2 * Copyright (C) 2012 The Android Open Source Project
4 * Licensed under the Apache License, Version 2.0 (the "License");
5 * you may not use this file except in compliance with the License.
6 * You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
17 #include <gtest/gtest.h>
27 #include <sys/prctl.h>
28 #include <sys/syscall.h>
36 #include "private/bionic_constants.h"
37 #include "private/bionic_macros.h"
38 #include "private/ScopeGuard.h"
39 #include "BionicDeathTest.h"
40 #include "ScopedSignalHandler.h"
43 TEST(pthread, pthread_key_create) {
45 ASSERT_EQ(0, pthread_key_create(&key, NULL));
46 ASSERT_EQ(0, pthread_key_delete(key));
47 // Can't delete a key that's already been deleted.
48 ASSERT_EQ(EINVAL, pthread_key_delete(key));
51 TEST(pthread, pthread_keys_max) {
52 // POSIX says PTHREAD_KEYS_MAX should be at least _POSIX_THREAD_KEYS_MAX.
53 ASSERT_GE(PTHREAD_KEYS_MAX, _POSIX_THREAD_KEYS_MAX);
56 TEST(pthread, sysconf_SC_THREAD_KEYS_MAX_eq_PTHREAD_KEYS_MAX) {
57 int sysconf_max = sysconf(_SC_THREAD_KEYS_MAX);
58 ASSERT_EQ(sysconf_max, PTHREAD_KEYS_MAX);
61 TEST(pthread, pthread_key_many_distinct) {
62 // As gtest uses pthread keys, we can't allocate exactly PTHREAD_KEYS_MAX
63 // pthread keys, but We should be able to allocate at least this many keys.
64 int nkeys = PTHREAD_KEYS_MAX / 2;
65 std::vector<pthread_key_t> keys;
67 auto scope_guard = make_scope_guard([&keys]{
68 for (const auto& key : keys) {
69 EXPECT_EQ(0, pthread_key_delete(key));
73 for (int i = 0; i < nkeys; ++i) {
75 // If this fails, it's likely that LIBC_PTHREAD_KEY_RESERVED_COUNT is wrong.
76 ASSERT_EQ(0, pthread_key_create(&key, NULL)) << i << " of " << nkeys;
78 ASSERT_EQ(0, pthread_setspecific(key, reinterpret_cast<void*>(i)));
81 for (int i = keys.size() - 1; i >= 0; --i) {
82 ASSERT_EQ(reinterpret_cast<void*>(i), pthread_getspecific(keys.back()));
83 pthread_key_t key = keys.back();
85 ASSERT_EQ(0, pthread_key_delete(key));
89 TEST(pthread, pthread_key_not_exceed_PTHREAD_KEYS_MAX) {
90 std::vector<pthread_key_t> keys;
93 // Pthread keys are used by gtest, so PTHREAD_KEYS_MAX should
94 // be more than we are allowed to allocate now.
95 for (int i = 0; i < PTHREAD_KEYS_MAX; i++) {
97 rv = pthread_key_create(&key, NULL);
106 for (const auto& key : keys) {
107 EXPECT_EQ(0, pthread_key_delete(key));
111 // We should have eventually reached the maximum number of keys and received
113 ASSERT_EQ(EAGAIN, rv);
116 TEST(pthread, pthread_key_delete) {
117 void* expected = reinterpret_cast<void*>(1234);
119 ASSERT_EQ(0, pthread_key_create(&key, NULL));
120 ASSERT_EQ(0, pthread_setspecific(key, expected));
121 ASSERT_EQ(expected, pthread_getspecific(key));
122 ASSERT_EQ(0, pthread_key_delete(key));
123 // After deletion, pthread_getspecific returns NULL.
124 ASSERT_EQ(NULL, pthread_getspecific(key));
125 // And you can't use pthread_setspecific with the deleted key.
126 ASSERT_EQ(EINVAL, pthread_setspecific(key, expected));
129 TEST(pthread, pthread_key_fork) {
130 void* expected = reinterpret_cast<void*>(1234);
132 ASSERT_EQ(0, pthread_key_create(&key, NULL));
133 ASSERT_EQ(0, pthread_setspecific(key, expected));
134 ASSERT_EQ(expected, pthread_getspecific(key));
137 ASSERT_NE(-1, pid) << strerror(errno);
140 // The surviving thread inherits all the forking thread's TLS values...
141 ASSERT_EQ(expected, pthread_getspecific(key));
145 AssertChildExited(pid, 99);
147 ASSERT_EQ(expected, pthread_getspecific(key));
148 ASSERT_EQ(0, pthread_key_delete(key));
151 static void* DirtyKeyFn(void* key) {
152 return pthread_getspecific(*reinterpret_cast<pthread_key_t*>(key));
155 TEST(pthread, pthread_key_dirty) {
157 ASSERT_EQ(0, pthread_key_create(&key, NULL));
159 size_t stack_size = 640 * 1024;
160 void* stack = mmap(NULL, stack_size, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, -1, 0);
161 ASSERT_NE(MAP_FAILED, stack);
162 memset(stack, 0xff, stack_size);
165 ASSERT_EQ(0, pthread_attr_init(&attr));
166 ASSERT_EQ(0, pthread_attr_setstack(&attr, stack, stack_size));
169 ASSERT_EQ(0, pthread_create(&t, &attr, DirtyKeyFn, &key));
172 ASSERT_EQ(0, pthread_join(t, &result));
173 ASSERT_EQ(nullptr, result); // Not ~0!
175 ASSERT_EQ(0, munmap(stack, stack_size));
176 ASSERT_EQ(0, pthread_key_delete(key));
179 TEST(pthread, static_pthread_key_used_before_creation) {
180 #if defined(__BIONIC__)
181 // See http://b/19625804. The bug is about a static/global pthread key being used before creation.
182 // So here tests if the static/global default value 0 can be detected as invalid key.
183 static pthread_key_t key;
184 ASSERT_EQ(nullptr, pthread_getspecific(key));
185 ASSERT_EQ(EINVAL, pthread_setspecific(key, nullptr));
186 ASSERT_EQ(EINVAL, pthread_key_delete(key));
188 GTEST_LOG_(INFO) << "This test tests bionic pthread key implementation detail.\n";
192 static void* IdFn(void* arg) {
196 class SpinFunctionHelper {
198 SpinFunctionHelper() {
199 SpinFunctionHelper::spin_flag_ = true;
201 ~SpinFunctionHelper() {
204 auto GetFunction() -> void* (*)(void*) {
205 return SpinFunctionHelper::SpinFn;
209 SpinFunctionHelper::spin_flag_ = false;
213 static void* SpinFn(void*) {
214 while (spin_flag_) {}
217 static std::atomic<bool> spin_flag_;
220 // It doesn't matter if spin_flag_ is used in several tests,
221 // because it is always set to false after each test. Each thread
222 // loops on spin_flag_ can find it becomes false at some time.
223 std::atomic<bool> SpinFunctionHelper::spin_flag_;
225 static void* JoinFn(void* arg) {
226 return reinterpret_cast<void*>(pthread_join(reinterpret_cast<pthread_t>(arg), NULL));
229 static void AssertDetached(pthread_t t, bool is_detached) {
231 ASSERT_EQ(0, pthread_getattr_np(t, &attr));
233 ASSERT_EQ(0, pthread_attr_getdetachstate(&attr, &detach_state));
234 pthread_attr_destroy(&attr);
235 ASSERT_EQ(is_detached, (detach_state == PTHREAD_CREATE_DETACHED));
238 static void MakeDeadThread(pthread_t& t) {
239 ASSERT_EQ(0, pthread_create(&t, NULL, IdFn, NULL));
240 ASSERT_EQ(0, pthread_join(t, NULL));
243 TEST(pthread, pthread_create) {
244 void* expected_result = reinterpret_cast<void*>(123);
245 // Can we create a thread?
247 ASSERT_EQ(0, pthread_create(&t, NULL, IdFn, expected_result));
248 // If we join, do we get the expected value back?
250 ASSERT_EQ(0, pthread_join(t, &result));
251 ASSERT_EQ(expected_result, result);
254 TEST(pthread, pthread_create_EAGAIN) {
255 pthread_attr_t attributes;
256 ASSERT_EQ(0, pthread_attr_init(&attributes));
257 ASSERT_EQ(0, pthread_attr_setstacksize(&attributes, static_cast<size_t>(-1) & ~(getpagesize() - 1)));
260 ASSERT_EQ(EAGAIN, pthread_create(&t, &attributes, IdFn, NULL));
263 TEST(pthread, pthread_no_join_after_detach) {
264 SpinFunctionHelper spin_helper;
267 ASSERT_EQ(0, pthread_create(&t1, NULL, spin_helper.GetFunction(), NULL));
269 // After a pthread_detach...
270 ASSERT_EQ(0, pthread_detach(t1));
271 AssertDetached(t1, true);
273 // ...pthread_join should fail.
274 ASSERT_EQ(EINVAL, pthread_join(t1, NULL));
277 TEST(pthread, pthread_no_op_detach_after_join) {
278 SpinFunctionHelper spin_helper;
281 ASSERT_EQ(0, pthread_create(&t1, NULL, spin_helper.GetFunction(), NULL));
283 // If thread 2 is already waiting to join thread 1...
285 ASSERT_EQ(0, pthread_create(&t2, NULL, JoinFn, reinterpret_cast<void*>(t1)));
287 sleep(1); // (Give t2 a chance to call pthread_join.)
289 #if defined(__BIONIC__)
290 ASSERT_EQ(EINVAL, pthread_detach(t1));
292 ASSERT_EQ(0, pthread_detach(t1));
294 AssertDetached(t1, false);
296 spin_helper.UnSpin();
298 // ...but t2's join on t1 still goes ahead (which we can tell because our join on t2 finishes).
300 ASSERT_EQ(0, pthread_join(t2, &join_result));
301 ASSERT_EQ(0U, reinterpret_cast<uintptr_t>(join_result));
304 TEST(pthread, pthread_join_self) {
305 ASSERT_EQ(EDEADLK, pthread_join(pthread_self(), NULL));
308 struct TestBug37410 {
309 pthread_t main_thread;
310 pthread_mutex_t mutex;
314 data.main_thread = pthread_self();
315 ASSERT_EQ(0, pthread_mutex_init(&data.mutex, NULL));
316 ASSERT_EQ(0, pthread_mutex_lock(&data.mutex));
319 ASSERT_EQ(0, pthread_create(&t, NULL, TestBug37410::thread_fn, reinterpret_cast<void*>(&data)));
321 // Wait for the thread to be running...
322 ASSERT_EQ(0, pthread_mutex_lock(&data.mutex));
323 ASSERT_EQ(0, pthread_mutex_unlock(&data.mutex));
330 static void* thread_fn(void* arg) {
331 TestBug37410* data = reinterpret_cast<TestBug37410*>(arg);
333 // Let the main thread know we're running.
