xref: /netbsd-src/tests/lib/libpthread/t_stack.c (revision f31867506b3d03104824848de4007d9c967e81b2)
1 /*	$NetBSD: t_stack.c,v 1.6 2023/11/28 02:54:33 riastradh Exp $	*/
2 
3 /*-
4  * Copyright (c) 2023 The NetBSD Foundation, Inc.
5  * All rights reserved.
6  *
7  * Redistribution and use in source and binary forms, with or without
8  * modification, are permitted provided that the following conditions
9  * are met:
10  * 1. Redistributions of source code must retain the above copyright
11  *    notice, this list of conditions and the following disclaimer.
12  * 2. Redistributions in binary form must reproduce the above copyright
13  *    notice, this list of conditions and the following disclaimer in the
14  *    documentation and/or other materials provided with the distribution.
15  *
16  * THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17  * ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18  * TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19  * PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20  * BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21  * CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22  * SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23  * INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24  * CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25  * ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26  * POSSIBILITY OF SUCH DAMAGE.
27  */
28 
29 #define	_KMEMUSER		/* __MACHINE_STACK_GROWS_UP */
30 
31 #include <sys/cdefs.h>
32 __RCSID("$NetBSD: t_stack.c,v 1.6 2023/11/28 02:54:33 riastradh Exp $");
33 
34 #include <sys/mman.h>
35 #include <sys/param.h>
36 #include <sys/sysctl.h>
37 #include <sys/types.h>
38 
39 #include <uvm/uvm_param.h>	/* VM_THREAD_GUARD_SIZE */
40 
41 #include <atf-c.h>
42 #include <pthread.h>
43 #include <setjmp.h>
44 #include <signal.h>
45 #include <string.h>
46 #include <unistd.h>
47 
48 #include "h_macros.h"
49 
50 struct jmp_ctx {
51 	jmp_buf buf;
52 };
53 
54 /*
55  * State used by various tests.
56  */
57 struct ctx {
58 	size_t size;		/* default stack size */
59 	size_t guardsize;	/* default guard size */
60 	void *addr;		/* user-allocated stack */
61 	pthread_key_t jmp_key;	/* jmp_ctx to return from SIGSEGV handler */
62 } ctx, *C = &ctx;
63 
64 /*
65  * getdefaultstacksize()
66  *
67  *	Return the default stack size for threads created with
68  *	pthread_create.
69  */
70 static size_t
71 getdefaultstacksize(void)
72 {
73 	pthread_attr_t attr;
74 	size_t stacksize;
75 
76 	/*
77 	 * When called from the main thread, this returns the default
78 	 * stack size (pthread__stacksize) used for pthreads.
79 	 */
80 	RZ(pthread_getattr_np(pthread_self(), &attr));
81 	RZ(pthread_attr_getstacksize(&attr, &stacksize));
82 	RZ(pthread_attr_destroy(&attr));
83 
84 	/*
85 	 * Verify that the assumption above holds.
86 	 */
87 	extern size_t pthread__stacksize; /* pthread_int.h */
88 	ATF_CHECK_EQ_MSG(stacksize, pthread__stacksize,
89 	    "stacksize=%zu pthread__stacksize=%zu",
90 	    stacksize, pthread__stacksize);
91 
92 	return stacksize;
93 }
94 
95 /*
96  * getnondefaultstacksize()
97  *
98  *	Return a stack size that is not the default stack size for
99  *	threads created with pthread_create.
100  */
101 static size_t
102 getnondefaultstacksize(void)
103 {
104 
105 	return getdefaultstacksize() + sysconf(_SC_PAGESIZE);
106 }
107 
108 /*
109  * getdefaultguardsize()
110  *
111  *	Return the default guard size for threads created with
112  *	pthread_create.
113  */
114 static size_t
115 getdefaultguardsize(void)
116 {
117 	const int mib[2] = { CTL_VM, VM_THREAD_GUARD_SIZE };
118 	unsigned guardsize;
119 	size_t len = sizeof(guardsize);
120 
121 	RL(sysctl(mib, __arraycount(mib), &guardsize, &len, NULL, 0));
122 	ATF_REQUIRE_EQ_MSG(len, sizeof(guardsize),
123 	    "len=%zu sizeof(guardsize)=%zu", len, sizeof(guardsize));
124 
125 	/*
126 	 * Verify this matches what libpthread determined.
