blob: e4f9cb88be7b58ee89353402185235aec2a092e6 [file] [log] [blame]
Elliott Hughesbfeab1b2012-09-05 17:47:37 -07001/*
2 * Copyright (C) 2012 The Android Open Source Project
3 *
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
7 *
8 * http://www.apache.org/licenses/LICENSE-2.0
9 *
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
15 */
16
17#include <gtest/gtest.h>
18
19#include <errno.h>
Elliott Hughes5b9310e2013-10-02 16:59:05 -070020#include <inttypes.h>
Elliott Hughesb95cf0d2013-07-15 14:51:07 -070021#include <limits.h>
Elliott Hughes04620a32014-03-07 17:59:05 -080022#include <malloc.h>
Elliott Hughesbfeab1b2012-09-05 17:47:37 -070023#include <pthread.h>
Christopher Ferrisf04935c2013-12-20 18:43:21 -080024#include <signal.h>
Yabin Cui140f3672015-02-03 10:32:00 -080025#include <stdio.h>
Colin Cross4c5595c2021-08-16 15:51:59 -070026#include <sys/cdefs.h>
Elliott Hughes70b24b12013-11-15 11:51:07 -080027#include <sys/mman.h>
Elliott Hughes4d098ca2016-04-11 12:43:05 -070028#include <sys/prctl.h>
George Burgess IV08fd0722019-01-15 19:00:11 -080029#include <sys/resource.h>
Elliott Hughes57b7a612014-08-25 17:26:50 -070030#include <sys/syscall.h>
Narayan Kamath51e6cb32014-03-03 15:38:51 +000031#include <time.h>
Elliott Hughes4d014e12012-09-07 16:47:54 -070032#include <unistd.h>
Yabin Cui33ac04a2015-09-22 11:16:15 -070033#include <unwind.h>
Elliott Hughesbfeab1b2012-09-05 17:47:37 -070034
Yabin Cui08ee8d22015-02-11 17:04:36 -080035#include <atomic>
Josh Gaoddf757e2018-10-17 15:23:03 -070036#include <future>
Yabin Cuib5845722015-03-16 22:46:42 -070037#include <vector>
Yabin Cui08ee8d22015-02-11 17:04:36 -080038
Elliott Hughes5e62b342018-10-25 11:00:00 -070039#include <android-base/macros.h>
Yabin Cui6b9c85b2018-01-23 12:56:18 -080040#include <android-base/parseint.h>
Tom Cherryb8ab6182017-04-05 16:20:29 -070041#include <android-base/scopeguard.h>
Elliott Hughes141b9172021-04-09 17:13:09 -070042#include <android-base/silent_death_test.h>
Yabin Cui6b9c85b2018-01-23 12:56:18 -080043#include <android-base/strings.h>
Tom Cherryb8ab6182017-04-05 16:20:29 -070044
Yabin Cuic9a659c2015-11-05 15:36:08 -080045#include "private/bionic_constants.h"
Elliott Hughes71ba5892018-02-07 12:44:45 -080046#include "SignalUtils.h"
Elliott Hughes15dfd632015-09-22 16:40:14 -070047#include "utils.h"
48
Elliott Hughes141b9172021-04-09 17:13:09 -070049using pthread_DeathTest = SilentDeathTest;
Elliott Hughese657eb42021-02-18 17:11:56 -080050
Elliott Hughesbfeab1b2012-09-05 17:47:37 -070051TEST(pthread, pthread_key_create) {
52 pthread_key_t key;
Yi Kong32bc0fc2018-08-02 17:31:13 -070053 ASSERT_EQ(0, pthread_key_create(&key, nullptr));
Elliott Hughesbfeab1b2012-09-05 17:47:37 -070054 ASSERT_EQ(0, pthread_key_delete(key));
55 // Can't delete a key that's already been deleted.
56 ASSERT_EQ(EINVAL, pthread_key_delete(key));
57}
Elliott Hughes4d014e12012-09-07 16:47:54 -070058
Dan Albertc4bcc752014-09-30 11:48:24 -070059TEST(pthread, pthread_keys_max) {
Yabin Cui6c238f22014-12-11 20:50:41 -080060 // POSIX says PTHREAD_KEYS_MAX should be at least _POSIX_THREAD_KEYS_MAX.
61 ASSERT_GE(PTHREAD_KEYS_MAX, _POSIX_THREAD_KEYS_MAX);
Dan Albertc4bcc752014-09-30 11:48:24 -070062}
Elliott Hughes718a5b52014-01-28 17:02:03 -080063
Yabin Cui6c238f22014-12-11 20:50:41 -080064TEST(pthread, sysconf_SC_THREAD_KEYS_MAX_eq_PTHREAD_KEYS_MAX) {
Dan Albertc4bcc752014-09-30 11:48:24 -070065 int sysconf_max = sysconf(_SC_THREAD_KEYS_MAX);
Yabin Cui6c238f22014-12-11 20:50:41 -080066 ASSERT_EQ(sysconf_max, PTHREAD_KEYS_MAX);
Dan Albertc4bcc752014-09-30 11:48:24 -070067}
68
69TEST(pthread, pthread_key_many_distinct) {
Yabin Cui6c238f22014-12-11 20:50:41 -080070 // As gtest uses pthread keys, we can't allocate exactly PTHREAD_KEYS_MAX
71 // pthread keys, but We should be able to allocate at least this many keys.
72 int nkeys = PTHREAD_KEYS_MAX / 2;
Dan Albertc4bcc752014-09-30 11:48:24 -070073 std::vector<pthread_key_t> keys;
74
Tom Cherryb8ab6182017-04-05 16:20:29 -070075 auto scope_guard = android::base::make_scope_guard([&keys] {
Elliott Hughes0b2acdf2015-10-02 18:25:19 -070076 for (const auto& key : keys) {
Dan Albertc4bcc752014-09-30 11:48:24 -070077 EXPECT_EQ(0, pthread_key_delete(key));
78 }
79 });
80
81 for (int i = 0; i < nkeys; ++i) {
82 pthread_key_t key;
Elliott Hughes61706932015-03-31 10:56:58 -070083 // If this fails, it's likely that LIBC_PTHREAD_KEY_RESERVED_COUNT is wrong.
Yi Kong32bc0fc2018-08-02 17:31:13 -070084 ASSERT_EQ(0, pthread_key_create(&key, nullptr)) << i << " of " << nkeys;
Dan Albertc4bcc752014-09-30 11:48:24 -070085 keys.push_back(key);
86 ASSERT_EQ(0, pthread_setspecific(key, reinterpret_cast<void*>(i)));
87 }
88
89 for (int i = keys.size() - 1; i >= 0; --i) {
90 ASSERT_EQ(reinterpret_cast<void*>(i), pthread_getspecific(keys.back()));
91 pthread_key_t key = keys.back();
92 keys.pop_back();
93 ASSERT_EQ(0, pthread_key_delete(key));
94 }
95}
96
Yabin Cui6c238f22014-12-11 20:50:41 -080097TEST(pthread, pthread_key_not_exceed_PTHREAD_KEYS_MAX) {
Elliott Hughes44b53ad2013-02-11 20:18:47 +000098 std::vector<pthread_key_t> keys;
Dan Albertc4bcc752014-09-30 11:48:24 -070099 int rv = 0;
Yabin Cui6c238f22014-12-11 20:50:41 -0800100
101 // Pthread keys are used by gtest, so PTHREAD_KEYS_MAX should
102 // be more than we are allowed to allocate now.
103 for (int i = 0; i < PTHREAD_KEYS_MAX; i++) {
Elliott Hughes44b53ad2013-02-11 20:18:47 +0000104 pthread_key_t key;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700105 rv = pthread_key_create(&key, nullptr);
Dan Albertc4bcc752014-09-30 11:48:24 -0700106 if (rv == EAGAIN) {
107 break;
108 }
109 EXPECT_EQ(0, rv);
Elliott Hughes44b53ad2013-02-11 20:18:47 +0000110 keys.push_back(key);
111 }
112
Dan Albertc4bcc752014-09-30 11:48:24 -0700113 // Don't leak keys.
Elliott Hughes0b2acdf2015-10-02 18:25:19 -0700114 for (const auto& key : keys) {
Dan Albertc4bcc752014-09-30 11:48:24 -0700115 EXPECT_EQ(0, pthread_key_delete(key));
Elliott Hughes44b53ad2013-02-11 20:18:47 +0000116 }
Dan Albertc4bcc752014-09-30 11:48:24 -0700117 keys.clear();
118
119 // We should have eventually reached the maximum number of keys and received
120 // EAGAIN.
121 ASSERT_EQ(EAGAIN, rv);
Elliott Hughes44b53ad2013-02-11 20:18:47 +0000122}
123
Elliott Hughesebb770f2014-06-25 13:46:46 -0700124TEST(pthread, pthread_key_delete) {
125 void* expected = reinterpret_cast<void*>(1234);
126 pthread_key_t key;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700127 ASSERT_EQ(0, pthread_key_create(&key, nullptr));
Elliott Hughesebb770f2014-06-25 13:46:46 -0700128 ASSERT_EQ(0, pthread_setspecific(key, expected));
129 ASSERT_EQ(expected, pthread_getspecific(key));
130 ASSERT_EQ(0, pthread_key_delete(key));
Yi Kong32bc0fc2018-08-02 17:31:13 -0700131 // After deletion, pthread_getspecific returns nullptr.
132 ASSERT_EQ(nullptr, pthread_getspecific(key));
Elliott Hughesebb770f2014-06-25 13:46:46 -0700133 // And you can't use pthread_setspecific with the deleted key.
134 ASSERT_EQ(EINVAL, pthread_setspecific(key, expected));
135}
136
Elliott Hughes40a52172014-07-30 14:48:10 -0700137TEST(pthread, pthread_key_fork) {
138 void* expected = reinterpret_cast<void*>(1234);
139 pthread_key_t key;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700140 ASSERT_EQ(0, pthread_key_create(&key, nullptr));
Elliott Hughes40a52172014-07-30 14:48:10 -0700141 ASSERT_EQ(0, pthread_setspecific(key, expected));
142 ASSERT_EQ(expected, pthread_getspecific(key));
143
144 pid_t pid = fork();
145 ASSERT_NE(-1, pid) << strerror(errno);
146
147 if (pid == 0) {
148 // The surviving thread inherits all the forking thread's TLS values...
149 ASSERT_EQ(expected, pthread_getspecific(key));
150 _exit(99);
151 }
152
Elliott Hughes33697a02016-01-26 13:04:57 -0800153 AssertChildExited(pid, 99);
Elliott Hughes40a52172014-07-30 14:48:10 -0700154
155 ASSERT_EQ(expected, pthread_getspecific(key));
Dan Albert1d53ae22014-09-02 15:24:26 -0700156 ASSERT_EQ(0, pthread_key_delete(key));
Elliott Hughes40a52172014-07-30 14:48:10 -0700157}
158
159static void* DirtyKeyFn(void* key) {
160 return pthread_getspecific(*reinterpret_cast<pthread_key_t*>(key));
161}
162
163TEST(pthread, pthread_key_dirty) {
164 pthread_key_t key;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700165 ASSERT_EQ(0, pthread_key_create(&key, nullptr));
Elliott Hughes40a52172014-07-30 14:48:10 -0700166
Yabin Cuia36158a2015-11-16 21:06:16 -0800167 size_t stack_size = 640 * 1024;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700168 void* stack = mmap(nullptr, stack_size, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0);
Elliott Hughes40a52172014-07-30 14:48:10 -0700169 ASSERT_NE(MAP_FAILED, stack);
170 memset(stack, 0xff, stack_size);
171
172 pthread_attr_t attr;
173 ASSERT_EQ(0, pthread_attr_init(&attr));
174 ASSERT_EQ(0, pthread_attr_setstack(&attr, stack, stack_size));
175
176 pthread_t t;
177 ASSERT_EQ(0, pthread_create(&t, &attr, DirtyKeyFn, &key));
178
179 void* result;
180 ASSERT_EQ(0, pthread_join(t, &result));
181 ASSERT_EQ(nullptr, result); // Not ~0!
182
183 ASSERT_EQ(0, munmap(stack, stack_size));
Dan Albert1d53ae22014-09-02 15:24:26 -0700184 ASSERT_EQ(0, pthread_key_delete(key));
Elliott Hughes40a52172014-07-30 14:48:10 -0700185}
186
Yabin Cui5ddbb3f2015-03-05 20:35:32 -0800187TEST(pthread, static_pthread_key_used_before_creation) {
188#if defined(__BIONIC__)
189 // See http://b/19625804. The bug is about a static/global pthread key being used before creation.
190 // So here tests if the static/global default value 0 can be detected as invalid key.
191 static pthread_key_t key;
192 ASSERT_EQ(nullptr, pthread_getspecific(key));
193 ASSERT_EQ(EINVAL, pthread_setspecific(key, nullptr));
194 ASSERT_EQ(EINVAL, pthread_key_delete(key));
195#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800196 GTEST_SKIP() << "bionic-only test";
Yabin Cui5ddbb3f2015-03-05 20:35:32 -0800197#endif
198}
199
Elliott Hughes4d014e12012-09-07 16:47:54 -0700200static void* IdFn(void* arg) {
201 return arg;
202}
203
Yabin Cui63481602014-12-01 17:41:04 -0800204class SpinFunctionHelper {
205 public:
206 SpinFunctionHelper() {
207 SpinFunctionHelper::spin_flag_ = true;
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400208 }
Elliott Hughes0bd9d132017-11-02 13:11:13 -0700209
Yabin Cui63481602014-12-01 17:41:04 -0800210 ~SpinFunctionHelper() {
211 UnSpin();
212 }
Elliott Hughes0bd9d132017-11-02 13:11:13 -0700213
Yabin Cui63481602014-12-01 17:41:04 -0800214 auto GetFunction() -> void* (*)(void*) {
215 return SpinFunctionHelper::SpinFn;
216 }
217
218 void UnSpin() {
219 SpinFunctionHelper::spin_flag_ = false;
220 }
221
222 private:
223 static void* SpinFn(void*) {
224 while (spin_flag_) {}
Yi Kong32bc0fc2018-08-02 17:31:13 -0700225 return nullptr;
Yabin Cui63481602014-12-01 17:41:04 -0800226 }
Yabin Cuia36158a2015-11-16 21:06:16 -0800227 static std::atomic<bool> spin_flag_;
Yabin Cui63481602014-12-01 17:41:04 -0800228};
229
230// It doesn't matter if spin_flag_ is used in several tests,
231// because it is always set to false after each test. Each thread
232// loops on spin_flag_ can find it becomes false at some time.
Yabin Cuia36158a2015-11-16 21:06:16 -0800233std::atomic<bool> SpinFunctionHelper::spin_flag_;
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400234
Elliott Hughes4d014e12012-09-07 16:47:54 -0700235static void* JoinFn(void* arg) {
Yi Kong32bc0fc2018-08-02 17:31:13 -0700236 return reinterpret_cast<void*>(pthread_join(reinterpret_cast<pthread_t>(arg), nullptr));
Elliott Hughes4d014e12012-09-07 16:47:54 -0700237}
238
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400239static void AssertDetached(pthread_t t, bool is_detached) {
240 pthread_attr_t attr;
241 ASSERT_EQ(0, pthread_getattr_np(t, &attr));
242 int detach_state;
243 ASSERT_EQ(0, pthread_attr_getdetachstate(&attr, &detach_state));
244 pthread_attr_destroy(&attr);
245 ASSERT_EQ(is_detached, (detach_state == PTHREAD_CREATE_DETACHED));
246}
247
Elliott Hughes7484c212017-02-02 02:41:38 +0000248static void MakeDeadThread(pthread_t& t) {
Yi Kong32bc0fc2018-08-02 17:31:13 -0700249 ASSERT_EQ(0, pthread_create(&t, nullptr, IdFn, nullptr));
250 ASSERT_EQ(0, pthread_join(t, nullptr));
Elliott Hughes7484c212017-02-02 02:41:38 +0000251}
252
Elliott Hughes4d014e12012-09-07 16:47:54 -0700253TEST(pthread, pthread_create) {
254 void* expected_result = reinterpret_cast<void*>(123);
255 // Can we create a thread?
256 pthread_t t;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700257 ASSERT_EQ(0, pthread_create(&t, nullptr, IdFn, expected_result));
Elliott Hughes4d014e12012-09-07 16:47:54 -0700258 // If we join, do we get the expected value back?
259 void* result;
260 ASSERT_EQ(0, pthread_join(t, &result));
261 ASSERT_EQ(expected_result, result);
262}
263
Elliott Hughes3e898472013-02-12 16:40:24 +0000264TEST(pthread, pthread_create_EAGAIN) {
265 pthread_attr_t attributes;
266 ASSERT_EQ(0, pthread_attr_init(&attributes));
267 ASSERT_EQ(0, pthread_attr_setstacksize(&attributes, static_cast<size_t>(-1) & ~(getpagesize() - 1)));
268
269 pthread_t t;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700270 ASSERT_EQ(EAGAIN, pthread_create(&t, &attributes, IdFn, nullptr));
Elliott Hughes3e898472013-02-12 16:40:24 +0000271}
272
Elliott Hughes4d014e12012-09-07 16:47:54 -0700273TEST(pthread, pthread_no_join_after_detach) {
Elliott Hughes725b2a92016-03-23 11:20:47 -0700274 SpinFunctionHelper spin_helper;
Yabin Cui63481602014-12-01 17:41:04 -0800275
Elliott Hughes4d014e12012-09-07 16:47:54 -0700276 pthread_t t1;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700277 ASSERT_EQ(0, pthread_create(&t1, nullptr, spin_helper.GetFunction(), nullptr));
Elliott Hughes4d014e12012-09-07 16:47:54 -0700278
279 // After a pthread_detach...
280 ASSERT_EQ(0, pthread_detach(t1));
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400281 AssertDetached(t1, true);
Elliott Hughes4d014e12012-09-07 16:47:54 -0700282
283 // ...pthread_join should fail.
Yi Kong32bc0fc2018-08-02 17:31:13 -0700284 ASSERT_EQ(EINVAL, pthread_join(t1, nullptr));
Elliott Hughes4d014e12012-09-07 16:47:54 -0700285}
286
287TEST(pthread, pthread_no_op_detach_after_join) {
Elliott Hughes725b2a92016-03-23 11:20:47 -0700288 SpinFunctionHelper spin_helper;
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400289
Elliott Hughes4d014e12012-09-07 16:47:54 -0700290 pthread_t t1;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700291 ASSERT_EQ(0, pthread_create(&t1, nullptr, spin_helper.GetFunction(), nullptr));
Elliott Hughes4d014e12012-09-07 16:47:54 -0700292
293 // If thread 2 is already waiting to join thread 1...
294 pthread_t t2;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700295 ASSERT_EQ(0, pthread_create(&t2, nullptr, JoinFn, reinterpret_cast<void*>(t1)));
Elliott Hughes4d014e12012-09-07 16:47:54 -0700296
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400297 sleep(1); // (Give t2 a chance to call pthread_join.)
Elliott Hughes4d014e12012-09-07 16:47:54 -0700298
Yabin Cuibbb04322015-03-19 15:19:25 -0700299#if defined(__BIONIC__)
300 ASSERT_EQ(EINVAL, pthread_detach(t1));
301#else
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400302 ASSERT_EQ(0, pthread_detach(t1));
Yabin Cuibbb04322015-03-19 15:19:25 -0700303#endif
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400304 AssertDetached(t1, false);
305
Elliott Hughes725b2a92016-03-23 11:20:47 -0700306 spin_helper.UnSpin();
Sergey Melnikov10ce9692012-10-26 14:06:43 +0400307
308 // ...but t2's join on t1 still goes ahead (which we can tell because our join on t2 finishes).
Elliott Hughes4d014e12012-09-07 16:47:54 -0700309 void* join_result;
310 ASSERT_EQ(0, pthread_join(t2, &join_result));
Elliott Hughes5b9310e2013-10-02 16:59:05 -0700311 ASSERT_EQ(0U, reinterpret_cast<uintptr_t>(join_result));
Elliott Hughes4d014e12012-09-07 16:47:54 -0700312}
Elliott Hughes14f19592012-10-29 10:19:44 -0700313
314TEST(pthread, pthread_join_self) {
Yi Kong32bc0fc2018-08-02 17:31:13 -0700315 ASSERT_EQ(EDEADLK, pthread_join(pthread_self(), nullptr));
Elliott Hughes14f19592012-10-29 10:19:44 -0700316}
Elliott Hughes4f251be2012-11-01 16:33:29 -0700317
Elliott Hughes877ec6d2013-11-15 17:40:18 -0800318struct TestBug37410 {
319 pthread_t main_thread;
320 pthread_mutex_t mutex;
Elliott Hughes4f251be2012-11-01 16:33:29 -0700321
Elliott Hughes877ec6d2013-11-15 17:40:18 -0800322 static void main() {
323 TestBug37410 data;
324 data.main_thread = pthread_self();
Yi Kong32bc0fc2018-08-02 17:31:13 -0700325 ASSERT_EQ(0, pthread_mutex_init(&data.mutex, nullptr));
Elliott Hughes877ec6d2013-11-15 17:40:18 -0800326 ASSERT_EQ(0, pthread_mutex_lock(&data.mutex));
327
328 pthread_t t;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700329 ASSERT_EQ(0, pthread_create(&t, nullptr, TestBug37410::thread_fn, reinterpret_cast<void*>(&data)));
Elliott Hughes877ec6d2013-11-15 17:40:18 -0800330
331 // Wait for the thread to be running...
332 ASSERT_EQ(0, pthread_mutex_lock(&data.mutex));
333 ASSERT_EQ(0, pthread_mutex_unlock(&data.mutex));
334
335 // ...and exit.
Yi Kong32bc0fc2018-08-02 17:31:13 -0700336 pthread_exit(nullptr);
Elliott Hughes877ec6d2013-11-15 17:40:18 -0800337 }
338
339 private:
340 static void* thread_fn(void* arg) {
341 TestBug37410* data = reinterpret_cast<TestBug37410*>(arg);
342
Evgenii Stepanov352853a2019-02-05 17:37:37 -0800343 // Unlocking data->mutex will cause the main thread to exit, invalidating *data. Save the handle.
344 pthread_t main_thread = data->main_thread;
345
Elliott Hughes877ec6d2013-11-15 17:40:18 -0800346 // Let the main thread know we're running.
347 pthread_mutex_unlock(&data->mutex);
348
349 // And wait for the main thread to exit.
Evgenii Stepanov352853a2019-02-05 17:37:37 -0800350 pthread_join(main_thread, nullptr);
Elliott Hughes877ec6d2013-11-15 17:40:18 -0800351
Yi Kong32bc0fc2018-08-02 17:31:13 -0700352 return nullptr;
Elliott Hughes877ec6d2013-11-15 17:40:18 -0800353 }
354};
Elliott Hughes4f251be2012-11-01 16:33:29 -0700355
Elliott Hughes7fd803c2013-02-14 16:33:52 -0800356// Even though this isn't really a death test, we have to say "DeathTest" here so gtest knows to
357// run this test (which exits normally) in its own process.
Yabin Cui9df70402014-11-05 18:01:01 -0800358TEST_F(pthread_DeathTest, pthread_bug_37410) {
Elliott Hughes4f251be2012-11-01 16:33:29 -0700359 // http://code.google.com/p/android/issues/detail?id=37410
Elliott Hughes877ec6d2013-11-15 17:40:18 -0800360 ASSERT_EXIT(TestBug37410::main(), ::testing::ExitedWithCode(0), "");
Elliott Hughes4f251be2012-11-01 16:33:29 -0700361}
Elliott Hughesc5d028f2013-01-10 14:42:14 -0800362
363static void* SignalHandlerFn(void* arg) {
Elliott Hughes5905d6f2018-01-30 15:09:51 -0800364 sigset64_t wait_set;
365 sigfillset64(&wait_set);
366 return reinterpret_cast<void*>(sigwait64(&wait_set, reinterpret_cast<int*>(arg)));
Elliott Hughesc5d028f2013-01-10 14:42:14 -0800367}
368
369TEST(pthread, pthread_sigmask) {
Elliott Hughes19e62322013-10-15 11:23:57 -0700370 // Check that SIGUSR1 isn't blocked.
