xref: /openbsd-src/gnu/llvm/compiler-rt/lib/asan/asan_thread.cpp (revision 3cab2bb3f667058bece8e38b12449a63a9d73c4b)
1*3cab2bb3Spatrick //===-- asan_thread.cpp ---------------------------------------------------===//
2*3cab2bb3Spatrick //
3*3cab2bb3Spatrick // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions.
4*3cab2bb3Spatrick // See https://llvm.org/LICENSE.txt for license information.
5*3cab2bb3Spatrick // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception
6*3cab2bb3Spatrick //
7*3cab2bb3Spatrick //===----------------------------------------------------------------------===//
8*3cab2bb3Spatrick //
9*3cab2bb3Spatrick // This file is a part of AddressSanitizer, an address sanity checker.
10*3cab2bb3Spatrick //
11*3cab2bb3Spatrick // Thread-related code.
12*3cab2bb3Spatrick //===----------------------------------------------------------------------===//
13*3cab2bb3Spatrick #include "asan_allocator.h"
14*3cab2bb3Spatrick #include "asan_interceptors.h"
15*3cab2bb3Spatrick #include "asan_poisoning.h"
16*3cab2bb3Spatrick #include "asan_stack.h"
17*3cab2bb3Spatrick #include "asan_thread.h"
18*3cab2bb3Spatrick #include "asan_mapping.h"
19*3cab2bb3Spatrick #include "sanitizer_common/sanitizer_common.h"
20*3cab2bb3Spatrick #include "sanitizer_common/sanitizer_placement_new.h"
21*3cab2bb3Spatrick #include "sanitizer_common/sanitizer_stackdepot.h"
22*3cab2bb3Spatrick #include "sanitizer_common/sanitizer_tls_get_addr.h"
23*3cab2bb3Spatrick #include "lsan/lsan_common.h"
24*3cab2bb3Spatrick 
25*3cab2bb3Spatrick namespace __asan {
26*3cab2bb3Spatrick 
27*3cab2bb3Spatrick // AsanThreadContext implementation.
28*3cab2bb3Spatrick 
29*3cab2bb3Spatrick void AsanThreadContext::OnCreated(void *arg) {
30*3cab2bb3Spatrick   CreateThreadContextArgs *args = static_cast<CreateThreadContextArgs*>(arg);
31*3cab2bb3Spatrick   if (args->stack)
32*3cab2bb3Spatrick     stack_id = StackDepotPut(*args->stack);
33*3cab2bb3Spatrick   thread = args->thread;
34*3cab2bb3Spatrick   thread->set_context(this);
35*3cab2bb3Spatrick }
36*3cab2bb3Spatrick 
37*3cab2bb3Spatrick void AsanThreadContext::OnFinished() {
38*3cab2bb3Spatrick   // Drop the link to the AsanThread object.
39*3cab2bb3Spatrick   thread = nullptr;
40*3cab2bb3Spatrick }
41*3cab2bb3Spatrick 
42*3cab2bb3Spatrick // MIPS requires aligned address
43*3cab2bb3Spatrick static ALIGNED(16) char thread_registry_placeholder[sizeof(ThreadRegistry)];
44*3cab2bb3Spatrick static ThreadRegistry *asan_thread_registry;
45*3cab2bb3Spatrick 
46*3cab2bb3Spatrick static BlockingMutex mu_for_thread_context(LINKER_INITIALIZED);
47*3cab2bb3Spatrick static LowLevelAllocator allocator_for_thread_context;
48*3cab2bb3Spatrick 
49*3cab2bb3Spatrick static ThreadContextBase *GetAsanThreadContext(u32 tid) {
50*3cab2bb3Spatrick   BlockingMutexLock lock(&mu_for_thread_context);
51*3cab2bb3Spatrick   return new(allocator_for_thread_context) AsanThreadContext(tid);
52*3cab2bb3Spatrick }
53*3cab2bb3Spatrick 
54*3cab2bb3Spatrick ThreadRegistry &asanThreadRegistry() {
55*3cab2bb3Spatrick   static bool initialized;
56*3cab2bb3Spatrick   // Don't worry about thread_safety - this should be called when there is
57*3cab2bb3Spatrick   // a single thread.
58*3cab2bb3Spatrick   if (!initialized) {
59*3cab2bb3Spatrick     // Never reuse ASan threads: we store pointer to AsanThreadContext
60*3cab2bb3Spatrick     // in TSD and can't reliably tell when no more TSD destructors will
61*3cab2bb3Spatrick     // be called. It would be wrong to reuse AsanThreadContext for another
62*3cab2bb3Spatrick     // thread before all TSD destructors will be called for it.
