blob: 6c1ea77de19f5227a2eebfa9de0e82df809283f7 [file] [log] [blame]
[email protected]8a34e6602010-10-02 17:29:431// Copyright (c) 2010 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
5#include "chrome/browser/memory_details.h"
initial.commit09911bf2008-07-26 23:55:296
initial.commit09911bf2008-07-26 23:55:297#include "base/file_version_info.h"
[email protected]835d7c82010-10-14 04:38:388#include "base/metrics/histogram.h"
[email protected]76543b92009-08-31 17:27:459#include "base/process_util.h"
[email protected]33b9df42010-07-29 06:46:3910#include "base/string_util.h"
[email protected]64048bd2010-03-08 23:28:5811#include "base/utf_string_conversions.h"
[email protected]d27893f62010-07-03 05:47:4212#include "chrome/browser/browser_child_process_host.h"
[email protected]e36717272010-10-12 12:07:1313#include "chrome/browser/browser_thread.h"
[email protected]57c4b852009-08-17 21:59:2914#include "chrome/browser/renderer_host/backing_store_manager.h"
[email protected]8c8657d62009-01-16 18:31:2615#include "chrome/browser/renderer_host/render_process_host.h"
[email protected]8cb5d5b2010-02-09 11:36:1616#include "chrome/browser/renderer_host/render_view_host.h"
[email protected]cd3d7892009-03-04 23:55:0617#include "chrome/browser/tab_contents/navigation_entry.h"
[email protected]57c6a652009-05-04 07:58:3418#include "chrome/browser/tab_contents/tab_contents.h"
[email protected]cd3d7892009-03-04 23:55:0619#include "chrome/common/url_constants.h"
[email protected]ae5ca892009-07-30 18:00:4720#include "grit/chromium_strings.h"
initial.commit09911bf2008-07-26 23:55:2921
[email protected]54fd1d32009-09-01 00:12:5822#if defined(OS_LINUX)
23#include "chrome/browser/zygote_host_linux.h"
24#include "chrome/browser/renderer_host/render_sandbox_host_linux.h"
25#endif
initial.commit09911bf2008-07-26 23:55:2926
27// About threading:
28//
29// This operation will hit no fewer than 3 threads.
30//
[email protected]a436d922009-02-13 23:16:4231// The ChildProcessInfo::Iterator can only be accessed from the IO thread.
initial.commit09911bf2008-07-26 23:55:2932//
33// The RenderProcessHostIterator can only be accessed from the UI thread.
34//
35// This operation can take 30-100ms to complete. We never want to have
36// one task run for that long on the UI or IO threads. So, we run the
37// expensive parts of this operation over on the file thread.
38//
39
initial.commit09911bf2008-07-26 23:55:2940void MemoryDetails::StartFetch() {
[email protected]f8b3ef82010-10-11 02:45:5241 DCHECK(!BrowserThread::CurrentlyOn(BrowserThread::IO));
42 DCHECK(!BrowserThread::CurrentlyOn(BrowserThread::FILE));
initial.commit09911bf2008-07-26 23:55:2943
44 // In order to process this request, we need to use the plugin information.
45 // However, plugin process information is only available from the IO thread.
[email protected]f8b3ef82010-10-11 02:45:5246 BrowserThread::PostTask(
47 BrowserThread::IO, FROM_HERE,
[email protected]a27a9382009-02-11 23:55:1048 NewRunnableMethod(this, &MemoryDetails::CollectChildInfoOnIOThread));
initial.commit09911bf2008-07-26 23:55:2949}
50
[email protected]a27a9382009-02-11 23:55:1051void MemoryDetails::CollectChildInfoOnIOThread() {
[email protected]f8b3ef82010-10-11 02:45:5252 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::IO));
initial.commit09911bf2008-07-26 23:55:2953
[email protected]a27a9382009-02-11 23:55:1054 std::vector<ProcessMemoryInformation> child_info;
55
[email protected]a436d922009-02-13 23:16:4256 // Collect the list of child processes.
