2017-09-19 22:54:40 +02:00
|
|
|
// Copyright 2017 The Abseil Authors.
|
|
|
|
//
|
|
|
|
// Licensed under the Apache License, Version 2.0 (the "License");
|
|
|
|
// you may not use this file except in compliance with the License.
|
|
|
|
// You may obtain a copy of the License at
|
|
|
|
//
|
2019-03-08 16:27:53 +01:00
|
|
|
// https://www.apache.org/licenses/LICENSE-2.0
|
2017-09-19 22:54:40 +02:00
|
|
|
//
|
|
|
|
// Unless required by applicable law or agreed to in writing, software
|
|
|
|
// distributed under the License is distributed on an "AS IS" BASIS,
|
|
|
|
// WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
|
|
|
|
// See the License for the specific language governing permissions and
|
|
|
|
// limitations under the License.
|
|
|
|
//
|
|
|
|
// -----------------------------------------------------------------------------
|
|
|
|
// mutex.h
|
|
|
|
// -----------------------------------------------------------------------------
|
|
|
|
//
|
|
|
|
// This header file defines a `Mutex` -- a mutually exclusive lock -- and the
|
|
|
|
// most common type of synchronization primitive for facilitating locks on
|
|
|
|
// shared resources. A mutex is used to prevent multiple threads from accessing
|
|
|
|
// and/or writing to a shared resource concurrently.
|
|
|
|
//
|
|
|
|
// Unlike a `std::mutex`, the Abseil `Mutex` provides the following additional
|
|
|
|
// features:
|
|
|
|
// * Conditional predicates intrinsic to the `Mutex` object
|
2018-07-12 19:34:29 +02:00
|
|
|
// * Shared/reader locks, in addition to standard exclusive/writer locks
|
2017-09-19 22:54:40 +02:00
|
|
|
// * Deadlock detection and debug support.
|
|
|
|
//
|
|
|
|
// The following helper classes are also defined within this file:
|
|
|
|
//
|
|
|
|
// MutexLock - An RAII wrapper to acquire and release a `Mutex` for exclusive/
|
|
|
|
// write access within the current scope.
|
2020-11-21 14:43:54 +01:00
|
|
|
//
|
2017-09-19 22:54:40 +02:00
|
|
|
// ReaderMutexLock
|
|
|
|
// - An RAII wrapper to acquire and release a `Mutex` for shared/read
|
|
|
|
// access within the current scope.
|
|
|
|
//
|
|
|
|
// WriterMutexLock
|
2020-11-21 14:43:54 +01:00
|
|
|
// - Effectively an alias for `MutexLock` above, designed for use in
|
|
|
|
// distinguishing reader and writer locks within code.
|
2017-09-19 22:54:40 +02:00
|
|
|
//
|
|
|
|
// In addition to simple mutex locks, this file also defines ways to perform
|
|
|
|
// locking under certain conditions.
|
|
|
|
//
|
2020-11-21 14:43:54 +01:00
|
|
|
// Condition - (Preferred) Used to wait for a particular predicate that
|
|
|
|
// depends on state protected by the `Mutex` to become true.
|
|
|
|
// CondVar - A lower-level variant of `Condition` that relies on
|
|
|
|
// application code to explicitly signal the `CondVar` when
|
|
|
|
// a condition has been met.
|
2017-09-19 22:54:40 +02:00
|
|
|
//
|
|
|
|
// See below for more information on using `Condition` or `CondVar`.
|
|
|
|
//
|
|
|
|
// Mutexes and mutex behavior can be quite complicated. The information within
|
|
|
|
// this header file is limited, as a result. Please consult the Mutex guide for
|
|
|
|
// more complete information and examples.
|
|
|
|
|
|
|
|
#ifndef ABSL_SYNCHRONIZATION_MUTEX_H_
|
|
|
|
#define ABSL_SYNCHRONIZATION_MUTEX_H_
|
|
|
|
|
|
|
|
#include <atomic>
|
|
|
|
#include <cstdint>
|
|
|
|
#include <string>
|
|
|
|
|
2018-12-13 19:30:03 +01:00
|
|
|
#include "absl/base/const_init.h"
|
2017-09-19 22:54:40 +02:00
|
|
|
#include "absl/base/internal/identity.h"
|
|
|
|
#include "absl/base/internal/low_level_alloc.h"
|
|
|
|
#include "absl/base/internal/thread_identity.h"
|
2018-01-29 07:33:45 +01:00
|
|
|
#include "absl/base/internal/tsan_mutex_interface.h"
|
2017-09-19 22:54:40 +02:00
|
|
|
#include "absl/base/port.h"
|
|
|
|
#include "absl/base/thread_annotations.h"
|
|
|
|
#include "absl/synchronization/internal/kernel_timeout.h"
|
|
|
|
#include "absl/synchronization/internal/per_thread_sem.h"
|
|
|
|
#include "absl/time/time.h"
|
|
|
|
|
|
|
|
namespace absl {
|
2019-12-12 19:36:03 +01:00
|
|
|
ABSL_NAMESPACE_BEGIN
|
2017-09-19 22:54:40 +02:00
|
|
|
|
|
|
|
class Condition;
|
2017-09-24 17:20:48 +02:00
|
|
|
struct SynchWaitParams;
|
2017-09-19 22:54:40 +02:00
|
|
|
|
|
|
|
// -----------------------------------------------------------------------------
|
|
|
|
// Mutex
|
|
|
|
// -----------------------------------------------------------------------------
|
|
|
|
//
|
|
|
|
// A `Mutex` is a non-reentrant (aka non-recursive) Mutually Exclusive lock
|
|
|
|
// on some resource, typically a variable or data structure with associated
|
|
|
|
// invariants. Proper usage of mutexes prevents concurrent access by different
|
|
|
|
// threads to the same resource.
|
|
|
|
//
|
|
|
|
// A `Mutex` has two basic operations: `Mutex::Lock()` and `Mutex::Unlock()`.
|
|
|
|
// The `Lock()` operation *acquires* a `Mutex` (in a state known as an
|
|
|
|
// *exclusive* -- or write -- lock), while the `Unlock()` operation *releases* a
|
|
|
|
// Mutex. During the span of time between the Lock() and Unlock() operations,
|
|
|
|
// a mutex is said to be *held*. By design all mutexes support exclusive/write
|
|
|
|
// locks, as this is the most common way to use a mutex.
|
|
|
|
//
|
|
|
|
// The `Mutex` state machine for basic lock/unlock operations is quite simple:
|
|
|
|
//
|
|
|
|
// | | Lock() | Unlock() |
|
|
|
|
// |----------------+------------+----------|
|
|
|
|
// | Free | Exclusive | invalid |
|
|
|
|
// | Exclusive | blocks | Free |
|
|
|
|
//
|
|
|
|
// Attempts to `Unlock()` must originate from the thread that performed the
|
|
|
|
// corresponding `Lock()` operation.
|
|
|
|
//
|
|
|
|
// An "invalid" operation is disallowed by the API. The `Mutex` implementation
|
|
|
|
// is allowed to do anything on an invalid call, including but not limited to
|
|
|
|
// crashing with a useful error message, silently succeeding, or corrupting
|
|
|
|
// data structures. In debug mode, the implementation attempts to crash with a
|
|
|
|
// useful error message.
|
|
|
|
//
|
|
|
|
// `Mutex` is not guaranteed to be "fair" in prioritizing waiting threads; it
|
|
|
|
// is, however, approximately fair over long periods, and starvation-free for
|
|
|
|
// threads at the same priority.
|
|
|
|
//
|
|
|
|
// The lock/unlock primitives are now annotated with lock annotations
|
|
|
|
// defined in (base/thread_annotations.h). When writing multi-threaded code,
|
|
|
|
// you should use lock annotations whenever possible to document your lock
|
|
|
|
// synchronization policy. Besides acting as documentation, these annotations
|
|
|
|
// also help compilers or static analysis tools to identify and warn about
|
|
|
|
// issues that could potentially result in race conditions and deadlocks.
|
|
|
|
//
|
|
|
|
// For more information about the lock annotations, please see
|
|
|
|
// [Thread Safety Analysis](http://clang.llvm.org/docs/ThreadSafetyAnalysis.html)
|
|
|
|
// in the Clang documentation.
|
|
|
|
//
|
|
|
|
// See also `MutexLock`, below, for scoped `Mutex` acquisition.
|
|
|
|
|
2019-09-05 11:54:58 +02:00
|
|
|
class ABSL_LOCKABLE Mutex {
|
2017-09-19 22:54:40 +02:00
|
|
|
public:
|
2018-12-13 19:30:03 +01:00
|
|
|
// Creates a `Mutex` that is not held by anyone. This constructor is
|
|
|
|
// typically used for Mutexes allocated on the heap or the stack.
|
|
|
|
//
|
|
|
|
// To create `Mutex` instances with static storage duration
|
|
|
|
// (e.g. a namespace-scoped or global variable), see
|
|
|
|
// `Mutex::Mutex(absl::kConstInit)` below instead.
|
2017-09-19 22:54:40 +02:00
|
|
|
Mutex();
|
2018-12-13 19:30:03 +01:00
|
|
|
|
|
|
|
// Creates a mutex with static storage duration. A global variable
|
|
|
|
// constructed this way avoids the lifetime issues that can occur on program
|
|
|
|
// startup and shutdown. (See absl/base/const_init.h.)
|
|
|
|
//
|
|
|
|
// For Mutexes allocated on the heap and stack, instead use the default
|
|
|
|
// constructor, which can interact more fully with the thread sanitizer.