63*3cab2bb3Spatrick     asan_thread_registry = new(thread_registry_placeholder) ThreadRegistry(
64*3cab2bb3Spatrick         GetAsanThreadContext, kMaxNumberOfThreads, kMaxNumberOfThreads);
65*3cab2bb3Spatrick     initialized = true;
66*3cab2bb3Spatrick   }
67*3cab2bb3Spatrick   return *asan_thread_registry;
68*3cab2bb3Spatrick }
69*3cab2bb3Spatrick 
70*3cab2bb3Spatrick AsanThreadContext *GetThreadContextByTidLocked(u32 tid) {
71*3cab2bb3Spatrick   return static_cast<AsanThreadContext *>(
72*3cab2bb3Spatrick       asanThreadRegistry().GetThreadLocked(tid));
73*3cab2bb3Spatrick }
74*3cab2bb3Spatrick 
75*3cab2bb3Spatrick // AsanThread implementation.
76*3cab2bb3Spatrick 
77*3cab2bb3Spatrick AsanThread *AsanThread::Create(thread_callback_t start_routine, void *arg,
78*3cab2bb3Spatrick                                u32 parent_tid, StackTrace *stack,
79*3cab2bb3Spatrick                                bool detached) {
80*3cab2bb3Spatrick   uptr PageSize = GetPageSizeCached();
81*3cab2bb3Spatrick   uptr size = RoundUpTo(sizeof(AsanThread), PageSize);
82*3cab2bb3Spatrick   AsanThread *thread = (AsanThread*)MmapOrDie(size, __func__);
83*3cab2bb3Spatrick   thread->start_routine_ = start_routine;
84*3cab2bb3Spatrick   thread->arg_ = arg;
85*3cab2bb3Spatrick   AsanThreadContext::CreateThreadContextArgs args = {thread, stack};
86*3cab2bb3Spatrick   asanThreadRegistry().CreateThread(*reinterpret_cast<uptr *>(thread), detached,
87*3cab2bb3Spatrick                                     parent_tid, &args);
88*3cab2bb3Spatrick 
89*3cab2bb3Spatrick   return thread;
90*3cab2bb3Spatrick }
91*3cab2bb3Spatrick 
92*3cab2bb3Spatrick void AsanThread::TSDDtor(void *tsd) {
93*3cab2bb3Spatrick   AsanThreadContext *context = (AsanThreadContext*)tsd;
94*3cab2bb3Spatrick   VReport(1, "T%d TSDDtor\n", context->tid);
95*3cab2bb3Spatrick   if (context->thread)
96*3cab2bb3Spatrick     context->thread->Destroy();
97*3cab2bb3Spatrick }
98*3cab2bb3Spatrick 
99*3cab2bb3Spatrick void AsanThread::Destroy() {
100*3cab2bb3Spatrick   int tid = this->tid();
101*3cab2bb3Spatrick   VReport(1, "T%d exited\n", tid);
102*3cab2bb3Spatrick 
103*3cab2bb3Spatrick   malloc_storage().CommitBack();
104*3cab2bb3Spatrick   if (common_flags()->use_sigaltstack) UnsetAlternateSignalStack();
105*3cab2bb3Spatrick   asanThreadRegistry().FinishThread(tid);
106*3cab2bb3Spatrick   FlushToDeadThreadStats(&stats_);
107*3cab2bb3Spatrick   // We also clear the shadow on thread destruction because
108*3cab2bb3Spatrick   // some code may still be executing in later TSD destructors
109*3cab2bb3Spatrick   // and we don't want it to have any poisoned stack.
110*3cab2bb3Spatrick   ClearShadowForThreadStackAndTLS();
111*3cab2bb3Spatrick   DeleteFakeStack(tid);
112*3cab2bb3Spatrick   uptr size = RoundUpTo(sizeof(AsanThread), GetPageSizeCached());
113*3cab2bb3Spatrick   UnmapOrDie(this, size);
114*3cab2bb3Spatrick   DTLS_Destroy();
115*3cab2bb3Spatrick }
116*3cab2bb3Spatrick 
117*3cab2bb3Spatrick void AsanThread::StartSwitchFiber(FakeStack **fake_stack_save, uptr bottom,
118*3cab2bb3Spatrick                                   uptr size) {
119*3cab2bb3Spatrick   if (atomic_load(&stack_switching_, memory_order_relaxed)) {
120*3cab2bb3Spatrick     Report("ERROR: starting fiber switch while in fiber switch\n");
121*3cab2bb3Spatrick     Die();
122*3cab2bb3Spatrick   }
123*3cab2bb3Spatrick 
124*3cab2bb3Spatrick   next_stack_bottom_ = bottom;
125*3cab2bb3Spatrick   next_stack_top_ = bottom + size;
126*3cab2bb3Spatrick   atomic_store(&stack_switching_, 1, memory_order_release);
127*3cab2bb3Spatrick 
128*3cab2bb3Spatrick   FakeStack *current_fake_stack = fake_stack_;
129*3cab2bb3Spatrick   if (fake_stack_save)
130*3cab2bb3Spatrick     *fake_stack_save = fake_stack_;
131*3cab2bb3Spatrick   fake_stack_ = nullptr;
132*3cab2bb3Spatrick   SetTLSFakeStack(nullptr);
