Index: sandbox/linux/services/syscall_wrappers_unittest.cc |
diff --git a/sandbox/linux/services/syscall_wrappers_unittest.cc b/sandbox/linux/services/syscall_wrappers_unittest.cc |
index bac3881ae06c11809b6fe0ebd4b9db46cb883016..a8b48fe586f04677a4add441b47a5dd2f42986d4 100644 |
--- a/sandbox/linux/services/syscall_wrappers_unittest.cc |
+++ b/sandbox/linux/services/syscall_wrappers_unittest.cc |
@@ -60,35 +60,6 @@ TEST(SyscallWrappers, CloneChildSettid) { |
EXPECT_EQ(kSuccessExit, WEXITSTATUS(status)); |
} |
-TEST(SyscallWrappers, ForkWithFlagsUpdatesPidCache) { |
- // The libc clone function, which allows ForkWithFlags to keep the pid cache |
- // up to date, does not work on Valgrind. |
- if (IsRunningOnValgrind()) { |
- return; |
- } |
- |
- // Warm up the libc pid cache, if there is one. |
- ASSERT_EQ(sys_getpid(), getpid()); |
- |
- pid_t ctid = 0; |
- pid_t pid = ForkWithFlags(CLONE_CHILD_SETTID | SIGCHLD, nullptr, &ctid); |
- |
- const int kSuccessExit = 0; |
- if (0 == pid) { |
- // In child. Check both the raw getpid syscall and the libc getpid wrapper |
- // (which may rely on a pid cache). |
- if (sys_getpid() == ctid && getpid() == ctid) |
- _exit(kSuccessExit); |
- _exit(1); |
- } |
- |
- ASSERT_NE(-1, pid); |
- int status = 0; |
- ASSERT_EQ(pid, HANDLE_EINTR(waitpid(pid, &status, 0))); |
- ASSERT_TRUE(WIFEXITED(status)); |
- EXPECT_EQ(kSuccessExit, WEXITSTATUS(status)); |
-} |
- |
} // namespace |
} // namespace sandbox |