Home | History | Annotate | Line # | Download | only in libpthread
t_stack.c revision 1.6.4.2
      1  1.6.4.2  martin /*	$NetBSD: t_stack.c,v 1.6.4.2 2023/12/09 13:24:23 martin Exp $	*/
      2  1.6.4.2  martin 
      3  1.6.4.2  martin /*-
      4  1.6.4.2  martin  * Copyright (c) 2023 The NetBSD Foundation, Inc.
      5  1.6.4.2  martin  * All rights reserved.
      6  1.6.4.2  martin  *
      7  1.6.4.2  martin  * Redistribution and use in source and binary forms, with or without
      8  1.6.4.2  martin  * modification, are permitted provided that the following conditions
      9  1.6.4.2  martin  * are met:
     10  1.6.4.2  martin  * 1. Redistributions of source code must retain the above copyright
     11  1.6.4.2  martin  *    notice, this list of conditions and the following disclaimer.
     12  1.6.4.2  martin  * 2. Redistributions in binary form must reproduce the above copyright
     13  1.6.4.2  martin  *    notice, this list of conditions and the following disclaimer in the
     14  1.6.4.2  martin  *    documentation and/or other materials provided with the distribution.
     15  1.6.4.2  martin  *
     16  1.6.4.2  martin  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
     17  1.6.4.2  martin  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
     18  1.6.4.2  martin  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
     19  1.6.4.2  martin  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
     20  1.6.4.2  martin  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
     21  1.6.4.2  martin  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
     22  1.6.4.2  martin  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
     23  1.6.4.2  martin  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
     24  1.6.4.2  martin  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
     25  1.6.4.2  martin  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
     26  1.6.4.2  martin  * POSSIBILITY OF SUCH DAMAGE.
     27  1.6.4.2  martin  */
     28  1.6.4.2  martin 
     29  1.6.4.2  martin #define	_KMEMUSER		/* __MACHINE_STACK_GROWS_UP */
     30  1.6.4.2  martin 
     31  1.6.4.2  martin #include <sys/cdefs.h>
     32  1.6.4.2  martin __RCSID("$NetBSD: t_stack.c,v 1.6.4.2 2023/12/09 13:24:23 martin Exp $");
     33  1.6.4.2  martin 
     34  1.6.4.2  martin #include <sys/mman.h>
     35  1.6.4.2  martin #include <sys/param.h>
     36  1.6.4.2  martin #include <sys/sysctl.h>
     37  1.6.4.2  martin #include <sys/types.h>
     38  1.6.4.2  martin 
     39  1.6.4.2  martin #include <uvm/uvm_param.h>	/* VM_THREAD_GUARD_SIZE */
     40  1.6.4.2  martin 
     41  1.6.4.2  martin #include <atf-c.h>
     42  1.6.4.2  martin #include <pthread.h>
     43  1.6.4.2  martin #include <setjmp.h>
     44  1.6.4.2  martin #include <signal.h>
     45  1.6.4.2  martin #include <string.h>
     46  1.6.4.2  martin #include <unistd.h>
     47  1.6.4.2  martin 
     48  1.6.4.2  martin #include "h_macros.h"
     49  1.6.4.2  martin 
     50  1.6.4.2  martin struct jmp_ctx {
     51  1.6.4.2  martin 	jmp_buf buf;
     52  1.6.4.2  martin };
     53  1.6.4.2  martin 
     54  1.6.4.2  martin /*
     55  1.6.4.2  martin  * State used by various tests.
     56  1.6.4.2  martin  */
     57  1.6.4.2  martin struct ctx {
     58  1.6.4.2  martin 	size_t size;		/* default stack size */
     59  1.6.4.2  martin 	size_t guardsize;	/* default guard size */
     60  1.6.4.2  martin 	void *addr;		/* user-allocated stack */
     61  1.6.4.2  martin 	pthread_key_t jmp_key;	/* jmp_ctx to return from SIGSEGV handler */
     62  1.6.4.2  martin } ctx, *C = &ctx;
     63  1.6.4.2  martin 
     64  1.6.4.2  martin /*
     65  1.6.4.2  martin  * getdefaultstacksize()
     66  1.6.4.2  martin  *
     67  1.6.4.2  martin  *	Return the default stack size for threads created with
     68  1.6.4.2  martin  *	pthread_create.