371 sigset_t original_set;
372 sigemptyset(&original_set);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700373 ASSERT_EQ(0, pthread_sigmask(SIG_BLOCK, nullptr, &original_set));
Elliott Hughes19e62322013-10-15 11:23:57 -0700374 ASSERT_FALSE(sigismember(&original_set, SIGUSR1));
375
Elliott Hughesc5d028f2013-01-10 14:42:14 -0800376 // Block SIGUSR1.
377 sigset_t set;
378 sigemptyset(&set);
379 sigaddset(&set, SIGUSR1);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700380 ASSERT_EQ(0, pthread_sigmask(SIG_BLOCK, &set, nullptr));
Elliott Hughesc5d028f2013-01-10 14:42:14 -0800381
Elliott Hughes19e62322013-10-15 11:23:57 -0700382 // Check that SIGUSR1 is blocked.
383 sigset_t final_set;
384 sigemptyset(&final_set);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700385 ASSERT_EQ(0, pthread_sigmask(SIG_BLOCK, nullptr, &final_set));
Elliott Hughes19e62322013-10-15 11:23:57 -0700386 ASSERT_TRUE(sigismember(&final_set, SIGUSR1));
387 // ...and that sigprocmask agrees with pthread_sigmask.
388 sigemptyset(&final_set);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700389 ASSERT_EQ(0, sigprocmask(SIG_BLOCK, nullptr, &final_set));
Elliott Hughes19e62322013-10-15 11:23:57 -0700390 ASSERT_TRUE(sigismember(&final_set, SIGUSR1));
391
Elliott Hughesc5d028f2013-01-10 14:42:14 -0800392 // Spawn a thread that calls sigwait and tells us what it received.
393 pthread_t signal_thread;
394 int received_signal = -1;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700395 ASSERT_EQ(0, pthread_create(&signal_thread, nullptr, SignalHandlerFn, &received_signal));
Elliott Hughesc5d028f2013-01-10 14:42:14 -0800396
397 // Send that thread SIGUSR1.
398 pthread_kill(signal_thread, SIGUSR1);
399
400 // See what it got.
401 void* join_result;
402 ASSERT_EQ(0, pthread_join(signal_thread, &join_result));
403 ASSERT_EQ(SIGUSR1, received_signal);
Elliott Hughes5b9310e2013-10-02 16:59:05 -0700404 ASSERT_EQ(0U, reinterpret_cast<uintptr_t>(join_result));
Elliott Hughes19e62322013-10-15 11:23:57 -0700405
406 // Restore the original signal mask.
Yi Kong32bc0fc2018-08-02 17:31:13 -0700407 ASSERT_EQ(0, pthread_sigmask(SIG_SETMASK, &original_set, nullptr));
Elliott Hughesc5d028f2013-01-10 14:42:14 -0800408}
Elliott Hughes5e3fc432013-02-11 16:36:48 -0800409
Elliott Hughes5905d6f2018-01-30 15:09:51 -0800410TEST(pthread, pthread_sigmask64_SIGTRMIN) {
411 // Check that SIGRTMIN isn't blocked.
412 sigset64_t original_set;
413 sigemptyset64(&original_set);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700414 ASSERT_EQ(0, pthread_sigmask64(SIG_BLOCK, nullptr, &original_set));
Elliott Hughes5905d6f2018-01-30 15:09:51 -0800415 ASSERT_FALSE(sigismember64(&original_set, SIGRTMIN));
416
417 // Block SIGRTMIN.
418 sigset64_t set;
419 sigemptyset64(&set);
420 sigaddset64(&set, SIGRTMIN);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700421 ASSERT_EQ(0, pthread_sigmask64(SIG_BLOCK, &set, nullptr));
Elliott Hughes5905d6f2018-01-30 15:09:51 -0800422
423 // Check that SIGRTMIN is blocked.
424 sigset64_t final_set;
425 sigemptyset64(&final_set);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700426 ASSERT_EQ(0, pthread_sigmask64(SIG_BLOCK, nullptr, &final_set));
Elliott Hughes5905d6f2018-01-30 15:09:51 -0800427 ASSERT_TRUE(sigismember64(&final_set, SIGRTMIN));
428 // ...and that sigprocmask64 agrees with pthread_sigmask64.
429 sigemptyset64(&final_set);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700430 ASSERT_EQ(0, sigprocmask64(SIG_BLOCK, nullptr, &final_set));
Elliott Hughes5905d6f2018-01-30 15:09:51 -0800431 ASSERT_TRUE(sigismember64(&final_set, SIGRTMIN));
432
433 // Spawn a thread that calls sigwait64 and tells us what it received.
434 pthread_t signal_thread;
435 int received_signal = -1;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700436 ASSERT_EQ(0, pthread_create(&signal_thread, nullptr, SignalHandlerFn, &received_signal));
Elliott Hughes5905d6f2018-01-30 15:09:51 -0800437
438 // Send that thread SIGRTMIN.
439 pthread_kill(signal_thread, SIGRTMIN);
440
441 // See what it got.
442 void* join_result;
443 ASSERT_EQ(0, pthread_join(signal_thread, &join_result));
444 ASSERT_EQ(SIGRTMIN, received_signal);
445 ASSERT_EQ(0U, reinterpret_cast<uintptr_t>(join_result));
446
447 // Restore the original signal mask.
Yi Kong32bc0fc2018-08-02 17:31:13 -0700448 ASSERT_EQ(0, pthread_sigmask64(SIG_SETMASK, &original_set, nullptr));
Elliott Hughes5905d6f2018-01-30 15:09:51 -0800449}
450
Elliott Hughes725b2a92016-03-23 11:20:47 -0700451static void test_pthread_setname_np__pthread_getname_np(pthread_t t) {
452 ASSERT_EQ(0, pthread_setname_np(t, "short"));
453 char name[32];
454 ASSERT_EQ(0, pthread_getname_np(t, name, sizeof(name)));
455 ASSERT_STREQ("short", name);
456
Elliott Hughesd1aea302015-04-25 10:05:24 -0700457 // The limit is 15 characters --- the kernel's buffer is 16, but includes a NUL.
Elliott Hughes725b2a92016-03-23 11:20:47 -0700458 ASSERT_EQ(0, pthread_setname_np(t, "123456789012345"));
459 ASSERT_EQ(0, pthread_getname_np(t, name, sizeof(name)));
460 ASSERT_STREQ("123456789012345", name);
461
462 ASSERT_EQ(ERANGE, pthread_setname_np(t, "1234567890123456"));
463
464 // The passed-in buffer should be at least 16 bytes.
465 ASSERT_EQ(0, pthread_getname_np(t, name, 16));
466 ASSERT_EQ(ERANGE, pthread_getname_np(t, name, 15));
Elliott Hughes3e898472013-02-12 16:40:24 +0000467}
468
Elliott Hughes725b2a92016-03-23 11:20:47 -0700469TEST(pthread, pthread_setname_np__pthread_getname_np__self) {
470 test_pthread_setname_np__pthread_getname_np(pthread_self());
Elliott Hughes3e898472013-02-12 16:40:24 +0000471}
472
Elliott Hughes725b2a92016-03-23 11:20:47 -0700473TEST(pthread, pthread_setname_np__pthread_getname_np__other) {
474 SpinFunctionHelper spin_helper;
Yabin Cui63481602014-12-01 17:41:04 -0800475
Elliott Hughes725b2a92016-03-23 11:20:47 -0700476 pthread_t t;
Elliott Hughes4d098ca2016-04-11 12:43:05 -0700477 ASSERT_EQ(0, pthread_create(&t, nullptr, spin_helper.GetFunction(), nullptr));
478 test_pthread_setname_np__pthread_getname_np(t);
479 spin_helper.UnSpin();
480 ASSERT_EQ(0, pthread_join(t, nullptr));
481}
482
483// http://b/28051133: a kernel misfeature means that you can't change the
484// name of another thread if you've set PR_SET_DUMPABLE to 0.
485TEST(pthread, pthread_setname_np__pthread_getname_np__other_PR_SET_DUMPABLE) {
486 ASSERT_EQ(0, prctl(PR_SET_DUMPABLE, 0)) << strerror(errno);
487
488 SpinFunctionHelper spin_helper;
489
490 pthread_t t;
491 ASSERT_EQ(0, pthread_create(&t, nullptr, spin_helper.GetFunction(), nullptr));
Elliott Hughes725b2a92016-03-23 11:20:47 -0700492 test_pthread_setname_np__pthread_getname_np(t);
493 spin_helper.UnSpin();
494 ASSERT_EQ(0, pthread_join(t, nullptr));
Elliott Hughes3e898472013-02-12 16:40:24 +0000495}
496
Elliott Hughes11859d42017-02-13 17:59:29 -0800497TEST_F(pthread_DeathTest, pthread_setname_np__no_such_thread) {
Elliott Hughesbcb15292017-02-07 21:05:30 +0000498 pthread_t dead_thread;
499 MakeDeadThread(dead_thread);
500
Elliott Hughes5bb113c2019-02-01 16:31:10 -0800501 EXPECT_DEATH(pthread_setname_np(dead_thread, "short 3"),
502 "invalid pthread_t (.*) passed to pthread_setname_np");
Elliott Hughes6ce686c2017-02-21 13:15:20 -0800503}
504
505TEST_F(pthread_DeathTest, pthread_setname_np__null_thread) {
506 pthread_t null_thread = 0;
507 EXPECT_EQ(ENOENT, pthread_setname_np(null_thread, "short 3"));
Elliott Hughes11859d42017-02-13 17:59:29 -0800508}
509
510TEST_F(pthread_DeathTest, pthread_getname_np__no_such_thread) {
511 pthread_t dead_thread;
512 MakeDeadThread(dead_thread);
513
Elliott Hughesbcb15292017-02-07 21:05:30 +0000514 char name[64];
Elliott Hughes5bb113c2019-02-01 16:31:10 -0800515 EXPECT_DEATH(pthread_getname_np(dead_thread, name, sizeof(name)),
516 "invalid pthread_t (.*) passed to pthread_getname_np");
Elliott Hughes6ce686c2017-02-21 13:15:20 -0800517}
518
519TEST_F(pthread_DeathTest, pthread_getname_np__null_thread) {
520 pthread_t null_thread = 0;
521
522 char name[64];
523 EXPECT_EQ(ENOENT, pthread_getname_np(null_thread, name, sizeof(name)));
Elliott Hughesbcb15292017-02-07 21:05:30 +0000524}
525
Elliott Hughes9d23e042013-02-15 19:21:51 -0800526TEST(pthread, pthread_kill__0) {
527 // Signal 0 just tests that the thread exists, so it's safe to call on ourselves.
528 ASSERT_EQ(0, pthread_kill(pthread_self(), 0));
529}
530
531TEST(pthread, pthread_kill__invalid_signal) {
532 ASSERT_EQ(EINVAL, pthread_kill(pthread_self(), -1));
533}
534
Elliott Hughesfae89fc2013-02-21 11:22:23 -0800535static void pthread_kill__in_signal_handler_helper(int signal_number) {
536 static int count = 0;
537 ASSERT_EQ(SIGALRM, signal_number);
538 if (++count == 1) {
539 // Can we call pthread_kill from a signal handler?
540 ASSERT_EQ(0, pthread_kill(pthread_self(), SIGALRM));
541 }
542}
543
544TEST(pthread, pthread_kill__in_signal_handler) {
Elliott Hughes4b558f52014-03-04 15:58:02 -0800545 ScopedSignalHandler ssh(SIGALRM, pthread_kill__in_signal_handler_helper);
Elliott Hughesfae89fc2013-02-21 11:22:23 -0800546 ASSERT_EQ(0, pthread_kill(pthread_self(), SIGALRM));
547}
548
Josh Gaoddf757e2018-10-17 15:23:03 -0700549TEST(pthread, pthread_kill__exited_thread) {
550 static std::promise<pid_t> tid_promise;
551 pthread_t thread;
552 ASSERT_EQ(0, pthread_create(&thread, nullptr,
553 [](void*) -> void* {
554 tid_promise.set_value(gettid());
555 return nullptr;
556 },
557 nullptr));
558
559 pid_t tid = tid_promise.get_future().get();
560 while (TEMP_FAILURE_RETRY(syscall(__NR_tgkill, getpid(), tid, 0)) != -1) {
561 continue;
562 }
563 ASSERT_EQ(ESRCH, errno);
564
565 ASSERT_EQ(ESRCH, pthread_kill(thread, 0));
566}
567
Elliott Hughes11859d42017-02-13 17:59:29 -0800568TEST_F(pthread_DeathTest, pthread_detach__no_such_thread) {
Elliott Hughes7484c212017-02-02 02:41:38 +0000569 pthread_t dead_thread;
570 MakeDeadThread(dead_thread);
571
Elliott Hughes5bb113c2019-02-01 16:31:10 -0800572 EXPECT_DEATH(pthread_detach(dead_thread),
573 "invalid pthread_t (.*) passed to pthread_detach");
Elliott Hughes6ce686c2017-02-21 13:15:20 -0800574}
575
576TEST_F(pthread_DeathTest, pthread_detach__null_thread) {
577 pthread_t null_thread = 0;
578 EXPECT_EQ(ESRCH, pthread_detach(null_thread));
Elliott Hughes7484c212017-02-02 02:41:38 +0000579}
580
Jeff Hao9b06cc32013-08-15 14:51:16 -0700581TEST(pthread, pthread_getcpuclockid__clock_gettime) {
Elliott Hughes725b2a92016-03-23 11:20:47 -0700582 SpinFunctionHelper spin_helper;
Yabin Cui63481602014-12-01 17:41:04 -0800583
Jeff Hao9b06cc32013-08-15 14:51:16 -0700584 pthread_t t;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700585 ASSERT_EQ(0, pthread_create(&t, nullptr, spin_helper.GetFunction(), nullptr));
Jeff Hao9b06cc32013-08-15 14:51:16 -0700586
587 clockid_t c;
588 ASSERT_EQ(0, pthread_getcpuclockid(t, &c));
589 timespec ts;
590 ASSERT_EQ(0, clock_gettime(c, &ts));
Elliott Hughes725b2a92016-03-23 11:20:47 -0700591 spin_helper.UnSpin();
Yabin Cuia36158a2015-11-16 21:06:16 -0800592 ASSERT_EQ(0, pthread_join(t, nullptr));
Jeff Hao9b06cc32013-08-15 14:51:16 -0700593}
594
Elliott Hughes11859d42017-02-13 17:59:29 -0800595TEST_F(pthread_DeathTest, pthread_getcpuclockid__no_such_thread) {
Elliott Hughesbcb15292017-02-07 21:05:30 +0000596 pthread_t dead_thread;
597 MakeDeadThread(dead_thread);
598
599 clockid_t c;
Elliott Hughes5bb113c2019-02-01 16:31:10 -0800600 EXPECT_DEATH(pthread_getcpuclockid(dead_thread, &c),
601 "invalid pthread_t (.*) passed to pthread_getcpuclockid");
Elliott Hughes6ce686c2017-02-21 13:15:20 -0800602}
603
604TEST_F(pthread_DeathTest, pthread_getcpuclockid__null_thread) {
605 pthread_t null_thread = 0;
606 clockid_t c;
607 EXPECT_EQ(ESRCH, pthread_getcpuclockid(null_thread, &c));
Elliott Hughesbcb15292017-02-07 21:05:30 +0000608}
609
Elliott Hughes11859d42017-02-13 17:59:29 -0800610TEST_F(pthread_DeathTest, pthread_getschedparam__no_such_thread) {
Elliott Hughesbcb15292017-02-07 21:05:30 +0000611 pthread_t dead_thread;
612 MakeDeadThread(dead_thread);
613
614 int policy;
615 sched_param param;
Elliott Hughes5bb113c2019-02-01 16:31:10 -0800616 EXPECT_DEATH(pthread_getschedparam(dead_thread, &policy, &param),
617 "invalid pthread_t (.*) passed to pthread_getschedparam");
Elliott Hughes6ce686c2017-02-21 13:15:20 -0800618}
619
620TEST_F(pthread_DeathTest, pthread_getschedparam__null_thread) {
621 pthread_t null_thread = 0;
622 int policy;
623 sched_param param;
624 EXPECT_EQ(ESRCH, pthread_getschedparam(null_thread, &policy, &param));
Elliott Hughesbcb15292017-02-07 21:05:30 +0000625}
626
Elliott Hughes11859d42017-02-13 17:59:29 -0800627TEST_F(pthread_DeathTest, pthread_setschedparam__no_such_thread) {
Elliott Hughesbcb15292017-02-07 21:05:30 +0000628 pthread_t dead_thread;
629 MakeDeadThread(dead_thread);
630
631 int policy = 0;
632 sched_param param;
Elliott Hughes5bb113c2019-02-01 16:31:10 -0800633 EXPECT_DEATH(pthread_setschedparam(dead_thread, policy, &param),
634 "invalid pthread_t (.*) passed to pthread_setschedparam");
Elliott Hughes6ce686c2017-02-21 13:15:20 -0800635}
636
637TEST_F(pthread_DeathTest, pthread_setschedparam__null_thread) {
638 pthread_t null_thread = 0;
639 int policy = 0;
640 sched_param param;
641 EXPECT_EQ(ESRCH, pthread_setschedparam(null_thread, policy, &param));
Elliott Hughesbcb15292017-02-07 21:05:30 +0000642}
643
Elliott Hughesdff08ce2017-10-16 09:58:45 -0700644TEST_F(pthread_DeathTest, pthread_setschedprio__no_such_thread) {
645 pthread_t dead_thread;
646 MakeDeadThread(dead_thread);
647
Elliott Hughes5bb113c2019-02-01 16:31:10 -0800648 EXPECT_DEATH(pthread_setschedprio(dead_thread, 123),
649 "invalid pthread_t (.*) passed to pthread_setschedprio");
Elliott Hughesdff08ce2017-10-16 09:58:45 -0700650}
651
652TEST_F(pthread_DeathTest, pthread_setschedprio__null_thread) {
653 pthread_t null_thread = 0;
654 EXPECT_EQ(ESRCH, pthread_setschedprio(null_thread, 123));
655}
656
Elliott Hughes11859d42017-02-13 17:59:29 -0800657TEST_F(pthread_DeathTest, pthread_join__no_such_thread) {
Elliott Hughes7484c212017-02-02 02:41:38 +0000658 pthread_t dead_thread;
659 MakeDeadThread(dead_thread);
660
Elliott Hughes5bb113c2019-02-01 16:31:10 -0800661 EXPECT_DEATH(pthread_join(dead_thread, nullptr),
662 "invalid pthread_t (.*) passed to pthread_join");
Elliott Hughes6ce686c2017-02-21 13:15:20 -0800663}
664
665TEST_F(pthread_DeathTest, pthread_join__null_thread) {
666 pthread_t null_thread = 0;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700667 EXPECT_EQ(ESRCH, pthread_join(null_thread, nullptr));
Elliott Hughes7484c212017-02-02 02:41:38 +0000668}
669
Elliott Hughes11859d42017-02-13 17:59:29 -0800670TEST_F(pthread_DeathTest, pthread_kill__no_such_thread) {
Elliott Hughes7484c212017-02-02 02:41:38 +0000671 pthread_t dead_thread;
672 MakeDeadThread(dead_thread);
673
Elliott Hughes5bb113c2019-02-01 16:31:10 -0800674 EXPECT_DEATH(pthread_kill(dead_thread, 0),
675 "invalid pthread_t (.*) passed to pthread_kill");
Elliott Hughes6ce686c2017-02-21 13:15:20 -0800676}
677
678TEST_F(pthread_DeathTest, pthread_kill__null_thread) {
679 pthread_t null_thread = 0;
680 EXPECT_EQ(ESRCH, pthread_kill(null_thread, 0));
Elliott Hughes7484c212017-02-02 02:41:38 +0000681}
682
msg5550f020d12013-06-06 14:59:28 -0400683TEST(pthread, pthread_join__multijoin) {
Elliott Hughes725b2a92016-03-23 11:20:47 -0700684 SpinFunctionHelper spin_helper;
msg5550f020d12013-06-06 14:59:28 -0400685
686 pthread_t t1;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700687 ASSERT_EQ(0, pthread_create(&t1, nullptr, spin_helper.GetFunction(), nullptr));
msg5550f020d12013-06-06 14:59:28 -0400688
689 pthread_t t2;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700690 ASSERT_EQ(0, pthread_create(&t2, nullptr, JoinFn, reinterpret_cast<void*>(t1)));
msg5550f020d12013-06-06 14:59:28 -0400691
692 sleep(1); // (Give t2 a chance to call pthread_join.)
693
694 // Multiple joins to the same thread should fail.
Yi Kong32bc0fc2018-08-02 17:31:13 -0700695 ASSERT_EQ(EINVAL, pthread_join(t1, nullptr));
msg5550f020d12013-06-06 14:59:28 -0400696
Elliott Hughes725b2a92016-03-23 11:20:47 -0700697 spin_helper.UnSpin();
msg5550f020d12013-06-06 14:59:28 -0400698
699 // ...but t2's join on t1 still goes ahead (which we can tell because our join on t2 finishes).
700 void* join_result;
701 ASSERT_EQ(0, pthread_join(t2, &join_result));
Elliott Hughes5b9310e2013-10-02 16:59:05 -0700702 ASSERT_EQ(0U, reinterpret_cast<uintptr_t>(join_result));
msg5550f020d12013-06-06 14:59:28 -0400703}
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700704
Elliott Hughes70b24b12013-11-15 11:51:07 -0800705TEST(pthread, pthread_join__race) {
706 // http://b/11693195 --- pthread_join could return before the thread had actually exited.
707 // If the joiner unmapped the thread's stack, that could lead to SIGSEGV in the thread.
708 for (size_t i = 0; i < 1024; ++i) {
Yabin Cuia36158a2015-11-16 21:06:16 -0800709 size_t stack_size = 640*1024;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700710 void* stack = mmap(nullptr, stack_size, PROT_READ|PROT_WRITE, MAP_ANON|MAP_PRIVATE, -1, 0);
Elliott Hughes70b24b12013-11-15 11:51:07 -0800711
712 pthread_attr_t a;
713 pthread_attr_init(&a);
714 pthread_attr_setstack(&a, stack, stack_size);
715
716 pthread_t t;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700717 ASSERT_EQ(0, pthread_create(&t, &a, IdFn, nullptr));
718 ASSERT_EQ(0, pthread_join(t, nullptr));
Elliott Hughes70b24b12013-11-15 11:51:07 -0800719 ASSERT_EQ(0, munmap(stack, stack_size));
720 }
721}
722
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700723static void* GetActualGuardSizeFn(void* arg) {
724 pthread_attr_t attributes;
725 pthread_getattr_np(pthread_self(), &attributes);
726 pthread_attr_getguardsize(&attributes, reinterpret_cast<size_t*>(arg));
Yi Kong32bc0fc2018-08-02 17:31:13 -0700727 return nullptr;
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700728}
729
730static size_t GetActualGuardSize(const pthread_attr_t& attributes) {
731 size_t result;
732 pthread_t t;
733 pthread_create(&t, &attributes, GetActualGuardSizeFn, &result);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700734 pthread_join(t, nullptr);
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700735 return result;
736}
737
738static void* GetActualStackSizeFn(void* arg) {
739 pthread_attr_t attributes;
740 pthread_getattr_np(pthread_self(), &attributes);
741 pthread_attr_getstacksize(&attributes, reinterpret_cast<size_t*>(arg));
Yi Kong32bc0fc2018-08-02 17:31:13 -0700742 return nullptr;
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700743}
744
745static size_t GetActualStackSize(const pthread_attr_t& attributes) {
746 size_t result;
747 pthread_t t;
748 pthread_create(&t, &attributes, GetActualStackSizeFn, &result);
Yi Kong32bc0fc2018-08-02 17:31:13 -0700749 pthread_join(t, nullptr);
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700750 return result;
751}
752
Elliott Hughesd6c678c2017-06-27 17:01:57 -0700753TEST(pthread, pthread_attr_setguardsize_tiny) {
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700754 pthread_attr_t attributes;
755 ASSERT_EQ(0, pthread_attr_init(&attributes));
756
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700757 // No such thing as too small: will be rounded up to one page by pthread_create.
