1*20941a42Sriastradh /* $NetBSD: t_stack.c,v 1.6 2023/11/28 02:54:33 riastradh Exp $ */
25b36b4eaSriastradh
35b36b4eaSriastradh /*-
45b36b4eaSriastradh * Copyright (c) 2023 The NetBSD Foundation, Inc.
55b36b4eaSriastradh * All rights reserved.
65b36b4eaSriastradh *
75b36b4eaSriastradh * Redistribution and use in source and binary forms, with or without
85b36b4eaSriastradh * modification, are permitted provided that the following conditions
95b36b4eaSriastradh * are met:
105b36b4eaSriastradh * 1. Redistributions of source code must retain the above copyright
115b36b4eaSriastradh * notice, this list of conditions and the following disclaimer.
125b36b4eaSriastradh * 2. Redistributions in binary form must reproduce the above copyright
135b36b4eaSriastradh * notice, this list of conditions and the following disclaimer in the
145b36b4eaSriastradh * documentation and/or other materials provided with the distribution.
155b36b4eaSriastradh *
165b36b4eaSriastradh * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
175b36b4eaSriastradh * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
185b36b4eaSriastradh * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
195b36b4eaSriastradh * PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
205b36b4eaSriastradh * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
215b36b4eaSriastradh * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
225b36b4eaSriastradh * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
235b36b4eaSriastradh * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
245b36b4eaSriastradh * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
255b36b4eaSriastradh * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
265b36b4eaSriastradh * POSSIBILITY OF SUCH DAMAGE.
275b36b4eaSriastradh */
285b36b4eaSriastradh
295b36b4eaSriastradh #define _KMEMUSER /* __MACHINE_STACK_GROWS_UP */
305b36b4eaSriastradh
315b36b4eaSriastradh #include <sys/cdefs.h>
32*20941a42Sriastradh __RCSID("$NetBSD: t_stack.c,v 1.6 2023/11/28 02:54:33 riastradh Exp $");
335b36b4eaSriastradh
345b36b4eaSriastradh #include <sys/mman.h>
3573a871b2Sriastradh #include <sys/param.h>
3673a871b2Sriastradh #include <sys/sysctl.h>
375b36b4eaSriastradh #include <sys/types.h>
385b36b4eaSriastradh
3973a871b2Sriastradh #include <uvm/uvm_param.h> /* VM_THREAD_GUARD_SIZE */
4073a871b2Sriastradh
415b36b4eaSriastradh #include <atf-c.h>
425b36b4eaSriastradh #include <pthread.h>
435b36b4eaSriastradh #include <setjmp.h>
445b36b4eaSriastradh #include <signal.h>
455b36b4eaSriastradh #include <string.h>
465b36b4eaSriastradh #include <unistd.h>
475b36b4eaSriastradh
485b36b4eaSriastradh #include "h_macros.h"
495b36b4eaSriastradh
505b36b4eaSriastradh struct jmp_ctx {
515b36b4eaSriastradh jmp_buf buf;
525b36b4eaSriastradh };
535b36b4eaSriastradh
545b36b4eaSriastradh /*
555b36b4eaSriastradh * State used by various tests.
565b36b4eaSriastradh */
575b36b4eaSriastradh struct ctx {
585b36b4eaSriastradh size_t size; /* default stack size */
5973a871b2Sriastradh size_t guardsize; /* default guard size */
605b36b4eaSriastradh void *addr; /* user-allocated stack */
615b36b4eaSriastradh pthread_key_t jmp_key; /* jmp_ctx to return from SIGSEGV handler */
625b36b4eaSriastradh } ctx, *C = &ctx;
635b36b4eaSriastradh
645b36b4eaSriastradh /*
655b36b4eaSriastradh * getdefaultstacksize()
665b36b4eaSriastradh *
675b36b4eaSriastradh * Return the default stack size for threads created with
685b36b4eaSriastradh * pthread_create.
