Reserve enough user request stack space in pthread_create.
Bug: 18830897 Change-Id: I1ba4aaeaf66a7ff99c5d82ad45469011171b0a3b
This commit is contained in:
parent
a2177c6ccb
commit
6a7aaf4675
@ -106,25 +106,25 @@ int __init_thread(pthread_internal_t* thread, bool add_to_thread_list) {
|
||||
return error;
|
||||
}
|
||||
|
||||
static void* __create_thread_stack(const pthread_attr_t& attr) {
|
||||
static void* __create_thread_stack(size_t stack_size, size_t guard_size) {
|
||||
// Create a new private anonymous map.
|
||||
int prot = PROT_READ | PROT_WRITE;
|
||||
int flags = MAP_PRIVATE | MAP_ANONYMOUS | MAP_NORESERVE;
|
||||
void* stack = mmap(NULL, attr.stack_size, prot, flags, -1, 0);
|
||||
void* stack = mmap(NULL, stack_size, prot, flags, -1, 0);
|
||||
if (stack == MAP_FAILED) {
|
||||
__libc_format_log(ANDROID_LOG_WARN,
|
||||
"libc",
|
||||
"pthread_create failed: couldn't allocate %zd-byte stack: %s",
|
||||
attr.stack_size, strerror(errno));
|
||||
stack_size, strerror(errno));
|
||||
return NULL;
|
||||
}
|
||||
|
||||
// Set the guard region at the end of the stack to PROT_NONE.
|
||||
if (mprotect(stack, attr.guard_size, PROT_NONE) == -1) {
|
||||
if (mprotect(stack, guard_size, PROT_NONE) == -1) {
|
||||
__libc_format_log(ANDROID_LOG_WARN, "libc",
|
||||
"pthread_create failed: couldn't mprotect PROT_NONE %zd-byte stack guard region: %s",
|
||||
attr.guard_size, strerror(errno));
|
||||
munmap(stack, attr.stack_size);
|
||||
guard_size, strerror(errno));
|
||||
munmap(stack, stack_size);
|
||||
return NULL;
|
||||
}
|
||||
|
||||
@ -132,30 +132,36 @@ static void* __create_thread_stack(const pthread_attr_t& attr) {
|
||||
}
|
||||
|
||||
static int __allocate_thread(pthread_attr_t* attr, pthread_internal_t** threadp, void** child_stack) {
|
||||
size_t allocate_stack_size;
|
||||
uint8_t* stack_top;
|
||||
|
||||
if (attr->stack_base == NULL) {
|
||||
// The caller didn't provide a stack, so allocate one.
|
||||
// Make sure the stack size and guard size are multiples of PAGE_SIZE.
|
||||
attr->stack_size = BIONIC_ALIGN(attr->stack_size, PAGE_SIZE);
|
||||
allocate_stack_size = BIONIC_ALIGN(attr->stack_size + sizeof(pthread_internal_t), PAGE_SIZE);
|
||||
attr->guard_size = BIONIC_ALIGN(attr->guard_size, PAGE_SIZE);
|
||||
attr->stack_base = __create_thread_stack(*attr);
|
||||
attr->stack_base = __create_thread_stack(allocate_stack_size, attr->guard_size);
|
||||
if (attr->stack_base == NULL) {
|
||||
return EAGAIN;
|
||||
}
|
||||
stack_top = reinterpret_cast<uint8_t*>(attr->stack_base) + allocate_stack_size;
|
||||
} else {
|
||||
// The caller did provide a stack, so remember we're not supposed to free it.
|
||||
attr->flags |= PTHREAD_ATTR_FLAG_USER_ALLOCATED_STACK;
|
||||
allocate_stack_size = 0;
|
||||
stack_top = reinterpret_cast<uint8_t*>(attr->stack_base) + attr->stack_size;
|
||||
}
|
||||
|
||||
// Thread stack is used for two sections:
|
||||
// pthread_internal_t.
|
||||
// regular stack, from top to down.