127 	 */
128 	extern size_t pthread__guardsize; /* pthread_int.h */
129 	ATF_CHECK_EQ_MSG(guardsize, pthread__guardsize,
130 	    "guardsize=%u pthread__guardsize=%zu",
131 	    guardsize, pthread__guardsize);
132 
133 	return guardsize;
134 }
135 
136 /*
137  * alloc(nbytes)
138  *
139  *	Allocate an nbytes-long page-aligned read/write region and
140  *	return a pointer to it.  Abort the test if allocation fails, so
141  *	if this function returns it succeeds.
142  */
143 static void *
144 alloc(size_t nbytes)
145 {
146 	void *ptr;
147 
148 	REQUIRE_LIBC((ptr = mmap(/*hint*/NULL, nbytes,
149 		    PROT_READ|PROT_WRITE, MAP_ANON, /*fd*/-1, /*offset*/0)),
150 	    MAP_FAILED);
151 
152 	return ptr;
153 }
154 
155 /*
156  * init(stacksize)
157  *
158  *	Initialize state used by various tests with the specified
159  *	stacksize.
160  *
161  *	Make sure to allocate enough space that even if there shouldn't
162  *	be a stack guard (i.e., it should be empty), adjusting the
163  *	requested bounds by the default stack guard size will leave us
164  *	inside allocated memory.
165  */
166 static void
167 init(size_t stacksize)
168 {
169 
170 	C->size = stacksize;
171 	C->guardsize = getdefaultguardsize();
172 	C->addr = alloc(C->size + C->guardsize);
173 	RZ(pthread_key_create(&C->jmp_key, NULL));
174 }
175 
176 /*
177  * stack_pointer()
178  *
179  *	Return the stack pointer.  This is used to verify whether the
180  *	stack pointer lie within a certain address range.
181  */
182 static __noinline void *
183 stack_pointer(void)
184 {
185 	return __builtin_frame_address(0);
186 }
187 
188 /*
189  * sigsegv_ok(signo)
190  *
191  *	Signal handler for SIGSEGV to return to the jmp ctx, to verify
192  *	that SIGSEGV happened without crashing.
193  */
194 static void
195 sigsegv_ok(int signo)
196 {
197 	struct jmp_ctx *j = pthread_getspecific(C->jmp_key);
198 
199 	longjmp(j->buf, 1);
200 }
201 
202 /*
203  * checksigsegv(p)
204  *
205  *	Verify that reading *p triggers SIGSEGV.  Fails test nonfatally
206  *	if SIGSEGV doesn't happen.
207  */
208 static void
209 checksigsegv(const char *p)
210 {
211 	struct jmp_ctx j;
212 	struct sigaction act, oact;
213 	volatile struct sigaction oactsave;
214 	volatile char v;
215 
216 	memset(&act, 0, sizeof(act));
217 	act.sa_handler = &sigsegv_ok;
218 
219 	if (setjmp(j.buf) == 0) {
220 		pthread_setspecific(C->jmp_key, &j);
221 		RL(sigaction(SIGSEGV, &act, &oact));
222 		oactsave = oact;
223 		v = *p;		/* trigger SIGSEGV */
224 		atf_tc_fail_nonfatal("failed to trigger SIGSEGV at %p", p);
225 	} else {
226 		/* return from SIGSEGV handler */
227 		oact = oactsave;
228 	}
229 	RL(sigaction(SIGSEGV, &oact, NULL));
230 	pthread_setspecific(C->jmp_key, NULL);
231 
232 	(void)v;		/* suppress unused variable warnings */
233 }
234 
235 /*
236  * checknosigsegv(p)
237  *
238  *	Verify that reading *p does not trigger SIGSEGV.  Fails test
239  *	nonfatally if SIGSEGV happens.
240  */
241 static void
242 checknosigsegv(const char *p)
243 {
244 	struct jmp_ctx j;
245 	struct sigaction act, oact;
246 	volatile struct sigaction oactsave;
247 	volatile char v;
248 
249 	memset(&act, 0, sizeof(act));
250 	act.sa_handler = &sigsegv_ok;
251 
252 	if (setjmp(j.buf) == 0) {
253 		pthread_setspecific(C->jmp_key, &j);
254 		RL(sigaction(SIGSEGV, &act, &oact));
255 		oactsave = oact;
256 		v = *p;		/* better not trigger SIGSEGV */
257 	} else {
258 		/* return from SIGSEGV handler */
259 		atf_tc_fail_nonfatal("spuriously triggered SIGSEGV at %p", p);
260 		oact = oactsave;
261 	}
262 	RL(sigaction(SIGSEGV, &oact, NULL));
263 	pthread_setspecific(C->jmp_key, NULL);
264 
265 	(void)v;		/* suppress unused variable warnings */
266 }
267 
268 /*
269  * checkguardaccessthread(cookie)
270  *
271  *	Thread start routine that verifies it has access to the start
272  *	and end of its stack, according to pthread_attr_getstack, and
273  *	_does not_ have access to the start or end of its stack guard,
274  *	above the stack (in stack growth direction) by
275  *	pthread_attr_getguardsize bytes.
