| 156 } | |
| 157 | |
| 158 if (!sample->is_continuation_sample()) { | |
| 159 break; | |
| 160 } | |
| 161 sample = Profiler::sample_buffer()->At(sample->continuation_index()); | |
| 162 } | |
| 163 free(var); | |
| 164 } | |
| 165 #endif // defined(TARGET_OS_LINUX) | |
| 166 | |
| 78 }; // namespace dart | 167 }; // namespace dart |
| 79 | 168 |
| 80 #endif // defined(DART_USE_TCMALLOC) && !defined(PRODUCT) | 169 #endif // defined(DART_USE_TCMALLOC) && !defined(PRODUCT) |
| OLD | NEW |