695b36b4eaSriastradh */
705b36b4eaSriastradh static size_t
getdefaultstacksize(void)715b36b4eaSriastradh getdefaultstacksize(void)
725b36b4eaSriastradh {
735b36b4eaSriastradh pthread_attr_t attr;
745b36b4eaSriastradh size_t stacksize;
755b36b4eaSriastradh
765b36b4eaSriastradh /*
775b36b4eaSriastradh * When called from the main thread, this returns the default
785b36b4eaSriastradh * stack size (pthread__stacksize) used for pthreads.
795b36b4eaSriastradh */
805b36b4eaSriastradh RZ(pthread_getattr_np(pthread_self(), &attr));
815b36b4eaSriastradh RZ(pthread_attr_getstacksize(&attr, &stacksize));
825b36b4eaSriastradh RZ(pthread_attr_destroy(&attr));
835b36b4eaSriastradh
845b36b4eaSriastradh /*
855b36b4eaSriastradh * Verify that the assumption above holds.
865b36b4eaSriastradh */
875b36b4eaSriastradh extern size_t pthread__stacksize; /* pthread_int.h */
885b36b4eaSriastradh ATF_CHECK_EQ_MSG(stacksize, pthread__stacksize,
895b36b4eaSriastradh "stacksize=%zu pthread__stacksize=%zu",
905b36b4eaSriastradh stacksize, pthread__stacksize);
915b36b4eaSriastradh
925b36b4eaSriastradh return stacksize;
935b36b4eaSriastradh }
945b36b4eaSriastradh
955b36b4eaSriastradh /*
965b36b4eaSriastradh * getnondefaultstacksize()
975b36b4eaSriastradh *
985b36b4eaSriastradh * Return a stack size that is not the default stack size for
995b36b4eaSriastradh * threads created with pthread_create.
1005b36b4eaSriastradh */
1015b36b4eaSriastradh static size_t
getnondefaultstacksize(void)1025b36b4eaSriastradh getnondefaultstacksize(void)
1035b36b4eaSriastradh {
1045b36b4eaSriastradh
1055b36b4eaSriastradh return getdefaultstacksize() + sysconf(_SC_PAGESIZE);
1065b36b4eaSriastradh }
1075b36b4eaSriastradh
1085b36b4eaSriastradh /*
10973a871b2Sriastradh * getdefaultguardsize()
11073a871b2Sriastradh *
11173a871b2Sriastradh * Return the default guard size for threads created with
11273a871b2Sriastradh * pthread_create.
11373a871b2Sriastradh */
11473a871b2Sriastradh static size_t
getdefaultguardsize(void)11573a871b2Sriastradh getdefaultguardsize(void)
11673a871b2Sriastradh {
11773a871b2Sriastradh const int mib[2] = { CTL_VM, VM_THREAD_GUARD_SIZE };
11873a871b2Sriastradh unsigned guardsize;
11973a871b2Sriastradh size_t len = sizeof(guardsize);
12073a871b2Sriastradh
12173a871b2Sriastradh RL(sysctl(mib, __arraycount(mib), &guardsize, &len, NULL, 0));
12273a871b2Sriastradh ATF_REQUIRE_EQ_MSG(len, sizeof(guardsize),
12373a871b2Sriastradh "len=%zu sizeof(guardsize)=%zu", len, sizeof(guardsize));
12473a871b2Sriastradh
12573a871b2Sriastradh /*
12673a871b2Sriastradh * Verify this matches what libpthread determined.
