Alexey Samsonov | 485d3dc | 2012-06-04 13:50:10 +0000 | [diff] [blame] | 1 | //===-- asan_thread.cc ----------------------------------------------------===// |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 2 | // |
| 3 | // The LLVM Compiler Infrastructure |
| 4 | // |
| 5 | // This file is distributed under the University of Illinois Open Source |
| 6 | // License. See LICENSE.TXT for details. |
| 7 | // |
| 8 | //===----------------------------------------------------------------------===// |
| 9 | // |
| 10 | // This file is a part of AddressSanitizer, an address sanity checker. |
| 11 | // |
| 12 | // Thread-related code. |
| 13 | //===----------------------------------------------------------------------===// |
| 14 | #include "asan_allocator.h" |
| 15 | #include "asan_interceptors.h" |
Alexey Samsonov | a88c60b | 2013-03-28 15:42:43 +0000 | [diff] [blame] | 16 | #include "asan_poisoning.h" |
Alexey Samsonov | 2d3a67b | 2012-01-17 06:35:31 +0000 | [diff] [blame] | 17 | #include "asan_stack.h" |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 18 | #include "asan_thread.h" |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 19 | #include "asan_mapping.h" |
Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 20 | #include "sanitizer_common/sanitizer_common.h" |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 21 | #include "sanitizer_common/sanitizer_placement_new.h" |
Kostya Serebryany | 9628839 | 2013-10-18 14:50:44 +0000 | [diff] [blame] | 22 | #include "sanitizer_common/sanitizer_stackdepot.h" |
Sergey Matveev | 65dd62a | 2013-05-21 13:40:13 +0000 | [diff] [blame] | 23 | #include "lsan/lsan_common.h" |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 24 | |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 25 | namespace __asan { |
| 26 | |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 27 | // AsanThreadContext implementation. |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 28 | |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 29 | void AsanThreadContext::OnCreated(void *arg) { |
| 30 | CreateThreadContextArgs *args = static_cast<CreateThreadContextArgs*>(arg); |
Kostya Serebryany | 9628839 | 2013-10-18 14:50:44 +0000 | [diff] [blame] | 31 | if (args->stack) |
| 32 | stack_id = StackDepotPut(args->stack->trace, args->stack->size); |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 33 | thread = args->thread; |
| 34 | thread->set_context(this); |
| 35 | } |
| 36 | |
| 37 | void AsanThreadContext::OnFinished() { |
| 38 | // Drop the link to the AsanThread object. |
| 39 | thread = 0; |
| 40 | } |
| 41 | |
Kostya Serebryany | c1aa0e8 | 2013-06-03 14:49:25 +0000 | [diff] [blame] | 42 | // MIPS requires aligned address |
Timur Iskhodzhanov | baf90cc | 2013-06-04 08:25:17 +0000 | [diff] [blame] | 43 | static ALIGNED(16) char thread_registry_placeholder[sizeof(ThreadRegistry)]; |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 44 | static ThreadRegistry *asan_thread_registry; |
| 45 | |
Kostya Serebryany | f11e485 | 2013-10-18 15:07:07 +0000 | [diff] [blame] | 46 | static BlockingMutex mu_for_thread_context(LINKER_INITIALIZED); |
| 47 | static LowLevelAllocator allocator_for_thread_context; |
| 48 | |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 49 | static ThreadContextBase *GetAsanThreadContext(u32 tid) { |