133*3cab2bb3Spatrick   // if fake_stack_save is null, the fiber will die, delete the fakestack
134*3cab2bb3Spatrick   if (!fake_stack_save && current_fake_stack)
135*3cab2bb3Spatrick     current_fake_stack->Destroy(this->tid());
136*3cab2bb3Spatrick }
137*3cab2bb3Spatrick 
138*3cab2bb3Spatrick void AsanThread::FinishSwitchFiber(FakeStack *fake_stack_save,
139*3cab2bb3Spatrick                                    uptr *bottom_old,
140*3cab2bb3Spatrick                                    uptr *size_old) {
141*3cab2bb3Spatrick   if (!atomic_load(&stack_switching_, memory_order_relaxed)) {
142*3cab2bb3Spatrick     Report("ERROR: finishing a fiber switch that has not started\n");
143*3cab2bb3Spatrick     Die();
144*3cab2bb3Spatrick   }
145*3cab2bb3Spatrick 
146*3cab2bb3Spatrick   if (fake_stack_save) {
147*3cab2bb3Spatrick     SetTLSFakeStack(fake_stack_save);
148*3cab2bb3Spatrick     fake_stack_ = fake_stack_save;
149*3cab2bb3Spatrick   }
150*3cab2bb3Spatrick 
151*3cab2bb3Spatrick   if (bottom_old)
152*3cab2bb3Spatrick     *bottom_old = stack_bottom_;
153*3cab2bb3Spatrick   if (size_old)
154*3cab2bb3Spatrick     *size_old = stack_top_ - stack_bottom_;
155*3cab2bb3Spatrick   stack_bottom_ = next_stack_bottom_;
156*3cab2bb3Spatrick   stack_top_ = next_stack_top_;
157*3cab2bb3Spatrick   atomic_store(&stack_switching_, 0, memory_order_release);
158*3cab2bb3Spatrick   next_stack_top_ = 0;
159*3cab2bb3Spatrick   next_stack_bottom_ = 0;
160*3cab2bb3Spatrick }
161*3cab2bb3Spatrick 
162*3cab2bb3Spatrick inline AsanThread::StackBounds AsanThread::GetStackBounds() const {
163*3cab2bb3Spatrick   if (!atomic_load(&stack_switching_, memory_order_acquire)) {
164*3cab2bb3Spatrick     // Make sure the stack bounds are fully initialized.
165*3cab2bb3Spatrick     if (stack_bottom_ >= stack_top_) return {0, 0};
166*3cab2bb3Spatrick     return {stack_bottom_, stack_top_};
167*3cab2bb3Spatrick   }
168*3cab2bb3Spatrick   char local;
169*3cab2bb3Spatrick   const uptr cur_stack = (uptr)&local;
170*3cab2bb3Spatrick   // Note: need to check next stack first, because FinishSwitchFiber
171*3cab2bb3Spatrick   // may be in process of overwriting stack_top_/bottom_. But in such case
172*3cab2bb3Spatrick   // we are already on the next stack.
173*3cab2bb3Spatrick   if (cur_stack >= next_stack_bottom_ && cur_stack < next_stack_top_)
174*3cab2bb3Spatrick     return {next_stack_bottom_, next_stack_top_};
175*3cab2bb3Spatrick   return {stack_bottom_, stack_top_};
176*3cab2bb3Spatrick }
177*3cab2bb3Spatrick 
178*3cab2bb3Spatrick uptr AsanThread::stack_top() {
179*3cab2bb3Spatrick   return GetStackBounds().top;
180*3cab2bb3Spatrick }
181*3cab2bb3Spatrick 
182*3cab2bb3Spatrick uptr AsanThread::stack_bottom() {
183*3cab2bb3Spatrick   return GetStackBounds().bottom;
184*3cab2bb3Spatrick }
185*3cab2bb3Spatrick 
186*3cab2bb3Spatrick uptr AsanThread::stack_size() {
187*3cab2bb3Spatrick   const auto bounds = GetStackBounds();
188*3cab2bb3Spatrick   return bounds.top - bounds.bottom;
189*3cab2bb3Spatrick }
190*3cab2bb3Spatrick 
191*3cab2bb3Spatrick // We want to create the FakeStack lazyly on the first use, but not eralier
192*3cab2bb3Spatrick // than the stack size is known and the procedure has to be async-signal safe.
193*3cab2bb3Spatrick FakeStack *AsanThread::AsyncSignalSafeLazyInitFakeStack() {
194*3cab2bb3Spatrick   uptr stack_size = this->stack_size();
195*3cab2bb3Spatrick   if (stack_size == 0)  // stack_size is not yet available, don't use FakeStack.
196*3cab2bb3Spatrick     return nullptr;
197*3cab2bb3Spatrick   uptr old_val = 0;
198*3cab2bb3Spatrick   // fake_stack_ has 3 states:
199*3cab2bb3Spatrick   // 0   -- not initialized
200*3cab2bb3Spatrick   // 1   -- being initialized
201*3cab2bb3Spatrick   // ptr -- initialized
202*3cab2bb3Spatrick   // This CAS checks if the state was 0 and if so changes it to state 1,
203*3cab2bb3Spatrick   // if that was successful, it initializes the pointer.
