1 //===-- asan_thread.cc ----------------------------------------------------===//
2 //
3 // The LLVM Compiler Infrastructure
4 //
5 // This file is distributed under the University of Illinois Open Source
6 // License. See LICENSE.TXT for details.
7 //
8 //===----------------------------------------------------------------------===//
9 //
10 // This file is a part of AddressSanitizer, an address sanity checker.
11 //
12 // Thread-related code.
13 //===----------------------------------------------------------------------===//
14 #include "asan_allocator.h"
15 #include "asan_interceptors.h"
16 #include "asan_poisoning.h"
17 #include "asan_stack.h"
18 #include "asan_thread.h"
19 #include "asan_mapping.h"
20 #include "sanitizer_common/sanitizer_common.h"
21 #include "sanitizer_common/sanitizer_placement_new.h"
22 #include "lsan/lsan_common.h"
23
24 namespace __asan {
25
26 // AsanThreadContext implementation.
27
OnCreated(void * arg)28 void AsanThreadContext::OnCreated(void *arg) {
29 CreateThreadContextArgs *args = static_cast<CreateThreadContextArgs*>(arg);
30 if (args->stack) {
31 internal_memcpy(&stack, args->stack, sizeof(stack));
32 }
33 thread = args->thread;
34 thread->set_context(this);
35 }
36
OnFinished()37 void AsanThreadContext::OnFinished() {
38 // Drop the link to the AsanThread object.
39 thread = 0;
40 }
41
42 // MIPS requires aligned address
43 static ALIGNED(16) char thread_registry_placeholder[sizeof(ThreadRegistry)];
44 static ThreadRegistry *asan_thread_registry;
45
GetAsanThreadContext(u32 tid)46 static ThreadContextBase *GetAsanThreadContext(u32 tid) {
47 void *mem = MmapOrDie(sizeof(AsanThreadContext), "AsanThreadContext");
48 return new(mem) AsanThreadContext(tid);
49 }
50
asanThreadRegistry()51 ThreadRegistry &asanThreadRegistry() {
52 static bool initialized;
53 // Don't worry about thread_safety - this should be called when there is
54 // a single thread.
55 if (!initialized) {
56 // Never reuse ASan threads: we store pointer to AsanThreadContext
57 // in TSD and can't reliably tell when no more TSD destructors will
58 // be called. It would be wrong to reuse AsanThreadContext for another
59 // thread before all TSD destructors will be called for it.
60 asan_thread_registry = new(thread_registry_placeholder) ThreadRegistry(
61 GetAsanThreadContext, kMaxNumberOfThreads, kMaxNumberOfThreads);
62 initialized = true;
63 }
64 return *asan_thread_registry;
65 }
66
GetThreadContextByTidLocked(u32 tid)67 AsanThreadContext *GetThreadContextByTidLocked(u32 tid) {
68 return static_cast<AsanThreadContext *>(
69 asanThreadRegistry().GetThreadLocked(tid));
70 }
71
72 // AsanThread implementation.
73
Create(thread_callback_t start_routine,void * arg)74 AsanThread *AsanThread::Create(thread_callback_t start_routine,
75 void *arg) {
76 uptr PageSize = GetPageSizeCached();
77 uptr size = RoundUpTo(sizeof(AsanThread), PageSize);
78 AsanThread *thread = (AsanThread*)MmapOrDie(size, __FUNCTION__);
79 thread->start_routine_ = start_routine;
80 thread->arg_ = arg;
81 thread->context_ = 0;
82
83 return thread;
84 }
85
TSDDtor(void * tsd)86 void AsanThread::TSDDtor(void *tsd) {
87 AsanThreadContext *context = (AsanThreadContext*)tsd;
88 if (flags()->verbosity >= 1)
89 Report("T%d TSDDtor\n", context->tid);
90 if (context->thread)
91 context->thread->Destroy();
92 }
93
Destroy()94 void AsanThread::Destroy() {
95 if (flags()->verbosity >= 1) {
96 Report("T%d exited\n", tid());
97 }
98
99 asanThreadRegistry().FinishThread(tid());
100 FlushToAccumulatedStats(&stats_);
101 // We also clear the shadow on thread destruction because
102 // some code may still be executing in later TSD destructors
103 // and we don't want it to have any poisoned stack.