|
|
|
|
//
|
|
|
|
// Example usage:
|
|
|
|
// namespace foo {
|
|
|
|
// ABSL_CONST_INIT Mutex mu(absl::kConstInit);
|
|
|
|
// }
|
|
|
|
explicit constexpr Mutex(absl::ConstInitType);
|
2019-03-19 19:14:01 +01:00
|
|
|
|
2017-09-19 22:54:40 +02:00
|
|
|
~Mutex();
|
|
|
|
|
|
|
|
// Mutex::Lock()
|
|
|
|
//
|
|
|
|
// Blocks the calling thread, if necessary, until this `Mutex` is free, and
|
|
|
|
// then acquires it exclusively. (This lock is also known as a "write lock.")
|
2019-09-05 11:54:58 +02:00
|
|
|
void Lock() ABSL_EXCLUSIVE_LOCK_FUNCTION();
|
2017-09-19 22:54:40 +02:00
|
|
|
|
|
|
|
// Mutex::Unlock()
|
|
|
|
//
|
|
|
|
// Releases this `Mutex` and returns it from the exclusive/write state to the
|
|
|
|
// free state. Caller must hold the `Mutex` exclusively.
|
2019-09-05 11:54:58 +02:00
|
|
|
void Unlock() ABSL_UNLOCK_FUNCTION();
|
2017-09-19 22:54:40 +02:00
|
|
|
|
|
|
|
// Mutex::TryLock()
|
|
|
|
//
|
|
|
|
// If the mutex can be acquired without blocking, does so exclusively and
|
|
|
|
// returns `true`. Otherwise, returns `false`. Returns `true` with high
|
|
|
|
// probability if the `Mutex` was free.
|
2019-09-05 11:54:58 +02:00
|
|
|
bool TryLock() ABSL_EXCLUSIVE_TRYLOCK_FUNCTION(true);
|
2017-09-19 22:54:40 +02:00
|
|
|
|
|
|
|
// Mutex::AssertHeld()
|
|
|
|
//
|
|
|
|
// Return immediately if this thread holds the `Mutex` exclusively (in write
|
|
|
|
// mode). Otherwise, may report an error (typically by crashing with a
|
|
|
|
// diagnostic), or may return immediately.
|
2019-09-05 11:54:58 +02:00
|
|
|
void AssertHeld() const ABSL_ASSERT_EXCLUSIVE_LOCK();
|
2017-09-19 22:54:40 +02:00
|
|
|
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
// Reader-Writer Locking
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
|
|
|
|
// A Mutex can also be used as a starvation-free reader-writer lock.
|
|
|
|
// Neither read-locks nor write-locks are reentrant/recursive to avoid
|
|
|
|
// potential client programming errors.
|
|
|
|
//
|
|
|
|
// The Mutex API provides `Writer*()` aliases for the existing `Lock()`,
|
|
|
|
// `Unlock()` and `TryLock()` methods for use within applications mixing
|
|
|
|
// reader/writer locks. Using `Reader*()` and `Writer*()` operations in this
|
|
|
|
// manner can make locking behavior clearer when mixing read and write modes.
|
|
|
|
//
|
|
|
|
// Introducing reader locks necessarily complicates the `Mutex` state
|
|
|
|
// machine somewhat. The table below illustrates the allowed state transitions
|
|
|
|
// of a mutex in such cases. Note that ReaderLock() may block even if the lock
|
|
|
|
// is held in shared mode; this occurs when another thread is blocked on a
|
|
|
|
// call to WriterLock().
|
|
|
|
//
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
// Operation: WriterLock() Unlock() ReaderLock() ReaderUnlock()
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
// State
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
// Free Exclusive invalid Shared(1) invalid
|
|
|
|
// Shared(1) blocks invalid Shared(2) or blocks Free
|
|
|
|
// Shared(n) n>1 blocks invalid Shared(n+1) or blocks Shared(n-1)
|
|
|
|
// Exclusive blocks Free blocks invalid
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
//
|
|
|
|
// In comments below, "shared" refers to a state of Shared(n) for any n > 0.
|
|
|
|
|
|
|
|
// Mutex::ReaderLock()
|
|
|
|
//
|
|
|
|
// Blocks the calling thread, if necessary, until this `Mutex` is either free,
|
|
|
|
// or in shared mode, and then acquires a share of it. Note that
|
|
|
|
// `ReaderLock()` will block if some other thread has an exclusive/writer lock
|
|
|
|
// on the mutex.
|
|
|
|
|
2019-09-05 11:54:58 +02:00
|
|
|
void ReaderLock() ABSL_SHARED_LOCK_FUNCTION();
|
2017-09-19 22:54:40 +02:00
|
|
|
|
|
|
|
// Mutex::ReaderUnlock()
|
|
|
|
//
|
|
|
|
// Releases a read share of this `Mutex`. `ReaderUnlock` may return a mutex to
|
|
|
|
// the free state if this thread holds the last reader lock on the mutex. Note
|
|
|
|
// that you cannot call `ReaderUnlock()` on a mutex held in write mode.
|
2019-09-05 11:54:58 +02:00
|
|
|
void ReaderUnlock() ABSL_UNLOCK_FUNCTION();
|
2017-09-19 22:54:40 +02:00
|
|
|
|
|
|
|
// Mutex::ReaderTryLock()
|
|
|
|
//
|
|
|
|
// If the mutex can be acquired without blocking, acquires this mutex for
|
|
|
|
// shared access and returns `true`. Otherwise, returns `false`. Returns
|
|
|
|
// `true` with high probability if the `Mutex` was free or shared.
|
2019-09-05 11:54:58 +02:00
|
|
|
bool ReaderTryLock() ABSL_SHARED_TRYLOCK_FUNCTION(true);
|
2017-09-19 22:54:40 +02:00
|
|
|
|
|
|
|
// Mutex::AssertReaderHeld()
|
|
|
|
//
|
|
|
|
// Returns immediately if this thread holds the `Mutex` in at least shared
|
|
|
|
// mode (read mode). Otherwise, may report an error (typically by
|
|
|
|
// crashing with a diagnostic), or may return immediately.
|
2019-09-05 11:54:58 +02:00
|
|
|
void AssertReaderHeld() const ABSL_ASSERT_SHARED_LOCK();
|
2017-09-19 22:54:40 +02:00
|
|
|
|
|
|
|
// Mutex::WriterLock()
|
|
|
|
// Mutex::WriterUnlock()
|
|
|
|
// Mutex::WriterTryLock()
|
|
|
|
//
|
|
|
|
// Aliases for `Mutex::Lock()`, `Mutex::Unlock()`, and `Mutex::TryLock()`.
|
|
|
|
//
|
2018-01-30 22:05:25 +01:00
|
|
|
// These methods may be used (along with the complementary `Reader*()`
|
|
|
|
// methods) to distingish simple exclusive `Mutex` usage (`Lock()`,
|
2017-09-19 22:54:40 +02:00
|
|
|
// etc.) from reader/writer lock usage.
|
2019-09-05 11:54:58 +02:00
|
|
|
void WriterLock() ABSL_EXCLUSIVE_LOCK_FUNCTION() { this->Lock(); }
|
2017-09-19 22:54:40 +02:00
|
|
|
|
2019-09-05 11:54:58 +02:00
|
|
|
void WriterUnlock() ABSL_UNLOCK_FUNCTION() { this->Unlock(); }
|
2017-09-19 22:54:40 +02:00
|
|
|
|
2019-09-05 11:54:58 +02:00
|
|
|
bool WriterTryLock() ABSL_EXCLUSIVE_TRYLOCK_FUNCTION(true) {
|
2017-09-19 22:54:40 +02:00
|
|
|
return this->TryLock();
|
|
|
|
}
|
|
|
|
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
// Conditional Critical Regions
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
|
|
|
|
// Conditional usage of a `Mutex` can occur using two distinct paradigms:
|
|
|
|
//
|
|
|
|
// * Use of `Mutex` member functions with `Condition` objects.
|
|
|
|
// * Use of the separate `CondVar` abstraction.
|
|
|
|
//
|
|
|
|
// In general, prefer use of `Condition` and the `Mutex` member functions
|
|
|
|
// listed below over `CondVar`. When there are multiple threads waiting on
|
|
|
|
// distinctly different conditions, however, a battery of `CondVar`s may be
|
|
|
|
// more efficient. This section discusses use of `Condition` objects.
|
|
|
|
//
|
|
|
|
// `Mutex` contains member functions for performing lock operations only under
|
|
|
|
// certain conditions, of class `Condition`. For correctness, the `Condition`
|
|
|
|
// must return a boolean that is a pure function, only of state protected by
|
|
|
|
// the `Mutex`. The condition must be invariant w.r.t. environmental state
|
|
|
|
// such as thread, cpu id, or time, and must be `noexcept`. The condition will
|
|
|
|
// always be invoked with the mutex held in at least read mode, so you should
|
|
|
|
// not block it for long periods or sleep it on a timer.
|
|
|
|
//
|
|
|
|
// Since a condition must not depend directly on the current time, use
|
|
|
|
// `*WithTimeout()` member function variants to make your condition
|
|
|
|
// effectively true after a given duration, or `*WithDeadline()` variants to
|
|
|
|
// make your condition effectively true after a given time.
|
|
|
|
//
|
|
|
|
// The condition function should have no side-effects aside from debug
|
|
|
|
// logging; as a special exception, the function may acquire other mutexes
|
|
|
|
// provided it releases all those that it acquires. (This exception was
|
|
|
|
// required to allow logging.)
|
|
|
|
|
|
|
|
// Mutex::Await()
|
|
|
|
//
|
|
|
|
// Unlocks this `Mutex` and blocks until simultaneously both `cond` is `true`
|
|
|
|
// and this `Mutex` can be reacquired, then reacquires this `Mutex` in the
|
|
|
|
// same mode in which it was previously held. If the condition is initially
|
|
|
|
// `true`, `Await()` *may* skip the release/re-acquire step.
