blob: 8338ad577c63e72af542c3a6b67bc90df2313136 [file] [log] [blame]
Elliott Hughes4b4a8822013-02-12 17:15:59 -08001/*
2 * Copyright (C) 2008 The Android Open Source Project
3 * All rights reserved.
4 *
5 * Redistribution and use in source and binary forms, with or without
6 * modification, are permitted provided that the following conditions
7 * are met:
8 * * Redistributions of source code must retain the above copyright
9 * notice, this list of conditions and the following disclaimer.
10 * * Redistributions in binary form must reproduce the above copyright
11 * notice, this list of conditions and the following disclaimer in
12 * the documentation and/or other materials provided with the
13 * distribution.
14 *
15 * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS
16 * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT
17 * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS
18 * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE
19 * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT,
20 * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING,
21 * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS
22 * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED
23 * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY,
24 * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT
25 * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF
26 * SUCH DAMAGE.
27 */
28
29#include <pthread.h>
30
31#include <errno.h>
32#include <sys/mman.h>
33
34#include "pthread_internal.h"
35
36#include "private/bionic_ssp.h"
37#include "private/bionic_tls.h"
Elliott Hughes8f2a5a02013-03-15 15:30:25 -070038#include "private/libc_logging.h"
Elliott Hughes4b4a8822013-02-12 17:15:59 -080039#include "private/thread_private.h"
40#include "private/ErrnoRestorer.h"
41#include "private/ScopedPthreadMutexLocker.h"
42
Elliott Hughes40eabe22013-02-14 18:59:37 -080043extern "C" int __pthread_clone(void* (*fn)(void*), void* child_stack, int flags, void* arg);
Elliott Hughes4b4a8822013-02-12 17:15:59 -080044
45#ifdef __i386__
46#define ATTRIBUTES __attribute__((noinline)) __attribute__((fastcall))
47#else
48#define ATTRIBUTES __attribute__((noinline))
49#endif
50
51extern "C" void ATTRIBUTES _thread_created_hook(pid_t thread_id);
52
Elliott Hughes2a0b8732013-10-08 18:50:24 -070053extern "C" int __set_tls(void* ptr);
54
Elliott Hughes4b4a8822013-02-12 17:15:59 -080055static pthread_mutex_t gPthreadStackCreationLock = PTHREAD_MUTEX_INITIALIZER;
56
57static pthread_mutex_t gDebuggerNotificationLock = PTHREAD_MUTEX_INITIALIZER;
58
Elliott Hughes40eabe22013-02-14 18:59:37 -080059void __init_tls(pthread_internal_t* thread) {
Elliott Hughes4b4a8822013-02-12 17:15:59 -080060 // Zero-initialize all the slots.
61 for (size_t i = 0; i < BIONIC_TLS_SLOTS; ++i) {
Elliott Hughes40eabe22013-02-14 18:59:37 -080062 thread->tls[i] = NULL;
Elliott Hughes4b4a8822013-02-12 17:15:59 -080063 }
64
65 // Slot 0 must point to itself. The x86 Linux kernel reads the TLS from %fs:0.
Elliott Hughes40eabe22013-02-14 18:59:37 -080066 thread->tls[TLS_SLOT_SELF] = thread->tls;
67 thread->tls[TLS_SLOT_THREAD_ID] = thread;
Elliott Hughes4b4a8822013-02-12 17:15:59 -080068 // GCC looks in the TLS for the stack guard on x86, so copy it there from our global.
Elliott Hughes40eabe22013-02-14 18:59:37 -080069 thread->tls[TLS_SLOT_STACK_GUARD] = (void*) __stack_chk_guard;
Elliott Hughes4b4a8822013-02-12 17:15:59 -080070
Elliott Hughes40eabe22013-02-14 18:59:37 -080071 __set_tls(thread->tls);
Elliott Hughes84114c82013-07-17 13:33:19 -070072
73 // Create and set an alternate signal stack.
74 // This must happen after __set_tls, in case a system call fails and tries to set errno.