12773a871b2Sriastradh */
12873a871b2Sriastradh extern size_t pthread__guardsize; /* pthread_int.h */
12973a871b2Sriastradh ATF_CHECK_EQ_MSG(guardsize, pthread__guardsize,
130a76ca770Sriastradh "guardsize=%u pthread__guardsize=%zu",
13173a871b2Sriastradh guardsize, pthread__guardsize);
13273a871b2Sriastradh
13373a871b2Sriastradh return guardsize;
13473a871b2Sriastradh }
13573a871b2Sriastradh
13673a871b2Sriastradh /*
1375b36b4eaSriastradh * alloc(nbytes)
1385b36b4eaSriastradh *
1395b36b4eaSriastradh * Allocate an nbytes-long page-aligned read/write region and
1405b36b4eaSriastradh * return a pointer to it. Abort the test if allocation fails, so
1415b36b4eaSriastradh * if this function returns it succeeds.
1425b36b4eaSriastradh */
1435b36b4eaSriastradh static void *
alloc(size_t nbytes)1445b36b4eaSriastradh alloc(size_t nbytes)
1455b36b4eaSriastradh {
1465b36b4eaSriastradh void *ptr;
1475b36b4eaSriastradh
1485b36b4eaSriastradh REQUIRE_LIBC((ptr = mmap(/*hint*/NULL, nbytes,
1495b36b4eaSriastradh PROT_READ|PROT_WRITE, MAP_ANON, /*fd*/-1, /*offset*/0)),
1505b36b4eaSriastradh MAP_FAILED);
1515b36b4eaSriastradh
1525b36b4eaSriastradh return ptr;
1535b36b4eaSriastradh }
1545b36b4eaSriastradh
1555b36b4eaSriastradh /*
1565b36b4eaSriastradh * init(stacksize)
1575b36b4eaSriastradh *
1585b36b4eaSriastradh * Initialize state used by various tests with the specified
1595b36b4eaSriastradh * stacksize.
16073a871b2Sriastradh *
16173a871b2Sriastradh * Make sure to allocate enough space that even if there shouldn't
16273a871b2Sriastradh * be a stack guard (i.e., it should be empty), adjusting the
16373a871b2Sriastradh * requested bounds by the default stack guard size will leave us
16473a871b2Sriastradh * inside allocated memory.
1655b36b4eaSriastradh */
1665b36b4eaSriastradh static void
init(size_t stacksize)1675b36b4eaSriastradh init(size_t stacksize)
1685b36b4eaSriastradh {
1695b36b4eaSriastradh
1705b36b4eaSriastradh C->size = stacksize;
17173a871b2Sriastradh C->guardsize = getdefaultguardsize();
1721ce2050aSriastradh C->addr = alloc(C->size + C->guardsize);
1735b36b4eaSriastradh RZ(pthread_key_create(&C->jmp_key, NULL));
1745b36b4eaSriastradh }
1755b36b4eaSriastradh
1765b36b4eaSriastradh /*
17773a871b2Sriastradh * stack_pointer()
17873a871b2Sriastradh *
17973a871b2Sriastradh * Return the stack pointer. This is used to verify whether the
18073a871b2Sriastradh * stack pointer lie within a certain address range.
18173a871b2Sriastradh */
18273a871b2Sriastradh static __noinline void *
stack_pointer(void)18373a871b2Sriastradh stack_pointer(void)
18473a871b2Sriastradh {
18573a871b2Sriastradh return __builtin_frame_address(0);
18673a871b2Sriastradh }
18773a871b2Sriastradh
18873a871b2Sriastradh /*
1895b36b4eaSriastradh * sigsegv_ok(signo)
1905b36b4eaSriastradh *
1915b36b4eaSriastradh * Signal handler for SIGSEGV to return to the jmp ctx, to verify
1925b36b4eaSriastradh * that SIGSEGV happened without crashing.
1935b36b4eaSriastradh */
1945b36b4eaSriastradh static void
sigsegv_ok(int signo)1955b36b4eaSriastradh sigsegv_ok(int signo)
1965b36b4eaSriastradh {
1975b36b4eaSriastradh struct jmp_ctx *j = pthread_getspecific(C->jmp_key);
1985b36b4eaSriastradh
1995b36b4eaSriastradh longjmp(j->buf, 1);
2005b36b4eaSriastradh }
2015b36b4eaSriastradh
2025b36b4eaSriastradh /*
2035b36b4eaSriastradh * checksigsegv(p)
2045b36b4eaSriastradh *
2055b36b4eaSriastradh * Verify that reading *p triggers SIGSEGV. Fails test nonfatally
2065b36b4eaSriastradh * if SIGSEGV doesn't happen.