276  */
277 static void *
278 checkguardaccessthread(void *cookie)
279 {
280 	pthread_t t = pthread_self();
281 	pthread_attr_t attr;
282 	void *addr, *guard;
283 	size_t size, guardsize;
284 
285 	/*
286 	 * Get the the stack and stack guard parameters.
287 	 */
288 	RZ(pthread_getattr_np(t, &attr));
289 	RZ(pthread_attr_getstack(&attr, &addr, &size));
290 	RZ(pthread_attr_getguardsize(&attr, &guardsize));
291 
292 	/*
293 	 * Determine where the guard starts in virtual address space
294 	 * (not in stack growth direction).
295 	 */
296 #ifdef __MACHINE_STACK_GROWS_UP
297 	guard = (char *)addr + size;
298 #else
299 	guard = (char *)addr - guardsize;
300 #endif
301 
302 	/*
303 	 * Verify access to the start and end of the stack itself.
304 	 */
305 	checknosigsegv(addr);
306 	checknosigsegv((char *)addr + size - 1);
307 
308 	/*
309 	 * Verify no access to the start or end of the stack guard.
310 	 */
311 	checksigsegv(guard);
312 	checksigsegv((char *)guard + guardsize - 1);
313 
314 	return NULL;
315 }
316 
317 /*
318  * checkaddraccessthread(cookie)
319  *
320  *	Thread start routine that verifies its stack is [C->addr,
321  *	C->addr + C->size), according to pthread_attr_getstack and
322  *	pthread_addr_getstacksize, and verifies it has access to that
323  *	whole range.
324  */
325 static void *
326 checkaddraccessthread(void *cookie)
327 {
328 	pthread_t t = pthread_self();
329 	pthread_attr_t attr;
330 	void *sp;
331 	void *addr;
332 	size_t size, size0;
333 
334 	/*
335 	 * Verify the stack pointer lies somewhere in the allocated
336 	 * range.
337 	 */
338 	sp = stack_pointer();
339 	ATF_CHECK_MSG(C->addr <= sp, "sp=%p not in [%p,%p + 0x%zu) = [%p,%p)",
340 	    sp, C->addr, C->addr, C->size, C->addr, (char *)C->addr + C->size);
341 	ATF_CHECK_MSG(sp <= (void *)((char *)C->addr + C->size),
342 	    "sp=%p not in [%p,%p + 0x%zu) = [%p,%p)",
343 	    sp, C->addr, C->addr, C->size, C->addr, (char *)C->addr + C->size);
344 
345 	/*
346 	 * Verify, if not that, then the stack pointer at least lies
347 	 * within the extra buffer we allocated for slop to address a
348 	 * bug NetBSD libpthread used to have of spuriously adding the
349 	 * guard size to a user-allocated stack address.  This is
350 	 * ATF_REQUIRE, not ATF_CHECK, because if this doesn't hold, we
351 	 * might be clobbering some other memory like malloc pages,
352 	 * causing the whole test to crash with useless diagnostics.
353 	 */
354 	ATF_REQUIRE_MSG(sp <= (void *)((char *)C->addr + C->size +
355 		C->guardsize),
356 	    "sp=%p not even in buffer [%p,%p + 0x%zu + 0x%zu) = [%p,%p)",
357 	    sp, C->addr, C->addr, C->size, C->guardsize,
358 	    C->addr, (char *)C->addr + C->size + C->guardsize);
359 
360 	/*
361 	 * Get the stack parameters -- both via pthread_attr_getstack
362 	 * and via pthread_attr_getstacksize, to make sure they agree
363 	 * -- and verify that they are what we expect from the caller.
364 	 */
365 	RZ(pthread_getattr_np(t, &attr));
366 	RZ(pthread_attr_getstack(&attr, &addr, &size));
367 	RZ(pthread_attr_getstacksize(&attr, &size0));
368 	ATF_CHECK_EQ_MSG(C->addr, addr, "expected %p actual %p",
369 	    C->addr, addr);
370 	ATF_CHECK_EQ_MSG(C->size, size, "expected %zu actual %zu",
371 	    C->size, size);
372 	ATF_CHECK_EQ_MSG(C->size, size0, "expected %zu actual %zu",
373 	    C->size, size0);
374 
375 	/*
376 	 * Verify that we have access to what we expect the stack to
377 	 * be.