334 pthread_mutex_unlock(&data->mutex);
336 // And wait for the main thread to exit.
337 pthread_join(data->main_thread, NULL);
343 // Even though this isn't really a death test, we have to say "DeathTest" here so gtest knows to
344 // run this test (which exits normally) in its own process.
346 class pthread_DeathTest : public BionicDeathTest {};
348 TEST_F(pthread_DeathTest, pthread_bug_37410) {
349 // http://code.google.com/p/android/issues/detail?id=37410
350 ASSERT_EXIT(TestBug37410::main(), ::testing::ExitedWithCode(0), "");
353 static void* SignalHandlerFn(void* arg) {
355 sigfillset(&wait_set);
356 return reinterpret_cast<void*>(sigwait(&wait_set, reinterpret_cast<int*>(arg)));
359 TEST(pthread, pthread_sigmask) {
360 // Check that SIGUSR1 isn't blocked.
361 sigset_t original_set;
362 sigemptyset(&original_set);
363 ASSERT_EQ(0, pthread_sigmask(SIG_BLOCK, NULL, &original_set));
364 ASSERT_FALSE(sigismember(&original_set, SIGUSR1));
369 sigaddset(&set, SIGUSR1);
370 ASSERT_EQ(0, pthread_sigmask(SIG_BLOCK, &set, NULL));
372 // Check that SIGUSR1 is blocked.
374 sigemptyset(&final_set);
375 ASSERT_EQ(0, pthread_sigmask(SIG_BLOCK, NULL, &final_set));
376 ASSERT_TRUE(sigismember(&final_set, SIGUSR1));
377 // ...and that sigprocmask agrees with pthread_sigmask.
378 sigemptyset(&final_set);
379 ASSERT_EQ(0, sigprocmask(SIG_BLOCK, NULL, &final_set));
380 ASSERT_TRUE(sigismember(&final_set, SIGUSR1));
382 // Spawn a thread that calls sigwait and tells us what it received.
383 pthread_t signal_thread;
384 int received_signal = -1;
385 ASSERT_EQ(0, pthread_create(&signal_thread, NULL, SignalHandlerFn, &received_signal));
387 // Send that thread SIGUSR1.
388 pthread_kill(signal_thread, SIGUSR1);
392 ASSERT_EQ(0, pthread_join(signal_thread, &join_result));
393 ASSERT_EQ(SIGUSR1, received_signal);
394 ASSERT_EQ(0U, reinterpret_cast<uintptr_t>(join_result));
396 // Restore the original signal mask.
397 ASSERT_EQ(0, pthread_sigmask(SIG_SETMASK, &original_set, NULL));
400 static void test_pthread_setname_np__pthread_getname_np(pthread_t t) {
401 ASSERT_EQ(0, pthread_setname_np(t, "short"));
403 ASSERT_EQ(0, pthread_getname_np(t, name, sizeof(name)));
404 ASSERT_STREQ("short", name);
406 // The limit is 15 characters --- the kernel's buffer is 16, but includes a NUL.
407 ASSERT_EQ(0, pthread_setname_np(t, "123456789012345"));
408 ASSERT_EQ(0, pthread_getname_np(t, name, sizeof(name)));
409 ASSERT_STREQ("123456789012345", name);
411 ASSERT_EQ(ERANGE, pthread_setname_np(t, "1234567890123456"));
413 // The passed-in buffer should be at least 16 bytes.
414 ASSERT_EQ(0, pthread_getname_np(t, name, 16));
415 ASSERT_EQ(ERANGE, pthread_getname_np(t, name, 15));
418 TEST(pthread, pthread_setname_np__pthread_getname_np__self) {
419 test_pthread_setname_np__pthread_getname_np(pthread_self());
422 TEST(pthread, pthread_setname_np__pthread_getname_np__other) {
423 SpinFunctionHelper spin_helper;
426 ASSERT_EQ(0, pthread_create(&t, nullptr, spin_helper.GetFunction(), nullptr));
427 test_pthread_setname_np__pthread_getname_np(t);
428 spin_helper.UnSpin();
429 ASSERT_EQ(0, pthread_join(t, nullptr));
432 // http://b/28051133: a kernel misfeature means that you can't change the
433 // name of another thread if you've set PR_SET_DUMPABLE to 0.
434 TEST(pthread, pthread_setname_np__pthread_getname_np__other_PR_SET_DUMPABLE) {
435 ASSERT_EQ(0, prctl(PR_SET_DUMPABLE, 0)) << strerror(errno);
437 SpinFunctionHelper spin_helper;
440 ASSERT_EQ(0, pthread_create(&t, nullptr, spin_helper.GetFunction(), nullptr));
441 test_pthread_setname_np__pthread_getname_np(t);
442 spin_helper.UnSpin();
443 ASSERT_EQ(0, pthread_join(t, nullptr));
446 TEST_F(pthread_DeathTest, pthread_setname_np__no_such_thread) {
447 pthread_t dead_thread;
448 MakeDeadThread(dead_thread);
450 EXPECT_DEATH(pthread_setname_np(dead_thread, "short 3"), "invalid pthread_t");
453 TEST_F(pthread_DeathTest, pthread_setname_np__null_thread) {
454 pthread_t null_thread = 0;
455 EXPECT_EQ(ENOENT, pthread_setname_np(null_thread, "short 3"));
458 TEST_F(pthread_DeathTest, pthread_getname_np__no_such_thread) {
459 pthread_t dead_thread;
460 MakeDeadThread(dead_thread);
463 EXPECT_DEATH(pthread_getname_np(dead_thread, name, sizeof(name)), "invalid pthread_t");
466 TEST_F(pthread_DeathTest, pthread_getname_np__null_thread) {
467 pthread_t null_thread = 0;
470 EXPECT_EQ(ENOENT, pthread_getname_np(null_thread, name, sizeof(name)));
473 TEST(pthread, pthread_kill__0) {
474 // Signal 0 just tests that the thread exists, so it's safe to call on ourselves.
475 ASSERT_EQ(0, pthread_kill(pthread_self(), 0));
478 TEST(pthread, pthread_kill__invalid_signal) {
479 ASSERT_EQ(EINVAL, pthread_kill(pthread_self(), -1));
482 static void pthread_kill__in_signal_handler_helper(int signal_number) {
483 static int count = 0;
484 ASSERT_EQ(SIGALRM, signal_number);
486 // Can we call pthread_kill from a signal handler?
487 ASSERT_EQ(0, pthread_kill(pthread_self(), SIGALRM));
491 TEST(pthread, pthread_kill__in_signal_handler) {
492 ScopedSignalHandler ssh(SIGALRM, pthread_kill__in_signal_handler_helper);
493 ASSERT_EQ(0, pthread_kill(pthread_self(), SIGALRM));
496 TEST_F(pthread_DeathTest, pthread_detach__no_such_thread) {
497 pthread_t dead_thread;
498 MakeDeadThread(dead_thread);
500 EXPECT_DEATH(pthread_detach(dead_thread), "invalid pthread_t");
503 TEST_F(pthread_DeathTest, pthread_detach__null_thread) {
504 pthread_t null_thread = 0;
505 EXPECT_EQ(ESRCH, pthread_detach(null_thread));
508 TEST(pthread, pthread_getcpuclockid__clock_gettime) {
509 SpinFunctionHelper spin_helper;
512 ASSERT_EQ(0, pthread_create(&t, NULL, spin_helper.GetFunction(), NULL));
515 ASSERT_EQ(0, pthread_getcpuclockid(t, &c));
517 ASSERT_EQ(0, clock_gettime(c, &ts));
518 spin_helper.UnSpin();
519 ASSERT_EQ(0, pthread_join(t, nullptr));
522 TEST_F(pthread_DeathTest, pthread_getcpuclockid__no_such_thread) {
523 pthread_t dead_thread;
524 MakeDeadThread(dead_thread);
527 EXPECT_DEATH(pthread_getcpuclockid(dead_thread, &c), "invalid pthread_t");
530 TEST_F(pthread_DeathTest, pthread_getcpuclockid__null_thread) {
531 pthread_t null_thread = 0;
533 EXPECT_EQ(ESRCH, pthread_getcpuclockid(null_thread, &c));
536 TEST_F(pthread_DeathTest, pthread_getschedparam__no_such_thread) {
537 pthread_t dead_thread;
538 MakeDeadThread(dead_thread);
542 EXPECT_DEATH(pthread_getschedparam(dead_thread, &policy, ¶m), "invalid pthread_t");
545 TEST_F(pthread_DeathTest, pthread_getschedparam__null_thread) {
546 pthread_t null_thread = 0;
549 EXPECT_EQ(ESRCH, pthread_getschedparam(null_thread, &policy, ¶m));
552 TEST_F(pthread_DeathTest, pthread_setschedparam__no_such_thread) {
553 pthread_t dead_thread;
554 MakeDeadThread(dead_thread);
558 EXPECT_DEATH(pthread_setschedparam(dead_thread, policy, ¶m), "invalid pthread_t");
561 TEST_F(pthread_DeathTest, pthread_setschedparam__null_thread) {
562 pthread_t null_thread = 0;
565 EXPECT_EQ(ESRCH, pthread_setschedparam(null_thread, policy, ¶m));
568 TEST_F(pthread_DeathTest, pthread_join__no_such_thread) {
569 pthread_t dead_thread;
570 MakeDeadThread(dead_thread);
572 EXPECT_DEATH(pthread_join(dead_thread, NULL), "invalid pthread_t");
575 TEST_F(pthread_DeathTest, pthread_join__null_thread) {
576 pthread_t null_thread = 0;
577 EXPECT_EQ(ESRCH, pthread_join(null_thread, NULL));
580 TEST_F(pthread_DeathTest, pthread_kill__no_such_thread) {
581 pthread_t dead_thread;
582 MakeDeadThread(dead_thread);
584 EXPECT_DEATH(pthread_kill(dead_thread, 0), "invalid pthread_t");
587 TEST_F(pthread_DeathTest, pthread_kill__null_thread) {
588 pthread_t null_thread = 0;
589 EXPECT_EQ(ESRCH, pthread_kill(null_thread, 0));
592 TEST(pthread, pthread_join__multijoin) {
593 SpinFunctionHelper spin_helper;
596 ASSERT_EQ(0, pthread_create(&t1, NULL, spin_helper.GetFunction(), NULL));
599 ASSERT_EQ(0, pthread_create(&t2, NULL, JoinFn, reinterpret_cast<void*>(t1)));
601 sleep(1); // (Give t2 a chance to call pthread_join.)
603 // Multiple joins to the same thread should fail.
604 ASSERT_EQ(EINVAL, pthread_join(t1, NULL));
606 spin_helper.UnSpin();
608 // ...but t2's join on t1 still goes ahead (which we can tell because our join on t2 finishes).
