diff options
author | scherkus <scherkus@chromium.org> | 2014-11-24 07:47:29 -0800 |
---|---|---|
committer | Commit bot <commit-bot@chromium.org> | 2014-11-24 15:48:26 +0000 |
commit | a9ffa63f231e1935e64e49a0eeb5c30df5036727 (patch) | |
tree | 4fc7e839384a7ce470db9cb57b5c8c030b658e76 /base/debug | |
parent | a18ee3f2e41777f76b1a6bba9c2dfb184577d969 (diff) | |
download | chromium_src-a9ffa63f231e1935e64e49a0eeb5c30df5036727.zip chromium_src-a9ffa63f231e1935e64e49a0eeb5c30df5036727.tar.gz chromium_src-a9ffa63f231e1935e64e49a0eeb5c30df5036727.tar.bz2 |
More valgrind workarounds for ProcMapsTest.ReadProcMaps.
Turns out the [stack:TID] format was only introduced in version 3.4 of
the kernel. Since a good chunk of our infrasturcture is running on 3.3,
don't bother inspecting the stack and address when running under valgrind.
BUG=431702
Review URL: https://codereview.chromium.org/752803002
Cr-Commit-Position: refs/heads/master@{#305424}
Diffstat (limited to 'base/debug')
-rw-r--r-- | base/debug/proc_maps_linux_unittest.cc | 44 |
1 files changed, 22 insertions, 22 deletions
diff --git a/base/debug/proc_maps_linux_unittest.cc b/base/debug/proc_maps_linux_unittest.cc index 142f891..c9f2267 100644 --- a/base/debug/proc_maps_linux_unittest.cc +++ b/base/debug/proc_maps_linux_unittest.cc @@ -199,13 +199,6 @@ TEST(ProcMapsTest, ReadProcMaps) { bool found_stack = false; bool found_address = false; - // Valgrind uses its own allocated stacks instead of the kernel-provided stack - // without letting the kernel know via prctl(PR_SET_MM_START_STACK). This - // causes the kernel to use [stack:TID] format. See http://crbug.com/431702 - // for details. - std::string stack_with_tid = - StringPrintf("[stack:%d]", PlatformThread::CurrentId()); - for (size_t i = 0; i < regions.size(); ++i) { if (regions[i].path == exe_path.value()) { // It's OK to find the executable mapped multiple times as there'll be @@ -213,23 +206,28 @@ TEST(ProcMapsTest, ReadProcMaps) { found_exe = true; } - bool is_correct_stack = false; - if (regions[i].path == "[stack]") { - is_correct_stack = true; - EXPECT_FALSE(RunningOnValgrind()); + // Valgrind uses its own allocated stacks instead of the kernel-provided + // stack without letting the kernel know via prctl(PR_SET_MM_START_STACK). + // Depending on which kernel you're running it'll impact the output of + // /proc/self/maps. + // + // Prior to version 3.4, the kernel completely ignores other stacks and + // always prints out the vma lying within mm->start_stack as [stack] even + // if the program was currently executing on a different stack. + // + // Starting in 3.4, the kernel will print out the vma containing the current + // stack pointer as [stack:TID] as long as that vma does not lie within + // mm->start_stack. + // + // Because this has gotten too complicated and brittle of a test, completely + // ignore checking for the stack and address when running under Valgrind. + // See http://crbug.com/431702 for more details. + if (!RunningOnValgrind() && regions[i].path == "[stack]") { EXPECT_GE(address, regions[i].start); EXPECT_LT(address, regions[i].end); - } else if (regions[i].path == stack_with_tid) { - is_correct_stack = true; - EXPECT_TRUE(RunningOnValgrind()); - } - - if (is_correct_stack) { - // Note that the stack is executable when it is created by Valgrind. EXPECT_TRUE(regions[i].permissions & MappedMemoryRegion::READ); EXPECT_TRUE(regions[i].permissions & MappedMemoryRegion::WRITE); - EXPECT_EQ(RunningOnValgrind(), - (regions[i].permissions & MappedMemoryRegion::EXECUTE) != 0); + EXPECT_FALSE(regions[i].permissions & MappedMemoryRegion::EXECUTE); EXPECT_TRUE(regions[i].permissions & MappedMemoryRegion::PRIVATE); EXPECT_FALSE(found_stack) << "Found duplicate stacks"; found_stack = true; @@ -242,8 +240,10 @@ TEST(ProcMapsTest, ReadProcMaps) { } EXPECT_TRUE(found_exe); - EXPECT_TRUE(found_stack); - EXPECT_TRUE(found_address); + if (!RunningOnValgrind()) { + EXPECT_TRUE(found_stack); + EXPECT_TRUE(found_address); + } } TEST(ProcMapsTest, ReadProcMapsNonEmptyString) { |