75 stack_t ss;
76 ss.ss_sp = mmap(NULL, SIGSTKSZ, PROT_READ|PROT_WRITE, MAP_PRIVATE|MAP_ANONYMOUS, 0, 0);
77 if (ss.ss_sp != MAP_FAILED) {
78 ss.ss_size = SIGSTKSZ;
79 ss.ss_flags = 0;
80 sigaltstack(&ss, NULL);
81 thread->alternate_signal_stack = ss.ss_sp;
82 }
Elliott Hughes4b4a8822013-02-12 17:15:59 -080083}
84
Elliott Hughes4b4a8822013-02-12 17:15:59 -080085__LIBC_ABI_PRIVATE__
Elliott Hughes40eabe22013-02-14 18:59:37 -080086int _init_thread(pthread_internal_t* thread, bool add_to_thread_list) {
Elliott Hughes4b4a8822013-02-12 17:15:59 -080087 int error = 0;
88
Elliott Hughes4b4a8822013-02-12 17:15:59 -080089 // Set the scheduling policy/priority of the thread.
90 if (thread->attr.sched_policy != SCHED_NORMAL) {
91 struct sched_param param;
92 param.sched_priority = thread->attr.sched_priority;
Elliott Hughes40eabe22013-02-14 18:59:37 -080093 if (sched_setscheduler(thread->tid, thread->attr.sched_policy, &param) == -1) {
Elliott Hughes4b4a8822013-02-12 17:15:59 -080094 // For backwards compatibility reasons, we just warn about failures here.
95 // error = errno;
Elliott Hughesb95cf0d2013-07-15 14:51:07 -070096 __libc_format_log(ANDROID_LOG_WARN, "libc",
97 "pthread_create sched_setscheduler call failed: %s", strerror(errno));
Elliott Hughes4b4a8822013-02-12 17:15:59 -080098 }
99 }
100
101 pthread_cond_init(&thread->join_cond, NULL);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800102 thread->cleanup_stack = NULL;
103
104 if (add_to_thread_list) {
105 _pthread_internal_add(thread);
106 }
107
108 return error;
109}
110
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700111static void* __create_thread_stack(pthread_internal_t* thread) {
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800112 ScopedPthreadMutexLocker lock(&gPthreadStackCreationLock);
113
114 // Create a new private anonymous map.
115 int prot = PROT_READ | PROT_WRITE;
116 int flags = MAP_PRIVATE | MAP_ANONYMOUS | MAP_NORESERVE;
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700117 void* stack = mmap(NULL, thread->attr.stack_size, prot, flags, -1, 0);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800118 if (stack == MAP_FAILED) {
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700119 __libc_format_log(ANDROID_LOG_WARN,
120 "libc",
121 "pthread_create failed: couldn't allocate %zd-byte stack: %s",
122 thread->attr.stack_size, strerror(errno));
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800123 return NULL;
124 }
125
126 // Set the guard region at the end of the stack to PROT_NONE.
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700127 if (mprotect(stack, thread->attr.guard_size, PROT_NONE) == -1) {
128 __libc_format_log(ANDROID_LOG_WARN, "libc",
129 "pthread_create failed: couldn't mprotect PROT_NONE %zd-byte stack guard region: %s",
130 thread->attr.guard_size, strerror(errno));
131 munmap(stack, thread->attr.stack_size);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800132 return NULL;
133 }
134
135 return stack;
136}
137
138int pthread_create(pthread_t* thread_out, pthread_attr_t const* attr,
139 void* (*start_routine)(void*), void* arg) {
140 ErrnoRestorer errno_restorer;
141
142 // Inform the rest of the C library that at least one thread
143 // was created. This will enforce certain functions to acquire/release
144 // locks (e.g. atexit()) to protect shared global structures.
145 // This works because pthread_create() is not called by the C library
146 // initialization routine that sets up the main thread's data structures.
147 __isthreaded = 1;
148
149 pthread_internal_t* thread = reinterpret_cast<pthread_internal_t*>(calloc(sizeof(*thread), 1));
150 if (thread == NULL) {
Elliott Hughescfa089d2013-03-29 16:35:00 -0700151 __libc_format_log(ANDROID_LOG_WARN, "libc", "pthread_create failed: couldn't allocate thread");
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800152 return EAGAIN;
153 }
154 thread->allocated_on_heap = true;
155
156 if (attr == NULL) {
157 pthread_attr_init(&thread->attr);
158 } else {
159 thread->attr = *attr;
160 attr = NULL; // Prevent misuse below.