610 ASSERT_EQ(0, pthread_join(t2, &join_result));
611 ASSERT_EQ(0U, reinterpret_cast<uintptr_t>(join_result));
614 TEST(pthread, pthread_join__race) {
615 // http://b/11693195 --- pthread_join could return before the thread had actually exited.
616 // If the joiner unmapped the thread's stack, that could lead to SIGSEGV in the thread.
617 for (size_t i = 0; i < 1024; ++i) {
618 size_t stack_size = 640*1024;
619 void* stack = mmap(NULL, stack_size, PROT_READ|PROT_WRITE, MAP_ANON|MAP_PRIVATE, -1, 0);
622 pthread_attr_init(&a);
623 pthread_attr_setstack(&a, stack, stack_size);
626 ASSERT_EQ(0, pthread_create(&t, &a, IdFn, NULL));
627 ASSERT_EQ(0, pthread_join(t, NULL));
628 ASSERT_EQ(0, munmap(stack, stack_size));
632 static void* GetActualGuardSizeFn(void* arg) {
633 pthread_attr_t attributes;
634 pthread_getattr_np(pthread_self(), &attributes);
635 pthread_attr_getguardsize(&attributes, reinterpret_cast<size_t*>(arg));
639 static size_t GetActualGuardSize(const pthread_attr_t& attributes) {
642 pthread_create(&t, &attributes, GetActualGuardSizeFn, &result);
643 pthread_join(t, NULL);
647 static void* GetActualStackSizeFn(void* arg) {
648 pthread_attr_t attributes;
649 pthread_getattr_np(pthread_self(), &attributes);
650 pthread_attr_getstacksize(&attributes, reinterpret_cast<size_t*>(arg));
654 static size_t GetActualStackSize(const pthread_attr_t& attributes) {
657 pthread_create(&t, &attributes, GetActualStackSizeFn, &result);
658 pthread_join(t, NULL);
662 TEST(pthread, pthread_attr_setguardsize) {
663 pthread_attr_t attributes;
664 ASSERT_EQ(0, pthread_attr_init(&attributes));
666 // Get the default guard size.
667 size_t default_guard_size;
668 ASSERT_EQ(0, pthread_attr_getguardsize(&attributes, &default_guard_size));
670 // No such thing as too small: will be rounded up to one page by pthread_create.
671 ASSERT_EQ(0, pthread_attr_setguardsize(&attributes, 128));
673 ASSERT_EQ(0, pthread_attr_getguardsize(&attributes, &guard_size));
674 ASSERT_EQ(128U, guard_size);
675 ASSERT_EQ(4096U, GetActualGuardSize(attributes));
677 // Large enough and a multiple of the page size.
678 ASSERT_EQ(0, pthread_attr_setguardsize(&attributes, 32*1024));
679 ASSERT_EQ(0, pthread_attr_getguardsize(&attributes, &guard_size));
680 ASSERT_EQ(32*1024U, guard_size);
682 // Large enough but not a multiple of the page size; will be rounded up by pthread_create.
683 ASSERT_EQ(0, pthread_attr_setguardsize(&attributes, 32*1024 + 1));
684 ASSERT_EQ(0, pthread_attr_getguardsize(&attributes, &guard_size));
685 ASSERT_EQ(32*1024U + 1, guard_size);
688 TEST(pthread, pthread_attr_setstacksize) {
689 pthread_attr_t attributes;
690 ASSERT_EQ(0, pthread_attr_init(&attributes));
692 // Get the default stack size.
693 size_t default_stack_size;
694 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &default_stack_size));
697 ASSERT_EQ(EINVAL, pthread_attr_setstacksize(&attributes, 128));
699 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size));
700 ASSERT_EQ(default_stack_size, stack_size);
701 ASSERT_GE(GetActualStackSize(attributes), default_stack_size);
703 // Large enough and a multiple of the page size; may be rounded up by pthread_create.
704 ASSERT_EQ(0, pthread_attr_setstacksize(&attributes, 32*1024));
705 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size));
706 ASSERT_EQ(32*1024U, stack_size);
707 ASSERT_GE(GetActualStackSize(attributes), 32*1024U);
709 // Large enough but not aligned; will be rounded up by pthread_create.
710 ASSERT_EQ(0, pthread_attr_setstacksize(&attributes, 32*1024 + 1));
711 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size));
712 ASSERT_EQ(32*1024U + 1, stack_size);
713 #if defined(__BIONIC__)
714 ASSERT_GT(GetActualStackSize(attributes), 32*1024U + 1);
716 // glibc rounds down, in violation of POSIX. They document this in their BUGS section.
717 ASSERT_EQ(GetActualStackSize(attributes), 32*1024U);
721 TEST(pthread, pthread_rwlockattr_smoke) {
722 pthread_rwlockattr_t attr;
723 ASSERT_EQ(0, pthread_rwlockattr_init(&attr));
725 int pshared_value_array[] = {PTHREAD_PROCESS_PRIVATE, PTHREAD_PROCESS_SHARED};
726 for (size_t i = 0; i < sizeof(pshared_value_array) / sizeof(pshared_value_array[0]); ++i) {
727 ASSERT_EQ(0, pthread_rwlockattr_setpshared(&attr, pshared_value_array[i]));
729 ASSERT_EQ(0, pthread_rwlockattr_getpshared(&attr, &pshared));
730 ASSERT_EQ(pshared_value_array[i], pshared);
733 int kind_array[] = {PTHREAD_RWLOCK_PREFER_READER_NP,
734 PTHREAD_RWLOCK_PREFER_WRITER_NONRECURSIVE_NP};
735 for (size_t i = 0; i < sizeof(kind_array) / sizeof(kind_array[0]); ++i) {
736 ASSERT_EQ(0, pthread_rwlockattr_setkind_np(&attr, kind_array[i]));
738 ASSERT_EQ(0, pthread_rwlockattr_getkind_np(&attr, &kind));
739 ASSERT_EQ(kind_array[i], kind);
742 ASSERT_EQ(0, pthread_rwlockattr_destroy(&attr));
745 TEST(pthread, pthread_rwlock_init_same_as_PTHREAD_RWLOCK_INITIALIZER) {
746 pthread_rwlock_t lock1 = PTHREAD_RWLOCK_INITIALIZER;
747 pthread_rwlock_t lock2;
748 ASSERT_EQ(0, pthread_rwlock_init(&lock2, NULL));
749 ASSERT_EQ(0, memcmp(&lock1, &lock2, sizeof(lock1)));
752 TEST(pthread, pthread_rwlock_smoke) {
754 ASSERT_EQ(0, pthread_rwlock_init(&l, NULL));
757 ASSERT_EQ(0, pthread_rwlock_rdlock(&l));
758 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
760 // Multiple read lock
761 ASSERT_EQ(0, pthread_rwlock_rdlock(&l));
762 ASSERT_EQ(0, pthread_rwlock_rdlock(&l));
763 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
764 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
767 ASSERT_EQ(0, pthread_rwlock_wrlock(&l));
768 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
771 ASSERT_EQ(0, pthread_rwlock_trywrlock(&l));
772 ASSERT_EQ(EBUSY, pthread_rwlock_trywrlock(&l));
773 ASSERT_EQ(EBUSY, pthread_rwlock_tryrdlock(&l));
774 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
777 ASSERT_EQ(0, pthread_rwlock_tryrdlock(&l));
778 ASSERT_EQ(0, pthread_rwlock_tryrdlock(&l));
779 ASSERT_EQ(EBUSY, pthread_rwlock_trywrlock(&l));
780 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
781 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
783 // Try writer lock after unlock
784 ASSERT_EQ(0, pthread_rwlock_wrlock(&l));
785 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
787 // EDEADLK in "read after write"
788 ASSERT_EQ(0, pthread_rwlock_wrlock(&l));
789 ASSERT_EQ(EDEADLK, pthread_rwlock_rdlock(&l));
790 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
792 // EDEADLK in "write after write"
793 ASSERT_EQ(0, pthread_rwlock_wrlock(&l));
794 ASSERT_EQ(EDEADLK, pthread_rwlock_wrlock(&l));
795 ASSERT_EQ(0, pthread_rwlock_unlock(&l));
797 ASSERT_EQ(0, pthread_rwlock_destroy(&l));
800 struct RwlockWakeupHelperArg {
801 pthread_rwlock_t lock;
809 std::atomic<Progress> progress;
810 std::atomic<pid_t> tid;
811 std::function<int (pthread_rwlock_t*)> trylock_function;
812 std::function<int (pthread_rwlock_t*)> lock_function;
813 std::function<int (pthread_rwlock_t*, const timespec*)> timed_lock_function;
816 static void pthread_rwlock_wakeup_helper(RwlockWakeupHelperArg* arg) {
818 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_INITIALIZED, arg->progress);
819 arg->progress = RwlockWakeupHelperArg::LOCK_WAITING;
821 ASSERT_EQ(EBUSY, arg->trylock_function(&arg->lock));
822 ASSERT_EQ(0, arg->lock_function(&arg->lock));
823 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_RELEASED, arg->progress);
824 ASSERT_EQ(0, pthread_rwlock_unlock(&arg->lock));
826 arg->progress = RwlockWakeupHelperArg::LOCK_ACCESSED;
829 static void test_pthread_rwlock_reader_wakeup_writer(std::function<int (pthread_rwlock_t*)> lock_function) {
830 RwlockWakeupHelperArg wakeup_arg;
831 ASSERT_EQ(0, pthread_rwlock_init(&wakeup_arg.lock, NULL));
832 ASSERT_EQ(0, pthread_rwlock_rdlock(&wakeup_arg.lock));
833 wakeup_arg.progress = RwlockWakeupHelperArg::LOCK_INITIALIZED;
835 wakeup_arg.trylock_function = pthread_rwlock_trywrlock;
836 wakeup_arg.lock_function = lock_function;
839 ASSERT_EQ(0, pthread_create(&thread, NULL,
840 reinterpret_cast<void* (*)(void*)>(pthread_rwlock_wakeup_helper), &wakeup_arg));
841 WaitUntilThreadSleep(wakeup_arg.tid);
842 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_WAITING, wakeup_arg.progress);
844 wakeup_arg.progress = RwlockWakeupHelperArg::LOCK_RELEASED;
845 ASSERT_EQ(0, pthread_rwlock_unlock(&wakeup_arg.lock));
847 ASSERT_EQ(0, pthread_join(thread, NULL));
848 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_ACCESSED, wakeup_arg.progress);