Kostya Serebryany | f11e485 | 2013-10-18 15:07:07 +0000 | [diff] [blame] | 50 | BlockingMutexLock lock(&mu_for_thread_context); |
Peter Collingbourne | 50cb32e | 2013-10-24 06:23:39 +0000 | [diff] [blame] | 51 | return new(allocator_for_thread_context) AsanThreadContext(tid); |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 52 | } |
| 53 | |
| 54 | ThreadRegistry &asanThreadRegistry() { |
| 55 | static bool initialized; |
| 56 | // Don't worry about thread_safety - this should be called when there is |
| 57 | // a single thread. |
| 58 | if (!initialized) { |
| 59 | // Never reuse ASan threads: we store pointer to AsanThreadContext |
| 60 | // in TSD and can't reliably tell when no more TSD destructors will |
| 61 | // be called. It would be wrong to reuse AsanThreadContext for another |
| 62 | // thread before all TSD destructors will be called for it. |
| 63 | asan_thread_registry = new(thread_registry_placeholder) ThreadRegistry( |
| 64 | GetAsanThreadContext, kMaxNumberOfThreads, kMaxNumberOfThreads); |
| 65 | initialized = true; |
| 66 | } |
| 67 | return *asan_thread_registry; |
| 68 | } |
| 69 | |
| 70 | AsanThreadContext *GetThreadContextByTidLocked(u32 tid) { |
| 71 | return static_cast<AsanThreadContext *>( |
| 72 | asanThreadRegistry().GetThreadLocked(tid)); |
| 73 | } |
| 74 | |
| 75 | // AsanThread implementation. |
| 76 | |
| 77 | AsanThread *AsanThread::Create(thread_callback_t start_routine, |
| 78 | void *arg) { |
Kostya Serebryany | f22c697 | 2012-11-23 15:38:49 +0000 | [diff] [blame] | 79 | uptr PageSize = GetPageSizeCached(); |
| 80 | uptr size = RoundUpTo(sizeof(AsanThread), PageSize); |
Alexey Samsonov | 40d5b77 | 2012-06-06 16:15:07 +0000 | [diff] [blame] | 81 | AsanThread *thread = (AsanThread*)MmapOrDie(size, __FUNCTION__); |
Alexey Samsonov | 2d3a67b | 2012-01-17 06:35:31 +0000 | [diff] [blame] | 82 | thread->start_routine_ = start_routine; |
| 83 | thread->arg_ = arg; |
Alexey Samsonov | 2d3a67b | 2012-01-17 06:35:31 +0000 | [diff] [blame] | 84 | |
| 85 | return thread; |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 86 | } |
| 87 | |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 88 | void AsanThread::TSDDtor(void *tsd) { |
| 89 | AsanThreadContext *context = (AsanThreadContext*)tsd; |
Sergey Matveev | 9be70fb | 2013-12-05 12:04:51 +0000 | [diff] [blame] | 90 | VReport(1, "T%d TSDDtor\n", context->tid); |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 91 | if (context->thread) |
| 92 | context->thread->Destroy(); |
Kostya Serebryany | b5eb5a7 | 2012-02-07 00:27:15 +0000 | [diff] [blame] | 93 | } |
| 94 | |
Kostya Serebryany | 3f4b9bb | 2012-01-06 19:44:11 +0000 | [diff] [blame] | 95 | void AsanThread::Destroy() { |
Kostya Serebryany | 7a3a93f | 2013-12-11 13:54:01 +0000 | [diff] [blame] | 96 | int tid = this->tid(); |
| 97 | VReport(1, "T%d exited\n", tid); |
Kostya Serebryany | b5eb5a7 | 2012-02-07 00:27:15 +0000 | [diff] [blame] | 98 | |
Kostya Serebryany | 04a1767 | 2013-11-13 13:27:44 +0000 | [diff] [blame] | 99 | malloc_storage().CommitBack(); |
| 100 | if (flags()->use_sigaltstack) UnsetAlternateSignalStack(); |
Kostya Serebryany | 7a3a93f | 2013-12-11 13:54:01 +0000 | [diff] [blame] | 101 | asanThreadRegistry().FinishThread(tid); |
Alexey Samsonov | 4b16885 | 2013-09-02 08:39:07 +0000 | [diff] [blame] | 102 | FlushToDeadThreadStats(&stats_); |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 103 | // We also clear the shadow on thread destruction because |