204*3cab2bb3Spatrick   if (atomic_compare_exchange_strong(
205*3cab2bb3Spatrick       reinterpret_cast<atomic_uintptr_t *>(&fake_stack_), &old_val, 1UL,
206*3cab2bb3Spatrick       memory_order_relaxed)) {
207*3cab2bb3Spatrick     uptr stack_size_log = Log2(RoundUpToPowerOfTwo(stack_size));
208*3cab2bb3Spatrick     CHECK_LE(flags()->min_uar_stack_size_log, flags()->max_uar_stack_size_log);
209*3cab2bb3Spatrick     stack_size_log =
210*3cab2bb3Spatrick         Min(stack_size_log, static_cast<uptr>(flags()->max_uar_stack_size_log));
211*3cab2bb3Spatrick     stack_size_log =
212*3cab2bb3Spatrick         Max(stack_size_log, static_cast<uptr>(flags()->min_uar_stack_size_log));
213*3cab2bb3Spatrick     fake_stack_ = FakeStack::Create(stack_size_log);
214*3cab2bb3Spatrick     SetTLSFakeStack(fake_stack_);
215*3cab2bb3Spatrick     return fake_stack_;
216*3cab2bb3Spatrick   }
217*3cab2bb3Spatrick   return nullptr;
218*3cab2bb3Spatrick }
219*3cab2bb3Spatrick 
220*3cab2bb3Spatrick void AsanThread::Init(const InitOptions *options) {
221*3cab2bb3Spatrick   next_stack_top_ = next_stack_bottom_ = 0;
222*3cab2bb3Spatrick   atomic_store(&stack_switching_, false, memory_order_release);
223*3cab2bb3Spatrick   CHECK_EQ(this->stack_size(), 0U);
224*3cab2bb3Spatrick   SetThreadStackAndTls(options);
225*3cab2bb3Spatrick   if (stack_top_ != stack_bottom_) {
226*3cab2bb3Spatrick     CHECK_GT(this->stack_size(), 0U);
227*3cab2bb3Spatrick     CHECK(AddrIsInMem(stack_bottom_));
228*3cab2bb3Spatrick     CHECK(AddrIsInMem(stack_top_ - 1));
229*3cab2bb3Spatrick   }
230*3cab2bb3Spatrick   ClearShadowForThreadStackAndTLS();
231*3cab2bb3Spatrick   fake_stack_ = nullptr;
232*3cab2bb3Spatrick   if (__asan_option_detect_stack_use_after_return)
233*3cab2bb3Spatrick     AsyncSignalSafeLazyInitFakeStack();
234*3cab2bb3Spatrick   int local = 0;
235*3cab2bb3Spatrick   VReport(1, "T%d: stack [%p,%p) size 0x%zx; local=%p\n", tid(),
236*3cab2bb3Spatrick           (void *)stack_bottom_, (void *)stack_top_, stack_top_ - stack_bottom_,
237*3cab2bb3Spatrick           &local);
238*3cab2bb3Spatrick }
239*3cab2bb3Spatrick 
240*3cab2bb3Spatrick // Fuchsia and RTEMS don't use ThreadStart.
241*3cab2bb3Spatrick // asan_fuchsia.c/asan_rtems.c define CreateMainThread and
242*3cab2bb3Spatrick // SetThreadStackAndTls.
243*3cab2bb3Spatrick #if !SANITIZER_FUCHSIA && !SANITIZER_RTEMS
244*3cab2bb3Spatrick 
245*3cab2bb3Spatrick thread_return_t AsanThread::ThreadStart(
246*3cab2bb3Spatrick     tid_t os_id, atomic_uintptr_t *signal_thread_is_registered) {
247*3cab2bb3Spatrick   Init();
248*3cab2bb3Spatrick   asanThreadRegistry().StartThread(tid(), os_id, ThreadType::Regular, nullptr);
249*3cab2bb3Spatrick   if (signal_thread_is_registered)
250*3cab2bb3Spatrick     atomic_store(signal_thread_is_registered, 1, memory_order_release);
251*3cab2bb3Spatrick 
252*3cab2bb3Spatrick   if (common_flags()->use_sigaltstack) SetAlternateSignalStack();
253*3cab2bb3Spatrick 
254*3cab2bb3Spatrick   if (!start_routine_) {
255*3cab2bb3Spatrick     // start_routine_ == 0 if we're on the main thread or on one of the
256*3cab2bb3Spatrick     // OS X libdispatch worker threads. But nobody is supposed to call
257*3cab2bb3Spatrick     // ThreadStart() for the worker threads.
258*3cab2bb3Spatrick     CHECK_EQ(tid(), 0);
259*3cab2bb3Spatrick     return 0;
260*3cab2bb3Spatrick   }
261*3cab2bb3Spatrick 
262*3cab2bb3Spatrick   thread_return_t res = start_routine_(arg_);
263*3cab2bb3Spatrick 
264*3cab2bb3Spatrick   // On POSIX systems we defer this to the TSD destructor. LSan will consider
265*3cab2bb3Spatrick   // the thread's memory as non-live from the moment we call Destroy(), even
266*3cab2bb3Spatrick   // though that memory might contain pointers to heap objects which will be
267*3cab2bb3Spatrick   // cleaned up by a user-defined TSD destructor. Thus, calling Destroy() before
268*3cab2bb3Spatrick   // the TSD destructors have run might cause false positives in LSan.