|
|
|
|
//
|
|
|
|
// `Await()` requires that this thread holds this `Mutex` in some mode.
|
|
|
|
void Await(const Condition &cond);
|
|
|
|
|
|
|
|
// Mutex::LockWhen()
|
|
|
|
// Mutex::ReaderLockWhen()
|
|
|
|
// Mutex::WriterLockWhen()
|
|
|
|
//
|
2018-07-12 19:34:29 +02:00
|
|
|
// Blocks until simultaneously both `cond` is `true` and this `Mutex` can
|
2017-09-19 22:54:40 +02:00
|
|
|
// be acquired, then atomically acquires this `Mutex`. `LockWhen()` is
|
|
|
|
// logically equivalent to `*Lock(); Await();` though they may have different
|
|
|
|
// performance characteristics.
|
2019-09-05 11:54:58 +02:00
|
|
|
void LockWhen(const Condition &cond) ABSL_EXCLUSIVE_LOCK_FUNCTION();
|
2017-09-19 22:54:40 +02:00
|
|
|
|
2019-09-05 11:54:58 +02:00
|
|
|
void ReaderLockWhen(const Condition &cond) ABSL_SHARED_LOCK_FUNCTION();
|
2017-09-19 22:54:40 +02:00
|
|
|
|
2019-09-05 11:54:58 +02:00
|
|
|
void WriterLockWhen(const Condition &cond) ABSL_EXCLUSIVE_LOCK_FUNCTION() {
|
2017-09-19 22:54:40 +02:00
|
|
|
this->LockWhen(cond);
|
|
|
|
}
|
|
|
|
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
// Mutex Variants with Timeouts/Deadlines
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
|
|
|
|
// Mutex::AwaitWithTimeout()
|
|
|
|
// Mutex::AwaitWithDeadline()
|
|
|
|
//
|
2020-04-16 00:13:54 +02:00
|
|
|
// Unlocks this `Mutex` and blocks until simultaneously:
|
2017-09-19 22:54:40 +02:00
|
|
|
// - either `cond` is true or the {timeout has expired, deadline has passed}
|
|
|
|
// and
|
|
|
|
// - this `Mutex` can be reacquired,
|
|
|
|
// then reacquire this `Mutex` in the same mode in which it was previously
|
|
|
|
// held, returning `true` iff `cond` is `true` on return.
|
|
|
|
//
|
2020-04-16 00:13:54 +02:00
|
|
|
// If the condition is initially `true`, the implementation *may* skip the
|
|
|
|
// release/re-acquire step and return immediately.
|
|
|
|
//
|
2017-09-19 22:54:40 +02:00
|
|
|
// Deadlines in the past are equivalent to an immediate deadline.
|
|
|
|
// Negative timeouts are equivalent to a zero timeout.
|
|
|
|
//
|
|
|
|
// This method requires that this thread holds this `Mutex` in some mode.
|
|
|
|
bool AwaitWithTimeout(const Condition &cond, absl::Duration timeout);
|
|
|
|
|
|
|
|
bool AwaitWithDeadline(const Condition &cond, absl::Time deadline);
|
|
|
|
|
|
|
|
// Mutex::LockWhenWithTimeout()
|
|
|
|
// Mutex::ReaderLockWhenWithTimeout()
|
|
|
|
// Mutex::WriterLockWhenWithTimeout()
|
|
|
|
//
|
|
|
|
// Blocks until simultaneously both:
|
|
|
|
// - either `cond` is `true` or the timeout has expired, and
|
|
|
|
// - this `Mutex` can be acquired,
|
|
|
|
// then atomically acquires this `Mutex`, returning `true` iff `cond` is
|
|
|
|
// `true` on return.
|
|
|
|
//
|
|
|
|
// Negative timeouts are equivalent to a zero timeout.
|
|
|
|
bool LockWhenWithTimeout(const Condition &cond, absl::Duration timeout)
|
2019-09-05 11:54:58 +02:00
|
|
|
ABSL_EXCLUSIVE_LOCK_FUNCTION();
|
2017-09-19 22:54:40 +02:00
|
|
|
bool ReaderLockWhenWithTimeout(const Condition &cond, absl::Duration timeout)
|
2019-09-05 11:54:58 +02:00
|
|
|
ABSL_SHARED_LOCK_FUNCTION();
|
2017-09-19 22:54:40 +02:00
|
|
|
bool WriterLockWhenWithTimeout(const Condition &cond, absl::Duration timeout)
|
2019-09-05 11:54:58 +02:00
|
|
|
ABSL_EXCLUSIVE_LOCK_FUNCTION() {
|
2017-09-19 22:54:40 +02:00
|
|
|
return this->LockWhenWithTimeout(cond, timeout);
|
|
|
|
}
|
|
|
|
|
|
|
|
// Mutex::LockWhenWithDeadline()
|
|
|
|
// Mutex::ReaderLockWhenWithDeadline()
|
|
|
|
// Mutex::WriterLockWhenWithDeadline()
|
|
|
|
//
|
|
|
|
// Blocks until simultaneously both:
|
|
|
|
// - either `cond` is `true` or the deadline has been passed, and
|
|
|
|
// - this `Mutex` can be acquired,
|
|
|
|
// then atomically acquires this Mutex, returning `true` iff `cond` is `true`
|
|
|
|
// on return.
|
|
|
|
//
|
|
|
|
// Deadlines in the past are equivalent to an immediate deadline.
|
|
|
|
bool LockWhenWithDeadline(const Condition &cond, absl::Time deadline)
|
2019-09-05 11:54:58 +02:00
|
|
|
ABSL_EXCLUSIVE_LOCK_FUNCTION();
|
2017-09-19 22:54:40 +02:00
|
|
|
bool ReaderLockWhenWithDeadline(const Condition &cond, absl::Time deadline)
|
2019-09-05 11:54:58 +02:00
|
|
|
ABSL_SHARED_LOCK_FUNCTION();
|
2017-09-19 22:54:40 +02:00
|
|
|
bool WriterLockWhenWithDeadline(const Condition &cond, absl::Time deadline)
|
2019-09-05 11:54:58 +02:00
|
|
|
ABSL_EXCLUSIVE_LOCK_FUNCTION() {
|
2017-09-19 22:54:40 +02:00
|
|
|
return this->LockWhenWithDeadline(cond, deadline);
|
|
|
|
}
|
|
|
|
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
// Debug Support: Invariant Checking, Deadlock Detection, Logging.
|
|
|
|
// ---------------------------------------------------------------------------
|
|
|
|
|
|
|
|
// Mutex::EnableInvariantDebugging()
|
|
|
|
//
|
|
|
|
// If `invariant`!=null and if invariant debugging has been enabled globally,
|
|
|
|
// cause `(*invariant)(arg)` to be called at moments when the invariant for
|
|
|
|
// this `Mutex` should hold (for example: just after acquire, just before
|
|
|
|
// release).
|
|
|
|
//
|
|
|
|
// The routine `invariant` should have no side-effects since it is not
|
|
|
|
// guaranteed how many times it will be called; it should check the invariant
|
|
|
|
// and crash if it does not hold. Enabling global invariant debugging may
|
|
|
|
// substantially reduce `Mutex` performance; it should be set only for
|
|
|
|
// non-production runs. Optimization options may also disable invariant
|
|
|
|
// checks.
|
|
|
|
void EnableInvariantDebugging(void (*invariant)(void *), void *arg);
|
|
|
|
|
|
|
|
// Mutex::EnableDebugLog()
|
|
|
|
//
|
|
|
|
// Cause all subsequent uses of this `Mutex` to be logged via
|
|
|
|
// `ABSL_RAW_LOG(INFO)`. Log entries are tagged with `name` if no previous
|
|
|
|
// call to `EnableInvariantDebugging()` or `EnableDebugLog()` has been made.
|
|
|
|
//
|
|
|
|
// Note: This method substantially reduces `Mutex` performance.
|
|
|
|
void EnableDebugLog(const char *name);
|
|
|
|
|
|
|
|
// Deadlock detection
|
|
|
|
|
|
|
|
// Mutex::ForgetDeadlockInfo()
|
|
|
|
//
|
|
|
|
// Forget any deadlock-detection information previously gathered
|
|
|
|
// about this `Mutex`. Call this method in debug mode when the lock ordering
|
|
|
|
// of a `Mutex` changes.
|
|
|
|
void ForgetDeadlockInfo();
|
|
|
|
|
|
|
|
// Mutex::AssertNotHeld()
|
|
|
|
//
|
|
|
|
// Return immediately if this thread does not hold this `Mutex` in any
|
|
|
|
// mode; otherwise, may report an error (typically by crashing with a
|
|
|
|
// diagnostic), or may return immediately.
|
|
|
|
//
|
|
|
|
// Currently this check is performed only if all of:
|
|
|
|
// - in debug mode
|
|
|
|
// - SetMutexDeadlockDetectionMode() has been set to kReport or kAbort
|
|
|
|
// - number of locks concurrently held by this thread is not large.
|
|
|
|
// are true.
|
|
|
|
void AssertNotHeld() const;
|
|
|
|
|
|
|
|
// Special cases.
|
|
|
|
|
|
|
|
// A `MuHow` is a constant that indicates how a lock should be acquired.
|
|
|
|
// Internal implementation detail. Clients should ignore.
|
|
|
|
typedef const struct MuHowS *MuHow;
|
|
|
|
|
|
|
|
// Mutex::InternalAttemptToUseMutexInFatalSignalHandler()
|
|
|
|
//
|
|
|
|
// Causes the `Mutex` implementation to prepare itself for re-entry caused by
|
|
|
|
// future use of `Mutex` within a fatal signal handler. This method is
|
|
|
|
// intended for use only for last-ditch attempts to log crash information.
