Chromium Code Reviews| Index: base/process/process_unittest.cc |
| diff --git a/base/process/process_unittest.cc b/base/process/process_unittest.cc |
| index 5180f64c55a8111a5db6456570d1ac4d38f2776e..a4d0212f6b8dd84fc1f00039f216c56577693917 100644 |
| --- a/base/process/process_unittest.cc |
| +++ b/base/process/process_unittest.cc |
| @@ -4,13 +4,25 @@ |
| #include "base/process/process.h" |
| +#include "base/files/file_path.h" |
| +#include "base/files/file_util.h" |
| #include "base/process/kill.h" |
| #include "base/test/multiprocess_test.h" |
| #include "base/test/test_timeouts.h" |
| +#include "base/third_party/dynamic_annotations/dynamic_annotations.h" |
| #include "base/threading/platform_thread.h" |
| +#include "build/build_config.h" |
| #include "testing/gtest/include/gtest/gtest.h" |
| #include "testing/multiprocess_func_list.h" |
| +#if defined(OS_LINUX) |
| +#include <errno.h> |
| +#include <sched.h> |
| +#include <sys/syscall.h> |
| +#include <sys/types.h> |
| +#include <sys/wait.h> |
| +#include <unistd.h> |
| +#endif |
| namespace { |
| @@ -201,4 +213,62 @@ TEST_F(ProcessTest, SetProcessBackgroundedSelf) { |
| EXPECT_EQ(old_priority, new_priority); |
| } |
| +#if defined(OS_LINUX) |
| +const int kSuccess = 0; |
| + |
| +MULTIPROCESS_TEST_MAIN(CheckPidProcess) { |
| + const pid_t kInitPid = 1; |
| + const pid_t pid = syscall(__NR_getpid); |
| + CHECK(pid == kInitPid); |
| + CHECK(getpid() == pid); |
| + return kSuccess; |
| +} |
| + |
| +TEST_F(ProcessTest, CloneFlags) { |
| + if (RunningOnValgrind() || !PathExists(FilePath("/proc/self/ns/user")) || |
| + !PathExists(FilePath("/proc/self/ns/pid"))) { |
| + // User or PID namespaces are not supported. |
| + return; |
| + } |
| + |
| + LaunchOptions options; |
| + options.clone_flags = CLONE_NEWUSER | CLONE_NEWPID; |
| + |
| + Process process(SpawnChildWithOptions("CheckPidProcess", options)); |
| + ASSERT_TRUE(process.IsValid()); |
| + |
| + int exit_code = 42; |
| + EXPECT_TRUE(process.WaitForExit(&exit_code)); |
| + EXPECT_EQ(kSuccess, exit_code); |
| +} |
| + |
| +TEST(ForkWithFlagsTest, UpdatesPidCache) { |
| + // The libc clone function, which allows ForkWithFlags to keep the pid cache |
| + // up to date, does not work on Valgrind. |
| + if (RunningOnValgrind()) { |
| + return; |
| + } |
| + |
| + // Warm up the libc pid cache, if there is one. |
| + ASSERT_EQ(syscall(__NR_getpid), getpid()); |
| + |
| + pid_t ctid = 0; |
| + const pid_t pid = ForkWithFlags(SIGCHLD | CLONE_CHILD_SETTID, nullptr, &ctid); |
| + if (pid == 0) { |
| + // In child. Check both the raw getpid syscall and the libc getpid wrapper |
| + // (which may rely on a pid cache). |
| + CHECK(syscall(__NR_getpid) == ctid); |
|
jln (very slow on Chromium)
2015/01/12 20:26:50
I think it'd be more robust here to _exit with a k
rickyz (no longer on Chrome)
2015/01/12 21:37:51
Is RAW_CHECK OK? It should be async signal safe, a
|
| + CHECK(getpid() == ctid); |
| + _exit(kSuccess); |
| + } |
| + |
| + ASSERT_NE(-1, pid); |
| + int status = 42; |
| + ASSERT_EQ(pid, HANDLE_EINTR(waitpid(pid, &status, 0))); |
| + ASSERT_TRUE(WIFEXITED(status)); |
| + EXPECT_EQ(kSuccess, WEXITSTATUS(status)); |
| +} |
| + |
| +#endif |
| + |
| } // namespace base |