// Copyright (c) 2012 The Chromium Authors. All rights reserved. // Use of this source code is governed by a BSD-style license that can be // found in the LICENSE file. #define _CRT_SECURE_NO_WARNINGS #include #include "base/command_line.h" #include "base/debug/alias.h" #include "base/debug/stack_trace.h" #include "base/files/file_path.h" #include "base/files/file_util.h" #include "base/files/scoped_file.h" #include "base/logging.h" #include "base/memory/scoped_ptr.h" #include "base/path_service.h" #include "base/posix/eintr_wrapper.h" #include "base/process/kill.h" #include "base/process/launch.h" #include "base/process/memory.h" #include "base/process/process.h" #include "base/process/process_metrics.h" #include "base/strings/string_number_conversions.h" #include "base/strings/utf_string_conversions.h" #include "base/synchronization/waitable_event.h" #include "base/test/multiprocess_test.h" #include "base/test/test_timeouts.h" #include "base/third_party/dynamic_annotations/dynamic_annotations.h" #include "base/threading/platform_thread.h" #include "base/threading/thread.h" #include "build/build_config.h" #include "testing/gtest/include/gtest/gtest.h" #include "testing/multiprocess_func_list.h" #if defined(OS_LINUX) #include #include #include #endif #if defined(OS_POSIX) #include #include #include #include #include #include #include #include #include #include #endif #if defined(OS_WIN) #include #include "base/win/windows_version.h" #endif #if defined(OS_MACOSX) #include #include #include "base/mac/mac_util.h" #endif #if defined(OS_ANDROID) #include "third_party/lss/linux_syscall_support.h" #endif using base::FilePath; namespace { const char kSignalFileSlow[] = "SlowChildProcess.die"; const char kSignalFileKill[] = "KilledChildProcess.die"; #if defined(OS_POSIX) const char kSignalFileTerm[] = "TerminatedChildProcess.die"; #if defined(OS_ANDROID) const char kShellPath[] = "/system/bin/sh"; const char kPosixShell[] = "sh"; #else const char kShellPath[] = "/bin/sh"; const char kPosixShell[] = "sh"; #endif #endif // defined(OS_POSIX) #if defined(OS_WIN) const int kExpectedStillRunningExitCode = 0x102; const int kExpectedKilledExitCode = 1; #else const int kExpectedStillRunningExitCode = 0; #endif // Sleeps until file filename is created. void WaitToDie(const char* filename) { FILE* fp; do { base::PlatformThread::Sleep(base::TimeDelta::FromMilliseconds(10)); fp = fopen(filename, "r"); } while (!fp); fclose(fp); } // Signals children they should die now. void SignalChildren(const char* filename) { FILE* fp = fopen(filename, "w"); fclose(fp); } // Using a pipe to the child to wait for an event was considered, but // there were cases in the past where pipes caused problems (other // libraries closing the fds, child deadlocking). This is a simple // case, so it's not worth the risk. Using wait loops is discouraged // in most instances. base::TerminationStatus WaitForChildTermination(base::ProcessHandle handle, int* exit_code) { // Now we wait until the result is something other than STILL_RUNNING. base::TerminationStatus status = base::TERMINATION_STATUS_STILL_RUNNING; const base::TimeDelta kInterval = base::TimeDelta::FromMilliseconds(20); base::TimeDelta waited; do { status = base::GetTerminationStatus(handle, exit_code); base::PlatformThread::Sleep(kInterval); waited += kInterval; } while (status == base::TERMINATION_STATUS_STILL_RUNNING && waited < TestTimeouts::action_max_timeout()); return status; } } // namespace class ProcessUtilTest : public base::MultiProcessTest { public: #if defined(OS_POSIX) // Spawn a child process that counts how many file descriptors are open. int CountOpenFDsInChild(); #endif // Converts the filename to a platform specific filepath. // On Android files can not be created in arbitrary directories. static std::string GetSignalFilePath(const char* filename); }; std::string ProcessUtilTest::GetSignalFilePath(const char* filename) { #if !defined(OS_ANDROID) return filename; #else FilePath tmp_dir; PathService::Get(base::DIR_CACHE, &tmp_dir); tmp_dir = tmp_dir.Append(filename); return tmp_dir.value(); #endif } MULTIPROCESS_TEST_MAIN(SimpleChildProcess) { return 0; } // TODO(viettrungluu): This should be in a "MultiProcessTestTest". TEST_F(ProcessUtilTest, SpawnChild) { base::Process process = SpawnChild("SimpleChildProcess"); ASSERT_TRUE(process.IsValid()); int exit_code; EXPECT_TRUE(process.WaitForExitWithTimeout( TestTimeouts::action_max_timeout(), &exit_code)); } MULTIPROCESS_TEST_MAIN(SlowChildProcess) { WaitToDie(ProcessUtilTest::GetSignalFilePath(kSignalFileSlow).c_str()); return 0; } TEST_F(ProcessUtilTest, KillSlowChild) { const std::string signal_file = ProcessUtilTest::GetSignalFilePath(kSignalFileSlow); remove(signal_file.c_str()); base::Process process = SpawnChild("SlowChildProcess"); ASSERT_TRUE(process.IsValid()); SignalChildren(signal_file.c_str()); int exit_code; EXPECT_TRUE(process.WaitForExitWithTimeout( TestTimeouts::action_max_timeout(), &exit_code)); remove(signal_file.c_str()); } // Times out on Linux and Win, flakes on other platforms, http://crbug.com/95058 TEST_F(ProcessUtilTest, DISABLED_GetTerminationStatusExit) { const std::string signal_file = ProcessUtilTest::GetSignalFilePath(kSignalFileSlow); remove(signal_file.c_str()); base::Process process = SpawnChild("SlowChildProcess"); ASSERT_TRUE(process.IsValid()); int exit_code = 42; EXPECT_EQ(base::TERMINATION_STATUS_STILL_RUNNING, base::GetTerminationStatus(process.Handle(), &exit_code)); EXPECT_EQ(kExpectedStillRunningExitCode, exit_code); SignalChildren(signal_file.c_str()); exit_code = 42; base::TerminationStatus status = WaitForChildTermination(process.Handle(), &exit_code); EXPECT_EQ(base::TERMINATION_STATUS_NORMAL_TERMINATION, status); EXPECT_EQ(0, exit_code); remove(signal_file.c_str()); } #if defined(OS_WIN) // TODO(cpu): figure out how to test this in other platforms. TEST_F(ProcessUtilTest, GetProcId) { base::ProcessId id1 = base::GetProcId(GetCurrentProcess()); EXPECT_NE(0ul, id1); base::Process process = SpawnChild("SimpleChildProcess"); ASSERT_TRUE(process.IsValid()); base::ProcessId id2 = process.Pid(); EXPECT_NE(0ul, id2); EXPECT_NE(id1, id2); } #endif #if !defined(OS_MACOSX) // This test is disabled on Mac, since it's flaky due to ReportCrash // taking a variable amount of time to parse and load the debug and // symbol data for this unit test's executable before firing the // signal handler. // // TODO(gspencer): turn this test process into a very small program // with no symbols (instead of using the multiprocess testing // framework) to reduce the ReportCrash overhead. const char kSignalFileCrash[] = "CrashingChildProcess.die"; MULTIPROCESS_TEST_MAIN(CrashingChildProcess) { WaitToDie(ProcessUtilTest::GetSignalFilePath(kSignalFileCrash).c_str()); #if defined(OS_ANDROID) // Android L+ expose signal and sigaction symbols that override the system // ones. There is a bug in these functions where a request to set the handler // to SIG_DFL is ignored. In that case, an infinite loop is entered as the // signal is repeatedly sent to the crash dump signal handler. // To work around this, directly call the system's sigaction. struct kernel_sigaction sa; memset(&sa, 0, sizeof(sa)); sys_sigemptyset(&sa.sa_mask); sa.sa_handler_ = SIG_DFL; sa.sa_flags = SA_RESTART; sys_rt_sigaction(SIGSEGV, &sa, NULL, sizeof(kernel_sigset_t)); #elif defined(OS_POSIX) // Have to disable to signal handler for segv so we can get a crash // instead of an abnormal termination through the crash dump handler. ::signal(SIGSEGV, SIG_DFL); #endif // Make this process have a segmentation fault. volatile int* oops = NULL; *oops = 0xDEAD; return 1; } // This test intentionally crashes, so we don't need to run it under // AddressSanitizer. #if defined(ADDRESS_SANITIZER) || defined(SYZYASAN) #define MAYBE_GetTerminationStatusCrash DISABLED_GetTerminationStatusCrash #else #define MAYBE_GetTerminationStatusCrash GetTerminationStatusCrash #endif TEST_F(ProcessUtilTest, MAYBE_GetTerminationStatusCrash) { const std::string signal_file = ProcessUtilTest::GetSignalFilePath(kSignalFileCrash); remove(signal_file.c_str()); base::Process process = SpawnChild("CrashingChildProcess"); ASSERT_TRUE(process.IsValid()); int exit_code = 42; EXPECT_EQ(base::TERMINATION_STATUS_STILL_RUNNING, base::GetTerminationStatus(process.Handle(), &exit_code)); EXPECT_EQ(kExpectedStillRunningExitCode, exit_code); SignalChildren(signal_file.c_str()); exit_code = 42; base::TerminationStatus status = WaitForChildTermination(process.Handle(), &exit_code); EXPECT_EQ(base::TERMINATION_STATUS_PROCESS_CRASHED, status); #if defined(OS_WIN) EXPECT_EQ(0xc0000005, exit_code); #elif defined(OS_POSIX) int signaled = WIFSIGNALED(exit_code); EXPECT_NE(0, signaled); int signal = WTERMSIG(exit_code); EXPECT_EQ(SIGSEGV, signal); #endif // Reset signal handlers back to "normal". base::debug::EnableInProcessStackDumping(); remove(signal_file.c_str()); } #endif // !defined(OS_MACOSX) MULTIPROCESS_TEST_MAIN(KilledChildProcess) { WaitToDie(ProcessUtilTest::GetSignalFilePath(kSignalFileKill).c_str()); #if defined(OS_WIN) // Kill ourselves. HANDLE handle = ::OpenProcess(PROCESS_ALL_ACCESS, 0, ::GetCurrentProcessId()); ::TerminateProcess(handle, kExpectedKilledExitCode); #elif defined(OS_POSIX) // Send a SIGKILL to this process, just like the OOM killer would. ::kill(getpid(), SIGKILL); #endif return 1; } #if defined(OS_POSIX) MULTIPROCESS_TEST_MAIN(TerminatedChildProcess) { WaitToDie(ProcessUtilTest::GetSignalFilePath(kSignalFileTerm).c_str()); // Send a SIGTERM to this process. ::kill(getpid(), SIGTERM); return 1; } #endif TEST_F(ProcessUtilTest, GetTerminationStatusSigKill) { const std::string signal_file = ProcessUtilTest::GetSignalFilePath(kSignalFileKill); remove(signal_file.c_str()); base::Process process = SpawnChild("KilledChildProcess"); ASSERT_TRUE(process.IsValid()); int exit_code = 42; EXPECT_EQ(base::TERMINATION_STATUS_STILL_RUNNING, base::GetTerminationStatus(process.Handle(), &exit_code)); EXPECT_EQ(kExpectedStillRunningExitCode, exit_code); SignalChildren(signal_file.c_str()); exit_code = 42; base::TerminationStatus status = WaitForChildTermination(process.Handle(), &exit_code); #if defined(OS_CHROMEOS) EXPECT_EQ(base::TERMINATION_STATUS_PROCESS_WAS_KILLED_BY_OOM, status); #else EXPECT_EQ(base::TERMINATION_STATUS_PROCESS_WAS_KILLED, status); #endif #if defined(OS_WIN) EXPECT_EQ(kExpectedKilledExitCode, exit_code); #elif defined(OS_POSIX) int signaled = WIFSIGNALED(exit_code); EXPECT_NE(0, signaled); int signal = WTERMSIG(exit_code); EXPECT_EQ(SIGKILL, signal); #endif remove(signal_file.c_str()); } #if defined(OS_POSIX) TEST_F(ProcessUtilTest, GetTerminationStatusSigTerm) { const std::string signal_file = ProcessUtilTest::GetSignalFilePath(kSignalFileTerm); remove(signal_file.c_str()); base::Process process = SpawnChild("TerminatedChildProcess"); ASSERT_TRUE(process.IsValid()); int exit_code = 42; EXPECT_EQ(base::TERMINATION_STATUS_STILL_RUNNING, base::GetTerminationStatus(process.Handle(), &exit_code)); EXPECT_EQ(kExpectedStillRunningExitCode, exit_code); SignalChildren(signal_file.c_str()); exit_code = 42; base::TerminationStatus status = WaitForChildTermination(process.Handle(), &exit_code); EXPECT_EQ(base::TERMINATION_STATUS_PROCESS_WAS_KILLED, status); int signaled = WIFSIGNALED(exit_code); EXPECT_NE(0, signaled); int signal = WTERMSIG(exit_code); EXPECT_EQ(SIGTERM, signal); remove(signal_file.c_str()); } #endif #if defined(OS_WIN) // TODO(estade): if possible, port this test. TEST_F(ProcessUtilTest, GetAppOutput) { // Let's create a decently long message. std::string message; for (int i = 0; i < 1025; i++) { // 1025 so it does not end on a kilo-byte // boundary. message += "Hello!"; } // cmd.exe's echo always adds a \r\n to its output. std::string expected(message); expected += "\r\n"; FilePath cmd(L"cmd.exe"); base::CommandLine cmd_line(cmd); cmd_line.AppendArg("/c"); cmd_line.AppendArg("echo " + message + ""); std::string output; ASSERT_TRUE(base::GetAppOutput(cmd_line, &output)); EXPECT_EQ(expected, output); // Let's make sure stderr is ignored. base::CommandLine other_cmd_line(cmd); other_cmd_line.AppendArg("/c"); // http://msdn.microsoft.com/library/cc772622.aspx cmd_line.AppendArg("echo " + message + " >&2"); output.clear(); ASSERT_TRUE(base::GetAppOutput(other_cmd_line, &output)); EXPECT_EQ("", output); } // TODO(estade): if possible, port this test. TEST_F(ProcessUtilTest, LaunchAsUser) { base::UserTokenHandle token; ASSERT_TRUE(OpenProcessToken(GetCurrentProcess(), TOKEN_ALL_ACCESS, &token)); base::LaunchOptions options; options.as_user = token; EXPECT_TRUE(base::LaunchProcess(MakeCmdLine("SimpleChildProcess"), options).IsValid()); } static const char kEventToTriggerHandleSwitch[] = "event-to-trigger-handle"; MULTIPROCESS_TEST_MAIN(TriggerEventChildProcess) { std::string handle_value_string = base::CommandLine::ForCurrentProcess()->GetSwitchValueASCII( kEventToTriggerHandleSwitch); CHECK(!handle_value_string.empty()); uint64 handle_value_uint64; CHECK(base::StringToUint64(handle_value_string, &handle_value_uint64)); // Give ownership of the handle to |event|. base::WaitableEvent event(base::win::ScopedHandle( reinterpret_cast(handle_value_uint64))); event.Signal(); return 0; } TEST_F(ProcessUtilTest, InheritSpecifiedHandles) { // Manually create the event, so that it can be inheritable. SECURITY_ATTRIBUTES security_attributes = {}; security_attributes.nLength = static_cast(sizeof(security_attributes)); security_attributes.lpSecurityDescriptor = NULL; security_attributes.bInheritHandle = true; // Takes ownership of the event handle. base::WaitableEvent event(base::win::ScopedHandle( CreateEvent(&security_attributes, true, false, NULL))); base::HandlesToInheritVector handles_to_inherit; handles_to_inherit.push_back(event.handle()); base::LaunchOptions options; options.handles_to_inherit = &handles_to_inherit; base::CommandLine cmd_line = MakeCmdLine("TriggerEventChildProcess"); cmd_line.AppendSwitchASCII(kEventToTriggerHandleSwitch, base::Uint64ToString(reinterpret_cast(event.handle()))); // This functionality actually requires Vista or later. Make sure that it // fails properly on XP. if (base::win::GetVersion() < base::win::VERSION_VISTA) { EXPECT_FALSE(base::LaunchProcess(cmd_line, options).IsValid()); return; } // Launch the process and wait for it to trigger the event. ASSERT_TRUE(base::LaunchProcess(cmd_line, options).IsValid()); EXPECT_TRUE(event.TimedWait(TestTimeouts::action_max_timeout())); } #endif // defined(OS_WIN) #if defined(OS_POSIX) namespace { // Returns the maximum number of files that a process can have open. // Returns 0 on error. int GetMaxFilesOpenInProcess() { struct rlimit rlim; if (getrlimit(RLIMIT_NOFILE, &rlim) != 0) { return 0; } // rlim_t is a uint64 - clip to maxint. We do this since FD #s are ints // which are all 32 bits on the supported platforms. rlim_t max_int = static_cast(std::numeric_limits::max()); if (rlim.rlim_cur > max_int) { return max_int; } return rlim.rlim_cur; } const int kChildPipe = 20; // FD # for write end of pipe in child process. #if defined(OS_MACOSX) // #if !defined(_GUARDID_T) #define _GUARDID_T typedef __uint64_t guardid_t; #endif // _GUARDID_T // From .../MacOSX10.9.sdk/usr/include/sys/syscall.h #if !defined(SYS_change_fdguard_np) #define SYS_change_fdguard_np 444 #endif // #if !defined(GUARD_DUP) #define GUARD_DUP (1u << 1) #endif // // // Atomically replaces |guard|/|guardflags| with |nguard|/|nguardflags| on |fd|. int change_fdguard_np(int fd, const guardid_t *guard, u_int guardflags, const guardid_t *nguard, u_int nguardflags, int *fdflagsp) { return syscall(SYS_change_fdguard_np, fd, guard, guardflags, nguard, nguardflags, fdflagsp); } // Attempt to set a file-descriptor guard on |fd|. In case of success, remove // it and return |true| to indicate that it can be guarded. Returning |false| // means either that |fd| is guarded by some other code, or more likely EBADF. // // Starting with 10.9, libdispatch began setting GUARD_DUP on a file descriptor. // Unfortunately, it is spun up as part of +[NSApplication initialize], which is // not really something that Chromium can avoid using on OSX. See // . This function allows querying whether the file // descriptor is guarded before attempting to close it. bool CanGuardFd(int fd) { // The syscall is first provided in 10.9/Mavericks. if (!base::mac::IsOSMavericksOrLater()) return true; // Saves the original flags to reset later. int original_fdflags = 0; // This can be any value at all, it just has to match up between the two // calls. const guardid_t kGuard = 15; // Attempt to change the guard. This can fail with EBADF if the file // descriptor is bad, or EINVAL if the fd already has a guard set. int ret = change_fdguard_np(fd, NULL, 0, &kGuard, GUARD_DUP, &original_fdflags); if (ret == -1) return false; // Remove