2075b36b4eaSriastradh */
2085b36b4eaSriastradh static void
checksigsegv(const char * p)2095b36b4eaSriastradh checksigsegv(const char *p)
2105b36b4eaSriastradh {
2115b36b4eaSriastradh struct jmp_ctx j;
2125b36b4eaSriastradh struct sigaction act, oact;
2135b36b4eaSriastradh volatile struct sigaction oactsave;
2145b36b4eaSriastradh volatile char v;
2155b36b4eaSriastradh
2165b36b4eaSriastradh memset(&act, 0, sizeof(act));
2175b36b4eaSriastradh act.sa_handler = &sigsegv_ok;
2185b36b4eaSriastradh
2195b36b4eaSriastradh if (setjmp(j.buf) == 0) {
2202852ab88Sriastradh pthread_setspecific(C->jmp_key, &j);
2215b36b4eaSriastradh RL(sigaction(SIGSEGV, &act, &oact));
2225b36b4eaSriastradh oactsave = oact;
2235b36b4eaSriastradh v = *p; /* trigger SIGSEGV */
2245b36b4eaSriastradh atf_tc_fail_nonfatal("failed to trigger SIGSEGV at %p", p);
2255b36b4eaSriastradh } else {
2265b36b4eaSriastradh /* return from SIGSEGV handler */
2275b36b4eaSriastradh oact = oactsave;
2285b36b4eaSriastradh }
2295b36b4eaSriastradh RL(sigaction(SIGSEGV, &oact, NULL));
2305b36b4eaSriastradh pthread_setspecific(C->jmp_key, NULL);
2315b36b4eaSriastradh
2325b36b4eaSriastradh (void)v; /* suppress unused variable warnings */
2335b36b4eaSriastradh }
2345b36b4eaSriastradh
2355b36b4eaSriastradh /*
2365b36b4eaSriastradh * checknosigsegv(p)
2375b36b4eaSriastradh *
2385b36b4eaSriastradh * Verify that reading *p does not trigger SIGSEGV. Fails test
2395b36b4eaSriastradh * nonfatally if SIGSEGV happens.
2405b36b4eaSriastradh */
2415b36b4eaSriastradh static void
checknosigsegv(const char * p)2425b36b4eaSriastradh checknosigsegv(const char *p)
2435b36b4eaSriastradh {
2445b36b4eaSriastradh struct jmp_ctx j;
2455b36b4eaSriastradh struct sigaction act, oact;
2465b36b4eaSriastradh volatile struct sigaction oactsave;
2475b36b4eaSriastradh volatile char v;
2485b36b4eaSriastradh
2495b36b4eaSriastradh memset(&act, 0, sizeof(act));
2505b36b4eaSriastradh act.sa_handler = &sigsegv_ok;
2515b36b4eaSriastradh
2525b36b4eaSriastradh if (setjmp(j.buf) == 0) {
2532852ab88Sriastradh pthread_setspecific(C->jmp_key, &j);
2545b36b4eaSriastradh RL(sigaction(SIGSEGV, &act, &oact));
2555b36b4eaSriastradh oactsave = oact;
2565b36b4eaSriastradh v = *p; /* better not trigger SIGSEGV */
2575b36b4eaSriastradh } else {
2585b36b4eaSriastradh /* return from SIGSEGV handler */
2595b36b4eaSriastradh atf_tc_fail_nonfatal("spuriously triggered SIGSEGV at %p", p);
2605b36b4eaSriastradh oact = oactsave;
2615b36b4eaSriastradh }
2625b36b4eaSriastradh RL(sigaction(SIGSEGV, &oact, NULL));
2635b36b4eaSriastradh pthread_setspecific(C->jmp_key, NULL);
2645b36b4eaSriastradh
2655b36b4eaSriastradh (void)v; /* suppress unused variable warnings */
2665b36b4eaSriastradh }
2675b36b4eaSriastradh
2685b36b4eaSriastradh /*
2695b36b4eaSriastradh * checkguardaccessthread(cookie)
2705b36b4eaSriastradh *
2715b36b4eaSriastradh * Thread start routine that verifies it has access to the start
2725b36b4eaSriastradh * and end of its stack, according to pthread_attr_getstack, and
2735b36b4eaSriastradh * _does not_ have access to the start or end of its stack guard,
2745b36b4eaSriastradh * above the stack (in stack growth direction) by
2755b36b4eaSriastradh * pthread_attr_getguardsize bytes.