104 ClearShadowForThreadStackAndTLS();
105 DeleteFakeStack();
106 uptr size = RoundUpTo(sizeof(AsanThread), GetPageSizeCached());
107 UnmapOrDie(this, size);
108 }
109
Init()110 void AsanThread::Init() {
111 SetThreadStackAndTls();
112 CHECK(AddrIsInMem(stack_bottom_));
113 CHECK(AddrIsInMem(stack_top_ - 1));
114 ClearShadowForThreadStackAndTLS();
115 if (flags()->verbosity >= 1) {
116 int local = 0;
117 Report("T%d: stack [%p,%p) size 0x%zx; local=%p\n",
118 tid(), (void*)stack_bottom_, (void*)stack_top_,
119 stack_top_ - stack_bottom_, &local);
120 }
121 fake_stack_ = 0; // Will be initialized lazily if needed.
122 AsanPlatformThreadInit();
123 }
124
ThreadStart(uptr os_id)125 thread_return_t AsanThread::ThreadStart(uptr os_id) {
126 Init();
127 asanThreadRegistry().StartThread(tid(), os_id, 0);
128 if (flags()->use_sigaltstack) SetAlternateSignalStack();
129
130 if (!start_routine_) {
131 // start_routine_ == 0 if we're on the main thread or on one of the
132 // OS X libdispatch worker threads. But nobody is supposed to call
133 // ThreadStart() for the worker threads.
134 CHECK_EQ(tid(), 0);
135 return 0;
136 }
137
138 thread_return_t res = start_routine_(arg_);
139 malloc_storage().CommitBack();
140 if (flags()->use_sigaltstack) UnsetAlternateSignalStack();
141
142 this->Destroy();
143
144 return res;
145 }
146
SetThreadStackAndTls()147 void AsanThread::SetThreadStackAndTls() {
148 uptr stack_size = 0, tls_size = 0;
149 GetThreadStackAndTls(tid() == 0, &stack_bottom_, &stack_size, &tls_begin_,
150 &tls_size);
151 stack_top_ = stack_bottom_ + stack_size;
152 tls_end_ = tls_begin_ + tls_size;
153
154 int local;
155 CHECK(AddrIsInStack((uptr)&local));
156 }
157
ClearShadowForThreadStackAndTLS()158 void AsanThread::ClearShadowForThreadStackAndTLS() {
159 PoisonShadow(stack_bottom_, stack_top_ - stack_bottom_, 0);
160 if (tls_begin_ != tls_end_)
161 PoisonShadow(tls_begin_, tls_end_ - tls_begin_, 0);
162 }
163
GetFrameNameByAddr(uptr addr,uptr * offset,uptr * frame_pc)164 const char *AsanThread::GetFrameNameByAddr(uptr addr, uptr *offset,
165 uptr *frame_pc) {
166 uptr bottom = 0;
167 if (AddrIsInStack(addr)) {
168 bottom = stack_bottom();
169 } else if (fake_stack()) {
170 bottom = fake_stack()->AddrIsInFakeStack(addr);
171 CHECK(bottom);
172 *offset = addr - bottom;
173 *frame_pc = ((uptr*)bottom)[2];
174 return (const char *)((uptr*)bottom)[1];
175 }
176 uptr aligned_addr = addr & ~(SANITIZER_WORDSIZE/8 - 1); // align addr.
177 u8 *shadow_ptr = (u8*)MemToShadow(aligned_addr);
178 u8 *shadow_bottom = (u8*)MemToShadow(bottom);
179
180 while (shadow_ptr >= shadow_bottom &&
181 *shadow_ptr != kAsanStackLeftRedzoneMagic) {
182 shadow_ptr--;
183 }
184
185 while (shadow_ptr >= shadow_bottom &&
186 *shadow_ptr == kAsanStackLeftRedzoneMagic) {
187 shadow_ptr--;
188 }
189
190 if (shadow_ptr < shadow_bottom) {
191 *offset = 0;
192 return "UNKNOWN";
193 }
194
195 uptr* ptr = (uptr*)SHADOW_TO_MEM((uptr)(shadow_ptr + 1));
196 CHECK(ptr[0] == kCurrentStackFrameMagic);
197 *offset = addr - (uptr)ptr;
198 *frame_pc = ptr[2];
199 return (const char*)ptr[1];
200 }
201
ThreadStackContainsAddress(ThreadContextBase * tctx_base,void * addr)202 static bool ThreadStackContainsAddress(ThreadContextBase *tctx_base,
203 void *addr) {
204 AsanThreadContext *tctx = static_cast<AsanThreadContext*>(tctx_base);
205 AsanThread *t = tctx->thread;
206 if (!t) return false;
207 if (t->AddrIsInStack((uptr)addr)) return true;
208 if (t->fake_stack() && t->fake_stack()->AddrIsInFakeStack((uptr)addr))
209 return true;
210 return false;
211 }
212
GetCurrentThread()213 AsanThread *GetCurrentThread() {
214 AsanThreadContext *context =
215 reinterpret_cast<AsanThreadContext *>(AsanTSDGet());
216 if (!context) {
217 if (SANITIZER_ANDROID) {
218 // On Android, libc constructor is called _after_ asan_init, and cleans up
219 // TSD. Try to figure out if this is still the main thread by the stack
220 // address. We are not entirely sure that we have correct main thread
221 // limits, so only do this magic on Android, and only if the found thread
222 // is the main thread.
