blob: 093cc45d72bfccf7f779af3bed857cc27c49bed0 [file] [log] [blame]
Elliott Hughesbfeab1b2012-09-05 17:47:37 -07001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <gtest/gtest.h>
18
19#include <errno.h>
Elliott Hughes5b9310e2013-10-02 16:59:05 -070020#include <inttypes.h>
Elliott Hughesb95cf0d2013-07-15 14:51:07 -070021#include <limits.h>
Elliott Hughes04620a32014-03-07 17:59:05 -080022#include <malloc.h>
Elliott Hughesbfeab1b2012-09-05 17:47:37 -070023#include <pthread.h>
Christopher Ferrisf04935c2013-12-20 18:43:21 -080024#include <signal.h>
Yabin Cui140f3672015-02-03 10:32:00 -080025#include <stdio.h>
Elliott Hughes70b24b12013-11-15 11:51:07 -080026#include <sys/mman.h>
Elliott Hughes57b7a612014-08-25 17:26:50 -070027#include <sys/syscall.h>
Narayan Kamath51e6cb32014-03-03 15:38:51 +000028#include <time.h>
Elliott Hughes4d014e12012-09-07 16:47:54 -070029#include <unistd.h>
Yabin Cui33ac04a2015-09-22 11:16:15 -070030#include <unwind.h>
Elliott Hughesbfeab1b2012-09-05 17:47:37 -070031
Yabin Cui08ee8d22015-02-11 17:04:36 -080032#include <atomic>
Yabin Cuif7969852015-04-02 17:47:48 -070033#include <regex>
Yabin Cuib5845722015-03-16 22:46:42 -070034#include <vector>
Yabin Cui08ee8d22015-02-11 17:04:36 -080035
Yabin Cuif7969852015-04-02 17:47:48 -070036#include <base/file.h>
37#include <base/stringprintf.h>
38
Yabin Cui17393b02015-03-21 15:08:25 -070039#include "private/bionic_macros.h"
40#include "private/ScopeGuard.h"
41#include "BionicDeathTest.h"
42#include "ScopedSignalHandler.h"
43
Elliott Hughes15dfd632015-09-22 16:40:14 -070044#include "utils.h"
45
Yabin Cuif7969852015-04-02 17:47:48 -070046extern "C" pid_t gettid();
47
Elliott Hughesbfeab1b2012-09-05 17:47:37 -070048TEST(pthread, pthread_key_create) {
49 pthread_key_t key;
50 ASSERT_EQ(0, pthread_key_create(&key, NULL));
51 ASSERT_EQ(0, pthread_key_delete(key));
52 // Can't delete a key that's already been deleted.
53 ASSERT_EQ(EINVAL, pthread_key_delete(key));
54}
Elliott Hughes4d014e12012-09-07 16:47:54 -070055
Dan Albertc4bcc752014-09-30 11:48:24 -070056TEST(pthread, pthread_keys_max) {
Yabin Cui6c238f22014-12-11 20:50:41 -080057 // POSIX says PTHREAD_KEYS_MAX should be at least _POSIX_THREAD_KEYS_MAX.
58 ASSERT_GE(PTHREAD_KEYS_MAX, _POSIX_THREAD_KEYS_MAX);
Dan Albertc4bcc752014-09-30 11:48:24 -070059}
Elliott Hughes718a5b52014-01-28 17:02:03 -080060
Yabin Cui6c238f22014-12-11 20:50:41 -080061TEST(pthread, sysconf_SC_THREAD_KEYS_MAX_eq_PTHREAD_KEYS_MAX) {
Dan Albertc4bcc752014-09-30 11:48:24 -070062 int sysconf_max = sysconf(_SC_THREAD_KEYS_MAX);
Yabin Cui6c238f22014-12-11 20:50:41 -080063 ASSERT_EQ(sysconf_max, PTHREAD_KEYS_MAX);
Dan Albertc4bcc752014-09-30 11:48:24 -070064}
65
66TEST(pthread, pthread_key_many_distinct) {
Yabin Cui6c238f22014-12-11 20:50:41 -080067 // As gtest uses pthread keys, we can't allocate exactly PTHREAD_KEYS_MAX
68 // pthread keys, but We should be able to allocate at least this many keys.
69 int nkeys = PTHREAD_KEYS_MAX / 2;
Dan Albertc4bcc752014-09-30 11:48:24 -070070 std::vector<pthread_key_t> keys;
71
72 auto scope_guard = make_scope_guard([&keys]{
Elliott Hughes0b2acdf2015-10-02 18:25:19 -070073 for (const auto& key : keys) {
Dan Albertc4bcc752014-09-30 11:48:24 -070074 EXPECT_EQ(0, pthread_key_delete(key));
75 }
76 });
77
78 for (int i = 0; i < nkeys; ++i) {
79 pthread_key_t key;
Elliott Hughes61706932015-03-31 10:56:58 -070080 // If this fails, it's likely that LIBC_PTHREAD_KEY_RESERVED_COUNT is wrong.
Dan Albertc4bcc752014-09-30 11:48:24 -070081 ASSERT_EQ(0, pthread_key_create(&key, NULL)) << i << " of " << nkeys;
82 keys.push_back(key);
83 ASSERT_EQ(0, pthread_setspecific(key, reinterpret_cast<void*>(i)));
84 }
85
86 for (int i = keys.size() - 1; i >= 0; --i) {
87 ASSERT_EQ(reinterpret_cast<void*>(i), pthread_getspecific(keys.back()));
88 pthread_key_t key = keys.back();
89 keys.pop_back();
90 ASSERT_EQ(0, pthread_key_delete(key));
91 }
92}
93
Yabin Cui6c238f22014-12-11 20:50:41 -080094TEST(pthread, pthread_key_not_exceed_PTHREAD_KEYS_MAX) {
Elliott Hughes44b53ad2013-02-11 20:18:47 +000095 std::vector<pthread_key_t> keys;
Dan Albertc4bcc752014-09-30 11:48:24 -070096 int rv = 0;
Yabin Cui6c238f22014-12-11 20:50:41 -080097
98 // Pthread keys are used by gtest, so PTHREAD_KEYS_MAX should
99 // be more than we are allowed to allocate now.
100 for (int i = 0; i < PTHREAD_KEYS_MAX; i++) {
Elliott Hughes44b53ad2013-02-11 20:18:47 +0000101 pthread_key_t key;
Dan Albertc4bcc752014-09-30 11:48:24 -0700102 rv = pthread_key_create(&key, NULL);
103 if (rv == EAGAIN) {
104 break;
105 }
106 EXPECT_EQ(0, rv);
Elliott Hughes44b53ad2013-02-11 20:18:47 +0000107 keys.push_back(key);
108 }
109
Dan Albertc4bcc752014-09-30 11:48:24 -0700110 // Don't leak keys.
Elliott Hughes0b2acdf2015-10-02 18:25:19 -0700111 for (const auto& key : keys) {
Dan Albertc4bcc752014-09-30 11:48:24 -0700112 EXPECT_EQ(0, pthread_key_delete(key));
Elliott Hughes44b53ad2013-02-11 20:18:47 +0000113 }
Dan Albertc4bcc752014-09-30 11:48:24 -0700114 keys.clear();
115
116 // We should have eventually reached the maximum number of keys and received
117 // EAGAIN.
118 ASSERT_EQ(EAGAIN, rv);
Elliott Hughes44b53ad2013-02-11 20:18:47 +0000119}
120
Elliott Hughesebb770f2014-06-25 13:46:46 -0700121TEST(pthread, pthread_key_delete) {
122 void* expected = reinterpret_cast<void*>(1234);
123 pthread_key_t key;
124 ASSERT_EQ(0, pthread_key_create(&key, NULL));
125 ASSERT_EQ(0, pthread_setspecific(key, expected));
126 ASSERT_EQ(expected, pthread_getspecific(key));
127 ASSERT_EQ(0, pthread_key_delete(key));
128 // After deletion, pthread_getspecific returns NULL.
129 ASSERT_EQ(NULL, pthread_getspecific(key));
130 // And you can't use pthread_setspecific with the deleted key.
131 ASSERT_EQ(EINVAL, pthread_setspecific(key, expected));
132}
133
Elliott Hughes40a52172014-07-30 14:48:10 -0700134TEST(pthread, pthread_key_fork) {
135 void* expected = reinterpret_cast<void*>(1234);
136 pthread_key_t key;
137 ASSERT_EQ(0, pthread_key_create(&key, NULL));
138 ASSERT_EQ(0, pthread_setspecific(key, expected));
139 ASSERT_EQ(expected, pthread_getspecific(key));
140
141 pid_t pid = fork();
142 ASSERT_NE(-1, pid) << strerror(errno);
143
144 if (pid == 0) {
145 // The surviving thread inherits all the forking thread's TLS values...
146 ASSERT_EQ(expected, pthread_getspecific(key));
147 _exit(99);
148 }
149
150 int status;
151 ASSERT_EQ(pid, waitpid(pid, &status, 0));
152 ASSERT_TRUE(WIFEXITED(status));
153 ASSERT_EQ(99, WEXITSTATUS(status));
154
155 ASSERT_EQ(expected, pthread_getspecific(key));
Dan Albert1d53ae22014-09-02 15:24:26 -0700156 ASSERT_EQ(0, pthread_key_delete(key));
Elliott Hughes40a52172014-07-30 14:48:10 -0700157}
158
159static void* DirtyKeyFn(void* key) {
160 return pthread_getspecific(*reinterpret_cast<pthread_key_t*>(key));
161}
162
163TEST(pthread, pthread_key_dirty) {
164 pthread_key_t key;
165 ASSERT_EQ(0, pthread_key_create(&key, NULL));
166
Yabin Cuia36158a2015-11-16 21:06:16 -0800167 size_t stack_size = 640 * 1024;
Elliott Hughes40a52172014-07-30 14:48:10 -0700168 void* stack = mmap(NULL, stack_size, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0);
169 ASSERT_NE(MAP_FAILED, stack);
170 memset(stack, 0xff, stack_size);
171
172 pthread_attr_t attr;
173 ASSERT_EQ(0, pthread_attr_init(&attr));
174 ASSERT_EQ(0, pthread_attr_setstack(&attr, stack, stack_size));
175
176 pthread_t t;
177 ASSERT_EQ(0, pthread_create(&t, &attr, DirtyKeyFn, &key));
178
179 void* result;
180 ASSERT_EQ(0, pthread_join(t, &result));
181 ASSERT_EQ(nullptr, result); // Not ~0!
182
183 ASSERT_EQ(0, munmap(stack, stack_size));
Dan Albert1d53ae22014-09-02 15:24:26 -0700184 ASSERT_EQ(0, pthread_key_delete(key));
Elliott Hughes40a52172014-07-30 14:48:10 -0700185}
186
Yabin Cui5ddbb3f2015-03-05 20:35:32 -0800187TEST(pthread, static_pthread_key_used_before_creation) {
188#if defined(__BIONIC__)
189 // See http://b/19625804. The bug is about a static/global pthread key being used before creation.
190 // So here tests if the static/global default value 0 can be detected as invalid key.
191 static pthread_key_t key;
192 ASSERT_EQ(nullptr, pthread_getspecific(key));
193 ASSERT_EQ(EINVAL, pthread_setspecific(key, nullptr));
194 ASSERT_EQ(EINVAL, pthread_key_delete(key));
195#else
196 GTEST_LOG_(INFO) << "This test tests bionic pthread key implementation detail.\n";
197#endif
198}
199
Elliott Hughes4d014e12012-09-07 16:47:54 -0700200static void* IdFn(void* arg) {
201 return arg;
202}
203
Yabin Cui63481602014-12-01 17:41:04 -0800204class SpinFunctionHelper {
205 public:
206 SpinFunctionHelper() {
207 SpinFunctionHelper::spin_flag_ = true;
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400208 }
Yabin Cui63481602014-12-01 17:41:04 -0800209 ~SpinFunctionHelper() {
210 UnSpin();
211 }
212 auto GetFunction() -> void* (*)(void*) {
213 return SpinFunctionHelper::SpinFn;
214 }
215
216 void UnSpin() {
217 SpinFunctionHelper::spin_flag_ = false;
218 }
219
220 private:
221 static void* SpinFn(void*) {
222 while (spin_flag_) {}
223 return NULL;
224 }
Yabin Cuia36158a2015-11-16 21:06:16 -0800225 static std::atomic<bool> spin_flag_;
Yabin Cui63481602014-12-01 17:41:04 -0800226};
227
228// It doesn't matter if spin_flag_ is used in several tests,
229// because it is always set to false after each test. Each thread
230// loops on spin_flag_ can find it becomes false at some time.
