| // Copyright (c) 2012 The Chromium Authors. All rights reserved. | 
 | // Use of this source code is governed by a BSD-style license that can be | 
 | // found in the LICENSE file. | 
 |  | 
 | #define _CRT_SECURE_NO_WARNINGS | 
 |  | 
 | #include <limits> | 
 |  | 
 | #include "base/command_line.h" | 
 | #include "base/debug/alias.h" | 
 | #include "base/debug/stack_trace.h" | 
 | #include "base/files/file_path.h" | 
 | #include "base/files/file_util.h" | 
 | #include "base/files/scoped_file.h" | 
 | #include "base/logging.h" | 
 | #include "base/memory/scoped_ptr.h" | 
 | #include "base/path_service.h" | 
 | #include "base/posix/eintr_wrapper.h" | 
 | #include "base/process/kill.h" | 
 | #include "base/process/launch.h" | 
 | #include "base/process/memory.h" | 
 | #include "base/process/process.h" | 
 | #include "base/process/process_metrics.h" | 
 | #include "base/strings/string_number_conversions.h" | 
 | #include "base/strings/utf_string_conversions.h" | 
 | #include "base/synchronization/waitable_event.h" | 
 | #include "base/test/multiprocess_test.h" | 
 | #include "base/test/test_timeouts.h" | 
 | #include "base/third_party/dynamic_annotations/dynamic_annotations.h" | 
 | #include "base/threading/platform_thread.h" | 
 | #include "base/threading/thread.h" | 
 | #include "build/build_config.h" | 
 | #include "testing/gtest/include/gtest/gtest.h" | 
 | #include "testing/multiprocess_func_list.h" | 
 |  | 
 | #if defined(OS_LINUX) | 
 | #include <malloc.h> | 
 | #include <sched.h> | 
 | #include <sys/syscall.h> | 
 | #endif | 
 | #if defined(OS_POSIX) | 
 | #include <dlfcn.h> | 
 | #include <errno.h> | 
 | #include <fcntl.h> | 
 | #include <sched.h> | 
 | #include <signal.h> | 
 | #include <sys/resource.h> | 
 | #include <sys/socket.h> | 
 | #include <sys/types.h> | 
 | #include <sys/wait.h> | 
 | #include <unistd.h> | 
 | #endif | 
 | #if defined(OS_WIN) | 
 | #include <windows.h> | 
 | #include "base/win/windows_version.h" | 
 | #endif | 
 | #if defined(OS_MACOSX) | 
 | #include <mach/vm_param.h> | 
 | #include <malloc/malloc.h> | 
 | #include "base/mac/mac_util.h" | 
 | #endif | 
 |  | 
 | using base::FilePath; | 
 |  | 
 | namespace { | 
 |  | 
 | #if defined(OS_ANDROID) | 
 | const char kShellPath[] = "/system/bin/sh"; | 
 | const char kPosixShell[] = "sh"; | 
 | #else | 
 | const char kShellPath[] = "/bin/sh"; | 
 | const char kPosixShell[] = "bash"; | 
 | #endif | 
 |  | 
 | const char kSignalFileSlow[] = "SlowChildProcess.die"; | 
 | const char kSignalFileKill[] = "KilledChildProcess.die"; | 
 |  | 
 | #if defined(OS_POSIX) | 
 | const char kSignalFileTerm[] = "TerminatedChildProcess.die"; | 
 | #endif | 
 |  | 
 | #if defined(OS_WIN) | 
 | const int kExpectedStillRunningExitCode = 0x102; | 
 | const int kExpectedKilledExitCode = 1; | 
 | #else | 
 | const int kExpectedStillRunningExitCode = 0; | 
 | #endif | 
 |  | 
 | // Sleeps until file filename is created. | 
 | void WaitToDie(const char* filename) { | 
 |   FILE* fp; | 
 |   do { | 
 |     base::PlatformThread::Sleep(base::TimeDelta::FromMilliseconds(10)); | 
 |     fp = fopen(filename, "r"); | 
 |   } while (!fp); | 
 |   fclose(fp); | 
 | } | 
 |  | 
 | // Signals children they should die now. | 
 | void SignalChildren(const char* filename) { | 
 |   FILE* fp = fopen(filename, "w"); | 
 |   fclose(fp); | 
 | } | 
 |  | 
 | // Using a pipe to the child to wait for an event was considered, but | 
 | // there were cases in the past where pipes caused problems (other | 
 | // libraries closing the fds, child deadlocking). This is a simple | 
 | // case, so it's not worth the risk.  Using wait loops is discouraged | 
 | // in most instances. | 
 | base::TerminationStatus WaitForChildTermination(base::ProcessHandle handle, | 
 |                                                 int* exit_code) { | 
 |   // Now we wait until the result is something other than STILL_RUNNING. | 
 |   base::TerminationStatus status = base::TERMINATION_STATUS_STILL_RUNNING; | 
 |   const base::TimeDelta kInterval = base::TimeDelta::FromMilliseconds(20); | 
 |   base::TimeDelta waited; | 
 |   do { | 
 |     status = base::GetTerminationStatus(handle, exit_code); | 
 |     base::PlatformThread::Sleep(kInterval); | 
 |     waited += kInterval; | 
 |   } while (status == base::TERMINATION_STATUS_STILL_RUNNING && | 
 |            waited < TestTimeouts::action_max_timeout()); | 
 |  | 
 |   return status; | 
 | } | 
 |  | 
 | }  // namespace | 
 |  | 
 | class ProcessUtilTest : public base::MultiProcessTest { | 
 |  public: | 
 | #if defined(OS_POSIX) | 
 |   // Spawn a child process that counts how many file descriptors are open. | 
 |   int CountOpenFDsInChild(); | 
 | #endif | 
 |   // Converts the filename to a platform specific filepath. | 
 |   // On Android files can not be created in arbitrary directories. | 
 |   static std::string GetSignalFilePath(const char* filename); | 
 | }; | 
 |  | 
 | std::string ProcessUtilTest::GetSignalFilePath(const char* filename) { | 
 | #if !defined(OS_ANDROID) | 
 |   return filename; | 
 | #else | 
 |   FilePath tmp_dir; | 
 |   PathService::Get(base::DIR_CACHE, &tmp_dir); | 
 |   tmp_dir = tmp_dir.Append(filename); | 
 |   return tmp_dir.value(); | 
 | #endif | 
 | } | 
 |  | 
 | MULTIPROCESS_TEST_MAIN(SimpleChildProcess) { | 
 |   return 0; | 
 | } | 
 |  | 
 | // TODO(viettrungluu): This should be in a "MultiProcessTestTest". | 