758 ASSERT_EQ(0, pthread_attr_setguardsize(&attributes, 128));
759 size_t guard_size;
760 ASSERT_EQ(0, pthread_attr_getguardsize(&attributes, &guard_size));
761 ASSERT_EQ(128U, guard_size);
762 ASSERT_EQ(4096U, GetActualGuardSize(attributes));
Elliott Hughesd6c678c2017-06-27 17:01:57 -0700763}
764
765TEST(pthread, pthread_attr_setguardsize_reasonable) {
766 pthread_attr_t attributes;
767 ASSERT_EQ(0, pthread_attr_init(&attributes));
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700768
769 // Large enough and a multiple of the page size.
770 ASSERT_EQ(0, pthread_attr_setguardsize(&attributes, 32*1024));
Elliott Hughesd6c678c2017-06-27 17:01:57 -0700771 size_t guard_size;
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700772 ASSERT_EQ(0, pthread_attr_getguardsize(&attributes, &guard_size));
773 ASSERT_EQ(32*1024U, guard_size);
Elliott Hughesd6c678c2017-06-27 17:01:57 -0700774 ASSERT_EQ(32*1024U, GetActualGuardSize(attributes));
775}
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700776
Elliott Hughesd6c678c2017-06-27 17:01:57 -0700777TEST(pthread, pthread_attr_setguardsize_needs_rounding) {
778 pthread_attr_t attributes;
779 ASSERT_EQ(0, pthread_attr_init(&attributes));
780
781 // Large enough but not a multiple of the page size.
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700782 ASSERT_EQ(0, pthread_attr_setguardsize(&attributes, 32*1024 + 1));
Elliott Hughesd6c678c2017-06-27 17:01:57 -0700783 size_t guard_size;
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700784 ASSERT_EQ(0, pthread_attr_getguardsize(&attributes, &guard_size));
785 ASSERT_EQ(32*1024U + 1, guard_size);
Elliott Hughesd6c678c2017-06-27 17:01:57 -0700786 ASSERT_EQ(36*1024U, GetActualGuardSize(attributes));
787}
788
789TEST(pthread, pthread_attr_setguardsize_enormous) {
790 pthread_attr_t attributes;
791 ASSERT_EQ(0, pthread_attr_init(&attributes));
792
793 // Larger than the stack itself. (Historically we mistakenly carved
794 // the guard out of the stack itself, rather than adding it after the
795 // end.)
796 ASSERT_EQ(0, pthread_attr_setguardsize(&attributes, 32*1024*1024));
797 size_t guard_size;
798 ASSERT_EQ(0, pthread_attr_getguardsize(&attributes, &guard_size));
799 ASSERT_EQ(32*1024*1024U, guard_size);
800 ASSERT_EQ(32*1024*1024U, GetActualGuardSize(attributes));
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700801}
802
803TEST(pthread, pthread_attr_setstacksize) {
804 pthread_attr_t attributes;
805 ASSERT_EQ(0, pthread_attr_init(&attributes));
806
807 // Get the default stack size.
808 size_t default_stack_size;
809 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &default_stack_size));
810
811 // Too small.
812 ASSERT_EQ(EINVAL, pthread_attr_setstacksize(&attributes, 128));
813 size_t stack_size;
814 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size));
815 ASSERT_EQ(default_stack_size, stack_size);
816 ASSERT_GE(GetActualStackSize(attributes), default_stack_size);
817
Yabin Cui917d3902015-01-08 12:32:42 -0800818 // Large enough and a multiple of the page size; may be rounded up by pthread_create.
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700819 ASSERT_EQ(0, pthread_attr_setstacksize(&attributes, 32*1024));
820 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size));
821 ASSERT_EQ(32*1024U, stack_size);
Yabin Cui917d3902015-01-08 12:32:42 -0800822 ASSERT_GE(GetActualStackSize(attributes), 32*1024U);
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700823
Yabin Cui917d3902015-01-08 12:32:42 -0800824 // Large enough but not aligned; will be rounded up by pthread_create.
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700825 ASSERT_EQ(0, pthread_attr_setstacksize(&attributes, 32*1024 + 1));
826 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size));
827 ASSERT_EQ(32*1024U + 1, stack_size);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800828#if defined(__BIONIC__)
Yabin Cui917d3902015-01-08 12:32:42 -0800829 ASSERT_GT(GetActualStackSize(attributes), 32*1024U + 1);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800830#else // __BIONIC__
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700831 // glibc rounds down, in violation of POSIX. They document this in their BUGS section.
832 ASSERT_EQ(GetActualStackSize(attributes), 32*1024U);
Christopher Ferrisf04935c2013-12-20 18:43:21 -0800833#endif // __BIONIC__
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700834}
Elliott Hughesc3f11402013-10-30 14:40:09 -0700835
Yabin Cui76615da2015-03-17 14:22:09 -0700836TEST(pthread, pthread_rwlockattr_smoke) {
837 pthread_rwlockattr_t attr;
838 ASSERT_EQ(0, pthread_rwlockattr_init(&attr));
839
840 int pshared_value_array[] = {PTHREAD_PROCESS_PRIVATE, PTHREAD_PROCESS_SHARED};
841 for (size_t i = 0; i < sizeof(pshared_value_array) / sizeof(pshared_value_array[0]); ++i) {
842 ASSERT_EQ(0, pthread_rwlockattr_setpshared(&attr, pshared_value_array[i]));
843 int pshared;
844 ASSERT_EQ(0, pthread_rwlockattr_getpshared(&attr, &pshared));
845 ASSERT_EQ(pshared_value_array[i], pshared);
846 }
847
Colin Cross4c5595c2021-08-16 15:51:59 -0700848#if !defined(ANDROID_HOST_MUSL)
Colin Cross7da20342021-07-28 11:18:11 -0700849 // musl doesn't have pthread_rwlockattr_setkind_np
Yabin Cui76615da2015-03-17 14:22:09 -0700850 int kind_array[] = {PTHREAD_RWLOCK_PREFER_READER_NP,
851 PTHREAD_RWLOCK_PREFER_WRITER_NONRECURSIVE_NP};
852 for (size_t i = 0; i < sizeof(kind_array) / sizeof(kind_array[0]); ++i) {
853 ASSERT_EQ(0, pthread_rwlockattr_setkind_np(&attr, kind_array[i]));
854 int kind;
855 ASSERT_EQ(0, pthread_rwlockattr_getkind_np(&attr, &kind));
856 ASSERT_EQ(kind_array[i], kind);
857 }
Colin Cross7da20342021-07-28 11:18:11 -0700858#endif
Yabin Cui76615da2015-03-17 14:22:09 -0700859
860 ASSERT_EQ(0, pthread_rwlockattr_destroy(&attr));
861}
862
863TEST(pthread, pthread_rwlock_init_same_as_PTHREAD_RWLOCK_INITIALIZER) {
864 pthread_rwlock_t lock1 = PTHREAD_RWLOCK_INITIALIZER;
865 pthread_rwlock_t lock2;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700866 ASSERT_EQ(0, pthread_rwlock_init(&lock2, nullptr));
Yabin Cui76615da2015-03-17 14:22:09 -0700867 ASSERT_EQ(0, memcmp(&lock1, &lock2, sizeof(lock1)));
868}
869
Elliott Hughesc3f11402013-10-30 14:40:09 -0700870TEST(pthread, pthread_rwlock_smoke) {
871 pthread_rwlock_t l;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700872 ASSERT_EQ(0, pthread_rwlock_init(&l, nullptr));
Elliott Hughesc3f11402013-10-30 14:40:09 -0700873
Calin Juravle76f352e2014-05-19 13:41:10 +0100874 // Single read lock
Elliott Hughesc3f11402013-10-30 14:40:09 -0700875 ASSERT_EQ(0, pthread_rwlock_rdlock(&l));
876 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
877
Calin Juravle76f352e2014-05-19 13:41:10 +0100878 // Multiple read lock
879 ASSERT_EQ(0, pthread_rwlock_rdlock(&l));
880 ASSERT_EQ(0, pthread_rwlock_rdlock(&l));
881 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
882 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
883
884 // Write lock
Calin Juravle92687e42014-05-22 19:21:22 +0100885 ASSERT_EQ(0, pthread_rwlock_wrlock(&l));
886 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
Calin Juravle76f352e2014-05-19 13:41:10 +0100887
888 // Try writer lock
889 ASSERT_EQ(0, pthread_rwlock_trywrlock(&l));
890 ASSERT_EQ(EBUSY, pthread_rwlock_trywrlock(&l));
891 ASSERT_EQ(EBUSY, pthread_rwlock_tryrdlock(&l));
892 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
893
894 // Try reader lock
895 ASSERT_EQ(0, pthread_rwlock_tryrdlock(&l));
896 ASSERT_EQ(0, pthread_rwlock_tryrdlock(&l));
897 ASSERT_EQ(EBUSY, pthread_rwlock_trywrlock(&l));
898 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
899 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
900
901 // Try writer lock after unlock
Elliott Hughesc3f11402013-10-30 14:40:09 -0700902 ASSERT_EQ(0, pthread_rwlock_wrlock(&l));
903 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
904
Calin Juravle76f352e2014-05-19 13:41:10 +0100905 // EDEADLK in "read after write"
906 ASSERT_EQ(0, pthread_rwlock_wrlock(&l));
907 ASSERT_EQ(EDEADLK, pthread_rwlock_rdlock(&l));
908 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
909
910 // EDEADLK in "write after write"
911 ASSERT_EQ(0, pthread_rwlock_wrlock(&l));
912 ASSERT_EQ(EDEADLK, pthread_rwlock_wrlock(&l));
913 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
Calin Juravle76f352e2014-05-19 13:41:10 +0100914
Elliott Hughesc3f11402013-10-30 14:40:09 -0700915 ASSERT_EQ(0, pthread_rwlock_destroy(&l));
916}
917
Yabin Cui08ee8d22015-02-11 17:04:36 -0800918struct RwlockWakeupHelperArg {
919 pthread_rwlock_t lock;
920 enum Progress {
921 LOCK_INITIALIZED,
922 LOCK_WAITING,
923 LOCK_RELEASED,
Yabin Cuic9a659c2015-11-05 15:36:08 -0800924 LOCK_ACCESSED,
925 LOCK_TIMEDOUT,
Yabin Cui08ee8d22015-02-11 17:04:36 -0800926 };
927 std::atomic<Progress> progress;
Yabin Cuif7969852015-04-02 17:47:48 -0700928 std::atomic<pid_t> tid;
Yabin Cuic9a659c2015-11-05 15:36:08 -0800929 std::function<int (pthread_rwlock_t*)> trylock_function;
930 std::function<int (pthread_rwlock_t*)> lock_function;
931 std::function<int (pthread_rwlock_t*, const timespec*)> timed_lock_function;
Tom Cherryc6b5bcd2018-03-05 14:14:44 -0800932 clockid_t clock;
Yabin Cui08ee8d22015-02-11 17:04:36 -0800933};
934
Yabin Cuic9a659c2015-11-05 15:36:08 -0800935static void pthread_rwlock_wakeup_helper(RwlockWakeupHelperArg* arg) {
Yabin Cuif7969852015-04-02 17:47:48 -0700936 arg->tid = gettid();
Yabin Cui08ee8d22015-02-11 17:04:36 -0800937 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_INITIALIZED, arg->progress);
938 arg->progress = RwlockWakeupHelperArg::LOCK_WAITING;
939
Yabin Cuic9a659c2015-11-05 15:36:08 -0800940 ASSERT_EQ(EBUSY, arg->trylock_function(&arg->lock));
941 ASSERT_EQ(0, arg->lock_function(&arg->lock));
Yabin Cui08ee8d22015-02-11 17:04:36 -0800942 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_RELEASED, arg->progress);
943 ASSERT_EQ(0, pthread_rwlock_unlock(&arg->lock));
944
945 arg->progress = RwlockWakeupHelperArg::LOCK_ACCESSED;
946}
947
Yabin Cuic9a659c2015-11-05 15:36:08 -0800948static void test_pthread_rwlock_reader_wakeup_writer(std::function<int (pthread_rwlock_t*)> lock_function) {
Yabin Cui08ee8d22015-02-11 17:04:36 -0800949 RwlockWakeupHelperArg wakeup_arg;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700950 ASSERT_EQ(0, pthread_rwlock_init(&wakeup_arg.lock, nullptr));
Yabin Cui08ee8d22015-02-11 17:04:36 -0800951 ASSERT_EQ(0, pthread_rwlock_rdlock(&wakeup_arg.lock));
952 wakeup_arg.progress = RwlockWakeupHelperArg::LOCK_INITIALIZED;
Yabin Cuif7969852015-04-02 17:47:48 -0700953 wakeup_arg.tid = 0;
Tom Cherry60ddedf2018-02-20 15:40:02 -0800954 wakeup_arg.trylock_function = &pthread_rwlock_trywrlock;
Yabin Cuic9a659c2015-11-05 15:36:08 -0800955 wakeup_arg.lock_function = lock_function;
Yabin Cui08ee8d22015-02-11 17:04:36 -0800956
957 pthread_t thread;
Yi Kong32bc0fc2018-08-02 17:31:13 -0700958 ASSERT_EQ(0, pthread_create(&thread, nullptr,
Yabin Cuic9a659c2015-11-05 15:36:08 -0800959 reinterpret_cast<void* (*)(void*)>(pthread_rwlock_wakeup_helper), &wakeup_arg));
Yabin Cuif7969852015-04-02 17:47:48 -0700960 WaitUntilThreadSleep(wakeup_arg.tid);
961 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_WAITING, wakeup_arg.progress);
962
Yabin Cui08ee8d22015-02-11 17:04:36 -0800963 wakeup_arg.progress = RwlockWakeupHelperArg::LOCK_RELEASED;
964 ASSERT_EQ(0, pthread_rwlock_unlock(&wakeup_arg.lock));
965
Yi Kong32bc0fc2018-08-02 17:31:13 -0700966 ASSERT_EQ(0, pthread_join(thread, nullptr));
Yabin Cui08ee8d22015-02-11 17:04:36 -0800967 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_ACCESSED, wakeup_arg.progress);
968 ASSERT_EQ(0, pthread_rwlock_destroy(&wakeup_arg.lock));
969}
970
Yabin Cuic9a659c2015-11-05 15:36:08 -0800971TEST(pthread, pthread_rwlock_reader_wakeup_writer) {
972 test_pthread_rwlock_reader_wakeup_writer(pthread_rwlock_wrlock);
Yabin Cui08ee8d22015-02-11 17:04:36 -0800973}
974
Yabin Cuic9a659c2015-11-05 15:36:08 -0800975TEST(pthread, pthread_rwlock_reader_wakeup_writer_timedwait) {
976 timespec ts;
977 ASSERT_EQ(0, clock_gettime(CLOCK_REALTIME, &ts));
978 ts.tv_sec += 1;
979 test_pthread_rwlock_reader_wakeup_writer([&](pthread_rwlock_t* lock) {
980 return pthread_rwlock_timedwrlock(lock, &ts);
981 });
982}
983
Tom Cherryc6b5bcd2018-03-05 14:14:44 -0800984TEST(pthread, pthread_rwlock_reader_wakeup_writer_timedwait_monotonic_np) {
985#if defined(__BIONIC__)
986 timespec ts;
987 ASSERT_EQ(0, clock_gettime(CLOCK_MONOTONIC, &ts));
988 ts.tv_sec += 1;
989 test_pthread_rwlock_reader_wakeup_writer(
990 [&](pthread_rwlock_t* lock) { return pthread_rwlock_timedwrlock_monotonic_np(lock, &ts); });
991#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -0800992 GTEST_SKIP() << "pthread_rwlock_timedwrlock_monotonic_np not available";
Tom Cherryc6b5bcd2018-03-05 14:14:44 -0800993#endif // __BIONIC__
994}
995
Tom Cherry69010802019-05-07 20:33:05 -0700996TEST(pthread, pthread_rwlock_reader_wakeup_writer_clockwait) {
997#if defined(__BIONIC__)
998 timespec ts;
999 ASSERT_EQ(0, clock_gettime(CLOCK_MONOTONIC, &ts));
1000 ts.tv_sec += 1;
1001 test_pthread_rwlock_reader_wakeup_writer([&](pthread_rwlock_t* lock) {
1002 return pthread_rwlock_clockwrlock(lock, CLOCK_MONOTONIC, &ts);
1003 });
1004
1005 ASSERT_EQ(0, clock_gettime(CLOCK_REALTIME, &ts));
1006 ts.tv_sec += 1;
1007 test_pthread_rwlock_reader_wakeup_writer([&](pthread_rwlock_t* lock) {
1008 return pthread_rwlock_clockwrlock(lock, CLOCK_REALTIME, &ts);
1009 });
1010#else // __BIONIC__
1011 GTEST_SKIP() << "pthread_rwlock_clockwrlock not available";
1012#endif // __BIONIC__
1013}
1014
Yabin Cuic9a659c2015-11-05 15:36:08 -08001015static void test_pthread_rwlock_writer_wakeup_reader(std::function<int (pthread_rwlock_t*)> lock_function) {
Yabin Cui08ee8d22015-02-11 17:04:36 -08001016 RwlockWakeupHelperArg wakeup_arg;
Yi Kong32bc0fc2018-08-02 17:31:13 -07001017 ASSERT_EQ(0, pthread_rwlock_init(&wakeup_arg.lock, nullptr));
Yabin Cui08ee8d22015-02-11 17:04:36 -08001018 ASSERT_EQ(0, pthread_rwlock_wrlock(&wakeup_arg.lock));
1019 wakeup_arg.progress = RwlockWakeupHelperArg::LOCK_INITIALIZED;
Yabin Cuif7969852015-04-02 17:47:48 -07001020 wakeup_arg.tid = 0;
Tom Cherry60ddedf2018-02-20 15:40:02 -08001021 wakeup_arg.trylock_function = &pthread_rwlock_tryrdlock;
Yabin Cuic9a659c2015-11-05 15:36:08 -08001022 wakeup_arg.lock_function = lock_function;
Yabin Cui08ee8d22015-02-11 17:04:36 -08001023
1024 pthread_t thread;
Yi Kong32bc0fc2018-08-02 17:31:13 -07001025 ASSERT_EQ(0, pthread_create(&thread, nullptr,
Yabin Cuic9a659c2015-11-05 15:36:08 -08001026 reinterpret_cast<void* (*)(void*)>(pthread_rwlock_wakeup_helper), &wakeup_arg));
Yabin Cuif7969852015-04-02 17:47:48 -07001027 WaitUntilThreadSleep(wakeup_arg.tid);
1028 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_WAITING, wakeup_arg.progress);
1029
Yabin Cui08ee8d22015-02-11 17:04:36 -08001030 wakeup_arg.progress = RwlockWakeupHelperArg::LOCK_RELEASED;
1031 ASSERT_EQ(0, pthread_rwlock_unlock(&wakeup_arg.lock));
1032
Yi Kong32bc0fc2018-08-02 17:31:13 -07001033 ASSERT_EQ(0, pthread_join(thread, nullptr));
Yabin Cui08ee8d22015-02-11 17:04:36 -08001034 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_ACCESSED, wakeup_arg.progress);
1035 ASSERT_EQ(0, pthread_rwlock_destroy(&wakeup_arg.lock));
1036}
1037
Yabin Cuic9a659c2015-11-05 15:36:08 -08001038TEST(pthread, pthread_rwlock_writer_wakeup_reader) {
1039 test_pthread_rwlock_writer_wakeup_reader(pthread_rwlock_rdlock);
1040}
1041
1042TEST(pthread, pthread_rwlock_writer_wakeup_reader_timedwait) {
1043 timespec ts;
1044 ASSERT_EQ(0, clock_gettime(CLOCK_REALTIME, &ts));
1045 ts.tv_sec += 1;
1046 test_pthread_rwlock_writer_wakeup_reader([&](pthread_rwlock_t* lock) {
1047 return pthread_rwlock_timedrdlock(lock, &ts);
1048 });
1049}
1050
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001051TEST(pthread, pthread_rwlock_writer_wakeup_reader_timedwait_monotonic_np) {
1052#if defined(__BIONIC__)
1053 timespec ts;
1054 ASSERT_EQ(0, clock_gettime(CLOCK_MONOTONIC, &ts));
1055 ts.tv_sec += 1;
1056 test_pthread_rwlock_writer_wakeup_reader(
1057 [&](pthread_rwlock_t* lock) { return pthread_rwlock_timedrdlock_monotonic_np(lock, &ts); });
1058#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -08001059 GTEST_SKIP() << "pthread_rwlock_timedrdlock_monotonic_np not available";
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001060#endif // __BIONIC__
1061}
1062
Tom Cherry69010802019-05-07 20:33:05 -07001063TEST(pthread, pthread_rwlock_writer_wakeup_reader_clockwait) {
1064#if defined(__BIONIC__)
1065 timespec ts;
1066 ASSERT_EQ(0, clock_gettime(CLOCK_MONOTONIC, &ts));