269*3cab2bb3Spatrick   if (!SANITIZER_POSIX)
270*3cab2bb3Spatrick     this->Destroy();
271*3cab2bb3Spatrick 
272*3cab2bb3Spatrick   return res;
273*3cab2bb3Spatrick }
274*3cab2bb3Spatrick 
275*3cab2bb3Spatrick AsanThread *CreateMainThread() {
276*3cab2bb3Spatrick   AsanThread *main_thread = AsanThread::Create(
277*3cab2bb3Spatrick       /* start_routine */ nullptr, /* arg */ nullptr, /* parent_tid */ 0,
278*3cab2bb3Spatrick       /* stack */ nullptr, /* detached */ true);
279*3cab2bb3Spatrick   SetCurrentThread(main_thread);
280*3cab2bb3Spatrick   main_thread->ThreadStart(internal_getpid(),
281*3cab2bb3Spatrick                            /* signal_thread_is_registered */ nullptr);
282*3cab2bb3Spatrick   return main_thread;
283*3cab2bb3Spatrick }
284*3cab2bb3Spatrick 
285*3cab2bb3Spatrick // This implementation doesn't use the argument, which is just passed down
286*3cab2bb3Spatrick // from the caller of Init (which see, above).  It's only there to support
287*3cab2bb3Spatrick // OS-specific implementations that need more information passed through.
288*3cab2bb3Spatrick void AsanThread::SetThreadStackAndTls(const InitOptions *options) {
289*3cab2bb3Spatrick   DCHECK_EQ(options, nullptr);
290*3cab2bb3Spatrick   uptr tls_size = 0;
291*3cab2bb3Spatrick   uptr stack_size = 0;
292*3cab2bb3Spatrick   GetThreadStackAndTls(tid() == 0, &stack_bottom_, &stack_size, &tls_begin_,
293*3cab2bb3Spatrick                        &tls_size);
294*3cab2bb3Spatrick   stack_top_ = stack_bottom_ + stack_size;
295*3cab2bb3Spatrick   tls_end_ = tls_begin_ + tls_size;
296*3cab2bb3Spatrick   dtls_ = DTLS_Get();
297*3cab2bb3Spatrick 
298*3cab2bb3Spatrick   if (stack_top_ != stack_bottom_) {
299*3cab2bb3Spatrick     int local;
300*3cab2bb3Spatrick     CHECK(AddrIsInStack((uptr)&local));
301*3cab2bb3Spatrick   }
302*3cab2bb3Spatrick }
303*3cab2bb3Spatrick 
304*3cab2bb3Spatrick #endif  // !SANITIZER_FUCHSIA && !SANITIZER_RTEMS
305*3cab2bb3Spatrick 
306*3cab2bb3Spatrick void AsanThread::ClearShadowForThreadStackAndTLS() {
307*3cab2bb3Spatrick   if (stack_top_ != stack_bottom_)
308*3cab2bb3Spatrick     PoisonShadow(stack_bottom_, stack_top_ - stack_bottom_, 0);
309*3cab2bb3Spatrick   if (tls_begin_ != tls_end_) {
310*3cab2bb3Spatrick     uptr tls_begin_aligned = RoundDownTo(tls_begin_, SHADOW_GRANULARITY);
311*3cab2bb3Spatrick     uptr tls_end_aligned = RoundUpTo(tls_end_, SHADOW_GRANULARITY);
312*3cab2bb3Spatrick     FastPoisonShadowPartialRightRedzone(tls_begin_aligned,
313*3cab2bb3Spatrick                                         tls_end_ - tls_begin_aligned,
314*3cab2bb3Spatrick                                         tls_end_aligned - tls_end_, 0);
315*3cab2bb3Spatrick   }
316*3cab2bb3Spatrick }
317*3cab2bb3Spatrick 
318*3cab2bb3Spatrick bool AsanThread::GetStackFrameAccessByAddr(uptr addr,
319*3cab2bb3Spatrick                                            StackFrameAccess *access) {
320*3cab2bb3Spatrick   if (stack_top_ == stack_bottom_)
321*3cab2bb3Spatrick     return false;
322*3cab2bb3Spatrick 
323*3cab2bb3Spatrick   uptr bottom = 0;
324*3cab2bb3Spatrick   if (AddrIsInStack(addr)) {
325*3cab2bb3Spatrick     bottom = stack_bottom();
326*3cab2bb3Spatrick   } else if (has_fake_stack()) {
327*3cab2bb3Spatrick     bottom = fake_stack()->AddrIsInFakeStack(addr);
328*3cab2bb3Spatrick     CHECK(bottom);
329*3cab2bb3Spatrick     access->offset = addr - bottom;
330*3cab2bb3Spatrick     access->frame_pc = ((uptr*)bottom)[2];
331*3cab2bb3Spatrick     access->frame_descr = (const char *)((uptr*)bottom)[1];
332*3cab2bb3Spatrick     return true;
333*3cab2bb3Spatrick   }
334*3cab2bb3Spatrick   uptr aligned_addr = RoundDownTo(addr, SANITIZER_WORDSIZE / 8);  // align addr.