 | TEST_F(ProcessUtilTest, SpawnChild) { | 
 |   base::Process process = SpawnChild("SimpleChildProcess"); | 
 |   ASSERT_TRUE(process.IsValid()); | 
 |   int exit_code; | 
 |   EXPECT_TRUE(process.WaitForExitWithTimeout( | 
 |                   TestTimeouts::action_max_timeout(), &exit_code)); | 
 | } | 
 |  | 
 | MULTIPROCESS_TEST_MAIN(SlowChildProcess) { | 
 |   WaitToDie(ProcessUtilTest::GetSignalFilePath(kSignalFileSlow).c_str()); | 
 |   return 0; | 
 | } | 
 |  | 
 | TEST_F(ProcessUtilTest, KillSlowChild) { | 
 |   const std::string signal_file = | 
 |       ProcessUtilTest::GetSignalFilePath(kSignalFileSlow); | 
 |   remove(signal_file.c_str()); | 
 |   base::Process process = SpawnChild("SlowChildProcess"); | 
 |   ASSERT_TRUE(process.IsValid()); | 
 |   SignalChildren(signal_file.c_str()); | 
 |   int exit_code; | 
 |   EXPECT_TRUE(process.WaitForExitWithTimeout( | 
 |                   TestTimeouts::action_max_timeout(), &exit_code)); | 
 |   remove(signal_file.c_str()); | 
 | } | 
 |  | 
 | // Times out on Linux and Win, flakes on other platforms, http://crbug.com/95058 | 
 | TEST_F(ProcessUtilTest, DISABLED_GetTerminationStatusExit) { | 
 |   const std::string signal_file = | 
 |       ProcessUtilTest::GetSignalFilePath(kSignalFileSlow); | 
 |   remove(signal_file.c_str()); | 
 |   base::Process process = SpawnChild("SlowChildProcess"); | 
 |   ASSERT_TRUE(process.IsValid()); | 
 |  | 
 |   int exit_code = 42; | 
 |   EXPECT_EQ(base::TERMINATION_STATUS_STILL_RUNNING, | 
 |             base::GetTerminationStatus(process.Handle(), &exit_code)); | 
 |   EXPECT_EQ(kExpectedStillRunningExitCode, exit_code); | 
 |  | 
 |   SignalChildren(signal_file.c_str()); | 
 |   exit_code = 42; | 
 |   base::TerminationStatus status = | 
 |       WaitForChildTermination(process.Handle(), &exit_code); | 
 |   EXPECT_EQ(base::TERMINATION_STATUS_NORMAL_TERMINATION, status); | 
 |   EXPECT_EQ(0, exit_code); | 
 |   remove(signal_file.c_str()); | 
 | } | 
 |  | 
 | #if defined(OS_WIN) | 
 | // TODO(cpu): figure out how to test this in other platforms. | 
 | TEST_F(ProcessUtilTest, GetProcId) { | 
 |   base::ProcessId id1 = base::GetProcId(GetCurrentProcess()); | 
 |   EXPECT_NE(0ul, id1); | 
 |   base::Process process = SpawnChild("SimpleChildProcess"); | 
 |   ASSERT_TRUE(process.IsValid()); | 
 |   base::ProcessId id2 = process.Pid(); | 
 |   EXPECT_NE(0ul, id2); | 
 |   EXPECT_NE(id1, id2); | 
 | } | 
 | #endif | 
 |  | 
 | #if !defined(OS_MACOSX) | 
 | // This test is disabled on Mac, since it's flaky due to ReportCrash | 
 | // taking a variable amount of time to parse and load the debug and | 
 | // symbol data for this unit test's executable before firing the | 
 | // signal handler. | 
 | // | 
 | // TODO(gspencer): turn this test process into a very small program | 
 | // with no symbols (instead of using the multiprocess testing | 
 | // framework) to reduce the ReportCrash overhead. | 
 | const char kSignalFileCrash[] = "CrashingChildProcess.die"; | 
 |  | 
 | MULTIPROCESS_TEST_MAIN(CrashingChildProcess) { | 
 |   WaitToDie(ProcessUtilTest::GetSignalFilePath(kSignalFileCrash).c_str()); | 
 | #if defined(OS_POSIX) | 
 |   // Have to disable to signal handler for segv so we can get a crash | 
 |   // instead of an abnormal termination through the crash dump handler. | 
 |   ::signal(SIGSEGV, SIG_DFL); | 
 | #endif | 
 |   // Make this process have a segmentation fault. | 
 |   volatile int* oops = NULL; | 
 |   *oops = 0xDEAD; | 
 |   return 1; | 
 | } | 
 |  | 
 | // This test intentionally crashes, so we don't need to run it under | 
 | // AddressSanitizer. | 
 | #if defined(ADDRESS_SANITIZER) || defined(SYZYASAN) | 
 | #define MAYBE_GetTerminationStatusCrash DISABLED_GetTerminationStatusCrash | 
 | #else | 
 | #define MAYBE_GetTerminationStatusCrash GetTerminationStatusCrash | 
 | #endif | 
 | TEST_F(ProcessUtilTest, MAYBE_GetTerminationStatusCrash) { | 
 |   const std::string signal_file = | 
 |     ProcessUtilTest::GetSignalFilePath(kSignalFileCrash); | 
 |   remove(signal_file.c_str()); | 
 |   base::Process process = SpawnChild("CrashingChildProcess"); | 
 |   ASSERT_TRUE(process.IsValid()); | 
 |  | 
 |   int exit_code = 42; | 
 |   EXPECT_EQ(base::TERMINATION_STATUS_STILL_RUNNING, | 
 |             base::GetTerminationStatus(process.Handle(), &exit_code)); | 
 |   EXPECT_EQ(kExpectedStillRunningExitCode, exit_code); | 
 |  | 
 |   SignalChildren(signal_file.c_str()); | 
 |   exit_code = 42; | 
 |   base::TerminationStatus status = | 
 |       WaitForChildTermination(process.Handle(), &exit_code); | 
 |   EXPECT_EQ(base::TERMINATION_STATUS_PROCESS_CRASHED, status); | 
 |  | 
 | #if defined(OS_WIN) | 
 |   EXPECT_EQ(0xc0000005, exit_code); | 
 | #elif defined(OS_POSIX) | 
 |   int signaled = WIFSIGNALED(exit_code); | 
 |   EXPECT_NE(0, signaled); | 
 |   int signal = WTERMSIG(exit_code); | 
 |   EXPECT_EQ(SIGSEGV, signal); | 
 | #endif | 
 |  | 
 |   // Reset signal handlers back to "normal". | 
 |   base::debug::EnableInProcessStackDumping(); | 
 |   remove(signal_file.c_str()); | 
 | } | 
 | #endif  // !defined(OS_MACOSX) | 
 |  | 
 | MULTIPROCESS_TEST_MAIN(KilledChildProcess) { | 
 |   WaitToDie(ProcessUtilTest::GetSignalFilePath(kSignalFileKill).c_str()); | 
 | #if defined(OS_WIN) | 
 |   // Kill ourselves. | 
 |   HANDLE handle = ::OpenProcess(PROCESS_ALL_ACCESS, 0, ::GetCurrentProcessId()); | 
