|  | //===-- sanitizer_tls_get_addr.cpp ----------------------------------------===// | 
|  | // | 
|  | // Part of the LLVM Project, under the Apache License v2.0 with LLVM Exceptions. | 
|  | // See https://llvm.org/LICENSE.txt for license information. | 
|  | // SPDX-License-Identifier: Apache-2.0 WITH LLVM-exception | 
|  | // | 
|  | //===----------------------------------------------------------------------===// | 
|  | // | 
|  | // Handle the __tls_get_addr call. | 
|  | // | 
|  | //===----------------------------------------------------------------------===// | 
|  |  | 
|  | #include "sanitizer_tls_get_addr.h" | 
|  |  | 
|  | #include "sanitizer_allocator_interface.h" | 
|  | #include "sanitizer_atomic.h" | 
|  | #include "sanitizer_common/sanitizer_common.h" | 
|  | #include "sanitizer_common/sanitizer_internal_defs.h" | 
|  | #include "sanitizer_flags.h" | 
|  | #include "sanitizer_platform_interceptors.h" | 
|  |  | 
|  | namespace __sanitizer { | 
|  | #if SANITIZER_INTERCEPT_TLS_GET_ADDR | 
|  |  | 
|  | // The actual parameter that comes to __tls_get_addr | 
|  | // is a pointer to a struct with two words in it: | 
|  | struct TlsGetAddrParam { | 
|  | uptr dso_id; | 
|  | uptr offset; | 
|  | }; | 
|  |  | 
|  | // This must be static TLS | 
|  | __attribute__((tls_model("initial-exec"))) | 
|  | static __thread DTLS dtls; | 
|  |  | 
|  | // Make sure we properly destroy the DTLS objects: | 
|  | // this counter should never get too large. | 
|  | static atomic_uintptr_t number_of_live_dtls; | 
|  |  | 
|  | static const uptr kDestroyedThread = -1; | 
|  |  | 
|  | static void DTLS_Deallocate(DTLS::DTVBlock *block) { | 
|  | VReport(2, "__tls_get_addr: DTLS_Deallocate %p\n", (void *)block); | 
|  | UnmapOrDie(block, sizeof(DTLS::DTVBlock)); | 
|  | atomic_fetch_sub(&number_of_live_dtls, 1, memory_order_relaxed); | 
|  | } | 
|  |  | 
|  | static DTLS::DTVBlock *DTLS_NextBlock(atomic_uintptr_t *cur) { | 
|  | uptr v = atomic_load(cur, memory_order_acquire); | 
|  | if (v == kDestroyedThread) | 
|  | return nullptr; | 
|  | DTLS::DTVBlock *next = (DTLS::DTVBlock *)v; | 
|  | if (next) | 
|  | return next; | 
|  | DTLS::DTVBlock *new_dtv = | 
|  | (DTLS::DTVBlock *)MmapOrDie(sizeof(DTLS::DTVBlock), "DTLS_NextBlock"); | 
|  | uptr prev = 0; | 
|  | if (!atomic_compare_exchange_strong(cur, &prev, (uptr)new_dtv, | 
|  | memory_order_seq_cst)) { | 
|  | UnmapOrDie(new_dtv, sizeof(DTLS::DTVBlock)); | 
|  | return (DTLS::DTVBlock *)prev; | 
|  | } | 
|  | uptr num_live_dtls = | 
|  | atomic_fetch_add(&number_of_live_dtls, 1, memory_order_relaxed); | 
|  | VReport(2, "__tls_get_addr: DTLS_NextBlock %p %zd\n", (void *)&dtls, | 
|  | num_live_dtls); | 
|  | return new_dtv; | 
|  | } | 
|  |  | 
|  | static DTLS::DTV *DTLS_Find(uptr id) { | 
|  | VReport(3, "__tls_get_addr: DTLS_Find %p %zd\n", (void *)&dtls, id); | 
|  | static constexpr uptr kPerBlock = ARRAY_SIZE(DTLS::DTVBlock::dtvs); | 
|  | DTLS::DTVBlock *cur = DTLS_NextBlock(&dtls.dtv_block); | 
|  | if (!cur) | 
|  | return nullptr; | 
|  | for (; id >= kPerBlock; id -= kPerBlock) cur = DTLS_NextBlock(&cur->next); | 
|  | return cur->dtvs + id; | 
|  | } | 
|  |  | 
|  | void DTLS_Destroy() { | 
|  | if (!common_flags()->intercept_tls_get_addr) return; | 
|  | VReport(2, "__tls_get_addr: DTLS_Destroy %p\n", (void *)&dtls); | 
|  | DTLS::DTVBlock *block = (DTLS::DTVBlock *)atomic_exchange( | 
|  | &dtls.dtv_block, kDestroyedThread, memory_order_release); | 
|  | while (block) { | 
|  | DTLS::DTVBlock *next = | 
|  | (DTLS::DTVBlock *)atomic_load(&block->next, memory_order_acquire); | 
|  | DTLS_Deallocate(block); | 
|  | block = next; | 
|  | } | 
|  | } | 
|  |  | 
|  | #if defined(__powerpc64__) || defined(__mips__) | 
|  | // This is glibc's TLS_DTV_OFFSET: | 
|  | // "Dynamic thread vector pointers point 0x8000 past the start of each | 
|  | //  TLS block." (sysdeps/<arch>/dl-tls.h) | 
|  | static const uptr kDtvOffset = 0x8000; | 
