Index: base/trace_event/process_memory_maps_dump_provider_unittest.cc |
diff --git a/base/trace_event/process_memory_maps_dump_provider_unittest.cc b/base/trace_event/process_memory_maps_dump_provider_unittest.cc |
index 33c1bbb0f25c2804cb4714ff3a31e376a9596af8..f36585b3ed2e3cc158dcae476e5d63c6f4cb3000 100644 |
--- a/base/trace_event/process_memory_maps_dump_provider_unittest.cc |
+++ b/base/trace_event/process_memory_maps_dump_provider_unittest.cc |
@@ -12,11 +12,105 @@ |
#include "base/trace_event/trace_event_argument.h" |
#include "testing/gtest/include/gtest/gtest.h" |
+namespace { |
+const char kTestSmaps1[] = |
+ "00400000-004be000 r-xp 00000000 fc:01 1234 /file/1\n" |
+ "Size: 760 kB\n" |
+ "Rss: 296 kB\n" |
+ "Pss: 162 kB\n" |
+ "Shared_Clean: 228 kB\n" |
+ "Shared_Dirty: 0 kB\n" |
+ "Private_Clean: 0 kB\n" |
+ "Private_Dirty: 68 kB\n" |
+ "Referenced: 296 kB\n" |
+ "Anonymous: 68 kB\n" |
+ "AnonHugePages: 0 kB\n" |
+ "Swap: 0 kB\n" |
+ "KernelPageSize: 4 kB\n" |
+ "MMUPageSize: 4 kB\n" |
+ "Locked: 0 kB\n" |
+ "VmFlags: rd ex mr mw me dw sd\n" |
+ "ff000000-ff800000 -w-p 00001080 fc:01 0 /file/name with space\n" |
+ "Size: 0 kB\n" |
+ "Rss: 128 kB\n" |
+ "Pss: 128 kB\n" |
+ "Shared_Clean: 124 kB\n" |
+ "Shared_Dirty: 0 kB\n" |
+ "Private_Clean: 68 kB\n" |
+ "Private_Dirty: 0 kB\n" |
+ "Referenced: 296 kB\n" |
+ "Anonymous: 0 kB\n" |
+ "AnonHugePages: 0 kB\n" |
+ "Swap: 0 kB\n" |
+ "KernelPageSize: 4 kB\n" |
+ "MMUPageSize: 4 kB\n" |
+ "Locked: 0 kB\n" |
+ "VmFlags: rd ex mr mw me dw sd"; |
+ |
+const char kTestSmaps2[] = |
+ // An invalid region, with zero size and overlapping with the last one |
Sami
2015/02/24 14:22:43
nit: extra space here
Primiano Tucci (use gerrit)
2015/02/24 15:43:25
Done.
|
+ // (See crbug.com/461237). |
+ "7fe7ce79c000-7fe7ce79c000 ---p 00000000 00:00 0 \n" |
+ "Size: 4 kB\n" |
+ "Rss: 0 kB\n" |
+ "Pss: 0 kB\n" |
+ "Shared_Clean: 0 kB\n" |
+ "Shared_Dirty: 0 kB\n" |
+ "Private_Clean: 0 kB\n" |
+ "Private_Dirty: 0 kB\n" |
+ "Referenced: 0 kB\n" |
+ "Anonymous: 0 kB\n" |
+ "AnonHugePages: 0 kB\n" |
+ "Swap: 0 kB\n" |
+ "KernelPageSize: 4 kB\n" |
+ "MMUPageSize: 4 kB\n" |
+ "Locked: 0 kB\n" |
+ "VmFlags: rd ex mr mw me dw sd\n" |
+ // A invalid region with its range going backwards. |
+ "00400000-00200000 ---p 00000000 00:00 0 \n" |
+ "Size: 4 kB\n" |
+ "Rss: 0 kB\n" |
+ "Pss: 0 kB\n" |
+ "Shared_Clean: 0 kB\n" |
+ "Shared_Dirty: 0 kB\n" |
+ "Private_Clean: 0 kB\n" |
+ "Private_Dirty: 0 kB\n" |
+ "Referenced: 0 kB\n" |
+ "Anonymous: 0 kB\n" |
+ "AnonHugePages: 0 kB\n" |
+ "Swap: 0 kB\n" |
+ "KernelPageSize: 4 kB\n" |
+ "MMUPageSize: 4 kB\n" |
+ "Locked: 0 kB\n" |
+ "VmFlags: rd ex mr mw me dw sd\n" |
+ // A good anonymous region at the end. |
+ "7fe7ce79c000-7fe7ce7a8000 ---p 00000000 00:00 0 \n" |
+ "Size: 48 kB\n" |
+ "Rss: 40 kB\n" |
+ "Pss: 0 kB\n" |
+ "Shared_Clean: 16 kB\n" |
+ "Shared_Dirty: 12 kB\n" |
+ "Private_Clean: 8 kB\n" |
+ "Private_Dirty: 4 kB\n" |
+ "Referenced: 40 kB\n" |
+ "Anonymous: 16 kB\n" |
+ "AnonHugePages: 0 kB\n" |