378 	 */
379 	checknosigsegv(C->addr);
380 	checknosigsegv((char *)C->addr + C->size - 1);
381 
382 	return NULL;
383 }
384 
385 ATF_TC(stack1);
386 ATF_TC_HEAD(stack1, tc)
387 {
388 	atf_tc_set_md_var(tc, "descr",
389 	    "Test allocating and reallocating a thread with a user stack");
390 }
391 ATF_TC_BODY(stack1, tc)
392 {
393 	pthread_attr_t attr;
394 	pthread_t t, t2;
395 
396 	/*
397 	 * Allocate a stack with a non-default size to verify
398 	 * libpthread didn't choose the stack size for us.
399 	 */
400 	init(getnondefaultstacksize());
401 
402 	/*
403 	 * Create a thread with user-allocated stack of a non-default
404 	 * size to verify the stack size and access.
405 	 */
406 	RZ(pthread_attr_init(&attr));
407 	RZ(pthread_attr_setstack(&attr, C->addr, C->size));
408 	RZ(pthread_create(&t, &attr, &checkaddraccessthread, C));
409 	RZ(pthread_join(t, NULL));
410 
411 	/*
412 	 * Create another thread with the same parameters, and verify
413 	 * that (a) it was recycled, and (b) it works the same way.
414 	 */
415 	RZ(pthread_create(&t2, &attr, &checkaddraccessthread, C));
416 	ATF_CHECK_EQ_MSG(t, t2, "t=%p t2=%p", t, t2); /* NetBSD recycles */
417 	RZ(pthread_join(t2, NULL));
418 }
419 
420 ATF_TC(stack2);
421 ATF_TC_HEAD(stack2, tc)
422 {
423 	atf_tc_set_md_var(tc, "descr",
424 	    "Test reallocating a thread with a newly self-allocated stack");
425 }
426 ATF_TC_BODY(stack2, tc)
427 {
428 	pthread_attr_t attr, attr2;
429 	size_t size, size2;
430 	pthread_t t, t2;
431 
432 	/*
433 	 * Allocate a stack with the default size so that we verify
434 	 * when libpthread reuses the thread, it doesn't inadvertently
435 	 * reuse the libpthread-allocated stack too and instead
436 	 * correctly uses our user-allocated stack.
437 	 */
438 	init(getdefaultstacksize());
439 
440 	/*
441 	 * Create a thread with a libpthread-allocated stack that
442 	 * verifies
443 	 * (a) access to its own stack, and
444 	 * (b) no access to its own guard pages;
445 	 * then get its attributes and wait for it to complete.
446 	 */
447 	RZ(pthread_create(&t, NULL, &checkguardaccessthread, C));
448 	RZ(pthread_getattr_np(t, &attr));
449 	RZ(pthread_join(t, NULL));
450 
451 	/*
452 	 * Create a thread with a user-allocated stack that verifies
453 	 * (a) stack addr/size match request, and
454 	 * (b) access to the requested stack,
455 	 * and confirm that the first thread was recycled -- not part
456 	 * of POSIX semantics, but part of NetBSD's implementation;
457 	 * this way, we verify that, even though the thread is
458 	 * recycled, the thread's stack is set to the user-allocated
459 	 * stack and access to it works as expected.  Then wait for it
460 	 * to complete.
461 	 */
462 	RZ(pthread_attr_init(&attr2));
463 	RZ(pthread_attr_setstack(&attr2, C->addr, C->size));
464 	RZ(pthread_create(&t2, &attr2, &checkaddraccessthread, C));
465 	ATF_CHECK_EQ_MSG(t, t2, "t=%p t2=%p", t, t2); /* NetBSD recycles */
466 	RZ(pthread_join(t2, NULL));
467 
468 	/*
469 	 * Verify that the libpthread-allocated stack and
470 	 * user-allocated stack had the same size, since we chose the
471 	 * default size.
472 	 *
473 	 * Note: We can't say anything about the guard size, because
474 	 * with pthread_attr_setstack, the guard size is ignored, and
475 	 * it's not clear from POSIX whether any meaningful guard size
476 	 * is stored for retrieval with pthread_attr_getguardsize in
477 	 * attributes with pthread_attr_setstack.
478 	 */
479 	RZ(pthread_attr_getstacksize(&attr, &size));
480 	RZ(pthread_attr_getstacksize(&attr2, &size2));
481 	ATF_CHECK_EQ_MSG(size, size2, "size=%zu size2=%zu", size, size2);
482 }
483 
484 ATF_TP_ADD_TCS(tp)
485 {
486 
487 	ATF_TP_ADD_TC(tp, stack1);
488 	ATF_TP_ADD_TC(tp, stack2);
489 
490 	return atf_no_error();
491 }
492