| 104 | // some code may still be executing in later TSD destructors |
| 105 | // and we don't want it to have any poisoned stack. |
Sergey Matveev | 09886cd | 2013-05-29 13:09:44 +0000 | [diff] [blame] | 106 | ClearShadowForThreadStackAndTLS(); |
Kostya Serebryany | 7a3a93f | 2013-12-11 13:54:01 +0000 | [diff] [blame] | 107 | DeleteFakeStack(tid); |
Kostya Serebryany | f22c697 | 2012-11-23 15:38:49 +0000 | [diff] [blame] | 108 | uptr size = RoundUpTo(sizeof(AsanThread), GetPageSizeCached()); |
Alexey Samsonov | 40d5b77 | 2012-06-06 16:15:07 +0000 | [diff] [blame] | 109 | UnmapOrDie(this, size); |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 110 | } |
| 111 | |
Kostya Serebryany | 628cda7 | 2013-09-12 08:34:50 +0000 | [diff] [blame] | 112 | // We want to create the FakeStack lazyly on the first use, but not eralier |
| 113 | // than the stack size is known and the procedure has to be async-signal safe. |
| 114 | FakeStack *AsanThread::AsyncSignalSafeLazyInitFakeStack() { |
| 115 | uptr stack_size = this->stack_size(); |
| 116 | if (stack_size == 0) // stack_size is not yet available, don't use FakeStack. |
| 117 | return 0; |
| 118 | uptr old_val = 0; |
| 119 | // fake_stack_ has 3 states: |
| 120 | // 0 -- not initialized |
| 121 | // 1 -- being initialized |
| 122 | // ptr -- initialized |
| 123 | // This CAS checks if the state was 0 and if so changes it to state 1, |
| 124 | // if that was successfull, it initilizes the pointer. |
| 125 | if (atomic_compare_exchange_strong( |
| 126 | reinterpret_cast<atomic_uintptr_t *>(&fake_stack_), &old_val, 1UL, |
Kostya Serebryany | 43c4493 | 2013-09-13 06:32:26 +0000 | [diff] [blame] | 127 | memory_order_relaxed)) { |
Kostya Serebryany | c3d43ca | 2013-09-18 10:35:12 +0000 | [diff] [blame] | 128 | uptr stack_size_log = Log2(RoundUpToPowerOfTwo(stack_size)); |
Kostya Serebryany | 1aedf6c | 2013-12-16 08:42:08 +0000 | [diff] [blame^] | 129 | CHECK_LE(flags()->min_uar_stack_size_log, flags()->max_uar_stack_size_log); |
| 130 | stack_size_log = |
| 131 | Min(stack_size_log, static_cast<uptr>(flags()->max_uar_stack_size_log)); |
| 132 | stack_size_log = |
| 133 | Max(stack_size_log, static_cast<uptr>(flags()->min_uar_stack_size_log)); |
Kostya Serebryany | c3d43ca | 2013-09-18 10:35:12 +0000 | [diff] [blame] | 134 | fake_stack_ = FakeStack::Create(stack_size_log); |
Kostya Serebryany | 43c4493 | 2013-09-13 06:32:26 +0000 | [diff] [blame] | 135 | SetTLSFakeStack(fake_stack_); |
| 136 | return fake_stack_; |
| 137 | } |
Kostya Serebryany | 628cda7 | 2013-09-12 08:34:50 +0000 | [diff] [blame] | 138 | return 0; |
| 139 | } |
| 140 | |
Kostya Serebryany | 6bb2f1d | 2011-12-16 19:13:35 +0000 | [diff] [blame] | 141 | void AsanThread::Init() { |
Sergey Matveev | 09886cd | 2013-05-29 13:09:44 +0000 | [diff] [blame] | 142 | SetThreadStackAndTls(); |
Alexey Samsonov | 2d3a67b | 2012-01-17 06:35:31 +0000 | [diff] [blame] | 143 | CHECK(AddrIsInMem(stack_bottom_)); |
Kostya Serebryany | 63c36bb | 2013-01-18 11:30:36 +0000 | [diff] [blame] | 144 | CHECK(AddrIsInMem(stack_top_ - 1)); |
Sergey Matveev | 09886cd | 2013-05-29 13:09:44 +0000 | [diff] [blame] | 145 | ClearShadowForThreadStackAndTLS(); |
Sergey Matveev | 9be70fb | 2013-12-05 12:04:51 +0000 | [diff] [blame] | 146 | int local = 0; |