+ "Swap: 0 kB\n" |
+ "KernelPageSize: 4 kB\n" |
+ "MMUPageSize: 4 kB\n" |
+ "Locked: 0 kB\n" |
+ "VmFlags: rd wr mr mw me ac sd\n"; |
+} // namespace |
+ |
namespace base { |
namespace trace_event { |
#if defined(OS_LINUX) || defined(OS_ANDROID) |
TEST(ProcessMemoryMapsDumpProviderTest, ParseProcSmaps) { |
+ const uint32 kProtR = ProcessMemoryMaps::VMRegion::kProtectionFlagsRead; |
+ const uint32 kProtW = ProcessMemoryMaps::VMRegion::kProtectionFlagsWrite; |
+ const uint32 kProtX = ProcessMemoryMaps::VMRegion::kProtectionFlagsExec; |
+ |
auto pmmdp = ProcessMemoryMapsDumpProvider::GetInstance(); |
// Emulate a non-existent /proc/self/smaps. |
@@ -34,8 +128,46 @@ TEST(ProcessMemoryMapsDumpProviderTest, ParseProcSmaps) { |
pmmdp->DumpInto(&pmd_invalid); |
ASSERT_FALSE(pmd_invalid.has_process_mmaps()); |
- // TODO(primiano): in the next CLs add the code to parse some actual smaps |
- // files and check that the parsing logic of the dump provider holds. |
+ // Parse the 1st smaps file. |
+ ProcessMemoryDump pmd_1; |
+ std::istringstream test_smaps_1(kTestSmaps1); |
+ ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = &test_smaps_1; |
+ pmmdp->DumpInto(&pmd_1); |
+ ASSERT_TRUE(pmd_1.has_process_mmaps()); |
+ const auto& regions_1 = pmd_1.process_mmaps()->vm_regions(); |
+ ASSERT_EQ(2UL, regions_1.size()); |
+ |
+ EXPECT_EQ(0x00400000UL, regions_1[0].start_address); |
+ EXPECT_EQ(0x004be000UL - 0x00400000UL, regions_1[0].size_in_bytes); |
+ EXPECT_EQ(kProtR | kProtX, regions_1[0].protection_flags); |
+ EXPECT_EQ("/file/1", regions_1[0].mapped_file); |
+ EXPECT_EQ(0UL, regions_1[0].mapped_file_offset); |
+ EXPECT_EQ(296 * 1024UL, regions_1[0].byte_stats_resident); |
+ EXPECT_EQ(68 * 1024UL, regions_1[0].byte_stats_anonymous); |
+ |
+ EXPECT_EQ(0xff000000UL, regions_1[1].start_address); |
+ EXPECT_EQ(0xff800000UL - 0xff000000UL, regions_1[1].size_in_bytes); |
+ EXPECT_EQ(kProtW, regions_1[1].protection_flags); |
+ EXPECT_EQ("/file/name with space", regions_1[1].mapped_file); |
+ EXPECT_EQ(0x00001080UL, regions_1[1].mapped_file_offset); |
+ EXPECT_EQ(128 * 1024UL, regions_1[1].byte_stats_resident); |
+ EXPECT_EQ(0UL, regions_1[1].byte_stats_anonymous); |
+ |
+ // Parse the 2nd smaps file. |
+ ProcessMemoryDump pmd_2; |
+ std::istringstream test_smaps_2(kTestSmaps2); |
+ ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = &test_smaps_2; |
+ pmmdp->DumpInto(&pmd_2); |
+ ASSERT_TRUE(pmd_2.has_process_mmaps()); |
+ const auto& regions_2 = pmd_2.process_mmaps()->vm_regions(); |
+ ASSERT_EQ(1UL, regions_2.size()); |
+ EXPECT_EQ(0x7fe7ce79c000UL, regions_2[0].start_address); |
+ EXPECT_EQ(0x7fe7ce7a8000UL - 0x7fe7ce79c000UL, regions_2[0].size_in_bytes); |
+ EXPECT_EQ(0U, regions_2[0].protection_flags); |
+ EXPECT_EQ("", regions_2[0].mapped_file); |
+ EXPECT_EQ(0UL, regions_2[0].mapped_file_offset); |
+ EXPECT_EQ(40 * 1024UL, regions_2[0].byte_stats_resident); |
+ EXPECT_EQ(16 * 1024UL, regions_2[0].byte_stats_anonymous); |
} |
#endif // defined(OS_LINUX) || defined(OS_ANDROID) |