[email protected]d27893f62010-07-03 05:47:4257 for (BrowserChildProcessHost::Iterator iter; !iter.Done(); ++iter) {
[email protected]a27a9382009-02-11 23:55:1058 ProcessMemoryInformation info;
[email protected]76543b92009-08-31 17:27:4559 info.pid = base::GetProcId(iter->handle());
[email protected]a27a9382009-02-11 23:55:1060 if (!info.pid)
61 continue;
62
[email protected]a436d922009-02-13 23:16:4263 info.type = iter->type();
64 info.titles.push_back(iter->name());
[email protected]a27a9382009-02-11 23:55:1065 child_info.push_back(info);
initial.commit09911bf2008-07-26 23:55:2966 }
67
68 // Now go do expensive memory lookups from the file thread.
[email protected]f8b3ef82010-10-11 02:45:5269 BrowserThread::PostTask(
70 BrowserThread::FILE, FROM_HERE,
[email protected]a27a9382009-02-11 23:55:1071 NewRunnableMethod(this, &MemoryDetails::CollectProcessData, child_info));
initial.commit09911bf2008-07-26 23:55:2972}
73
[email protected]a27a9382009-02-11 23:55:1074void MemoryDetails::CollectChildInfoOnUIThread() {
[email protected]f8b3ef82010-10-11 02:45:5275 DCHECK(BrowserThread::CurrentlyOn(BrowserThread::UI));
initial.commit09911bf2008-07-26 23:55:2976
[email protected]54fd1d32009-09-01 00:12:5877#if defined(OS_LINUX)
78 const pid_t zygote_pid = Singleton<ZygoteHost>()->pid();
79 const pid_t sandbox_helper_pid = Singleton<RenderSandboxHostLinux>()->pid();
80#endif
81
82 ProcessData* const chrome_browser = ChromeBrowser();
[email protected]a27a9382009-02-11 23:55:1083 // Get more information about the process.
[email protected]54fd1d32009-09-01 00:12:5884 for (size_t index = 0; index < chrome_browser->processes.size();
initial.commit09911bf2008-07-26 23:55:2985 index++) {
[email protected]a27a9382009-02-11 23:55:1086 // Check if it's a renderer, if so get the list of page titles in it and
87 // check if it's a diagnostics-related process. We skip all diagnostics
88 // pages (e.g. "about:xxx" URLs). Iterate the RenderProcessHosts to find
[email protected]cd3d7892009-03-04 23:55:0689 // the tab contents.
[email protected]54fd1d32009-09-01 00:12:5890 ProcessMemoryInformation& process =
91 chrome_browser->processes[index];
92
[email protected]019191a2009-10-02 20:37:2793 for (RenderProcessHost::iterator renderer_iter(
94 RenderProcessHost::AllHostsIterator()); !renderer_iter.IsAtEnd();
95 renderer_iter.Advance()) {
[email protected]9de09f82009-08-17 20:13:5396 DCHECK(renderer_iter.GetCurrentValue());
[email protected]8a34e6602010-10-02 17:29:4397 // Ignore processes that don't have a connection, such as crashed tabs.
[email protected]062fdf12010-02-18 23:54:5498 if (!renderer_iter.GetCurrentValue()->HasConnection() || process.pid !=
[email protected]201b2732009-11-13 18:57:4699 base::GetProcId(renderer_iter.GetCurrentValue()->GetHandle())) {
[email protected]a27a9382009-02-11 23:55:10100 continue;
[email protected]201b2732009-11-13 18:57:46101 }
[email protected]a27a9382009-02-11 23:55:10102 process.type = ChildProcessInfo::RENDER_PROCESS;
103 // The RenderProcessHost may host multiple TabContents. Any
104 // of them which contain diagnostics information make the whole
105 // process be considered a diagnostics process.
106 //
107 // NOTE: This is a bit dangerous. We know that for now, listeners
108 // are always RenderWidgetHosts. But in theory, they don't
109 // have to be.