Yabin Cuia36158a2015-11-16 21:06:16 -0800231std::atomic<bool> SpinFunctionHelper::spin_flag_;
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400232
Elliott Hughes4d014e12012-09-07 16:47:54 -0700233static void* JoinFn(void* arg) {
234 return reinterpret_cast<void*>(pthread_join(reinterpret_cast<pthread_t>(arg), NULL));
235}
236
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400237static void AssertDetached(pthread_t t, bool is_detached) {
238 pthread_attr_t attr;
239 ASSERT_EQ(0, pthread_getattr_np(t, &attr));
240 int detach_state;
241 ASSERT_EQ(0, pthread_attr_getdetachstate(&attr, &detach_state));
242 pthread_attr_destroy(&attr);
243 ASSERT_EQ(is_detached, (detach_state == PTHREAD_CREATE_DETACHED));
244}
245
Elliott Hughes9d23e042013-02-15 19:21:51 -0800246static void MakeDeadThread(pthread_t& t) {
247 ASSERT_EQ(0, pthread_create(&t, NULL, IdFn, NULL));
Elliott Hughes34c987a2014-09-22 16:01:26 -0700248 ASSERT_EQ(0, pthread_join(t, NULL));
Elliott Hughes9d23e042013-02-15 19:21:51 -0800249}
250
Elliott Hughes4d014e12012-09-07 16:47:54 -0700251TEST(pthread, pthread_create) {
252 void* expected_result = reinterpret_cast<void*>(123);
253 // Can we create a thread?
254 pthread_t t;
255 ASSERT_EQ(0, pthread_create(&t, NULL, IdFn, expected_result));
256 // If we join, do we get the expected value back?
257 void* result;
258 ASSERT_EQ(0, pthread_join(t, &result));
259 ASSERT_EQ(expected_result, result);
260}
261
Elliott Hughes3e898472013-02-12 16:40:24 +0000262TEST(pthread, pthread_create_EAGAIN) {
263 pthread_attr_t attributes;
264 ASSERT_EQ(0, pthread_attr_init(&attributes));
265 ASSERT_EQ(0, pthread_attr_setstacksize(&attributes, static_cast<size_t>(-1) & ~(getpagesize() - 1)));
266
267 pthread_t t;
268 ASSERT_EQ(EAGAIN, pthread_create(&t, &attributes, IdFn, NULL));
269}
270
Elliott Hughes4d014e12012-09-07 16:47:54 -0700271TEST(pthread, pthread_no_join_after_detach) {
Yabin Cui63481602014-12-01 17:41:04 -0800272 SpinFunctionHelper spinhelper;
273
Elliott Hughes4d014e12012-09-07 16:47:54 -0700274 pthread_t t1;
Yabin Cui63481602014-12-01 17:41:04 -0800275 ASSERT_EQ(0, pthread_create(&t1, NULL, spinhelper.GetFunction(), NULL));
Elliott Hughes4d014e12012-09-07 16:47:54 -0700276
277 // After a pthread_detach...
278 ASSERT_EQ(0, pthread_detach(t1));
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400279 AssertDetached(t1, true);
Elliott Hughes4d014e12012-09-07 16:47:54 -0700280
281 // ...pthread_join should fail.
Elliott Hughes34c987a2014-09-22 16:01:26 -0700282 ASSERT_EQ(EINVAL, pthread_join(t1, NULL));
Elliott Hughes4d014e12012-09-07 16:47:54 -0700283}
284
285TEST(pthread, pthread_no_op_detach_after_join) {
Yabin Cui63481602014-12-01 17:41:04 -0800286 SpinFunctionHelper spinhelper;
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400287
Elliott Hughes4d014e12012-09-07 16:47:54 -0700288 pthread_t t1;
Yabin Cui63481602014-12-01 17:41:04 -0800289 ASSERT_EQ(0, pthread_create(&t1, NULL, spinhelper.GetFunction(), NULL));
Elliott Hughes4d014e12012-09-07 16:47:54 -0700290
291 // If thread 2 is already waiting to join thread 1...
292 pthread_t t2;
293 ASSERT_EQ(0, pthread_create(&t2, NULL, JoinFn, reinterpret_cast<void*>(t1)));
294
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400295 sleep(1); // (Give t2 a chance to call pthread_join.)
Elliott Hughes4d014e12012-09-07 16:47:54 -0700296
Yabin Cuibbb04322015-03-19 15:19:25 -0700297#if defined(__BIONIC__)
298 ASSERT_EQ(EINVAL, pthread_detach(t1));
299#else
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400300 ASSERT_EQ(0, pthread_detach(t1));
Yabin Cuibbb04322015-03-19 15:19:25 -0700301#endif
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400302 AssertDetached(t1, false);
303
Yabin Cui63481602014-12-01 17:41:04 -0800304 spinhelper.UnSpin();
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400305
306 // ...but t2's join on t1 still goes ahead (which we can tell because our join on t2 finishes).
Elliott Hughes4d014e12012-09-07 16:47:54 -0700307 void* join_result;
308 ASSERT_EQ(0, pthread_join(t2, &join_result));
Elliott Hughes5b9310e2013-10-02 16:59:05 -0700309 ASSERT_EQ(0U, reinterpret_cast<uintptr_t>(join_result));
Elliott Hughes4d014e12012-09-07 16:47:54 -0700310}
Elliott Hughes14f19592012-10-29 10:19:44 -0700311
312TEST(pthread, pthread_join_self) {
Elliott Hughes34c987a2014-09-22 16:01:26 -0700313 ASSERT_EQ(EDEADLK, pthread_join(pthread_self(), NULL));
Elliott Hughes14f19592012-10-29 10:19:44 -0700314}
Elliott Hughes4f251be2012-11-01 16:33:29 -0700315
Elliott Hughes877ec6d2013-11-15 17:40:18 -0800316struct TestBug37410 {
317 pthread_t main_thread;
318 pthread_mutex_t mutex;
Elliott Hughes4f251be2012-11-01 16:33:29 -0700319
Elliott Hughes877ec6d2013-11-15 17:40:18 -0800320 static void main() {
321 TestBug37410 data;
322 data.main_thread = pthread_self();
323 ASSERT_EQ(0, pthread_mutex_init(&data.mutex, NULL));
324 ASSERT_EQ(0, pthread_mutex_lock(&data.mutex));
325
326 pthread_t t;
327 ASSERT_EQ(0, pthread_create(&t, NULL, TestBug37410::thread_fn, reinterpret_cast<void*>(&data)));
328
329 // Wait for the thread to be running...
330 ASSERT_EQ(0, pthread_mutex_lock(&data.mutex));
331 ASSERT_EQ(0, pthread_mutex_unlock(&data.mutex));
332
333 // ...and exit.
334 pthread_exit(NULL);
335 }
336
337 private:
338 static void* thread_fn(void* arg) {
339 TestBug37410* data = reinterpret_cast<TestBug37410*>(arg);
340
341 // Let the main thread know we're running.
342 pthread_mutex_unlock(&data->mutex);
343
344 // And wait for the main thread to exit.
345 pthread_join(data->main_thread, NULL);
346
347 return NULL;
348 }
349};
Elliott Hughes4f251be2012-11-01 16:33:29 -0700350
Elliott Hughes7fd803c2013-02-14 16:33:52 -0800351// Even though this isn't really a death test, we have to say "DeathTest" here so gtest knows to
352// run this test (which exits normally) in its own process.
Yabin Cui9df70402014-11-05 18:01:01 -0800353
354class pthread_DeathTest : public BionicDeathTest {};
355
356TEST_F(pthread_DeathTest, pthread_bug_37410) {
Elliott Hughes4f251be2012-11-01 16:33:29 -0700357 // http://code.google.com/p/android/issues/detail?id=37410
Elliott Hughes877ec6d2013-11-15 17:40:18 -0800358 ASSERT_EXIT(TestBug37410::main(), ::testing::ExitedWithCode(0), "");
Elliott Hughes4f251be2012-11-01 16:33:29 -0700359}
Elliott Hughesc5d028f2013-01-10 14:42:14 -0800360
361static void* SignalHandlerFn(void* arg) {
362 sigset_t wait_set;
363 sigfillset(&wait_set);
364 return reinterpret_cast<void*>(sigwait(&wait_set, reinterpret_cast<int*>(arg)));
365}
366
367TEST(pthread, pthread_sigmask) {
Elliott Hughes19e62322013-10-15 11:23:57 -0700368 // Check that SIGUSR1 isn't blocked.
369 sigset_t original_set;
370 sigemptyset(&original_set);
371 ASSERT_EQ(0, pthread_sigmask(SIG_BLOCK, NULL, &original_set));
372 ASSERT_FALSE(sigismember(&original_set, SIGUSR1));
373
Elliott Hughesc5d028f2013-01-10 14:42:14 -0800374 // Block SIGUSR1.
375 sigset_t set;
376 sigemptyset(&set);
377 sigaddset(&set, SIGUSR1);
378 ASSERT_EQ(0, pthread_sigmask(SIG_BLOCK, &set, NULL));
379
Elliott Hughes19e62322013-10-15 11:23:57 -0700380 // Check that SIGUSR1 is blocked.
381 sigset_t final_set;
382 sigemptyset(&final_set);
383 ASSERT_EQ(0, pthread_sigmask(SIG_BLOCK, NULL, &final_set));
384 ASSERT_TRUE(sigismember(&final_set, SIGUSR1));
385 // ...and that sigprocmask agrees with pthread_sigmask.
386 sigemptyset(&final_set);
387 ASSERT_EQ(0, sigprocmask(SIG_BLOCK, NULL, &final_set));
388 ASSERT_TRUE(sigismember(&final_set, SIGUSR1));
389
Elliott Hughesc5d028f2013-01-10 14:42:14 -0800390 // Spawn a thread that calls sigwait and tells us what it received.
391 pthread_t signal_thread;
392 int received_signal = -1;
393 ASSERT_EQ(0, pthread_create(&signal_thread, NULL, SignalHandlerFn, &received_signal));
394
395 // Send that thread SIGUSR1.
396 pthread_kill(signal_thread, SIGUSR1);
397
398 // See what it got.
399 void* join_result;
400 ASSERT_EQ(0, pthread_join(signal_thread, &join_result));
401 ASSERT_EQ(SIGUSR1, received_signal);
Elliott Hughes5b9310e2013-10-02 16:59:05 -0700402 ASSERT_EQ(0U, reinterpret_cast<uintptr_t>(join_result));
Elliott Hughes19e62322013-10-15 11:23:57 -0700403
404 // Restore the original signal mask.
405 ASSERT_EQ(0, pthread_sigmask(SIG_SETMASK, &original_set, NULL));
Elliott Hughesc5d028f2013-01-10 14:42:14 -0800406}
Elliott Hughes5e3fc432013-02-11 16:36:48 -0800407
Elliott Hughes3e898472013-02-12 16:40:24 +0000408TEST(pthread, pthread_setname_np__too_long) {
Elliott Hughesd1aea302015-04-25 10:05:24 -0700409 // The limit is 15 characters --- the kernel's buffer is 16, but includes a NUL.
410 ASSERT_EQ(0, pthread_setname_np(pthread_self(), "123456789012345"));
411 ASSERT_EQ(ERANGE, pthread_setname_np(pthread_self(), "1234567890123456"));
Elliott Hughes3e898472013-02-12 16:40:24 +0000412}
413
414TEST(pthread, pthread_setname_np__self) {
415 ASSERT_EQ(0, pthread_setname_np(pthread_self(), "short 1"));
416}
417
418TEST(pthread, pthread_setname_np__other) {
Yabin Cui63481602014-12-01 17:41:04 -0800419 SpinFunctionHelper spinhelper;
420
Elliott Hughesed29e852014-10-27 12:01:51 -0700421 pthread_t t1;
Yabin Cui63481602014-12-01 17:41:04 -0800422 ASSERT_EQ(0, pthread_create(&t1, NULL, spinhelper.GetFunction(), NULL));
Elliott Hughesed29e852014-10-27 12:01:51 -0700423 ASSERT_EQ(0, pthread_setname_np(t1, "short 2"));
Yabin Cuia36158a2015-11-16 21:06:16 -0800424 spinhelper.UnSpin();
425 ASSERT_EQ(0, pthread_join(t1, nullptr));
Elliott Hughes3e898472013-02-12 16:40:24 +0000426}
427
Yabin Cui220b99b2015-03-26 18:13:07 +0000428TEST(pthread, pthread_setname_np__no_such_thread) {
Elliott Hughes9d23e042013-02-15 19:21:51 -0800429 pthread_t dead_thread;
430 MakeDeadThread(dead_thread);
Elliott Hughes3e898472013-02-12 16:40:24 +0000431
432 // Call pthread_setname_np after thread has already exited.