| 147 | VReport(1, "T%d: stack [%p,%p) size 0x%zx; local=%p\n", tid(), |
| 148 | (void *)stack_bottom_, (void *)stack_top_, stack_top_ - stack_bottom_, |
| 149 | &local); |
Kostya Serebryany | 6a068a7 | 2013-06-26 12:16:05 +0000 | [diff] [blame] | 150 | fake_stack_ = 0; // Will be initialized lazily if needed. |
Alexander Potapenko | 51e6488 | 2012-07-23 14:07:58 +0000 | [diff] [blame] | 151 | AsanPlatformThreadInit(); |
Kostya Serebryany | 6bb2f1d | 2011-12-16 19:13:35 +0000 | [diff] [blame] | 152 | } |
| 153 | |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 154 | thread_return_t AsanThread::ThreadStart(uptr os_id) { |
Kostya Serebryany | 6bb2f1d | 2011-12-16 19:13:35 +0000 | [diff] [blame] | 155 | Init(); |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 156 | asanThreadRegistry().StartThread(tid(), os_id, 0); |
Alexey Samsonov | 34efb8e | 2012-07-09 14:36:04 +0000 | [diff] [blame] | 157 | if (flags()->use_sigaltstack) SetAlternateSignalStack(); |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 158 | |
| 159 | if (!start_routine_) { |
Kostya Serebryany | 8d03204 | 2012-05-31 14:35:53 +0000 | [diff] [blame] | 160 | // start_routine_ == 0 if we're on the main thread or on one of the |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 161 | // OS X libdispatch worker threads. But nobody is supposed to call |
| 162 | // ThreadStart() for the worker threads. |
Kostya Serebryany | 5b4267f | 2013-04-05 14:40:25 +0000 | [diff] [blame] | 163 | CHECK_EQ(tid(), 0); |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 164 | return 0; |
| 165 | } |
| 166 | |
Timur Iskhodzhanov | 0f9c9a5 | 2012-02-24 15:28:43 +0000 | [diff] [blame] | 167 | thread_return_t res = start_routine_(arg_); |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 168 | |
Sergey Matveev | da9f5e7 | 2013-10-14 12:01:05 +0000 | [diff] [blame] | 169 | // On POSIX systems we defer this to the TSD destructor. LSan will consider |
| 170 | // the thread's memory as non-live from the moment we call Destroy(), even |
| 171 | // though that memory might contain pointers to heap objects which will be |
| 172 | // cleaned up by a user-defined TSD destructor. Thus, calling Destroy() before |
| 173 | // the TSD destructors have run might cause false positives in LSan. |
| 174 | if (!SANITIZER_POSIX) |
| 175 | this->Destroy(); |
Kostya Serebryany | 332923b | 2012-01-11 02:03:16 +0000 | [diff] [blame] | 176 | |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 177 | return res; |
| 178 | } |
| 179 | |
Sergey Matveev | 09886cd | 2013-05-29 13:09:44 +0000 | [diff] [blame] | 180 | void AsanThread::SetThreadStackAndTls() { |
Kostya Serebryany | f8bbdfa | 2013-09-19 14:59:52 +0000 | [diff] [blame] | 181 | uptr tls_size = 0; |
| 182 | GetThreadStackAndTls(tid() == 0, &stack_bottom_, &stack_size_, &tls_begin_, |
Sergey Matveev | 09886cd | 2013-05-29 13:09:44 +0000 | [diff] [blame] | 183 | &tls_size); |
Kostya Serebryany | f8bbdfa | 2013-09-19 14:59:52 +0000 | [diff] [blame] | 184 | stack_top_ = stack_bottom_ + stack_size_; |
Sergey Matveev | 09886cd | 2013-05-29 13:09:44 +0000 | [diff] [blame] | 185 | tls_end_ = tls_begin_ + tls_size; |
| 186 | |
Alexey Samsonov | 4b1f103 | 2012-06-07 07:13:46 +0000 | [diff] [blame] | 187 | int local; |
| 188 | CHECK(AddrIsInStack((uptr)&local)); |