|
|
|
|
// It does not guarantee that attempts to use Mutexes within the handler will
|
|
|
|
// not deadlock; it merely makes other faults less likely.
|
|
|
|
//
|
|
|
|
// WARNING: This routine must be invoked from a signal handler, and the
|
|
|
|
// signal handler must either loop forever or terminate the process.
|
|
|
|
// Attempts to return from (or `longjmp` out of) the signal handler once this
|
|
|
|
// call has been made may cause arbitrary program behaviour including
|
|
|
|
// crashes and deadlocks.
|
|
|
|
static void InternalAttemptToUseMutexInFatalSignalHandler();
|
|
|
|
|
|
|
|
private:
|
|
|
|
std::atomic<intptr_t> mu_; // The Mutex state.
|
|
|
|
|
|
|
|
// Post()/Wait() versus associated PerThreadSem; in class for required
|
|
|
|
// friendship with PerThreadSem.
|
|
|
|
static inline void IncrementSynchSem(Mutex *mu,
|
|
|
|
base_internal::PerThreadSynch *w);
|
|
|
|
static inline bool DecrementSynchSem(
|
|
|
|
Mutex *mu, base_internal::PerThreadSynch *w,
|
|
|
|
synchronization_internal::KernelTimeout t);
|
|
|
|
|
|
|
|
// slow path acquire
|
|
|
|
void LockSlowLoop(SynchWaitParams *waitp, int flags);
|
|
|
|
// wrappers around LockSlowLoop()
|
|
|
|
bool LockSlowWithDeadline(MuHow how, const Condition *cond,
|
|
|
|
synchronization_internal::KernelTimeout t,
|
|
|
|
int flags);
|
|
|
|
void LockSlow(MuHow how, const Condition *cond,
|
|
|
|
int flags) ABSL_ATTRIBUTE_COLD;
|
|
|
|
// slow path release
|
|
|
|
void UnlockSlow(SynchWaitParams *waitp) ABSL_ATTRIBUTE_COLD;
|
|
|
|
// Common code between Await() and AwaitWithTimeout/Deadline()
|
|
|
|
bool AwaitCommon(const Condition &cond,
|
|
|
|
synchronization_internal::KernelTimeout t);
|
|
|
|
// Attempt to remove thread s from queue.
|
|
|
|
void TryRemove(base_internal::PerThreadSynch *s);
|
|
|
|
// Block a thread on mutex.
|
|
|
|
void Block(base_internal::PerThreadSynch *s);
|
|
|
|
// Wake a thread; return successor.
|
|
|
|
base_internal::PerThreadSynch *Wakeup(base_internal::PerThreadSynch *w);
|
|
|
|
|
|
|
|
friend class CondVar; // for access to Trans()/Fer().
|
|
|
|
void Trans(MuHow how); // used for CondVar->Mutex transfer
|
|
|
|
void Fer(
|
|
|
|
base_internal::PerThreadSynch *w); // used for CondVar->Mutex transfer
|
|
|
|
|
|
|
|
// Catch the error of writing Mutex when intending MutexLock.
|
|
|
|
Mutex(const volatile Mutex * /*ignored*/) {} // NOLINT(runtime/explicit)
|
|
|
|
|
|
|
|
Mutex(const Mutex&) = delete;
|
|
|
|
Mutex& operator=(const Mutex&) = delete;
|
|
|
|
};
|
|
|
|
|
|
|
|
// -----------------------------------------------------------------------------
|
|
|
|
// Mutex RAII Wrappers
|
|
|
|
// -----------------------------------------------------------------------------
|
|
|
|
|
|
|
|
// MutexLock
|
|
|
|
//
|
|
|
|
// `MutexLock` is a helper class, which acquires and releases a `Mutex` via
|
|
|
|
// RAII.
|
|
|
|
//
|
|
|
|
// Example:
|
|
|
|
//
|
|
|
|
// Class Foo {
|
2020-11-21 14:43:54 +01:00
|
|
|
// public:
|
2017-09-19 22:54:40 +02:00
|
|
|
// Foo::Bar* Baz() {
|
2020-11-21 14:43:54 +01:00
|
|
|
// MutexLock lock(&mu_);
|
2017-09-19 22:54:40 +02:00
|
|
|
// ...
|
|
|
|
// return bar;
|
|
|
|
// }
|
|
|
|
//
|
|
|
|
// private:
|
2020-11-21 14:43:54 +01:00
|
|
|
// Mutex mu_;
|
2017-09-19 22:54:40 +02:00
|
|
|
// };
|
2019-09-05 11:54:58 +02:00
|
|
|
class ABSL_SCOPED_LOCKABLE MutexLock {
|
2017-09-19 22:54:40 +02:00
|
|
|
public:
|
2020-11-21 14:43:54 +01:00
|
|
|
// Constructors
|
|
|
|
|
|
|
|
// Calls `mu->Lock()` and returns when that call returns. That is, `*mu` is
|
|
|
|
// guaranteed to be locked when this object is constructed. Requires that
|
|
|
|
// `mu` be dereferenceable.
|
2019-09-05 11:54:58 +02:00
|
|
|
explicit MutexLock(Mutex *mu) ABSL_EXCLUSIVE_LOCK_FUNCTION(mu) : mu_(mu) {
|
2017-09-19 22:54:40 +02:00
|
|
|
this->mu_->Lock();
|
|
|
|
}
|
2018-04-11 18:52:42 +02:00
|
|
|
|
2020-11-21 14:43:54 +01:00
|
|
|
// Like above, but calls `mu->LockWhen(cond)` instead. That is, in addition to
|
|
|
|
// the above, the condition given by `cond` is also guaranteed to hold when
|
|
|
|
// this object is constructed.
|
|
|
|
explicit MutexLock(Mutex *mu, const Condition &cond)
|
|
|
|
ABSL_EXCLUSIVE_LOCK_FUNCTION(mu)
|
|
|
|
: mu_(mu) {
|
|
|
|
this->mu_->LockWhen(cond);
|
|
|
|
}
|
|
|
|
|
2018-04-11 18:52:42 +02:00
|
|
|
MutexLock(const MutexLock &) = delete; // NOLINT(runtime/mutex)
|
|
|
|
MutexLock(MutexLock&&) = delete; // NOLINT(runtime/mutex)
|
|
|
|
MutexLock& operator=(const MutexLock&) = delete;
|
|
|
|
MutexLock& operator=(MutexLock&&) = delete;
|
|
|
|
|
2019-09-05 11:54:58 +02:00
|
|
|
~MutexLock() ABSL_UNLOCK_FUNCTION() { this->mu_->Unlock(); }
|
2018-04-11 18:52:42 +02:00
|
|
|
|
2017-09-19 22:54:40 +02:00
|
|
|
private:
|
|
|
|
Mutex *const mu_;
|
|
|
|
};
|
|
|
|
|
|
|
|
// ReaderMutexLock
|
|
|
|
//
|
|
|
|
// The `ReaderMutexLock` is a helper class, like `MutexLock`, which acquires and
|
|
|
|
// releases a shared lock on a `Mutex` via RAII.
|
2019-09-05 11:54:58 +02:00
|
|
|
class ABSL_SCOPED_LOCKABLE ReaderMutexLock {
|
2017-09-19 22:54:40 +02:00
|
|
|
public:
|
2019-09-05 11:54:58 +02:00
|
|
|
explicit ReaderMutexLock(Mutex *mu) ABSL_SHARED_LOCK_FUNCTION(mu) : mu_(mu) {
|
2017-09-19 22:54:40 +02:00
|
|
|
mu->ReaderLock();
|
|
|
|
}
|
2018-04-11 18:52:42 +02:00
|
|
|
|
2020-11-21 14:43:54 +01:00
|
|
|
explicit ReaderMutexLock(Mutex *mu, const Condition &cond)
|
|
|
|
ABSL_SHARED_LOCK_FUNCTION(mu)
|
|
|
|
: mu_(mu) {
|
|
|
|
mu->ReaderLockWhen(cond);
|
|
|
|
}
|
|
|
|
|
2018-04-11 18:52:42 +02:00
|
|
|
ReaderMutexLock(const ReaderMutexLock&) = delete;
|
|
|
|
ReaderMutexLock(ReaderMutexLock&&) = delete;
|
|
|
|
ReaderMutexLock& operator=(const ReaderMutexLock&) = delete;
|
|
|
|
ReaderMutexLock& operator=(ReaderMutexLock&&) = delete;
|
|
|
|
|
2019-09-05 11:54:58 +02:00
|
|
|
~ReaderMutexLock() ABSL_UNLOCK_FUNCTION() { this->mu_->ReaderUnlock(); }
|
2018-04-11 18:52:42 +02:00
|
|
|
|
2017-09-19 22:54:40 +02:00
|
|
|
private:
|
|
|
|
Mutex *const mu_;
|
|
|
|
};
|
|
|
|
|
|
|
|
// WriterMutexLock
|
|
|
|
//
|
|
|
|
// The `WriterMutexLock` is a helper class, like `MutexLock`, which acquires and
|
2018-08-02 19:08:43 +02:00
|
|
|
// releases a write (exclusive) lock on a `Mutex` via RAII.
