• Home
  • Line#
  • Scopes#
  • Navigate#
  • Raw
  • Download
1 // Copyright 2014 The Chromium Authors. All rights reserved.
2 // Use of this source code is governed by a BSD-style license that can be
3 // found in the LICENSE file.
4 
5 #include <dlfcn.h>
6 #include <fcntl.h>
7 #include <stdlib.h>
8 #include <string.h>
9 #include <sys/mman.h>
10 #include <unistd.h>
11 #include <map>
12 
13 #include "base/compiler_specific.h"
14 #include "testing/gtest/include/gtest/gtest.h"
15 #include "tools/android/heap_profiler/heap_profiler.h"
16 
17 namespace {
18 
19 typedef void* (*AllocatorFn)(size_t);
20 typedef int (*FreeFn)(void*, size_t);
21 
22 const size_t kSize1 = 499 * PAGE_SIZE;
23 const size_t kSize2 = 503 * PAGE_SIZE;
24 const size_t kSize3 = 509 * PAGE_SIZE;
25 
26 // The purpose of the four functions below is to create watermarked allocations,
27 // so the test fixture can ascertain that the hooks work end-to-end.
MallocInner(size_t size)28 __attribute__((noinline)) void* MallocInner(size_t size) {
29   void* ptr = malloc(size);
30   // The memset below is to avoid tail-call elimination optimizations and ensure
31   // that this function will be part of the stack trace.
32   memset(ptr, 0, size);
33   return ptr;
34 }
35 
MallocOuter(size_t size)36 __attribute__((noinline)) void* MallocOuter(size_t size) {
37   void* ptr = MallocInner(size);
38   memset(ptr, 0, size);
39   return ptr;
40 }
41 
DoMmap(size_t size)42 __attribute__((noinline)) void* DoMmap(size_t size) {
43   return mmap(
44       0, size, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS, 0, 0);
45 }
46 
MmapInner(size_t size)47 __attribute__((noinline)) void* MmapInner(size_t size) {
48   void* ptr = DoMmap(size);
49   memset(ptr, 0, size);
50   return ptr;
51 }
52 
MmapOuter(size_t size)53 __attribute__((noinline)) void* MmapOuter(size_t size) {
54   void* ptr = MmapInner(size);
55   memset(ptr, 0, size);
56   return ptr;
57 }
58 
GetHeapStats()59 const HeapStats* GetHeapStats() {
60   HeapStats* const* stats_ptr = reinterpret_cast<HeapStats* const*>(
61       dlsym(RTLD_DEFAULT, "heap_profiler_stats_for_tests"));
62   EXPECT_TRUE(stats_ptr != NULL);
63   const HeapStats* stats = *stats_ptr;
64   EXPECT_TRUE(stats != NULL);
65   EXPECT_EQ(HEAP_PROFILER_MAGIC_MARKER, stats->magic_start);
66   return stats;
67 }
68 
StackTraceContains(const StacktraceEntry * s,AllocatorFn fn)69 bool StackTraceContains(const StacktraceEntry* s, AllocatorFn fn) {
70   // kExpectedFnLen is a gross estimation of the watermark functions' size.
71   // It tries to address the following problem: the addrs in the unwound stack
72   // stack frames will NOT point to the beginning of the functions, but to the
73   // PC after the call to malloc/mmap.