223 AsanThreadContext *tctx = GetThreadContextByTidLocked(0);
224 if (ThreadStackContainsAddress(tctx, &context)) {
225 SetCurrentThread(tctx->thread);
226 return tctx->thread;
227 }
228 }
229 return 0;
230 }
231 return context->thread;
232 }
233
SetCurrentThread(AsanThread * t)234 void SetCurrentThread(AsanThread *t) {
235 CHECK(t->context());
236 if (flags()->verbosity >= 2) {
237 Report("SetCurrentThread: %p for thread %p\n",
238 t->context(), (void*)GetThreadSelf());
239 }
240 // Make sure we do not reset the current AsanThread.
241 CHECK_EQ(0, AsanTSDGet());
242 AsanTSDSet(t->context());
243 CHECK_EQ(t->context(), AsanTSDGet());
244 }
245
GetCurrentTidOrInvalid()246 u32 GetCurrentTidOrInvalid() {
247 AsanThread *t = GetCurrentThread();
248 return t ? t->tid() : kInvalidTid;
249 }
250
FindThreadByStackAddress(uptr addr)251 AsanThread *FindThreadByStackAddress(uptr addr) {
252 asanThreadRegistry().CheckLocked();
253 AsanThreadContext *tctx = static_cast<AsanThreadContext *>(
254 asanThreadRegistry().FindThreadContextLocked(ThreadStackContainsAddress,
255 (void *)addr));
256 return tctx ? tctx->thread : 0;
257 }
258
EnsureMainThreadIDIsCorrect()259 void EnsureMainThreadIDIsCorrect() {
260 AsanThreadContext *context =
261 reinterpret_cast<AsanThreadContext *>(AsanTSDGet());
262 if (context && (context->tid == 0))
263 context->os_id = GetTid();
264 }
265 } // namespace __asan
266
267 // --- Implementation of LSan-specific functions --- {{{1
268 namespace __lsan {
GetThreadRangesLocked(uptr os_id,uptr * stack_begin,uptr * stack_end,uptr * tls_begin,uptr * tls_end,uptr * cache_begin,uptr * cache_end)269 bool GetThreadRangesLocked(uptr os_id, uptr *stack_begin, uptr *stack_end,
270 uptr *tls_begin, uptr *tls_end,
271 uptr *cache_begin, uptr *cache_end) {
272 __asan::AsanThreadContext *context = static_cast<__asan::AsanThreadContext *>(
273 __asan::asanThreadRegistry().FindThreadContextByOsIDLocked(os_id));
274 if (!context) return false;
275 __asan::AsanThread *t = context->thread;
276 if (!t) return false;
277 *stack_begin = t->stack_bottom();
278 *stack_end = t->stack_top();
279 *tls_begin = t->tls_begin();
280 *tls_end = t->tls_end();
281 // ASan doesn't keep allocator caches in TLS, so these are unused.
282 *cache_begin = 0;
283 *cache_end = 0;
284 return true;
285 }
286
LockThreadRegistry()287 void LockThreadRegistry() {
288 __asan::asanThreadRegistry().Lock();
289 }
290
UnlockThreadRegistry()291 void UnlockThreadRegistry() {
292 __asan::asanThreadRegistry().Unlock();
293 }
294
EnsureMainThreadIDIsCorrect()295 void EnsureMainThreadIDIsCorrect() {
296 __asan::EnsureMainThreadIDIsCorrect();
297 }
298 } // namespace __lsan
299