1067 ts.tv_sec += 1;
1068 test_pthread_rwlock_writer_wakeup_reader([&](pthread_rwlock_t* lock) {
1069 return pthread_rwlock_clockrdlock(lock, CLOCK_MONOTONIC, &ts);
1070 });
1071
1072 ASSERT_EQ(0, clock_gettime(CLOCK_REALTIME, &ts));
1073 ts.tv_sec += 1;
1074 test_pthread_rwlock_writer_wakeup_reader([&](pthread_rwlock_t* lock) {
1075 return pthread_rwlock_clockrdlock(lock, CLOCK_REALTIME, &ts);
1076 });
1077#else // __BIONIC__
1078 GTEST_SKIP() << "pthread_rwlock_clockrdlock not available";
1079#endif // __BIONIC__
1080}
1081
Yabin Cuic9a659c2015-11-05 15:36:08 -08001082static void pthread_rwlock_wakeup_timeout_helper(RwlockWakeupHelperArg* arg) {
1083 arg->tid = gettid();
1084 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_INITIALIZED, arg->progress);
1085 arg->progress = RwlockWakeupHelperArg::LOCK_WAITING;
1086
1087 ASSERT_EQ(EBUSY, arg->trylock_function(&arg->lock));
1088
1089 timespec ts;
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001090 ASSERT_EQ(0, clock_gettime(arg->clock, &ts));
Yabin Cuic9a659c2015-11-05 15:36:08 -08001091 ASSERT_EQ(ETIMEDOUT, arg->timed_lock_function(&arg->lock, &ts));
1092 ts.tv_nsec = -1;
1093 ASSERT_EQ(EINVAL, arg->timed_lock_function(&arg->lock, &ts));
1094 ts.tv_nsec = NS_PER_S;
1095 ASSERT_EQ(EINVAL, arg->timed_lock_function(&arg->lock, &ts));
1096 ts.tv_nsec = NS_PER_S - 1;
1097 ts.tv_sec = -1;
1098 ASSERT_EQ(ETIMEDOUT, arg->timed_lock_function(&arg->lock, &ts));
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001099 ASSERT_EQ(0, clock_gettime(arg->clock, &ts));
Yabin Cuic9a659c2015-11-05 15:36:08 -08001100 ts.tv_sec += 1;
1101 ASSERT_EQ(ETIMEDOUT, arg->timed_lock_function(&arg->lock, &ts));
1102 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_WAITING, arg->progress);
1103 arg->progress = RwlockWakeupHelperArg::LOCK_TIMEDOUT;
1104}
1105
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001106static void pthread_rwlock_timedrdlock_timeout_helper(
1107 clockid_t clock, int (*lock_function)(pthread_rwlock_t* __rwlock, const timespec* __timeout)) {
Yabin Cuic9a659c2015-11-05 15:36:08 -08001108 RwlockWakeupHelperArg wakeup_arg;
1109 ASSERT_EQ(0, pthread_rwlock_init(&wakeup_arg.lock, nullptr));
1110 ASSERT_EQ(0, pthread_rwlock_wrlock(&wakeup_arg.lock));
1111 wakeup_arg.progress = RwlockWakeupHelperArg::LOCK_INITIALIZED;
1112 wakeup_arg.tid = 0;
Tom Cherry60ddedf2018-02-20 15:40:02 -08001113 wakeup_arg.trylock_function = &pthread_rwlock_tryrdlock;
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001114 wakeup_arg.timed_lock_function = lock_function;
1115 wakeup_arg.clock = clock;
1116
1117 pthread_t thread;
1118 ASSERT_EQ(0, pthread_create(&thread, nullptr,
1119 reinterpret_cast<void* (*)(void*)>(pthread_rwlock_wakeup_timeout_helper), &wakeup_arg));
1120 WaitUntilThreadSleep(wakeup_arg.tid);
1121 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_WAITING, wakeup_arg.progress);
1122
1123 ASSERT_EQ(0, pthread_join(thread, nullptr));
1124 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_TIMEDOUT, wakeup_arg.progress);
1125 ASSERT_EQ(0, pthread_rwlock_unlock(&wakeup_arg.lock));
1126 ASSERT_EQ(0, pthread_rwlock_destroy(&wakeup_arg.lock));
1127}
1128
1129TEST(pthread, pthread_rwlock_timedrdlock_timeout) {
1130 pthread_rwlock_timedrdlock_timeout_helper(CLOCK_REALTIME, pthread_rwlock_timedrdlock);
1131}
1132
1133TEST(pthread, pthread_rwlock_timedrdlock_monotonic_np_timeout) {
1134#if defined(__BIONIC__)
1135 pthread_rwlock_timedrdlock_timeout_helper(CLOCK_MONOTONIC,
1136 pthread_rwlock_timedrdlock_monotonic_np);
1137#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -08001138 GTEST_SKIP() << "pthread_rwlock_timedrdlock_monotonic_np not available";
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001139#endif // __BIONIC__
1140}
1141
Tom Cherry69010802019-05-07 20:33:05 -07001142TEST(pthread, pthread_rwlock_clockrdlock_monotonic_timeout) {
1143#if defined(__BIONIC__)
1144 pthread_rwlock_timedrdlock_timeout_helper(
1145 CLOCK_MONOTONIC, [](pthread_rwlock_t* __rwlock, const timespec* __timeout) {
1146 return pthread_rwlock_clockrdlock(__rwlock, CLOCK_MONOTONIC, __timeout);
1147 });
1148#else // __BIONIC__
1149 GTEST_SKIP() << "pthread_rwlock_clockrdlock not available";
1150#endif // __BIONIC__
1151}
1152
1153TEST(pthread, pthread_rwlock_clockrdlock_realtime_timeout) {
1154#if defined(__BIONIC__)
1155 pthread_rwlock_timedrdlock_timeout_helper(
1156 CLOCK_REALTIME, [](pthread_rwlock_t* __rwlock, const timespec* __timeout) {
1157 return pthread_rwlock_clockrdlock(__rwlock, CLOCK_REALTIME, __timeout);
1158 });
1159#else // __BIONIC__
1160 GTEST_SKIP() << "pthread_rwlock_clockrdlock not available";
1161#endif // __BIONIC__
1162}
1163
1164TEST(pthread, pthread_rwlock_clockrdlock_invalid) {
1165#if defined(__BIONIC__)
1166 pthread_rwlock_t lock = PTHREAD_RWLOCK_INITIALIZER;
1167 timespec ts;
1168 EXPECT_EQ(EINVAL, pthread_rwlock_clockrdlock(&lock, CLOCK_PROCESS_CPUTIME_ID, &ts));
1169#else // __BIONIC__
1170 GTEST_SKIP() << "pthread_rwlock_clockrdlock not available";
1171#endif // __BIONIC__
1172}
1173
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001174static void pthread_rwlock_timedwrlock_timeout_helper(
1175 clockid_t clock, int (*lock_function)(pthread_rwlock_t* __rwlock, const timespec* __timeout)) {
1176 RwlockWakeupHelperArg wakeup_arg;
1177 ASSERT_EQ(0, pthread_rwlock_init(&wakeup_arg.lock, nullptr));
1178 ASSERT_EQ(0, pthread_rwlock_rdlock(&wakeup_arg.lock));
1179 wakeup_arg.progress = RwlockWakeupHelperArg::LOCK_INITIALIZED;
1180 wakeup_arg.tid = 0;
1181 wakeup_arg.trylock_function = &pthread_rwlock_trywrlock;
1182 wakeup_arg.timed_lock_function = lock_function;
1183 wakeup_arg.clock = clock;
Yabin Cuic9a659c2015-11-05 15:36:08 -08001184
1185 pthread_t thread;
1186 ASSERT_EQ(0, pthread_create(&thread, nullptr,
1187 reinterpret_cast<void* (*)(void*)>(pthread_rwlock_wakeup_timeout_helper), &wakeup_arg));
1188 WaitUntilThreadSleep(wakeup_arg.tid);
1189 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_WAITING, wakeup_arg.progress);
1190
1191 ASSERT_EQ(0, pthread_join(thread, nullptr));
1192 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_TIMEDOUT, wakeup_arg.progress);
1193 ASSERT_EQ(0, pthread_rwlock_unlock(&wakeup_arg.lock));
1194 ASSERT_EQ(0, pthread_rwlock_destroy(&wakeup_arg.lock));
1195}
1196
1197TEST(pthread, pthread_rwlock_timedwrlock_timeout) {
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001198 pthread_rwlock_timedwrlock_timeout_helper(CLOCK_REALTIME, pthread_rwlock_timedwrlock);
1199}
Yabin Cuic9a659c2015-11-05 15:36:08 -08001200
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001201TEST(pthread, pthread_rwlock_timedwrlock_monotonic_np_timeout) {
1202#if defined(__BIONIC__)
1203 pthread_rwlock_timedwrlock_timeout_helper(CLOCK_MONOTONIC,
1204 pthread_rwlock_timedwrlock_monotonic_np);
1205#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -08001206 GTEST_SKIP() << "pthread_rwlock_timedwrlock_monotonic_np not available";
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001207#endif // __BIONIC__
Yabin Cuic9a659c2015-11-05 15:36:08 -08001208}
1209
Tom Cherry69010802019-05-07 20:33:05 -07001210TEST(pthread, pthread_rwlock_clockwrlock_monotonic_timeout) {
1211#if defined(__BIONIC__)
1212 pthread_rwlock_timedwrlock_timeout_helper(
1213 CLOCK_MONOTONIC, [](pthread_rwlock_t* __rwlock, const timespec* __timeout) {
1214 return pthread_rwlock_clockwrlock(__rwlock, CLOCK_MONOTONIC, __timeout);
1215 });
1216#else // __BIONIC__
1217 GTEST_SKIP() << "pthread_rwlock_clockwrlock not available";
1218#endif // __BIONIC__
1219}
1220
1221TEST(pthread, pthread_rwlock_clockwrlock_realtime_timeout) {
1222#if defined(__BIONIC__)
1223 pthread_rwlock_timedwrlock_timeout_helper(
1224 CLOCK_REALTIME, [](pthread_rwlock_t* __rwlock, const timespec* __timeout) {
1225 return pthread_rwlock_clockwrlock(__rwlock, CLOCK_REALTIME, __timeout);
1226 });
1227#else // __BIONIC__
1228 GTEST_SKIP() << "pthread_rwlock_clockwrlock not available";
1229#endif // __BIONIC__
1230}
1231
1232TEST(pthread, pthread_rwlock_clockwrlock_invalid) {
1233#if defined(__BIONIC__)
1234 pthread_rwlock_t lock = PTHREAD_RWLOCK_INITIALIZER;
1235 timespec ts;
1236 EXPECT_EQ(EINVAL, pthread_rwlock_clockwrlock(&lock, CLOCK_PROCESS_CPUTIME_ID, &ts));
1237#else // __BIONIC__
1238 GTEST_SKIP() << "pthread_rwlock_clockrwlock not available";
1239#endif // __BIONIC__
1240}
1241
Colin Cross4c5595c2021-08-16 15:51:59 -07001242#if !defined(ANDROID_HOST_MUSL)
Colin Cross7da20342021-07-28 11:18:11 -07001243// musl doesn't have pthread_rwlockattr_setkind_np
Yabin Cui76615da2015-03-17 14:22:09 -07001244class RwlockKindTestHelper {
1245 private:
1246 struct ThreadArg {
1247 RwlockKindTestHelper* helper;
1248 std::atomic<pid_t>& tid;
1249
1250 ThreadArg(RwlockKindTestHelper* helper, std::atomic<pid_t>& tid)
1251 : helper(helper), tid(tid) { }
1252 };
1253
1254 public:
1255 pthread_rwlock_t lock;
1256
1257 public:
Chih-Hung Hsieh62e3a072016-05-03 12:08:05 -07001258 explicit RwlockKindTestHelper(int kind_type) {
Yabin Cui76615da2015-03-17 14:22:09 -07001259 InitRwlock(kind_type);
1260 }
1261
1262 ~RwlockKindTestHelper() {
1263 DestroyRwlock();
1264 }
1265
1266 void CreateWriterThread(pthread_t& thread, std::atomic<pid_t>& tid) {
1267 tid = 0;
1268 ThreadArg* arg = new ThreadArg(this, tid);
Yi Kong32bc0fc2018-08-02 17:31:13 -07001269 ASSERT_EQ(0, pthread_create(&thread, nullptr,
Yabin Cui76615da2015-03-17 14:22:09 -07001270 reinterpret_cast<void* (*)(void*)>(WriterThreadFn), arg));
1271 }
1272
1273 void CreateReaderThread(pthread_t& thread, std::atomic<pid_t>& tid) {
1274 tid = 0;
1275 ThreadArg* arg = new ThreadArg(this, tid);
Yi Kong32bc0fc2018-08-02 17:31:13 -07001276 ASSERT_EQ(0, pthread_create(&thread, nullptr,
Yabin Cui76615da2015-03-17 14:22:09 -07001277 reinterpret_cast<void* (*)(void*)>(ReaderThreadFn), arg));
1278 }
1279
1280 private:
1281 void InitRwlock(int kind_type) {
1282 pthread_rwlockattr_t attr;
1283 ASSERT_EQ(0, pthread_rwlockattr_init(&attr));
1284 ASSERT_EQ(0, pthread_rwlockattr_setkind_np(&attr, kind_type));
1285 ASSERT_EQ(0, pthread_rwlock_init(&lock, &attr));
1286 ASSERT_EQ(0, pthread_rwlockattr_destroy(&attr));
1287 }
1288
1289 void DestroyRwlock() {
1290 ASSERT_EQ(0, pthread_rwlock_destroy(&lock));
1291 }
1292
1293 static void WriterThreadFn(ThreadArg* arg) {
1294 arg->tid = gettid();
1295
1296 RwlockKindTestHelper* helper = arg->helper;
1297 ASSERT_EQ(0, pthread_rwlock_wrlock(&helper->lock));
1298 ASSERT_EQ(0, pthread_rwlock_unlock(&helper->lock));
1299 delete arg;
1300 }
1301
1302 static void ReaderThreadFn(ThreadArg* arg) {
1303 arg->tid = gettid();
1304
1305 RwlockKindTestHelper* helper = arg->helper;
1306 ASSERT_EQ(0, pthread_rwlock_rdlock(&helper->lock));
1307 ASSERT_EQ(0, pthread_rwlock_unlock(&helper->lock));
1308 delete arg;
1309 }
1310};
Colin Cross7da20342021-07-28 11:18:11 -07001311#endif
Yabin Cui76615da2015-03-17 14:22:09 -07001312
1313TEST(pthread, pthread_rwlock_kind_PTHREAD_RWLOCK_PREFER_READER_NP) {
Colin Cross4c5595c2021-08-16 15:51:59 -07001314#if !defined(ANDROID_HOST_MUSL)
Yabin Cui76615da2015-03-17 14:22:09 -07001315 RwlockKindTestHelper helper(PTHREAD_RWLOCK_PREFER_READER_NP);
1316 ASSERT_EQ(0, pthread_rwlock_rdlock(&helper.lock));
1317
1318 pthread_t writer_thread;
1319 std::atomic<pid_t> writer_tid;
1320 helper.CreateWriterThread(writer_thread, writer_tid);
1321 WaitUntilThreadSleep(writer_tid);
1322
1323 pthread_t reader_thread;
1324 std::atomic<pid_t> reader_tid;
1325 helper.CreateReaderThread(reader_thread, reader_tid);
Yi Kong32bc0fc2018-08-02 17:31:13 -07001326 ASSERT_EQ(0, pthread_join(reader_thread, nullptr));
Yabin Cui76615da2015-03-17 14:22:09 -07001327
1328 ASSERT_EQ(0, pthread_rwlock_unlock(&helper.lock));
Yi Kong32bc0fc2018-08-02 17:31:13 -07001329 ASSERT_EQ(0, pthread_join(writer_thread, nullptr));
Colin Cross7da20342021-07-28 11:18:11 -07001330#else
1331 GTEST_SKIP() << "musl doesn't have pthread_rwlockattr_setkind_np";
1332#endif
Yabin Cui76615da2015-03-17 14:22:09 -07001333}
1334
1335TEST(pthread, pthread_rwlock_kind_PTHREAD_RWLOCK_PREFER_WRITER_NONRECURSIVE_NP) {
Colin Cross4c5595c2021-08-16 15:51:59 -07001336#if !defined(ANDROID_HOST_MUSL)
Yabin Cui76615da2015-03-17 14:22:09 -07001337 RwlockKindTestHelper helper(PTHREAD_RWLOCK_PREFER_WRITER_NONRECURSIVE_NP);
1338 ASSERT_EQ(0, pthread_rwlock_rdlock(&helper.lock));
1339
1340 pthread_t writer_thread;
1341 std::atomic<pid_t> writer_tid;
1342 helper.CreateWriterThread(writer_thread, writer_tid);
1343 WaitUntilThreadSleep(writer_tid);
1344
1345 pthread_t reader_thread;
1346 std::atomic<pid_t> reader_tid;
1347 helper.CreateReaderThread(reader_thread, reader_tid);
1348 WaitUntilThreadSleep(reader_tid);
1349
1350 ASSERT_EQ(0, pthread_rwlock_unlock(&helper.lock));
Yi Kong32bc0fc2018-08-02 17:31:13 -07001351 ASSERT_EQ(0, pthread_join(writer_thread, nullptr));
1352 ASSERT_EQ(0, pthread_join(reader_thread, nullptr));
Colin Cross7da20342021-07-28 11:18:11 -07001353#else
1354 GTEST_SKIP() << "musl doesn't have pthread_rwlockattr_setkind_np";
1355#endif
Yabin Cui76615da2015-03-17 14:22:09 -07001356}
1357
Elliott Hughes1728b232014-05-14 10:02:03 -07001358static int g_once_fn_call_count = 0;
Elliott Hughesc3f11402013-10-30 14:40:09 -07001359static void OnceFn() {
Elliott Hughes1728b232014-05-14 10:02:03 -07001360 ++g_once_fn_call_count;
Elliott Hughesc3f11402013-10-30 14:40:09 -07001361}
1362
1363TEST(pthread, pthread_once_smoke) {
1364 pthread_once_t once_control = PTHREAD_ONCE_INIT;
1365 ASSERT_EQ(0, pthread_once(&once_control, OnceFn));
1366 ASSERT_EQ(0, pthread_once(&once_control, OnceFn));
Elliott Hughes1728b232014-05-14 10:02:03 -07001367 ASSERT_EQ(1, g_once_fn_call_count);
Elliott Hughesc3f11402013-10-30 14:40:09 -07001368}
1369
Elliott Hughes3694ec62014-05-14 11:46:08 -07001370static std::string pthread_once_1934122_result = "";
1371
1372static void Routine2() {
1373 pthread_once_1934122_result += "2";
1374}
1375
1376static void Routine1() {
1377 pthread_once_t once_control_2 = PTHREAD_ONCE_INIT;
1378 pthread_once_1934122_result += "1";
1379 pthread_once(&once_control_2, &Routine2);
1380}
1381
1382TEST(pthread, pthread_once_1934122) {
1383 // Very old versions of Android couldn't call pthread_once from a
1384 // pthread_once init routine. http://b/1934122.
1385 pthread_once_t once_control_1 = PTHREAD_ONCE_INIT;
1386 ASSERT_EQ(0, pthread_once(&once_control_1, &Routine1));
1387 ASSERT_EQ("12", pthread_once_1934122_result);
1388}
1389
Elliott Hughes1728b232014-05-14 10:02:03 -07001390static int g_atfork_prepare_calls = 0;
Dmitriy Ivanovea295f62014-11-20 20:47:02 -08001391static void AtForkPrepare1() { g_atfork_prepare_calls = (g_atfork_prepare_calls * 10) + 1; }
1392static void AtForkPrepare2() { g_atfork_prepare_calls = (g_atfork_prepare_calls * 10) + 2; }
Elliott Hughes1728b232014-05-14 10:02:03 -07001393static int g_atfork_parent_calls = 0;
Dmitriy Ivanovea295f62014-11-20 20:47:02 -08001394static void AtForkParent1() { g_atfork_parent_calls = (g_atfork_parent_calls * 10) + 1; }
1395static void AtForkParent2() { g_atfork_parent_calls = (g_atfork_parent_calls * 10) + 2; }
Elliott Hughes1728b232014-05-14 10:02:03 -07001396static int g_atfork_child_calls = 0;
Dmitriy Ivanovea295f62014-11-20 20:47:02 -08001397static void AtForkChild1() { g_atfork_child_calls = (g_atfork_child_calls * 10) + 1; }
1398static void AtForkChild2() { g_atfork_child_calls = (g_atfork_child_calls * 10) + 2; }
Elliott Hughesc3f11402013-10-30 14:40:09 -07001399
Dmitriy Ivanov00e37812014-11-20 16:53:47 -08001400TEST(pthread, pthread_atfork_smoke) {
Dmitriy Ivanovcb0443c2015-03-16 14:15:46 -07001401 ASSERT_EQ(0, pthread_atfork(AtForkPrepare1, AtForkParent1, AtForkChild1));
1402 ASSERT_EQ(0, pthread_atfork(AtForkPrepare2, AtForkParent2, AtForkChild2));
Elliott Hughesc3f11402013-10-30 14:40:09 -07001403
Elliott Hughes33697a02016-01-26 13:04:57 -08001404 pid_t pid = fork();
Dmitriy Ivanovcb0443c2015-03-16 14:15:46 -07001405 ASSERT_NE(-1, pid) << strerror(errno);
Elliott Hughesc3f11402013-10-30 14:40:09 -07001406
Dmitriy Ivanovcb0443c2015-03-16 14:15:46 -07001407 // Child and parent calls are made in the order they were registered.
1408 if (pid == 0) {
Dmitriy Ivanovea295f62014-11-20 20:47:02 -08001409 ASSERT_EQ(12, g_atfork_child_calls);
Dmitriy Ivanovcb0443c2015-03-16 14:15:46 -07001410 _exit(0);
1411 }
Dmitriy Ivanovea295f62014-11-20 20:47:02 -08001412 ASSERT_EQ(12, g_atfork_parent_calls);
Elliott Hughesc3f11402013-10-30 14:40:09 -07001413
Dmitriy Ivanovcb0443c2015-03-16 14:15:46 -07001414 // Prepare calls are made in the reverse order.