2765b36b4eaSriastradh */
2775b36b4eaSriastradh static void *
checkguardaccessthread(void * cookie)2785b36b4eaSriastradh checkguardaccessthread(void *cookie)
2795b36b4eaSriastradh {
2805b36b4eaSriastradh pthread_t t = pthread_self();
2815b36b4eaSriastradh pthread_attr_t attr;
2825b36b4eaSriastradh void *addr, *guard;
2835b36b4eaSriastradh size_t size, guardsize;
2845b36b4eaSriastradh
2855b36b4eaSriastradh /*
2865b36b4eaSriastradh * Get the the stack and stack guard parameters.
2875b36b4eaSriastradh */
2885b36b4eaSriastradh RZ(pthread_getattr_np(t, &attr));
2895b36b4eaSriastradh RZ(pthread_attr_getstack(&attr, &addr, &size));
2905b36b4eaSriastradh RZ(pthread_attr_getguardsize(&attr, &guardsize));
2915b36b4eaSriastradh
2925b36b4eaSriastradh /*
2935b36b4eaSriastradh * Determine where the guard starts in virtual address space
2945b36b4eaSriastradh * (not in stack growth direction).
2955b36b4eaSriastradh */
2965b36b4eaSriastradh #ifdef __MACHINE_STACK_GROWS_UP
2975b36b4eaSriastradh guard = (char *)addr + size;
2985b36b4eaSriastradh #else
2995b36b4eaSriastradh guard = (char *)addr - guardsize;
3005b36b4eaSriastradh #endif
3015b36b4eaSriastradh
3025b36b4eaSriastradh /*
3035b36b4eaSriastradh * Verify access to the start and end of the stack itself.
3045b36b4eaSriastradh */
3055b36b4eaSriastradh checknosigsegv(addr);
3065b36b4eaSriastradh checknosigsegv((char *)addr + size - 1);
3075b36b4eaSriastradh
3085b36b4eaSriastradh /*
3095b36b4eaSriastradh * Verify no access to the start or end of the stack guard.
3105b36b4eaSriastradh */
3115b36b4eaSriastradh checksigsegv(guard);
3125b36b4eaSriastradh checksigsegv((char *)guard + guardsize - 1);
3135b36b4eaSriastradh
3145b36b4eaSriastradh return NULL;
3155b36b4eaSriastradh }
3165b36b4eaSriastradh
3175b36b4eaSriastradh /*
3185b36b4eaSriastradh * checkaddraccessthread(cookie)
3195b36b4eaSriastradh *
3205b36b4eaSriastradh * Thread start routine that verifies its stack is [C->addr,
3215b36b4eaSriastradh * C->addr + C->size), according to pthread_attr_getstack and
3225b36b4eaSriastradh * pthread_addr_getstacksize, and verifies it has access to that
3235b36b4eaSriastradh * whole range.
