blob: 6b354874d7ef57bb4130b576af5648607e5b5b46 [file] [log] [blame]
// Copyright 2015 The Chromium Authors. All rights reserved.
// Use of this source code is governed by a BSD-style license that can be
// found in the LICENSE file.
#include "base/android/library_loader/library_prefetcher.h"
#include <stddef.h>
#include <stdint.h>
#include <sys/mman.h>
#include <string>
#include <vector>
#include "base/debug/proc_maps_linux.h"
#include "base/memory/shared_memory.h"
#include "build/build_config.h"
#include "testing/gtest/include/gtest/gtest.h"
namespace base {
namespace android {
namespace {
const uint8_t kRead = base::debug::MappedMemoryRegion::READ;
const uint8_t kReadPrivate = base::debug::MappedMemoryRegion::READ |
base::debug::MappedMemoryRegion::PRIVATE;
const uint8_t kExecutePrivate = base::debug::MappedMemoryRegion::EXECUTE |
base::debug::MappedMemoryRegion::PRIVATE;
} // namespace
TEST(NativeLibraryPrefetcherTest, TestIsGoodToPrefetchNoRange) {
const base::debug::MappedMemoryRegion regions[4] = {
base::debug::MappedMemoryRegion{0x4000, 0x5000, 10, 0, kReadPrivate, ""},
base::debug::MappedMemoryRegion{0x4000, 0x5000, 10, 0, kReadPrivate,
"foo"},
base::debug::MappedMemoryRegion{0x4000, 0x5000, 10, 0, kReadPrivate,
"foobar.apk"},
base::debug::MappedMemoryRegion{0x4000, 0x5000, 10, 0, kReadPrivate,
"libchromium.so"}};
for (int i = 0; i < 4; ++i) {
ASSERT_FALSE(NativeLibraryPrefetcher::IsGoodToPrefetch(regions[i]));
}
}
TEST(NativeLibraryPrefetcherTest, TestIsGoodToPrefetchUnreadableRange) {
const base::debug::MappedMemoryRegion region = {
0x4000, 0x5000, 10, 0, kExecutePrivate, "base.apk"};
ASSERT_FALSE(NativeLibraryPrefetcher::IsGoodToPrefetch(region));
}
TEST(NativeLibraryPrefetcherTest, TestIsGoodToPrefetchSkipSharedRange) {
const base::debug::MappedMemoryRegion region = {
0x4000, 0x5000, 10, 0, kRead, "base.apk"};
ASSERT_FALSE(NativeLibraryPrefetcher::IsGoodToPrefetch(region));
}
TEST(NativeLibraryPrefetcherTest, TestIsGoodToPrefetchLibchromeRange) {
const base::debug::MappedMemoryRegion region = {
0x4000, 0x5000, 10, 0, kReadPrivate, "libchrome.so"};
ASSERT_TRUE(NativeLibraryPrefetcher::IsGoodToPrefetch(region));
}
TEST(NativeLibraryPrefetcherTest, TestIsGoodToPrefetchBaseApkRange) {
const base::debug::MappedMemoryRegion region = {
0x4000, 0x5000, 10, 0, kReadPrivate, "base.apk"};
ASSERT_TRUE(NativeLibraryPrefetcher::IsGoodToPrefetch(region));
}
TEST(NativeLibraryPrefetcherTest,
TestFilterLibchromeRangesOnlyIfPossibleNoLibchrome) {
std::vector<base::debug::MappedMemoryRegion> regions;
regions.push_back(base::debug::MappedMemoryRegion{0x1, 0x2, 0, 0,
kReadPrivate, "base.apk"});
regions.push_back(base::debug::MappedMemoryRegion{0x3, 0x4, 0, 0,
kReadPrivate, "base.apk"});
std::vector<NativeLibraryPrefetcher::AddressRange> ranges;
NativeLibraryPrefetcher::FilterLibchromeRangesOnlyIfPossible(regions,
&ranges);
EXPECT_EQ(ranges.size(), 2U);
EXPECT_EQ(ranges[0].first, 0x1U);