| 189 | } |
| 190 | |
Sergey Matveev | 09886cd | 2013-05-29 13:09:44 +0000 | [diff] [blame] | 191 | void AsanThread::ClearShadowForThreadStackAndTLS() { |
Alexey Samsonov | 2d3a67b | 2012-01-17 06:35:31 +0000 | [diff] [blame] | 192 | PoisonShadow(stack_bottom_, stack_top_ - stack_bottom_, 0); |
Sergey Matveev | 09886cd | 2013-05-29 13:09:44 +0000 | [diff] [blame] | 193 | if (tls_begin_ != tls_end_) |
| 194 | PoisonShadow(tls_begin_, tls_end_ - tls_begin_, 0); |
Alexey Samsonov | 2d3a67b | 2012-01-17 06:35:31 +0000 | [diff] [blame] | 195 | } |
| 196 | |
Kostya Serebryany | 667a34a | 2013-03-22 10:36:24 +0000 | [diff] [blame] | 197 | const char *AsanThread::GetFrameNameByAddr(uptr addr, uptr *offset, |
| 198 | uptr *frame_pc) { |
Kostya Serebryany | 8d03204 | 2012-05-31 14:35:53 +0000 | [diff] [blame] | 199 | uptr bottom = 0; |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 200 | if (AddrIsInStack(addr)) { |
| 201 | bottom = stack_bottom(); |
Kostya Serebryany | 736bd08 | 2013-09-12 08:43:44 +0000 | [diff] [blame] | 202 | } else if (has_fake_stack()) { |
Kostya Serebryany | 6a068a7 | 2013-06-26 12:16:05 +0000 | [diff] [blame] | 203 | bottom = fake_stack()->AddrIsInFakeStack(addr); |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 204 | CHECK(bottom); |
Alexander Potapenko | bcc00a4 | 2012-11-15 15:24:42 +0000 | [diff] [blame] | 205 | *offset = addr - bottom; |
Kostya Serebryany | 667a34a | 2013-03-22 10:36:24 +0000 | [diff] [blame] | 206 | *frame_pc = ((uptr*)bottom)[2]; |
Alexander Potapenko | bcc00a4 | 2012-11-15 15:24:42 +0000 | [diff] [blame] | 207 | return (const char *)((uptr*)bottom)[1]; |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 208 | } |
Kostya Serebryany | 734f1eb | 2012-11-21 12:38:58 +0000 | [diff] [blame] | 209 | uptr aligned_addr = addr & ~(SANITIZER_WORDSIZE/8 - 1); // align addr. |
Kostya Serebryany | 1d35d15 | 2012-05-31 15:02:07 +0000 | [diff] [blame] | 210 | u8 *shadow_ptr = (u8*)MemToShadow(aligned_addr); |
| 211 | u8 *shadow_bottom = (u8*)MemToShadow(bottom); |
Evgeniy Stepanov | d989be1 | 2012-05-12 12:33:10 +0000 | [diff] [blame] | 212 | |
| 213 | while (shadow_ptr >= shadow_bottom && |
Alexander Potapenko | bcc00a4 | 2012-11-15 15:24:42 +0000 | [diff] [blame] | 214 | *shadow_ptr != kAsanStackLeftRedzoneMagic) { |
Evgeniy Stepanov | d989be1 | 2012-05-12 12:33:10 +0000 | [diff] [blame] | 215 | shadow_ptr--; |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 216 | } |
Evgeniy Stepanov | d989be1 | 2012-05-12 12:33:10 +0000 | [diff] [blame] | 217 | |
| 218 | while (shadow_ptr >= shadow_bottom && |
Alexander Potapenko | bcc00a4 | 2012-11-15 15:24:42 +0000 | [diff] [blame] | 219 | *shadow_ptr == kAsanStackLeftRedzoneMagic) { |
Evgeniy Stepanov | d989be1 | 2012-05-12 12:33:10 +0000 | [diff] [blame] | 220 | shadow_ptr--; |
| 221 | } |
| 222 | |
| 223 | if (shadow_ptr < shadow_bottom) { |
Alexander Potapenko | bcc00a4 | 2012-11-15 15:24:42 +0000 | [diff] [blame] | 224 | *offset = 0; |
| 225 | return "UNKNOWN"; |
Evgeniy Stepanov | d989be1 | 2012-05-12 12:33:10 +0000 | [diff] [blame] | 226 | } |
| 227 | |
Kostya Serebryany | 8d03204 | 2012-05-31 14:35:53 +0000 | [diff] [blame] | 228 | uptr* ptr = (uptr*)SHADOW_TO_MEM((uptr)(shadow_ptr + 1)); |
Alexander Potapenko | bcc00a4 | 2012-11-15 15:24:42 +0000 | [diff] [blame] | 229 | CHECK(ptr[0] == kCurrentStackFrameMagic); |