 |   ::TerminateProcess(handle, kExpectedKilledExitCode); | 
 | #elif defined(OS_POSIX) | 
 |   // Send a SIGKILL to this process, just like the OOM killer would. | 
 |   ::kill(getpid(), SIGKILL); | 
 | #endif | 
 |   return 1; | 
 | } | 
 |  | 
 | #if defined(OS_POSIX) | 
 | MULTIPROCESS_TEST_MAIN(TerminatedChildProcess) { | 
 |   WaitToDie(ProcessUtilTest::GetSignalFilePath(kSignalFileTerm).c_str()); | 
 |   // Send a SIGTERM to this process. | 
 |   ::kill(getpid(), SIGTERM); | 
 |   return 1; | 
 | } | 
 | #endif | 
 |  | 
 | TEST_F(ProcessUtilTest, GetTerminationStatusSigKill) { | 
 |   const std::string signal_file = | 
 |     ProcessUtilTest::GetSignalFilePath(kSignalFileKill); | 
 |   remove(signal_file.c_str()); | 
 |   base::Process process = SpawnChild("KilledChildProcess"); | 
 |   ASSERT_TRUE(process.IsValid()); | 
 |  | 
 |   int exit_code = 42; | 
 |   EXPECT_EQ(base::TERMINATION_STATUS_STILL_RUNNING, | 
 |             base::GetTerminationStatus(process.Handle(), &exit_code)); | 
 |   EXPECT_EQ(kExpectedStillRunningExitCode, exit_code); | 
 |  | 
 |   SignalChildren(signal_file.c_str()); | 
 |   exit_code = 42; | 
 |   base::TerminationStatus status = | 
 |       WaitForChildTermination(process.Handle(), &exit_code); | 
 | #if defined(OS_CHROMEOS) | 
 |   EXPECT_EQ(base::TERMINATION_STATUS_PROCESS_WAS_KILLED_BY_OOM, status); | 
 | #else | 
 |   EXPECT_EQ(base::TERMINATION_STATUS_PROCESS_WAS_KILLED, status); | 
 | #endif | 
 |  | 
 | #if defined(OS_WIN) | 
 |   EXPECT_EQ(kExpectedKilledExitCode, exit_code); | 
 | #elif defined(OS_POSIX) | 
 |   int signaled = WIFSIGNALED(exit_code); | 
 |   EXPECT_NE(0, signaled); | 
 |   int signal = WTERMSIG(exit_code); | 
 |   EXPECT_EQ(SIGKILL, signal); | 
 | #endif | 
 |   remove(signal_file.c_str()); | 
 | } | 
 |  | 
 | #if defined(OS_POSIX) | 
 | TEST_F(ProcessUtilTest, GetTerminationStatusSigTerm) { | 
 |   const std::string signal_file = | 
 |     ProcessUtilTest::GetSignalFilePath(kSignalFileTerm); | 
 |   remove(signal_file.c_str()); | 
 |   base::Process process = SpawnChild("TerminatedChildProcess"); | 
 |   ASSERT_TRUE(process.IsValid()); | 
 |  | 
 |   int exit_code = 42; | 
 |   EXPECT_EQ(base::TERMINATION_STATUS_STILL_RUNNING, | 
 |             base::GetTerminationStatus(process.Handle(), &exit_code)); | 
 |   EXPECT_EQ(kExpectedStillRunningExitCode, exit_code); | 
 |  | 
 |   SignalChildren(signal_file.c_str()); | 
 |   exit_code = 42; | 
 |   base::TerminationStatus status = | 
 |       WaitForChildTermination(process.Handle(), &exit_code); | 
 |   EXPECT_EQ(base::TERMINATION_STATUS_PROCESS_WAS_KILLED, status); | 
 |  | 
 |   int signaled = WIFSIGNALED(exit_code); | 
 |   EXPECT_NE(0, signaled); | 
 |   int signal = WTERMSIG(exit_code); | 
 |   EXPECT_EQ(SIGTERM, signal); | 
 |   remove(signal_file.c_str()); | 
 | } | 
 | #endif | 
 |  | 
 | #if defined(OS_WIN) | 
 | // TODO(estade): if possible, port this test. | 
 | TEST_F(ProcessUtilTest, GetAppOutput) { | 
 |   // Let's create a decently long message. | 
 |   std::string message; | 
 |   for (int i = 0; i < 1025; i++) {  // 1025 so it does not end on a kilo-byte | 
 |                                     // boundary. | 
 |     message += "Hello!"; | 
 |   } | 
 |   // cmd.exe's echo always adds a \r\n to its output. | 
 |   std::string expected(message); | 
 |   expected += "\r\n"; | 
 |  | 
 |   FilePath cmd(L"cmd.exe"); | 
 |   base::CommandLine cmd_line(cmd); | 
 |   cmd_line.AppendArg("/c"); | 
 |   cmd_line.AppendArg("echo " + message + ""); | 
 |   std::string output; | 
 |   ASSERT_TRUE(base::GetAppOutput(cmd_line, &output)); | 
 |   EXPECT_EQ(expected, output); | 
 |  | 
 |   // Let's make sure stderr is ignored. | 
 |   base::CommandLine other_cmd_line(cmd); | 
 |   other_cmd_line.AppendArg("/c"); | 
 |   // http://msdn.microsoft.com/library/cc772622.aspx | 
 |   cmd_line.AppendArg("echo " + message + " >&2"); | 
 |   output.clear(); | 
 |   ASSERT_TRUE(base::GetAppOutput(other_cmd_line, &output)); | 
 |   EXPECT_EQ("", output); | 
 | } | 
 |  | 
 | // TODO(estade): if possible, port this test. | 
 | TEST_F(ProcessUtilTest, LaunchAsUser) { | 
 |   base::UserTokenHandle token; | 
 |   ASSERT_TRUE(OpenProcessToken(GetCurrentProcess(), TOKEN_ALL_ACCESS, &token)); | 
 |   base::LaunchOptions options; | 
 |   options.as_user = token; | 
 |   EXPECT_TRUE(base::LaunchProcess(MakeCmdLine("SimpleChildProcess"), | 
 |                                   options).IsValid()); | 
 | } | 
 |  | 
 | static const char kEventToTriggerHandleSwitch[] = "event-to-trigger-handle"; | 
 |  | 
 | MULTIPROCESS_TEST_MAIN(TriggerEventChildProcess) { | 
 |   std::string handle_value_string = | 
 |       base::CommandLine::ForCurrentProcess()->GetSwitchValueASCII( | 
 |           kEventToTriggerHandleSwitch); | 
 |   CHECK(!handle_value_string.empty()); | 
 |  | 
 |   uint64 handle_value_uint64; | 
 |   CHECK(base::StringToUint64(handle_value_string, &handle_value_uint64)); | 
 |   // Give ownership of the handle to |event|. | 
 |   base::WaitableEvent event(base::win::ScopedHandle( | 
 |       reinterpret_cast<HANDLE>(handle_value_uint64))); | 
 |  | 
 |   event.Signal(); | 
 |  | 
 |   return 0; | 
 | } | 
 |  | 
 | TEST_F(ProcessUtilTest, InheritSpecifiedHandles) { | 
 |   // Manually create the event, so that it can be inheritable. | 
 |   SECURITY_ATTRIBUTES security_attributes = {}; | 
