Index: base/process/process_unittest.cc |
diff --git a/base/process/process_unittest.cc b/base/process/process_unittest.cc |
index 5180f64c55a8111a5db6456570d1ac4d38f2776e..8130726942a06f263f6610b9cafd3c242dfc45e2 100644 |
--- a/base/process/process_unittest.cc |
+++ b/base/process/process_unittest.cc |
@@ -4,13 +4,27 @@ |
#include "base/process/process.h" |
+#include "base/files/file_path.h" |
+#include "base/files/file_util.h" |
+#include "base/files/scoped_file.h" |
+#include "base/posix/eintr_wrapper.h" |
#include "base/process/kill.h" |
#include "base/test/multiprocess_test.h" |
#include "base/test/test_timeouts.h" |
+#include "base/third_party/dynamic_annotations/dynamic_annotations.h" |
#include "base/threading/platform_thread.h" |
+#include "build/build_config.h" |
#include "testing/gtest/include/gtest/gtest.h" |
#include "testing/multiprocess_func_list.h" |
+#if defined(OS_LINUX) |
+#include <errno.h> |
+#include <sched.h> |
+#include <sys/syscall.h> |
+#include <sys/types.h> |
+#include <sys/wait.h> |
+#include <unistd.h> |
+#endif |
namespace { |
@@ -201,4 +215,105 @@ TEST_F(ProcessTest, SetProcessBackgroundedSelf) { |
EXPECT_EQ(old_priority, new_priority); |
} |
+#if defined(OS_LINUX) |
+const int kSuccess = 0; |
+ |
+MULTIPROCESS_TEST_MAIN(CheckPidProcess) { |
+ const pid_t kInitPid = 1; |
+ const pid_t pid = syscall(__NR_getpid); |
+ CHECK(pid == kInitPid); |
+ CHECK(getpid() == pid); |
+ return kSuccess; |
+} |
+ |
+TEST_F(ProcessTest, CloneFlags) { |
+ if (RunningOnValgrind() || !PathExists(FilePath("/proc/self/ns/user")) || |
+ !PathExists(FilePath("/proc/self/ns/pid"))) { |
+ // User or PID namespaces are not supported. |
+ return; |
+ } |
+ |
+ LaunchOptions options; |
+ options.clone_flags = CLONE_NEWUSER | CLONE_NEWPID; |
+ |
+ Process process(SpawnChildWithOptions("CheckPidProcess", options)); |
+ ASSERT_TRUE(process.IsValid()); |
+ |
+ int exit_code = 42; |
+ EXPECT_TRUE(process.WaitForExit(&exit_code)); |
+ EXPECT_EQ(kSuccess, exit_code); |
+} |
+ |
+TEST(ForkWithFlagsTest, UpdatesPidCache) { |
+ // The libc clone function, which allows ForkWithFlags to keep the pid cache |
+ // up to date, does not work on Valgrind. |
+ if (RunningOnValgrind()) { |
+ return; |
+ } |
+ |
+ // Warm up the libc pid cache, if there is one. |
+ ASSERT_EQ(syscall(__NR_getpid), getpid()); |
+ |
+ pid_t ctid = 0; |
+ const pid_t pid = ForkWithFlags(SIGCHLD | CLONE_CHILD_SETTID, nullptr, &ctid); |
+ if (pid == 0) { |
+ // In child. Check both the raw getpid syscall and the libc getpid wrapper |
+ // (which may rely on a pid cache). |
+ RAW_CHECK(syscall(__NR_getpid) == ctid); |
+ RAW_CHECK(getpid() == ctid); |
+ _exit(kSuccess); |
+ } |
+ |
+ ASSERT_NE(-1, pid); |
+ int status = 42; |
+ ASSERT_EQ(pid, HANDLE_EINTR(waitpid(pid, &status, 0))); |
+ ASSERT_TRUE(WIFEXITED(status)); |
+ EXPECT_EQ(kSuccess, WEXITSTATUS(status)); |
+} |
+#endif |
+ |
+#if defined(OS_POSIX) && !defined(OS_ANDROID) |
+const char kPipeValue = '\xcc'; |
+ |
+class ReadFromPipeDelegate : public LaunchOptions::PreExecDelegate { |
+ public: |
+ explicit ReadFromPipeDelegate(int fd) : fd_(fd) {} |
+ ~ReadFromPipeDelegate() override {} |
+ void RunAsyncSafe() override { |
+ char c; |
+ RAW_CHECK(HANDLE_EINTR(read(fd_, &c, 1)) == 1); |
+ RAW_CHECK(IGNORE_EINTR(close(fd_)) == 0); |
+ RAW_CHECK(c == kPipeValue); |
+ } |
+ |
+ private: |
+ int fd_; |
+ DISALLOW_COPY_AND_ASSIGN(ReadFromPipeDelegate); |
+}; |
+ |
+TEST_F(ProcessTest, PreExecHook) { |
+ int pipe_fds[2]; |
+ ASSERT_EQ(0, pipe(pipe_fds)); |
+ |
+ ScopedFD read_fd(pipe_fds[0]); |
+ ScopedFD write_fd(pipe_fds[1]); |
+ base::FileHandleMappingVector fds_to_remap; |
+ fds_to_remap.push_back(std::make_pair(read_fd.get(), read_fd.get())); |
+ |
+ ReadFromPipeDelegate read_from_pipe_delegate(read_fd.get()); |
+ LaunchOptions options; |
+ options.fds_to_remap = &fds_to_remap; |
+ options.pre_exec_delegate = &read_from_pipe_delegate; |
+ Process process(SpawnChildWithOptions("SimpleChildProcess", options)); |
+ ASSERT_TRUE(process.IsValid()); |
+ |
+ read_fd.reset(); |
+ ASSERT_EQ(1, HANDLE_EINTR(write(write_fd.get(), &kPipeValue, 1))); |
+ |
+ int exit_code = 42; |
+ EXPECT_TRUE(process.WaitForExit(&exit_code)); |
+ EXPECT_EQ(0, exit_code); |
+} |
+#endif // defined(OS_POSIX) && !defined(OS_ANDROID) |
+ |
} // namespace base |