335*3cab2bb3Spatrick   uptr mem_ptr = RoundDownTo(aligned_addr, SHADOW_GRANULARITY);
336*3cab2bb3Spatrick   u8 *shadow_ptr = (u8*)MemToShadow(aligned_addr);
337*3cab2bb3Spatrick   u8 *shadow_bottom = (u8*)MemToShadow(bottom);
338*3cab2bb3Spatrick 
339*3cab2bb3Spatrick   while (shadow_ptr >= shadow_bottom &&
340*3cab2bb3Spatrick          *shadow_ptr != kAsanStackLeftRedzoneMagic) {
341*3cab2bb3Spatrick     shadow_ptr--;
342*3cab2bb3Spatrick     mem_ptr -= SHADOW_GRANULARITY;
343*3cab2bb3Spatrick   }
344*3cab2bb3Spatrick 
345*3cab2bb3Spatrick   while (shadow_ptr >= shadow_bottom &&
346*3cab2bb3Spatrick          *shadow_ptr == kAsanStackLeftRedzoneMagic) {
347*3cab2bb3Spatrick     shadow_ptr--;
348*3cab2bb3Spatrick     mem_ptr -= SHADOW_GRANULARITY;
349*3cab2bb3Spatrick   }
350*3cab2bb3Spatrick 
351*3cab2bb3Spatrick   if (shadow_ptr < shadow_bottom) {
352*3cab2bb3Spatrick     return false;
353*3cab2bb3Spatrick   }
354*3cab2bb3Spatrick 
355*3cab2bb3Spatrick   uptr* ptr = (uptr*)(mem_ptr + SHADOW_GRANULARITY);
356*3cab2bb3Spatrick   CHECK(ptr[0] == kCurrentStackFrameMagic);
357*3cab2bb3Spatrick   access->offset = addr - (uptr)ptr;
358*3cab2bb3Spatrick   access->frame_pc = ptr[2];
359*3cab2bb3Spatrick   access->frame_descr = (const char*)ptr[1];
360*3cab2bb3Spatrick   return true;
361*3cab2bb3Spatrick }
362*3cab2bb3Spatrick 
363*3cab2bb3Spatrick uptr AsanThread::GetStackVariableShadowStart(uptr addr) {
364*3cab2bb3Spatrick   uptr bottom = 0;
365*3cab2bb3Spatrick   if (AddrIsInStack(addr)) {
366*3cab2bb3Spatrick     bottom = stack_bottom();
367*3cab2bb3Spatrick   } else if (has_fake_stack()) {
368*3cab2bb3Spatrick     bottom = fake_stack()->AddrIsInFakeStack(addr);
369*3cab2bb3Spatrick     CHECK(bottom);
370*3cab2bb3Spatrick   } else {
371*3cab2bb3Spatrick     return 0;
372*3cab2bb3Spatrick   }
373*3cab2bb3Spatrick 
374*3cab2bb3Spatrick   uptr aligned_addr = RoundDownTo(addr, SANITIZER_WORDSIZE / 8);  // align addr.
375*3cab2bb3Spatrick   u8 *shadow_ptr = (u8*)MemToShadow(aligned_addr);
376*3cab2bb3Spatrick   u8 *shadow_bottom = (u8*)MemToShadow(bottom);
377*3cab2bb3Spatrick 
378*3cab2bb3Spatrick   while (shadow_ptr >= shadow_bottom &&
379*3cab2bb3Spatrick          (*shadow_ptr != kAsanStackLeftRedzoneMagic &&
380*3cab2bb3Spatrick           *shadow_ptr != kAsanStackMidRedzoneMagic &&
381*3cab2bb3Spatrick           *shadow_ptr != kAsanStackRightRedzoneMagic))
382*3cab2bb3Spatrick     shadow_ptr--;
383*3cab2bb3Spatrick 
384*3cab2bb3Spatrick   return (uptr)shadow_ptr + 1;
385*3cab2bb3Spatrick }
386*3cab2bb3Spatrick 
387*3cab2bb3Spatrick bool AsanThread::AddrIsInStack(uptr addr) {
388*3cab2bb3Spatrick   const auto bounds = GetStackBounds();
389*3cab2bb3Spatrick   return addr >= bounds.bottom && addr < bounds.top;
390*3cab2bb3Spatrick }
391*3cab2bb3Spatrick 
392*3cab2bb3Spatrick static bool ThreadStackContainsAddress(ThreadContextBase *tctx_base,
393*3cab2bb3Spatrick                                        void *addr) {
394*3cab2bb3Spatrick   AsanThreadContext *tctx = static_cast<AsanThreadContext*>(tctx_base);
395*3cab2bb3Spatrick   AsanThread *t = tctx->thread;
396*3cab2bb3Spatrick   if (!t) return false;
397*3cab2bb3Spatrick   if (t->AddrIsInStack((uptr)addr)) return true;
398*3cab2bb3Spatrick   if (t->has_fake_stack() && t->fake_stack()->AddrIsInFakeStack((uptr)addr))
399*3cab2bb3Spatrick     return true;
400*3cab2bb3Spatrick   return false;
401*3cab2bb3Spatrick }
402*3cab2bb3Spatrick 
403*3cab2bb3Spatrick AsanThread *GetCurrentThread() {
404*3cab2bb3Spatrick   if (SANITIZER_RTEMS && !asan_inited)
405*3cab2bb3Spatrick     return nullptr;
406*3cab2bb3Spatrick 
407*3cab2bb3Spatrick   AsanThreadContext *context =
408*3cab2bb3Spatrick       reinterpret_cast<AsanThreadContext *>(AsanTSDGet());
409*3cab2bb3Spatrick   if (!context) {
410*3cab2bb3Spatrick     if (SANITIZER_ANDROID) {
411*3cab2bb3Spatrick       // On Android, libc constructor is called _after_ asan_init, and cleans up
412*3cab2bb3Spatrick       // TSD. Try to figure out if this is still the main thread by the stack
413*3cab2bb3Spatrick       // address. We are not entirely sure that we have correct main thread
414*3cab2bb3Spatrick       // limits, so only do this magic on Android, and only if the found thread
415*3cab2bb3Spatrick       // is the main thread.