3245b36b4eaSriastradh */
3255b36b4eaSriastradh static void *
checkaddraccessthread(void * cookie)3265b36b4eaSriastradh checkaddraccessthread(void *cookie)
3275b36b4eaSriastradh {
3285b36b4eaSriastradh pthread_t t = pthread_self();
3295b36b4eaSriastradh pthread_attr_t attr;
33073a871b2Sriastradh void *sp;
3315b36b4eaSriastradh void *addr;
3325b36b4eaSriastradh size_t size, size0;
3335b36b4eaSriastradh
3345b36b4eaSriastradh /*
33573a871b2Sriastradh * Verify the stack pointer lies somewhere in the allocated
33673a871b2Sriastradh * range.
33773a871b2Sriastradh */
33873a871b2Sriastradh sp = stack_pointer();
33973a871b2Sriastradh ATF_CHECK_MSG(C->addr <= sp, "sp=%p not in [%p,%p + 0x%zu) = [%p,%p)",
34073a871b2Sriastradh sp, C->addr, C->addr, C->size, C->addr, (char *)C->addr + C->size);
34173a871b2Sriastradh ATF_CHECK_MSG(sp <= (void *)((char *)C->addr + C->size),
34273a871b2Sriastradh "sp=%p not in [%p,%p + 0x%zu) = [%p,%p)",
34373a871b2Sriastradh sp, C->addr, C->addr, C->size, C->addr, (char *)C->addr + C->size);
34473a871b2Sriastradh
34573a871b2Sriastradh /*
34673a871b2Sriastradh * Verify, if not that, then the stack pointer at least lies
34773a871b2Sriastradh * within the extra buffer we allocated for slop to address a
34873a871b2Sriastradh * bug NetBSD libpthread used to have of spuriously adding the
34973a871b2Sriastradh * guard size to a user-allocated stack address. This is
35073a871b2Sriastradh * ATF_REQUIRE, not ATF_CHECK, because if this doesn't hold, we
35173a871b2Sriastradh * might be clobbering some other memory like malloc pages,
35273a871b2Sriastradh * causing the whole test to crash with useless diagnostics.
35373a871b2Sriastradh */
35473a871b2Sriastradh ATF_REQUIRE_MSG(sp <= (void *)((char *)C->addr + C->size +
35573a871b2Sriastradh C->guardsize),
35673a871b2Sriastradh "sp=%p not even in buffer [%p,%p + 0x%zu + 0x%zu) = [%p,%p)",
35773a871b2Sriastradh sp, C->addr, C->addr, C->size, C->guardsize,
35873a871b2Sriastradh C->addr, (char *)C->addr + C->size + C->guardsize);
35973a871b2Sriastradh
36073a871b2Sriastradh /*
3615b36b4eaSriastradh * Get the stack parameters -- both via pthread_attr_getstack
3625b36b4eaSriastradh * and via pthread_attr_getstacksize, to make sure they agree
3635b36b4eaSriastradh * -- and verify that they are what we expect from the caller.
3645b36b4eaSriastradh */
3655b36b4eaSriastradh RZ(pthread_getattr_np(t, &attr));
3665b36b4eaSriastradh RZ(pthread_attr_getstack(&attr, &addr, &size));
3675b36b4eaSriastradh RZ(pthread_attr_getstacksize(&attr, &size0));
3685b36b4eaSriastradh ATF_CHECK_EQ_MSG(C->addr, addr, "expected %p actual %p",
3695b36b4eaSriastradh C->addr, addr);
3705b36b4eaSriastradh ATF_CHECK_EQ_MSG(C->size, size, "expected %zu actual %zu",
3715b36b4eaSriastradh C->size, size);
3725b36b4eaSriastradh ATF_CHECK_EQ_MSG(C->size, size0, "expected %zu actual %zu",
3735b36b4eaSriastradh C->size, size0);
3745b36b4eaSriastradh
3755b36b4eaSriastradh /*
3765b36b4eaSriastradh * Verify that we have access to what we expect the stack to
3775b36b4eaSriastradh * be.
