t_stack.c revision 1.6.4.2 1 1.6.4.2 martin /* $NetBSD: t_stack.c,v 1.6.4.2 2023/12/09 13:24:23 martin Exp $ */
2 1.6.4.2 martin
3 1.6.4.2 martin /*-
4 1.6.4.2 martin * Copyright (c) 2023 The NetBSD Foundation, Inc.
5 1.6.4.2 martin * All rights reserved.
6 1.6.4.2 martin *
7 1.6.4.2 martin * Redistribution and use in source and binary forms, with or without
8 1.6.4.2 martin * modification, are permitted provided that the following conditions
9 1.6.4.2 martin * are met:
10 1.6.4.2 martin * 1. Redistributions of source code must retain the above copyright
11 1.6.4.2 martin * notice, this list of conditions and the following disclaimer.
12 1.6.4.2 martin * 2. Redistributions in binary form must reproduce the above copyright
13 1.6.4.2 martin * notice, this list of conditions and the following disclaimer in the
14 1.6.4.2 martin * documentation and/or other materials provided with the distribution.
15 1.6.4.2 martin *
16 1.6.4.2 martin * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17 1.6.4.2 martin * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18 1.6.4.2 martin * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19 1.6.4.2 martin * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20 1.6.4.2 martin * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21 1.6.4.2 martin * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22 1.6.4.2 martin * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23 1.6.4.2 martin * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24 1.6.4.2 martin * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25 1.6.4.2 martin * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26 1.6.4.2 martin * POSSIBILITY OF SUCH DAMAGE.
27 1.6.4.2 martin */
28 1.6.4.2 martin
29 1.6.4.2 martin #define _KMEMUSER /* __MACHINE_STACK_GROWS_UP */
30 1.6.4.2 martin
31 1.6.4.2 martin #include <sys/cdefs.h>
32 1.6.4.2 martin __RCSID("$NetBSD: t_stack.c,v 1.6.4.2 2023/12/09 13:24:23 martin Exp $");
33 1.6.4.2 martin
34 1.6.4.2 martin #include <sys/mman.h>
35 1.6.4.2 martin #include <sys/param.h>
36 1.6.4.2 martin #include <sys/sysctl.h>
37 1.6.4.2 martin #include <sys/types.h>
38 1.6.4.2 martin
39 1.6.4.2 martin #include <uvm/uvm_param.h> /* VM_THREAD_GUARD_SIZE */
40 1.6.4.2 martin
41 1.6.4.2 martin #include <atf-c.h>
42 1.6.4.2 martin #include <pthread.h>
43 1.6.4.2 martin #include <setjmp.h>
44 1.6.4.2 martin #include <signal.h>
45 1.6.4.2 martin #include <string.h>
46 1.6.4.2 martin #include <unistd.h>
47 1.6.4.2 martin
48 1.6.4.2 martin #include "h_macros.h"
49 1.6.4.2 martin
50 1.6.4.2 martin struct jmp_ctx {
51 1.6.4.2 martin jmp_buf buf;
52 1.6.4.2 martin };
53 1.6.4.2 martin
54 1.6.4.2 martin /*
55 1.6.4.2 martin * State used by various tests.
56 1.6.4.2 martin */
57 1.6.4.2 martin struct ctx {
58 1.6.4.2 martin size_t size; /* default stack size */
59 1.6.4.2 martin size_t guardsize; /* default guard size */
60 1.6.4.2 martin void *addr; /* user-allocated stack */
61 1.6.4.2 martin pthread_key_t jmp_key; /* jmp_ctx to return from SIGSEGV handler */
62 1.6.4.2 martin } ctx, *C = &ctx;
63 1.6.4.2 martin
64 1.6.4.2 martin /*
65 1.6.4.2 martin * getdefaultstacksize()
66 1.6.4.2 martin *
67 1.6.4.2 martin * Return the default stack size for threads created with
68 1.6.4.2 martin * pthread_create.
69 1.6.4.2 martin */
70 1.6.4.2 martin static size_t
71 1.6.4.2 martin getdefaultstacksize(void)
72 1.6.4.2 martin {
73 1.6.4.2 martin pthread_attr_t attr;
74 1.6.4.2 martin size_t stacksize;
75 1.6.4.2 martin
76 1.6.4.2 martin /*
77 1.6.4.2 martin * When called from the main thread, this returns the default
78 1.6.4.2 martin * stack size (pthread__stacksize) used for pthreads.