     69  1.6.4.2  martin  */
     70  1.6.4.2  martin static size_t
     71  1.6.4.2  martin getdefaultstacksize(void)
     72  1.6.4.2  martin {
     73  1.6.4.2  martin 	pthread_attr_t attr;
     74  1.6.4.2  martin 	size_t stacksize;
     75  1.6.4.2  martin 
     76  1.6.4.2  martin 	/*
     77  1.6.4.2  martin 	 * When called from the main thread, this returns the default
     78  1.6.4.2  martin 	 * stack size (pthread__stacksize) used for pthreads.
     79  1.6.4.2  martin 	 */
     80  1.6.4.2  martin 	RZ(pthread_getattr_np(pthread_self(), &attr));
     81  1.6.4.2  martin 	RZ(pthread_attr_getstacksize(&attr, &stacksize));
     82  1.6.4.2  martin 	RZ(pthread_attr_destroy(&attr));
     83  1.6.4.2  martin 
     84  1.6.4.2  martin 	/*
     85  1.6.4.2  martin 	 * Verify that the assumption above holds.
     86  1.6.4.2  martin 	 */
     87  1.6.4.2  martin 	extern size_t pthread__stacksize; /* pthread_int.h */
     88  1.6.4.2  martin 	ATF_CHECK_EQ_MSG(stacksize, pthread__stacksize,
     89  1.6.4.2  martin 	    "stacksize=%zu pthread__stacksize=%zu",
     90  1.6.4.2  martin 	    stacksize, pthread__stacksize);
     91  1.6.4.2  martin 
     92  1.6.4.2  martin 	return stacksize;
     93  1.6.4.2  martin }
     94  1.6.4.2  martin 
     95  1.6.4.2  martin /*
     96  1.6.4.2  martin  * getnondefaultstacksize()
     97  1.6.4.2  martin  *
     98  1.6.4.2  martin  *	Return a stack size that is not the default stack size for
     99  1.6.4.2  martin  *	threads created with pthread_create.
    100  1.6.4.2  martin  */
    101  1.6.4.2  martin static size_t
    102  1.6.4.2  martin getnondefaultstacksize(void)
    103  1.6.4.2  martin {
    104  1.6.4.2  martin 
    105  1.6.4.2  martin 	return getdefaultstacksize() + sysconf(_SC_PAGESIZE);
    106  1.6.4.2  martin }
    107  1.6.4.2  martin 
    108  1.6.4.2  martin /*
    109  1.6.4.2  martin  * getdefaultguardsize()
    110  1.6.4.2  martin  *
    111  1.6.4.2  martin  *	Return the default guard size for threads created with
    112  1.6.4.2  martin  *	pthread_create.
    113  1.6.4.2  martin  */
    114  1.6.4.2  martin static size_t
    115  1.6.4.2  martin getdefaultguardsize(void)
    116  1.6.4.2  martin {
    117  1.6.4.2  martin 	const int mib[2] = { CTL_VM, VM_THREAD_GUARD_SIZE };
    118  1.6.4.2  martin 	unsigned guardsize;
    119  1.6.4.2  martin 	size_t len = sizeof(guardsize);
    120  1.6.4.2  martin 
    121  1.6.4.2  martin 	RL(sysctl(mib, __arraycount(mib), &guardsize, &len, NULL, 0));
    122  1.6.4.2  martin 	ATF_REQUIRE_EQ_MSG(len, sizeof(guardsize),
    123  1.6.4.2  martin 	    "len=%zu sizeof(guardsize)=%zu", len, sizeof(guardsize));
    124  1.6.4.2  martin 
    125  1.6.4.2  martin 	/*
    126  1.6.4.2  martin 	 * Verify this matches what libpthread determined.