|
2019-09-05 11:54:58 +02:00
|
|
|
class ABSL_SCOPED_LOCKABLE WriterMutexLock {
|
2017-09-19 22:54:40 +02:00
|
|
|
public:
|
2019-09-05 11:54:58 +02:00
|
|
|
explicit WriterMutexLock(Mutex *mu) ABSL_EXCLUSIVE_LOCK_FUNCTION(mu)
|
2017-09-19 22:54:40 +02:00
|
|
|
: mu_(mu) {
|
|
|
|
mu->WriterLock();
|
|
|
|
}
|
2018-04-11 18:52:42 +02:00
|
|
|
|
2020-11-21 14:43:54 +01:00
|
|
|
explicit WriterMutexLock(Mutex *mu, const Condition &cond)
|
|
|
|
ABSL_EXCLUSIVE_LOCK_FUNCTION(mu)
|
|
|
|
: mu_(mu) {
|
|
|
|
mu->WriterLockWhen(cond);
|
|
|
|
}
|
|
|
|
|
2018-04-11 18:52:42 +02:00
|
|
|
WriterMutexLock(const WriterMutexLock&) = delete;
|
|
|
|
WriterMutexLock(WriterMutexLock&&) = delete;
|
|
|
|
WriterMutexLock& operator=(const WriterMutexLock&) = delete;
|
|
|
|
WriterMutexLock& operator=(WriterMutexLock&&) = delete;
|
|
|
|
|
2019-09-05 11:54:58 +02:00
|
|
|
~WriterMutexLock() ABSL_UNLOCK_FUNCTION() { this->mu_->WriterUnlock(); }
|
2018-04-11 18:52:42 +02:00
|
|
|
|
2017-09-19 22:54:40 +02:00
|
|
|
private:
|
|
|
|
Mutex *const mu_;
|
|
|
|
};
|
|
|
|
|
|
|
|
// -----------------------------------------------------------------------------
|
|
|
|
// Condition
|
|
|
|
// -----------------------------------------------------------------------------
|
|
|
|
//
|
|
|
|
// As noted above, `Mutex` contains a number of member functions which take a
|
2018-10-29 23:53:34 +01:00
|
|
|
// `Condition` as an argument; clients can wait for conditions to become `true`
|
2017-09-19 22:54:40 +02:00
|
|
|
// before attempting to acquire the mutex. These sections are known as
|
|
|
|
// "condition critical" sections. To use a `Condition`, you simply need to
|
|
|
|
// construct it, and use within an appropriate `Mutex` member function;
|
|
|
|
// everything else in the `Condition` class is an implementation detail.
|
|
|
|
//
|
|
|
|
// A `Condition` is specified as a function pointer which returns a boolean.
|
|
|
|
// `Condition` functions should be pure functions -- their results should depend
|
|
|
|
// only on passed arguments, should not consult any external state (such as
|
|
|
|
// clocks), and should have no side-effects, aside from debug logging. Any
|
|
|
|
// objects that the function may access should be limited to those which are
|
|
|
|
// constant while the mutex is blocked on the condition (e.g. a stack variable),
|
|
|
|
// or objects of state protected explicitly by the mutex.
|
|
|
|
//
|
|
|
|
// No matter which construction is used for `Condition`, the underlying
|
|
|
|
// function pointer / functor / callable must not throw any
|
|
|
|
// exceptions. Correctness of `Mutex` / `Condition` is not guaranteed in
|
|
|
|
// the face of a throwing `Condition`. (When Abseil is allowed to depend
|
|
|
|
// on C++17, these function pointers will be explicitly marked
|
|
|
|
// `noexcept`; until then this requirement cannot be enforced in the
|
|
|
|
// type system.)
|
|
|
|
//
|
2020-11-21 14:43:54 +01:00
|
|
|
// Note: to use a `Condition`, you need only construct it and pass it to a
|
|
|
|
// suitable `Mutex' member function, such as `Mutex::Await()`, or to the
|
|
|
|
// constructor of one of the scope guard classes.
|
2017-09-19 22:54:40 +02:00
|
|
|
//
|
2020-11-21 14:43:54 +01:00
|
|
|
// Example using LockWhen/Unlock:
|
2017-09-19 22:54:40 +02:00
|
|
|
//
|
|
|
|
// // assume count_ is not internal reference count
|
Export of internal Abseil changes
--
f13697e3d33803f9667d124072da4f6dd8bfbf85 by Andy Soffer <asoffer@google.com>:
Addressing https://github.com/abseil/abseil-cpp/issues/314, fixing
CMakeLists.txt to reference ABSL_TEST_COPTS rather than ABSL_DEFAULT_COPTS.
ABSL_TEST_COPTS should be preferred for all tests so that they are configured consistently (moreover, CMake should agree with Bazel).
PiperOrigin-RevId: 274932312
--
c31c24a1fa6bb98136adf51ef37c0818ac366690 by Derek Mauro <dmauro@google.com>:
Silence MSAN in the stack consumption test utility
PiperOrigin-RevId: 274912950
--
2412913c05a246cd527cd4c31452f126e9129f3a by CJ Johnson <johnsoncj@google.com>:
Internal change
PiperOrigin-RevId: 274847103
--
75e984a93b5760873501b96ac3229ccfd955daf8 by Abseil Team <absl-team@google.com>:
Reformat BUILD file to current standards.
PiperOrigin-RevId: 274815392
--
a2780e085f1df1e4ca2c814a58c893d1b78a1d9c by Samuel Benzaquen <sbenza@google.com>:
Fix invalid result regarding leading zeros in the exponent.
PiperOrigin-RevId: 274808017
--
dd402e1cb5c4ebacb576372ae24bf289d729d323 by Samuel Benzaquen <sbenza@google.com>:
Make string_view's relational operators constexpr when possible.
PiperOrigin-RevId: 274807873
--
b4ef32565653a5da1cb8bb8d0351586d23519658 by Abseil Team <absl-team@google.com>:
Internal rework.
PiperOrigin-RevId: 274787159
--
70d81971c5914e6785b8e8a9d4f6eb2655dd62c0 by Gennadiy Rozental <rogeeff@google.com>:
Internal rework.
PiperOrigin-RevId: 274715557
--
14f5b0440e353b899cafaaa15b53e77f98f401af by Gennadiy Rozental <rogeeff@google.com>:
Make deprecated statements about ParseFLag/UnparseFlag consistent in a file.
PiperOrigin-RevId: 274668123
--
2e85adbdbb92612e4d750bc34fbca3333128b42d by Abseil Team <absl-team@google.com>:
Allow absl::c_equal to be used with arrays.
This is achieved by allowing container size computation for arrays.
PiperOrigin-RevId: 274426830
--
219719f107226d328773e6cec99fb473f5d3119c by Gennadiy Rozental <rogeeff@google.com>:
Release correct extension interfaces to support usage of absl::Time and absl::Duration as ABSL_FLAG
PiperOrigin-RevId: 274273788
--
47a77f93fda23b69b4a6bdbd506fe643c69a5579 by Gennadiy Rozental <rogeeff@google.com>:
Rework of flags persistence/FlagSaver internals.
PiperOrigin-RevId: 274225213
--
7807be3fe757c19e3b0c487298387683d4c9f5b3 by Abseil Team <absl-team@google.com>:
Switch reference to sdkddkver.h to lowercase, matching conventions used in the Windows SDK and other uses. This helps to avoid confusion on case-sensitive filesystems.
PiperOrigin-RevId: 274061877
--
561304090087a19f1d10f0475f564fe132ebf06e by Andy Getzendanner <durandal@google.com>:
Fix ABSL_WAITER_MODE detection for mingw
Import of https://github.com/abseil/abseil-cpp/pull/342
PiperOrigin-RevId: 274030071
--
9b3caac2cf202b9d440dfa1b4ffd538ac4bf715b by Derek Mauro <dmauro@google.com>:
Support using Abseil with the musl libc implementation.
Only test changes were required:
* Workaround for a bug in sigaltstack() on musl
* printf-style pointer formatting (%p) is implementation defined,
so verify StrFromat produces something compatible
* Fix detection of feenableexcept()
PiperOrigin-RevId: 274011666
--
73e8a938fc139e1cc8670d4513a445bacc855539 by Abseil Team <absl-team@google.com>:
nvcc workaround: explicitly specify the definition of node_handle::Base
PiperOrigin-RevId: 274011392
--
ab9cc6d042aca7d48e16c504ab10eab39433f4b2 by Andy Soffer <asoffer@google.com>:
Internal change
PiperOrigin-RevId: 273996318
--
e567c4979ca99c7e71821ec1523b8f5edd2c76ac by Abseil Team <absl-team@google.com>:
Introduce a type alias to work around an nvcc bug.
On the previous code, nvcc gets confused thinking that T has to be a parameter
pack, as IsDecomposable accepts one.
PiperOrigin-RevId: 273980472
--
105b6e6339b77a32f4432de05f44cd3f9c436751 by Eric Fiselier <ericwf@google.com>:
Import of CCTZ from GitHub.
PiperOrigin-RevId: 273955589
--
8feb87ff1d7e721fe094855e67c19539d5e582b7 by Abseil Team <absl-team@google.com>:
Avoid dual-exporting scheduling_mode.h
PiperOrigin-RevId: 273825112
--
fbc37854776d295dae98fb9d06a541f296daab95 by Andy Getzendanner <durandal@google.com>:
Fix ABSL_HAVE_ALARM check on mingw
Import of https://github.com/abseil/abseil-cpp/pull/341
PiperOrigin-RevId: 273817839
--
6aedcd63a735b9133e143b043744ba0a25407f6f by Andy Soffer <asoffer@google.com>:
Remove bit_gen_view.h now that all callers have been migrated to bit_gen_ref.h
Tested:
TGP - https://test.corp.google.com/ui#id=OCL:273762409:BASE:273743370:1570639020744:3001bcb5
PiperOrigin-RevId: 273810331
--
6573de24a66ba715c579f7f32b5c48a1d743c7f8 by Abseil Team <absl-team@google.com>:
Internal change.
PiperOrigin-RevId: 273589963
--
91c8c28b6dca26d98b39e8e06a8ed17c701ff793 by Abseil Team <absl-team@google.com>:
Update macro name for `ABSL_GUARDED_BY()` in the example section.