79 1.6.4.2 martin */
80 1.6.4.2 martin RZ(pthread_getattr_np(pthread_self(), &attr));
81 1.6.4.2 martin RZ(pthread_attr_getstacksize(&attr, &stacksize));
82 1.6.4.2 martin RZ(pthread_attr_destroy(&attr));
83 1.6.4.2 martin
84 1.6.4.2 martin /*
85 1.6.4.2 martin * Verify that the assumption above holds.
86 1.6.4.2 martin */
87 1.6.4.2 martin extern size_t pthread__stacksize; /* pthread_int.h */
88 1.6.4.2 martin ATF_CHECK_EQ_MSG(stacksize, pthread__stacksize,
89 1.6.4.2 martin "stacksize=%zu pthread__stacksize=%zu",
90 1.6.4.2 martin stacksize, pthread__stacksize);
91 1.6.4.2 martin
92 1.6.4.2 martin return stacksize;
93 1.6.4.2 martin }
94 1.6.4.2 martin
95 1.6.4.2 martin /*
96 1.6.4.2 martin * getnondefaultstacksize()
97 1.6.4.2 martin *
98 1.6.4.2 martin * Return a stack size that is not the default stack size for
99 1.6.4.2 martin * threads created with pthread_create.
100 1.6.4.2 martin */
101 1.6.4.2 martin static size_t
102 1.6.4.2 martin getnondefaultstacksize(void)
103 1.6.4.2 martin {
104 1.6.4.2 martin
105 1.6.4.2 martin return getdefaultstacksize() + sysconf(_SC_PAGESIZE);
106 1.6.4.2 martin }
107 1.6.4.2 martin
108 1.6.4.2 martin /*
109 1.6.4.2 martin * getdefaultguardsize()
110 1.6.4.2 martin *
111 1.6.4.2 martin * Return the default guard size for threads created with
112 1.6.4.2 martin * pthread_create.
113 1.6.4.2 martin */
114 1.6.4.2 martin static size_t
115 1.6.4.2 martin getdefaultguardsize(void)
116 1.6.4.2 martin {
117 1.6.4.2 martin const int mib[2] = { CTL_VM, VM_THREAD_GUARD_SIZE };
118 1.6.4.2 martin unsigned guardsize;
119 1.6.4.2 martin size_t len = sizeof(guardsize);
120 1.6.4.2 martin
121 1.6.4.2 martin RL(sysctl(mib, __arraycount(mib), &guardsize, &len, NULL, 0));
122 1.6.4.2 martin ATF_REQUIRE_EQ_MSG(len, sizeof(guardsize),
123 1.6.4.2 martin "len=%zu sizeof(guardsize)=%zu", len, sizeof(guardsize));
124 1.6.4.2 martin
125 1.6.4.2 martin /*
126 1.6.4.2 martin * Verify this matches what libpthread determined.
127 1.6.4.2 martin */
128 1.6.4.2 martin extern size_t pthread__guardsize; /* pthread_int.h */
129 1.6.4.2 martin ATF_CHECK_EQ_MSG(guardsize, pthread__guardsize,
130 1.6.4.2 martin "guardsize=%u pthread__guardsize=%zu",
131 1.6.4.2 martin guardsize, pthread__guardsize);
132 1.6.4.2 martin
133 1.6.4.2 martin return guardsize;
134 1.6.4.2 martin }
135 1.6.4.2 martin
136 1.6.4.2 martin /*
137 1.6.4.2 martin * alloc(nbytes)
138 1.6.4.2 martin *
139 1.6.4.2 martin * Allocate an nbytes-long page-aligned read/write region and
140 1.6.4.2 martin * return a pointer to it. Abort the test if allocation fails, so
141 1.6.4.2 martin * if this function returns it succeeds.