Elliott Hughes68d98d82014-11-12 21:03:26 -0800433 ASSERT_EQ(ENOENT, pthread_setname_np(dead_thread, "short 3"));
Elliott Hughes3e898472013-02-12 16:40:24 +0000434}
Elliott Hughes9d23e042013-02-15 19:21:51 -0800435
436TEST(pthread, pthread_kill__0) {
437 // Signal 0 just tests that the thread exists, so it's safe to call on ourselves.
438 ASSERT_EQ(0, pthread_kill(pthread_self(), 0));
439}
440
441TEST(pthread, pthread_kill__invalid_signal) {
442 ASSERT_EQ(EINVAL, pthread_kill(pthread_self(), -1));
443}
444
Elliott Hughesfae89fc2013-02-21 11:22:23 -0800445static void pthread_kill__in_signal_handler_helper(int signal_number) {
446 static int count = 0;
447 ASSERT_EQ(SIGALRM, signal_number);
448 if (++count == 1) {
449 // Can we call pthread_kill from a signal handler?
450 ASSERT_EQ(0, pthread_kill(pthread_self(), SIGALRM));
451 }
452}
453
454TEST(pthread, pthread_kill__in_signal_handler) {
Elliott Hughes4b558f52014-03-04 15:58:02 -0800455 ScopedSignalHandler ssh(SIGALRM, pthread_kill__in_signal_handler_helper);
Elliott Hughesfae89fc2013-02-21 11:22:23 -0800456 ASSERT_EQ(0, pthread_kill(pthread_self(), SIGALRM));
457}
458
Yabin Cui220b99b2015-03-26 18:13:07 +0000459TEST(pthread, pthread_detach__no_such_thread) {
Elliott Hughes9d23e042013-02-15 19:21:51 -0800460 pthread_t dead_thread;
461 MakeDeadThread(dead_thread);
462
463 ASSERT_EQ(ESRCH, pthread_detach(dead_thread));
464}
465
Jeff Hao9b06cc32013-08-15 14:51:16 -0700466TEST(pthread, pthread_getcpuclockid__clock_gettime) {
Yabin Cui63481602014-12-01 17:41:04 -0800467 SpinFunctionHelper spinhelper;
468
Jeff Hao9b06cc32013-08-15 14:51:16 -0700469 pthread_t t;
Yabin Cui63481602014-12-01 17:41:04 -0800470 ASSERT_EQ(0, pthread_create(&t, NULL, spinhelper.GetFunction(), NULL));
Jeff Hao9b06cc32013-08-15 14:51:16 -0700471
472 clockid_t c;
473 ASSERT_EQ(0, pthread_getcpuclockid(t, &c));
474 timespec ts;
475 ASSERT_EQ(0, clock_gettime(c, &ts));
Yabin Cuia36158a2015-11-16 21:06:16 -0800476 spinhelper.UnSpin();
477 ASSERT_EQ(0, pthread_join(t, nullptr));
Jeff Hao9b06cc32013-08-15 14:51:16 -0700478}
479
Yabin Cui220b99b2015-03-26 18:13:07 +0000480TEST(pthread, pthread_getcpuclockid__no_such_thread) {
Elliott Hughes9d23e042013-02-15 19:21:51 -0800481 pthread_t dead_thread;
482 MakeDeadThread(dead_thread);
483
484 clockid_t c;
485 ASSERT_EQ(ESRCH, pthread_getcpuclockid(dead_thread, &c));
486}
487
Yabin Cui220b99b2015-03-26 18:13:07 +0000488TEST(pthread, pthread_getschedparam__no_such_thread) {
Elliott Hughes9d23e042013-02-15 19:21:51 -0800489 pthread_t dead_thread;
490 MakeDeadThread(dead_thread);
491
492 int policy;
493 sched_param param;
494 ASSERT_EQ(ESRCH, pthread_getschedparam(dead_thread, &policy, &param));
495}
496
Yabin Cui220b99b2015-03-26 18:13:07 +0000497TEST(pthread, pthread_setschedparam__no_such_thread) {
Elliott Hughes9d23e042013-02-15 19:21:51 -0800498 pthread_t dead_thread;
499 MakeDeadThread(dead_thread);
500
501 int policy = 0;
502 sched_param param;
503 ASSERT_EQ(ESRCH, pthread_setschedparam(dead_thread, policy, &param));
504}
505
Yabin Cui220b99b2015-03-26 18:13:07 +0000506TEST(pthread, pthread_join__no_such_thread) {
Elliott Hughes9d23e042013-02-15 19:21:51 -0800507 pthread_t dead_thread;
508 MakeDeadThread(dead_thread);
509
Elliott Hughes34c987a2014-09-22 16:01:26 -0700510 ASSERT_EQ(ESRCH, pthread_join(dead_thread, NULL));
Elliott Hughes9d23e042013-02-15 19:21:51 -0800511}
512
Yabin Cui220b99b2015-03-26 18:13:07 +0000513TEST(pthread, pthread_kill__no_such_thread) {
Elliott Hughes9d23e042013-02-15 19:21:51 -0800514 pthread_t dead_thread;
515 MakeDeadThread(dead_thread);
516
517 ASSERT_EQ(ESRCH, pthread_kill(dead_thread, 0));
518}
msg5550f020d12013-06-06 14:59:28 -0400519
520TEST(pthread, pthread_join__multijoin) {
Yabin Cui63481602014-12-01 17:41:04 -0800521 SpinFunctionHelper spinhelper;
msg5550f020d12013-06-06 14:59:28 -0400522
523 pthread_t t1;
Yabin Cui63481602014-12-01 17:41:04 -0800524 ASSERT_EQ(0, pthread_create(&t1, NULL, spinhelper.GetFunction(), NULL));
msg5550f020d12013-06-06 14:59:28 -0400525
526 pthread_t t2;
527 ASSERT_EQ(0, pthread_create(&t2, NULL, JoinFn, reinterpret_cast<void*>(t1)));
528
529 sleep(1); // (Give t2 a chance to call pthread_join.)
530
531 // Multiple joins to the same thread should fail.
532 ASSERT_EQ(EINVAL, pthread_join(t1, NULL));
533
Yabin Cui63481602014-12-01 17:41:04 -0800534 spinhelper.UnSpin();
msg5550f020d12013-06-06 14:59:28 -0400535
536 // ...but t2's join on t1 still goes ahead (which we can tell because our join on t2 finishes).
537 void* join_result;
538 ASSERT_EQ(0, pthread_join(t2, &join_result));
Elliott Hughes5b9310e2013-10-02 16:59:05 -0700539 ASSERT_EQ(0U, reinterpret_cast<uintptr_t>(join_result));
msg5550f020d12013-06-06 14:59:28 -0400540}
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700541
Elliott Hughes70b24b12013-11-15 11:51:07 -0800542TEST(pthread, pthread_join__race) {
543 // http://b/11693195 --- pthread_join could return before the thread had actually exited.
544 // If the joiner unmapped the thread's stack, that could lead to SIGSEGV in the thread.
545 for (size_t i = 0; i < 1024; ++i) {
Yabin Cuia36158a2015-11-16 21:06:16 -0800546 size_t stack_size = 640*1024;
Elliott Hughes70b24b12013-11-15 11:51:07 -0800547 void* stack = mmap(NULL, stack_size, PROT_READ|PROT_WRITE, MAP_ANON|MAP_PRIVATE, -1, 0);
548
549 pthread_attr_t a;
550 pthread_attr_init(&a);
551 pthread_attr_setstack(&a, stack, stack_size);
552
553 pthread_t t;
554 ASSERT_EQ(0, pthread_create(&t, &a, IdFn, NULL));
555 ASSERT_EQ(0, pthread_join(t, NULL));
556 ASSERT_EQ(0, munmap(stack, stack_size));
557 }
558}
559
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700560static void* GetActualGuardSizeFn(void* arg) {
561 pthread_attr_t attributes;
562 pthread_getattr_np(pthread_self(), &attributes);
563 pthread_attr_getguardsize(&attributes, reinterpret_cast<size_t*>(arg));
564 return NULL;
565}
566
567static size_t GetActualGuardSize(const pthread_attr_t& attributes) {
568 size_t result;
569 pthread_t t;
570 pthread_create(&t, &attributes, GetActualGuardSizeFn, &result);
Elliott Hughes34c987a2014-09-22 16:01:26 -0700571 pthread_join(t, NULL);
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700572 return result;
573}
574
575static void* GetActualStackSizeFn(void* arg) {
576 pthread_attr_t attributes;
577 pthread_getattr_np(pthread_self(), &attributes);
578 pthread_attr_getstacksize(&attributes, reinterpret_cast<size_t*>(arg));
579 return NULL;
580}
581
582static size_t GetActualStackSize(const pthread_attr_t& attributes) {
583 size_t result;
584 pthread_t t;
585 pthread_create(&t, &attributes, GetActualStackSizeFn, &result);
Elliott Hughes34c987a2014-09-22 16:01:26 -0700586 pthread_join(t, NULL);
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700587 return result;
588}
589
590TEST(pthread, pthread_attr_setguardsize) {
591 pthread_attr_t attributes;
592 ASSERT_EQ(0, pthread_attr_init(&attributes));
593
594 // Get the default guard size.
595 size_t default_guard_size;
596 ASSERT_EQ(0, pthread_attr_getguardsize(&attributes, &default_guard_size));
597
598 // No such thing as too small: will be rounded up to one page by pthread_create.
599 ASSERT_EQ(0, pthread_attr_setguardsize(&attributes, 128));
600 size_t guard_size;
601 ASSERT_EQ(0, pthread_attr_getguardsize(&attributes, &guard_size));
602 ASSERT_EQ(128U, guard_size);
603 ASSERT_EQ(4096U, GetActualGuardSize(attributes));
604
605 // Large enough and a multiple of the page size.
606 ASSERT_EQ(0, pthread_attr_setguardsize(&attributes, 32*1024));
607 ASSERT_EQ(0, pthread_attr_getguardsize(&attributes, &guard_size));
608 ASSERT_EQ(32*1024U, guard_size);
609
610 // Large enough but not a multiple of the page size; will be rounded up by pthread_create.
611 ASSERT_EQ(0, pthread_attr_setguardsize(&attributes, 32*1024 + 1));
612 ASSERT_EQ(0, pthread_attr_getguardsize(&attributes, &guard_size));
613 ASSERT_EQ(32*1024U + 1, guard_size);
614}
615
616TEST(pthread, pthread_attr_setstacksize) {
617 pthread_attr_t attributes;
618 ASSERT_EQ(0, pthread_attr_init(&attributes));
619
620 // Get the default stack size.
621 size_t default_stack_size;
622 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &default_stack_size));
623
624 // Too small.
625 ASSERT_EQ(EINVAL, pthread_attr_setstacksize(&attributes, 128));
626 size_t stack_size;
627 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size));
628 ASSERT_EQ(default_stack_size, stack_size);
629 ASSERT_GE(GetActualStackSize(attributes), default_stack_size);
630
Yabin Cui917d3902015-01-08 12:32:42 -0800631 // Large enough and a multiple of the page size; may be rounded up by pthread_create.
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700632 ASSERT_EQ(0, pthread_attr_setstacksize(&attributes, 32*1024));
633 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size));
634 ASSERT_EQ(32*1024U, stack_size);
Yabin Cui917d3902015-01-08 12:32:42 -0800635 ASSERT_GE(GetActualStackSize(attributes), 32*1024U);
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700636
Yabin Cui917d3902015-01-08 12:32:42 -0800637 // Large enough but not aligned; will be rounded up by pthread_create.
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700638 ASSERT_EQ(0, pthread_attr_setstacksize(&attributes, 32*1024 + 1));
639 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size));
640 ASSERT_EQ(32*1024U + 1, stack_size);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800641#if defined(__BIONIC__)
Yabin Cui917d3902015-01-08 12:32:42 -0800642 ASSERT_GT(GetActualStackSize(attributes), 32*1024U + 1);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800643#else // __BIONIC__
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700644 // glibc rounds down, in violation of POSIX. They document this in their BUGS section.