    127  1.6.4.2  martin 	 */
    128  1.6.4.2  martin 	extern size_t pthread__guardsize; /* pthread_int.h */
    129  1.6.4.2  martin 	ATF_CHECK_EQ_MSG(guardsize, pthread__guardsize,
    130  1.6.4.2  martin 	    "guardsize=%u pthread__guardsize=%zu",
    131  1.6.4.2  martin 	    guardsize, pthread__guardsize);
    132  1.6.4.2  martin 
    133  1.6.4.2  martin 	return guardsize;
    134  1.6.4.2  martin }
    135  1.6.4.2  martin 
    136  1.6.4.2  martin /*
    137  1.6.4.2  martin  * alloc(nbytes)
    138  1.6.4.2  martin  *
    139  1.6.4.2  martin  *	Allocate an nbytes-long page-aligned read/write region and
    140  1.6.4.2  martin  *	return a pointer to it.  Abort the test if allocation fails, so
    141  1.6.4.2  martin  *	if this function returns it succeeds.
    142  1.6.4.2  martin  */
    143  1.6.4.2  martin static void *
    144  1.6.4.2  martin alloc(size_t nbytes)
    145  1.6.4.2  martin {
    146  1.6.4.2  martin 	void *ptr;
    147  1.6.4.2  martin 
    148  1.6.4.2  martin 	REQUIRE_LIBC((ptr = mmap(/*hint*/NULL, nbytes,
    149  1.6.4.2  martin 		    PROT_READ|PROT_WRITE, MAP_ANON, /*fd*/-1, /*offset*/0)),
    150  1.6.4.2  martin 	    MAP_FAILED);
    151  1.6.4.2  martin 
    152  1.6.4.2  martin 	return ptr;
    153  1.6.4.2  martin }
    154  1.6.4.2  martin 
    155  1.6.4.2  martin /*
    156  1.6.4.2  martin  * init(stacksize)
    157  1.6.4.2  martin  *
    158  1.6.4.2  martin  *	Initialize state used by various tests with the specified
    159  1.6.4.2  martin  *	stacksize.
    160  1.6.4.2  martin  *
    161  1.6.4.2  martin  *	Make sure to allocate enough space that even if there shouldn't
    162  1.6.4.2  martin  *	be a stack guard (i.e., it should be empty), adjusting the
    163  1.6.4.2  martin  *	requested bounds by the default stack guard size will leave us
    164  1.6.4.2  martin  *	inside allocated memory.
    165  1.6.4.2  martin  */
    166  1.6.4.2  martin static void
    167  1.6.4.2  martin init(size_t stacksize)
    168  1.6.4.2  martin {
    169  1.6.4.2  martin 
    170  1.6.4.2  martin 	C->size = stacksize;
    171  1.6.4.2  martin 	C->guardsize = getdefaultguardsize();
    172  1.6.4.2  martin 	C->addr = alloc(C->size + C->guardsize);
    173  1.6.4.2  martin 	RZ(pthread_key_create(&C->jmp_key, NULL));
    174  1.6.4.2  martin }
    175  1.6.4.2  martin 
    176  1.6.4.2  martin /*
    177  1.6.4.2  martin  * stack_pointer()
    178  1.6.4.2  martin  *
    179  1.6.4.2  martin  *	Return the stack pointer.  This is used to verify whether the
    180  1.6.4.2  martin  *	stack pointer lie within a certain address range.
    181  1.6.4.2  martin  */
    182  1.6.4.2  martin static __noinline void *
    183  1.6.4.2  martin stack_pointer(void)
    184  1.6.4.2  martin {
    185  1.6.4.2  martin 	return __builtin_frame_address(0);
    186  1.6.4.2  martin }
    187  1.6.4.2  martin 
    188  1.6.4.2  martin /*
    189  1.6.4.2  martin  * sigsegv_ok(signo)
    190  1.6.4.2  martin  *
    191  1.6.4.2  martin  *	Signal handler for SIGSEGV to return to the jmp ctx, to verify
    192  1.6.4.2  martin  *	that SIGSEGV happened without crashing.
