mirror of
https://gitlab.winehq.org/wine/wine-gecko.git
synced 2024-09-13 09:24:08 -07:00
2a602a5685
Landing on a CLOSED TREE
602 lines
17 KiB
C++
602 lines
17 KiB
C++
/* -*- Mode: C++; tab-width: 4; indent-tabs-mode: nil; c-basic-offset: 4 -*-
|
|
* vim: sw=4 ts=4 et :
|
|
* ***** BEGIN LICENSE BLOCK *****
|
|
* Version: MPL 1.1/GPL 2.0/LGPL 2.1
|
|
*
|
|
* The contents of this file are subject to the Mozilla Public License Version
|
|
* 1.1 (the "License"); you may not use this file except in compliance with
|
|
* the License. You may obtain a copy of the License at
|
|
* http://www.mozilla.org/MPL/
|
|
*
|
|
* Software distributed under the License is distributed on an "AS IS" basis,
|
|
* WITHOUT WARRANTY OF ANY KIND, either express or implied. See the License
|
|
* for the specific language governing rights and limitations under the
|
|
* License.
|
|
*
|
|
* The Original Code is mozilla.org code.
|
|
*
|
|
* The Initial Developer of the Original Code is
|
|
* Mozilla Corporation.
|
|
* Portions created by the Initial Developer are Copyright (C) 2009
|
|
* the Initial Developer. All Rights Reserved.
|
|
*
|
|
* Contributor(s):
|
|
* Chris Jones <jones.chris.g@gmail.com>
|
|
*
|
|
* Alternatively, the contents of this file may be used under the terms of
|
|
* either of the GNU General Public License Version 2 or later (the "GPL"),
|
|
* or the GNU Lesser General Public License Version 2.1 or later (the "LGPL"),
|
|
* in which case the provisions of the GPL or the LGPL are applicable instead
|
|
* of those above. If you wish to allow use of your version of this file only
|
|
* under the terms of either the GPL or the LGPL, and not to allow others to
|
|
* use your version of this file under the terms of the MPL, indicate your
|
|
* decision by deleting the provisions above and replace them with the notice
|
|
* and other provisions required by the GPL or the LGPL. If you do not delete
|
|
* the provisions above, a recipient may use your version of this file under
|
|
* the terms of any one of the MPL, the GPL or the LGPL.
|
|
*
|
|
* ***** END LICENSE BLOCK ***** */
|
|
|
|
#include "mozilla/Util.h"
|
|
|
|
#include "prenv.h"
|
|
#include "prerror.h"
|
|
#include "prio.h"
|
|
#include "prproces.h"
|
|
|
|
#include "nsMemory.h"
|
|
|
|
#include "mozilla/CondVar.h"
|
|
#include "mozilla/ReentrantMonitor.h"
|
|
#include "mozilla/Mutex.h"
|
|
|
|
#include "TestHarness.h"
|
|
|
|
using namespace mozilla;
|
|
|
|
static PRThread*
|
|
spawn(void (*run)(void*), void* arg)
|
|
{
|
|
return PR_CreateThread(PR_SYSTEM_THREAD,
|
|
run,
|
|
arg,
|
|
PR_PRIORITY_NORMAL,
|
|
PR_GLOBAL_THREAD,
|
|
PR_JOINABLE_THREAD,
|
|
0);
|
|
}
|
|
|
|
#define PASS() \
|
|
do { \
|
|
passed(__FUNCTION__); \
|
|
return NS_OK; \
|
|
} while (0)
|
|
|
|
#define FAIL(why) \
|
|
do { \
|
|
fail("%s | %s - %s", __FILE__, __FUNCTION__, why); \
|
|
return NS_ERROR_FAILURE; \