645 ASSERT_EQ(GetActualStackSize(attributes), 32*1024U);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800646#endif // __BIONIC__
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700647}
Elliott Hughesc3f11402013-10-30 14:40:09 -0700648
Yabin Cui76615da2015-03-17 14:22:09 -0700649TEST(pthread, pthread_rwlockattr_smoke) {
650 pthread_rwlockattr_t attr;
651 ASSERT_EQ(0, pthread_rwlockattr_init(&attr));
652
653 int pshared_value_array[] = {PTHREAD_PROCESS_PRIVATE, PTHREAD_PROCESS_SHARED};
654 for (size_t i = 0; i < sizeof(pshared_value_array) / sizeof(pshared_value_array[0]); ++i) {
655 ASSERT_EQ(0, pthread_rwlockattr_setpshared(&attr, pshared_value_array[i]));
656 int pshared;
657 ASSERT_EQ(0, pthread_rwlockattr_getpshared(&attr, &pshared));
658 ASSERT_EQ(pshared_value_array[i], pshared);
659 }
660
661 int kind_array[] = {PTHREAD_RWLOCK_PREFER_READER_NP,
662 PTHREAD_RWLOCK_PREFER_WRITER_NONRECURSIVE_NP};
663 for (size_t i = 0; i < sizeof(kind_array) / sizeof(kind_array[0]); ++i) {
664 ASSERT_EQ(0, pthread_rwlockattr_setkind_np(&attr, kind_array[i]));
665 int kind;
666 ASSERT_EQ(0, pthread_rwlockattr_getkind_np(&attr, &kind));
667 ASSERT_EQ(kind_array[i], kind);
668 }
669
670 ASSERT_EQ(0, pthread_rwlockattr_destroy(&attr));
671}
672
673TEST(pthread, pthread_rwlock_init_same_as_PTHREAD_RWLOCK_INITIALIZER) {
674 pthread_rwlock_t lock1 = PTHREAD_RWLOCK_INITIALIZER;
675 pthread_rwlock_t lock2;
676 ASSERT_EQ(0, pthread_rwlock_init(&lock2, NULL));
677 ASSERT_EQ(0, memcmp(&lock1, &lock2, sizeof(lock1)));
678}
679
Elliott Hughesc3f11402013-10-30 14:40:09 -0700680TEST(pthread, pthread_rwlock_smoke) {
681 pthread_rwlock_t l;
682 ASSERT_EQ(0, pthread_rwlock_init(&l, NULL));
683
Calin Juravle76f352e2014-05-19 13:41:10 +0100684 // Single read lock
Elliott Hughesc3f11402013-10-30 14:40:09 -0700685 ASSERT_EQ(0, pthread_rwlock_rdlock(&l));
686 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
687
Calin Juravle76f352e2014-05-19 13:41:10 +0100688 // Multiple read lock
689 ASSERT_EQ(0, pthread_rwlock_rdlock(&l));
690 ASSERT_EQ(0, pthread_rwlock_rdlock(&l));
691 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
692 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
693
694 // Write lock
Calin Juravle92687e42014-05-22 19:21:22 +0100695 ASSERT_EQ(0, pthread_rwlock_wrlock(&l));
696 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
Calin Juravle76f352e2014-05-19 13:41:10 +0100697
698 // Try writer lock
699 ASSERT_EQ(0, pthread_rwlock_trywrlock(&l));
700 ASSERT_EQ(EBUSY, pthread_rwlock_trywrlock(&l));
701 ASSERT_EQ(EBUSY, pthread_rwlock_tryrdlock(&l));
702 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
703
704 // Try reader lock
705 ASSERT_EQ(0, pthread_rwlock_tryrdlock(&l));
706 ASSERT_EQ(0, pthread_rwlock_tryrdlock(&l));
707 ASSERT_EQ(EBUSY, pthread_rwlock_trywrlock(&l));
708 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
709 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
710
711 // Try writer lock after unlock
Elliott Hughesc3f11402013-10-30 14:40:09 -0700712 ASSERT_EQ(0, pthread_rwlock_wrlock(&l));
713 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
714
Calin Juravle76f352e2014-05-19 13:41:10 +0100715 // EDEADLK in "read after write"
716 ASSERT_EQ(0, pthread_rwlock_wrlock(&l));
717 ASSERT_EQ(EDEADLK, pthread_rwlock_rdlock(&l));
718 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
719
720 // EDEADLK in "write after write"
721 ASSERT_EQ(0, pthread_rwlock_wrlock(&l));
722 ASSERT_EQ(EDEADLK, pthread_rwlock_wrlock(&l));
723 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
Calin Juravle76f352e2014-05-19 13:41:10 +0100724
Elliott Hughesc3f11402013-10-30 14:40:09 -0700725 ASSERT_EQ(0, pthread_rwlock_destroy(&l));
726}
727
Yabin Cuie7c2fff2015-11-05 22:06:09 -0800728static void WaitUntilThreadSleep(std::atomic<pid_t>& tid) {
729 while (tid == 0) {
Yabin Cuif7969852015-04-02 17:47:48 -0700730 usleep(1000);
731 }
Yabin Cuie7c2fff2015-11-05 22:06:09 -0800732 std::string filename = android::base::StringPrintf("/proc/%d/stat", tid.load());
Yabin Cuif7969852015-04-02 17:47:48 -0700733 std::regex regex {R"(\s+S\s+)"};
734
735 while (true) {
736 std::string content;
737 ASSERT_TRUE(android::base::ReadFileToString(filename, &content));
738 if (std::regex_search(content, regex)) {
739 break;
740 }
741 usleep(1000);
742 }
743}
744
Yabin Cui08ee8d22015-02-11 17:04:36 -0800745struct RwlockWakeupHelperArg {
746 pthread_rwlock_t lock;
747 enum Progress {
748 LOCK_INITIALIZED,
749 LOCK_WAITING,
750 LOCK_RELEASED,
751 LOCK_ACCESSED
752 };
753 std::atomic<Progress> progress;
Yabin Cuif7969852015-04-02 17:47:48 -0700754 std::atomic<pid_t> tid;
Yabin Cui08ee8d22015-02-11 17:04:36 -0800755};
756
757static void pthread_rwlock_reader_wakeup_writer_helper(RwlockWakeupHelperArg* arg) {
Yabin Cuif7969852015-04-02 17:47:48 -0700758 arg->tid = gettid();
Yabin Cui08ee8d22015-02-11 17:04:36 -0800759 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_INITIALIZED, arg->progress);
760 arg->progress = RwlockWakeupHelperArg::LOCK_WAITING;
761
762 ASSERT_EQ(EBUSY, pthread_rwlock_trywrlock(&arg->lock));
763 ASSERT_EQ(0, pthread_rwlock_wrlock(&arg->lock));
764 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_RELEASED, arg->progress);
765 ASSERT_EQ(0, pthread_rwlock_unlock(&arg->lock));
766
767 arg->progress = RwlockWakeupHelperArg::LOCK_ACCESSED;
768}
769
770TEST(pthread, pthread_rwlock_reader_wakeup_writer) {
771 RwlockWakeupHelperArg wakeup_arg;
772 ASSERT_EQ(0, pthread_rwlock_init(&wakeup_arg.lock, NULL));
773 ASSERT_EQ(0, pthread_rwlock_rdlock(&wakeup_arg.lock));
774 wakeup_arg.progress = RwlockWakeupHelperArg::LOCK_INITIALIZED;
Yabin Cuif7969852015-04-02 17:47:48 -0700775 wakeup_arg.tid = 0;
Yabin Cui08ee8d22015-02-11 17:04:36 -0800776
777 pthread_t thread;
778 ASSERT_EQ(0, pthread_create(&thread, NULL,
779 reinterpret_cast<void* (*)(void*)>(pthread_rwlock_reader_wakeup_writer_helper), &wakeup_arg));
Yabin Cuif7969852015-04-02 17:47:48 -0700780 WaitUntilThreadSleep(wakeup_arg.tid);
781 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_WAITING, wakeup_arg.progress);
782
Yabin Cui08ee8d22015-02-11 17:04:36 -0800783 wakeup_arg.progress = RwlockWakeupHelperArg::LOCK_RELEASED;
784 ASSERT_EQ(0, pthread_rwlock_unlock(&wakeup_arg.lock));
785
786 ASSERT_EQ(0, pthread_join(thread, NULL));
787 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_ACCESSED, wakeup_arg.progress);
788 ASSERT_EQ(0, pthread_rwlock_destroy(&wakeup_arg.lock));
789}
790
791static void pthread_rwlock_writer_wakeup_reader_helper(RwlockWakeupHelperArg* arg) {
Yabin Cuif7969852015-04-02 17:47:48 -0700792 arg->tid = gettid();
Yabin Cui08ee8d22015-02-11 17:04:36 -0800793 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_INITIALIZED, arg->progress);
794 arg->progress = RwlockWakeupHelperArg::LOCK_WAITING;
795
796 ASSERT_EQ(EBUSY, pthread_rwlock_tryrdlock(&arg->lock));
797 ASSERT_EQ(0, pthread_rwlock_rdlock(&arg->lock));
798 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_RELEASED, arg->progress);
799 ASSERT_EQ(0, pthread_rwlock_unlock(&arg->lock));
800
801 arg->progress = RwlockWakeupHelperArg::LOCK_ACCESSED;
802}
803
804TEST(pthread, pthread_rwlock_writer_wakeup_reader) {
805 RwlockWakeupHelperArg wakeup_arg;
806 ASSERT_EQ(0, pthread_rwlock_init(&wakeup_arg.lock, NULL));
807 ASSERT_EQ(0, pthread_rwlock_wrlock(&wakeup_arg.lock));
808 wakeup_arg.progress = RwlockWakeupHelperArg::LOCK_INITIALIZED;
Yabin Cuif7969852015-04-02 17:47:48 -0700809 wakeup_arg.tid = 0;
Yabin Cui08ee8d22015-02-11 17:04:36 -0800810
811 pthread_t thread;
812 ASSERT_EQ(0, pthread_create(&thread, NULL,
813 reinterpret_cast<void* (*)(void*)>(pthread_rwlock_writer_wakeup_reader_helper), &wakeup_arg));
Yabin Cuif7969852015-04-02 17:47:48 -0700814 WaitUntilThreadSleep(wakeup_arg.tid);
815 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_WAITING, wakeup_arg.progress);
816
Yabin Cui08ee8d22015-02-11 17:04:36 -0800817 wakeup_arg.progress = RwlockWakeupHelperArg::LOCK_RELEASED;
818 ASSERT_EQ(0, pthread_rwlock_unlock(&wakeup_arg.lock));
819
820 ASSERT_EQ(0, pthread_join(thread, NULL));
821 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_ACCESSED, wakeup_arg.progress);
822 ASSERT_EQ(0, pthread_rwlock_destroy(&wakeup_arg.lock));
823}
824
Yabin Cui76615da2015-03-17 14:22:09 -0700825class RwlockKindTestHelper {
826 private:
827 struct ThreadArg {
828 RwlockKindTestHelper* helper;
829 std::atomic<pid_t>& tid;
830
831 ThreadArg(RwlockKindTestHelper* helper, std::atomic<pid_t>& tid)
832 : helper(helper), tid(tid) { }
833 };
834
835 public:
836 pthread_rwlock_t lock;
837
838 public:
839 RwlockKindTestHelper(int kind_type) {
840 InitRwlock(kind_type);
841 }
842
843 ~RwlockKindTestHelper() {
844 DestroyRwlock();
845 }
846
847 void CreateWriterThread(pthread_t& thread, std::atomic<pid_t>& tid) {
848 tid = 0;
849 ThreadArg* arg = new ThreadArg(this, tid);
850 ASSERT_EQ(0, pthread_create(&thread, NULL,
851 reinterpret_cast<void* (*)(void*)>(WriterThreadFn), arg));
852 }
853
854 void CreateReaderThread(pthread_t& thread, std::atomic<pid_t>& tid) {
855 tid = 0;
856 ThreadArg* arg = new ThreadArg(this, tid);
857 ASSERT_EQ(0, pthread_create(&thread, NULL,
858 reinterpret_cast<void* (*)(void*)>(ReaderThreadFn), arg));
859 }
860
861 private:
862 void InitRwlock(int kind_type) {
863 pthread_rwlockattr_t attr;
864 ASSERT_EQ(0, pthread_rwlockattr_init(&attr));
865 ASSERT_EQ(0, pthread_rwlockattr_setkind_np(&attr, kind_type));
866 ASSERT_EQ(0, pthread_rwlock_init(&lock, &attr));
867 ASSERT_EQ(0, pthread_rwlockattr_destroy(&attr));
868 }
869
870 void DestroyRwlock() {
871 ASSERT_EQ(0, pthread_rwlock_destroy(&lock));
872 }
873
874 static void WriterThreadFn(ThreadArg* arg) {
875 arg->tid = gettid();
876
877 RwlockKindTestHelper* helper = arg->helper;
878 ASSERT_EQ(0, pthread_rwlock_wrlock(&helper->lock));
879 ASSERT_EQ(0, pthread_rwlock_unlock(&helper->lock));
880 delete arg;
881 }
882
883 static void ReaderThreadFn(ThreadArg* arg) {
884 arg->tid = gettid();
885
886 RwlockKindTestHelper* helper = arg->helper;
887 ASSERT_EQ(0, pthread_rwlock_rdlock(&helper->lock));
888 ASSERT_EQ(0, pthread_rwlock_unlock(&helper->lock));
889 delete arg;
890 }
891};
892
893TEST(pthread, pthread_rwlock_kind_PTHREAD_RWLOCK_PREFER_READER_NP) {
894 RwlockKindTestHelper helper(PTHREAD_RWLOCK_PREFER_READER_NP);
895 ASSERT_EQ(0, pthread_rwlock_rdlock(&helper.lock));
896
897 pthread_t writer_thread;
898 std::atomic<pid_t> writer_tid;
899 helper.CreateWriterThread(writer_thread, writer_tid);
900 WaitUntilThreadSleep(writer_tid);
901
902 pthread_t reader_thread;
903 std::atomic<pid_t> reader_tid;
904 helper.CreateReaderThread(reader_thread, reader_tid);
905 ASSERT_EQ(0, pthread_join(reader_thread, NULL));
906
907 ASSERT_EQ(0, pthread_rwlock_unlock(&helper.lock));
908 ASSERT_EQ(0, pthread_join(writer_thread, NULL));
909}
910
911TEST(pthread, pthread_rwlock_kind_PTHREAD_RWLOCK_PREFER_WRITER_NONRECURSIVE_NP) {
912 RwlockKindTestHelper helper(PTHREAD_RWLOCK_PREFER_WRITER_NONRECURSIVE_NP);
913 ASSERT_EQ(0, pthread_rwlock_rdlock(&helper.lock));
914
915 pthread_t writer_thread;
916 std::atomic<pid_t> writer_tid;
917 helper.CreateWriterThread(writer_thread, writer_tid);
918 WaitUntilThreadSleep(writer_tid);
919
920 pthread_t reader_thread;
921 std::atomic<pid_t> reader_tid;
922 helper.CreateReaderThread(reader_thread, reader_tid);
923 WaitUntilThreadSleep(reader_tid);
924
925 ASSERT_EQ(0, pthread_rwlock_unlock(&helper.lock));
926 ASSERT_EQ(0, pthread_join(writer_thread, NULL));
927 ASSERT_EQ(0, pthread_join(reader_thread, NULL));
928}
929
Elliott Hughes1728b232014-05-14 10:02:03 -0700930static int g_once_fn_call_count = 0;
Elliott Hughesc3f11402013-10-30 14:40:09 -0700931static void OnceFn() {
Elliott Hughes1728b232014-05-14 10:02:03 -0700932 ++g_once_fn_call_count;
Elliott Hughesc3f11402013-10-30 14:40:09 -0700933}
934
935TEST(pthread, pthread_once_smoke) {
936 pthread_once_t once_control = PTHREAD_ONCE_INIT;
937 ASSERT_EQ(0, pthread_once(&once_control, OnceFn));
938 ASSERT_EQ(0, pthread_once(&once_control, OnceFn));
Elliott Hughes1728b232014-05-14 10:02:03 -0700939 ASSERT_EQ(1, g_once_fn_call_count);
Elliott Hughesc3f11402013-10-30 14:40:09 -0700940}
941
Elliott Hughes3694ec62014-05-14 11:46:08 -0700942static std::string pthread_once_1934122_result = "";
943
944static void Routine2() {
945 pthread_once_1934122_result += "2";
946}
947
948static void Routine1() {
949 pthread_once_t once_control_2 = PTHREAD_ONCE_INIT;
950 pthread_once_1934122_result += "1";
951 pthread_once(&once_control_2, &Routine2);
952}
953
954TEST(pthread, pthread_once_1934122) {
955 // Very old versions of Android couldn't call pthread_once from a
956 // pthread_once init routine. http://b/1934122.
