// Copyright (c) 2010 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #include "chrome/browser/memory_details.h" #include "base/file_version_info.h" #include "base/metrics/histogram.h" #include "base/process_util.h" #include "base/string_util.h" #include "base/utf_string_conversions.h" #include "chrome/browser/extensions/extension_service.h" #include "chrome/browser/profiles/profile.h" #include "chrome/common/extensions/extension.h" #include "chrome/common/url_constants.h" #include "content/browser/browser_child_process_host.h" #include "content/browser/browser_thread.h" #include "content/browser/renderer_host/backing_store_manager.h" #include "content/browser/renderer_host/render_process_host.h" #include "content/browser/renderer_host/render_view_host.h" #include "content/browser/tab_contents/navigation_entry.h" #include "content/browser/tab_contents/tab_contents.h" #include "content/common/bindings_policy.h" #include "grit/chromium_strings.h" #include "grit/generated_resources.h" #include "ui/base/l10n/l10n_util.h" #if defined(OS_LINUX) #include "content/browser/zygote_host_linux.h" #include "content/browser/renderer_host/render_sandbox_host_linux.h" #endif ProcessMemoryInformation::ProcessMemoryInformation() : pid(0), num_processes(0), is_diagnostics(false), type(ChildProcessInfo::UNKNOWN_PROCESS), renderer_type(ChildProcessInfo::RENDERER_UNKNOWN) { } ProcessMemoryInformation::~ProcessMemoryInformation() {} ProcessData::ProcessData() {} ProcessData::ProcessData(const ProcessData& rhs) : name(rhs.name), process_name(rhs.process_name), processes(rhs.processes) { } ProcessData::~ProcessData() {} ProcessData& ProcessData::operator=(const ProcessData& rhs) { name = rhs.name; process_name = rhs.process_name; processes = rhs.processes; return *this; } // About threading: // // This operation will hit no fewer than 3 threads. // // The ChildProcessInfo::Iterator can only be accessed from the IO thread. // // The RenderProcessHostIterator can only be accessed from the UI thread. // // This operation can take 30-100ms to complete. We never want to have // one task run for that long on the UI or IO threads. So, we run the // expensive parts of this operation over on the file thread. // void MemoryDetails::StartFetch() { DCHECK(!BrowserThread::CurrentlyOn(BrowserThread::IO)); DCHECK(!BrowserThread::CurrentlyOn(BrowserThread::FILE)); // In order to process this request, we need to use the plugin information. // However, plugin process information is only available from the IO thread. BrowserThread::PostTask( BrowserThread::IO, FROM_HERE, NewRunnableMethod(this, &MemoryDetails::CollectChildInfoOnIOThread)); } MemoryDetails::~MemoryDetails() {} void MemoryDetails::CollectChildInfoOnIOThread() { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO)); std::vector child_info; // Collect the list of child processes. for (BrowserChildProcessHost::Iterator iter; !iter.Done(); ++iter) { ProcessMemoryInformation info; info.pid = base::GetProcId(iter->handle()); if (!info.pid) continue; info.type = iter->type(); info.renderer_type = iter->renderer_type(); info.titles.push_back(WideToUTF16Hack(iter->name())); child_info.push_back(info); } // Now go do expensive memory lookups from the file thread. BrowserThread::PostTask( BrowserThread::FILE, FROM_HERE, NewRunnableMethod(this, &MemoryDetails::CollectProcessData, child_info)); } void MemoryDetails::CollectChildInfoOnUIThread() { DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI)); #if defined(OS_LINUX) const pid_t zygote_pid = ZygoteHost::GetInstance()->pid(); const pid_t sandbox_helper_pid = RenderSandboxHostLinux::GetInstance()->pid(); #endif ProcessData* const chrome_browser = ChromeBrowser(); // Get more information about the process. for (size_t index = 0; index < chrome_browser->processes.size(); index++) { // Check if it's a renderer, if so get the list of page titles in it and // check if it's a diagnostics-related process. We