142 1.6.4.2 martin */
143 1.6.4.2 martin static void *
144 1.6.4.2 martin alloc(size_t nbytes)
145 1.6.4.2 martin {
146 1.6.4.2 martin void *ptr;
147 1.6.4.2 martin
148 1.6.4.2 martin REQUIRE_LIBC((ptr = mmap(/*hint*/NULL, nbytes,
149 1.6.4.2 martin PROT_READ|PROT_WRITE, MAP_ANON, /*fd*/-1, /*offset*/0)),
150 1.6.4.2 martin MAP_FAILED);
151 1.6.4.2 martin
152 1.6.4.2 martin return ptr;
153 1.6.4.2 martin }
154 1.6.4.2 martin
155 1.6.4.2 martin /*
156 1.6.4.2 martin * init(stacksize)
157 1.6.4.2 martin *
158 1.6.4.2 martin * Initialize state used by various tests with the specified
159 1.6.4.2 martin * stacksize.
160 1.6.4.2 martin *
161 1.6.4.2 martin * Make sure to allocate enough space that even if there shouldn't
162 1.6.4.2 martin * be a stack guard (i.e., it should be empty), adjusting the
163 1.6.4.2 martin * requested bounds by the default stack guard size will leave us
164 1.6.4.2 martin * inside allocated memory.
165 1.6.4.2 martin */
166 1.6.4.2 martin static void
167 1.6.4.2 martin init(size_t stacksize)
168 1.6.4.2 martin {
169 1.6.4.2 martin
170 1.6.4.2 martin C->size = stacksize;
171 1.6.4.2 martin C->guardsize = getdefaultguardsize();
172 1.6.4.2 martin C->addr = alloc(C->size + C->guardsize);
173 1.6.4.2 martin RZ(pthread_key_create(&C->jmp_key, NULL));
174 1.6.4.2 martin }
175 1.6.4.2 martin
176 1.6.4.2 martin /*
177 1.6.4.2 martin * stack_pointer()
178 1.6.4.2 martin *
179 1.6.4.2 martin * Return the stack pointer. This is used to verify whether the
180 1.6.4.2 martin * stack pointer lie within a certain address range.
181 1.6.4.2 martin */
182 1.6.4.2 martin static __noinline void *
183 1.6.4.2 martin stack_pointer(void)
184 1.6.4.2 martin {
185 1.6.4.2 martin return __builtin_frame_address(0);
186 1.6.4.2 martin }
187 1.6.4.2 martin
188 1.6.4.2 martin /*
189 1.6.4.2 martin * sigsegv_ok(signo)
190 1.6.4.2 martin *
191 1.6.4.2 martin * Signal handler for SIGSEGV to return to the jmp ctx, to verify
192 1.6.4.2 martin * that SIGSEGV happened without crashing.
193 1.6.4.2 martin */
194 1.6.4.2 martin static void
195 1.6.4.2 martin sigsegv_ok(int signo)
196 1.6.4.2 martin {
197 1.6.4.2 martin struct jmp_ctx *j = pthread_getspecific(C->jmp_key);
198 1.6.4.2 martin
199 1.6.4.2 martin longjmp(j->buf, 1);
200 1.6.4.2 martin }
201 1.6.4.2 martin
202 1.6.4.2 martin /*
203 1.6.4.2 martin * checksigsegv(p)
204 1.6.4.2 martin *
205 1.6.4.2 martin * Verify that reading *p triggers SIGSEGV. Fails test nonfatally
206 1.6.4.2 martin * if SIGSEGV doesn't happen.
207 1.6.4.2 martin */
208 1.6.4.2 martin static void
209 1.6.4.2 martin checksigsegv(const char *p)
210 1.6.4.2 martin {
211 1.6.4.2 martin struct jmp_ctx j;
212 1.6.4.2 martin struct sigaction act, oact;
213 1.6.4.2 martin volatile struct sigaction oactsave;
214 1.6.4.2 martin volatile char v;
215 1.6.4.2 martin
216 1.6.4.2 martin memset(&act, 0, sizeof(act));
217 1.6.4.2 martin act.sa_handler = &sigsegv_ok;
218 1.6.4.2 martin
219 1.6.4.2 martin if (setjmp(j.buf) == 0) {
220 1.6.4.2 martin pthread_setspecific(C->jmp_key, &j);
221 1.6.4.2 martin RL(sigaction(SIGSEGV, &act, &oact));
222 1.6.4.2 martin oactsave = oact;
223 1.6.4.2 martin v = *p; /* trigger SIGSEGV */
224 1.6.4.2 martin atf_tc_fail_nonfatal("failed to trigger SIGSEGV at %p", p);
225 1.6.4.2 martin } else {
226 1.6.4.2 martin /* return from SIGSEGV handler */
227 1.6.4.2 martin oact = oactsave;
228 1.6.4.2 martin }
229 1.6.4.2 martin RL(sigaction(SIGSEGV, &oact, NULL));
230 1.6.4.2 martin pthread_setspecific(C->jmp_key, NULL);
231 1.6.4.2 martin
232 1.6.4.2 martin (void)v; /* suppress unused variable warnings */
233 1.6.4.2 martin }
234 1.6.4.2 martin
235 1.6.4.2 martin /*
236 1.6.4.2 martin * checknosigsegv(p)
237 1.6.4.2 martin *
238 1.6.4.2 martin * Verify that reading *p does not trigger SIGSEGV. Fails test
239 1.6.4.2 martin * nonfatally if SIGSEGV happens.
