1 
2 /* Do stupid things with semaphores, and check that Thrcheck doesn't
3    fall over and does report errors appropriately.  If nothing else
4    this just checks that the relevant functions are getting
5    intercepted. */
6 
7 /* This is pretty lame, because making the sem_ functions fail is
8    difficult.  Not sure it's really worth having. */
9 #include <unistd.h>
10 #include <stdio.h>
11 #include <stdlib.h>
12 #include <assert.h>
13 #include <pthread.h>
14 #include <semaphore.h>
15 #include <string.h>
16 void start_watchdog ( void );
main(void)17 int main ( void )
18 {
19   int r __attribute__((unused));
20   sem_t s1;
21   start_watchdog();
22   /* Do sem_init with huge initial count */
23   r= sem_init(&s1, 0, ~0);
24 
25   /* initialise properly */
26   r= sem_init(&s1, 0, 0);
27 
28   /* in glibc, sem_destroy is a no-op; making it fail is
29      impossible. */
30 
31   /* Do 'wait' on a bogus semaphore.  This should fail, but on glibc
32      it succeeds. */
33   memset(&s1, 0x55, sizeof(s1));
34   r= sem_wait(&s1); /* assert(r != 0); */
35 
36   /* this only fails with glibc 2.7 and later. */
37   r= sem_post(&s1);
38 
39   sem_destroy(&s1);
40 
41   return 0;
42 }
43 
watchdog(void * v)44 void* watchdog ( void* v )
45 {
46   sleep(10);
47   fprintf(stderr, "watchdog timer expired - not a good sign\n");
48   exit(0);
49 }
50 
start_watchdog(void)51 void start_watchdog ( void )
52 {
53   pthread_t t;
54   int r;
55   r= pthread_create(&t, NULL, watchdog, NULL);
56   assert(!r);
57 }
58