    193  1.6.4.2  martin  */
    194  1.6.4.2  martin static void
    195  1.6.4.2  martin sigsegv_ok(int signo)
    196  1.6.4.2  martin {
    197  1.6.4.2  martin 	struct jmp_ctx *j = pthread_getspecific(C->jmp_key);
    198  1.6.4.2  martin 
    199  1.6.4.2  martin 	longjmp(j->buf, 1);
    200  1.6.4.2  martin }
    201  1.6.4.2  martin 
    202  1.6.4.2  martin /*
    203  1.6.4.2  martin  * checksigsegv(p)
    204  1.6.4.2  martin  *
    205  1.6.4.2  martin  *	Verify that reading *p triggers SIGSEGV.  Fails test nonfatally
    206  1.6.4.2  martin  *	if SIGSEGV doesn't happen.
    207  1.6.4.2  martin  */
    208  1.6.4.2  martin static void
    209  1.6.4.2  martin checksigsegv(const char *p)
    210  1.6.4.2  martin {
    211  1.6.4.2  martin 	struct jmp_ctx j;
    212  1.6.4.2  martin 	struct sigaction act, oact;
    213  1.6.4.2  martin 	volatile struct sigaction oactsave;
    214  1.6.4.2  martin 	volatile char v;
    215  1.6.4.2  martin 
    216  1.6.4.2  martin 	memset(&act, 0, sizeof(act));
    217  1.6.4.2  martin 	act.sa_handler = &sigsegv_ok;
    218  1.6.4.2  martin 
    219  1.6.4.2  martin 	if (setjmp(j.buf) == 0) {
    220  1.6.4.2  martin 		pthread_setspecific(C->jmp_key, &j);
    221  1.6.4.2  martin 		RL(sigaction(SIGSEGV, &act, &oact));
    222  1.6.4.2  martin 		oactsave = oact;
    223  1.6.4.2  martin 		v = *p;		/* trigger SIGSEGV */
    224  1.6.4.2  martin 		atf_tc_fail_nonfatal("failed to trigger SIGSEGV at %p", p);
    225  1.6.4.2  martin 	} else {
    226  1.6.4.2  martin 		/* return from SIGSEGV handler */
    227  1.6.4.2  martin 		oact = oactsave;
    228  1.6.4.2  martin 	}
    229  1.6.4.2  martin 	RL(sigaction(SIGSEGV, &oact, NULL));
    230  1.6.4.2  martin 	pthread_setspecific(C->jmp_key, NULL);
    231  1.6.4.2  martin 
    232  1.6.4.2  martin 	(void)v;		/* suppress unused variable warnings */
    233  1.6.4.2  martin }
    234  1.6.4.2  martin 
    235  1.6.4.2  martin /*
    236  1.6.4.2  martin  * checknosigsegv(p)
    237  1.6.4.2  martin  *
    238  1.6.4.2  martin  *	Verify that reading *p does not trigger SIGSEGV.  Fails test
    239  1.6.4.2  martin  *	nonfatally if SIGSEGV happens.
    240  1.6.4.2  martin  */
    241  1.6.4.2  martin static void
    242  1.6.4.2  martin checknosigsegv(const char *p)
    243  1.6.4.2  martin {
    244  1.6.4.2  martin 	struct jmp_ctx j;
    245  1.6.4.2  martin 	struct sigaction act, oact;
    246  1.6.4.2  martin 	volatile struct sigaction oactsave;
    247  1.6.4.2  martin 	volatile char v;
    248  1.6.4.2  martin 
    249  1.6.4.2  martin 	memset(&act, 0, sizeof(act));
    250  1.6.4.2  martin 	act.sa_handler = &sigsegv_ok;
    251  1.6.4.2  martin 
    252  1.6.4.2  martin 	if (setjmp(j.buf) == 0) {
    253  1.6.4.2  martin 		pthread_setspecific(C->jmp_key, &j);
    254  1.6.4.2  martin 		RL(sigaction(SIGSEGV, &act, &oact));
    255  1.6.4.2  martin 		oactsave = oact;
    256  1.6.4.2  martin 		v = *p;		/* better not trigger SIGSEGV */
    257  1.6.4.2  martin 	} else {
    258  1.6.4.2  martin 		/* return from SIGSEGV handler */
    259  1.6.4.2  martin 		atf_tc_fail_nonfatal("spuriously triggered SIGSEGV at %p", p);
    260  1.6.4.2  martin 		oact = oactsave;
    261  1.6.4.2  martin 	}
    262  1.6.4.2  martin 	RL(sigaction(SIGSEGV, &oact, NULL));
    263  1.6.4.2  martin 	pthread_setspecific(C->jmp_key, NULL);
    264  1.6.4.2  martin 
    265  1.6.4.2  martin 	(void)v;		/* suppress unused variable warnings */
    266  1.6.4.2  martin }
    267  1.6.4.2  martin 
    268  1.6.4.2  martin /*
    269  1.6.4.2  martin  * checkguardaccessthread(cookie)
    270  1.6.4.2  martin  *
    271  1.6.4.2  martin  *	Thread start routine that verifies it has access to the start
    272  1.6.4.2  martin  *	and end of its stack, according to pthread_attr_getstack, and
    273  1.6.4.2  martin  *	_does not_ have access to the start or end of its stack guard,
    274  1.6.4.2  martin  *	above the stack (in stack growth direction) by
    275  1.6.4.2  martin  *	pthread_attr_getguardsize bytes.