957 pthread_once_t once_control_1 = PTHREAD_ONCE_INIT;
958 ASSERT_EQ(0, pthread_once(&once_control_1, &Routine1));
959 ASSERT_EQ("12", pthread_once_1934122_result);
960}
961
Elliott Hughes1728b232014-05-14 10:02:03 -0700962static int g_atfork_prepare_calls = 0;
Dmitriy Ivanovea295f62014-11-20 20:47:02 -0800963static void AtForkPrepare1() { g_atfork_prepare_calls = (g_atfork_prepare_calls * 10) + 1; }
964static void AtForkPrepare2() { g_atfork_prepare_calls = (g_atfork_prepare_calls * 10) + 2; }
Elliott Hughes1728b232014-05-14 10:02:03 -0700965static int g_atfork_parent_calls = 0;
Dmitriy Ivanovea295f62014-11-20 20:47:02 -0800966static void AtForkParent1() { g_atfork_parent_calls = (g_atfork_parent_calls * 10) + 1; }
967static void AtForkParent2() { g_atfork_parent_calls = (g_atfork_parent_calls * 10) + 2; }
Elliott Hughes1728b232014-05-14 10:02:03 -0700968static int g_atfork_child_calls = 0;
Dmitriy Ivanovea295f62014-11-20 20:47:02 -0800969static void AtForkChild1() { g_atfork_child_calls = (g_atfork_child_calls * 10) + 1; }
970static void AtForkChild2() { g_atfork_child_calls = (g_atfork_child_calls * 10) + 2; }
Elliott Hughesc3f11402013-10-30 14:40:09 -0700971
Dmitriy Ivanov00e37812014-11-20 16:53:47 -0800972TEST(pthread, pthread_atfork_smoke) {
Dmitriy Ivanovcb0443c2015-03-16 14:15:46 -0700973 ASSERT_EQ(0, pthread_atfork(AtForkPrepare1, AtForkParent1, AtForkChild1));
974 ASSERT_EQ(0, pthread_atfork(AtForkPrepare2, AtForkParent2, AtForkChild2));
Elliott Hughesc3f11402013-10-30 14:40:09 -0700975
Dmitriy Ivanovcb0443c2015-03-16 14:15:46 -0700976 int pid = fork();
977 ASSERT_NE(-1, pid) << strerror(errno);
Elliott Hughesc3f11402013-10-30 14:40:09 -0700978
Dmitriy Ivanovcb0443c2015-03-16 14:15:46 -0700979 // Child and parent calls are made in the order they were registered.
980 if (pid == 0) {
Dmitriy Ivanovea295f62014-11-20 20:47:02 -0800981 ASSERT_EQ(12, g_atfork_child_calls);
Dmitriy Ivanovcb0443c2015-03-16 14:15:46 -0700982 _exit(0);
983 }
Dmitriy Ivanovea295f62014-11-20 20:47:02 -0800984 ASSERT_EQ(12, g_atfork_parent_calls);
Elliott Hughesc3f11402013-10-30 14:40:09 -0700985
Dmitriy Ivanovcb0443c2015-03-16 14:15:46 -0700986 // Prepare calls are made in the reverse order.
Dmitriy Ivanovea295f62014-11-20 20:47:02 -0800987 ASSERT_EQ(21, g_atfork_prepare_calls);
988 int status;
989 ASSERT_EQ(pid, waitpid(pid, &status, 0));
990}
991
Elliott Hughesc3f11402013-10-30 14:40:09 -0700992TEST(pthread, pthread_attr_getscope) {
993 pthread_attr_t attr;
994 ASSERT_EQ(0, pthread_attr_init(&attr));
995
996 int scope;
997 ASSERT_EQ(0, pthread_attr_getscope(&attr, &scope));
998 ASSERT_EQ(PTHREAD_SCOPE_SYSTEM, scope);
999}
Narayan Kamath51e6cb32014-03-03 15:38:51 +00001000
1001TEST(pthread, pthread_condattr_init) {
1002 pthread_condattr_t attr;
1003 pthread_condattr_init(&attr);
1004
1005 clockid_t clock;
1006 ASSERT_EQ(0, pthread_condattr_getclock(&attr, &clock));
1007 ASSERT_EQ(CLOCK_REALTIME, clock);
1008
1009 int pshared;
1010 ASSERT_EQ(0, pthread_condattr_getpshared(&attr, &pshared));
1011 ASSERT_EQ(PTHREAD_PROCESS_PRIVATE, pshared);
1012}
1013
1014TEST(pthread, pthread_condattr_setclock) {
1015 pthread_condattr_t attr;
1016 pthread_condattr_init(&attr);
1017
1018 ASSERT_EQ(0, pthread_condattr_setclock(&attr, CLOCK_REALTIME));
1019 clockid_t clock;
1020 ASSERT_EQ(0, pthread_condattr_getclock(&attr, &clock));
1021 ASSERT_EQ(CLOCK_REALTIME, clock);
1022
1023 ASSERT_EQ(0, pthread_condattr_setclock(&attr, CLOCK_MONOTONIC));
1024 ASSERT_EQ(0, pthread_condattr_getclock(&attr, &clock));
1025 ASSERT_EQ(CLOCK_MONOTONIC, clock);
1026
1027 ASSERT_EQ(EINVAL, pthread_condattr_setclock(&attr, CLOCK_PROCESS_CPUTIME_ID));
1028}
1029
1030TEST(pthread, pthread_cond_broadcast__preserves_condattr_flags) {
Yabin Cui32651b82015-03-13 20:30:00 -07001031#if defined(__BIONIC__)
Narayan Kamath51e6cb32014-03-03 15:38:51 +00001032 pthread_condattr_t attr;
1033 pthread_condattr_init(&attr);
1034
1035 ASSERT_EQ(0, pthread_condattr_setclock(&attr, CLOCK_MONOTONIC));
1036 ASSERT_EQ(0, pthread_condattr_setpshared(&attr, PTHREAD_PROCESS_SHARED));
1037
1038 pthread_cond_t cond_var;
1039 ASSERT_EQ(0, pthread_cond_init(&cond_var, &attr));
1040
1041 ASSERT_EQ(0, pthread_cond_signal(&cond_var));
1042 ASSERT_EQ(0, pthread_cond_broadcast(&cond_var));
1043
Yabin Cui32651b82015-03-13 20:30:00 -07001044 attr = static_cast<pthread_condattr_t>(*reinterpret_cast<uint32_t*>(cond_var.__private));
Narayan Kamath51e6cb32014-03-03 15:38:51 +00001045 clockid_t clock;
1046 ASSERT_EQ(0, pthread_condattr_getclock(&attr, &clock));
1047 ASSERT_EQ(CLOCK_MONOTONIC, clock);
1048 int pshared;
1049 ASSERT_EQ(0, pthread_condattr_getpshared(&attr, &pshared));
1050 ASSERT_EQ(PTHREAD_PROCESS_SHARED, pshared);
Yabin Cui32651b82015-03-13 20:30:00 -07001051#else // !defined(__BIONIC__)
1052 GTEST_LOG_(INFO) << "This tests a bionic implementation detail.\n";
1053#endif // !defined(__BIONIC__)
1054}
1055
1056class pthread_CondWakeupTest : public ::testing::Test {
1057 protected:
1058 pthread_mutex_t mutex;
1059 pthread_cond_t cond;
1060
1061 enum Progress {
1062 INITIALIZED,
1063 WAITING,
1064 SIGNALED,
1065 FINISHED,
1066 };
1067 std::atomic<Progress> progress;
1068 pthread_t thread;
1069
1070 protected:
1071 virtual void SetUp() {
1072 ASSERT_EQ(0, pthread_mutex_init(&mutex, NULL));
1073 ASSERT_EQ(0, pthread_cond_init(&cond, NULL));
1074 progress = INITIALIZED;
1075 ASSERT_EQ(0,
1076 pthread_create(&thread, NULL, reinterpret_cast<void* (*)(void*)>(WaitThreadFn), this));
1077 }
1078
1079 virtual void TearDown() {
1080 ASSERT_EQ(0, pthread_join(thread, NULL));
1081 ASSERT_EQ(FINISHED, progress);
1082 ASSERT_EQ(0, pthread_cond_destroy(&cond));
1083 ASSERT_EQ(0, pthread_mutex_destroy(&mutex));
1084 }
1085
1086 void SleepUntilProgress(Progress expected_progress) {
1087 while (progress != expected_progress) {
1088 usleep(5000);
1089 }
1090 usleep(5000);
1091 }
1092
1093 private:
1094 static void WaitThreadFn(pthread_CondWakeupTest* test) {
1095 ASSERT_EQ(0, pthread_mutex_lock(&test->mutex));
1096 test->progress = WAITING;
1097 while (test->progress == WAITING) {
1098 ASSERT_EQ(0, pthread_cond_wait(&test->cond, &test->mutex));
1099 }
1100 ASSERT_EQ(SIGNALED, test->progress);
1101 test->progress = FINISHED;
1102 ASSERT_EQ(0, pthread_mutex_unlock(&test->mutex));
1103 }
1104};
1105
1106TEST_F(pthread_CondWakeupTest, signal) {
1107 SleepUntilProgress(WAITING);
1108 progress = SIGNALED;
1109 pthread_cond_signal(&cond);
1110}
1111
1112TEST_F(pthread_CondWakeupTest, broadcast) {
1113 SleepUntilProgress(WAITING);
1114 progress = SIGNALED;
1115 pthread_cond_broadcast(&cond);
Narayan Kamath51e6cb32014-03-03 15:38:51 +00001116}
Elliott Hughes0e714a52014-03-03 16:42:47 -08001117
1118TEST(pthread, pthread_mutex_timedlock) {
1119 pthread_mutex_t m;
1120 ASSERT_EQ(0, pthread_mutex_init(&m, NULL));
1121
1122 // If the mutex is already locked, pthread_mutex_timedlock should time out.