|
|
} while (0)
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
static const char* sPathToThisBinary;
|
|
static const char* sAssertBehaviorEnv = "XPCOM_DEBUG_BREAK=abort";
|
|
|
|
class Subprocess
|
|
{
|
|
public:
|
|
// not available until process finishes
|
|
PRInt32 mExitCode;
|
|
nsCString mStdout;
|
|
nsCString mStderr;
|
|
|
|
Subprocess(const char* aTestName) {
|
|
// set up stdio redirection
|
|
PRFileDesc* readStdin; PRFileDesc* writeStdin;
|
|
PRFileDesc* readStdout; PRFileDesc* writeStdout;
|
|
PRFileDesc* readStderr; PRFileDesc* writeStderr;
|
|
PRProcessAttr* pattr = PR_NewProcessAttr();
|
|
|
|
NS_ASSERTION(pattr, "couldn't allocate process attrs");
|
|
|
|
NS_ASSERTION(PR_SUCCESS == PR_CreatePipe(&readStdin, &writeStdin),
|
|
"couldn't create child stdin pipe");
|
|
NS_ASSERTION(PR_SUCCESS == PR_SetFDInheritable(readStdin, true),
|
|
"couldn't set child stdin inheritable");
|
|
PR_ProcessAttrSetStdioRedirect(pattr, PR_StandardInput, readStdin);
|
|
|
|
NS_ASSERTION(PR_SUCCESS == PR_CreatePipe(&readStdout, &writeStdout),
|
|
"couldn't create child stdout pipe");
|
|
NS_ASSERTION(PR_SUCCESS == PR_SetFDInheritable(writeStdout, true),
|
|
"couldn't set child stdout inheritable");
|
|
PR_ProcessAttrSetStdioRedirect(pattr, PR_StandardOutput, writeStdout);
|
|
|
|
NS_ASSERTION(PR_SUCCESS == PR_CreatePipe(&readStderr, &writeStderr),
|
|
"couldn't create child stderr pipe");
|
|
NS_ASSERTION(PR_SUCCESS == PR_SetFDInheritable(writeStderr, true),
|
|
"couldn't set child stderr inheritable");
|
|
PR_ProcessAttrSetStdioRedirect(pattr, PR_StandardError, writeStderr);
|
|
|
|
// set up argv with test name to run
|
|
char* const newArgv[3] = {
|
|
strdup(sPathToThisBinary),
|
|
strdup(aTestName),
|
|
0
|
|
};
|
|
|
|
// make sure the child will abort if an assertion fails
|
|
NS_ASSERTION(PR_SUCCESS == PR_SetEnv(sAssertBehaviorEnv),
|
|
"couldn't set XPCOM_DEBUG_BREAK env var");
|
|
|
|
PRProcess* proc;
|
|
NS_ASSERTION(proc = PR_CreateProcess(sPathToThisBinary,
|
|
newArgv,
|
|
0, // inherit environment
|
|
pattr),
|
|
"couldn't create process");
|
|
PR_Close(readStdin);
|
|
PR_Close(writeStdout);
|
|
PR_Close(writeStderr);
|
|
|
|
mProc = proc;
|
|
mStdinfd = writeStdin;
|
|
mStdoutfd = readStdout;
|
|
mStderrfd = readStderr;
|
|
|
|
free(newArgv[0]);
|
|
free(newArgv[1]);
|
|
PR_DestroyProcessAttr(pattr);
|
|
}
|
|
|
|
void RunToCompletion(PRUint32 aWaitMs)
|
|
{
|
|
PR_Close(mStdinfd);
|
|
|
|
PRPollDesc pollfds[2];
|
|
PRInt32 nfds;
|
|
bool stdoutOpen = true, stderrOpen = true;
|
|
char buf[4096];
|
|
PRInt32 len;
|
|
|
|
PRIntervalTime now = PR_IntervalNow();
|
|
PRIntervalTime deadline = now + PR_MillisecondsToInterval(aWaitMs);
|
|
|
|
while ((stdoutOpen || stderrOpen) && now < deadline) {
|
|
nfds = 0;
|
|
if (stdoutOpen) {
|
|
pollfds[nfds].fd = mStdoutfd;
|
|
pollfds[nfds].in_flags = PR_POLL_READ;
|
|