 |   security_attributes.nLength = static_cast<DWORD>(sizeof(security_attributes)); | 
 |   security_attributes.lpSecurityDescriptor = NULL; | 
 |   security_attributes.bInheritHandle = true; | 
 |  | 
 |   // Takes ownership of the event handle. | 
 |   base::WaitableEvent event(base::win::ScopedHandle( | 
 |       CreateEvent(&security_attributes, true, false, NULL))); | 
 |   base::HandlesToInheritVector handles_to_inherit; | 
 |   handles_to_inherit.push_back(event.handle()); | 
 |   base::LaunchOptions options; | 
 |   options.handles_to_inherit = &handles_to_inherit; | 
 |  | 
 |   base::CommandLine cmd_line = MakeCmdLine("TriggerEventChildProcess"); | 
 |   cmd_line.AppendSwitchASCII(kEventToTriggerHandleSwitch, | 
 |       base::Uint64ToString(reinterpret_cast<uint64>(event.handle()))); | 
 |  | 
 |   // This functionality actually requires Vista or later. Make sure that it | 
 |   // fails properly on XP. | 
 |   if (base::win::GetVersion() < base::win::VERSION_VISTA) { | 
 |     EXPECT_FALSE(base::LaunchProcess(cmd_line, options).IsValid()); | 
 |     return; | 
 |   } | 
 |  | 
 |   // Launch the process and wait for it to trigger the event. | 
 |   ASSERT_TRUE(base::LaunchProcess(cmd_line, options).IsValid()); | 
 |   EXPECT_TRUE(event.TimedWait(TestTimeouts::action_max_timeout())); | 
 | } | 
 | #endif  // defined(OS_WIN) | 
 |  | 
 | #if defined(OS_POSIX) | 
 |  | 
 | namespace { | 
 |  | 
 | // Returns the maximum number of files that a process can have open. | 
 | // Returns 0 on error. | 
 | int GetMaxFilesOpenInProcess() { | 
 |   struct rlimit rlim; | 
 |   if (getrlimit(RLIMIT_NOFILE, &rlim) != 0) { | 
 |     return 0; | 
 |   } | 
 |  | 
 |   // rlim_t is a uint64 - clip to maxint. We do this since FD #s are ints | 
 |   // which are all 32 bits on the supported platforms. | 
 |   rlim_t max_int = static_cast<rlim_t>(std::numeric_limits<int32>::max()); | 
 |   if (rlim.rlim_cur > max_int) { | 
 |     return max_int; | 
 |   } | 
 |  | 
 |   return rlim.rlim_cur; | 
 | } | 
 |  | 
 | const int kChildPipe = 20;  // FD # for write end of pipe in child process. | 
 |  | 
 | #if defined(OS_MACOSX) | 
 |  | 
 | // <http://opensource.apple.com/source/xnu/xnu-2422.1.72/bsd/sys/guarded.h> | 
 | #if !defined(_GUARDID_T) | 
 | #define _GUARDID_T | 
 | typedef __uint64_t guardid_t; | 
 | #endif  // _GUARDID_T | 
 |  | 
 | // From .../MacOSX10.9.sdk/usr/include/sys/syscall.h | 
 | #if !defined(SYS_change_fdguard_np) | 
 | #define SYS_change_fdguard_np 444 | 
 | #endif | 
 |  | 
 | // <http://opensource.apple.com/source/xnu/xnu-2422.1.72/bsd/sys/guarded.h> | 
 | #if !defined(GUARD_DUP) | 
 | #define GUARD_DUP (1u << 1) | 
 | #endif | 
 |  | 
 | // <http://opensource.apple.com/source/xnu/xnu-2422.1.72/bsd/kern/kern_guarded.c?txt> | 
 | // | 
 | // Atomically replaces |guard|/|guardflags| with |nguard|/|nguardflags| on |fd|. | 
 | int change_fdguard_np(int fd, | 
 |                       const guardid_t *guard, u_int guardflags, | 
 |                       const guardid_t *nguard, u_int nguardflags, | 
 |                       int *fdflagsp) { | 
 |   return syscall(SYS_change_fdguard_np, fd, guard, guardflags, | 
 |                  nguard, nguardflags, fdflagsp); | 
 | } | 
 |  | 
 | // Attempt to set a file-descriptor guard on |fd|.  In case of success, remove | 
 | // it and return |true| to indicate that it can be guarded.  Returning |false| | 
 | // means either that |fd| is guarded by some other code, or more likely EBADF. | 
 | // | 
 | // Starting with 10.9, libdispatch began setting GUARD_DUP on a file descriptor. | 
 | // Unfortunately, it is spun up as part of +[NSApplication initialize], which is | 
 | // not really something that Chromium can avoid using on OSX.  See | 
 | // <http://crbug.com/338157>.  This function allows querying whether the file | 
 | // descriptor is guarded before attempting to close it. | 
 | bool CanGuardFd(int fd) { | 
 |   // The syscall is first provided in 10.9/Mavericks. | 
 |   if (!base::mac::IsOSMavericksOrLater()) | 
 |     return true; | 
 |  | 
 |   // Saves the original flags to reset later. | 
 |   int original_fdflags = 0; | 
 |  | 
 |   // This can be any value at all, it just has to match up between the two | 
 |   // calls. | 
 |   const guardid_t kGuard = 15; | 
 |  | 
 |   // Attempt to change the guard.  This can fail with EBADF if the file | 
 |   // descriptor is bad, or EINVAL if the fd already has a guard set. | 
 |   int ret = | 
 |       change_fdguard_np(fd, NULL, 0, &kGuard, GUARD_DUP, &original_fdflags); | 
 |   if (ret == -1) | 
 |     return false; | 
 |  | 
 |   // Remove the guard.  It should not be possible to fail in removing the guard | 
 |   // just added. | 
 |   ret = change_fdguard_np(fd, &kGuard, GUARD_DUP, NULL, 0, &original_fdflags); | 
 |   DPCHECK(ret == 0); | 
 |  | 
 |   return true; | 
 | } | 
 | #endif  // OS_MACOSX | 
 |  | 
 | }  // namespace | 
 |  | 
 | MULTIPROCESS_TEST_MAIN(ProcessUtilsLeakFDChildProcess) { | 
 |   // This child process counts the number of open FDs, it then writes that | 
 |   // number out to a pipe connected to the parent. | 
 |   int num_open_files = 0; | 
 |   int write_pipe = kChildPipe; | 
 |   int max_files = GetMaxFilesOpenInProcess(); | 
 |   for (int i = STDERR_FILENO + 1; i < max_files; i++) { | 
 | #if defined(OS_MACOSX) | 
 |     // Ignore guarded or invalid file descriptors. | 
