| /* |
| * Copyright (C) 2008 The Android Open Source Project |
| * All rights reserved. |
| * |
| * Redistribution and use in source and binary forms, with or without |
| * modification, are permitted provided that the following conditions |
| * are met: |
| * * Redistributions of source code must retain the above copyright |
| * notice, this list of conditions and the following disclaimer. |
| * * Redistributions in binary form must reproduce the above copyright |
| * notice, this list of conditions and the following disclaimer in |
| * the documentation and/or other materials provided with the |
| * distribution. |
| * |
| * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS |
| * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT |
| * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS |
| * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE |
| * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, |
| * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, |
| * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS |
| * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED |
| * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, |
| * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT |
| * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF |
| * SUCH DAMAGE. |
| */ |
| |
| #include <errno.h> |
| #include <pthread.h> |
| |
| #include "private/bionic_tls.h" |
| #include "pthread_internal.h" |
| |
| /* A technical note regarding our thread-local-storage (TLS) implementation: |
| * |
| * There can be up to BIONIC_TLS_SLOTS independent TLS keys in a given process, |
| * The keys below TLS_SLOT_FIRST_USER_SLOT are reserved for Bionic to hold |
| * special thread-specific variables like errno or a pointer to |
| * the current thread's descriptor. These entries cannot be accessed through |
| * pthread_getspecific() / pthread_setspecific() or pthread_key_delete() |
| * |
| * The 'tls_map_t' type defined below implements a shared global map of |
| * currently created/allocated TLS keys and the destructors associated |
| * with them. |
| * |
| * The global TLS map simply contains a bitmap of allocated keys, and |
| * an array of destructors. |
| * |
| * Each thread has a TLS area that is a simple array of BIONIC_TLS_SLOTS void* |
| * pointers. the TLS area of the main thread is stack-allocated in |
| * __libc_init_common, while the TLS area of other threads is placed at |
| * the top of their stack in pthread_create. |
| * |
| * When pthread_key_delete() is called it will erase the key's bitmap bit |
| * and its destructor, and will also clear the key data in the TLS area of |
| * all created threads. As mandated by Posix, it is the responsibility of |
| * the caller of pthread_key_delete() to properly reclaim the objects that |
| * were pointed to by these data fields (either before or after the call). |
| */ |
| |
| #define TLSMAP_BITS 32 |
| #define TLSMAP_WORDS ((BIONIC_TLS_SLOTS+TLSMAP_BITS-1)/TLSMAP_BITS) |
| #define TLSMAP_WORD(m,k) (m).map[(k)/TLSMAP_BITS] |
| #define TLSMAP_MASK(k) (1U << ((k)&(TLSMAP_BITS-1))) |
| |
| static inline bool IsValidUserKey(pthread_key_t key) { |
| return (key >= TLS_SLOT_FIRST_USER_SLOT && key < BIONIC_TLS_SLOTS); |
| } |
| |
| typedef void (*key_destructor_t)(void*); |
| |
| struct tls_map_t { |
| bool is_initialized; |
| |
| /* bitmap of allocated keys */ |
| uint32_t map[TLSMAP_WORDS]; |
| |
| key_destructor_t key_destructors[BIONIC_TLS_SLOTS]; |
| }; |
| |
| class ScopedTlsMapAccess { |
| public: |
| ScopedTlsMapAccess() { |
| Lock(); |
| |
| // If this is the first time the TLS map has been accessed, |
| // mark the slots belonging to well-known keys as being in use. |
| // This isn't currently necessary because the well-known keys |
| // can only be accessed directly by bionic itself, do not have |
| // destructors, and all the functions that touch the TLS map |
| // start after the maximum well-known slot. |
| if (!s_tls_map_.is_initialized) { |
| for (pthread_key_t key = 0; key < TLS_SLOT_FIRST_USER_SLOT; ++key) { |
| SetInUse(key, NULL); |
| } |
| s_tls_map_.is_initialized = true; |
| } |
| } |
| |
| ~ScopedTlsMapAccess() { |
| Unlock(); |
| } |
| |
| int CreateKey(pthread_key_t* result, void (*key_destructor)(void*)) { |
| // Take the first unallocated key. |
| for (int key = 0; key < BIONIC_TLS_SLOTS; ++key) { |
