summaryrefslogtreecommitdiffstats
path: root/test/threadstest.c
diff options
context:
space:
mode:
authorPauli <pauli@openssl.org>2022-01-12 04:22:29 +0100
committerPauli <pauli@openssl.org>2022-01-13 11:46:34 +0100
commit3d4d5305c292f5db62b4abf732f6682b2ada6f44 (patch)
tree73856b245ddffb6a91a1857ff8e3c8332952cff3 /test/threadstest.c
parentdrbg: add handling for cases where TSAN isn't available (diff)
downloadopenssl-3d4d5305c292f5db62b4abf732f6682b2ada6f44.tar.xz
openssl-3d4d5305c292f5db62b4abf732f6682b2ada6f44.zip
threadstest: use locking for tsan operations if required
Not all platforms support tsan operations, those that don't need to have an alternative locking path. Fixes #17447 Reviewed-by: Bernd Edlinger <bernd.edlinger@hotmail.de> (Merged from https://github.com/openssl/openssl/pull/17479)
Diffstat (limited to 'test/threadstest.c')
-rw-r--r--test/threadstest.c28
1 files changed, 26 insertions, 2 deletions
diff --git a/test/threadstest.c b/test/threadstest.c
index 8e6aaf5404..b529517723 100644
--- a/test/threadstest.c
+++ b/test/threadstest.c
@@ -44,7 +44,11 @@ static const char *default_provider[] = { "default", NULL };
static const char *fips_provider[] = { "fips", NULL };
static const char *fips_and_default_providers[] = { "default", "fips", NULL };
-/* Grab a globally unique integer value */
+#ifdef TSAN_REQUIRES_LOCKING
+static CRYPTO_RWLOCK *tsan_lock;
+#endif
+
+/* Grab a globally unique integer value, return 0 on failure */
static int get_new_uid(void)
{
/*
@@ -52,8 +56,19 @@ static int get_new_uid(void)
* we generate a new OID.
*/
static TSAN_QUALIFIER int current_uid = 1 << (sizeof(int) * 8 - 2);
+#ifdef TSAN_REQUIRES_LOCKING
+ int r;
+
+ if (!TEST_true(CRYPTO_THREAD_write_lock(tsan_lock)))
+ return 0;
+ r = ++current_uid;
+ if (!TEST_true(CRYPTO_THREAD_unlock(tsan_lock)))
+ return 0;
+ return r;
+#else
return tsan_counter(&current_uid);
+#endif
}
static int test_lock(void)
@@ -626,7 +641,8 @@ static void test_obj_create_one(void)
BIO_snprintf(oid, sizeof(oid), "1.3.6.1.4.1.16604.%s", tids);
BIO_snprintf(sn, sizeof(sn), "short-name-%s", tids);
BIO_snprintf(ln, sizeof(ln), "long-name-%s", tids);
- if (!TEST_true(id = OBJ_create(oid, sn, ln))
+ if (!TEST_int_ne(id, 0)
+ || !TEST_true(id = OBJ_create(oid, sn, ln))
|| !TEST_true(OBJ_add_sigid(id, NID_sha3_256, NID_rsa)))
multi_success = 0;
}
@@ -684,6 +700,11 @@ int setup_tests(void)
if (!TEST_ptr(privkey))
return 0;
+#ifdef TSAN_REQUIRES_LOCKING
+ if (!TEST_ptr(tsan_lock = CRYPTO_THREAD_lock_new()))
+ return 0;
+#endif
+
/* Keep first to validate auto creation of default library context */
ADD_TEST(test_multi_default);
@@ -707,4 +728,7 @@ int setup_tests(void)
void cleanup_tests(void)
{
OPENSSL_free(privkey);
+#ifdef TSAN_REQUIRES_LOCKING
+ CRYPTO_THREAD_lock_free(tsan_lock);
+#endif
}