|
||||
uint8_t* stack_top = reinterpret_cast<uint8_t*>(attr->stack_base) + attr->stack_size;
|
||||
stack_top -= sizeof(pthread_internal_t);
|
||||
pthread_internal_t* thread = reinterpret_cast<pthread_internal_t*>(stack_top);
|
||||
|
||||
// No need to check stack_top alignment. The size of pthread_internal_t is 16-bytes aligned,
|
||||
// and user allocated stack is guaranteed by pthread_attr_setstack.
|
||||
|
||||
thread->allocated_stack_size = allocate_stack_size;
|
||||
thread->attr = *attr;
|
||||
__init_tls(thread);
|
||||
|
||||
@ -243,7 +249,7 @@ int pthread_create(pthread_t* thread_out, pthread_attr_t const* attr,
|
||||
// reminder that you can't rewrite this function to use a ScopedPthreadMutexLocker.
|
||||
pthread_mutex_unlock(&thread->startup_handshake_mutex);
|
||||
if (!thread->user_allocated_stack()) {
|
||||
munmap(thread->attr.stack_base, thread->attr.stack_size);
|
||||
munmap(thread->attr.stack_base, thread->allocated_stack_size);
|
||||
}
|
||||
__libc_format_log(ANDROID_LOG_WARN, "libc", "pthread_create failed: clone failed: %s", strerror(errno));
|
||||
return clone_errno;
|
||||
|
@ -89,7 +89,7 @@ void pthread_exit(void* return_value) {
|
||||
|
||||
// Keep track of what we need to know about the stack before we lose the pthread_internal_t.
|
||||
void* stack_base = thread->attr.stack_base;
|
||||
size_t stack_size = thread->attr.stack_size;
|
||||
size_t stack_size = thread->allocated_stack_size;
|
||||
bool free_stack = false;
|
||||
|
||||
pthread_mutex_lock(&g_thread_list_lock);
|
||||
|
@ -86,6 +86,9 @@ struct pthread_internal_t {
|
||||
|
||||
pthread_mutex_t startup_handshake_mutex;
|
||||
|
||||
/* Store real allocated stack size, including thread stack and pthread_internal_t. */
|
||||
int allocated_stack_size;
|
||||
|
||||
void* tls[BIONIC_TLS_SLOTS];
|
||||
|
||||
/*
|
||||
|
@ -53,9 +53,9 @@ void _pthread_internal_remove_locked(pthread_internal_t* thread, bool free_threa
|
||||
|
||||
// For threads using user allocated stack (including the main thread), the pthread_internal_t
|
||||
// can't be freed since it is on the stack.
|
||||
if (free_thread && !(thread->attr.flags & PTHREAD_ATTR_FLAG_USER_ALLOCATED_STACK)) {
|
||||
// Use one munmap to free the whole thread stack, including pthread_internal_t.
|
||||
munmap(thread->attr.stack_base, thread->attr.stack_size);
|
||||
if (free_thread && !thread->user_allocated_stack()) {
|
||||
// Use one munmap to free allocated stack size, including thread stack and pthread_internal_t.
|
||||
munmap(thread->attr.stack_base, thread->allocated_stack_size);
|
||||
}
|
||||
}
|
||||
|
||||
|
@ -644,8 +644,7 @@ TEST(pthread, pthread_attr_setstacksize) {
|
||||
ASSERT_EQ(0, pthread_attr_getstacksize(&attributes, &stack_size));
|
||||
ASSERT_EQ(32*1024U + 1, stack_size);
|
||||
#if defined(__BIONIC__)
|
||||
// Bionic rounds up, which is what POSIX allows.
|
||||
ASSERT_EQ(GetActualStackSize(attributes), (32 + 4)*1024U);
|
||||
ASSERT_EQ(GetActualStackSize(attributes), 32*1024U + 1);
|
||||
#else // __BIONIC__
|
||||
// glibc rounds down, in violation of POSIX. They document this in their BUGS section.
|
||||
ASSERT_EQ(GetActualStackSize(attributes), 32*1024U);
|
||||
|
Loading…
x
Reference in New Issue
Block a user