blob: d1aeb93fadb4e26a3e13f0eb1fc8ec18735f01cb [file] [log] [blame]
Elliott Hughes4b4a8822013-02-12 17:15:59 -08001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in
12 * the documentation and/or other materials provided with the
13 * distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 */
28
29#include <pthread.h>
30
31#include <errno.h>
32#include <sys/mman.h>
Elliott Hughes7086ad62014-06-19 16:39:01 -070033#include <unistd.h>
Elliott Hughes4b4a8822013-02-12 17:15:59 -080034
35#include "pthread_internal.h"
36
Christopher Ferris03eebcb2014-06-13 13:57:51 -070037#include "private/bionic_macros.h"
Elliott Hughes4b4a8822013-02-12 17:15:59 -080038#include "private/bionic_ssp.h"
39#include "private/bionic_tls.h"
Elliott Hughes8f2a5a02013-03-15 15:30:25 -070040#include "private/libc_logging.h"
Elliott Hughes4b4a8822013-02-12 17:15:59 -080041#include "private/ErrnoRestorer.h"
42#include "private/ScopedPthreadMutexLocker.h"
43
Elliott Hughes0d236aa2014-05-09 14:42:16 -070044// x86 uses segment descriptors rather than a direct pointer to TLS.
45#if __i386__
46#include <asm/ldt.h>
47extern "C" __LIBC_HIDDEN__ void __init_user_desc(struct user_desc*, int, void*);
48#endif
49
Elliott Hughescd461042014-05-14 10:58:58 -070050static pthread_mutex_t g_pthread_stack_creation_lock = PTHREAD_MUTEX_INITIALIZER;
Elliott Hughes4b4a8822013-02-12 17:15:59 -080051
Elliott Hughesf2cea022014-03-13 14:54:53 -070052extern "C" int __isthreaded;
53
Elliott Hughes70b24b12013-11-15 11:51:07 -080054// This code is used both by each new pthread and the code that initializes the main thread.
Elliott Hughesaf8aebe2014-01-14 17:16:18 -080055void __init_tls(pthread_internal_t* thread) {
Elliott Hughes70b24b12013-11-15 11:51:07 -080056 // Zero-initialize all the slots after TLS_SLOT_SELF and TLS_SLOT_THREAD_ID.
57 for (size_t i = TLS_SLOT_ERRNO; i < BIONIC_TLS_SLOTS; ++i) {
Elliott Hughes40eabe22013-02-14 18:59:37 -080058 thread->tls[i] = NULL;
Elliott Hughes4b4a8822013-02-12 17:15:59 -080059 }
60
61 // Slot 0 must point to itself. The x86 Linux kernel reads the TLS from %fs:0.
Elliott Hughes40eabe22013-02-14 18:59:37 -080062 thread->tls[TLS_SLOT_SELF] = thread->tls;
63 thread->tls[TLS_SLOT_THREAD_ID] = thread;
Elliott Hughes4b4a8822013-02-12 17:15:59 -080064 // GCC looks in the TLS for the stack guard on x86, so copy it there from our global.
Elliott Hughes40eabe22013-02-14 18:59:37 -080065 thread->tls[TLS_SLOT_STACK_GUARD] = (void*) __stack_chk_guard;
Elliott Hughes70b24b12013-11-15 11:51:07 -080066}
Elliott Hughes4b4a8822013-02-12 17:15:59 -080067
Elliott Hughes70b24b12013-11-15 11:51:07 -080068void __init_alternate_signal_stack(pthread_internal_t* thread) {
Elliott Hughes84114c82013-07-17 13:33:19 -070069 // Create and set an alternate signal stack.