Dmitriy Ivanovea295f62014-11-20 20:47:02 -08001415 ASSERT_EQ(21, g_atfork_prepare_calls);
Elliott Hughes33697a02016-01-26 13:04:57 -08001416 AssertChildExited(pid, 0);
Dmitriy Ivanovea295f62014-11-20 20:47:02 -08001417}
1418
Elliott Hughesc3f11402013-10-30 14:40:09 -07001419TEST(pthread, pthread_attr_getscope) {
1420 pthread_attr_t attr;
1421 ASSERT_EQ(0, pthread_attr_init(&attr));
1422
1423 int scope;
1424 ASSERT_EQ(0, pthread_attr_getscope(&attr, &scope));
1425 ASSERT_EQ(PTHREAD_SCOPE_SYSTEM, scope);
1426}
Narayan Kamath51e6cb32014-03-03 15:38:51 +00001427
1428TEST(pthread, pthread_condattr_init) {
1429 pthread_condattr_t attr;
1430 pthread_condattr_init(&attr);
1431
1432 clockid_t clock;
1433 ASSERT_EQ(0, pthread_condattr_getclock(&attr, &clock));
1434 ASSERT_EQ(CLOCK_REALTIME, clock);
1435
1436 int pshared;
1437 ASSERT_EQ(0, pthread_condattr_getpshared(&attr, &pshared));
1438 ASSERT_EQ(PTHREAD_PROCESS_PRIVATE, pshared);
1439}
1440
1441TEST(pthread, pthread_condattr_setclock) {
1442 pthread_condattr_t attr;
1443 pthread_condattr_init(&attr);
1444
1445 ASSERT_EQ(0, pthread_condattr_setclock(&attr, CLOCK_REALTIME));
1446 clockid_t clock;
1447 ASSERT_EQ(0, pthread_condattr_getclock(&attr, &clock));
1448 ASSERT_EQ(CLOCK_REALTIME, clock);
1449
1450 ASSERT_EQ(0, pthread_condattr_setclock(&attr, CLOCK_MONOTONIC));
1451 ASSERT_EQ(0, pthread_condattr_getclock(&attr, &clock));
1452 ASSERT_EQ(CLOCK_MONOTONIC, clock);
1453
1454 ASSERT_EQ(EINVAL, pthread_condattr_setclock(&attr, CLOCK_PROCESS_CPUTIME_ID));
1455}
1456
1457TEST(pthread, pthread_cond_broadcast__preserves_condattr_flags) {
Yabin Cui32651b82015-03-13 20:30:00 -07001458#if defined(__BIONIC__)
Narayan Kamath51e6cb32014-03-03 15:38:51 +00001459 pthread_condattr_t attr;
1460 pthread_condattr_init(&attr);
1461
1462 ASSERT_EQ(0, pthread_condattr_setclock(&attr, CLOCK_MONOTONIC));
1463 ASSERT_EQ(0, pthread_condattr_setpshared(&attr, PTHREAD_PROCESS_SHARED));
1464
1465 pthread_cond_t cond_var;
1466 ASSERT_EQ(0, pthread_cond_init(&cond_var, &attr));
1467
1468 ASSERT_EQ(0, pthread_cond_signal(&cond_var));
1469 ASSERT_EQ(0, pthread_cond_broadcast(&cond_var));
1470
Yabin Cui32651b82015-03-13 20:30:00 -07001471 attr = static_cast<pthread_condattr_t>(*reinterpret_cast<uint32_t*>(cond_var.__private));
Narayan Kamath51e6cb32014-03-03 15:38:51 +00001472 clockid_t clock;
1473 ASSERT_EQ(0, pthread_condattr_getclock(&attr, &clock));
1474 ASSERT_EQ(CLOCK_MONOTONIC, clock);
1475 int pshared;
1476 ASSERT_EQ(0, pthread_condattr_getpshared(&attr, &pshared));
1477 ASSERT_EQ(PTHREAD_PROCESS_SHARED, pshared);
Yabin Cui32651b82015-03-13 20:30:00 -07001478#else // !defined(__BIONIC__)
Elliott Hughesbcaa4542019-03-08 15:20:23 -08001479 GTEST_SKIP() << "bionic-only test";
Yabin Cui32651b82015-03-13 20:30:00 -07001480#endif // !defined(__BIONIC__)
1481}
1482
1483class pthread_CondWakeupTest : public ::testing::Test {
1484 protected:
1485 pthread_mutex_t mutex;
1486 pthread_cond_t cond;
1487
1488 enum Progress {
1489 INITIALIZED,
1490 WAITING,
1491 SIGNALED,
1492 FINISHED,
1493 };
1494 std::atomic<Progress> progress;
1495 pthread_t thread;
Yabin Cuic9a659c2015-11-05 15:36:08 -08001496 std::function<int (pthread_cond_t* cond, pthread_mutex_t* mutex)> wait_function;
Yabin Cui32651b82015-03-13 20:30:00 -07001497
1498 protected:
Yabin Cuic9a659c2015-11-05 15:36:08 -08001499 void SetUp() override {
1500 ASSERT_EQ(0, pthread_mutex_init(&mutex, nullptr));
1501 }
1502
1503 void InitCond(clockid_t clock=CLOCK_REALTIME) {
1504 pthread_condattr_t attr;
1505 ASSERT_EQ(0, pthread_condattr_init(&attr));
1506 ASSERT_EQ(0, pthread_condattr_setclock(&attr, clock));
1507 ASSERT_EQ(0, pthread_cond_init(&cond, &attr));
1508 ASSERT_EQ(0, pthread_condattr_destroy(&attr));
1509 }
1510
Tom Cherry69010802019-05-07 20:33:05 -07001511 void StartWaitingThread(
1512 std::function<int(pthread_cond_t* cond, pthread_mutex_t* mutex)> wait_function) {
Yabin Cui32651b82015-03-13 20:30:00 -07001513 progress = INITIALIZED;
Yabin Cuic9a659c2015-11-05 15:36:08 -08001514 this->wait_function = wait_function;
Tom Cherry69010802019-05-07 20:33:05 -07001515 ASSERT_EQ(0, pthread_create(&thread, nullptr, reinterpret_cast<void* (*)(void*)>(WaitThreadFn),
1516 this));
Yabin Cuic9a659c2015-11-05 15:36:08 -08001517 while (progress != WAITING) {
Yabin Cui32651b82015-03-13 20:30:00 -07001518 usleep(5000);
1519 }
1520 usleep(5000);
1521 }
1522
Tom Cherry69010802019-05-07 20:33:05 -07001523 void RunTimedTest(
1524 clockid_t clock,
1525 std::function<int(pthread_cond_t* cond, pthread_mutex_t* mutex, const timespec* timeout)>
1526 wait_function) {
1527 timespec ts;
1528 ASSERT_EQ(0, clock_gettime(clock, &ts));
1529 ts.tv_sec += 1;
1530
1531 StartWaitingThread([&wait_function, &ts](pthread_cond_t* cond, pthread_mutex_t* mutex) {
1532 return wait_function(cond, mutex, &ts);
1533 });
1534
1535 progress = SIGNALED;
1536 ASSERT_EQ(0, pthread_cond_signal(&cond));
1537 }
1538
1539 void RunTimedTest(clockid_t clock, std::function<int(pthread_cond_t* cond, pthread_mutex_t* mutex,
1540 clockid_t clock, const timespec* timeout)>
1541 wait_function) {
1542 RunTimedTest(clock, [clock, &wait_function](pthread_cond_t* cond, pthread_mutex_t* mutex,
1543 const timespec* timeout) {
1544 return wait_function(cond, mutex, clock, timeout);
1545 });
1546 }
1547
Yabin Cuic9a659c2015-11-05 15:36:08 -08001548 void TearDown() override {
1549 ASSERT_EQ(0, pthread_join(thread, nullptr));
1550 ASSERT_EQ(FINISHED, progress);
1551 ASSERT_EQ(0, pthread_cond_destroy(&cond));
1552 ASSERT_EQ(0, pthread_mutex_destroy(&mutex));
1553 }
1554
Yabin Cui32651b82015-03-13 20:30:00 -07001555 private:
1556 static void WaitThreadFn(pthread_CondWakeupTest* test) {
1557 ASSERT_EQ(0, pthread_mutex_lock(&test->mutex));
1558 test->progress = WAITING;
1559 while (test->progress == WAITING) {
Yabin Cuic9a659c2015-11-05 15:36:08 -08001560 ASSERT_EQ(0, test->wait_function(&test->cond, &test->mutex));
Yabin Cui32651b82015-03-13 20:30:00 -07001561 }
1562 ASSERT_EQ(SIGNALED, test->progress);
1563 test->progress = FINISHED;
1564 ASSERT_EQ(0, pthread_mutex_unlock(&test->mutex));
1565 }
1566};
1567
Yabin Cuic9a659c2015-11-05 15:36:08 -08001568TEST_F(pthread_CondWakeupTest, signal_wait) {
1569 InitCond();
1570 StartWaitingThread([](pthread_cond_t* cond, pthread_mutex_t* mutex) {
1571 return pthread_cond_wait(cond, mutex);
1572 });
Yabin Cui32651b82015-03-13 20:30:00 -07001573 progress = SIGNALED;
Yabin Cuic9a659c2015-11-05 15:36:08 -08001574 ASSERT_EQ(0, pthread_cond_signal(&cond));
Yabin Cui32651b82015-03-13 20:30:00 -07001575}
1576
Yabin Cuic9a659c2015-11-05 15:36:08 -08001577TEST_F(pthread_CondWakeupTest, broadcast_wait) {
1578 InitCond();
1579 StartWaitingThread([](pthread_cond_t* cond, pthread_mutex_t* mutex) {
1580 return pthread_cond_wait(cond, mutex);
1581 });
Yabin Cui32651b82015-03-13 20:30:00 -07001582 progress = SIGNALED;
Yabin Cuic9a659c2015-11-05 15:36:08 -08001583 ASSERT_EQ(0, pthread_cond_broadcast(&cond));
Narayan Kamath51e6cb32014-03-03 15:38:51 +00001584}
Elliott Hughes0e714a52014-03-03 16:42:47 -08001585
Yabin Cuic9a659c2015-11-05 15:36:08 -08001586TEST_F(pthread_CondWakeupTest, signal_timedwait_CLOCK_REALTIME) {
1587 InitCond(CLOCK_REALTIME);
Tom Cherry69010802019-05-07 20:33:05 -07001588 RunTimedTest(CLOCK_REALTIME, pthread_cond_timedwait);
Yabin Cuic9a659c2015-11-05 15:36:08 -08001589}
Elliott Hughes0e714a52014-03-03 16:42:47 -08001590
Yabin Cuic9a659c2015-11-05 15:36:08 -08001591TEST_F(pthread_CondWakeupTest, signal_timedwait_CLOCK_MONOTONIC) {
1592 InitCond(CLOCK_MONOTONIC);
Tom Cherry69010802019-05-07 20:33:05 -07001593 RunTimedTest(CLOCK_MONOTONIC, pthread_cond_timedwait);
Yabin Cuic9a659c2015-11-05 15:36:08 -08001594}
Elliott Hughes0e714a52014-03-03 16:42:47 -08001595
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001596TEST_F(pthread_CondWakeupTest, signal_timedwait_CLOCK_MONOTONIC_np) {
1597#if defined(__BIONIC__)
1598 InitCond(CLOCK_REALTIME);
Tom Cherry69010802019-05-07 20:33:05 -07001599 RunTimedTest(CLOCK_MONOTONIC, pthread_cond_timedwait_monotonic_np);
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001600#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -08001601 GTEST_SKIP() << "pthread_cond_timedwait_monotonic_np not available";
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001602#endif // __BIONIC__
1603}
1604
Tom Cherry69010802019-05-07 20:33:05 -07001605TEST_F(pthread_CondWakeupTest, signal_clockwait_monotonic_monotonic) {
1606#if defined(__BIONIC__)
1607 InitCond(CLOCK_MONOTONIC);
1608 RunTimedTest(CLOCK_MONOTONIC, pthread_cond_clockwait);
1609#else // __BIONIC__
1610 GTEST_SKIP() << "pthread_cond_clockwait not available";
1611#endif // __BIONIC__
1612}
1613
1614TEST_F(pthread_CondWakeupTest, signal_clockwait_monotonic_realtime) {
1615#if defined(__BIONIC__)
1616 InitCond(CLOCK_MONOTONIC);
1617 RunTimedTest(CLOCK_REALTIME, pthread_cond_clockwait);
1618#else // __BIONIC__
1619 GTEST_SKIP() << "pthread_cond_clockwait not available";
1620#endif // __BIONIC__
1621}
1622
1623TEST_F(pthread_CondWakeupTest, signal_clockwait_realtime_monotonic) {
1624#if defined(__BIONIC__)
1625 InitCond(CLOCK_REALTIME);
1626 RunTimedTest(CLOCK_MONOTONIC, pthread_cond_clockwait);
1627#else // __BIONIC__
1628 GTEST_SKIP() << "pthread_cond_clockwait not available";
1629#endif // __BIONIC__
1630}
1631
1632TEST_F(pthread_CondWakeupTest, signal_clockwait_realtime_realtime) {
1633#if defined(__BIONIC__)
1634 InitCond(CLOCK_REALTIME);
1635 RunTimedTest(CLOCK_REALTIME, pthread_cond_clockwait);
1636#else // __BIONIC__
1637 GTEST_SKIP() << "pthread_cond_clockwait not available";
1638#endif // __BIONIC__
1639}
1640
Tom Cherry800c1a92019-07-17 10:45:18 -07001641static void pthread_cond_timedwait_timeout_helper(bool init_monotonic, clockid_t clock,
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001642 int (*wait_function)(pthread_cond_t* __cond,
1643 pthread_mutex_t* __mutex,
1644 const timespec* __timeout)) {
Yabin Cuic9a659c2015-11-05 15:36:08 -08001645 pthread_mutex_t mutex;
1646 ASSERT_EQ(0, pthread_mutex_init(&mutex, nullptr));
1647 pthread_cond_t cond;
Tom Cherry800c1a92019-07-17 10:45:18 -07001648
1649 if (init_monotonic) {
1650 pthread_condattr_t attr;
1651 pthread_condattr_init(&attr);
1652
1653 ASSERT_EQ(0, pthread_condattr_setclock(&attr, CLOCK_MONOTONIC));
1654 clockid_t clock;
1655 ASSERT_EQ(0, pthread_condattr_getclock(&attr, &clock));
1656 ASSERT_EQ(CLOCK_MONOTONIC, clock);
1657
1658 ASSERT_EQ(0, pthread_cond_init(&cond, &attr));
1659 } else {
1660 ASSERT_EQ(0, pthread_cond_init(&cond, nullptr));
1661 }
Yabin Cuic9a659c2015-11-05 15:36:08 -08001662 ASSERT_EQ(0, pthread_mutex_lock(&mutex));
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001663
Yabin Cuic9a659c2015-11-05 15:36:08 -08001664 timespec ts;
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001665 ASSERT_EQ(0, clock_gettime(clock, &ts));
1666 ASSERT_EQ(ETIMEDOUT, wait_function(&cond, &mutex, &ts));
Yabin Cuic9a659c2015-11-05 15:36:08 -08001667 ts.tv_nsec = -1;
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001668 ASSERT_EQ(EINVAL, wait_function(&cond, &mutex, &ts));
Yabin Cuic9a659c2015-11-05 15:36:08 -08001669 ts.tv_nsec = NS_PER_S;
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001670 ASSERT_EQ(EINVAL, wait_function(&cond, &mutex, &ts));
Yabin Cuic9a659c2015-11-05 15:36:08 -08001671 ts.tv_nsec = NS_PER_S - 1;
1672 ts.tv_sec = -1;
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001673 ASSERT_EQ(ETIMEDOUT, wait_function(&cond, &mutex, &ts));
Yabin Cuic9a659c2015-11-05 15:36:08 -08001674 ASSERT_EQ(0, pthread_mutex_unlock(&mutex));
Elliott Hughes0e714a52014-03-03 16:42:47 -08001675}
Elliott Hughes57b7a612014-08-25 17:26:50 -07001676
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001677TEST(pthread, pthread_cond_timedwait_timeout) {
Tom Cherry800c1a92019-07-17 10:45:18 -07001678 pthread_cond_timedwait_timeout_helper(false, CLOCK_REALTIME, pthread_cond_timedwait);
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001679}
1680
1681TEST(pthread, pthread_cond_timedwait_monotonic_np_timeout) {
1682#if defined(__BIONIC__)
Tom Cherry800c1a92019-07-17 10:45:18 -07001683 pthread_cond_timedwait_timeout_helper(false, CLOCK_MONOTONIC, pthread_cond_timedwait_monotonic_np);
1684 pthread_cond_timedwait_timeout_helper(true, CLOCK_MONOTONIC, pthread_cond_timedwait_monotonic_np);
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001685#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -08001686 GTEST_SKIP() << "pthread_cond_timedwait_monotonic_np not available";
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08001687#endif // __BIONIC__
1688}
1689
Tom Cherry69010802019-05-07 20:33:05 -07001690TEST(pthread, pthread_cond_clockwait_timeout) {
1691#if defined(__BIONIC__)
1692 pthread_cond_timedwait_timeout_helper(
Tom Cherry800c1a92019-07-17 10:45:18 -07001693 false, CLOCK_MONOTONIC,
Tom Cherry69010802019-05-07 20:33:05 -07001694 [](pthread_cond_t* __cond, pthread_mutex_t* __mutex, const timespec* __timeout) {
1695 return pthread_cond_clockwait(__cond, __mutex, CLOCK_MONOTONIC, __timeout);
1696 });
1697 pthread_cond_timedwait_timeout_helper(
Tom Cherry800c1a92019-07-17 10:45:18 -07001698 true, CLOCK_MONOTONIC,
1699 [](pthread_cond_t* __cond, pthread_mutex_t* __mutex, const timespec* __timeout) {
1700 return pthread_cond_clockwait(__cond, __mutex, CLOCK_MONOTONIC, __timeout);
1701 });
1702 pthread_cond_timedwait_timeout_helper(
1703 false, CLOCK_REALTIME,
1704 [](pthread_cond_t* __cond, pthread_mutex_t* __mutex, const timespec* __timeout) {
1705 return pthread_cond_clockwait(__cond, __mutex, CLOCK_REALTIME, __timeout);
1706 });
1707 pthread_cond_timedwait_timeout_helper(
1708 true, CLOCK_REALTIME,
Tom Cherry69010802019-05-07 20:33:05 -07001709 [](pthread_cond_t* __cond, pthread_mutex_t* __mutex, const timespec* __timeout) {
1710 return pthread_cond_clockwait(__cond, __mutex, CLOCK_REALTIME, __timeout);
1711 });
1712#else // __BIONIC__
1713 GTEST_SKIP() << "pthread_cond_clockwait not available";
1714#endif // __BIONIC__
1715}
1716
1717TEST(pthread, pthread_cond_clockwait_invalid) {
1718#if defined(__BIONIC__)
1719 pthread_cond_t cond = PTHREAD_COND_INITIALIZER;
1720 pthread_mutex_t mutex = PTHREAD_MUTEX_INITIALIZER;
1721 timespec ts;
1722 EXPECT_EQ(EINVAL, pthread_cond_clockwait(&cond, &mutex, CLOCK_PROCESS_CPUTIME_ID, &ts));
1723
1724#else // __BIONIC__
1725 GTEST_SKIP() << "pthread_cond_clockwait not available";
1726#endif // __BIONIC__
1727}
1728
Elliott Hughes57b7a612014-08-25 17:26:50 -07001729TEST(pthread, pthread_attr_getstack__main_thread) {
1730 // This test is only meaningful for the main thread, so make sure we're running on it!
1731 ASSERT_EQ(getpid(), syscall(__NR_gettid));
1732
1733 // Get the main thread's attributes.
1734 pthread_attr_t attributes;
1735 ASSERT_EQ(0, pthread_getattr_np(pthread_self(), &attributes));
1736
1737 // Check that we correctly report that the main thread has no guard page.
1738 size_t guard_size;
1739 ASSERT_EQ(0, pthread_attr_getguardsize(&attributes, &guard_size));
1740 ASSERT_EQ(0U, guard_size); // The main thread has no guard page.
1741
1742 // Get the stack base and the stack size (both ways).
1743 void* stack_base;
1744 size_t stack_size;
1745 ASSERT_EQ(0, pthread_attr_getstack(&attributes, &stack_base, &stack_size));
1746 size_t stack_size2;
1747 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size2));
1748
1749 // The two methods of asking for the stack size should agree.
1750 EXPECT_EQ(stack_size, stack_size2);
1751
Yabin Cuib0c6f2db2015-05-19 15:09:23 -07001752#if defined(__BIONIC__)
dimitry6dfa5b52018-01-30 13:24:28 +01001753 // Find stack in /proc/self/maps using a pointer to the stack.
1754 //
1755 // We do not use "[stack]" label because in native-bridge environment it is not
1756 // guaranteed to point to the right stack. A native bridge implementation may
1757 // keep separate stack for the guest code.
Yi Kong32bc0fc2018-08-02 17:31:13 -07001758 void* maps_stack_hi = nullptr;
Elliott Hughes15dfd632015-09-22 16:40:14 -07001759 std::vector<map_record> maps;
1760 ASSERT_TRUE(Maps::parse_maps(&maps));
Evgenii Stepanov7cc67062019-02-05 18:43:34 -08001761 uintptr_t stack_address = reinterpret_cast<uintptr_t>(untag_address(&maps_stack_hi));
Elliott Hughes0b2acdf2015-10-02 18:25:19 -07001762 for (const auto& map : maps) {
dimitry6dfa5b52018-01-30 13:24:28 +01001763 if (map.addr_start <= stack_address && map.addr_end > stack_address){
Elliott Hughes15dfd632015-09-22 16:40:14 -07001764 maps_stack_hi = reinterpret_cast<void*>(map.addr_end);
Elliott Hughes57b7a612014-08-25 17:26:50 -07001765 break;
1766 }
1767 }
Elliott Hughes57b7a612014-08-25 17:26:50 -07001768
dimitry6dfa5b52018-01-30 13:24:28 +01001769 // The high address of the /proc/self/maps stack region should equal stack_base + stack_size.
Yabin Cuib0c6f2db2015-05-19 15:09:23 -07001770 // Remember that the stack grows down (and is mapped in on demand), so the low address of the
1771 // region isn't very interesting.
1772 EXPECT_EQ(maps_stack_hi, reinterpret_cast<uint8_t*>(stack_base) + stack_size);
1773
Elliott Hughes9e4ffa72014-08-27 15:32:01 -07001774 // The stack size should correspond to RLIMIT_STACK.
Elliott Hughes57b7a612014-08-25 17:26:50 -07001775 rlimit rl;
Elliott Hughes9e4ffa72014-08-27 15:32:01 -07001776 ASSERT_EQ(0, getrlimit(RLIMIT_STACK, &rl));
Elliott Hughes27a9aed2014-09-04 16:09:25 -07001777 uint64_t original_rlim_cur = rl.rlim_cur;
Elliott Hughes27a9aed2014-09-04 16:09:25 -07001778 if (rl.rlim_cur == RLIM_INFINITY) {
1779 rl.rlim_cur = 8 * 1024 * 1024; // Bionic reports unlimited stacks as 8MiB.
1780 }
Elliott Hughes9e4ffa72014-08-27 15:32:01 -07001781 EXPECT_EQ(rl.rlim_cur, stack_size);
1782
Tom Cherryb8ab6182017-04-05 16:20:29 -07001783 auto guard = android::base::make_scope_guard([&rl, original_rlim_cur]() {
Elliott Hughes27a9aed2014-09-04 16:09:25 -07001784 rl.rlim_cur = original_rlim_cur;
1785 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1786 });
1787
Elliott Hughes9e4ffa72014-08-27 15:32:01 -07001788 //
1789 // What if RLIMIT_STACK is smaller than the stack's current extent?
1790 //
Elliott Hughes57b7a612014-08-25 17:26:50 -07001791 rl.rlim_cur = rl.rlim_max = 1024; // 1KiB. We know the stack must be at least a page already.
1792 rl.rlim_max = RLIM_INFINITY;
1793 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1794
1795 ASSERT_EQ(0, pthread_getattr_np(pthread_self(), &attributes));
1796 ASSERT_EQ(0, pthread_attr_getstack(&attributes, &stack_base, &stack_size));
1797 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size2));
1798
1799 EXPECT_EQ(stack_size, stack_size2);
1800 ASSERT_EQ(1024U, stack_size);
1801
1802 //
Elliott Hughes9e4ffa72014-08-27 15:32:01 -07001803 // What if RLIMIT_STACK isn't a whole number of pages?
Elliott Hughes57b7a612014-08-25 17:26:50 -07001804 //
1805 rl.rlim_cur = rl.rlim_max = 6666; // Not a whole number of pages.
1806 rl.rlim_max = RLIM_INFINITY;
1807 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1808
1809 ASSERT_EQ(0, pthread_getattr_np(pthread_self(), &attributes));
1810 ASSERT_EQ(0, pthread_attr_getstack(&attributes, &stack_base, &stack_size));
1811 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size2));
1812
1813 EXPECT_EQ(stack_size, stack_size2);
1814 ASSERT_EQ(6666U, stack_size);
Yabin Cuib0c6f2db2015-05-19 15:09:23 -07001815#endif
Elliott Hughes57b7a612014-08-25 17:26:50 -07001816}
Elliott Hughes8fb639c2014-09-12 14:43:07 -07001817
Mor-sarid, Nitzan56933322015-09-11 05:31:36 +00001818struct GetStackSignalHandlerArg {
1819 volatile bool done;
Chih-Hung Hsieh9af13d22016-06-02 14:40:09 -07001820 void* signal_stack_base;
1821 size_t signal_stack_size;
Mor-sarid, Nitzan56933322015-09-11 05:31:36 +00001822 void* main_stack_base;
1823 size_t main_stack_size;
1824};
1825
1826static GetStackSignalHandlerArg getstack_signal_handler_arg;
1827
1828static void getstack_signal_handler(int sig) {
1829 ASSERT_EQ(SIGUSR1, sig);
1830 // Use sleep() to make current thread be switched out by the kernel to provoke the error.
1831 sleep(1);
1832 pthread_attr_t attr;
1833 ASSERT_EQ(0, pthread_getattr_np(pthread_self(), &attr));
1834 void* stack_base;
1835 size_t stack_size;
1836 ASSERT_EQ(0, pthread_attr_getstack(&attr, &stack_base, &stack_size));
Chih-Hung Hsieh9af13d22016-06-02 14:40:09 -07001837
1838 // Verify if the stack used by the signal handler is the alternate stack just registered.
1839 ASSERT_LE(getstack_signal_handler_arg.signal_stack_base, &attr);
Evgenii Stepanov7cc67062019-02-05 18:43:34 -08001840 ASSERT_LT(static_cast<void*>(untag_address(&attr)),
Chih-Hung Hsieh9af13d22016-06-02 14:40:09 -07001841 static_cast<char*>(getstack_signal_handler_arg.signal_stack_base) +
Evgenii Stepanov7cc67062019-02-05 18:43:34 -08001842 getstack_signal_handler_arg.signal_stack_size);
Chih-Hung Hsieh9af13d22016-06-02 14:40:09 -07001843
1844 // Verify if the main thread's stack got in the signal handler is correct.
1845 ASSERT_EQ(getstack_signal_handler_arg.main_stack_base, stack_base);
1846 ASSERT_LE(getstack_signal_handler_arg.main_stack_size, stack_size);
1847
Mor-sarid, Nitzan56933322015-09-11 05:31:36 +00001848 getstack_signal_handler_arg.done = true;
1849}
1850
1851// The previous code obtained the main thread's stack by reading the entry in
1852// /proc/self/task/<pid>/maps that was labeled [stack]. Unfortunately, on x86/x86_64, the kernel
1853// relies on sp0 in task state segment(tss) to label the stack map with [stack]. If the kernel
1854// switches a process while the main thread is in an alternate stack, then the kernel will label
1855// the wrong map with [stack]. This test verifies that when the above situation happens, the main
1856// thread's stack is found correctly.
1857TEST(pthread, pthread_attr_getstack_in_signal_handler) {
Yabin Cui61e4d462016-03-07 17:44:58 -08001858 // This test is only meaningful for the main thread, so make sure we're running on it!
1859 ASSERT_EQ(getpid(), syscall(__NR_gettid));
1860
Mor-sarid, Nitzan56933322015-09-11 05:31:36 +00001861 const size_t sig_stack_size = 16 * 1024;
Yi Kong32bc0fc2018-08-02 17:31:13 -07001862 void* sig_stack = mmap(nullptr, sig_stack_size, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS,
Mor-sarid, Nitzan56933322015-09-11 05:31:36 +00001863 -1, 0);
1864 ASSERT_NE(MAP_FAILED, sig_stack);
1865 stack_t ss;
1866 ss.ss_sp = sig_stack;
1867 ss.ss_size = sig_stack_size;
1868 ss.ss_flags = 0;
1869 stack_t oss;
1870 ASSERT_EQ(0, sigaltstack(&ss, &oss));
1871
Yabin Cui61e4d462016-03-07 17:44:58 -08001872 pthread_attr_t attr;
1873 ASSERT_EQ(0, pthread_getattr_np(pthread_self(), &attr));
1874 void* main_stack_base;
1875 size_t main_stack_size;
1876 ASSERT_EQ(0, pthread_attr_getstack(&attr, &main_stack_base, &main_stack_size));
1877
Mor-sarid, Nitzan56933322015-09-11 05:31:36 +00001878 ScopedSignalHandler handler(SIGUSR1, getstack_signal_handler, SA_ONSTACK);
1879 getstack_signal_handler_arg.done = false;
Chih-Hung Hsieh9af13d22016-06-02 14:40:09 -07001880 getstack_signal_handler_arg.signal_stack_base = sig_stack;
1881 getstack_signal_handler_arg.signal_stack_size = sig_stack_size;
1882 getstack_signal_handler_arg.main_stack_base = main_stack_base;
1883 getstack_signal_handler_arg.main_stack_size = main_stack_size;
Mor-sarid, Nitzan56933322015-09-11 05:31:36 +00001884 kill(getpid(), SIGUSR1);
1885 ASSERT_EQ(true, getstack_signal_handler_arg.done);
1886
Mor-sarid, Nitzan56933322015-09-11 05:31:36 +00001887 ASSERT_EQ(0, sigaltstack(&oss, nullptr));
1888 ASSERT_EQ(0, munmap(sig_stack, sig_stack_size));
1889}
1890
Yabin Cui917d3902015-01-08 12:32:42 -08001891static void pthread_attr_getstack_18908062_helper(void*) {
1892 char local_variable;
1893 pthread_attr_t attributes;
1894 pthread_getattr_np(pthread_self(), &attributes);
1895 void* stack_base;
1896 size_t stack_size;
1897 pthread_attr_getstack(&attributes, &stack_base, &stack_size);
1898
1899 // Test whether &local_variable is in [stack_base, stack_base + stack_size).