240 1.6.4.2 martin */
241 1.6.4.2 martin static void
242 1.6.4.2 martin checknosigsegv(const char *p)
243 1.6.4.2 martin {
244 1.6.4.2 martin struct jmp_ctx j;
245 1.6.4.2 martin struct sigaction act, oact;
246 1.6.4.2 martin volatile struct sigaction oactsave;
247 1.6.4.2 martin volatile char v;
248 1.6.4.2 martin
249 1.6.4.2 martin memset(&act, 0, sizeof(act));
250 1.6.4.2 martin act.sa_handler = &sigsegv_ok;
251 1.6.4.2 martin
252 1.6.4.2 martin if (setjmp(j.buf) == 0) {
253 1.6.4.2 martin pthread_setspecific(C->jmp_key, &j);
254 1.6.4.2 martin RL(sigaction(SIGSEGV, &act, &oact));
255 1.6.4.2 martin oactsave = oact;
256 1.6.4.2 martin v = *p; /* better not trigger SIGSEGV */
257 1.6.4.2 martin } else {
258 1.6.4.2 martin /* return from SIGSEGV handler */
259 1.6.4.2 martin atf_tc_fail_nonfatal("spuriously triggered SIGSEGV at %p", p);
260 1.6.4.2 martin oact = oactsave;
261 1.6.4.2 martin }
262 1.6.4.2 martin RL(sigaction(SIGSEGV, &oact, NULL));
263 1.6.4.2 martin pthread_setspecific(C->jmp_key, NULL);
264 1.6.4.2 martin
265 1.6.4.2 martin (void)v; /* suppress unused variable warnings */
266 1.6.4.2 martin }
267 1.6.4.2 martin
268 1.6.4.2 martin /*
269 1.6.4.2 martin * checkguardaccessthread(cookie)
270 1.6.4.2 martin *
271 1.6.4.2 martin * Thread start routine that verifies it has access to the start
272 1.6.4.2 martin * and end of its stack, according to pthread_attr_getstack, and
273 1.6.4.2 martin * _does not_ have access to the start or end of its stack guard,
274 1.6.4.2 martin * above the stack (in stack growth direction) by
275 1.6.4.2 martin * pthread_attr_getguardsize bytes.
276 1.6.4.2 martin */
277 1.6.4.2 martin static void *
278 1.6.4.2 martin checkguardaccessthread(void *cookie)
279 1.6.4.2 martin {
280 1.6.4.2 martin pthread_t t = pthread_self();
281 1.6.4.2 martin pthread_attr_t attr;
282 1.6.4.2 martin void *addr, *guard;
283 1.6.4.2 martin size_t size, guardsize;
284 1.6.4.2 martin
285 1.6.4.2 martin /*
286 1.6.4.2 martin * Get the the stack and stack guard parameters.
287 1.6.4.2 martin */
288 1.6.4.2 martin RZ(pthread_getattr_np(t, &attr));
289 1.6.4.2 martin RZ(pthread_attr_getstack(&attr, &addr, &size));
290 1.6.4.2 martin RZ(pthread_attr_getguardsize(&attr, &guardsize));
291 1.6.4.2 martin
292 1.6.4.2 martin /*
293 1.6.4.2 martin * Determine where the guard starts in virtual address space
294 1.6.4.2 martin * (not in stack growth direction).