PiperOrigin-RevId: 273286983
--
0ff7d1a93d70f8ecd693f8dbb98b7a4a016ca2a4 by Abseil Team <absl-team@google.com>:
Fix potential integer overflow in the absl time library.
In absl::FromTM, the tm.tm_year is added by 1900 regarding that tm.tm_year represents the years since 1900. This change checks integer overflow before doing the arithmetic operation.
PiperOrigin-RevId: 273092952
--
b41c2a1310086807be09a833099ae6d4009f037c by Gennadiy Rozental <rogeeff@google.com>:
Correctly Unlock the global mutex in case of concurrent flag initialization.
Fixes #386
PiperOrigin-RevId: 272979749
--
c53103e71b2a6063af3c6d4ff68aa2d8f9ae9e06 by Abseil Team <absl-team@google.com>:
Try to become idle only when there is no wakeup.
Immediately after waking up (when futex wait returns), the current thread tries
to become idle doing bunch of memory loads and a branch. Problem is that there
is a good chance that we woke up due to a wakeup, especially for actively used
threads. For such wakeups, calling MaybeBecomeIdle() would be a waste of
cycles.
Instead, call MaybeBecomeIdle() only when we are sure there is no wakeup. For
idle threads the net effect should be the same. For active, threads this will
be more efficient.
Moreover, since MaybeBecomeIdle() is called before waiting on the futex, the
current thread will try to become idle before sleeping. This should result
in more accurate idleness and more efficient release of thread resources.
PiperOrigin-RevId: 272940381
GitOrigin-RevId: f13697e3d33803f9667d124072da4f6dd8bfbf85
Change-Id: I36de05aec12595183725652dd362dfa58fb095d0
2019-10-16 03:18:40 +02:00
|
|
|
// int count_ ABSL_GUARDED_BY(mu_);
|
2020-11-21 14:43:54 +01:00
|
|
|
// Condition count_is_zero(+[](int *count) { return *count == 0; }, &count_);
|
|
|
|
//
|
|
|
|
// mu_.LockWhen(count_is_zero);
|
|
|
|
// // ...
|
|
|
|
// mu_.Unlock();
|
2017-09-19 22:54:40 +02:00
|
|
|
//
|
2020-11-21 14:43:54 +01:00
|
|
|
// Example using a scope guard:
|
|
|
|
//
|
|
|
|
// {
|
|
|
|
// MutexLock lock(&mu_, count_is_zero);
|
|
|
|
// // ...
|
|
|
|
// }
|
2017-09-19 22:54:40 +02:00
|
|
|
//
|
|
|
|
// When multiple threads are waiting on exactly the same condition, make sure
|
|
|
|
// that they are constructed with the same parameters (same pointer to function
|
|
|
|
// + arg, or same pointer to object + method), so that the mutex implementation
|
|
|
|
// can avoid redundantly evaluating the same condition for each thread.
|
|
|
|
class Condition {
|
|
|
|
public:
|
|
|
|
// A Condition that returns the result of "(*func)(arg)"
|
|
|
|
Condition(bool (*func)(void *), void *arg);
|
|
|
|
|
|
|
|
// Templated version for people who are averse to casts.
|
|
|
|
//
|
|
|
|
// To use a lambda, prepend it with unary plus, which converts the lambda
|
|
|
|
// into a function pointer:
|
|
|
|
// Condition(+[](T* t) { return ...; }, arg).
|
|
|
|
//
|
|
|
|
// Note: lambdas in this case must contain no bound variables.
|
|
|
|
//
|
|
|
|
// See class comment for performance advice.
|
|
|
|
template<typename T>
|
|
|
|
Condition(bool (*func)(T *), T *arg);
|
|
|
|
|
|
|
|
// Templated version for invoking a method that returns a `bool`.
|
|
|
|
//
|
|
|
|
// `Condition(object, &Class::Method)` constructs a `Condition` that evaluates
|
|
|
|
// `object->Method()`.
|
|
|
|
//
|
|
|
|
// Implementation Note: `absl::internal::identity` is used to allow methods to
|
|
|
|
// come from base classes. A simpler signature like
|
|
|
|
// `Condition(T*, bool (T::*)())` does not suffice.
|
|
|
|
template<typename T>
|
|
|
|
Condition(T *object, bool (absl::internal::identity<T>::type::* method)());
|
|
|
|
|
|
|
|
// Same as above, for const members
|
|
|
|
template<typename T>
|
|
|
|
Condition(const T *object,
|
|
|
|
bool (absl::internal::identity<T>::type::* method)() const);
|
|
|
|
|
|
|
|
// A Condition that returns the value of `*cond`
|
|
|
|
explicit Condition(const bool *cond);
|
|
|
|
|
|
|
|
// Templated version for invoking a functor that returns a `bool`.
|
|
|
|
// This approach accepts pointers to non-mutable lambdas, `std::function`,
|
|
|
|
// the result of` std::bind` and user-defined functors that define
|
|
|
|
// `bool F::operator()() const`.
|
|
|
|
//
|
|
|
|
// Example:
|
|
|
|
//
|
|
|
|
// auto reached = [this, current]() {
|
|
|
|
// mu_.AssertReaderHeld(); // For annotalysis.
|
|
|
|
// return processed_ >= current;
|
|
|
|
// };
|
|
|
|
// mu_.Await(Condition(&reached));
|
2020-11-21 14:43:54 +01:00
|
|
|
//
|
|
|
|
// NOTE: never use "mu_.AssertHeld()" instead of "mu_.AssertReaderHeld()" in
|
|
|
|
// the lambda as it may be called when the mutex is being unlocked from a
|
|
|
|
// scope holding only a reader lock, which will make the assertion not
|
|
|
|
// fulfilled and crash the binary.
|
2017-09-19 22:54:40 +02:00
|
|
|
|
|
|
|
// See class comment for performance advice. In particular, if there
|
|
|
|
// might be more than one waiter for the same condition, make sure
|
|
|
|
// that all waiters construct the condition with the same pointers.
|
|
|
|
|
|
|
|
// Implementation note: The second template parameter ensures that this
|
|
|
|
// constructor doesn't participate in overload resolution if T doesn't have
|
|
|
|
// `bool operator() const`.
|
|
|
|
template <typename T, typename E = decltype(
|
|
|
|
static_cast<bool (T::*)() const>(&T::operator()))>
|
|
|
|
explicit Condition(const T *obj)
|
|
|
|
: Condition(obj, static_cast<bool (T::*)() const>(&T::operator())) {}
|
|
|
|
|
|
|
|
// A Condition that always returns `true`.
|
|
|
|
static const Condition kTrue;
|
|
|
|
|
|
|
|
// Evaluates the condition.
|
|
|
|
bool Eval() const;
|
|
|
|
|
|
|
|
// Returns `true` if the two conditions are guaranteed to return the same
|
|
|
|
// value if evaluated at the same time, `false` if the evaluation *may* return
|
|
|
|
// different results.
|
|
|
|
//
|
|
|
|
// Two `Condition` values are guaranteed equal if both their `func` and `arg`
|
|
|
|
// components are the same. A null pointer is equivalent to a `true`
|
|
|
|
// condition.
|
|
|
|
static bool GuaranteedEqual(const Condition *a, const Condition *b);
|
|
|
|
|
|
|
|
private:
|
|
|
|
typedef bool (*InternalFunctionType)(void * arg);
|
|
|
|
typedef bool (Condition::*InternalMethodType)();
|
|
|
|
typedef bool (*InternalMethodCallerType)(void * arg,
|
|
|
|
InternalMethodType internal_method);
|
|
|
|
|
|
|
|
bool (*eval_)(const Condition*); // Actual evaluator
|
|
|
|
InternalFunctionType function_; // function taking pointer returning bool
|
|
|
|
InternalMethodType method_; // method returning bool
|
|
|
|
void *arg_; // arg of function_ or object of method_
|
|
|
|
|
|
|
|
Condition(); // null constructor used only to create kTrue
|
|
|
|
|
|
|
|
// Various functions eval_ can point to:
|
|
|
|
static bool CallVoidPtrFunction(const Condition*);
|
|
|
|
template <typename T> static bool CastAndCallFunction(const Condition* c);
|
|
|
|
template <typename T> static bool CastAndCallMethod(const Condition* c);
|
|
|
|
};
|
|
|
|
|
|
|
|
// -----------------------------------------------------------------------------
|
|
|
|
// CondVar
|
|
|
|
// -----------------------------------------------------------------------------
|
|
|
|
//
|
|
|
|
// A condition variable, reflecting state evaluated separately outside of the
|
|
|
|
// `Mutex` object, which can be signaled to wake callers.
|
|
|
|
// This class is not normally needed; use `Mutex` member functions such as
|
|
|
|
// `Mutex::Await()` and intrinsic `Condition` abstractions. In rare cases
|
|
|
|
// with many threads and many conditions, `CondVar` may be faster.
|
|
|
|
//
|
|
|
|
// The implementation may deliver signals to any condition variable at
|
|
|
|
// any time, even when no call to `Signal()` or `SignalAll()` is made; as a
|
|
|
|
// result, upon being awoken, you must check the logical condition you have
|
2018-01-17 18:53:47 +01:00
|
|
|
// been waiting upon.
|
2017-09-19 22:54:40 +02:00
|
|
|
//
|
|
|
|
// Examples:
|
|
|
|
//
|
|
|
|
// Usage for a thread waiting for some condition C protected by mutex mu:
|
|
|
|
// mu.Lock();
|
|
|
|
// while (!C) { cv->Wait(&mu); } // releases and reacquires mu
|
|
|
|
// // C holds; process data
|
|
|
|
// mu.Unlock();
|
|
|
|
//
|
|
|
|
// Usage to wake T is:
|
|
|
|
// mu.Lock();
|
|
|
|
// // process data, possibly establishing C
|
|
|
|
// if (C) { cv->Signal(); }
|
|
|
|
// mu.Unlock();
|
|
|
|
//
|
|
|
|
// If C may be useful to more than one waiter, use `SignalAll()` instead of
|
|
|
|
// `Signal()`.