849 ASSERT_EQ(0, pthread_rwlock_destroy(&wakeup_arg.lock));
852 TEST(pthread, pthread_rwlock_reader_wakeup_writer) {
853 test_pthread_rwlock_reader_wakeup_writer(pthread_rwlock_wrlock);
856 TEST(pthread, pthread_rwlock_reader_wakeup_writer_timedwait) {
858 ASSERT_EQ(0, clock_gettime(CLOCK_REALTIME, &ts));
860 test_pthread_rwlock_reader_wakeup_writer([&](pthread_rwlock_t* lock) {
861 return pthread_rwlock_timedwrlock(lock, &ts);
865 static void test_pthread_rwlock_writer_wakeup_reader(std::function<int (pthread_rwlock_t*)> lock_function) {
866 RwlockWakeupHelperArg wakeup_arg;
867 ASSERT_EQ(0, pthread_rwlock_init(&wakeup_arg.lock, NULL));
868 ASSERT_EQ(0, pthread_rwlock_wrlock(&wakeup_arg.lock));
869 wakeup_arg.progress = RwlockWakeupHelperArg::LOCK_INITIALIZED;
871 wakeup_arg.trylock_function = pthread_rwlock_tryrdlock;
872 wakeup_arg.lock_function = lock_function;
875 ASSERT_EQ(0, pthread_create(&thread, NULL,
876 reinterpret_cast<void* (*)(void*)>(pthread_rwlock_wakeup_helper), &wakeup_arg));
877 WaitUntilThreadSleep(wakeup_arg.tid);
878 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_WAITING, wakeup_arg.progress);
880 wakeup_arg.progress = RwlockWakeupHelperArg::LOCK_RELEASED;
881 ASSERT_EQ(0, pthread_rwlock_unlock(&wakeup_arg.lock));
883 ASSERT_EQ(0, pthread_join(thread, NULL));
884 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_ACCESSED, wakeup_arg.progress);
885 ASSERT_EQ(0, pthread_rwlock_destroy(&wakeup_arg.lock));
888 TEST(pthread, pthread_rwlock_writer_wakeup_reader) {
889 test_pthread_rwlock_writer_wakeup_reader(pthread_rwlock_rdlock);
892 TEST(pthread, pthread_rwlock_writer_wakeup_reader_timedwait) {
894 ASSERT_EQ(0, clock_gettime(CLOCK_REALTIME, &ts));
896 test_pthread_rwlock_writer_wakeup_reader([&](pthread_rwlock_t* lock) {
897 return pthread_rwlock_timedrdlock(lock, &ts);
901 static void pthread_rwlock_wakeup_timeout_helper(RwlockWakeupHelperArg* arg) {
903 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_INITIALIZED, arg->progress);
904 arg->progress = RwlockWakeupHelperArg::LOCK_WAITING;
906 ASSERT_EQ(EBUSY, arg->trylock_function(&arg->lock));
909 ASSERT_EQ(0, clock_gettime(CLOCK_REALTIME, &ts));
910 ASSERT_EQ(ETIMEDOUT, arg->timed_lock_function(&arg->lock, &ts));
912 ASSERT_EQ(EINVAL, arg->timed_lock_function(&arg->lock, &ts));
913 ts.tv_nsec = NS_PER_S;
914 ASSERT_EQ(EINVAL, arg->timed_lock_function(&arg->lock, &ts));
915 ts.tv_nsec = NS_PER_S - 1;
917 ASSERT_EQ(ETIMEDOUT, arg->timed_lock_function(&arg->lock, &ts));
918 ASSERT_EQ(0, clock_gettime(CLOCK_REALTIME, &ts));
920 ASSERT_EQ(ETIMEDOUT, arg->timed_lock_function(&arg->lock, &ts));
921 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_WAITING, arg->progress);
922 arg->progress = RwlockWakeupHelperArg::LOCK_TIMEDOUT;
925 TEST(pthread, pthread_rwlock_timedrdlock_timeout) {
926 RwlockWakeupHelperArg wakeup_arg;
927 ASSERT_EQ(0, pthread_rwlock_init(&wakeup_arg.lock, nullptr));
928 ASSERT_EQ(0, pthread_rwlock_wrlock(&wakeup_arg.lock));
929 wakeup_arg.progress = RwlockWakeupHelperArg::LOCK_INITIALIZED;
931 wakeup_arg.trylock_function = pthread_rwlock_tryrdlock;
932 wakeup_arg.timed_lock_function = pthread_rwlock_timedrdlock;
935 ASSERT_EQ(0, pthread_create(&thread, nullptr,
936 reinterpret_cast<void* (*)(void*)>(pthread_rwlock_wakeup_timeout_helper), &wakeup_arg));
937 WaitUntilThreadSleep(wakeup_arg.tid);
938 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_WAITING, wakeup_arg.progress);
940 ASSERT_EQ(0, pthread_join(thread, nullptr));
941 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_TIMEDOUT, wakeup_arg.progress);
942 ASSERT_EQ(0, pthread_rwlock_unlock(&wakeup_arg.lock));
943 ASSERT_EQ(0, pthread_rwlock_destroy(&wakeup_arg.lock));
946 TEST(pthread, pthread_rwlock_timedwrlock_timeout) {
947 RwlockWakeupHelperArg wakeup_arg;
948 ASSERT_EQ(0, pthread_rwlock_init(&wakeup_arg.lock, nullptr));
949 ASSERT_EQ(0, pthread_rwlock_rdlock(&wakeup_arg.lock));
950 wakeup_arg.progress = RwlockWakeupHelperArg::LOCK_INITIALIZED;
952 wakeup_arg.trylock_function = pthread_rwlock_trywrlock;
953 wakeup_arg.timed_lock_function = pthread_rwlock_timedwrlock;
956 ASSERT_EQ(0, pthread_create(&thread, nullptr,
957 reinterpret_cast<void* (*)(void*)>(pthread_rwlock_wakeup_timeout_helper), &wakeup_arg));
958 WaitUntilThreadSleep(wakeup_arg.tid);
959 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_WAITING, wakeup_arg.progress);
961 ASSERT_EQ(0, pthread_join(thread, nullptr));
962 ASSERT_EQ(RwlockWakeupHelperArg::LOCK_TIMEDOUT, wakeup_arg.progress);
963 ASSERT_EQ(0, pthread_rwlock_unlock(&wakeup_arg.lock));
964 ASSERT_EQ(0, pthread_rwlock_destroy(&wakeup_arg.lock));
967 class RwlockKindTestHelper {
970 RwlockKindTestHelper* helper;
971 std::atomic<pid_t>& tid;
973 ThreadArg(RwlockKindTestHelper* helper, std::atomic<pid_t>& tid)
974 : helper(helper), tid(tid) { }
978 pthread_rwlock_t lock;
981 explicit RwlockKindTestHelper(int kind_type) {
982 InitRwlock(kind_type);
985 ~RwlockKindTestHelper() {
989 void CreateWriterThread(pthread_t& thread, std::atomic<pid_t>& tid) {
991 ThreadArg* arg = new ThreadArg(this, tid);
992 ASSERT_EQ(0, pthread_create(&thread, NULL,
993 reinterpret_cast<void* (*)(void*)>(WriterThreadFn), arg));
996 void CreateReaderThread(pthread_t& thread, std::atomic<pid_t>& tid) {
998 ThreadArg* arg = new ThreadArg(this, tid);
999 ASSERT_EQ(0, pthread_create(&thread, NULL,
1000 reinterpret_cast<void* (*)(void*)>(ReaderThreadFn), arg));
1004 void InitRwlock(int kind_type) {
1005 pthread_rwlockattr_t attr;
1006 ASSERT_EQ(0, pthread_rwlockattr_init(&attr));
1007 ASSERT_EQ(0, pthread_rwlockattr_setkind_np(&attr, kind_type));
1008 ASSERT_EQ(0, pthread_rwlock_init(&lock, &attr));
1009 ASSERT_EQ(0, pthread_rwlockattr_destroy(&attr));
1012 void DestroyRwlock() {
1013 ASSERT_EQ(0, pthread_rwlock_destroy(&lock));
1016 static void WriterThreadFn(ThreadArg* arg) {
1017 arg->tid = gettid();
1019 RwlockKindTestHelper* helper = arg->helper;
1020 ASSERT_EQ(0, pthread_rwlock_wrlock(&helper->lock));
1021 ASSERT_EQ(0, pthread_rwlock_unlock(&helper->lock));
1025 static void ReaderThreadFn(ThreadArg* arg) {
1026 arg->tid = gettid();
1028 RwlockKindTestHelper* helper = arg->helper;
1029 ASSERT_EQ(0, pthread_rwlock_rdlock(&helper->lock));
1030 ASSERT_EQ(0, pthread_rwlock_unlock(&helper->lock));
1035 TEST(pthread, pthread_rwlock_kind_PTHREAD_RWLOCK_PREFER_READER_NP) {
1036 RwlockKindTestHelper helper(PTHREAD_RWLOCK_PREFER_READER_NP);
1037 ASSERT_EQ(0, pthread_rwlock_rdlock(&helper.lock));
1039 pthread_t writer_thread;
1040 std::atomic<pid_t> writer_tid;
1041 helper.CreateWriterThread(writer_thread, writer_tid);
1042 WaitUntilThreadSleep(writer_tid);
1044 pthread_t reader_thread;
1045 std::atomic<pid_t> reader_tid;
1046 helper.CreateReaderThread(reader_thread, reader_tid);
1047 ASSERT_EQ(0, pthread_join(reader_thread, NULL));
1049 ASSERT_EQ(0, pthread_rwlock_unlock(&helper.lock));
1050 ASSERT_EQ(0, pthread_join(writer_thread, NULL));
1053 TEST(pthread, pthread_rwlock_kind_PTHREAD_RWLOCK_PREFER_WRITER_NONRECURSIVE_NP) {
1054 RwlockKindTestHelper helper(PTHREAD_RWLOCK_PREFER_WRITER_NONRECURSIVE_NP);
1055 ASSERT_EQ(0, pthread_rwlock_rdlock(&helper.lock));
1057 pthread_t writer_thread;
1058 std::atomic<pid_t> writer_tid;
1059 helper.CreateWriterThread(writer_thread, writer_tid);
1060 WaitUntilThreadSleep(writer_tid);
1062 pthread_t reader_thread;
1063 std::atomic<pid_t> reader_tid;
1064 helper.CreateReaderThread(reader_thread, reader_tid);
1065 WaitUntilThreadSleep(reader_tid);
1067 ASSERT_EQ(0, pthread_rwlock_unlock(&helper.lock));
1068 ASSERT_EQ(0, pthread_join(writer_thread, NULL));
1069 ASSERT_EQ(0, pthread_join(reader_thread, NULL));
1072 static int g_once_fn_call_count = 0;
1073 static void OnceFn() {
1074 ++g_once_fn_call_count;
1077 TEST(pthread, pthread_once_smoke) {
1078 pthread_once_t once_control = PTHREAD_ONCE_INIT;
1079 ASSERT_EQ(0, pthread_once(&once_control, OnceFn));
1080 ASSERT_EQ(0, pthread_once(&once_control, OnceFn));
1081 ASSERT_EQ(1, g_once_fn_call_count);
1084 static std::string pthread_once_1934122_result = "";
1086 static void Routine2() {
1087 pthread_once_1934122_result += "2";
1090 static void Routine1() {
1091 pthread_once_t once_control_2 = PTHREAD_ONCE_INIT;
1092 pthread_once_1934122_result += "1";
1093 pthread_once(&once_control_2, &Routine2);
1096 TEST(pthread, pthread_once_1934122) {
1097 // Very old versions of Android couldn't call pthread_once from a
1098 // pthread_once init routine. http://b/1934122.