 |     if (!CanGuardFd(i)) | 
 |       continue; | 
 | #endif | 
 |  | 
 |     if (i != kChildPipe) { | 
 |       int fd; | 
 |       if ((fd = HANDLE_EINTR(dup(i))) != -1) { | 
 |         close(fd); | 
 |         num_open_files += 1; | 
 |       } | 
 |     } | 
 |   } | 
 |  | 
 |   int written = HANDLE_EINTR(write(write_pipe, &num_open_files, | 
 |                                    sizeof(num_open_files))); | 
 |   DCHECK_EQ(static_cast<size_t>(written), sizeof(num_open_files)); | 
 |   int ret = IGNORE_EINTR(close(write_pipe)); | 
 |   DPCHECK(ret == 0); | 
 |  | 
 |   return 0; | 
 | } | 
 |  | 
 | int ProcessUtilTest::CountOpenFDsInChild() { | 
 |   int fds[2]; | 
 |   if (pipe(fds) < 0) | 
 |     NOTREACHED(); | 
 |  | 
 |   base::FileHandleMappingVector fd_mapping_vec; | 
 |   fd_mapping_vec.push_back(std::pair<int, int>(fds[1], kChildPipe)); | 
 |   base::LaunchOptions options; | 
 |   options.fds_to_remap = &fd_mapping_vec; | 
 |   base::Process process = | 
 |       SpawnChildWithOptions("ProcessUtilsLeakFDChildProcess", options); | 
 |   CHECK(process.IsValid()); | 
 |   int ret = IGNORE_EINTR(close(fds[1])); | 
 |   DPCHECK(ret == 0); | 
 |  | 
 |   // Read number of open files in client process from pipe; | 
 |   int num_open_files = -1; | 
 |   ssize_t bytes_read = | 
 |       HANDLE_EINTR(read(fds[0], &num_open_files, sizeof(num_open_files))); | 
 |   CHECK_EQ(bytes_read, static_cast<ssize_t>(sizeof(num_open_files))); | 
 |  | 
 | #if defined(THREAD_SANITIZER) | 
 |   // Compiler-based ThreadSanitizer makes this test slow. | 
 |   base::TimeDelta timeout = base::TimeDelta::FromSeconds(3); | 
 | #else | 
 |   base::TimeDelta timeout = base::TimeDelta::FromSeconds(1); | 
 | #endif | 
 |   int exit_code; | 
 |   CHECK(process.WaitForExitWithTimeout(timeout, &exit_code)); | 
 |   ret = IGNORE_EINTR(close(fds[0])); | 
 |   DPCHECK(ret == 0); | 
 |  | 
 |   return num_open_files; | 
 | } | 
 |  | 
 | #if defined(ADDRESS_SANITIZER) || defined(THREAD_SANITIZER) | 
 | // ProcessUtilTest.FDRemapping is flaky when ran under xvfb-run on Precise. | 
 | // The problem is 100% reproducible with both ASan and TSan. | 
 | // See http://crbug.com/136720. | 
 | #define MAYBE_FDRemapping DISABLED_FDRemapping | 
 | #else | 
 | #define MAYBE_FDRemapping FDRemapping | 
 | #endif | 
 | TEST_F(ProcessUtilTest, MAYBE_FDRemapping) { | 
 |   int fds_before = CountOpenFDsInChild(); | 
 |  | 
 |   // open some dummy fds to make sure they don't propagate over to the | 
 |   // child process. | 
 |   int dev_null = open("/dev/null", O_RDONLY); | 
 |   int sockets[2]; | 
 |   socketpair(AF_UNIX, SOCK_STREAM, 0, sockets); | 
 |  | 
 |   int fds_after = CountOpenFDsInChild(); | 
 |  | 
 |   ASSERT_EQ(fds_after, fds_before); | 
 |  | 
 |   int ret; | 
 |   ret = IGNORE_EINTR(close(sockets[0])); | 
 |   DPCHECK(ret == 0); | 
 |   ret = IGNORE_EINTR(close(sockets[1])); | 
 |   DPCHECK(ret == 0); | 
 |   ret = IGNORE_EINTR(close(dev_null)); | 
 |   DPCHECK(ret == 0); | 
 | } | 
 |  | 
 | namespace { | 
 |  | 
 | std::string TestLaunchProcess(const std::vector<std::string>& args, | 
 |                               const base::EnvironmentMap& env_changes, | 
 |                               const bool clear_environ, | 
 |                               const int clone_flags) { | 
 |   base::FileHandleMappingVector fds_to_remap; | 
 |  | 
 |   int fds[2]; | 
 |   PCHECK(pipe(fds) == 0); | 
 |  | 
 |   fds_to_remap.push_back(std::make_pair(fds[1], 1)); | 
 |   base::LaunchOptions options; | 
 |   options.wait = true; | 
 |   options.environ = env_changes; | 
 |   options.clear_environ = clear_environ; | 
 |   options.fds_to_remap = &fds_to_remap; | 
 | #if defined(OS_LINUX) | 
 |   options.clone_flags = clone_flags; | 
 | #else | 
 |   CHECK_EQ(0, clone_flags); | 
 | #endif  // OS_LINUX | 
 |   EXPECT_TRUE(base::LaunchProcess(args, options).IsValid()); | 
 |   PCHECK(IGNORE_EINTR(close(fds[1])) == 0); | 
 |  | 
 |   char buf[512]; | 
 |   const ssize_t n = HANDLE_EINTR(read(fds[0], buf, sizeof(buf))); | 
 |  | 
 |   PCHECK(IGNORE_EINTR(close(fds[0])) == 0); | 
 |  | 
 |   return std::string(buf, n); | 
 | } | 
 |  | 
 | const char kLargeString[] = | 
 |     "0123456789012345678901234567890123456789012345678901234567890123456789" | 
 |     "0123456789012345678901234567890123456789012345678901234567890123456789" | 
 |     "0123456789012345678901234567890123456789012345678901234567890123456789" | 
 |     "0123456789012345678901234567890123456789012345678901234567890123456789" | 
 |     "0123456789012345678901234567890123456789012345678901234567890123456789" | 
 |     "0123456789012345678901234567890123456789012345678901234567890123456789" | 
 |     "0123456789012345678901234567890123456789012345678901234567890123456789"; | 
 |  | 
 | }  // namespace | 
 |  | 
 | TEST_F(ProcessUtilTest, LaunchProcess) { | 
 |   base::EnvironmentMap env_changes; | 
 |   std::vector<std::string> echo_base_test; | 
 |   echo_base_test.push_back(kPosixShell); | 
 |   echo_base_test.push_back("-c"); | 
 |   echo_base_test.push_back("echo $BASE_TEST"); | 
 |  | 
 |   std::vector<std::string> print_env; | 
 |   print_env.push_back("/usr/bin/env"); | 
 |   const int no_clone_flags = 0; | 
 |   const bool no_clear_environ = false; | 
 |  | 
 |   const char kBaseTest[] = "BASE_TEST"; | 
 |  | 
 |   env_changes[kBaseTest] = "bar"; | 
