| /* | 
 |  * Copyright (C) 2008 The Android Open Source Project | 
 |  * All rights reserved. | 
 |  * | 
 |  * Redistribution and use in source and binary forms, with or without | 
 |  * modification, are permitted provided that the following conditions | 
 |  * are met: | 
 |  *  * Redistributions of source code must retain the above copyright | 
 |  *    notice, this list of conditions and the following disclaimer. | 
 |  *  * Redistributions in binary form must reproduce the above copyright | 
 |  *    notice, this list of conditions and the following disclaimer in | 
 |  *    the documentation and/or other materials provided with the | 
 |  *    distribution. | 
 |  * | 
 |  * THIS SOFTWARE IS PROVIDED BY THE COPYRIGHT HOLDERS AND CONTRIBUTORS | 
 |  * "AS IS" AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT | 
 |  * LIMITED TO, THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS | 
 |  * FOR A PARTICULAR PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE | 
 |  * COPYRIGHT OWNER OR CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, | 
 |  * INCIDENTAL, SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, | 
 |  * BUT NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES; LOSS | 
 |  * OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION) HOWEVER CAUSED | 
 |  * AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT, STRICT LIABILITY, | 
 |  * OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN ANY WAY OUT | 
 |  * OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED OF THE POSSIBILITY OF | 
 |  * SUCH DAMAGE. | 
 |  */ | 
 |  | 
 | #include <errno.h> | 
 | #include <pthread.h> | 
 |  | 
 | #include "private/bionic_tls.h" | 
 | #include "pthread_internal.h" | 
 |  | 
 | /* A technical note regarding our thread-local-storage (TLS) implementation: | 
 |  * | 
 |  * There can be up to BIONIC_TLS_SLOTS independent TLS keys in a given process, | 
 |  * The keys below TLS_SLOT_FIRST_USER_SLOT are reserved for Bionic to hold | 
 |  * special thread-specific variables like errno or a pointer to | 
 |  * the current thread's descriptor. These entries cannot be accessed through | 
 |  * pthread_getspecific() / pthread_setspecific() or pthread_key_delete() | 
 |  * | 
 |  * The 'tls_map_t' type defined below implements a shared global map of | 
 |  * currently created/allocated TLS keys and the destructors associated | 
 |  * with them. | 
 |  * | 
 |  * The global TLS map simply contains a bitmap of allocated keys, and | 
 |  * an array of destructors. | 
 |  * | 
 |  * Each thread has a TLS area that is a simple array of BIONIC_TLS_SLOTS void* | 
 |  * pointers. the TLS area of the main thread is stack-allocated in | 
 |  * __libc_init_common, while the TLS area of other threads is placed at | 
 |  * the top of their stack in pthread_create. | 
 |  * | 
 |  * When pthread_key_delete() is called it will erase the key's bitmap bit | 
 |  * and its destructor, and will also clear the key data in the TLS area of | 
 |  * all created threads. As mandated by Posix, it is the responsibility of | 
 |  * the caller of pthread_key_delete() to properly reclaim the objects that | 
 |  * were pointed to by these data fields (either before or after the call). | 
 |  */ | 
 |  | 
 | #define TLSMAP_BITS       32 | 
 | #define TLSMAP_WORDS      ((BIONIC_TLS_SLOTS+TLSMAP_BITS-1)/TLSMAP_BITS) | 