|  | #elif defined(__riscv) | 
|  | // This is glibc's TLS_DTV_OFFSET: | 
|  | // "Dynamic thread vector pointers point 0x800 past the start of each | 
|  | // TLS block." (sysdeps/riscv/dl-tls.h) | 
|  | static const uptr kDtvOffset = 0x800; | 
|  | #else | 
|  | static const uptr kDtvOffset = 0; | 
|  | #endif | 
|  |  | 
|  | extern "C" { | 
|  | SANITIZER_WEAK_ATTRIBUTE | 
|  | uptr __sanitizer_get_allocated_size(const void *p); | 
|  |  | 
|  | SANITIZER_WEAK_ATTRIBUTE | 
|  | const void *__sanitizer_get_allocated_begin(const void *p); | 
|  | } | 
|  |  | 
|  | SANITIZER_INTERFACE_WEAK_DEF(uptr, __sanitizer_get_dtls_size, | 
|  | const void *tls_begin) { | 
|  | const void *start = __sanitizer_get_allocated_begin(tls_begin); | 
|  | if (!start) | 
|  | return 0; | 
|  | CHECK_LE(start, tls_begin); | 
|  | uptr tls_size = __sanitizer_get_allocated_size(start); | 
|  | VReport(2, "__tls_get_addr: glibc DTLS suspected; tls={%p,0x%zx}\n", | 
|  | tls_begin, tls_size); | 
|  | uptr offset = | 
|  | (reinterpret_cast<uptr>(tls_begin) - reinterpret_cast<uptr>(start)); | 
|  | CHECK_LE(offset, tls_size); | 
|  | return tls_size - offset; | 
|  | } | 
|  |  | 
|  | DTLS::DTV *DTLS_on_tls_get_addr(void *arg_void, void *res, | 
|  | uptr static_tls_begin, uptr static_tls_end) { | 
|  | if (!common_flags()->intercept_tls_get_addr) return 0; | 
|  | TlsGetAddrParam *arg = reinterpret_cast<TlsGetAddrParam *>(arg_void); | 
|  | uptr dso_id = arg->dso_id; | 
|  | DTLS::DTV *dtv = DTLS_Find(dso_id); | 
|  | if (!dtv || dtv->beg) | 
|  | return nullptr; | 
|  | CHECK_LE(static_tls_begin, static_tls_end); | 
|  | uptr tls_beg = reinterpret_cast<uptr>(res) - arg->offset - kDtvOffset; | 
|  | VReport(2, | 
|  | "__tls_get_addr: %p {0x%zx,0x%zx} => %p; tls_beg: %p; sp: %p " | 
|  | "num_live_dtls %zd\n", | 
|  | (void *)arg, arg->dso_id, arg->offset, res, (void *)tls_beg, | 
|  | (void *)&tls_beg, | 
|  | atomic_load(&number_of_live_dtls, memory_order_relaxed)); | 
|  | if (tls_beg >= static_tls_begin && tls_beg < static_tls_end) { | 
|  | // This is the static TLS block which was initialized / unpoisoned at thread | 
|  | // creation. | 
|  | VReport(2, "__tls_get_addr: static tls: %p\n", (void *)tls_beg); | 
|  | dtv->beg = tls_beg; | 
|  | dtv->size = 0; | 
|  | return nullptr; | 
|  | } | 
|  | if (uptr tls_size = | 
|  | __sanitizer_get_dtls_size(reinterpret_cast<void *>(tls_beg))) { | 
|  | dtv->beg = tls_beg; | 
|  | dtv->size = tls_size; | 
|  | return dtv; | 
|  | } | 
|  | VReport(2, "__tls_get_addr: Can't guess glibc version\n"); | 
|  | // This may happen inside the DTOR a thread, or async signal handlers before | 
|  | // thread initialization, so just ignore it. | 
|  | // | 
|  | // If the unknown block is dynamic TLS, unlikely we will be able to recognize | 
|  | // it in future, mark it as done with '{tls_beg, 0}'. | 
|  | // | 
|  | // If the block is static TLS, possible reason of failed detection is nullptr | 
|  | // in `static_tls_begin`. Regardless of reasons, the future handling of static | 
|  | // TLS is still '{tls_beg, 0}'. | 
|  | dtv->beg = tls_beg; | 
|  | dtv->size = 0; | 
|  | return nullptr; | 
|  | } | 
|  |  | 
|  | DTLS *DTLS_Get() { return &dtls; } | 
|  |  | 
|  | bool DTLSInDestruction(DTLS *dtls) { | 
|  | return atomic_load(&dtls->dtv_block, memory_order_relaxed) == | 
|  | kDestroyedThread; | 
|  | } | 
|  |  | 
|  | #else | 
|  | SANITIZER_INTERFACE_WEAK_DEF(uptr, __sanitizer_get_dtls_size, const void *) { | 
|  | return 0; | 
|  | } | 
|  | DTLS::DTV *DTLS_on_tls_get_addr(void *arg, void *res, | 
|  | unsigned long, unsigned long) { return 0; } | 
|  | DTLS *DTLS_Get() { return 0; } | 
|  | void DTLS_Destroy() {} | 
|  | bool DTLSInDestruction(DTLS *dtls) { | 
|  | UNREACHABLE("dtls is unsupported on this platform!"); | 
|  | } | 
|  |  | 
|  | #endif  // SANITIZER_INTERCEPT_TLS_GET_ADDR | 
|  |  | 
|  | }  // namespace __sanitizer |