1900 ASSERT_LE(reinterpret_cast<char*>(stack_base), &local_variable);
Evgenii Stepanov7cc67062019-02-05 18:43:34 -08001901 ASSERT_LT(untag_address(&local_variable), reinterpret_cast<char*>(stack_base) + stack_size);
Yabin Cui917d3902015-01-08 12:32:42 -08001902}
1903
1904// Check whether something on stack is in the range of
1905// [stack_base, stack_base + stack_size). see b/18908062.
1906TEST(pthread, pthread_attr_getstack_18908062) {
1907 pthread_t t;
Yi Kong32bc0fc2018-08-02 17:31:13 -07001908 ASSERT_EQ(0, pthread_create(&t, nullptr,
Yabin Cui917d3902015-01-08 12:32:42 -08001909 reinterpret_cast<void* (*)(void*)>(pthread_attr_getstack_18908062_helper),
Yi Kong32bc0fc2018-08-02 17:31:13 -07001910 nullptr));
1911 ASSERT_EQ(0, pthread_join(t, nullptr));
Yabin Cui917d3902015-01-08 12:32:42 -08001912}
1913
Elliott Hughes8fb639c2014-09-12 14:43:07 -07001914#if defined(__BIONIC__)
Elliott Hughesf2083612015-11-11 13:32:28 -08001915static pthread_mutex_t pthread_gettid_np_mutex = PTHREAD_MUTEX_INITIALIZER;
1916
Elliott Hughes8fb639c2014-09-12 14:43:07 -07001917static void* pthread_gettid_np_helper(void* arg) {
1918 *reinterpret_cast<pid_t*>(arg) = gettid();
Elliott Hughesf2083612015-11-11 13:32:28 -08001919
1920 // Wait for our parent to call pthread_gettid_np on us before exiting.
1921 pthread_mutex_lock(&pthread_gettid_np_mutex);
1922 pthread_mutex_unlock(&pthread_gettid_np_mutex);
Yi Kong32bc0fc2018-08-02 17:31:13 -07001923 return nullptr;
Elliott Hughes8fb639c2014-09-12 14:43:07 -07001924}
1925#endif
1926
1927TEST(pthread, pthread_gettid_np) {
1928#if defined(__BIONIC__)
1929 ASSERT_EQ(gettid(), pthread_gettid_np(pthread_self()));
1930
Elliott Hughesf2083612015-11-11 13:32:28 -08001931 // Ensure the other thread doesn't exit until after we've called
1932 // pthread_gettid_np on it.
1933 pthread_mutex_lock(&pthread_gettid_np_mutex);
1934
Elliott Hughes8fb639c2014-09-12 14:43:07 -07001935 pid_t t_gettid_result;
1936 pthread_t t;
Yi Kong32bc0fc2018-08-02 17:31:13 -07001937 pthread_create(&t, nullptr, pthread_gettid_np_helper, &t_gettid_result);
Elliott Hughes8fb639c2014-09-12 14:43:07 -07001938
1939 pid_t t_pthread_gettid_np_result = pthread_gettid_np(t);
1940
Elliott Hughesf2083612015-11-11 13:32:28 -08001941 // Release the other thread and wait for it to exit.
1942 pthread_mutex_unlock(&pthread_gettid_np_mutex);
Yi Kong32bc0fc2018-08-02 17:31:13 -07001943 ASSERT_EQ(0, pthread_join(t, nullptr));
Elliott Hughes8fb639c2014-09-12 14:43:07 -07001944
1945 ASSERT_EQ(t_gettid_result, t_pthread_gettid_np_result);
1946#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -08001947 GTEST_SKIP() << "pthread_gettid_np not available";
Elliott Hughes8fb639c2014-09-12 14:43:07 -07001948#endif
1949}
Elliott Hughes34c987a2014-09-22 16:01:26 -07001950
1951static size_t cleanup_counter = 0;
1952
Derek Xue41996952014-09-25 11:05:32 +01001953static void AbortCleanupRoutine(void*) {
Elliott Hughes34c987a2014-09-22 16:01:26 -07001954 abort();
1955}
1956
Derek Xue41996952014-09-25 11:05:32 +01001957static void CountCleanupRoutine(void*) {
Elliott Hughes34c987a2014-09-22 16:01:26 -07001958 ++cleanup_counter;
1959}
1960
Derek Xue41996952014-09-25 11:05:32 +01001961static void PthreadCleanupTester() {
Yi Kong32bc0fc2018-08-02 17:31:13 -07001962 pthread_cleanup_push(CountCleanupRoutine, nullptr);
1963 pthread_cleanup_push(CountCleanupRoutine, nullptr);
1964 pthread_cleanup_push(AbortCleanupRoutine, nullptr);
Elliott Hughes34c987a2014-09-22 16:01:26 -07001965
1966 pthread_cleanup_pop(0); // Pop the abort without executing it.
1967 pthread_cleanup_pop(1); // Pop one count while executing it.
1968 ASSERT_EQ(1U, cleanup_counter);
1969 // Exit while the other count is still on the cleanup stack.
Yi Kong32bc0fc2018-08-02 17:31:13 -07001970 pthread_exit(nullptr);
Elliott Hughes34c987a2014-09-22 16:01:26 -07001971
1972 // Calls to pthread_cleanup_pop/pthread_cleanup_push must always be balanced.
1973 pthread_cleanup_pop(0);
1974}
1975
Derek Xue41996952014-09-25 11:05:32 +01001976static void* PthreadCleanupStartRoutine(void*) {
Elliott Hughes34c987a2014-09-22 16:01:26 -07001977 PthreadCleanupTester();
Yi Kong32bc0fc2018-08-02 17:31:13 -07001978 return nullptr;
Elliott Hughes34c987a2014-09-22 16:01:26 -07001979}
1980
1981TEST(pthread, pthread_cleanup_push__pthread_cleanup_pop) {
1982 pthread_t t;
Yi Kong32bc0fc2018-08-02 17:31:13 -07001983 ASSERT_EQ(0, pthread_create(&t, nullptr, PthreadCleanupStartRoutine, nullptr));
1984 ASSERT_EQ(0, pthread_join(t, nullptr));
Elliott Hughes34c987a2014-09-22 16:01:26 -07001985 ASSERT_EQ(2U, cleanup_counter);
1986}
Derek Xue41996952014-09-25 11:05:32 +01001987
1988TEST(pthread, PTHREAD_MUTEX_DEFAULT_is_PTHREAD_MUTEX_NORMAL) {
1989 ASSERT_EQ(PTHREAD_MUTEX_NORMAL, PTHREAD_MUTEX_DEFAULT);
1990}
1991
1992TEST(pthread, pthread_mutexattr_gettype) {
1993 pthread_mutexattr_t attr;
1994 ASSERT_EQ(0, pthread_mutexattr_init(&attr));
1995
1996 int attr_type;
1997
1998 ASSERT_EQ(0, pthread_mutexattr_settype(&attr, PTHREAD_MUTEX_NORMAL));
1999 ASSERT_EQ(0, pthread_mutexattr_gettype(&attr, &attr_type));
2000 ASSERT_EQ(PTHREAD_MUTEX_NORMAL, attr_type);
2001
2002 ASSERT_EQ(0, pthread_mutexattr_settype(&attr, PTHREAD_MUTEX_ERRORCHECK));
2003 ASSERT_EQ(0, pthread_mutexattr_gettype(&attr, &attr_type));
2004 ASSERT_EQ(PTHREAD_MUTEX_ERRORCHECK, attr_type);
2005
2006 ASSERT_EQ(0, pthread_mutexattr_settype(&attr, PTHREAD_MUTEX_RECURSIVE));
2007 ASSERT_EQ(0, pthread_mutexattr_gettype(&attr, &attr_type));
2008 ASSERT_EQ(PTHREAD_MUTEX_RECURSIVE, attr_type);
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002009
2010 ASSERT_EQ(0, pthread_mutexattr_destroy(&attr));
2011}
2012
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002013TEST(pthread, pthread_mutexattr_protocol) {
2014 pthread_mutexattr_t attr;
2015 ASSERT_EQ(0, pthread_mutexattr_init(&attr));
2016
2017 int protocol;
2018 ASSERT_EQ(0, pthread_mutexattr_getprotocol(&attr, &protocol));
2019 ASSERT_EQ(PTHREAD_PRIO_NONE, protocol);
2020 for (size_t repeat = 0; repeat < 2; ++repeat) {
2021 for (int set_protocol : {PTHREAD_PRIO_NONE, PTHREAD_PRIO_INHERIT}) {
2022 ASSERT_EQ(0, pthread_mutexattr_setprotocol(&attr, set_protocol));
2023 ASSERT_EQ(0, pthread_mutexattr_getprotocol(&attr, &protocol));
2024 ASSERT_EQ(protocol, set_protocol);
2025 }
2026 }
2027}
2028
Yabin Cui17393b02015-03-21 15:08:25 -07002029struct PthreadMutex {
2030 pthread_mutex_t lock;
2031
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002032 explicit PthreadMutex(int mutex_type, int protocol = PTHREAD_PRIO_NONE) {
2033 init(mutex_type, protocol);
Yabin Cui17393b02015-03-21 15:08:25 -07002034 }
2035
2036 ~PthreadMutex() {
2037 destroy();
2038 }
2039
2040 private:
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002041 void init(int mutex_type, int protocol) {
Yabin Cui17393b02015-03-21 15:08:25 -07002042 pthread_mutexattr_t attr;
2043 ASSERT_EQ(0, pthread_mutexattr_init(&attr));
2044 ASSERT_EQ(0, pthread_mutexattr_settype(&attr, mutex_type));
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002045 ASSERT_EQ(0, pthread_mutexattr_setprotocol(&attr, protocol));
Yabin Cui17393b02015-03-21 15:08:25 -07002046 ASSERT_EQ(0, pthread_mutex_init(&lock, &attr));
2047 ASSERT_EQ(0, pthread_mutexattr_destroy(&attr));
2048 }
2049
2050 void destroy() {
2051 ASSERT_EQ(0, pthread_mutex_destroy(&lock));
2052 }
2053
2054 DISALLOW_COPY_AND_ASSIGN(PthreadMutex);
2055};
Derek Xue41996952014-09-25 11:05:32 +01002056
Ryan Prichard4b6c0f52019-04-18 22:47:04 -07002057static int UnlockFromAnotherThread(pthread_mutex_t* mutex) {
2058 pthread_t thread;
2059 pthread_create(&thread, nullptr, [](void* mutex_voidp) -> void* {
2060 pthread_mutex_t* mutex = static_cast<pthread_mutex_t*>(mutex_voidp);
2061 intptr_t result = pthread_mutex_unlock(mutex);
2062 return reinterpret_cast<void*>(result);
2063 }, mutex);
2064 void* result;
2065 EXPECT_EQ(0, pthread_join(thread, &result));
2066 return reinterpret_cast<intptr_t>(result);
2067};
2068
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002069static void TestPthreadMutexLockNormal(int protocol) {
2070 PthreadMutex m(PTHREAD_MUTEX_NORMAL, protocol);
Derek Xue41996952014-09-25 11:05:32 +01002071
Yabin Cui17393b02015-03-21 15:08:25 -07002072 ASSERT_EQ(0, pthread_mutex_lock(&m.lock));
Ryan Prichard4b6c0f52019-04-18 22:47:04 -07002073 if (protocol == PTHREAD_PRIO_INHERIT) {
2074 ASSERT_EQ(EPERM, UnlockFromAnotherThread(&m.lock));
2075 }
Yabin Cui17393b02015-03-21 15:08:25 -07002076 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
Elliott Hughesd31d4c12015-12-14 17:35:10 -08002077 ASSERT_EQ(0, pthread_mutex_trylock(&m.lock));
2078 ASSERT_EQ(EBUSY, pthread_mutex_trylock(&m.lock));
2079 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
Derek Xue41996952014-09-25 11:05:32 +01002080}
2081
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002082static void TestPthreadMutexLockErrorCheck(int protocol) {
2083 PthreadMutex m(PTHREAD_MUTEX_ERRORCHECK, protocol);
Derek Xue41996952014-09-25 11:05:32 +01002084
Yabin Cui17393b02015-03-21 15:08:25 -07002085 ASSERT_EQ(0, pthread_mutex_lock(&m.lock));
Ryan Prichard4b6c0f52019-04-18 22:47:04 -07002086 ASSERT_EQ(EPERM, UnlockFromAnotherThread(&m.lock));
Yabin Cui17393b02015-03-21 15:08:25 -07002087 ASSERT_EQ(EDEADLK, pthread_mutex_lock(&m.lock));
2088 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
2089 ASSERT_EQ(0, pthread_mutex_trylock(&m.lock));
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002090 if (protocol == PTHREAD_PRIO_NONE) {
2091 ASSERT_EQ(EBUSY, pthread_mutex_trylock(&m.lock));
2092 } else {
2093 ASSERT_EQ(EDEADLK, pthread_mutex_trylock(&m.lock));
2094 }
Yabin Cui17393b02015-03-21 15:08:25 -07002095 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
2096 ASSERT_EQ(EPERM, pthread_mutex_unlock(&m.lock));
Derek Xue41996952014-09-25 11:05:32 +01002097}
2098
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002099static void TestPthreadMutexLockRecursive(int protocol) {
2100 PthreadMutex m(PTHREAD_MUTEX_RECURSIVE, protocol);
Derek Xue41996952014-09-25 11:05:32 +01002101
Yabin Cui17393b02015-03-21 15:08:25 -07002102 ASSERT_EQ(0, pthread_mutex_lock(&m.lock));
Ryan Prichard4b6c0f52019-04-18 22:47:04 -07002103 ASSERT_EQ(EPERM, UnlockFromAnotherThread(&m.lock));
Yabin Cui17393b02015-03-21 15:08:25 -07002104 ASSERT_EQ(0, pthread_mutex_lock(&m.lock));
Ryan Prichard4b6c0f52019-04-18 22:47:04 -07002105 ASSERT_EQ(EPERM, UnlockFromAnotherThread(&m.lock));
Yabin Cui17393b02015-03-21 15:08:25 -07002106 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
2107 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
2108 ASSERT_EQ(0, pthread_mutex_trylock(&m.lock));
Elliott Hughesd31d4c12015-12-14 17:35:10 -08002109 ASSERT_EQ(0, pthread_mutex_trylock(&m.lock));
2110 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
Yabin Cui17393b02015-03-21 15:08:25 -07002111 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
2112 ASSERT_EQ(EPERM, pthread_mutex_unlock(&m.lock));
2113}
2114
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002115TEST(pthread, pthread_mutex_lock_NORMAL) {
2116 TestPthreadMutexLockNormal(PTHREAD_PRIO_NONE);
2117}
2118
2119TEST(pthread, pthread_mutex_lock_ERRORCHECK) {
2120 TestPthreadMutexLockErrorCheck(PTHREAD_PRIO_NONE);
2121}
2122
2123TEST(pthread, pthread_mutex_lock_RECURSIVE) {
2124 TestPthreadMutexLockRecursive(PTHREAD_PRIO_NONE);
2125}
2126
2127TEST(pthread, pthread_mutex_lock_pi) {
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002128 TestPthreadMutexLockNormal(PTHREAD_PRIO_INHERIT);
2129 TestPthreadMutexLockErrorCheck(PTHREAD_PRIO_INHERIT);
2130 TestPthreadMutexLockRecursive(PTHREAD_PRIO_INHERIT);
2131}
2132
Yabin Cui5a00ba72018-01-26 17:32:31 -08002133TEST(pthread, pthread_mutex_pi_count_limit) {
2134#if defined(__BIONIC__) && !defined(__LP64__)
2135 // Bionic only supports 65536 pi mutexes in 32-bit programs.
2136 pthread_mutexattr_t attr;
2137 ASSERT_EQ(0, pthread_mutexattr_init(&attr));
2138 ASSERT_EQ(0, pthread_mutexattr_setprotocol(&attr, PTHREAD_PRIO_INHERIT));
2139 std::vector<pthread_mutex_t> mutexes(65536);
2140 // Test if we can use 65536 pi mutexes at the same time.
2141 // Run 2 times to check if freed pi mutexes can be recycled.
2142 for (int repeat = 0; repeat < 2; ++repeat) {
2143 for (auto& m : mutexes) {
2144 ASSERT_EQ(0, pthread_mutex_init(&m, &attr));
2145 }
2146 pthread_mutex_t m;
2147 ASSERT_EQ(ENOMEM, pthread_mutex_init(&m, &attr));
2148 for (auto& m : mutexes) {
2149 ASSERT_EQ(0, pthread_mutex_lock(&m));
2150 }
2151 for (auto& m : mutexes) {
2152 ASSERT_EQ(0, pthread_mutex_unlock(&m));
2153 }
2154 for (auto& m : mutexes) {
2155 ASSERT_EQ(0, pthread_mutex_destroy(&m));
2156 }
2157 }
2158 ASSERT_EQ(0, pthread_mutexattr_destroy(&attr));
2159#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -08002160 GTEST_SKIP() << "pi mutex count not limited to 64Ki";
Yabin Cui5a00ba72018-01-26 17:32:31 -08002161#endif
2162}
2163
Yabin Cui17393b02015-03-21 15:08:25 -07002164TEST(pthread, pthread_mutex_init_same_as_static_initializers) {
2165 pthread_mutex_t lock_normal = PTHREAD_MUTEX_INITIALIZER;
2166 PthreadMutex m1(PTHREAD_MUTEX_NORMAL);
2167 ASSERT_EQ(0, memcmp(&lock_normal, &m1.lock, sizeof(pthread_mutex_t)));
2168 pthread_mutex_destroy(&lock_normal);
2169
Colin Cross4c5595c2021-08-16 15:51:59 -07002170#if !defined(ANDROID_HOST_MUSL)
Colin Cross7da20342021-07-28 11:18:11 -07002171 // musl doesn't support PTHREAD_ERRORCHECK_MUTEX_INITIALIZER_NP or
2172 // PTHREAD_RECURSIVE_MUTEX_INITIALIZER_NP.
Yabin Cui17393b02015-03-21 15:08:25 -07002173 pthread_mutex_t lock_errorcheck = PTHREAD_ERRORCHECK_MUTEX_INITIALIZER_NP;
2174 PthreadMutex m2(PTHREAD_MUTEX_ERRORCHECK);
2175 ASSERT_EQ(0, memcmp(&lock_errorcheck, &m2.lock, sizeof(pthread_mutex_t)));
2176 pthread_mutex_destroy(&lock_errorcheck);
2177
2178 pthread_mutex_t lock_recursive = PTHREAD_RECURSIVE_MUTEX_INITIALIZER_NP;
2179 PthreadMutex m3(PTHREAD_MUTEX_RECURSIVE);
2180 ASSERT_EQ(0, memcmp(&lock_recursive, &m3.lock, sizeof(pthread_mutex_t)));
2181 ASSERT_EQ(0, pthread_mutex_destroy(&lock_recursive));
Colin Cross7da20342021-07-28 11:18:11 -07002182#endif
Derek Xue41996952014-09-25 11:05:32 +01002183}
Yabin Cui5a00ba72018-01-26 17:32:31 -08002184
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002185class MutexWakeupHelper {
2186 private:
Yabin Cui17393b02015-03-21 15:08:25 -07002187 PthreadMutex m;
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002188 enum Progress {
2189 LOCK_INITIALIZED,
2190 LOCK_WAITING,
2191 LOCK_RELEASED,
2192 LOCK_ACCESSED
2193 };
2194 std::atomic<Progress> progress;
Yabin Cuif7969852015-04-02 17:47:48 -07002195 std::atomic<pid_t> tid;
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002196
2197 static void thread_fn(MutexWakeupHelper* helper) {
Yabin Cuif7969852015-04-02 17:47:48 -07002198 helper->tid = gettid();
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002199 ASSERT_EQ(LOCK_INITIALIZED, helper->progress);
2200 helper->progress = LOCK_WAITING;
2201
Yabin Cui17393b02015-03-21 15:08:25 -07002202 ASSERT_EQ(0, pthread_mutex_lock(&helper->m.lock));
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002203 ASSERT_EQ(LOCK_RELEASED, helper->progress);
Yabin Cui17393b02015-03-21 15:08:25 -07002204 ASSERT_EQ(0, pthread_mutex_unlock(&helper->m.lock));
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002205
2206 helper->progress = LOCK_ACCESSED;
2207 }
2208
2209 public:
Chih-Hung Hsieh62e3a072016-05-03 12:08:05 -07002210 explicit MutexWakeupHelper(int mutex_type) : m(mutex_type) {
Yabin Cui17393b02015-03-21 15:08:25 -07002211 }
2212
2213 void test() {
2214 ASSERT_EQ(0, pthread_mutex_lock(&m.lock));
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002215 progress = LOCK_INITIALIZED;
Yabin Cuif7969852015-04-02 17:47:48 -07002216 tid = 0;
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002217
2218 pthread_t thread;
Yi Kong32bc0fc2018-08-02 17:31:13 -07002219 ASSERT_EQ(0, pthread_create(&thread, nullptr,
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002220 reinterpret_cast<void* (*)(void*)>(MutexWakeupHelper::thread_fn), this));
2221
Yabin Cuif7969852015-04-02 17:47:48 -07002222 WaitUntilThreadSleep(tid);
2223 ASSERT_EQ(LOCK_WAITING, progress);
2224
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002225 progress = LOCK_RELEASED;
Yabin Cui17393b02015-03-21 15:08:25 -07002226 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002227
Yi Kong32bc0fc2018-08-02 17:31:13 -07002228 ASSERT_EQ(0, pthread_join(thread, nullptr));
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002229 ASSERT_EQ(LOCK_ACCESSED, progress);
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002230 }
2231};
2232
2233TEST(pthread, pthread_mutex_NORMAL_wakeup) {
Yabin Cui17393b02015-03-21 15:08:25 -07002234 MutexWakeupHelper helper(PTHREAD_MUTEX_NORMAL);
2235 helper.test();
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002236}
2237
2238TEST(pthread, pthread_mutex_ERRORCHECK_wakeup) {
Yabin Cui17393b02015-03-21 15:08:25 -07002239 MutexWakeupHelper helper(PTHREAD_MUTEX_ERRORCHECK);
2240 helper.test();
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002241}
2242
2243TEST(pthread, pthread_mutex_RECURSIVE_wakeup) {
Yabin Cui17393b02015-03-21 15:08:25 -07002244 MutexWakeupHelper helper(PTHREAD_MUTEX_RECURSIVE);
2245 helper.test();
Yabin Cui5b8e7cd2015-03-04 17:36:59 -08002246}
2247
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002248static int GetThreadPriority(pid_t tid) {
2249 // sched_getparam() returns the static priority of a thread, which can't reflect a thread's
2250 // priority after priority inheritance. So read /proc/<pid>/stat to get the dynamic priority.