Kostya Serebryany | 8d03204 | 2012-05-31 14:35:53 +0000 | [diff] [blame] | 230 | *offset = addr - (uptr)ptr; |
Kostya Serebryany | 667a34a | 2013-03-22 10:36:24 +0000 | [diff] [blame] | 231 | *frame_pc = ptr[2]; |
Evgeniy Stepanov | d989be1 | 2012-05-12 12:33:10 +0000 | [diff] [blame] | 232 | return (const char*)ptr[1]; |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 233 | } |
| 234 | |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 235 | static bool ThreadStackContainsAddress(ThreadContextBase *tctx_base, |
| 236 | void *addr) { |
| 237 | AsanThreadContext *tctx = static_cast<AsanThreadContext*>(tctx_base); |
| 238 | AsanThread *t = tctx->thread; |
Kostya Serebryany | 6a068a7 | 2013-06-26 12:16:05 +0000 | [diff] [blame] | 239 | if (!t) return false; |
| 240 | if (t->AddrIsInStack((uptr)addr)) return true; |
Kostya Serebryany | 44441cc | 2013-09-12 08:47:00 +0000 | [diff] [blame] | 241 | if (t->has_fake_stack() && t->fake_stack()->AddrIsInFakeStack((uptr)addr)) |
Kostya Serebryany | 6a068a7 | 2013-06-26 12:16:05 +0000 | [diff] [blame] | 242 | return true; |
| 243 | return false; |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 244 | } |
| 245 | |
Alexey Samsonov | cf025cb | 2013-03-20 09:23:28 +0000 | [diff] [blame] | 246 | AsanThread *GetCurrentThread() { |
Sergey Matveev | bdeff95 | 2013-07-08 12:57:24 +0000 | [diff] [blame] | 247 | AsanThreadContext *context = |
| 248 | reinterpret_cast<AsanThreadContext *>(AsanTSDGet()); |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 249 | if (!context) { |
| 250 | if (SANITIZER_ANDROID) { |
| 251 | // On Android, libc constructor is called _after_ asan_init, and cleans up |
| 252 | // TSD. Try to figure out if this is still the main thread by the stack |
| 253 | // address. We are not entirely sure that we have correct main thread |
Dmitry Vyukov | a7e42b5 | 2013-03-22 07:29:59 +0000 | [diff] [blame] | 254 | // limits, so only do this magic on Android, and only if the found thread |
| 255 | // is the main thread. |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 256 | AsanThreadContext *tctx = GetThreadContextByTidLocked(0); |
| 257 | if (ThreadStackContainsAddress(tctx, &context)) { |
| 258 | SetCurrentThread(tctx->thread); |
| 259 | return tctx->thread; |
| 260 | } |
Alexey Samsonov | cf025cb | 2013-03-20 09:23:28 +0000 | [diff] [blame] | 261 | } |
Alexey Samsonov | cf025cb | 2013-03-20 09:23:28 +0000 | [diff] [blame] | 262 | return 0; |
| 263 | } |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 264 | return context->thread; |
Alexey Samsonov | cf025cb | 2013-03-20 09:23:28 +0000 | [diff] [blame] | 265 | } |
| 266 | |
| 267 | void SetCurrentThread(AsanThread *t) { |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 268 | CHECK(t->context()); |
Sergey Matveev | 9be70fb | 2013-12-05 12:04:51 +0000 | [diff] [blame] | 269 | VReport(2, "SetCurrentThread: %p for thread %p\n", t->context(), |
| 270 | (void *)GetThreadSelf()); |
Alexey Samsonov | cf025cb | 2013-03-20 09:23:28 +0000 | [diff] [blame] | 271 | // Make sure we do not reset the current AsanThread. |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 272 | CHECK_EQ(0, AsanTSDGet()); |
| 273 | AsanTSDSet(t->context()); |
| 274 | CHECK_EQ(t->context(), AsanTSDGet()); |
Alexey Samsonov | cf025cb | 2013-03-20 09:23:28 +0000 | [diff] [blame] | 275 | } |