pollfds[nfds].out_flags = 0;
|
|
++nfds;
|
|
}
|
|
if (stderrOpen) {
|
|
pollfds[nfds].fd = mStderrfd;
|
|
pollfds[nfds].in_flags = PR_POLL_READ;
|
|
pollfds[nfds].out_flags = 0;
|
|
++nfds;
|
|
}
|
|
|
|
PRInt32 rv = PR_Poll(pollfds, nfds, deadline - now);
|
|
NS_ASSERTION(0 <= rv, PR_ErrorToName(PR_GetError()));
|
|
|
|
if (0 == rv) { // timeout
|
|
fputs("(timed out!)\n", stderr);
|
|
Finish(false); // abnormal
|
|
return;
|
|
}
|
|
|
|
for (PRInt32 i = 0; i < nfds; ++i) {
|
|
if (!pollfds[i].out_flags)
|
|
continue;
|
|
|
|
bool isStdout = mStdoutfd == pollfds[i].fd;
|
|
|
|
if (PR_POLL_READ & pollfds[i].out_flags) {
|
|
len = PR_Read(pollfds[i].fd, buf, sizeof(buf) - 1);
|
|
NS_ASSERTION(0 <= len, PR_ErrorToName(PR_GetError()));
|
|
}
|
|
else if (PR_POLL_HUP & pollfds[i].out_flags) {
|
|
len = 0;
|
|
}
|
|
else {
|
|
NS_ERROR(PR_ErrorToName(PR_GetError()));
|
|
}
|
|
|
|
if (0 < len) {
|
|
buf[len] = '\0';
|
|
if (isStdout)
|
|
mStdout += buf;
|
|
else
|
|
mStderr += buf;
|
|
}
|
|
else if (isStdout) {
|
|
stdoutOpen = false;
|
|
}
|
|
else {
|
|
stderrOpen = false;
|
|
}
|
|
}
|
|
|
|
now = PR_IntervalNow();
|
|
}
|
|
|
|
if (stdoutOpen)
|
|
fputs("(stdout still open!)\n", stderr);
|
|
if (stderrOpen)
|
|
fputs("(stderr still open!)\n", stderr);
|
|
if (now > deadline)
|
|
fputs("(timed out!)\n", stderr);
|
|
|
|
Finish(!stdoutOpen && !stderrOpen && now <= deadline);
|
|
}
|
|
|
|
private:
|
|
void Finish(bool normalExit) {
|
|
if (!normalExit) {
|
|
PR_KillProcess(mProc);
|
|
mExitCode = -1;
|
|
PRInt32 dummy;
|
|
PR_WaitProcess(mProc, &dummy);
|
|
}
|
|
else {
|
|
PR_WaitProcess(mProc, &mExitCode); // this had better not block ...
|
|
}
|
|
|
|
PR_Close(mStdoutfd);
|
|
PR_Close(mStderrfd);
|
|
}
|
|
|
|
PRProcess* mProc;
|
|
PRFileDesc* mStdinfd; // writeable
|
|
PRFileDesc* mStdoutfd; // readable
|
|
PRFileDesc* mStderrfd; // readable
|
|
};
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// Harness for checking detector errors
|
|
bool
|
|
CheckForDeadlock(const char* test, const char* const* findTokens)
|
|
{
|
|
Subprocess proc(test);
|
|
proc.RunToCompletion(5000);
|
|
|
|
if (0 == proc.mExitCode)
|
|
return false;
|
|
|
|
PRInt32 idx = 0;
|
|
for (const char* const* tp = findTokens; *tp; ++tp) {
|
|
const char* const token = *tp;
|
|
#ifdef MOZILLA_INTERNAL_API
|
|
idx = proc.mStderr.Find(token, false, idx);
|
|
#else
|
|
nsCString tokenCString(token);
|
|
idx = proc.mStderr.Find(tokenCString, idx);
|
|
#endif
|
|
if (-1 == idx) {
|
|
printf("(missed token '%s' in output)\n", token);
|
|
puts("----------------------------------\n");
|
|
puts(proc.mStderr.get());
|
|
puts("----------------------------------\n");
|
|
return false;
|
|
}
|
|
idx += strlen(token);
|
|
}
|
|
|
|
return true;
|
|
}
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// Single-threaded sanity tests
|
|
|
|
// Stupidest possible deadlock.