skip about:memory pages. // Iterate the RenderProcessHosts to find the tab contents. ProcessMemoryInformation& process = chrome_browser->processes[index]; for (RenderProcessHost::iterator renderer_iter( RenderProcessHost::AllHostsIterator()); !renderer_iter.IsAtEnd(); renderer_iter.Advance()) { RenderProcessHost* render_process_host = renderer_iter.GetCurrentValue(); DCHECK(render_process_host); // Ignore processes that don't have a connection, such as crashed tabs. if (!render_process_host->HasConnection() || process.pid != base::GetProcId(render_process_host->GetHandle())) { continue; } process.type = ChildProcessInfo::RENDER_PROCESS; Profile* profile = render_process_host->profile(); ExtensionService* extension_service = profile->GetExtensionService(); // The RenderProcessHost may host multiple TabContents. Any // of them which contain diagnostics information make the whole // process be considered a diagnostics process. // // NOTE: This is a bit dangerous. We know that for now, listeners // are always RenderWidgetHosts. But in theory, they don't // have to be. RenderProcessHost::listeners_iterator iter( render_process_host->ListenersIterator()); for (; !iter.IsAtEnd(); iter.Advance()) { const RenderWidgetHost* widget = static_cast(iter.GetCurrentValue()); DCHECK(widget); if (!widget || !widget->IsRenderView()) continue; const RenderViewHost* host = static_cast(widget); RenderViewHostDelegate* host_delegate = host->delegate(); DCHECK(host_delegate); GURL url = host_delegate->GetURL(); ViewType::Type type = host_delegate->GetRenderViewType(); if (host->enabled_bindings() & BindingsPolicy::WEB_UI) { // TODO(erikkay) the type for devtools doesn't actually appear to // be set. if (type == ViewType::DEV_TOOLS_UI) process.renderer_type = ChildProcessInfo::RENDERER_DEVTOOLS; else process.renderer_type = ChildProcessInfo::RENDERER_CHROME; } else if (host->enabled_bindings() & BindingsPolicy::EXTENSION) { process.renderer_type = ChildProcessInfo::RENDERER_EXTENSION; } TabContents* contents = host_delegate->GetAsTabContents(); if (!contents) { if (host->is_extension_process()) { const Extension* extension = extension_service->GetExtensionByURL(url); if (extension) { string16 title = UTF8ToUTF16(extension->name()); process.titles.push_back(title); } } else if (process.renderer_type == ChildProcessInfo::RENDERER_UNKNOWN) { process.titles.push_back(UTF8ToUTF16(url.spec())); switch (type) { case ViewType::BACKGROUND_CONTENTS: process.renderer_type = ChildProcessInfo::RENDERER_BACKGROUND_APP; break; case ViewType::INTERSTITIAL_PAGE: process.renderer_type = ChildProcessInfo::RENDERER_INTERSTITIAL; break; case ViewType::NOTIFICATION: process.renderer_type = ChildProcessInfo::RENDERER_NOTIFICATION; break; default: process.renderer_type = ChildProcessInfo::RENDERER_UNKNOWN; break; } } continue; } // Since We have a TabContents and and the renderer type hasn't been // set yet, it must be a normal tabbed renderer. if (process.renderer_type == ChildProcessInfo::RENDERER_UNKNOWN) process.renderer_type = ChildProcessInfo::RENDERER_NORMAL; string16 title = contents->GetTitle(); if (!title.length()) title = l10n_util::GetStringUTF16(IDS_DEFAULT_TAB_TITLE); process.titles.push_back(title); // We need to check the pending entry as well as the virtual_url to // see if it's an about:memory URL (we don't want to count these in the // total memory usage of the browser). // // When we reach here, about:memory will be the pending entry since we // haven't responded with any data such that it would be committed. If // you have another about:memory tab open (which would be committed), // we don't want to count it either, so we also check the last committed // entry. // // Either the pending or last committed entries can be NULL. const NavigationEntry* pending_entry = contents->controller().pending_entry(); const NavigationEntry* last_committed_entry = contents->controller().GetLastCommittedEntry(); if ((last_committed_entry && LowerCaseEqualsASCII(last_committed_entry->virtual_url().spec(), chrome::kAboutMemoryURL)) || (pending_entry && LowerCaseEqualsASCII(pending_entry->virtual_url().spec(), chrome::kAboutMemoryURL))) process.is_diagnostics = true; } } #if defined(OS_LINUX) if (process.pid == zygote_pid) { process.type = ChildProcessInfo::ZYGOTE_PROCESS; } else if (process.pid == sandbox_helper_pid) { process.type = ChildProcessInfo::SANDBOX_HELPER_PROCESS; } #endif } // Get rid of other Chrome processes that are from a different profile. for (size_t index = 0; index < chrome_browser->processes.size(); index++) { if (chrome_browser->processes[index].type == ChildProcessInfo::UNKNOWN_PROCESS) { chrome_browser->processes.erase( chrome_browser->processes.begin() + index); index--; } } UpdateHistograms(); OnDetailsAvailable(); } void MemoryDetails::UpdateHistograms() { // Reports a set of memory metrics to UMA. // Memory is measured in KB. const ProcessData& browser = *ChromeBrowser(); size_t aggregate_memory = 0; int chrome_count = 0; int extension_count = 0; int plugin_count = 0; int renderer_count = 0; int other_count = 0; int worker_count = 0; for (size_t index = 0; index < browser.processes.size(); index++) { int sample = static_cast(browser.processes[index].working_set.priv); aggregate_memory += sample; switch (browser.processes[index].type) { case ChildProcessInfo::BROWSER_PROCESS: UMA_HISTOGRAM_MEMORY_KB("Memory.Browser", sample); break; case ChildProcessInfo::RENDER_PROCESS: { ChildProcessInfo::RendererProcessType renderer_type = browser.processes[index].renderer_type; switch (renderer_type) { case ChildProcessInfo::RENDERER_EXTENSION: UMA_HISTOGRAM_MEMORY_KB("Memory.Extension", sample); extension_count++; break; case ChildProcessInfo::RENDERER_CHROME: UMA_HISTOGRAM_MEMORY_KB("Memory.Chrome", sample); chrome_count++; break; case ChildProcessInfo::RENDERER_UNKNOWN: NOTREACHED() << "Unknown renderer process type."; break; case ChildProcessInfo::RENDERER_NORMAL: default: // TODO(erikkay): Should we bother splitting out the other subtypes? UMA_HISTOGRAM_MEMORY_KB("Memory.Renderer", sample); renderer_count++; break; } break; } case ChildProcessInfo::PLUGIN_PROCESS: UMA_HISTOGRAM_MEMORY_KB("Memory.Plugin", sample); plugin_count++; break; case ChildProcessInfo::WORKER_PROCESS: UMA_HISTOGRAM_MEMORY_KB("Memory.Worker", sample); worker_count++; break; case ChildProcessInfo::UTILITY_PROCESS: UMA_HISTOGRAM_MEMORY_KB("Memory.Utility", sample); other_count++; break; case ChildProcessInfo::ZYGOTE_PROCESS: UMA_HISTOGRAM_MEMORY_KB("Memory.Zygote", sample); other_count++; break; case ChildProcessInfo::SANDBOX_HELPER_PROCESS: UMA_HISTOGRAM_MEMORY_KB("Memory.SandboxHelper", sample); other_count++; break; case ChildProcessInfo::NACL_LOADER_PROCESS: UMA_HISTOGRAM_MEMORY_KB("Memory.NativeClient", sample); other_count++; break; case ChildProcessInfo::NACL_BROKER_PROCESS: UMA_HISTOGRAM_MEMORY_KB("Memory.NativeClientBroker", sample); other_count++; break; case ChildProcessInfo::GPU_PROCESS: UMA_HISTOGRAM_MEMORY_KB("Memory.Gpu", sample); other_count++; break; default: NOTREACHED(); } } UMA_HISTOGRAM_MEMORY_KB("Memory.BackingStore", BackingStoreManager::MemorySize() / 1024); UMA_HISTOGRAM_COUNTS_100("Memory.ProcessCount", static_cast(browser.processes.size())); UMA_HISTOGRAM_COUNTS_100("Memory.ChromeProcessCount", chrome_count); UMA_HISTOGRAM_COUNTS_100("Memory.ExtensionProcessCount", extension_count); UMA_HISTOGRAM_COUNTS_100("Memory.OtherProcessCount", other_count); UMA_HISTOGRAM_COUNTS_100("Memory.PluginProcessCount", plugin_count); UMA_HISTOGRAM_COUNTS_100("Memory.RendererProcessCount", renderer_count); UMA_HISTOGRAM_COUNTS_100("Memory.WorkerProcessCount", worker_count); // TODO(viettrungluu): Do we want separate counts for the other // (platform-specific) process types? int total_sample = static_cast(aggregate_memory / 1000); UMA_HISTOGRAM_MEMORY_MB("Memory.Total", total_sample); }