the guard. It should not be possible to fail in removing the guard // just added. ret = change_fdguard_np(fd, &kGuard, GUARD_DUP, NULL, 0, &original_fdflags); DPCHECK(ret == 0); return true; } #endif // OS_MACOSX } // namespace MULTIPROCESS_TEST_MAIN(ProcessUtilsLeakFDChildProcess) { // This child process counts the number of open FDs, it then writes that // number out to a pipe connected to the parent. int num_open_files = 0; int write_pipe = kChildPipe; int max_files = GetMaxFilesOpenInProcess(); for (int i = STDERR_FILENO + 1; i < max_files; i++) { #if defined(OS_MACOSX) // Ignore guarded or invalid file descriptors. if (!CanGuardFd(i)) continue; #endif if (i != kChildPipe) { int fd; if ((fd = HANDLE_EINTR(dup(i))) != -1) { close(fd); num_open_files += 1; } } } int written = HANDLE_EINTR(write(write_pipe, &num_open_files, sizeof(num_open_files))); DCHECK_EQ(static_cast(written), sizeof(num_open_files)); int ret = IGNORE_EINTR(close(write_pipe)); DPCHECK(ret == 0); return 0; } int ProcessUtilTest::CountOpenFDsInChild() { int fds[2]; if (pipe(fds) < 0) NOTREACHED(); base::FileHandleMappingVector fd_mapping_vec; fd_mapping_vec.push_back(std::pair(fds[1], kChildPipe)); base::LaunchOptions options; options.fds_to_remap = &fd_mapping_vec; base::Process process = SpawnChildWithOptions("ProcessUtilsLeakFDChildProcess", options); CHECK(process.IsValid()); int ret = IGNORE_EINTR(close(fds[1])); DPCHECK(ret == 0); // Read number of open files in client process from pipe; int num_open_files = -1; ssize_t bytes_read = HANDLE_EINTR(read(fds[0], &num_open_files, sizeof(num_open_files))); CHECK_EQ(bytes_read, static_cast(sizeof(num_open_files))); #if defined(THREAD_SANITIZER) // Compiler-based ThreadSanitizer makes this test slow. base::TimeDelta timeout = base::TimeDelta::FromSeconds(3); #else base::TimeDelta timeout = base::TimeDelta::FromSeconds(1); #endif int exit_code; CHECK(process.WaitForExitWithTimeout(timeout, &exit_code)); ret = IGNORE_EINTR(close(fds[0])); DPCHECK(ret == 0); return num_open_files; } #if defined(ADDRESS_SANITIZER) || defined(THREAD_SANITIZER) // ProcessUtilTest.FDRemapping is flaky when ran under xvfb-run on Precise. // The problem is 100% reproducible with both ASan and TSan. // See http://crbug.com/136720. #define MAYBE_FDRemapping DISABLED_FDRemapping #else #define MAYBE_FDRemapping FDRemapping #endif TEST_F(ProcessUtilTest, MAYBE_FDRemapping) { int fds_before = CountOpenFDsInChild(); // open some dummy fds to make sure they don't propagate over to the // child process. int dev_null = open("/dev/null", O_RDONLY); int sockets[2]; socketpair(AF_UNIX, SOCK_STREAM, 0, sockets); int fds_after = CountOpenFDsInChild(); ASSERT_EQ(fds_after, fds_before); int ret; ret = IGNORE_EINTR(close(sockets[0])); DPCHECK(ret == 0); ret = IGNORE_EINTR(close(sockets[1])); DPCHECK(ret == 0); ret = IGNORE_EINTR(close(dev_null)); DPCHECK(ret == 0); } namespace { std::string TestLaunchProcess(const std::vector& args, const base::EnvironmentMap& env_changes, const bool clear_environ, const int clone_flags) { base::FileHandleMappingVector fds_to_remap; int fds[2]; PCHECK(pipe(fds) == 0); fds_to_remap.push_back(std::make_pair(fds[1], 1)); base::LaunchOptions options; options.wait = true; options.environ = env_changes; options.clear_environ = clear_environ; options.fds_to_remap = &fds_to_remap; #if defined(OS_LINUX) options.clone_flags = clone_flags; #else CHECK_EQ(0, clone_flags); #endif // OS_LINUX EXPECT_TRUE(base::LaunchProcess(args, options).IsValid()); PCHECK(IGNORE_EINTR(close(fds[1])) == 0); char buf[512]; const ssize_t n = HANDLE_EINTR(read(fds[0], buf, sizeof(buf))); PCHECK(IGNORE_EINTR(close(fds[0])) == 0); return std::string(buf, n); } const char kLargeString[] = "0123456789012345678901234567890123456789012345678901234567890123456789" "0123456789012345678901234567890123456789012345678901234567890123456789" "0123456789012345678901234567890123456789012345678901234567890123456789" "0123456789012345678901234567890123456789012345678901234567890123456789" "0123456789012345678901234567890123456789012345678901234567890123456789" "0123456789012345678901234567890123456789012345678901234567890123456789" "0123456789012345678901234567890123456789012345678901234567890123456789"; } // namespace