[email protected]9de09f82009-08-17 20:13:53110 RenderProcessHost::listeners_iterator iter(
111 renderer_iter.GetCurrentValue()->ListenersIterator());
112 for (; !iter.IsAtEnd(); iter.Advance()) {
113 const RenderWidgetHost* widget =
114 static_cast<const RenderWidgetHost*>(iter.GetCurrentValue());
[email protected]a27a9382009-02-11 23:55:10115 DCHECK(widget);
116 if (!widget || !widget->IsRenderView())
117 continue;
initial.commit09911bf2008-07-26 23:55:29118
[email protected]9de09f82009-08-17 20:13:53119 const RenderViewHost* host = static_cast<const RenderViewHost*>(widget);
[email protected]6d53eb22009-02-13 20:48:39120 TabContents* contents = NULL;
121 if (host->delegate())
[email protected]57c6a652009-05-04 07:58:34122 contents = host->delegate()->GetAsTabContents();
[email protected]a27a9382009-02-11 23:55:10123 if (!contents)
124 continue;
[email protected]4c4d8d22009-03-04 05:29:27125 std::wstring title = UTF16ToWideHack(contents->GetTitle());
[email protected]a27a9382009-02-11 23:55:10126 if (!title.length())
127 title = L"Untitled";
128 process.titles.push_back(title);
[email protected]cd3d7892009-03-04 23:55:06129
[email protected]ebe89e062009-08-13 23:16:54130 // We need to check the pending entry as well as the virtual_url to
[email protected]cd3d7892009-03-04 23:55:06131 // see if it's an about:memory URL (we don't want to count these in the
132 // total memory usage of the browser).
133 //
134 // When we reach here, about:memory will be the pending entry since we
135 // haven't responded with any data such that it would be committed. If
136 // you have another about:memory tab open (which would be committed),
137 // we don't want to count it either, so we also check the last committed
138 // entry.
139 //
140 // Either the pending or last committed entries can be NULL.
[email protected]6df40742009-03-19 22:24:50141 const NavigationEntry* pending_entry =
[email protected]ce3fa3c2009-04-20 19:55:57142 contents->controller().pending_entry();
[email protected]cd3d7892009-03-04 23:55:06143 const NavigationEntry* last_committed_entry =
[email protected]ce3fa3c2009-04-20 19:55:57144 contents->controller().GetLastCommittedEntry();
[email protected]cd3d7892009-03-04 23:55:06145 if ((last_committed_entry &&
[email protected]ebe89e062009-08-13 23:16:54146 LowerCaseEqualsASCII(last_committed_entry->virtual_url().spec(),
[email protected]cd3d7892009-03-04 23:55:06147 chrome::kAboutMemoryURL)) ||
148 (pending_entry &&
[email protected]ebe89e062009-08-13 23:16:54149 LowerCaseEqualsASCII(pending_entry->virtual_url().spec(),
[email protected]cd3d7892009-03-04 23:55:06150 chrome::kAboutMemoryURL)))
[email protected]a27a9382009-02-11 23:55:10151 process.is_diagnostics = true;
initial.commit09911bf2008-07-26 23:55:29152 }
153 }
[email protected]54fd1d32009-09-01 00:12:58154
155#if defined(OS_LINUX)
156 if (process.pid == zygote_pid) {
157 process.type = ChildProcessInfo::ZYGOTE_PROCESS;
158 } else if (process.pid == sandbox_helper_pid) {
159 process.type = ChildProcessInfo::SANDBOX_HELPER_PROCESS;
160 }
161#endif
initial.commit09911bf2008-07-26 23:55:29162 }
163
[email protected]a27a9382009-02-11 23:55:10164 // Get rid of other Chrome processes that are from a different profile.
[email protected]54fd1d32009-09-01 00:12:58165 for (size_t index = 0; index < chrome_browser->processes.size();
[email protected]a27a9382009-02-11 23:55:10166 index++) {
[email protected]54fd1d32009-09-01 00:12:58167 if (chrome_browser->processes[index].type ==
[email protected]a27a9382009-02-11 23:55:10168 ChildProcessInfo::UNKNOWN_PROCESS) {
[email protected]54fd1d32009-09-01 00:12:58169 chrome_browser->processes.erase(
170 chrome_browser->processes.begin() + index);
[email protected]a436d922009-02-13 23:16:42171 index--;
[email protected]a27a9382009-02-11 23:55:10172 }
173 }
174
initial.commit09911bf2008-07-26 23:55:29175 UpdateHistograms();
176
177 OnDetailsAvailable();
178}
179
180void MemoryDetails::UpdateHistograms() {
181 // Reports a set of memory metrics to UMA.
