| Index: base/process_util_unittest.cc
|
| diff --git a/base/process_util_unittest.cc b/base/process_util_unittest.cc
|
| index d3a4100611a2a1eb6f7fd18b858546994077d197..4a3d36d77801d8612953df298a39a78c715fd187 100644
|
| --- a/base/process_util_unittest.cc
|
| +++ b/base/process_util_unittest.cc
|
| @@ -44,7 +44,6 @@
|
| #if defined(OS_MACOSX)
|
| #include <mach/vm_param.h>
|
| #include <malloc/malloc.h>
|
| -#include "base/process_util_unittest_mac.h"
|
| #endif
|
|
|
| using base::FilePath;
|
| @@ -76,12 +75,6 @@ const int kExpectedKilledExitCode = 1;
|
| const int kExpectedStillRunningExitCode = 0;
|
| #endif
|
|
|
| -#if defined(OS_WIN)
|
| -// HeapQueryInformation function pointer.
|
| -typedef BOOL (WINAPI* HeapQueryFn) \
|
| - (HANDLE, HEAP_INFORMATION_CLASS, PVOID, SIZE_T, PSIZE_T);
|
| -#endif
|
| -
|
| // Sleeps until file filename is created.
|
| void WaitToDie(const char* filename) {
|
| FILE* fp;
|
| @@ -213,25 +206,6 @@ TEST_F(ProcessUtilTest, GetProcId) {
|
| EXPECT_NE(id1, id2);
|
| base::CloseProcessHandle(handle);
|
| }
|
| -
|
| -TEST_F(ProcessUtilTest, GetModuleFromAddress) {
|
| - // Since the unit tests are their own EXE, this should be
|
| - // equivalent to the EXE's HINSTANCE.
|
| - //
|
| - // kExpectedKilledExitCode is a constant in this file and
|
| - // therefore within the unit test EXE.
|
| - EXPECT_EQ(::GetModuleHandle(NULL),
|
| - base::GetModuleFromAddress(
|
| - const_cast<int*>(&kExpectedKilledExitCode)));
|
| -
|
| - // Any address within the kernel32 module should return
|
| - // kernel32's HMODULE. Our only assumption here is that
|
| - // kernel32 is larger than 4 bytes.
|
| - HMODULE kernel32 = ::GetModuleHandle(L"kernel32.dll");
|
| - HMODULE kernel32_from_address =
|
| - base::GetModuleFromAddress(reinterpret_cast<DWORD*>(kernel32) + 1);
|
| - EXPECT_EQ(kernel32, kernel32_from_address);
|
| -}
|
| #endif
|
|
|
| #if !defined(OS_MACOSX)
|
| @@ -418,49 +392,6 @@ TEST_F(ProcessUtilTest, GetSystemMemoryInfo) {
|
|
|
| // TODO(estade): if possible, port these 2 tests.
|
| #if defined(OS_WIN)
|
| -TEST_F(ProcessUtilTest, EnableLFH) {
|
| - ASSERT_TRUE(base::EnableLowFragmentationHeap());
|
| - if (IsDebuggerPresent()) {
|
| - // Under these conditions, LFH can't be enabled. There's no point to test
|
| - // anything.
|
| - const char* no_debug_env = getenv("_NO_DEBUG_HEAP");
|
| - if (!no_debug_env || strcmp(no_debug_env, "1"))
|
| - return;
|
| - }
|
| - HMODULE kernel32 = GetModuleHandle(L"kernel32.dll");
|
| - ASSERT_TRUE(kernel32 != NULL);
|
| - HeapQueryFn heap_query = reinterpret_cast<HeapQueryFn>(GetProcAddress(
|
| - kernel32,
|
| - "HeapQueryInformation"));
|
| -
|
| - // On Windows 2000, the function is not exported. This is not a reason to
|
| - // fail but we won't be able to retrieves information about the heap, so we
|
| - // should stop here.