1099 pthread_once_t once_control_1 = PTHREAD_ONCE_INIT;
1100 ASSERT_EQ(0, pthread_once(&once_control_1, &Routine1));
1101 ASSERT_EQ("12", pthread_once_1934122_result);
1104 static int g_atfork_prepare_calls = 0;
1105 static void AtForkPrepare1() { g_atfork_prepare_calls = (g_atfork_prepare_calls * 10) + 1; }
1106 static void AtForkPrepare2() { g_atfork_prepare_calls = (g_atfork_prepare_calls * 10) + 2; }
1107 static int g_atfork_parent_calls = 0;
1108 static void AtForkParent1() { g_atfork_parent_calls = (g_atfork_parent_calls * 10) + 1; }
1109 static void AtForkParent2() { g_atfork_parent_calls = (g_atfork_parent_calls * 10) + 2; }
1110 static int g_atfork_child_calls = 0;
1111 static void AtForkChild1() { g_atfork_child_calls = (g_atfork_child_calls * 10) + 1; }
1112 static void AtForkChild2() { g_atfork_child_calls = (g_atfork_child_calls * 10) + 2; }
1114 TEST(pthread, pthread_atfork_smoke) {
1115 ASSERT_EQ(0, pthread_atfork(AtForkPrepare1, AtForkParent1, AtForkChild1));
1116 ASSERT_EQ(0, pthread_atfork(AtForkPrepare2, AtForkParent2, AtForkChild2));
1119 ASSERT_NE(-1, pid) << strerror(errno);
1121 // Child and parent calls are made in the order they were registered.
1123 ASSERT_EQ(12, g_atfork_child_calls);
1126 ASSERT_EQ(12, g_atfork_parent_calls);
1128 // Prepare calls are made in the reverse order.
1129 ASSERT_EQ(21, g_atfork_prepare_calls);
1130 AssertChildExited(pid, 0);
1133 TEST(pthread, pthread_attr_getscope) {
1134 pthread_attr_t attr;
1135 ASSERT_EQ(0, pthread_attr_init(&attr));
1138 ASSERT_EQ(0, pthread_attr_getscope(&attr, &scope));
1139 ASSERT_EQ(PTHREAD_SCOPE_SYSTEM, scope);
1142 TEST(pthread, pthread_condattr_init) {
1143 pthread_condattr_t attr;
1144 pthread_condattr_init(&attr);
1147 ASSERT_EQ(0, pthread_condattr_getclock(&attr, &clock));
1148 ASSERT_EQ(CLOCK_REALTIME, clock);
1151 ASSERT_EQ(0, pthread_condattr_getpshared(&attr, &pshared));
1152 ASSERT_EQ(PTHREAD_PROCESS_PRIVATE, pshared);
1155 TEST(pthread, pthread_condattr_setclock) {
1156 pthread_condattr_t attr;
1157 pthread_condattr_init(&attr);
1159 ASSERT_EQ(0, pthread_condattr_setclock(&attr, CLOCK_REALTIME));
1161 ASSERT_EQ(0, pthread_condattr_getclock(&attr, &clock));
1162 ASSERT_EQ(CLOCK_REALTIME, clock);
1164 ASSERT_EQ(0, pthread_condattr_setclock(&attr, CLOCK_MONOTONIC));
1165 ASSERT_EQ(0, pthread_condattr_getclock(&attr, &clock));
1166 ASSERT_EQ(CLOCK_MONOTONIC, clock);
1168 ASSERT_EQ(EINVAL, pthread_condattr_setclock(&attr, CLOCK_PROCESS_CPUTIME_ID));
1171 TEST(pthread, pthread_cond_broadcast__preserves_condattr_flags) {
1172 #if defined(__BIONIC__)
1173 pthread_condattr_t attr;
1174 pthread_condattr_init(&attr);
1176 ASSERT_EQ(0, pthread_condattr_setclock(&attr, CLOCK_MONOTONIC));
1177 ASSERT_EQ(0, pthread_condattr_setpshared(&attr, PTHREAD_PROCESS_SHARED));
1179 pthread_cond_t cond_var;
1180 ASSERT_EQ(0, pthread_cond_init(&cond_var, &attr));
1182 ASSERT_EQ(0, pthread_cond_signal(&cond_var));
1183 ASSERT_EQ(0, pthread_cond_broadcast(&cond_var));
1185 attr = static_cast<pthread_condattr_t>(*reinterpret_cast<uint32_t*>(cond_var.__private));
1187 ASSERT_EQ(0, pthread_condattr_getclock(&attr, &clock));
1188 ASSERT_EQ(CLOCK_MONOTONIC, clock);
1190 ASSERT_EQ(0, pthread_condattr_getpshared(&attr, &pshared));
1191 ASSERT_EQ(PTHREAD_PROCESS_SHARED, pshared);
1192 #else // !defined(__BIONIC__)
1193 GTEST_LOG_(INFO) << "This tests a bionic implementation detail.\n";
1194 #endif // !defined(__BIONIC__)
1197 class pthread_CondWakeupTest : public ::testing::Test {
1199 pthread_mutex_t mutex;
1200 pthread_cond_t cond;
1208 std::atomic<Progress> progress;
1210 std::function<int (pthread_cond_t* cond, pthread_mutex_t* mutex)> wait_function;
1213 void SetUp() override {
1214 ASSERT_EQ(0, pthread_mutex_init(&mutex, nullptr));
1217 void InitCond(clockid_t clock=CLOCK_REALTIME) {
1218 pthread_condattr_t attr;
1219 ASSERT_EQ(0, pthread_condattr_init(&attr));
1220 ASSERT_EQ(0, pthread_condattr_setclock(&attr, clock));
1221 ASSERT_EQ(0, pthread_cond_init(&cond, &attr));
1222 ASSERT_EQ(0, pthread_condattr_destroy(&attr));
1225 void StartWaitingThread(std::function<int (pthread_cond_t* cond, pthread_mutex_t* mutex)> wait_function) {
1226 progress = INITIALIZED;
1227 this->wait_function = wait_function;
1228 ASSERT_EQ(0, pthread_create(&thread, NULL, reinterpret_cast<void* (*)(void*)>(WaitThreadFn), this));
1229 while (progress != WAITING) {
1235 void TearDown() override {
1236 ASSERT_EQ(0, pthread_join(thread, nullptr));
1237 ASSERT_EQ(FINISHED, progress);
1238 ASSERT_EQ(0, pthread_cond_destroy(&cond));
1239 ASSERT_EQ(0, pthread_mutex_destroy(&mutex));
1243 static void WaitThreadFn(pthread_CondWakeupTest* test) {
1244 ASSERT_EQ(0, pthread_mutex_lock(&test->mutex));
1245 test->progress = WAITING;
1246 while (test->progress == WAITING) {
1247 ASSERT_EQ(0, test->wait_function(&test->cond, &test->mutex));
1249 ASSERT_EQ(SIGNALED, test->progress);
1250 test->progress = FINISHED;
1251 ASSERT_EQ(0, pthread_mutex_unlock(&test->mutex));
1255 TEST_F(pthread_CondWakeupTest, signal_wait) {
1257 StartWaitingThread([](pthread_cond_t* cond, pthread_mutex_t* mutex) {
1258 return pthread_cond_wait(cond, mutex);
1260 progress = SIGNALED;
1261 ASSERT_EQ(0, pthread_cond_signal(&cond));
1264 TEST_F(pthread_CondWakeupTest, broadcast_wait) {
1266 StartWaitingThread([](pthread_cond_t* cond, pthread_mutex_t* mutex) {
1267 return pthread_cond_wait(cond, mutex);
1269 progress = SIGNALED;
1270 ASSERT_EQ(0, pthread_cond_broadcast(&cond));
1273 TEST_F(pthread_CondWakeupTest, signal_timedwait_CLOCK_REALTIME) {
1274 InitCond(CLOCK_REALTIME);
1276 ASSERT_EQ(0, clock_gettime(CLOCK_REALTIME, &ts));
1278 StartWaitingThread([&](pthread_cond_t* cond, pthread_mutex_t* mutex) {
1279 return pthread_cond_timedwait(cond, mutex, &ts);
1281 progress = SIGNALED;
1282 ASSERT_EQ(0, pthread_cond_signal(&cond));
1285 TEST_F(pthread_CondWakeupTest, signal_timedwait_CLOCK_MONOTONIC) {
1286 InitCond(CLOCK_MONOTONIC);
1288 ASSERT_EQ(0, clock_gettime(CLOCK_MONOTONIC, &ts));
1290 StartWaitingThread([&](pthread_cond_t* cond, pthread_mutex_t* mutex) {
1291 return pthread_cond_timedwait(cond, mutex, &ts);
1293 progress = SIGNALED;
1294 ASSERT_EQ(0, pthread_cond_signal(&cond));
1297 TEST(pthread, pthread_cond_timedwait_timeout) {
1298 pthread_mutex_t mutex;
1299 ASSERT_EQ(0, pthread_mutex_init(&mutex, nullptr));
1300 pthread_cond_t cond;
1301 ASSERT_EQ(0, pthread_cond_init(&cond, nullptr));
1302 ASSERT_EQ(0, pthread_mutex_lock(&mutex));
1304 ASSERT_EQ(0, clock_gettime(CLOCK_REALTIME, &ts));
1305 ASSERT_EQ(ETIMEDOUT, pthread_cond_timedwait(&cond, &mutex, &ts));
1307 ASSERT_EQ(EINVAL, pthread_cond_timedwait(&cond, &mutex, &ts));
1308 ts.tv_nsec = NS_PER_S;
1309 ASSERT_EQ(EINVAL, pthread_cond_timedwait(&cond, &mutex, &ts));
1310 ts.tv_nsec = NS_PER_S - 1;
1312 ASSERT_EQ(ETIMEDOUT, pthread_cond_timedwait(&cond, &mutex, &ts));
1313 ASSERT_EQ(0, pthread_mutex_unlock(&mutex));
1316 TEST(pthread, pthread_attr_getstack__main_thread) {
1317 // This test is only meaningful for the main thread, so make sure we're running on it!
1318 ASSERT_EQ(getpid(), syscall(__NR_gettid));
1320 // Get the main thread's attributes.
1321 pthread_attr_t attributes;
1322 ASSERT_EQ(0, pthread_getattr_np(pthread_self(), &attributes));
1324 // Check that we correctly report that the main thread has no guard page.
1326 ASSERT_EQ(0, pthread_attr_getguardsize(&attributes, &guard_size));
1327 ASSERT_EQ(0U, guard_size); // The main thread has no guard page.
1329 // Get the stack base and the stack size (both ways).
