blob: 7c9a7d06591fc605dbd98839b6bcf3ae75719517 [file] [log] [blame]
[email protected]76543b92009-08-31 17:27:451// Copyright (c) 2009 The Chromium Authors. All rights reserved.
license.botbf09a502008-08-24 00:55:552// Use of this source code is governed by a BSD-style license that can be
3// found in the LICENSE file.
initial.commit09911bf2008-07-26 23:55:294
5#include "chrome/browser/memory_details.h"
initial.commit09911bf2008-07-26 23:55:296
[email protected]ae5ca892009-07-30 18:00:477#include "app/l10n_util.h"
initial.commit09911bf2008-07-26 23:55:298#include "base/file_version_info.h"
[email protected]76543b92009-08-31 17:27:459#include "base/process_util.h"
[email protected]64048bd2010-03-08 23:28:5810#include "base/utf_string_conversions.h"
[email protected]dcddcdb02010-02-23 09:10:1311#include "chrome/browser/child_process_host.h"
[email protected]dcccb942009-02-01 18:23:0012#include "chrome/browser/chrome_thread.h"
[email protected]57c4b852009-08-17 21:59:2913#include "chrome/browser/renderer_host/backing_store_manager.h"
[email protected]8c8657d62009-01-16 18:31:2614#include "chrome/browser/renderer_host/render_process_host.h"
[email protected]8cb5d5b2010-02-09 11:36:1615#include "chrome/browser/renderer_host/render_view_host.h"
[email protected]cd3d7892009-03-04 23:55:0616#include "chrome/browser/tab_contents/navigation_entry.h"
[email protected]57c6a652009-05-04 07:58:3417#include "chrome/browser/tab_contents/tab_contents.h"
[email protected]cd3d7892009-03-04 23:55:0618#include "chrome/common/url_constants.h"
[email protected]ae5ca892009-07-30 18:00:4719#include "grit/chromium_strings.h"
initial.commit09911bf2008-07-26 23:55:2920
[email protected]54fd1d32009-09-01 00:12:5821#if defined(OS_LINUX)
22#include "chrome/browser/zygote_host_linux.h"
23#include "chrome/browser/renderer_host/render_sandbox_host_linux.h"
24#endif
initial.commit09911bf2008-07-26 23:55:2925
26// About threading:
27//
28// This operation will hit no fewer than 3 threads.
29//
[email protected]a436d922009-02-13 23:16:4230// The ChildProcessInfo::Iterator can only be accessed from the IO thread.
initial.commit09911bf2008-07-26 23:55:2931//
32// The RenderProcessHostIterator can only be accessed from the UI thread.
33//
34// This operation can take 30-100ms to complete. We never want to have
35// one task run for that long on the UI or IO threads. So, we run the
36// expensive parts of this operation over on the file thread.
37//
38
initial.commit09911bf2008-07-26 23:55:2939void MemoryDetails::StartFetch() {
[email protected]6fad2632009-11-02 05:59:3740 DCHECK(!ChromeThread::CurrentlyOn(ChromeThread::IO));
41 DCHECK(!ChromeThread::CurrentlyOn(ChromeThread::FILE));
initial.commit09911bf2008-07-26 23:55:2942
43 // In order to process this request, we need to use the plugin information.
44 // However, plugin process information is only available from the IO thread.
[email protected]6fad2632009-11-02 05:59:3745 ChromeThread::PostTask(
46 ChromeThread::IO, FROM_HERE,
[email protected]a27a9382009-02-11 23:55:1047 NewRunnableMethod(this, &MemoryDetails::CollectChildInfoOnIOThread));
initial.commit09911bf2008-07-26 23:55:2948}
49
[email protected]a27a9382009-02-11 23:55:1050void MemoryDetails::CollectChildInfoOnIOThread() {
[email protected]d85cf072009-10-27 03:59:3151 DCHECK(ChromeThread::CurrentlyOn(ChromeThread::IO));
initial.commit09911bf2008-07-26 23:55:2952
[email protected]a27a9382009-02-11 23:55:1053 std::vector<ProcessMemoryInformation> child_info;
54
[email protected]a436d922009-02-13 23:16:4255 // Collect the list of child processes.