|
|
nsresult
|
|
Sanity_Child()
|
|
{
|
|
mozilla::Mutex m1("dd.sanity.m1");
|
|
m1.Lock();
|
|
m1.Lock();
|
|
return 0; // not reached
|
|
}
|
|
|
|
nsresult
|
|
Sanity()
|
|
{
|
|
const char* const tokens[] = {
|
|
"###!!! ERROR: Potential deadlock detected",
|
|
"=== Cyclical dependency starts at\n--- Mutex : dd.sanity.m1",
|
|
"=== Cycle completed at\n--- Mutex : dd.sanity.m1",
|
|
"###!!! Deadlock may happen NOW!", // better catch these easy cases...
|
|
"###!!! ASSERTION: Potential deadlock detected",
|
|
0
|
|
};
|
|
if (CheckForDeadlock("Sanity", tokens)) {
|
|
PASS();
|
|
} else {
|
|
FAIL("deadlock not detected");
|
|
}
|
|
}
|
|
|
|
// Slightly less stupid deadlock.
|
|
nsresult
|
|
Sanity2_Child()
|
|
{
|
|
mozilla::Mutex m1("dd.sanity2.m1");
|
|
mozilla::Mutex m2("dd.sanity2.m2");
|
|
m1.Lock();
|
|
m2.Lock();
|
|
m1.Lock();
|
|
return 0; // not reached
|
|
}
|
|
|
|
nsresult
|
|
Sanity2()
|
|
{
|
|
const char* const tokens[] = {
|
|
"###!!! ERROR: Potential deadlock detected",
|
|
"=== Cyclical dependency starts at\n--- Mutex : dd.sanity2.m1",
|
|
"--- Next dependency:\n--- Mutex : dd.sanity2.m2",
|
|
"=== Cycle completed at\n--- Mutex : dd.sanity2.m1",
|
|
"###!!! Deadlock may happen NOW!", // better catch these easy cases...
|
|
"###!!! ASSERTION: Potential deadlock detected",
|
|
0
|
|
};
|
|
if (CheckForDeadlock("Sanity2", tokens)) {
|
|
PASS();
|
|
} else {
|
|
FAIL("deadlock not detected");
|
|
}
|
|
}
|
|
|
|
|
|
nsresult
|
|
Sanity3_Child()
|
|
{
|
|
mozilla::Mutex m1("dd.sanity3.m1");
|
|
mozilla::Mutex m2("dd.sanity3.m2");
|
|
mozilla::Mutex m3("dd.sanity3.m3");
|
|
mozilla::Mutex m4("dd.sanity3.m4");
|
|
|
|
m1.Lock();
|
|
m2.Lock();
|
|
m3.Lock();
|
|
m4.Lock();
|
|
m4.Unlock();
|
|
m3.Unlock();
|
|
m2.Unlock();
|
|
m1.Unlock();
|
|
|
|
m4.Lock();
|
|
m1.Lock();
|
|
return 0;
|
|
}
|
|
|
|
nsresult
|
|
Sanity3()
|
|
{
|
|
const char* const tokens[] = {
|
|
"###!!! ERROR: Potential deadlock detected",
|
|
"=== Cyclical dependency starts at\n--- Mutex : dd.sanity3.m1",
|
|
"--- Next dependency:\n--- Mutex : dd.sanity3.m2",
|
|
"--- Next dependency:\n--- Mutex : dd.sanity3.m3",
|
|
"--- Next dependency:\n--- Mutex : dd.sanity3.m4",
|
|
"=== Cycle completed at\n--- Mutex : dd.sanity3.m1",
|
|
"###!!! ASSERTION: Potential deadlock detected",
|
|
0
|
|
};
|
|
if (CheckForDeadlock("Sanity3", tokens)) {
|
|
PASS();
|
|
} else {
|
|
FAIL("deadlock not detected");
|
|
}
|
|
}
|
|
|
|
|
|
nsresult
|
|
Sanity4_Child()
|
|
{
|
|