1332 ASSERT_EQ(0, pthread_attr_getstack(&attributes, &stack_base, &stack_size));
1334 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size2));
1336 // The two methods of asking for the stack size should agree.
1337 EXPECT_EQ(stack_size, stack_size2);
1339 #if defined(__BIONIC__)
1340 // What does /proc/self/maps' [stack] line say?
1341 void* maps_stack_hi = NULL;
1342 std::vector<map_record> maps;
1343 ASSERT_TRUE(Maps::parse_maps(&maps));
1344 for (const auto& map : maps) {
1345 if (map.pathname == "[stack]") {
1346 maps_stack_hi = reinterpret_cast<void*>(map.addr_end);
1351 // The high address of the /proc/self/maps [stack] region should equal stack_base + stack_size.
1352 // Remember that the stack grows down (and is mapped in on demand), so the low address of the
1353 // region isn't very interesting.
1354 EXPECT_EQ(maps_stack_hi, reinterpret_cast<uint8_t*>(stack_base) + stack_size);
1356 // The stack size should correspond to RLIMIT_STACK.
1358 ASSERT_EQ(0, getrlimit(RLIMIT_STACK, &rl));
1359 uint64_t original_rlim_cur = rl.rlim_cur;
1360 if (rl.rlim_cur == RLIM_INFINITY) {
1361 rl.rlim_cur = 8 * 1024 * 1024; // Bionic reports unlimited stacks as 8MiB.
1363 EXPECT_EQ(rl.rlim_cur, stack_size);
1365 auto guard = make_scope_guard([&rl, original_rlim_cur]() {
1366 rl.rlim_cur = original_rlim_cur;
1367 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1371 // What if RLIMIT_STACK is smaller than the stack's current extent?
1373 rl.rlim_cur = rl.rlim_max = 1024; // 1KiB. We know the stack must be at least a page already.
1374 rl.rlim_max = RLIM_INFINITY;
1375 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1377 ASSERT_EQ(0, pthread_getattr_np(pthread_self(), &attributes));
1378 ASSERT_EQ(0, pthread_attr_getstack(&attributes, &stack_base, &stack_size));
1379 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size2));
1381 EXPECT_EQ(stack_size, stack_size2);
1382 ASSERT_EQ(1024U, stack_size);
1385 // What if RLIMIT_STACK isn't a whole number of pages?
1387 rl.rlim_cur = rl.rlim_max = 6666; // Not a whole number of pages.
1388 rl.rlim_max = RLIM_INFINITY;
1389 ASSERT_EQ(0, setrlimit(RLIMIT_STACK, &rl));
1391 ASSERT_EQ(0, pthread_getattr_np(pthread_self(), &attributes));
1392 ASSERT_EQ(0, pthread_attr_getstack(&attributes, &stack_base, &stack_size));
1393 ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size2));
1395 EXPECT_EQ(stack_size, stack_size2);
1396 ASSERT_EQ(6666U, stack_size);
1400 struct GetStackSignalHandlerArg {
1402 void* signal_stack_base;
1403 size_t signal_stack_size;
1404 void* main_stack_base;
1405 size_t main_stack_size;
1408 static GetStackSignalHandlerArg getstack_signal_handler_arg;
1410 static void getstack_signal_handler(int sig) {
1411 ASSERT_EQ(SIGUSR1, sig);
1412 // Use sleep() to make current thread be switched out by the kernel to provoke the error.
1414 pthread_attr_t attr;
1415 ASSERT_EQ(0, pthread_getattr_np(pthread_self(), &attr));
1418 ASSERT_EQ(0, pthread_attr_getstack(&attr, &stack_base, &stack_size));
1420 // Verify if the stack used by the signal handler is the alternate stack just registered.
1421 ASSERT_LE(getstack_signal_handler_arg.signal_stack_base, &attr);
1422 ASSERT_LT(static_cast<void*>(&attr),
1423 static_cast<char*>(getstack_signal_handler_arg.signal_stack_base) +
1424 getstack_signal_handler_arg.signal_stack_size);
1426 // Verify if the main thread's stack got in the signal handler is correct.
1427 ASSERT_EQ(getstack_signal_handler_arg.main_stack_base, stack_base);
1428 ASSERT_LE(getstack_signal_handler_arg.main_stack_size, stack_size);
1430 getstack_signal_handler_arg.done = true;
1433 // The previous code obtained the main thread's stack by reading the entry in
1434 // /proc/self/task/<pid>/maps that was labeled [stack]. Unfortunately, on x86/x86_64, the kernel
1435 // relies on sp0 in task state segment(tss) to label the stack map with [stack]. If the kernel
1436 // switches a process while the main thread is in an alternate stack, then the kernel will label
1437 // the wrong map with [stack]. This test verifies that when the above situation happens, the main
1438 // thread's stack is found correctly.
1439 TEST(pthread, pthread_attr_getstack_in_signal_handler) {
1440 // This test is only meaningful for the main thread, so make sure we're running on it!
1441 ASSERT_EQ(getpid(), syscall(__NR_gettid));
1443 const size_t sig_stack_size = 16 * 1024;
1444 void* sig_stack = mmap(NULL, sig_stack_size, PROT_READ | PROT_WRITE, MAP_PRIVATE | MAP_ANONYMOUS,
1446 ASSERT_NE(MAP_FAILED, sig_stack);
1448 ss.ss_sp = sig_stack;
1449 ss.ss_size = sig_stack_size;
1452 ASSERT_EQ(0, sigaltstack(&ss, &oss));
1454 pthread_attr_t attr;
1455 ASSERT_EQ(0, pthread_getattr_np(pthread_self(), &attr));
1456 void* main_stack_base;
1457 size_t main_stack_size;
1458 ASSERT_EQ(0, pthread_attr_getstack(&attr, &main_stack_base, &main_stack_size));
1460 ScopedSignalHandler handler(SIGUSR1, getstack_signal_handler, SA_ONSTACK);
1461 getstack_signal_handler_arg.done = false;
1462 getstack_signal_handler_arg.signal_stack_base = sig_stack;
1463 getstack_signal_handler_arg.signal_stack_size = sig_stack_size;
1464 getstack_signal_handler_arg.main_stack_base = main_stack_base;
1465 getstack_signal_handler_arg.main_stack_size = main_stack_size;
1466 kill(getpid(), SIGUSR1);
1467 ASSERT_EQ(true, getstack_signal_handler_arg.done);
1469 ASSERT_EQ(0, sigaltstack(&oss, nullptr));
1470 ASSERT_EQ(0, munmap(sig_stack, sig_stack_size));
1473 static void pthread_attr_getstack_18908062_helper(void*) {
1474 char local_variable;
1475 pthread_attr_t attributes;
1476 pthread_getattr_np(pthread_self(), &attributes);
1479 pthread_attr_getstack(&attributes, &stack_base, &stack_size);
1481 // Test whether &local_variable is in [stack_base, stack_base + stack_size).
1482 ASSERT_LE(reinterpret_cast<char*>(stack_base), &local_variable);
1483 ASSERT_LT(&local_variable, reinterpret_cast<char*>(stack_base) + stack_size);
1486 // Check whether something on stack is in the range of
1487 // [stack_base, stack_base + stack_size). see b/18908062.
1488 TEST(pthread, pthread_attr_getstack_18908062) {
1490 ASSERT_EQ(0, pthread_create(&t, NULL,
1491 reinterpret_cast<void* (*)(void*)>(pthread_attr_getstack_18908062_helper),
1493 pthread_join(t, NULL);
1496 #if defined(__BIONIC__)
1497 static pthread_mutex_t pthread_gettid_np_mutex = PTHREAD_MUTEX_INITIALIZER;
1499 static void* pthread_gettid_np_helper(void* arg) {
1500 *reinterpret_cast<pid_t*>(arg) = gettid();
1502 // Wait for our parent to call pthread_gettid_np on us before exiting.
1503 pthread_mutex_lock(&pthread_gettid_np_mutex);
1504 pthread_mutex_unlock(&pthread_gettid_np_mutex);
1509 TEST(pthread, pthread_gettid_np) {
1510 #if defined(__BIONIC__)
1511 ASSERT_EQ(gettid(), pthread_gettid_np(pthread_self()));
1513 // Ensure the other thread doesn't exit until after we've called
1514 // pthread_gettid_np on it.
1515 pthread_mutex_lock(&pthread_gettid_np_mutex);
1517 pid_t t_gettid_result;
1519 pthread_create(&t, NULL, pthread_gettid_np_helper, &t_gettid_result);
1521 pid_t t_pthread_gettid_np_result = pthread_gettid_np(t);
1523 // Release the other thread and wait for it to exit.
1524 pthread_mutex_unlock(&pthread_gettid_np_mutex);
1525 pthread_join(t, NULL);
1527 ASSERT_EQ(t_gettid_result, t_pthread_gettid_np_result);
1529 GTEST_LOG_(INFO) << "This test does nothing.\n";
1533 static size_t cleanup_counter = 0;
1535 static void AbortCleanupRoutine(void*) {
1539 static void CountCleanupRoutine(void*) {
1543 static void PthreadCleanupTester() {
1544 pthread_cleanup_push(CountCleanupRoutine, NULL);
1545 pthread_cleanup_push(CountCleanupRoutine, NULL);
1546 pthread_cleanup_push(AbortCleanupRoutine, NULL);
1548 pthread_cleanup_pop(0); // Pop the abort without executing it.
1549 pthread_cleanup_pop(1); // Pop one count while executing it.
1550 ASSERT_EQ(1U, cleanup_counter);
1551 // Exit while the other count is still on the cleanup stack.
1554 // Calls to pthread_cleanup_pop/pthread_cleanup_push must always be balanced.