1123 ASSERT_EQ(0, pthread_mutex_lock(&m));
1124
1125 timespec ts;
1126 ASSERT_EQ(0, clock_gettime(CLOCK_REALTIME, &ts));
1127 ts.tv_nsec += 1;
1128 ASSERT_EQ(ETIMEDOUT, pthread_mutex_timedlock(&m, &ts));
1129
1130 // If the mutex is unlocked, pthread_mutex_timedlock should succeed.
1131 ASSERT_EQ(0, pthread_mutex_unlock(&m));
1132
1133 ASSERT_EQ(0, clock_gettime(CLOCK_REALTIME, &ts));
1134 ts.tv_nsec += 1;
1135 ASSERT_EQ(0, pthread_mutex_timedlock(&m, &ts));
1136
1137 ASSERT_EQ(0, pthread_mutex_unlock(&m));
1138 ASSERT_EQ(0, pthread_mutex_destroy(&m));
1139}
Elliott Hughes57b7a612014-08-25 17:26:50 -07001140
1141TEST(pthread, pthread_attr_getstack__main_thread) {
1142 // This test is only meaningful for the main thread, so make sure we're running on it!
1143 ASSERT_EQ(getpid(), syscall(__NR_gettid));
1144
1145 // Get the main thread's attributes.
1146 pthread_attr_t attributes;
1147 ASSERT_EQ(0, pthread_getattr_np(pthread_self(), &attributes));
1148
1149 // Check that we correctly report that the main thread has no guard page.
1150 size_t guard_size;
1151 ASSERT_EQ(0, pthread_attr_getguardsize(&attributes, &guard_size));
1152 ASSERT_EQ(0U, guard_size); // The main thread has no guard page.
1153
1154 // Get the stack base and the stack size (both ways).
1155 void* stack_base;
1156 size_t stack_size;
1157 ASSERT_EQ(0, pthread_attr_getstack(&attributes, &stack_base, &stack_size));
1158 size_t stack_size2;
1159 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size2));
1160
1161 // The two methods of asking for the stack size should agree.
1162 EXPECT_EQ(stack_size, stack_size2);
1163
Yabin Cuib0c6f2db2015-05-19 15:09:23 -07001164#if defined(__BIONIC__)
Elliott Hughes57b7a612014-08-25 17:26:50 -07001165 // What does /proc/self/maps' [stack] line say?
Elliott Hughes9e4ffa72014-08-27 15:32:01 -07001166 void* maps_stack_hi = NULL;
Elliott Hughes15dfd632015-09-22 16:40:14 -07001167 std::vector<map_record> maps;
1168 ASSERT_TRUE(Maps::parse_maps(&maps));
Elliott Hughes0b2acdf2015-10-02 18:25:19 -07001169 for (const auto& map : maps) {
Elliott Hughes15dfd632015-09-22 16:40:14 -07001170 if (map.pathname == "[stack]") {
1171 maps_stack_hi = reinterpret_cast<void*>(map.addr_end);
Elliott Hughes57b7a612014-08-25 17:26:50 -07001172 break;
1173 }
1174 }
Elliott Hughes57b7a612014-08-25 17:26:50 -07001175
Yabin Cuib0c6f2db2015-05-19 15:09:23 -07001176 // The high address of the /proc/self/maps [stack] region should equal stack_base + stack_size.
1177 // Remember that the stack grows down (and is mapped in on demand), so the low address of the
1178 // region isn't very interesting.
1179 EXPECT_EQ(maps_stack_hi, reinterpret_cast<uint8_t*>(stack_base) + stack_size);
1180
Elliott Hughes9e4ffa72014-08-27 15:32:01 -07001181 // The stack size should correspond to RLIMIT_STACK.
Elliott Hughes57b7a612014-08-25 17:26:50 -07001182 rlimit rl;
Elliott Hughes9e4ffa72014-08-27 15:32:01 -07001183 ASSERT_EQ(0, getrlimit(RLIMIT_STACK, &rl));
Elliott Hughes27a9aed2014-09-04 16:09:25 -07001184 uint64_t original_rlim_cur = rl.rlim_cur;
Elliott Hughes27a9aed2014-09-04 16:09:25 -07001185 if (rl.rlim_cur == RLIM_INFINITY) {
1186 rl.rlim_cur = 8 * 1024 * 1024; // Bionic reports unlimited stacks as 8MiB.
1187 }
Elliott Hughes9e4ffa72014-08-27 15:32:01 -07001188 EXPECT_EQ(rl.rlim_cur, stack_size);
1189
Dmitriy Ivanovd9ff7222014-09-08 16:22:22 -07001190 auto guard = make_scope_guard([&rl, original_rlim_cur]() {
Elliott Hughes27a9aed2014-09-04 16:09:25 -07001191 rl.rlim_cur = original_rlim_cur;
1192 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1193 });
1194
Elliott Hughes9e4ffa72014-08-27 15:32:01 -07001195 //
1196 // What if RLIMIT_STACK is smaller than the stack's current extent?
1197 //
Elliott Hughes57b7a612014-08-25 17:26:50 -07001198 rl.rlim_cur = rl.rlim_max = 1024; // 1KiB. We know the stack must be at least a page already.
1199 rl.rlim_max = RLIM_INFINITY;
1200 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1201
1202 ASSERT_EQ(0, pthread_getattr_np(pthread_self(), &attributes));
1203 ASSERT_EQ(0, pthread_attr_getstack(&attributes, &stack_base, &stack_size));
1204 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size2));
1205
1206 EXPECT_EQ(stack_size, stack_size2);
1207 ASSERT_EQ(1024U, stack_size);
1208
1209 //
Elliott Hughes9e4ffa72014-08-27 15:32:01 -07001210 // What if RLIMIT_STACK isn't a whole number of pages?
Elliott Hughes57b7a612014-08-25 17:26:50 -07001211 //
1212 rl.rlim_cur = rl.rlim_max = 6666; // Not a whole number of pages.
1213 rl.rlim_max = RLIM_INFINITY;
1214 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1215
1216 ASSERT_EQ(0, pthread_getattr_np(pthread_self(), &attributes));
1217 ASSERT_EQ(0, pthread_attr_getstack(&attributes, &stack_base, &stack_size));
1218 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size2));
1219
1220 EXPECT_EQ(stack_size, stack_size2);
1221 ASSERT_EQ(6666U, stack_size);
Yabin Cuib0c6f2db2015-05-19 15:09:23 -07001222#endif
Elliott Hughes57b7a612014-08-25 17:26:50 -07001223}
Elliott Hughes8fb639c2014-09-12 14:43:07 -07001224
Mor-sarid, Nitzan56933322015-09-11 05:31:36 +00001225struct GetStackSignalHandlerArg {
1226 volatile bool done;
1227 void* signal_handler_sp;
1228 void* main_stack_base;
1229 size_t main_stack_size;
1230};
1231
1232static GetStackSignalHandlerArg getstack_signal_handler_arg;
1233
1234static void getstack_signal_handler(int sig) {
1235 ASSERT_EQ(SIGUSR1, sig);
1236 // Use sleep() to make current thread be switched out by the kernel to provoke the error.
1237 sleep(1);
1238 pthread_attr_t attr;
1239 ASSERT_EQ(0, pthread_getattr_np(pthread_self(), &attr));
1240 void* stack_base;
1241 size_t stack_size;
1242 ASSERT_EQ(0, pthread_attr_getstack(&attr, &stack_base, &stack_size));
1243 getstack_signal_handler_arg.signal_handler_sp = &attr;
1244 getstack_signal_handler_arg.main_stack_base = stack_base;
1245 getstack_signal_handler_arg.main_stack_size = stack_size;
1246 getstack_signal_handler_arg.done = true;
1247}
1248
1249// The previous code obtained the main thread's stack by reading the entry in
1250// /proc/self/task/<pid>/maps that was labeled [stack]. Unfortunately, on x86/x86_64, the kernel
1251// relies on sp0 in task state segment(tss) to label the stack map with [stack]. If the kernel
1252// switches a process while the main thread is in an alternate stack, then the kernel will label
1253// the wrong map with [stack]. This test verifies that when the above situation happens, the main
1254// thread's stack is found correctly.
1255TEST(pthread, pthread_attr_getstack_in_signal_handler) {
1256 const size_t sig_stack_size = 16 * 1024;
1257 void* sig_stack = mmap(NULL, sig_stack_size, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS,
1258 -1, 0);
1259 ASSERT_NE(MAP_FAILED, sig_stack);
1260 stack_t ss;
1261 ss.ss_sp = sig_stack;
1262 ss.ss_size = sig_stack_size;
1263 ss.ss_flags = 0;
1264 stack_t oss;
1265 ASSERT_EQ(0, sigaltstack(&ss, &oss));
1266
1267 ScopedSignalHandler handler(SIGUSR1, getstack_signal_handler, SA_ONSTACK);
1268 getstack_signal_handler_arg.done = false;
1269 kill(getpid(), SIGUSR1);
1270 ASSERT_EQ(true, getstack_signal_handler_arg.done);
1271
1272 // Verify if the stack used by the signal handler is the alternate stack just registered.
1273 ASSERT_LE(sig_stack, getstack_signal_handler_arg.signal_handler_sp);
1274 ASSERT_GE(reinterpret_cast<char*>(sig_stack) + sig_stack_size,
1275 getstack_signal_handler_arg.signal_handler_sp);
1276
1277 // Verify if the main thread's stack got in the signal handler is correct.
1278 ASSERT_LE(getstack_signal_handler_arg.main_stack_base, &ss);
1279 ASSERT_GE(reinterpret_cast<char*>(getstack_signal_handler_arg.main_stack_base) +
1280 getstack_signal_handler_arg.main_stack_size, reinterpret_cast<void*>(&ss));
1281
1282 ASSERT_EQ(0, sigaltstack(&oss, nullptr));
1283 ASSERT_EQ(0, munmap(sig_stack, sig_stack_size));
1284}
1285
Yabin Cui917d3902015-01-08 12:32:42 -08001286static void pthread_attr_getstack_18908062_helper(void*) {
1287 char local_variable;
1288 pthread_attr_t attributes;
1289 pthread_getattr_np(pthread_self(), &attributes);
1290 void* stack_base;
1291 size_t stack_size;
1292 pthread_attr_getstack(&attributes, &stack_base, &stack_size);
1293
1294 // Test whether &local_variable is in [stack_base, stack_base + stack_size).
1295 ASSERT_LE(reinterpret_cast<char*>(stack_base), &local_variable);
1296 ASSERT_LT(&local_variable, reinterpret_cast<char*>(stack_base) + stack_size);
1297}
1298
1299// Check whether something on stack is in the range of
1300// [stack_base, stack_base + stack_size). see b/18908062.
1301TEST(pthread, pthread_attr_getstack_18908062) {
1302 pthread_t t;
1303 ASSERT_EQ(0, pthread_create(&t, NULL,
1304 reinterpret_cast<void* (*)(void*)>(pthread_attr_getstack_18908062_helper),
1305 NULL));
1306 pthread_join(t, NULL);
1307}
1308
Elliott Hughes8fb639c2014-09-12 14:43:07 -07001309#if defined(__BIONIC__)
Elliott Hughesf2083612015-11-11 13:32:28 -08001310static pthread_mutex_t pthread_gettid_np_mutex = PTHREAD_MUTEX_INITIALIZER;
1311
Elliott Hughes8fb639c2014-09-12 14:43:07 -07001312static void* pthread_gettid_np_helper(void* arg) {
1313 *reinterpret_cast<pid_t*>(arg) = gettid();
Elliott Hughesf2083612015-11-11 13:32:28 -08001314
1315 // Wait for our parent to call pthread_gettid_np on us before exiting.
1316 pthread_mutex_lock(&pthread_gettid_np_mutex);
1317 pthread_mutex_unlock(&pthread_gettid_np_mutex);
Elliott Hughes8fb639c2014-09-12 14:43:07 -07001318 return NULL;
1319}
1320#endif
1321
1322TEST(pthread, pthread_gettid_np) {
1323#if defined(__BIONIC__)
1324 ASSERT_EQ(gettid(), pthread_gettid_np(pthread_self()));
1325
Elliott Hughesf2083612015-11-11 13:32:28 -08001326 // Ensure the other thread doesn't exit until after we've called
1327 // pthread_gettid_np on it.