Elliott Hughes84114c82013-07-17 13:33:19 -070070 stack_t ss;
71 ss.ss_sp = mmap(NULL, SIGSTKSZ, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, 0, 0);
72 if (ss.ss_sp != MAP_FAILED) {
73 ss.ss_size = SIGSTKSZ;
74 ss.ss_flags = 0;
75 sigaltstack(&ss, NULL);
76 thread->alternate_signal_stack = ss.ss_sp;
77 }
Elliott Hughes4b4a8822013-02-12 17:15:59 -080078}
79
Elliott Hughescef3fae2013-11-19 16:52:24 -080080int __init_thread(pthread_internal_t* thread, bool add_to_thread_list) {
Elliott Hughes4b4a8822013-02-12 17:15:59 -080081 int error = 0;
82
Elliott Hughes4b4a8822013-02-12 17:15:59 -080083 // Set the scheduling policy/priority of the thread.
84 if (thread->attr.sched_policy != SCHED_NORMAL) {
Elliott Hughesc3f11402013-10-30 14:40:09 -070085 sched_param param;
Elliott Hughes4b4a8822013-02-12 17:15:59 -080086 param.sched_priority = thread->attr.sched_priority;
Elliott Hughes40eabe22013-02-14 18:59:37 -080087 if (sched_setscheduler(thread->tid, thread->attr.sched_policy, &param) == -1) {
Elliott Hughes98624c32013-10-15 16:51:17 -070088#if __LP64__
89 // For backwards compatibility reasons, we only report failures on 64-bit devices.
90 error = errno;
91#endif
Elliott Hughesb95cf0d2013-07-15 14:51:07 -070092 __libc_format_log(ANDROID_LOG_WARN, "libc",
93 "pthread_create sched_setscheduler call failed: %s", strerror(errno));
Elliott Hughes4b4a8822013-02-12 17:15:59 -080094 }
95 }
96
Elliott Hughes4b4a8822013-02-12 17:15:59 -080097 thread->cleanup_stack = NULL;
98
99 if (add_to_thread_list) {
100 _pthread_internal_add(thread);
101 }
102
103 return error;
104}
105
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700106static void* __create_thread_stack(pthread_internal_t* thread) {
Elliott Hughescd461042014-05-14 10:58:58 -0700107 ScopedPthreadMutexLocker lock(&g_pthread_stack_creation_lock);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800108
109 // Create a new private anonymous map.
110 int prot = PROT_READ | PROT_WRITE;
111 int flags = MAP_PRIVATE | MAP_ANONYMOUS | MAP_NORESERVE;
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700112 void* stack = mmap(NULL, thread->attr.stack_size, prot, flags, -1, 0);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800113 if (stack == MAP_FAILED) {
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700114 __libc_format_log(ANDROID_LOG_WARN,
115 "libc",
116 "pthread_create failed: couldn't allocate %zd-byte stack: %s",
117 thread->attr.stack_size, strerror(errno));
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800118 return NULL;
119 }
120
121 // Set the guard region at the end of the stack to PROT_NONE.
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700122 if (mprotect(stack, thread->attr.guard_size, PROT_NONE) == -1) {
123 __libc_format_log(ANDROID_LOG_WARN, "libc",
124 "pthread_create failed: couldn't mprotect PROT_NONE %zd-byte stack guard region: %s",
125 thread->attr.guard_size, strerror(errno));
126 munmap(stack, thread->attr.stack_size);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800127 return NULL;
128 }
129
130 return stack;
131}
132
Elliott Hughese48b6852013-11-15 14:57:45 -0800133static int __pthread_start(void* arg) {
134 pthread_internal_t* thread = reinterpret_cast<pthread_internal_t*>(arg);
135
136 // Wait for our creating thread to release us. This lets it have time to
137 // notify gdb about this thread before we start doing anything.
138 // This also provides the memory barrier needed to ensure that all memory
139 // accesses previously made by the creating thread are visible to us.