2251 std::string filename = android::base::StringPrintf("/proc/%d/stat", tid);
2252 std::string content;
2253 int result = INT_MAX;
2254 if (!android::base::ReadFileToString(filename, &content)) {
2255 return result;
2256 }
2257 std::vector<std::string> strs = android::base::Split(content, " ");
2258 if (strs.size() < 18) {
2259 return result;
2260 }
2261 if (!android::base::ParseInt(strs[17], &result)) {
2262 return INT_MAX;
2263 }
2264 return result;
2265}
2266
2267class PIMutexWakeupHelper {
2268private:
2269 PthreadMutex m;
2270 int protocol;
2271 enum Progress {
2272 LOCK_INITIALIZED,
2273 LOCK_CHILD_READY,
2274 LOCK_WAITING,
2275 LOCK_RELEASED,
2276 };
2277 std::atomic<Progress> progress;
2278 std::atomic<pid_t> main_tid;
2279 std::atomic<pid_t> child_tid;
2280 PthreadMutex start_thread_m;
2281
2282 static void thread_fn(PIMutexWakeupHelper* helper) {
2283 helper->child_tid = gettid();
2284 ASSERT_EQ(LOCK_INITIALIZED, helper->progress);
2285 ASSERT_EQ(0, setpriority(PRIO_PROCESS, gettid(), 1));
2286 ASSERT_EQ(21, GetThreadPriority(gettid()));
2287 ASSERT_EQ(0, pthread_mutex_lock(&helper->m.lock));
2288 helper->progress = LOCK_CHILD_READY;
2289 ASSERT_EQ(0, pthread_mutex_lock(&helper->start_thread_m.lock));
2290
2291 ASSERT_EQ(0, pthread_mutex_unlock(&helper->start_thread_m.lock));
2292 WaitUntilThreadSleep(helper->main_tid);
2293 ASSERT_EQ(LOCK_WAITING, helper->progress);
2294
2295 if (helper->protocol == PTHREAD_PRIO_INHERIT) {
2296 ASSERT_EQ(20, GetThreadPriority(gettid()));
2297 } else {
2298 ASSERT_EQ(21, GetThreadPriority(gettid()));
2299 }
2300 helper->progress = LOCK_RELEASED;
2301 ASSERT_EQ(0, pthread_mutex_unlock(&helper->m.lock));
2302 }
2303
2304public:
2305 explicit PIMutexWakeupHelper(int mutex_type, int protocol)
2306 : m(mutex_type, protocol), protocol(protocol), start_thread_m(PTHREAD_MUTEX_NORMAL) {
2307 }
2308
2309 void test() {
2310 ASSERT_EQ(0, pthread_mutex_lock(&start_thread_m.lock));
2311 main_tid = gettid();
2312 ASSERT_EQ(20, GetThreadPriority(main_tid));
2313 progress = LOCK_INITIALIZED;
2314 child_tid = 0;
2315
2316 pthread_t thread;
Yi Kong32bc0fc2018-08-02 17:31:13 -07002317 ASSERT_EQ(0, pthread_create(&thread, nullptr,
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002318 reinterpret_cast<void* (*)(void*)>(PIMutexWakeupHelper::thread_fn), this));
2319
2320 WaitUntilThreadSleep(child_tid);
2321 ASSERT_EQ(LOCK_CHILD_READY, progress);
2322 ASSERT_EQ(0, pthread_mutex_unlock(&start_thread_m.lock));
2323 progress = LOCK_WAITING;
2324 ASSERT_EQ(0, pthread_mutex_lock(&m.lock));
2325
2326 ASSERT_EQ(LOCK_RELEASED, progress);
2327 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
2328 ASSERT_EQ(0, pthread_join(thread, nullptr));
2329 }
2330};
2331
2332TEST(pthread, pthread_mutex_pi_wakeup) {
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002333 for (int type : {PTHREAD_MUTEX_NORMAL, PTHREAD_MUTEX_RECURSIVE, PTHREAD_MUTEX_ERRORCHECK}) {
2334 for (int protocol : {PTHREAD_PRIO_INHERIT}) {
2335 PIMutexWakeupHelper helper(type, protocol);
2336 helper.test();
2337 }
2338 }
2339}
2340
Yabin Cui140f3672015-02-03 10:32:00 -08002341TEST(pthread, pthread_mutex_owner_tid_limit) {
Yabin Cuie69c2452015-02-13 16:21:25 -08002342#if defined(__BIONIC__) && !defined(__LP64__)
Yabin Cui140f3672015-02-03 10:32:00 -08002343 FILE* fp = fopen("/proc/sys/kernel/pid_max", "r");
Yi Kong32bc0fc2018-08-02 17:31:13 -07002344 ASSERT_TRUE(fp != nullptr);
Yabin Cui140f3672015-02-03 10:32:00 -08002345 long pid_max;
2346 ASSERT_EQ(1, fscanf(fp, "%ld", &pid_max));
2347 fclose(fp);
Yabin Cuie69c2452015-02-13 16:21:25 -08002348 // Bionic's pthread_mutex implementation on 32-bit devices uses 16 bits to represent owner tid.
Yabin Cui140f3672015-02-03 10:32:00 -08002349 ASSERT_LE(pid_max, 65536);
Yabin Cuie69c2452015-02-13 16:21:25 -08002350#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -08002351 GTEST_SKIP() << "pthread_mutex supports 32-bit tid";
Yabin Cuie69c2452015-02-13 16:21:25 -08002352#endif
Yabin Cui140f3672015-02-03 10:32:00 -08002353}
Yabin Cuib5845722015-03-16 22:46:42 -07002354
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002355static void pthread_mutex_timedlock_helper(clockid_t clock,
2356 int (*lock_function)(pthread_mutex_t* __mutex,
2357 const timespec* __timeout)) {
Yabin Cuic9a659c2015-11-05 15:36:08 -08002358 pthread_mutex_t m;
2359 ASSERT_EQ(0, pthread_mutex_init(&m, nullptr));
2360
2361 // If the mutex is already locked, pthread_mutex_timedlock should time out.
2362 ASSERT_EQ(0, pthread_mutex_lock(&m));
2363
2364 timespec ts;
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002365 ASSERT_EQ(0, clock_gettime(clock, &ts));
2366 ASSERT_EQ(ETIMEDOUT, lock_function(&m, &ts));
Yabin Cuic9a659c2015-11-05 15:36:08 -08002367 ts.tv_nsec = -1;
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002368 ASSERT_EQ(EINVAL, lock_function(&m, &ts));
Yabin Cuic9a659c2015-11-05 15:36:08 -08002369 ts.tv_nsec = NS_PER_S;
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002370 ASSERT_EQ(EINVAL, lock_function(&m, &ts));
Yabin Cuic9a659c2015-11-05 15:36:08 -08002371 ts.tv_nsec = NS_PER_S - 1;
2372 ts.tv_sec = -1;
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002373 ASSERT_EQ(ETIMEDOUT, lock_function(&m, &ts));
Yabin Cuic9a659c2015-11-05 15:36:08 -08002374
2375 // If the mutex is unlocked, pthread_mutex_timedlock should succeed.
2376 ASSERT_EQ(0, pthread_mutex_unlock(&m));
2377
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002378 ASSERT_EQ(0, clock_gettime(clock, &ts));
Yabin Cuic9a659c2015-11-05 15:36:08 -08002379 ts.tv_sec += 1;
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002380 ASSERT_EQ(0, lock_function(&m, &ts));
Yabin Cuic9a659c2015-11-05 15:36:08 -08002381
2382 ASSERT_EQ(0, pthread_mutex_unlock(&m));
2383 ASSERT_EQ(0, pthread_mutex_destroy(&m));
2384}
2385
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002386TEST(pthread, pthread_mutex_timedlock) {
2387 pthread_mutex_timedlock_helper(CLOCK_REALTIME, pthread_mutex_timedlock);
2388}
2389
2390TEST(pthread, pthread_mutex_timedlock_monotonic_np) {
2391#if defined(__BIONIC__)
2392 pthread_mutex_timedlock_helper(CLOCK_MONOTONIC, pthread_mutex_timedlock_monotonic_np);
2393#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -08002394 GTEST_SKIP() << "pthread_mutex_timedlock_monotonic_np not available";
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002395#endif // __BIONIC__
2396}
2397
Tom Cherry69010802019-05-07 20:33:05 -07002398TEST(pthread, pthread_mutex_clocklock) {
2399#if defined(__BIONIC__)
2400 pthread_mutex_timedlock_helper(
2401 CLOCK_MONOTONIC, [](pthread_mutex_t* __mutex, const timespec* __timeout) {
2402 return pthread_mutex_clocklock(__mutex, CLOCK_MONOTONIC, __timeout);
2403 });
2404 pthread_mutex_timedlock_helper(
2405 CLOCK_REALTIME, [](pthread_mutex_t* __mutex, const timespec* __timeout) {
2406 return pthread_mutex_clocklock(__mutex, CLOCK_REALTIME, __timeout);
2407 });
2408#else // __BIONIC__
2409 GTEST_SKIP() << "pthread_mutex_clocklock not available";
2410#endif // __BIONIC__
2411}
2412
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002413static void pthread_mutex_timedlock_pi_helper(clockid_t clock,
2414 int (*lock_function)(pthread_mutex_t* __mutex,
2415 const timespec* __timeout)) {
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002416 PthreadMutex m(PTHREAD_MUTEX_NORMAL, PTHREAD_PRIO_INHERIT);
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002417
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002418 timespec ts;
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002419 clock_gettime(clock, &ts);
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002420 ts.tv_sec += 1;
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002421 ASSERT_EQ(0, lock_function(&m.lock, &ts));
2422
2423 struct ThreadArgs {
2424 clockid_t clock;
2425 int (*lock_function)(pthread_mutex_t* __mutex, const timespec* __timeout);
2426 PthreadMutex& m;
2427 };
2428
2429 ThreadArgs thread_args = {
2430 .clock = clock,
2431 .lock_function = lock_function,
2432 .m = m,
2433 };
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002434
2435 auto ThreadFn = [](void* arg) -> void* {
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002436 auto args = static_cast<ThreadArgs*>(arg);
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002437 timespec ts;
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002438 clock_gettime(args->clock, &ts);
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002439 ts.tv_sec += 1;
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002440 intptr_t result = args->lock_function(&args->m.lock, &ts);
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002441 return reinterpret_cast<void*>(result);
2442 };
2443
2444 pthread_t thread;
Yi Kong32bc0fc2018-08-02 17:31:13 -07002445 ASSERT_EQ(0, pthread_create(&thread, nullptr, ThreadFn, &thread_args));
Yabin Cui6b9c85b2018-01-23 12:56:18 -08002446 void* result;
2447 ASSERT_EQ(0, pthread_join(thread, &result));
2448 ASSERT_EQ(ETIMEDOUT, reinterpret_cast<intptr_t>(result));
2449 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
2450}
2451
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002452TEST(pthread, pthread_mutex_timedlock_pi) {
2453 pthread_mutex_timedlock_pi_helper(CLOCK_REALTIME, pthread_mutex_timedlock);
2454}
2455
2456TEST(pthread, pthread_mutex_timedlock_monotonic_np_pi) {
2457#if defined(__BIONIC__)
2458 pthread_mutex_timedlock_pi_helper(CLOCK_MONOTONIC, pthread_mutex_timedlock_monotonic_np);
2459#else // __BIONIC__
Elliott Hughesbcaa4542019-03-08 15:20:23 -08002460 GTEST_SKIP() << "pthread_mutex_timedlock_monotonic_np not available";
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002461#endif // __BIONIC__
2462}
2463
Tom Cherry69010802019-05-07 20:33:05 -07002464TEST(pthread, pthread_mutex_clocklock_pi) {
2465#if defined(__BIONIC__)
2466 pthread_mutex_timedlock_pi_helper(
2467 CLOCK_MONOTONIC, [](pthread_mutex_t* __mutex, const timespec* __timeout) {
2468 return pthread_mutex_clocklock(__mutex, CLOCK_MONOTONIC, __timeout);
2469 });
2470 pthread_mutex_timedlock_pi_helper(
2471 CLOCK_REALTIME, [](pthread_mutex_t* __mutex, const timespec* __timeout) {
2472 return pthread_mutex_clocklock(__mutex, CLOCK_REALTIME, __timeout);
2473 });
2474#else // __BIONIC__
2475 GTEST_SKIP() << "pthread_mutex_clocklock not available";
2476#endif // __BIONIC__
2477}
2478
2479TEST(pthread, pthread_mutex_clocklock_invalid) {
2480#if defined(__BIONIC__)
2481 pthread_mutex_t mutex = PTHREAD_MUTEX_INITIALIZER;
2482 timespec ts;
2483 EXPECT_EQ(EINVAL, pthread_mutex_clocklock(&mutex, CLOCK_PROCESS_CPUTIME_ID, &ts));
2484#else // __BIONIC__
2485 GTEST_SKIP() << "pthread_mutex_clocklock not available";
2486#endif // __BIONIC__
2487}
2488
Elliott Hughese657eb42021-02-18 17:11:56 -08002489TEST_F(pthread_DeathTest, pthread_mutex_using_destroyed_mutex) {
Yabin Cui9651fdf2018-03-14 12:02:21 -07002490#if defined(__BIONIC__)
2491 pthread_mutex_t m;
2492 ASSERT_EQ(0, pthread_mutex_init(&m, nullptr));
2493 ASSERT_EQ(0, pthread_mutex_destroy(&m));
2494 ASSERT_EXIT(pthread_mutex_lock(&m), ::testing::KilledBySignal(SIGABRT),
2495 "pthread_mutex_lock called on a destroyed mutex");
2496 ASSERT_EXIT(pthread_mutex_unlock(&m), ::testing::KilledBySignal(SIGABRT),
2497 "pthread_mutex_unlock called on a destroyed mutex");
2498 ASSERT_EXIT(pthread_mutex_trylock(&m), ::testing::KilledBySignal(SIGABRT),
2499 "pthread_mutex_trylock called on a destroyed mutex");
2500 timespec ts;
2501 ASSERT_EXIT(pthread_mutex_timedlock(&m, &ts), ::testing::KilledBySignal(SIGABRT),
2502 "pthread_mutex_timedlock called on a destroyed mutex");
Tom Cherryc6b5bcd2018-03-05 14:14:44 -08002503 ASSERT_EXIT(pthread_mutex_timedlock_monotonic_np(&m, &ts), ::testing::KilledBySignal(SIGABRT),
2504 "pthread_mutex_timedlock_monotonic_np called on a destroyed mutex");
Tom Cherry69010802019-05-07 20:33:05 -07002505 ASSERT_EXIT(pthread_mutex_clocklock(&m, CLOCK_MONOTONIC, &ts), ::testing::KilledBySignal(SIGABRT),
2506 "pthread_mutex_clocklock called on a destroyed mutex");
2507 ASSERT_EXIT(pthread_mutex_clocklock(&m, CLOCK_REALTIME, &ts), ::testing::KilledBySignal(SIGABRT),
2508 "pthread_mutex_clocklock called on a destroyed mutex");
2509 ASSERT_EXIT(pthread_mutex_clocklock(&m, CLOCK_PROCESS_CPUTIME_ID, &ts),
2510 ::testing::KilledBySignal(SIGABRT),
2511 "pthread_mutex_clocklock called on a destroyed mutex");
Yabin Cui9651fdf2018-03-14 12:02:21 -07002512 ASSERT_EXIT(pthread_mutex_destroy(&m), ::testing::KilledBySignal(SIGABRT),
2513 "pthread_mutex_destroy called on a destroyed mutex");
2514#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -08002515 GTEST_SKIP() << "bionic-only test";
Yabin Cui9651fdf2018-03-14 12:02:21 -07002516#endif
2517}
2518
Yabin Cuib5845722015-03-16 22:46:42 -07002519class StrictAlignmentAllocator {
2520 public:
2521 void* allocate(size_t size, size_t alignment) {
2522 char* p = new char[size + alignment * 2];
2523 allocated_array.push_back(p);
2524 while (!is_strict_aligned(p, alignment)) {
2525 ++p;
2526 }
2527 return p;
2528 }
2529
2530 ~StrictAlignmentAllocator() {
Elliott Hughes0b2acdf2015-10-02 18:25:19 -07002531 for (const auto& p : allocated_array) {
2532 delete[] p;
Yabin Cuib5845722015-03-16 22:46:42 -07002533 }
2534 }
2535
2536 private:
2537 bool is_strict_aligned(char* p, size_t alignment) {
2538 return (reinterpret_cast<uintptr_t>(p) % (alignment * 2)) == alignment;
2539 }
2540
2541 std::vector<char*> allocated_array;
2542};
2543
2544TEST(pthread, pthread_types_allow_four_bytes_alignment) {
2545#if defined(__BIONIC__)
2546 // For binary compatibility with old version, we need to allow 4-byte aligned data for pthread types.
2547 StrictAlignmentAllocator allocator;
2548 pthread_mutex_t* mutex = reinterpret_cast<pthread_mutex_t*>(
2549 allocator.allocate(sizeof(pthread_mutex_t), 4));
Yi Kong32bc0fc2018-08-02 17:31:13 -07002550 ASSERT_EQ(0, pthread_mutex_init(mutex, nullptr));
Yabin Cuib5845722015-03-16 22:46:42 -07002551 ASSERT_EQ(0, pthread_mutex_lock(mutex));
2552 ASSERT_EQ(0, pthread_mutex_unlock(mutex));
2553 ASSERT_EQ(0, pthread_mutex_destroy(mutex));
2554
2555 pthread_cond_t* cond = reinterpret_cast<pthread_cond_t*>(
2556 allocator.allocate(sizeof(pthread_cond_t), 4));
Yi Kong32bc0fc2018-08-02 17:31:13 -07002557 ASSERT_EQ(0, pthread_cond_init(cond, nullptr));
Yabin Cuib5845722015-03-16 22:46:42 -07002558 ASSERT_EQ(0, pthread_cond_signal(cond));
2559 ASSERT_EQ(0, pthread_cond_broadcast(cond));
2560 ASSERT_EQ(0, pthread_cond_destroy(cond));
2561
2562 pthread_rwlock_t* rwlock = reinterpret_cast<pthread_rwlock_t*>(
2563 allocator.allocate(sizeof(pthread_rwlock_t), 4));
Yi Kong32bc0fc2018-08-02 17:31:13 -07002564 ASSERT_EQ(0, pthread_rwlock_init(rwlock, nullptr));
Yabin Cuib5845722015-03-16 22:46:42 -07002565 ASSERT_EQ(0, pthread_rwlock_rdlock(rwlock));
2566 ASSERT_EQ(0, pthread_rwlock_unlock(rwlock));
2567 ASSERT_EQ(0, pthread_rwlock_wrlock(rwlock));
2568 ASSERT_EQ(0, pthread_rwlock_unlock(rwlock));
2569 ASSERT_EQ(0, pthread_rwlock_destroy(rwlock));
2570
2571#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -08002572 GTEST_SKIP() << "bionic-only test";
Yabin Cuib5845722015-03-16 22:46:42 -07002573#endif
2574}
Christopher Ferris60907c72015-06-09 18:46:15 -07002575
2576TEST(pthread, pthread_mutex_lock_null_32) {
2577#if defined(__BIONIC__) && !defined(__LP64__)
Dan Albertbaa2a972015-08-13 16:58:50 -07002578 // For LP32, the pthread lock/unlock functions allow a NULL mutex and return
2579 // EINVAL in that case: http://b/19995172.
2580 //
2581 // We decorate the public defintion with _Nonnull so that people recompiling
2582 // their code with get a warning and might fix their bug, but need to pass
2583 // NULL here to test that we remain compatible.
2584 pthread_mutex_t* null_value = nullptr;
2585 ASSERT_EQ(EINVAL, pthread_mutex_lock(null_value));
Christopher Ferris60907c72015-06-09 18:46:15 -07002586#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -08002587 GTEST_SKIP() << "32-bit bionic-only test";
Christopher Ferris60907c72015-06-09 18:46:15 -07002588#endif
2589}
2590
2591TEST(pthread, pthread_mutex_unlock_null_32) {
2592#if defined(__BIONIC__) && !defined(__LP64__)
Dan Albertbaa2a972015-08-13 16:58:50 -07002593 // For LP32, the pthread lock/unlock functions allow a NULL mutex and return
2594 // EINVAL in that case: http://b/19995172.
2595 //
2596 // We decorate the public defintion with _Nonnull so that people recompiling
2597 // their code with get a warning and might fix their bug, but need to pass
2598 // NULL here to test that we remain compatible.
2599 pthread_mutex_t* null_value = nullptr;
2600 ASSERT_EQ(EINVAL, pthread_mutex_unlock(null_value));
Christopher Ferris60907c72015-06-09 18:46:15 -07002601#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -08002602 GTEST_SKIP() << "32-bit bionic-only test";
Christopher Ferris60907c72015-06-09 18:46:15 -07002603#endif
2604}
2605
2606TEST_F(pthread_DeathTest, pthread_mutex_lock_null_64) {
2607#if defined(__BIONIC__) && defined(__LP64__)
2608 pthread_mutex_t* null_value = nullptr;
2609 ASSERT_EXIT(pthread_mutex_lock(null_value), testing::KilledBySignal(SIGSEGV), "");
2610#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -08002611 GTEST_SKIP() << "64-bit bionic-only test";
Christopher Ferris60907c72015-06-09 18:46:15 -07002612#endif
2613}
2614
2615TEST_F(pthread_DeathTest, pthread_mutex_unlock_null_64) {
2616#if defined(__BIONIC__) && defined(__LP64__)
2617 pthread_mutex_t* null_value = nullptr;
2618 ASSERT_EXIT(pthread_mutex_unlock(null_value), testing::KilledBySignal(SIGSEGV), "");
2619#else
Elliott Hughesbcaa4542019-03-08 15:20:23 -08002620 GTEST_SKIP() << "64-bit bionic-only test";
Christopher Ferris60907c72015-06-09 18:46:15 -07002621#endif
2622}
Yabin Cui33ac04a2015-09-22 11:16:15 -07002623
2624extern _Unwind_Reason_Code FrameCounter(_Unwind_Context* ctx, void* arg);
2625
2626static volatile bool signal_handler_on_altstack_done;
2627
Josh Gao61db9ac2017-03-15 19:42:05 -07002628__attribute__((__noinline__))
2629static void signal_handler_backtrace() {
2630 // Check if we have enough stack space for unwinding.
2631 int count = 0;
2632 _Unwind_Backtrace(FrameCounter, &count);
2633 ASSERT_GT(count, 0);
2634}
2635
2636__attribute__((__noinline__))
2637static void signal_handler_logging() {
2638 // Check if we have enough stack space for logging.
2639 std::string s(2048, '*');
2640 GTEST_LOG_(INFO) << s;
2641 signal_handler_on_altstack_done = true;
2642}
2643
2644__attribute__((__noinline__))
2645static void signal_handler_snprintf() {
2646 // Check if we have enough stack space for snprintf to a PATH_MAX buffer, plus some extra.