TEST_F(ProcessUtilTest, LaunchProcess) { base::EnvironmentMap env_changes; std::vector echo_base_test; echo_base_test.push_back(kPosixShell); echo_base_test.push_back("-c"); echo_base_test.push_back("echo $BASE_TEST"); std::vector print_env; print_env.push_back("/usr/bin/env"); const int no_clone_flags = 0; const bool no_clear_environ = false; const char kBaseTest[] = "BASE_TEST"; env_changes[kBaseTest] = "bar"; EXPECT_EQ("bar\n", TestLaunchProcess( echo_base_test, env_changes, no_clear_environ, no_clone_flags)); env_changes.clear(); EXPECT_EQ(0, setenv(kBaseTest, "testing", 1 /* override */)); EXPECT_EQ("testing\n", TestLaunchProcess( echo_base_test, env_changes, no_clear_environ, no_clone_flags)); env_changes[kBaseTest] = std::string(); EXPECT_EQ("\n", TestLaunchProcess( echo_base_test, env_changes, no_clear_environ, no_clone_flags)); env_changes[kBaseTest] = "foo"; EXPECT_EQ("foo\n", TestLaunchProcess( echo_base_test, env_changes, no_clear_environ, no_clone_flags)); env_changes.clear(); EXPECT_EQ(0, setenv(kBaseTest, kLargeString, 1 /* override */)); EXPECT_EQ(std::string(kLargeString) + "\n", TestLaunchProcess( echo_base_test, env_changes, no_clear_environ, no_clone_flags)); env_changes[kBaseTest] = "wibble"; EXPECT_EQ("wibble\n", TestLaunchProcess( echo_base_test, env_changes, no_clear_environ, no_clone_flags)); #if defined(OS_LINUX) // Test a non-trival value for clone_flags. // Don't test on Valgrind as it has limited support for clone(). if (!RunningOnValgrind()) { EXPECT_EQ("wibble\n", TestLaunchProcess(echo_base_test, env_changes, no_clear_environ, CLONE_FS)); } EXPECT_EQ( "BASE_TEST=wibble\n", TestLaunchProcess( print_env, env_changes, true /* clear_environ */, no_clone_flags)); env_changes.clear(); EXPECT_EQ( "", TestLaunchProcess( print_env, env_changes, true /* clear_environ */, no_clone_flags)); #endif } TEST_F(ProcessUtilTest, GetAppOutput) { std::string output; #if defined(OS_ANDROID) std::vector argv; argv.push_back("sh"); // Instead of /bin/sh, force path search to find it. argv.push_back("-c"); argv.push_back("exit 0"); EXPECT_TRUE(base::GetAppOutput(base::CommandLine(argv), &output)); EXPECT_STREQ("", output.c_str()); argv[2] = "exit 1"; EXPECT_FALSE(base::GetAppOutput(base::CommandLine(argv), &output)); EXPECT_STREQ("", output.c_str()); argv[2] = "echo foobar42"; EXPECT_TRUE(base::GetAppOutput(base::CommandLine(argv), &output)); EXPECT_STREQ("foobar42\n", output.c_str()); #else EXPECT_TRUE(base::GetAppOutput(base::CommandLine(FilePath("true")), &output)); EXPECT_STREQ("", output.c_str()); EXPECT_FALSE(base::GetAppOutput(base::CommandLine(FilePath("false")), &output)); std::vector argv; argv.push_back("/bin/echo"); argv.push_back("-n"); argv.push_back("foobar42"); EXPECT_TRUE(base::GetAppOutput(base::CommandLine(argv), &output)); EXPECT_STREQ("foobar42", output.c_str()); #endif // defined(OS_ANDROID) } // Flakes on Android, crbug.com/375840 #if defined(OS_ANDROID) #define MAYBE_GetAppOutputRestricted DISABLED_GetAppOutputRestricted #else #define MAYBE_GetAppOutputRestricted GetAppOutputRestricted #endif TEST_F(ProcessUtilTest, MAYBE_GetAppOutputRestricted) { // Unfortunately, since we can't rely on the path, we need to know where // everything is. So let's use /bin/sh, which is on every POSIX system, and // its built-ins. std::vector argv; argv.push_back(std::string(kShellPath)); // argv[0] argv.push_back("-c"); // argv[1] // On success, should set |output|. We use |/bin/sh -c 'exit 0'| instead of // |true| since the location of the latter may be |/bin| or |/usr/bin| (and we // need absolute paths). argv.push_back("exit 0"); // argv[2]; equivalent to "true" std::string output = "abc"; EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, 100)); EXPECT_STREQ("", output.c_str()); argv[2] = "exit 1"; // equivalent to "false" output = "before"; EXPECT_FALSE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, 100)); EXPECT_STREQ("", output.c_str()); // Amount of output exactly equal to space allowed. argv[2] = "echo 123456789"; // (the sh built-in doesn't take "-n") output.clear(); EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, 10)); EXPECT_STREQ("123456789\n", output.c_str()); // Amount