mozilla::ReentrantMonitor m1("dd.sanity4.m1");
|
|
mozilla::Mutex m2("dd.sanity4.m2");
|
|
m1.Enter();
|
|
m2.Lock();
|
|
m1.Enter();
|
|
return 0;
|
|
}
|
|
|
|
nsresult
|
|
Sanity4()
|
|
{
|
|
const char* const tokens[] = {
|
|
"Re-entering ReentrantMonitor after acquiring other resources",
|
|
"###!!! ERROR: Potential deadlock detected",
|
|
"=== Cyclical dependency starts at\n--- ReentrantMonitor : dd.sanity4.m1",
|
|
"--- Next dependency:\n--- Mutex : dd.sanity4.m2",
|
|
"=== Cycle completed at\n--- ReentrantMonitor : dd.sanity4.m1",
|
|
"###!!! ASSERTION: Potential deadlock detected",
|
|
0
|
|
};
|
|
if (CheckForDeadlock("Sanity4", tokens)) {
|
|
PASS();
|
|
} else {
|
|
FAIL("deadlock not detected");
|
|
}
|
|
}
|
|
|
|
//-----------------------------------------------------------------------------
|
|
// Multithreaded tests
|
|
|
|
mozilla::Mutex* ttM1;
|
|
mozilla::Mutex* ttM2;
|
|
|
|
static void
|
|
TwoThreads_thread(void* arg)
|
|
{
|
|
PRInt32 m1First = NS_PTR_TO_INT32(arg);
|
|
if (m1First) {
|
|
ttM1->Lock();
|
|
ttM2->Lock();
|
|
ttM2->Unlock();
|
|
ttM1->Unlock();
|
|
}
|
|
else {
|
|
ttM2->Lock();
|
|
ttM1->Lock();
|
|
ttM1->Unlock();
|
|
ttM2->Unlock();
|
|
}
|
|
}
|
|
|
|
nsresult
|
|
TwoThreads_Child()
|
|
{
|
|
ttM1 = new mozilla::Mutex("dd.twothreads.m1");
|
|
ttM2 = new mozilla::Mutex("dd.twothreads.m2");
|
|
if (!ttM1 || !ttM2)
|
|
NS_RUNTIMEABORT("couldn't allocate mutexes");
|
|
|
|
PRThread* t1 = spawn(TwoThreads_thread, (void*) 0);
|
|
PR_JoinThread(t1);
|
|
|
|
PRThread* t2 = spawn(TwoThreads_thread, (void*) 1);
|
|
PR_JoinThread(t2);
|
|
|
|
return 0;
|
|
}
|
|
|
|
nsresult
|
|
TwoThreads()
|
|
{
|
|
const char* const tokens[] = {
|
|
"###!!! ERROR: Potential deadlock detected",
|
|
"=== Cyclical dependency starts at\n--- Mutex : dd.twothreads.m2",
|
|
"--- Next dependency:\n--- Mutex : dd.twothreads.m1",
|
|
"=== Cycle completed at\n--- Mutex : dd.twothreads.m2",
|
|
"###!!! ASSERTION: Potential deadlock detected",
|
|
0
|
|
};
|
|
|
|
if (CheckForDeadlock("TwoThreads", tokens)) {
|
|
PASS();
|
|
} else {
|
|
FAIL("deadlock not detected");
|
|
}
|
|
}
|
|
|
|
|
|
mozilla::Mutex* cndMs[4];
|
|
const PRUint32 K = 100000;
|
|
|
|
static void
|
|
ContentionNoDeadlock_thread(void* arg)
|
|
{
|
|
PRInt32 starti = NS_PTR_TO_INT32(arg);
|
|
|
|
for (PRUint32 k = 0; k < K; ++k) {
|
|
for (PRInt32 i = starti; i < (PRInt32) ArrayLength(cndMs); ++i)
|
|
cndMs[i]->Lock();
|
|
// comment out the next two lines for deadlocking fun!