2647 char buf[PATH_MAX + 2048];
2648 ASSERT_GT(snprintf(buf, sizeof(buf), "/proc/%d/status", getpid()), 0);
2649}
2650
Yabin Cui33ac04a2015-09-22 11:16:15 -07002651static void SignalHandlerOnAltStack(int signo, siginfo_t*, void*) {
2652 ASSERT_EQ(SIGUSR1, signo);
Josh Gao61db9ac2017-03-15 19:42:05 -07002653 signal_handler_backtrace();
2654 signal_handler_logging();
2655 signal_handler_snprintf();
Yabin Cui33ac04a2015-09-22 11:16:15 -07002656}
2657
Josh Gao415daa82017-03-06 17:45:33 -08002658TEST(pthread, big_enough_signal_stack) {
Yabin Cui33ac04a2015-09-22 11:16:15 -07002659 signal_handler_on_altstack_done = false;
2660 ScopedSignalHandler handler(SIGUSR1, SignalHandlerOnAltStack, SA_SIGINFO | SA_ONSTACK);
2661 kill(getpid(), SIGUSR1);
2662 ASSERT_TRUE(signal_handler_on_altstack_done);
2663}
Yabin Cuie7c2fff2015-11-05 22:06:09 -08002664
2665TEST(pthread, pthread_barrierattr_smoke) {
2666 pthread_barrierattr_t attr;
2667 ASSERT_EQ(0, pthread_barrierattr_init(&attr));
2668 int pshared;
2669 ASSERT_EQ(0, pthread_barrierattr_getpshared(&attr, &pshared));
2670 ASSERT_EQ(PTHREAD_PROCESS_PRIVATE, pshared);
2671 ASSERT_EQ(0, pthread_barrierattr_setpshared(&attr, PTHREAD_PROCESS_SHARED));
2672 ASSERT_EQ(0, pthread_barrierattr_getpshared(&attr, &pshared));
2673 ASSERT_EQ(PTHREAD_PROCESS_SHARED, pshared);
2674 ASSERT_EQ(0, pthread_barrierattr_destroy(&attr));
2675}
2676
Yabin Cui81d27972016-03-22 13:45:55 -07002677struct BarrierTestHelperData {
2678 size_t thread_count;
2679 pthread_barrier_t barrier;
2680 std::atomic<int> finished_mask;
2681 std::atomic<int> serial_thread_count;
Yabin Cuie7c2fff2015-11-05 22:06:09 -08002682 size_t iteration_count;
Yabin Cui81d27972016-03-22 13:45:55 -07002683 std::atomic<size_t> finished_iteration_count;
2684
2685 BarrierTestHelperData(size_t thread_count, size_t iteration_count)
2686 : thread_count(thread_count), finished_mask(0), serial_thread_count(0),
2687 iteration_count(iteration_count), finished_iteration_count(0) {
2688 }
2689};
2690
2691struct BarrierTestHelperArg {
2692 int id;
2693 BarrierTestHelperData* data;
Yabin Cuie7c2fff2015-11-05 22:06:09 -08002694};
2695
2696static void BarrierTestHelper(BarrierTestHelperArg* arg) {
Yabin Cui81d27972016-03-22 13:45:55 -07002697 for (size_t i = 0; i < arg->data->iteration_count; ++i) {
2698 int result = pthread_barrier_wait(&arg->data->barrier);
2699 if (result == PTHREAD_BARRIER_SERIAL_THREAD) {
2700 arg->data->serial_thread_count++;
2701 } else {
2702 ASSERT_EQ(0, result);
2703 }
Yabin Cuid5c04c52017-05-02 12:57:39 -07002704 int mask = arg->data->finished_mask.fetch_or(1 << arg->id);
Yabin Cuiab4cddc2017-05-02 16:18:13 -07002705 mask |= 1 << arg->id;
Yabin Cuid5c04c52017-05-02 12:57:39 -07002706 if (mask == ((1 << arg->data->thread_count) - 1)) {
Yabin Cui81d27972016-03-22 13:45:55 -07002707 ASSERT_EQ(1, arg->data->serial_thread_count);
2708 arg->data->finished_iteration_count++;
2709 arg->data->finished_mask = 0;
2710 arg->data->serial_thread_count = 0;
2711 }
Yabin Cuie7c2fff2015-11-05 22:06:09 -08002712 }
2713}
2714
2715TEST(pthread, pthread_barrier_smoke) {
2716 const size_t BARRIER_ITERATION_COUNT = 10;
2717 const size_t BARRIER_THREAD_COUNT = 10;
Yabin Cui81d27972016-03-22 13:45:55 -07002718 BarrierTestHelperData data(BARRIER_THREAD_COUNT, BARRIER_ITERATION_COUNT);
2719 ASSERT_EQ(0, pthread_barrier_init(&data.barrier, nullptr, data.thread_count));
2720 std::vector<pthread_t> threads(data.thread_count);
Yabin Cuie7c2fff2015-11-05 22:06:09 -08002721 std::vector<BarrierTestHelperArg> args(threads.size());
2722 for (size_t i = 0; i < threads.size(); ++i) {
Yabin Cui81d27972016-03-22 13:45:55 -07002723 args[i].id = i;
2724 args[i].data = &data;
Yabin Cuie7c2fff2015-11-05 22:06:09 -08002725 ASSERT_EQ(0, pthread_create(&threads[i], nullptr,
2726 reinterpret_cast<void* (*)(void*)>(BarrierTestHelper), &args[i]));
2727 }
Yabin Cuie7c2fff2015-11-05 22:06:09 -08002728 for (size_t i = 0; i < threads.size(); ++i) {
2729 ASSERT_EQ(0, pthread_join(threads[i], nullptr));
2730 }
Yabin Cui81d27972016-03-22 13:45:55 -07002731 ASSERT_EQ(data.iteration_count, data.finished_iteration_count);
2732 ASSERT_EQ(0, pthread_barrier_destroy(&data.barrier));
2733}
2734
2735struct BarrierDestroyTestArg {
2736 std::atomic<int> tid;
2737 pthread_barrier_t* barrier;
2738};
2739
2740static void BarrierDestroyTestHelper(BarrierDestroyTestArg* arg) {
2741 arg->tid = gettid();
2742 ASSERT_EQ(0, pthread_barrier_wait(arg->barrier));
Yabin Cuie7c2fff2015-11-05 22:06:09 -08002743}
2744
2745TEST(pthread, pthread_barrier_destroy) {
2746 pthread_barrier_t barrier;
2747 ASSERT_EQ(0, pthread_barrier_init(&barrier, nullptr, 2));
2748 pthread_t thread;
Yabin Cui81d27972016-03-22 13:45:55 -07002749 BarrierDestroyTestArg arg;
Yabin Cuie7c2fff2015-11-05 22:06:09 -08002750 arg.tid = 0;
2751 arg.barrier = &barrier;
Yabin Cuie7c2fff2015-11-05 22:06:09 -08002752 ASSERT_EQ(0, pthread_create(&thread, nullptr,
Yabin Cui81d27972016-03-22 13:45:55 -07002753 reinterpret_cast<void* (*)(void*)>(BarrierDestroyTestHelper), &arg));
Yabin Cuie7c2fff2015-11-05 22:06:09 -08002754 WaitUntilThreadSleep(arg.tid);
2755 ASSERT_EQ(EBUSY, pthread_barrier_destroy(&barrier));
2756 ASSERT_EQ(PTHREAD_BARRIER_SERIAL_THREAD, pthread_barrier_wait(&barrier));
2757 // Verify if the barrier can be destroyed directly after pthread_barrier_wait().
2758 ASSERT_EQ(0, pthread_barrier_destroy(&barrier));
2759 ASSERT_EQ(0, pthread_join(thread, nullptr));
2760#if defined(__BIONIC__)
2761 ASSERT_EQ(EINVAL, pthread_barrier_destroy(&barrier));
2762#endif
2763}
2764
2765struct BarrierOrderingTestHelperArg {
2766 pthread_barrier_t* barrier;
2767 size_t* array;
2768 size_t array_length;
2769 size_t id;
2770};
2771
2772void BarrierOrderingTestHelper(BarrierOrderingTestHelperArg* arg) {
2773 const size_t ITERATION_COUNT = 10000;
2774 for (size_t i = 1; i <= ITERATION_COUNT; ++i) {
2775 arg->array[arg->id] = i;
Yabin Cuic9a659c2015-11-05 15:36:08 -08002776 int result = pthread_barrier_wait(arg->barrier);
2777 ASSERT_TRUE(result == 0 || result == PTHREAD_BARRIER_SERIAL_THREAD);
Yabin Cuie7c2fff2015-11-05 22:06:09 -08002778 for (size_t j = 0; j < arg->array_length; ++j) {
2779 ASSERT_EQ(i, arg->array[j]);
2780 }
Yabin Cuic9a659c2015-11-05 15:36:08 -08002781 result = pthread_barrier_wait(arg->barrier);
2782 ASSERT_TRUE(result == 0 || result == PTHREAD_BARRIER_SERIAL_THREAD);
Yabin Cuie7c2fff2015-11-05 22:06:09 -08002783 }
2784}
2785
2786TEST(pthread, pthread_barrier_check_ordering) {
2787 const size_t THREAD_COUNT = 4;
2788 pthread_barrier_t barrier;
2789 ASSERT_EQ(0, pthread_barrier_init(&barrier, nullptr, THREAD_COUNT));
2790 size_t array[THREAD_COUNT];
2791 std::vector<pthread_t> threads(THREAD_COUNT);
2792 std::vector<BarrierOrderingTestHelperArg> args(THREAD_COUNT);
2793 for (size_t i = 0; i < THREAD_COUNT; ++i) {
2794 args[i].barrier = &barrier;
2795 args[i].array = array;
2796 args[i].array_length = THREAD_COUNT;
2797 args[i].id = i;
2798 ASSERT_EQ(0, pthread_create(&threads[i], nullptr,
2799 reinterpret_cast<void* (*)(void*)>(BarrierOrderingTestHelper),
2800 &args[i]));
2801 }
2802 for (size_t i = 0; i < THREAD_COUNT; ++i) {
2803 ASSERT_EQ(0, pthread_join(threads[i], nullptr));
2804 }
2805}
Yabin Cuife3a83a2015-11-17 16:03:18 -08002806
Elliott Hughes463faad2018-07-06 14:34:49 -07002807TEST(pthread, pthread_barrier_init_zero_count) {
2808 pthread_barrier_t barrier;
2809 ASSERT_EQ(EINVAL, pthread_barrier_init(&barrier, nullptr, 0));
2810}
2811
Yabin Cuife3a83a2015-11-17 16:03:18 -08002812TEST(pthread, pthread_spinlock_smoke) {
2813 pthread_spinlock_t lock;
2814 ASSERT_EQ(0, pthread_spin_init(&lock, 0));
2815 ASSERT_EQ(0, pthread_spin_trylock(&lock));
2816 ASSERT_EQ(0, pthread_spin_unlock(&lock));
2817 ASSERT_EQ(0, pthread_spin_lock(&lock));
2818 ASSERT_EQ(EBUSY, pthread_spin_trylock(&lock));
2819 ASSERT_EQ(0, pthread_spin_unlock(&lock));
2820 ASSERT_EQ(0, pthread_spin_destroy(&lock));
2821}
Elliott Hughes53dc9dd2017-09-19 14:02:50 -07002822
Elliott Hughes8aecba72017-10-17 15:34:41 -07002823TEST(pthread, pthread_attr_getdetachstate__pthread_attr_setdetachstate) {
Elliott Hughes53dc9dd2017-09-19 14:02:50 -07002824 pthread_attr_t attr;
2825 ASSERT_EQ(0, pthread_attr_init(&attr));
2826
Elliott Hughes8aecba72017-10-17 15:34:41 -07002827 int state;
Elliott Hughes53dc9dd2017-09-19 14:02:50 -07002828 ASSERT_EQ(0, pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED));
Elliott Hughes8aecba72017-10-17 15:34:41 -07002829 ASSERT_EQ(0, pthread_attr_getdetachstate(&attr, &state));
2830 ASSERT_EQ(PTHREAD_CREATE_DETACHED, state);
2831
Elliott Hughes53dc9dd2017-09-19 14:02:50 -07002832 ASSERT_EQ(0, pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_JOINABLE));
Elliott Hughes8aecba72017-10-17 15:34:41 -07002833 ASSERT_EQ(0, pthread_attr_getdetachstate(&attr, &state));
2834 ASSERT_EQ(PTHREAD_CREATE_JOINABLE, state);
2835
Elliott Hughes53dc9dd2017-09-19 14:02:50 -07002836 ASSERT_EQ(EINVAL, pthread_attr_setdetachstate(&attr, 123));
Elliott Hughes8aecba72017-10-17 15:34:41 -07002837 ASSERT_EQ(0, pthread_attr_getdetachstate(&attr, &state));
2838 ASSERT_EQ(PTHREAD_CREATE_JOINABLE, state);
Elliott Hughes53dc9dd2017-09-19 14:02:50 -07002839}
2840
2841TEST(pthread, pthread_create__mmap_failures) {
Evgeny Eltsinb4f7aaa2020-06-09 15:49:20 +02002842 // After thread is successfully created, native_bridge might need more memory to run it.
2843 SKIP_WITH_NATIVE_BRIDGE;
2844
Elliott Hughes53dc9dd2017-09-19 14:02:50 -07002845 pthread_attr_t attr;
2846 ASSERT_EQ(0, pthread_attr_init(&attr));
2847 ASSERT_EQ(0, pthread_attr_setdetachstate(&attr, PTHREAD_CREATE_DETACHED));
2848
2849 const auto kPageSize = sysconf(_SC_PAGE_SIZE);
2850
Elliott Hughes57512982017-10-02 22:49:18 -07002851 // Use up all the VMAs. By default this is 64Ki (though some will already be in use).
Elliott Hughes53dc9dd2017-09-19 14:02:50 -07002852 std::vector<void*> pages;
Elliott Hughes57512982017-10-02 22:49:18 -07002853 pages.reserve(64 * 1024);
Elliott Hughes53dc9dd2017-09-19 14:02:50 -07002854 int prot = PROT_NONE;
2855 while (true) {
2856 void* page = mmap(nullptr, kPageSize, prot, MAP_ANON|MAP_PRIVATE, -1, 0);
2857 if (page == MAP_FAILED) break;
2858 pages.push_back(page);
2859 prot = (prot == PROT_NONE) ? PROT_READ : PROT_NONE;
2860 }
2861
2862 // Try creating threads, freeing up a page each time we fail.
2863 size_t EAGAIN_count = 0;
2864 size_t i = 0;
2865 for (; i < pages.size(); ++i) {
2866 pthread_t t;
2867 int status = pthread_create(&t, &attr, IdFn, nullptr);
2868 if (status != EAGAIN) break;
2869 ++EAGAIN_count;
2870 ASSERT_EQ(0, munmap(pages[i], kPageSize));
2871 }
2872
Ryan Prichard45d13492019-01-03 02:51:30 -08002873 // Creating a thread uses at least three VMAs: the combined stack and TLS, and a guard on each
2874 // side. So we should have seen at least three failures.
2875 ASSERT_GE(EAGAIN_count, 3U);
Elliott Hughes53dc9dd2017-09-19 14:02:50 -07002876
2877 for (; i < pages.size(); ++i) {
2878 ASSERT_EQ(0, munmap(pages[i], kPageSize));
2879 }
2880}
Elliott Hughesdff08ce2017-10-16 09:58:45 -07002881
2882TEST(pthread, pthread_setschedparam) {
2883 sched_param p = { .sched_priority = INT_MIN };
2884 ASSERT_EQ(EINVAL, pthread_setschedparam(pthread_self(), INT_MIN, &p));
2885}
2886
2887TEST(pthread, pthread_setschedprio) {
2888 ASSERT_EQ(EINVAL, pthread_setschedprio(pthread_self(), INT_MIN));
2889}
Elliott Hughes8aecba72017-10-17 15:34:41 -07002890
2891TEST(pthread, pthread_attr_getinheritsched__pthread_attr_setinheritsched) {
2892 pthread_attr_t attr;
2893 ASSERT_EQ(0, pthread_attr_init(&attr));
2894
2895 int state;
2896 ASSERT_EQ(0, pthread_attr_setinheritsched(&attr, PTHREAD_INHERIT_SCHED));
2897 ASSERT_EQ(0, pthread_attr_getinheritsched(&attr, &state));
2898 ASSERT_EQ(PTHREAD_INHERIT_SCHED, state);
2899
2900 ASSERT_EQ(0, pthread_attr_setinheritsched(&attr, PTHREAD_EXPLICIT_SCHED));
2901 ASSERT_EQ(0, pthread_attr_getinheritsched(&attr, &state));
2902 ASSERT_EQ(PTHREAD_EXPLICIT_SCHED, state);
2903
2904 ASSERT_EQ(EINVAL, pthread_attr_setinheritsched(&attr, 123));
2905 ASSERT_EQ(0, pthread_attr_getinheritsched(&attr, &state));
2906 ASSERT_EQ(PTHREAD_EXPLICIT_SCHED, state);
2907}
2908
2909TEST(pthread, pthread_attr_setinheritsched__PTHREAD_INHERIT_SCHED__PTHREAD_EXPLICIT_SCHED) {
2910 pthread_attr_t attr;
2911 ASSERT_EQ(0, pthread_attr_init(&attr));
2912
2913 // If we set invalid scheduling attributes but choose to inherit, everything's fine...
2914 sched_param param = { .sched_priority = sched_get_priority_max(SCHED_FIFO) + 1 };
2915 ASSERT_EQ(0, pthread_attr_setschedparam(&attr, &param));
2916 ASSERT_EQ(0, pthread_attr_setschedpolicy(&attr, SCHED_FIFO));
2917 ASSERT_EQ(0, pthread_attr_setinheritsched(&attr, PTHREAD_INHERIT_SCHED));
2918
2919 pthread_t t;
2920 ASSERT_EQ(0, pthread_create(&t, &attr, IdFn, nullptr));
2921 ASSERT_EQ(0, pthread_join(t, nullptr));
2922
Elliott Hughes7a660662017-10-30 09:26:06 -07002923#if defined(__LP64__)
2924 // If we ask to use them, though, we'll see a failure...
Elliott Hughes8aecba72017-10-17 15:34:41 -07002925 ASSERT_EQ(0, pthread_attr_setinheritsched(&attr, PTHREAD_EXPLICIT_SCHED));
2926 ASSERT_EQ(EINVAL, pthread_create(&t, &attr, IdFn, nullptr));
Elliott Hughes7a660662017-10-30 09:26:06 -07002927#else
2928 // For backwards compatibility with broken apps, we just ignore failures
2929 // to set scheduler attributes on LP32.
2930#endif
Elliott Hughes8aecba72017-10-17 15:34:41 -07002931}
2932
2933TEST(pthread, pthread_attr_setinheritsched_PTHREAD_INHERIT_SCHED_takes_effect) {
2934 sched_param param = { .sched_priority = sched_get_priority_min(SCHED_FIFO) };
2935 int rc = pthread_setschedparam(pthread_self(), SCHED_FIFO, &param);
Elliott Hughesbcaa4542019-03-08 15:20:23 -08002936 if (rc == EPERM) GTEST_SKIP() << "pthread_setschedparam failed with EPERM";
Elliott Hughes8aecba72017-10-17 15:34:41 -07002937 ASSERT_EQ(0, rc);
2938
2939 pthread_attr_t attr;
2940 ASSERT_EQ(0, pthread_attr_init(&attr));
2941 ASSERT_EQ(0, pthread_attr_setinheritsched(&attr, PTHREAD_INHERIT_SCHED));
2942
Elliott Hughes0bd9d132017-11-02 13:11:13 -07002943 SpinFunctionHelper spin_helper;
Elliott Hughes8aecba72017-10-17 15:34:41 -07002944 pthread_t t;
Elliott Hughes0bd9d132017-11-02 13:11:13 -07002945 ASSERT_EQ(0, pthread_create(&t, &attr, spin_helper.GetFunction(), nullptr));
Elliott Hughes8aecba72017-10-17 15:34:41 -07002946 int actual_policy;
2947 sched_param actual_param;
2948 ASSERT_EQ(0, pthread_getschedparam(t, &actual_policy, &actual_param));
2949 ASSERT_EQ(SCHED_FIFO, actual_policy);
Elliott Hughes0bd9d132017-11-02 13:11:13 -07002950 spin_helper.UnSpin();
Elliott Hughes8aecba72017-10-17 15:34:41 -07002951 ASSERT_EQ(0, pthread_join(t, nullptr));
2952}
2953
2954TEST(pthread, pthread_attr_setinheritsched_PTHREAD_EXPLICIT_SCHED_takes_effect) {
2955 sched_param param = { .sched_priority = sched_get_priority_min(SCHED_FIFO) };
2956 int rc = pthread_setschedparam(pthread_self(), SCHED_FIFO, &param);
Elliott Hughesbcaa4542019-03-08 15:20:23 -08002957 if (rc == EPERM) GTEST_SKIP() << "pthread_setschedparam failed with EPERM";
Elliott Hughes8aecba72017-10-17 15:34:41 -07002958 ASSERT_EQ(0, rc);
2959
2960 pthread_attr_t attr;
2961 ASSERT_EQ(0, pthread_attr_init(&attr));
2962 ASSERT_EQ(0, pthread_attr_setinheritsched(&attr, PTHREAD_EXPLICIT_SCHED));
2963 ASSERT_EQ(0, pthread_attr_setschedpolicy(&attr, SCHED_OTHER));
2964
Elliott Hughes0bd9d132017-11-02 13:11:13 -07002965 SpinFunctionHelper spin_helper;
Elliott Hughes8aecba72017-10-17 15:34:41 -07002966 pthread_t t;
Elliott Hughes0bd9d132017-11-02 13:11:13 -07002967 ASSERT_EQ(0, pthread_create(&t, &attr, spin_helper.GetFunction(), nullptr));
Elliott Hughes8aecba72017-10-17 15:34:41 -07002968 int actual_policy;
2969 sched_param actual_param;
2970 ASSERT_EQ(0, pthread_getschedparam(t, &actual_policy, &actual_param));
2971 ASSERT_EQ(SCHED_OTHER, actual_policy);
Elliott Hughes0bd9d132017-11-02 13:11:13 -07002972 spin_helper.UnSpin();
Elliott Hughes8aecba72017-10-17 15:34:41 -07002973 ASSERT_EQ(0, pthread_join(t, nullptr));
2974}
2975
2976TEST(pthread, pthread_attr_setinheritsched__takes_effect_despite_SCHED_RESET_ON_FORK) {
2977 sched_param param = { .sched_priority = sched_get_priority_min(SCHED_FIFO) };
2978 int rc = pthread_setschedparam(pthread_self(), SCHED_FIFO | SCHED_RESET_ON_FORK, &param);
Elliott Hughesbcaa4542019-03-08 15:20:23 -08002979 if (rc == EPERM) GTEST_SKIP() << "pthread_setschedparam failed with EPERM";
Elliott Hughes8aecba72017-10-17 15:34:41 -07002980 ASSERT_EQ(0, rc);
2981
2982 pthread_attr_t attr;
2983 ASSERT_EQ(0, pthread_attr_init(&attr));
2984 ASSERT_EQ(0, pthread_attr_setinheritsched(&attr, PTHREAD_INHERIT_SCHED));
2985
Elliott Hughes0bd9d132017-11-02 13:11:13 -07002986 SpinFunctionHelper spin_helper;
Elliott Hughes8aecba72017-10-17 15:34:41 -07002987 pthread_t t;
Elliott Hughes0bd9d132017-11-02 13:11:13 -07002988 ASSERT_EQ(0, pthread_create(&t, &attr, spin_helper.GetFunction(), nullptr));
Elliott Hughes8aecba72017-10-17 15:34:41 -07002989 int actual_policy;
2990 sched_param actual_param;
2991 ASSERT_EQ(0, pthread_getschedparam(t, &actual_policy, &actual_param));
2992 ASSERT_EQ(SCHED_FIFO | SCHED_RESET_ON_FORK, actual_policy);
Elliott Hughes0bd9d132017-11-02 13:11:13 -07002993 spin_helper.UnSpin();
Elliott Hughes8aecba72017-10-17 15:34:41 -07002994 ASSERT_EQ(0, pthread_join(t, nullptr));
2995}
Peter Collingbourne5d3aa862020-09-11 15:05:17 -07002996
2997extern "C" bool android_run_on_all_threads(bool (*func)(void*), void* arg);
2998
2999TEST(pthread, run_on_all_threads) {
3000#if defined(__BIONIC__)
3001 pthread_t t;
3002 ASSERT_EQ(
3003 0, pthread_create(
3004 &t, nullptr,
3005 [](void*) -> void* {
3006 pthread_attr_t detached;
3007 if (pthread_attr_init(&detached) != 0 ||
3008 pthread_attr_setdetachstate(&detached, PTHREAD_CREATE_DETACHED) != 0) {
3009 return reinterpret_cast<void*>(errno);
3010 }
3011
3012 for (int i = 0; i != 1000; ++i) {
3013 pthread_t t1, t2;
3014 if (pthread_create(
3015 &t1, &detached, [](void*) -> void* { return nullptr; }, nullptr) != 0 ||
3016 pthread_create(
3017 &t2, nullptr, [](void*) -> void* { return nullptr; }, nullptr) != 0 ||
3018 pthread_join(t2, nullptr) != 0) {
3019 return reinterpret_cast<void*>(errno);
3020 }
3021 }
3022
3023 if (pthread_attr_destroy(&detached) != 0) {
3024 return reinterpret_cast<void*>(errno);
3025 }
3026 return nullptr;
3027 },
3028 nullptr));
3029
3030 for (int i = 0; i != 1000; ++i) {
3031 ASSERT_TRUE(android_run_on_all_threads([](void* arg) { return arg == nullptr; }, nullptr));
3032 }
3033
3034 void *retval;
3035 ASSERT_EQ(0, pthread_join(t, &retval));
3036 ASSERT_EQ(nullptr, retval);
3037#else
3038 GTEST_SKIP() << "bionic-only test";
3039#endif
3040}