 |   EXPECT_EQ("bar\n", | 
 |             TestLaunchProcess( | 
 |                 echo_base_test, env_changes, no_clear_environ, no_clone_flags)); | 
 |   env_changes.clear(); | 
 |  | 
 |   EXPECT_EQ(0, setenv(kBaseTest, "testing", 1 /* override */)); | 
 |   EXPECT_EQ("testing\n", | 
 |             TestLaunchProcess( | 
 |                 echo_base_test, env_changes, no_clear_environ, no_clone_flags)); | 
 |  | 
 |   env_changes[kBaseTest] = std::string(); | 
 |   EXPECT_EQ("\n", | 
 |             TestLaunchProcess( | 
 |                 echo_base_test, env_changes, no_clear_environ, no_clone_flags)); | 
 |  | 
 |   env_changes[kBaseTest] = "foo"; | 
 |   EXPECT_EQ("foo\n", | 
 |             TestLaunchProcess( | 
 |                 echo_base_test, env_changes, no_clear_environ, no_clone_flags)); | 
 |  | 
 |   env_changes.clear(); | 
 |   EXPECT_EQ(0, setenv(kBaseTest, kLargeString, 1 /* override */)); | 
 |   EXPECT_EQ(std::string(kLargeString) + "\n", | 
 |             TestLaunchProcess( | 
 |                 echo_base_test, env_changes, no_clear_environ, no_clone_flags)); | 
 |  | 
 |   env_changes[kBaseTest] = "wibble"; | 
 |   EXPECT_EQ("wibble\n", | 
 |             TestLaunchProcess( | 
 |                 echo_base_test, env_changes, no_clear_environ, no_clone_flags)); | 
 |  | 
 | #if defined(OS_LINUX) | 
 |   // Test a non-trival value for clone_flags. | 
 |   // Don't test on Valgrind as it has limited support for clone(). | 
 |   if (!RunningOnValgrind()) { | 
 |     EXPECT_EQ("wibble\n", TestLaunchProcess(echo_base_test, env_changes, | 
 |                                             no_clear_environ, CLONE_FS)); | 
 |   } | 
 |  | 
 |   EXPECT_EQ( | 
 |       "BASE_TEST=wibble\n", | 
 |       TestLaunchProcess( | 
 |           print_env, env_changes, true /* clear_environ */, no_clone_flags)); | 
 |   env_changes.clear(); | 
 |   EXPECT_EQ( | 
 |       "", | 
 |       TestLaunchProcess( | 
 |           print_env, env_changes, true /* clear_environ */, no_clone_flags)); | 
 | #endif | 
 | } | 
 |  | 
 | TEST_F(ProcessUtilTest, GetAppOutput) { | 
 |   std::string output; | 
 |  | 
 | #if defined(OS_ANDROID) | 
 |   std::vector<std::string> argv; | 
 |   argv.push_back("sh");  // Instead of /bin/sh, force path search to find it. | 
 |   argv.push_back("-c"); | 
 |  | 
 |   argv.push_back("exit 0"); | 
 |   EXPECT_TRUE(base::GetAppOutput(base::CommandLine(argv), &output)); | 
 |   EXPECT_STREQ("", output.c_str()); | 
 |  | 
 |   argv[2] = "exit 1"; | 
 |   EXPECT_FALSE(base::GetAppOutput(base::CommandLine(argv), &output)); | 
 |   EXPECT_STREQ("", output.c_str()); | 
 |  | 
 |   argv[2] = "echo foobar42"; | 
 |   EXPECT_TRUE(base::GetAppOutput(base::CommandLine(argv), &output)); | 
 |   EXPECT_STREQ("foobar42\n", output.c_str()); | 
 | #else | 
 |   EXPECT_TRUE(base::GetAppOutput(base::CommandLine(FilePath("true")), | 
 |                                  &output)); | 
 |   EXPECT_STREQ("", output.c_str()); | 
 |  | 
 |   EXPECT_FALSE(base::GetAppOutput(base::CommandLine(FilePath("false")), | 
 |                                   &output)); | 
 |  | 
 |   std::vector<std::string> argv; | 
 |   argv.push_back("/bin/echo"); | 
 |   argv.push_back("-n"); | 
 |   argv.push_back("foobar42"); | 
 |   EXPECT_TRUE(base::GetAppOutput(base::CommandLine(argv), &output)); | 
 |   EXPECT_STREQ("foobar42", output.c_str()); | 
 | #endif  // defined(OS_ANDROID) | 
 | } | 
 |  | 
 | // Flakes on Android, crbug.com/375840 | 
 | #if defined(OS_ANDROID) | 
 | #define MAYBE_GetAppOutputRestricted DISABLED_GetAppOutputRestricted | 
 | #else | 
 | #define MAYBE_GetAppOutputRestricted GetAppOutputRestricted | 
 | #endif | 
 | TEST_F(ProcessUtilTest, MAYBE_GetAppOutputRestricted) { | 
 |   // Unfortunately, since we can't rely on the path, we need to know where | 
 |   // everything is. So let's use /bin/sh, which is on every POSIX system, and | 
 |   // its built-ins. | 
 |   std::vector<std::string> argv; | 
 |   argv.push_back(std::string(kShellPath));  // argv[0] | 
 |   argv.push_back("-c");  // argv[1] | 
 |  | 
 |   // On success, should set |output|. We use |/bin/sh -c 'exit 0'| instead of | 
 |   // |true| since the location of the latter may be |/bin| or |/usr/bin| (and we | 
 |   // need absolute paths). | 
 |   argv.push_back("exit 0");   // argv[2]; equivalent to "true" | 
 |   std::string output = "abc"; | 
 |   EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, | 
 |                                            100)); | 
 |   EXPECT_STREQ("", output.c_str()); | 
 |  | 
 |   argv[2] = "exit 1";  // equivalent to "false" | 
 |   output = "before"; | 
 |   EXPECT_FALSE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, | 
 |                                             100)); | 
 |   EXPECT_STREQ("", output.c_str()); | 
 |  | 
 |   // Amount of output exactly equal to space allowed. | 
 |   argv[2] = "echo 123456789";  // (the sh built-in doesn't take "-n") | 
 |   output.clear(); | 
 |   EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, | 
 |                                            10)); | 
 |   EXPECT_STREQ("123456789\n", output.c_str()); | 
 |  | 
 |   // Amount of output greater than space allowed. | 
 |   output.clear(); | 
 |   EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, | 
 |                                            5)); | 
 |   EXPECT_STREQ("12345", output.c_str()); | 