of output greater than space allowed. output.clear(); EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, 5)); EXPECT_STREQ("12345", output.c_str()); // Amount of output less than space allowed. output.clear(); EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, 15)); EXPECT_STREQ("123456789\n", output.c_str()); // Zero space allowed. output = "abc"; EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, 0)); EXPECT_STREQ("", output.c_str()); } #if !defined(OS_MACOSX) && !defined(OS_OPENBSD) // TODO(benwells): GetAppOutputRestricted should terminate applications // with SIGPIPE when we have enough output. http://crbug.com/88502 TEST_F(ProcessUtilTest, GetAppOutputRestrictedSIGPIPE) { std::vector argv; std::string output; argv.push_back(std::string(kShellPath)); // argv[0] argv.push_back("-c"); #if defined(OS_ANDROID) argv.push_back("while echo 12345678901234567890; do :; done"); EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, 10)); EXPECT_STREQ("1234567890", output.c_str()); #else argv.push_back("yes"); EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, 10)); EXPECT_STREQ("y\ny\ny\ny\ny\n", output.c_str()); #endif } #endif #if defined(ADDRESS_SANITIZER) && defined(OS_MACOSX) && \ defined(ARCH_CPU_64_BITS) // Times out under AddressSanitizer on 64-bit OS X, see // http://crbug.com/298197. #define MAYBE_GetAppOutputRestrictedNoZombies \ DISABLED_GetAppOutputRestrictedNoZombies #else #define MAYBE_GetAppOutputRestrictedNoZombies GetAppOutputRestrictedNoZombies #endif TEST_F(ProcessUtilTest, MAYBE_GetAppOutputRestrictedNoZombies) { std::vector argv; argv.push_back(std::string(kShellPath)); // argv[0] argv.push_back("-c"); // argv[1] argv.push_back("echo 123456789012345678901234567890"); // argv[2] // Run |GetAppOutputRestricted()| 300 (> default per-user processes on Mac OS // 10.5) times with an output buffer big enough to capture all output. for (int i = 0; i < 300; i++) { std::string output; EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, 100)); EXPECT_STREQ("123456789012345678901234567890\n", output.c_str()); } // Ditto, but with an output buffer too small to capture all output. for (int i = 0; i < 300; i++) { std::string output; EXPECT_TRUE(base::GetAppOutputRestricted(base::CommandLine(argv), &output, 10)); EXPECT_STREQ("1234567890", output.c_str()); } } TEST_F(ProcessUtilTest, GetAppOutputWithExitCode) { // Test getting output from a successful application. std::vector argv; std::string output; int exit_code; argv.push_back(std::string(kShellPath)); // argv[0] argv.push_back("-c"); // argv[1] argv.push_back("echo foo"); // argv[2]; EXPECT_TRUE(base::GetAppOutputWithExitCode(base::CommandLine(argv), &output, &exit_code)); EXPECT_STREQ("foo\n", output.c_str()); EXPECT_EQ(exit_code, 0); // Test getting output from an application which fails with a specific exit // code. output.clear(); argv[2] = "echo foo; exit 2"; EXPECT_TRUE(base::GetAppOutputWithExitCode(base::CommandLine(argv), &output, &exit_code)); EXPECT_STREQ("foo\n", output.c_str()); EXPECT_EQ(exit_code, 2); } TEST_F(ProcessUtilTest, GetParentProcessId) { base::ProcessId ppid = base::GetParentProcessId(base::GetCurrentProcId()); EXPECT_EQ(ppid, getppid()); } // TODO(port): port those unit tests. bool IsProcessDead(base::ProcessHandle child) { // waitpid() will actually reap the process which is exactly NOT what we // want to test for. The good thing is that if it can't find the process // we'll get a nice value for errno which we can test for. const pid_t result = HANDLE_EINTR(waitpid(child, NULL, WNOHANG)); return result == -1 && errno == ECHILD; } TEST_F(ProcessUtilTest, DelayedTermination) { base::Process child_process = SpawnChild("process_util_test_never_die"); ASSERT_TRUE(child_process.IsValid()); base::EnsureProcessTerminated(child_process.Duplicate()); int exit_code; child_process.WaitForExitWithTimeout(base::TimeDelta::FromSeconds(5), &exit_code); // Check that process was really killed. EXPECT_TRUE(IsProcessDead(child_process.Handle())); } MULTIPROCESS_TEST_MAIN(process_util_test_never_die) { while (1) { sleep(500); } return 0; } TEST_F(ProcessUtilTest, ImmediateTermination) { base::Process child_process = SpawnChild("process_util_test_die_immediately"); ASSERT_TRUE(child_process.IsValid()); // Give it time to die. sleep(2); base::EnsureProcessTerminated(child_process.Duplicate()); // Check that process was really killed. EXPECT_TRUE(IsProcessDead(child_process.Handle())); } MULTIPROCESS_TEST_MAIN(process_util_test_die_immediately) { return 0; } #if !defined(OS_ANDROID) const char kPipeValue = '\xcc'; class ReadFromPipeDelegate : public base::LaunchOptions::PreExecDelegate { public: explicit ReadFromPipeDelegate(int fd) : fd_(fd) {} ~ReadFromPipeDelegate() override {} void RunAsyncSafe() override { char c; RAW_CHECK(HANDLE_EINTR(read(fd_, &c, 1)) == 1); RAW_CHECK(IGNORE_EINTR(close(fd_)) == 0); RAW_CHECK(c == kPipeValue); } private: int fd_; DISALLOW_COPY_AND_ASSIGN(ReadFromPipeDelegate); }; TEST_F(ProcessUtilTest, PreExecHook) { int pipe_fds[2]; ASSERT_EQ(0, pipe(pipe_fds)); base::ScopedFD read_fd(pipe_fds[0]); base::ScopedFD write_fd(pipe_fds[1]); base::FileHandleMappingVector fds_to_remap; fds_to_remap.push_back(std::make_pair(read_fd.get(), read_fd.get())); ReadFromPipeDelegate read_from_pipe_delegate(read_fd.get()); base::LaunchOptions options; options.fds_to_remap = &fds_to_remap; options.pre_exec_delegate = &read_from_pipe_delegate; base::Process process(SpawnChildWithOptions("SimpleChildProcess", options)); ASSERT_TRUE(process.IsValid()); read_fd.reset(); ASSERT_EQ(1, HANDLE_EINTR(write(write_fd.get(), &kPipeValue, 1))); int exit_code = 42; EXPECT_TRUE(process.WaitForExit(&exit_code)); EXPECT_EQ(0, exit_code); } #endif // !defined(OS_ANDROID) #endif // defined(OS_POSIX) #if defined(OS_LINUX) const int kSuccess = 0; MULTIPROCESS_TEST_MAIN(CheckPidProcess) { const pid_t kInitPid = 1; const pid_t pid = syscall(__NR_getpid); CHECK(pid == kInitPid); CHECK(getpid() == pid); return kSuccess; } #if defined(CLONE_NEWUSER) && defined(CLONE_NEWPID) TEST_F(ProcessUtilTest, CloneFlags) { if (RunningOnValgrind() || !base::PathExists(FilePath("/proc/self/ns/user")) || !base::PathExists(FilePath("/proc/self/ns/pid"))) { // User or PID namespaces are not supported. return; } base::LaunchOptions options; options.clone_flags = CLONE_NEWUSER | CLONE_NEWPID; base::Process process(SpawnChildWithOptions("CheckPidProcess", options)); ASSERT_TRUE(process.IsValid()); int exit_code = 42; EXPECT_TRUE(process.WaitForExit(&exit_code)); EXPECT_EQ(kSuccess, exit_code); } #endif TEST(ForkWithFlagsTest, UpdatesPidCache) { // The libc clone function, which allows ForkWithFlags to keep the pid cache // up to date, does not work on Valgrind. if (RunningOnValgrind()) { return; } // Warm up the libc pid cache, if there is one. ASSERT_EQ(syscall(__NR_getpid), getpid()); pid_t ctid = 0; const pid_t pid = base::ForkWithFlags(SIGCHLD | CLONE_CHILD_SETTID, nullptr, &ctid); if (pid == 0) { // In child. Check both the raw getpid syscall and the libc getpid wrapper // (which may rely on a pid cache). RAW_CHECK(syscall(__NR_getpid) == ctid); RAW_CHECK(getpid() == ctid); _exit(kSuccess); } ASSERT_NE(-1, pid); int status = 42; ASSERT_EQ(pid, HANDLE_EINTR(waitpid(pid, &status, 0))); ASSERT_TRUE(WIFEXITED(status)); EXPECT_EQ(kSuccess, WEXITSTATUS(status)); } MULTIPROCESS_TEST_MAIN(CheckCwdProcess) { base::FilePath expected; CHECK(base::GetTempDir(&expected)); base::FilePath actual; CHECK(base::GetCurrentDirectory(&actual)); CHECK(actual == expected); return kSuccess; } TEST_F(ProcessUtilTest, CurrentDirectory) { // TODO(rickyz): Add support for passing arguments to multiprocess children, // then create a special directory for this test. base::FilePath tmp_dir; ASSERT_TRUE(base::GetTempDir(&tmp_dir)); base::LaunchOptions options; options.current_directory = tmp_dir; base::Process process(SpawnChildWithOptions("CheckCwdProcess", options)); ASSERT_TRUE(process.IsValid()); int exit_code = 42; EXPECT_TRUE(process.WaitForExit(&exit_code)); EXPECT_EQ(kSuccess, exit_code); } TEST_F(ProcessUtilTest, InvalidCurrentDirectory) { base::LaunchOptions options; options.current_directory = base::FilePath("/dev/null"); base::Process process(SpawnChildWithOptions("SimpleChildProcess", options)); ASSERT_TRUE(process.IsValid()); int exit_code = kSuccess; EXPECT_TRUE(process.WaitForExit(&exit_code)); EXPECT_NE(kSuccess, exit_code); } #endif