EXPECT_EQ(ranges[0].second, 0x2U);
EXPECT_EQ(ranges[1].first, 0x3U);
EXPECT_EQ(ranges[1].second, 0x4U);
}
TEST(NativeLibraryPrefetcherTest,
TestFilterLibchromeRangesOnlyIfPossibleHasLibchrome) {
std::vector<base::debug::MappedMemoryRegion> regions;
regions.push_back(base::debug::MappedMemoryRegion{0x1, 0x2, 0, 0,
kReadPrivate, "base.apk"});
regions.push_back(base::debug::MappedMemoryRegion{
0x6, 0x7, 0, 0, kReadPrivate, "libchrome.so"});
regions.push_back(base::debug::MappedMemoryRegion{0x3, 0x4, 0, 0,
kReadPrivate, "base.apk"});
std::vector<NativeLibraryPrefetcher::AddressRange> ranges;
NativeLibraryPrefetcher::FilterLibchromeRangesOnlyIfPossible(regions,
&ranges);
EXPECT_EQ(ranges.size(), 1U);
EXPECT_EQ(ranges[0].first, 0x6U);
EXPECT_EQ(ranges[0].second, 0x7U);
}
// Fails with ASAN, crbug.com/570423.
#if !defined(ADDRESS_SANITIZER)
namespace {
const size_t kPageSize = 4096;
} // namespace
TEST(NativeLibraryPrefetcherTest, TestPercentageOfResidentCode) {
size_t length = 4 * kPageSize;
base::SharedMemory shared_mem;
ASSERT_TRUE(shared_mem.CreateAndMapAnonymous(length));
void* address = shared_mem.memory();
std::vector<NativeLibraryPrefetcher::AddressRange> ranges = {
{reinterpret_cast<uintptr_t>(address),
reinterpret_cast<uintptr_t>(address) + length}};
// Remove everything.
ASSERT_EQ(0, madvise(address, length, MADV_DONTNEED));
// TODO(lizeb): If flaky, mock mincore().
EXPECT_EQ(0, NativeLibraryPrefetcher::PercentageOfResidentCode(ranges));
// Get everything back.
ASSERT_EQ(0, mlock(address, length));
EXPECT_EQ(100, NativeLibraryPrefetcher::PercentageOfResidentCode(ranges));
munlock(address, length);
}
TEST(NativeLibraryPrefetcherTest, TestPercentageOfResidentCodeTwoRegions) {
size_t length = 4 * kPageSize;
base::SharedMemory shared_mem;
ASSERT_TRUE(shared_mem.CreateAndMapAnonymous(length));
void* address = shared_mem.memory();
size_t length2 = 8 * kPageSize;
base::SharedMemory shared_mem2;
ASSERT_TRUE(shared_mem2.CreateAndMapAnonymous(length2));
void* address2 = shared_mem2.memory();
std::vector<NativeLibraryPrefetcher::AddressRange> ranges = {
{reinterpret_cast<uintptr_t>(address),
reinterpret_cast<uintptr_t>(address) + length},
{reinterpret_cast<uintptr_t>(address2),
reinterpret_cast<uintptr_t>(address2) + length2}};
// Remove everything.
ASSERT_EQ(0, madvise(address, length, MADV_DONTNEED));
ASSERT_EQ(0, madvise(address2, length, MADV_DONTNEED));
// TODO(lizeb): If flaky, mock mincore().
EXPECT_EQ(0, NativeLibraryPrefetcher::PercentageOfResidentCode(ranges));
// Get back the first range.
ASSERT_EQ(0, mlock(address, length));
EXPECT_EQ(33, NativeLibraryPrefetcher::PercentageOfResidentCode(ranges));
// The second one.
ASSERT_EQ(0, mlock(address2, length2));
EXPECT_EQ(100, NativeLibraryPrefetcher::PercentageOfResidentCode(ranges));
munlock(address, length);
munlock(address2, length);
}
#endif // !defined(ADDRESS_SANITIZER)
} // namespace android
} // namespace base