[email protected]6dffde322009-02-18 03:47:4856 for (ChildProcessHost::Iterator iter; !iter.Done(); ++iter) {
[email protected]a27a9382009-02-11 23:55:1057 ProcessMemoryInformation info;
[email protected]76543b92009-08-31 17:27:4558 info.pid = base::GetProcId(iter->handle());
[email protected]a27a9382009-02-11 23:55:1059 if (!info.pid)
60 continue;
61
[email protected]a436d922009-02-13 23:16:4262 info.type = iter->type();
63 info.titles.push_back(iter->name());
[email protected]a27a9382009-02-11 23:55:1064 child_info.push_back(info);
initial.commit09911bf2008-07-26 23:55:2965 }
66
67 // Now go do expensive memory lookups from the file thread.
[email protected]d85cf072009-10-27 03:59:3168 ChromeThread::PostTask(
69 ChromeThread::FILE, FROM_HERE,
[email protected]a27a9382009-02-11 23:55:1070 NewRunnableMethod(this, &MemoryDetails::CollectProcessData, child_info));
initial.commit09911bf2008-07-26 23:55:2971}
72
[email protected]a27a9382009-02-11 23:55:1073void MemoryDetails::CollectChildInfoOnUIThread() {
[email protected]6fad2632009-11-02 05:59:3774 DCHECK(ChromeThread::CurrentlyOn(ChromeThread::UI));
initial.commit09911bf2008-07-26 23:55:2975
[email protected]54fd1d32009-09-01 00:12:5876#if defined(OS_LINUX)
77 const pid_t zygote_pid = Singleton<ZygoteHost>()->pid();
78 const pid_t sandbox_helper_pid = Singleton<RenderSandboxHostLinux>()->pid();
79#endif
80
81 ProcessData* const chrome_browser = ChromeBrowser();
[email protected]a27a9382009-02-11 23:55:1082 // Get more information about the process.
[email protected]54fd1d32009-09-01 00:12:5883 for (size_t index = 0; index < chrome_browser->processes.size();
initial.commit09911bf2008-07-26 23:55:2984 index++) {
[email protected]a27a9382009-02-11 23:55:1085 // Check if it's a renderer, if so get the list of page titles in it and
86 // check if it's a diagnostics-related process. We skip all diagnostics
87 // pages (e.g. "about:xxx" URLs). Iterate the RenderProcessHosts to find
[email protected]cd3d7892009-03-04 23:55:0688 // the tab contents.
[email protected]54fd1d32009-09-01 00:12:5889 ProcessMemoryInformation& process =
90 chrome_browser->processes[index];
91
[email protected]019191a2009-10-02 20:37:2792 for (RenderProcessHost::iterator renderer_iter(
93 RenderProcessHost::AllHostsIterator()); !renderer_iter.IsAtEnd();
94 renderer_iter.Advance()) {
[email protected]9de09f82009-08-17 20:13:5395 DCHECK(renderer_iter.GetCurrentValue());
[email protected]062fdf12010-02-18 23:54:5496 // Ignore processes that don't have a connection, such as crashed tabs or
97 // phantom tabs.
98 if (!renderer_iter.GetCurrentValue()->HasConnection() || process.pid !=
[email protected]201b2732009-11-13 18:57:4699 base::GetProcId(renderer_iter.GetCurrentValue()->GetHandle())) {
[email protected]a27a9382009-02-11 23:55:10100 continue;
[email protected]201b2732009-11-13 18:57:46101 }
[email protected]a27a9382009-02-11 23:55:10102 process.type = ChildProcessInfo::RENDER_PROCESS;
103 // The RenderProcessHost may host multiple TabContents. Any
104 // of them which contain diagnostics information make the whole
105 // process be considered a diagnostics process.
106 //
107 // NOTE: This is a bit dangerous. We know that for now, listeners
108 // are always RenderWidgetHosts. But in theory, they don't
109 // have to be.