3785b36b4eaSriastradh */
3795b36b4eaSriastradh checknosigsegv(C->addr);
3805b36b4eaSriastradh checknosigsegv((char *)C->addr + C->size - 1);
3815b36b4eaSriastradh
3825b36b4eaSriastradh return NULL;
3835b36b4eaSriastradh }
3845b36b4eaSriastradh
3855b36b4eaSriastradh ATF_TC(stack1);
ATF_TC_HEAD(stack1,tc)3865b36b4eaSriastradh ATF_TC_HEAD(stack1, tc)
3875b36b4eaSriastradh {
3885b36b4eaSriastradh atf_tc_set_md_var(tc, "descr",
3895b36b4eaSriastradh "Test allocating and reallocating a thread with a user stack");
3905b36b4eaSriastradh }
ATF_TC_BODY(stack1,tc)3915b36b4eaSriastradh ATF_TC_BODY(stack1, tc)
3925b36b4eaSriastradh {
3935b36b4eaSriastradh pthread_attr_t attr;
3945b36b4eaSriastradh pthread_t t, t2;
3955b36b4eaSriastradh
3965b36b4eaSriastradh /*
3975b36b4eaSriastradh * Allocate a stack with a non-default size to verify
3985b36b4eaSriastradh * libpthread didn't choose the stack size for us.
3995b36b4eaSriastradh */
4005b36b4eaSriastradh init(getnondefaultstacksize());
4015b36b4eaSriastradh
4025b36b4eaSriastradh /*
4035b36b4eaSriastradh * Create a thread with user-allocated stack of a non-default
4045b36b4eaSriastradh * size to verify the stack size and access.
4055b36b4eaSriastradh */
4065b36b4eaSriastradh RZ(pthread_attr_init(&attr));
4075b36b4eaSriastradh RZ(pthread_attr_setstack(&attr, C->addr, C->size));
4085b36b4eaSriastradh RZ(pthread_create(&t, &attr, &checkaddraccessthread, C));
4095b36b4eaSriastradh RZ(pthread_join(t, NULL));
4105b36b4eaSriastradh
4115b36b4eaSriastradh /*
4125b36b4eaSriastradh * Create another thread with the same parameters, and verify
4135b36b4eaSriastradh * that (a) it was recycled, and (b) it works the same way.
4145b36b4eaSriastradh */
4155b36b4eaSriastradh RZ(pthread_create(&t2, &attr, &checkaddraccessthread, C));
4165b36b4eaSriastradh ATF_CHECK_EQ_MSG(t, t2, "t=%p t2=%p", t, t2); /* NetBSD recycles */
4175b36b4eaSriastradh RZ(pthread_join(t2, NULL));
4185b36b4eaSriastradh }
4195b36b4eaSriastradh
4205b36b4eaSriastradh ATF_TC(stack2);
ATF_TC_HEAD(stack2,tc)4215b36b4eaSriastradh ATF_TC_HEAD(stack2, tc)
4225b36b4eaSriastradh {
4235b36b4eaSriastradh atf_tc_set_md_var(tc, "descr",
4245b36b4eaSriastradh "Test reallocating a thread with a newly self-allocated stack");
4255b36b4eaSriastradh }
ATF_TC_BODY(stack2,tc)4265b36b4eaSriastradh ATF_TC_BODY(stack2, tc)
4275b36b4eaSriastradh {
4285b36b4eaSriastradh pthread_attr_t attr, attr2;
4295b36b4eaSriastradh size_t size, size2;
4305b36b4eaSriastradh pthread_t t, t2;
4315b36b4eaSriastradh
4325b36b4eaSriastradh /*
4335b36b4eaSriastradh * Allocate a stack with the default size so that we verify
4345b36b4eaSriastradh * when libpthread reuses the thread, it doesn't inadvertently
4355b36b4eaSriastradh * reuse the libpthread-allocated stack too and instead
4365b36b4eaSriastradh * correctly uses our user-allocated stack.
