| // Copyright 2015 The Chromium Authors. All rights reserved. | 
 | // Use of this source code is governed by a BSD-style license that can be | 
 | // found in the LICENSE file. | 
 |  | 
 | #include "base/trace_event/process_memory_maps_dump_provider.h" | 
 |  | 
 | #include <fstream> | 
 | #include <sstream> | 
 |  | 
 | #include "base/trace_event/process_memory_dump.h" | 
 | #include "base/trace_event/process_memory_maps.h" | 
 | #include "base/trace_event/trace_event_argument.h" | 
 | #include "testing/gtest/include/gtest/gtest.h" | 
 |  | 
 | namespace base { | 
 | namespace trace_event { | 
 |  | 
 | #if defined(OS_LINUX) || defined(OS_ANDROID) | 
 | namespace { | 
 | const char kTestSmaps1[] = | 
 |     "00400000-004be000 r-xp 00000000 fc:01 1234              /file/1\n" | 
 |     "Size:                760 kB\n" | 
 |     "Rss:                 296 kB\n" | 
 |     "Pss:                 162 kB\n" | 
 |     "Shared_Clean:        228 kB\n" | 
 |     "Shared_Dirty:          0 kB\n" | 
 |     "Private_Clean:         0 kB\n" | 
 |     "Private_Dirty:        68 kB\n" | 
 |     "Referenced:          296 kB\n" | 
 |     "Anonymous:            68 kB\n" | 
 |     "AnonHugePages:         0 kB\n" | 
 |     "Swap:                  0 kB\n" | 
 |     "KernelPageSize:        4 kB\n" | 
 |     "MMUPageSize:           4 kB\n" | 
 |     "Locked:                0 kB\n" | 
 |     "VmFlags: rd ex mr mw me dw sd\n" | 
 |     "ff000000-ff800000 -w-p 00001080 fc:01 0            /file/name with space\n" | 
 |     "Size:                  0 kB\n" | 
 |     "Rss:                 192 kB\n" | 
 |     "Pss:                 128 kB\n" | 
 |     "Shared_Clean:        120 kB\n" | 
 |     "Shared_Dirty:          4 kB\n" | 
 |     "Private_Clean:        60 kB\n" | 
 |     "Private_Dirty:         8 kB\n" | 
 |     "Referenced:          296 kB\n" | 
 |     "Anonymous:             0 kB\n" | 
 |     "AnonHugePages:         0 kB\n" | 
 |     "Swap:                  0 kB\n" | 
 |     "KernelPageSize:        4 kB\n" | 
 |     "MMUPageSize:           4 kB\n" | 
 |     "Locked:                0 kB\n" | 
 |     "VmFlags: rd ex mr mw me dw sd"; | 
 |  | 
 | const char kTestSmaps2[] = | 
 |     // An invalid region, with zero size and overlapping with the last one | 
 |     // (See crbug.com/461237). | 
 |     "7fe7ce79c000-7fe7ce79c000 ---p 00000000 00:00 0 \n" | 
 |     "Size:                  4 kB\n" | 
 |     "Rss:                   0 kB\n" | 
 |     "Pss:                   0 kB\n" | 
 |     "Shared_Clean:          0 kB\n" | 
 |     "Shared_Dirty:          0 kB\n" | 
 |     "Private_Clean:         0 kB\n" | 
 |     "Private_Dirty:         0 kB\n" | 
 |     "Referenced:            0 kB\n" | 
 |     "Anonymous:             0 kB\n" | 
 |     "AnonHugePages:         0 kB\n" | 
 |     "Swap:                  0 kB\n" | 
 |     "KernelPageSize:        4 kB\n" | 
 |     "MMUPageSize:           4 kB\n" | 
 |     "Locked:                0 kB\n" | 
 |     "VmFlags: rd ex mr mw me dw sd\n" | 
 |     // A invalid region with its range going backwards. | 
 |     "00400000-00200000 ---p 00000000 00:00 0 \n" | 
 |     "Size:                  4 kB\n" | 
 |     "Rss:                   0 kB\n" | 
 |     "Pss:                   0 kB\n" | 
 |     "Shared_Clean:          0 kB\n" | 
 |     "Shared_Dirty:          0 kB\n" | 
 |     "Private_Clean:         0 kB\n" | 
 |     "Private_Dirty:         0 kB\n" | 
 |     "Referenced:            0 kB\n" | 
 |     "Anonymous:             0 kB\n" | 
 |     "AnonHugePages:         0 kB\n" | 
 |     "Swap:                  0 kB\n" | 
 |     "KernelPageSize:        4 kB\n" | 
 |     "MMUPageSize:           4 kB\n" | 
 |     "Locked:                0 kB\n" | 
 |     "VmFlags: rd ex mr mw me dw sd\n" | 
 |     // A good anonymous region at the end. | 
 |     "7fe7ce79c000-7fe7ce7a8000 ---p 00000000 00:00 0 \n" | 
 |     "Size:                 48 kB\n" | 
 |     "Rss:                  40 kB\n" | 
 |     "Pss:                  32 kB\n" | 
 |     "Shared_Clean:         16 kB\n" | 
 |     "Shared_Dirty:         12 kB\n" | 