[email protected]9de09f82009-08-17 20:13:53110 RenderProcessHost::listeners_iterator iter(
111 renderer_iter.GetCurrentValue()->ListenersIterator());
112 for (; !iter.IsAtEnd(); iter.Advance()) {
113 const RenderWidgetHost* widget =
114 static_cast<const RenderWidgetHost*>(iter.GetCurrentValue());
[email protected]a27a9382009-02-11 23:55:10115 DCHECK(widget);
116 if (!widget || !widget->IsRenderView())
117 continue;
initial.commit09911bf2008-07-26 23:55:29118
[email protected]9de09f82009-08-17 20:13:53119 const RenderViewHost* host = static_cast<const RenderViewHost*>(widget);
[email protected]6d53eb22009-02-13 20:48:39120 TabContents* contents = NULL;
121 if (host->delegate())
[email protected]57c6a652009-05-04 07:58:34122 contents = host->delegate()->GetAsTabContents();
[email protected]a27a9382009-02-11 23:55:10123 if (!contents)
124 continue;
[email protected]4c4d8d22009-03-04 05:29:27125 std::wstring title = UTF16ToWideHack(contents->GetTitle());
[email protected]a27a9382009-02-11 23:55:10126 if (!title.length())
127 title = L"Untitled";
128 process.titles.push_back(title);
[email protected]cd3d7892009-03-04 23:55:06129
[email protected]ebe89e062009-08-13 23:16:54130 // We need to check the pending entry as well as the virtual_url to
[email protected]cd3d7892009-03-04 23:55:06131 // see if it's an about:memory URL (we don't want to count these in the
132 // total memory usage of the browser).
133 //
134 // When we reach here, about:memory will be the pending entry since we
135 // haven't responded with any data such that it would be committed. If
136 // you have another about:memory tab open (which would be committed),
137 // we don't want to count it either, so we also check the last committed
138 // entry.
139 //
140 // Either the pending or last committed entries can be NULL.
[email protected]6df40742009-03-19 22:24:50141 const NavigationEntry* pending_entry =
[email protected]ce3fa3c2009-04-20 19:55:57142 contents->controller().pending_entry();
[email protected]cd3d7892009-03-04 23:55:06143 const NavigationEntry* last_committed_entry =
[email protected]ce3fa3c2009-04-20 19:55:57144 contents->controller().GetLastCommittedEntry();
[email protected]cd3d7892009-03-04 23:55:06145 if ((last_committed_entry &&
[email protected]ebe89e062009-08-13 23:16:54146 LowerCaseEqualsASCII(last_committed_entry->virtual_url().spec(),
[email protected]cd3d7892009-03-04 23:55:06147 chrome::kAboutMemoryURL)) ||
148 (pending_entry &&
[email protected]ebe89e062009-08-13 23:16:54149 LowerCaseEqualsASCII(pending_entry->virtual_url().spec(),
[email protected]cd3d7892009-03-04 23:55:06150 chrome::kAboutMemoryURL)))
[email protected]a27a9382009-02-11 23:55:10151 process.is_diagnostics = true;
initial.commit09911bf2008-07-26 23:55:29152 }
153 }
[email protected]54fd1d32009-09-01 00:12:58154
155#if defined(OS_LINUX)
156 if (process.pid == zygote_pid) {
157 process.type = ChildProcessInfo::ZYGOTE_PROCESS;
158 } else if (process.pid == sandbox_helper_pid) {
159 process.type = ChildProcessInfo::SANDBOX_HELPER_PROCESS;
160 }
161#endif
initial.commit09911bf2008-07-26 23:55:29162 }
163
[email protected]a27a9382009-02-11 23:55:10164 // Get rid of other Chrome processes that are from a different profile.
[email protected]54fd1d32009-09-01 00:12:58165 for (size_t index = 0; index < chrome_browser->processes.size();
[email protected]a27a9382009-02-11 23:55:10166 index++) {
[email protected]54fd1d32009-09-01 00:12:58167 if (chrome_browser->processes[index].type ==
[email protected]a27a9382009-02-11 23:55:10168 ChildProcessInfo::UNKNOWN_PROCESS) {
[email protected]54fd1d32009-09-01 00:12:58169 chrome_browser->processes.erase(
170 chrome_browser->processes.begin() + index);
[email protected]a436d922009-02-13 23:16:42171 index--;
[email protected]a27a9382009-02-11 23:55:10172 }
173 }
174
initial.commit09911bf2008-07-26 23:55:29175 UpdateHistograms();
176
177 OnDetailsAvailable();
178}
179
180void MemoryDetails::UpdateHistograms() {
181 // Reports a set of memory metrics to UMA.