1328 pthread_mutex_lock(&pthread_gettid_np_mutex);
1329
Elliott Hughes8fb639c2014-09-12 14:43:07 -07001330 pid_t t_gettid_result;
1331 pthread_t t;
1332 pthread_create(&t, NULL, pthread_gettid_np_helper, &t_gettid_result);
1333
1334 pid_t t_pthread_gettid_np_result = pthread_gettid_np(t);
1335
Elliott Hughesf2083612015-11-11 13:32:28 -08001336 // Release the other thread and wait for it to exit.
1337 pthread_mutex_unlock(&pthread_gettid_np_mutex);
Elliott Hughes34c987a2014-09-22 16:01:26 -07001338 pthread_join(t, NULL);
Elliott Hughes8fb639c2014-09-12 14:43:07 -07001339
1340 ASSERT_EQ(t_gettid_result, t_pthread_gettid_np_result);
1341#else
1342 GTEST_LOG_(INFO) << "This test does nothing.\n";
1343#endif
1344}
Elliott Hughes34c987a2014-09-22 16:01:26 -07001345
1346static size_t cleanup_counter = 0;
1347
Derek Xue41996952014-09-25 11:05:32 +01001348static void AbortCleanupRoutine(void*) {
Elliott Hughes34c987a2014-09-22 16:01:26 -07001349 abort();
1350}
1351
Derek Xue41996952014-09-25 11:05:32 +01001352static void CountCleanupRoutine(void*) {
Elliott Hughes34c987a2014-09-22 16:01:26 -07001353 ++cleanup_counter;
1354}
1355
Derek Xue41996952014-09-25 11:05:32 +01001356static void PthreadCleanupTester() {
Elliott Hughes34c987a2014-09-22 16:01:26 -07001357 pthread_cleanup_push(CountCleanupRoutine, NULL);
1358 pthread_cleanup_push(CountCleanupRoutine, NULL);
1359 pthread_cleanup_push(AbortCleanupRoutine, NULL);
1360
1361 pthread_cleanup_pop(0); // Pop the abort without executing it.
1362 pthread_cleanup_pop(1); // Pop one count while executing it.
1363 ASSERT_EQ(1U, cleanup_counter);
1364 // Exit while the other count is still on the cleanup stack.
1365 pthread_exit(NULL);
1366
1367 // Calls to pthread_cleanup_pop/pthread_cleanup_push must always be balanced.
1368 pthread_cleanup_pop(0);
1369}
1370
Derek Xue41996952014-09-25 11:05:32 +01001371static void* PthreadCleanupStartRoutine(void*) {
Elliott Hughes34c987a2014-09-22 16:01:26 -07001372 PthreadCleanupTester();
1373 return NULL;
1374}
1375
1376TEST(pthread, pthread_cleanup_push__pthread_cleanup_pop) {
1377 pthread_t t;
1378 ASSERT_EQ(0, pthread_create(&t, NULL, PthreadCleanupStartRoutine, NULL));
1379 pthread_join(t, NULL);
1380 ASSERT_EQ(2U, cleanup_counter);
1381}
Derek Xue41996952014-09-25 11:05:32 +01001382
1383TEST(pthread, PTHREAD_MUTEX_DEFAULT_is_PTHREAD_MUTEX_NORMAL) {
1384 ASSERT_EQ(PTHREAD_MUTEX_NORMAL, PTHREAD_MUTEX_DEFAULT);
1385}
1386
1387TEST(pthread, pthread_mutexattr_gettype) {
1388 pthread_mutexattr_t attr;
1389 ASSERT_EQ(0, pthread_mutexattr_init(&attr));
1390
1391 int attr_type;
1392
1393 ASSERT_EQ(0, pthread_mutexattr_settype(&attr, PTHREAD_MUTEX_NORMAL));
1394 ASSERT_EQ(0, pthread_mutexattr_gettype(&attr, &attr_type));
1395 ASSERT_EQ(PTHREAD_MUTEX_NORMAL, attr_type);
1396
1397 ASSERT_EQ(0, pthread_mutexattr_settype(&attr, PTHREAD_MUTEX_ERRORCHECK));
1398 ASSERT_EQ(0, pthread_mutexattr_gettype(&attr, &attr_type));
1399 ASSERT_EQ(PTHREAD_MUTEX_ERRORCHECK, attr_type);
1400
1401 ASSERT_EQ(0, pthread_mutexattr_settype(&attr, PTHREAD_MUTEX_RECURSIVE));
1402 ASSERT_EQ(0, pthread_mutexattr_gettype(&attr, &attr_type));
1403 ASSERT_EQ(PTHREAD_MUTEX_RECURSIVE, attr_type);
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08001404
1405 ASSERT_EQ(0, pthread_mutexattr_destroy(&attr));
1406}
1407
Yabin Cui17393b02015-03-21 15:08:25 -07001408struct PthreadMutex {
1409 pthread_mutex_t lock;
1410
1411 PthreadMutex(int mutex_type) {
1412 init(mutex_type);
1413 }
1414
1415 ~PthreadMutex() {
1416 destroy();
1417 }
1418
1419 private:
1420 void init(int mutex_type) {
1421 pthread_mutexattr_t attr;
1422 ASSERT_EQ(0, pthread_mutexattr_init(&attr));
1423 ASSERT_EQ(0, pthread_mutexattr_settype(&attr, mutex_type));
1424 ASSERT_EQ(0, pthread_mutex_init(&lock, &attr));
1425 ASSERT_EQ(0, pthread_mutexattr_destroy(&attr));
1426 }
1427
1428 void destroy() {
1429 ASSERT_EQ(0, pthread_mutex_destroy(&lock));
1430 }
1431
1432 DISALLOW_COPY_AND_ASSIGN(PthreadMutex);
1433};
Derek Xue41996952014-09-25 11:05:32 +01001434
1435TEST(pthread, pthread_mutex_lock_NORMAL) {
Yabin Cui17393b02015-03-21 15:08:25 -07001436 PthreadMutex m(PTHREAD_MUTEX_NORMAL);
Derek Xue41996952014-09-25 11:05:32 +01001437
Yabin Cui17393b02015-03-21 15:08:25 -07001438 ASSERT_EQ(0, pthread_mutex_lock(&m.lock));
1439 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
Derek Xue41996952014-09-25 11:05:32 +01001440}
1441
1442TEST(pthread, pthread_mutex_lock_ERRORCHECK) {
Yabin Cui17393b02015-03-21 15:08:25 -07001443 PthreadMutex m(PTHREAD_MUTEX_ERRORCHECK);
Derek Xue41996952014-09-25 11:05:32 +01001444
Yabin Cui17393b02015-03-21 15:08:25 -07001445 ASSERT_EQ(0, pthread_mutex_lock(&m.lock));
1446 ASSERT_EQ(EDEADLK, pthread_mutex_lock(&m.lock));
1447 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
1448 ASSERT_EQ(0, pthread_mutex_trylock(&m.lock));
1449 ASSERT_EQ(EBUSY, pthread_mutex_trylock(&m.lock));
1450 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
1451 ASSERT_EQ(EPERM, pthread_mutex_unlock(&m.lock));
Derek Xue41996952014-09-25 11:05:32 +01001452}
1453
1454TEST(pthread, pthread_mutex_lock_RECURSIVE) {
Yabin Cui17393b02015-03-21 15:08:25 -07001455 PthreadMutex m(PTHREAD_MUTEX_RECURSIVE);
Derek Xue41996952014-09-25 11:05:32 +01001456
Yabin Cui17393b02015-03-21 15:08:25 -07001457 ASSERT_EQ(0, pthread_mutex_lock(&m.lock));
1458 ASSERT_EQ(0, pthread_mutex_lock(&m.lock));
1459 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
1460 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
1461 ASSERT_EQ(0, pthread_mutex_trylock(&m.lock));
1462 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
1463 ASSERT_EQ(EPERM, pthread_mutex_unlock(&m.lock));
1464}
1465
1466TEST(pthread, pthread_mutex_init_same_as_static_initializers) {
1467 pthread_mutex_t lock_normal = PTHREAD_MUTEX_INITIALIZER;
1468 PthreadMutex m1(PTHREAD_MUTEX_NORMAL);
1469 ASSERT_EQ(0, memcmp(&lock_normal, &m1.lock, sizeof(pthread_mutex_t)));
1470 pthread_mutex_destroy(&lock_normal);
1471
1472 pthread_mutex_t lock_errorcheck = PTHREAD_ERRORCHECK_MUTEX_INITIALIZER_NP;
1473 PthreadMutex m2(PTHREAD_MUTEX_ERRORCHECK);
1474 ASSERT_EQ(0, memcmp(&lock_errorcheck, &m2.lock, sizeof(pthread_mutex_t)));
1475 pthread_mutex_destroy(&lock_errorcheck);
1476
1477 pthread_mutex_t lock_recursive = PTHREAD_RECURSIVE_MUTEX_INITIALIZER_NP;
1478 PthreadMutex m3(PTHREAD_MUTEX_RECURSIVE);
1479 ASSERT_EQ(0, memcmp(&lock_recursive, &m3.lock, sizeof(pthread_mutex_t)));
1480 ASSERT_EQ(0, pthread_mutex_destroy(&lock_recursive));
Derek Xue41996952014-09-25 11:05:32 +01001481}
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08001482class MutexWakeupHelper {
1483 private:
Yabin Cui17393b02015-03-21 15:08:25 -07001484 PthreadMutex m;
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08001485 enum Progress {
1486 LOCK_INITIALIZED,
1487 LOCK_WAITING,
1488 LOCK_RELEASED,
1489 LOCK_ACCESSED
1490 };
1491 std::atomic<Progress> progress;
Yabin Cuif7969852015-04-02 17:47:48 -07001492 std::atomic<pid_t> tid;
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08001493
1494 static void thread_fn(MutexWakeupHelper* helper) {
Yabin Cuif7969852015-04-02 17:47:48 -07001495 helper->tid = gettid();
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08001496 ASSERT_EQ(LOCK_INITIALIZED, helper->progress);
1497 helper->progress = LOCK_WAITING;
1498
Yabin Cui17393b02015-03-21 15:08:25 -07001499 ASSERT_EQ(0, pthread_mutex_lock(&helper->m.lock));
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08001500 ASSERT_EQ(LOCK_RELEASED, helper->progress);
Yabin Cui17393b02015-03-21 15:08:25 -07001501 ASSERT_EQ(0, pthread_mutex_unlock(&helper->m.lock));
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08001502
1503 helper->progress = LOCK_ACCESSED;
1504 }
1505
1506 public:
Yabin Cui17393b02015-03-21 15:08:25 -07001507 MutexWakeupHelper(int mutex_type) : m(mutex_type) {
1508 }
1509
1510 void test() {
1511 ASSERT_EQ(0, pthread_mutex_lock(&m.lock));
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08001512 progress = LOCK_INITIALIZED;
Yabin Cuif7969852015-04-02 17:47:48 -07001513 tid = 0;
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08001514
1515 pthread_t thread;
1516 ASSERT_EQ(0, pthread_create(&thread, NULL,
1517 reinterpret_cast<void* (*)(void*)>(MutexWakeupHelper::thread_fn), this));
1518
Yabin Cuif7969852015-04-02 17:47:48 -07001519 WaitUntilThreadSleep(tid);
1520 ASSERT_EQ(LOCK_WAITING, progress);
1521
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08001522 progress = LOCK_RELEASED;
Yabin Cui17393b02015-03-21 15:08:25 -07001523 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08001524
1525 ASSERT_EQ(0, pthread_join(thread, NULL));
1526 ASSERT_EQ(LOCK_ACCESSED, progress);
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08001527 }
1528};
1529
1530TEST(pthread, pthread_mutex_NORMAL_wakeup) {
Yabin Cui17393b02015-03-21 15:08:25 -07001531 MutexWakeupHelper helper(PTHREAD_MUTEX_NORMAL);
1532 helper.test();
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08001533}
1534
1535TEST(pthread, pthread_mutex_ERRORCHECK_wakeup) {
Yabin Cui17393b02015-03-21 15:08:25 -07001536 MutexWakeupHelper helper(PTHREAD_MUTEX_ERRORCHECK);
1537 helper.test();
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08001538}
1539
1540TEST(pthread, pthread_mutex_RECURSIVE_wakeup) {
Yabin Cui17393b02015-03-21 15:08:25 -07001541 MutexWakeupHelper helper(PTHREAD_MUTEX_RECURSIVE);
1542 helper.test();
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08001543}
1544
Yabin Cui140f3672015-02-03 10:32:00 -08001545TEST(pthread, pthread_mutex_owner_tid_limit) {
Yabin Cuie69c2452015-02-13 16:21:25 -08001546#if defined(__BIONIC__) && !defined(__LP64__)
Yabin Cui140f3672015-02-03 10:32:00 -08001547 FILE* fp = fopen("/proc/sys/kernel/pid_max", "r");
1548 ASSERT_TRUE(fp != NULL);
1549 long pid_max;
1550 ASSERT_EQ(1, fscanf(fp, "%ld", &pid_max));
1551 fclose(fp);
Yabin Cuie69c2452015-02-13 16:21:25 -08001552 // Bionic's pthread_mutex implementation on 32-bit devices uses 16 bits to represent owner tid.