    276  1.6.4.2  martin  */
    277  1.6.4.2  martin static void *
    278  1.6.4.2  martin checkguardaccessthread(void *cookie)
    279  1.6.4.2  martin {
    280  1.6.4.2  martin 	pthread_t t = pthread_self();
    281  1.6.4.2  martin 	pthread_attr_t attr;
    282  1.6.4.2  martin 	void *addr, *guard;
    283  1.6.4.2  martin 	size_t size, guardsize;
    284  1.6.4.2  martin 
    285  1.6.4.2  martin 	/*
    286  1.6.4.2  martin 	 * Get the the stack and stack guard parameters.
    287  1.6.4.2  martin 	 */
    288  1.6.4.2  martin 	RZ(pthread_getattr_np(t, &attr));
    289  1.6.4.2  martin 	RZ(pthread_attr_getstack(&attr, &addr, &size));
    290  1.6.4.2  martin 	RZ(pthread_attr_getguardsize(&attr, &guardsize));
    291  1.6.4.2  martin 
    292  1.6.4.2  martin 	/*
    293  1.6.4.2  martin 	 * Determine where the guard starts in virtual address space
    294  1.6.4.2  martin 	 * (not in stack growth direction).
    295  1.6.4.2  martin 	 */
    296  1.6.4.2  martin #ifdef __MACHINE_STACK_GROWS_UP
    297  1.6.4.2  martin 	guard = (char *)addr + size;
    298  1.6.4.2  martin #else
    299  1.6.4.2  martin 	guard = (char *)addr - guardsize;
    300  1.6.4.2  martin #endif
    301  1.6.4.2  martin 
    302  1.6.4.2  martin 	/*
    303  1.6.4.2  martin 	 * Verify access to the start and end of the stack itself.
    304  1.6.4.2  martin 	 */
    305  1.6.4.2  martin 	checknosigsegv(addr);
    306  1.6.4.2  martin 	checknosigsegv((char *)addr + size - 1);
    307  1.6.4.2  martin 
    308  1.6.4.2  martin 	/*
    309  1.6.4.2  martin 	 * Verify no access to the start or end of the stack guard.
    310  1.6.4.2  martin 	 */
    311  1.6.4.2  martin 	checksigsegv(guard);
    312  1.6.4.2  martin 	checksigsegv((char *)guard + guardsize - 1);
    313  1.6.4.2  martin 
    314  1.6.4.2  martin 	return NULL;
    315  1.6.4.2  martin }
    316  1.6.4.2  martin 
    317  1.6.4.2  martin /*
    318  1.6.4.2  martin  * checkaddraccessthread(cookie)
    319  1.6.4.2  martin  *
    320  1.6.4.2  martin  *	Thread start routine that verifies its stack is [C->addr,
    321  1.6.4.2  martin  *	C->addr + C->size), according to pthread_attr_getstack and
    322  1.6.4.2  martin  *	pthread_addr_getstacksize, and verifies it has access to that
    323  1.6.4.2  martin  *	whole range.