| 276 | |
| 277 | u32 GetCurrentTidOrInvalid() { |
| 278 | AsanThread *t = GetCurrentThread(); |
| 279 | return t ? t->tid() : kInvalidTid; |
| 280 | } |
| 281 | |
Alexey Samsonov | 54afba8 | 2013-03-21 11:23:41 +0000 | [diff] [blame] | 282 | AsanThread *FindThreadByStackAddress(uptr addr) { |
| 283 | asanThreadRegistry().CheckLocked(); |
| 284 | AsanThreadContext *tctx = static_cast<AsanThreadContext *>( |
| 285 | asanThreadRegistry().FindThreadContextLocked(ThreadStackContainsAddress, |
| 286 | (void *)addr)); |
| 287 | return tctx ? tctx->thread : 0; |
| 288 | } |
Sergey Matveev | bdeff95 | 2013-07-08 12:57:24 +0000 | [diff] [blame] | 289 | |
| 290 | void EnsureMainThreadIDIsCorrect() { |
| 291 | AsanThreadContext *context = |
| 292 | reinterpret_cast<AsanThreadContext *>(AsanTSDGet()); |
| 293 | if (context && (context->tid == 0)) |
| 294 | context->os_id = GetTid(); |
| 295 | } |
Sergey Matveev | 43d90cb | 2013-10-14 14:04:50 +0000 | [diff] [blame] | 296 | |
| 297 | __asan::AsanThread *GetAsanThreadByOsIDLocked(uptr os_id) { |
| 298 | __asan::AsanThreadContext *context = static_cast<__asan::AsanThreadContext *>( |
| 299 | __asan::asanThreadRegistry().FindThreadContextByOsIDLocked(os_id)); |
| 300 | if (!context) return 0; |
| 301 | return context->thread; |
| 302 | } |
Kostya Serebryany | 019b76f | 2011-11-30 01:07:02 +0000 | [diff] [blame] | 303 | } // namespace __asan |
Sergey Matveev | 65dd62a | 2013-05-21 13:40:13 +0000 | [diff] [blame] | 304 | |
| 305 | // --- Implementation of LSan-specific functions --- {{{1 |
| 306 | namespace __lsan { |
| 307 | bool GetThreadRangesLocked(uptr os_id, uptr *stack_begin, uptr *stack_end, |
| 308 | uptr *tls_begin, uptr *tls_end, |
| 309 | uptr *cache_begin, uptr *cache_end) { |
Sergey Matveev | 43d90cb | 2013-10-14 14:04:50 +0000 | [diff] [blame] | 310 | __asan::AsanThread *t = __asan::GetAsanThreadByOsIDLocked(os_id); |
Sergey Matveev | 09886cd | 2013-05-29 13:09:44 +0000 | [diff] [blame] | 311 | if (!t) return false; |
| 312 | *stack_begin = t->stack_bottom(); |
| 313 | *stack_end = t->stack_top(); |
| 314 | *tls_begin = t->tls_begin(); |
| 315 | *tls_end = t->tls_end(); |
| 316 | // ASan doesn't keep allocator caches in TLS, so these are unused. |
| 317 | *cache_begin = 0; |
| 318 | *cache_end = 0; |
| 319 | return true; |
Sergey Matveev | 65dd62a | 2013-05-21 13:40:13 +0000 | [diff] [blame] | 320 | } |
| 321 | |
Sergey Matveev | 43d90cb | 2013-10-14 14:04:50 +0000 | [diff] [blame] | 322 | void ForEachExtraStackRange(uptr os_id, RangeIteratorCallback callback, |
| 323 | void *arg) { |
| 324 | __asan::AsanThread *t = __asan::GetAsanThreadByOsIDLocked(os_id); |
| 325 | if (t && t->has_fake_stack()) |
| 326 | t->fake_stack()->ForEachFakeFrame(callback, arg); |
| 327 | } |
| 328 | |
Sergey Matveev | 65dd62a | 2013-05-21 13:40:13 +0000 | [diff] [blame] | 329 | void LockThreadRegistry() { |
| 330 | __asan::asanThreadRegistry().Lock(); |
| 331 | } |
| 332 | |
| 333 | void UnlockThreadRegistry() { |
| 334 | __asan::asanThreadRegistry().Unlock(); |
| 335 | } |
Sergey Matveev | bdeff95 | 2013-07-08 12:57:24 +0000 | [diff] [blame] | 336 | |
| 337 | void EnsureMainThreadIDIsCorrect() { |
| 338 | __asan::EnsureMainThreadIDIsCorrect(); |
| 339 | } |
Sergey Matveev | 65dd62a | 2013-05-21 13:40:13 +0000 | [diff] [blame] | 340 | } // namespace __lsan |