295 1.6.4.2 martin */
296 1.6.4.2 martin #ifdef __MACHINE_STACK_GROWS_UP
297 1.6.4.2 martin guard = (char *)addr + size;
298 1.6.4.2 martin #else
299 1.6.4.2 martin guard = (char *)addr - guardsize;
300 1.6.4.2 martin #endif
301 1.6.4.2 martin
302 1.6.4.2 martin /*
303 1.6.4.2 martin * Verify access to the start and end of the stack itself.
304 1.6.4.2 martin */
305 1.6.4.2 martin checknosigsegv(addr);
306 1.6.4.2 martin checknosigsegv((char *)addr + size - 1);
307 1.6.4.2 martin
308 1.6.4.2 martin /*
309 1.6.4.2 martin * Verify no access to the start or end of the stack guard.
310 1.6.4.2 martin */
311 1.6.4.2 martin checksigsegv(guard);
312 1.6.4.2 martin checksigsegv((char *)guard + guardsize - 1);
313 1.6.4.2 martin
314 1.6.4.2 martin return NULL;
315 1.6.4.2 martin }
316 1.6.4.2 martin
317 1.6.4.2 martin /*
318 1.6.4.2 martin * checkaddraccessthread(cookie)
319 1.6.4.2 martin *
320 1.6.4.2 martin * Thread start routine that verifies its stack is [C->addr,
321 1.6.4.2 martin * C->addr + C->size), according to pthread_attr_getstack and
322 1.6.4.2 martin * pthread_addr_getstacksize, and verifies it has access to that
323 1.6.4.2 martin * whole range.
324 1.6.4.2 martin */
325 1.6.4.2 martin static void *
326 1.6.4.2 martin checkaddraccessthread(void *cookie)
327 1.6.4.2 martin {
328 1.6.4.2 martin pthread_t t = pthread_self();
329 1.6.4.2 martin pthread_attr_t attr;
330 1.6.4.2 martin void *sp;
331 1.6.4.2 martin void *addr;
332 1.6.4.2 martin size_t size, size0;
333 1.6.4.2 martin
334 1.6.4.2 martin /*
335 1.6.4.2 martin * Verify the stack pointer lies somewhere in the allocated
336 1.6.4.2 martin * range.
337 1.6.4.2 martin */
338 1.6.4.2 martin sp = stack_pointer();
339 1.6.4.2 martin ATF_CHECK_MSG(C->addr <= sp, "sp=%p not in [%p,%p + 0x%zu) = [%p,%p)",
340 1.6.4.2 martin sp, C->addr, C->addr, C->size, C->addr, (char *)C->addr + C->size);
341 1.6.4.2 martin ATF_CHECK_MSG(sp <= (void *)((char *)C->addr + C->size),
342 1.6.4.2 martin "sp=%p not in [%p,%p + 0x%zu) = [%p,%p)",
343 1.6.4.2 martin sp, C->addr, C->addr, C->size, C->addr, (char *)C->addr + C->size);
344 1.6.4.2 martin
345 1.6.4.2 martin /*
346 1.6.4.2 martin * Verify, if not that, then the stack pointer at least lies
347 1.6.4.2 martin * within the extra buffer we allocated for slop to address a
348 1.6.4.2 martin * bug NetBSD libpthread used to have of spuriously adding the
349 1.6.4.2 martin * guard size to a user-allocated stack address. This is
350 1.6.4.2 martin * ATF_REQUIRE, not ATF_CHECK, because if this doesn't hold, we
351 1.6.4.2 martin * might be clobbering some other memory like malloc pages,
352 1.6.4.2 martin * causing the whole test to crash with useless diagnostics.
353 1.6.4.2 martin */
354 1.6.4.2 martin ATF_REQUIRE_MSG(sp <= (void *)((char *)C->addr + C->size +
355 1.6.4.2 martin C->guardsize),
356 1.6.4.2 martin "sp=%p not even in buffer [%p,%p + 0x%zu + 0x%zu) = [%p,%p)",
357 1.6.4.2 martin sp, C->addr, C->addr, C->size, C->guardsize,
358 1.6.4.2 martin C->addr, (char *)C->addr + C->size + C->guardsize);
359 1.6.4.2 martin
360 1.6.4.2 martin /*
361 1.6.4.2 martin * Get the stack parameters -- both via pthread_attr_getstack
362 1.6.4.2 martin * and via pthread_attr_getstacksize, to make sure they agree
363 1.6.4.2 martin * -- and verify that they are what we expect from the caller.