    324  1.6.4.2  martin  */
    325  1.6.4.2  martin static void *
    326  1.6.4.2  martin checkaddraccessthread(void *cookie)
    327  1.6.4.2  martin {
    328  1.6.4.2  martin 	pthread_t t = pthread_self();
    329  1.6.4.2  martin 	pthread_attr_t attr;
    330  1.6.4.2  martin 	void *sp;
    331  1.6.4.2  martin 	void *addr;
    332  1.6.4.2  martin 	size_t size, size0;
    333  1.6.4.2  martin 
    334  1.6.4.2  martin 	/*
    335  1.6.4.2  martin 	 * Verify the stack pointer lies somewhere in the allocated
    336  1.6.4.2  martin 	 * range.
    337  1.6.4.2  martin 	 */
    338  1.6.4.2  martin 	sp = stack_pointer();
    339  1.6.4.2  martin 	ATF_CHECK_MSG(C->addr <= sp, "sp=%p not in [%p,%p + 0x%zu) = [%p,%p)",
    340  1.6.4.2  martin 	    sp, C->addr, C->addr, C->size, C->addr, (char *)C->addr + C->size);
    341  1.6.4.2  martin 	ATF_CHECK_MSG(sp <= (void *)((char *)C->addr + C->size),
    342  1.6.4.2  martin 	    "sp=%p not in [%p,%p + 0x%zu) = [%p,%p)",
    343  1.6.4.2  martin 	    sp, C->addr, C->addr, C->size, C->addr, (char *)C->addr + C->size);
    344  1.6.4.2  martin 
    345  1.6.4.2  martin 	/*
    346  1.6.4.2  martin 	 * Verify, if not that, then the stack pointer at least lies
    347  1.6.4.2  martin 	 * within the extra buffer we allocated for slop to address a
    348  1.6.4.2  martin 	 * bug NetBSD libpthread used to have of spuriously adding the
    349  1.6.4.2  martin 	 * guard size to a user-allocated stack address.  This is
    350  1.6.4.2  martin 	 * ATF_REQUIRE, not ATF_CHECK, because if this doesn't hold, we
    351  1.6.4.2  martin 	 * might be clobbering some other memory like malloc pages,
    352  1.6.4.2  martin 	 * causing the whole test to crash with useless diagnostics.
    353  1.6.4.2  martin 	 */
    354  1.6.4.2  martin 	ATF_REQUIRE_MSG(sp <= (void *)((char *)C->addr + C->size +
    355  1.6.4.2  martin 		C->guardsize),
    356  1.6.4.2  martin 	    "sp=%p not even in buffer [%p,%p + 0x%zu + 0x%zu) = [%p,%p)",
    357  1.6.4.2  martin 	    sp, C->addr, C->addr, C->size, C->guardsize,
    358  1.6.4.2  martin 	    C->addr, (char *)C->addr + C->size + C->guardsize);
    359  1.6.4.2  martin 
    360  1.6.4.2  martin 	/*
    361  1.6.4.2  martin 	 * Get the stack parameters -- both via pthread_attr_getstack
    362  1.6.4.2  martin 	 * and via pthread_attr_getstacksize, to make sure they agree
    363  1.6.4.2  martin 	 * -- and verify that they are what we expect from the caller.
    364  1.6.4.2  martin 	 */
    365  1.6.4.2  martin 	RZ(pthread_getattr_np(t, &attr));
    366  1.6.4.2  martin 	RZ(pthread_attr_getstack(&attr, &addr, &size));
    367  1.6.4.2  martin 	RZ(pthread_attr_getstacksize(&attr, &size0));
    368  1.6.4.2  martin 	ATF_CHECK_EQ_MSG(C->addr, addr, "expected %p actual %p",
    369  1.6.4.2  martin 	    C->addr, addr);
    370  1.6.4.2  martin 	ATF_CHECK_EQ_MSG(C->size, size, "expected %zu actual %zu",
    371  1.6.4.2  martin 	    C->size, size);
    372  1.6.4.2  martin 	ATF_CHECK_EQ_MSG(C->size, size0, "expected %zu actual %zu",
    373  1.6.4.2  martin 	    C->size, size0);
    374  1.6.4.2  martin 
    375  1.6.4.2  martin 	/*
    376  1.6.4.2  martin 	 * Verify that we have access to what we expect the stack to
    377  1.6.4.2  martin 	 * be.