416*3cab2bb3Spatrick       AsanThreadContext *tctx = GetThreadContextByTidLocked(0);
417*3cab2bb3Spatrick       if (tctx && ThreadStackContainsAddress(tctx, &context)) {
418*3cab2bb3Spatrick         SetCurrentThread(tctx->thread);
419*3cab2bb3Spatrick         return tctx->thread;
420*3cab2bb3Spatrick       }
421*3cab2bb3Spatrick     }
422*3cab2bb3Spatrick     return nullptr;
423*3cab2bb3Spatrick   }
424*3cab2bb3Spatrick   return context->thread;
425*3cab2bb3Spatrick }
426*3cab2bb3Spatrick 
427*3cab2bb3Spatrick void SetCurrentThread(AsanThread *t) {
428*3cab2bb3Spatrick   CHECK(t->context());
429*3cab2bb3Spatrick   VReport(2, "SetCurrentThread: %p for thread %p\n", t->context(),
430*3cab2bb3Spatrick           (void *)GetThreadSelf());
431*3cab2bb3Spatrick   // Make sure we do not reset the current AsanThread.
432*3cab2bb3Spatrick   CHECK_EQ(0, AsanTSDGet());
433*3cab2bb3Spatrick   AsanTSDSet(t->context());
434*3cab2bb3Spatrick   CHECK_EQ(t->context(), AsanTSDGet());
435*3cab2bb3Spatrick }
436*3cab2bb3Spatrick 
437*3cab2bb3Spatrick u32 GetCurrentTidOrInvalid() {
438*3cab2bb3Spatrick   AsanThread *t = GetCurrentThread();
439*3cab2bb3Spatrick   return t ? t->tid() : kInvalidTid;
440*3cab2bb3Spatrick }
441*3cab2bb3Spatrick 
442*3cab2bb3Spatrick AsanThread *FindThreadByStackAddress(uptr addr) {
443*3cab2bb3Spatrick   asanThreadRegistry().CheckLocked();
444*3cab2bb3Spatrick   AsanThreadContext *tctx = static_cast<AsanThreadContext *>(
445*3cab2bb3Spatrick       asanThreadRegistry().FindThreadContextLocked(ThreadStackContainsAddress,
446*3cab2bb3Spatrick                                                    (void *)addr));
447*3cab2bb3Spatrick   return tctx ? tctx->thread : nullptr;
448*3cab2bb3Spatrick }
449*3cab2bb3Spatrick 
450*3cab2bb3Spatrick void EnsureMainThreadIDIsCorrect() {
451*3cab2bb3Spatrick   AsanThreadContext *context =
452*3cab2bb3Spatrick       reinterpret_cast<AsanThreadContext *>(AsanTSDGet());
453*3cab2bb3Spatrick   if (context && (context->tid == 0))
454*3cab2bb3Spatrick     context->os_id = GetTid();
455*3cab2bb3Spatrick }
456*3cab2bb3Spatrick 
457*3cab2bb3Spatrick __asan::AsanThread *GetAsanThreadByOsIDLocked(tid_t os_id) {
458*3cab2bb3Spatrick   __asan::AsanThreadContext *context = static_cast<__asan::AsanThreadContext *>(
459*3cab2bb3Spatrick       __asan::asanThreadRegistry().FindThreadContextByOsIDLocked(os_id));
460*3cab2bb3Spatrick   if (!context) return nullptr;
461*3cab2bb3Spatrick   return context->thread;
462*3cab2bb3Spatrick }
463*3cab2bb3Spatrick } // namespace __asan
464*3cab2bb3Spatrick 
465*3cab2bb3Spatrick // --- Implementation of LSan-specific functions --- {{{1
466*3cab2bb3Spatrick namespace __lsan {
467*3cab2bb3Spatrick bool GetThreadRangesLocked(tid_t os_id, uptr *stack_begin, uptr *stack_end,
468*3cab2bb3Spatrick                            uptr *tls_begin, uptr *tls_end, uptr *cache_begin,
469*3cab2bb3Spatrick                            uptr *cache_end, DTLS **dtls) {
470*3cab2bb3Spatrick   __asan::AsanThread *t = __asan::GetAsanThreadByOsIDLocked(os_id);
471*3cab2bb3Spatrick   if (!t) return false;
472*3cab2bb3Spatrick   *stack_begin = t->stack_bottom();
473*3cab2bb3Spatrick   *stack_end = t->stack_top();
474*3cab2bb3Spatrick   *tls_begin = t->tls_begin();
475*3cab2bb3Spatrick   *tls_end = t->tls_end();
476*3cab2bb3Spatrick   // ASan doesn't keep allocator caches in TLS, so these are unused.