364 1.6.4.2 martin */
365 1.6.4.2 martin RZ(pthread_getattr_np(t, &attr));
366 1.6.4.2 martin RZ(pthread_attr_getstack(&attr, &addr, &size));
367 1.6.4.2 martin RZ(pthread_attr_getstacksize(&attr, &size0));
368 1.6.4.2 martin ATF_CHECK_EQ_MSG(C->addr, addr, "expected %p actual %p",
369 1.6.4.2 martin C->addr, addr);
370 1.6.4.2 martin ATF_CHECK_EQ_MSG(C->size, size, "expected %zu actual %zu",
371 1.6.4.2 martin C->size, size);
372 1.6.4.2 martin ATF_CHECK_EQ_MSG(C->size, size0, "expected %zu actual %zu",
373 1.6.4.2 martin C->size, size0);
374 1.6.4.2 martin
375 1.6.4.2 martin /*
376 1.6.4.2 martin * Verify that we have access to what we expect the stack to
377 1.6.4.2 martin * be.
378 1.6.4.2 martin */
379 1.6.4.2 martin checknosigsegv(C->addr);
380 1.6.4.2 martin checknosigsegv((char *)C->addr + C->size - 1);
381 1.6.4.2 martin
382 1.6.4.2 martin return NULL;
383 1.6.4.2 martin }
384 1.6.4.2 martin
385 1.6.4.2 martin ATF_TC(stack1);
386 1.6.4.2 martin ATF_TC_HEAD(stack1, tc)
387 1.6.4.2 martin {
388 1.6.4.2 martin atf_tc_set_md_var(tc, "descr",
389 1.6.4.2 martin "Test allocating and reallocating a thread with a user stack");
390 1.6.4.2 martin }
391 1.6.4.2 martin ATF_TC_BODY(stack1, tc)
392 1.6.4.2 martin {
393 1.6.4.2 martin pthread_attr_t attr;
394 1.6.4.2 martin pthread_t t, t2;
395 1.6.4.2 martin
396 1.6.4.2 martin /*
397 1.6.4.2 martin * Allocate a stack with a non-default size to verify
398 1.6.4.2 martin * libpthread didn't choose the stack size for us.
399 1.6.4.2 martin */
400 1.6.4.2 martin init(getnondefaultstacksize());
401 1.6.4.2 martin
402 1.6.4.2 martin /*
403 1.6.4.2 martin * Create a thread with user-allocated stack of a non-default
404 1.6.4.2 martin * size to verify the stack size and access.
405 1.6.4.2 martin */
406 1.6.4.2 martin RZ(pthread_attr_init(&attr));
407 1.6.4.2 martin RZ(pthread_attr_setstack(&attr, C->addr, C->size));
408 1.6.4.2 martin RZ(pthread_create(&t, &attr, &checkaddraccessthread, C));
409 1.6.4.2 martin RZ(pthread_join(t, NULL));
410 1.6.4.2 martin
411 1.6.4.2 martin /*
412 1.6.4.2 martin * Create another thread with the same parameters, and verify
413 1.6.4.2 martin * that (a) it was recycled, and (b) it works the same way.
414 1.6.4.2 martin */
415 1.6.4.2 martin RZ(pthread_create(&t2, &attr, &checkaddraccessthread, C));
416 1.6.4.2 martin ATF_CHECK_EQ_MSG(t, t2, "t=%p t2=%p", t, t2); /* NetBSD recycles */
417 1.6.4.2 martin RZ(pthread_join(t2, NULL));
418 1.6.4.2 martin }
419 1.6.4.2 martin
420 1.6.4.2 martin ATF_TC(stack2);
421 1.6.4.2 martin ATF_TC_HEAD(stack2, tc)
422 1.6.4.2 martin {
423 1.6.4.2 martin atf_tc_set_md_var(tc, "descr",
424 1.6.4.2 martin "Test reallocating a thread with a newly self-allocated stack");
425 1.6.4.2 martin }
426 1.6.4.2 martin ATF_TC_BODY(stack2, tc)
427 1.6.4.2 martin {
428 1.6.4.2 martin pthread_attr_t attr, attr2;
429 1.6.4.2 martin size_t size, size2;
430 1.6.4.2 martin pthread_t t, t2;
431 1.6.4.2 martin
432 1.6.4.2 martin /*
433 1.6.4.2 martin * Allocate a stack with the default size so that we verify
434 1.6.4.2 martin * when libpthread reuses the thread, it doesn't inadvertently
435 1.6.4.2 martin * reuse the libpthread-allocated stack too and instead
436 1.6.4.2 martin * correctly uses our user-allocated stack.