    378  1.6.4.2  martin 	 */
    379  1.6.4.2  martin 	checknosigsegv(C->addr);
    380  1.6.4.2  martin 	checknosigsegv((char *)C->addr + C->size - 1);
    381  1.6.4.2  martin 
    382  1.6.4.2  martin 	return NULL;
    383  1.6.4.2  martin }
    384  1.6.4.2  martin 
    385  1.6.4.2  martin ATF_TC(stack1);
    386  1.6.4.2  martin ATF_TC_HEAD(stack1, tc)
    387  1.6.4.2  martin {
    388  1.6.4.2  martin 	atf_tc_set_md_var(tc, "descr",
    389  1.6.4.2  martin 	    "Test allocating and reallocating a thread with a user stack");
    390  1.6.4.2  martin }
    391  1.6.4.2  martin ATF_TC_BODY(stack1, tc)
    392  1.6.4.2  martin {
    393  1.6.4.2  martin 	pthread_attr_t attr;
    394  1.6.4.2  martin 	pthread_t t, t2;
    395  1.6.4.2  martin 
    396  1.6.4.2  martin 	/*
    397  1.6.4.2  martin 	 * Allocate a stack with a non-default size to verify
    398  1.6.4.2  martin 	 * libpthread didn't choose the stack size for us.
    399  1.6.4.2  martin 	 */
    400  1.6.4.2  martin 	init(getnondefaultstacksize());
    401  1.6.4.2  martin 
    402  1.6.4.2  martin 	/*
    403  1.6.4.2  martin 	 * Create a thread with user-allocated stack of a non-default
    404  1.6.4.2  martin 	 * size to verify the stack size and access.
    405  1.6.4.2  martin 	 */
    406  1.6.4.2  martin 	RZ(pthread_attr_init(&attr));
    407  1.6.4.2  martin 	RZ(pthread_attr_setstack(&attr, C->addr, C->size));
    408  1.6.4.2  martin 	RZ(pthread_create(&t, &attr, &checkaddraccessthread, C));
    409  1.6.4.2  martin 	RZ(pthread_join(t, NULL));
    410  1.6.4.2  martin 
    411  1.6.4.2  martin 	/*
    412  1.6.4.2  martin 	 * Create another thread with the same parameters, and verify
    413  1.6.4.2  martin 	 * that (a) it was recycled, and (b) it works the same way.
    414  1.6.4.2  martin 	 */
    415  1.6.4.2  martin 	RZ(pthread_create(&t2, &attr, &checkaddraccessthread, C));
    416  1.6.4.2  martin 	ATF_CHECK_EQ_MSG(t, t2, "t=%p t2=%p", t, t2); /* NetBSD recycles */
    417  1.6.4.2  martin 	RZ(pthread_join(t2, NULL));
    418  1.6.4.2  martin }
    419  1.6.4.2  martin 
    420  1.6.4.2  martin ATF_TC(stack2);
    421  1.6.4.2  martin ATF_TC_HEAD(stack2, tc)
    422  1.6.4.2  martin {
    423  1.6.4.2  martin 	atf_tc_set_md_var(tc, "descr",
    424  1.6.4.2  martin 	    "Test reallocating a thread with a newly self-allocated stack");
    425  1.6.4.2  martin }
    426  1.6.4.2  martin ATF_TC_BODY(stack2, tc)
    427  1.6.4.2  martin {
    428  1.6.4.2  martin 	pthread_attr_t attr, attr2;
    429  1.6.4.2  martin 	size_t size, size2;
    430  1.6.4.2  martin 	pthread_t t, t2;
    431  1.6.4.2  martin 
    432  1.6.4.2  martin 	/*
    433  1.6.4.2  martin 	 * Allocate a stack with the default size so that we verify
    434  1.6.4.2  martin 	 * when libpthread reuses the thread, it doesn't inadvertently
    435  1.6.4.2  martin 	 * reuse the libpthread-allocated stack too and instead
    436  1.6.4.2  martin 	 * correctly uses our user-allocated stack.