 | #define TLSMAP_WORD(m,k)  (m).map[(k)/TLSMAP_BITS] | 
 | #define TLSMAP_MASK(k)    (1U << ((k)&(TLSMAP_BITS-1))) | 
 |  | 
 | static inline bool IsValidUserKey(pthread_key_t key) { | 
 |   return (key >= TLS_SLOT_FIRST_USER_SLOT && key < BIONIC_TLS_SLOTS); | 
 | } | 
 |  | 
 | typedef void (*key_destructor_t)(void*); | 
 |  | 
 | struct tls_map_t { | 
 |   bool is_initialized; | 
 |  | 
 |   /* bitmap of allocated keys */ | 
 |   uint32_t map[TLSMAP_WORDS]; | 
 |  | 
 |   key_destructor_t key_destructors[BIONIC_TLS_SLOTS]; | 
 | }; | 
 |  | 
 | class ScopedTlsMapAccess { | 
 |  public: | 
 |   ScopedTlsMapAccess() { | 
 |     Lock(); | 
 |  | 
 |     // If this is the first time the TLS map has been accessed, | 
 |     // mark the slots belonging to well-known keys as being in use. | 
 |     // This isn't currently necessary because the well-known keys | 
 |     // can only be accessed directly by bionic itself, do not have | 
 |     // destructors, and all the functions that touch the TLS map | 
 |     // start after the maximum well-known slot. | 
 |     if (!s_tls_map_.is_initialized) { | 
 |       for (pthread_key_t key = 0; key < TLS_SLOT_FIRST_USER_SLOT; ++key) { | 
 |         SetInUse(key, NULL); | 
 |       } | 
 |       s_tls_map_.is_initialized = true; | 
 |     } | 
 |   } | 
 |  | 
 |   ~ScopedTlsMapAccess() { | 
 |     Unlock(); | 
 |   } | 
 |  | 
 |   int CreateKey(pthread_key_t* result, void (*key_destructor)(void*)) { | 
 |     // Take the first unallocated key. | 
 |     for (int key = 0; key < BIONIC_TLS_SLOTS; ++key) { | 
 |       if (!IsInUse(key)) { | 
 |         SetInUse(key, key_destructor); | 
 |         *result = key; | 
 |         return 0; | 
 |       } | 
 |     } | 
 |  | 
 |     // We hit PTHREAD_KEYS_MAX. POSIX says EAGAIN for this case. | 
 |     return EAGAIN; | 
 |   } | 
 |  | 
 |   void DeleteKey(pthread_key_t key) { | 
 |     TLSMAP_WORD(s_tls_map_, key) &= ~TLSMAP_MASK(key); | 
 |     s_tls_map_.key_destructors[key] = NULL; | 
 |   } | 
 |  | 
 |   bool IsInUse(pthread_key_t key) { | 
 |     return (TLSMAP_WORD(s_tls_map_, key) & TLSMAP_MASK(key)) != 0; | 
 |   } | 
 |  | 
 |   void SetInUse(pthread_key_t key, void (*key_destructor)(void*)) { | 
 |     TLSMAP_WORD(s_tls_map_, key) |= TLSMAP_MASK(key); | 
 |     s_tls_map_.key_destructors[key] = key_destructor; | 
 |   } | 
 |  | 
 |   // Called from pthread_exit() to remove all TLS key data | 
 |   // from this thread's TLS area. This must call the destructor of all keys | 
 |   // that have a non-NULL data value and a non-NULL destructor. | 
 |   void CleanAll() { | 
 |     void** tls = __get_tls(); | 
 |  | 
 |     // Because destructors can do funky things like deleting/creating other | 
 |     // keys, we need to implement this in a loop. | 
 |     for (int rounds = PTHREAD_DESTRUCTOR_ITERATIONS; rounds > 0; --rounds) { | 
 |       size_t called_destructor_count = 0; | 
 |       for (int key = 0; key < BIONIC_TLS_SLOTS; ++key) { | 
 |         if (IsInUse(key)) { | 
 |           void* data = tls[key]; | 
 |           void (*key_destructor)(void*) = s_tls_map_.key_destructors[key]; | 
 |  | 
 |           if (data != NULL && key_destructor != NULL) { | 
 |             // we need to clear the key data now, this will prevent the | 