| if (!IsInUse(key)) { |
| SetInUse(key, key_destructor); |
| *result = key; |
| return 0; |
| } |
| } |
| |
| // We hit PTHREAD_KEYS_MAX. POSIX says EAGAIN for this case. |
| return EAGAIN; |
| } |
| |
| void DeleteKey(pthread_key_t key) { |
| TLSMAP_WORD(s_tls_map_, key) &= ~TLSMAP_MASK(key); |
| s_tls_map_.key_destructors[key] = NULL; |
| } |
| |
| bool IsInUse(pthread_key_t key) { |
| return (TLSMAP_WORD(s_tls_map_, key) & TLSMAP_MASK(key)) != 0; |
| } |
| |
| void SetInUse(pthread_key_t key, void (*key_destructor)(void*)) { |
| TLSMAP_WORD(s_tls_map_, key) |= TLSMAP_MASK(key); |
| s_tls_map_.key_destructors[key] = key_destructor; |
| } |
| |
| // Called from pthread_exit() to remove all TLS key data |
| // from this thread's TLS area. This must call the destructor of all keys |
| // that have a non-NULL data value and a non-NULL destructor. |
| void CleanAll() { |
| void** tls = __get_tls(); |
| |
| // Because destructors can do funky things like deleting/creating other |
| // keys, we need to implement this in a loop. |
| for (int rounds = PTHREAD_DESTRUCTOR_ITERATIONS; rounds > 0; --rounds) { |
| size_t called_destructor_count = 0; |
| for (int key = 0; key < BIONIC_TLS_SLOTS; ++key) { |
| if (IsInUse(key)) { |
| void* data = tls[key]; |
| void (*key_destructor)(void*) = s_tls_map_.key_destructors[key]; |
| |
| if (data != NULL && key_destructor != NULL) { |
| // we need to clear the key data now, this will prevent the |
| // destructor (or a later one) from seeing the old value if |
| // it calls pthread_getspecific() for some odd reason |
| |
| // we do not do this if 'key_destructor == NULL' just in case another |
| // destructor function might be responsible for manually |
| // releasing the corresponding data. |
| tls[key] = NULL; |
| |
| // because the destructor is free to call pthread_key_create |
| // and/or pthread_key_delete, we need to temporarily unlock |
| // the TLS map |
| Unlock(); |
| (*key_destructor)(data); |
| Lock(); |
| ++called_destructor_count; |
| } |
| } |
| } |
| |
| // If we didn't call any destructors, there is no need to check the TLS data again. |
| if (called_destructor_count == 0) { |
| break; |
| } |
| } |
| } |
| |
| private: |
| static tls_map_t s_tls_map_; |
| static pthread_mutex_t s_tls_map_lock_; |
| |
| void Lock() { |
| pthread_mutex_lock(&s_tls_map_lock_); |
| } |
| |
| void Unlock() { |
| pthread_mutex_unlock(&s_tls_map_lock_); |
| } |
| }; |
| |
| __LIBC_HIDDEN__ tls_map_t ScopedTlsMapAccess::s_tls_map_; |
| __LIBC_HIDDEN__ pthread_mutex_t ScopedTlsMapAccess::s_tls_map_lock_; |
| |
| __LIBC_HIDDEN__ void pthread_key_clean_all() { |
| ScopedTlsMapAccess tls_map; |
| tls_map.CleanAll(); |
| } |
| |
| int pthread_key_create(pthread_key_t* key, void (*key_destructor)(void*)) { |
| ScopedTlsMapAccess tls_map; |
| return tls_map.CreateKey(key, key_destructor); |
| } |
| |
| // Deletes a pthread_key_t. note that the standard mandates that this does |
| // not call the destructors for non-NULL key values. Instead, it is the |
| // responsibility of the caller to properly dispose of the corresponding data |
| // and resources, using any means it finds suitable. |
| int pthread_key_delete(pthread_key_t key) { |
| ScopedTlsMapAccess tls_map; |
| |
| if (!IsValidUserKey(key) || !tls_map.IsInUse(key)) { |
| return EINVAL; |
| } |
| |
| // Clear value in all threads. |
| pthread_mutex_lock(&g_thread_list_lock); |
| for (pthread_internal_t* t = g_thread_list; t != NULL; t = t->next) { |
| t->tls[key] = NULL; |
| } |
| tls_map.DeleteKey(key); |
| |
| pthread_mutex_unlock(&g_thread_list_lock); |
| return 0; |
| } |
| |
| void* pthread_getspecific(pthread_key_t key) { |
| if (!IsValidUserKey(key)) { |
| return NULL; |
| } |
| |
| // For performance reasons, we do not lock/unlock the global TLS map |
| // to check that the key is properly allocated. If the key was not |
| // allocated, the value read from the TLS should always be NULL |
| // due to pthread_key_delete() clearing the values for all threads. |
| return __get_tls()[key]; |
| } |
| |
| int pthread_setspecific(pthread_key_t key, const void* ptr) { |
| ScopedTlsMapAccess tls_map; |
| |
| if (!IsValidUserKey(key) || !tls_map.IsInUse(key)) { |
| return EINVAL; |
| } |
| |
| __get_tls()[key] = const_cast<void*>(ptr); |
| return 0; |
| } |