Yabin Cui140f3672015-02-03 10:32:00 -08001553 ASSERT_LE(pid_max, 65536);
Yabin Cuie69c2452015-02-13 16:21:25 -08001554#else
1555 GTEST_LOG_(INFO) << "This test does nothing as 32-bit tid is supported by pthread_mutex.\n";
1556#endif
Yabin Cui140f3672015-02-03 10:32:00 -08001557}
Yabin Cuib5845722015-03-16 22:46:42 -07001558
1559class StrictAlignmentAllocator {
1560 public:
1561 void* allocate(size_t size, size_t alignment) {
1562 char* p = new char[size + alignment * 2];
1563 allocated_array.push_back(p);
1564 while (!is_strict_aligned(p, alignment)) {
1565 ++p;
1566 }
1567 return p;
1568 }
1569
1570 ~StrictAlignmentAllocator() {
Elliott Hughes0b2acdf2015-10-02 18:25:19 -07001571 for (const auto& p : allocated_array) {
1572 delete[] p;
Yabin Cuib5845722015-03-16 22:46:42 -07001573 }
1574 }
1575
1576 private:
1577 bool is_strict_aligned(char* p, size_t alignment) {
1578 return (reinterpret_cast<uintptr_t>(p) % (alignment * 2)) == alignment;
1579 }
1580
1581 std::vector<char*> allocated_array;
1582};
1583
1584TEST(pthread, pthread_types_allow_four_bytes_alignment) {
1585#if defined(__BIONIC__)
1586 // For binary compatibility with old version, we need to allow 4-byte aligned data for pthread types.
1587 StrictAlignmentAllocator allocator;
1588 pthread_mutex_t* mutex = reinterpret_cast<pthread_mutex_t*>(
1589 allocator.allocate(sizeof(pthread_mutex_t), 4));
1590 ASSERT_EQ(0, pthread_mutex_init(mutex, NULL));
1591 ASSERT_EQ(0, pthread_mutex_lock(mutex));
1592 ASSERT_EQ(0, pthread_mutex_unlock(mutex));
1593 ASSERT_EQ(0, pthread_mutex_destroy(mutex));
1594
1595 pthread_cond_t* cond = reinterpret_cast<pthread_cond_t*>(
1596 allocator.allocate(sizeof(pthread_cond_t), 4));
1597 ASSERT_EQ(0, pthread_cond_init(cond, NULL));
1598 ASSERT_EQ(0, pthread_cond_signal(cond));
1599 ASSERT_EQ(0, pthread_cond_broadcast(cond));
1600 ASSERT_EQ(0, pthread_cond_destroy(cond));
1601
1602 pthread_rwlock_t* rwlock = reinterpret_cast<pthread_rwlock_t*>(
1603 allocator.allocate(sizeof(pthread_rwlock_t), 4));
1604 ASSERT_EQ(0, pthread_rwlock_init(rwlock, NULL));
1605 ASSERT_EQ(0, pthread_rwlock_rdlock(rwlock));
1606 ASSERT_EQ(0, pthread_rwlock_unlock(rwlock));
1607 ASSERT_EQ(0, pthread_rwlock_wrlock(rwlock));
1608 ASSERT_EQ(0, pthread_rwlock_unlock(rwlock));
1609 ASSERT_EQ(0, pthread_rwlock_destroy(rwlock));
1610
1611#else
1612 GTEST_LOG_(INFO) << "This test tests bionic implementation details.";
1613#endif
1614}
Christopher Ferris60907c72015-06-09 18:46:15 -07001615
1616TEST(pthread, pthread_mutex_lock_null_32) {
1617#if defined(__BIONIC__) && !defined(__LP64__)
1618 ASSERT_EQ(EINVAL, pthread_mutex_lock(NULL));
1619#else
1620 GTEST_LOG_(INFO) << "This test tests bionic implementation details on 32 bit devices.";
1621#endif
1622}
1623
1624TEST(pthread, pthread_mutex_unlock_null_32) {
1625#if defined(__BIONIC__) && !defined(__LP64__)
1626 ASSERT_EQ(EINVAL, pthread_mutex_unlock(NULL));
1627#else
1628 GTEST_LOG_(INFO) << "This test tests bionic implementation details on 32 bit devices.";
1629#endif
1630}
1631
1632TEST_F(pthread_DeathTest, pthread_mutex_lock_null_64) {
1633#if defined(__BIONIC__) && defined(__LP64__)
1634 pthread_mutex_t* null_value = nullptr;
1635 ASSERT_EXIT(pthread_mutex_lock(null_value), testing::KilledBySignal(SIGSEGV), "");
1636#else
1637 GTEST_LOG_(INFO) << "This test tests bionic implementation details on 64 bit devices.";
1638#endif
1639}
1640
1641TEST_F(pthread_DeathTest, pthread_mutex_unlock_null_64) {
1642#if defined(__BIONIC__) && defined(__LP64__)
1643 pthread_mutex_t* null_value = nullptr;
1644 ASSERT_EXIT(pthread_mutex_unlock(null_value), testing::KilledBySignal(SIGSEGV), "");
1645#else
1646 GTEST_LOG_(INFO) << "This test tests bionic implementation details on 64 bit devices.";
1647#endif
1648}
Yabin Cui33ac04a2015-09-22 11:16:15 -07001649
1650extern _Unwind_Reason_Code FrameCounter(_Unwind_Context* ctx, void* arg);
1651
1652static volatile bool signal_handler_on_altstack_done;
1653
1654static void SignalHandlerOnAltStack(int signo, siginfo_t*, void*) {
1655 ASSERT_EQ(SIGUSR1, signo);
1656 // Check if we have enough stack space for unwinding.
1657 int count = 0;
1658 _Unwind_Backtrace(FrameCounter, &count);
1659 ASSERT_GT(count, 0);
1660 // Check if we have enough stack space for logging.
1661 std::string s(2048, '*');
1662 GTEST_LOG_(INFO) << s;
1663 signal_handler_on_altstack_done = true;
1664}
1665
1666TEST(pthread, big_enough_signal_stack_for_64bit_arch) {
1667 signal_handler_on_altstack_done = false;
1668 ScopedSignalHandler handler(SIGUSR1, SignalHandlerOnAltStack, SA_SIGINFO | SA_ONSTACK);
1669 kill(getpid(), SIGUSR1);
1670 ASSERT_TRUE(signal_handler_on_altstack_done);
1671}
Yabin Cuie7c2fff2015-11-05 22:06:09 -08001672
1673TEST(pthread, pthread_barrierattr_smoke) {
1674 pthread_barrierattr_t attr;
1675 ASSERT_EQ(0, pthread_barrierattr_init(&attr));
1676 int pshared;
1677 ASSERT_EQ(0, pthread_barrierattr_getpshared(&attr, &pshared));
1678 ASSERT_EQ(PTHREAD_PROCESS_PRIVATE, pshared);
1679 ASSERT_EQ(0, pthread_barrierattr_setpshared(&attr, PTHREAD_PROCESS_SHARED));
1680 ASSERT_EQ(0, pthread_barrierattr_getpshared(&attr, &pshared));
1681 ASSERT_EQ(PTHREAD_PROCESS_SHARED, pshared);
1682 ASSERT_EQ(0, pthread_barrierattr_destroy(&attr));
1683}
1684
1685struct BarrierTestHelperArg {
1686 std::atomic<pid_t> tid;
1687 pthread_barrier_t* barrier;
1688 size_t iteration_count;
1689};
1690
1691static void BarrierTestHelper(BarrierTestHelperArg* arg) {
1692 arg->tid = gettid();
1693 for (size_t i = 0; i < arg->iteration_count; ++i) {
1694 ASSERT_EQ(0, pthread_barrier_wait(arg->barrier));
1695 }
1696}
1697
1698TEST(pthread, pthread_barrier_smoke) {
1699 const size_t BARRIER_ITERATION_COUNT = 10;
1700 const size_t BARRIER_THREAD_COUNT = 10;
1701 pthread_barrier_t barrier;
1702 ASSERT_EQ(0, pthread_barrier_init(&barrier, nullptr, BARRIER_THREAD_COUNT + 1));
1703 std::vector<pthread_t> threads(BARRIER_THREAD_COUNT);
1704 std::vector<BarrierTestHelperArg> args(threads.size());
1705 for (size_t i = 0; i < threads.size(); ++i) {
1706 args[i].tid = 0;
1707 args[i].barrier = &barrier;
1708 args[i].iteration_count = BARRIER_ITERATION_COUNT;
1709 ASSERT_EQ(0, pthread_create(&threads[i], nullptr,
1710 reinterpret_cast<void* (*)(void*)>(BarrierTestHelper), &args[i]));
1711 }
1712 for (size_t iteration = 0; iteration < BARRIER_ITERATION_COUNT; ++iteration) {
1713 for (size_t i = 0; i < threads.size(); ++i) {
1714 WaitUntilThreadSleep(args[i].tid);
1715 }
1716 ASSERT_EQ(PTHREAD_BARRIER_SERIAL_THREAD, pthread_barrier_wait(&barrier));
1717 }
1718 for (size_t i = 0; i < threads.size(); ++i) {
1719 ASSERT_EQ(0, pthread_join(threads[i], nullptr));
1720 }
1721 ASSERT_EQ(0, pthread_barrier_destroy(&barrier));
1722}
1723
1724TEST(pthread, pthread_barrier_destroy) {
1725 pthread_barrier_t barrier;
1726 ASSERT_EQ(0, pthread_barrier_init(&barrier, nullptr, 2));
1727 pthread_t thread;
1728 BarrierTestHelperArg arg;
1729 arg.tid = 0;
1730 arg.barrier = &barrier;
1731 arg.iteration_count = 1;
1732 ASSERT_EQ(0, pthread_create(&thread, nullptr,
1733 reinterpret_cast<void* (*)(void*)>(BarrierTestHelper), &arg));
1734 WaitUntilThreadSleep(arg.tid);
1735 ASSERT_EQ(EBUSY, pthread_barrier_destroy(&barrier));
1736 ASSERT_EQ(PTHREAD_BARRIER_SERIAL_THREAD, pthread_barrier_wait(&barrier));
1737 // Verify if the barrier can be destroyed directly after pthread_barrier_wait().
1738 ASSERT_EQ(0, pthread_barrier_destroy(&barrier));
1739 ASSERT_EQ(0, pthread_join(thread, nullptr));
1740#if defined(__BIONIC__)
1741 ASSERT_EQ(EINVAL, pthread_barrier_destroy(&barrier));
1742#endif
1743}
1744
1745struct BarrierOrderingTestHelperArg {
1746 pthread_barrier_t* barrier;
1747 size_t* array;
1748 size_t array_length;
1749 size_t id;
1750};
1751
1752void BarrierOrderingTestHelper(BarrierOrderingTestHelperArg* arg) {
1753 const size_t ITERATION_COUNT = 10000;
1754 for (size_t i = 1; i <= ITERATION_COUNT; ++i) {
1755 arg->array[arg->id] = i;
1756 int ret = pthread_barrier_wait(arg->barrier);
1757 ASSERT_TRUE(ret == 0 || ret == PTHREAD_BARRIER_SERIAL_THREAD);
1758 for (size_t j = 0; j < arg->array_length; ++j) {
1759 ASSERT_EQ(i, arg->array[j]);
1760 }
1761 ret = pthread_barrier_wait(arg->barrier);
1762 ASSERT_TRUE(ret == 0 || ret == PTHREAD_BARRIER_SERIAL_THREAD);
1763 }
1764}
1765
1766TEST(pthread, pthread_barrier_check_ordering) {
1767 const size_t THREAD_COUNT = 4;
1768 pthread_barrier_t barrier;
1769 ASSERT_EQ(0, pthread_barrier_init(&barrier, nullptr, THREAD_COUNT));
1770 size_t array[THREAD_COUNT];
1771 std::vector<pthread_t> threads(THREAD_COUNT);
1772 std::vector<BarrierOrderingTestHelperArg> args(THREAD_COUNT);
1773 for (size_t i = 0; i < THREAD_COUNT; ++i) {
1774 args[i].barrier = &barrier;
1775 args[i].array = array;
1776 args[i].array_length = THREAD_COUNT;
1777 args[i].id = i;
1778 ASSERT_EQ(0, pthread_create(&threads[i], nullptr,
1779 reinterpret_cast<void* (*)(void*)>(BarrierOrderingTestHelper),
1780 &args[i]));
1781 }
1782 for (size_t i = 0; i < THREAD_COUNT; ++i) {
1783 ASSERT_EQ(0, pthread_join(threads[i], nullptr));
1784 }
1785}