|
| - if (heap_query == NULL)
|
| - return;
|
| -
|
| - HANDLE heaps[1024] = { 0 };
|
| - unsigned number_heaps = GetProcessHeaps(1024, heaps);
|
| - EXPECT_GT(number_heaps, 0u);
|
| - for (unsigned i = 0; i < number_heaps; ++i) {
|
| - ULONG flag = 0;
|
| - SIZE_T length;
|
| - ASSERT_NE(0, heap_query(heaps[i],
|
| - HeapCompatibilityInformation,
|
| - &flag,
|
| - sizeof(flag),
|
| - &length));
|
| - // If flag is 0, the heap is a standard heap that does not support
|
| - // look-asides. If flag is 1, the heap supports look-asides. If flag is 2,
|
| - // the heap is a low-fragmentation heap (LFH). Note that look-asides are not
|
| - // supported on the LFH.
|
| -
|
| - // We don't have any documented way of querying the HEAP_NO_SERIALIZE flag.
|
| - EXPECT_LE(flag, 2u);
|
| - EXPECT_NE(flag, 1u);
|
| - }
|
| -}
|
| -
|
| TEST_F(ProcessUtilTest, CalcFreeMemory) {
|
| scoped_ptr<base::ProcessMetrics> metrics(
|
| base::ProcessMetrics::CreateProcessMetrics(::GetCurrentProcess()));
|
| @@ -545,60 +476,6 @@ TEST_F(ProcessUtilTest, LaunchAsUser) {
|
|
|
| #endif // defined(OS_WIN)
|
|
|
| -#if defined(OS_MACOSX)
|
| -
|
| -// For the following Mac tests:
|
| -// Note that base::EnableTerminationOnHeapCorruption() is called as part of
|
| -// test suite setup and does not need to be done again, else mach_override
|
| -// will fail.
|
| -
|
| -#if !defined(ADDRESS_SANITIZER)
|
| -// The following code tests the system implementation of malloc() thus no need
|
| -// to test it under AddressSanitizer.
|
| -TEST_F(ProcessUtilTest, MacMallocFailureDoesNotTerminate) {
|
| - // Test that ENOMEM doesn't crash via CrMallocErrorBreak two ways: the exit
|
| - // code and lack of the error string. The number of bytes is one less than
|
| - // MALLOC_ABSOLUTE_MAX_SIZE, more than which the system early-returns NULL and
|
| - // does not call through malloc_error_break(). See the comment at
|
| - // EnableTerminationOnOutOfMemory() for more information.
|
| - void* buf = NULL;
|
| - ASSERT_EXIT(
|
| - {
|
| - base::EnableTerminationOnOutOfMemory();
|
| -
|
| - buf = malloc(std::numeric_limits<size_t>::max() - (2 * PAGE_SIZE) - 1);
|
| - },
|
| - testing::KilledBySignal(SIGTRAP),
|
| - "\\*\\*\\* error: can't allocate region.*"
|
| - "(Terminating process due to a potential for future heap "
|
| - "corruption){0}");
|
| -
|
| - base::debug::Alias(buf);
|
| -}
|
| -#endif // !defined(ADDRESS_SANITIZER)
|
| -
|
| -TEST_F(ProcessUtilTest, MacTerminateOnHeapCorruption) {
|
| - // Assert that freeing an unallocated pointer will crash the process.
|
| - char buf[3];
|
| - asm("" : "=r" (buf)); // Prevent clang from being too smart.
|
| -#if ARCH_CPU_64_BITS
|
| - // On 64 bit Macs, the malloc system automatically abort()s on heap corruption
|
| - // but does not output anything.
|
| - ASSERT_DEATH(free(buf), "");
|
| -#elif defined(ADDRESS_SANITIZER)
|
| - // AddressSanitizer replaces malloc() and prints a different error message on
|
| - // heap corruption.