[email protected]57c4b852009-08-17 21:59:29182 // Memory is measured in KB.
initial.commit09911bf2008-07-26 23:55:29183
[email protected]54fd1d32009-09-01 00:12:58184 const ProcessData& browser = *ChromeBrowser();
initial.commit09911bf2008-07-26 23:55:29185 size_t aggregate_memory = 0;
[email protected]a27a9382009-02-11 23:55:10186 int plugin_count = 0;
187 int worker_count = 0;
initial.commit09911bf2008-07-26 23:55:29188 for (size_t index = 0; index < browser.processes.size(); index++) {
[email protected]921cd0cc2008-10-21 22:30:55189 int sample = static_cast<int>(browser.processes[index].working_set.priv);
190 aggregate_memory += sample;
[email protected]a27a9382009-02-11 23:55:10191 switch (browser.processes[index].type) {
[email protected]f164cea2009-11-05 23:37:40192 case ChildProcessInfo::BROWSER_PROCESS:
193 UMA_HISTOGRAM_MEMORY_KB("Memory.Browser", sample);
194 break;
195 case ChildProcessInfo::RENDER_PROCESS:
196 UMA_HISTOGRAM_MEMORY_KB("Memory.Renderer", sample);
197 break;
198 case ChildProcessInfo::PLUGIN_PROCESS:
199 UMA_HISTOGRAM_MEMORY_KB("Memory.Plugin", sample);
200 plugin_count++;
201 break;
202 case ChildProcessInfo::WORKER_PROCESS:
203 UMA_HISTOGRAM_MEMORY_KB("Memory.Worker", sample);
204 worker_count++;
205 break;
206 case ChildProcessInfo::UTILITY_PROCESS:
207 UMA_HISTOGRAM_MEMORY_KB("Memory.Utility", sample);
208 break;
209 case ChildProcessInfo::ZYGOTE_PROCESS:
210 UMA_HISTOGRAM_MEMORY_KB("Memory.Zygote", sample);
211 break;
212 case ChildProcessInfo::SANDBOX_HELPER_PROCESS:
213 UMA_HISTOGRAM_MEMORY_KB("Memory.SandboxHelper", sample);
214 break;
[email protected]103607e2010-02-01 18:57:09215 case ChildProcessInfo::NACL_LOADER_PROCESS:
[email protected]f164cea2009-11-05 23:37:40216 UMA_HISTOGRAM_MEMORY_KB("Memory.NativeClient", sample);
217 break;
[email protected]aef8d5ae2010-03-17 22:40:52218 case ChildProcessInfo::NACL_BROKER_PROCESS:
219 UMA_HISTOGRAM_MEMORY_KB("Memory.NativeClientBroker", sample);
220 break;
[email protected]96fcbf2d2010-08-03 16:10:27221 case ChildProcessInfo::GPU_PROCESS:
222 UMA_HISTOGRAM_MEMORY_KB("Memory.Gpu", sample);
223 break;
[email protected]f164cea2009-11-05 23:37:40224 default:
225 NOTREACHED();
initial.commit09911bf2008-07-26 23:55:29226 }
227 }
[email protected]57c4b852009-08-17 21:59:29228 UMA_HISTOGRAM_MEMORY_KB("Memory.BackingStore",
229 BackingStoreManager::MemorySize() / 1024);
[email protected]a27a9382009-02-11 23:55:10230
[email protected]553dba62009-02-24 19:08:23231 UMA_HISTOGRAM_COUNTS_100("Memory.ProcessCount",
initial.commit09911bf2008-07-26 23:55:29232 static_cast<int>(browser.processes.size()));
[email protected]553dba62009-02-24 19:08:23233 UMA_HISTOGRAM_COUNTS_100("Memory.PluginProcessCount", plugin_count);
234 UMA_HISTOGRAM_COUNTS_100("Memory.WorkerProcessCount", worker_count);
[email protected]f164cea2009-11-05 23:37:40235 // TODO(viettrungluu): Do we want separate counts for the other
236 // (platform-specific) process types?
[email protected]921cd0cc2008-10-21 22:30:55237
238 int total_sample = static_cast<int>(aggregate_memory / 1000);
[email protected]553dba62009-02-24 19:08:23239 UMA_HISTOGRAM_MEMORY_MB("Memory.Total", total_sample);
initial.commit09911bf2008-07-26 23:55:29240}