437 1.6.4.2 martin */
438 1.6.4.2 martin init(getdefaultstacksize());
439 1.6.4.2 martin
440 1.6.4.2 martin /*
441 1.6.4.2 martin * Create a thread with a libpthread-allocated stack that
442 1.6.4.2 martin * verifies
443 1.6.4.2 martin * (a) access to its own stack, and
444 1.6.4.2 martin * (b) no access to its own guard pages;
445 1.6.4.2 martin * then get its attributes and wait for it to complete.
446 1.6.4.2 martin */
447 1.6.4.2 martin RZ(pthread_create(&t, NULL, &checkguardaccessthread, C));
448 1.6.4.2 martin RZ(pthread_getattr_np(t, &attr));
449 1.6.4.2 martin RZ(pthread_join(t, NULL));
450 1.6.4.2 martin
451 1.6.4.2 martin /*
452 1.6.4.2 martin * Create a thread with a user-allocated stack that verifies
453 1.6.4.2 martin * (a) stack addr/size match request, and
454 1.6.4.2 martin * (b) access to the requested stack,
455 1.6.4.2 martin * and confirm that the first thread was recycled -- not part
456 1.6.4.2 martin * of POSIX semantics, but part of NetBSD's implementation;
457 1.6.4.2 martin * this way, we verify that, even though the thread is
458 1.6.4.2 martin * recycled, the thread's stack is set to the user-allocated
459 1.6.4.2 martin * stack and access to it works as expected. Then wait for it
460 1.6.4.2 martin * to complete.
461 1.6.4.2 martin */
462 1.6.4.2 martin RZ(pthread_attr_init(&attr2));
463 1.6.4.2 martin RZ(pthread_attr_setstack(&attr2, C->addr, C->size));
464 1.6.4.2 martin RZ(pthread_create(&t2, &attr2, &checkaddraccessthread, C));
465 1.6.4.2 martin ATF_CHECK_EQ_MSG(t, t2, "t=%p t2=%p", t, t2); /* NetBSD recycles */
466 1.6.4.2 martin RZ(pthread_join(t2, NULL));
467 1.6.4.2 martin
468 1.6.4.2 martin /*
469 1.6.4.2 martin * Verify that the libpthread-allocated stack and
470 1.6.4.2 martin * user-allocated stack had the same size, since we chose the
471 1.6.4.2 martin * default size.
472 1.6.4.2 martin *
473 1.6.4.2 martin * Note: We can't say anything about the guard size, because
474 1.6.4.2 martin * with pthread_attr_setstack, the guard size is ignored, and
475 1.6.4.2 martin * it's not clear from POSIX whether any meaningful guard size
476 1.6.4.2 martin * is stored for retrieval with pthread_attr_getguardsize in
477 1.6.4.2 martin * attributes with pthread_attr_setstack.
478 1.6.4.2 martin */
479 1.6.4.2 martin RZ(pthread_attr_getstacksize(&attr, &size));
480 1.6.4.2 martin RZ(pthread_attr_getstacksize(&attr2, &size2));
481 1.6.4.2 martin ATF_CHECK_EQ_MSG(size, size2, "size=%zu size2=%zu", size, size2);
482 1.6.4.2 martin }
483 1.6.4.2 martin
484 1.6.4.2 martin ATF_TP_ADD_TCS(tp)
485 1.6.4.2 martin {
486 1.6.4.2 martin
487 1.6.4.2 martin ATF_TP_ADD_TC(tp, stack1);
488 1.6.4.2 martin ATF_TP_ADD_TC(tp, stack2);
489 1.6.4.2 martin
490 1.6.4.2 martin return atf_no_error();
491 1.6.4.2 martin }
492