|
| - ASSERT_DEATH(free(buf), "attempting free on address which "
|
| - "was not malloc\\(\\)-ed");
|
| -#else
|
| - ASSERT_DEATH(free(buf), "being freed.*"
|
| - "\\*\\*\\* set a breakpoint in malloc_error_break to debug.*"
|
| - "Terminating process due to a potential for future heap corruption");
|
| -#endif // ARCH_CPU_64_BITS || defined(ADDRESS_SANITIZER)
|
| -}
|
| -
|
| -#endif // defined(OS_MACOSX)
|
| -
|
| #if defined(OS_POSIX)
|
|
|
| namespace {
|
| @@ -1078,230 +955,3 @@ MULTIPROCESS_TEST_MAIN(process_util_test_die_immediately) {
|
| }
|
|
|
| #endif // defined(OS_POSIX)
|
| -
|
| -// Android doesn't implement set_new_handler, so we can't use the
|
| -// OutOfMemoryTest cases.
|
| -// OpenBSD does not support these tests either.
|
| -// AddressSanitizer and ThreadSanitizer define the malloc()/free()/etc.
|
| -// functions so that they don't crash if the program is out of memory, so the
|
| -// OOM tests aren't supposed to work.
|
| -// TODO(vandebo) make this work on Windows too.
|
| -#if !defined(OS_ANDROID) && !defined(OS_OPENBSD) && \
|
| - !defined(OS_WIN) && \
|
| - !defined(ADDRESS_SANITIZER) && !defined(THREAD_SANITIZER)
|
| -
|
| -#if defined(USE_TCMALLOC)
|
| -extern "C" {
|
| -int tc_set_new_mode(int mode);
|
| -}
|
| -#endif // defined(USE_TCMALLOC)
|
| -
|
| -class OutOfMemoryDeathTest : public testing::Test {
|
| - public:
|
| - OutOfMemoryDeathTest()
|
| - : value_(NULL),
|
| - // Make test size as large as possible minus a few pages so
|
| - // that alignment or other rounding doesn't make it wrap.
|
| - test_size_(std::numeric_limits<std::size_t>::max() - 12 * 1024),
|
| - signed_test_size_(std::numeric_limits<ssize_t>::max()) {
|
| - }
|
| -
|
| -#if defined(USE_TCMALLOC)
|
| - virtual void SetUp() OVERRIDE {
|
| - tc_set_new_mode(1);
|
| - }
|
| -
|
| - virtual void TearDown() OVERRIDE {
|
| - tc_set_new_mode(0);
|
| - }
|
| -#endif // defined(USE_TCMALLOC)
|
| -
|
| - void SetUpInDeathAssert() {
|
| - // Must call EnableTerminationOnOutOfMemory() because that is called from
|
| - // chrome's main function and therefore hasn't been called yet.
|
| - // Since this call may result in another thread being created and death
|
| - // tests shouldn't be started in a multithread environment, this call
|
| - // should be done inside of the ASSERT_DEATH.
|
| - base::EnableTerminationOnOutOfMemory();
|
| - }
|
| -
|
| - void* value_;
|
| - size_t test_size_;
|
| - ssize_t signed_test_size_;
|
| -};
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, New) {
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - value_ = operator new(test_size_);
|
| - }, "");
|
| -}
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, NewArray) {
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - value_ = new char[test_size_];
|
| - }, "");
|
| -}
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, Malloc) {
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - value_ = malloc(test_size_);
|
| - }, "");
|
| -}
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, Realloc) {
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - value_ = realloc(NULL, test_size_);
|
| - }, "");
|
| -}
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, Calloc) {
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - value_ = calloc(1024, test_size_ / 1024L);
|
| - }, "");
|
| -}
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, Valloc) {
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - value_ = valloc(test_size_);
|
| - }, "");
|
| -}
|
| -
|
| -#if defined(OS_LINUX)
|
| -TEST_F(OutOfMemoryDeathTest, Pvalloc) {
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - value_ = pvalloc(test_size_);
|
| - }, "");
|
| -}
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, Memalign) {
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - value_ = memalign(4, test_size_);
|
| - }, "");
|
| -}
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, ViaSharedLibraries) {
|
| - // g_try_malloc is documented to return NULL on failure. (g_malloc is the
|
| - // 'safe' default that crashes if allocation fails). However, since we have
|
| - // hopefully overridden malloc, even g_try_malloc should fail. This tests
|
| - // that the run-time symbol resolution is overriding malloc for shared
|
| - // libraries as well as for our code.