Elliott Hughesb30aff42014-05-28 19:35:33 +0000140 pthread_mutex_lock(&thread->startup_handshake_mutex);
141 pthread_mutex_destroy(&thread->startup_handshake_mutex);
Elliott Hughese48b6852013-11-15 14:57:45 -0800142
143 __init_alternate_signal_stack(thread);
144
Elliott Hughese48b6852013-11-15 14:57:45 -0800145 void* result = thread->start_routine(thread->start_routine_arg);
146 pthread_exit(result);
147
148 return 0;
149}
150
Elliott Hughescef3fae2013-11-19 16:52:24 -0800151// A dummy start routine for pthread_create failures where we've created a thread but aren't
152// going to run user code on it. We swap out the user's start routine for this and take advantage
153// of the regular thread teardown to free up resources.
154static void* __do_nothing(void*) {
155 return NULL;
156}
157
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800158int pthread_create(pthread_t* thread_out, pthread_attr_t const* attr,
159 void* (*start_routine)(void*), void* arg) {
160 ErrnoRestorer errno_restorer;
161
Elliott Hughesf2cea022014-03-13 14:54:53 -0700162 // Inform the rest of the C library that at least one thread was created.
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800163 __isthreaded = 1;
164
165 pthread_internal_t* thread = reinterpret_cast<pthread_internal_t*>(calloc(sizeof(*thread), 1));
166 if (thread == NULL) {
Elliott Hughescfa089d2013-03-29 16:35:00 -0700167 __libc_format_log(ANDROID_LOG_WARN, "libc", "pthread_create failed: couldn't allocate thread");
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800168 return EAGAIN;
169 }
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800170
171 if (attr == NULL) {
172 pthread_attr_init(&thread->attr);
173 } else {
174 thread->attr = *attr;
175 attr = NULL; // Prevent misuse below.
176 }
177
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700178 // Make sure the stack size and guard size are multiples of PAGE_SIZE.
Christopher Ferris03eebcb2014-06-13 13:57:51 -0700179 thread->attr.stack_size = BIONIC_ALIGN(thread->attr.stack_size, PAGE_SIZE);
180 thread->attr.guard_size = BIONIC_ALIGN(thread->attr.guard_size, PAGE_SIZE);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800181
182 if (thread->attr.stack_base == NULL) {
183 // The caller didn't provide a stack, so allocate one.
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700184 thread->attr.stack_base = __create_thread_stack(thread);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800185 if (thread->attr.stack_base == NULL) {
186 free(thread);
187 return EAGAIN;
188 }
189 } else {
190 // The caller did provide a stack, so remember we're not supposed to free it.
Elliott Hughes2b6e43e2013-10-29 16:11:06 -0700191 thread->attr.flags |= PTHREAD_ATTR_FLAG_USER_ALLOCATED_STACK;
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800192 }
193
Elliott Hughes84114c82013-07-17 13:33:19 -0700194 // Make room for the TLS area.
195 // The child stack is the same address, just growing in the opposite direction.
196 // At offsets >= 0, we have the TLS slots.
197 // At offsets < 0, we have the child stack.
Elliott Hughesb30aff42014-05-28 19:35:33 +0000198 thread->tls = reinterpret_cast<void**>(reinterpret_cast<uint8_t*>(thread->attr.stack_base) +
199 thread->attr.stack_size - BIONIC_TLS_SLOTS * sizeof(void*));
Elliott Hughes70b24b12013-11-15 11:51:07 -0800200 void* child_stack = thread->tls;
Elliott Hughes0d236aa2014-05-09 14:42:16 -0700201 __init_tls(thread);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800202
Elliott Hughes70b24b12013-11-15 11:51:07 -0800203 // Create a mutex for the thread in TLS to wait on once it starts so we can keep
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800204 // it from doing anything until after we notify the debugger about it
205 //
206 // This also provides the memory barrier we need to ensure that all
207 // memory accesses previously performed by this thread are visible to
208 // the new thread.