    437  1.6.4.2  martin 	 */
    438  1.6.4.2  martin 	init(getdefaultstacksize());
    439  1.6.4.2  martin 
    440  1.6.4.2  martin 	/*
    441  1.6.4.2  martin 	 * Create a thread with a libpthread-allocated stack that
    442  1.6.4.2  martin 	 * verifies
    443  1.6.4.2  martin 	 * (a) access to its own stack, and
    444  1.6.4.2  martin 	 * (b) no access to its own guard pages;
    445  1.6.4.2  martin 	 * then get its attributes and wait for it to complete.
    446  1.6.4.2  martin 	 */
    447  1.6.4.2  martin 	RZ(pthread_create(&t, NULL, &checkguardaccessthread, C));
    448  1.6.4.2  martin 	RZ(pthread_getattr_np(t, &attr));
    449  1.6.4.2  martin 	RZ(pthread_join(t, NULL));
    450  1.6.4.2  martin 
    451  1.6.4.2  martin 	/*
    452  1.6.4.2  martin 	 * Create a thread with a user-allocated stack that verifies
    453  1.6.4.2  martin 	 * (a) stack addr/size match request, and
    454  1.6.4.2  martin 	 * (b) access to the requested stack,
    455  1.6.4.2  martin 	 * and confirm that the first thread was recycled -- not part
    456  1.6.4.2  martin 	 * of POSIX semantics, but part of NetBSD's implementation;
    457  1.6.4.2  martin 	 * this way, we verify that, even though the thread is
    458  1.6.4.2  martin 	 * recycled, the thread's stack is set to the user-allocated
    459  1.6.4.2  martin 	 * stack and access to it works as expected.  Then wait for it
    460  1.6.4.2  martin 	 * to complete.
    461  1.6.4.2  martin 	 */
    462  1.6.4.2  martin 	RZ(pthread_attr_init(&attr2));
    463  1.6.4.2  martin 	RZ(pthread_attr_setstack(&attr2, C->addr, C->size));
    464  1.6.4.2  martin 	RZ(pthread_create(&t2, &attr2, &checkaddraccessthread, C));
    465  1.6.4.2  martin 	ATF_CHECK_EQ_MSG(t, t2, "t=%p t2=%p", t, t2); /* NetBSD recycles */
    466  1.6.4.2  martin 	RZ(pthread_join(t2, NULL));
    467  1.6.4.2  martin 
    468  1.6.4.2  martin 	/*
    469  1.6.4.2  martin 	 * Verify that the libpthread-allocated stack and
    470  1.6.4.2  martin 	 * user-allocated stack had the same size, since we chose the
    471  1.6.4.2  martin 	 * default size.
    472  1.6.4.2  martin 	 *
    473  1.6.4.2  martin 	 * Note: We can't say anything about the guard size, because
    474  1.6.4.2  martin 	 * with pthread_attr_setstack, the guard size is ignored, and
    475  1.6.4.2  martin 	 * it's not clear from POSIX whether any meaningful guard size
    476  1.6.4.2  martin 	 * is stored for retrieval with pthread_attr_getguardsize in
    477  1.6.4.2  martin 	 * attributes with pthread_attr_setstack.
    478  1.6.4.2  martin 	 */
    479  1.6.4.2  martin 	RZ(pthread_attr_getstacksize(&attr, &size));
    480  1.6.4.2  martin 	RZ(pthread_attr_getstacksize(&attr2, &size2));
    481  1.6.4.2  martin 	ATF_CHECK_EQ_MSG(size, size2, "size=%zu size2=%zu", size, size2);
    482  1.6.4.2  martin }
    483  1.6.4.2  martin 
    484  1.6.4.2  martin ATF_TP_ADD_TCS(tp)
    485  1.6.4.2  martin {
    486  1.6.4.2  martin 
    487  1.6.4.2  martin 	ATF_TP_ADD_TC(tp, stack1);
    488  1.6.4.2  martin 	ATF_TP_ADD_TC(tp, stack2);
    489  1.6.4.2  martin 
    490  1.6.4.2  martin 	return atf_no_error();
    491  1.6.4.2  martin }
    492