|
|
|
|
//
|
|
|
|
// With this implementation it is efficient to use `Signal()/SignalAll()` inside
|
|
|
|
// the locked region; this usage can make reasoning about your program easier.
|
|
|
|
//
|
|
|
|
class CondVar {
|
|
|
|
public:
|
2020-05-13 00:05:26 +02:00
|
|
|
// A `CondVar` allocated on the heap or on the stack can use the this
|
|
|
|
// constructor.
|
2017-09-19 22:54:40 +02:00
|
|
|
CondVar();
|
|
|
|
~CondVar();
|
|
|
|
|
|
|
|
// CondVar::Wait()
|
|
|
|
//
|
2018-01-17 18:53:47 +01:00
|
|
|
// Atomically releases a `Mutex` and blocks on this condition variable.
|
|
|
|
// Waits until awakened by a call to `Signal()` or `SignalAll()` (or a
|
|
|
|
// spurious wakeup), then reacquires the `Mutex` and returns.
|
|
|
|
//
|
2017-09-19 22:54:40 +02:00
|
|
|
// Requires and ensures that the current thread holds the `Mutex`.
|
|
|
|
void Wait(Mutex *mu);
|
|
|
|
|
|
|
|
// CondVar::WaitWithTimeout()
|
|
|
|
//
|
2018-01-17 18:53:47 +01:00
|
|
|
// Atomically releases a `Mutex` and blocks on this condition variable.
|
|
|
|
// Waits until awakened by a call to `Signal()` or `SignalAll()` (or a
|
|
|
|
// spurious wakeup), or until the timeout has expired, then reacquires
|
|
|
|
// the `Mutex` and returns.
|
2017-09-19 22:54:40 +02:00
|
|
|
//
|
|
|
|
// Returns true if the timeout has expired without this `CondVar`
|
|
|
|
// being signalled in any manner. If both the timeout has expired
|
|
|
|
// and this `CondVar` has been signalled, the implementation is free
|
|
|
|
// to return `true` or `false`.
|
|
|
|
//
|
|
|
|
// Requires and ensures that the current thread holds the `Mutex`.
|
|
|
|
bool WaitWithTimeout(Mutex *mu, absl::Duration timeout);
|
|
|
|
|
|
|
|
// CondVar::WaitWithDeadline()
|
|
|
|
//
|
2018-01-17 18:53:47 +01:00
|
|
|
// Atomically releases a `Mutex` and blocks on this condition variable.
|
|
|
|
// Waits until awakened by a call to `Signal()` or `SignalAll()` (or a
|
|
|
|
// spurious wakeup), or until the deadline has passed, then reacquires
|
|
|
|
// the `Mutex` and returns.
|
2017-09-19 22:54:40 +02:00
|
|
|
//
|
|
|
|
// Deadlines in the past are equivalent to an immediate deadline.
|
|
|
|
//
|
|
|
|
// Returns true if the deadline has passed without this `CondVar`
|
|
|
|
// being signalled in any manner. If both the deadline has passed
|
|
|
|
// and this `CondVar` has been signalled, the implementation is free
|
|
|
|
// to return `true` or `false`.
|
|
|
|
//
|
|
|
|
// Requires and ensures that the current thread holds the `Mutex`.
|
|
|
|
bool WaitWithDeadline(Mutex *mu, absl::Time deadline);
|
|
|
|
|
|
|
|
// CondVar::Signal()
|
|
|
|
//
|
|
|
|
// Signal this `CondVar`; wake at least one waiter if one exists.
|
|
|
|
void Signal();
|
|
|
|
|
|
|
|
// CondVar::SignalAll()
|
|
|
|
//
|
|
|
|
// Signal this `CondVar`; wake all waiters.
|
|
|
|
void SignalAll();
|
|
|
|
|
|
|
|
// CondVar::EnableDebugLog()
|
|
|
|
//
|
|
|
|
// Causes all subsequent uses of this `CondVar` to be logged via
|
|
|
|
// `ABSL_RAW_LOG(INFO)`. Log entries are tagged with `name` if `name != 0`.
|
|
|
|
// Note: this method substantially reduces `CondVar` performance.
|
|
|
|
void EnableDebugLog(const char *name);
|
|
|
|
|
|
|
|
private:
|
|
|
|
bool WaitCommon(Mutex *mutex, synchronization_internal::KernelTimeout t);
|
|
|
|
void Remove(base_internal::PerThreadSynch *s);
|
|
|
|
void Wakeup(base_internal::PerThreadSynch *w);
|
|
|
|
std::atomic<intptr_t> cv_; // Condition variable state.
|
|
|
|
CondVar(const CondVar&) = delete;
|
|
|
|
CondVar& operator=(const CondVar&) = delete;
|
|
|
|
};
|
|
|
|
|
|
|
|
|
|
|
|
// Variants of MutexLock.
|
|
|
|
//
|
|
|
|
// If you find yourself using one of these, consider instead using
|
|
|
|
// Mutex::Unlock() and/or if-statements for clarity.
|
|
|
|
|
|
|
|
// MutexLockMaybe
|
|
|
|
//
|
|
|
|
// MutexLockMaybe is like MutexLock, but is a no-op when mu is null.
|
2019-09-05 11:54:58 +02:00
|
|
|
class ABSL_SCOPED_LOCKABLE MutexLockMaybe {
|
2017-09-19 22:54:40 +02:00
|
|
|
public:
|
2019-09-05 11:54:58 +02:00
|
|
|
explicit MutexLockMaybe(Mutex *mu) ABSL_EXCLUSIVE_LOCK_FUNCTION(mu)
|
|
|
|
: mu_(mu) {
|
|
|
|
if (this->mu_ != nullptr) {
|
|
|
|
this->mu_->Lock();
|
|
|
|
}
|
|
|
|
}
|
2020-11-21 14:43:54 +01:00
|
|
|
|
|
|
|
explicit MutexLockMaybe(Mutex *mu, const Condition &cond)
|
|
|
|
ABSL_EXCLUSIVE_LOCK_FUNCTION(mu)
|
|
|
|
: mu_(mu) {
|
|
|
|
if (this->mu_ != nullptr) {
|
|
|
|
this->mu_->LockWhen(cond);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2019-09-05 11:54:58 +02:00
|
|
|
~MutexLockMaybe() ABSL_UNLOCK_FUNCTION() {
|
2017-09-19 22:54:40 +02:00
|
|
|
if (this->mu_ != nullptr) { this->mu_->Unlock(); }
|
|
|
|
}
|
2019-09-05 11:54:58 +02:00
|
|
|
|
2017-09-19 22:54:40 +02:00
|
|
|
private:
|
|
|
|
Mutex *const mu_;
|
|
|
|
MutexLockMaybe(const MutexLockMaybe&) = delete;
|
2018-04-11 18:52:42 +02:00
|
|
|
MutexLockMaybe(MutexLockMaybe&&) = delete;
|
2017-09-19 22:54:40 +02:00
|
|
|
MutexLockMaybe& operator=(const MutexLockMaybe&) = delete;
|
2018-04-11 18:52:42 +02:00
|
|
|
MutexLockMaybe& operator=(MutexLockMaybe&&) = delete;
|
2017-09-19 22:54:40 +02:00
|
|
|
};
|
|
|
|
|
2018-05-18 17:24:54 +02:00
|
|
|
// ReleasableMutexLock
|
2017-09-19 22:54:40 +02:00
|
|
|
//
|
|
|
|
// ReleasableMutexLock is like MutexLock, but permits `Release()` of its
|
|
|
|
// mutex before destruction. `Release()` may be called at most once.
