xref: /netbsd-src/tests/usr.bin/c++/t_tsan_lock_order_inversion.sh (revision 4bb9965c4810ecd9c59e6a3c0d9bfaeb7ab7b45c)
1# Copyright (c) 2018 The NetBSD Foundation, Inc.
2# All rights reserved.
3#
4# This code is derived from software contributed to The NetBSD Foundation
5# by Yang Zheng.
6#
7# Redistribution and use in source and binary forms, with or without
8# modification, are permitted provided that the following conditions
9# are met:
10# 1. Redistributions of source code must retain the above copyright
11#    notice, this list of conditions and the following disclaimer.
12# 2. Redistributions in binary form must reproduce the above copyright
13#    notice, this list of conditions and the following disclaimer in the
14#    documentation and/or other materials provided with the distribution.
15#
16# THIS SOFTWARE IS PROVIDED BY THE NETBSD FOUNDATION, INC. AND CONTRIBUTORS
17# ``AS IS'' AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED
18# TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
19# PURPOSE ARE DISCLAIMED.  IN NO EVENT SHALL THE FOUNDATION OR CONTRIBUTORS
20# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY, OR
21# CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT OF
22# SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR BUSINESS
23# INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN
24# CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
25# ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE
26# POSSIBILITY OF SUCH DAMAGE.
27#
28
29
30tsan_available_archs()
31{
32	atf_set "require.arch" "x86_64"
33}
34
35atf_test_case lock_order_inversion
36lock_order_inversion_head() {
37	atf_set "descr" "Test thread sanitizer for lock order inversion condition"
38	atf_set "require.progs" "c++ paxctl"
39	tsan_available_archs
40}
41
42atf_test_case lock_order_inversion_profile
43lock_order_inversion_profile_head() {
44	atf_set "descr" "Test thread sanitizer for lock order inversion with profiling option"
45	atf_set "require.progs" "c++ paxctl"
46	tsan_available_archs
47}
48atf_test_case lock_order_inversion_pic
49lock_order_inversion_pic_head() {
50	atf_set "descr" "Test thread sanitizer for lock order inversion with position independent code (PIC) flag"
51	atf_set "require.progs" "c++ paxctl"
52	tsan_available_archs
53}
54atf_test_case lock_order_inversion_pie
55lock_order_inversion_pie_head() {
56	atf_set "descr" "Test thread sanitizer for lock order inversion with position independent execution (PIE) flag"
57	atf_set "require.progs" "c++ paxctl"
58	tsan_available_archs
59}
60
61lock_order_inversion_body(){
62	cat > test.cc << EOF
63#include <pthread.h>
64
65pthread_mutex_t l1, l2;
66int main() {
67  pthread_mutex_init(&l1, NULL);
68  pthread_mutex_init(&l2, NULL);
69  pthread_mutex_lock(&l2);
70  pthread_mutex_lock(&l1);
71  pthread_mutex_unlock(&l1);
72  pthread_mutex_unlock(&l2);
73
74  pthread_mutex_lock(&l1);
75  pthread_mutex_lock(&l2);
76  pthread_mutex_unlock(&l2);
77  pthread_mutex_unlock(&l1);
78  return 0;
79}
80EOF
81
82	c++ -fsanitize=thread -o test test.cc
83	paxctl +a test
84	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: lock-order-inversion" ./test
85}
86
87lock_order_inversion_profile_body(){
88	atf_expect_fail "PR toolchain/55760"
89	cat > test.cc << EOF
90#include <pthread.h>
91
92pthread_mutex_t l1, l2;
93int main() {
94  pthread_mutex_init(&l1, NULL);
95  pthread_mutex_init(&l2, NULL);
96  pthread_mutex_lock(&l2);
97  pthread_mutex_lock(&l1);
98  pthread_mutex_unlock(&l1);
99  pthread_mutex_unlock(&l2);
100
101  pthread_mutex_lock(&l1);
102  pthread_mutex_lock(&l2);
103  pthread_mutex_unlock(&l2);
104  pthread_mutex_unlock(&l1);
105  return 0;
106}
107EOF
108
109	c++ -fsanitize=thread -static -o test -pg test.cc
110	paxctl +a test
111	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: lock-order-inversion" ./test
112}
113
114lock_order_inversion_pic_body(){
115	cat > test.cc << EOF
116#include <stdio.h>
117#include <stdlib.h>
118int help(int);
119int main(int argc, char **argv) {return help(argc);}
120EOF
121
122	cat > pic.cc << EOF
123#include <pthread.h>
124
125pthread_mutex_t l1, l2;
126int help(int argc) {
127  pthread_mutex_init(&l1, NULL);
128  pthread_mutex_init(&l2, NULL);
129  pthread_mutex_lock(&l2);
130  pthread_mutex_lock(&l1);
131  pthread_mutex_unlock(&l1);
132  pthread_mutex_unlock(&l2);
133
134  pthread_mutex_lock(&l1);
135  pthread_mutex_lock(&l2);
136  pthread_mutex_unlock(&l2);
137  pthread_mutex_unlock(&l1);
138  return 0;
139}
140EOF
141
142	c++ -fsanitize=thread -fPIC -shared -o libtest.so pic.cc
143	c++ -o test test.cc -fsanitize=thread -L. -ltest
144	paxctl +a test
145
146	export LD_LIBRARY_PATH=.
147	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: lock-order-inversion" ./test
148}
149lock_order_inversion_pie_body(){
150
151	#check whether -pie flag is supported on this architecture
152	if ! c++ -pie -dM -E - < /dev/null 2>/dev/null >/dev/null; then
153		atf_set_skip "c++ -pie not supported on this architecture"
154	fi
155	cat > test.cc << EOF
156#include <pthread.h>
157
158pthread_mutex_t l1, l2;
159int main() {
160  pthread_mutex_init(&l1, NULL);
161  pthread_mutex_init(&l2, NULL);
162  pthread_mutex_lock(&l2);
163  pthread_mutex_lock(&l1);
164  pthread_mutex_unlock(&l1);
165  pthread_mutex_unlock(&l2);
166
167  pthread_mutex_lock(&l1);
168  pthread_mutex_lock(&l2);
169  pthread_mutex_unlock(&l2);
170  pthread_mutex_unlock(&l1);
171  return 0;
172}
173EOF
174
175	c++ -fsanitize=thread -o test -fpie -pie test.cc
176	paxctl +a test
177	atf_check -s ignore -o ignore -e match:"WARNING: ThreadSanitizer: lock-order-inversion" ./test
178}
179
180atf_init_test_cases()
181{
182	atf_add_test_case lock_order_inversion
183	atf_add_test_case lock_order_inversion_profile
184	atf_add_test_case lock_order_inversion_pie
185	atf_add_test_case lock_order_inversion_pic
186}
187