 |  | 
 |   // Amount of output less than space allowed. | 
 |   output.clear(); | 
 |   EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, | 
 |                                            15)); | 
 |   EXPECT_STREQ("123456789\n", output.c_str()); | 
 |  | 
 |   // Zero space allowed. | 
 |   output = "abc"; | 
 |   EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, | 
 |                                            0)); | 
 |   EXPECT_STREQ("", output.c_str()); | 
 | } | 
 |  | 
 | #if !defined(OS_MACOSX) && !defined(OS_OPENBSD) | 
 | // TODO(benwells): GetAppOutputRestricted should terminate applications | 
 | // with SIGPIPE when we have enough output. http://crbug.com/88502 | 
 | TEST_F(ProcessUtilTest, GetAppOutputRestrictedSIGPIPE) { | 
 |   std::vector<std::string> argv; | 
 |   std::string output; | 
 |  | 
 |   argv.push_back(std::string(kShellPath));  // argv[0] | 
 |   argv.push_back("-c"); | 
 | #if defined(OS_ANDROID) | 
 |   argv.push_back("while echo 12345678901234567890; do :; done"); | 
 |   EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, | 
 |                                            10)); | 
 |   EXPECT_STREQ("1234567890", output.c_str()); | 
 | #else | 
 |   argv.push_back("yes"); | 
 |   EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, | 
 |                                            10)); | 
 |   EXPECT_STREQ("y\ny\ny\ny\ny\n", output.c_str()); | 
 | #endif | 
 | } | 
 | #endif | 
 |  | 
 | #if defined(ADDRESS_SANITIZER) && defined(OS_MACOSX) && \ | 
 |     defined(ARCH_CPU_64_BITS) | 
 | // Times out under AddressSanitizer on 64-bit OS X, see | 
 | // http://crbug.com/298197. | 
 | #define MAYBE_GetAppOutputRestrictedNoZombies \ | 
 |     DISABLED_GetAppOutputRestrictedNoZombies | 
 | #else | 
 | #define MAYBE_GetAppOutputRestrictedNoZombies GetAppOutputRestrictedNoZombies | 
 | #endif | 
 | TEST_F(ProcessUtilTest, MAYBE_GetAppOutputRestrictedNoZombies) { | 
 |   std::vector<std::string> argv; | 
 |  | 
 |   argv.push_back(std::string(kShellPath));  // argv[0] | 
 |   argv.push_back("-c");  // argv[1] | 
 |   argv.push_back("echo 123456789012345678901234567890");  // argv[2] | 
 |  | 
 |   // Run |GetAppOutputRestricted()| 300 (> default per-user processes on Mac OS | 
 |   // 10.5) times with an output buffer big enough to capture all output. | 
 |   for (int i = 0; i < 300; i++) { | 
 |     std::string output; | 
 |     EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, | 
 |                                              100)); | 
 |     EXPECT_STREQ("123456789012345678901234567890\n", output.c_str()); | 
 |   } | 
 |  | 
 |   // Ditto, but with an output buffer too small to capture all output. | 
 |   for (int i = 0; i < 300; i++) { | 
 |     std::string output; | 
 |     EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, | 
 |                                              10)); | 
 |     EXPECT_STREQ("1234567890", output.c_str()); | 
 |   } | 
 | } | 
 |  | 
 | TEST_F(ProcessUtilTest, GetAppOutputWithExitCode) { | 
 |   // Test getting output from a successful application. | 
 |   std::vector<std::string> argv; | 
 |   std::string output; | 
 |   int exit_code; | 
 |   argv.push_back(std::string(kShellPath));  // argv[0] | 
 |   argv.push_back("-c");  // argv[1] | 
 |   argv.push_back("echo foo");  // argv[2]; | 
 |   EXPECT_TRUE(base::GetAppOutputWithExitCode(base::CommandLine(argv), &output, | 
 |                                              &exit_code)); | 
 |   EXPECT_STREQ("foo\n", output.c_str()); | 
 |   EXPECT_EQ(exit_code, 0); | 
 |  | 
 |   // Test getting output from an application which fails with a specific exit | 
 |   // code. | 
 |   output.clear(); | 
 |   argv[2] = "echo foo; exit 2"; | 
 |   EXPECT_TRUE(base::GetAppOutputWithExitCode(base::CommandLine(argv), &output, | 
 |                                              &exit_code)); | 
 |   EXPECT_STREQ("foo\n", output.c_str()); | 
 |   EXPECT_EQ(exit_code, 2); | 
 | } | 
 |  | 
 | TEST_F(ProcessUtilTest, GetParentProcessId) { | 
 |   base::ProcessId ppid = base::GetParentProcessId(base::GetCurrentProcId()); | 
 |   EXPECT_EQ(ppid, getppid()); | 
 | } | 
 |  | 
 | // TODO(port): port those unit tests. | 
 | bool IsProcessDead(base::ProcessHandle child) { | 
 |   // waitpid() will actually reap the process which is exactly NOT what we | 
 |   // want to test for.  The good thing is that if it can't find the process | 
 |   // we'll get a nice value for errno which we can test for. | 
 |   const pid_t result = HANDLE_EINTR(waitpid(child, NULL, WNOHANG)); | 
 |   return result == -1 && errno == ECHILD; | 
 | } | 
 |  | 
 | TEST_F(ProcessUtilTest, DelayedTermination) { | 
 |   base::Process child_process = SpawnChild("process_util_test_never_die"); | 
 |   ASSERT_TRUE(child_process.IsValid()); | 
 |   base::EnsureProcessTerminated(child_process.Duplicate()); | 
 |   int exit_code; | 
 |   child_process.WaitForExitWithTimeout(base::TimeDelta::FromSeconds(5), | 
 |                                        &exit_code); | 
 |  | 
 |   // Check that process was really killed. | 
 |   EXPECT_TRUE(IsProcessDead(child_process.Handle())); | 
 | } | 
 |  | 
 | MULTIPROCESS_TEST_MAIN(process_util_test_never_die) { | 
 |   while (1) { | 
 |     sleep(500); | 
 |   } | 
 |   return 0; | 
 | } | 
 |  | 
 | TEST_F(ProcessUtilTest, ImmediateTermination) { | 