1555 pthread_cleanup_pop(0);
1558 static void* PthreadCleanupStartRoutine(void*) {
1559 PthreadCleanupTester();
1563 TEST(pthread, pthread_cleanup_push__pthread_cleanup_pop) {
1565 ASSERT_EQ(0, pthread_create(&t, NULL, PthreadCleanupStartRoutine, NULL));
1566 pthread_join(t, NULL);
1567 ASSERT_EQ(2U, cleanup_counter);
1570 TEST(pthread, PTHREAD_MUTEX_DEFAULT_is_PTHREAD_MUTEX_NORMAL) {
1571 ASSERT_EQ(PTHREAD_MUTEX_NORMAL, PTHREAD_MUTEX_DEFAULT);
1574 TEST(pthread, pthread_mutexattr_gettype) {
1575 pthread_mutexattr_t attr;
1576 ASSERT_EQ(0, pthread_mutexattr_init(&attr));
1580 ASSERT_EQ(0, pthread_mutexattr_settype(&attr, PTHREAD_MUTEX_NORMAL));
1581 ASSERT_EQ(0, pthread_mutexattr_gettype(&attr, &attr_type));
1582 ASSERT_EQ(PTHREAD_MUTEX_NORMAL, attr_type);
1584 ASSERT_EQ(0, pthread_mutexattr_settype(&attr, PTHREAD_MUTEX_ERRORCHECK));
1585 ASSERT_EQ(0, pthread_mutexattr_gettype(&attr, &attr_type));
1586 ASSERT_EQ(PTHREAD_MUTEX_ERRORCHECK, attr_type);
1588 ASSERT_EQ(0, pthread_mutexattr_settype(&attr, PTHREAD_MUTEX_RECURSIVE));
1589 ASSERT_EQ(0, pthread_mutexattr_gettype(&attr, &attr_type));
1590 ASSERT_EQ(PTHREAD_MUTEX_RECURSIVE, attr_type);
1592 ASSERT_EQ(0, pthread_mutexattr_destroy(&attr));
1595 struct PthreadMutex {
1596 pthread_mutex_t lock;
1598 explicit PthreadMutex(int mutex_type) {
1607 void init(int mutex_type) {
1608 pthread_mutexattr_t attr;
1609 ASSERT_EQ(0, pthread_mutexattr_init(&attr));
1610 ASSERT_EQ(0, pthread_mutexattr_settype(&attr, mutex_type));
1611 ASSERT_EQ(0, pthread_mutex_init(&lock, &attr));
1612 ASSERT_EQ(0, pthread_mutexattr_destroy(&attr));
1616 ASSERT_EQ(0, pthread_mutex_destroy(&lock));
1619 DISALLOW_COPY_AND_ASSIGN(PthreadMutex);
1622 TEST(pthread, pthread_mutex_lock_NORMAL) {
1623 PthreadMutex m(PTHREAD_MUTEX_NORMAL);
1625 ASSERT_EQ(0, pthread_mutex_lock(&m.lock));
1626 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
1627 ASSERT_EQ(0, pthread_mutex_trylock(&m.lock));
1628 ASSERT_EQ(EBUSY, pthread_mutex_trylock(&m.lock));
1629 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
1632 TEST(pthread, pthread_mutex_lock_ERRORCHECK) {
1633 PthreadMutex m(PTHREAD_MUTEX_ERRORCHECK);
1635 ASSERT_EQ(0, pthread_mutex_lock(&m.lock));
1636 ASSERT_EQ(EDEADLK, pthread_mutex_lock(&m.lock));
1637 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
1638 ASSERT_EQ(0, pthread_mutex_trylock(&m.lock));
1639 ASSERT_EQ(EBUSY, pthread_mutex_trylock(&m.lock));
1640 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
1641 ASSERT_EQ(EPERM, pthread_mutex_unlock(&m.lock));
1644 TEST(pthread, pthread_mutex_lock_RECURSIVE) {
1645 PthreadMutex m(PTHREAD_MUTEX_RECURSIVE);
1647 ASSERT_EQ(0, pthread_mutex_lock(&m.lock));
1648 ASSERT_EQ(0, pthread_mutex_lock(&m.lock));
1649 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
1650 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
1651 ASSERT_EQ(0, pthread_mutex_trylock(&m.lock));
1652 ASSERT_EQ(0, pthread_mutex_trylock(&m.lock));
1653 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
1654 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
1655 ASSERT_EQ(EPERM, pthread_mutex_unlock(&m.lock));
1658 TEST(pthread, pthread_mutex_init_same_as_static_initializers) {
1659 pthread_mutex_t lock_normal = PTHREAD_MUTEX_INITIALIZER;
1660 PthreadMutex m1(PTHREAD_MUTEX_NORMAL);
1661 ASSERT_EQ(0, memcmp(&lock_normal, &m1.lock, sizeof(pthread_mutex_t)));
1662 pthread_mutex_destroy(&lock_normal);
1664 pthread_mutex_t lock_errorcheck = PTHREAD_ERRORCHECK_MUTEX_INITIALIZER_NP;
1665 PthreadMutex m2(PTHREAD_MUTEX_ERRORCHECK);
1666 ASSERT_EQ(0, memcmp(&lock_errorcheck, &m2.lock, sizeof(pthread_mutex_t)));
1667 pthread_mutex_destroy(&lock_errorcheck);
1669 pthread_mutex_t lock_recursive = PTHREAD_RECURSIVE_MUTEX_INITIALIZER_NP;
1670 PthreadMutex m3(PTHREAD_MUTEX_RECURSIVE);
1671 ASSERT_EQ(0, memcmp(&lock_recursive, &m3.lock, sizeof(pthread_mutex_t)));
1672 ASSERT_EQ(0, pthread_mutex_destroy(&lock_recursive));
1674 class MutexWakeupHelper {
1683 std::atomic<Progress> progress;
1684 std::atomic<pid_t> tid;
1686 static void thread_fn(MutexWakeupHelper* helper) {
1687 helper->tid = gettid();
1688 ASSERT_EQ(LOCK_INITIALIZED, helper->progress);
1689 helper->progress = LOCK_WAITING;
1691 ASSERT_EQ(0, pthread_mutex_lock(&helper->m.lock));
1692 ASSERT_EQ(LOCK_RELEASED, helper->progress);
1693 ASSERT_EQ(0, pthread_mutex_unlock(&helper->m.lock));
1695 helper->progress = LOCK_ACCESSED;
1699 explicit MutexWakeupHelper(int mutex_type) : m(mutex_type) {
1703 ASSERT_EQ(0, pthread_mutex_lock(&m.lock));
1704 progress = LOCK_INITIALIZED;
1708 ASSERT_EQ(0, pthread_create(&thread, NULL,
1709 reinterpret_cast<void* (*)(void*)>(MutexWakeupHelper::thread_fn), this));
1711 WaitUntilThreadSleep(tid);
1712 ASSERT_EQ(LOCK_WAITING, progress);
1714 progress = LOCK_RELEASED;
1715 ASSERT_EQ(0, pthread_mutex_unlock(&m.lock));
1717 ASSERT_EQ(0, pthread_join(thread, NULL));
1718 ASSERT_EQ(LOCK_ACCESSED, progress);
1722 TEST(pthread, pthread_mutex_NORMAL_wakeup) {
1723 MutexWakeupHelper helper(PTHREAD_MUTEX_NORMAL);
1727 TEST(pthread, pthread_mutex_ERRORCHECK_wakeup) {
1728 MutexWakeupHelper helper(PTHREAD_MUTEX_ERRORCHECK);
1732 TEST(pthread, pthread_mutex_RECURSIVE_wakeup) {
1733 MutexWakeupHelper helper(PTHREAD_MUTEX_RECURSIVE);
1737 TEST(pthread, pthread_mutex_owner_tid_limit) {
1738 #if defined(__BIONIC__) && !defined(__LP64__)
1739 FILE* fp = fopen("/proc/sys/kernel/pid_max", "r");
1740 ASSERT_TRUE(fp != NULL);
1742 ASSERT_EQ(1, fscanf(fp, "%ld", &pid_max));
1744 // Bionic's pthread_mutex implementation on 32-bit devices uses 16 bits to represent owner tid.
1745 ASSERT_LE(pid_max, 65536);
1747 GTEST_LOG_(INFO) << "This test does nothing as 32-bit tid is supported by pthread_mutex.\n";
1751 TEST(pthread, pthread_mutex_timedlock) {
1753 ASSERT_EQ(0, pthread_mutex_init(&m, nullptr));
1755 // If the mutex is already locked, pthread_mutex_timedlock should time out.
1756 ASSERT_EQ(0, pthread_mutex_lock(&m));
1759 ASSERT_EQ(0, clock_gettime(CLOCK_REALTIME, &ts));
1760 ASSERT_EQ(ETIMEDOUT, pthread_mutex_timedlock(&m, &ts));
1762 ASSERT_EQ(EINVAL, pthread_mutex_timedlock(&m, &ts));
1763 ts.tv_nsec = NS_PER_S;
1764 ASSERT_EQ(EINVAL, pthread_mutex_timedlock(&m, &ts));
1765 ts.tv_nsec = NS_PER_S - 1;
1767 ASSERT_EQ(ETIMEDOUT, pthread_mutex_timedlock(&m, &ts));
1769 // If the mutex is unlocked, pthread_mutex_timedlock should succeed.
1770 ASSERT_EQ(0, pthread_mutex_unlock(&m));
1772 ASSERT_EQ(0, clock_gettime(CLOCK_REALTIME, &ts));
1774 ASSERT_EQ(0, pthread_mutex_timedlock(&m, &ts));
1776 ASSERT_EQ(0, pthread_mutex_unlock(&m));
1777 ASSERT_EQ(0, pthread_mutex_destroy(&m));
1780 class StrictAlignmentAllocator {
1782 void* allocate(size_t size, size_t alignment) {
1783 char* p = new char[size + alignment * 2];
1784 allocated_array.push_back(p);
1785 while (!is_strict_aligned(p, alignment)) {
1791 ~StrictAlignmentAllocator() {
1792 for (const auto& p : allocated_array) {
1798 bool is_strict_aligned(char* p, size_t alignment) {
1799 return (reinterpret_cast<uintptr_t>(p) % (alignment * 2)) == alignment;
1802 std::vector<char*> allocated_array;
1805 TEST(pthread, pthread_types_allow_four_bytes_alignment) {
1806 #if defined(__BIONIC__)
1807 // For binary compatibility with old version, we need to allow 4-byte aligned data for pthread types.
1808 StrictAlignmentAllocator allocator;
1809 pthread_mutex_t* mutex = reinterpret_cast<pthread_mutex_t*>(
1810 allocator.allocate(sizeof(pthread_mutex_t), 4));
1811 ASSERT_EQ(0, pthread_mutex_init(mutex, NULL));
1812 ASSERT_EQ(0, pthread_mutex_lock(mutex));
1813 ASSERT_EQ(0, pthread_mutex_unlock(mutex));
1814 ASSERT_EQ(0, pthread_mutex_destroy(mutex));
1816 pthread_cond_t* cond = reinterpret_cast<pthread_cond_t*>(
1817 allocator.allocate(sizeof(pthread_cond_t), 4));
1818 ASSERT_EQ(0, pthread_cond_init(cond, NULL));
1819 ASSERT_EQ(0, pthread_cond_signal(cond));
1820 ASSERT_EQ(0, pthread_cond_broadcast(cond));
1821 ASSERT_EQ(0, pthread_cond_destroy(cond));
1823 pthread_rwlock_t* rwlock = reinterpret_cast<pthread_rwlock_t*>(
1824 allocator.allocate(sizeof(pthread_rwlock_t), 4));
1825 ASSERT_EQ(0, pthread_rwlock_init(rwlock, NULL));
1826 ASSERT_EQ(0, pthread_rwlock_rdlock(rwlock));
1827 ASSERT_EQ(0, pthread_rwlock_unlock(rwlock));
1828 ASSERT_EQ(0, pthread_rwlock_wrlock(rwlock));
1829 ASSERT_EQ(0, pthread_rwlock_unlock(rwlock));
1830 ASSERT_EQ(0, pthread_rwlock_destroy(rwlock));
1833 GTEST_LOG_(INFO) << "This test tests bionic implementation details.";
1837 TEST(pthread, pthread_mutex_lock_null_32) {
1838 #if defined(__BIONIC__) && !defined(__LP64__)
1839 // For LP32, the pthread lock/unlock functions allow a NULL mutex and return
1840 // EINVAL in that case: http://b/19995172.