477*3cab2bb3Spatrick   *cache_begin = 0;
478*3cab2bb3Spatrick   *cache_end = 0;
479*3cab2bb3Spatrick   *dtls = t->dtls();
480*3cab2bb3Spatrick   return true;
481*3cab2bb3Spatrick }
482*3cab2bb3Spatrick 
483*3cab2bb3Spatrick void ForEachExtraStackRange(tid_t os_id, RangeIteratorCallback callback,
484*3cab2bb3Spatrick                             void *arg) {
485*3cab2bb3Spatrick   __asan::AsanThread *t = __asan::GetAsanThreadByOsIDLocked(os_id);
486*3cab2bb3Spatrick   if (t && t->has_fake_stack())
487*3cab2bb3Spatrick     t->fake_stack()->ForEachFakeFrame(callback, arg);
488*3cab2bb3Spatrick }
489*3cab2bb3Spatrick 
490*3cab2bb3Spatrick void LockThreadRegistry() {
491*3cab2bb3Spatrick   __asan::asanThreadRegistry().Lock();
492*3cab2bb3Spatrick }
493*3cab2bb3Spatrick 
494*3cab2bb3Spatrick void UnlockThreadRegistry() {
495*3cab2bb3Spatrick   __asan::asanThreadRegistry().Unlock();
496*3cab2bb3Spatrick }
497*3cab2bb3Spatrick 
498*3cab2bb3Spatrick ThreadRegistry *GetThreadRegistryLocked() {
499*3cab2bb3Spatrick   __asan::asanThreadRegistry().CheckLocked();
500*3cab2bb3Spatrick   return &__asan::asanThreadRegistry();
501*3cab2bb3Spatrick }
502*3cab2bb3Spatrick 
503*3cab2bb3Spatrick void EnsureMainThreadIDIsCorrect() {
504*3cab2bb3Spatrick   __asan::EnsureMainThreadIDIsCorrect();
505*3cab2bb3Spatrick }
506*3cab2bb3Spatrick } // namespace __lsan
507*3cab2bb3Spatrick 
508*3cab2bb3Spatrick // ---------------------- Interface ---------------- {{{1
509*3cab2bb3Spatrick using namespace __asan;
510*3cab2bb3Spatrick 
511*3cab2bb3Spatrick extern "C" {
512*3cab2bb3Spatrick SANITIZER_INTERFACE_ATTRIBUTE
513*3cab2bb3Spatrick void __sanitizer_start_switch_fiber(void **fakestacksave, const void *bottom,
514*3cab2bb3Spatrick                                     uptr size) {
515*3cab2bb3Spatrick   AsanThread *t = GetCurrentThread();
516*3cab2bb3Spatrick   if (!t) {
517*3cab2bb3Spatrick     VReport(1, "__asan_start_switch_fiber called from unknown thread\n");
518*3cab2bb3Spatrick     return;
519*3cab2bb3Spatrick   }
520*3cab2bb3Spatrick   t->StartSwitchFiber((FakeStack**)fakestacksave, (uptr)bottom, size);
521*3cab2bb3Spatrick }
522*3cab2bb3Spatrick 
523*3cab2bb3Spatrick SANITIZER_INTERFACE_ATTRIBUTE
524*3cab2bb3Spatrick void __sanitizer_finish_switch_fiber(void* fakestack,
525*3cab2bb3Spatrick                                      const void **bottom_old,
526*3cab2bb3Spatrick                                      uptr *size_old) {
527*3cab2bb3Spatrick   AsanThread *t = GetCurrentThread();
528*3cab2bb3Spatrick   if (!t) {
529*3cab2bb3Spatrick     VReport(1, "__asan_finish_switch_fiber called from unknown thread\n");
530*3cab2bb3Spatrick     return;
531*3cab2bb3Spatrick   }
532*3cab2bb3Spatrick   t->FinishSwitchFiber((FakeStack*)fakestack,
533*3cab2bb3Spatrick                        (uptr*)bottom_old,
534*3cab2bb3Spatrick                        (uptr*)size_old);
535*3cab2bb3Spatrick }
536*3cab2bb3Spatrick }
537