 |     "Private_Clean:         8 kB\n" | 
 |     "Private_Dirty:         4 kB\n" | 
 |     "Referenced:           40 kB\n" | 
 |     "Anonymous:            16 kB\n" | 
 |     "AnonHugePages:         0 kB\n" | 
 |     "Swap:                  0 kB\n" | 
 |     "KernelPageSize:        4 kB\n" | 
 |     "MMUPageSize:           4 kB\n" | 
 |     "Locked:                0 kB\n" | 
 |     "VmFlags: rd wr mr mw me ac sd\n"; | 
 | }  // namespace | 
 |  | 
 | TEST(ProcessMemoryMapsDumpProviderTest, ParseProcSmaps) { | 
 |   const uint32 kProtR = ProcessMemoryMaps::VMRegion::kProtectionFlagsRead; | 
 |   const uint32 kProtW = ProcessMemoryMaps::VMRegion::kProtectionFlagsWrite; | 
 |   const uint32 kProtX = ProcessMemoryMaps::VMRegion::kProtectionFlagsExec; | 
 |  | 
 |   auto pmmdp = ProcessMemoryMapsDumpProvider::GetInstance(); | 
 |  | 
 |   // Emulate a non-existent /proc/self/smaps. | 
 |   ProcessMemoryDump pmd_invalid(nullptr /* session_state */); | 
 |   std::ifstream non_existent_file("/tmp/does-not-exist"); | 
 |   ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = &non_existent_file; | 
 |   CHECK_EQ(false, non_existent_file.good()); | 
 |   pmmdp->OnMemoryDump(&pmd_invalid); | 
 |   ASSERT_FALSE(pmd_invalid.has_process_mmaps()); | 
 |  | 
 |   // Emulate an empty /proc/self/smaps. | 
 |   std::ifstream empty_file("/dev/null"); | 
 |   ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = &empty_file; | 
 |   CHECK_EQ(true, empty_file.good()); | 
 |   pmmdp->OnMemoryDump(&pmd_invalid); | 
 |   ASSERT_FALSE(pmd_invalid.has_process_mmaps()); | 
 |  | 
 |   // Parse the 1st smaps file. | 
 |   ProcessMemoryDump pmd_1(nullptr /* session_state */); | 
 |   std::istringstream test_smaps_1(kTestSmaps1); | 
 |   ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = &test_smaps_1; | 
 |   pmmdp->OnMemoryDump(&pmd_1); | 
 |   ASSERT_TRUE(pmd_1.has_process_mmaps()); | 
 |   const auto& regions_1 = pmd_1.process_mmaps()->vm_regions(); | 
 |   ASSERT_EQ(2UL, regions_1.size()); | 
 |  | 
 |   EXPECT_EQ(0x00400000UL, regions_1[0].start_address); | 
 |   EXPECT_EQ(0x004be000UL - 0x00400000UL, regions_1[0].size_in_bytes); | 
 |   EXPECT_EQ(kProtR | kProtX, regions_1[0].protection_flags); | 
 |   EXPECT_EQ("/file/1", regions_1[0].mapped_file); | 
 |   EXPECT_EQ(162 * 1024UL, regions_1[0].byte_stats_proportional_resident); | 
 |   EXPECT_EQ((228 + 0) * 1024UL, regions_1[0].byte_stats_shared_resident); | 
 |   EXPECT_EQ((0 + 68) * 1024UL, regions_1[0].byte_stats_private_resident); | 
 |  | 
 |   EXPECT_EQ(0xff000000UL, regions_1[1].start_address); | 
 |   EXPECT_EQ(0xff800000UL - 0xff000000UL, regions_1[1].size_in_bytes); | 
 |   EXPECT_EQ(kProtW, regions_1[1].protection_flags); | 
 |   EXPECT_EQ("/file/name with space", regions_1[1].mapped_file); | 
 |   EXPECT_EQ(128 * 1024UL, regions_1[1].byte_stats_proportional_resident); | 
 |   EXPECT_EQ((120 + 4) * 1024UL, regions_1[1].byte_stats_shared_resident); | 
 |   EXPECT_EQ((60 + 8) * 1024UL, regions_1[1].byte_stats_private_resident); | 
 |  | 
 |   // Parse the 2nd smaps file. | 
 |   ProcessMemoryDump pmd_2(nullptr /* session_state */); | 
 |   std::istringstream test_smaps_2(kTestSmaps2); | 
 |   ProcessMemoryMapsDumpProvider::proc_smaps_for_testing = &test_smaps_2; | 
 |   pmmdp->OnMemoryDump(&pmd_2); | 
 |   ASSERT_TRUE(pmd_2.has_process_mmaps()); | 
 |   const auto& regions_2 = pmd_2.process_mmaps()->vm_regions(); | 
 |   ASSERT_EQ(1UL, regions_2.size()); | 
 |   EXPECT_EQ(0x7fe7ce79c000UL, regions_2[0].start_address); | 
 |   EXPECT_EQ(0x7fe7ce7a8000UL - 0x7fe7ce79c000UL, regions_2[0].size_in_bytes); | 
 |   EXPECT_EQ(0U, regions_2[0].protection_flags); | 
 |   EXPECT_EQ("", regions_2[0].mapped_file); | 
 |   EXPECT_EQ(32 * 1024UL, regions_2[0].byte_stats_proportional_resident); | 
 |   EXPECT_EQ((16 + 12) * 1024UL, regions_2[0].byte_stats_shared_resident); | 
 |   EXPECT_EQ((8 + 4) * 1024UL, regions_2[0].byte_stats_private_resident); | 
 | } | 
 | #endif  // defined(OS_LINUX) || defined(OS_ANDROID) | 
 |  | 
 | }  // namespace trace_event | 
 | }  // namespace base |