 |             // destructor (or a later one) from seeing the old value if | 
 |             // it calls pthread_getspecific() for some odd reason | 
 |  | 
 |             // we do not do this if 'key_destructor == NULL' just in case another | 
 |             // destructor function might be responsible for manually | 
 |             // releasing the corresponding data. | 
 |             tls[key] = NULL; | 
 |  | 
 |             // because the destructor is free to call pthread_key_create | 
 |             // and/or pthread_key_delete, we need to temporarily unlock | 
 |             // the TLS map | 
 |             Unlock(); | 
 |             (*key_destructor)(data); | 
 |             Lock(); | 
 |             ++called_destructor_count; | 
 |           } | 
 |         } | 
 |       } | 
 |  | 
 |       // If we didn't call any destructors, there is no need to check the TLS data again. | 
 |       if (called_destructor_count == 0) { | 
 |         break; | 
 |       } | 
 |     } | 
 |   } | 
 |  | 
 |  private: | 
 |   static tls_map_t s_tls_map_; | 
 |   static pthread_mutex_t s_tls_map_lock_; | 
 |  | 
 |   void Lock() { | 
 |     pthread_mutex_lock(&s_tls_map_lock_); | 
 |   } | 
 |  | 
 |   void Unlock() { | 
 |     pthread_mutex_unlock(&s_tls_map_lock_); | 
 |   } | 
 | }; | 
 |  | 
 | __LIBC_HIDDEN__ tls_map_t ScopedTlsMapAccess::s_tls_map_; | 
 | __LIBC_HIDDEN__ pthread_mutex_t ScopedTlsMapAccess::s_tls_map_lock_; | 
 |  | 
 | __LIBC_HIDDEN__ void pthread_key_clean_all() { | 
 |   ScopedTlsMapAccess tls_map; | 
 |   tls_map.CleanAll(); | 
 | } | 
 |  | 
 | int pthread_key_create(pthread_key_t* key, void (*key_destructor)(void*)) { | 
 |   ScopedTlsMapAccess tls_map; | 
 |   return tls_map.CreateKey(key, key_destructor); | 
 | } | 
 |  | 
 | // Deletes a pthread_key_t. note that the standard mandates that this does | 
 | // not call the destructors for non-NULL key values. Instead, it is the | 
 | // responsibility of the caller to properly dispose of the corresponding data | 
 | // and resources, using any means it finds suitable. | 
 | int pthread_key_delete(pthread_key_t key) { | 
 |   ScopedTlsMapAccess tls_map; | 
 |  | 
 |   if (!IsValidUserKey(key) || !tls_map.IsInUse(key)) { | 
 |     return EINVAL; | 
 |   } | 
 |  | 
 |   // Clear value in all threads. | 
 |   pthread_mutex_lock(&g_thread_list_lock); | 
 |   for (pthread_internal_t*  t = g_thread_list; t != NULL; t = t->next) { | 
 |     t->tls[key] = NULL; | 
 |   } | 
 |   tls_map.DeleteKey(key); | 
 |  | 
 |   pthread_mutex_unlock(&g_thread_list_lock); | 
 |   return 0; | 
 | } | 
 |  | 
 | void* pthread_getspecific(pthread_key_t key) { | 
 |   if (!IsValidUserKey(key)) { | 
 |     return NULL; | 
 |   } | 
 |  | 
 |   // For performance reasons, we do not lock/unlock the global TLS map | 
 |   // to check that the key is properly allocated. If the key was not | 
 |   // allocated, the value read from the TLS should always be NULL | 
 |   // due to pthread_key_delete() clearing the values for all threads. | 
 |   return __get_tls()[key]; | 
 | } | 
 |  | 
 | int pthread_setspecific(pthread_key_t key, const void* ptr) { | 
 |   ScopedTlsMapAccess tls_map; | 
 |  | 
 |   if (!IsValidUserKey(key) || !tls_map.IsInUse(key)) { | 
 |     return EINVAL; | 
 |   } | 
 |  | 
 |   __get_tls()[key] = const_cast<void*>(ptr); | 
 |   return 0; | 
 | } |