1842 // We decorate the public defintion with _Nonnull so that people recompiling
1843 // their code with get a warning and might fix their bug, but need to pass
1844 // NULL here to test that we remain compatible.
1845 pthread_mutex_t* null_value = nullptr;
1846 ASSERT_EQ(EINVAL, pthread_mutex_lock(null_value));
1848 GTEST_LOG_(INFO) << "This test tests bionic implementation details on 32 bit devices.";
1852 TEST(pthread, pthread_mutex_unlock_null_32) {
1853 #if defined(__BIONIC__) && !defined(__LP64__)
1854 // For LP32, the pthread lock/unlock functions allow a NULL mutex and return
1855 // EINVAL in that case: http://b/19995172.
1857 // We decorate the public defintion with _Nonnull so that people recompiling
1858 // their code with get a warning and might fix their bug, but need to pass
1859 // NULL here to test that we remain compatible.
1860 pthread_mutex_t* null_value = nullptr;
1861 ASSERT_EQ(EINVAL, pthread_mutex_unlock(null_value));
1863 GTEST_LOG_(INFO) << "This test tests bionic implementation details on 32 bit devices.";
1867 TEST_F(pthread_DeathTest, pthread_mutex_lock_null_64) {
1868 #if defined(__BIONIC__) && defined(__LP64__)
1869 pthread_mutex_t* null_value = nullptr;
1870 ASSERT_EXIT(pthread_mutex_lock(null_value), testing::KilledBySignal(SIGSEGV), "");
1872 GTEST_LOG_(INFO) << "This test tests bionic implementation details on 64 bit devices.";
1876 TEST_F(pthread_DeathTest, pthread_mutex_unlock_null_64) {
1877 #if defined(__BIONIC__) && defined(__LP64__)
1878 pthread_mutex_t* null_value = nullptr;
1879 ASSERT_EXIT(pthread_mutex_unlock(null_value), testing::KilledBySignal(SIGSEGV), "");
1881 GTEST_LOG_(INFO) << "This test tests bionic implementation details on 64 bit devices.";
1885 extern _Unwind_Reason_Code FrameCounter(_Unwind_Context* ctx, void* arg);
1887 static volatile bool signal_handler_on_altstack_done;
1889 static void SignalHandlerOnAltStack(int signo, siginfo_t*, void*) {
1890 ASSERT_EQ(SIGUSR1, signo);
1891 // Check if we have enough stack space for unwinding.
1893 _Unwind_Backtrace(FrameCounter, &count);
1894 ASSERT_GT(count, 0);
1895 // Check if we have enough stack space for logging.
1896 std::string s(2048, '*');
1897 GTEST_LOG_(INFO) << s;
1898 signal_handler_on_altstack_done = true;
1901 TEST(pthread, big_enough_signal_stack_for_64bit_arch) {
1902 signal_handler_on_altstack_done = false;
1903 ScopedSignalHandler handler(SIGUSR1, SignalHandlerOnAltStack, SA_SIGINFO | SA_ONSTACK);
1904 kill(getpid(), SIGUSR1);
1905 ASSERT_TRUE(signal_handler_on_altstack_done);
1908 TEST(pthread, pthread_barrierattr_smoke) {
1909 pthread_barrierattr_t attr;
1910 ASSERT_EQ(0, pthread_barrierattr_init(&attr));
1912 ASSERT_EQ(0, pthread_barrierattr_getpshared(&attr, &pshared));
1913 ASSERT_EQ(PTHREAD_PROCESS_PRIVATE, pshared);
1914 ASSERT_EQ(0, pthread_barrierattr_setpshared(&attr, PTHREAD_PROCESS_SHARED));
1915 ASSERT_EQ(0, pthread_barrierattr_getpshared(&attr, &pshared));
1916 ASSERT_EQ(PTHREAD_PROCESS_SHARED, pshared);
1917 ASSERT_EQ(0, pthread_barrierattr_destroy(&attr));
1920 struct BarrierTestHelperData {
1921 size_t thread_count;
1922 pthread_barrier_t barrier;
1923 std::atomic<int> finished_mask;
1924 std::atomic<int> serial_thread_count;
1925 size_t iteration_count;
1926 std::atomic<size_t> finished_iteration_count;
1928 BarrierTestHelperData(size_t thread_count, size_t iteration_count)
1929 : thread_count(thread_count), finished_mask(0), serial_thread_count(0),
1930 iteration_count(iteration_count), finished_iteration_count(0) {
1934 struct BarrierTestHelperArg {
1936 BarrierTestHelperData* data;
1939 static void BarrierTestHelper(BarrierTestHelperArg* arg) {
1940 for (size_t i = 0; i < arg->data->iteration_count; ++i) {
1941 int result = pthread_barrier_wait(&arg->data->barrier);
1942 if (result == PTHREAD_BARRIER_SERIAL_THREAD) {
1943 arg->data->serial_thread_count++;
1945 ASSERT_EQ(0, result);
1947 arg->data->finished_mask |= (1 << arg->id);
1948 if (arg->data->finished_mask == ((1 << arg->data->thread_count) - 1)) {
1949 ASSERT_EQ(1, arg->data->serial_thread_count);
1950 arg->data->finished_iteration_count++;
1951 arg->data->finished_mask = 0;
1952 arg->data->serial_thread_count = 0;
1957 TEST(pthread, pthread_barrier_smoke) {
1958 const size_t BARRIER_ITERATION_COUNT = 10;
1959 const size_t BARRIER_THREAD_COUNT = 10;
1960 BarrierTestHelperData data(BARRIER_THREAD_COUNT, BARRIER_ITERATION_COUNT);
1961 ASSERT_EQ(0, pthread_barrier_init(&data.barrier, nullptr, data.thread_count));
1962 std::vector<pthread_t> threads(data.thread_count);
1963 std::vector<BarrierTestHelperArg> args(threads.size());
1964 for (size_t i = 0; i < threads.size(); ++i) {
1966 args[i].data = &data;
1967 ASSERT_EQ(0, pthread_create(&threads[i], nullptr,
1968 reinterpret_cast<void* (*)(void*)>(BarrierTestHelper), &args[i]));
1970 for (size_t i = 0; i < threads.size(); ++i) {
1971 ASSERT_EQ(0, pthread_join(threads[i], nullptr));
1973 ASSERT_EQ(data.iteration_count, data.finished_iteration_count);
1974 ASSERT_EQ(0, pthread_barrier_destroy(&data.barrier));
1977 struct BarrierDestroyTestArg {
1978 std::atomic<int> tid;
1979 pthread_barrier_t* barrier;
1982 static void BarrierDestroyTestHelper(BarrierDestroyTestArg* arg) {
1983 arg->tid = gettid();
1984 ASSERT_EQ(0, pthread_barrier_wait(arg->barrier));
1987 TEST(pthread, pthread_barrier_destroy) {
1988 pthread_barrier_t barrier;
1989 ASSERT_EQ(0, pthread_barrier_init(&barrier, nullptr, 2));
1991 BarrierDestroyTestArg arg;
1993 arg.barrier = &barrier;
1994 ASSERT_EQ(0, pthread_create(&thread, nullptr,
1995 reinterpret_cast<void* (*)(void*)>(BarrierDestroyTestHelper), &arg));
1996 WaitUntilThreadSleep(arg.tid);
1997 ASSERT_EQ(EBUSY, pthread_barrier_destroy(&barrier));
1998 ASSERT_EQ(PTHREAD_BARRIER_SERIAL_THREAD, pthread_barrier_wait(&barrier));
1999 // Verify if the barrier can be destroyed directly after pthread_barrier_wait().
2000 ASSERT_EQ(0, pthread_barrier_destroy(&barrier));
2001 ASSERT_EQ(0, pthread_join(thread, nullptr));
2002 #if defined(__BIONIC__)
2003 ASSERT_EQ(EINVAL, pthread_barrier_destroy(&barrier));
2007 struct BarrierOrderingTestHelperArg {
2008 pthread_barrier_t* barrier;
2010 size_t array_length;
2014 void BarrierOrderingTestHelper(BarrierOrderingTestHelperArg* arg) {
2015 const size_t ITERATION_COUNT = 10000;
2016 for (size_t i = 1; i <= ITERATION_COUNT; ++i) {
2017 arg->array[arg->id] = i;
2018 int result = pthread_barrier_wait(arg->barrier);
2019 ASSERT_TRUE(result == 0 || result == PTHREAD_BARRIER_SERIAL_THREAD);
2020 for (size_t j = 0; j < arg->array_length; ++j) {
2021 ASSERT_EQ(i, arg->array[j]);
2023 result = pthread_barrier_wait(arg->barrier);
2024 ASSERT_TRUE(result == 0 || result == PTHREAD_BARRIER_SERIAL_THREAD);
2028 TEST(pthread, pthread_barrier_check_ordering) {
2029 const size_t THREAD_COUNT = 4;
2030 pthread_barrier_t barrier;
2031 ASSERT_EQ(0, pthread_barrier_init(&barrier, nullptr, THREAD_COUNT));
2032 size_t array[THREAD_COUNT];
2033 std::vector<pthread_t> threads(THREAD_COUNT);
2034 std::vector<BarrierOrderingTestHelperArg> args(THREAD_COUNT);
2035 for (size_t i = 0; i < THREAD_COUNT; ++i) {
2036 args[i].barrier = &barrier;
2037 args[i].array = array;
2038 args[i].array_length = THREAD_COUNT;
2040 ASSERT_EQ(0, pthread_create(&threads[i], nullptr,
2041 reinterpret_cast<void* (*)(void*)>(BarrierOrderingTestHelper),
2044 for (size_t i = 0; i < THREAD_COUNT; ++i) {
2045 ASSERT_EQ(0, pthread_join(threads[i], nullptr));
2049 TEST(pthread, pthread_spinlock_smoke) {
2050 pthread_spinlock_t lock;
2051 ASSERT_EQ(0, pthread_spin_init(&lock, 0));
2052 ASSERT_EQ(0, pthread_spin_trylock(&lock));
2053 ASSERT_EQ(0, pthread_spin_unlock(&lock));
2054 ASSERT_EQ(0, pthread_spin_lock(&lock));
2055 ASSERT_EQ(EBUSY, pthread_spin_trylock(&lock));
2056 ASSERT_EQ(0, pthread_spin_unlock(&lock));
2057 ASSERT_EQ(0, pthread_spin_destroy(&lock));