[email protected]57c4b852009-08-17 21:59:29182 // Memory is measured in KB.
initial.commit09911bf2008-07-26 23:55:29183
[email protected]54fd1d32009-09-01 00:12:58184 const ProcessData& browser = *ChromeBrowser();
initial.commit09911bf2008-07-26 23:55:29185 size_t aggregate_memory = 0;
[email protected]a27a9382009-02-11 23:55:10186 int plugin_count = 0;
187 int worker_count = 0;
initial.commit09911bf2008-07-26 23:55:29188 for (size_t index = 0; index < browser.processes.size(); index++) {
[email protected]921cd0cc2008-10-21 22:30:55189 int sample = static_cast<int>(browser.processes[index].working_set.priv);
190 aggregate_memory += sample;
[email protected]a27a9382009-02-11 23:55:10191 switch (browser.processes[index].type) {
[email protected]f164cea2009-11-05 23:37:40192 case ChildProcessInfo::BROWSER_PROCESS:
193 UMA_HISTOGRAM_MEMORY_KB("Memory.Browser", sample);
194 break;
195 case ChildProcessInfo::RENDER_PROCESS:
196 UMA_HISTOGRAM_MEMORY_KB("Memory.Renderer", sample);
197 break;
198 case ChildProcessInfo::PLUGIN_PROCESS:
199 UMA_HISTOGRAM_MEMORY_KB("Memory.Plugin", sample);
200 plugin_count++;
201 break;
202 case ChildProcessInfo::WORKER_PROCESS:
203 UMA_HISTOGRAM_MEMORY_KB("Memory.Worker", sample);
204 worker_count++;
205 break;
206 case ChildProcessInfo::UTILITY_PROCESS:
207 UMA_HISTOGRAM_MEMORY_KB("Memory.Utility", sample);
208 break;
209 case ChildProcessInfo::ZYGOTE_PROCESS:
210 UMA_HISTOGRAM_MEMORY_KB("Memory.Zygote", sample);
211 break;
212 case ChildProcessInfo::SANDBOX_HELPER_PROCESS:
213 UMA_HISTOGRAM_MEMORY_KB("Memory.SandboxHelper", sample);
214 break;
[email protected]103607e2010-02-01 18:57:09215 case ChildProcessInfo::NACL_LOADER_PROCESS:
[email protected]f164cea2009-11-05 23:37:40216 UMA_HISTOGRAM_MEMORY_KB("Memory.NativeClient", sample);
217 break;
[email protected]aef8d5ae2010-03-17 22:40:52218 case ChildProcessInfo::NACL_BROKER_PROCESS:
219 UMA_HISTOGRAM_MEMORY_KB("Memory.NativeClientBroker", sample);
220 break;
[email protected]f164cea2009-11-05 23:37:40221 default:
222 NOTREACHED();
initial.commit09911bf2008-07-26 23:55:29223 }
224 }
[email protected]57c4b852009-08-17 21:59:29225 UMA_HISTOGRAM_MEMORY_KB("Memory.BackingStore",
226 BackingStoreManager::MemorySize() / 1024);
[email protected]a27a9382009-02-11 23:55:10227
[email protected]553dba62009-02-24 19:08:23228 UMA_HISTOGRAM_COUNTS_100("Memory.ProcessCount",
initial.commit09911bf2008-07-26 23:55:29229 static_cast<int>(browser.processes.size()));
[email protected]553dba62009-02-24 19:08:23230 UMA_HISTOGRAM_COUNTS_100("Memory.PluginProcessCount", plugin_count);
231 UMA_HISTOGRAM_COUNTS_100("Memory.WorkerProcessCount", worker_count);
[email protected]f164cea2009-11-05 23:37:40232 // TODO(viettrungluu): Do we want separate counts for the other
233 // (platform-specific) process types?
[email protected]921cd0cc2008-10-21 22:30:55234
235 int total_sample = static_cast<int>(aggregate_memory / 1000);
[email protected]553dba62009-02-24 19:08:23236 UMA_HISTOGRAM_MEMORY_MB("Memory.Total", total_sample);
initial.commit09911bf2008-07-26 23:55:29237}