|
|
for (PRInt32 i = ArrayLength(cndMs) - 1; i >= starti; --i)
|
|
cndMs[i]->Unlock();
|
|
|
|
starti = (starti + 1) % 3;
|
|
}
|
|
}
|
|
|
|
nsresult
|
|
ContentionNoDeadlock_Child()
|
|
{
|
|
PRThread* threads[3];
|
|
|
|
for (PRUint32 i = 0; i < ArrayLength(cndMs); ++i)
|
|
cndMs[i] = new mozilla::Mutex("dd.cnd.ms");
|
|
|
|
for (PRInt32 i = 0; i < (PRInt32) ArrayLength(threads); ++i)
|
|
threads[i] = spawn(ContentionNoDeadlock_thread, NS_INT32_TO_PTR(i));
|
|
|
|
for (PRUint32 i = 0; i < ArrayLength(threads); ++i)
|
|
PR_JoinThread(threads[i]);
|
|
|
|
for (PRUint32 i = 0; i < ArrayLength(cndMs); ++i)
|
|
delete cndMs[i];
|
|
|
|
return 0;
|
|
}
|
|
|
|
nsresult
|
|
ContentionNoDeadlock()
|
|
{
|
|
const char * func = __func__;
|
|
Subprocess proc(func);
|
|
proc.RunToCompletion(60000);
|
|
if (0 != proc.mExitCode) {
|
|
printf("(expected 0 == return code, got %d)\n", proc.mExitCode);
|
|
puts("(output)\n----------------------------------\n");
|
|
puts(proc.mStdout.get());
|
|
puts("----------------------------------\n");
|
|
puts("(error output)\n----------------------------------\n");
|
|
puts(proc.mStderr.get());
|
|
puts("----------------------------------\n");
|
|
|
|
FAIL("deadlock");
|
|
}
|
|
PASS();
|
|
}
|
|
|
|
|
|
|
|
//-----------------------------------------------------------------------------
|
|
|
|
int
|
|
main(int argc, char** argv)
|
|
{
|
|
if (1 < argc) {
|
|
// XXX can we run w/o scoped XPCOM?
|
|
const char* test = argv[1];
|
|
ScopedXPCOM xpcom(test);
|
|
if (xpcom.failed())
|
|
return 1;
|
|
|
|
// running in a spawned process. call the specificed child function.
|
|
if (!strcmp("Sanity", test))
|
|
return Sanity_Child();
|
|
if (!strcmp("Sanity2", test))
|
|
return Sanity2_Child();
|
|
if (!strcmp("Sanity3", test))
|
|
return Sanity3_Child();
|
|
if (!strcmp("Sanity4", test))
|
|
return Sanity4_Child();
|
|
|
|
if (!strcmp("TwoThreads", test))
|
|
return TwoThreads_Child();
|
|
if (!strcmp("ContentionNoDeadlock", test))
|
|
return ContentionNoDeadlock_Child();
|
|
|
|
FAIL("unknown child test");
|
|
}
|
|
|
|
ScopedXPCOM xpcom("XPCOM deadlock detector correctness (" __FILE__ ")");
|
|
if (xpcom.failed())
|
|
return 1;
|
|
|
|
// in the first invocation of this process. we will be the "driver".
|
|
int rv = 0;
|
|
|
|
sPathToThisBinary = argv[0];
|
|
|
|
if (NS_FAILED(Sanity()))
|
|
rv = 1;
|
|
if (NS_FAILED(Sanity2()))
|
|
rv = 1;
|
|
if (NS_FAILED(Sanity3()))
|
|
rv = 1;
|
|
if (NS_FAILED(Sanity4()))
|
|
rv = 1;
|
|
|
|
if (NS_FAILED(TwoThreads()))
|
|
rv = 1;
|
|
if (NS_FAILED(ContentionNoDeadlock()))
|
|
rv = 1;
|
|
|
|
return rv;
|
|
}
|