 |   base::Process child_process = SpawnChild("process_util_test_die_immediately"); | 
 |   ASSERT_TRUE(child_process.IsValid()); | 
 |   // Give it time to die. | 
 |   sleep(2); | 
 |   base::EnsureProcessTerminated(child_process.Duplicate()); | 
 |  | 
 |   // Check that process was really killed. | 
 |   EXPECT_TRUE(IsProcessDead(child_process.Handle())); | 
 | } | 
 |  | 
 | MULTIPROCESS_TEST_MAIN(process_util_test_die_immediately) { | 
 |   return 0; | 
 | } | 
 |  | 
 | #if !defined(OS_ANDROID) | 
 | const char kPipeValue = '\xcc'; | 
 |  | 
 | class ReadFromPipeDelegate : public base::LaunchOptions::PreExecDelegate { | 
 |  public: | 
 |   explicit ReadFromPipeDelegate(int fd) : fd_(fd) {} | 
 |   ~ReadFromPipeDelegate() override {} | 
 |   void RunAsyncSafe() override { | 
 |     char c; | 
 |     RAW_CHECK(HANDLE_EINTR(read(fd_, &c, 1)) == 1); | 
 |     RAW_CHECK(IGNORE_EINTR(close(fd_)) == 0); | 
 |     RAW_CHECK(c == kPipeValue); | 
 |   } | 
 |  | 
 |  private: | 
 |   int fd_; | 
 |   DISALLOW_COPY_AND_ASSIGN(ReadFromPipeDelegate); | 
 | }; | 
 |  | 
 | TEST_F(ProcessUtilTest, PreExecHook) { | 
 |   int pipe_fds[2]; | 
 |   ASSERT_EQ(0, pipe(pipe_fds)); | 
 |  | 
 |   base::ScopedFD read_fd(pipe_fds[0]); | 
 |   base::ScopedFD write_fd(pipe_fds[1]); | 
 |   base::FileHandleMappingVector fds_to_remap; | 
 |   fds_to_remap.push_back(std::make_pair(read_fd.get(), read_fd.get())); | 
 |  | 
 |   ReadFromPipeDelegate read_from_pipe_delegate(read_fd.get()); | 
 |   base::LaunchOptions options; | 
 |   options.fds_to_remap = &fds_to_remap; | 
 |   options.pre_exec_delegate = &read_from_pipe_delegate; | 
 |   base::Process process(SpawnChildWithOptions("SimpleChildProcess", options)); | 
 |   ASSERT_TRUE(process.IsValid()); | 
 |  | 
 |   read_fd.reset(); | 
 |   ASSERT_EQ(1, HANDLE_EINTR(write(write_fd.get(), &kPipeValue, 1))); | 
 |  | 
 |   int exit_code = 42; | 
 |   EXPECT_TRUE(process.WaitForExit(&exit_code)); | 
 |   EXPECT_EQ(0, exit_code); | 
 | } | 
 | #endif  // !defined(OS_ANDROID) | 
 |  | 
 | #endif  // defined(OS_POSIX) | 
 |  | 
 | #if defined(OS_LINUX) | 
 | const int kSuccess = 0; | 
 |  | 
 | MULTIPROCESS_TEST_MAIN(CheckPidProcess) { | 
 |   const pid_t kInitPid = 1; | 
 |   const pid_t pid = syscall(__NR_getpid); | 
 |   CHECK(pid == kInitPid); | 
 |   CHECK(getpid() == pid); | 
 |   return kSuccess; | 
 | } | 
 |  | 
 | TEST_F(ProcessUtilTest, CloneFlags) { | 
 |   if (RunningOnValgrind() || | 
 |       !base::PathExists(FilePath("/proc/self/ns/user")) || | 
 |       !base::PathExists(FilePath("/proc/self/ns/pid"))) { | 
 |     // User or PID namespaces are not supported. | 
 |     return; | 
 |   } | 
 |  | 
 |   base::LaunchOptions options; | 
 |   options.clone_flags = CLONE_NEWUSER | CLONE_NEWPID; | 
 |  | 
 |   base::Process process(SpawnChildWithOptions("CheckPidProcess", options)); | 
 |   ASSERT_TRUE(process.IsValid()); | 
 |  | 
 |   int exit_code = 42; | 
 |   EXPECT_TRUE(process.WaitForExit(&exit_code)); | 
 |   EXPECT_EQ(kSuccess, exit_code); | 
 | } | 
 |  | 
 | TEST(ForkWithFlagsTest, UpdatesPidCache) { | 
 |   // The libc clone function, which allows ForkWithFlags to keep the pid cache | 
 |   // up to date, does not work on Valgrind. | 
 |   if (RunningOnValgrind()) { | 
 |     return; | 
 |   } | 
 |  | 
 |   // Warm up the libc pid cache, if there is one. | 
 |   ASSERT_EQ(syscall(__NR_getpid), getpid()); | 
 |  | 
 |   pid_t ctid = 0; | 
 |   const pid_t pid = | 
 |       base::ForkWithFlags(SIGCHLD | CLONE_CHILD_SETTID, nullptr, &ctid); | 
 |   if (pid == 0) { | 
 |     // In child.  Check both the raw getpid syscall and the libc getpid wrapper | 
 |     // (which may rely on a pid cache). | 
 |     RAW_CHECK(syscall(__NR_getpid) == ctid); | 
 |     RAW_CHECK(getpid() == ctid); | 
 |     _exit(kSuccess); | 
 |   } | 
 |  | 
 |   ASSERT_NE(-1, pid); | 
 |   int status = 42; | 
 |   ASSERT_EQ(pid, HANDLE_EINTR(waitpid(pid, &status, 0))); | 
 |   ASSERT_TRUE(WIFEXITED(status)); | 
 |   EXPECT_EQ(kSuccess, WEXITSTATUS(status)); | 
 | } | 
 |  | 
 | MULTIPROCESS_TEST_MAIN(CheckCwdProcess) { | 
 |   base::FilePath expected; | 
 |   CHECK(base::GetTempDir(&expected)); | 
 |   base::FilePath actual; | 
 |   CHECK(base::GetCurrentDirectory(&actual)); | 
 |   CHECK(actual == expected); | 
 |   return kSuccess; | 
 | } | 
 |  | 
 | TEST_F(ProcessUtilTest, CurrentDirectory) { | 
 |   // TODO(rickyz): Add support for passing arguments to multiprocess children, | 
 |   // then create a special directory for this test. | 
 |   base::FilePath tmp_dir; | 
 |   ASSERT_TRUE(base::GetTempDir(&tmp_dir)); | 
 |  | 
 |   base::LaunchOptions options; | 
 |   options.current_directory = tmp_dir; | 
 |  | 
 |   base::Process process(SpawnChildWithOptions("CheckCwdProcess", options)); | 
 |   ASSERT_TRUE(process.IsValid()); | 
 |  | 
 |   int exit_code = 42; | 
 |   EXPECT_TRUE(process.WaitForExit(&exit_code)); | 
 |   EXPECT_EQ(kSuccess, exit_code); | 
 | } | 
 |  | 
 | TEST_F(ProcessUtilTest, InvalidCurrentDirectory) { | 
 |   base::LaunchOptions options; | 
 |   options.current_directory = base::FilePath("/dev/null"); | 
 |  | 
 |   base::Process process(SpawnChildWithOptions("SimpleChildProcess", options)); | 
 |   ASSERT_TRUE(process.IsValid()); | 
 |  | 
 |   int exit_code = kSuccess; | 
 |   EXPECT_TRUE(process.WaitForExit(&exit_code)); | 
 |   EXPECT_NE(kSuccess, exit_code); | 
 | } | 
 | #endif |