4375b36b4eaSriastradh */
4385b36b4eaSriastradh init(getdefaultstacksize());
4395b36b4eaSriastradh
4405b36b4eaSriastradh /*
4415b36b4eaSriastradh * Create a thread with a libpthread-allocated stack that
4425b36b4eaSriastradh * verifies
4435b36b4eaSriastradh * (a) access to its own stack, and
4445b36b4eaSriastradh * (b) no access to its own guard pages;
4455b36b4eaSriastradh * then get its attributes and wait for it to complete.
4465b36b4eaSriastradh */
4475b36b4eaSriastradh RZ(pthread_create(&t, NULL, &checkguardaccessthread, C));
4485b36b4eaSriastradh RZ(pthread_getattr_np(t, &attr));
4495b36b4eaSriastradh RZ(pthread_join(t, NULL));
4505b36b4eaSriastradh
4515b36b4eaSriastradh /*
4525b36b4eaSriastradh * Create a thread with a user-allocated stack that verifies
4535b36b4eaSriastradh * (a) stack addr/size match request, and
4545b36b4eaSriastradh * (b) access to the requested stack,
4555b36b4eaSriastradh * and confirm that the first thread was recycled -- not part
4565b36b4eaSriastradh * of POSIX semantics, but part of NetBSD's implementation;
4575b36b4eaSriastradh * this way, we verify that, even though the thread is
4585b36b4eaSriastradh * recycled, the thread's stack is set to the user-allocated
4595b36b4eaSriastradh * stack and access to it works as expected. Then wait for it
4605b36b4eaSriastradh * to complete.
4615b36b4eaSriastradh */
4625b36b4eaSriastradh RZ(pthread_attr_init(&attr2));
4635b36b4eaSriastradh RZ(pthread_attr_setstack(&attr2, C->addr, C->size));
4645b36b4eaSriastradh RZ(pthread_create(&t2, &attr2, &checkaddraccessthread, C));
4655b36b4eaSriastradh ATF_CHECK_EQ_MSG(t, t2, "t=%p t2=%p", t, t2); /* NetBSD recycles */
4665b36b4eaSriastradh RZ(pthread_join(t2, NULL));
4675b36b4eaSriastradh
4685b36b4eaSriastradh /*
4695b36b4eaSriastradh * Verify that the libpthread-allocated stack and
4705b36b4eaSriastradh * user-allocated stack had the same size, since we chose the
4715b36b4eaSriastradh * default size.
4725b36b4eaSriastradh *
4735b36b4eaSriastradh * Note: We can't say anything about the guard size, because
4745b36b4eaSriastradh * with pthread_attr_setstack, the guard size is ignored, and
4755b36b4eaSriastradh * it's not clear from POSIX whether any meaningful guard size
4765b36b4eaSriastradh * is stored for retrieval with pthread_attr_getguardsize in
4775b36b4eaSriastradh * attributes with pthread_attr_setstack.
4785b36b4eaSriastradh */
4795b36b4eaSriastradh RZ(pthread_attr_getstacksize(&attr, &size));
4805b36b4eaSriastradh RZ(pthread_attr_getstacksize(&attr2, &size2));
4815b36b4eaSriastradh ATF_CHECK_EQ_MSG(size, size2, "size=%zu size2=%zu", size, size2);
4825b36b4eaSriastradh }
4835b36b4eaSriastradh
ATF_TP_ADD_TCS(tp)4845b36b4eaSriastradh ATF_TP_ADD_TCS(tp)
4855b36b4eaSriastradh {
4865b36b4eaSriastradh
4875b36b4eaSriastradh ATF_TP_ADD_TC(tp, stack1);
4885b36b4eaSriastradh ATF_TP_ADD_TC(tp, stack2);
4895b36b4eaSriastradh
4905b36b4eaSriastradh return atf_no_error();
4915b36b4eaSriastradh }
492