|
2019-09-05 11:54:58 +02:00
|
|
|
class ABSL_SCOPED_LOCKABLE ReleasableMutexLock {
|
2017-09-19 22:54:40 +02:00
|
|
|
public:
|
2019-09-05 11:54:58 +02:00
|
|
|
explicit ReleasableMutexLock(Mutex *mu) ABSL_EXCLUSIVE_LOCK_FUNCTION(mu)
|
2017-09-19 22:54:40 +02:00
|
|
|
: mu_(mu) {
|
|
|
|
this->mu_->Lock();
|
|
|
|
}
|
2020-11-21 14:43:54 +01:00
|
|
|
|
|
|
|
explicit ReleasableMutexLock(Mutex *mu, const Condition &cond)
|
|
|
|
ABSL_EXCLUSIVE_LOCK_FUNCTION(mu)
|
|
|
|
: mu_(mu) {
|
|
|
|
this->mu_->LockWhen(cond);
|
|
|
|
}
|
|
|
|
|
2019-09-05 11:54:58 +02:00
|
|
|
~ReleasableMutexLock() ABSL_UNLOCK_FUNCTION() {
|
2017-09-19 22:54:40 +02:00
|
|
|
if (this->mu_ != nullptr) { this->mu_->Unlock(); }
|
|
|
|
}
|
|
|
|
|
2019-09-05 11:54:58 +02:00
|
|
|
void Release() ABSL_UNLOCK_FUNCTION();
|
2017-09-19 22:54:40 +02:00
|
|
|
|
|
|
|
private:
|
|
|
|
Mutex *mu_;
|
|
|
|
ReleasableMutexLock(const ReleasableMutexLock&) = delete;
|
2018-04-11 18:52:42 +02:00
|
|
|
ReleasableMutexLock(ReleasableMutexLock&&) = delete;
|
2017-09-19 22:54:40 +02:00
|
|
|
ReleasableMutexLock& operator=(const ReleasableMutexLock&) = delete;
|
2018-04-11 18:52:42 +02:00
|
|
|
ReleasableMutexLock& operator=(ReleasableMutexLock&&) = delete;
|
2017-09-19 22:54:40 +02:00
|
|
|
};
|
|
|
|
|
2018-01-29 07:33:45 +01:00
|
|
|
inline Mutex::Mutex() : mu_(0) {
|
|
|
|
ABSL_TSAN_MUTEX_CREATE(this, __tsan_mutex_not_static);
|
|
|
|
}
|
2019-03-19 19:14:01 +01:00
|
|
|
|
2018-12-13 19:30:03 +01:00
|
|
|
inline constexpr Mutex::Mutex(absl::ConstInitType) : mu_(0) {}
|
2017-12-15 20:12:12 +01:00
|
|
|
|
2017-09-19 22:54:40 +02:00
|
|
|
inline CondVar::CondVar() : cv_(0) {}
|
2020-05-13 00:05:26 +02:00
|
|
|
|
2017-09-19 22:54:40 +02:00
|
|
|
// static
|
|
|
|
template <typename T>
|
|
|
|
bool Condition::CastAndCallMethod(const Condition *c) {
|
|
|
|
typedef bool (T::*MemberType)();
|
|
|
|
MemberType rm = reinterpret_cast<MemberType>(c->method_);
|
|
|
|
T *x = static_cast<T *>(c->arg_);
|
|
|
|
return (x->*rm)();
|
|
|
|
}
|
|
|
|
|
|
|
|
// static
|
|
|
|
template <typename T>
|
|
|
|
bool Condition::CastAndCallFunction(const Condition *c) {
|
|
|
|
typedef bool (*FuncType)(T *);
|
|
|
|
FuncType fn = reinterpret_cast<FuncType>(c->function_);
|
|
|
|
T *x = static_cast<T *>(c->arg_);
|
|
|
|
return (*fn)(x);
|
|
|
|
}
|
|
|
|
|
|
|
|
template <typename T>
|
|
|
|
inline Condition::Condition(bool (*func)(T *), T *arg)
|
|
|
|
: eval_(&CastAndCallFunction<T>),
|
|
|
|
function_(reinterpret_cast<InternalFunctionType>(func)),
|
|
|
|
method_(nullptr),
|
|
|
|
arg_(const_cast<void *>(static_cast<const void *>(arg))) {}
|
|
|
|
|
|
|
|
template <typename T>
|
|
|
|
inline Condition::Condition(T *object,
|
|
|
|
bool (absl::internal::identity<T>::type::*method)())
|
|
|
|
: eval_(&CastAndCallMethod<T>),
|
|
|
|
function_(nullptr),
|
|
|
|
method_(reinterpret_cast<InternalMethodType>(method)),
|
|
|
|
arg_(object) {}
|
|
|
|
|
|
|
|
template <typename T>
|
|
|
|
inline Condition::Condition(const T *object,
|
|
|
|
bool (absl::internal::identity<T>::type::*method)()
|
|
|
|
const)
|
|
|
|
: eval_(&CastAndCallMethod<T>),
|
|
|
|
function_(nullptr),
|
|
|
|
method_(reinterpret_cast<InternalMethodType>(method)),
|
|
|
|
arg_(reinterpret_cast<void *>(const_cast<T *>(object))) {}
|
|
|
|
|
|
|
|
// Register a hook for profiling support.
|
|
|
|
//
|
|
|
|
// The function pointer registered here will be called whenever a mutex is
|
|
|
|
// contended. The callback is given the absl/base/cycleclock.h timestamp when
|
|
|
|
// waiting began.
|
|
|
|
//
|
|
|
|
// Calls to this function do not race or block, but there is no ordering
|
|
|
|
// guaranteed between calls to this function and call to the provided hook.
|
|
|
|
// In particular, the previously registered hook may still be called for some
|
|
|
|
// time after this function returns.
|
|
|
|
void RegisterMutexProfiler(void (*fn)(int64_t wait_timestamp));
|
|
|
|
|
|
|
|
// Register a hook for Mutex tracing.
|
|
|
|
//
|
|
|
|
// The function pointer registered here will be called whenever a mutex is
|
|
|
|
// contended. The callback is given an opaque handle to the contended mutex,
|
|
|
|
// an event name, and the number of wait cycles (as measured by
|
|
|
|
// //absl/base/internal/cycleclock.h, and which may not be real
|
|
|
|
// "cycle" counts.)
|
|
|
|
//
|
|
|
|
// The only event name currently sent is "slow release".
|
|
|
|
//
|
|
|
|
// This has the same memory ordering concerns as RegisterMutexProfiler() above.
|
|
|
|
void RegisterMutexTracer(void (*fn)(const char *msg, const void *obj,
|
2020-11-21 14:43:54 +01:00
|
|
|
int64_t wait_cycles));
|
2017-09-19 22:54:40 +02:00
|
|
|
|
|
|
|
// TODO(gfalcon): Combine RegisterMutexProfiler() and RegisterMutexTracer()
|
|
|
|
// into a single interface, since they are only ever called in pairs.
|
|
|
|
|
|
|
|
// Register a hook for CondVar tracing.
|
|
|
|
//
|
|
|
|
// The function pointer registered here will be called here on various CondVar
|
|
|
|
// events. The callback is given an opaque handle to the CondVar object and
|
2018-08-21 20:31:02 +02:00
|
|
|
// a string identifying the event. This is thread-safe, but only a single
|
2017-09-19 22:54:40 +02:00
|
|
|
// tracer can be registered.
|
|
|
|
//
|
|
|
|
// Events that can be sent are "Wait", "Unwait", "Signal wakeup", and
|
|
|
|
// "SignalAll wakeup".
|
|
|
|
//
|
|
|
|
// This has the same memory ordering concerns as RegisterMutexProfiler() above.
|
|
|
|
void RegisterCondVarTracer(void (*fn)(const char *msg, const void *cv));
|
|
|
|
|
|
|
|
// Register a hook for symbolizing stack traces in deadlock detector reports.
|
|
|
|
//
|
|
|
|
// 'pc' is the program counter being symbolized, 'out' is the buffer to write
|
|
|
|
// into, and 'out_size' is the size of the buffer. This function can return
|
2019-12-12 19:36:03 +01:00
|
|
|
// false if symbolizing failed, or true if a NUL-terminated symbol was written
|
2017-09-19 22:54:40 +02:00
|
|
|
// to 'out.'
|
|
|
|
//
|
|
|
|
// This has the same memory ordering concerns as RegisterMutexProfiler() above.
|
2018-05-07 20:12:21 +02:00
|
|
|
//
|
|
|
|
// DEPRECATED: The default symbolizer function is absl::Symbolize() and the
|
|
|
|
// ability to register a different hook for symbolizing stack traces will be
|
|
|
|
// removed on or after 2023-05-01.
|
|
|
|
ABSL_DEPRECATED("absl::RegisterSymbolizer() is deprecated and will be removed "
|
|
|
|
"on or after 2023-05-01")
|
2017-09-19 22:54:40 +02:00
|
|
|
void RegisterSymbolizer(bool (*fn)(const void *pc, char *out, int out_size));
|
|
|
|
|
|
|
|
// EnableMutexInvariantDebugging()
|
|
|
|
//
|
|
|
|
// Enable or disable global support for Mutex invariant debugging. If enabled,
|
|
|
|
// then invariant predicates can be registered per-Mutex for debug checking.
|
|
|
|
// See Mutex::EnableInvariantDebugging().
|
|
|
|
void EnableMutexInvariantDebugging(bool enabled);
|
|
|
|
|
|
|
|
// When in debug mode, and when the feature has been enabled globally, the
|
|
|
|
// implementation will keep track of lock ordering and complain (or optionally
|
|
|
|
// crash) if a cycle is detected in the acquired-before graph.
|
|
|
|
|
|
|
|
// Possible modes of operation for the deadlock detector in debug mode.
|
|
|
|
enum class OnDeadlockCycle {
|
|
|
|
kIgnore, // Neither report on nor attempt to track cycles in lock ordering
|
|
|
|
kReport, // Report lock cycles to stderr when detected
|
|
|
|
kAbort, // Report lock cycles to stderr when detected, then abort
|
|
|
|
};
|
|
|
|
|
|
|
|
// SetMutexDeadlockDetectionMode()
|
|
|
|
//
|
|
|
|
// Enable or disable global support for detection of potential deadlocks
|
|
|
|
// due to Mutex lock ordering inversions. When set to 'kIgnore', tracking of
|
|
|
|
// lock ordering is disabled. Otherwise, in debug builds, a lock ordering graph
|
|
|
|
// will be maintained internally, and detected cycles will be reported in
|
|
|
|
// the manner chosen here.
|
|
|
|
void SetMutexDeadlockDetectionMode(OnDeadlockCycle mode);
|
|
|
|
|
2019-12-12 19:36:03 +01:00
|
|
|
ABSL_NAMESPACE_END
|
2017-09-19 22:54:40 +02:00
|
|
|
} // namespace absl
|
|
|
|
|
|
|
|
// In some build configurations we pass --detect-odr-violations to the
|
|
|
|
// gold linker. This causes it to flag weak symbol overrides as ODR
|
|
|
|
// violations. Because ODR only applies to C++ and not C,
|
|
|
|
// --detect-odr-violations ignores symbols not mangled with C++ names.
|
|
|
|
// By changing our extension points to be extern "C", we dodge this
|
|
|
|
// check.
|
|
|
|
extern "C" {
|
|
|
|
void AbslInternalMutexYield();
|
|
|
|
} // extern "C"
|
2019-03-19 19:14:01 +01:00
|
|
|
|
2017-09-19 22:54:40 +02:00
|
|
|
#endif // ABSL_SYNCHRONIZATION_MUTEX_H_
|