Elliott Hughesb30aff42014-05-28 19:35:33 +0000209 pthread_mutex_init(&thread->startup_handshake_mutex, NULL);
210 pthread_mutex_lock(&thread->startup_handshake_mutex);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800211
Elliott Hughes70b24b12013-11-15 11:51:07 -0800212 thread->start_routine = start_routine;
213 thread->start_routine_arg = arg;
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800214
Elliott Hughes7086ad62014-06-19 16:39:01 -0700215 thread->set_cached_pid(getpid());
216
Elliott Hughes877ec6d2013-11-15 17:40:18 -0800217 int flags = CLONE_VM | CLONE_FS | CLONE_FILES | CLONE_SIGHAND | CLONE_THREAD | CLONE_SYSVSEM |
218 CLONE_SETTLS | CLONE_PARENT_SETTID | CLONE_CHILD_CLEARTID;
Elliott Hughes0d236aa2014-05-09 14:42:16 -0700219 void* tls = thread->tls;
Elliott Hughes80906142013-11-26 13:57:21 -0800220#if defined(__i386__)
221 // On x86 (but not x86-64), CLONE_SETTLS takes a pointer to a struct user_desc rather than
Elliott Hughes0d236aa2014-05-09 14:42:16 -0700222 // a pointer to the TLS itself.
223 user_desc tls_descriptor;
224 __init_user_desc(&tls_descriptor, false, tls);
225 tls = &tls_descriptor;
Elliott Hughes80906142013-11-26 13:57:21 -0800226#endif
Elliott Hughes0d236aa2014-05-09 14:42:16 -0700227 int rc = clone(__pthread_start, child_stack, flags, thread, &(thread->tid), tls, &(thread->tid));
Elliott Hughes877ec6d2013-11-15 17:40:18 -0800228 if (rc == -1) {
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800229 int clone_errno = errno;
Elliott Hughes877ec6d2013-11-15 17:40:18 -0800230 // We don't have to unlock the mutex at all because clone(2) failed so there's no child waiting to
231 // be unblocked, but we're about to unmap the memory the mutex is stored in, so this serves as a
232 // reminder that you can't rewrite this function to use a ScopedPthreadMutexLocker.
Elliott Hughesb30aff42014-05-28 19:35:33 +0000233 pthread_mutex_unlock(&thread->startup_handshake_mutex);
Elliott Hughes2b6e43e2013-10-29 16:11:06 -0700234 if ((thread->attr.flags & PTHREAD_ATTR_FLAG_USER_ALLOCATED_STACK) == 0) {
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700235 munmap(thread->attr.stack_base, thread->attr.stack_size);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800236 }
237 free(thread);
Elliott Hughescfa089d2013-03-29 16:35:00 -0700238 __libc_format_log(ANDROID_LOG_WARN, "libc", "pthread_create failed: clone failed: %s", strerror(errno));
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800239 return clone_errno;
240 }
241
Elliott Hughescef3fae2013-11-19 16:52:24 -0800242 int init_errno = __init_thread(thread, true);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800243 if (init_errno != 0) {
Elliott Hughescef3fae2013-11-19 16:52:24 -0800244 // Mark the thread detached and replace its start_routine with a no-op.
245 // Letting the thread run is the easiest way to clean up its resources.
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800246 thread->attr.flags |= PTHREAD_ATTR_FLAG_DETACHED;
Elliott Hughescef3fae2013-11-19 16:52:24 -0800247 thread->start_routine = __do_nothing;
Elliott Hughesb30aff42014-05-28 19:35:33 +0000248 pthread_mutex_unlock(&thread->startup_handshake_mutex);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800249 return init_errno;
250 }
251
Elliott Hughes877ec6d2013-11-15 17:40:18 -0800252 // Publish the pthread_t and unlock the mutex to let the new thread start running.
253 *thread_out = reinterpret_cast<pthread_t>(thread);
Elliott Hughesb30aff42014-05-28 19:35:33 +0000254 pthread_mutex_unlock(&thread->startup_handshake_mutex);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800255
256 return 0;
257}