74   const size_t kExpectedFnLen = 16;
75   const uintptr_t fn_addr = reinterpret_cast<uintptr_t>(fn);
76   for (size_t i = 0; i < HEAP_PROFILER_MAX_DEPTH; ++i) {
77     if (s->frames[i] >= fn_addr && s->frames[i] <= fn_addr + kExpectedFnLen)
78       return true;
79   }
80   return false;
81 }
82 
LookupStackTrace(size_t size,AllocatorFn fn)83 const StacktraceEntry* LookupStackTrace(size_t size, AllocatorFn fn) {
84   const HeapStats* stats = GetHeapStats();
85   for (size_t i = 0; i < stats->max_stack_traces; ++i) {
86     const StacktraceEntry* st = &stats->stack_traces[i];
87     if (st->alloc_bytes == size && StackTraceContains(st, fn))
88       return st;
89   }
90   return NULL;
91 }
92 
DoFree(void * addr,size_t)93 int DoFree(void* addr, size_t /*size, ignored.*/) {
94   free(addr);
95   return 0;
96 }
97 
TestStackTracesWithParams(AllocatorFn outer_fn,AllocatorFn inner_fn,FreeFn free_fn)98 void TestStackTracesWithParams(AllocatorFn outer_fn,
99                                AllocatorFn inner_fn,
100                                FreeFn free_fn) {
101   const HeapStats* stats = GetHeapStats();
102 
103   void* m1 = outer_fn(kSize1);
104   void* m2 = inner_fn(kSize2);
105   void* m3 = inner_fn(kSize3);
106   free_fn(m3, kSize3);
107 
108   const StacktraceEntry* st1 = LookupStackTrace(kSize1, inner_fn);
109   const StacktraceEntry* st2 = LookupStackTrace(kSize2, inner_fn);
110   const StacktraceEntry* st3 = LookupStackTrace(kSize3, inner_fn);
111 
112   EXPECT_TRUE(st1 != NULL);
113   EXPECT_TRUE(StackTraceContains(st1, outer_fn));
114   EXPECT_TRUE(StackTraceContains(st1, inner_fn));
115 
116   EXPECT_TRUE(st2 != NULL);
117   EXPECT_FALSE(StackTraceContains(st2, outer_fn));
118   EXPECT_TRUE(StackTraceContains(st2, inner_fn));
119 
120   EXPECT_EQ(NULL, st3);
121 
122   const size_t total_alloc_start = stats->total_alloc_bytes;
123   const size_t num_stack_traces_start = stats->num_stack_traces;
124 
125   free_fn(m1, kSize1);
126   free_fn(m2, kSize2);
127 
128   const size_t total_alloc_end = stats->total_alloc_bytes;
129   const size_t num_stack_traces_end = stats->num_stack_traces;
130 
131   EXPECT_EQ(kSize1 + kSize2, total_alloc_start - total_alloc_end);
132   EXPECT_EQ(2, num_stack_traces_start - num_stack_traces_end);
133   EXPECT_EQ(NULL, LookupStackTrace(kSize1, inner_fn));
134   EXPECT_EQ(NULL, LookupStackTrace(kSize2, inner_fn));
135   EXPECT_EQ(NULL, LookupStackTrace(kSize3, inner_fn));
136 }
137 
TEST(HeapProfilerIntegrationTest,TestMallocStackTraces)138 TEST(HeapProfilerIntegrationTest, TestMallocStackTraces) {
139   TestStackTracesWithParams(&MallocOuter, &MallocInner, &DoFree);
140 }
141 
TEST(HeapProfilerIntegrationTest,TestMmapStackTraces)142 TEST(HeapProfilerIntegrationTest, TestMmapStackTraces) {
143   TestStackTracesWithParams(&MmapOuter, &MmapInner, &munmap);
144 }
145 
146 // Returns the path of the directory containing the current executable.
GetExePath()147 std::string GetExePath() {
148   char buf[1024];
149   ssize_t len = readlink("/proc/self/exe", buf, sizeof(buf) - 1);
150   if (len == -1)
151     return std::string();
152   std::string path(buf, len);
153   size_t sep = path.find_last_of('/');
154   if (sep == std::string::npos)
155     return std::string();
156   path.erase(sep);
157   return path;
158 }
159 
160 }  // namespace
161 
main(int argc,char ** argv)162 int main(int argc, char** argv) {
163   // Re-launch the process itself forcing the preload of the libheap_profiler.
164   char* ld_preload = getenv("LD_PRELOAD");
165   if (ld_preload == NULL || strstr(ld_preload, "libheap_profiler.so") == NULL) {
166     char env_ld_lib_path[256];
167     strlcpy(env_ld_lib_path, "LD_LIBRARY_PATH=", sizeof(env_ld_lib_path));
168     strlcat(env_ld_lib_path, GetExePath().c_str(), sizeof(env_ld_lib_path));
169     char env_ld_preload[] = "LD_PRELOAD=libheap_profiler.so";
170     char* const env[] = {env_ld_preload, env_ld_lib_path, 0};
171     execve("/proc/self/exe", argv, env);
172     // execve() never returns, unless something goes wrong.
173     perror("execve");
174     assert(false);
175   }
176 
177   testing::InitGoogleTest(&argc, argv);
178   return RUN_ALL_TESTS();
179 }
180