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - value_ = g_try_malloc(test_size_);
|
| - }, "");
|
| -}
|
| -#endif // OS_LINUX
|
| -
|
| -// Android doesn't implement posix_memalign().
|
| -#if defined(OS_POSIX) && !defined(OS_ANDROID)
|
| -TEST_F(OutOfMemoryDeathTest, Posix_memalign) {
|
| - // Grab the return value of posix_memalign to silence a compiler warning
|
| - // about unused return values. We don't actually care about the return
|
| - // value, since we're asserting death.
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - EXPECT_EQ(ENOMEM, posix_memalign(&value_, 8, test_size_));
|
| - }, "");
|
| -}
|
| -#endif // defined(OS_POSIX) && !defined(OS_ANDROID)
|
| -
|
| -#if defined(OS_MACOSX)
|
| -
|
| -// Purgeable zone tests
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, MallocPurgeable) {
|
| - malloc_zone_t* zone = malloc_default_purgeable_zone();
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - value_ = malloc_zone_malloc(zone, test_size_);
|
| - }, "");
|
| -}
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, ReallocPurgeable) {
|
| - malloc_zone_t* zone = malloc_default_purgeable_zone();
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - value_ = malloc_zone_realloc(zone, NULL, test_size_);
|
| - }, "");
|
| -}
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, CallocPurgeable) {
|
| - malloc_zone_t* zone = malloc_default_purgeable_zone();
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - value_ = malloc_zone_calloc(zone, 1024, test_size_ / 1024L);
|
| - }, "");
|
| -}
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, VallocPurgeable) {
|
| - malloc_zone_t* zone = malloc_default_purgeable_zone();
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - value_ = malloc_zone_valloc(zone, test_size_);
|
| - }, "");
|
| -}
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, PosixMemalignPurgeable) {
|
| - malloc_zone_t* zone = malloc_default_purgeable_zone();
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - value_ = malloc_zone_memalign(zone, 8, test_size_);
|
| - }, "");
|
| -}
|
| -
|
| -// Since these allocation functions take a signed size, it's possible that
|
| -// calling them just once won't be enough to exhaust memory. In the 32-bit
|
| -// environment, it's likely that these allocation attempts will fail because
|
| -// not enough contiguous address space is available. In the 64-bit environment,
|
| -// it's likely that they'll fail because they would require a preposterous
|
| -// amount of (virtual) memory.
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, CFAllocatorSystemDefault) {
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - while ((value_ =
|
| - base::AllocateViaCFAllocatorSystemDefault(signed_test_size_))) {}
|
| - }, "");
|
| -}
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, CFAllocatorMalloc) {
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - while ((value_ =
|
| - base::AllocateViaCFAllocatorMalloc(signed_test_size_))) {}
|
| - }, "");
|
| -}
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, CFAllocatorMallocZone) {
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - while ((value_ =
|
| - base::AllocateViaCFAllocatorMallocZone(signed_test_size_))) {}
|
| - }, "");
|
| -}
|
| -
|
| -#if !defined(ARCH_CPU_64_BITS)
|
| -
|
| -// See process_util_unittest_mac.mm for an explanation of why this test isn't
|
| -// run in the 64-bit environment.
|
| -
|
| -TEST_F(OutOfMemoryDeathTest, PsychoticallyBigObjCObject) {
|
| - ASSERT_DEATH({
|
| - SetUpInDeathAssert();
|
| - while ((value_ = base::AllocatePsychoticallyBigObjCObject())) {}
|
| - }, "");
|
| -}
|
| -
|
| -#endif // !ARCH_CPU_64_BITS
|
| -#endif // OS_MACOSX
|
| -
|
| -#endif // !defined(OS_ANDROID) && !defined(OS_OPENBSD) &&
|
| - // !defined(OS_WIN) && !defined(ADDRESS_SANITIZER)
|
|
|