161 }
162
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700163 // Make sure the stack size and guard size are multiples of PAGE_SIZE.
164 thread->attr.stack_size = (thread->attr.stack_size + (PAGE_SIZE-1)) & ~(PAGE_SIZE-1);
165 thread->attr.guard_size = (thread->attr.guard_size + (PAGE_SIZE-1)) & ~(PAGE_SIZE-1);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800166
167 if (thread->attr.stack_base == NULL) {
168 // The caller didn't provide a stack, so allocate one.
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700169 thread->attr.stack_base = __create_thread_stack(thread);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800170 if (thread->attr.stack_base == NULL) {
171 free(thread);
172 return EAGAIN;
173 }
174 } else {
175 // The caller did provide a stack, so remember we're not supposed to free it.
176 thread->attr.flags |= PTHREAD_ATTR_FLAG_USER_STACK;
177 }
178
Elliott Hughes84114c82013-07-17 13:33:19 -0700179 // Make room for the TLS area.
180 // The child stack is the same address, just growing in the opposite direction.
181 // At offsets >= 0, we have the TLS slots.
182 // At offsets < 0, we have the child stack.
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700183 void** tls = (void**)((uint8_t*)(thread->attr.stack_base) + thread->attr.stack_size - BIONIC_TLS_SLOTS * sizeof(void*));
Elliott Hughes84114c82013-07-17 13:33:19 -0700184 void* child_stack = tls;
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800185
186 // Create a mutex for the thread in TLS_SLOT_SELF to wait on once it starts so we can keep
187 // it from doing anything until after we notify the debugger about it
188 //
189 // This also provides the memory barrier we need to ensure that all
190 // memory accesses previously performed by this thread are visible to
191 // the new thread.
192 pthread_mutex_t* start_mutex = (pthread_mutex_t*) &tls[TLS_SLOT_SELF];
193 pthread_mutex_init(start_mutex, NULL);
194 ScopedPthreadMutexLocker start_locker(start_mutex);
195
196 tls[TLS_SLOT_THREAD_ID] = thread;
197
Elliott Hughes40eabe22013-02-14 18:59:37 -0800198 int flags = CLONE_FILES | CLONE_FS | CLONE_VM | CLONE_SIGHAND | CLONE_THREAD | CLONE_SYSVSEM;
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800199
Elliott Hughes84114c82013-07-17 13:33:19 -0700200 int tid = __pthread_clone(start_routine, child_stack, flags, arg);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800201 if (tid < 0) {
202 int clone_errno = errno;
203 if ((thread->attr.flags & PTHREAD_ATTR_FLAG_USER_STACK) == 0) {
Elliott Hughesb95cf0d2013-07-15 14:51:07 -0700204 munmap(thread->attr.stack_base, thread->attr.stack_size);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800205 }
206 free(thread);
Elliott Hughescfa089d2013-03-29 16:35:00 -0700207 __libc_format_log(ANDROID_LOG_WARN, "libc", "pthread_create failed: clone failed: %s", strerror(errno));
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800208 return clone_errno;
209 }
210
Elliott Hughes40eabe22013-02-14 18:59:37 -0800211 thread->tid = tid;
212
213 int init_errno = _init_thread(thread, true);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800214 if (init_errno != 0) {
215 // Mark the thread detached and let its __thread_entry run to
216 // completion. (It'll just exit immediately, cleaning up its resources.)
Elliott Hugheseb847bc2013-10-09 15:50:50 -0700217 thread->internal_flags |= PTHREAD_INTERNAL_FLAG_THREAD_INIT_FAILED;
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800218 thread->attr.flags |= PTHREAD_ATTR_FLAG_DETACHED;
219 return init_errno;
220 }
221
222 // Notify any debuggers about the new thread.
223 {
224 ScopedPthreadMutexLocker debugger_locker(&gDebuggerNotificationLock);
Elliott Hughes40eabe22013-02-14 18:59:37 -0800225 _thread_created_hook(thread->tid);
Elliott Hughes4b4a8822013-02-12 17:15:59 -0800226 }
227
228 // Publish the pthread_t and let the thread run.
229 *thread_out = (pthread_t) thread;
230
231 return 0;
232}